TEST 2
INFORMATION TECHNOLOGY
ANSWERS
Q.1:Ans:
Information System
Life Cycle is commonly referred as Software/System
Development Life Cycle (SDLC) which is a methodology used to describe the
process of building information systems. SDLC framework provides a
sequence of activities for system designers and developers to follow. It
consists of a set of steps or phases in which each phase of the SDLC
uses the results of the previous one. Various phases for developing an
Information
System are given as follows:
Phase 1:
System Investigation: This phase examines that
‘What is the problem and is it
worth solving’? A feasibility study is
done under the dimensions – Technical, Economical,
Legal, Operational etc.
Phase 2:
System Analysis: This phase examines that ‘What
must the Information System do to solve the problem’? System analyst would be
gathering details about the current system
and will involve interviewing staff;
examining current business; sending out questionnaires and
observation of current procedures. The
Systems Analyst will examine data and information flows in the enterprise using
data flow diagrams; establish what the proposed system will actually do (not
how it will do it); analyse costs and benefits; outline system implementation
options. (For example: in-house or using consultants); consider possible
hardware configurations; and make recommendations.
Phase 3:
System Designing: This phase examines that ‘How
will the Information System do what it must do to obtain the solution to the
problem’? This phase specifies the technical aspects of a proposed system in
terms of Hardware platform; Software; Outputs; Inputs; User interface; Modular
design; Test plan; Conversion plan and Documentation.
Phase 4:
System Implementation: This phase examines that
‘How will the solution be put into effect’? This phase involves coding and
testing of the system; acquisition of hardware and software; and either
installation of the new system or conversion of the old system to the new one.
Phase 5: System
Maintenance and Review: This phase evaluates
results of solution and
modifies the system to meet the changing
needs. Post implementation review would be done
to address Programming amendments;
Adjustment of clerical procedures; Modification of
Reports, and Request for new programs.
Q.2:Ans:
(a) The differences
between Random Access Memory (RAM) and Read Only Memory (ROM) are given below:
Random Access Memory (RAM)
|
Read Only Memory (ROM)
|
RAM is a volatile memory and when the
computer is turned off, RAM loses its data. When the computer is turned on again,
operating system and other files are once again loaded into RAM usually
from the hard disk.
|
Unlike RAM, ROM is non-volatile. The
contents of ROM remain even after the
computer is switched off.
|
This is Read Write memory wherein information
can be read as well as modified.
|
Originally, the ROM used to be
readonly; however, the new versions of ROM allow limited rewriting making it
possible to upgrade firmware such as the BIOS by using installation software
|
(b) The
differences between Hierarchical Database Model and Network Database Model are
given below
Hierarchical Database Model
|
Network Database Model
|
The hierarchical model permits a
record to be a member of only one set at one time.
|
Unlike the hierarchical mode, the
network
model permits a record to be a member of
more than one set at one time
|
The hierarchical data structure implements
one-to-one and one-to-many relationships.
|
The network model allows us to represent
one-to-one, one-to-many and many to many relationships
|
Each parent record may have one or
more child records, but no child
record
may have more than one parent record
|
Each parent record may have one or
more child records, and even a child
record may have more than one parent
record.
|
The hierarchical model does not
represent redundancy in data
efficiently
|
The network model is able to represent
redundancy in data more efficiently
than
in the hierarchical model.
|
The hierarchical data structures
require
specific entrance points to find
records
in a hierarchy
|
The network data structures can be
entered and traversed more flexibly
|
(c) Complex Instruction Set Computer
(CISC): If the Control Unit contains a number of
micro-electronic circuitry to generate a set of control signals and each
micro-circuitry is
activated by a micro-code, this design approach is called CISC design.
Examples of CISC
processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors etc.
processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors etc.
CISC chips have a large, variable length and complex instructions and generally
make use of
complex addressing modes. Different machine programs can be executed on
CISC machine.
