Escolar Documentos
Profissional Documentos
Cultura Documentos
UNIT I
Part A
1. Define HRM. (April/May 2011/May 2015/May 2017)
HRM can be defined as managing(planning, organizing, directing and controlling the functions
of employing, developing and compensating human resources resulting in the creating and
development of human relations with a view to contribute proportionately(due to them) to the
organizational, individual and social goals
2.Define Personnel Management.
Personnel Management is defined by the Institute of Personnel Management (UK) as,” Personnel
Management is a responsibility of all those who manage people as well as being a description of the
work of those who are employed as specialists. It is that part of management which is concerned with
people at work and with their relationships within an enterprise. It applies not only to industry and
commerce but to all fields of employment”.PM is a responsibility of all managers in an organization and
it is a staff function.PM is a part of management concerned with the people and their relationship.This
applies to all organizations in the universe.
3. Difference between HRM and Personnel Management.
4. Employees are treated as cost center and Employees are treated as a profit center and
therefore management controls the cost of therefore, invests capital for human resource
labour. development and future utility.
5. Employees are used mostly for Employees are used for the multiple mutual
organizational benefit. benefits of the organization, employees and
their family members.
Part A
UNIT-III
Part A
The package of quantifiable rewards an employee receives for his or her labors.
The fixed pay an employee receives on a regular basis, either in the form of a salary or as an hourly
wage.
The perceived fairness in pay relative to what other employers are paying for the same type of labor.
A pay system in which employees are paid on the basis of the jobs they can do or talents they have that
can be successfully applied to variety of tasks and situations.
A pay plan in which most employees are part of the same compensation system.
A pay plan in which different compensation systems are established for employees or groups at
different organizational levels.
The process of evaluating the relative value or contribution of different jobs to an organization.
Employees often do not believe that pay-for-performance programs are fair or that they truly reward
performance, a phenomenon called the credibility gap.
The willingness to do something and is conditioned by this action’s ability to satisfy some need for the
individual.
14. What are the five needs mentioned in Maslow’s hierarchy of needs.
15. What are the two factors mentioned in Herzberg’s motivation –hygiene theory? (Dec 2010)
The two factors mentioned in the theory are Motivational factors and hygiene factors.
16. What are the four personality types? (Nov/ December 2012)
The four personality types are dominant, influencing, steady and careful.
The senior person in the organization who by his experience and his knowledge going to guide the
juniors in the organization.
The junior persons or the protégé who is going to get guidance from the senior in the organizations is
called as the protégé in the organization.
Career represents a sequence of positions, jobs or occupation that a person has over his or her working
life.
Empowering workers is by giving decision making authority to jobs. For a salesperson in a store, job
enrichment might involve the authority to resolve customer problems
UNIT V
Part A
1. Define MBO.
MBO- Management by Objectives. It is a process whereby the superior and subordinate jointly
identify the targets to be attained by the subordinate against which the performance of the
subordinate will be assessed and compared for giving rewards.
2. Define promotion.(Dec 2015)
It covers a change and calls for greater responsibilities and usually involves higher pay and better
terms and conditions of services.
3. Define Demotion. (Nov/ December 2013)(Dec 2015)
It of an individual to a job of a lower rank and pay usually involving lower level of difficulty and
responsibility.
4. Define transfer and what are the concepts behind transfer? (Dec 2015)
A lateral shift causing movement of individuals from one position to another usually without
involving any marked change in duties responsibilities, skills needed or compensation. Human
resources concept behind transfer is not to sack or lose an employee, every human being is an
asset to the organization, loosing an employee by dismissing will spoil the image of the firm,
Transfer will motivate the employee.
5. Define separation. (April/ May 2012/May 2015)(Dec 2015)
Cessations of service of agreement with the organization for one or other reason like resignation,
discharge and dismissal, suspension and retrenchment and lay-off.
6. What are the different types of promotion? (Nov/ December 2012)
Multiple promotions, up or out promotions, dry promotions are the different types of promotions.
7. What are the types of control systems based on managerial level and timing?
The major control systems by managerial level and timing are financial control, budgetary
control, quality control and inventory control.
8. Define responsibility centre.
A responsibility centre is a subunit headed by a manager who is responsible for achieving one or
more goals.
