Vous êtes sur la page 1sur 10




Unit 1
Part A

1. Explain the basic components of Information Systems

2. What are the Strategic Uses of Information Technology in business?
3. What are the competitive strategies to counteract competitive forces
4. What is a system? What are the functions of a system? How a system differs from a
cybernetic system.
5. How information Technology can be used to implement the five basic competitive

6. What are the classifications of Information Systems other than Operational Support
Systems and Management Support Systems
7. Explain the life cycle of business process Reengineering.
8. What are the fundamental roles of IS in business?
9. What are the managerial challenges of Information Technology?
10. What is Business Process Reengineering? How does it differ from business
11. What are the competitive strategiesother than the five basic strategies?
12. Explain the five Information system resources?
13. Explain the types of management Information system with examples.
14. What are the Basic Strategies in the Business Use of Information Technology?
15. Give the life cycle of the Business Process Reengineering?

Part B

1. Explain the various competitive forces a business might meet and the competitive
strategies to counteract such forces.
2. Explain the concept of system? A business is an example of organizational system-
3. Explain how information technology can be used to implement the five basic
competitive strategies.
4. Explain the life cycle of Business Process Reengineering and how BPR differ from
business improvements
5. Explain the Business Process Reengineering
6. Explain the importance of Information system in business.
7. Explain the activities of Information System?
8. What is an IS? Explain the various components of an IS.
9. Explain the various types of Information Systems in detail

Unit 2
Part -A

1. Write about micro computers

2. What are peripherals?
3. What is hardware? Describe any two hardware of your choice.
4. What other peripheral devices and capabilities wouldyou want to have for your
business PC? Explain yourchoices.
5. Write a short note on GUI and pointing device
6. What are two types of storage devices used in a computer and its classification
7. Briefly describe about primary memory.
8. Write a short note on sequential and direct access. Give two examples for each type of
9. Write a short on Radio Frequency Identification (RFID)
10. What are the devices used for output? Briefly describe any two devices
11. What is Software? Write briefly about the different types of software
12. Write a short note on web browsers
13. Explain the fundamental concept of networks
14. Write a short note on database management.
15. How data mining extracts business knowledge from a data warehouse?
16. What is a network? What are the physical components needed for the network?
17. What is the role of intranets and extranets in business?

Part B

1. Explain the types of computers.

2. Explain the parts of a computer with a block diagram
3. Discuss about computer peripherals
4. Discuss the various Input technologies.
5. Discuss about the secondary storage devices
6. Briefly discuss any five general purpose application software.
7. Explain the steps in database development.
8. Explain the two types of databases in detail
9. What is the purpose of data ware house? Describe the components of a complete data
warehouse system.
10. Explain the concept of computer networking
Unit 3
Part - A
1. What is e-commerce? What is the scope of it?
2. Which technologies are necessary for e-commerce?
3. Describe the Categories of e-Commerce
4. Write a short note on Content Management and catalog management
5. Write a short notes on B2C e-commerce
6. What is electronic funds transfer? Explain.
7. What are the basic security measures are being used to solve the security problem in
Secure Electronic Payments
8. What are the key factors for success in e-commerce?
9. What Web store requirements must be implemented by a company to develop a
successful e-commerce business?
10. What are applications of e-commerce?
11. Describe the issues in e-commerce.?
12. Write about the top retail web sites.
13. What are the types of e-commerce marketplaces?
14. Write briefly about Business-to-Business e-Commerce
15. What is the role of catalog/content management and workflow management in a
Webbased procurement process

Part B
1. Explain the architecture of e-commerce with a neat diagram.
2. Discuss how funds could be transferred Electronic Funds Transfer. Explain with an
example of a secure electronic payment system with many payment alternatives.
3. Explain the various Electronic Payment Processes
4. Discuss the success factors of e-commerce
5. Explain the steps in developing a webstore
6. Explain the role and importance of catalog/content management and workflow
management in a Webbased procurement process. Give an example.
7. What is Business-to-Business e-Commerce? Write about B2Be-commerce Web
8. Discuss the applications and issues of e-commerce

