BSc (Hons) Business Management Information System & Big Data Analysis Exam Paper
Verified
Added on 2023/06/08
|12
|3079
|141
AI Summary
This exam paper is for BSc (Hons) Business Management Information System & Big Data Analysis course. It covers topics like McAfee, MS Office, decision support systems, cloud computing, and IoT. The paper discusses the advantages and disadvantages of each system.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
BSc (Hons) Business Management WITH FOUNDATION SEMESTER 1, EXAMINATION 2021/22 NFORMATION SYSTEM & BIG DATA ANALYSIS MODULE NO: BMP4005 Exam Paper Release Date & Time: Saturday 06 August 2022 at 10:00am Submission Cut-off Date & Time: Monday 08 August 2022 at 10:00am --------------------------------------------------------------------------------------------------------------- ANSWER BOOKLET All the pages of the answer booklet should be submitted including blank ones. Please type your answers in the spaces provided. Insert additional pages where required. Student Name ID Number
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents SECTION A.....................................................................................................................................1 Answer to the Question no. 1(i).............................................................................................1 Answer to the Question no. 1(iv)...........................................................................................2 Answer to the question no. 2 (i).............................................................................................2 Answer to the question no. 2 (ii)............................................................................................2 Answer to the question no. 2 (iii)...........................................................................................2 Answer to the question no. 2 (iv)...........................................................................................2 Answer to the question no. 2 (v)............................................................................................2 Answer to the question no. 3..................................................................................................2 SECTION B.....................................................................................................................................3 Answer to the question no. 1 (i).............................................................................................3 Answer to the question no. 1 (ii)............................................................................................3 REFERENCES................................................................................................................................4
SECTION A Answer to the Question no. 1(i) McAfee: With McAfee ePO programming, IT heads can bring together security the board across endpoints, organizations, information, and consistence arrangements from McAfee and outsider arrangements. McAfee ePO programming gives adaptable, mechanized administration abilities so you recognize, make due, and answer security issues and dangers. McAfee ePO programming helps drive down the expense and intricacy of overseeing security. For more data about McAfee ePO highlights, read the item information sheet. McAfee's product is all evolved utilizing the Agile or Continuous Integration/Continuous Delivery (CI/CD) technique(Sakazi and et. al., 2022).These dexterous and CI/CD practices are alluded to as the Agile Software Development Lifecycle (SDLC). The Waterfall philosophy is not generally utilized inside McAfee. At McAfee, the SDLC is alluded to inside as the Product Lifecycle Framework (PLF) v2.TheMcAfeeePOserveristhefocalprogrammingstorehouseforallMcAfeeitem establishments, refreshes, and other substance. The secluded plan of ePolicy Orchestrator permits new items to be added as augmentations. This incorporates new or refreshed variants of McAfee and McAfee-viable arrangements from the Security Innovation Alliance. ePolicy Orchestrator likewiseconsidersreplicationtodispersedarchivesatfaroffareasfortransferspeed improvement. The ePolicy Orchestrator System Tree sorts out oversaw frameworks in units for observing, relegating approaches, booking errands, and making moves. Answer to the Question no. 1(iv) MS Office: Aside from Facebook, the main program that anybody has on his/her PC is Microsoft Office. Microsoft Office is the world's most famous and strong efficiency suite for learning, confidential utilizing, and office work. Microsoft Office before Office 2007 utilized exclusive document designs in light of the OLE Compound File Binary Format. This constrained clients who share information to embrace a similar programming stage. In 2008, Microsoft made the whole documentation for the double Office designs uninhibitedly accessible for download and allowed any potential licenses privileges for use or executions of that twofold configuration for nothing under the Open Specification Promise. Beginning with Office 2007, the default document design has been a form of Office Open XML, however not quite the same as the one 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
