com/
Rational decision making models involve a cognitive process where each step follows in a logical order from the
one before. By cognitive, I mean it is based on thinking through and weighing up the alternatives to come up with
the best potential result.
There are different types of rational models and the number of steps involved, and even the steps themselves, will
differ in different models. Some people assume that decision making is equivalent to problem solving. Some
decisions however are not problem oriented and I've taken this into consideration when describing the general
outline of a rational model below
The comparison is often performed by filling out forms or charts that have many names. Decision matrix, Pugh
matrix, decision grid, selection matrix, criteria rating form, amongst others. A relative importance is given to each
criterion and the options are scored against each of the criteria and the highest 'wins'.
Such a model also presupposes that it is possible to consider every option and also to know the future
consequences of each. While many would like to think they know what will happen, the universe often has other
plans!
It is also limited by the cognitive abilities of the person making the decision; how good is their memory? How good
is their imagination? The criteria themselves, of course, will be subjective and may be difficult to compare. These
models require a great deal of time and a great deal of information. And, of course, a rational decision making
model attempts to negate the role of emotions in decision making.
1
http://mbaignoumaterial.blogspot.com/
Obviously it would be optimal to buy a proper fitting shirt. But if the person is in a hurry and cannot wear a wet,
coffee stained shirt, then buying the poorly fitting one is appropriate. This is an example of bounded rationality.
The Vroom-Jago decision model has a series of seven yes/no questions that elicit the important criteria and indicate
which of the five decision-making processes is the most appropriate
Intuitive decision making models
Some people consider these decisions to be unlikely coincidences, lucky guesses, or some kind of new-age hocus-
pocus. Many universities are still only teaching rational decision making models and suggest that if these are not
used, failure results. Some researchers are even studying the logic behind the intuitive decision making models!
The groups who study intuitive decision making models are realising that it's not simply the opposite of rational
decision making. Carl Jung pointed out that it is outside the realm of reason.
In military schools the rational, analytical models have historically been utilised. It is also long been recognised,
however, that once the enemy is engaged the analytical model may do more harm than good. History is full of
examples where battles have more often been lost by a leader? Failure to make a decision than by his making a poor
one.
A good plan, executed now, is better than a perfect plan next week."
- General George S. Patton, Jr.
The military are educating the soldiers of every rank in how to make intuitive decisions. Information overload, lack
of time and chaotic conditions are poor conditions for rational models. Instead of improving their rational decision
making, the army has turned to intuitive decision models. Why? Because they work!
If they don't think it will work, they choose another, and mentally rehearse that. As soon as they find one that they
think will work, they do it. Again past experience and learning plays a big part here. There is no actual
comparison of choices, but rather a cycling through choices until an appropriate one is found.
Today’s managers depend on information systems for decision making. The managers have handful of data around
them but manually they cannot process the data accurately and with in the short period of time available to them
due to heavy competition in modern world. Therefore mangers depend on information systems.
Information:
2
http://mbaignoumaterial.blogspot.com/
Data are facts and figures that are not currently being used in a decision processes and usually take the form of
historical records that are recorded and filed without immediate intent to retrieve for decision making.
Information consists of data that have been retrieved, processed or otherwise used for information or inference
purposes, argument, or as a basis for forecasting or decision making.
System can be described simply as a set of elements joined together for a common objective. A subsystem is part of
a larger system with which we are concerned. All systems are part of larger systems. The objective of an MIS
(Management Information System) is to provide information for decision making on planning, initiating,
organizing, and controlling the operations of the subsystems of the form and to provide a synergetic organization in
the process.
Decision Support System: It is sometimes described as the next evolutionary step after Management Information
Systems (MIS). MIS support decision making in both structured and unstructured problem environments.. It
supports decision making at all levels of the organization .IS (Information Systems) are intended to be woven into
the fabric of the organizations, not standing alone. IS support all aspects of the decision making process.MIS are
made of people, computers, procedures, databases, interactive query facilities and so on. They are intended to be
evolutionary/adaptive and easy for people to use
MIS is a technique for making programmed decisions. If we include the computer and management science as
integral parts or tools of computer-based information systems, the prospects for a revolution in programmed
decision making are very real. Just as a manufacturing process is becoming more and more automated so is the
automation of programmed decisions increasing to support this production and other information needs through out
the organization.