9. Define discretionary expense centre.
A responsibility center whose budgetary performance is based on achieving is goals by operating
within predetermined expense constraints set through managerial judgment or discretion.
10. Define quality. (April/ May 2014)
The totality of features and characteristics of a product or service that bear on its ability to satisfy
stated or implied needs.
11. What are the eight dimensions of quality on strategic point of view?
Performance, features, reliability, conformance, durability, serviceability, aesthetic and perceived
quality are the eight dimensions of quality on strategic point of view.
12. Define TQM. (April/ May 2013)
TQM – Total Quality Management.A quality control approach that emphasizes organization
wide commitment, integration of quality improvement efforts with organizational goals and
inclusion of quality as a factor in performance appraisals.
13. Define Benchmarking. (Nov/ December 2010)
Benchmarking is the process of identifying the best practices and approaches productivity in
specific areas within one’s own company with the productivity of other organizations both
within and outside the industry.
14. What are the levels of control?
The different levels of control are operational control, tactic control and strategic control.
15. Define performance appraisal.(May 2017)
Performance appraisal is the process of appraising or evaluating the performance of an employee
by different methods so that an organization how he is working in it so that he could achieve the
organizational goals and objectives.
16. What are the two different methods of performance appraisal?
The two different methods of performance appraisal are new or modern methods and old
methods. They are straight ranking method, man-to –man comparison methods, grading
methods, graphic rating scale, forced choice methods, forced choice distribution methods. The
modern methods are assessment centers, MBO and human asset accounting methods.
17. What are the old methods of performance appraisal? (May 2011)
They are straight ranking method, man-to –man comparison methods, grading methods, graphic
rating scale, forced choice methods, forced choice distribution methods .
18. What are the modern methods of performance appraisal? (May 2011)
The modern methods are assessment centers, MBO and human asset accounting methods.
19. What is the purpose of giving feedback to the employees?
Through feedback, the employee will be informed about his performance, so that he will be
correcting his behavioral and performance wise mistakes and also if he has performed well he
will also be motivated by the feedback from the top level management.
20. What is known as feed forward control? (April/ May 2010)
Whenever the control is maintained in the inputs of any process then such types of control is
called as feed forward control as the inputs are feed forwarded to all the process.
21. What are the causes or sources of grievances?
Concerning wages, Concerning supervision, Concerning individual advancement, General working
conditions, Collective bargaining., Promotions, Amenities, Continuity of service, Compensation,
Disciplinary action, Fines, increments, Leave and medical benefits, Nature of the job, Safety appliances,
Transfer, Victimization and Conditions of work
BRM
UNIT-I PART-A
UNIT-II PART A
6. What is Scalogram?
A method for scaling attitude items. It holds that attitude items can be arranged such that a
subject who responds positively to a particular item also does so to all other items having a
lower rank.
Internal Validity The extent to which results in an experiment are caused by the
treatment variables as distinct from extraneous variables.
Nominal Scale A scale in which numbers are used only to identify or categorise objects or
events without ordering the categories.
14. What do you mean by Ordinal Scale ? (Dec’10, Dec’2012, June 2016)
A scale of measurement in which objects or alternatives are arranged in a certain order
such as 'more than' or 'less than'.
UNIT-III PART A
1. What do you mean primary and secondary data collection?(Dec’10, Dec’2012, June’13)
Primary data is a original problem -or project – specific and collected for serving a
particular purposes. Its authenticity is or relevance is reasonably high. Secondary data is
collected by the decision-marker or the researcher in a short span of time and the data is
also obtained from past.
UNIT-IV
PART A
In Q-type factor analysis, the correlations are computed between pairs of respondents
instead of pairs of variables. High correlations occur when respondents A pattern of
responses on all the variables is much like respondents B pattern of responses.
28. Write a note about one tail and two tail test
One-tailed test : A directional test of a null hypothesis that considers only one
possibility that the sample statistic is not the same as the population parameter.
UNIT_V PART A
2. Define- Histogram.
A form of bar chart in which the height of the bars represents the absolute or relative
frequency of occurrence of the variable of interest.
5. Define-Scanner data.
Single –source data, refers to the ability of these systems to gather several types of
interrelated data such as purchase , sales promotion. Eg. the wealth of product and
brand sales information collected by optical scanners in super markets and other retail
outlet .
