QUESTIONS 2022-23 MID SEM
Q1. Show how the components of an MIS are interrelated. How an MIS can facilitate
the general functions of Management (plan, organize, etc.)? [6 Marks]
Components of MIS:
1. Hardware – Physical devices like servers, computers, and networking tools.
2. Software – Applications and programs that process data.
3. Data – Raw facts used for processing.
4. People – Users who interact with MIS: managers, IT staff, end-users.
5. Procedures – Instructions and rules for using the MIS.
6. Networks – Communication systems that connect hardware.
Interrelation Diagram:
[People]
↑ ↓
[Procedures] ←→ [Software] ←→ [Hardware]
↑
[Data]
↑
[Network]
All components are interlinked: data is processed via software on hardware using procedures
by people across networks.
Facilitation of Management Functions:
• Planning: MIS provides forecasts, market trends, and decision support.
• Organizing: Structures resources and workflows through project tracking and HRIS.
• Staffing: Uses data for recruitment analysis and talent management.
• Directing: Real-time dashboards help in immediate decision-making.
• Controlling: Monitors KPIs, quality, budgets, and gives alerts on deviations.
Q2. Investment Decision Based on Payoff Matrix [10 Marks]
Alternatives Uneven Growth Sustained Growth
(0.30) (0.70)
Travel-agency chain -$10,000,000 $50,000,000
Property modernization & $90,000,000 -$15,000,000
upgrading
Prepared-foods firm $30,000,000 $25,000,000
a) Maximax Rule (Optimistic):
Choose alternative with maximum possible payoff:
• Travel: $50M
• Property: $90M
• Prepared Foods: $30M
Decision: Property modernization (Payoff: $90,000,000)
b) Minimize Regret (Equal probabilities):
1. Create Regret Table (difference between best payoff in each state and current option):
Alternatives Uneven Growth Sustained Growth Max Regret
Travel-agency chain 100M 40M 100M
Property modernization 0M 105M 105M
Prepared-foods firm 60M 65M 65M
Decision: Prepared-foods firm (Min Regret = $65M)
c) Expected Value:
EV=(0.30×Uneven)+(0.70×Sustained)EV = (0.30 \times \text{Uneven}) + (0.70 \times
\text{Sustained})EV=(0.30×Uneven)+(0.70×Sustained)
• Travel: (0.30 × -10M) + (0.70 × 50M) = -3M + 35M = $32M
• Property: (0.30 × 90M) + (0.70 × -15M) = 27M - 10.5M = $16.5M
• Prepared Foods: (0.30 × 30M) + (0.70 × 25M) = 9M + 17.5M = $26.5M
Decision: Travel-agency chain (EV = $32M)
3a. List the different types of decisions. Explain Simon’s Model of Decision Making [7
Marks]
Types of Decisions:
1. Structured – Routine, repetitive (e.g., payroll processing).
2. Semi-Structured – Partially programmable (e.g., sales forecasting).
3. Unstructured – Novel, non-routine (e.g., strategic planning).
Simon’s Model:
1. Intelligence Phase: Identify the problem using MIS (data gathering).
2. Design Phase: Develop possible solutions (modelling).
3. Choice Phase: Select the best alternative (evaluation and implementation).
4. (Optional) Implementation: Put the decision into action.
3b. Differentiate between TPS and MIS [3 Marks]
Feature TPS (Transaction Processing MIS (Management Information
System) System)
Purpose Record day-to-day transactions Provide management reports and
summaries
Users Operational staff Middle and top managers
Data High volume, real-time Processed and aggregated data
Handling
Examples Billing, payroll Sales analysis, budgeting
4. Write a note on any two of the following [2×3 = 6 Marks]
a. Human Resource Information Systems (HRIS):
HRIS is a type of MIS focusing on employee data. It manages recruitment, payroll, training,
performance, and legal compliance. It enhances strategic HR decisions through real-time data
access.
b. Matrix of Functional Subsystems and Management Activities:
A cross-grid showing subsystems like finance, marketing, HR across activities like planning,
organizing, controlling. It helps in designing MIS to address specific managerial needs.
c. Components of MIS:
Already covered in Q1.
d. Decision Table:
A tabular method to represent and analyze rules and decision logic. Used in structured
decisions. It consists of:
• Conditions (inputs)
• Actions (outputs)
• Rules (combinations)
Example:
Condition A Condition B Action
Yes No X
No Yes Y
QUESTION 2022-23 END SEM
Q1a. List the different types of information systems with brief detail. Differentiate
between DSS and MIS.
Information systems (IS) are critical tools used in modern organizations to support
operations, management, and decision-making. These systems vary in complexity and
function depending on the user and the organizational level. The major types of information
systems include:
1. Transaction Processing Systems (TPS): These are used at the operational level to
record day-to-day business transactions such as sales, receipts, cash deposits, payroll,
credit decisions, and flow of materials. They ensure the smooth operation of an
organization and maintain data integrity.
