Sei sulla pagina 1di 84

Information Technology

Solution of Past Exam Questions

ICMAB Professional Level - I

Syed M Hoq, ACCA


syedmhoq@gmail.com

Information Technology
Lesson 01: Information system Its impact and Challenges on Organization
Q.1.

What is information system? Distinguish between a computer and information system.


Information system is an integrated set of components for collecting, storing, and processing data and for
delivering information, knowledge, and digital products. Business firms and other organizations rely on
information systems to carry out and manage their operations, interact with their customers and suppliers,
and compete in the marketplace. For instance, corporations use information systems to reach their potential
customers with targeted messages over the Web, to process financial accounts, and to manage their human
resources.
A computer is an electronic device that manipulates information, or "data." It has the ability to store,
retrieve, and process data.

Q.2.

Write five components of information system.


The main components of information system are as follows;
i) Data: Stream of raw facts representing events occurring in organization or the physical environment
before they have been organized and arranged into a form that people can understand and use.
ii) Information: Data that have been shaped into a form that is meaningful and useful to human beings.
iii) Input: The activity of gathering and capturing raw data.
iv) Processing: Converting or transforming data into useful outputs.
v) Output: Production of useful information, usually in the form of documents and reports.
vi) Feedback: Output that is used to make changes to input or processing activities.

Q.3.

Why information systems are essential in business today?


The emergence of a global economy, transformation of industrial economies, transformation of the business
enterprise, and the emergence of the digital firm make information systems essential in business today.
These trends present the business firm and its management with several new challenges. As a growing
percentage of the advanced industrial economies in the United States, Europe and Asia depends on imports
and exports, information systems supply both communications and analytic instruments for engaging in
trade and for managing businesses that are spread throughout the world.
The major industrial powers in the United States, Europe and Asia are being transformed from industrial
economies to knowledge- and information-based service economies. In such economies, information
systems and technology have become critical to these economies, and in this day and age, they have
become essential to economies that primarily remain reliant upon manufacturing.
Development of the power and capabilities of information systems has transformed the possibilities for
organizing and managing business enterprises. Businesses of this style are less hierarchical (flatter) and are
more decentralized, allowing them to rely more on informal commitments and temporary task forces. Many
managers have become more reliant upon individuals who report to them for decision making as these
reportees have more learning and current knowledge. Also, more and more under this transformation,
companies are becoming more customer-oriented.
The emerging technology and the organizational redesign that has accompanied it have created the
condition for the emergence of the digital firm. While firms of this type are still few and far between, they
are growing in number. Perhaps more important right now, almost all larger firms and even many smaller
ones have become reliant upon the digital firm technology for much of their activity, including relations with
customers and suppliers.

Syed M Hoq, ACCA

Page 1

Information Technology
Six reasons why information systems are so important for business today include:
(1) Operational excellence
(2) New products, services, and business models
(3) Customer and supplier intimacy
(4) Improved decision making
(5) Competitive advantage
(6) Survival
Information systems are the foundation for conducting business today. In many industries, survival and even
existence without extensive use of IT is inconceivable, and IT plays a critical role in increasing productivity.
Although information technology has become more of a commodity, when coupled with complementary
changes in organization and management, it can provide the foundation for new products, services, and
ways of conducting business that provide firms with a strategic advantage.
Q.4.

Why do managers need to know about information systems?


Managers need to understand: 1) the types of information systems that are available; 2) the prerequisites
for effectively leveraging information systems; 3) the necessary steps to install and operate information
systems; and 4) the appropriate type of user for the various information systems. At the core of each of
these is the fact that a manager must assure that the information systems being leveraged or planned are
supported by an information systems strategy that is tied to the business strategy.
Information systems exist to assist in the operation of a wide range of business functions. These systems
include Customer Relationship Management (CRM), Enterprise Resource Management (ERP), Reporting and
Visualization (Decision Support System-DSS, Business Analytics, Online Analytical Processing), Automated
Decision Support (ADS), and Identity and Access Management (IAM) to name a few. These systems support
functions that every company deals with in some way. A manager must understand the purpose of these
systems and how they would benefit the overall organization.
Leveraging an information system has less to do with installing and integrating it than with the existing
infrastructure. Before a system can benefit the organization there must be supporting data and processes
that will allow the system to function accurately and effectively. Getting the infrastructure in order such
that there are accurate master files representing customers, orders, inventory, etc. is difficult. Creating
processes that will properly leverage information systems can also be challenging. People need to be
trained, old processes need to be retired, and new processes need to be designed and proved out.
Rolling out an information system involves gaining leadership support for the new system. A vetting process
will likely ensue and knowing how to gather requirements, measure systems against those options and arrive
at a decision are necessary skills for a manager. Without an effective IS project management process, an
attempt to procure and install a new system will suffer delays, unexpected expenditures and in many cases
ultimately fail. Managers need to understand that it is not the technology that will save the day; it is the
people and processes that are involved in leveraging the technology that determine its level of success.
Finally, managers must understand the correct use for a given information systems. Systems exist that serve
different levels of management: 1) Operational; 2) Mid-level; and 3) Executive.
Operational management needs detailed information and in some cases can have decisions automated. The
information at this level deals with largely tactical situations. Data concerning reorder points, machine
maintenance windows, and employee task assignments are required to operate the business on a day-byday basis. Since many decisions are largely data driven with little external influence, they are good
candidates for automation using ADS systems.

Syed M Hoq, ACCA

Page 2

Information Technology
Mid-tier management deals with both tactical and strategic decisions. Their view of information must
encompass a broader set of measures, but have access to details. Some decision at this level can be
automated but in other cases involve less structured data and need to be handled by a person. Rapid access
to the aggregated data, such as produced using a DSS, is vital to managers at this level.
Executive management is concerned with the organizations strategy and its performance to Key
Performance Indicators (KPI). These key measures allow for a rapid understanding of the companys
standing. Executive Information Systems allow for such views to be created.
In all cases, it is the availability and quality of the underlying data that will allow for any meaningful
automation or reporting to be created. In cases where data from disparate systems are required the
company may need to look at approaches such as data warehousing or Enterprise Application Integration
(EAI) tools that allow for the exchange of information between heterogeneous systems.
With an understanding of the business aspects of IS, the business leadership will be in a position to
effectively champion and manage technology-related projects. IS is not something to be left to the
technology team. It is a key component of successful companies. Being a business manager who is well
versed in IS and who bridges between business and technology will assure that the companys strategy is
properly communicated and mirrored in its information technology implementations.
Q.5.

What is the difference between computer based information system and manual information system?
Basically a manual-based information system is one that does not rely on any computerised systems and a
computer-based information system does. A manual-based system will see information recorded and kept in
different ways such as in files in paper form. Whereas a computer based information system will see data
stored on various computer programs including on databases, Word documents, Excel etc.
Both types of information system are designed to help a business carry out its day-to-day running and
operations. In recent times, computer-based systems are generally considered to be more popular as more
businesses are choosing to keep up with the developments in information technology. There are still those
who continue to use manual systems though, perhaps as a matter of financial constraints or it may simply be
more suitable for their type of business.
A manual-based information system is generally considered to be cheaper than a computer-based system,
however it may contribute to lower levels of staff productivity. In addition, having data stores manually in
boxes or files is not very environmentally-friendly and this could lead company documentation at risk if a fire
broke out for example as there would be no back up.
A computer-based information system may be considered to be more cost effective and efficient than a
manual system. It speeds up operations and can back up important information at the touch of a button. It is
however very expensive to set up and may need to be maintained by IT technical support advisors on a
regular basis.
An information system does not only refer to the way in which business data is stored by a company. It also
refers to the way in which the business interacts with clients or associates, processes orders and advertises.