6. Define-Pseudo research.
Activities that appear to be research but are conducted for the purposes of
organizational politics rather than objective gathering of information.
13. What are the various types of diagrams used for depicting research results?
Line graph, surface chart, bar chart, pie charts, pictograms, flow chart, organizational
chart decision chart (Decision tree) Gantt chart etc.
Business research- Called as ex-post facto research researcher has no control over
variables. it is used to measure frequency of shopping, preference and so on.
17. What are the various types of diagrams used for depicting research results?
Line graph, surface chart, bar chart, pie charts, pictograms, flow chart, organizational
chart decision chart (Decision tree) Gantt chart etc.
Reports are written for the sake of audience ie the readers of the reports. The goal
of report writer is to enable the audience to act and hence the audience should be
taken into consideration, right from word choice, planning, organizing, deciding about
the visual aids, etc.,
Top line report. It may be a report in miniature, covering all the aspects in the body of
the report but in abbreviated form or it may be a concise summary of the major findings
and conclusions, including recommendations
20.Define synopsis.(June’11)
A synopsis is only a brief overview of the entire report and may either highlight the main
points as they appear in the report or simply inform the reader as to the content of
the report.
Research ethics is specifically interested in the analysis of ethical issues that are raised
when people are involved as participants in research.
IM
Unit I
Part A
1. Define Data. (May / June 2014)
Data can be defined as a representation of facts, concepts or instructions in a formalized manner
which should be suitable for communication, interpretation, or processing by human or electronic
machine.
2. What is Information? (May / June 2015)
Information is organised or classified data which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
3. What is Intelligence? (Nov / Dec 2014)
Intelligence is related to the possession and creation of knowledge and characterizes an adaptive
behavior.
4. Define knowledge. (May / June 2013)
Knowledge is a familiarity, awareness or understanding of someone or something, such as facts,
information, descriptions, or skills, which is acquired through experience or education by perceiving,
discovering, or learning.
5. Idealize the difference between knowledge and information. (May/June 2017)
Knowledge consists of facts, truths, and beliefs, perspectives and concepts, judgments and
expectations, methodologies and know-how. Knowledge is accumulated and integrated and held over
time to handle specific situations and challenges.
Information consists of facts and data organized to describe a particular situation or condition. We
use knowledge to determine what a specific situation means. Knowledge is applied to interpret
information about the situation and to decide how to handle it.
6. Distinguish between data and information. (April / May 2010)
Data is an unprocessed and raw data collected from the different data collection centers. Data is also
called unprocessed information. Information is data that has been collected and processed into an
organized, usable form, accurate, relevant, complete, cost effective, verifiable, and reliable and is
available when needed.
7. What is a system? (April / May 2011) (April / May 2015)
A ‘System’ is a group of interrelated parts working together towards a common goal by accepting
inputs and producing outputs in an organized transformation process.
8. How computer based information system differs from manual based information system?
Computer based information system provides the following advantages: (1). volume of data storage
will be high, (2). Data retrieval is very fast, (3). Data security is high. (4).Multiple persons can work
at the same time. Drawback of manual system is: (1). Time consuming, (2). Data security is low, (3).
Data retrieval is very slow or difficult.
9. What is Information Technology? (Nov / Dec 2014)
Information technology (IT) is the use of any computers, storage, networking and other physical
devices, infrastructure and processes to create, process, store, secure and exchange all forms of
electronic data.
10. What are the components of Information Technology? (May / June 2016)
People, Hardware, Software and Data.
11. What are roles of IT in Business?
Operational excellence, Customer and Supplier intimacy, improved decision making competitive
advantage, and survival.
12. What are the IS activities?
Input of data resources, processing of data into information, output of information products, and
storage of data resources and control of system performance.
13. What are the types of Information System based on functions? (Nov / Dec 2014)
Manufacturing, Accounting, finance, Marketing and Sales and Human Resources. BA5205
Information Management Department of M B A 2017 - 2018
4 St. Joseph’s College of Engineering
14. What are the types of information system based on hierarchy? (May / June 2012)
Executive information system, Decision support system, Management information system and
Transaction processing systems.
15. What are the methodologies used to develop information system? (Nov / Dec 2010)
Waterfall model, Spiral model, V model, Rapid application development, incremental model.