Q2. Discuss the critical success factor method for the purpose of information requirement analysis
Requirements analysis in systems engineering and software engineering, encompasses those tasks that go into
determining the needs or conditions to meet for a new or altered product, taking account of the possibly
conflicting requirements of the various stakeholders, such as beneficiaries or users.
Requirements analysis is critical to the success of a development project. Requirements must be documented,
actionable, measurable, testable, related to identified business needs or opportunities, and defined to a level of detail
sufficient for system design. Requirements can be architectural, structural, behavioral, functional, and non-
functional.
3
http://mbaignoumaterial.blogspot.com/
The IS requirements-gathering process is a critical first step in the IS development or adoption process. However,
IS requirements are too frequently incomplete, inconsistent, or incorrect. Often, the reasons for this failure have less
to do with technologies than with people and management.
4
http://mbaignoumaterial.blogspot.com/
and gain an appreciation for the functions and features needed in the new system as well as the constraints that may
impact a computer-based system.
5
http://mbaignoumaterial.blogspot.com/
1. Input: Involves capturing and assembling elements that enter the system to be processed. For ex. Raw
materials, energy, data, and human effort must be secured and organized for processing.
2. Processing involves transformation processes that convert into output. Ex: manufacturing process, the human
breathing process or mathematical calculations.
3. Output involves transferring elements that have been produced by a transformation process to their ultimate
destination. E.g.finished products, human services, and management information must be transmitted to their
human users. The system concept becomes even more useful by including two addition components: feedback
and control. A system with feedback and control components is sometimes called a Cyber ne tic system that is
self monitoring and self regulating system.
Feedback: is data about the performance of a system. Ex. Data about sales performance is feedback to a sales
manager.
Information system model highlights the relationships among the components and activities of information systems.
It provides a framework that emphasizes four major concepts that can applied to all types of information systems.
Network Topologies
In computer networking, topology refers to the layout of connected devices. Network topologies are categorized
into the following basic types:
• bus
• ring
• star
• tree
• mesh
More complex networks can be built as hybrids of two or more of the above basic topologies.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all
devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into
with an interface connector. A device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and
processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives.
10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for
bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen
computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable
fails, the entire network effectively becomes unusable.
This diagram illustrates the bus network topology. A bus topology such as 10Base-2 or 10Base-5 Ethernet uses a
single communication backbone for all devices.
7
http://mbaignoumaterial.blogspot.com/
8
http://mbaignoumaterial.blogspot.com/
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus, and each hub functions as the "root" of
a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus
(limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub
connection points) alone.
This diagram illustrates the tree network topology. A tree topology integrates the star and bus topologies in a hybrid
approach to improve network scalability.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh
network can take any of several possible paths from source to destination. (Recall that even in a ring, although two
cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration
below, partial mesh networks also exist in which some devices connect only indirectly to others.
9
http://mbaignoumaterial.blogspot.com/
This diagram illustrates the mesh network topology. A mesh topology provides redundant communication paths
between some or all devices (partial or full mesh).
Summary
Topologies remain an important part of network design theory. You can probably build a home or small business
computer network without understanding the difference between a bus design and a star design, but becoming
familiar with the standard topologies gives you a better understanding of important networking concepts like hubs,
broadcasts, and routes.
The database management system, or DBMS, is a computer software program that is designed as the means of
managing all databases that are currently installed on a system hard drive or network. Different types of database
management systems exist, with some of them designed for the oversight and proper control of databases that are
configured for specific purposes. Here are some examples of the various incarnations of DBMS technology that are
currently in use, and some of the basic elements that are part of DBMS software applications.
As the tool that is employed in the broad practice of managing databases, the DBMS is marketed in many forms.
Some of the more popular examples of DBMS solutions include Microsoft Access, FileMaker, DB2, and Oracle.
All these products provide for the creation of a series of rights or privileges that can be associated with a specific
user. This means that it is possible to designate one or more database administrators who may control each function,
as well as provide other users with various levels of administration rights. This flexibility makes the task of using
DBMS methods to oversee a system something that can be centrally controlled, or allocated to several different
people.
A DBMS is a software package that carries out many different tasks including the provision of facilities to enable
the user to access and modify information in the database. The database is an intermediate link between the physical
database, computer and the operating system and the users. To provide the various facilities to different types of
users, a DBMS normally provides one or more specialized programming languages called database languages.