Q.6.

What are the possible differences between IT and IS?


The main difference between information technology and information systems (IS) is that IS personnel are
business oriented and focus on the applications and implications of computing in the business domain. IT
does not focus on a single domain in which IT is practiced, but instead focuses on the selection, integration
and deployment of computing technology.

Syed M Hoq, ACCA

Page 3

Information Technology
IS requires the business skills to thrive in the Board Room and learn enough about the technology to make
sound strategic decisions. On the other hand IT generally consists of planning and deploying networking
infrastructure or integrates databases or builds significant Web sites.
In layman's terms IS deals with the business side of technology as IT deals with the technical side.
Q.7.

What are the components of a decision support system?


The three basic components of a DSS include a DSS database, DSS software system, and DSS user interface.
The DSS database is a collection of current or historical data from a number of applications or groups,
organized for easy access by a range of applications. The DSS database may be a small database residing on a
PC or it may be a massive data warehouse that is continuously updated by major organizational TPS.
The DSS software system is a collection of software tools used for data analysis, including a collection of
mathematical and analytical models, OLAP tools, and data mining tools. Various kinds of models may be in
the model base, including libraries of statistical, optimization, sensitivity analysis, and forecasting models.
The DSS user interface permits easy interaction between users and the DSS software tools.
A typical Decision support systems has four components: data management, model management,
knowledge management and user interface management.
Data Management Component
The data management component performs the function of storing and maintaining the information that
you want your Decision Support System to use. The data management component, therefore, consists of
both the Decision Support System information and the Decision Support System database management
system. The information you use in your Decision Support System comes from one or more of three sources:
i) Organizational information;
ii) Personal information; and
iii) External information.
Model Management Component
The model management component consists of both the Decision Support System models and the Decision
Support System model management system. A model is a representation of some event, fact, or situation. As
it is not always practical, or wise, to experiment with reality, people build models and use them for
experimentation.
User Interface Management Component
The user interface management component allows you to communicate with the Decision Support System. It
consists of the user interface management system. This is the component that allows you to combine your
know-how with the storage and processing capabilities of the computer.
The user interface is the part of the system you see through it when enter information, commands, and
models. This is the only component of the system with which you have direct contract. If you have a Decision
Support System with a poorly designed user interface, if it is too rigid or too cumbersome to use, you simply
wont use it no matter what its capabilities. The best user interface uses your terminology and methods and
is flexible, consistent, simple, and adaptable.
Knowledge Management Component
The knowledge management component, like that in an expert system, provides information about the
relationship among data that is too complex for a database to represent. It consists of rules that can
constrain possible solution as well as alternative solutions and methods for evaluating them.

Syed M Hoq, ACCA

Page 4

Information Technology
For example, when analyzing the impact of a price reduction, a Decision Support System should signal if the
forecasted volume of activity exceeds the volume that the projected staff can service. Such signalling
requires the Decision Support System to incorporate some rules-of-thumb about an appropriate ratio of staff
to sales volume. Such rules-of-thumb, also known as heuristics, make up the knowledge base.
Q.8.

What is a group decision-support system (GDSS)? How does it differ from a DSS?
GDSS
GDSS or Group Decision Support System is a subclass or subcategory of DSS. It is defined as a computer
based information system built to support and promotes positive group decision making. GDSS has three
important components: software, which consists of the database with management capabilities for group
decision making. Another component is the hardware and lastly the people. The latter will include the
decision making participants.
DSS
Meanwhile, DSS also known as Decision Support System is meant to affect how individuals decide or process
decision making. Through the use of DSS, both human capabilities and computer capacities are maximized to
result to one great positive decision. The system will provide assistance for the human element and not the
sole decision maker. DSS also allows customization of the programs particularly the decision making
capabilities to better suit individual needs.
Difference between GDSS and DSS
GDSS is a computer based information system that focuses on the group while DSS focuses on an individual
for instance, the manager or the supervisor. GDSS and DSS may have similar components in terms of
hardware and software structures however, GDSS has a networking technology that is best suited for group
discussions or communication. DSS on the other hand, have technologies that are focused for a single user.
GDSS maintenance involves a better system reliability and incomprehensible multi-user access compared to
DSS because system failures in GDSS will involve a lot of individual.
Through these programs or computer based information system, company or individual decision making
capacities will be enhanced and hasten. This allows not only good communication system but also a positive
outcome within a department, group, or company.

Q.9.

What are the benefits of GDSS?


The benefits of GDSS are;
i) Take better decision: Through the GDSS we can take better decisions because the under GDSS the
decisions are taken by a group of DSS.
ii) To solve the problem: GDSS provide solution to unstructured problems. GDSS collects various type of
information at various sources.
iii) To minimize the risk: GDSS allows managers to assess the risks associated with various alternatives.
This helps managers to be proactive rather than reactive.
iv) To collect large amount of information: GDSS collect information at various sources for making
decision making. This information minimizes the risk.
v) To provide interactive communication: GDSS provide interactive communication. It takes better
decision through the interactive communication.
vi) To improve the decision making process: GDSS improve the decision making process because GDSS
is a goal oriented. When the GDSS is designed the goal is considered.
vii) To make coordination in various activities: In GDSS decision are taken by a group of DSS. The work is
divided into different parts then each DSS performs own work. So the coordination is possible.

Syed M Hoq, ACCA

Page 5

Information Technology
Q.10.

Explain how GDSS & DSS can enhance decision-making?


GDSS enable more people to attend and participate in a meeting, and at the same time the GDSS can
increase meeting productivity. This increase in productivity is realized because the attendees can contribute
simultaneously. A GDSS can guarantee anonymity, follow structured methods for organizing and evaluating
ideas, preserve the results of meetings, and can increase the number of ideas generated and the quality of
decisions while producing the desired results in fewer meetings. A GDSS can support idea generation,
complex problem analysis, and large groups.

Q.11.

What is the difference between MIS and DSS?


A DSS assists management decision making by combining data, sophisticated analytical models, and userfriendly software into a single, powerful system that can support semi-structured or unstructured decision
making. These systems help end users utilize data and models to discuss and decide semi-structured and
unstructured problems, but they do not solve the problems for the user.
Generally speaking, MIS provide routine, pre-specified, and formatted reports based on data extracted and
summarized from the firm's TPS. These reports provide information on the firm's performance and are used
to help monitor and control the business. In contrast, DSS provide capabilities for addressing non-routine
decisions and user control. DSS emphasize change, flexibility, and rapid response and place a greater
emphasis on models, assumptions, ad hoc queries, and display graphics.
Additionally, MIS primarily address structured problems, while DSS focus more on supporting semistructured and unstructured problems.
The focus of a DSS is on making effective decisions. Whereas an MIS helps an organization do things right,
a DSS helps a manager do the right thing.

Q.12.

