IS01
Introduction to Information Technology
Assignment – I
Assignment Code: 2013IS01B1 Last Date of Submission: 15th October 2013
Maximum Marks: 100
Attempt all the questions. All the questions are compulsory and carry equal marks.
Section-A
1. What are Software Technology Parks (STPs)? What is their role? Discuss
2. Write an explanatory note on Computer Memory
3. What are the different communication channels generally used in networking? Explain each in detail. Differentiate between synchronous and asynchronous communication.
4. Describe the following terms:
i. Types of Data Processing
ii. e-Commerce Framework
iii. Buses and Registers
iv. System Softwares
Section-B
Case Study: Database Technology Used to Improve Airport Security
The Transportation Security Administration is evaluating various approaches to harness database technology in its efforts to improve airport security. Unfortunately, any such system may require airlines to invest in additional information systems technology – at a time when they are suffering from a lack of revenue one major airline has already declared a bankruptcy.
One idea is to develop a database system that links every airline reservation system in the country with a number of private and government databases. Data mining and predictive analysis would be used to sort through personal travel histories, the backgrounds of passengers aboard particular flights, and a wealth of other data to assign numerical threat ratings to individuals. Warnings would be sent electronically to workers at airport screening locations to inspect individuals with high threat ratings more closely.
Another approach would allow prescreened “trusted travelers” to pass through airport security checkpoints quickly, avoiding long lines and congestion, This system would devote more time and resources to screening other travelers whose level of risk is higher or unknown. Those who apply for the “trusted traveler” program would have to pass a background check using data from a number of state and federal databases. Once at the airport, “trusted traveler” passengers would be identified, perhaps by scanning their fingerprints or retinas or requiring some form of identification card. (The federal government is considering developing a security ID card for airline passengers that would rely on biometric identification and be linked to government database). The system would also cross-check the passenger’s identification with the FBI’s watch list database and a federal passenger profiling system known as Computer Assisted Passenger Screening. Provided everything was clear, they could then proceed to his or her airplane using expedited security check in procedures.
5. Case Questions:
a. Which approach is best in terms of improving airport security: assigning a threat rating to individuals or prescreening individuals to identify “trusted travelers”? Why do you think this approach is best?
b. Identify specific data that could be used to assign numeric threat ratings to individuals. Describe how the system would work.
IS01
Introduction to Information Technology
Assignment – II
Assignment Code: 2013IS01B2 Last Date of Submission: 15th November 2013
Maximum Marks: 100
Attempt all the questions. All the questions are compulsory and carry equal marks.
Section-A
1. “Information System act as a backbone for today’s business environment” Justify
2. What do you understand from Decision Support System? How DSS helps managers making effective decisions.
3. Explain System Development Life Cycle with suitable example.
4. Write short note on:
a. Artificial Intelligence
b. Strategic Information System
c. Types of Information System
d. Computer-based Supply Chain
Section-B
Case Study
Western Chemical uses the Internet and an electronic commerce website to connect to its customers and suppliers, and to capture data and share information about sales order and purchases. Sales and order data processes immediately, and inventory and other databases are updated. Videoconferencing and electronic mail servers are also provided. Data generated by a chemical refinery process are captured by sensors and processes by computer that also suggests answers to complex refinery problem posed by engineer. Managers and business professionals access reports on a periodic, exceptions, and demand basis, and use computers to interactively assess the possible results of alternative decisions. Finally, top management can access text summaries and graphics displays that identify key elements of organizational performance and compare them to industry and competitor performance.
Western Chemical Corporation has started forming business alliances and using intranets, extranets, and the Internet to build a global electronic commerce website to offer their customers worldwide products and services. Western Chemical is in the midst of making fundamental changes to their e-business operations and their managers’ ability to react quickly to change business conditions.
5. Case Questions:
(i) Identify how Information System supports:
a. Business Operations
b. Business Decision Making
c. Strategic Advantage
d. E-business Enterprise
e. Electronic Commerce at Western Chemical
(ii) There are many different types of Information systems at Western Chemical. Identify as many as you can and explain the reasons for your choices.
