You are on page 1of 7

GLS Institute of Computer Technology

Management Information System

Question Bank
(The following questions are for the preparation of your exam. No need to write them in
assignment. Only the group no mentioned in the bracket will submit the answers in the softcopy
of the assignment.)
From the book : Analysis and Design of Information System. By V. Rajaraman

Chap-1 (Group No A)
1) Differentiate between data and information with example.
2) Differentiate between strategic information, tactical information and operational
information with examples.
3) What is statutory information? Give examples.
4) Justify the need for computer based information systems?
5) Match the levels of hierarchy and types of information used at each level. Justify your
answer.
6) Discuss in brief the qualities of information system. How will u ensure that quality
aspects of information are maintained?

Chap- 2 (Group No A)
1) Differentiate between online transaction processing and batch processing.
2) Differentiate between MIS and DSS.
3) Explain how data will be processed in a bank when a cheque is presented by a customer
and payment made to him.

From the book : Management Information Systems, Text and Cases. By Waman
Jawadekar

Chap – 5 (Group No B, (Que No 1-10), Group C, (Que No 11-18)


1) Compare and contrast the positive and negative impact of IT on society.
2) Define the term privacy. List down and explain the 5 scenario where individual’s
personal information is exposed to the outside world.
3) By what actions individual and organization can ensure that breach of privacy doesn’t
occur?
4) Define ethics. What do you mean by respecting ethical values. Explain in brief.
5) Differentiate between ethics and moral.
6) How internet and web technologies has exposed individual’s privacy?
7) Justify that how can technology provide solution to protect individual’s breach of
privacy.
8) Define the following terms : Intellectual property, copyright and patents
9) Discuss the issues pertaining to computer software and copy right.
10) Elaborate the scenarios which present challenges to the IPR.
11) Compare the impact of IT on the workplace. Can you fix up the accountability and
liability in case of negative impact? How? If not then provide solution for use of IT at
work place.
12) Which are the main sources of poor information quality and performance? Explain in
brief.
13) ‘Zero defect software is myth’ Agree/ Disagree. Justify your answer.
14) Information technology has an impact on the social life of an individual. Justify.
15) What is digital divide? How does it affect the society?
16) Define the following terms : Spamming, Hacking, Jamming, and Sniffing.
17) From the book, fill in the blanks, page no 134
18) Solution for the case study No 1,2,3 ( page no :– 135-139)

Chap -6 (Group No D, (Que No 1-10), Group E, (Que No 11-19)

1) Define the word decision making. Explain the characteristics of decision making.
2) Explain the process of decision making. How MIS helps in the decision making process.
3) Explain the concept of rational decision making. Does rationality change from person to
person and situation to situation?
4) Explain in brief the problems in making rational decision.
5) Why does decision maker resort to bounded rationality in a decision making situation?
Can a decision be called right or wrong? Justify ur answer.
6) Compare and contrast between open decision making system and closed decision making
system.
7) Based on the degree of knowledge, describe the types of decisions. What will be role of
MIS in the above types of decision making.
8) Differentiate between programmed decision and non programmed decision.
9) Explain the law of requisite variety.
10) Explain the methods for selecting the best alternative in decision making. Justify the
appropriateness of the methods.
11) Discuss the analytical modeling techniques for decision analysis.
12) Differentiate between what if analysis and sensitivity analysis.
13) Differentiate between what if analysis and goal seeking analysis.
14) Compare the behavior nature of human and risk taking ability in decision making..
15) List down the reasons for conflict. Provide methods for conflict resolution.
16) Provide methods for dealing with uncertainty in decision making.
17) Decision making improves with organizational learning. Justify.
18) From the book, fill in the blanks. Page no 162,163
19) Solution of the case study No 1, 2 ( page no 164-167)

Chap -7 (Group No F(Que No 1-11), Group G (Que No 12-24), Group H (Que No 25-32)

1) List the characteristics of information and explain it with example.


2) Explain conceptual model of communication with diagram.
3) Explain the concept of information summarization. Justify the importance of it.
4) Do you think that the misuse of information is possible? How? Explain the methods to
avoid misuse of information.
5) Bias in information could be controlled. How will you do it? Explain with examples.
6) What attributes information should possess? Provide explanation.
7) Explain different dimensions to measure the quality of information.
8) Explain different parameters which have an impact on information quality. Give
examples.
9) Differentiate between the following with example:
1) Action and No- action information
2) Recurring and non- recurring information
3) Internal and external information
10) Based on application, provide classifications of information with example..
11) Based on usage, explain the classification of information.
12) What are the different methods of data collection? Explain it with example
13) How will you determine the value of information? Does perfect information exists?
Explain the concept of VPI.
14) The value of information is different for different person. Justify.
15) Explain the model of a human as an information processor with diagram.
16) Explain the different methods of filtering with example, which an information processor
adopts.
17) Cognitive style of each manager affects their decision making. (Decision taken by one
manager doesn’t follow the decision taken by the another manager in the same situation. )
Justify the reasons for individual differences with example.
18) Summaries the information concepts and their implications in brief w.r.t MIS.
19) Define the word knowledge. Explain the concept of knowledge management.
20) Differentiate between Information and knowledge with example.
21) Define wisdom.
22) List the components of knowledge driven capabilities.
23) Differentiate between explicit and tacit knowledge with example.
24) What you mean by Intellectual Capital? Explain the importance of it.
25) List the myths regarding knowledge management. Provide correction for them.
26) Knowledge management is not an alternative or luxury but a necessity due to demand of
customer centric business environment. Discuss the driving forces behind KM.
27) KM initiate drastically affects workplace scenario. Justify
28) List and explain the key aspects of knowledge management.
29) Explain the barriers in knowledge management process.
30) Explain the concept of business intelligence.
31) From the book, fill in the blanks. Page no 194
32) Solution of the case study No 1, 2 ( page no 195-199)

