Top Banner
Extra Questions Unit III Concepts of planning and control Ques 1. What is Total quality management (TQM)? Ques 2. What are the different levels of management? Ques 3. Why is planning important for Information systems? Ques 4. What is organizational planning? Ques 5. What is a business model? What are the components of a business model? Ques 6. What is Information technology architecture for any business? Ques 7. Discuss system analysis and design Ques 8. Discuss MIS development procedure Ques 9. Discuss quality in Information systems Ques 10. Discuss acquisition of hardware, software and services for Information systems Ques 11. Discuss computer peripherals and storage devices available Ques 12. Discuss software available for IS development Ques 13. What are structured and unstructured decisions? What are programmable and un-programmable decisions? Ques 14. What is Information system audit? Ques 15. Briefly discuss the planning process. Discuss the three stage model of the planning process Ques 16. Discuss computational support for planning Ques 17. Why is control important for management Ques 18. Discuss different types of control. Ques 19. What is feedback and why is it important? Ques 20. Discuss the factors to be considered for Information system organization? Ques 21. Discuss NOLANs four and six stage model Ques 22. Discuss the content of IS master plan Ques 23. Discuss post audit evaluation of IS applications Ques 24. How do you determine the IS requirements?
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Unit Iii

Extra Questions Unit III

Concepts of planning and control

Ques 1. What is Total quality management (TQM)?Ques 2. What are the different levels of management?Ques 3. Why is planning important for Information systems?Ques 4. What is organizational planning?Ques 5. What is a business model? What are the components of a business model?Ques 6. What is Information technology architecture for any business?Ques 7. Discuss system analysis and designQues 8. Discuss MIS development procedureQues 9. Discuss quality in Information systemsQues 10. Discuss acquisition of hardware, software and services for Information systemsQues 11. Discuss computer peripherals and storage devices availableQues 12. Discuss software available for IS developmentQues 13. What are structured and unstructured decisions? What are programmable and un-

programmable decisions?Ques 14. What is Information system audit?Ques 15. Briefly discuss the planning process. Discuss the three stage model of the planning

processQues 16. Discuss computational support for planningQues 17. Why is control important for managementQues 18. Discuss different types of control.Ques 19. What is feedback and why is it important?Ques 20. Discuss the factors to be considered for Information system organization?Ques 21. Discuss NOLANs four and six stage modelQues 22. Discuss the content of IS master planQues 23. Discuss post audit evaluation of IS applicationsQues 24. How do you determine the IS requirements?

Page 2: Unit Iii

Answers

1-9. Quality in Information Systems

An application has quality relative to its primary and secondary users, operations personnel, control personnel, maintenance personnel, and so forth. Ensuring continuous quality in IS throughout development process is called Total quality management. TQM is a strategic approach to business improvement.Quality in information systems has a number of characteristics. The importance of each depends on the application and its context. The following are some of the characteristics included in the concept of quality in information systems:Complete Data All data items are captured and stored for use. Data items are

properly identified with time periods.Accurate data The correct data values are recordedPrecise data Measurement of variables meets user needs for precisionUnderstandable output The output of the system is understandableTimely output The output of the application is available in time for actions and

decisionsRelevant output The outputs are relevant to the actions and decisions to be takenMeaningful output The format, labelling, data provided, and context in which data is

presented makes the output meaningful for actions and decisionsUser friendly operation The system provides user interfaces that are understandable and

designed to confirm to human capabilitiesError resistant operations Suitable error prevention and detection procedures are in place.

There are procedures for reporting and correcting errors. Various audit procedures are applied.

Authorized use Only authorized personnel have access to facilities, applications and data

Protection system and operations

The system and its operations are protected from various environmental and operational risks. There are provisions for recovery in the event of failure or destruction of part or all of the system.

The role of top management in information system quality control is to establish the overall organization structure, select the information system executive, approve the information system plan and budget, and evaluate performance.

2. Top level-Strategic management Middle management –Tactical Operational management-Operating management

3-4. Planning is an ongoing organizational function that provides the framework for operational activities and decision making. The organization mission is translated into operational objectives through an organizational hierarchy of planning activities. Formal organizational planning focuses the energies and activities of the organization on achievement of its objectives, to reconcile

Page 3: Unit Iii

differences in objectives and plans of subareas and individuals within the organization, and to remove doubts about what organization should do. Thus planning can help in motivation

5. A business model is a conceptual framework that expresses the underlying economic logic and system that prove how a business can deliver value to customer at an appropriate cost and make money. Components of business model are:Components QuestionsCustomer value How is the firm offering its customers something distinctive at lower

cost using ITScope To which customer is the firm offering this valuePricing How does the firm price the valueRevenue resource Where do the revenues come fromConnected activities Set of activities to be performedImplementation What organizational structure, people, systems and environment is

needed by people to carry out these activitiesCapabilities What are the capabilities or lack in capabilities of firmSustainability What keeps the firm in a strategic advantage It is a valuable tool because it focuses attention on how all the essential components of a business fit into a complete system. On the basis of such business models, new strategies can be built during the planning phase.

