Solution of Assignment Synopsis & Project Dissertation Report

Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!


Title Name Amity Solved Assignment BBA 4th Sem for Management Information systems assignment 3
University AMITY
Service Type Assignment
Course B.B.A
Semester Semester-IV Course: B.B.A
Short Name or Subject Code Management Information systems
Commerce line item Type Semester-IV Course: B.B.A
Product Assignment of B.B.A Semester-IV (AMITY)


Click to View Price
Download Question File
Download Answer File 297532648518.docx (Purchase the product for download...!!!)




  1. What are the goals of Information System security? Explain IS security Management control and any five tools of security management to overcome computer crime?


Solve by contact for more detail - 8882309876

  1. What is Decision Support System? Explain the components, Decision making Phases and Analytical Models of DSS


  1. Discuss Data Resource Management Technologies? Why these technologies considered as backbone of modern Information Systems?


  1. What M-Commerce Services and Applications an organization should integrate in its Information System? What operation excellence will they give to the organization


  1. Write notes on (All questions to be answered. Minimum 1 full page for each question)


  1. Information System planning and approaches


An information system (IS) is a system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.

The plural term information systems (construed as singular) is also used for the actual academic study of the field, in other words for the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create and distribute data.


The 5 components that must come together in order to produce a computer-based information system are:

  1. Hardware: The term hardware refers to machinery. This category includes the computer itself, which is often referred to as the central processing unit (CPU), and all of its support equipments. Among the support equipments are input and output devices, storage devices and communications devices.
  2. Software: The term software refers to computer programs and the manuals (if any) that support them. Computer programs are machine-readable instructions that direct the circuitry within the hardware parts of the system to function in ways that produce useful information from data. Programs are generally stored on some input / output medium, often a disk or tape.
  3. Data: Data are facts that are used by programs to produce useful information. Like programs, data are generally stored in machine-readable form on disk or tape until the computer needs them.
  4. Procedures: Procedures are the policies that govern the operation of a computer system. "Procedures are to people what software is to hardware" is a common analogy that is used to illustrate the role of procedures in a system.
  5. People: Every system needs people if it is to be useful. Often the most over-looked element of the system are the people, probably the component that most influence the success or failure of information system.
  1. Pre-requisites of Information Systems development


  1. Physical & Logical DFD


  1. Grantt Chart


  1. Explain organization as a system. Define Hierarchical structure of an organization and discuss how characteristics of information changes while traversing different levels of management


Solve by contact for more detail - 8882309876

  1. What challenges do you see for a company that wants to implement collaborative system integration of its various services and departments?  How would a company meet such challenges?


  1. What is Information System Prototyping? Explaining the concept of System Development Life Cycle (SDLC). Discuss in detail the activities involved in development of E-Commerce based Information System in an organization



The near past saw the effective implementation of the online services including Electronic Customer Relationship Management (e-CRM) solution by the US-based IT giant IBM. The conceiving and implementation of online e-CRM solution by IBM was scheduled in association with the leading CRM software vendor - Siebel Systems.

The process followed by IBM to implement the e-CRM solution describing its systems architecture faced quite a lot challenges in implementing the solution, but the benefits reaped by the company after the implementation were enormous.

In January 2000, IBM, the $86 billion IT company, embarked on the largest electronic based Customer Relationship Management (e-CRM) project known at that time. Termed CRM 2000, the project aimed at ensuring that any point of interface between the customer and IBM, through any of its channels, in any country, was dealt with uniformly, providing the same service level, applying the same tools and information.

In other words, IBM wanted to present a unified interface to its customers across the world. In 2004, four years after the project, the company was well on its way towards fulfilling its objective, reporting significant improvement in customer satisfaction levels.

To manage the worldwide installation of Siebel´s e-CRM applications, IBM launched a global program. Installation of e-CRM systems was only a part of the implementation process of CRM solutions at IBM. A more important task was to manage internal business process changes following the installation.