Unit 4
1. What are the various levels of managerial decision making that must be supported by
information technology in a successful organization
2. Write briefly about decision support system
3. What are the type of information required by decision making in a company
4. What are the attributes of information quality?
5. Explain the different type of Decision structures with example.
6. What is Decision structures? With example.
7. Write about Business Intelligence.
8. What is Decision Support System? What are the components of Decision Support
9. Write a short note on MIS.
10. Write about Online Analytical Processing.
11. Give an example of the components in a Marketing Intelligence System that uses
Internet and Intranet.
12. Explain the Various Analytical Operations in Online Analytical Processing.
13. What is Artificial Intelligence? What are the Attributes of Intelligence behavior?
14. Write a short note on intelligent behavior.
15. Write a short note on Expert System.
16. What are the benefits and limitations of Expert System?
17. Who is knowledge Engineer? What is his role in Expert System?
18. What is Virtual Reality? Write down its applications.
19. Briefly discuss the various methods of Knowledge representation.
20. Write down the difference between Management Information System and Decision
Support System

1. Explain about
a) Information Decision Management.
b) Decision Structure
c) Information Quality
2. What is MIS? What is DSS? Write about the Difference between MIS & DSS.
3. What is Decision Support System? Explain the components of DSS in detail.
4. What is MIS? Discuss its role in supporting the managers in Business.
5. Explain in detail about the Online Analytical Processing.
6. What is Expert System? Explain the various Application categories and examples of
Expert System.
7. How Expert System Developed? State its Benefits and Limitations.
8. Explain the components of an Expert System and its Applications.
9. What is Artificial Intelligence and Discuss the latest Commercial Application of AI

Unit 5
1. What is a system approach in analyzing and formulating a solution to a problem?
Describe the activities.
2. Write a short note on system analysis and design?
3. What are the benefits of the new information system?
4. Write a short note on user interface design?
5. What is prototyping? Briefly explain the prototyping process.
6. Give the system specification for a new e-commerce system for a business.
7. What is a project? Write about the process of project management?
8. What are keys for a successful implementation of a new business system?
9. Write a brief note on the security challenges faced by the business when using IT in
their process?
10. Briefly explain the basic categories of ethical business issues.
11. Write a short note on business ethics?
12. What are computer crimes? How are large companies protecting themselves from
13. Write a short note on hacking and cracking?
14. What are the various common tactics to attack companies through the internet and
other networks?
15. What is cyber theft?
16. Write a short note encryption?
17. Brief about various security measures that are used to protect business systems?
18. What are the components of managing information technology?
19. Explain the business/IT planning which focus on innovative approach to satisfy
20. Briefly describe about the components in IT architecture created by the business/IT
planning process.
21. What are the five main reasons behind an organization to take a decision to
22. What is offshoring and outsourcing?
23. What are the reasons for failures in IT management?

Part - B

1. How should information technology he managed? Identify the components of

information technology management compare conventional and e-business-driven IT
management approaches.
2. Explain in detail about the outsourcing and offshoring IT and IS.
3. Explain the business/IT planning process in satisfying a company's customer values
and business values goals.
4. Discuss the variety of security measures that are used to protect business system and
5. Explain about the unauthorized use of computer system and networks by employees
in a company?
6. What is computer crime? Explain about the hacking attacks through the network.
7. What is a project? Explain the process of project management.
8. Discuss about the system development life cycle.
Part – C