What do you mean by MIS? MIS provides four major reporting alternatives explain.
A management information system (MIS) provides information that organizations need to manage
themselves efficiently and effectively. Management information systems are typically computer systems
used for managing three primary components: technology, people (individuals, groups, or organizations),
and data (information for decision making). Management information systems are distinct from other
information systems, in that they are used to analyze and facilitate strategic and operational activities.
Academically, the term is commonly used to refer to the study of how individuals, groups, and organizations
evaluate, design, implement, manage, and utilize systems to generate information to improve efficiency and
effectiveness of decision making, including systems termed decision support systems, expert systems, and
executive information systems.
MIS provide a variety of information products to managers which include 3 reporting alternatives:
i) Periodic Scheduled Reports: E.g. Weekly Sales Analysis Reports, Monthly Financial Statements etc.
ii) Exception Reports: E.g. Periodic Report but contains information only about specific events.
iii) Demand Reports and Responses: E.g. Information on demand.

Q.13.

Any organization cannot run effectively without having any information system of its own explain
why?
Organizations use "Information Systems" to plan and systematize all their strategic processes. Using this
mechanism, the organization collects and tabulates data on all its functions. This data is presented in report
formats for managerial decision making.

Syed M Hoq, ACCA

Page 6

Information Technology
Function
Information systems are used in all phases and departments of the organizations for purposes ranging from
recording mundane business transactions to executive decision making.
Features
Information systems define the organization's work flows, authority-responsibility diagrams and the manner
of allocation of resources. All these reports are presented to the top management for them to make their
decisions.
Considerations
Companies must apportion time and money to their information systems. Also, if the chore of its
development is entrusted to consultants, they must be made fully aware of the organization's needs and
specifications.
Q.14.

Why we study information system? Describe the contemporary approaches to information system.
Informational systems have become a pivotal feature in contemporary business. Understanding the
management practices associated with informational technology can make you an instant commodity for
innovative companies. In todays world, it is essential to manage the storage, transmission and analysis of
information. Studying the management of informational systems allows you to understand the demands put
on employees and practical ethical challenges that may arise in the future.
Studying management information system is going to make you understand the role of information
technology in the company. The kind of IT programs that your company use may affect the decisions that
you make in the structure and strategies of your organization and customer relationships. With your
background on key concepts in MIS, you will be able to strategically use control and implement modern
information systems that include business software.
Information systems are socio-technical systems. Although they are composed of machines, devices, and
"hard" physical technology, they require substantial social, organizational, and intellectual investments to
make them work properly. Since problems with information systemsand their solutionsare rarely all
technical or behavioural, a multidisciplinary approach is needed.
The study of information systems deals with issues and insights contributed from technical and behavioral
disciplines.
The technical approach emphasizes mathematically based, normative models to study information systems,
as well as the physical technology and formal capabilities of these systems. The behavioral approach, a
growing part of the information systems field, does not ignore technology, but tends to focus on nontechnical solutions concentrating instead on changes in attitudes, management and organizational policy,
and behaviour.
MIS combines the work of computer science, management science, and operations research with a practical
orientation toward developing system solutions to real-world problems and managing information
technology resources. It is also concerned with behavioural issues surrounding the development, use, and
impact of information systems, which are typically discussed in the fields of sociology, economics, and
psychology.
In the socio-technical view of systems, optimal organizational performance is achieved by jointly optimizing
both the social and technical systems used in production. Adopting a socio-technical systems perspective
helps to avoid a purely technological approach to information systems.

Syed M Hoq, ACCA

Page 7

Information Technology
Technology must be changed and designed, sometimes even "de-optimized," to fit organizational and
individual needs. Organizations and individuals must also be changed through training, learning, and planned
organizational change to allow technology to operate and prosper.
Q.15.

What are the functions and role of information system?


An information system can be a mainframe, mid-range or network computer concept that allows distributed
processing for a group of users accessing the same software application. These systems provide
management with control over their data, with various tools to extract data or view data structures and
records. The role of an information system is to foster a data management environment that is robust and
can be expanded according to an organizations' strategic plan for information processing. An information
system also satisfies diverse information needs in an organization.
Automation of Manual Tasks
Information systems architecture can assist an organization in automating manual tasks. Automation can
save time, money and resources and enhance organizational workflow. There are various types of
information systems that automate manual tasking, ranging from robotic information systems used in areas
such as health and medical services to logistical information systems (automated warehouses and
distribution systems).
Hardware and Software Integration
An organization can have several different computer platforms (hardware and software). The concept of
information systems as a scalable platform can merge different hardware and software systems. A system
can process, store and distribute information if integrated into the workflow of an information system. For
example, a local area network (LAN) can integrate into a mainframe system that processes accounting
information through a concept called a "gateway." An open architecture information system allows for
integration at all levels throughout an organization.
Support of a Multi-Processing Environment
An information system can support a "real-time" multi-processing environment through the concept of
"time-sharing application." Time-sharing application allows for the prioritizing of applications based on userid and system priority assigned to an application, device, and database or system catalog. These features are
important to an organization that process transactions while developing and testing program applications. In
a multi-processing environment, various departments, divisions or branches can have access to the system
at the same time intervals.
System Partitioning
The layout of an information system is partitioned according to data security policies, user access and
program applications. The partitioning of the physical hard drives, memory and storage space related to
software applications creates system balance and effective use of the system Central Processing Unit (CPU).
System partitioning programs, tools and routines keeps the system from overloading, which slows down
system performance. Extra files paged to memory that are not being used can slow down a customer
support system, which relies on timely processing of customer inquiries. System partitioning is maintained
by a process of "preventive maintenance" which ensures the integrity of system partitioning.
Provides Data for Decision Support
The most important role of an information system in an organization is to provide data to help executive
management make decisions. Data is compiled through transaction processing or query routines built into
the information system to access item and detail records. Through decision support programs, which are
packaged as software routines, executive management can analyze several areas of an organization and

Syed M Hoq, ACCA

Page 8

Information Technology
create scenarios through the information system for a desired result. These results are defined in the
organizations' objectives and goals to improve productivity.
Q.16.

Discuss information system on business perspective.


From a business perspective, information systems are part of a series of value-adding activities for acquiring,
transforming, and distributing information that managers can use to improve decision making, enhance
organizational performance, and ultimately increase firm profitability.
The business perspective calls attention to the organizational and managerial nature of information systems.
An information system represents an organizational and management solution based on information
technology to a challenge or problem posed by the environment.
Some firms achieve better results from their information systems than others. Studies of returns from
information technology investments show that there is considerable variation in the returns firms receive.
Reasons for lower return on investment include failure to adopt the right business model that suits the new
technology or seeking to preserve an old business model that is doomed by new technology.

Q.17.

Information systems are too important to be left to computer specialists. Do you agree? Why or why not?
It is common misunderstanding that Information system is just computers but actually it involves much more
than computers in terms of software and hardware (like database, expert system, etc). Take for eg of
database. A good computer specialist may know about database administration like installing, backing up,
optimizing etc. But does he know what data is, schema, database model, API, query etc. In my opinion,
Information system should be left to Information Managers that can have overview of all hardware and
software involved and able to have manage/control of it.

Syed M Hoq, ACCA

Page 9

Information Technology
Lesson 02: Information and organization their nature and role
Q.18.

What is information?
In general information refers to summarize data or otherwise manipulated data. Technically, data comprises
raw and figures that are processed into information. However, information can also be raw data for next
persons or job. But for business management purposes information can be defined as processed data or
facts that are useful for a specific business decision making purposes. On the other hand as far as computer
technology is concerned Information is the desired output of computerized information system achieved
through specific processing of data.

Q.19.

Explain the changing role of Information System?


