E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question...

17
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai) Nagore Post, Nagapattinam 611 002, Tamilnadu. Rev.0 COE/2017/QB 1702BA205 INFORMATION MANAGEMENT Academic Year : 2017-2018 Question Bank Programme : MBA Year / Semester : I / II Course Coordinator: Ms L.Aarthi Ms.R.Nivethitha Course Objectives Course Outcomes: 1. Provide students with an understanding and utility of various Management Information Systems in the functional areas of management. 2. Familiarize the students with intricacies of Enterprise Resource Planning and dimensions of e- commerce. 3. Enable the students to gain an understanding about how Information Systems are developed and implemented On completion of the course, students will be able to CO1: Construct data from various sources CO2: Understand the system design CO3: Understand database management system CO4: Identify the vulnerability and threats CO5:.Apply the E-Commerce and cloud computing PART A ( 2 Mark Questions With Key) S.No Questions Mark COs BTL UNIT I INTRODUCTION 1 What is meant by an Information Management? 2 1 K1 Information management (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. This sometimes involves those who have a stake in, or a right to that information. 2 2 List down the characteristics of Information management. 2 1 K1 Operations support system. Transaction Processing System (TPS) Process Control System Enterprise Collaboration System 2 3 How do you differentiate information and data? 2 1 K1 Information Data. 2 It is just text and number It is refined data Records and Observations Analysis Unorganized organized 4 Write needs of information technology. 2 1 K1 Education is a lifelong process therefore anytime anywhere access to it is the need Information explosion is an ever increasing phenomena therefore there is need to get access to this information It is a requirement of the society that the individuals should posses technological literacy 2 5 What are the types of Information system? 2 1 K1 Transaction Processing Systems Management Information Systems Decision Support Systems Executive Information Systems 2 6 What do you meant by OAS? 2 1 K1

Transcript of E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question...

Page 1: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

1702BA205 INFORMATION MANAGEMENT

Academic Year

:

2017-2018

Question Bank

Programme : MBA

Year / Semester : I / II Course Coordinator: Ms L.Aarthi

Ms.R.Nivethitha

Course Objectives

Course Outcomes:

1. Provide students with an understanding

and utility of various Management

Information Systems in the functional

areas of management.

2. Familiarize the students with intricacies

of Enterprise Resource Planning and

dimensions of e- commerce.

3. Enable the students to gain an

understanding about how Information

Systems are developed and

implemented

On completion of the course, students will be able to

CO1: Construct data from various sources

CO2: Understand the system design

CO3: Understand database management system

CO4: Identify the vulnerability and threats

CO5:.Apply the E-Commerce and cloud computing

PART – A ( 2 Mark Questions With Key)

S.No Questions Mark COs BTL

UNIT I INTRODUCTION

1 What is meant by an Information Management? 2 1 K1

Information management (IM) is the collection and management of information from one or

more sources and the distribution of that information to one or more audiences. This

sometimes involves those who have a stake in, or a right to that information.

2

2 List down the characteristics of Information management. 2 1 K1

Operations support system.

Transaction Processing System (TPS)

Process Control System

Enterprise Collaboration System

2

3 How do you differentiate information and data? 2 1 K1

Information Data. 2

It is just text and number It is refined data

Records and Observations Analysis

Unorganized organized

4 Write needs of information technology. 2 1 K1

Education is a lifelong process therefore anytime anywhere access to it is the need

Information explosion is an ever increasing phenomena therefore there is need to get

access to this information

It is a requirement of the society that the individuals should posses technological

literacy

2

5 What are the types of Information system? 2 1 K1

Transaction Processing Systems

Management Information Systems

Decision Support Systems

Executive Information Systems

2

6 What do you meant by OAS? 2 1 K1

Page 2: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

Office Automation Systems (OAS) is a Computer system, such as word processing, electronic

mail system, and scheduling system, that is designed to increase the productivity of data

workers in the office.