10
http://mbaignoumaterial.blogspot.com/
Functions of DBMS
• DBMS free the programmers from the need to worry about the organization and
location of the data i.e. it shields the users from complex hardware level details.
• DBMS can organize process and present data elements from the database. This capability enables decision
makers to search and query database contents in order to extract answers that are not available in regular
Reports.
• Programming is speeded up because programmer can concentrate on logic of the application.
• It includes special user friendly query languages which are easy to understand by non programming users of the
system.
The various common examples of DBMS are Oracle, Access, SQL Server, Sybase, FoxPro, Dbase etc.
ADVANTAGES OF DBMS
The DBMS (Database Management System) is preferred ever the conventional file
Processing system due to the following advantages:
1. Controlling Data Redundancy - In the conventional file processing system, every user group maintains its own
files for handling its data files. This may lead to
11
http://mbaignoumaterial.blogspot.com/
once made are reflected to all the tables where a particulars field is stored. Thus the update is brought automatically
and is known as propagating updates.
3. Better service to the users - A DBMS is often used to provide better services to the
users. In conventional system, availability of information is often poor, since it normally difficult to obtain
information that the existing systems were not designed for. Once several conventional systems are combined to
form one centralized database, the availability of information and its updateness is likely to improve since the data
can now be shared and DBMS makes it easy to respond to anticipated information requests.
Centralizing the data in the database also means that user can obtain new and combined information easily that
would have been impossible to obtain otherwise. Also use of DBMS should allow users that don't know
programming to interact with the data more easily, unlike file processing system where the programmer may need
to write new programs to meet every new demand.
4. Flexibility of the System is improved - Since changes are often necessary to the contents of the data stored in
any system, these changes are made more easily in a centralized database than in a conventional system.
Applications programs need not to be changed on changing the data in the database.
5. Integrity can be improved - Since data of the organization using database approach is centralized and would be
used by a number of users at a time. It is essential to enforce integrity-constraints.
In the conventional systems because the data is duplicated in multiple files so updating or changes may sometimes
lead to entry of incorrect data in some files where it exists.
For example: - The example of result system that we have already discussed. Since multiple files are to maintained,
as sometimes you may enter a value for course which may not exist. Suppose course can have values (Computer,
Accounts, Economics, and Arts) but we enter a value 'Hindi' for it, so this may lead to an inconsistent data, so lack
of Integrity.
Even if we centralized the database it may still contain incorrect data. For example: -
• Salary of full time employ may be entered as Rs. 500 rather than Rs. 5000.
• A student may be shown to have borrowed books but has no enrollment.
• A list of employee numbers for a given department may include a number of non existent employees.
These problems can be avoided by defining the validation procedures whenever any update operation is attempted.
6. Standards can be enforced - Since all access to the database must be through DBMS,
so standards are easier to enforce. Standards may relate to the naming of data, format of
data, structure of the data etc. Standardizing stored data formats is usually desirable for
The purpose of data interchange or migration between systems.
Consider an Example of banking in which the employee at different levels may be given
access to different types of data in the database. A clerk may be given the authority to
know only the names of all the customers who have a loan in bank but not the details of
each loan the customer may have. It can be accomplished by giving the privileges to each
employee.
8. Organization's requirement can be identified - All organizations have sections and departments and each of
these units often consider the work of their unit as the most important and therefore consider their need as the most
important. Once a database has
been setup with centralized control, it will be necessary to identify organization's requirement and to balance the
12
http://mbaignoumaterial.blogspot.com/
needs of the competating units. So it may become necessary to ignore some requests for information if they conflict
with higher priority need of the organization.
For example: - A DBA must choose best file Structure and access method to give fast
response for the high critical applications as compared to less critical applications.
9. Overall cost of developing and maintaining systems is lower - It is much easier to respond to unanticipated
requests when data is centralized in a database than when it is stored in a conventional file system. Although the
initial cost of setting up of a database can be large, one normal expects the overall cost of setting up of a database,
developing and maintaining application programs to be far lower than for similar service using conventional
systems, Since the productivity of programmers can be higher in using non-procedural languages that have been
developed with DBMS than using procedural languages.
10. Data Model must be developed - Perhaps the most important advantage of setting up of database system is the
requirement that an overall data model for an organization be build. In conventional systems, it is more likely that
files will be designed as per need of particular applications demand. The overall view is often not considered.