Chap -8 (Group No I)

1) Explain generalized model of the system with concept of filter and boundary. Explain
with example.
2) Define the following terms with example
a. Sensor
b. Comparison units
c. Feedback mechanism
d. Corrective unit
3) Explain system as a control model with example.
4) Explain the control system model in data processing.
5) Explain how MIS supports the business with illustration.
6) Explain the concept of Decomposition of super system into subsystem with examples and
diagram.
7) When you can say system as a black box? Explain with example.
8) Differentiate between the following with example:
a. Open V/s Close system
b. Probabilistic V/s Deterministic systems
c. Super V/s Sub system
d. System efficiency and effectiveness
9) Explain different approaches of handling system complexity with example.
10) Explain the concept of entropy and negative entropy with example. How will you
provide negative entropy to the system?
11) The biggest challenge for the system designer is forced change in the system goal.
Justify it.
12) Explain the following terms in brief.
a. DPS
b. TPS
c. APS
d. BPS
e. IPS

Chap -9 (Group No J)
1) Why long range plan o MIS is necessary? How it is linked with the business plan of
the organization?
2) What are the components of MIS plan? What is the purpose of each of them?
3) Draw a matrix of the class of information versus users, and explain the nature of use
in each case.
4) Define functional management information. On what parameters functional
management information could be assessed? Explain in detail
5) List down the difficulties to determine a correct and complete set of information .
Discuss various methods for determining the information requirement.
6) Match the method for determining information requirement with the degree of
uncertainty. Justify your answer.
7) Differentiate between prototype approach and life cycle approach of MIS
development and implementation with diagram.
8) List the guidelines for the system designer for successful implementation of the
system.
9) List down the factors to assure the quality of the parameters.
10) Do you think organization structure of MIS differs from one organization to another.
Justify your answer.
11) List features which contribute to the success of MIS.
12) List features which contribute to the failures of MIS.
13) From the book, fill in the blanks. Page no 307

Chap -12 (Group No K )


1) Discuss in brief the model of information processing system.
2) How MIS helps in Business system integration? Convert MIS design into EIS.
3) From the book, fill in the blanks. Page no 413,414

Chap -13 (Group No K )


1) Distinguish between the manufacturing sector and service sector in terms of
characters, focus and deliverables.
2) What is the difference between product management and service management?
3) Explain different characters of service concept.
4) Explain service quality model with diagram.
5) Explain different stages in Service Process Cylce.
6) List down the factors which influence the customer service design and show
relationship between them.
7) Explain each module of SMS with diagram and example of your own choice.
8) What are the expectations and perception of good service? Explain with example.
9) Applications in Service industry will be efficient and effective, if appropriate IT is
chosen.
10) What care should be taken while configuring the hardware and software platform in
service applications.
11) From the book, fill in the blanks. Page no 451

Chap -14 (Group No L )

1) What is the purpose of DSS in MIS?


2) Explain different types of Decision Support System with example.
3) Explain different approaches on which DSS can be developed. Give example
4) Explain different cost accounting system with example.
5) Explain in brief ABC analysis.
6) Write a short note on GDSS.
7) Define knowledge. Define IC
8) Explain the process of knowledge management
9) Explain knowledge management system architecture.
10) Write a short note on knowledge base Expert System.
11) List the benefits of DSS.
12) From the book, fill in the blanks. Page no 497
13) Identify the following as Tacit or Explicit Knowledge
a. S/W product
b. Smart card
c. Consultant’s advice
d. On line help
e. Tea testing process by tester
14) What is simulation? What are the assumption and limiatations of using the simulation
model in DSS?
15) Which is the type of DSS that can be integrated in the MIS and which are types not
worthy of integration?

Chap -8 : From the book, MIS: Managing The Digital Firm (Lauden and Lauden

1) Define the following terms: Security and Control


2) Give reasons why information systems are vulnerable.
3) Explain how systems are vulnerable by the use of internet and Wi-Fi.
4) Define the following terms :
a. Malware
b. Worms
c. Trojan Horse
d. Spyware
e. Keyloggers
f. Hacker and Cracker
g. Cyber vandalism
h. Botnet
i. DoS
j. DDoS
k. Identity theft
l. Phishing
m. Evil twins
n. Pharming
o. Click fraud
p. Social Engineering
q. Patches
r. AUP
s. Authorization policies
t. Token
u. Smart card
v. Authentication
w. Access control
x. IDS
y. UTM
z. Encryption
aa. Digital certificate
bb. Fault tolerant system
cc. Recovery oriented computing.
dd. Down time
ee. DPI
5) Differentiate between spoofing and sniffing.
6) Explain computer crime with examples.
7) Write a short note on Cyber terrorism and Cyberwarfare.
8) What do you mean by software vulnerability? Explain.
9) Differentiate between general control and application control.
10) Explain the process of risk assessment with example.
11) Write a short note on Security policy.
12) Write a short note on disaster recovery planning and business continuity planning.
13) Explain the role of Auditing in Information System.
14) Write a short note on biometric authentication.
15) Explain with diagram :firewall.
16) Explain public key encryption with diagram.
17) Differentiate between high availability computing and fault tolerant computer system.

* * * * *

You might also like