2. Management Information Systems (MIS): MIS provides structured information in the
form of reports, summaries, and graphs to assist middle-level managers in decision-
making. It uses data from TPS and processes it into meaningful formats for
management use.
3. Decision Support Systems (DSS): DSS are interactive software-based systems
designed to help managers make decisions that are not routine. These systems analyze
large volumes of data and use models or simulations to support complex decision-
making processes.
4. Executive Support Systems (ESS): Designed for senior executives, ESS provides
access to both internal and external data to support strategic decisions. They offer
dashboards and high-level summaries with drill-down capabilities.
5. Enterprise Systems (ERP, CRM): These systems integrate core business processes
across departments. ERP systems like SAP and Oracle unify procurement,
manufacturing, HR, and finance operations.
Difference Between MIS and DSS:
Feature MIS DSS
Purpose Summarizes data for routine Assists in complex/non-routine
decision-making decisions
Type of Structured Semi-structured or
Decision unstructured
Inputs Internal data (mainly from TPS) Internal and external data
Output Predefined reports, summaries Interactive reports, simulations
User Middle managers Analysts and senior managers
In conclusion, while MIS focuses on operational efficiency and routine decision-making,
DSS supports higher-level, analytical decision-making where multiple variables and
outcomes must be considered.
Q1b. List the different types of decisions. Explain Simon’s Model of Decision Making.
Types of Decisions in an Organization:
1. Structured Decisions:
o These are routine, repetitive, and well-defined decisions.
o Procedures are standardized, and outcomes are predictable.
o Example: Reordering inventory when stock levels fall below the minimum
threshold.
2. Semi-Structured Decisions:
o These involve a combination of structured and unstructured elements.
o While some procedures are known, human judgment is also required.
o Example: Budget allocation across departments or sales forecasting.
3. Unstructured Decisions:
o These are complex decisions with no predefined procedures or clear outcomes.
o They require creativity, intuition, and judgment.
o Example: Entering a new market, launching a new product.
Simon’s Model of Decision Making:
Herbert A. Simon proposed a model that outlines the decision-making process as consisting
of three major phases:
1. Intelligence Phase:
o In this phase, the problem is identified and understood.
o It includes data collection, analysis, and diagnosis.
o Managers explore the environment for conditions that require a decision.
2. Design Phase:
o Possible solutions or alternatives are developed and analyzed.
o Models are created to represent the problem and simulate various scenarios.
o The aim is to generate and evaluate all possible alternatives.
3. Choice Phase:
o Among the alternatives, the best one is selected based on evaluation criteria.
o It includes ranking, cost-benefit analysis, and risk assessment.
o Once the decision is made, it is implemented.
Diagram: Simon’s Model
[Problem Identification]
↓
[INTELLIGENCE]
↓
[DESIGN ALTERNATIVES]
↓
[CHOICE]
↓
[Implementation & Review]
Simon emphasized that decision-making is not always entirely rational but rather bounded by
limitations like information, cognitive ability, and time.
Q2a. What is Computer Network Security? Explain the Control Spreadsheet used for
Computer Network Security with a suitable example.
Computer Network Security refers to the strategies, practices, and technologies used to
protect data and resources on computer networks from unauthorized access, misuse,
malfunction, modification, or destruction. The goal is to ensure confidentiality, integrity, and
availability of data.
With the growing number of cyber threats—such as malware, phishing, ransomware, and
DDoS attacks—organizations must implement robust network security policies and systems.
Key Elements of Network Security:
1. Firewall: Blocks unauthorized access while allowing permitted communication.
2. Antivirus/Antimalware: Detects and removes harmful software.
3. Intrusion Detection and Prevention Systems (IDPS): Monitors for unusual activity.
4. Virtual Private Network (VPN): Encrypts communication for remote access.
5. Access Control: Limits who can access network resources.
Control Spreadsheet for Network Security:
A Control Spreadsheet is a tool used by IT managers to track, monitor, and enforce
network security controls. It includes the following columns:
Control Security Measure Objective Status Owner Last
ID Audit
C-01 Firewall Prevent Active IT 10-05-
configuration unauthorized access Admin 2025
C-02 Password policy Strengthen Active HR 01-05-
enforcement authentication Dept 2025
Example:
Imagine a university network. Using a control spreadsheet, the university's IT department can
monitor:
• Student access permissions
• Firewall logs
• Backup procedures
• Intrusion detection alerts
This ensures accountability, routine audits, and documentation of control mechanisms.
Q2b. Differentiate between the Maximin and Maximax decision rules of the Payoff
Matrix.
When making decisions under uncertainty, decision-makers often rely on different decision
rules to evaluate alternatives. Two such rules are Maximin and Maximax, each reflecting a
different risk appetite and perspective.
1. Maximin Decision Rule (Pessimistic Approach):
• Definition: The Maximin rule identifies the worst possible outcome for each
alternative and then selects the alternative with the best of these worst outcomes.
