IT Sem - 4
IT Sem - 4
1) Objective of MIS.
Ans:
A Management Information System (MIS) is a computerized system that collects,
processes, stores, and disseminates information to support decision-making within an
organization. It involves the use of technology, software, and databases to gather and
analyze data, providing managers with timely and accurate information for planning,
organizing, and controlling business activities. MIS helps streamline processes, enhance
communication, and improve overall efficiency in an organization by facilitating the flow
of information across different levels and functions.
1
different customer demographics among other things. The report is presented in a
format that can be understood by the company's management.
For example, an inventory summary, which summarizes the cost of stocking inventory
and their purchase value. A sales summary report summarizes the sales revenue, the
geographical distribution of sales, and details of products sold.
4. On-Demand Reports
The on-demand report is a type of MIS reports that are produced on specific demands
from your company's management team. There is no fixed criteria or format that must be
included in an on-demand report. This type of MIS report includes the requirements of a
company and the prevailing circumstances will dictate the contents of an on-demand
report.
For example, a sales manager may want to know the peak sales season for a particular
product in a particular location. This will help the manager to decide whether other
similar products may succeed in the same market.
5. Financial Reports
Financial reports are types of MIS reports that can be used to determine the financial
condition of an organization. A financial report often includes a company's balance
sheets, income, and expense details, and cash flow statements. Financial reports are
used by your company's financial analysts, investors, the board of directors, and even
government units to access the overall financial health of your organization. These
reports are used in making critical financial decisions within a company.
The financial statement is a subtype of financial report that is used to provide information
to shareholders and all other concerned parties.
2
For Example, your company might report finance numbers quarterly, semi-annually, or
annually.
6. Inventory Reports
Inventory reports are a type of MIS report that is used to manage and keep a track of all
the products in your inventory. The inventory report includes details about the number of
products left in stock, the best selling products, the top-selling categories of products
and how they vary by demographic, etc. Inventory reports can help your business to
make smarter, data-driven decisions.
For Example, your inventory report might highlight that a particular product sells better
in a particular area as compared to others. Your company can then target advertising to
increase revenue.
7. Sales Reports
The sales report is prepared by the marketing and sales division of your organization. It
includes a visualization of products that have been sold during the last quarter/month in
your organization. The sales data is often visualized by taking into account the budgeted
and actual sales numbers. It provides an insight into the sales variance (the difference
between the budgeted and actual sales), the geographical distribution of products sold,
and the timeline of sales among other factors.
For Example, during the peak shopping season, your company might sell more
products than anticipated, which will reflect in your sales report during the next quarter.
8. Budget Reports
Organizations operate on a variety of budgets. These may include cash budgets, income
v/s expenditure budgets, marketing budget, HR budget, production budget, etc. An MIS
budget report contains internal information about your organization. It is used to maintain
your company's financial health while driving growth.
For Example, Your company's marketing budget during a new marketing campaign is
an example of the budget report.
9. Production Reports
Production report is a types of MIS report that contains information about the raw
production numbers in your company. The manufacturing division within your company
will prepare this report, and provide details of the production targets that were achieved
or missed.
This report also details the predicted v/s actual products manufactured in the time frame.
It may also highlight a production bottleneck or ideas on how to speed up the production
process.
For Example, your production report might highlight an increase in the speed of
production due to new machines being allocated.
3
3) SDLC (Waterfall model)
Ans: The software development lifecycle (SDLC) is the cost-effective and time-efficient
process that development teams use to design and build high-quality software. The goal
of SDLC is to minimize project risks through forward planning so that software meets
customer expectations during production and beyond.
2. System Design − The requirement specifications from first phase are studied in
this phase and the system design is prepared. This system design helps in
specifying hardware and system requirements and helps in defining the overall
system architecture.
3. Implementation − With inputs from the system design, the system is first
developed in small programs called units, which are integrated in the next phase.
Each unit is developed and tested for its functionality, which is referred to as Unit
Testing.