normalized and distributed by Ecma International and by ISO/IEC. Microsoft has allowed patent privileges to the organizations innovation under the Open Specification Promise and has made accessible free downloadable converters for past variants of Microsoft Office including Office 2003, Office XP, Office 2000 and Office 2004 for Mac OS X. Outsider executions of Office Open XML exist on the Windows stage (LibreOffice, all stages), macOS stage (iWork '08, NeoOffice, LibreOffice) and Linux (LibreOffice and OpenOffice.org 3.0). Also, Office 2010, Service Pack 2 for Office 2007, and Office 2016 for Mac upholds the Open Document Format (ODF) for opening and saving archives - just the old ODF 1.0 is upheld, not the 1.2 rendition. Microsoft gives the capacity to eliminate metadata from Office archives. Metadata expulsion was most readily accessible in 2004, when Microsoft delivered a device called Remove Hidden Data Add-in for Office 2003/XP for this reason(Venter and Swart 2018).The income is split between the engineer and Microsoft where the designer gets 80% of the cash. Engineers can impart applications to all Office clients. Answer to the question no. 2 (i) A choice emotionally supportive network (DSS) is an electronic program used to help conclusions, decisions, and game-plans in an association or a business. A DSS filters through and breaks down enormous measures of information, gathering far reaching data that can be utilized to take care of issues and in direction. In associations, a choice emotionally supportive network (DSS) breaks down and combines immense measures of information to aid navigation. Google GPS route planning. A DSS can be utilized to design the quickest and best route plan between two focuses by examining the accessible choices(Jana and et. al., 2022). Penn Medicine Clinical DSS. These frameworks assist clinicians with diagnosing their patients. Penn Medicine has made a clinical DSS that assists it with getting ICU patients off ventilators quicker. Answer to the question no. 2 (ii) An Executive Support System (ESS) is programming that permits clients to change venture information into rapidly open and chief level reports, for example, those utilized by charging, 2
bookkeeping and staffing divisions. An ESS improves decision making for chiefs. Instances of the utilization of ESS are as per the following: Cambridge Systematics, Inc. fabricated an ESS that is coordinated with the growth strategy for the Ministry of Transportation in Canada. ESS predominantly manages information connected with key offices like charging, bookkeeping, planning, staffing and so on(Shadmanova and Azimdjonova, 2022). Answer to the question no. 2 (iii) An exchange transaction process system (TPS) is a data handling framework for deals including the assortment, change and recovery of all exchange information. Qualities of a TPS incorporate execution, dependability and consistency(Petrov and et. al., 2019).TPS is otherwise called real-time processing or transaction process handling. TPS gathers information about exchanges and furthermore starts handling that changes stored information. Models incorporate request handling, representative records, and lodging reservation frameworks. Instances of continuous real-time transaction processes are the retail location terminals (P.O.S) and microfinance advance frameworks. Answer to the question no. 2 (iv) An administration data framework (MIS) is a data framework utilized for navigation, and for the coordination, control, examination, and representation of data in an association(Raadabadi and et. al., 2018).The investigation of the administration data frameworks affects individuals, cycles and innovation in an authoritative setting. MIS addressesregion where latest considerationisbeing engaged. TermsHuman ResourceInformationSystem(HRIS),andHumanResourceManagementSystem (HRMS) are normal. MIS depicts how the PC could be applied to the whole scope of data assortment. 3
Answer to the question no. 2 (v) KSM incorporate the assortment, investigation, scattering, and general administration of all data that is moved within an association(Yaseen and et. al., 2020).A Knowledge Management System does these capabilities and follows best practices to convey ideal outcomes for the association involving it in a proficient and viable way. Urge representatives to question the KMS for without a moment to spare learning. Give replies to usually posed inquiries for client self-administration drives. Answer to the question no. 3 Globalizationalludestothespreadoftheprogressionofmonetaryitems,products, innovation, data, and occupations across public boundaries and societies. In financial terms, it depicts a reliance of countries all over the planet encouraged through streamlined commerce. Globalization is the word used to portray the developing association of the world's economies, societies, and populaces, achieved by cross-line exchange labour and products, innovation, and streams of venture, individuals, and data(Zajda and Majhanovich eds., 2021).Nations have constructed monetary organizations to work with these developments over numerous hundreds of years. The movement towards globalization has been around for quite a long time; however it truly became observable in the mid 1900's with mechanical advances. The message and phone permitted individuals to impart across borders whenever already it would require weeks or months to transfer messages. The creation of the plane considered a lot of faster worldwide travel, while specialized gadgets, for example, the radio permitted individuals all around the globe to pay attention to news from everywhere the world in close to continuous. Data innovation was the driver in making the overall combination of different worldwide business sectors that make up globalization. Ascent of the Personal Computer- The ascent of the Windows-based PC, which advocated individualized computing, killed another significant obstruction that was confining globalization: the breaking point on how much data that an individual could get, creator, alter, and disseminate. Development of the World Wide Web- Before the World Wide Web, we had the web which associated the globe, yet with the World Wide Web people were currently like 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
never before ready to post their own computerized content so that anybody across the globe might be able to see. Computerized, Mobile, Personal and Virtual Movement- More as of late the world has been amassed with computerized cameras, portable PDA's and cell phones alongside private PCs and this is having a significant effect on the movement of globalization. With the developing fame of these kinds of advancements people and organizations can work together with each other all the more much of the time and in such countless more ways than any other time. 5
