IMPORTANT QUESTIONS
UNIT 2: E-COMMERCE PROCESS AND E-SECURITY
QUESTION 1: WHAT IS CHANGE MANAGEMENT? DISCUSS
VARIOUS STRATEGIES AND BARRIERS OF CHANGE
MANAGEMENT.
Answer: Change Management
In the existing system, with the number of employee, and with the existing technology,
when any kind of changes are implemented then the employees of the company are not
ready to accept the change, so in place of implementing new change suddenly, company
can do changes step by step with the help of same employees then it is known as change
management.
Strategies for the change management
1) Education & communication
2) Participation & involvement
3) Facilitation & Support
4) Addition
(1) Education & Communication
When any of the changes are going to implement in the system then first of all provide
enough guidance to the employees about the new system.
And also specify the advantage and disadvantage of the existing system so employees
are inspire to accept the change.
(2) Participation & Involvement
By taking the participation of the employee I the new process analysis, design,
implementation Stages Company can easily apply change.
Because these employees can inspire others or can motivate others for implementation
of new system.
(3) Facilitation & Support
If any changes is occurred, there are higher chance for demoralization to accept the
change.
In this strategy has to provide facilities and support so employees become ready to
apply change willingly.
(4) Addition
1) If company can offer employees more salary when it apply change in the system then
also employees can inspire to accept the change.
COMPUTER APPLICATION-IV 1
IMPORTANT QUESTIONS
Change Management in Public Administration
1) Public administration in developing country is highly centralized.
2) Public administration is based on legal system.
3) Public administration is based on colonial system.
Characteristic of Public Administration
1) Budget allocation are not based on results and performances of the department.
2) Salary of public employees are not related to their performance.
3) There are highly political interference in the working department.
4) There are difficulties to implement changes related to customer’s satisfaction & service
quality.
Need to implement change Management Public Administration
1) Even after the independence, we are still following the colonial system.
2) It has no real concept of providing service to people because this was also main
characteristic of colonial system.
3) Development for people was not objective of colonial government so it is not presented
in current system.
4) It is necessary to restructure, redesign and reengineering this system to alter it’s image
to make it more friendly to people.
QUESTION 2: WHAT IS CRYPTOGRAPHY? EXPLAIN SYMMETRIC
KEY AND ASYMMETRIC KEY.
Answer: Cryptography
Cryptography means “Secret Writing” it provides privacy to the original message.
If we want to provide security to our message then we have to encrypt the message at
the sender side and then decrypt the message at the receiver side.
Basic terminology
1) Plain text: The original message is known as Plain text. Example: Hello
2) Cipher text: The coded message is known as Cipher text. Example: *****
3) Cipher: The algorithm that is used to transform from plain text to cipher text.
4) Key: It is an information in cipher which is only known by sender and receiver.
5) Encryption: Converting plain text to cipher text is called Encryption. Example: Hello
*****
COMPUTER APPLICATION-IV 2
IMPORTANT QUESTIONS
6) Decryption: Converting cipher text to plain text is called Decryption. Example: *****
Hello
Cryptography algorithms are divided into two types: (1) Symmetric Key Cryptography
(2) Asymmetric Key Cryptography
(1) Symmetric Key Cryptography:
Symmetric key cryptography is also known single key cryptography, private key
cryptography, or Conventional key cryptography.
In symmetric key cryptography both sender and receiver share a common key.
In symmetric key cryptography, one secret number is used to encrypt or to decrypt the
data.
This secret number is known as secret key, symmetric key or private key.
When we want to encrypt the data this symmetric key is used and when we want to
decrypt the data then the same symmetric key is used.
In symmetric key encryption, key distribution is the main problem and problem of key
maintenance (Means a key OR can be forget or key can be stolen).
(2) Asymmetric Key Cryptography
COMPUTER APPLICATION-IV 3
IMPORTANT QUESTIONS
Asymmetric key cryptography is also known as two key cryptography, public key
cryptography.
To solve the problem of symmetric key cryptography, the concept of Asymmetric key
is used.
Here, in place of the same key, two different keys are used.
One key is used to encrypt the data where as another key is used to decrypt the data.
All the members can generate their own public and private key using program.
Public key is known by all the members and private key is known only by the owner of
the key.
QUESTION 3: WHAT IS BPR? DISCUSS VARIOUS PHASES IN BPR
PROJECT.
Answer: BPR (Business Process Reengineering)
“The fundamental rethinking and drastic redesign of business process to achieve
dramatic improvements in the performance, cost, quality, service and speed is
known as BPR.”