4
4. Integration and Testing − All the units developed in the implementation phase
are integrated into a system after testing of each unit. Post integration the entire
system is tested for any faults and failures.
6. Maintenance − There are some issues which come up in the client environment.
To fix those issues, patches are released. Also to enhance the product some
better versions are released. Maintenance is done to deliver these changes in
the customer environment.
4) Output of MIS.(SN)
Ans:
1. Periodic Reports:
- Explanation: Periodic reports are regularly generated at predetermined intervals,
offering routine updates on various business activities. These reports follow a set format
and contribute to ongoing monitoring and assessment.
- Example: A weekly sales summary report that provides insights into sales
performance, trends, and key metrics over the past week.
2. Triggered Reports:
- Explanation: Triggered reports are generated in response to specific events or
situations, often predefined within the MIS. These reports are designed to address
particular needs that arise based on triggers or thresholds.
- Example: An inventory reorder report triggered when the stock levels of a particular
item fall below a predetermined reorder level.
3. Demand Reports:
- Explanation: Demand reports are responses to specific queries posed by decision-
makers. These reports provide targeted information based on the queries raised,
supporting decision-making processes.
- Example: A request for a report on total sales to date for a specific product, allowing
decision-makers to assess the product's performance.
4. Plan Reports:
- Explanation: Plan reports are customized to assist in the formulation of various plans,
including sales forecasts, distribution plans, and budgets. These reports provide
valuable insights for strategic planning.
- Example: A sales forecast report that analyzes historical sales data and market
trends to predict future sales figures.
5
5. Key-Indicator Reports:
- Explanation: Key-indicator reports summarize critical activities and metrics, typically
available at the beginning of each workday. These reports offer a quick overview of key
indicators for informed decision-making.
- Example: A daily operations report summarizing key metrics such as inventory levels,
production activity, and sales volume from the previous day.
5) Structure of MIS.
Ans: A management information system (MIS) is an organised combination of people,
hardware, communication networks and data sources that collects, transforms and
distributes information in an organisation. An MIS helps decision making by providing
timely, relevant and accurate information to managers. The physical components of an
MIS include hardware, software, database, personnel and procedures.
6
1. Database:
The database is the foundation of an MIS, serving as a centralized repository for storing
and organizing data. It includes tables, records, and fields that collectively hold the
information needed for various organizational processes.
2. Procedure:
Procedures define the step-by-step processes and methods for collecting, processing,
and managing information within the MIS. Clear procedures ensure consistency and
accuracy in data handling.
3. Operating Personnel:
Operating personnel are the individuals responsible for managing and using the MIS.
This includes data entry operators, system administrators, analysts, and other staff
members involved in the day-to-day operations of the system.
4. Hardware:
Hardware refers to the physical components of the MIS, such as servers, computers,
storage devices, and networking equipment. These elements provide the infrastructure
necessary for the MIS to function.
5. Software:
Software includes the applications, programs, and systems that enable the MIS to
perform specific tasks. This encompasses database management software, data
processing applications, and any custom software designed for the organization's
specific needs.
7
6) Types of DSS.
Ans: A Decision Support System (DSS) is an interactive computer-based information
system designed to assist decision-makers in an organization. It provides analytical tools
and information to facilitate decision-making processes by synthesizing large volumes of
data, generating reports, and offering insights into complex problems.
Types of DSS
1. Data-driven DSS
A data-driven DSS is a computer program that makes decisions based on data from
internal databases or external databases.
Typically, a data-driven DSS uses data mining techniques to discern trends and
patterns, enabling it to predict future events.
Businesses often use data-driven DSSes to help make decisions about inventory, sales
and other business processes.
Some are used to help make decisions in the public sector, such as predicting the
likelihood of future criminal behavior
2. Model-driven DSS
Built on an underlying decision model, model-driven decision support systems are
customized according to a predefined set of user requirements to help analyze different
scenarios that meet these requirements.
For example, a model-driven DSS may assist with scheduling or developing financial
statements.
