Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
ASSIGNMENT
DRIVE SUMMER
|
2014
|
PROGRAM
|
MBADS – (SEM 4/SEM 6) / MBAN2 / MBAFLEX – (SEM 4) /
PGDISMN – (SEM 2)
|
SUBJECT CODE & NAME
|
MI0040- TECHNOLOGY MANAGEMENT
|
BK ID
|
B1326
|
CREDITS
|
4
|
MARKS
|
60
|
Note: Answer all questions. Kindly note that answers for 10 marks
questions should be approximately of 400 words. Each question is followed by
evaluation scheme.
1 Consider that you are a manager in a
company and you want to manage a technology that is newly incorporated.
a. Describe the effects of technologies on
business.
b. Prepare a list of the factors that are
considered in managing technology.
Answer : Effects of
technologies on business :
1. Shrinking world:
Technology has made national and
international commerce a much more feasible reality. Today, people and
businesses can buy and sell with people all over the world. In past history it
might have taken months for a letter to go from one party to another. Now, an
email can reach someone in seconds, and a transaction can be completed with the
push of a button. While this is terribly convenient for some businesses, it
does make some people impatient when they actually have to wait for things.
Without historical perspective, people can lose touch with how much power and
convenience they have at their fingertips.
2 The purpose of forecast is to improve the
quality of the decisions related to selection of an alternative from available
alternatives and not to force to accept a particular decision.
Answer : Primary forecasting techniques help
organizations plan for the future. Some are based on subjective criteria and
often amount to little more than wild guesses or wishful thinking. Others are
based on measurable, historical quantitative data and are given more credence
by outside parties, such as analysts and potential investors. While no
forecasting tool can predict the future with complete certainty, they remain
essential in estimating an organization's forward prospects.
Delphi Technique
3 Write short notes on
a. Technology adoption
Answer : The
technology life-cycle (TLC) describes the commercial gain of a product through
the expense of research and development phase, and the financial return during
its "vital life". Some technologies, such as steel, paper or cement
manufacturing, have a long lifespan (with minor variations in technology
incorporated with time) whilst in other cases, such as electronic or
pharmaceutical products, the lifespan may be quite short.
The technology
life cycle is concerned
b. Technology diffusion
Answer : Technology
and technological innovation play a central role in the organization and
delivery of health services and are a driver of optimal health outcomes.
Diffusion of innovations is a
theory that seeks to explain how, why, and at what rate new ideas and
technology spread through
c. Technology absorption
Answer : It
involves ‘Know-why’ exercises, basic investigations into the product and or
process and or systems. This will require unpack aging of a technology package.
It requires R&D projects in know-why, optimization and improvement of
product/process/systems and related equipments.
Benefits of technology absorption :
The benefits that we get from
technology absorption exercises, as evidenced by Government and industry
experiences so far. These benefits are:
1· Repeated collaborations for
the same product/ process are avoided.
4 When you choose a new technology, you may
have to face some of the question like what are its functional requirements,
non-functional requirements and does the technology fit the organization culture?
Answer : : It’s ubiquitous, (and
it’s everywhere as well) and some would have you believe that if you’re not
using the latest and greatest product, then you’re falling behind. This “you’re
not keeping up” sales pitch is very effective at striking at the heart of our
insecurities; am I falling behind? Will I lose out if I don’t buy this stuff?
Don’t the ads claim that they’ll make me more productive, more efficient, and
even more attractive to the
5 Write short notes on
a. Bridging agencies
Answer : In
telecommunication networks, a bridge is a product that connects a local area
network (LAN) to another local area network that uses the same protocol (for
example, Ethernet or token ring). You can envision a bridge as being a device
that decides whether a message from you to someone else is going to the local
area network in your building or to someone on the local area network in the
building across the street. A bridge exa
b. Problem solver model
Answer : In
order to correctly solve a problem, it is important to follow a series of
steps. Many researchers refer to this as the problem-solving cycle, which
includes developing strategies and organizing knowledge. While this cycle is
portrayed sequentially, people rarely follow a rigid series of steps to find a
solution. Instead, we often skip steps or even go back through steps multiple
times until the desired solution is reached.
c. Bar-Zakay model
Answer : The Bar-Zakay model: This model is
based on a project management approach, and was introduced by Bar-Zakay
{managing partner of films, who focused his practice on personal injury and
wrongful death law). As per this model, we can divide the process of technology
transfer into four stages:
* Search.
* Adapt
* Implement
* Maintain.
d. Schlie, Radnor and Wad model
Answer : It’s
a model that seven elementscould make an effect on the planning, implementation
and eventual successof any technology transfer project. The seven elements are
the transferor (theentityselling the technology to the recipient), the
transferee (the entitybuying the technology), the technology which is being
transferred, thetransfer mechanism which has been chosen to transfer the chosen
6 Explain the basic scheme for knowledge
based applications
Answer : Knowledge-based authentication or applications
(KBA) is an authentication scheme in which the user is asked to answer at
least one "secret" question. KBA is often used as a component in
multifactor authentication (MFA) and for self-service password retrieval.
Secret questions
can be static or dynamic. In a static scheme, the end user pre-selects the
questions he would like to be asked and provides the
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.