There are many companies in the market and competition is continuously increased
with respect to cost, quality and service provided the customer.
So to complete with others, companies requires removing the barriers of the company.
Now a days business is handled based on the customer not based on company.
BPR is used for redesigning the existing system OPTIMIZE the business process,
provide better quality to customer and to reduce the cost to increase the profit.
BPR mainly concern with business process not with departments.
Business Process
Business process are used to provide better service to the customers without wasting of
time of the customer.
Business process includes three elements and they are: (1) Input (2) Process (3)
Output.
(1) Input: In input element, customer provides the information about his requirements.
(2) Process: In process element, all the data is manipulated and all the departmental
work is handled.
(3) Output: In output element, the final result is given to the customer.
BPR Project Team
BPR Project team includes Five members and they are:
COMPUTER APPLICATION-IV 4
IMPORTANT QUESTIONS
(1) Project Leader
The project leader is the top level person who is responsible for answering the project
result.
Project leader selects the BPR Methodology with the help of reengineering guru who
has knowledge about each methodology.
Project leader also interacts with the steering committee for getting the progress of the
work.
Project leader is also responsible for managing the budget.
(2) Project Manager
Project manager is responsible for analysis of the process that is required to
reengineered.
He also schedules the project task and keeps track of it.
He also manages the sub team activities.
(3) Core BPR Team
Core BPR team member study the existing system and find out the processes that are
required to organize.
Core BPR team finalize the business processes.
They includes two types of member and they are
(1) Insiders: Insiders are those members who have the knowledge of the process and
who can give answers of the outsiders.
(2) Outsiders: Outsiders are those members who can study the process and ask the
questions to the insiders.
(4) Sterring Committee
The Sterring committee members continuously observe each activity of the team
member and take report and then convey the information to the project leader.
(5) Individual Task Team
Individual task team includes the member who is actually implementing the design.
BPR Methodology
There are two methods available to implement BPR in company.
(1) Rapid Re engineering Method (RRM)
(2) Process Re engineering Life Cycle (PRLC)
QUESTION 4: EXPLAIN IN BRIEF RRM.
Answer: Rapid Re engineering Method (RRM)
RRM includes five stages.
COMPUTER APPLICATION-IV 5
IMPORTANT QUESTIONS
(1) Preparation
In the preparation stage, the BPR Project team is prepared and ALL the insiders and
outsiders are decided.
Preparation stage performs the following task.
Recognize need
Execute workshop
To give training to team
(2) Identification
In identification stage, the customer oriented process model is developed.
The identification stage performs the following task.
Model customers
Measure performances
Identify processes
Prepare organization map
(3) Vision
In vision stage the processes which are required to reengineered is finalized.
The vision stage, performs the following task.
Understanding process structure
Understanding process flow
Identify activities
(4) Technical and social solution designs
In solution stage, project team defines the technical as well as social design.
The solution stage performs the following task technical design.
Model entity relationship
Apply new technology
Implement plan
Social design:
Empower customer contact
Define jobs
Specify management structure
Implement plan
(5) Transformation
In transformation stage, the team implement the new reengineered plan in the company
step by step.
The transformation stage performs the following task.
Perform technical design
Develop test plan
Give training to staff
Continuously improvement if required.
COMPUTER APPLICATION-IV 6
IMPORTANT QUESTIONS
QUESTION 5: EXPLAIN IN BRIEF PRLC.
Answer: Process Re-engineering Life Cycle (PRLC)
PRLC includes the six stages.
(1) Envision
In envision stage the goal of the company is specified clearly.
The envision stage performs the following task.
Identifying reengineering opportunities
Align with corporate strategy
(2) Initiate
In initiate stage, the project team decide their insiders and outsiders.
The initiate stage performs the following task.
Organize Reengineering team
COMPUTER APPLICATION-IV 7
IMPORTANT QUESTIONS
Setting a goal in terms of cost and time
(3) Diagonse
In this stage, the existing system of the company is identified.
The diagnose stage performs the following task.
Document existing process.
Identify existing process.
Prepare organization map
(4) Redesign
In Redesign stage, the design of business process is structured.
The redesign stage perform the following task.
Design the new process
Design human resource architecture.
Develop pilot plan
(5) Reconstruct
In reconstruct stage, the implementation of new system is done.
Install IT
Recognize business process
(6) Monitor
In monitoring stage the performance of company is measured and if any of the problem
is found then project team start working on it.
It performs the following task.
Measure performance
Link to quality improvement
COMPUTER APPLICATION-IV 8