Business perspective on information systems:
Information system is instrument for creating value
Investments in information technology will result in superior returns:
Productivity increases
Revenue increases
Superior long-term strategic positioning
Business information value chain
Raw data acquired and transformed through stages that add value to that information
Value of information system determined in part by extent to which it leads to better decisions,
greater efficiency, and higher profits
Business perspective:
Calls attention to organizational and managerial nature of information systems

Q.20.

What activities convert raw data into usable information in information system?
Input captures raw data, processing converts the data into a more meaningful form, and output transfers the
processed information to people or activities where it will be used. Some of the output will be used to
correct any problems found, and also to provide feedback that will then be used to evaluate the data.

Syed M Hoq, ACCA

Page 10

Information Technology
Lesson 03: Information as strategic resources
Q.21.

Why information is considered as a strategic resource?


The world is a rapidly changing canvas that visits a dynamic and turbulent environment on senior managers
changing how Information Systems (IS) are used and needed in each organization. The power to collect,
assess, and disseminate information is a valuable strategic resource that any organization can use to
improve its competitive advantage. At the same time, technological advances are changing rapidly, thus
requiring frequent updates in hardware and software as well as new competencies for IS professionals. As
strategic managers face the challenges of optimizing the use of information systems, they are called to
address a number of issues so they can make informed and effective decisions. A failure to understand the
nature of the changing environment and the associated consequences is certain to cause decision-making
that is slow to meet the challenges of the global market, thus creating a strategic disadvantage for the late
mover. Managers must not only understand the role of IS in corporate governance and corporate strategy
formulation, but how the accepted norms of this role are changing over time.

Q.22.

How can organization determine the business value of information systems?


See text book page # 60.

Q.23.

An information system is a strategic tool for an organization justify the statement. By using
information systems effectively an organization can attain some competitive advantages how?
Technology has taken the business environment by storm. Processes that used to be manual are now
automated, and electronic means of communication have been heavily integrated into today's offices. The
arrival of technology has completely transformed today's business practices.
Information systems (IS) have been around for a while, but as they evolve, they are continually 'new' and
offer many possibilities. An IS system isn't just a collection of hardware and software, it's much more than
that, it's a tool. This tool can be used in a number of ways, and the value of it really depends on how a
business opts to utilize it. Many businesses today have realized the power their technology possesses, but
may not understand the whole benefit that can be achieved. Once strategic knowledge is realized, the
potential is endless.
Installing automation simply for the sake of having it guarantees it'll be a just an ordinary (and expensive!)
business possession, but grasping an understanding of the ways it can be used is the real value. Strategic
planning in utilizing information systems is the key to gaining a competitive advantage. Managerial decision
makers don't want to purchase new systems for the upgrade unless there is a plan to maximize its
capabilities. Don't think of your IS systems as a commodity, view these as assets and a means to gain a
competitive lead in your industry. Ways you can maximize your information systems:
Enhance jobs
Implementing IS to make jobs more efficient frees employees to move onto other important tasks. No longer
do staff have to spend valuable time sorting through statistics, data and other pertinent information because
the system has ability to gather it for them. IS provides a cost-effective way to conduct transactions,
significantly cutting down the time involved in processing.
Differentiation
IS provides the ability to strategically define your organization in a way that makes the business stand out
from the competition. Information systems can be integrated in such a way where customers can be offered
something no one else provides. With a unique design that makes your business appealing to do business
with, you can easily increase your customer base.

Syed M Hoq, ACCA

Page 11

Information Technology
Coordination of supply and distribution
IS provides a terrific way to monitor and track inventory. Typically, managers will use information system to
track goods and to manage their entire supply/chain management process. If there's a problem, you can
easily pinpoint and enact a solution before becoming a costly issue.
Customers
Integrating business processes with the web is a great way to maximize your technology. You can generate
efficiency, effectiveness and enhancement all at the same time. Employee burden is relieved and you can
augment your customer's shopping experience at the same time.
Decision making
Information systems allow the vital element of providing "real-time" information. In today's competitive
environment, a manager needs to make rapid decisions and to do this effectively, you'll need the most up to
date information available. Properly designing your IS to custom fit your needs will enable you to accomplish
this. You'll get fast action when you can quickly assess a situation.
Communication
Information systems possess ways to effectively and efficiently share information. Automated
communication is a time and resource saver and can add tremendous value to your business.
When implementing IS, technology standards are important, but inter-connectivity is essential. Providing a
way to network within your own organization and with partners and customers is a vital component. If a
company has the latest and greatest technology, even better than competitors and suppliers, it doesn't do
much good in seclusion because the business is isolated from the others. Ultimately this ends up becoming
less cost-effective and more time consuming which decreases the value of IS.
Great benefits come with utilizing management information systems. The business value in this investment
are less redundancy (which saves on man-hours worked), efficiency, better data integrity, streamlining of
processes - the possibilities are endless.
With proper planning, a company can maximize profit while decreasing overhead costs. Implementing such a
system will be costly initially, but if business requirements and processes are properly and accurately
identified, the payoffs are vast. Investing in IS keep your business competitive and a strong ability to
maintain status in the global economy.
Many businesses who do not have a web presence or engage in ecommerce will probably find themselves
being ousted by their competitors. Companies that do not implement technology into their organizational
structure will likely find themselves falling by the wayside. Today a networked presence is vital to
organizations, and implementing IS systems to help run businesses processes. When exploring the value of IS
from both a technical perspective and a competitive advantage perspective, information systems are a
definitive and effective means to expand your business.
Q.24.

What is strategic information system? Explain with example.


Strategic information system is a computer systems at any level of the organization that change the goals,
operations, products, services, or environmental relationships to help the organization gain a competitive
advantage.
A Strategic Information System (SIS) is a system that helps companies change or otherwise alter their
business strategy and/or structure. It is typically utilized to streamline and quicken the reaction time to
environmental changes and aid it in achieving a competitive advantage.

Syed M Hoq, ACCA

Page 12

Information Technology
Key features of the Strategic Information Systems are the following:
1) Decision support systems that enable to develop a strategic approach to align Information Systems
(IS) or Information Technologies (IT) with an organization's business strategies
2) Primarily Enterprise resource planning solutions that integrate/link the business processes to meet
the enterprise objectives for the optimization of the enterprise resources
3) Database systems with the "data mining" capabilities to make the best use of available corporate
information for marketing, production, promotion and innovation. The SIS systems also facilitate
identification of the data collection strategies to help optimize database marketing opportunities.
4) The real-time information Systems that intend to maintain a rapid-response and the quality
indicators.
Q.25.

What do you mean by IS/IT strategy and business strategy?


IT strategy is a comprehensive plan that information technology management professionals use to guide
their organizations. IT strategy should cover all facets of technology management, including cost
management, human capital management, hardware and software management, vendor management, risk
management and all other considerations in the enterprise.
A business strategy is the means by which it sets out to achieve its desired ends (objectives). It can simply be
described as a long-term business planning. Typically a business strategy will cover a period of about 3-5
years (sometimes even longer). A business strategy is concerned with major resource issues e.g. raising the
finance to build a new factory or plant. Strategies are also concerned with deciding on what products to
allocate major resources to - for example when Coca-Cola launched Pooh Roo Juice in this country.
Strategies are concerned with the scope of a business' activities i.e. what and where they produce. For
example, BIC's scope is focused on three main product areas - lighters, pens, and razors, and they have
developed super factories in key geographical locations to produce these items.

