Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
ASSIGNMENT
DRIVE
|
SPRING 2016
|
PROGRAM
|
MBA/ MBADS/ MBAFLEX/ MBAHCSN3/ PGDBAN2
|
SEMESTER
|
II
|
SUBJECT CODE & NAME
|
MB0047 – MANAGEMENT INFORMATION SYSTEMS
|
BK ID
|
B1968
|
CREDITS
|
4
|
MARKS
|
60
|
Note: Answer all questions. Kindly note
that answers for 10 marks questions should be approximately of 400 words. Each
question is followed by evaluation scheme.
Question. 1 What are the differences
between data and information? Briefly explain the different types of
information systems.
Answer:Data are simply facts or figures
— bits of information, but not information itself. When data are processed,
interpreted, organized, structured or presented so as to make them meaningful
or useful, they are called information. Information provides context for data.
For
example, a list of dates — data — is meaningless without the information that
makes the dates relevant (dates of holiday).
"Data"
and "information" are intricately tied together, whether one is
recognizing them as two separate words or using them interchangeably, as is
Question. 2 How to use information
system to support competitive strategy? Explain with an example for each
strategy
Answer:Firms with a competitive
advantage over others typically have access to special resources that others do
not or are able to use resources more efficiently, resulting in higher revenue
growth, profitability, or productivity growth (efficiency), all of which
ultimately in the long run translate into higher stock market valuations than
their competitors.
Michael Porter's competitive forces model
describes five competitive forces that shape the fate of the firm.
1.
Traditional competitors: Existing firms that
share a firm's market space
2.
New market entrants: New companies have certain
advantages, such as not being locked into old equipment and high motivation, as
well as disadvantages, such as less expertise and little brand recognition.
Some industries
Question. 3 a. Explain First-order and
second-order effects
Answer:First-order: First-order
approximation (also 1st order) is the term scientists use for a further
educated guess[clarification needed] at an answer. Some simplifying assumptions
are made, and when a number is needed, an answer with only one significant
figure is often given ("the town has 4×103 or four thousand
residents").
b. Distinguish between hierarchy and
matrix organisational structures
Answer:A hierarchy is an organisation
structured in layers where each person has clear roles and responsibilities.
Those at the top of the hierarchy have more authority than those lower down.
Just as KBR's organisational structure is designed to deliver its business
goals and strategy, the organisational structure of Aspire Defence Services Ltd
(ADSL) is designed to reflect the intended outcomes of the project. The
structure is a
Question. 4 Briefly explain the Customer
Relationship Management (CRM) system. What are the various facilities created
by CRM?
Answer:Customer relationship management
(CRM) is an approach to managing a company's interaction with current and
future customers. The CRM approach tries to analyse data about customers'
history with a company, to improve business relationships with customers,
specifically focusing on customer retention, and ultimately to drive sales
growth.
Question. 5 Briefly explain the
different aspects of the need for database systems.
Answer:Organizations use large amounts
of data. A database management system (DBMS) is a software tool that makes it
possible to organize data in a database.
The
standard acronym for database
Question. 6 Why privacy is important for
individuals in the organisations? Briefly explain. How workplace electronic
monitoring is done in the organizations?
Answer:Employee
monitoring has become a major issue in human resources management. Different
types of monitoring are currently being used by employers, including computer
monitoring, video surveillance, investigators, undercover operatives, spying,
eavesdropping and wiretapping, and electronic mail and voice mail, and active
badge systems. Critics argue that such activities may lead to employer abuses,
compromised employee privacy, and weakened occupational health and safety.
However, business supporters counter that it is the right of employers to
control the work environment and employee productivity, increase their
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.