Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views38 pages

IT Sem - 4

The document provides a comprehensive overview of Management Information Systems (MIS), detailing their objectives, types of reports generated, structure, and the Software Development Life Cycle (SDLC) using the Waterfall model. It also discusses various types of Decision Support Systems (DSS) and their functionalities, as well as the role of information systems in organizations. Key components such as data capturing, processing, storage, and retrieval are emphasized, alongside the importance of timely and accurate information for effective decision-making.

Uploaded by

DUTCHMAN GAMING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views38 pages

IT Sem - 4

The document provides a comprehensive overview of Management Information Systems (MIS), detailing their objectives, types of reports generated, structure, and the Software Development Life Cycle (SDLC) using the Waterfall model. It also discusses various types of Decision Support Systems (DSS) and their functionalities, as well as the role of information systems in organizations. Key components such as data capturing, processing, storage, and retrieval are emphasized, alongside the importance of timely and accurate information for effective decision-making.

Uploaded by

DUTCHMAN GAMING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

IT SEM-4

1) Objective of MIS.
Ans:
A Management Information System (MIS) is a computerized system that collects,
processes, stores, and disseminates information to support decision-making within an
organization. It involves the use of technology, software, and databases to gather and
analyze data, providing managers with timely and accurate information for planning,
organizing, and controlling business activities. MIS helps streamline processes, enhance
communication, and improve overall efficiency in an organization by facilitating the flow
of information across different levels and functions.

1. Capturing Data − Capturing contextual data, or operational information


that will contribute in decision making from various internal and external
sources of organization.

2. Processing Data − The captured data is processed into information


needed for planning, organizing, coordinating, directing and controlling
functionalities at strategic, tactical and operational level.
Processing data means −
- making calculations with the data
- sorting data
- classifying data and
- summarizing data

3. Information Storage − Information or processed data need to be stored for


future use.

4. Information Retrieval − The system should be able to retrieve this information


from the storage as and when required by various users.

5. Information circulation − Information or the finished product of the MIS


should be circulated to its users periodically using the organizational network.

2) Report of MIS (Types)


Ans:
1. The Summary Reports
Summary reports are a type of MIS reports used to visualize aggregate data and provide
a summary. This summary could be of different business units, different products,

1
different customer demographics among other things. The report is presented in a
format that can be understood by the company's management.
For example, an inventory summary, which summarizes the cost of stocking inventory
and their purchase value. A sales summary report summarizes the sales revenue, the
geographical distribution of sales, and details of products sold.

2. The Trend Reports


Trend Reports are types of MIS reports that allow your company to see the trends and
patterns among different categories. Trend reports are also used to compare different
products or services. They are often used to draw comparisons between the actual
versus the predicted output/growth within an organization. These reports help to pinpoint
the problem areas in a company and give potential solutions to them.
For example, a sales trend report, which will highlight the product sales across different
demographics and different time periods. It will also help the company to understand
which products perform relatively better.

3. The Exception Reports


An exception report is a type of MIS reports that is an aggregate report of exceptions,
which are abnormal or unusual circumstances within a company. The exceptions report
will collect instances of all such conditions within different departments in your company,
and present them to the management in a uniform format. Exceptions reports are useful
for catching problems early, and solving them before they cause a major disruption.
For example, an inventory that is seriously understocked, which has to be refilled on an
urgent basis; or a product which is underperforming and needs to be scrapped.

4. On-Demand Reports
The on-demand report is a type of MIS reports that are produced on specific demands
from your company's management team. There is no fixed criteria or format that must be
included in an on-demand report. This type of MIS report includes the requirements of a
company and the prevailing circumstances will dictate the contents of an on-demand
report.
For example, a sales manager may want to know the peak sales season for a particular
product in a particular location. This will help the manager to decide whether other
similar products may succeed in the same market.

5. Financial Reports
Financial reports are types of MIS reports that can be used to determine the financial
condition of an organization. A financial report often includes a company's balance
sheets, income, and expense details, and cash flow statements. Financial reports are
used by your company's financial analysts, investors, the board of directors, and even
government units to access the overall financial health of your organization. These
reports are used in making critical financial decisions within a company.
The financial statement is a subtype of financial report that is used to provide information
to shareholders and all other concerned parties.

2
For Example, your company might report finance numbers quarterly, semi-annually, or
annually.

6. Inventory Reports
Inventory reports are a type of MIS report that is used to manage and keep a track of all
the products in your inventory. The inventory report includes details about the number of
products left in stock, the best selling products, the top-selling categories of products
and how they vary by demographic, etc. Inventory reports can help your business to
make smarter, data-driven decisions.
For Example, your inventory report might highlight that a particular product sells better
in a particular area as compared to others. Your company can then target advertising to
increase revenue.

7. Sales Reports
The sales report is prepared by the marketing and sales division of your organization. It
includes a visualization of products that have been sold during the last quarter/month in
your organization. The sales data is often visualized by taking into account the budgeted
and actual sales numbers. It provides an insight into the sales variance (the difference
between the budgeted and actual sales), the geographical distribution of products sold,
and the timeline of sales among other factors.
For Example, during the peak shopping season, your company might sell more
products than anticipated, which will reflect in your sales report during the next quarter.

8. Budget Reports
Organizations operate on a variety of budgets. These may include cash budgets, income
v/s expenditure budgets, marketing budget, HR budget, production budget, etc. An MIS
budget report contains internal information about your organization. It is used to maintain
your company's financial health while driving growth.
For Example, Your company's marketing budget during a new marketing campaign is
an example of the budget report.

9. Production Reports
Production report is a types of MIS report that contains information about the raw
production numbers in your company. The manufacturing division within your company
will prepare this report, and provide details of the production targets that were achieved
or missed.
This report also details the predicted v/s actual products manufactured in the time frame.
It may also highlight a production bottleneck or ideas on how to speed up the production
process.
For Example, your production report might highlight an increase in the speed of
production due to new machines being allocated.

3
3) SDLC (Waterfall model)
Ans: The software development lifecycle (SDLC) is the cost-effective and time-efficient
process that development teams use to design and build high-quality software. The goal
of SDLC is to minimize project risks through forward planning so that software meets
customer expectations during production and beyond.

Waterfall Model is a classical software development methodology that was first


introduced by Winston W. Royce in 1970. It is a linear and sequential approach to
software development that consists of several phases that must be completed in a
specific order.

The Waterfall Model has six phases:

1. Requirement Gathering and analysis − All possible requirements of the system


to be developed are captured in this phase and documented in a requirement
specification document.

2. System Design − The requirement specifications from first phase are studied in
this phase and the system design is prepared. This system design helps in
specifying hardware and system requirements and helps in defining the overall
system architecture.

3. Implementation − With inputs from the system design, the system is first
developed in small programs called units, which are integrated in the next phase.
Each unit is developed and tested for its functionality, which is referred to as Unit
Testing.

4
4. Integration and Testing − All the units developed in the implementation phase
are integrated into a system after testing of each unit. Post integration the entire
system is tested for any faults and failures.

5. Deployment of system − Once the functional and non-functional testing is done;


the product is deployed in the customer environment or released into the market.

6. Maintenance − There are some issues which come up in the client environment.
To fix those issues, patches are released. Also to enhance the product some
better versions are released. Maintenance is done to deliver these changes in
the customer environment.