Q.26.

The information system of an organization may be better compared to the nervous system of human
body. Do you think so? Explain why?
Information is a critical resource in the operation and management of organizations. Timely availability of
relevant information is vital for effective performance of managerial functions such as planning, organizing,
leading, and control. An information system in an organization is like the nervous system in the human body:
it is the link that connects all the organization's components together and provides for better operation and
survival in a competitive environment. Indeed, today's organizations run on information.
The term information system usually refers to a computer-based system, one that is designed to support the
operations, management, and decision functions of an organization. Information systems in organizations
thus provide information support for decision makers. Information systems encompass transaction
processing systems, management information systems, decision support systems, and strategic information
systems.
Information consists of data that have been processed and are meaningful to a user. A system is a set of
components that operate together to achieve a common purpose. Thus a management information system
collects, transmits, processes, and stores data on an organization's resources, programmes, and
accomplishments. The system makes possible the conversion of these data into management information
for use by decision makers within the organization. A management information system, therefore, produces
information that supports the management functions of an organization.

Syed M Hoq, ACCA

Page 13

Information Technology
Q.27.

What strategic role can information technology play in business reengineering and total quality
management?
Information technology can play a vital role in BPR and TQM. Using the technology involved in BPR, an
organization can achieve dramatic improvements in areas such as cost, quality, speed and service.
Information technology can also be used to enable a firm to recognize improvements in quality, productivity,
flexibility, timeliness, and customer responsiveness. Thus, technology in BPR and TQM can be used as tools
and methods to improve the current way of doing business.
Information technology is a key ingredient in reengineering business operations by enabling radical changes
to business processes that dramatically improve their efficiency and effectiveness. Internet technologies can
play a major role other information technologies play an important role in providing computing and
telecommunications resources to support the communications, coordination, and information flows needed.
Managers of a virtual company depend on IT to help them manage a network of people, knowledge,
financial, and physical resources provided by many business partners to quickly take advantage of rapidly
changing market opportunities.

Q.28.

What is business process reengineering? What steps are required to make it effective?
Business Process Reengineering involves the radical redesign of core business processes to achieve dramatic
improvements in productivity, cycle times and quality. In Business Process Reengineering, companies start
with a blank sheet of paper and rethink existing processes to deliver more value to the customer. They
typically adopt a new value system that places increased emphasis on customer needs. Companies reduce
organizational layers and eliminate unproductive activities in two key areas. First, they redesign functional
organizations into cross-functional teams. Second, they use technology to improve data dissemination and
decision making.
In order to implement BPR to an enterprise the followings key actions need to take place:
Selection of the strategic (added-value) processes for redesign.
Simplify new processes - minimize steps optimize efficiency -.(modeling).
Organize a team of employees for each process and assign a role for process coordinator.
Organize the workflow - document transfer and control.
Assign responsibilities and roles for each process.
Automate processes using IT(Intranets, Extranets, Workflow Management)
Train the process team to efficiently manage and operate the new process
Introduce the redesigned process into the business organizational structure
The five steps suggested for BPR are as follows;

Develop the business vision and process objectives.


Identify the processes to be redesigned.
Understand and measure the performance of existing processes.
Understand the opportunities for applying information technology.
Build a prototype of the new process.

Syed M Hoq, ACCA

Page 14

Information Technology
Lesson 04: Organization
Q.29.

How are information systems transforming organization and management?


Transformation of the Business Enterprise
Flattening
Decentralization
Flexibility
Location independence
Low transaction and coordination costs
Empowerment
Collaborative work and teamwork

Q.30.

Briefly discuss why it is difficult to implement a new information system in an organization?


Implementation of a new information system is often more difficult than anticipated because of
organizational change requirements. Since information systems potentially change important organizational
dimensions, including the structure, culture, power relationships, and work activities, there is often
considerable resistance to new systems.

Q.31.

Identify the major management challenges to building and using information systems in organization.
Management challenges to identify the requirements for the system:
Select the right software vendor for developing the system;
Communicate the benefits to the information systems users so they can adopt the change and
support company strategy;
Justify information system investment;
Objectives for developing the system;
Design competitive & efficient systems;
Understand system requirements of global business environment;
Create information architecture that supports organizations goals;
Determine business value of information systems; and
Design systems people can control, understand & use in a socially, ethically responsible manner

Q.32.

Describe some of the major changes that information systems are bringing to organization.
Information systems are driving both daily operations and organizational strategy. Powerful computers,
software, and networks, including the Internet, have helped organizations become more flexible, eliminate
layers of management, separate work from location, and restructure work flows, giving new powers to both
line workers and management. The flattening of organizations is probably one change that students are
likely to cite, particularly with the concern over downsizing. The parallel increase in information and in the
decision power of line workers (empowerment) also increased the workers corresponding work satisfaction
as management span of control is broadened. The empowering of the line worker means managers can
spend more time thinking more strategically.

Q.33.

It is commonly said that the information system always affects the organizational structure and culture of
a company, explain.
The impact of information systems in organization is not unidirectional. Information systems and the
organizations in which they are used interact with and influence each other. The introduction of a new
information system will affect the organizational structure, goals, work design, values, competition between

Syed M Hoq, ACCA

Page 15

Information Technology
interest groups, and decision making, and day-to-day behaviour. At the same time, information systems
must be designed to serve the needs of important organizational groups and will be shaped by the structure,
task, goals, politics, and management of the organization. The power of information systems to transform
organizations radically by flattening organizational hierarchies has not yet been demonstrated for all types of
organizations.
Q.34.

What factors do you take into consideration while adopting information system in an organization?
Explain all of them.
The following factors will be considered;
1) The environment in which the organization must function.
2) The structure of the organization: hierarchy, specialization standard operating procedures.
3) The culture and politics of the organization.
4) The extent of support and understanding of top management.
5) The level of organization at which the system resides.
6) The principle interest groups affected by the systems.
7) The kinds of tasks and decisions that the information system is designed to assist.
8) The sentiments and attitude of workers in the organization who will be using the information
system.
9) The history of the organization: past investments in information technology, existing skills, important
programs, and human resources.

Q.35.

Describe the different information systems that are used in the different management level.
While there are several different versions of the pyramid model, the most common is probably a four level
model based on the people who use the systems. Basing the classification on the people who use the
information system means that many of the other characteristics such as the nature of the task and
informational requirements are taken into account more or less automatically.

Four level pyramid model based on the different levels of hierarchy in the organization
A comparison of different kinds of Information Systems
Using the four level pyramid model above, we can now compare how the information systems in our model
differ from each other.
Syed M Hoq, ACCA

Page 16

Information Technology
1. Transaction Processing Systems
What is a Transaction Processing System?
Transaction Processing System are operational-level systems at the bottom of the pyramid. They are usually
operated directly by shop floor workers or front line staff, which provide the key data required to support
the management of operations. This data is usually obtained through the automated or semi-automated
tracking of low-level activities and basic transactions.
Functions of a TPS
TPS are ultimately little more than simple data processing systems.
Functions of a TPS in terms of data processing requirements
Inputs

Processing

Outputs

Transactions
Events

Validation
Sorting
Listing
Merging
Updating
Calculation

Lists
Detail reports
Action reports
Summary reports?