Introduction to Information Technology
Assignment – I
Assignment Code: 2013IS01B1 Last Date of Submission: 15th October 2013
Maximum Marks: 100
Attempt all the questions. All the questions are compulsory and carry equal marks.
Section-A
1. What are Software Technology Parks (STPs)? What is their role? Discuss
2. Write an explanatory note on Computer Memory
3. What are the different communication channels generally used in networking? Explain each in detail. Differentiate between synchronous and asynchronous communication.
4. Describe the following terms:
i. Types of Data Processing
ii. e-Commerce Framework
iii. Buses and Registers
iv. System Softwares
Section-B
Case Study: Database Technology Used to Improve Airport Security
The Transportation Security Administration is evaluating various approaches to harness database technology in its efforts to improve airport security. Unfortunately, any such system may require airlines to invest in additional information systems technology – at a time when they are suffering from a lack of revenue one major airline has already declared a bankruptcy.
One idea is to develop a database system that links every airline reservation system in the country with a number of private and government databases. Data mining and predictive analysis would be used to sort through personal travel histories, the backgrounds of passengers aboard particular flights, and a wealth of other data to assign numerical threat ratings to individuals. Warnings would be sent electronically to workers at airport screening locations to inspect individuals with high threat ratings more closely.
Another approach would allow prescreened “trusted travelers” to pass through airport security checkpoints quickly, avoiding long lines and congestion, This system would devote more time and resources to screening other travelers whose level of risk is higher or unknown. Those who apply for the “trusted traveler” program would have to pass a background check using data from a number of state and federal databases. Once at the airport, “trusted traveler” passengers would be identified, perhaps by scanning their fingerprints or retinas or requiring some form of identification card. (The federal government is considering developing a security ID card for airline passengers that would rely on biometric identification and be linked to government database). The system would also cross-check the passenger’s identification with the FBI’s watch list database and a federal passenger profiling system known as Computer Assisted Passenger Screening. Provided everything was clear, they could then proceed to his or her airplane using expedited security check in procedures.
5. Case Questions:
a. Which approach is best in terms of improving airport security: assigning a threat rating to individuals or prescreening individuals to identify “trusted travelers”? Why do you think this approach is best?
b. Identify specific data that could be used to assign numeric threat ratings to individuals. Describe how the system would work.
IS01
Introduction to Information Technology
Assignment – II
Assignment Code: 2013IS01B2 Last Date of Submission: 15th November 2013
Maximum Marks: 100
Attempt all the questions. All the questions are compulsory and carry equal marks.
Section-A
1. “Information System act as a backbone for today’s business environment” Justify
2. What do you understand from Decision Support System? How DSS helps managers making effective decisions.
3. Explain System Development Life Cycle with suitable example.
4. Write short note on:
a. Artificial Intelligence
b. Strategic Information System
c. Types of Information System
d. Computer-based Supply Chain
Section-B
Case Study
Western Chemical uses the Internet and an electronic commerce website to connect to its customers and suppliers, and to capture data and share information about sales order and purchases. Sales and order data processes immediately, and inventory and other databases are updated. Videoconferencing and electronic mail servers are also provided. Data generated by a chemical refinery process are captured by sensors and processes by computer that also suggests answers to complex refinery problem posed by engineer. Managers and business professionals access reports on a periodic, exceptions, and demand basis, and use computers to interactively assess the possible results of alternative decisions. Finally, top management can access text summaries and graphics displays that identify key elements of organizational performance and compare them to industry and competitor performance.
Western Chemical Corporation has started forming business alliances and using intranets, extranets, and the Internet to build a global electronic commerce website to offer their customers worldwide products and services. Western Chemical is in the midst of making fundamental changes to their e-business operations and their managers’ ability to react quickly to change business conditions.
5. Case Questions:
(i) Identify how Information System supports:
a. Business Operations
b. Business Decision Making
c. Strategic Advantage
d. E-business Enterprise
e. Electronic Commerce at Western Chemical
(ii) There are many different types of Information systems at Western Chemical. Identify as many as you can and explain the reasons for your choices.
No comments:
Post a Comment