4) Output of MIS.(SN)
Ans:
1. Periodic Reports:
- Explanation: Periodic reports are regularly generated at predetermined intervals,
offering routine updates on various business activities. These reports follow a set format
and contribute to ongoing monitoring and assessment.
- Example: A weekly sales summary report that provides insights into sales
performance, trends, and key metrics over the past week.

2. Triggered Reports:
- Explanation: Triggered reports are generated in response to specific events or
situations, often predefined within the MIS. These reports are designed to address
particular needs that arise based on triggers or thresholds.
- Example: An inventory reorder report triggered when the stock levels of a particular
item fall below a predetermined reorder level.

3. Demand Reports:
- Explanation: Demand reports are responses to specific queries posed by decision-
makers. These reports provide targeted information based on the queries raised,
supporting decision-making processes.
- Example: A request for a report on total sales to date for a specific product, allowing
decision-makers to assess the product's performance.

4. Plan Reports:
- Explanation: Plan reports are customized to assist in the formulation of various plans,
including sales forecasts, distribution plans, and budgets. These reports provide
valuable insights for strategic planning.
- Example: A sales forecast report that analyzes historical sales data and market
trends to predict future sales figures.

5
5. Key-Indicator Reports:
- Explanation: Key-indicator reports summarize critical activities and metrics, typically
available at the beginning of each workday. These reports offer a quick overview of key
indicators for informed decision-making.
- Example: A daily operations report summarizing key metrics such as inventory levels,
production activity, and sales volume from the previous day.

In practice, a well-designed MIS utilizes these types of reports to cater to different


informational needs within an organization. Whether it's providing routine updates,
responding to specific triggers, answering queries, assisting in planning, or summarizing
key indicators, these reports collectively contribute to effective decision-making and
overall business management.

5) Structure of MIS.
Ans: A management information system (MIS) is an organised combination of people,
hardware, communication networks and data sources that collects, transforms and
distributes information in an organisation. An MIS helps decision making by providing
timely, relevant and accurate information to managers. The physical components of an
MIS include hardware, software, database, personnel and procedures.

6
1. Database:
The database is the foundation of an MIS, serving as a centralized repository for storing
and organizing data. It includes tables, records, and fields that collectively hold the
information needed for various organizational processes.

2. Procedure:
Procedures define the step-by-step processes and methods for collecting, processing,
and managing information within the MIS. Clear procedures ensure consistency and
accuracy in data handling.

3. Operating Personnel:
Operating personnel are the individuals responsible for managing and using the MIS.
This includes data entry operators, system administrators, analysts, and other staff
members involved in the day-to-day operations of the system.

4. Hardware:
Hardware refers to the physical components of the MIS, such as servers, computers,
storage devices, and networking equipment. These elements provide the infrastructure
necessary for the MIS to function.

5. Software:
Software includes the applications, programs, and systems that enable the MIS to
perform specific tasks. This encompasses database management software, data
processing applications, and any custom software designed for the organization's
specific needs.

6. Medium and Messenger:


The medium and messenger involve the channels used for communication within the
MIS. This includes the physical or digital means through which information is
transmitted, such as emails, reports, memos, or other communication tools.

7. Input and Output:


Input refers to the data that is entered into the MIS, while output is the processed
information that is generated as a result. This includes reports, analytics, and other
forms of data presentation that aid decision-making.

In summary, the structure of a Management Information System comprises


interconnected components, including a robust database, well-defined procedures, a
team of operating personnel, hardware infrastructure, specialized software,
communication channels, and the processes of inputting and outputting data. The
effective integration and coordination of these elements contribute to the functionality
and efficiency of the MIS in supporting organizational decision-making and operations..

7
6) Types of DSS.
Ans: A Decision Support System (DSS) is an interactive computer-based information
system designed to assist decision-makers in an organization. It provides analytical tools
and information to facilitate decision-making processes by synthesizing large volumes of
data, generating reports, and offering insights into complex problems.

Types of DSS

1. Data-driven DSS
A data-driven DSS is a computer program that makes decisions based on data from
internal databases or external databases.
Typically, a data-driven DSS uses data mining techniques to discern trends and
patterns, enabling it to predict future events.
Businesses often use data-driven DSSes to help make decisions about inventory, sales
and other business processes.
Some are used to help make decisions in the public sector, such as predicting the
likelihood of future criminal behavior

2. Model-driven DSS
Built on an underlying decision model, model-driven decision support systems are
customized according to a predefined set of user requirements to help analyze different
scenarios that meet these requirements.
For example, a model-driven DSS may assist with scheduling or developing financial
statements.

3. Communication-driven DSS
A communication-driven and group decision support system uses a variety of
communication tools such as email, instant messaging or voice chat to allow more than
one person to work on the same task.
The goal behind this type of DSS is to increase collaboration between the users and the
system and to improve the overall efficiency and effectiveness of the system.

4. Knowledge-driven DSS
In this type of decision support system, the data that drives the system resides in a
knowledge base that is continuously updated and maintained by a knowledge
management system.
A knowledge-driven DSS provides information to users that is consistent with a
company's business processes and knowledge

5. Document-Driven DSS
A Document-Driven DSS is a helpful tool that uses documents to find and manage
information. For instance, if a manager needs to review company policies, this system

8
allows them to quickly search and access the relevant documents, making decision-
making easier and more efficient.

7) Explain types of Information system with diagram.


Ans: An information system (IS) is an interconnected set of components used to collect,
store, process and transmit data and digital information. At its core, it is a collection of
hardware, software, data, people and processes that work together to transform raw
data into useful information.

1) Artificial Intelligence (Al)


Artificial Intelligence (AI) is the development of computer systems that can
perform tasks that typically require human intelligence. These tasks include
learning from data, making decisions, understanding natural language, and
recognizing patterns in images and speech. AI technology is used in various
applications such as virtual assistants, Speech recognition, Learning, planning,
Problem solving.

2) Knowledge Management System (KMS)


Exist to help businesses create and share information. They are typically used in
businesses where employees create new knowledge and expertise, which can
then be shared by other people in the organisation to create further commercial
opportunities. Good examples include firms of lawyers, accountants and
management consultants.

KMS are built around systems which allow efficient categorisation and
distribution of knowledge. For example, the knowledge itself might be contained
in word processing documents, spreadsheets, PowerPoint presentations. internet
pages etc. To share the knowledge, a KMS would use group collaboration
systems, such as an intranet.

There are two broad types of knowledge: Explicit and Tacit.

9
Explicit Knowledge: Explicit knowledge is that which can be formalised easily
and as consequence is easily available across the organisation. For example:
Online tutorials, Policy and procedure manuals etc.

Tacit Knowledge: Tacit knowledge, on the on the other hand, resides in a few
often-in just one person and hasn't been captured by the organisation or made
available to others.For example: hand-on skill, special know-how, employee
experiences etc.

3) Executive support systems (ESS)


Designed to help senior management make strategic decisions. An ESS gathers,
analyses and summarises the key internal and external information used in the
business. ESS typically involve lots of data analysis and modelling tools, such as
"what-if" analysis, to help strategic decision-making
A good way to think about an ESS is to imagine the senior management team in
an aircraft cockpit, with the instrument panel showing them the status of all the
key business activities.