Some examples of TPS


o Payroll systems
o Order processing systems
o Reservation systems
o Stock control systems
o Systems for payments and funds transfers
The role of TPS
o Produce information for other systems
o Cross boundaries (internal and external)
o Used by operational personnel + supervisory levels
o Efficiency oriented
2. Management Information Systems
What is a Management Information System?
For historical reasons, many of the different types of Information Systems found in commercial organizations
are referred to as "Management Information Systems". However, within our pyramid model, Management
Information Systems are management-level systems that are used by middle managers to help ensure the
smooth running of the organization in the short to medium term. The highly structured information provided
by these systems allows managers to evaluate an organization's performance by comparing current with
previous outputs.
Functions of a MIS
MIS are built on the data provided by the TPS
Functions of a MIS in terms of data processing requirements
Inputs

Processing

Outputs

Internal Transactions

Sorting

Summary reports

Syed M Hoq, ACCA

Page 17

Information Technology
Internal Files
Structured data

Merging
Summarizing

Action reports
Detailed reports

Some examples of MIS


o Sales management systems
o Inventory control systems
o Budgeting systems
o Management Reporting Systems (MRS)
o Personnel (HRM) systems
The role of MIS
o Based on internal information flows
o Support relatively structured decisions
o Inflexible and have little analytical capacity
o Used by lower and middle managerial levels
o Deals with the past and present rather than the future
o Efficiency oriented?
3. Decision Support Systems
What is a Decision Support System?
A Decision Support System can be seen as a knowledge based system, used by senior managers, which
facilitates the creation of knowledge and allow its integration into the organization. These systems are often
used to analyze existing structured information and allow managers to project the potential effects of their
decisions into the future. Such systems are usually interactive and are used to solve ill structured problems.
They offer access to databases, analytical tools, allow "what if" simulations, and may support the exchange
of information within the organization.
Functions of a DSS
DSS manipulate and build upon the information from a MIS and/or TPS to generate insights and new
information.
Functions of a DSS in terms of data processing requirements
Inputs

Processing

Outputs

Internal Transactions
Internal Files
External Information?

Modelling
Simulation
Analysis
Summarizing

Summary reports
Forecasts
Graphs / Plots

Some examples of DSS


o Group Decision Support Systems (GDSS)
o Computer Supported Co-operative work (CSCW)
o Logistics systems
o Financial Planning systems
o Spreadsheet Models?
The role of DSS
o Support ill- structured or semi-structured decisions
o Have analytical and/or modelling capacity
o Used by more senior managerial levels
o Are concerned with predicting the future
Syed M Hoq, ACCA

Page 18

Information Technology
o

Are effectiveness oriented?

4. Executive Information Systems


What is an EIS?
Executive Information Systems are strategic-level information systems that are found at the top of the
Pyramid. They help executives and senior managers analyze the environment in which the organization
operates, to identify long-term trends, and to plan appropriate courses of action. The information in such
systems is often weakly structured and comes from both internal and external sources. Executive
Information System are designed to be operated directly by executives without the need for intermediaries
and easily tailored to the preferences of the individual using them.
Functions of an EIS
EIS organizes and presents data and information from both external data sources and internal MIS or TPS in
order to support and extend the inherent capabilities of senior executives.
Functions of a EIS in terms of data processing requirements
Inputs

Processing

Outputs

External Data
Internal Files
Pre-defined models

Summarizing
Simulation
"Drilling Down"

Summary reports
Forecasts
Graphs / Plots

Some examples of EIS


Executive Information Systems tend to be highly individualized and are often custom made for a particular
client group; however, a number of off-the-shelf EIS packages do exist and many enterprise level systems
offer a customizable EIS module.
The role of EIS
o Are concerned with ease of use
o Are concerned with predicting the future
o Are effectiveness oriented and Are highly flexible
o Support unstructured decisions
o Use internal and external data sources
o Used only at the most senior management levels
Q.36.

How can enterprise analysis and critical success factors be used to establish organization wide information
system requirements?
Both approaches attempt to gain a clear understanding of the organization's long and short-term
information requirements. Both use interviews of managers to gain the information needed.
Enterprise analysis approaches the problem by looking at the entire organization in terms of organizational
units, functions, processes and data elements. This approach takes a large sample of managers and asks
them how they use information, where they get the information, what their environment is like, what their
objectives are, how they make decisions and what their data needs are. This data is aggregated into
subunits, functions, processes, and data matrices. From this information, conclusions are drawn about the
organization-wide information systems requirements.
The CSF approach interviews a smaller number of top managers who are asked to identify their goals and the
objectives essential to those goals. These critical success factors (CSFs) are aggregated to develop a picture
of the overall organization's CSFs. The last step is to designate systems that are needed to deliver these
critical success factors.

Syed M Hoq, ACCA

Page 19

Information Technology
Lesson 05: Information management and decision making
Q.37.

Why is information so important for decision making?


Every job, project, and/or task involves decision making. Decision making is the process of identifying,
selecting, and implementing alternatives. The right information, in the right form, at the right time is needed
to make correct decisions. For example, based on information about customers, competitors, and
production capabilities, a manager may decide to alert top executives that a strategic decision needs to be
made. Top executives would use the information received to identify alternatives for consideration. Each
alternative would then be evaluated based on feasibility, cost, time to implement, consistency with
corporate strategy, and other criteria.
On the basis of their assessment, top executives would select the alternative that makes the most business
sense and begin implementation. Finally, information would be gathered to assess the quality of the
decisions that were made.

Q.38.

How can information systems help individual managers taking better decisions when the problems are
non-routine and constantly changing?
Decision support systems offer the potential to generate higher profits, lower costs, and better products and
services. For example, healthcare organizations use DSSs to track and reduce costs. As with a TPS and an
MIS, a DSS should be designed, developed, and used to help an organization achieve its goals and objectives.
Decision support systems, although skewed somewhat toward the top levels of management, are used at all
levels. To some extent, today's managers at all levels are faced with less structured, non routine problems,
but the quantity and magnitude of these decisions increase as a manager rises higher in an organization.
Many organizations contain a tangled web of complex rules, procedures, and decisions. DSSs are used to
bring more structure to these problems to aid the decision making process. In addition, because of the
inherent flexibility of decision support systems, managers at all levels are able to use DSSs to assist in some
relatively routine, programmable decisions in lieu of more formalized management information systems.
A management information system is especially helpful for handling routine management tasks. For nonroutine decision-making, many managers use another type of system called a decision support system (DSS).
As the name implies a DSS is a computer system that supports managers in decision making tasks.
Executive support systems (ESS) help managers make unstructured and semi structured decisions. ESS focus
on the information needs of senior management and combine data from both internal and external sources.
The ESS creates a generalised computing and communications environment that can be focused on and
applied to a changing array of problems. The ESS can help senior executives monitor organizational
performance, track activities of competitors, spot problems, identify opportunities, and forecast trends.

Q.39.

How information system can facilitate supply chain management?


Supply chain management is the close linkage of activities involved in the processes of buying, making and
moving a product. Supply chain management is important to a business because through its efficiency it can
coordinate, schedule, and control the delivery of products and services to customers.
Supply chain management closely links and coordinates activities in buying, making, and moving a product.
The system should lower costs and streamline the users business. Information systems make supply chain
management more efficient by helping companies coordinate, schedule, and control procurement,
production, inventory management, and delivery of products and services to customers. Information
systems help organizations achieve great efficiencies by automating parts of these processes or by helping
organizations rethink and streamline these processes.

Syed M Hoq, ACCA

Page 20

Information Technology
Information systems can help participants in the supply chain:
1.
2.
3.
4.
5.
6.
7.
8.

