SlideShare a Scribd company logo
1 of 3
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
ASSIGNMENT
DRIVE SPRING 2014
PROGRAM MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2/ PGDBAN2
SUBJECT CODE & NAME MB0047- MANAGEMENT INFORMATION SYSTEM
SEMESTER 2
BK ID B1630
CREDITS 4
MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.1 Professor A. Van Cauwenbergh of Antwerp University, in a paper presented at the Tenth
Anniversary Conference of the European Institute for Advanced Studies in Management,
presented four revisions to traditional Management Theory. In summary, the revisions are:
(1) The initiative for the renewal and adjustment of the activities of a firm should come from
the different levels in the management hierarchy. “Strategy is not a privilege of top
management”.
(2) Firms, especially big firms, are incoherent systems (goals of the different component
systems are not simply subdivisions of an overall goal; there are individual, conflicting goals
as well).
Some of these differences are manifestations of organizational initiative and vitality. Using
information systems and central planning and rule-making to suppress all differences is
destructive to organizations.
(3) The most vital “fluid” of an enterprise is the aggregate of its entrepreneurial values. The
most fundamental and motivation and control come through these shared values relative to
work, quality, efficiency, etc. Management often neglects these values and assumes that the
collection and dissemination of information will provide sufficient motivation and control.
(4) Enterprises are open systems; their structure and operating processes are determined by
their environment. This means organizations must be designed to continually adjust to the
environment.
a. If these revisions are correct, how is planning to be organized?
b. How should the information system support the planning organization?
Ans : a. Explaining the organizational planning process with diagram
It should be organized by the cooperation, quality work and efficiency. The enterprises should cope
up or adjust to the new environment so that all the main goals of an enterprises will be
accomplished within the work. The information system should support the planning organization in
the form of combing the information system with the planning and rule making of an enterprise. It
should be in different values that must be shared all together in order for it to supress all the
differences of the ideas and combine the positive
Q.2 Information Technology and Computers have brought information age. The spread of Internet
& relative ease of access made Information Breach easier. Our future is not secure, if our
information is not secure. Information Resources need to be guarded, protected and controlled.
List the precautionary measures to be considered to prevent cybercrime?
Ans : 5 measures to prevent cyber crime :
1. Technical:
There are a variety of different technical countermeasures that can be deployed to thwart
cybercriminals and harden systems against attack. Firewalls, network or host based, are considered
the first line of defense in securing a computer network by setting Access Control Lists (ACLs)
determining which what services and traffic can pass through the check point.
Antivirus can be used to prevent propagation of malicious
Q.3 a. While implementing MIS in any organization change can occur in number of ways.
List and explain the steps in the process as suggested by Lewin’s model.
b. Compare between prototype approach and Life Cycle approach
Ans: a. Explaining the 3 steps of implementing the process suggested by Lewin’s model :
For Lewin, the process of change entails creating the perception that a change is needed, then
moving toward the new, desired level of behavior and finally, solidifying that new behavior as the
norm. The model is still widely used and serves as the basis for many modern change models.
1.Unfreezing:
Before you can cook a meal that has been frozen, you need to defrost or thaw it out. The same can
be said of change. Before a change can be implemented, it must go through the initial step of
unfreezing. Because many people will naturally resist
Q.4 There is an information explosion in today’s society. There are lot of advantages of DBMS
like proper maintenance of the data and maintaining security. Explain the process of data
transition using diagram and an example of your own.
Ans: DFD provides an overview of the data entering and leaving the system. It also shows the
entities that are providing or receiving that data. These correspond usually to the people that are
using the system we will develop. The context diagram helps to define our system boundary to show
what is included in, and what is excluded from, our system.
The diagram consists of a rectangle representing the system boundary, the external entities
interacting with the system and the data which flows into and out of the system.
Luckily there are only four different symbols that are normally used on a DFD. The elements
represented are:
• External entities
Q.5 Write short note on
a. World wide web
b. Voice over IP
c. Intranet
d. Extranet
Ans: a. World Wide Web :
The World Wide Web (abbreviated as WWW or W3 commonly known as the web) is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view web
pages that may contain text, images, videos, and other multimedia and navigate between them via
hyperlinks. Tim Berners-Lee, a British computer scientist and at that time employee of CERN, a
European research organisation near Geneva, wrote
Q.6 Artificial intelligent system functions like a human being and helps a manager in taking quick
decisions. Explain the different applications AI using diagram.
Ans : 1. Applications of cognitive science :
Cognitive science is the interdisciplinary scientific study of the mind and its processes. It examines
what cognition is, what it does and how it works. It includes research on intelligence and behavior,
especially focusing on how information is represented, processed, and transformed (in faculties such
as perception, language, memory, reasoning, and emotion) within nervous systems (human or other
animal) and machines (e.g. computers). Cognitive
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )

