Friday, 22 April 2016

TEST 2 ITSM ANSWERS

TEST 2
INFORMATION TECHNOLOGY
ANSWERS

Q.1:Ans:
                           Information System Life Cycle is commonly referred as Software/System Development Life Cycle (SDLC) which is a methodology used to describe the process of building information systems. SDLC framework provides a sequence of activities for system designers and developers to follow. It consists of a set of steps or phases in which each phase of the SDLC uses the results of the previous one. Various phases for developing an Information
System are given as follows:
Phase 1: System Investigation: This phase examines that ‘What is the problem and is it
worth solving’? A feasibility study is done under the dimensions – Technical, Economical,
Legal, Operational etc.
Phase 2: System Analysis: This phase examines that ‘What must the Information System do to solve the problem’? System analyst would be gathering details about the current system
and will involve interviewing staff; examining current business; sending out questionnaires and
observation of current procedures. The Systems Analyst will examine data and information flows in the enterprise using data flow diagrams; establish what the proposed system will actually do (not how it will do it); analyse costs and benefits; outline system implementation options. (For example: in-house or using consultants); consider possible hardware configurations; and make recommendations.
Phase 3: System Designing: This phase examines that ‘How will the Information System do what it must do to obtain the solution to the problem’? This phase specifies the technical aspects of a proposed system in terms of Hardware platform; Software; Outputs; Inputs; User interface; Modular design; Test plan; Conversion plan and Documentation.
Phase 4: System Implementation: This phase examines that ‘How will the solution be put into effect’? This phase involves coding and testing of the system; acquisition of hardware and software; and either installation of the new system or conversion of the old system to the new one.
Phase 5: System Maintenance and Review: This phase evaluates results of solution and
modifies the system to meet the changing needs. Post implementation review would be done
to address Programming amendments; Adjustment of clerical procedures; Modification of
Reports, and Request for new programs.

Q.2:Ans:
(a) The differences between Random Access Memory (RAM) and Read Only Memory (ROM) are given below:
Random Access Memory (RAM)
Read Only Memory (ROM)
RAM is a volatile memory and when the computer is turned off, RAM loses its data. When the computer is turned on again, operating system and other files are once again loaded into RAM usually
from the hard disk.
Unlike RAM, ROM is non-volatile. The
contents of ROM remain even after the
computer is switched off.

This is Read Write memory wherein information can be read as well as modified.
Originally, the ROM used to be readonly; however, the new versions of ROM allow limited rewriting making it possible to upgrade firmware such as the BIOS by using installation software

(b) The differences between Hierarchical Database Model and Network Database Model are  
       given below
Hierarchical Database Model
Network Database Model
The hierarchical model permits a record to be a member of only one set at one time.
Unlike the hierarchical mode, the network
model permits a record to be a member of more than one set at one time
The hierarchical data structure implements one-to-one and one-to-many relationships.
The network model allows us to represent one-to-one, one-to-many and many to many relationships
Each parent record may have one or
more child records, but no child record
may have more than one parent record
Each parent record may have one or
more child records, and even a child
record may have more than one parent
record.
The hierarchical model does not
represent redundancy in data efficiently
The network model is able to represent
redundancy in data more efficiently than
in the hierarchical model.
The hierarchical data structures require
specific entrance points to find records
in a hierarchy
The network data structures can be
entered and traversed more flexibly

(c) Complex Instruction Set Computer (CISC): If the Control Unit contains a number of
      micro-electronic circuitry to generate a set of control signals and each micro-circuitry is
      activated by a micro-code, this design approach is called CISC design. Examples of CISC     
      processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors etc.    
      CISC chips have a large, variable length and complex instructions and generally make use of  
      complex addressing modes. Different machine programs can be executed on CISC machine.
      Since CISC processors possess so many processing features, the job of machine language      
      programmers becomes easier. But at the same time, they are complex as well as expensive to   
      produce. Now-a-days, most of the personal computers use CISC processors.

Reduced Instruction Set Computer (RISC): To execute each instruction, if there is separate electronic circuitry in the control unit, which produces all the necessary signals, this approach of the design of the control section of the processor is called RISC design.
It is also called hard-wired approach. Examples of RISC processors: IBM RS6000, MC88100 processors etc. RISC processors use a small and limited number of instructions and mostly use hardwired control unit. These consume less power and are having high performance. RISC processors use simple addressing modes and RISC instruction is of uniform fixed length. Since RISC processors have a small instruction set, they place extra demand on programmers who must consider how to implement complex computations by combining simple instructions. However, RISC processors are faster, less complex and less expensive than CISC processors because of their simpler design.