2

7 What do you understand about intelligence ? 2 1 K1

Intelligence has been defined in many different ways such as in terms of one's capacity for

logic, abstract thought, understanding, self-awareness, communication, learning, emotional

knowledge,

memory, planning, creativity and problem solving

2

8 What is meant by Transaction Process system and give suitable example 2 1 K1

Transaction Processing Systems (TPS)is Computerized system that performs and records the

daily routine transactions necessary to conduct the business. these systems serve the

operational level of the organization

Example; payroll, accounts payable

2

9 Write about Decision Support System. 2 1 K1

A properly designed Decision Support System is an interactive software-based system

intended to help decision makers compile useful information from raw data, documents,

personal knowledge, and/or business models to identify and solve problems and make

decisions.

2

10 What is Management Information Systems? 2 1 K1

A management information system (MIS) is a computerized database of financial information

organized and programmed in such a way that it produces regular reports on operations for

every level of management in a company.

2

11 What is an EIS? 2 1 K1

An executive information system (EIS) is a decision support system (DSS) used to assist

senior executives in the decision-making process. It does this by providing easy access to

important data needed to achieve strategic goals in an organization. An EIS normally features

graphical displays on an easy-to-use interface.

2

12 What is software prototyping? 2 1 K1

Software prototyping is the activity of creating prototypes of software applications, i.e.,

incomplete versions of the software program being developed.

2

13 What is meant by executive information System? 2 1 K1

An executive information system (EIS), also known as an executive support system (ESS), is a

type of management information system that facilitates and supports senior executive

information and decision-making needs. It provides easy access to internal and

external information relevant to organizational goals.

2

14 What is Geographic information system? 2 1 K1

A geographic information system (GIS) lets us visualize, question, analyze, and interpret data

to understand relationships, patterns, and trends.

2

15 List down the components of DSS 2 1 K1

Data Management Component

User Interface Management Component

Knowledge Management Component

2

UNIT II - SYSTEM ANALYSIS AND DESIGN

1 What is system analysis and design? 2 2 K1

A system is an orderly grouping of interdependent components linked together according to a

plan to achieve a specific objective.

2

2 What is system flow chart? 2 2 K1

System flowcharts are a way of displaying how data flows in a system and how decisions are

made to control events. To illustrate this, symbols are used. They are connected together to

show what happens to data and where it goes. The basic ones include: Symbols used in flow

2

Page 3: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

charts.

3 What are the Characteristics of a System? 2 2 K1

Organization

Interaction

Interdependence

Integration

Central Objective

2

4 What is structured analysis? 2 2 K1

Structured analysis is a software engineering technique that uses graphical diagrams to

develop and portray system specifications that are easily understood by users.

2

5 What is end user computing? 2 2 K1

End-user computing (EUC) is a term that refers to the technologies that IT professionals use to

deploy, manage and secure the devices, applications and data that workers require to perform

their jobs.

2

6 Define system design. 2 2 K1

Systems design is the process of defining the architecture, modules, interfaces, and data for a

system to satisfy specified requirements. Systems design could be seen as the application of

systems theory to product development.

2

7 What do you meant by CASE tool? 2 2 K1

CASE tools stand for Computer Aided Software Engineering tools As the name implies they

are computer based programs to increase the productivity of analysts They permit effective

communication with users as well as other members of the development team.

2

8 What is a Decision table? 2 2 K1

A decision table is a good way to deal with combinations of things (e.g. inputs). This

technique is sometimes also referred to as a ‘cause-effect’ table.

2

9 What is Data Flow Diagram? 2 2 K1

A data flow diagram (DFD) maps out the flow of information for any process or system. It

uses defined symbols like rectangles, circles and arrows, plus short text labels, to show data

inputs, outputs, storage points and the routes between each destination.

2

10 What is an Entity relationship 2 2 K1

Entity-relationship (ER) diagram, is a graphical representation of entities and

their relationships to each other, typically used in computing in regard to the organization of

data within databases or information systems.

2

11 What are the uses of decision table? 2 2 K1

Compact and structured presentation

Preventing errors is easier

Avoid incompleteness and inconsistency

Modular knowledge organization

Powerful visualisation

2

12 What do you meant by (OOAD)

Object-oriented analysis and design (OOAD) is a popular technical approach to analyzing,

designing an application, system, or business by applying the object-oriented paradigm and

visual modeling throughout the development life cycles to foster better stakeholder

communication and product

quality.

2 2 K1

2

13 What is UML Diagrams 2 2 K1

Page 4: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

.