3. Communication-driven DSS
A communication-driven and group decision support system uses a variety of
communication tools such as email, instant messaging or voice chat to allow more than
one person to work on the same task.
The goal behind this type of DSS is to increase collaboration between the users and the
system and to improve the overall efficiency and effectiveness of the system.
4. Knowledge-driven DSS
In this type of decision support system, the data that drives the system resides in a
knowledge base that is continuously updated and maintained by a knowledge
management system.
A knowledge-driven DSS provides information to users that is consistent with a
company's business processes and knowledge
5. Document-Driven DSS
A Document-Driven DSS is a helpful tool that uses documents to find and manage
information. For instance, if a manager needs to review company policies, this system
8
allows them to quickly search and access the relevant documents, making decision-
making easier and more efficient.
KMS are built around systems which allow efficient categorisation and
distribution of knowledge. For example, the knowledge itself might be contained
in word processing documents, spreadsheets, PowerPoint presentations. internet
pages etc. To share the knowledge, a KMS would use group collaboration
systems, such as an intranet.
9
Explicit Knowledge: Explicit knowledge is that which can be formalised easily
and as consequence is easily available across the organisation. For example:
Online tutorials, Policy and procedure manuals etc.
Tacit Knowledge: Tacit knowledge, on the on the other hand, resides in a few
often-in just one person and hasn't been captured by the organisation or made
available to others.For example: hand-on skill, special know-how, employee
experiences etc.
10
System or the Accounting System of roughly any outsized company: TPS
systems are designed to process transactions virtually instantly to ensure that
customer data is available to the processes that require it.
TPS is designed to process routine transactions efficiently and accurately.
A business will have several TPS; for example:
● Billing systems to send invoices to customers
● Systems to calculate the weekly and monthly payroll and tax payments
● Production and purchasing systems to calculate raw material
requirements.
● Stock control systems to process all movements into, within and out of
the business
8) Classification of DSS.(SN) 33
Ans: A decision support system (DSS) can be defined as a system that provides tools to
managers to assist them in solving semi-structured and unstructured problems in their
own, somewhat in personalised way. Often, some type of modelling environment
perhaps a very simple environment such as the one accompanying a spreadsheet
package is involved. A DSS is not intended to make decisions for managers but rather to
provide managers with a set of capabilities that enable them to generate the information
required by them in making decisions. In other words, a DSS supports the human
decision-making process rather than providing a means to replace it.
● Text Oriented DSS: It contains textually represented information that could have
a bearing on decision. It allows documents to be electronically created, revised
and viewed as needed.
● Database Oriented DSS: Database plays a major role here; it contains
organised and highly structured data.
● Spreadsheet Oriented DSS: It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to
execute self-contained instructions. The most popular tool is Excel and Lotus 1-
2-3.
● Solver Oriented DSS: It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
● Rules Oriented DSS: It follows certain procedures adopted as rules.
● Compound DSS: It is built by using two or more of the five structures explained
above.
11
innovative technology. E-CRM software provides profiles and histories of each
interaction the organisation has with its customers, making it an important tool for all
small and medium businesses..
5. Back End Management: eCRM systems include back-end management features that
enable administrators to configure and customize the system according to business
needs. This may include user management, security settings, data integration, workflow
automation, and system maintenance.
6. Reporting and Analysis: eCRM systems offer robust reporting and analysis
capabilities that allow businesses to track key performance indicators (KPIs), measure
the effectiveness of customer interactions, and gain insights into customer behavior and
trends. Users can generate custom reports, visualize data through dashboards and
charts, and make data-driven decisions to improve business outcomes.
12
10) Explain Key capability of CRM with diagram. 66
Ans: Various capabilities of CRM software are; it can organise contacts, manage deals
and tasks, automate workflows, track leads in sales cycle, run and measure campaigns,
and generate reports in one platform. CRM software also aligns the workflows and data
of various departments, mainly sales, marketing, and support, and promotes
collaboration among teams.