6. It architecture is created by the strategic/ IT planning process and includes the following major components:

Technology platform consists of the networks, computer systems, software, applications Data resources include databases, warehouses etc. Application architecture is the architecture of the implemented system which may be cross

functional such as ERP, CRM etc. IT organization is the organizational structure for IS specialists

7. System Analysis and design is performed before the system is actually implemented. It forms the basis for implementation and gives direction to the system implementation.Steps in System Analysis and Design

1. Need for information (Nature of information)2. Define the system (Nature of system)3. Feasibility study (Technical, Economic, Operational)4. Detailing the requirements (Precise requirements)5. Conceptual System Design (Input, Process, Output)6. Detailing the System design (DFDs, Data flows)7. Structuring the system design (Hierarchy)8. Conceptual model of computer system (processes) 9. Break the system in programmable modules10. Develop the test data for checking the system ability11. Install the system12. Implementation13. Review and maintenance

Page 4: Unit Iii

8. Depending upon uncertainty level about the requirements gathered the development strategy is selected. Following four strategies are discussed.

1. Acceptance assurance strategy is applied when the requirements are complete and correct. Once the requirements are gathered they are implemented in the system.

2. Linear assurance process starts with requirement gathering and in each subsequent stage there are assurance checks to confirm correct implementation

3. Iterative assurance process goes ahead like other methods, but whenever there is a need to improve the requirements, it goes back to the first stage, thus being called iterative.

4. Experimental assurance process creates a prototype (a demo version) and then builds the whole system on its basis, if it gets approved.The implementation activities include:

1. Acquisition of hardware and software2. Software development3. End user training4. System documentation5. Conversion of system (Application in the organization)

10. Companies evaluate the hardware and software required for IS implementation, before they acquire it. First the requirements are laid down in a request for quotation document. Basic performance requirements are stated and quotations received for the product. Several companies use a scoring system for evaluating multiple proposals. Independent hardware and software information services can be used to gain detailed specifications. It should be ensured that hardware is safe to use and technically competent. Software used should be reliable and compatible. Services are generally provided with purchase of new hardware and software.

11. Review of Hardware and Software TechnologiesPeripherals is the generic name given to all input, output and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of a computer system.Input technologies

1. Keyboard2. Pointing devices

1. Electronic mouse2. Trackball 3. Touchpad 4. Pointing stick5. Touch screens use infrared beam, sound waves, or a slight electric current that is

broken when the screen is touched3. Handwriting recognition through pen-based computing. PDAs have a pressure sensitive layer

like a graphics pad under their slate like liquid crystal display screen.4. Speech recognition systems digitize, analyze, and classify your speech and its sound

patterns. The software compares your speech patterns to a database of sound patterns in its vocabulary and passes recognized words to your application software.

5. Optical scanning devices read text or graphics and convert them into digital input for your computer. Another technology is optical character recognition.

6. Magnetic stripe

Page 5: Unit Iii

7. Smart cards8. Digital cameras9. Magnetic ink character recognition detects iron oxide-based ink

Output Technologies1. Video output

1. Video monitors use a cathode ray tube technology 2. Liquid crystal displays (LCDs)

2. Printed output1. Inkjet printers spray ink onto a page one line at a time.2. Laser printers use an electrostatic process similar to a photocopying machine.

Storage1. Magnetic tape records data in the form of magnetized spots on the iron oxide coating of the

plastic tape. 2. Magnetic disks contain metal disks that are coated on both sides with an iron oxide

recording material. Several disks are mounted together on which data is stored in the form of tiny magnetized spots to form the binary digits

1. Floppy disks2. Hard disk drives3. RAID (redundant arrays of independent disks)

3. Optical disks are used by business for image processing1. CD-ROM use a laser device to read the binary codes created by burning microscopic

pits in a spiral track by laser2. CD-R records permanently3. CD-RW use magneto optical technology4. DVD5. DVD-ROM6. DVD-RAM

12.SoftwareTypes of programming languages

1. Machine language/ Ist generation language: It is a series of 0s and 1s2. Assembler language/ IInd generation language: It uses mnemonic names for

operations3. High level language/ IIIrd level language: Instructions are in the form of statements

which are compiled or interpreted before being executed4. Fourth level languages are more non-procedural with simpler syntax5. Object oriented language

Classification of software1. Application software which performs processing for end user2. System software that supports operations of computer networks and systems

