assignmentssolution@gmail.com

Get Assignments and Projects prepared by experts at a very nominal fee.

More than 8 years in assisting assignments and projects/dissertation/thesis of MBA,BBA,BCA,MCA,PhD and others-

Contact us at : Email : assignmentssolution@gmail.com

Help for : SMU, IIBM,IMT, NMIMS, NIBM ,KSBM, KAIZAN, ISBM, SYMBIOSIS, NIMS, IGNOU, XAVIER, XIBMS, ISM, PSBM, NSBM, NIRM, ISBM, ISMRC, ICMIND, UPES and many others.

Help in : Assignments, projects, M.Phil,Ph.D disseration & thesis,case studies

Courses,MBA,BBA,PhD,MPhil,EMBA,MIB,DMS,MMS,BMS,GDS etc

Contact us at : Email : assignmentssolution@gmail.com



Tuesday, 6 June 2017

IIBM Exam papers/IIBM Case Studies: Contact us for answers at assignmentssolution@gmail.com

IIBM Institute of Business Management
Examination Paper MM.100
Information Technology and Management

1. Computer crime is defined by:
a. AITP
b. SWAT
c. Both (a) & (b)
d. None of the above
2. Prototyping is sometimes called:
a. ASD
b. RSD
c. RAD
d. None of the above
3. Virtual reality is also called:
a. Computer-simulated reality
b. Neurons
c. Software robots
d. Telepresence
..
IIBM Institute of Business Management
d. None of the above
7. A basic system component of information systems is:
a. Memory
b. Processing
c. Storage
d. All of the above
8. How many characters uses the MICR system?
a. 15 characters
b. 18 characters
c. 24 characters
d. 14 characters
9. EBCDIC stands for:
a. Extended Binary Coded Decimal Interchange Code
b. Extended Binary Coded Decimal Instruction Code
c. Extended Binary Coded Data Interchange Code
d. Electronic Binary Coded Data Interchange Code
10. The smallest element of data is called:
a. Byte
b. Bit
c. Giga byte
d. None of the above
Part Two:
1. Write a note on ‘Cache Memory’.
2. What do know about ‘Assembler’?
3. Write a note on ‘Optical Character Recognition’.
4. Explain the term ‘Electronic commerce’.

Caselet 1
It began as a trading site for nerds, the newly jobless, home-bound housewives, and bored retirees to
sell subprime goods: collectibles and attic trash. But eBay quickly grew into a teeming marketplace
of 30 million, with its own laws and norms, such as a feedback system in which buyers and sellers
Examination Paper: Information Technology
3
IIBM Institute of Business Management
rate each ...jumped
ninefold, to $23 million, in the first quarter.As businesses on eBay grow larger, they spur the
creation of even more businesses. A new army of merchants, for example, is making a business out
of selling on eBay for other people. From almost none a couple of years ago, these so called Trading
Assistants now number nearly 23,000. This kind of organic growth makes it exceedingly though to
predict how far the eBay economy can go. Whitman professes not to know. “We don’t actually
control this,” she admits. “We are not building this company by ourselves. We have a unique partner
– million of people.”
Examination Paper: Information Technology
4
IIBM Institute of Business Management
Questions:
1. Why has eBay become such a successful and diverse online marketplace? Visit the eBay website
to help you answer, and check out their many trading categories, specialty sites, international
sites, and other features.
2. Why do you think eBay has become the largest online/offline seller of used cars, and the largest
online seller of certain other products, like computers and photographic equipment?
Caselet 2
It’s no secret that somewhere in a back room in the typical Fortune 500 company, there’s a team of
analytical wizards running sophisticated data mining queries that mine for gems such as data about
about the company’s best customers – those top 20 percent of clients that produce 80 percent of the
company’s profits. These jewels can be a business’s most valuable intellectual property, which
makes them very valuable to competitors. What’s to prevent that data set from walking out the door
or falling into the wrong hands? Sometimes, not much. Many.. roles, this
may be an attractive solution. “The problem is that once you have over 40 distinct roles, you run into
performance issues, and we have identified about 70 user roles,” Sayles explains. He says there’s
way around this difficulty. “I think we are going to use a combination of Web portals and user roles.
A user would sign on through a particular Web portal, which would effectively place the user in a
role category. This reduces the overhead burden on the application,” says Sayles.
Questions:
1. Why have developments in IT helped to increase the value of the data resources of many
companies?
2. How can companies use IT to meet the challenges of data resources security?
END OF SECTION B
Section C: Applied Theory (30 marks)
•?This section consists of Applied Theory Questions.
•?Answer all the questions.
•?Each question carries 15 marks.
•?Detailed information should form the part of your answer (Word limit 200 to 250 words).
1. What potential security problems do you see in the increasing use of intranets and extranets in
business? What might be done to solve such problems? Give several examples.
2. Suppose you are a manager being asked to develop e-business and e-commerce applications to
gain a competitive advantage in an important market for your company. What reservations might
you have about doing so? Why?

No comments:

Post a Comment