Your contribution can guide someone’s learning journey. Share your
documents today.
SBS Swiss Business School FINALS Course CodeMIS 220Course NameManagement Information Systems Date12.07.2020Time Duration Maximum Marks60 pointsWeight Learning Outcomes Student NameAhmed Rayyan Student IDSBS-180-70166 For Examiner’s Use Only TasksA Marks Allocated60 Marks Obtained Total Points: _______/ 60 points= _________%Grade: 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Management Information Systems Management Information Systems – Finals - 2020 DIRECTIONS: This exam contains: 6 essay questions, each worth 10 points.60 points This exam is worth a total of 60 points. Print your name below. 2
Part A - Essay Questions(10 points each)Answer 6 out of 6 1.What is Database Management System? What are the Advantage and Disadvantage of Database Management System? Explain in detail. 2.What is cloud? What is Cloud computing and the components of Cloud Computing? Explain in detail. 3.What is Deployment Model and Service Model?. 4.What is the role of MIS in today's business? What is the evolution of WEB? Explain in Detail. 5.What is General Data Protection Regulation? Explain in detail. 6.Explain Database System Architectures & Data Model 3
Management Information System Assignment Ahmed Rayyan SBS-180-70166 12 July 2020 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TABLE OF CONTENTS Part A - Essay Questions(10 points each)Answer 6 out of 6 1.What is Database Management System? What are the Advantage and Disadvantage of Database Management System? Explain in detail. Ans.) Database Management System (DBMS) is a product for putting away and recovering clients' information while considering proper safety efforts. It comprises of a gathering of projects which control the database. 5
The DBMS acknowledges the solicitation for information from an application and teaches the working framework to give the particular information. In enormous frameworks, a DBMS assists clients and other outsider programming with storing and recover information. DBMS permits clients to make their own databases according to their necessity. The expression "DBMS" incorporates the client of the database and other application programs. It gives an interface between the information and the product application. The advantages and disadvantages are mentioned below: Advantages of Database Management: 1) DBMS offers an assortment of strategies to store and recover information 2) DBMS fills in as a productive handler to adjust the requirements of various applications utilizing similar information 3) Uniform organization strategies for information 4) Application software engineers never presented to subtleties of information portrayal and capacity. 5) A DBMS utilizes different amazing capacities to store and recover information effectively. 6) Offers Data Integrity and Security 7) The DBMS suggests respectability requirements to get an elevated level of insurance against disallowed access to information. 6
8) A DBMS plans simultaneous access to the information in such a way, that just a single client can get to similar information at once 9) Reduced Application Development Time Disadvantages of Database Management: 1. Cost of Hardware and Software of a DBMS is very high which builds the financial plan of your association. 2. Most database the board frameworks are regularly mind boggling frameworks, so the preparation for clients to utilize the DBMS is required. 3. In certain associations, all information is incorporated into a solitary database which can be harmed in light of electric disappointment or database is adulterated on the capacity media 4. Utilization of a similar program at once by numerous clients in some cases lead to the loss of certain information. 5. DBMS can't perform complex estimations 2.What is cloud? What is Cloud computing and the components of Cloud Computing? Explain in detail. Ans.) Cloud computing has been portrayed as an analogy for the Internet, since the Internet is frequently drawn as a cloud in organize outlines. Utilizing cloud computing, associations and individual clients can utilize Web administrations, database administrations, and 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
application administrations over the Internet, without putting resources into corporate or individual equipment, programming, or programming instruments. Figure outlined underneath portrays the trades between customer PCs and administrations in the cloud. Organizations use Web programs, for example, Microsoft Internet Explorer or Mozilla Firefox to get to applications. As should be obvious, servers store programming and information for organizations. Some huge, entrenched equipment, programming, and counseling organizations, for example, Cisco, Dell, IBM, HP, Microsoft, SAP, and others are making monstrous distributed computing tries, frequently with what are named "virtualized assets." What is unmistakable about these methodologies is their capacity to develop and adjust to changing business needs. That is, they are adaptable to suit developing (or changing) request by clients. The model of "programming as a help," additionally called SaaS, is remembered for the idea of distributed computing. 1.) Client computers: A client computer is a processing gadget that interfaces with a system in one of a few different ways, yet the term ordinarily depicts a PC or workstation PC. Since client computer are associated with systems of different PCs, if an assailant or an infection deals with an arranged PC, it very well may be utilized as a take-off platform to assault any or the entirety of the gadgets on the system. 8
2.) Distributed Servers: A Distributed Servers is an assortment of autonomous parts situated on various machines that offer messages with one another so as to accomplish shared objectives. In that capacity, the Distributed Servers will show up as though it is one interface or PC to the end-client. The expectation is that together, the framework can expand assets and data while failures, as though one framework falls flat, it won't influence the accessibility of the administration. 3.) Datacenters: A Data Center is a physical office that associations use to house their basic applications and information. A Data Center plan depends on a system of figuring and capacity assets that empower the conveyance of shared applications and information. The key segments of a Data Center configuration incorporate switches, switches, firewalls, stockpiling frameworks, servers, and application-conveyance controllers. 3.What is Deployment Model and Service Model?. Ans.)Deployment Model:A deployment model speaks to a particular sort of cloud condition, basically recognized by proprietorship, size, and access. There are four regular cloud arrangement models: Public Clouds Private Clouds and Hybrid Clouds. 9