Q.3:Ans:
Service Models of Cloud Computing are as follows:
Infrastructure as a Service (IaaS): It is the foundation of cloud services that provides clients with access to server hardware, storage, bandwidth and other fundamental computing resources. The service is typically paid for on a usage basis and may also include dynamic scaling so that if the customer needs more resources than expected, she/he can get them on the fly (probably to a given limit). It provides access to shared resources on need basis, without revealing details like location and hardware to clients
.    Software as a Service (SaaS): It includes a complete software offering on the cloud.
Users can access a software application hosted by the cloud vendor on pay-per-use
basis. SaaS is a model of software deployment where an application is hosted as a
service provided to customers across the Internet by removing the need to install and run
an application on a user’s own computer. SaaS can alleviate the burden of software
maintenance and support but users relinquish control over software versions and
requirements.

Platform as a Service (PaaS): It provides clients with access to the basic operating
software and optional services to develop and use software applications (e.g. database
access and payment service) without the need to buy and manage the underlying
computing infrastructure. For example, Google App Engine allows clients to run their web
applications (i.e. software that can be accessed using a web browser such as Internet
Explorer over the internet) on Google’s infrastructure.
Network as a Service (NaaS): It is a category of cloud services where the capability
provided to the cloud service user is to use network/transport connecting services. NaaS
involves optimization of resource allocation by considering network and computing
resources as a whole. Some of the examples are: Virtual Private Network, Mobile
Network Virtualization etc.
Communication as a Service (CaaS): CaaS is an outsourced enterprise communication
solution that can be leased from a single vender. The CaaS vendor is responsible for all
hardware and software management and offers guaranteed Quality of Service (QoS). It
allows businesses to selectively deploy communication devices and modes on a pay-asyou-
go, as-needed basis. This approach eliminates the large capital investments.
Examples are: Voice over IP (VoIP), Instant Messaging (IM), Collaboration and
Videoconferencing application using fixed and mobile devices.

Q.4: Ans:
Business Process Automation (BPA) is a process of managing information, data and
processes to reduce costs, resources and investment. BPA capabilities range from
automating a simple data-entry-manipulation task to building complex, automated
financial management processes using existing applications. The resulting benefits are
cost reduction, elimination of human error, freeing people from routine and volume,
and allow management to do what they are best at: make decisions, analyse data
implications and trends and focus on providing better customer service.

The steps involved in any BPA are as follows:
Step 1         Define why we plan to implement BPA?
Step 2         Understand the rules/ regulation under which it needs to comply with?
Step 3         Document the process, we wish to automate.
Step 4         Define the objectives/goals to be achieved by implementing BPA.
Step 5         Engage the business process consultant.
Step 6         Calculate the ROI for project.
Step 7         Development of BPA.
Step 8         Testing the BPA.
BPA makes existing processes more efficient, not only at enterprise level but even for desktop users’ through simple workflows, access and authorizations. BPA application ties up these activities – Integration, Orchestration and Automation.

Q.5:Ans:
Computer architecture is the art that specifies the relations and parts of a computer system. In computer engineering, Computer Architecture is the conceptual design and fundamental
operational structure of a computer system. The computer is based on a fixed hardware platform capable of executing a fixed repertoire of instructions. CPU, the centre piece of the computer’s architecture, is in charge of executing the instructions of the currently loaded program. These instructions tell the CPU to carry out various calculations, to read and write values from and into the memory, and to conditionally jump to execute other instructions in the program. Popular computing architecture used today is called Instruction Set Architecture (ISA). Computer architecture includes at least three main subcategories: Instruction Set Architecture, Micro-Architecture and System Design.


Q.6:Ans:
(a) Server:  From a hardware perspective, a server is a computer (hardware) or device on a network dedicated to run one or more services (as a host), to serve the needs of the users of other computers on a network. In client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the server performs some computational task on behalf of "clients". The clients either run on the same computer or they connect through the network. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks.

(b)Overview of Computing: Computing may be defined as any goal-oriented activity requiring, benefiting from or creating computers. It includes designing and building hardware and software systems for a wide range of purposes; processing, structuring, and managing various kinds of information; doing scientific studies using computers; making computer systems behave intelligently; creating and using communications & entertainment media; finding and gathering information relevant to any particular purpose, and so on.

(c) Groupware: Groupware also known as Team-ware, Collaboration Software is software
that allows collective and collaborative working of teams from different geographical
locations on an online and real-time basis.

(d) Memory Controller: Memory Controller is a digital circuit which manages the flow of
data going to and from the main memory and can be a separate chip or integrated into
another chip.

(e) Direct Memory Access (DMA): Direct Memory Access (DMA) is a feature of
modern computers that allows certain hardware subsystems within the computer to
access system memory independently of the Central Processing Unit (CPU).

STRATEGIC MANAGEMENT
ANSWERS

Q.1:Ans:
            (a) Incorrect: Industry is a consortium of firms whose products or services have
homogenous attributes or are close substitutes such that they compete for the same
buyer. For example, all paper manufacturers constitute the paper industry
(b) Incorrect: SWOT analysis stands for the analysis of strengths, weaknesses
opportunities, and threats. It is not used for ranking of organizations. It is a tool for
organizational and environmental appraisal necessary for formulating effective strategies.
(c) Incorrect: The acronym BCG stands for Boston Consulting Group, an organization that developed a matrix to portray an organizational corporate portfolio of investment. This matrix depicts growth of business and the business share enjoyed by an organization. The matrix is also known for its cow and dog metaphors and is popularly used for resource allocation in a diversified company.
(d) Correct: An industry contains only one strategic group when all sellers pursue
essentially identical strategies and have comparable market positions. At the other
extreme, there are as many strategic groups as there are competitors when each rival
pursues a distinctively different competitive approach and occupies a substantially
different competitive position in the marketplace.