• Objective: It is a conservative approach, ideal for risk-averse decision-makers who
want to avoid the worst-case scenario.
• Steps:
1. For each decision alternative, identify the minimum payoff.
2. Choose the alternative with the highest minimum payoff.
Example:
If the minimum payoffs of three options are:
• A: ₹10 lakhs
• B: ₹12 lakhs
• C: ₹8 lakhs
Then Maximin selects B (₹12 lakhs), as it has the best worst-case scenario.
2. Maximax Decision Rule (Optimistic Approach):
• Definition: The Maximax rule identifies the best possible outcome for each alternative
and selects the one with the highest payoff.
• Objective: It is an aggressive approach, suitable for risk-seekers looking to maximize
returns.
• Steps:
1. For each alternative, find the maximum payoff.
2. Choose the one with the highest value.
Example:
If the maximum payoffs of three options are:
• A: ₹25 lakhs
• B: ₹22 lakhs
• C: ₹30 lakhs
Then Maximax chooses C (₹30 lakhs), as it provides the highest potential gain.
Comparison Table:
Feature Maximin Maximax
Approach Pessimistic (risk-averse) Optimistic (risk-seeking)
Decision Best of the worst outcomes Best of the best outcomes
Criteria
Focus Minimizing loss Maximizing gain
Suitable For Conservative decision- Ambitious, risk-tolerant decision-
makers makers
Conclusion:
Both Maximin and Maximax are non-probabilistic techniques used when probabilities of
outcomes are unknown. The choice between them depends on the decision-maker’s risk
preference.
Q3. Draw a decision tree and prepare an analysis for the following pricing problem.
Problem Overview:
A firm must choose the best price ($0.99, $1.29, or $1.59) for a new product. The success
depends on both:
• The competitor’s pricing strategy
• Conditional profits under each scenario
Let’s first decode the conditional profit matrix and probability distributions.
Step 1: Understand Probabilities
If Company sets price Prob(Comp = $0.99) Prob(Comp = $1.29) Prob(Comp = $1.59)
$0.99 0.50 0.40 0.10
$1.29 0.20 0.40 0.40
$1.59 0.10 0.30 0.60
Step 2: Payoff Matrix
Company Price → / Competitor Price ↓ $0.99 $1.29 $1.59 If No Competitor
$0.99 30 40 45 75
$1.29 21 42 45 90
$1.59 10 30 53 100
Step 3: Calculate Expected Values
For $0.99:
= (0.50 × 30) + (0.40 × 40) + (0.10 × 45)
= 15 + 16 + 4.5 = 35.5
For $1.29:
= (0.20 × 21) + (0.40 × 42) + (0.40 × 45)
= 4.2 + 16.8 + 18 = 39
For $1.59:
= (0.10 × 10) + (0.30 × 30) + (0.60 × 53)
= 1 + 9 + 31.8 = 41.8
Conclusion:
• Optimal Price: $1.59
• Maximum Expected Value: 41.8
Q4a. Write a “Feasibility Assessment Report” to make an engineering and management
teaching institute campus Wi-Fi enabled.
Feasibility Assessment Report: Campus Wi-Fi Implementation
Project Title:
Implementation of Wi-Fi Enabled Campus at [Engineering & Management Institute]
Objective:
To provide campus-wide wireless internet connectivity for students, faculty, and staff,
enabling seamless access to academic and administrative resources.
1. Technical Feasibility:
• Infrastructure: Evaluation of current networking infrastructure (routers, LAN ports,
access points).
• Hardware: Wi-Fi routers with appropriate range, switches, firewall systems, and
backup servers.
• Network Design: Implementation of a secure wireless architecture (e.g., WPA3
security, VLAN segmentation).
• Bandwidth: Sufficient internet bandwidth for at least 500–1000 concurrent users.
Conclusion: Technically feasible with moderate upgrades to networking systems.
2. Economic Feasibility:
• Estimated Cost: ₹10–15 lakhs (equipment + installation + configuration).
• Ongoing Cost: Annual maintenance and internet service charges (approx. ₹3–5 lakhs).
• Funding: Internal funds and possible educational grants.
Cost-Benefit Analysis: Long-term academic productivity and digital enablement outweigh
initial costs.
3. Operational Feasibility:
• User Training: Minimal; most users are already familiar with Wi-Fi.
• Maintenance: IT team can handle most operations post-setup.
• Support System: A helpdesk or ticketing system for connectivity issues.
4. Legal & Ethical Feasibility:
• Compliance: Ensure compliance with data privacy laws and cybersecurity regulations.
• Filtering: Academic filtering software to avoid misuse.
Recommendation:
The campus-wide Wi-Fi project is feasible on all grounds and is recommended for
implementation within the next academic session.
Q4b. Draw a data flow diagram (DFD) for the following case of ink cartridge ordering
system.
Given Case Summary:
• ABC Ltd. supplies printer cartridges online.
• Customers place orders → confirmation → warehouse gets order.
• Returning customers get discounts.