1. Contact Management: CRM systems provide a centralized database for storing and
managing customer contact information, including names, addresses, phone numbers,
email addresses, and other relevant details. This allows businesses to maintain a
comprehensive view of their customer base and easily access contact details when
needed.
2. Reporting and Dashboard: CRM systems offer reporting and dashboard features
that allow users to track and analyze key metrics and performance indicators related to
sales, marketing, and customer service. Users can generate custom reports, visualize
data through charts and graphs, and gain insights into trends and patterns.
3. Lead Management: CRM systems enable businesses to capture, track, and manage
leads throughout the sales pipeline. Users can record lead information, qualify leads
based on predefined criteria, assign leads to sales representatives, and track lead status
and progress.
4. Deal and Tasks Management: CRM systems facilitate deal and task management by
allowing users to create and track sales opportunities, deals, and tasks. Users can set
reminders, schedule follow-up activities, and monitor the progress of deals and tasks
through various stages of the sales process.
6. Email Tracking: CRM systems provide email tracking capabilities that allow users to
track email interactions with customers and prospects. Users can monitor email opens,
clicks, responses, and other engagement metrics to assess the effectiveness of email
communications.
7. Social Media Management: Some CRM systems offer integration with social media
platforms, enabling users to monitor social media interactions, engage with customers
and prospects, and track social media mentions and conversations. This helps
businesses stay connected and responsive on social media channels.
13
8. Mobile Version: Many CRM systems offer mobile applications or mobile-friendly web
interfaces that allow users to access CRM data and functionality from smartphones and
tablets. This enables users to stay productive and responsive while on the go, whether
they are in the office, on the road, or working remotely.
1. Awareness: This is the stage where potential customers become aware of a business,
its products, or its services. It can happen through various channels such as
advertisements, social media, word of mouth, or search engines. The goal during this
stage is to grab the attention of potential customers and make them aware of what the
business has to offer.
2. Engagement: Once potential customers are aware of the business, the next stage is
engagement. This involves interacting with customers through various touchpoints such
as social media, email newsletters, website content, or events. The goal is to build a
relationship with customers and keep them engaged with the brand.
14
3. Consideration: In the consideration stage, potential customers are actively evaluating
the business's offerings and comparing them to alternatives. They may research product
features, read reviews, or seek recommendations from friends or online communities.
The goal is to provide valuable information and address any concerns or questions
potential customers may have to help them make a decision.
4. Conversion: The conversion stage occurs when potential customers make a purchase
or take a desired action, such as signing up for a free trial, requesting a quote, or
subscribing to a service. The goal is to turn potential customers into paying customers or
leads that can be further nurtured.
5. Retention: After customers have made a purchase or taken a desired action, the focus
shifts to retention. This involves providing excellent customer service, delivering on
promises, and ensuring a positive experience throughout the customer journey. The goal
is to keep customers satisfied, engaged, and coming back for repeat business.
6. Advocacy: The advocacy stage occurs when satisfied customers become advocates
for the business, recommending it to others and promoting its products or services
through word of mouth, reviews, testimonials, or social media. The goal is to turn
customers into brand ambassadors who help attract new customers and build credibility
for the business.
1. Basket Analysis: Data mining techniques such as association rule mining are used
to analyze transactional data and identify patterns in customer purchasing behavior. This
helps businesses understand which products are frequently purchased together,
enabling them to optimize product placement, promotions, and cross-selling strategies.
2. Sales Forecasting: Data mining models can analyze historical sales data, market
trends, and other relevant factors to predict future sales volumes. This helps businesses
15
make informed decisions about inventory management, resource allocation, and
strategic planning.
4. Predictive life-cycle management: Data mining models can predict the likelihood of
customers churning or leaving the business based on their behavior and interaction
history. This enables businesses to implement proactive retention strategies and
interventions to prevent customer attrition.
7. Fraud detection: Data mining models can analyze transactional data and detect
patterns indicative of fraudulent activity, such as unusual spending patterns or
suspicious behavior. This helps businesses identify and prevent fraudulent transactions,
reducing financial losses and protecting customer trust.