16. Define DSS. (May / June 2012)
A decision support system (DSS) is a computerized information system used to support decision-
making in an organization or a business. A DSS lets users sift through and analyze massive reams of
data and compile information that can be used to solve problems and make better decisions.
17. What EIS? (May / June 2011)
An executive information system (EIS), also known as an executive support system (ESS), is a
type of management information system that facilitates and supports senior executive information
and decision-making needs. It provides easy access to internal and external information relevant to
organizational goals.
18. What is KMS? (Nov / Dec 2011)
Knowledge management systems refer to any kind of IT system that stores and retrieves
knowledge, improves collaboration, locates knowledge sources, mines repositories for hidden
knowledge, captures and uses knowledge, or in some other way enhances the KM process.
19. What is GIS? (May / June 2011)
A geographic information system (GIS) is a computer system for capturing, storing, checking, and
displaying data related to positions on Earth's surface. GIS can show many different kinds of data on
one map. This enables people to more easily see, analyze, and understand patterns and relationships.
20. What is an International Information System? (Nov / Dec 2010)
A global information system (GIS) is an information system which is developed and / or used in a
global context. A global information system (GIS) is any information system which attempts to
deliver the totality of measurable data worldwide within a defined context.
21. What is the need for information? (April / May 2015)
The fundamental tasks or the organizational goals of the management, The fundamental
functions of the management seeking the objectives to fulfill and implement these fundamental
tasks, Deciphering the role of the flow of information (communication) within a management
process.
Unit II
Part A
1. What is a case tool? (Nov / Dec 2011)
Computer-aided software engineering (CASE) is the domain of software tools used to design and
implement applications. CASE tools are similar to and were partly inspired by computer-aided
design (CAD)tools used for designing hardware products.
2. What are the advantages of CASE tools? (May / June 2012)
Advantages of CASE tools: It is automated software for development activities. It is intended to
accelerate the process of developing systems; it is to improve the quality of the resulting systems.
3. What is system flow chart? (Nov / Dec 2014)
System flowcharts are a way of displaying how data flows in a system and how decisions are made
to control events. To illustrate this, symbols are used. They are connected together to show what
happens to data and where it goes.
4. What is decision table? (May / June 2011)
A decision table is an excellent tool to use in both testing and requirements management. Essentially
it is a structured exercise to formulate requirements when dealing with complex business rules.
Decision tables are used to model complicated logic.
5. Clarify the purpose of decision tables with an example.(May/June 2016)
Decision tables are a precise yet compact way to model complex rule sets and their corresponding
actions. Decision tables, like flowcharts, if-then-else, and switch-case statements, associate
conditions with actions to perform, but in many cases do so in a more elegant way.
6. What is DFD? (May / June 2011)
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modelling its process aspects. A DFD is often used as a preliminary step to
create an overview of the system, which can later be elaborated.
7. What is ER Model? (Nov / Dec 2012) BA5205 Information Management Department of M B A
2017 - 2018
23 St. Joseph’s College of Engineering
An entity relationship model, also called an entity-relationship (ER) diagram, is a graphical
representation of entities and their relationships to each other, typically used in computing in regard
to the organization of data within databases or information systems.
8. What is an Entity? (May / June 2012)
A person, partnership, organization, or business that has a legal and separately identifiable existence
9. Define attributes? (May /June 2012)
Attributes are the properties of entities. Attributes are represented by means of ellipses. Every ellipse
represents one attribute and is directly connected to its entity (rectangle). 10. What are the types of
attributes? (May / June 2011)
Single and multivalued attributes, Composite or simple attributes and derived attributes.
11. What is Entity Relationship? (Nov / Dec 2010)
Relationships are represented by diamond-shaped box. Name of the relationship is written inside the
diamond-box.
12. What are the types of Relationship? (Nov / Dec 2011)
One- one, One- Many, Many – one and many – many relationships
13. What is OOAD? (May / June 2013)
Object-oriented analysis and design (OOAD) is a technical approach used in the analysis and design
of an application or system through the application of the object-oriented paradigm and concepts
including visual modeling.
14. What is UML? (Nov / Dec 2015)
UML stands for Unified Modeling Language which is used in object oriented software engineering.
Although typically used in software engineering it is a rich language that can be used to model an
application structures, behavior and even business processes.
