Thursday, 1 May 2014

mb0047 smu mba spring 2014 jul/aug exam assignment 2nd sem

Get fully solved assignment
100%  trusted website bcoz we use installment payment
 
smu mba/bba/bca/mca assignment Spring season (JUL/AUG exam) 2014 sem (I , II , III , IV) in only Rs 700/ sem ( 6 sub) or Rs 125/question paper.
You can pay in 6 installment of Rs 125-125 if u have any doubt.
 
For solution-
mail us on computeroperator4@gmail.com with your question subject code or question paper
 
if urgent then
Call us on 08273413412 , 08791490301 or

web- www.smuassignment.in
www.assignmenthelpforall.blogspot.in

DRIVE SPRING DRIVE 2014
PROGRAM MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2/ PGDBAN2
SEMESTER II
SUBJECT CODE & NAME-MB0047- MANAGEMENT INFORMATION SYSTEM

Q1. Professor A. Van Cauwenbergh of Antwerp University, in a paper presented at the Tenth Anniversary Conference of the European Institute for Advanced Studies in Management presented four revisions to traditional Management Theory. In summary, the revisions are:
(1) The initiative for the renewal and adjustment of the activities of a firm should come from the different levels in the management hierarchy. “Strategy is not a privilege of top management”.
(2) Firms, especially big firms, are incoherent systems (goals of the different component systems are not simply subdivisions of an overall goal; there are individual, conflicting goal as well).
Some of these differences are manifestations of organizational initiative and vitality. Using information systems and central planning and rule-making to suppress all differences is destructive to organizations.
(3) the most vital “fluid” of an enterprise is the aggregate of its entrepreneurial values. The most fundamental and motivation and control come through these shared values relative to work, quality, efficiency, etc. Management often neglects these values and assumes that the collection and dissemination of information will provide sufficient motivation and control.
(4) Enterprises are open systems; their structure and operating processes are determined by their environment. This means organizations must be designed to continually adjust to the environment.
a. If these revisions are correct, how is planning to be organized?
b. How should the information system support the planning organization?
(Explaining the organizational planning process with diagram-4, Guidelines for planning MIS-2, Comparing MIS plan and Business Plan (at least two)-2, Explaining significant problem of the Lewis model-2) 10 marks
Answer. 
a.)
Organizational planning process with diagram
The overall implementation activity. The system designers are change agents who speed up the process of implementation. As the project deals with people it has to be dealt with care. The user of the system has a certain fear complex when a the work culture changes. The foremost fear is the consequences of changeover from the old to the new system. Care has to be taken to assure the user that these fears are baseless. The second fear is about the role played by


Q2. Information Technology and Computers have brought information age. The spread of Internet & relative ease of access made Information Breach easier. Our future is not secure, if our information is not secure. Information Resources need to be guarded, protected and controlled. List the precautionary measures to be considered to prevent cybercrime?
(Listing any 5 measures to prevent cyber crime) 10 marks
Answer.
Measures to prevent cyber crime

Violated computers are often damaged while the hacker either makes off with, or decides to destroy the data on the hard drive. Business owners especially need to be vigilant to computer crimes. Here's how such criminal acts can be prevented.

 

Keep the internet safe
They originally scoured chat rooms looking for offenders, but have since expanded their searches to websites, internet news groups, internet relay chat channels, eGroups, Peer-2-Peer file-sharing programs, and bulletin boards or online forums. Stopping these types of crimes involves FBI agents going undercover on these media, using false names and

Q3. a. While implementing MIS in any organization change can occur in number of ways. List and explain the steps in the process as suggested by Lewin’s model.
b. Compare between prototype approach and Life Cycle approach
(Explaining the 3 steps of implementing the process suggested by Lewin’s model-6, Comparison between the two approaches at least two points-4) 10 marks
Answer.
a.)

Steps of implementing the MIS process suggested by Lewin’s model

Implementation of the MIS in an organisation is a process where change can occur in a number of ways.
The Lewin's model suggests three steps in this process.
1. The first step is to communicate openly within the organisation. This makes everyone in the organisation look forward to the new system or the changes with a sense of pride


Q4. There is an information explosion in today’s society. There are lot of advantages of DBMS like proper maintenance of the data and maintaining security. Explain the process of data transition using diagram and an example of your own.
(Writing diagram-2, Own example-3, Explaining the process-5) 10 marks
Answer.
Process of data transition
Data that has been processed is referred to as information. Information helps in analysis and decision making. It is observed that information is obtained from the data but not all data produce useful information. Information is useful when it is relevant, reliable, accurate, up-to-date, timely, complete, intelligent, consistent and convenient to the recipient. An information system is designed in a way to process data to a meaningful form, i.e., to accept input, manipulate it in some way and produce output. DBMS helps in gathering and providing reports. The set of data that is stored in row and


Q5. Write short note on
a. World wide web
b. Voice over IP
c. Intranet
d. Extranet
(World Wide Web-2, Voice over IP-2, Intranet-3, Extranet-3) 10 marks
Answer.
World Wide Web
The World Wide Web is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs. These hyperlinks and URLs allow the Web servers and other machines that store originals and cached copies of these resources to deliver them as required using Hypertext
Transfer Protocol (HTTP). HTTP is only one of the communication protocols used on the Internet. Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.
Voice over IP


Q6. Artificial intelligent system functions like a human being and helps a manager in taking quick decisions. Explain the different applications AI using diagram.
a. Diagram
b. Applications of cognitive science
c. Applications of robotics
d. Applications of natural interface
e. Explaining each type with an example
(Diagram-2, Applications of cognitive science-2, Applications of robotics-2, Applications of natural interface-2, Explaining each type with an example-2) 10 marks
Answer.
Different applications AI using diagram
The aim of AI is to promote computers that can simulate the ability to think, see, hear, walk, talk and feel. In other words, simulation of computer functions normally is linked with human intelligence, such as logical thinking, finding out Get fully solved assignment
100%  trusted website bcoz we use installment payment
 
smu mba/bba/bca/mca assignment Spring season (JUL/AUG exam) 2014 sem (I , II , III , IV) in only Rs 700/ sem ( 6 sub) or Rs 125/question paper.
You can pay in 6 installment of Rs 125-125 if u have any doubt.
 
For solution-
mail us on computeroperator4@gmail.com with your question subject code or question paper
 
if urgent then
Call us on 08273413412 , 08791490301 or

web- www.smuassignment.in
www.assignmenthelpforall.blogspot.in


No comments:

Post a Comment