Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
1. Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
ASSIGNMENT
DRIVE SUMMER 2014
PROGRAM MBADS – (SEM 4/SEM 6) / MBAN2 / MBAFLEX – (SEM 4) /
PGDISMN – (SEM 2)
SUBJECT CODE & NAME MI0040- TECHNOLOGY MANAGEMENT
BK ID B1326
CREDITS 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
1 Consider that you are a manager in a company and you want to manage a technology that is
newly incorporated.
a. Describe the effects of technologies on business.
b. Prepare a list of the factors that are considered in managing technology.
Answer : Effects of technologies on business :
1. Shrinking world:
Technology has made national and international commerce a much more feasible reality. Today,
people andbusinessescanbuy andsell with people all over the world. In past history it might have
taken months for a letter to go from one party to another. Now, an email can reach someone in
seconds, and a transaction can be completed with the push of a button. While this is terri bly
convenient for some businesses, it does make some people impatient when they actually have to
wait for things. Without historical perspective, people can lose touch with how much power and
convenience they have at their fingertips.
2 The purpose of forecast is to improve the quality of the decisions related to selection of an
alternative from available alternatives and not to force to accept a particular decision.
Answer:Primary forecastingtechniqueshelp organizationsplan for the future. Some are based on
subjective criteriaandoftenamounttolittle more thanwildguesses or wishful thinking. Others are
basedon measurable,historical quantitative data and are given more credence by outside parties,
such as analysts and potential investors. While no forecasting tool can predict the future with
complete certainty, they remain essential in estimating an organization's forward prospects.
2. Delphi Technique
3 Write short notes on
a. Technology adoption
Answer : The technology life-cycle (TLC) describes the commercial gain of a product through the
expense of research and development phase, and the financial return during its "vital life". Some
technologies, such as steel, paper or cement manufacturing, have a long lifespan (with minor
variations in technology incorporated with time) whilst in other cases, such as electronic or
pharmaceutical products, the lifespan may be quite short.
The technology life cycle is concerned
b. Technology diffusion
Answer:Technologyandtechnological innovationplayacentral role inthe organizationanddelivery
of health services and are a driver of optimal health outcomes.
Diffusionof innovationsisatheory that seeks to explain how, why, and at what rate new ideas and
technology spread through
c. Technology absorption
Answer:It involves‘Know-why’exercises, basic investigations into the product and or process and
or systems.Thiswill require unpackagingof a technologypackage.ItrequiresR&Dprojectsinknow-
why, optimization and improvement of product/process/systems and related equipments.
Benefits of technology absorption :
The benefits that we get from technology absorption exercises, as evidenced by Government and
industry experiences so far. These benefits are:
1· Repeated collaborations for the same product/ process are avoided.
4 Whenyou choose a new technology,you may have to face some of the questionlike what are its
functional requirements, non-functional requirements and does the technology fit the
organization culture?
Answer : : It’s ubiquitous, (and it’s everywhere as well) and some would have you believe that if
you’re notusingthe latestand greatestproduct,thenyou’re fallingbehind.This“you’re notkeeping
up” salespitchisveryeffectiveatstrikingat the heart of our insecurities; am I falling behind? Will I
lose out if I don’t buy this stuff? Don’t the ads claim that they’ll make me more productive, more
efficient, and even more attractive to the
5 Write short notes on
a. Bridging agencies
3. Answer : In telecommunication networks, a bridge is a product that connects a local area network
(LAN) to another local area network that uses the same protocol (for example, Ethernet or token
ring). You can envision a bridge as being a device that decides whether a message from you to
someone else is going to the local area network in your building or to someone on the local area
network in the building across the street. A bridge exa
b. Problem solver model
Answer : In order to correctly solve a problem, it is important to follow a series of steps. Many
researchers refer to this as the problem-solving cycle, which includes developing strategies and
organizingknowledge.Whilethiscycle isportrayedsequentially,people rarelyfollowarigidseriesof
steps to find a solution. Instead, we often skip steps or even go back through steps multiple times
until the desired solution is reached.
c. Bar-Zakay model
Answer : The Bar-Zakay model: This model is based on a project management approach, and was
introducedbyBar-Zakay{managingpartnerof films,whofocusedhispractice onpersonal injury and
wrongful death law). As per this model, we can divide the process of technology transfer into four
stages:
* Search.
* Adapt
* Implement
* Maintain.
d. Schlie, Radnor and Wad model
Answer:It’s a model thatsevenelementscouldmake aneffectonthe planning,implementationand
eventual successof any technology transfer project. The seven elements are the transferor
(theentitysellingthe technologytothe recipient),the transferee (the entitybuying the technology),
the technology which is being transferred, thetransfer mechanism which has been chosen to
transfer the chosen
6 Explain the basic scheme for knowledge based applications
Answer : Knowledge-based authentication or applications (KBA) is an authentication scheme in
whichthe useris askedtoanswerat least one "secret" question. KBA is often used as a component
in multifactor authentication (MFA) and for self-service password retrieval.
Secretquestionscanbe staticor dynamic.In a staticscheme,the enduserpre-selects the questions
he would like to be asked and provides the
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
4. Call us at : 08263069601
(Prefer mailing. Call in emergency )