Building an overall view of an organization's data is usual cost effective in the long terms.
11. Provides backup and Recovery - Centralizing a database provides the schemes such as recovery and backups
from the failures including disk crash, power failures, software errors which may help the database to recover from
the inconsistent state to the state that existed prior to the occurrence of the failure, though methods are very
complex.
Query, Data Manipulation, and Reporting Capabilities: -
The DBMS’s ability to support reporting requirements, along with users’ query and data
manipulation needs, is the cornerstone of today’s management information systems. A sound
DBMS is going to provide the capability to generate structured reports in a variety of formats. In addition, the
DBMS will provide a query language that is powerful, yet easy to learn and use. The language should be able to
support both planned and unplanned query requirements with short response times.
For those who are interested, however, exploring the physical organization features may be of value. For example,
it is known that the inverted list is most efficient in supporting multikey retrieval, whereas the chain list is superior
for file updating since there is no need for updating a separate file. Information on other architectural features may
be elicited in the process of considering the DBMS’s capability to support the types of applications common to the
firm
13
http://mbaignoumaterial.blogspot.com/
Requirements specification -> Analysis -> Conceptual design -> Implementation Design-> Physical Schema
Design and Optimisation
Data Models & Schemas as a Means of Capturing Data
The database development design phase brings up the concept of 'data models'. Data models are diagrams or
schemas, which are used to present the data requirements at different levels of abstraction. The first step in the
Database Development Life Cycle is to draw up a requirements document.
The requirements document can then be analysed and turned into a basic data set which can be converted into a
conceptual model. The end result of the conceptual design phase is a conceptual data model which provides little
information of how the database system will eventually be implemented. The conceptual data model is simply a
high-level overview of the database system.
In the implementation design phase, the conceptual data model is translated into a 'logical' representation of the
database system. The logical data model conveys the "logical functioning and structure" of the database (Benyon,
1993) and describes 'how the data is stored' (Dan et al., 2007) (e.g. what tables are used, what constraints are
applied) but is not specific to any DBMS. Logical database model is a lower-level conceptual model, which must be
translated to a physical design
Physical modelling deals with the "representational aspects" and the "operational aspects"
(Benyon & Murray, 1993) of the database, i.e. the internal DBMS specific operations and processes and how the
DBMS interacts with the data, the database and the user. The translation from logical design to physical design
assigns "functions" to both the machine (the DBMS) and to the user (Benyon & Murray, 1993), functions such as
storage and security (Batini et al., 1986), and additional aspects such as consistency (of data) and learnability
(Benyon & Murray, 1993) are dealt with in the physical model/schema. Practically speaking, a physical schema is
the SQL code used to build the database.
One benchmark of a good database is one, which is complete, integral, simple, understandable, flexible and
implementable (Moody & Shanks, 2002). Batini et al says that database modelling strives for a "nonredundant,
unified representation of all data managed in an organization" (Batini et al., 1986). By following the above
methodology,
and by using the data models, these database design ideals are fulfilled. In conclusion,
here are two examples of why using data models is paramount to capturing and
Conveying data requirementsof the information system:
(i) By drawing up a 'logical model', extra data items can be added more easily in that model then in the physical
model. A database design that can change easily according to needs of the company is important; because it ensures
the final database system is complete and up-to-date.
(ii) Another consideration is understandability. By initially creating a 'conceptual model', both the designer and the
organization are able to understand the database design and decide if it is complete or not. If there were no
'conceptual model', the organization would not be able to 'conceptualise' the database design and make sure that it
actually represents all the data requirements of the organization.
(iii) By creating a physical model, the designers can have a low level overview of how the database system would
operate before it is actually implemented.
14
http://mbaignoumaterial.blogspot.com/
How do keys relate to ensuring that changes in database states confirm to specified rules? Well, for example, you
could ensure that the primary key of an entity cannot be null. This is one way of ensuring entity integrity. If primary
keys were allowed to be null, then there would be no way of ensuring that individual entities were uniquely
identifiable. If you cannot ensure that individual entities are uniquely identifiable then you can't ensure that the
database is 'integral', which is a core property of a properly designed data model (Moody & Shanks, 2002). So, by
ensuring that keys follow certain rules, you can ensure integrity of data.
Another way of enforcing integrity of data via keys, is to ensure that, if two tables are
related to each other, an attribute of one relation must be the same as the primary attribute
(primary key) of the other one. Enforcing this rule ensures referential integrity of data.