15. What are the graphical notations used in UML? (Nov / Dec 2010)
Classes, Objects, Interface, Collaboration, use case, active classes, components and Nodes.
16. What are the types of UML relationships? (May / June 2012)
Dependency, Association, Generalization and Extensibility
17. What are the different perspectives of UML diagram? (May / June 2009)
Design, Implementation, Process and Deployment
18. What are the types of UML diagram? (Nov / Dec 2010)
Classes diagrams, Object diagrams, Deployment diagrams, Package diagrams, Composite structure
diagram and Component diagram.
19. What are the advantages of UML diagram? (May / June 2011)
Provides standard for software development, Reducing of costs to develop diagrams of UML using
supporting tools, Development time is reduced, The past faced issues by the developers are no longer
exists, Has large visual elements to construct and easy to follow.
20. What are the elements in State Chart diagrams? (May / June 2016)
Initial State: This state shows the first activity of the flow, State: A state represents the state of an
object at a particular given point of time, Transition: The transition from one state to another state of
objects is represented by an arrow, Event and Action: A trigger that causes a transition to occur,
Signal: When a message or a trigger caused by an event to a state, which causes a transition, this
message is called as a signal, Final State: The state diagram ends with a diagram that depicts a bull’s
eye is known as Final State
21. What are the types of case tools? (Nov / Dec 2010)
CASE tools fall into three categories: Upper CASE tools, Lower CASE tools and Integrated CASE
tools.
Unit III
Part A
1. Define DBMS. (Nov / Dec 2010)
A database management system (DBMS) is a computer software application that interacts with the
user, other applications, and the database itself to capture and analyze data. A general-BA5205
Information Management Department of M B A 2017 - 2018
36 St. Joseph’s College of Engineering
purpose DBMS is designed to allow the definition, creation, querying, update, and administration of
databases.
2. What is Database? (May / June 2009)
A database is a collection of information that is organized so that it can easily be accessed, managed,
and updated. In one view, databases can be classified according to types of content: bibliographic,
full-text, numeric, and images.
3. What are the characteristics of database?
Ordered collection, related data, specific information needs and shared.
4. What is data dictionary? (May / June 2015)
Data dictionary is a catalogue – of all elements in a system. It is a document that collects, co-
ordinates, and confirms what a specific data terms mean to different people in the organization.
5. What is data model? (May / June 2013)
A database model is a type of data model that determines the logical structure of a database and
fundamentally determines in which manner data can be stored, organized, and manipulated. The most
popular example of a database model is the relational model, which uses a table-based format.
6. What are data types? (Nov / Dec 2010)
A data type, in programming, is a classification that specifies which type of value a variable has and
what type of mathematical, relational or logical operations can be applied to it without causing an
error. A string, for example, is a data type that is used to classify text and an integer is a data type
used to classify whole numbers.
7. What are the basic data models? (May / June 2009)
Relational database Management Systems (RDBMS) and Object – oriented Database Management
systems (OODBMS).
8. What is HDBMS? (Nov / Dec 2010)
Hierarchical database model is a data model in which the data is organized into a tree-like structure.
The data is stored as records which are connected to one another through links. A record is a
collection of fields, with each field containing only one value.
9. What is NDBMS? (May / June 2008)
The network model is a database model conceived as a flexible way of representing objects and
their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object
types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
10. What is RDBMS? (Nov / Dec 2011)
The relational model (RM) for database management is an approach to managing data using a
structure and language consistent with first-order predicate logic, first described in 1969 by Edgar F.
Codd, where all data is represented in terms of tuples, grouped into relations.
11. What is OODBMS? (May / June 2009)
An object database (also object-oriented database management system, OODBMS) is a database
management system in which information is represented in the form of objects as used in object-
oriented programming. Object databases are different from relational databases which are table-
oriented.
12. What is Query? (May / June 2011)
A database query can be either a select query or an action query. A select query is simply a data
retrieval query. An action query can ask for additional operations on the data, such as insertion,
updating, or deletion.
13. What is Query Language? (Nov / Dec 2011)
Language used to interact with database are called query languages, of which the Structured Query
Language (SQL) is the well – known standard.
14. What is Query Processing? (May / June 2012) BA5205 Information Management Department
of M B A 2017 - 2018
37 St. Joseph’s College of Engineering
Query Processing would mean the entire process or activity which involves query translation into
low level instructions, query optimization to save resources, cost estimation or evaluation of query,
and extraction of data from the database.