More Related Content

Viewers also liked

猝死,防得了嗎?
猝死,防得了嗎?猝死,防得了嗎?
猝死,防得了嗎?hoa99999
 
Plácido domingo
Plácido domingoPlácido domingo
Plácido domingoAlePatrizio
 
Symbolic identity power point
Symbolic identity power pointSymbolic identity power point
Symbolic identity power pointheinlvi
 
Sustainability for Innovation & framework...
Sustainability for Innovation & framework...Sustainability for Innovation & framework...
Sustainability for Innovation & framework...Cyril Danthi
 

Viewers also liked (9)

Testpps
TestppsTestpps
Testpps
 
Mf0012
Mf0012Mf0012
Mf0012
 
Help sam build
Help sam buildHelp sam build
Help sam build
 
Colourict
ColourictColourict
Colourict
 
Listado de precios 11 de agosto 2014 specialtech
Listado de precios  11  de agosto   2014 specialtech Listado de precios  11  de agosto   2014 specialtech
Listado de precios 11 de agosto 2014 specialtech
 
猝死,防得了嗎?
猝死,防得了嗎?猝死,防得了嗎?
猝死,防得了嗎?
 
Plácido domingo
Plácido domingoPlácido domingo
Plácido domingo
 
Symbolic identity power point
Symbolic identity power pointSymbolic identity power point
Symbolic identity power point
 
Sustainability for Innovation & framework...
Sustainability for Innovation & framework...Sustainability for Innovation & framework...
Sustainability for Innovation & framework...
 

Similar to Mb0047 management information system

Mb0047 management information system winter 2014
Mb0047  management information system winter 2014Mb0047  management information system winter 2014
Mb0047 management information system winter 2014Mba Assignments
 
Ms 07 information systems for managers
Ms  07 information systems for managersMs  07 information systems for managers
Ms 07 information systems for managerssmumbahelp
 
Cima syllabus is in the context of look : E3 strategic case study 2015 march
Cima syllabus is in the context of look  :  E3 strategic case study 2015 marchCima syllabus is in the context of look  :  E3 strategic case study 2015 march
Cima syllabus is in the context of look : E3 strategic case study 2015 marchPraneeth Prabodha Dissanayaka, MILT
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence toolssmumbahelp
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxklinda1
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxlesleyryder69361
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial servicesLuis Caldeira
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial servicesLuis Caldeira
 
Ms 07 information systems for managers
Ms   07 information systems for managersMs   07 information systems for managers
Ms 07 information systems for managerssmumbahelp
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Bt0081 software engineering
Bt0081   software engineeringBt0081   software engineering
Bt0081 software engineeringsmumbahelp
 
Systems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions ManualSystems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions Manualbijavotyz
 
Instructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxInstructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxcarliotwaycave
 
Mba information system ii year- Annamalai Assignments 2017-18
Mba information system ii year- Annamalai Assignments 2017-18Mba information system ii year- Annamalai Assignments 2017-18
Mba information system ii year- Annamalai Assignments 2017-18PRADEEP SHARMA
 

Similar to Mb0047 management information system (20)

Mb0047
Mb0047Mb0047
Mb0047
 
Mb0047 management information system winter 2014
Mb0047  management information system winter 2014Mb0047  management information system winter 2014
Mb0047 management information system winter 2014
 
Ms 07 information systems for managers
Ms  07 information systems for managersMs  07 information systems for managers
Ms 07 information systems for managers
 
Cima syllabus is in the context of look : E3 strategic case study 2015 march
Cima syllabus is in the context of look  :  E3 strategic case study 2015 marchCima syllabus is in the context of look  :  E3 strategic case study 2015 march
Cima syllabus is in the context of look : E3 strategic case study 2015 march
 
Ch02
Ch02Ch02
Ch02
 
2 nd sem
2 nd sem2 nd sem
2 nd sem
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial services
 
Technology in financial services
Technology in financial servicesTechnology in financial services
Technology in financial services
 
Ms 07 information systems for managers
Ms   07 information systems for managersMs   07 information systems for managers
Ms 07 information systems for managers
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Bt0081 software engineering
Bt0081   software engineeringBt0081   software engineering
Bt0081 software engineering
 
Systems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions ManualSystems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions Manual
 
Instructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxInstructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docx
 
Mba information system ii year- Annamalai Assignments 2017-18
Mba information system ii year- Annamalai Assignments 2017-18Mba information system ii year- Annamalai Assignments 2017-18
Mba information system ii year- Annamalai Assignments 2017-18
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Mb0047 management information system