Q6. Differentiate among Trojans, Worms and Viruses. Give one example of each.
Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there
are differences among the three.
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan
horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the
same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but
there are differences among the three, and knowing those differences can help you to better protect your computer
from their often damaging effects.
Trojan
Trojan, is software that appears to perform a desirable function for the user prior to run
or install, but (perhaps in addition to the expected function) steals information or harms
the system
15
http://mbaignoumaterial.blogspot.com/
Trojan are impostors—files that claim to be something desirable but, in fact, are malicious. A very important
distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojan horses
contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must
invite these programs onto your computers; for example, by opening an email attachment or downloading and
running a file from the Internet. Trojan. Vundo is a Trojan horse
Worms
Worms are programs that replicate themselves from system to system without the use of a host file. This is in
contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of
other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file.
Usually the worm will release a document that already has the "worm" macro inside the document. The entire
document will travel from computer to computer, so the entire document should be considered the worm
W32.Mydoom.AX@mm is an example of a worm
Virus
A computer virus is a small program written to alter the way a computer operates, without the permission or
knowledge of the user. A virus must meet two criteria:
• It must execute itself. It often places its own code in the path of execution of another program.
• It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file.
Viruses can infect desktop computers and network servers alike.
Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the
hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence
known by presenting text, video, and audio messages. Even these benign viruses can create problems for the
computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause
erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead
to system crashes and data loss.
Five recognized types of viruses
File Inspector Viruses File infector viruses infect program files. These viruses normally infect
executable code, such as .com and .exe files. The can infect other files when an
infected program is run from floppy, hard drive, or from the network. Many of
16
http://mbaignoumaterial.blogspot.com/
these viruses are memory resident. After memory becomes infected, any no
infected executable that runs becomes infected. Examples of known file infector
viruses include Jerusalem and Cascade.
Boot Sector viruses Boot sector viruses infect the system area of a disk; that is, the boot record on
floppy disks and hard disks. All floppy disks and hard disks (including disks
containing only data) contain a small program in the boot record that is run
when the computer starts up. Boot sector viruses attach themselves to this part
of the disk and activate when the user attempts to start up from the infected
disk. These viruses are always memory resident in nature. Most were written
for DOS, but, all PCs, regardless of the operating system, are potential targets
of this type of virus. All that is required to become infected is to attempt to start
up your computer with an infected floppy disk Thereafter, while the virus
remains in memory, all floppy disks that are not write protected will become
infected when the floppy disk is accessed. Examples of boot sector viruses are
Form, Disk Killer, Michelangelo, and Stoned.
Master Boot record viruses Master boot record viruses are memory-resident viruses that infect disks in the
same manner as boot sector viruses. The difference between these two virus
types is where the viral code is located. Master boot record infectors normally
save a legitimate copy of the master boot record in a different location.
Windows NT computers that become infected by either boot sector viruses or
master boot sector viruses will not boot. This is due to the difference in how the
operating system accesses its boot information, as compared to Windows
98/Me. If your Windows NT system is formatted with FAT partitions you can
usually remove the virus by booting to DOS and using antivirus software. If the
boot partition is NTFS, the system must be recovered
by using the three Windows NT Setup disks. Examples of master boot record
infectors are NYB, AntiExe, and Unashamed.
Multipartite Viruses Multipartite (also known as polypartite) viruses infect both boot records and
program files. These are particularly difficult to repair. If the boot area is
cleaned, but the files are not, the boot area will be reinfected. The same holds
true for cleaning infected files. If the virus is not removed from the boot area,
any files that you have cleaned will be reinfected. Examples of multipartite
viruses include One-half, Emperor, Anthrax and Tequilla.
Macro Viruses These types of viruses infect data files. They are the most common and have
cost corporations the most money and time trying to repair. With the advent of
Visual Basic in Microsoft's Office 97, a macro virus can be written that not only
infects data files, but also can infect other files as well. Macro viruses infect
Microsoft Office Word, Excel, PowerPoint and Access files. Newer strains are
now turning up in other programs as well. All of these viruses use another
program's internal programming language, which was created to allow users to
automate certain tasks within that program. Because of the ease with which
these viruses can be created, there are now thousands of them in circulation.
Examples of macro viruses include W97M.Melissa, WM. Nice Day and
W97M.Groov.
17