UML (Unified Modeling Language) is a standard language for specifying, visualizing,

constructing, and documenting the artifacts of software systems

2

14 What do you meant by component diagram 2 2 K1

Component diagrams represent a set of components and their relationships. These components

consist of classes, interfaces or collaborations. So Component diagrams represent the

implementation view of a system.

2

15 Define system development life cycle 2 2 K1

The systems development life cycle (SDLC), also referred to as the application development

life-cycle, is a term used in systems engineering, information systems and software

engineering to describe a process for planning, creating, testing, and deploying an

information system.

2

UNIT III- DATABASE MANAGEMENT SYSTEMS

1 Define DBMS 2 3 K1

A database-management system (DBMS) is a computer-software application that interacts

with end-users, other applications, and the database itself to capture and analyze data. A

general-purpose DBMS allows the definition, creation, querying, update, and administration of

databases.

2

2 Define data . 2 3 K1

Data is information that has been translated into a form that is efficient for movement or

processing.

3 What are the four major components of a database system? 2 3 K1

Software

Hardware

Data

Procedures

Database Access Language

Query Processor

Run Time Database Manager

Data Manager

2

4 What is database? 2 3 K1

A database is a collection of information that is organized so that it can be easily accessed,

managed and updated.

5 What do you meant by query language ? 2 3 K1

Query language (QL) refers to any computer programming language that requests and

retrieves data from database and information systems by sending queries. It works on user

entered structured and formal programming command based queries to find and extract data

from host databases.

6 What do you meant by data mining ? 2 3 K1

Data mining is the process of sorting through large data sets to identify patterns and establish

relationships to solve problems through data analysis.

7 Define HDBMS 2 3 K1

A hierarchical database model is a data model in which the data is organized into a tree-like

structure. The data is stored as records which are connected to one another through links. A

record is a collection of fields, with each field containing only one value

8 Define RDBMS 2 3 K1

In relational databases, the relationship between data files is relational. Hierarchical and

network databases require the user to pass a hierarchy in order to access needed data. These

databases connect

to the data in different files by using common data numbers or a key field.

Page 5: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

9 What are all the properties involved in RDBMS 2 3 K1

It's Values are Atomic

In Each Row is alone.

Column Values are of the same thing.

Columns are undistinguished.

Sequence of Rows is Insignificant.

Each Column has a common Name

10 Write down the steps involved in Query Processing?

Step 1 - Parsing and translation

Step 2 -Optimization

Step 3 -Evaluation

2 3 K1

11 Define SQL 2 3 K1

SQL is Structured Query Language, which is a computer language for storing, manipulating

and retrieving data stored in relational database.

12 What is Data mart? 2 3 K1

A data mart is a repository of data that is designed to serve a particular community of

knowledge workers.

13 What do you mean Concurrency control ? 2 3 K1

Concurrency control is a database management systems (DBMS) concept that is used to

address conflicts with the simultaneous accessing or altering of data that can occur with a

multi-user system.

14 What is meant by Data Warehousing? 2 3 K1

A data warehouse is a federated repository for all the data that an enterprise's various business

systems collect. The repository may be physical or logical.

15 What are the steps involved in data mart ? 2 3 K1

Designing

Constructing

Populating

Accessing

Managing

UNIT-IV SECURITY, CONTROL AND REPORTING

1 Define information security. 2 4 K1

Information security (infosec) is a set of strategies for managing the processes, tools and

policies necessary to prevent, detect, document and counter threats to digital and non-digital

information

2 What do you meant by System testing? 2 4 K1

System Testing is a level of the software testing where a complete and integrated software is

tested. The purpose of this test is to evaluate the system's compliance with the specified

requirements.

3 Define Cryptographic. 2 4 K1

Cryptography involves creating written or generated codes that allows information to be kept

secret. Cryptography converts data into a format that is unreadable for an unauthorized user,

allowing it to be transmitted without anyone decoding it back into a readable format, thus

compromising the data.