Case Studies


Greenfingers Garden Services was established in Cape Town in 1990, starting as a small
suburban garden maintenance service (mowing lawns, weeding flowerbeds, etc), employed
by a limited number of clients on an annual contract basis. Over the last decade the business
has expanded considerably, and it now has three branches (in the Southern Suburbs, Northern
Suburbs, and Camps Bay area) which offer consulting and landscaping services, one-off
“spring cleans” as well as regular garden maintenance. The company has both residential and
corporate clients, and ascribes its success to the efficient and personal service that it has
always provided.
The main Southern Suburbs branch is run by the owner, Alice Cooper, and is responsible for
overall management of the business, including all the accounting and general administration
functions, marketing, consulting, and stock. Each branch manages its own supplies of
gardening equipment and schedules its labour force (permanent and casual staff) to ensure
that jobs are completed on time. With the growth of the business, its administration is turning
into a nightmare, and Alice finds that her evenings and weekends are being spent collating
information, working out schedules, and trying to overcome problems by sharing equipment
and even staff between branches. More and more clients are complaining that special
instructions given to Steve Carlton are not being carried out by their work team, or that
discounts that were promised have been omitted from the invoice. Alice is also aware that
opportunities are being missed for the provision of extra services such as spraying and
pruning, which are highly profitable since the work team is already on site and no additional
time or cost is needed for transport.

 Explain how the automation of this information flow could improve the running of
Greenfingers Garden Services.
 At a Transaction Processing level, what data would need to be captured in order to
provide the input for an automated information system?
 Provide a comprehensive list of useful reports that could be produced by a
Management Information System, and specify who each would be used by.
 What feedback mechanisms could be put in place to monitor and control business

2. Case Study –KitchenAid : Do You Let Your Brand Go Online All by Itself?

Areputation is a fragile thing—especially on the Internet, where trademarked images are easily
borrowed, corporate secrets can be divulged anonymously in chat rooms, and idle speculation and
malicious commentary on a blog can affect a company’s stock price. Brands are under constant attack,
but companies such as BrandProtect, MarkMonitor, and NameProtect (now part of Corporation
Services Company) are stepping in to offer companies some artillery in the fight for control of their
brands and reputations. Brian Maynard, director of marketing for KitchenAid, a division of
Whirlpool, had a rather unique problem. Like the classic Coke bottle and Disney’s Mickey Mouse
ears, the silhouette of the KitchenAid mixer, that colorful and distinctively rounded wedding registry
staple, is a registered trademark. Although the KitchenAid stand mixer silhouette has been a
registered trademark since the mid-1990s, it has been a well-recognized symbol since the current
design was introducedin the 1930s. “The KitchenAid mixer is an incredible asset so it is important for
us to protect both the name and the image from becoming generic,” says Maynard, who reports that
the equity of the brand has been estimated to be in the tens of millions of dollars. Any kind of
violations that go unnoticed can quickly erode that precious equity. KitchenAid had experienced some
problems on the Web with knockoffs and unauthorized uses of the mixer’s image, but getting a handle
on the many and varied online trademark infringements seemed daunting. Maynard knew that
historically, corporate brands that were not well-protected and policed by their owners had been ruled
generic by the courts—aspirin and escalator are two examples. “Throughout history terms like
escalator and aspirin have become generic simply because people did not do the work to protect
them,” says Maynard. “To avoid that fate, you have to show the courts that you have put every effort
into protecting your brand. If you don’t police your brand, courts will typically rule that the mark is
no longer meaningful and has become ubiquitous.” So when he received a cold-call from
BrandProtect, he was intrigued. Criminals hijacking online corporate brands and masquerading for
profit, however, are ramping up their efforts. Dubbed “brandjacking” by MarkMonitor Inc., a San
Francisco–based brand protection service provider, the practice is becoming a major threat to
household names. “Not only is the volume of these abuses significant, but abusers are becoming
alarmingly savvy marketers,” says Frederick Felman, MarkMonitor’s chief marketing officer. In its
first Brandjacking Index report, Mark- Monitor tracked 25 of the top 100 brands for three weeks by
monitoring illegal or unethical tactics that ranged from cybersquatting to pay-per-click fraud. Media
companies made up the greatest percentage of targeted brands.

 Consider your own online shopping patterns. How much weight do you place on the
presence of a name or logo or other trademark (such as the KitchenAid silhouette) on
a Web site when purchasing goods or services? Do you ever stop to consider whether
you may have been misled? How could you tell the difference?
 The company mentioned in the case (e.g., KitchenAid,) was well established and
enjoyed strong brand recognition well before the advent of the Internet. Do you think
online-only companies face the same problems as they do? Why or why not? Justify
the rationale for your answer.