The deployment of the e-CRM solution let to significant productivity improvement at various IBM units within a year of implementation. Without increasing the number of staff manning call centers, more number of calls could be dealt with and more leads were generated.

  1. Discuss the importance of implementing an online CRM solution in a large multi-product, multinational company



  1. Discuss the implementation process of a mega e-CRM project in a leading IT company in the world. 



  1. Study the challenges faced in an e-CRM project and identify ways to overcome them


Solve by contact for more detail - 8882309876

  1. A _____ focuses on planning, policies, and procedures regarding the use of corporate data and information
    1. CIO
    2. systems analyst
    3. database administrator
    4. system operator
  2. _____ organizational structure employs individuals, groups, or complete business units in geographically dispersed areas who may never meet face to face in the same room.
    1. Traditional
    2. Virtual
    3. Multidimensional
    4. Matrix
  3. _____ are individuals who help users determine what outputs they need from the system and construct the plans needed to develop the necessary programs that produce these outputs.
    1. Data entry operators
    2. Programmers
    3. Database administrators
    4. Systems analysts
  4. The current major stage in the business use of IS is oriented towards ____.
    1. Cost reduction and productivity
    2. Gaining competitive advantage
    3. Strategic advantage and costs
    4. Improved customer relationship management


  1. The extent to which technology permeates an area or department is called ____.
    1. Technology diffusion
    2. Technology infusion
    3. Technology collusion
    4. Technology fusion

Solve by contact for more detail - 8882309876


  1. According to the ____ theory, organizations adapt to new conditions or alter their practices over time. 
    1. Change model
    2. Organizational learning
    3. Organizational culture
    4. Continuous improvement
  1. A ____ is an abstraction or an approximation that is used to represent reality.
    1. Model
    2. System parameter
    3. System performance standard
    4. System
  2. ____ gives the computer the ability to make suggestions and act like an expert in a particular field.
    1. Decision support systems
    2. Virtual reality systems
    3. Management information systems
    4. Expert systems
  3. ____ is an awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision
    1. Knowledge
    2. Data
    3. Feedback
    4. A process
  4. ____ attacks have overwhelmed the capacity of some of the Web´s most established and popular sites.
    1. Spam
    2. Credit card fraud
    3. Denial-of-service
    4. Spoofing
  5. The value of information is directly linked to ____.
    1. its accuracy and completeness
    2. its verifiability
    3. its simplicity and security
    4. how it helps decision makers achieve organizational goals
  6. ____ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.
    1. Data
    2. E-commerce
    3. A transaction
    4. Input
  1. ____ represent(s) the application of information concepts and technology to routine, repetitive, and usually ordinary business transactions
    1. E-commerce
    2. Transaction processing systems
    3. Management information systems
    4. Decision support systems
  2. ____ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.
    1. Bundled software
    2. Software suite
    3. Productivity applications
    4. General purpose software
  3. Information systems that support the firm in its interaction with its environment are said to be performing within the ____.
    1. Workgroup sphere of influence
    2. Global sphere of influence
    3. Enterprise sphere of influence
    4. Individual sphere of influence
  4. _____ is software programs that were developed for a general market and that can be purchased in a store.