Q.2: Ans: Experience curve is similar to learning curve which explains the efficiency gained by workers through repetitive productive work. Experience curve is based on the commonly observed phenomenon that unit costs decline as a firm accumulates experience in terms of a
cumulative volume of production. The implication is that larger firms in an industry would tend to have lower unit costs as compared to those of smaller organizations, thereby gaining a competitive cost advantage. Experience curve results from a variety of factors such as
learning effects, economies of scale, product redesign and technological improvements in
production. The concept of experience curve is relevant for a number of areas in strategic
management. For instance, experience curve is considered a barrier for new firms
contemplating entry in an industry. It is also used to build market share and discourage
competition.

Q.3: Ans: In the light of BCG Growth Matrix, once an organisation has classified its products or SBUs, it must determine what role each will play in the future. The four strategies that
can be pursued are:
(i) Build: Here the objective is to increase market share, even by forgoing short-term
earnings in favour of building a strong future with large market share.
(ii) Hold: Here the objective is to preserve market share.
(iii) Harvest: Here the objective is to increase short-term cash flow regardless of long-term effect.
(iv)Divest: Here the objective is to sell or liquidate the business because resources can
be better used elsewhere.


Q.4: Ans: An important component of strategic thinking requires the generation of a series of strategic alternatives, or choices of future strategies to pursue, given the company's internal strengths and weaknesses and its external opportunities and threats. The comparison of strengths, weaknesses, opportunities, and threats is normally referred to as SWOT analysis.
Strength: Strength is an inherent capability of the organization which it can use to gain
strategic advantage over its competitors.
Weakness: A weakness is an inherent limitation or constraint of the organization which creates strategic disadvantage to it.
Opportunity: An opportunity is a favourable condition in the organisation’s environment which enables it to strengthen its position.
Threat: A threat is an unfavourable condition in the organisation’s environment which
causes a risk for, or damage to, the organisation’s position.

SWOT analysis helps managers to craft a business model (or models) that will allow a
company to gain a competitive advantage in its industry (or industries). Competitive advantage
leads to increased profitability, and this maximizes a company's chances of surviving in the
fast-changing, competitive environment. Key reasons for SWOT analyses are:
• It provides a logical framework.
• It presents a comparative account.
• It guides the strategist in strategy identification.

Q.5: Ans:
The Ansoff’s product market growth matrix (proposed by Igor Ansoff) is an useful tool that
helps businesses decide their product and market growth strategy. With the use of this matrix,
a business can get a fair idea about how its growth depends upon its markets in new or
existing products in both new and existing markets.

Based on the matrix, Aurobindo may segregate its different products. Being in pharmaceuticals, development of new products is result of extensive research and involves huge costs. There are also social dimensions that may influence the decision of the company. It can adopt penetration, product development, market development or diversification simultaneously for its different products.

Market penetration refers to a growth strategy where the business focuses on selling existing
products into existing markets. It is achieved by making more sales to present customers
without changing products in any major way. Market development refers to a growth strategy
where the business seeks to sell its existing products into new markets. It is a strategy for
company growth by identifying and developing new markets for the existing products of the
company. Product development is refers to a growth strategy where business aims to introduce new products into existing markets. It is a strategy for company growth by offering modified or new products to current markets. Diversification refers to a growth strategy where a business markets new products in new markets. It is a strategy by starting up or acquiring businesses outside the company’s current products and markets.

As market conditions change overtime, a company may shift product-market growth strategies.
For example, when its present market is fully saturated a company may have no choice other
than to pursue new market.

Q.6: Ans:
The elements considered for situational analysis are as follows:
·         Environmental factors: What external and internal environmental factors are there
that needs to be taken into account. This can include economic, political, demographic or    sociological factors that have a bearing on the performance.
·         Opportunity and issue analysis: What are the current opportunities that are available in the market, the main threats that business is facing and may face in the future, the strengths that the business can rely on and any weaknesses that may affect the business performance.
·         Competitive situation: Analyse main competitors of the organisation: Who are they, what they up to are, how they compare. What are their competitive advantages?
·         Distribution situation: Review the distribution situation - how are the products
moving through channels.

·         Product situation: The details about current product. The details about current product may be divided into parts such as the core product and any secondary or supporting services or products that also make up what you sell. It is important to observe this in terms of its different parts in order to relate this back to core client needs.

No comments:

Post a Comment

AS 22

Dear Students Click on the below link to view AS 22 https://drive.google.com/open?id=1ATNVdP11LrTTFpAnwk5AOt0CKE1o2UvT All the Best...