4) Decision Support Systems (DSS)


Specifically designed to help management make decisions in situations where
there is uncertainty about the outcomes of those decisions
DSS use tools and techniques to help gather relevant information and analyse
the options and alternatives. DSS often involves use of complex spreadsheet and
databases to create “what-if ” models

5) Management Information Systems (MIS)


Primarily concerned with internal sources of information. MIS usually take data
from the Transaction Processing Systems and summarise it into a series of
management reports.
MIS reports tend to be used by middle management and operational supervisors.

6) Office Automation Systems (OAS)


Try to improve the productivity of employees who need to process data and
information Perhaps the best example is the wide range of software systems that
exist to improve the productivity of employees working in an office (for example,
Microsoft Office XP), or sys that allow employees to work from home or while on
the move.

7) Transaction Processing Systems (TPS)


A Transaction Processing System (TPS) may be defined a type of information
system that collects, stores, modifies and retrieves the day-to-day data
transactions of an enterprise. Typical examples of such systems would be used
in an Airline Reservation Systems, Railway Reservation by IRCT, Banking

10
System or the Accounting System of roughly any outsized company: TPS
systems are designed to process transactions virtually instantly to ensure that
customer data is available to the processes that require it.
TPS is designed to process routine transactions efficiently and accurately.
A business will have several TPS; for example:
● Billing systems to send invoices to customers
● Systems to calculate the weekly and monthly payroll and tax payments
● Production and purchasing systems to calculate raw material
requirements.
● Stock control systems to process all movements into, within and out of
the business

8) Classification of DSS.(SN) 33
Ans: A decision support system (DSS) can be defined as a system that provides tools to
managers to assist them in solving semi-structured and unstructured problems in their
own, somewhat in personalised way. Often, some type of modelling environment
perhaps a very simple environment such as the one accompanying a spreadsheet
package is involved. A DSS is not intended to make decisions for managers but rather to
provide managers with a set of capabilities that enable them to generate the information
required by them in making decisions. In other words, a DSS supports the human
decision-making process rather than providing a means to replace it.

● Text Oriented DSS: It contains textually represented information that could have
a bearing on decision. It allows documents to be electronically created, revised
and viewed as needed.
● Database Oriented DSS: Database plays a major role here; it contains
organised and highly structured data.
● Spreadsheet Oriented DSS: It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to
execute self-contained instructions. The most popular tool is Excel and Lotus 1-
2-3.
● Solver Oriented DSS: It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
● Rules Oriented DSS: It follows certain procedures adopted as rules.
● Compound DSS: It is built by using two or more of the five structures explained
above.

9) Explain the features of ECRM. 60


Ans: E-CRM, or Electronic Customer Relationship Management, is an integrated online
sales, marketing and service strategy that is used to identify, attract and retain an
organisation's customers. It describes improved and increased communication between
an organisation and its clients by creating and enhancing customer interaction through

11
innovative technology. E-CRM software provides profiles and histories of each
interaction the organisation has with its customers, making it an important tool for all
small and medium businesses..

E-CRM software systems may contain a selection of the following features:

1. Customer Management: eCRM systems provide a centralized database for storing


and managing customer information, including contact details, purchase history,
preferences, and interactions across various channels. This allows businesses to
maintain a comprehensive view of their customers and deliver personalized experiences.

2. Knowledge Management: eCRM systems include knowledge management features


that enable businesses to capture, organize, and share information and resources
internally. This may include product information, FAQs, troubleshooting guides, and best
practices, which can be accessed by employees to provide timely and accurate support
to customers.

3. Account Management: eCRM systems offer account management capabilities for


managing relationships with key accounts, clients, or business partners. Users can track
account activities, interactions, and communication history to ensure effective account
servicing and relationship building.

4. Case Management: eCRM systems facilitate case management by allowing


businesses to track and resolve customer inquiries, issues, and requests in a timely and
efficient manner. Users can create cases, assign them to relevant teams or individuals,
track case status and progress, and communicate with customers throughout the
resolution process.

5. Back End Management: eCRM systems include back-end management features that
enable administrators to configure and customize the system according to business
needs. This may include user management, security settings, data integration, workflow
automation, and system maintenance.

6. Reporting and Analysis: eCRM systems offer robust reporting and analysis
capabilities that allow businesses to track key performance indicators (KPIs), measure
the effectiveness of customer interactions, and gain insights into customer behavior and
trends. Users can generate custom reports, visualize data through dashboards and
charts, and make data-driven decisions to improve business outcomes.

Overall, eCRM systems help businesses streamline customer interactions,


enhance customer satisfaction and loyalty, and drive business growth by
leveraging technology to effectively manage customer relationships across
multiple channels and touchpoints.

12
10) Explain Key capability of CRM with diagram. 66
Ans: Various capabilities of CRM software are; it can organise contacts, manage deals
and tasks, automate workflows, track leads in sales cycle, run and measure campaigns,
and generate reports in one platform. CRM software also aligns the workflows and data
of various departments, mainly sales, marketing, and support, and promotes
collaboration among teams.

These are some of the key capabilities of CRM systems:

1. Contact Management: CRM systems provide a centralized database for storing and
managing customer contact information, including names, addresses, phone numbers,
email addresses, and other relevant details. This allows businesses to maintain a
comprehensive view of their customer base and easily access contact details when
needed.

2. Reporting and Dashboard: CRM systems offer reporting and dashboard features
that allow users to track and analyze key metrics and performance indicators related to
sales, marketing, and customer service. Users can generate custom reports, visualize
data through charts and graphs, and gain insights into trends and patterns.

3. Lead Management: CRM systems enable businesses to capture, track, and manage
leads throughout the sales pipeline. Users can record lead information, qualify leads
based on predefined criteria, assign leads to sales representatives, and track lead status
and progress.

4. Deal and Tasks Management: CRM systems facilitate deal and task management by
allowing users to create and track sales opportunities, deals, and tasks. Users can set
reminders, schedule follow-up activities, and monitor the progress of deals and tasks
through various stages of the sales process.

5. Campaign Management: CRM systems include features for managing marketing


campaigns, such as email campaigns, social media campaigns, and advertising
campaigns. Users can create, launch, and track campaigns, segment target audiences,
and measure campaign performance.

6. Email Tracking: CRM systems provide email tracking capabilities that allow users to
track email interactions with customers and prospects. Users can monitor email opens,
clicks, responses, and other engagement metrics to assess the effectiveness of email
communications.

7. Social Media Management: Some CRM systems offer integration with social media
platforms, enabling users to monitor social media interactions, engage with customers
and prospects, and track social media mentions and conversations. This helps
businesses stay connected and responsive on social media channels.

13
8. Mobile Version: Many CRM systems offer mobile applications or mobile-friendly web
interfaces that allow users to access CRM data and functionality from smartphones and
tablets. This enables users to stay productive and responsive while on the go, whether
they are in the office, on the road, or working remotely.

Overall, these capabilities help businesses streamline customer interactions,


improve sales and marketing effectiveness, and enhance overall customer
relationship management.

11) Explain Customer life cycle with diagram.(7M) 67


Ans: Customer life cycle is a term used to describe the progression of steps a customer
goes through when considering, purchasing, using, and maintaining loyalty to a product
or service. The customer life cycle into seven distinct steps: Awareness, Engagement,
Consideration, Conversion, Retention and Advocacy.