Since CISC processors possess so many processing features, the job of
machine language
programmers becomes easier. But at the same time, they are complex as
well as expensive to
produce. Now-a-days, most of the personal computers use CISC processors.
Reduced
Instruction Set Computer (RISC): To execute each
instruction, if there is separate electronic circuitry in the control unit,
which produces all the necessary signals, this approach of the design of the
control section of the processor is called RISC design.
It is also
called hard-wired approach. Examples of RISC processors: IBM RS6000, MC88100
processors etc. RISC processors use a small and limited number of instructions
and mostly use hardwired control unit. These consume less power and are having
high performance. RISC processors use simple addressing modes and RISC instruction
is of uniform fixed length. Since RISC processors have a small instruction set,
they place extra demand on programmers who must consider how to implement
complex computations by combining simple instructions. However, RISC processors
are faster, less complex and less expensive than CISC processors because of
their simpler design.
Q.3:Ans:
Service
Models of Cloud Computing are as follows:
♦ Infrastructure as a Service (IaaS):
It is the foundation of cloud services that provides clients with access to
server hardware, storage, bandwidth and other fundamental computing resources.
The service is typically paid for on a usage basis and may also include dynamic
scaling so that if the customer needs more resources than expected, she/he can
get them on the fly (probably to a given limit). It provides access to shared resources
on need basis, without revealing details like location and hardware to clients
.
♦ Software
as a Service (SaaS): It includes a complete software offering on the cloud.
Users can
access a software application hosted by the cloud vendor on pay-per-use
basis. SaaS
is a model of software deployment where an application is hosted as a
service
provided to customers across the Internet by removing the need to install and
run
an
application on a user’s own computer. SaaS can alleviate the burden of software
maintenance
and support but users relinquish control over software versions and
requirements.
♦ Platform as a Service (PaaS): It provides clients with
access to the basic operating
software and
optional services to develop and use software applications (e.g. database
access and
payment service) without the need to buy and manage the underlying
computing infrastructure.
For example, Google App Engine allows clients to run their web
applications
(i.e. software that can be accessed using a web browser such as Internet
Explorer over
the internet) on Google’s infrastructure.
♦ Network as a Service (NaaS): It is a category of cloud
services where the capability
provided to
the cloud service user is to use network/transport connecting services. NaaS
involves
optimization of resource allocation by considering network and computing
resources as
a whole. Some of the examples are: Virtual Private Network, Mobile
Network
Virtualization etc.
♦ Communication as a Service (CaaS): CaaS is an outsourced
enterprise communication
solution that
can be leased from a single vender. The CaaS vendor is responsible for all
hardware and
software management and offers guaranteed Quality of Service (QoS). It
allows
businesses to selectively deploy communication devices and modes on a
pay-asyou-
go, as-needed
basis. This approach eliminates the large capital investments.
Examples are:
Voice over IP (VoIP), Instant Messaging (IM), Collaboration and
Videoconferencing
application using fixed and mobile devices.
Q.4: Ans:
Business Process Automation (BPA) is a
process of managing information, data and
processes to
reduce costs, resources and investment. BPA capabilities range from
automating a
simple data-entry-manipulation task to building complex, automated
financial
management processes using existing applications. The resulting benefits are
cost
reduction, elimination of human error, freeing people from routine and volume,
and allow
management to do what they are best at: make decisions, analyse data
implications
and trends and focus on providing better customer service.
The steps involved in any BPA are as follows:
Step 1 Define why we plan to implement BPA?
Step 2 Understand the rules/ regulation under
which it needs to comply with?
Step 3 Document the process, we wish to
automate.
Step 4 Define the objectives/goals to be
achieved by implementing BPA.
Step 5 Engage the business process consultant.
Step 6 Calculate the ROI for project.
Step 7 Development of BPA.
Step 8 Testing the BPA.
BPA makes
existing processes more efficient, not only at enterprise level but even for
desktop users’ through simple workflows, access and authorizations. BPA
application ties up these activities – Integration, Orchestration and
Automation.
