0% found this document useful (0 votes)
35 views6 pages

Mis 6 Pages

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views6 pages

Mis 6 Pages

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1) What is Big Data? Give characteristics.

Big Data refers to the massive volumes of structured and unstructured data that cannot be
easily processed using traditional database and software techniques.

Characteristics (5 V's of Big Data):

1. Volume: Large amounts of data.


2. Velocity: Speed at which data is generated and processed.
3. Variety: Different types of data (structured, semi-structured, unstructured).
4. Veracity: Uncertainty and trustworthiness of data.
5. Value: Ability to turn data into useful insights.

2) Define ethics.

Ethics is the study of moral principles and values that determine right and wrong conduct. It
involves guidelines and standards that govern the behavior of individuals and organizations.

3) Define MIS and its Objectives.

Management Information System (MIS) is an integrated system used to collect, store,


process, and present information for decision-making, coordination, and control in an
organization.

Objectives:

● To improve decision-making.
● To enhance communication within the organization.
● To support strategic planning and operations.

4) What is OLAP? Give an example.

OLAP (Online Analytical Processing) is a category of software tools used to perform complex
analysis of data stored in a database. It enables users to analyze multidimensional data from
different perspectives.

Example: Sales analysis by region, time, and product category in a retail business.
5) Define CBIS and its components.

Computer-Based Information System (CBIS) refers to an information system that relies on


computer hardware and software to process and store data.

Components:

1. Hardware: Physical devices (computers, servers).


2. Software: Programs and applications.
3. Data: Raw facts and figures.
Network
4. Procedures: Guidelines for using the system. People

6) What are PK and FK in RDBMS?

● Primary Key (PK): A unique identifier for each record in a table. It ensures that no
duplicate entries exist.
● Foreign Key (FK): A field in one table that links to the primary key in another table,
establishing a relationship between the two tables.

7) Describe four widely used standards in ethical frameworks.

1. Utilitarianism: Focuses on maximizing overall happiness and minimizing harm.


2. Deontology: Emphasizes duties and rules, where actions are judged based on
adherence to principles.
3. Rights-based ethics: Focuses on the rights of individuals and the obligations others
have to respect those rights.
4. Justice ethics: Concerned with fairness and equality in distributing benefits and
burdens.
8) Difference between Data Mart and Data Warehouse.

9) Explain accountability and liability as fundamental tenets of ethics. responsibility

● Accountability: Responsibility to explain and justify one's actions to stakeholders.


● Liability: Legal obligation to compensate for harm caused by one's actions.

10) Two function-oriented information systems present in an organization:

1. Transaction Processing System (TPS): Manages routine, day-to-day operations such


as sales, receipts, and payroll.
2. Human Resource Information System (HRIS): Manages employee data, recruitment,
payroll, and benefits.

11) Define the OPT-In and OPT-Out models of informed consent in terms of
privacy concerns.

● OPT-In: Users must actively consent to share their personal data.


● OPT-Out: Users' data is shared by default unless they specifically request not to.
12) What is sensitivity and goal-seeking analysis?

● Sensitivity Analysis: Determines how different values of an independent variable affect


a particular dependent variable. Example: How changing interest rates impact loan
affordability.
● Goal-Seeking Analysis: Determines what values of inputs are required to achieve a
specific goal or outcome. Example: Finding the sales volume required to reach a target
profit.

1) Explain possible threats to Information Systems and describe any two in


detail.

Possible threats to Information Systems include:

● Natural disasters: Earthquakes, floods, fires.


● Human errors: Mistakes made by employees like accidental deletion or
mismanagement of data.
● Malicious attacks: Cyberattacks such as malware, phishing, and ransomware.
● System failures: Hardware or software malfunctions.

Detailed examples:

1. Phishing: Phishing involves fraudulent attempts to steal sensitive information, like


usernames, passwords, or credit card details, by posing as a trustworthy entity in
electronic communications, often through email.
2. Ransomware: This is a type of malicious software that blocks access to data or systems
until a ransom is paid, potentially leading to severe financial losses or operational
downtime.

2) Process and phases in decision making (with a neat diagram).

Phases in Decision Making:

1. Intelligence: Identify the problem or opportunity.


2. Design: Explore alternatives and possible solutions.
3. Choice: Select the best solution from alternatives.
4. Implementation: Put the decision into action.
5. Review: Evaluate the outcome and adjust as necessary.

Problem Identification --> Solution Generation --> Choice of Best Solution --> Implementation
--> Review

3) Explain Porter’s competitive model with a diagram.

Porter's Five Forces model is a tool for analyzing an industry's competitive environment. The
five forces are:

1. Threat of New Entrants: The ease or difficulty for new competitors to enter the market.
2. Bargaining Power of Suppliers: How much control suppliers have over the price and
availability of inputs.
3. Bargaining Power of Buyers: The influence customers have on pricing and terms.
4. Threat of Substitute Products: The likelihood of customers switching to alternatives.
5. Industry Rivalry: The degree of competition among existing firms.

Supplier Power

New Entrants <-- Industry Rivalry --> Substitutes

Buyer Power

4) Explain ethical frameworks used in the corporate environment.

Ethical frameworks help organizations ensure responsible and fair decision-making. Common
frameworks include:

● Utilitarianism: Focuses on maximizing benefits and minimizing harm for the greatest
number of people.
● Deontology: Emphasizes following a set of rules or duties, regardless of the outcome.
● Rights-based ethics: Centers on respecting the inherent rights of individuals (e.g.,
privacy, freedom of speech).
● Justice-based ethics: Focuses on fairness, equity, and impartiality in decision-making
and distribution of resources.

These frameworks help corporations align their operations with societal values and ensure
compliance with legal and moral standards.

5) Difference between unintentional and deliberate threats to information


systems, and elaborate on alien software attacks faced by organizations.
● Unintentional threats: These arise from human error, such as data entry mistakes or
accidentally deleting critical files.
● Deliberate threats: These involve intentional attacks, like hacking, cyber espionage,
and data theft.

Alien software attacks refer to spyware, adware, and other malicious software that
infiltrates a system without permission. These programs can track user activity, steal personal
information, and degrade system performance. Organizations may face significant data
breaches or security compromises due to alien software, requiring them to implement strong
security measures.

6) With a diagram, explain how organizations handle business pressures


using IT.

Organizations use IT to respond to business pressures such as competition, customer


demands, and operational inefficiencies. IT tools help organizations:

● Automate processes: This reduces human error and speeds up operations (e.g., using
ERP systems).
● Data analytics: Provides insights from data to improve decision-making.
● Supply chain management: Improves logistics, inventory control, and supplier
relations.

Business Pressure --> IT System --> Automation, Data Analysis, Efficiency --> Competitive
Advantage

You might also like