8. Warranties: Data mining techniques can analyze warranty claims data to identify
patterns and trends related to product defects or failures. This helps businesses improve
product quality, identify potential warranty issues early, and optimize warranty
management processes to reduce costs and enhance customer satisfaction.
Databases are designed to handle large volumes of data and provide mechanisms for
accessing, querying, updating, and managing the stored information. They typically
consist of tables, records, and fields, where each table represents a specific entity or
16
concept, each record represents an individual instance of that entity, and each field
represents a piece of information about the entity.
1. Centralized Database:
- A centralized database is a single database system located in one physical or logical
location, managed and controlled by a single entity or organization.
- It stores all data in one central repository, making it easy to manage and administer.
- However, it is susceptible to single points of failure and may pose challenges in terms
of scalability and accessibility, especially in distributed or geographically dispersed
environments.
2. Distributed Database:
- A distributed database is spread across multiple locations or nodes, with each node
containing a subset of the data.
- It offers advantages such as improved scalability, fault tolerance, and performance by
distributing data and workload across multiple nodes.
- Distributed databases require sophisticated data distribution and synchronization
mechanisms to ensure data consistency and integrity across the network.
● Homogeneous DDB: Those database systems which execute on the same
operating system and use the same application process and carry the same
hardware devices.
● Heterogeneous DDB: Those database systems which execute on different
operating systems under different application procedures, and carries different
hardware devices.
3. Relational Database:
- Relational databases organize data into tables with rows and columns, where each
row represents a record and each column represents an attribute or field.
- They use structured query language (SQL) for querying, updating, and managing
data, adhering to the principles of relational algebra and relational calculus.
- Relational databases are widely used in various applications and industries due to
their simplicity, flexibility, and strong support for data integrity and consistency.
4. NoSQL Database:
- NoSQL (Not Only SQL) databases are designed to handle large volumes of
unstructured or semi-structured data, which may not fit well into the rigid structure of
relational databases.
- They offer flexible schemas, scalability, and high performance for distributed and big
data environments, making them suitable for applications such as web analytics, content
management, and real-time data processing.
- NoSQL databases come in various types, including document stores, key-value
stores, column-family stores, and graph databases, each optimized for different use
cases and data models.
17
5. Cloud Database:
- A cloud database is hosted and managed by a cloud service provider, accessible
over the internet from anywhere with an internet connection.
- It offers scalability, flexibility, and cost-effectiveness by providing on-demand
resources and pay-as-you-go pricing models.
- Cloud databases eliminate the need for on-premises infrastructure and maintenance,
allowing businesses to focus on their core activities while leveraging the benefits of
cloud computing.
6. Object-oriented Databases:
- Object-oriented databases store data as objects, encapsulating both data and
methods (functions) that operate on the data.
- They are well-suited for applications with complex data structures and relationships,
such as object-oriented programming languages and software systems.
- Object-oriented databases offer advantages such as inheritance, polymorphism, and
encapsulation, enabling developers to model real-world entities and relationships more
naturally.
7. Hierarchical Databases:
- Hierarchical databases organize data in a tree-like structure, with parent-child
relationships between data elements.
- They are commonly used in legacy systems and applications with a strict hierarchy of
data, such as file systems, directory structures, and organizational charts.
- Hierarchical databases are efficient for representing data with one-to-many
relationships and navigating hierarchical structures.
8. Network Databases:
- Network databases extend the hierarchical model by allowing multiple parent-child
relationships between data elements, forming a more complex network or graph-like
structure.
- They are suitable for representing complex relationships in data, such as in
engineering or scientific applications where entities have multiple connections or
associations.
- Network databases offer greater flexibility and expressiveness than hierarchical
databases but may require more sophisticated data modeling and querying techniques.
9. Personal Database:
- A personal database is used by individuals to store and manage personal
information, such as contacts, calendars, notes, and personal finance data.