15. What is SQL? (May / June 2009)
Structured Query Language (SQL) is a standard computer language for relational database
management and data manipulation. SQL is used to query, insert, update and modify data.
16. What is concurrency control? (May / June 2010)
In a multiprogramming environment where multiple transactions can be executed simultaneously, it
is highly important to control the concurrency of transactions. We have concurrency control
protocols to ensure atomicity, isolation, and serializability of concurrent transactions. Concurrency
control protocols can be broadly divided into two categories − Lock based protocols, Time stamp
based protocols.
17. What is two – phase locking protocol? (Nov / Dec 2009)
This locking protocol divides the execution phase of a transaction into three parts. In the first part,
when the transaction starts executing, it seeks permission for the locks it requires. The second part is
where the transaction acquires all the locks. As soon as the transaction releases its first lock, the third
phase starts. In this phase, the transaction cannot demand any new locks; it only releases the acquired
locks.
18. What is strict two phase locking protocol? (May / June 2010)
The first phase of Strict-2PL is same as 2PL. After acquiring all the locks in the first phase, the
transaction continues to execute normally. But in contrast to 2PL, Strict-2PL does not release a lock
after using it. Strict-2PL holds all the locks until the commit point and releases all the locks at a time.
19. What is data warehousing? (May / June 2012)
A data warehouse is a federated repository for all the data that an enterprise's various business
systems collect. The repository may be physical or logical.
20. What is data mart? (Nov / Dec 2010)
The data mart is a subset of the data warehouse and is usually oriented to a specific business line or
team. Whereas data warehouses have an enterprise-wide depth, the information in data marts
pertains to a single department.
21. Analyse the importance of data marts. (May/June 2016)
The Data Marts can be Dimensional (Star Schemas) or relational, depending on how the information
is to be used and what "front end" Data Warehousing Tools will be used to present the information.
Each Data Mart can contain different combinations of tables, columns and rows from the Enterprise
DataWarehouse.
Unit IV
Part A
1. What are the software controls used to protect the data?
1. Passwords 2. Lockout and Dial-back systems 3. Account numbers 4. Encryption
2. What are the different types of testing? (May / June 2013)
The different types of testing are: (I) Program test, (II) String test, (III) System test, (IV) Pilot test
3. What is data validation? (April / May 2009) (May / June 2015)
Data validation refers to checking transaction data for any errors or omissions that can be detected by
looking at the data. Common computerized validation procedures include checking for missing data,
invalid data and inconsistent data.
4. What are the threats to information system? (May / June 2011)
(I) Hardware failure (II) Software failure (III) Personnel actions (IV) Terminal access penetrations
(V) Theft of data, services or equipments (VI) Sabotage, malicious damage to computer resources
(VII) Computer viruses (VIII) Fire, earthquake, floods, power failure, explosions (IX) User errors
(X) Program changes (XI) Telecommunications problem.
5. What are the different types of controls? (May / June 2010)
Implementation controls, Software Controls, Hardware controls, Computer operations controls, Data
security controls
6. What are the different coding techniques? (May / June2011)
Unique identification, Cross – referencing, Efficient storage and retrieval
7. What are the types of implementation? (Nov / Dec 2009)
Different types of implementation are: (I) Parallel conversion (II) Direct cutover (III) Pilot system
(IV) Phase –in – method
8. What are the objectives of control? (Nov / Dec 2010)
The objectives of control are : (I) To make sure that the data entering the computer are correct. (II)
To check the clerical handling of data before they reach the computer. (III) To provide a method of
BA5205 Information Management Department of M B A 2017 - 2018
48 St. Joseph’s College of Engineering
audit the steps in a procedure to detect quickly where an error has occurred in the procedure. (IV) To
ensure that accounting for tax purpose or other legal requirements is carried out according to the law.
(V) To guard against fraud that may affect the financial standing or reputation of the business.
9. What are the different types of securities? (May / June 2011)
(I) Physical safety, (II) Physical access safety, (III) Fire protection, (IV) media protection (V) Back –
up and fall back safety, (VI) Risk assurance
10. What are software verification tests? (May / June 2015)
It is a type of test wherein appropriate independent testing authority will be employed to perform
testing system verification test.