Public Cloud: A cloud is called public when administrations are rendered by outsider suppliers over a system open for open use, implying that you share a similar equipment, programming, and system gadgets with different customers of a similar supplier (different organizations, for instance). Another significant differentiator between a public cloud and a private one is the duty over the cloud's facilitating and the executives. In an open cloud, since you are just "leasing" a space on the cloud from an outsider supplier, he will be the one accepting the expenses and the upkeep of the entire foundation. Private Cloud:A private cloud refers to a cloud deployment model worked only for a solitary association, regardless of whether it is truly situated at the organizations on location data center or is overseen and facilitated by a third-get-together supplier. In a private cloud, assets are not imparted to different associations, yet this additionally implies the organization utilizing it is altogether liable for its administration, upkeep, and ordinary updates – which can likewise get essentially more costly than open ones. Hybrid Clouds:Hybrid Clouds as their name recommends, are a mix of private and open cloud sending models that are bound together to give the advantages of the two foundations to the organization utilizing them. By utilizing a Hybrid Clouds associations are equipped for moving information and applications among private and open mists 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
relying upon their motivations. For instance, if there should be an occurrence of high-volume, less reasonable information that doesn't require solid security layers, open mists are the better choice as they give greater ability to their clients. Be that as it may, if the organization needs to store and oversee delicate information identified with basic business activities, it is normally prescribed to utilize a private cloud as it gives greater security. Service Models are the reference models on which the Cloud Computing is based. Types of service models are as follows: SaaS (Software as a Service):This sort of open distributed computing conveys applications over the web through the program. The most well known SaaS applications for business can be found in Google's G Suite and Microsoft's Office 365; among big business applications, Salesforce stands out. In any case, basically all venture applications, including ERP suites from Oracle and SAP, have embraced the SaaS model. Normally, SaaS applications offer broad setup alternatives just as improvement conditions that empower clients to code their own adjustments and increases. IaaS (Infrastructure as a Service):At an essential level, IaaS open cloud suppliers offer register administrations on a compensation for every utilization premise. In any case, the full cluster of administrations offered by all significant open cloud suppliers is faltering: 11
exceptionally adaptable databases, virtual private systems, huge information examination, engineer apparatuses, AI, application checking, etc. Amazon Web Services was the primary IaaS supplier and remains the pioneer, followed by Microsoft Azure, Google Cloud Platform, and IBM Cloud. PaaS (Platform as a Service):PaaS gives sets of administrations and work processes that explicitly target designers, who can utilize shared devices, procedures, and APIs to quicken the turn of events, testing, and sending of utilizations. Salesforce's Heroku and Force.com are well known open cloud PaaS contributions; Pivotal's Cloud Foundry and Red Hat's OpenShift can be conveyed on premises or got to through the significant open mists. For endeavors, PaaS can guarantee that designers have prepared access to assets, follow certain procedures, and utilize just a particular exhibit of administrations, while administrators keep up the hidden foundation. 4.What is the role of MIS in today's business? What is the evolution of WEB? Explain in Detail. Ans.) Operational excellence is the accomplishment of more elevated levels of profitability and productivity. Data frameworks can help accomplish operational greatness by improving correspondences to provider and 12
streamlining the gracefully chain. Data frameworks could assist administrators with speaking with laborers all the more productively, empower mechanical advancement in items, limit stockroom overhead, smooth out appropriation. Organizations have been utilizing data frameworks to expand devotion and create more grounded associations with clients. Having a system on client/provider closeness makes clients and providers significant partners inside the association and they will feel increasingly esteemed. With the expanded utilization of the Internet, building up a solid relationship with the two clients and providers is urgent for endurance in such a serious market where customers approach any data. Comparable to providers, data frameworks have empowered providers to approach creation timetables of the firm thus, they have more notification of when to have materials prepared. On the client side, data frameworks permit firms to monitor inclinations so they can make future suggestions to clients or they won't have to pose similar inquiries each time the client utilizes their great/administration. A case of this is in lodgings when a data framework can store data about favored registration times, television programs and so forth. A Competitive Advantage is accomplished when an association can do any a certain something, process, work, and so on more viably as well as effectively than others in that industry fragment or at times over the whole business. Regardless of whether the association utilizes an ease technique, cost/value separation, or what have you there is an Information System 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
supporting the capacity. A very much arranged and executed Information System is basic in the present business world. Very much arranged and executed Information Systems are key devices for the errand of acquiring a Competitive Advantage. The revolution of WEB is as follows: Web 1.0 Web 1.0 began in the 60s, as the most essential structure, with text- just programs, for example, ELISA, at that point rose HTML that made pages increasingly lovely to the eye, and the primary visual programs like Netscape and Internet Explorer. This Web is perused just, the client can't collaborate with the page content and it is restricted to what the Webmaster transfers to the site. Web 2.0 The term Web 2.0, marked by Tom O 'Reilly in 2004 alludes to a second era of models of Web pages. It is comprehended as another way of thinking of navigation, another approach to take an interest in the system. His antecedent, Web 1.0, has a progressively static route model, this new organization energizes dynamic interest. The client is not, at this point constrained to access to data, rather makes it. Web 3.0 Another term, Web 3.0 seemed to relate the semantic Web. It is an augmentation of the World Wide Web, by which information can be 14