  1. Proprietary software
  2. Off-the-shelf software
  3. Contract software
  4. Application software
  1. ____ describes various program functions and help users operate the computer system
    1. A computer program
    2. Documentation
    3. Systems software
    4. A computer system platform
  2. ____ is an Internet service that enables you to log on to another computer and access its public files.
    1. Telnet
    2. FTP
    3. Content streaming
    4. Instant messaging
  3. ____ is a protocol that enables you to copy a file from another computer to your computer.
    1. SLIP
    2. Usenet
    3. Telnet
    4. FTP
  4. ____ is the process of converting a message into a secret code and changing the encoded message back to regular text.
    1. Encryption
    2. Fraud
    3. Encoding
    4. Cryptography
  5. ____ converts ciphertext back into plaintext.
    1. Encryption
    2. A firewall
    3. Decryption
    4. An encoder
  6. Using ____ technology, network managers can route phone calls and fax transmissions over the same network that they use for data.
    1. Voice-over-IP
    2. Content streaming
    3. Hypermedia
    4. XML
  7. Which of the following is NOT a goal of transaction processing systems?
    1. Capture, process, and store transactions
    2. Produce a variety of documents related to routine business activities
    3. Reduce manual effort associated with processing business transactions
    4. Produce standard reports used for management decision making
  8. ___ is a form of transaction processing in which all transactions are collected into a group and processed together.
    1. Accumulation processing
    2. Batch processing
    3. Data collection
    4. Data collection
  9. The data processing activity that involves rekeying miskeyed or misscanned data is called ____.
    1. Editing
    2. data storage
    3. data correction
    4. data collection
  10. With the ___ form of data processing, each transaction is processed immediately.
    1. OLTP
    2. batch processing
    3. active processing
    4. automated transaction processing A(n) ____ is a type of report that summarizes the previous
  11. Day’s critical activities and is typically available at the beginning of each workday.
    1. Demand report
    2. scheduled report
    3. key-indicator report
    4. exception report
  12. Which of the following statements, about the use of decision support systems, is true?
    1. They are applied only to the choice phase of the problem-solving process.
    2. They are only applied to frequent, recurring problems.
    3. They are only applied to highly-structured problems
    4. They assist decision makers at all levels within the organization.
  13. Problems that are routine and have well-defined relationships are called ____.
    1. Structured problems
    2. Programmed decisions
    3. Simple problems
    4. Heuristics
  14. Using ____, a decision maker can make hypothetical changes to problem data and observe the impact on the results
    1. Simulation
    2. What-if analysis
    3. Optimization
    4. Goal-seeking analysis
  15. The first stage in the problem-solving process is called the ____ stage. During this stage, potential problems or opportunities are identified and defined.
    1. Choice
    2. Design
    3. Monitoring
    4. Intelligence
  16. The component of a decision support system that provides decision makers access to a variety of models and assists them in decision making is called the ____.
    1. Model base
    2. model management software
    3. database
    4. dialogue manager
  17. ____ often referred to as "rules of thumb," are commonly accepted guidelines or procedures that usually lead to a good decision.
    1. Optimization models
    2. Satisficing models
    3. Heuristics
    4. Programmed decisions
  18. ____ involves the investigation of new approaches to existing problems.

    1. Systems analysis
    2. Creative analysis
    3. Critical analysis
    4. Organizational analysis
  19. Which of the following SDLCs listed below takes an iterative approach to the systems development process?
    1. end user
    2. RAD
    3. Prototyping
    4. traditional waterfall
  20. ____ is factors that are essential to the success of certain functional areas of an organization.
    1. Mission-critical factors
    2. Critical success factors
    3. Performance objectives
    4. Strategic factors
  21. The translation of strategic and organizational goals into system development initiatives is called ____.
    1. Systems development
    2. information systems planning
    3. project planning
    4. project definition
  22. The four key questions related to fairness in information use are ____.
    1. cost, timing, content, and frequency
    2. notice, consent, accuracy, and authorization
    3. knowledge, control, notice, and consent
    4. knowledge, accuracy, timing, and permission
  23. Whose responsibility is it to see that the potential consequences of IS use are fully considered?

    1. IS professionals
    2. Managers
    3. Users
    4. all of the above
  1. ___ is a crime in which the imposter obtains key pieces of personal information in order to impersonate the victim.
    1. Social engineering
    2. Dumpster diving
    3. Computer fraud
    4. Identity theft

Solve by contact for more detail - 8882309876


Only after making the payment you would be able to see the answer...!!!


Average user rating

4.8 / 5

Rating breakdown

80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

15-May, 2018
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.