11. What is a software validation? (May / June 2012)
Software validations tests run the system in a simulated environment using simulated data. This
simulated test is also called as alpha testing.
12. What are the levels of testing? (May / June 2008)
Unit testing, Systems testing, Special system testing, Peak load testing, Storage testing, Performance
time testing, Recovery testing, Procedure testing, Human factors
13. Define data quality audit. (May / June 2009)
A software audit review, or software audit, is a type of software review in which one or more
auditors who are not members of the software development organization conduct "An independent
examination of a software product, software process, or set of software processes to assess
compliance with specifications, standards, contractual agreements, or other criteria"
14. Write some of the testing tools? (May / June 2011)
Some of the testing tools are: Winrunner, Rational rose, Silk test
15. Define Risk assessment. (Nov / Dec 2010)
Risk Assessment is defined as the determining the potential frequency of the occurrence of a problem
and the potential damage if the problem were to occur. Used to determine the cost/benefit of a
control
16. What is the need for controls? (May / June 2012)
I) To minimize errors, disasters, interruptions of service, computer crimes and breaches of security,
special policies and procedures must be incorporated into the design and implementation of
information systems and ensure that they perform according to management standards is controls
need. II) General controls: Overall controls that establish a frame work for controlling the design,
security and use of computer programs throughout an organization. III) Application controls: specific
controls unique to each computerized application IV) Data security controls: Controls to ensure that
data files on cither disk or tape are not subject to unauthorized access, change or destruction.
17. What is user interface? (Nov / Dec 2009)
In information technology, the user interface (UI) is everything designed into an information device
with which a person may interact. This can include display screens, keyboards, a mouse and the
appearance of a desktop. It is also the way through which a user interacts with an application or a
website. The growing dependence of many companies on web applications and mobile applications
has led many companies to place increased priority on UI in an effort to improve the user's overall
experience.
18. What are Ethics in IT? (May / June 2011)
Ethics also promotes respect in the use of information technology. This is because they prevent
users from denying others access to computer networks. Ethical codes also prevent users from
introducing malicious software, such as viruses, to computer systems.
19. Indicate any two methods of assessing the value of IS. (Nov / Dec 2012)
Delphi Method, Heuristic Method
20. List any four parameters that define software –engineering qualities. (May / June 2011)
BA5205 Information Management Department of M B A 2017 - 2018
49 St. Joseph’s College of Engineering
They are: Compatibility: As we said SE must be compatibility and settle to any Environment and
user friendly. Efficiency: The SE process must make the software to run efficiently in terms of speed,
accuracy and error- free etc. Reliability; The software developed are to be unchangeable to any
environment so, if changes occurs it is not Reliable and the output must not keep changing.
Maintainability: The software must be made and easy to maintain in all terms and conditions of
various environment.
21. What is computer crime? (May / June2009)
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a
hacker that illegally browses or steals a company's or individuals private information. In some cases,
this person or group of individuals may be malicious and destroy or otherwise corrupt the computer
or data files.
22. What are the types of computer crimes? (May / June 2015)
Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it
an example of both "computer as target" and "computer as tool" crime), Information warfare,
Phishing scams and Spam
23. What is Information System vulnerability? (Nov / Dec 2015)
In computer security, vulnerability is a weakness which allows an attacker to reduce a system's
information assurance. Vulnerability is the intersection of three elements: a system susceptibility or
flaw, attacker access to the flaw, and attacker capability to exploit the flaw.
Unit V
Part A
1. What is ERP? (May / June 2015)
Enterprise resource planning (ERP) is business process management software that allows an
organization to use a system of integrated applications to manage the business and automate many
back office functions related to technology, services and human resources.
2. What are the advantages of ERP? (April / May 2011)
The advantages of ERP System are: (I) Enterprise – wide information flow, (II) Data security, (III)
Fast decision making (IV) Reduced lead time
3. What is big 5’s in ERP? (May / June 2016)
BAAN, SAP, Peoplesoft, JD Edwards and Oracle Apps
4. What are the modules in ERP? (Nov / Dec 2015)
Production and operations, Sales and distribution, Finance and control, HR
5. What are the verticals in ERP? (May / June 2010)
Education services, Hospitality and tourism, Oil and Gas, Health care
6. What is e- Business? (May / June 2012)
E-business can comprise a range of functions and services, ranging from the development of intranets
and extranets to e-service, the provision of services and tasks over the Internet by application service
providers.