Q.5:Ans:
Computer
architecture is the art that specifies the relations and parts of a computer
system. In computer engineering, Computer Architecture is the conceptual design
and fundamental
operational
structure of a computer system. The computer is based on a fixed hardware
platform capable of executing a fixed repertoire of instructions. CPU, the
centre piece of the computer’s architecture, is in charge of executing the
instructions of the currently loaded program. These instructions tell the CPU
to carry out various calculations, to read and write values from and into the
memory, and to conditionally jump to execute other instructions in the program.
Popular computing architecture used today is called Instruction Set Architecture
(ISA). Computer architecture includes at least three main subcategories: Instruction
Set Architecture, Micro-Architecture and System Design.
Q.6:Ans:
(a) Server: From a hardware perspective,
a server is a computer (hardware) or device on a network dedicated to run one
or more services (as a host), to serve the needs of the users of other
computers on a network. In client-server architecture, a server is a computer
program running to serve the requests of other programs, the
"clients". Thus, the server performs some computational task on
behalf of "clients". The clients either run on the same computer or
they connect through the network. Servers are often dedicated, meaning that they
perform no other tasks besides their server tasks.
(b)Overview
of Computing: Computing
may be defined as any goal-oriented activity
requiring, benefiting from or creating computers. It includes designing and
building hardware and software systems for a wide range of purposes;
processing, structuring, and managing various kinds of information; doing
scientific studies using computers; making computer systems behave
intelligently; creating and using communications & entertainment media; finding
and gathering information relevant to any particular purpose, and so on.
(c)
Groupware: Groupware
also known as Team-ware, Collaboration Software is
software
that allows
collective and collaborative working of teams from different geographical
locations on
an online and real-time basis.
(d) Memory
Controller: Memory Controller is a digital circuit
which manages the flow of
data going to
and from the main memory and can be a separate chip or integrated into
another chip.
(e) Direct
Memory Access (DMA): Direct Memory Access (DMA) is
a feature of
modern
computers that allows certain hardware subsystems within the computer to
access system
memory independently of the Central Processing Unit (CPU).
STRATEGIC MANAGEMENT
ANSWERS
Q.1:Ans:
(a)
Incorrect: Industry is a consortium of firms whose
products or services have
homogenous attributes or are close substitutes such that they
compete for the same
buyer. For example, all paper manufacturers constitute the paper
industry
(b)
Incorrect: SWOT analysis stands for the analysis of
strengths, weaknesses
opportunities, and threats. It is not used for ranking of
organizations. It is a tool for
organizational
and environmental appraisal necessary for formulating effective strategies.
(c)
Incorrect: The acronym BCG stands for Boston
Consulting Group, an organization that developed a matrix to portray an
organizational corporate portfolio of investment. This matrix depicts growth of
business and the business share enjoyed by an organization. The matrix is also
known for its cow and dog metaphors and is popularly used for resource
allocation in a diversified company.
(d) Correct:
An industry contains only one strategic group when
all sellers pursue
essentially identical strategies and have comparable market
positions. At the other
extreme, there are as many strategic groups as there are competitors
when each rival
pursues a distinctively different competitive approach and occupies
a substantially
different competitive position in the marketplace.
Q.2: Ans: Experience curve is similar to
learning curve which explains the efficiency gained by workers through
repetitive productive work. Experience curve is based on the commonly observed phenomenon
that unit costs decline as a firm accumulates experience in terms of a
cumulative
volume of production. The implication is that larger firms in an industry would
tend to have lower unit costs as compared to those of smaller organizations,
thereby gaining a competitive cost advantage. Experience curve results from a
variety of factors such as
learning
effects, economies of scale, product redesign and technological improvements in
production. The
concept of experience curve is relevant for a number of areas in strategic
management.
For instance, experience curve is considered a barrier for new firms
contemplating
entry in an industry. It is also used to build market share and discourage
competition.