Decide when and what to produce, store, and move


Rapidly communicate orders Track the status of orders
Check inventory availability and monitor inventory levels
Track shipments
Plan production based on actual customer demand
Rapidly communicate changes in product design
Provide product specifications
Share information about defect rates and returns

Syed M Hoq, ACCA

Page 21

Information Technology
Lesson 06: Computer and its components
Q.40.

What is a dual processor? What advantages does it offer to its user?


Dual processor can refer to two different types of multiprocessing:
1. A computer with two central processing units
2. A dual-core central processing unit: two processors combined into a single integrated circuit or
package.
In the modern world of computing, computer users may sometimes do whatever it takes to increase the
speed of their desktops and servers. One of the primary ways to increase speed is by upgrading the
computer's main processor, also known as the CPU, or Central Processing Unit. One of the relatively
advanced ways to upgrade a computer's processor is by simply adding a second CPU to the computer, if the
motherboard supports it. This is known as a dual processor configuration.
Speed
The foremost benefit and reason that a dual processor configuration is generally chosen is for the basic
factor of speed. The speed increase from adding a second processor can be relatively phenomenal in
comparison to a single processor computer. Sometimes a computer user will want even more processing
speed than is currently available in a single processor configuration, so adding a second processor can be
one of the best options to achieve a speed increase. A computer operating system must, however, support a
dual processor configuration for the second processor to actually be available for software applications to
use. Although a dual processor configuration substantially increases speed, it does not double the processing
power.
Multitasking
Another intriguing benefit of a computer featuring a dual processor configuration is in the area of
multitasking. Many computer users may not realize that they can actually allocate a software application to
run on one processor of a dual processor computer. This means that, for instance, a video encoding
application can be working in the background encoding a movie on one processor in a computer, while a
computer user is using the second processor to play a game or do something more productive. Using a
computer in this way allows a computer user to get much more done simultaneously. It is almost like having
two computers in one and can be one of the most useful benefits of a dual processor configuration.
Virtualization
Operating system virtualization is one of the most popular, cutting-edge concepts of modern computing is.
Virtualization is the ability to run multiple operating systems on one computer simultaneously. This means
that a computer user can be using Windows and Mac OS, Linux or a variety of other operating systems at the
same time without needing to reboot a computer. Virtualization software basically emulates computer
hardware and appears to an operating system running inside another operating system, as though it were
bare computer hardware rather than software. In a dual processor configuration, one operating system can
be assigned to each of the processors. This allows each of the two operating systems to potentially run at
speeds relatively comparable to two single processor computers.
Alternative answer to this question:
A dual core processor for a computer is a central processing unit (CPU) that has two separate cores on the
same die, each with its own cache. It essentially is two microprocessors in one. This type of CPU is widely
available from many manufacturers. In a dual core processor, each core handles incoming data strings
simultaneously to improve efficiency.
Advantages:

Syed M Hoq, ACCA

Page 22

Information Technology
An attractive value of dual core processors is that they do not require new motherboards but can be used in
existing boards that feature the correct sockets. For the average user, the difference in performance will be
most noticeable during multi-tasking. Servers that are running multiple dual core processors will see an
appreciable increase in performance.
Features
Dual core processors often come with advanced features that single core processors do not have, such as
multithreading. A thread is a single line of data that is processed by your processor at one time. A dual core
processor can thread more data streams simultaneously. This makes multitasking on your computer easier
because your processor doesn't have to switch back and forth between threads.
Affordability
When you need extra processing power, there are several ways to enhance your computer. You can
purchase a system with two processors and two motherboard sockets. However, dual core processors are
often cheaper alternatives. A dual processor refers to a computer with two processors, each processor
containing a separate connection with the motherboard. A dual core processor is one single processor with
two processing cores having a single connection to the motherboard.
Better Performance
Dual core processors report faster speeds than single core processors. When running a single program, both
cores work together to stream data. This allows your computer to download at faster speeds and run
commands more efficiently. Dual core processors also reduce the need for motherboard fans.
Power Consumption
With two cores running simultaneously, your computer is able to process programs faster, which reduces
the power consumption of your system. This is especially useful in video and audio editing. You computer
may need to run for hours while a video is rendering. A dual core processor cuts rendering time and saves
energy.
Q.41.

If costs were not issue, describe the characteristics of your ideal computer. What would you use it for?
Would you choose a handheld, portable, desktop or workstation computer? Why?
If cost were not an issue I would want to be able to design and setup my own computer; which will be ideal
for me and meet all of my need and requirements. I will use the computer for gaming and surfing the
internet, but generally for gaming; and do assignments if it requires using a computer.
Characteristics of my ideal computer would be as below:
a) Intel Core 2 Extremen X6800 processor
b) 4GB of RAM
c) twin Nvidia Quadro FX Go 2500M graphics
d) dual 250GB hard disk
e) 7-in-1 memory card reader
f) dual layer DVD RW drive and a high resolution 17 inch 1920X1200 display
With those characteristics of my ideal computer, I may use it not only to assist me in my daily tasks but also
it can assist me in producing more attractive charts for my presentation purpose.
I choose the computer to be portable (laptop), so that I can take it anywhere. Having a portable computer,
this will enable me to take the computer anywhere and the matter of size means that it will not be space
consuming. The downside of having a portable computer (laptop) is that, if hardware is damaged, you will
have to disassemble the whole computer. This is because everything is assembled into one packed laptop. A

Syed M Hoq, ACCA

Page 23

Information Technology
desktop however, has its own monitor, CPU and keyboard; making it easier to fix the computer if it is
damaged.
But nevertheless, being able to make or create your own computer with no price restrictions is very
favourable.
Q.42.

What is called Bar Code Scanner?


A barcode reader or scanner, also known as a point of sale (POS) scanner is a hardware device capable of
reading a barcode and printing out the details of the product or logging that product into a database. A
perfect example of a barcode reader is a super market barcode scanner that reads and logs the price of a
product.
A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes. Like a flatbed
scanner, it consists of a light source, a lens and a light sensor translating optical impulses into electrical ones.
Additionally, nearly all barcode readers contain decoder circuitry analyzing the barcode's image data
provided by the sensor and sending the barcode's content to the scanner's output port.

Q.43.

What are the applications of barcode reader in business? Mention what factors we should consider for
buying a monitor and a printer?
The use of barcoding and barcode scanners has transformed operational efficiencies of a phenomenal
number of businesses both large and small. Simple yet effective, the barcode as an invention has made itself
indispensable purely by the multi-faceted advantages that it offers to the user across the entire barcoding
spectrum - from generating barcodes through customizable barcode generating software right up to
sophisticated barcode scanners and barcode readers. Given below are the useful killer benefits of these
marvelous devices.
1. Speed and Accuracy: A really good data entry operator would be able to enter a 12 digit number (like
product code for example) on his keypad in approximately 4-5 seconds, but the average would be more like
7 seconds. The same operation if performed with a barcode scanner would take just one flick of the wrist,
less than a second. The speed difference is evident - the use of the barcodes is unmatched in its ability to
plough through large volumes of these operations effortlessly. While a data entry operator might make
keyboard errors when he types in data, the chances of a barcode reader giving wrong output is practically
nonexistent tending almost to zero. For all practical purposes, accuracy is exact, every time the barcode
reader makes its flowing motion over the barcode.
2. Good value for money: If you could capture information quickly and accurately, it could only mean a
tighter supply chain and well-knit business processes based on this information. With superior information,
you can take superior business decisions that increase shareholder value. Imagine what disastrous
consequences incorrect information could have on your business! A vast collection of barcodes and barcode
scanner usage data has revealed that the investment made in this technology pays back in as short a period
as 6 to 10 months - way faster than most modern technologies that attempt to improve the way we conduct
our business. Thus the barcode genre is one where the customer truly gets good value for money and high
return on investment.
3. Ease of implementation: You decide you want to start using barcodes for your products but are worried
that you have never done it before? Fear not, for in 15-20 minutes of your time that scenario will get
reversed. The use of barcode readers is almost childishly simple with no prerequisite for usage. Not only can
anybody do it, but they can do it quickly as well for the learning curve of using barcodes is extremely steep
and short.