7. What are the types of e- Business? (Nov / Dec 2011)
An e-business model is simply the approach a company takes to become a profitable business on the
Internet. There are many buzzwords that define aspects of electronic business, and there are
subgroups as well, such as content providers, auction sites and pure-play Internet retailers in the
business-to-consumer space.
8. What are the advantages of e- Business? (Nov / Dec 2013)
Cost – effective marketing, flexible working hours, Global reach, Reduced distribution overheads
9. What is e-governance? (May / June 2013)
Electronic governance or e-governance is the application of information and communication
technology (ICT) for delivering government services, exchange of information, communication
transactions, integration of various stand-alone systems and services between government-to-
customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back
office processes and interactions within the entire government framework.
10. What are the advantages of e- governance?
Accountability – Once the governing process is made transparent the Government is automatically
made accountable. Accountability is answerability of the Government to the people. It is the
answerability for the deeds of the Government. An accountable Government is a responsible
Government.
11. What is data mining? (Nov / Dec 2014)
It is the computational process of discovering patterns in large data sets involving methods at the
intersection of artificial intelligence, machine learning, statistics, and database systems.
12. What is business intelligence? Nov / Dec 2012) BA5205 Information Management Department
of M B A 2017 - 2018
73 St. Joseph’s College of Engineering
Business intelligence (BI) is a technology-driven process for analyzing data and presenting
actionable information to help corporate executives, business managers and other end users make
more informed business decisions.
13. What are the benefits of business intelligence? (Nov / Dec 2011)
It improves guesswork, Gives you quicker responses to your business-related queries, Obtain
important business metrics reports whenever and wherever you need them, Gain valuable insight into
your customer’s behavior, Pinpoint up-selling as well as cross-selling opportunities, Get the knack of
streamlining operations, Conduct better inventory
14. What is pervasive computing? (May / June 2014)
Pervasive computing, also called ubiquitous computing, is the growing trend of embedding
computational capability (generally in the form of microprocessors) into everyday objects to make
them effectively communicate and perform useful tasks in a way that minimizes the end user's need
to interact with computers as computers. Pervasive computing devices are network-connected and
constantly available.
15. What is cloud computing? (May / June 2015)
Cloud computing is a general term for the delivery of hosted services over the internet. Cloud
computing enables companies to consume a compute resource, such as a virtual machine (VMs),
storage or an application, as a utility -- just like electricity -- rather than having to build and maintain
computing infrastructures in house.
16. What are the types of cloud computing? (Nov / Dec 2015)
Public, Private and Hybrid cloud computing.
17. What are the advantages of cloud computing? (May / June 2014)
Cost saving, Reliability, Manageability and strategic edge
18. What is CMM? (Nov / Dec 2012)
The Capability Maturity Model (CMM) is a methodology used to develop and refine an
organization's software development process. The model describes a five-level evolutionary path of
increasingly organized and systematically more mature processes.
19. What are the levels in CMM? (Nov / Dec2010)
Initial, Managed, Defined, Measured and optimization
20. What are the data mining techniques available? (Nov / Dec 2009)
Seeking Out Incomplete Data, Dynamic Data Dashboards, Database Analysis, Text Analysis,
Efficient Handling of Complex and Relational Data, Relevance and Scalability of Chosen Data
Mining Algorithms
21. Describe any four features of e-governance. (May/June 2016)
Focuses on designing, developing and improving governmental systems and implementing e-
government components at every level of the state
Specialisation in IT technologies, innovation/services in the public and private sector or adoption
and marketing of e-government
User-oriented services offered by government that are based on information and communication
technologies
Offers experience in the industry, practical research and project work already during studies, for
example at the “e-state technologies laboratory”
FM
UNIT I PART A
1. What do you mean by financial management?(May 2014)
It refers to Managerial activity which is concerned with the planning and controlling of the firm’s
financial resources.
10. What is cash flow? And how it is different from net profit
It is the cash earnings from operation of a firm that is estimated by adding non cash and non operating
expenditure and deducting non cash income and non operating income from net profit.
19. Difference between put option and call option (Nov 2013)
Option is the right or claim without any liability. Put option is right to sell whereas call option is right to
buy.