Types of software1. Software suites are two or more packages bundled together e.g. Microsoft office, Lotus

notes suite2. Software packages are a combination of some functions of several programs e.g. Microsoft

works3. Web browsers enable easy use of internet4. E-mail is a way of communicating with people5. Word processors e.g. Microsoft word

Page 6: Unit Iii

6. Electronic spreadsheets e.g. Microsoft excel7. Presentation graphics e.g. Microsoft PowerPoint8. Database management systems (DBMS)9. Technologies for multimedia10. Personal information managers e.g. lotus notes11. Operating systems12. Model generators facilitate the development of models and DSS. It includes programming

language, spreadsheets, and statistical packages. A good model generator should have easy usability, access t o wide variety of data and analysis capability.

13. Model Base Management Systems (MBMS) manage models and analysis programs in much the same way as the DBMS manages data.

13. Structured decisions are the ones that involve a methodological process for decision making and a lot of experience is available for such decision making. Established models can be followed for making such decisions. But some decisions are not structured and require personal judgement and intuition. These decisions are based on the decision maker’s values and perception. It is difficult to build a system which can replicate such decision making. Similarly programmable decisions can be modelled whereas non-programmable decisions cannot be replicated.

14. Auditors evaluate the Information systems against the laid down standards. Auditors specializing in IS audits are called EDPs. External auditors study and evaluate the internal control. Their evaluation process consists of the following steps:

1. Preliminary phase of review which forms the guideline for the rest of the review 2. Complete the review with a detailed study of the other control system3. Obtain evidence to the compliance of existing system4. Evaluation of the evidence

Internal auditors are the employees of the company and provide the controlling activities for the system. They report to the managers and participate in post audit evaluation, periodic tests of security and backup procedures.

15. Three stage model of the planning process

• It clarifies the generic planning activities, the order of activities, and the alternative techniques and methodologies that apply

Page 7: Unit Iii

16. Computational support for planning There are four types of computational support needed for the analysis preparatory to planning, the preparation of plan, and the output of results.

1. An analysis of historical data 2. Projections and forecasts for estimating future values3. Computations internal to the plan and computations required for outputs4. Organized output of results

Historical data analysisTime trend analysis states the past trend over time for a particular quantity such as sales growth over the past 5 years. Correlation analysis finds the degree of association between two sets of data. Data description and dispersion using mean, median, mode and standard deviationHistorical Extrapolation TechniquesIt involves combining past data analysis with planning. Time series extrapolation would state that if past growth rate of data has been 5%, then it will be the same the next year as well. Similarly on the basis of regression analysis we can assume the past patterns to maintain themselves. Similarly percentages and ratios can be calculatedFinancial Planning ComputationsRate of return, Break even analysis etc can be calculated

17. Managerial control implies the measurement of accomplishment against the standard and the correction of deviations to assure attainment of objectives according to plans.

It is a continuous process of verifying whether actions are being taken as planned and taking corrective action to ensure that events conform to plans as closely as possible.

Planning is meaningless without control and control is aimless without planning. Control helps understand the need for revision of plans if required.

18. Information feedback systemsOpen and closed loop

Information feedback is essential to an understanding of the self regulating nature of systems in general and how this attribute can be applied in a MIS to aid in decision making

Page 8: Unit Iii

Control and feedback

Feed-forward control

These models of control can be implemented in IS and the reports generated can be used to find deviations from plans

19. Once the plan has been implemented, it is important to see if it is being implemented or operated in the right manner and it serves the business purpose correct. For this we evaluate the system frequently and send reports in the form of feedback to the system. Feedback is important because it helps in knowing the current position of business. Feedback that helps dampen and reduce fluctuations around the standard is termed negative feedback and the feedback that reinforces the direction in which the system is moving is called positive feedback.

20. Major issues are:

• Centralization and Decentralization• Allocation of hardware and software• Maintenance of the service level• Fitting the organization of the MIS in corporate organization, its culture and management

philosophy

21. Information system growth modelsAssumptions of NOLAN model

• Organizational learning• Stages cannot be skipped• Other than the natural process, these processes can be planned, coordinated, and managed

to move through the stages effectively and efficiently

• The NOLAN stage modelThe organization must go through each stage of growth before it can progress to the next one, thus giving an insight to planning regarding the stage of an ISStages of Information system growth

Page 9: Unit Iii

Stages of growth Description

Initiation Early use

Expansion Experimentation, rising cost

Formalization Organizational controls

Maturity Integration of applications

Stages

NOLAN six stage model

Stage Level of control or slack

I Low control. Some slack. No planning

II Greater slack due to encouraged use, integration and lack of planning

III High controls, planning given importance

IV Use of databases for integration

V Slack due to focus on strategically important systems

VI Application portfolio complete and matches organizational objectives

NOLAN alternative modelDue to technological changes the growth curve shifts as follows

