FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU MBA 2018 Summer 4th Sem 2840402 Strategic Information Technology Management Question Paper

Download GTU (Gujarat Technological University) MBA (Master of Business Administration) 2018 Summer 4th Sem 2840402 Strategic Information Technology Management Previous Question Paper

This post was last modified on 19 February 2020

GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University


FirstRanker.com

Seat No.: Enrolment No.

GUJARAT TECHNOLOGICAL UNIVERSITY

--- Content provided by FirstRanker.com ---

MBA - SEMESTER—IV EXAMINATION — Summer 2018

Subject Code: 2840402 Date: 30-05-2018

Subject Name: Strategic Information Technology Management

Time: 02:30pm — 05:30pm Total Marks: 70

Instructions:

--- Content provided by⁠ FirstRanker.com ---

  1. Attempt all questions.
  2. Make suitable assumptions wherever necessary.
  3. Figures to the right indicate full marks.
  1. (a)
    1. i. Expertise and experience of organizational members that has not been formally documented is known as: 06
      1. Knowledge sharing
      2. Tacit knowledge
      3. --- Content provided by⁠ FirstRanker.com ---

      4. Explicit knowledge
      5. Organizational Learning
    2. ii. CRM allows an organization to accomplish all of the following, except:
      1. Make call centers more efficient
      2. Provide better customer service
      3. --- Content provided by‍ FirstRanker.com ---

      4. Help sales staff close deals faster
      5. Complicate marketing & sales processes
    3. iii. Which of these items is a major component of today's IT infrastructure?
      1. Data Management Technology
      2. Networking
      3. --- Content provided by FirstRanker.com ---

      4. Technology Services
      5. All of the above
    4. iv. The first phase of IT planning is called planning
      1. Tactical
      2. Project
      3. --- Content provided by‌ FirstRanker.com ---

      4. Organisational
      5. Strategic
    5. v. Which of the following is not a function of DBA?
      1. Routine Maintenance
      2. Schema Definition
      3. --- Content provided by‌ FirstRanker.com ---

      4. Network Maintenance
      5. Authorization for data access
    6. vi. Contemporary Information systems are interfacing with customers and suppliers using:
      1. BPR
      2. CRM
      3. --- Content provided by‌ FirstRanker.com ---

      4. SCM
      5. Both B and C
  2. (b) Define the following: 04
    1. i. Business Process Management
    2. --- Content provided by​ FirstRanker.com ---

    3. ii. Decision Support Systems
    4. iii. E-Commerce
    5. iv. Types of Network
  3. (c) How does information technology help a business to gain competitive strategies? 07
  4. --- Content provided by FirstRanker.com ---

  1. (a) Explain the tools available to the managers at different levels for controlling the organization 07
  2. (b) Briefly explain the major challenges faced by management regarding Adoption, implementation and maintenance of information system 07

    OR

    Explaining the relationship between business strategy, information system strategy and IT strategy, explain how Information Technology can contribute to strategic objectives and competitive advantage of a firm.
  1. (a) What are supply Chain Management (SCM) applications? Briefly explain the objectives and outcomes of implementing SCM software. 07
  2. (b) Write detailed note on ERP with its components? Explain benefits of ERP. What are the problems in implementing ERP systems? 07

    OR

    --- Content provided by‍ FirstRanker.com ---

    Define and explain CRM. List the major types of CRM and its uses.
  1. (a) What are the important factors and managerial challenges that determine technology adoption and implementation in SME’s and MSME’s? 07
  2. (b) What are the challenges associated with use of unstructured data in business 07
  1. (a) Define Knowledge Management. How can the firm protect its knowledge and keep it from competitors 07

    OR

    What are the ethical issues related to use of information technology
  2. --- Content provided by‍ FirstRanker.com ---

  3. (b) What do you mean by “DSS”? Discuss various components of DSS in detail. 07
  1. (a) Pat Washington is chairperson of a new company that sells PC software for children, a combination of education and entertainment. The firm has experienced rapid growth and two of its products are best sellers. Being chairperson of a technology company, Pat wants to take advantage of mass market services such as America Online. While her products are aimed at children, adults purchase almost all of their software.
    Pat is particularly fascinated by the Internet and the World Wide Web. She says, “There must be a way to establish closer rapport with our customers, adults who purchase and the children who use our products, through the Internet.” Pat is unsure what to do. Alternatives range from setting up a home page and a product catalog on the World Wide Web to taking orders over the Net.
    Questions:
    1. What should Pat consider in her decision?
    2. What are the pros and cons of the different alternatives?
    3. --- Content provided by FirstRanker.com ---

    4. How do the commercial services like America Online fit into her strategy?
    14

    OR

    Security Loopholes
    Utpal had just joined SystemX as Systems Manager. But he was a worried man looking at the current state of affairs at SystemX. As a part of assessing hardware and software requirements, it was found that out of the 364 desktops at the corporate office; more than half did not have their antivirus software updated with recent virus signature files. Three - fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, he wondered about the situation at the seven branch offices across the country.
    SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. Utpal’s first thought was that he would recommend that SystemX bring in a security consultant. But the budget constraints meant that his recommendation was unlikely to find favour. He was beginning to feel a bit out of depth and was wondering what he should do to ensure that SystemX’s data remained safe and secure.

    --- Content provided by​ FirstRanker.com ---

    Questions:
    1. What security loopholes come to the fore in the situation described? How can these be plugged?
    2. What is the importance of a “security budget” in the context of the given situation?
    14

FirstRanker.com


--- Content provided by‍ FirstRanker.com ---


This download link is referred from the post: GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University