Q.3: Ans: In the light of BCG Growth Matrix, once an organisation has
classified its products or SBUs, it must determine what role each will play in
the future. The four strategies that
can be pursued are:
(i) Build: Here the objective is to increase market share, even by
forgoing short-term
earnings in favour of building a strong future with large market
share.
(ii) Hold: Here the objective is to preserve market share.
(iii) Harvest: Here the
objective is to increase short-term cash flow regardless of long-term effect.
(iv)Divest: Here the objective is to sell or liquidate the business
because resources can
be better used elsewhere.
Q.4:
Ans: An important component of strategic thinking
requires the generation of a series of strategic alternatives, or choices of
future strategies to pursue, given the company's internal strengths and
weaknesses and its external opportunities and threats. The comparison of
strengths, weaknesses, opportunities, and threats is normally referred to as
SWOT analysis.
• Strength: Strength is an inherent
capability of the organization which it can use to gain
strategic
advantage over its competitors.
• Weakness: A weakness is an inherent
limitation or constraint of the organization which creates strategic
disadvantage to it.
• Opportunity: An opportunity is a
favourable condition in the organisation’s environment which enables it to
strengthen its position.
• Threat: A threat is an unfavourable
condition in the organisation’s environment which
causes a risk
for, or damage to, the organisation’s position.
SWOT analysis helps managers to craft a business model (or models) that
will allow a
company to gain a competitive advantage
in its industry (or industries). Competitive advantage
leads to increased profitability, and
this maximizes a company's chances of surviving in the
fast-changing, competitive environment.
Key reasons for SWOT analyses are:
• It provides a
logical framework.
• It presents a
comparative account.
• It guides the
strategist in strategy identification.
Q.5:
Ans:
The Ansoff’s product market growth
matrix (proposed by Igor Ansoff) is an useful tool that
helps businesses decide their product and
market growth strategy. With the use of this matrix,
a business can get a fair idea about how
its growth depends upon its markets in new or
existing products in both new and
existing markets.
Based on the matrix, Aurobindo may
segregate its different products. Being in pharmaceuticals, development of new
products is result of extensive research and involves huge costs. There are
also social dimensions that may influence the decision of the company. It can
adopt penetration, product development, market development or diversification simultaneously
for its different products.
Market penetration refers to a growth
strategy where the business focuses on selling existing
products into existing markets. It is
achieved by making more sales to present customers
without changing products in any major
way. Market development refers to a growth strategy
where the business seeks to sell its
existing products into new markets. It is a strategy for
company growth by identifying and
developing new markets for the existing products of the
company. Product development is refers
to a growth strategy where business aims to introduce new products into
existing markets. It is a strategy for company growth by offering modified or
new products to current markets. Diversification refers to a growth strategy
where a business markets new products in new markets. It is a strategy by
starting up or acquiring businesses outside the company’s current products and
markets.
As market conditions change overtime, a
company may shift product-market growth strategies.
For example, when its present market is
fully saturated a company may have no choice other
than to pursue new market.
Q.6: Ans:
The elements
considered for situational analysis are as follows:
·
Environmental factors: What external and internal environmental factors are there
that needs to
be taken into account. This can include economic, political, demographic or sociological factors that have a bearing on
the performance.
·
Opportunity and issue
analysis: What are the current opportunities that
are available in the market, the main threats that business is facing and may
face in the future, the strengths that the business can rely on and any
weaknesses that may affect the business performance.
·
Competitive situation: Analyse main competitors of the organisation: Who are they, what
they up to are, how they compare. What are their competitive advantages?
·
Distribution situation: Review the distribution situation - how are the products
moving through
channels.
·
Product situation: The details about current product. The details about current product
may be divided into parts such as the core product and any secondary or supporting
services or products that also make up what you sell. It is important to observe
this in terms of its different parts in order to relate this back to core
client needs.
No comments:
Post a Comment