1. Awareness: This is the stage where potential customers become aware of a business,
its products, or its services. It can happen through various channels such as
advertisements, social media, word of mouth, or search engines. The goal during this
stage is to grab the attention of potential customers and make them aware of what the
business has to offer.

2. Engagement: Once potential customers are aware of the business, the next stage is
engagement. This involves interacting with customers through various touchpoints such
as social media, email newsletters, website content, or events. The goal is to build a
relationship with customers and keep them engaged with the brand.

14
3. Consideration: In the consideration stage, potential customers are actively evaluating
the business's offerings and comparing them to alternatives. They may research product
features, read reviews, or seek recommendations from friends or online communities.
The goal is to provide valuable information and address any concerns or questions
potential customers may have to help them make a decision.

4. Conversion: The conversion stage occurs when potential customers make a purchase
or take a desired action, such as signing up for a free trial, requesting a quote, or
subscribing to a service. The goal is to turn potential customers into paying customers or
leads that can be further nurtured.

5. Retention: After customers have made a purchase or taken a desired action, the focus
shifts to retention. This involves providing excellent customer service, delivering on
promises, and ensuring a positive experience throughout the customer journey. The goal
is to keep customers satisfied, engaged, and coming back for repeat business.

6. Advocacy: The advocacy stage occurs when satisfied customers become advocates
for the business, recommending it to others and promoting its products or services
through word of mouth, reviews, testimonials, or social media. The goal is to turn
customers into brand ambassadors who help attract new customers and build credibility
for the business.

By understanding and effectively managing each stage of the customer lifecycle,


businesses can attract, convert, retain, and delight customers, ultimately driving long-
term success and growth.

12) Application of data mining in CRM. (8M). 71


Ans: Data mining is the process of finding useful patterns and relationships in large
volumes of data. Data mining and customer relationship management are the two
common functions used by the organisation to focus on the customers. Using CRM it is
easier to select the right customers from a large set of potential customers. Data mining
can help the organisations to offer the most appealing products to the existing customers
or identify customers by which the organisation is at risk of losing.

Applications of Data Mining in CRM

1. Basket Analysis: Data mining techniques such as association rule mining are used
to analyze transactional data and identify patterns in customer purchasing behavior. This
helps businesses understand which products are frequently purchased together,
enabling them to optimize product placement, promotions, and cross-selling strategies.

2. Sales Forecasting: Data mining models can analyze historical sales data, market
trends, and other relevant factors to predict future sales volumes. This helps businesses

15
make informed decisions about inventory management, resource allocation, and
strategic planning.

3. Database marketing: Retailers can design profiles of customers based on their


demographics, tastes, preferences, buying behaviour etc. It will also aid the marketing
team in designing personalised marketing campaigns and promotion offers.
This will result in enhanced productivity, optimal allocation of company's resources and
bring the desired ROL.

4. Predictive life-cycle management: Data mining models can predict the likelihood of
customers churning or leaving the business based on their behavior and interaction
history. This enables businesses to implement proactive retention strategies and
interventions to prevent customer attrition.

5. Customer segmentation: Learn which customers are interested in purchasing your


products and design your marketing campaigns and promotions keeping their tastes and
preferences in mind. This will increase the efficiency and result in the desired ROI since
you won't be targeting customers who show little to no interest in your product.

6. Product Customisation: Data mining is used to analyze customer preferences and


feedback to customize products or services according to individual needs and
preferences. This enables businesses to offer personalized experiences that enhance
customer satisfaction and loyalty.

7. Fraud detection: Data mining models can analyze transactional data and detect
patterns indicative of fraudulent activity, such as unusual spending patterns or
suspicious behavior. This helps businesses identify and prevent fraudulent transactions,
reducing financial losses and protecting customer trust.

8. Warranties: Data mining techniques can analyze warranty claims data to identify
patterns and trends related to product defects or failures. This helps businesses improve
product quality, identify potential warranty issues early, and optimize warranty
management processes to reduce costs and enhance customer satisfaction.

13) Explain types of database.


Ans: A database is a structured collection of data organized in a way that facilitates
efficient storage, retrieval, and manipulation of information. It acts as a centralized
repository for storing various types of data, ranging from text and numbers to images,
videos, and more complex data types.

Databases are designed to handle large volumes of data and provide mechanisms for
accessing, querying, updating, and managing the stored information. They typically
consist of tables, records, and fields, where each table represents a specific entity or

16
concept, each record represents an individual instance of that entity, and each field
represents a piece of information about the entity.

1. Centralized Database:
- A centralized database is a single database system located in one physical or logical
location, managed and controlled by a single entity or organization.
- It stores all data in one central repository, making it easy to manage and administer.
- However, it is susceptible to single points of failure and may pose challenges in terms
of scalability and accessibility, especially in distributed or geographically dispersed
environments.

2. Distributed Database:
- A distributed database is spread across multiple locations or nodes, with each node
containing a subset of the data.
- It offers advantages such as improved scalability, fault tolerance, and performance by
distributing data and workload across multiple nodes.
- Distributed databases require sophisticated data distribution and synchronization
mechanisms to ensure data consistency and integrity across the network.
● Homogeneous DDB: Those database systems which execute on the same
operating system and use the same application process and carry the same
hardware devices.
● Heterogeneous DDB: Those database systems which execute on different
operating systems under different application procedures, and carries different
hardware devices.

3. Relational Database:
- Relational databases organize data into tables with rows and columns, where each
row represents a record and each column represents an attribute or field.
- They use structured query language (SQL) for querying, updating, and managing
data, adhering to the principles of relational algebra and relational calculus.
- Relational databases are widely used in various applications and industries due to
their simplicity, flexibility, and strong support for data integrity and consistency.

4. NoSQL Database:
- NoSQL (Not Only SQL) databases are designed to handle large volumes of
unstructured or semi-structured data, which may not fit well into the rigid structure of
relational databases.
- They offer flexible schemas, scalability, and high performance for distributed and big
data environments, making them suitable for applications such as web analytics, content
management, and real-time data processing.
- NoSQL databases come in various types, including document stores, key-value
stores, column-family stores, and graph databases, each optimized for different use
cases and data models.

17
5. Cloud Database:
- A cloud database is hosted and managed by a cloud service provider, accessible
over the internet from anywhere with an internet connection.
- It offers scalability, flexibility, and cost-effectiveness by providing on-demand
resources and pay-as-you-go pricing models.
- Cloud databases eliminate the need for on-premises infrastructure and maintenance,
allowing businesses to focus on their core activities while leveraging the benefits of
cloud computing.

6. Object-oriented Databases:
- Object-oriented databases store data as objects, encapsulating both data and
methods (functions) that operate on the data.
- They are well-suited for applications with complex data structures and relationships,
such as object-oriented programming languages and software systems.
- Object-oriented databases offer advantages such as inheritance, polymorphism, and
encapsulation, enabling developers to model real-world entities and relationships more
naturally.

7. Hierarchical Databases:
- Hierarchical databases organize data in a tree-like structure, with parent-child
relationships between data elements.
- They are commonly used in legacy systems and applications with a strict hierarchy of
data, such as file systems, directory structures, and organizational charts.
- Hierarchical databases are efficient for representing data with one-to-many
relationships and navigating hierarchical structures.

