FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU MBA 2016 Winter 2nd Sem 2820002 Management Information System Mis Question Paper

Download GTU (Gujarat Technological University) MBA (Master of Business Administration) 2016 Winter 2nd Sem 2820002 Management Information System Mis Previous Question Paper

This post was last modified on 19 February 2020

GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University


FirstRanker.com
Firstranker's choice www.FirstRanker.com
Seat No.: Enrolment No.

--- Content provided by FirstRanker.com ---

GUJARAT TECHNOLOGICAL UNIVERSITY
MBA - SEMESTER - 2 - EXAMINATION — WINTER 2016
Subject Code:2820002 Date: 21/10/2016
Subject Name: Management Information System (MIS)
Time: 10.30 am to 01.30 pm Total Marks: 70

--- Content provided by FirstRanker.com ---

Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

Q. No. Write an appropriate option for multiple choice questions 6

--- Content provided by‍ FirstRanker.com ---

Q.1 (a) The majority of publically available Internet information sources are:
1 A. Created in XML. B. Structured information.
C. Unstructured information D. Normal information.

The term CRM means?
A. Customer Relationship B. Customer Retention Manager

--- Content provided by​ FirstRanker.com ---

2. Management
C. Customer’s Relative D Channel Root Market
Meet

Management information systems (MIS) :
A. Create and share B. Process business transactions (e.g.,

--- Content provided by FirstRanker.com ---

documents that support time cards, payments, orders, etc.)
3. day-today office activities
C. Capture and reproduce the D. Use the transaction data to produce
knowledge of an expert information needed by managers to
problem solver run the business

--- Content provided by FirstRanker.com ---

Which one of the following is not a business driver for an information system?
A. Business Process Re- B. Knowledge Asset Management
4 design
C. Proliferation of D. Security and Privacy
Networks and the

--- Content provided by FirstRanker.com ---

Internet

If a university sets up a web-based information system that faculty could access
to record student grades and to advise students, that would be an example of
5. a/an
A. CRM B. Intranet

--- Content provided by⁠ FirstRanker.com ---

C. ERP D. Extranet

An information system that supports the planning and assessment needs of
executive management is :
A. DSS B. TPS
C. MIS D. None of the above

--- Content provided by‌ FirstRanker.com ---

Q.1 (b) Explain the following terms: 04
1. MIS
2. Phishing
3. Supply Chain Management
4. Internet

--- Content provided by‍ FirstRanker.com ---

FirstRanker.com

Q.2 (a) 1. What is Firewall?
2. Explain ERP.
3. What are the three basic components of a DSS ?
4. Define expert system. 04

--- Content provided by‍ FirstRanker.com ---

(b) Discuss types of decisions? Also discuss types of information require
at each level of decisions 07

Q.3 (a) Describe four competitive strategies enabled by information systems
that firm can pursue. 07

OR

--- Content provided by​ FirstRanker.com ---

(b) Name and describe the principle network topology. 07

Q.4 (a) Describe the relationship between TPS, MIS,DSS and ESS. 07

OR

(b) Supply chain management is less about managing the physical
movement of goods and more about managing information. Discuss

--- Content provided by FirstRanker.com ---

the implications of this statement. 07

Q.5 (a) Explain in detail the different medium used in establishing
telecommunication networks. 07

(b) Explain in detail Computer crime and Hacking as the biggest issue to
the information system. 07

--- Content provided by‍ FirstRanker.com ---

(a) Why do contemporary information system technology and the internet
pose challenges to the protection of individual privacy and intellectual
property? 07

OR

(b) ERP has its base in the manufacturing and evolved from there to serve

--- Content provided by​ FirstRanker.com ---

practically every type of industry--Comment with suitable illustration. 07

(a) Differentiate between internet and intranet. Also describe the business
value gained by organization using both of them. 07

(b) For EACH of the following situations, briefly describe and justify the
most suitable Management Information System sub-type that could be

--- Content provided by FirstRanker.com ---

implemented:
(1) A food producing company wants to make different decisions
regarding the production process whenever these are
required. Specifically, they want to be able to effectively
answer questions such as “If one of the production process

--- Content provided by​ FirstRanker.com ---

machines breaks down, what is the effect on the
company’s ability to satisfy customer demand for our
products?” and “If we add an additional shift to our daily
work schedule on one of our production process machines,
what impact would this have on our throughput per day?”.

--- Content provided by‌ FirstRanker.com ---

(i1) A company wants to provide expert help to its technicians
when diagnosing and repairing faults in complex electronic
control systems, without having to commission and wait
for the human expert to attend each time.
(iii) The management of a university wants to report percentage

--- Content provided by​ FirstRanker.com ---

attendances in classes for students on a weekly basis, as
basis according to current information requirements. 14

OR

Heerapur Police busted a racket involving an online fraud worth Rs
12.5 lakh. The modus operandi of the accused was to hack into the

--- Content provided by‌ FirstRanker.com ---

online shopping India website and make purchases in the names of
credit card-holders. Two persons, including alleged mastermind Amit
Kumar, a B.Com student, were arrested and forwarded to the court of
the sub-divisional judicial magistrate. The other arrested person is
Ravi Kumar.

--- Content provided by​ FirstRanker.com ---

Superintendent of police said the duo was later remanded in judicial
custody but four other persons allegedly involved in the racket were
untraceable. A case has been registered against the accused under
Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT
Act and further investigation is on, he said.

--- Content provided by‌ FirstRanker.com ---

While Patel, son of a retired employee, was arrested from his
residence. Patel allegedly hacked into the online shopping India site
and gathered the details of around 700 credit cardholders. He then
made purchases by using their passwords.

The fraud came to the notice online shopping officials when it was

--- Content provided by‍ FirstRanker.com ---

detected that several purchases were made from Heerpur while the
customers were based in different cities of India and abroad. The
company brought the matter to the notice of police after some
customers lodged complaints. Patel used the address of Ravi kumar
for delivery of the purchased goods, said police. The gang was

--- Content provided by‌ FirstRanker.com ---

involved in train, flight and hotel reseryations.

The hand of Kavikumar was -also arrested in Mumbai city, is
suspected in the crime. Kavikumar had booked a room in a Bangalore
hotel for three months. The hotel and transport bills rose to Rs 5 lakh,
which he did not pay."He was arrested for non-payment of bills,

--- Content provided by‌ FirstRanker.com ---

following which Amit’kumar rushed to Bangalore and stood guarantor
for his release onbail, police sources said.

Q.1 In reference, to' the above case, give your view for the prevention
of such cyber crime.

Q.2 What.is cyber law? How it will help in preventing such cyber

--- Content provided by‍ FirstRanker.com ---

crime? What measures are required to be made in cyber law? 14



This download link is referred from the post: GTU MBA Last 10 Years 2010-2020 Question Papers || Gujarat Technological University

--- Content provided by⁠ FirstRanker.com ---