4 What do you meant by ARQ? 2 4 K1

Automatic repeat request (ARQ) is a protocol for error control in data transmission. When the

receiver detects an error in a packet, it automatically requests the transmitter to resend the

packet. This process is repeated until the packet is error free or the error continues beyond a

predetermined number of transmissions

5 List out the Types of general controls 2 4 K1

Software controls

Page 6: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

Hardware controls

Computer operations controls

Data security controls

Implementation controls

Administrative controls

6 What do you meant by Vulnerability? 2 4 K1

Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to

attack. It may also refer to any type of weakness in a computer system itself, in a set of

procedures, or in anything that leaves information security exposed to a threat.

7 Define Disaster Management 2 4 K1

Disaster management as the organization and management of resources and responsibilities

for dealing with all humanitarian aspects of emergencies, in particular preparedness, response

and recovery in order to lessen the impact of disasters..

8 What is data validation? 2 4 K1

Data validation is the process of ensuring that data have undergone data cleansing to ensure

they have data quality, that is, that they are both correct and useful.

9 Define computer crime. 2 4 K1

Computer crime is an act performed by a knowledgeable computer user, sometimes referred to

as a hacker that illegally browses or steals a company's or individual's private information. In

some cases, this person or group of individuals may be malicious and destroy or otherwise

corrupt the computer or data files.

10 What is system audit? 2 4 K1

An information technology audit, or information systems audit, is an examination of the

management controls within an Information technology (IT) infrastructure.

11 Write any five kinds of computer crime 2 4 K1

Data diddling:

• Salami slicing:

• Phreaking:

• Cloning:

• Carding

12 What do you meant by Intranet 2 4 K1

A local or restricted communications network, especially a private network created using

World Wide Web software.

13 What is Global area network? 2 4 K1

A global area network (GAN) is a network used for supporting mobile across an arbitrary

number of wireless LANs, satellite coverage areas.

14 How security of is IS tested? 2 4 K1

Security testing is a process intended to reveal flaws in the security mechanisms of

an information system that protect data and maintain functionality as intended. Due to the

logical limitations of security testing, passing security testing is not an indication that no

flaws exist or that the system adequately satisfies the security requirements.

15 What is validation of software? 2 4 K1

Validation is determining if the system complies with the requirements and performs functions

for which it is intended and meets the organization’s goals and user needs. Validation is done

at the end of the development process and takes place after verifications are completed.

UNIT-V- NEW IT INITIATIVES

1 Define E-commerce. 2 5 K1

Conducting business online. Selling goods, in the traditional sense, is possible to do

electronically because of certain software programs that run the main functions of an e-

commerce Web site, including product display, online ordering, and inventory management.

2 Define CGI. 2 5 K1

Page 7: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's

request to an application program and to receive data back to forward to the user.

3 Define Data migration 2 5 K1

Data migration is the process of moving, copying, and restructuring data from an existing

system to the ERP system. Migration is critical to implementation success and requires

significant planning.

4 Write down the list of e-Business tools 2 5 K1

Personal digital assistants (pdas)

Electronic data interchange

File transfer

Facsimile

Video conferencing, Internet, intranets and extranets

5 What do you meant by e-governance? 2 5 K1

E-governance is the application of information and communication technology (ICT) for

delivering government services, exchange of information communication transactions,

integration of various stand-alone systems and services between government-to-customer

6 What is ERP? 2 5 K1

Enterprise resource planning (ERP) is a process by which a company manages and integrates

the important parts of its business. An ERP management information system integrates areas

such as planning, purchasing, inventory, sales, marketing, finance and human resources.

7 Write at least four advantage of ERP 2 5 K1

Complete visibility

Automatic and coherent workflow

A unified and single reporting system.

TO provide Business Intelligence

8 Define business intelligence. 2 5 K1

Business intelligence (BI) is the set of techniques and tools for the transformation of raw data

into meaningful and useful information for business analysis purposes. BI technologies are

capable of handling large amounts of unstructured data to help identify, develop and otherwise

create new strategic business opportunities.

9 Define Data mining. 2 5 K1

Data mining is the process of sorting through large data sets to identify patterns and establish

relationships to solve problems through data analysis. Data mining tools allow enterprises to

predict future trends.

10 Mention some of the data mining techniques. 2 5 K1

Prediction.

Decision trees.

Combinations.

Long-term (memory) processing.