- They are typically lightweight, user-friendly, and designed for personal productivity
and organization, offering features such as data entry forms, search capabilities, and
customizable views.
18
- Personal databases may be implemented using desktop software, web applications,
or mobile apps, providing users with access to their data across different devices and
platforms.
19
b. DROP: DROP command is used to remove the whole database or table indexes,
data, and more.
c. ALTER: It is used to alter the structure of the database. This change could be either
to modify the characteristics of an existing attribute or probably to add a new attribute.
d. TRUNCATE: TRUNCATE command is used to remove all the rows from the table.
20
c. SAVEPOINT: It is used to roll the transaction back to a certain point without rolling
back the entire transaction.
1) Primary Key :
The primary key is like a special ID assigned to each row (tuples) in a table. It
uniquely identifies each record, ensuring that no two rows have the same
identifier.
For example, in a table of employee,, the primary key could be a Employee ID
number. This ensures that each student record is distinct and identifiable.
2) Candidate key
21
A candidate key is an attribute or set of attributes that can uniquely identify a
tuple. Except for the primary key, the remaining attributes are considered a
candidate key. The candidate keys are as strong as the primary key.
For example: In the EMPLOYEE table, id is best suited for the primary key. The
rest of the attributes, like SSN, Passport_Number, License_Number, etc., are
considered a candidate key.
3) Super Key
A super key in the context of databases refers to a set of attributes (or columns)
within a table that collectively uniquely identify each record (or row) in that table.
It represents a broader concept than other types of keys, such as candidate keys
and primary keys, as it includes all possible combinations of attributes that
ensure uniqueness.
In a table of employees, a super key could be a combination of attributes like
Employee ID, First Name, and Last Name. Each unique combination of these
attributes uniquely identifies an employee record in the table
4) Foreign key:
A foreign key is like a special link between two tables in a database. It helps
connect information from one table to another. Imagine you have two lists—one
for students and another for courses. A foreign key in the courses list could point
back to a specific student in the students list, showing which student is enrolled
in each course.
Example:
22
Every employee works in a specific department in a company, and employee and
department are two different entities. So we can't store the department's
information in the employee table.
That's why we link these two tables through the primary key of one table.
We add the primary key of the DEPARTMENT table, Department_Id, as a new
attribute in the EMPLOYEE table. In the EMPLOYEE table, Department_Id is the
foreign key, and both the tables are related.
5) Alternate Key:
Out of all candidate keys, only one gets selected as primary key, remaining keys
are known as alternate or secondary keys
In simple words you can say that Candidate keys minus Primary Key are called
as Alternate Keys.
Example:
6) Composite key:
A composite key, also known as a composite primary key, is a combination of
two or more columns in a database table that together uniquely identify each
record in the table. Unlike a single primary key, which consists of a single
column, a composite key requires multiple columns to ensure uniqueness.
23
16) Data warehouse architecture with diagram. 110
Ans: A Data Warehouse (DW) is a relational database that is designed for query and
analysis rather than transaction processing. It includes historical data derived from
transaction data from single and multiple sources. A Data Warehouse provides
integrated, enterprise-wide, historical data and focuses on providing support for
decision-makers for data modeling and analysis. A Data Warehouse is a group of data
specific to the entire organization, not only to particular group of users. It is not used for
daily operations and transaction processing but used for making decisions.
● External Sources –
External source is a source from where data is collected irrespective of the type
of data. Data can be structured, semi structured and unstructured as well.
● Stage Area –
Since the data, extracted from the external sources does not follow a particular
format, so there is a need to validate this data to load into datawarehouse. For
this purpose, it is recommended to use ETL tool.
○ E(Extracted): Data is extracted from External data source.
○ T(Transform): Data is transformed into the standard format.
○ L(Load): Data is loaded into data warehouse after transforming it into the
standard format.
● Data-warehouse –
The datawarehouse as central repository. It actually stores the meta data and the
actual data gets stored in the data marts. Note that datawarehouse stores the
data in its purest form in this top-down approach.