8. Network Databases:
- Network databases extend the hierarchical model by allowing multiple parent-child
relationships between data elements, forming a more complex network or graph-like
structure.
- They are suitable for representing complex relationships in data, such as in
engineering or scientific applications where entities have multiple connections or
associations.
- Network databases offer greater flexibility and expressiveness than hierarchical
databases but may require more sophisticated data modeling and querying techniques.

9. Personal Database:
- A personal database is used by individuals to store and manage personal
information, such as contacts, calendars, notes, and personal finance data.
- They are typically lightweight, user-friendly, and designed for personal productivity
and organization, offering features such as data entry forms, search capabilities, and
customizable views.

18
- Personal databases may be implemented using desktop software, web applications,
or mobile apps, providing users with access to their data across different devices and
platforms.

10. Operational Database:


- An operational database is optimized for transactional processing and day-to-day
operations of an organization, such as adding, modifying, and deleting data in real-time.
- It supports tasks such as order processing, inventory management, customer
support, and financial transactions, ensuring data integrity, consistency, and
concurrency control.
- Operational databases are typically characterized by high availability, low latency,
and high throughput, supporting mission-critical applications and business processes.

11. Enterprise Database:


- An enterprise database is a comprehensive database system used by large
organizations to store and manage various types of data across different departments
and functions.
- It serves as a centralized repository for critical business data, supporting enterprise-
wide applications such as customer relationship management (CRM), enterprise
resource planning (ERP), supply chain management (SCM), and business intelligence
(BI).
- Enterprise databases provide features such as data integration, data warehousing,
data governance, and security, enabling organizations to streamline operations, improve
decision-making,

14) Types of SQL/database command. (SN)


Ans: Structured Query Language (SQL), as we all know, is the database language by
the use of which we can perform certain operations on the existing database, and also
we can use this language to create a database. SQL uses certain commands like
CREATE, DROP, INSERT, etc. to carry out the required tasks.
1. Data Definition Language (DDL)
• DDL changes the structure of the table like creating a table, deleting a table, altering a
table, etc.
• All the command of DDL are auto-committed that means it permanently save all the
changes in the
database.
• Here are some commands that come under DDL:
• CREATE
• ALTER
• DROP
• TRUNCATE
a. CREATE: It is used to create a new table in the database.

19
b. DROP: DROP command is used to remove the whole database or table indexes,
data, and more.
c. ALTER: It is used to alter the structure of the database. This change could be either
to modify the characteristics of an existing attribute or probably to add a new attribute.
d. TRUNCATE: TRUNCATE command is used to remove all the rows from the table.

2. Data Manipulation Language


DML commands are used to modify the database. It is responsible for all form of
changes in the
database.
The command of DML is not auto-committed that means it can't permanently save all the
changes in the database. They can be rollback.
• Here are some commands that come under DML:
INSERT
UPDATE
DELETE
a. INSERT: The INSERT statement is a SQL query. It is used to insert data into the row
of a table.
b. UPDATE: This command is used to update or modify the value of a column in the
table.
c. DELETE: It is used to remove one or more row from a table.

3. Data Control Language


DCL commands are used to grant and take back authority from any database user.
Here are some commands that come under DCL:
Grant
Revoke
a. Grant: It is used to give user access privileges to a database.
b. Revoke: It is used to take back permissions from the user.

4. Transaction Control Language


• TCL commands can only use with DML commands like INSERT, DELETE and
UPDATE only.
• These operations are automatically committed in the database that's why they cannot
be used while
creating tables or dropping them.
• Here are some commands that come under TCL:
• COMMIT
• ROLLBACK
• SAVEPOINT
a. Commit: Commit command is used to save all the transactions to the database.
b. Rollback: Rollback command is used to undo transactions that have not already been
saved to the database.

20
c. SAVEPOINT: It is used to roll the transaction back to a certain point without rolling
back the entire transaction.

5. Data Query Language


• DQL is used to fetch the data from the database.
•It uses only one command:
SELECT
a. SELECT: This is the same as the projection operation of relational algebra. It is used
to select the attribute based on the condition described by WHERE clause.

15) Types of database keys. 99


Ans: Keys play an important role in the relational database. It is used to uniquely identify
any record or row of data from the table. It is also used to establish and identify
relationships between tables.
• For example, ID is used as a key in the Student table because it is unique for each
student. In the PERSON table, passport_number, license_number, SSN are keys since
they are unique for each person.

1) Primary Key :
The primary key is like a special ID assigned to each row (tuples) in a table. It
uniquely identifies each record, ensuring that no two rows have the same
identifier.
For example, in a table of employee,, the primary key could be a Employee ID
number. This ensures that each student record is distinct and identifiable.

2) Candidate key

21
A candidate key is an attribute or set of attributes that can uniquely identify a
tuple. Except for the primary key, the remaining attributes are considered a
candidate key. The candidate keys are as strong as the primary key.
For example: In the EMPLOYEE table, id is best suited for the primary key. The
rest of the attributes, like SSN, Passport_Number, License_Number, etc., are
considered a candidate key.

3) Super Key
A super key in the context of databases refers to a set of attributes (or columns)
within a table that collectively uniquely identify each record (or row) in that table.
It represents a broader concept than other types of keys, such as candidate keys
and primary keys, as it includes all possible combinations of attributes that
ensure uniqueness.
In a table of employees, a super key could be a combination of attributes like
Employee ID, First Name, and Last Name. Each unique combination of these
attributes uniquely identifies an employee record in the table

4) Foreign key:
A foreign key is like a special link between two tables in a database. It helps
connect information from one table to another. Imagine you have two lists—one
for students and another for courses. A foreign key in the courses list could point
back to a specific student in the students list, showing which student is enrolled
in each course.
Example:

22
Every employee works in a specific department in a company, and employee and
department are two different entities. So we can't store the department's
information in the employee table.
That's why we link these two tables through the primary key of one table.
We add the primary key of the DEPARTMENT table, Department_Id, as a new
attribute in the EMPLOYEE table. In the EMPLOYEE table, Department_Id is the
foreign key, and both the tables are related.

5) Alternate Key:
Out of all candidate keys, only one gets selected as primary key, remaining keys
are known as alternate or secondary keys
In simple words you can say that Candidate keys minus Primary Key are called
as Alternate Keys.
Example:

There are three candidate keys in above table: {Emp_No}, {PanCard_No},


{Aadhar_No}. Since database designer has selected (Emp_No) as primary key,
the remaining candidate keys (PanCard_No) and (Aadhar_No) would be called
alternative or secondary key.

6) Composite key:
A composite key, also known as a composite primary key, is a combination of
two or more columns in a database table that together uniquely identify each
record in the table. Unlike a single primary key, which consists of a single
column, a composite key requires multiple columns to ensure uniqueness.

For example, in employee relations, we assume that an employee may be


assigned multiple roles, and an employee may work on multiple projects
simultaneously. So the primary key will be composed of all three attributes,
namely Emp_ID, Emp_role, and Proj_ID in combination. So these attributes act
as a composite key since the primary key comprises more than one attribute.

