Time: 3Hr. Max Marks: 100
NOTE: There are 9 Questions in all.
· Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.
· Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.
· Any required data not explicitly given, may be suitably assumed and stated.
Q.1 Choose the correct or best alternative in the following: (2x10)
a. The purpose of reengineering in an organization is for the purpose of
(A) increasing the sales of the organization.
(B) reducing the machinery used in the company to the optimum level.
(C) improving the overall performance of the company.
(D) reducing the labour force in the company, thus saving in salaries.
b. The following types of data is useful to display charts
(A) Decimal numbers (B) Graphics
(C) Binary numbers (D) Bit map images
c. The steps in the Systems Development Life Cycle (SDLC) are
(A) Investigation, analysis, testing, design and maintenance.
(B) Analysis, testing, investing, implementation and maintenance.
(C) Analysis, testing, design, implementation and maintenance.
(D) Investigation, analysis, design, implementation and maintenance.
d. The difference between a database and a spread sheet is
(A) Database has stronger controls over spread sheets for security and integrity.
(B) Spread sheets have stronger controls over database for security and integrity.
(C) Spread sheets are not useful to display projection in a graph sheet.
(D) All the above three are applicable.
e. The logical data structure with a one to many relationship is a
(A) network (B) tree
(C) chain (D) All the above
f. The possible errors in creating modules are
(A) Data (B) Equations
(C) Presentation and interpretation (D) All the above
g. Information systems are designed for the following purpose
(A) For competitive advantage (B) For transaction processing
(C) For decision support system (D) For all the above three
h. The time frame of designing information system using SDLC (system development life cycle) is
(A) Long (B) Medium
(C) Short (D) None of the above
i. Integrity and security in the design of information system using rapid application
development(RAD) is
(A) Vital (B) Limited
(C) Weak (D) None of the above
j. The purpose of an input device is
(A) To convert the data into binary form for the storage in the computer.
(B) To display the data on a terminal.
(C) To store the data in the computer memory.
(D) None of the above.
Answer any FIVE questions out of EIGHT questions
Each question carries 16 marks
Q.2 a. What is the main purpose of MIS ? Briefly explain. (5)
b. How has technology changed the role of management? (5)
c. Describe the basic levels of management decisions in detail. (6)
Q.3 List the five basic types of data. Explain, in detail how these types of data are handled in computer systems. (16)
Q.4 a. What are the basic tasks performed by a database administrator? Explain briefly each one of them. (6)
b. How is data stored in relational databases? (3)
c. Distinguish between QBE and SQL as a mechanism of creating queries and getting responses to queries. (7)
Q.5 a. Define Data Mining. What is the purpose of OLAP (Online Analytical Processing) ? (8)
b. What are the three components of a DSS ? Explain each one in detail. (8)
Q.6 a. External agents for an organization consists of suppliers, customers, rivals, potential new entrants and substituted products. Write notes on the effect of each of these parameters on the performance of an organization. (10)
b. Explain quality management as a mechanism of competitive advantage. (6)
Q.7 a. Compare decision support system, expert system and artificial intelligence as a tool for the managers. (8)
b. Discuss briefly the limitations of expert system and the management issues involved in the design of an expert system. (8)
Q.8 a. How does client server approach combine the benefits of centralization and decentralization of hardware, software and personnel resources? (8)
b. Explain system development life cycle? How does it relate to systems analysis? (8)
Q.9 a. What is encryption and decryption? How is encryption used for data security? (5)
b. What are the different types of modules used in a business system? Explain the reasons to build modules in a business system. (6)
c. Discuss the problems encountered in developing information systems. (5)