● Data Marts –
Data mart is also a part of storage component. It stores the information of a
particular function of an organisation which is handled by single authority. There
can be as many number of data marts in an organisation depending upon the
functions. We can also say that data mart contains subset of the data stored in
datawarehouse.
● Data Mining –
Data mining is the process of discovering patterns, trends, correlations, and
insights from large datasets using various techniques from statistics, machine
learning, and artificial intelligence. It involves extracting valuable knowledge and
actionable information from raw data to support decision-making and solve
complex problems.
24
1. Top-down approach:
2. Bottom-up approach:
● First, the data is extracted from external sources (same as happens in top-down
approach).
● Then, the data go through the staging area (as explained above) and loaded into
data marts instead of datawarehouse. The data marts are created first and
provide reporting capability. It addresses a single business area.
● These data marts are then integrated into datawarehouse.
25
17) Data Mining technique. 115
Ans:
Data mining is the process of discovering patterns, trends, correlations, and insights
from large datasets using various techniques from statistics, machine learning, and
artificial intelligence. It involves extracting valuable knowledge and actionable
information from raw data to support decision-making and solve complex problems.
● Text Mining: Text mining techniques are used to extract valuable insights and
patterns from unstructured textual data. This includes tasks such as sentiment analysis,
26
topic modeling, document clustering, and named entity recognition. Natural Language
Processing (NLP) techniques, including Bag-of-Words, Term Frequency-Inverse
Document Frequency (TF-IDF), and Word Embeddings (e.g., Word2Vec, GloVe), are
commonly used in text mining.
Types of BPO
1. Onshore BPO: Onshore BPO refers to outsourcing services to a third-party
provider located within the same country as the client organization. This type of
outsourcing is often chosen for processes that do not require significant cost
savings but benefit from access to specialized skills or resources.
27
specialized domain expertise, analytical skills, and advanced technical
knowledge. KPO services may include research and analytics, market research,
intellectual property research, and legal services.
28
4. Desktop as a Service (DaaS)
Desktop as a Service (DaaS) is a cloud computing service model that delivers virtual
desktop infrastructure (VDI) to users over the internet. Instead of managing traditional
physical desktop computers, organizations can access virtual desktops hosted in the
cloud from any device with an internet connection.
Characteristics of KPO:
1. High-Value Processes: KPO involves outsourcing processes that are critical to
business success and involve high intellectual value. These processes often
require advanced problem-solving skills, research capabilities, and analytical
expertise.
3. Complex Analysis and Decision Support: KPO services may involve complex
data analysis, research, market intelligence, financial analysis, risk assessment,
strategic planning, and decision support. These tasks require a deep
understanding of the subject matter and the ability to derive actionable insights
from data and information.
5. Global Delivery Model: KPO services are often delivered through a global
delivery model, leveraging a combination of onshore, nearshore, and offshore
resources to access specialized talent pools, reduce costs, and provide round-
the-clock support to clients worldwide.
29
Ans: Cloud computing services refer to a range of computing resources and services
delivered over the internet by cloud service providers. These services allow users to
access and use computing resources such as servers, storage, databases, networking,
software, and applications without the need for extensive infrastructure investment or
maintenance.
1) Public Cloud
Public clouds are managed by third parties which provide cloud services over the
internet to the public, these services are available as pay-as-you-go billing models. They
offer solutions for minimizing IT infrastructure costs and become a good option for
handling peak loads on the local infrastructure. Public clouds are the go-to option for
small enterprises, which can start their businesses without large upfront investments by
completely relying on public infrastructure for their IT needs.A public cloud is meant to
serve multiple users, not a single customer. A user requires a virtual computing
environment that is separated, and most likely isolated, from other users.
2) Private cloud
Private clouds are distributed systems that work on private infrastructure and.provide the
users with dynamic provisioning of computing resources.Instead of a pay-as-you-go
model in private clouds, there could be other schemes that manage the usage of the
cloud and proportionally billing of the different departments or sections of an enterprise.