11 List out six component of BI 2 5 K1

Multidimensional aggregation and allocation

De normalization, tagging and standardization

Real time reporting with analytical alert

A method of interfacing with unstructured data sources

Group consolidation, budgeting and rolling forecasts

Statistical inference and probabilistic simulation

12 Define cloud computing. 2 5 K1

Cloud computing is computing in which large groups of remote servers are networked to allow

the centralized data storage, and online access to computer services or resources

13 What is hybrid cloud? 2 5 K1

Hybrid cloud is a composition of two or more clouds (private, community or public) that

Page 8: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

remain distinct entities but are bound together, offering the benefits of multiple deployment

models. Hybrid cloud can also mean the ability to connect collocation, managed and/or

dedicated services with cloud resources.

14 Define CMM. 2 5 K1

Capability Maturity Model is a bench-mark for measuring the maturity of an organization's

software process. It is a methodology used to develop and refine an organization's software

development process.

15 What do you meant by Inter cloud? 2 5 K1

The Inter cloud is an interconnected global "cloud of clouds" and an extension of the Internet

"network of networks" on which it is based. The focus is on direct interoperability between

public cloud service providers, more so than between providers and consumers.

PART – B (12 Mark Questions with Key)

S.No Questions Mark COs BTL

UNIT I- INTRODUCTION

1 Define information system and write importance of IS in briefly 12 1 K2

An information system (IS) is a system composed of people and computers that processes or

interprets information. The term is also sometimes used in more restricted senses to refer to

only the software used to run a computerized database or to refer to only a computer system.

Importance Of IS

To control the creation and growth of records

To reduce operating costs

To improve efficiency and productivity

To assimilate new records management technologies

To ensure regulatory compliance

To safeguard vital information

To support better management decision making

2 Write about the Evolution of Information System. 12 1 K2

The first business application of computers (in the mid- 1950s) performed repetitive, high-

volume,transaction-computing tasks.

Transaction processing systems

Management Information Systems (MISs

Decision Support Systems

Intelligent Support System

Data Warehousing:

3 Describe briefly about following with examples

i) Management Information Systems

ii) Decision Support Systems

12 1 K2

Management Information Systems

Information system at the management level of an organization that serves the functions of

planning, controlling, and decision making by providing routine summary and exception

reports.

• TYPE: Management-level

• INPUTS: high volume data

• PROCESSING: simple models

• OUTPUTS: summary reports

• USERS: middle managers

• DECISION-MAKING: structured to semi-structured.

EXAMPLE: annual budgeting

Decision Support Systems

Page 9: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

Information system at the management level of an organization that combines data and

sophisticated analytical models or data analysis tools to support semi-structured and

unstructured decision making.

• TYPE: Management-level

• INPUTS: low volume data

• PROCESSING: simulations, analysis

• OUTPUTS: decision analysis

• USERS: professionals, staff managers

• DECISION-MAKING: semi-structured

EXAMPLE: sales region analysis

4 Elaborate the relationship between GIS , KMS,EIS 12 1 K2

Geographic information system (GIS) is a system designed to capture, store, manipulate,

analyze, manage, and present spatial or geographic data. The acronym GIS is sometimes used

for geographic information science (GIScience) to refer to the academic discipline that studies

geographic information systems[and is a large domain within the broader academic discipline

of geo informatics.

GIS can refer to a number of different technologies, processes, and methods. It is attached to

many operations and has many applications related to engineering, planning, management,

transport/logistics, insurance, telecommunications, and business. For that reason, GIS

and location intelligence applications can be the foundation for many location-enabled services

that rely on analysis and visualization

Knowledge management systems refer to any kind of IT system that stores and

retrieves knowledge, improves collaboration, locates knowledge sources, mines repositories

for hidden knowledge, captures and uses knowledge, or in some other way enhances the KM

process.

If my explanation above makes the definition of these systems seem vague, that is because

there is no consensus as to what constitutes a knowledge management system, much like there

is no consensus regarding KM. Furthermore, since KM is involved in all areas of the firm,

drawing a line is very difficult.

Executive information system (EIS), also known as an executive support system (ESS) is a

type of management information system that facilitates and supports senior executive

information and decision-making needs. It provides easy access to internal and external

information relevant to organizational goals. It is commonly considered a specialized form

of decision support system (DSS).