• Invoice raised → payment → product dispatched.
DFD – Level 0 (Context Diagram):
DFD – Level 1 (Detailed Breakdown):
1. Customer places order
2. System checks customer database
o Applies discounts if returning
3. Order is confirmed
4. Invoice generated and sent
5. Payment received
6. Warehouse dispatches item
Entities:
• External: Customer, Accounts Dept., Warehouse
• Processes: Order Checking, Invoice & Payment, Dispatch
• Data Stores: Customer Database, Orders, Inventory
Q5. Write short notes on any three of the following:
A. Advantages of E-Commerce to Society
1. Convenience and Accessibility: People can shop 24/7 without physical barriers,
especially beneficial for rural areas.
2. Wider Choices: Enables access to global products and brands.
3. Eco-friendly: Reduces need for physical stores, lowers pollution from commuting.
4. Entrepreneurship Boost: Facilitates small and home-based businesses to reach large
markets.
5. Social Inclusion: Benefits elderly and disabled individuals with doorstep services and
accessibility features.
B. Digital Signature
A digital signature is a cryptographic technique that ensures the authenticity, integrity, and
non-repudiation of digital data.
• How it works:
o The sender’s private key is used to generate a unique hash of the message.
o The recipient uses the sender’s public key to decrypt the hash and verify it.
• Applications:
o E-Governance, tax filing (e.g., ITR), online contracts, and digital certificates.
• Benefits:
o Prevents tampering and impersonation.
o Legally accepted under IT laws.
C. Robotic Process Automation (RPA)
RPA is the use of software robots to automate repetitive and rule-based tasks traditionally
performed by humans.
• Applications:
o Invoice processing, data entry, payroll, customer support.
• Benefits:
o Increases efficiency, reduces human errors, operates 24/7, and reduces
operational costs.
• Example Tools: UiPath, Blue Prism, Automation Anywhere.
D. Spatial Computing
Spatial computing refers to the digital interaction with physical spaces using technologies
such as AR, VR, sensors, GPS, and IoT.
• Key Features:
o Maps virtual elements into real-world environments.
o Involves motion tracking, 3D mapping, and immersive interaction.
• Applications:
o Smart cities, AR navigation, architecture simulations, metaverse, and spatial
analytics.
QUESTION 2023-25 MID SEM
Q1: Characteristics of MIS and Role of IT Infrastructure
A Management Information System (MIS) is designed to provide timely, relevant, and
accurate information to support decision-making and operational control in an organization.
The key characteristics of MIS include:
1. Systematic Design – MIS is structured to collect, process, and disseminate
information.
2. Integrated System – It integrates various business processes across departments.
3. Supports Planning and Decision Making – It provides reports and real-time data to
support managerial activities.
4. Feedback Mechanism – Enables continuous monitoring and improvement.
5. User-Oriented – Tailored to meet user needs at different managerial levels (strategic,
tactical, operational).
Role of IT Infrastructure:
IT infrastructure is the backbone of MIS. It includes hardware (servers, computers,
networking equipment), software (databases, ERP, CRM systems), and communication
technologies (internet, intranet, cloud). These components enable the smooth flow of data
from operational systems to managers. For example, a retail chain may use Point of Sale
(POS) systems to collect real-time data, which is stored in cloud databases and processed
using analytical software to generate dashboards for decision-making.
Diagram: Basic MIS Framework
[Data Input] → [Processing Unit (IT Infra)] → [Database] → [Reports/Outputs] →
[Managers]
Q2: Feasibility Assessment Report for XYZ Co.
Feasibility Assessment Report: XYZ Co. Implementation of MIS
XYZ Co., a multi-location retail chain, is facing operational inefficiencies due to a lack of an
integrated information system. To overcome challenges in inventory management, sales
tracking, and customer relationship management (CRM), the company plans to implement a
Management Information System (MIS). Before implementation, a feasibility study is
essential to evaluate the viability of this project.
Types of Feasibility Assessments:
1. Technical Feasibility: This assesses whether the organization has the technical
resources (hardware, software, skilled manpower) to implement the MIS. XYZ Co.
needs modern IT infrastructure and staff trained in MIS operations.
2. Economic Feasibility: Evaluates the cost-effectiveness of the project. It involves cost-
benefit analysis. Costs include software, hardware, training, and maintenance;
benefits include reduced inventory costs, better CRM, and increased efficiency.
3. Operational Feasibility: Checks whether the system will function effectively once
implemented. Given that XYZ Co. has decentralized operations, the MIS should be
scalable and user-friendly to ensure widespread adoption.
4. Schedule Feasibility: Determines if the project can be completed within a reasonable
timeframe. XYZ Co. must ensure minimal business disruption during deployment.
5. Legal Feasibility: Ensures compliance with data protection and IT regulations.
A positive result in all areas would support moving forward with the MIS implementation.
Q3(a): Decision Rules of the Payoff Matrix – Maximin vs. Maximax
Payoff Matrix is a tool used in decision theory to evaluate different alternatives under
conditions of risk or uncertainty.