Cream is a large and well-established advertising company, with corporate clients in all the
major South African cities. Over the last decade, Cream has developed a reputation for the
creation of avant-garde and witty advertising campaigns, predominantly on television and in
glossy magazines, and has scooped several prestigious national awards. Much of their success
is ascribed to the diversity of talents and personalities within the company, and a strong ethos
of teamwork. A lot of time is spent in meetings and informal discussions between staff, and
the pervading culture within the organisation is that work should be not only challenging but
also fun.
Information technology is used to support various separate business functions:
· Accounting and administration, including the general ledger, accounts payable and
receivable, and payroll.
· Graphic design for the development of new conceptual material.
· Word processing and presentation software for writing copy and making presentations to
· E-mail for communications and internet browsing to keep up with advertising trends.
Cream does not have an in-house IS department, and relies on the support provided by
vendors and outside consultants to maintain their systems and solve any computer-related
A brief overview of their business activities is as follows:
· The general manager, Jade Smith, contacts existing client by phone at least once a month to
check that they are happy with the performance of their current campaigns, and perhaps make
suggestions for future changes to content or media.
· All members of staff listen to industry gossip, and if a competitor’s advertising campaign
appears to be badly received, Jade is informed and decides whether to contact the client to
market Cream instead. If so, she sets up an appointment for the marketing manager, Tim
Mabusa, to give a standard presentation showing examples of previous work. Tim also
provides a glossy brochure detailing the expertise and abilities within the firm, but his
enthusiastic personality is a vital ingredient of the sales talk.
· When a new campaign is initiated, Jade will appoint one of her senior staff as project
manager, and the two of them will meet with the client to discuss the form that the campaign
should take (content, media, etc), and provide an initial (estimated) quotation. In many cases
this meeting involves travel to other cities, which adds to costs and seriously impacts their
availability for dealing with other business issues.
· A fee of 20% of the initial quote is payable before any further work on a new campaign is
undertaken. A project team consisting of the project manager, a graphic designer and a
copywriter will then work closely together to create several alternative ad outlines. These are
presented to the client for discussion and possible reworking before the final quote is
submitted and production begins on the advertisement.
· Cream take care of all the liaison with publication media, and confirm to the client the
periods and costs involved. The actual account for publication or broadcasting is submitted
directly to the client, and Cream is not involved in the client’s financial transactions other
than the money charged by themselves for work done. Payment of the final quoted amount
less the initial fee is due within 30 days of completion and invoicing.
As the business has grown, so more and more time is being spent on travel, telephone calls
and faxes. A lot of coordination is needed to keep track of the various elements of each
campaign, and make sure that actual advertising material, publication arrangements and
accounting are all being attended to. Holdups frequently occur because the initial 20% fee has
not yet been debited, or else it has been received but the project team have not been informed
that they can proceed; and several TV ads have received unsatisfactory broadcast times
because bookings were made late. Staff are tired rather than stimulated, and Jade is concerned
that the quality of their work will be affected. She is wondering whether the introduction of
additional technology to support the business processes would free her staff to focus more on
their creative abilities.