EIS emphasizes graphical displays and easy-to-use user interfaces. They offer strong reporting

and drill-down capabilities. In general, EIS are enterprise-wide DSS that help top-level

executives analyze, compare, and highlight trends in important variables so that they can

monitor performance and identify opportunities and problems. EIS and data

warehousing technologies are converging in the marketplace.

5 What is Prototyping? And discuss the strength and weakness of Prototyping. 12 1 K2

The Prototyping Model is a systems development method (SDM) in which aprototype (an

early approximation of a final system or product) is built, tested, and then reworked as

ecessary until an acceptable prototype is finally achieved from which the complete system or

product can now be developed.

Page 10: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

Strength

Potential exists for exploiting knowledge gained in an early iteration as later iterations

are developed.

Helps to easily identify confusing or difficult functions and missing functionality.

May generate specifications for a production application.

Encourages innovation and flexible designs.

Provides quick implementation of an incomplete, but functional, application

Weakness

Approval process and control is not strict.

Incomplete or inadequate problem analysis may occur whereby only the most obvious

and superficial needs will be addressed, resulting in current inefficient practices being

easily built into the new system.

Requirements may frequently change significantly.

Identification of non-functional elements is difficult to document.

Designers may prototype too quickly, without sufficient up-front user needs analysis,

resulting in an inflexible design with narrow focus that limits future system potential.

6 Describe about Geographic information system. 12 1 K2

A geographic information system (GIS) is a computer system for capturing, storing, checking,

and displaying data related to positions on Earth’s surface. By relating seemingly unrelated

data, GIS can help individuals and organizations better understand spatial patterns and

relationships.

Data Capture

Cartographic data

Photographic interpretation

Digital data

Remote sensing

GIS Maps

GIS Jobs

UNIT II- SYSTEM ANALYSIS AND DESIGN

1 What is system and explain different kinds of systems with examples ? 12 1 K2

A system is an orderly grouping of interdependent components linked together according to a

plan to achieve a specific objective.

Different kinds of system

Physical system

Abstract System

Deterministic System

Probabilistic System

Social System

Adaptive System

Non Adaptive System

Open System

Closed System

2 Explain the system flow chart and what are the symbols are used in flow chart ? 12 1 K2

System flowcharts are a way of displaying how data flows in a system and how

decisions are made to control events.

Flowcharts use special shapes to represent different types of actions or steps in a

process. Lines and arrows show the sequence of the steps, and the relationships among

them. These are known as flowchart symbols.

Page 11: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

3 Describe the entity relation and its model 12 1 K2

In software engineering, an entity–relationship model (ER model) is a data model for

describing the data or information aspects of a business domain or its process requirements, in

an abstract way that lends itself to ultimately being implemented in a database such as a

relational database.

Entity–Relationship modeling

One-to-One Entity

One-to-Many Entity

Many-to-Many Entity

4 Explain the advantage & disadvantage of CASE tool. 12 1 K2

CASE tools stand for Computer Aided Software Engineering tools As the name implies they

are computer based programs to increase the productivity of analysts They permit effective

communication with users as well as other members of the development team.

Advantage

Integrate the development done during each phase of system development

Permit effective communication with users

They are useful as communication aids with users of the system

Reduce time to develop applications

Improve documentation

Automate system analysis

Disadvantage

Some tools are expensive

All software engineers need to be trained to use these tools

A lot of time is wasted in using the tools

Software developed using CASE tools are of poor quality

Page 12: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

5 Give the system concepts for object modeling –How will you perform object analysis in

the business model.

12 1 K2

Object-oriented analysis and design (OOAD) is a popular technical approach to analyzing,

designing an application, system, or business by applying the object-oriented paradigm and

visual modeling throughout the development life cycles to foster better stakeholder

communication and product quality.

Object-oriented modeling (OOM) is a common approach to modeling applications, systems,

and business domains by using the object-oriented paradigm throughout the entire

development life cycles. OOM is a main technique heavily used by both OOA and OOD

activities in modern software engineering. Efficient and effective communication Useful and

stable abstraction.

Object analysis :

The purpose of any analysis activity in the software life-cycle is to create a model of the

system's functional requirements that is independent of implementation constraints.