Decision Rules:
1. Maximax (Optimistic Approach):
o Select the alternative with the maximum possible payoff.
o Focuses on the best-case scenario.
o Suitable for risk-takers.
o Example: If Alternative A can yield ₹100,000, B ₹200,000, and C ₹150,000 —
Maximax chooses B.
2. Maximin (Pessimistic Approach):
o Select the alternative with the best among the worst payoffs.
o Focuses on minimizing the risk of loss.
o Suitable for risk-averse decision-makers.
o Example: If worst payoffs are A = ₹30,000, B = ₹20,000, C = ₹40,000 —
Maximin chooses C.
Difference:
• Maximax assumes optimism (hopes for the best), while Maximin assumes pessimism
(prepares for the worst).
• Maximax is used when management wants to maximize potential gain.
• Maximin is chosen when avoiding worst-case losses is more critical.
Diagram (Simplified Payoff Matrix):
Alternatives Worst Payoff Best Payoff
A 30,000 100,000
B 20,000 200,000
C 40,000 150,000
• Maximax: Choose B
• Maximin: Choose C
Q3(b): Types of Decisions & Simon’s Model
Types of Decisions:
1. Structured Decisions – Routine, repetitive, and easily programmable (e.g., payroll
processing).
2. Unstructured Decisions – Non-routine, complex, and require judgment (e.g., product
launch).
3. Semi-structured Decisions – Combine both (e.g., budgeting, marketing strategies).
Simon’s Model of Decision-Making (Herbert A. Simon):
Simon proposed a model with four phases:
1. Intelligence – Gathering and analyzing data to identify problems or opportunities.
2. Design – Developing possible solutions or alternatives.
3. Choice – Selecting the most appropriate solution from alternatives.
4. Implementation – Putting the chosen solution into action and monitoring results.
Example: In sales forecasting:
• Intelligence: Collect past sales data.
• Design: Create forecasting models.
• Choice: Choose the most accurate model.
• Implementation: Apply the model to predict future sales.
This model is widely used in MIS design as it emphasizes rational, data-driven decision-
making and aligns with system development.
Q4 (a): Financial Information Systems
Financial Information Systems (FIS) are computer-based systems that manage and process
financial data. These systems provide managers with timely, relevant, and accurate financial
reports and analysis.
Components:
• General ledger
• Accounts payable/receivable
• Payroll systems
• Budgeting modules
• Financial forecasting tools
Benefits:
• Enhances accuracy of financial records.
• Improves compliance with financial regulations.
• Facilitates strategic planning and budgeting.
• Supports decision-making with real-time data.
Example: ERP software like SAP or Oracle Financials are widely used FIS.
Q4 (b): Matrix of Functional Subsystems and Management Activities
This matrix maps functional areas of business (like marketing, finance, HR, production)
against managerial activities (strategic planning, tactical control, operational control).
Function \ Activity Strategic Planning Tactical Control Operational Control
Marketing Market Expansion Pricing Strategy Sales Reporting
Finance Capital Budgeting Budget Control Invoice Processing
HR Workforce Planning Training Payroll
Production Plant Location Production Plan Quality Checks
This matrix helps in designing information systems aligned with managerial
responsibilities and ensures comprehensive data flow across levels.
Q4 (c): Decision Table
A Decision Table is a structured method for representing complex decision logic based on
conditions and corresponding actions.
Components:
• Conditions: Inputs or decision factors.
• Actions: Possible outcomes or responses.
• Rules: Combinations of conditions leading to actions.
Example: Loan Approval
Conditions Rule 1 Rule 2 Rule 3 Rule 4
Credit Score > 750 Y Y N N
Income > ₹50,000 Y N Y N
Action: Approve Loan Yes No No No
Used widely in decision support systems (DSS) for clear rule-based programming and logic
handling.
4 D) Proposal definition
A proposal definition using the life cycle approach to application system development
refers to the initial stage in the Systems Development Life Cycle (SDLC) where the need
for a new or enhanced information system is formally identified, evaluated, and proposed for
further development.
Key Explanation:
1. Life Cycle Approach:
This is a structured, phased methodology used to plan, develop, test, deploy, and maintain
information systems. The standard phases include:
• Planning
• Analysis
• Design
• Development
• Implementation
• Maintenance
2. Proposal Definition Stage:
This occurs at the very beginning of the SDLC (usually part of the Planning phase). The
focus here is on:
• Identifying business needs or problems.
• Evaluating existing systems or workflows.
• Defining clear objectives for a new system.
• Estimating resources (time, budget, manpower).
• Assessing technical and operational feasibility.
• Producing a project proposal document, often called a system proposal.
3. Purpose:
The goal is to provide decision-makers with enough information to determine whether to
proceed to a more detailed feasibility study or move into full system development.