23
16) Data warehouse architecture with diagram. 110
Ans: A Data Warehouse (DW) is a relational database that is designed for query and
analysis rather than transaction processing. It includes historical data derived from
transaction data from single and multiple sources. A Data Warehouse provides
integrated, enterprise-wide, historical data and focuses on providing support for
decision-makers for data modeling and analysis. A Data Warehouse is a group of data
specific to the entire organization, not only to particular group of users. It is not used for
daily operations and transaction processing but used for making decisions.

● External Sources –
External source is a source from where data is collected irrespective of the type
of data. Data can be structured, semi structured and unstructured as well.

● Stage Area –
Since the data, extracted from the external sources does not follow a particular
format, so there is a need to validate this data to load into datawarehouse. For
this purpose, it is recommended to use ETL tool.
○ E(Extracted): Data is extracted from External data source.
○ T(Transform): Data is transformed into the standard format.
○ L(Load): Data is loaded into data warehouse after transforming it into the
standard format.

● Data-warehouse –
The datawarehouse as central repository. It actually stores the meta data and the
actual data gets stored in the data marts. Note that datawarehouse stores the
data in its purest form in this top-down approach.

● Data Marts –
Data mart is also a part of storage component. It stores the information of a
particular function of an organisation which is handled by single authority. There
can be as many number of data marts in an organisation depending upon the
functions. We can also say that data mart contains subset of the data stored in
datawarehouse.

● Data Mining –
Data mining is the process of discovering patterns, trends, correlations, and
insights from large datasets using various techniques from statistics, machine
learning, and artificial intelligence. It involves extracting valuable knowledge and
actionable information from raw data to support decision-making and solve
complex problems.

There are 2 approaches for constructing data-warehouse:

24
1. Top-down approach:

● Data Collection: Aggregation of various data types, including structured,


semi-structured, and unstructured data.
● Staging Area: Extraction, transformation, and loading processes occur
within this intermediary stage.
● Data Cleansing: Removal of inconsistencies and standardization of data
before storage in the data warehouse.
● Data Warehouse: Central repository storing both metadata and actual
data, serving as a foundation for data analysis.
● Data Marts: Specialized subsets of data tailored to specific functional
areas within the organization.
● Data Mining: Utilization of statistical, machine learning, and artificial
intelligence techniques to extract patterns and insights from large
datasets.

2. Bottom-up approach:

● First, the data is extracted from external sources (same as happens in top-down
approach).
● Then, the data go through the staging area (as explained above) and loaded into
data marts instead of datawarehouse. The data marts are created first and
provide reporting capability. It addresses a single business area.
● These data marts are then integrated into datawarehouse.

25
17) Data Mining technique. 115
Ans:
Data mining is the process of discovering patterns, trends, correlations, and insights
from large datasets using various techniques from statistics, machine learning, and
artificial intelligence. It involves extracting valuable knowledge and actionable
information from raw data to support decision-making and solve complex problems.

Data Mining Technique


● Classification: Classification is a supervised learning technique used to categorize
data into predefined classes or categories based on input features. Popular classification
algorithms include Decision Trees, Random Forests, Naive Bayes, Support Vector
Machines (SVM), and Neural Networks.

● Regression Analysis: Regression analysis is used to predict a continuous numerical


value based on input features. It identifies relationships between variables and estimates
the value of the dependent variable. Linear Regression, Polynomial Regression, and
Logistic Regression are common regression techniques.

● Clustering: Clustering is an unsupervised learning technique used to group similar


data points together based on their characteristics or attributes. Clustering algorithms
aim to partition the data into clusters such that data points within the same cluster are
more similar to each other than to those in other clusters. K-Means, Hierarchical
Clustering, and DBSCAN are popular clustering algorithms.

● Association Rule Mining: Association rule mining is used to discover interesting


relationships or associations between variables in large datasets. It identifies frequent
patterns, correlations, or co-occurrences among items in transactional databases. The
Apriori algorithm is a well-known technique for association rule mining.

● Anomaly Detection: Anomaly detection, also known as outlier detection, is used to


identify unusual or abnormal data points that deviate from normal behavior within a
dataset. Anomalies may indicate potential fraud, errors, or novel insights. Techniques for
anomaly detection include Statistical Methods, Density-Based Methods, and Machine
Learning-based Methods (e.g., Isolation Forest, One-Class SVM).

● Dimensionality Reduction: Dimensionality reduction techniques are used to reduce


the number of features or variables in a dataset while preserving the most important
information. This helps in simplifying data analysis, improving model performance, and
visualizing high-dimensional data. Principal Component Analysis (PCA) and t-Distributed
Stochastic Neighbor Embedding (t-SNE) are commonly used dimensionality reduction
techniques.

● Text Mining: Text mining techniques are used to extract valuable insights and
patterns from unstructured textual data. This includes tasks such as sentiment analysis,

26
topic modeling, document clustering, and named entity recognition. Natural Language
Processing (NLP) techniques, including Bag-of-Words, Term Frequency-Inverse
Document Frequency (TF-IDF), and Word Embeddings (e.g., Word2Vec, GloVe), are
commonly used in text mining.

18) Explain types of BPO. 126


Ans: Business Process Outsourcing (BPO) is a subset of outsourcing that involves the
contracting of the operations and responsibilities of specific business functions (or
processes) to a third-party service provider. The most common examples of BPO are
call centres, human resources, accounting and payroll outsourcing. Normally, BPO is
undertaken by developed firms. For example: Coca Cola, where almost the total supply
chain is outsourced and the company is essentially becoming a marketing organisation.

Types of BPO
1. Onshore BPO: Onshore BPO refers to outsourcing services to a third-party
provider located within the same country as the client organization. This type of
outsourcing is often chosen for processes that do not require significant cost
savings but benefit from access to specialized skills or resources.

2. Offshore BPO: Offshore BPO involves outsourcing services to a third-party


provider located in a different country, typically one with lower labor costs.
Offshore outsourcing is often chosen to achieve significant cost savings while
accessing a large talent pool and 24/7 service availability.

3. Nearshore BPO: Nearshore BPO is a variation of offshore outsourcing where


services are outsourced to a third-party provider located in a nearby country or
region. This type of outsourcing offers advantages such as cultural proximity,
time zone alignment, and easier communication and collaboration.

4. Back-Office BPO: Back-office BPO involves outsourcing internal administrative


and operational processes such as finance and accounting, human resources,
data entry, and procurement. These processes are essential for the smooth
functioning of the organization but are not directly related to customer-facing
activities.

5. Front-Office BPO: Front-office BPO, also known as customer-facing


outsourcing, involves outsourcing customer-centric processes such as call center
services, technical support, sales, and marketing. These processes directly
impact customer experience and are critical for customer acquisition, retention,
and satisfaction.

6. Knowledge Process Outsourcing (KPO): Knowledge Process Outsourcing


(KPO) involves outsourcing high-value, knowledge-based processes that require

27
specialized domain expertise, analytical skills, and advanced technical
knowledge. KPO services may include research and analytics, market research,
intellectual property research, and legal services.

7. Multifunctional BPO: Multifunctional BPO involves outsourcing multiple


business processes to a single service provider. Instead of outsourcing individual
processes separately, organizations opt for comprehensive BPO solutions that
cover a wide range of functions, such as finance and accounting, HR, IT support,
and customer service.