Page 10: Unit Iii

Advantages and disadvantages of NOLAN model• Advantages

– Evolutionist model as it focuses on development• Disadvantages

– Lack of specificity as it does not define the mechanism for change

22. Content of Master development plan/ Information System plan/ Information Resource planThe master plan has two components:- a long-range plan and a short-range plan. The long-range plan provides general guidelines for direction and the short-range plan provides a basis for specific accountability as to operational and financial performance. It consists of the following subheadings:-

– Information system goals, objectives, and architecture– Inventory of current capabilities– Forecast of developments against the plan– The specific plan

1. Information system goals, Objectives, and architecture – Organizational goals, objectives, and strategies– External environment (industry, government regulations, customers, and suppliers)– Internal organizational constraints such as management philosophy– Assumptions about business risks and potential consequences– Overall goals, objectives, and strategy for the information system– Architecture of the information system

2. Current capabilities – Inventory of

– Hardware– Software (System software, DBMS, etc)– Application systems (classified on the basis of functional systems,

organizational strategy, maintenance need)– Analysis of

– Expense– Hardware utilization– Software utilization– Personnel utilization (further classification such as job, skill, functional area)

– Status of projects in progress– Assessment of strengths and weaknesses

3. Forecast of developments Affecting plan

Page 11: Unit Iii

– Hardware and software technological availabilities should be forecasted with expected impact on existing IS

– Methodology changes should be forecasted– Environmental developments such as government regulations, tax laws and

competitors affecting IS should be stated 4. Specific plan

– Hardware acquisition schedule– Purchased software schedule

• System Software• Applications software

– Application development schedule– Software maintenance and conversion schedule– Personnel resources required and schedule of hiring and training– Financial resources required by object of expenditure

The master plan is prepared from the CIO’s point of view and focuses on the planning strategy e.g. if the planning strategy for consideration is the end-user computing, then the plan will highlight the end users in the IS.

23. Post audit evaluation of IS Applications The audit group reviews the objectives and cost-benefit representations made on behalf of the project and compare them with actual performance and actual costs. It also reviews the operational characteristics, documentation, backup and maintainability considerations. Control and security provisions are examined. The results of post audit evaluation are used for improving profitability, reference for future projects, replacing of application if no longer useful. The system is evaluated on technical, operational and economic basis. The existing hardware and software is also evaluated using monitors that detect performance, idle resources, bottlenecks and load imbalance. Also system logs can be made that provide important information for evaluation such as job times, problems with reruns etc.

24. Analysis of Organizational information requirements

• Information requirements are required at the organizational level for information system planning, identifying applications, and planning an information system architecture.

• More detailed information requirements are required for detailed design of applications.Strategy approach to the determination of Information requirements

• Constraints– Humans as information processors– Variety and complexity– Complex patterns of interaction– Unwillingness of some users

• Levels of requirements– Organizational level requirements help in making the master plan. The overall

information architecture and the boundaries and interfaces of the individual application subsystem are defined.

– Database level requirements define the data associated with organizational processes.

– Detailed requirements for an application (social and technical) are based on the needs of tasks or jobs.

Page 12: Unit Iii

Steps:

Identify those characteristics of the four elements in the development process that affect uncertainty in the determination of information requirements

– Utilizing system (Identify the existing business systems)– Information system or application (Identify the existing information systems)– Users (Identify the existing users)– Analysis

• Evaluate the effect of the characteristics of the four elements in the development process on three process uncertainties: (Which of these can be relied for collecting information)

– Existence and availability of a set of usable requirements– Ability of users to specify requirements– Ability of analysis to elicit and evaluate requirements

• Evaluate the combined effect of the process uncertainties on overall requirements uncertainty

• Select a primary strategy for requirements determination based on the overall requirements uncertainty.

– Asking• Closed questions• Open questions• Brainstorming• Guided brainstorming• Group consensus

– Deriving from an existing information system• Existing system being replaced by the new system• Existing system in another , similar organization• Proprietary system or commercial package• Descriptions in textbooks, handbooks, industry studies etc.

– Synthesizing from characteristics of the utilizing system• Normative analysis (normal or general requirements of any system)• Strategy set transformation (organizational requirements)• Critical factors analysis approach (critical success factors CSFs)• Process analysis (Business systems planning BSP) studies the business

processes to understand the underlying requirements• Ends-means analysis distinguishes inputs from outputs and identifies both

by interacting with the managers• Decision analysis identifies the information required for decision making• Socio-technical analysis• Input-process-output analysis

– Discovering from experimentation with an evolving information system i.e. build a sample program and understand from that system.

• Select one or more methods from the set of methods to implement the primary strategy