Components of a Proposal in the Life Cycle Approach:
• Problem Statement
• Objectives of the proposed system
• Preliminary system requirements
• Cost-benefit analysis
• Risk assessment
• Development schedule
• Recommendation
Question Paper 2023-25 END SEM
Q1.
(a) Define Management Information Systems (MIS) and explain its components.
Management Information Systems (MIS) is an integrated system that gathers, processes,
stores, and disseminates information to support managerial roles in an organization. It helps
managers make strategic, tactical, and operational decisions by providing timely and accurate
information. MIS bridges the gap between raw data and decision-making.
Components of MIS:
1. Hardware: Includes computers, servers, networking devices, and other physical tools
that support data processing and communication within MIS. These form the
infrastructure needed for system operations.
2. Software: Encompasses the programs and applications used for data processing and
reporting. It includes both system software (like operating systems) and application
software (like databases).
3. Data: The most vital resource in MIS. It includes all the raw facts and figures that are
processed into meaningful information for decision-making.
4. People: Users who interact with the system including IT staff, system analysts, and
end users. They manage operations, input data, and utilize outputs for decision-
making.
5. Processes: Procedures and rules that govern how data is collected, processed, and
distributed. Efficient processes ensure accuracy and speed in information generation.
(b) List the different types of decisions. Explain the stages of the Decision-Making Process.
Types of Decisions:
1. Strategic Decisions: These are long-term and impact the overall direction of the
organization. For example, entering a new market or launching a new product line.
2. Tactical Decisions: These are medium-term and usually deal with resource allocation
or departmental planning. For instance, budgeting or hiring plans.
3. Operational Decisions: These are short-term and routine, often taken by lower-level
managers or automated systems. An example is scheduling shifts or ordering
inventory.
Stages of Decision-Making Process:
1. Intelligence: Recognizing and defining the problem or opportunity by collecting and
analyzing relevant data.
2. Design: Developing various alternatives and analyzing them for feasibility, cost, and
benefits.
3. Choice: Selecting the best alternative among the available options based on criteria
and analysis.
4. Implementation: Putting the chosen solution into action through planning and
resource allocation.
5. Monitoring: Assessing outcomes and feedback to ensure that the decision is effective
and making adjustments if needed.
Q2. (a) What are the different types of Computer Network Security threats? Explain
with examples.
Computer network security threats refer to risks that can harm the confidentiality, integrity, or
availability of data and systems. These threats can be internal or external and vary in their
complexity and impact.
1. Viruses and Worms: Malicious software that replicate themselves and spread across
systems. For example, the "ILOVEYOU" virus infected millions of computers via
email.
2. Phishing Attacks: Fake emails or websites trick users into revealing personal or
financial information. Attackers mimic trusted sources to steal credentials.
3. Denial of Service (DoS) Attacks: Overload a server or network with excessive
requests, making services unavailable to legitimate users. A common example is
flooding a website with traffic.
4. Man-in-the-Middle Attacks: The attacker secretly intercepts communication between
two parties, altering or stealing data. This often happens over unsecured Wi-Fi
networks.
5. Ransomware: Malware that encrypts user data and demands payment for decryption
keys. WannaCry was a global ransomware attack that affected hospitals and
corporations.
(b) List the decision rules of the Payoff Matrix. Differentiate between 'Expected Value' and
'Maximin'.
Decision Rules in Payoff Matrix:
1. Maximin Rule: Choose the decision with the best worst-case outcome. It’s useful for
risk-averse individuals.
2. Maximax Rule: Choose the decision with the best possible outcome. Suitable for risk-
takers.
3. Minimax Regret Rule: Focuses on minimizing the maximum regret one might face
after the decision.
4. Expected Value Rule: Multiply each payoff by the probability of its corresponding
state and sum them up to choose the option with the highest expected return.
Difference between Expected Value and Maximin:
• Expected Value is a probabilistic approach, useful when probabilities of outcomes are
known. It balances all outcomes based on their likelihood.
• Maximin is a conservative strategy, focusing on the best of the worst-case payoffs. It
is used when probabilities are unknown or when one prefers guaranteed safety over
potential gain.
• Expected Value vs Maximin:
Criterion Basis Use Case
Expected Value Probability-weighted avg Risk-neutral decisions
Maximin Best of worst outcomes Risk-averse decisions
• Diagram:
Simple payoff matrix:
Decision State A State B EV
D1 40 20 30
D2 30 30 30
D3 50 10 30
Q3. Build a decision tree using the provided dataset. Identify the best attribute to split
and draw the full tree.
To build the decision tree, we apply the ID3 algorithm which selects attributes based on
highest information gain. We calculate the entropy for the entire dataset and for each
attribute, then choose the one with the highest information gain as the root.
Step-by-step Process:
1. List all attributes: Weather, Parents, Cash, Exam.
2. Calculate the entropy for the overall decision class.
3. Calculate entropy for each attribute split.
4. Choose the attribute with the highest information gain.
5. Repeat recursively for branches until decisions are pure.
Assume that 'Weather' provides the highest gain. The simplified decision tree is:
This tree correctly classifies each record in the dataset. The process of selecting attributes can
also be refined using Gini index or other metrics.