 Give practical examples of how information systems could be used to support the
business at each of the management levels.
 If you were Jade Smith, what business strategy would you select (low-cost,
differentiation, or niche marketing) and why? How could IS be used to support this
 In what ways could the implementation of e-commerce replace or enhance the
existing business activities of Cream?
4. Case Study - The Future of Public Wi-Fi
Public Wi-Fi hot spots have been popular for about eight years. During that time, companies
providing the service have been trying to figure out how to monetize it. The dominant model
to date has been just to charge for it. Pay us $20 a month, and you can log in at any of our
many locations. Recently, however, a kind of tipping point has been reached; now, instead of
being rented for a fee, Wi-Fi will increasingly be given away to motivate customers to buy
other goods and services. Now Wi-Fi is just like the free toaster that banks used to hand out
for opening a new account.
Starbucks is leading a transition from Wi-Fi-for-money to Wi-Fi as a lure to get people to
spend money on other things. It probably has to do with the strong competition Starbucks is
facing for the morning breakfast crowd from the likes of McDonald’s, which is also being
more aggressive with Wi-Fi access.
The Starbucks offer may be a stroke of genius. Starbucks and AT&T will give you two hours
of free Wi-Fi per day, but only if you use a Starbucks card. If you want more than two hours,
you can pay $19.99 per month, which also entitles you to unlimited Wi-Fi offered by AT&T
at some 70,000 hot spots in 89 countries. Starbucks not only trumps other sellers of sugar and
caffeine by offering free Wi-Fi, but also pushes its lucrative Starbucks card and provides an
upgrade path for people eager to hand over money in exchange for unlimited access.
Starbucks cards benefit Starbucks in three ways. First, people with Starbucks cards in their
pockets are probably more likely to choose Starbucks when there are other nearby
alternatives. Second, by getting millions of customers to pay in advance, Starbucks gets more
cash upfront (rather than waiting until people actually get their coffee). Last and best is that
cards get lost, stolen, or forgotten. When that happens,Starbucks gets to keep the money
without supplying anything.
Like many indie cafes, Seattle’s Bauhaus Books and Coffee has long relied on free Wi-Fi to
help bring in customers. “In the evenings, the whole bar along the window will be lined with
people using their computers,” says Grace Heinze, a 13-year manager at Bauhaus, located
between downtown Seattle and the trendy neighborhood of Capitol Hill. Bauhaus has thrived
despite all of the Starbucks shops that have popped up around it: 15 within half a mile and 38
within one mile.
So is Heinze worried that the fiercely artsy cafe, named for the 1920s German art movement
and replete with memorabilia, might lose customers to Starbucks now that it is dumping its
high Wi-Fi rate in favor of two free hours of Wi-Fi a day to any customer? Not really.
“People come here because they like our atmosphere and because they like our coffee,”
Heinze said. “We’re not feeling very uptight about this.” Wi-Fi hot spots began to emerge
around the beginning of the millennium. Propelled by the fast-growing popularity of laptops,
Wi-Fi-enabled coffee shops quickly supplanted the older-style cybercafés, which relied on
the expensive purchase and upkeep of PCs.
Still, until several years ago, many cafes were granting access to their Wi-Fi hot spots
through codes given only to paying customers, according to Jack Kelley, president of Seattle
regional chain CaffeLadro. There was the fear “that if public Wi-Fi was free, you’d fill your
place up with ‘campers,’” Kelley said, referring to patrons who linger all day without buying
anything. But that didn’t happen after Ladro’s 12 Seattle-area cafes switched to free Wi-Fi
several years ago. Nowadays, “we don’t even care if you sit in the parking lot and use it,”
Kelley said. Asked about the impact of Starbucks’s move on his business, Kelley retorted,
“Wi-Fi is free everywhere these days. Isn’t Starbucks a little behind the times?”
As pressure mounts to make more Wi-Fi hot spots free, some operators are turning to Web
advertising to offset costs or make money. Those ads are delivered during log-in or at the
user’s landing page. JiWire serves up ads to more than 8 million users per month on various
Wi-Fi networks, including Boingo, at rates far higher than ones on typical Web pages. That
kind of advertising “sounds gross” to Ladro’s Kelley, though. “It’s just like all of those ads in
the movie theatre,” he said. “I say, enough is enough.”

 Do you agree with the plans by Starbucks to offer time limited free Wi-Fi to customers? -
 Do you think free Wi-Fi would be enough to instill the kind of loyalty?
 There are some companies that offer free Wi-Fi in exchange for viewing advertisements or
answering questions for market research studies. Would you be willing to do so in order to get
free wireless access, say, at an airport? Would your answer change if you were using a
corporate laptop versus your own, because of security concerns?