19) Explain the cloud computing services Model. 148


Ans: Cloud computing services refer to a range of computing resources and services
delivered over the internet by cloud service providers. These services allow users to
access and use computing resources such as servers, storage, databases, networking,
software, and applications without the need for extensive infrastructure investment or
maintenance.

1.Infrastructure as a Service (IaaS):


Infrastructure as a Service (IaaS) provides virtualized computing resources over the
internet. Users can access and provision infrastructure components such as virtual
machines, storage, and networking resources. With IaaS, users have control over the
operating systems, applications, and middleware running on the infrastructure.
Examples of IaaS providers include Amazon Web Services (AWS) EC2,
Microsoft Azure Virtual Machines, Google Compute Engine (GCE), and
IBM Cloud Virtual Servers.

2. Platform as a Service (PaaS):


Platform as a Service (PaaS) offers a platform for building, deploying, and managing
applications over the internet. PaaS providers offer development tools, runtime
environments, databases, middleware, and other services to support application
development and deployment. Users can focus on developing and deploying
applications without the need to manage underlying infrastructure.
Examples of PaaS offerings include AWS Elastic Beanstalk, Microsoft
Azure App Service, Google App Engine, and Heroku.

3. Software as a Service (SaaS):


Software as a Service (SaaS) delivers software applications over the internet on a
subscription basis. SaaS providers host and manage software applications in the cloud,
making them accessible to users via web browsers or APIs. Users can access and use
applications without needing to install or maintain software locally.
Examples of SaaS applications include Salesforce CRM, Microsoft
Office 365, Google Workspace (formerly G Suite), Dropbox, and
Slack.

28
4. Desktop as a Service (DaaS)
Desktop as a Service (DaaS) is a cloud computing service model that delivers virtual
desktop infrastructure (VDI) to users over the internet. Instead of managing traditional
physical desktop computers, organizations can access virtual desktops hosted in the
cloud from any device with an internet connection.

20) Explain the characteristics of KPO (SN)


Ans: KPO stands for Knowledge Process Outsourcing. It refers to the outsourcing of
high-level, knowledge-based business processes or tasks that require specialized
expertise, advanced analytical skills, and domain knowledge to third-party service
providers.

Characteristics of KPO:
1. High-Value Processes: KPO involves outsourcing processes that are critical to
business success and involve high intellectual value. These processes often
require advanced problem-solving skills, research capabilities, and analytical
expertise.

2. Specialized Knowledge and Expertise: KPO tasks require specialized domain


knowledge, industry expertise, and advanced skills in areas such as research,
analysis, consulting, and decision-making. Service providers often employ
professionals with advanced degrees or specialized certifications to deliver KPO
services.

3. Complex Analysis and Decision Support: KPO services may involve complex
data analysis, research, market intelligence, financial analysis, risk assessment,
strategic planning, and decision support. These tasks require a deep
understanding of the subject matter and the ability to derive actionable insights
from data and information.

4. Value-Added Services: KPO providers deliver value-added services that go


beyond basic data processing or transactional tasks. They offer strategic
insights, actionable recommendations, and expert advice to help clients make
informed decisions and drive business growth.

5. Global Delivery Model: KPO services are often delivered through a global
delivery model, leveraging a combination of onshore, nearshore, and offshore
resources to access specialized talent pools, reduce costs, and provide round-
the-clock support to clients worldwide.

21) Explain types of cloud computing services. 150

29
Ans: Cloud computing services refer to a range of computing resources and services
delivered over the internet by cloud service providers. These services allow users to
access and use computing resources such as servers, storage, databases, networking,
software, and applications without the need for extensive infrastructure investment or
maintenance.

1) Public Cloud
Public clouds are managed by third parties which provide cloud services over the
internet to the public, these services are available as pay-as-you-go billing models. They
offer solutions for minimizing IT infrastructure costs and become a good option for
handling peak loads on the local infrastructure. Public clouds are the go-to option for
small enterprises, which can start their businesses without large upfront investments by
completely relying on public infrastructure for their IT needs.A public cloud is meant to
serve multiple users, not a single customer. A user requires a virtual computing
environment that is separated, and most likely isolated, from other users.

Advantages of using a Public cloud are:


1. High Scalability
2. Cost Reduction
3. Reliability and flexibility
4. Disaster Recovery
Disadvantages of using a Public cloud are:
1. Loss of control over data
2. Data security and privacy
3. Limited Visibility
4. Unpredictable cost

2) Private cloud
Private clouds are distributed systems that work on private infrastructure and.provide the
users with dynamic provisioning of computing resources.Instead of a pay-as-you-go
model in private clouds, there could be other schemes that manage the usage of the
cloud and proportionally billing of the different departments or sections of an enterprise.
Private cloud providers are HP Data Centers, Ubuntu, Elastic-Private cloud, Microsoft,
etc.

30
Advantages of using a private cloud are as follows:
1) Customer information protection: In the private cloud security concerns are
less since customer data and other sensitive information do not flow out of
private infrastructure.
2) Infrastructure ensuring SLAs: Private cloud provides specific operations such
as appropriate clustering, data replication, system monitoring, and maintenance,
disaster recovery, and other uptime services.
3) Compliance with standard procedures and operations: Specific procedures
have to be put in place when deploying and executing applications according to
third-party compliance standards. This is not possible in the case of the public
cloud.
Disadvantages of using a private cloud are:
1) The restricted area of operations: Private cloud is accessible within a particular
area. So the area of accessibility is restricted.
2) Expertise requires: In the private cloud security concerns are less since
customer data and other sensitive information do not flow out of private
infrastructure. Hence skilled people are required to manage & operate cloud
services

3) Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also called
heterogeneous clouds. A major drawback of private deployments is the inability to scale
on-demand and efficiently address peak loads. Here public clouds are needed. Hence, a
hybrid cloud takes advantage of both public and private clouds.

31
Advantages of using a Hybrid cloud are:
1) Cost: Available at a cheap cost than other clouds because it is formed by a
distributed system.
2) Speed: It is efficiently fast with lower cost, It reduces the latency of the data
transfer process.
3) Security: Most important thing is security. A hybrid cloud is totally safe and
secure because it works on the distributed system network.
Disadvantages of using a Hybrid cloud are:
1) It’s possible that businesses lack the internal knowledge necessary to create
such a hybrid environment. Managing security may also be more challenging.
Different access levels and security considerations may apply in each
environment.
2) Managing a hybrid cloud may be more difficult. With all of the alternatives and
choices available today, not to mention the new PaaS components and
technologies that will be released every day going forward, public cloud and
migration to public cloud are already complicated enough. It could just feel like a
step too far to include hybrid.

4 ) Community cloud:
Community clouds are distributed systems created by integrating the services of
different clouds to address the specific needs of an industry, a community, or a business
sector. But sharing responsibilities among the organizations is difficult. In the community
cloud, the infrastructure is shared between organizations that have shared concerns or

32
tasks. An organization or a third party may manage the cloud.

Advantages of using Community cloud are:


1. Because the entire cloud is shared by numerous enterprises or acommunity,
community clouds are cost-effective.
2. Because it works with every user, the community cloud is adaptable and
scalable. Users can alter the documents according to their needs and
requirements.
3. Public cloud is less secure than the community cloud, which is more secure than
private cloud.
Disadvantages of using Community cloud are:
1. Not all businesses should choose community cloud.
2. It’s challenging for corporations to share duties.