Q4. (a) Write a Feasibility Assessment Report to implement RFID-based classroom
attendance monitoring system.
Feasibility Assessment Report:
• Objective: To implement an automated RFID-based system that records student
attendance in real time to replace manual roll calls.
• Technical Feasibility: RFID readers and tags are readily available and easy to
integrate with existing systems. The university network supports the technical
infrastructure required.
• Economic Feasibility: Initial investment in RFID hardware is offset by reduced
administrative costs and improved productivity. Long-term cost-benefit analysis
shows positive ROI.
• Operational Feasibility: Easy to train staff and students to use the system. The RFID
cards can be incorporated into existing student ID cards, minimizing resistance to
change.
• Schedule Feasibility: The project can be implemented in phases over 2–3 months
including testing and training.
(b) Prepare a Data-Flow Diagram (DFD) of an accounts section (hill processing) of a small
manufacturing organization.
Level 1 DFD:
This DFD shows how payroll and vendor payments are processed through the accounting
department.
Q5. Write short notes on any three of the following:
(i) Virtual Try-On: Virtual Try-On is an augmented reality (AR) application that allows users
to preview how clothes, glasses, or cosmetics will look on them without physically trying
them on. It enhances customer experience in e-commerce by increasing engagement and
reducing return rates. Brands like Lenskart and Sephora use this to simulate product usage
before purchase.
(ii) Human Resource Information System (HRIS): HRIS is a software system that manages
all HR functions such as recruitment, payroll, training, performance evaluation, and
employee data management. It streamlines administrative tasks and enables better decision-
making by providing accurate data and analytics. It also ensures compliance with labor laws
and improves communication.
(iii) IoT Applications in Healthcare Industry: IoT devices in healthcare include wearable
monitors, smart beds, and remote diagnostic tools. These devices collect patient data in real
time, allowing doctors to monitor conditions and intervene early. This reduces hospital
readmissions, enables home care, and enhances patient safety. Examples include smart insulin
pumps and ECG monitors.
(iv) ERP Systems: Enterprise Resource Planning (ERP) systems integrate all functional areas
of an organization into a single platform including finance, HR, production, and inventory. It
promotes information sharing, eliminates redundancy, and improves process efficiency.
Leading ERP systems include SAP, Oracle, and Microsoft Dynamics.
Q1 a. Types of Information Systems & Difference between DSS and MIS
Types of Information Systems:
1. Transaction Processing System (TPS): Handles day-to-day transactions like billing,
payroll.
2. Management Information System (MIS): Provides regular reports for middle
managers using data from TPS.
3. Decision Support System (DSS): Helps in decision-making using data analysis tools
and models.
4. Executive Support System (ESS): Used by top-level executives for strategic
decisions.
5. Office Automation System (OAS): Supports daily office tasks like email, word
processing.
6. Knowledge Management System (KMS): Helps in storing and sharing
organizational knowledge.
7. Enterprise Resource Planning (ERP): Integrates all departments into one system.
Difference between DSS and MIS:
Feature MIS DSS
Purpose Regular reports Helps in solving unstructured problems
User Middle-level managers Analysts, senior managers
Data Used Internal Both internal and external
Output Summary reports Interactive analysis and simulation
Tools Predefined reports Models, what-if analysis, forecasting
Q1 b. Types of Decisions & Simon’s Model
Types of Decisions:
1. Structured Decisions: Routine, repetitive (e.g., payroll).
2. Unstructured Decisions: Unique, require judgment (e.g., entering a new market).
3. Semi-Structured Decisions: Mix of both (e.g., inventory control).
Simon’s Model of Decision-Making:
1. Intelligence Phase: Identify the problem.
2. Design Phase: Generate possible solutions.
3. Choice Phase: Select the best solution.
4. Implementation Phase: Apply the decision.
1. What is Computer Network Security?
Computer Network Security means protecting the data, systems, and resources of a
computer network from unauthorized access, misuse, or attacks.
In Simple Words:
Just like we lock our doors at home to keep strangers out, network security keeps hackers,
viruses, and unauthorized users away from our computers and data.
2. Key Objectives of Network Security: CIAA
Objective Explanation (in simple terms)
Confidentiality Keeping your data secret and safe from unauthorized people
Integrity Ensuring that data is not changed or tampered with
Availability Making sure systems and data are always accessible when needed
Authentication Making sure the right person is accessing the system
Non-repudiation The sender cannot deny sending the message
3. Common Network Security Tools and Techniques:
Tool/Method What it Does (Simple Explanation)
Firewall Acts like a security guard that filters what goes in
and out
Antivirus software Finds and removes viruses and malware
Encryption Locks your data so only the right person can read it
VPN (Virtual Private Network) Hides your internet activity from outsiders
User ID & Passwords Basic access control system
Multi-Factor Authentication Adds extra steps (OTP, biometrics) for login
(MFA)
4. Example of Network Security in Real Life:
• In a college Wi-Fi network:
o Only students and staff can log in using their ID and password.
o Firewalls block harmful websites.
o Data shared over Wi-Fi is encrypted so no outsider can read it.