Find the objects

Organize the objects

Describe how the objects interact

Define the behavior of the objects 6 Describe about UML Diagrams? 12 1 K2

UML (Unified Modeling Language) is a standard language for specifying, visualizing,

constructing, and documenting the artifacts of software systems

Two broad categories of diagrams

Structural Diagrams

Class diagram

Object diagram

Component diagram

Deployment diagram

Behavioral Diagrams

Use case diagram

Sequence diagram

Collaboration diagram

State chart diagram

Activity diagram

UNIT-III Database Management Systems

1 Explain the characteristics and users of DBMS 12 1 K2

Characteristics

Real-world entity

Relation-based tables

Isolation of data and application

Less redundancy

Consistency

Query Language

Security

USER

Administrators

Designer

2 Define in your own words , a data base and data base management system .discuss the

objectives , advantage and disadvantage of database

12 1 K2

Page 13: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

A database management system stores data, in such a way which is easier to retrieve,

manipulate and helps to produce information

Advantage

Improved data sharing

Improved data security

Better data integration

Minimized data inconsistency

Improved data access

Improved decision making

Disadvantage

Increased costs

Management complexity

Maintaining currency

Frequent upgrade/replacement cycles

3 Explain the various tier of architecture in DBMS

The design of a Database Management System highly depends on its architecture. It can be

centralized or decentralized or hierarchical. DBMS architecture can be seen as single tier or

multi tier. n-tier architecture divides the whole system into related but independent n modules,

which can be independently modified, altered, changed or replaced

First tier architecture

Second tier architecture

Third tier architecture

Database (Data) Tier

Application (Middle) Tier

User (Presentation) Tier

4 Describe about HDBMS with example. 12 1 K2

A hierarchical database model is a data model in which the data is organized into a tree-like

structure. The data is stored as records which are connected to one another through links. A

record is a collection of fields, with each field containing only one value. The entity type of a

record defines.

The hierarchical database model mandates that each child record has only one parent, whereas

each parent record can have one or more child records. In order to retrieve data from a

hierarchical database the whole tree needs to be traversed starting from the root node. This

model is recognized as the first database model created by IBM in the 1960s. Which fields the

record contains.

Example ; IBM

5 Explain the various steps of query processing and describe the SQL command 12 1 K2

steps of query processing

1. Parsing and translation

Translate the query into its internal form. This is then translated into relational

algebra. Parser checks syntax, verifies relations.

2. Optimization

Amongst all equivalent evaluation plans choose the one with lowest cost. Cost

is estimated using statistical information from the database catalog.

3.Evaluation

The query-execution engine takes a query-evaluation plan, executes that plan,

and returns the answers to the query. A relational algebra expression may have

Page 14: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

many equivalent expressions. Each relational algebra operation can be

evaluated using one of several different algorithms.

SQL command

CREATE

SELECT

INSERT

UPDATE

DELETE and

DROP

6 Discuss the problem of data warehouse? 12 1 K2

Underestimation of resources for data loading

Hidden problems with source systems

Required data not captured

Increased end-user demands

Data homogenization

High demand for resources

Data ownership

High maintenance

Long-duration projects

Complexity of integration

UNIT IV - SECURITY, CONTROL AND REPORTING

1 Describe the Types of tests in system testing 12 1 K2

Graphical user interface testing

Usability testing

Software performance testing

Compatibility testing

Load testing

Volume testing

Security testing

2 Explain the information system control 12 1 K2

Controls

Administrative

Logical

Physical

-General controls

-Application controls 3. Explain the Vulnerability consequences? 12 1 K2

Familiarity

Connectivity

Password management flaws

Fundamental operating system design flaws

Internet Website Browsing

Software bugs

Unchecked user input

Not learning from past mistakes

4. Discuss the common threats to computerized information systems 12 1 K2

Trojan

Page 15: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

Virus

Worm

Spyware

Scareware

Keylogger

Adware

Backdoor

Crimeware

SQL Injection

5 Explain the types of computer crime 12 1 K2

Data diddling: modifying data

• Salami slicing: skimming small amounts of money

• Phreaking: making free long distance calls

• Cloning: cellular phone fraud using scanners

• Carding: stealing credit card numbers online

• Piggybacking: stealing credit card numbers by spying

• Social engineering: tricking employees to gain access

• Dumpster diving: finding private info in garbage cans

• Spoofing: stealing passwords through a false login page

6 What is wireless network and its types –elaborate 12 1 K2

A wireless network is any type of computer network that uses wireless data connections for

connecting network nodes

-Communications satellites

-Cellular and PCS systems use several radio communications technologies

-Radio and spread spectrum technologies

Types of wireless networks

Wireless PAN

Wireless LAN

Wireless mesh network

Wireless MAN

UNIT-V New IT Initiatives

1

Explain the functional modules of ERP 12 1 K2

Human Resource.