found in any language and in positions appropriate for a wide range of programming. It depends essentially on data and its structure, which permits the client to think that its all the more rapidly and viably. Web 3.0 is a neologism used to depict the development of the utilization and cooperation in the system through various ways. This incorporates changing the system into a database, a move planned for making content available by various applications that are not simply the program, the push of computerized reasoning advancements, the geospatial web, 3D Web. 5.What is General Data Protection Regulation? Explain in detail. Ans.) The General Data Protection Regulation (GDPR) is a lawful structure that sets rules for the assortment and handling of individual data from people who live in the European Union (EU). Since the Regulation applies paying little heed to where sites are based, it must be noticed by all locales that pull in European guests, regardless of whether they don't explicitly showcase merchandise or administrations to EU inhabitants. The GDPR orders that EU guests be given various information divulgences. The site should likewise find a way to encourage such EU purchaser rights as an ideal notice in case of individual information being penetrated. Embraced in April 2016, the Regulation came into full impact in May 2018, following a two-year change period. Oversees the capacity 15
and handling of information instead of its assortment. It additionally incorporates some significant purchaser rights: oThe right to be informed, oThe right of access, oThe right to correct errors, oThe right to erase data, oThe right to restrict processing, and oThe right to take it elsewhere (data portability). The GDPR orders a benchmark set of measures for organizations that handle EU residents' information to all the more likely protect the preparing and development of residents' very own information. The purpose behind the GDPR is to force a uniform information security law on all EU individuals, with the goal that every part express no longer needs to compose its own information insurance laws and laws are reliable over the whole EU. Notwithstanding EU individuals, note that any organization that business sectors merchandise or administrations to EU inhabitants, paying little mind to its area, is dependent upon the guideline. Thus, GDPR will affect information assurance prerequisites comprehensively. 6.Explain Database System Architectures & Data Model 16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ans.) Database management systems architecture design will assist us with understanding the segments of database framework and the connection among them. The architecture of DBMS relies upon the PC framework on which it runs. For instance, in a customer server DBMS design, the database system at server machine can run a few requests made by customer machine. We will comprehend this correspondence with the assistance of outlines. 1. Single tier architecture:In this kind of architecture, the database is promptly accessible on the customer machine, any solicitation made by customer doesn't require a system association with play out the activity on the database. For example, lets state you need to get the records of representative from the database and the database is accessible on your PC framework, so the solicitation to get worker subtleties will be finished by your PC and the records will be brought from the database by your PC too. This kind of framework is by and large alluded as local database system. 2. Two tier architecture:In two-tier architecture, the Database system is available at the server machine and the DBMS application is available at the customer machine, these two machines are associated with one another through a dependable system. At whatever point customer machine makes a solicitation to get to the database present at server utilizing a question language like SQL, the server play out the 17
request on the database and returns the outcome back to the customer. The application association interface, for example, JDBC, ODBC are utilized for the collaboration among server and customer. 3. Three tier architecture:In three-tier architecture, another layer is available between the customer machine and server machine. In this engineering, the customer application doesn't discuss legitimately with the database frameworks present at the server machine, rather the customer application speaks with server application and the server application inside speaks with the database framework present at the server. A model is a reflection procedure which shroud unnecessary details. Data modeling is utilized for speaking to substances and their relationship in database. Data model is an assortment of ideas which is utilized to depict structure of a database which gives essential intends to reflection. The structure of a database implies that holds the information. High Level-conceptual Data Model: User level information model is elevated level or theoretical model. It gives ideas which are near way that numerous clients see information. Low level-Physical Data Model: It gives ideas that depict subtleties of how information is put away in PC model. Low-level information model is just for Computer pros not for end-client. 18
Representation Data Model: It is between High level and Low level information model which gives ideas that might be comprehended by end-client however that are not very far expelled from way information is composed by inside PC. The most well-known model are: Relational Data Model : The Relational Model uses an assortment of tables and relationship among those tables. Tables have different segments and every section has an interesting name. The primary bit of leeway of this model is its capacity to speak to information in an improved arrangement. The way toward controlling records is improved with utilization of certain key ascribes used to recover information. Network Model: The information in organize model are spoken to by assortment of records and connections among information are spoken to by joins, which can be seen as pointers. The records in the database are composed as assortment of discretionary gatherings. The principle bit of leeway of this model is its portrayal of connections between elements is executed utilizing pointers which permits portrayal of discretionary relationship. 19