5. What is a Control Spreadsheet?
AM
A Control Spreadsheet is a special type of spreadsheet used in auditing and management
to track, control, and verify data accuracy.
Simple Explanation:
It is like a digital checklist or tracking sheet used to:
• Monitor transactions
• Catch errors CV MP
• Prevent fraud
• Verify calculations
EBIDA
Uses of Control Spreadsheets:
Use Case Simple Explanation
Error checking Helps find mistakes in data entry or calculations
Data validation Ensures that only correct values are entered
Audit trails Keeps record of changes and who made them
Budget monitoring Compares actual vs planned budget easily
Inventory control Tracks items sold and restocked
Example:
In a company:
• A control spreadsheet is used to track the daily sales report.
• It automatically highlights entries where sales don’t match stock movement.
• It helps the manager identify errors or fraud early.
• Here’s a simple comparison between Maximin and Maximax decision rules in a
tabular format with 10 key points:
Feature/Point Maximin Decision Rule Maximax Decision Rule
1. Approach Conservative or pessimistic Aggressive or optimistic
Focuses on minimizing possible Focuses on maximizing
2. Strategy
losses possible gains
Chooses the option with the best Chooses the option with the
3. Decision Basis
of the worst outcomes best of the best outcomes
4. Risk Nature Risk-averse Risk-seeking
Uncertain situations with high Situations with high reward
5. Suitable For
risk potential
6. Example
"Play safe" approach "Go big or go home" approach
Behavior
7. Assumption Assumes worst-case scenario Assumes best-case scenario
8. Decision Maker's
Cautious and careful Ambitious and adventurous
Attitude
Guarantees minimum loss or
9. Outcome Aims for highest possible gain
gain
Emergency planning, disaster Venture capital, product
10. Used In
management launches, high-risk investments
Feasibility Assessment Report for Wi-Fi Installation
1. Introduction
This report evaluates the feasibility of installing a Wi-Fi network in a specified area
such as a college campus, office, hospital, hotel, or public space. The goal is to
determine whether the setup is technically possible, economically affordable, and
operationally useful.
2. Objectives of the Project
• Provide high-speed internet access to users.
• Enable smooth communication, e-learning, and online access.
• Improve productivity and digital engagement.
• Support smart devices and IoT (Internet of Things).
3. Types of Feasibility
Type of Meaning (in simple words)
Feasibility
Technical Checks if we have the technology, equipment, and
Feasibility skills to set up Wi-Fi
Economic Checks if the project is affordable and gives value for
Feasibility money
Operational Checks if the Wi-Fi system will work well in the
Feasibility environment and be useful for users
Legal Feasibility Makes sure the setup follows government/telecom
rules and licensing
Schedule Checks if the project can be completed within the
Feasibility required time
4. Technical Feasibility
• Network Design: Planning access points, routers, repeaters, and coverage areas.
• Bandwidth Requirements: Estimating the internet speed needed based on the
number of users.
• Equipment Needed:
o Wi-Fi routers and extenders
o Cables and power supply
o Server/modem
o Switches if needed
• ISP (Internet Service Provider): Selection based on speed, cost, and reliability.
• Backup Options: Power backup (UPS), dual internet lines, etc.
5. Economic Feasibility
Item Estimated Cost (Example values)
Wi-Fi Routers (10 units) ₹50,000
Cabling and Infrastructure ₹20,000
Installation & Configuration ₹10,000
Monthly Internet Charges ₹5,000/month
Annual Maintenance ₹15,000/year
Conclusion: The project is economically feasible if budget allows an initial
investment of around ₹1–1.5 lakhs and monthly running costs.
6. Operational Feasibility
• Ease of Use: Easy login system with password/OTP.
• Maintenance: Regular checks, updates, and technical support team.
• User Access Control: Restrict unauthorized users and set data usage limits.
• Security: Firewalls, encryption, antivirus, and MAC address filtering.
7. Legal Feasibility
• Must register with an authorized ISP.
• Follow TRAI (Telecom Regulatory Authority of India) norms.
• Install firewalls and content filters to prevent illegal usage.
8. Schedule Feasibility
• Project Duration: 2–3 weeks
o Week 1: Planning and purchase
o Week 2: Installation and setup
o Week 3: Testing and training
9. SWOT Analysis
Strengths Weaknesses
Fast communication Initial cost
Wide coverage Maintenance required
Supports digital learning Internet downtime issues
Opportunities Threats
Can expand to more areas Cyber attacks, hacking
Offers smart campus benefits Misuse of network
10. Conclusion
The feasibility assessment shows that installing a Wi-Fi network is both technically
and economically possible, and will benefit users significantly. With proper
planning, security, and maintenance, this project can improve digital access and
productivity.