Inventory.

Sales & Marketing.

Purchase.

Finance & Accounting.

Customer Relationship Management(CRM)

Engineering/ Production.

Supply Chain Management (SCM)

2 Describe the E-business tools and its advantage 12 1 K2

business to business (B2B)

business to consumer (B2C) (also known as e-Commerce)

government to consumer (G2C)

Government to business (G2B).

3 Elaborate the Architecture for Data Mining 12 1 K2

Page 16: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

4 Explain the Characteristics Cloud computing 12 1 K2

Agility improves with users' ability to re-provision technological infrastructure resources.

Application programming interface (API)

Cost reductions claimed by cloud providers. A public-cloud delivery model converts capital

expenditure to operational expenditure. This purportedly lowers barriers to entry, as

infrastructure is typically provided by a third party and does not need to be purchased for

onetime or infrequent intensive computing tasks.

Device and location independence enable users to access systems using a web browser

regardless of their location or what device they use (e.g., PC, mobile phone). As

infrastructure is off-site (typically provided by a third-party) and accessed via the Internet,

users can connect from anywhere.

Maintenance of cloud computing applications is easier, because they do not need to be

installed on each user's computer and can be accessed from different places.

Multitenancy enables sharing of resources and costs across a large pool of users thus

allowing for:

Centralization of infrastructure in locations with lower costs (such as real estate,

electricity, etc.)

peak-load capacity increases (users need not engineer for highest possible load-levels)

5 Discuss the fundamental model of cloud computing 12 1 K2

6 What is software audit? Explain the principles of software audit? 12 1 K2

A software audit review, or software audit, is a type of software review in which one or more

auditors who are not members of the software development organization conduct "An

independent examination of a software product, software process, or set of software processes

to assess compliance with specifications, standards, contractual agreement

Page 17: E.G.S. PILLAY ENGINEERING COLLEGE Rev.0 …coe.egspec.org/ct12017/pdf/1702BA205.pdf · Question Bank Programme : MBA Year ... Understand database management system CO4 ... every level

E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)

Nagore Post, Nagapattinam – 611 002, Tamilnadu.

Rev.0 COE/2017/QB

PART – C (20 Mark Questions with Key)

S.No Questions Mark COs BTL

UNIT I INTRODUCTION

1 Explain the evolution of information system as envisaged Nolan’s Six-stage Model. 20 1 K3

2 Explain the System development methodologies and its pros &cons. 20 1 K3

UNIT-II SYSTEM ANALYSIS AND DESIGN

1 Elaborate the decision table methodologies with suitable examples 20 1 K3

2 Describe the Object Oriented Analysis and Design (OOAD) and explain how it benefit to

the user.

20 1 K3

UNIT III- DATABASE MANAGEMENT SYSTEMS

1 Describe about data mart and elaborate what are the steps involved in data mart 20 1 K3

2

How do you differentiate hierarchy and network data model? Discuss the advantage and

limitation of a relational DBMS of business application in today business‘s environment.

20 1 K3

UNIT IV- SECURITY, CONTROL AND REPORTING

1

Increased dependence on computer has brought with it problem of vulnerability to

dishonest and unethical practice – elaborate the statement

20 1 K3

2 Assume that you have joined as a chief security officer for major IT service company.

Formulate a strategy for a company to ensure a good security culture is developed,

implemented and maintained.

20 1 K3

UNIT V - NEW IT INITIATIVES

1

What is ERP? Explain with suitable examples .Do you think ERP should be adopted by the

management of industries of all sizes? If so briefly explain the steps implementing ERP in

an organization.

20 1 K3

2 Elaborate how BI is applied to solve business problem -discuss. 20 1 K3