0% found this document useful (0 votes)
85 views3 pages

SMU Winter 2013 MIS Assignment

This document provides information about assignments for various management courses, including course codes, credits, and evaluation criteria for questions. It includes sample questions related to management information systems, planning and organizational structure, information security, data transmission diagrams, applications of artificial intelligence, and more. Students are to answer all questions in approximately 400 words each.

Uploaded by

Arvind K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views3 pages

SMU Winter 2013 MIS Assignment

This document provides information about assignments for various management courses, including course codes, credits, and evaluation criteria for questions. It includes sample questions related to management information systems, planning and organizational structure, information security, data transmission diagrams, applications of artificial intelligence, and more. Students are to answer all questions in approximately 400 words each.

Uploaded by

Arvind K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd

For Solved SMU Assignment and Project Contact: +91- 9873 9!"!

#mail : m$a818%&gmail'com (tt):**+++'sm,assignments'in-o *

DRIVE PROGRAM SEMESTER SUBJECT CODE & NAME B" ID CREDIT MAR"S

ASSIGNMENT WINTER DRIVE 2013 MBADS/ MBAFLEX/ MBAHCSN3/ MBAN2/ PGDBAN2 II MB0047 MANAGEMENT INFORMATION S!STEM B1#30 4 #0

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Ea h question is followed by e!aluation s heme. Marks Total Marks $%&'()*+' [Link] Professor A. Van Cauwenbergh of Antwerp University, in a paper presented at the Tenth 1

Anniversary Conference of the uropean !nstitute for Advanced "tudies in Manage#ent, presented four revisions to traditional Manage#ent Theory. !n su##ary, the revisions are$ %&' The initiative for the renewal and ad(ust#ent of the activities of a fir# should co#e fro# the )*!!+U+,- .+/+.V *, -0+ P1,12+P+,- 0*+U1U3045 67-U1-+24 *V ,8- 1 "U*/*.+2+ 8! -8" P1,12+P+,-95 %:' 3ir#s, especially big fir#s, are incoherent syste#s %goals of the different co#ponent syste#s are not si#ply subdivisions of an overall goal; there are individual, conflicting goals as well'. "o#e of these differences are #anifestations of organi<ational initiative and vitality. Using : infor#ation syste#s and central planning and rule=#aking to suppress all differences is destructive to organi<ations. 555 >0+ P8V- /*-1. 6!.?*)9 8! 1, +,-+U"U*V+ *V -0+ 122U+21-+ 8! *-V +,-U+"U+,+?U*1. /1.?+V5 #ost funda#ental and #otivation and control co#e through these shared values relative to >0+ work, @uality, efficiency, etc. Manage#ent often neglects these values and assu#es that the collection and disse#ination of infor#ation will provide sufficient #otivation and control. %A' nterprises are open syste#s; their structure and operating processes are deter#ined by their environ#ent. This #eans organi<ations #ust be designed to continually ad(ust to the environ#ent. &F a. !f these revisions are correct, how is planning to be organi<edB b. +ow should the infor#ation syste# support the planning organi<ationB : A a. Cplaining the organi<ational planning &DE process with diagra# b. )uidelines for planning M!" Co#paring M!" plan and Gusiness Plan %atleast two'

Cplaining significant proble# of the *ewis #odel :

A E A

!nfor#ation Technology and Co#puters have brought infor#ation age. The spread of !nternet H relative ease of access #ade !nfor#ation Greach easier. .ur future is not secure, if our infor#ation is not secure. !nfor#ation 8esources need to be guarded, protected and controlled. *ist the precautionary #easures to be considered to prevent cybercri#eB *isting any I #easures to prevent cyber cri#e &F &F a. -hile i#ple#enting M!" in any organi<ation change can occur in nu#ber of ways. J*V- 1,) +K".1*, -0+ V-+"V *, -0+ "U83+VV 1V V?22+V-+) 4 J+L*,MV P8)+.. b. Co#pare between prototype approach and *ife Cycle approach a. Cplaining the E steps of i#ple#enting the 7 "U83+VV V?22+V-+) 4 J+L*,MV P8)+. &F b. Co#parison between the two approaches A atleast two points

0+U+ *V A 1, > *,!8UP1-*8, +K".8V*8, *, -8)14MV V83*+-45 >0+U+ 1U+ .8- 8! 1)/1,-12+V 8! NOF7 like proper #aintenance of the data and #aintaining security. Cplain the process of data transition using diagra# and an eCa#ple of your own. A -riting diagra#, : &F .wn eCa#ple other than given in the "*M E Cplaining the process I I -rite short note on a. -orld wide web b. Voice over !P c. !ntranet d. Ctranet a. -orld -ide -eb b. Voice over !P c. !ntranet d. Ctranet :

E : : E

&F

Artificial intelligent syste# functions like a hu#an being and helps a #anager in taking @uick decisions. Cplain the different applications A! using diagra#.

a. 1iagra# b. Applications of cognitive science c. Applications of robotics d. Applications of natural interface e. Cplaining each type with an eCa#ple

: :

&F

PA=Answer

You might also like