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 (Prefer mailing. Call in emergency ) ASSIGNMENT DRIVE SPRING 2014 PROGRAM MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2/ PGDBAN2 SUBJECT CODE & NAME MB0047- MANAGEMENT INFORMATION SYSTEM SEMESTER 2 BK ID B1630 CREDITS 4 MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q.1 Professor A. Van Cauwenbergh of Antwerp University, in a paper presented at the Tenth Anniversary Conference of the European Institute for Advanced Studies in Management, presented four revisions to traditional Management Theory. In summary, the revisions are: (1) The initiative for the renewal and adjustment of the activities of a firm should come from the different levels in the management hierarchy. “Strategy is not a privilege of top management”. (2) Firms, especially big firms, are incoherent systems (goals of the different component systems are not simply subdivisions of an overall goal; there are individual, conflicting goals as well). Some of these differences are manifestations of organizational initiative and vitality. Using information systems and central planning and rule-making to suppress all differences is destructive to organizations. (3) The most vital “fluid” of an enterprise is the aggregate of its entrepreneurial values. The most fundamental and motivation and control come through these shared values relative to work, quality, efficiency, etc. Management often neglects these values and assumes that the collection and dissemination of information will provide sufficient motivation and control. (4) Enterprises are open systems; their structure and operating processes are determined by their environment. This means organizations must be designed to continually adjust to the environment. a. If these revisions are correct, how is planning to be organized? b. How should the information system support the planning organization? Ans : a. Explaining the organizational planning process with diagram
  • 2. It should be organized by the cooperation, quality work and efficiency. The enterprises should cope up or adjust to the new environment so that all the main goals of an enterprises will be accomplished within the work. The information system should support the planning organization in the form of combing the information system with the planning and rule making of an enterprise. It should be in different values that must be shared all together in order for it to supress all the differences of the ideas and combine the positive Q.2 Information Technology and Computers have brought information age. The spread of Internet & relative ease of access made Information Breach easier. Our future is not secure, if our information is not secure. Information Resources need to be guarded, protected and controlled. List the precautionary measures to be considered to prevent cybercrime? Ans : 5 measures to prevent cyber crime : 1. Technical: There are a variety of different technical countermeasures that can be deployed to thwart cybercriminals and harden systems against attack. Firewalls, network or host based, are considered the first line of defense in securing a computer network by setting Access Control Lists (ACLs) determining which what services and traffic can pass through the check point. Antivirus can be used to prevent propagation of malicious Q.3 a. While implementing MIS in any organization change can occur in number of ways. List and explain the steps in the process as suggested by Lewin’s model. b. Compare between prototype approach and Life Cycle approach Ans: a. Explaining the 3 steps of implementing the process suggested by Lewin’s model : For Lewin, the process of change entails creating the perception that a change is needed, then moving toward the new, desired level of behavior and finally, solidifying that new behavior as the norm. The model is still widely used and serves as the basis for many modern change models. 1.Unfreezing: Before you can cook a meal that has been frozen, you need to defrost or thaw it out. The same can be said of change. Before a change can be implemented, it must go through the initial step of unfreezing. Because many people will naturally resist Q.4 There is an information explosion in today’s society. There are lot of advantages of DBMS like proper maintenance of the data and maintaining security. Explain the process of data transition using diagram and an example of your own. Ans: DFD provides an overview of the data entering and leaving the system. It also shows the entities that are providing or receiving that data. These correspond usually to the people that are using the system we will develop. The context diagram helps to define our system boundary to show what is included in, and what is excluded from, our system.
  • 3. The diagram consists of a rectangle representing the system boundary, the external entities interacting with the system and the data which flows into and out of the system. Luckily there are only four different symbols that are normally used on a DFD. The elements represented are: • External entities Q.5 Write short note on a. World wide web b. Voice over IP c. Intranet d. Extranet Ans: a. World Wide Web : The World Wide Web (abbreviated as WWW or W3 commonly known as the web) is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks. Tim Berners-Lee, a British computer scientist and at that time employee of CERN, a European research organisation near Geneva, wrote Q.6 Artificial intelligent system functions like a human being and helps a manager in taking quick decisions. Explain the different applications AI using diagram. Ans : 1. Applications of cognitive science : Cognitive science is the interdisciplinary scientific study of the mind and its processes. It examines what cognition is, what it does and how it works. It includes research on intelligence and behavior, especially focusing on how information is represented, processed, and transformed (in faculties such as perception, language, memory, reasoning, and emotion) within nervous systems (human or other animal) and machines (e.g. computers). Cognitive Dear students get fully solved assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 (Prefer mailing. Call in emergency )