22) Components of ESCM. (8/7). 77


Ans:
E-Supply Chain Management (E-SCM) is the use of digital technologies to optimize and
manage the various activities involved in a supply chain. This includes everything from
sourcing raw materials to delivering finished products to customers.
E-SCM utilizes electronic communication and data sharing between different supply
chain partners, such as suppliers, manufacturers, distributors, and retailers. By
leveraging digital technologies such as cloud computing, big data analytics, and the
internet of things (IoT), E-SCM enables real-time visibility and collaboration across the
supply chain, improving efficiency, reducing costs, and increasing customer satisfaction.
Electronic Procurement (e-Procurement): This involves the use of digital platforms for
purchasing goods and services, including online catalogs, electronic purchase orders,
and automated approval workflows.

Components of eSCM
1. Supply Chain Planning Tools: These tools utilize data analytics and forecasting
algorithms to optimize inventory levels, production schedules, and distribution

33
networks. They help in demand forecasting, production planning, and inventory
optimization.

2. Electronic Data Interchange (EDI): EDI facilitates the electronic exchange of


business documents, such as purchase orders, invoices, and shipping notices,
between trading partners. It standardizes the format of these documents for
seamless communication.

3. Inventory Management Systems: These systems track inventory levels in real-


time, enabling better inventory control, reduction of stockouts, and optimization of
reorder points. RFID(Radio Frequency Identification) and barcode technology
often play a role in these systems.

4. Warehouse Management Systems (WMS): WMS software automates and


optimizes warehouse operations, including inventory tracking, order
picking,packing, and shipping. It improves efficiency and accuracy in warehouse
management.

5. Transportation Management Systems (TMS): TMS solutions optimize the


transportation of goods by selecting the most efficient routes, modes of
transportation, and carriers. They also provide visibility into shipment tracking
and delivery status.

6. Supplier Relationship Management (SRM): SRM systems help in managing


relationships with suppliers by providing tools for supplier performance
evaluation, collaboration, and risk management. They facilitate communication
and collaboration between buyers and suppliers.

7. Customer Relationship Management (CRM): CRM systems assist in managing


relationships with customers by capturing and analyzing customer data, enabling
personalized marketing, sales, and service activities. In the context of e-SCM,
CRM helps in understanding customer demand patterns and preferences.

8. Digital Platforms and Marketplaces: These platforms connect buyers and


sellers in a digital marketplace, enabling efficient procurement, sales, and
collaboration across the supply chain ecosystem. Examples include Alibaba,
Amazon Business, and Ariba Network.

9. Blockchain Technology: Blockchain can enhance transparency and traceability


in supply chains by securely recording transactions across multiple parties in a
tamper-proof ledger. It can be used for tracking the provenance of goods,
ensuring compliance with regulations, and mitigating risks such as counterfeiting
and fraud.

34
23) Application of DSS.
Ans:
1) Cost Accounting System :- The healthcare industry is well known for its cost
complexity.Managing cost in this industry requires controlling costs of supplies ,
expensive machinery technology and variety of personnel.Cost accounting applications
help healthcare organisations to calculate product cost for individual procedures or
services.DSS can accumulate these product costs to calculate total costs per patient.

2) Capital Budgeting System: - Computers require new tools to evaluate high-


technology investment decisions. One Decision Support System Designed to support
decisions about investments in automated manufacturing technology is Automan, which
allows decision makers to consider financial, non-financial, quantitative and qualitative
factors in their decision making process.

3) Clinical DSS:- A DSS used in medicine is called a clinical DSS.Clinical DSs have the
potential to change the way medicine has been taught and practiced.

4) Flood Management DSS:-Colorado state in US has used a DSS to provide


information about floods and potential hazards throughout the state. It includes real time
weather conditions, local and country data about floods as well historical data, floodplain
boundaries and much more.

5) Real Estate Investment Management DSS: Real estate investment companies


typically use DSS to manage the day to day running of their businesses. Information
about and from each property can be processed to give access to data across the
enterprise that allows for not just day to day running but also for future planning.

6) University Admission Management DSS :- Universities need to fill places every


year. Too few students and they lose money and may lose funding the following year.
There is the issue of predicting how many students will want to enroll in a particular
course. For taking such complex decisions Universities are using DSS.

7) Water Management DSS:- DSS have been used to forecast the demand for water in
particular areas. Using information about the local geography, Historical information
about water consumption in the area as well as prediction models, planners can predict
and plan for future consumption needs in the area. "Hydronumerics" has used DSS to
support its water management work in India.

Q2. Multiple choice


1. ______ knowledge is represent Spoken word, written material & complied data.
A. Tacit
B. explicit ✓

35
C.procedure
D. Implicit

2. _____ Reports are reports on Specific situations.


A. Periodic
B. Plan
C. Key indicator
D. Trigger ✓

3. _______ is a Computer program application uses to improve a computer's decision.


making capabilities
A. DSS ✓
B. MIS
C. EIS
D. TPS

4. ______ is the Co-ordination of information & resources involved in moving a product or


service from supplier to customer
A.CRM
B.HRM
C. ERP
D. SCM ✓

5. _____ is a DDL command.


A. Creates ✓
B. SQL
C. Insert
D. Commit

6. _____ is the framework that defines task performed at each step Software development
process
A. LL
B. SDLC ✓
C. PML
D. DML

7. _____ Database System executive on the Some OS.


A. Relational
B. Hetrogenous
C. Homogenous ✓
D. No SQL

8. ____ required specialize advance analytical Skills and domain knowledge


A. KPO ✓

36
B. IPO
C. BPO
D. MIS
9. _____ provides Virtualize computer system.
A. IAAS ✓
B. SAAS
C. TAAS
D. PAAS

10. _______ provide cloud service over the Internet to the public.
A.Private
B. Public ✓
C. Hybrid
D. Community

11. _____ knowledge is represented as intution, perspective, believe, value.


A. Tacit ✓
B. Explicit
C. Implicit
D. Procedural

Q3. True and False


1. DSS design to help the Senior manager to make strategic management. True
2. Triggered report are report on Specific situation. True
3. Insert is the DEL Decision Command. False
4. Super foreign Keys are column of table used to coined the primary key of the another
table. False
5. Database that store data in the form of parents child relationship notes. True
6. Clustering is the data mining technique. True
7. KPO involve Outsourcing of routine, repetitive task. False
8. DBMS is the system software for Creating and managing database. True
9. Data about data is called metadata. True
10. DAA Delivery Software application over the internet on subscription basis. False
(Desktop as provider)

Q4. Fill in the blanks


1. Key indicators report Summerised prionow days. Critical activities.
2. MIS refers to the data, equipment, and Computer programs that are used to develop info
for managerial use.
3. CRM is the process in which an organisation adminsters interact with customer.
4. Insert is the DML Command.
5. Heterogeneous database system execut on the different OS
6. BPO require good communication. and basic knowledge.

37
7. PAAS offers a platform for building deploying and managing application over the
internet.
8. Hybrid is the Hetrogenous distributed system form by combining facilities public cloud or
private cloud.
9. Select is DQL command.

38

You might also like