Private cloud providers are HP Data Centers, Ubuntu, Elastic-Private cloud, Microsoft,
etc.
30
Advantages of using a private cloud are as follows:
1) Customer information protection: In the private cloud security concerns are
less since customer data and other sensitive information do not flow out of
private infrastructure.
2) Infrastructure ensuring SLAs: Private cloud provides specific operations such
as appropriate clustering, data replication, system monitoring, and maintenance,
disaster recovery, and other uptime services.
3) Compliance with standard procedures and operations: Specific procedures
have to be put in place when deploying and executing applications according to
third-party compliance standards. This is not possible in the case of the public
cloud.
Disadvantages of using a private cloud are:
1) The restricted area of operations: Private cloud is accessible within a particular
area. So the area of accessibility is restricted.
2) Expertise requires: In the private cloud security concerns are less since
customer data and other sensitive information do not flow out of private
infrastructure. Hence skilled people are required to manage & operate cloud
services
3) Hybrid cloud:
A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also called
heterogeneous clouds. A major drawback of private deployments is the inability to scale
on-demand and efficiently address peak loads. Here public clouds are needed. Hence, a
hybrid cloud takes advantage of both public and private clouds.
31
Advantages of using a Hybrid cloud are:
1) Cost: Available at a cheap cost than other clouds because it is formed by a
distributed system.
2) Speed: It is efficiently fast with lower cost, It reduces the latency of the data
transfer process.
3) Security: Most important thing is security. A hybrid cloud is totally safe and
secure because it works on the distributed system network.
Disadvantages of using a Hybrid cloud are:
1) It’s possible that businesses lack the internal knowledge necessary to create
such a hybrid environment. Managing security may also be more challenging.
Different access levels and security considerations may apply in each
environment.
2) Managing a hybrid cloud may be more difficult. With all of the alternatives and
choices available today, not to mention the new PaaS components and
technologies that will be released every day going forward, public cloud and
migration to public cloud are already complicated enough. It could just feel like a
step too far to include hybrid.
4 ) Community cloud:
Community clouds are distributed systems created by integrating the services of
different clouds to address the specific needs of an industry, a community, or a business
sector. But sharing responsibilities among the organizations is difficult. In the community
cloud, the infrastructure is shared between organizations that have shared concerns or
32
tasks. An organization or a third party may manage the cloud.
Components of eSCM
1. Supply Chain Planning Tools: These tools utilize data analytics and forecasting
algorithms to optimize inventory levels, production schedules, and distribution
33
networks. They help in demand forecasting, production planning, and inventory
optimization.
34
23) Application of DSS.
Ans:
1) Cost Accounting System :- The healthcare industry is well known for its cost
complexity.Managing cost in this industry requires controlling costs of supplies ,
expensive machinery technology and variety of personnel.Cost accounting applications
help healthcare organisations to calculate product cost for individual procedures or
services.DSS can accumulate these product costs to calculate total costs per patient.
3) Clinical DSS:- A DSS used in medicine is called a clinical DSS.Clinical DSs have the
potential to change the way medicine has been taught and practiced.
7) Water Management DSS:- DSS have been used to forecast the demand for water in
particular areas. Using information about the local geography, Historical information
about water consumption in the area as well as prediction models, planners can predict
and plan for future consumption needs in the area. "Hydronumerics" has used DSS to
support its water management work in India.
35
C.procedure
D. Implicit
6. _____ is the framework that defines task performed at each step Software development
process
A. LL
B. SDLC ✓
C. PML
D. DML
36
B. IPO
C. BPO
D. MIS
9. _____ provides Virtualize computer system.
A. IAAS ✓
B. SAAS
C. TAAS
D. PAAS
10. _______ provide cloud service over the Internet to the public.
A.Private
B. Public ✓
C. Hybrid
D. Community
37
7. PAAS offers a platform for building deploying and managing application over the
internet.
8. Hybrid is the Hetrogenous distributed system form by combining facilities public cloud or
private cloud.
9. Select is DQL command.
38