SECTION B Answer to the question no. 1 (i) Cloud computingis the on-request accessibility of PC framework assets, particularly information capacity and figuring power, without direct dynamic administration by the client (Sunyaev, 2020).Huge mists frequently have capabilities circulated over numerous areas, every area being a server farm. Advantages Back-up and re-establish information: Once the information is put away in the cloud, it is simpler to get back-up and re-establish that information utilizing the cloud. Cloud computingfurtherdevelopscooperationbypermittinggatheringstorapidlyand effectively share data in the cloud by means of shared stockpiling. Lowupkeepcost:Cloudcomputingdiminishesbothequipmentandprogramming support costs for associations. Cloud registering permits us to effectively get to all cloud information through versatile. Limitless capacity limit: Cloud computing offers us a colossal measure of putting away limit with regards to putting away our significant information like records, pictures, sound, video, and so on in one spot. Informationsecurity:Datasecurityisoneofthegreatestbenefitsofdistributed computing. Cloud computing offers many high level elements connected with security and guarantees that information is safely put away and taken care of. Disadvantages Requires Internet Connectivity: As in Cloud computing, each datum (picture, sound, video, and so forth) is put away on the cloud, and we access this information through the cloud by utilizing the web association. Restricted Control: As cloud framework is totally claimed, made due, and checked by the specialist organization, so the cloud clients have less command over the capability and execution of administrations inside a cloud foundation. Security: Although Cloud computing organizations carry out the best security norms to store significant data. Yet, prior to taking on cloud innovation, you ought to know that you will send all your association's delicate data to an outsider, i.e., a distributed 6
computing specialist co-op. While sending the information on the cloud, there might be an opportunity that your association's data is hacked by Hackers. Answer to the question no. 1 (ii) TheIOT(Internet of things) portrays tangible objects with sensors, handling skill, programming, and different advancements that associate and trade information with different gadgets and frameworks over the Internet or different interchanges organizations(Koohang and et. al., 2022). Through which the communication of information among the processes and systems becomes easier Advantages Limit human exertion: As IoT gadgets collaborate and speak with one another, they can computerizetheerrandsassistingwithworkingonthenatureofabusiness' administrations and decreasing the requirement for human mediation. Save time: By lessening the human exertion, it saves a ton within recent memory. Saving time is one of the essential benefits of utilizing the IoT stage. Improved information assortment: Information is effectively open, regardless of whether we are far away from our genuine area, and it is refreshed every now and again progressively. Thus these gadgets can get to data from anyplace whenever on any gadget. Further developed security: If we have an interconnected framework, it can aid the more brilliant control of homes and urban communities through cell phones. It improves security and offers individual assurance. Decreasedutilizationofotherelectronichardware:Electricgadgetsare straightforwardly associated and can speak with a regulator PC, like a cell phone, bringing about proficient power use. Disadvantages Security issues: IoT frameworks are interconnected and convey over networks. In this way, the framework offers little control notwithstanding any safety efforts, and it can prompt different sorts of organization assaults. The IoT framework gives basic individual information in full detail without the client's dynamic support. Theintricacyoftheframework:Theplanning,creating,keepingupwith,and empowering the broad innovation to IoT framework is very convoluted. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Absence of worldwide normalizations: As there is no global norm of similarity for IoT, it is hazardous for gadgets from various makers to speak with one another. High reliance on the web and use of internet: They depend vigorously on the web and can't work actually without it. 8
REFERENCES Books and Journals Jana, S. and et. al., 2022, September. Decision support system (DSS) for hierarchical allocation of resources and tasks for disaster management. InOperations Research Forum(Vol. 3, No. 3, pp. 1-30). Springer International Publishing. Koohang,A.andet.al.,2022.InternetofThings(IoT):Fromawarenesstocontinued use.International Journal of Information Management,62, p.102442. Petrov, I. and et. al., 2019. Hardware-assisted transaction processing: NVM. InEncyclopedia of big data technologies(pp. 934-941). Springer International Publishing. Raadabadi, M. and et. al., 2018. Barriers to the Use of Management Information System (MIS) in theHealthInsuranceOrganizations:ACaseStudyofIran.JournalofHealth Management,20(4), pp.427-438. Sakazi, S. and et. al., 2022. Prioritizing Antivirus Alerts on Internal Enterprise Machines. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 75-95). Springer, Cham. Shadmanova, U. and Azimdjonova, M., 2022, June. Factors affecting the information system in the management of corporations. InAIP Conference Proceedings(Vol. 2432, No. 1, p. 060024). AIP Publishing LLC. Sunyaev, A., 2020. Cloud computing. InInternet computing(pp. 195-236). Springer, Cham. Venter, M. and Swart, A.J., 2018, April. An integrated model for the continuous use intention of Microsoft Office simulation software. In2018 IEEE Global Engineering Education Conference (EDUCON)(pp. 320-329). IEEE. Yaseen, M. and et. al., 2020. Knowledge Sharing Management (KSM) Model in the Context of Global Software Development.i-Manager's Journal on Software Engineering,14(3), p.22. Zajda, J.I. and Majhanovich, S. eds., 2021.Globalisation, cultural identity and nation-building: The changing paradigms(Vol. 5). Dordrecht: Springer. 9