Syed M Hoq, ACCA

Page 24

Information Technology
One can never get enough of the importance and advantages of barcodes and barcode scanners. It now only
remains for you to start scouring the market for various barcoding solutions to unlock the immense savings
and gains that are lying in wait for your business! Go ahead and barcode your business growth in to the
future!

Q.44.

What factors determine the speed of computer system? Explain.


With the exception of the central processing unit (CPU), most hardware within a computer has two numbers
that can help to determine the speed of the system. The first number is the amount of the resource
provided, such as the volume of a hard drive or the capacity of the random access memory (RAM) chips. The
second number is the speed at which the hardware operates, which can cause other components inside a
computer to become slower if it is too low. Software also determines computer speed, specifically how
many programs or processes are running in the background and taking up computer power and
resources. Overall computer speed ultimately is largely determined by how well all the software and
hardware components operate together.
At the center of a computer is the CPU, which is the main processor that performs most of the operations
within a computer or delegates tasks to other components. The faster a CPU, the faster a computer will be in
most cases, although other factors can mitigate the increase in computer speed. The cache, which is a buffer
between the CPU and hardware such as a hard drive, can cause the CPU to operate slowly if it is not fast
enough to feed information to the CPU or accept it quickly from hardware. Additionally, the circuits known
as buses on the motherboard serve as the primary pathways for reading from hardware, and they need to be
as fast as the CPU. If these components are not assembled so they have complementary speeds, then the
overall computer speed will be slower than expected.
The size and rate of the RAM also can affect computer speed. RAM is used to hold information in a location
that can be accessed quickly, allowing programs to run fast, and large data calculations to be made
efficiently. Like other components, RAM has a given speed that determines how fast information can be read
and written to it. If there is an insufficient amount of RAM in a system, then the computer will start to use
the hard drive as a virtual RAM disk, which is accessed at a much slower rate.
A computers hard drive, the physical storage device, can affect computer speed. Aside from the speed of
reading and writing operations and the amount of available space, which the operating system uses to
temporarily store memory pages from RAM, a hard disk can suffer from disk fragmentation. Disk
fragmentation occurs when information, such as a program or a document, is not stored in consecutive
memory locations but instead is spread across many areas of a hard disk. This means the drive must jump to
several random physical locations to assemble a single file, slowing execution. Regularly defragmenting a
hard drive can solve this problem.
The software that is installed also can reduce computer speed. When a computer initially starts, certain
programs and drivers are loaded into memory. Many of these are vital for the computers operation, but
some are not and simply occupy memory, processor cycles and, potentially, network bandwidth. Managing
the amount of processes that are running at any given time, as well as other programs that might be in the
background, can increase computer speed significantly and release valuable resources for other programs to
use.

Q.45.

What do you mean by communication protocol? Describe the different types of protocols.
A communications protocol is a system of digital message formats and rules for exchanging those messages
in or between computing systems and in telecommunications. A protocol may have a formal description.
Protocols may include signalling, authentication and error detection and correction capabilities.

Syed M Hoq, ACCA

Page 25

Information Technology
When two humans converse, they may have to use the same language but they generally understand each
other without having to adhere to rigid rules of grammar or formal language frameworks. Computers, on the
other hand, have to have everything explicitly defined and structured. If computers wish to communicate
with one another, they have to know in advance exactly how information is to be exchanged and precisely
what the format will be. Therefore, standard methods of transmitting and processing various kinds of
information are used and these methods are called "protocols". Protocols are established by international
agreement and ensure that computers everywhere can talk to one another. There are a variety of protocols
for different kinds of information and functions.
TCP/IP
TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different procedures that are often
linked together. The linking of several protocols is common since the functions of different protocols can be
complementary so that together they carry out some complete task. The combination of several protocols to
carry out a particular task is often called a "stack" because it has layers of operations. In fact, the term
"TCP/IP" is normally used to refer to a whole suite of protocols, each with different functions. This suite of
protocols is what carries out the basic operations of the Web. TCP/IP is also used on many local area
networks. The details of how the Web works are beyond the scope of this article but I will briefly describe
some of the basics of this very important group of protocols. More details can be found in the references in
the last section.
When information is sent over the Internet, it is generally broken up into smaller pieces or "packets". The
use of packets facilitates speedy transmission since different parts of a message can be sent by different
routes and then reassembled at the destination. It is also a safety measure to minimize the chances of losing
information in the transmission process. TCP is the means for creating the packets, putting them back
together in the correct order at the end, and checking to make sure that no packets got lost in transmission.
If necessary, TCP will request that a packet be resent.
Internet Protocol (IP) is the method used to route information to the proper address. Every computer on the
Internet has to have it own unique address known as the IP address. Every packet sent will contain an IP
address showing where it is supposed to go. A packet may go through a number of computer routers before
arriving at its final destination and IP controls the process of getting everything to the designated computer.
Note that IP does not make physical connections between computers but relies on TCP for this function. IP is
also used in conjunction with other protocols that create connections.
Another member of the TCP/IP suite is User Datagram Protocol (UDP). (A datagram is almost the same as a
packet except that sometimes a packet will contain more than one datagram.) This protocol is used together
with IP when small amounts of information are involved. It is simpler than TCP and lacks the flow-control
and error-recovery functions of TCP. Thus, it uses fewer system resources.
A different type of protocol is Internet Control Message Protocol (ICMP) . It defines a small number of
messages used for diagnostic and management purposes. It is also used by Ping and Traceroute.
Mail protocols
Email requires its own set of protocols and there are a variety, both for sending and for receiving mail. The
most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP). When configuring email
clients such as Outlook Express, an Internet address for an SMTP server must be entered. The most common
protocol for receiving mail is Post Office Protocol (POP). It is now in version 3 so it is called POP3. Email
clients such as Outlook Express require an address for a POP3 server before they can read mail. The SMTP
and POP3 servers may or may not be the same address. Both SMTP and POP3 use TCP for managing the
transmission and delivery of mail across the Internet.
Syed M Hoq, ACCA

Page 26

Information Technology
A more powerful but less common protocol for reading mail is Interactive Mail Access Protocol (IMAP). This
protocol allows for the reading of individual mailboxes at a single account and is more common in business
environments. IMAP also uses TCP to manage the actual transmission of mail.
It is increasingly popular to use Web based email such as Yahoo. Web mail, of course, involves the same
protocol as a Web page and this is discussed next.
Hypertext Transfer Protocol
Web pages are constructed according to a standard method called Hypertext Markup Language (HTML). An
HTML page is transmitted over the Web in a standard way and format known as Hypertext Transfer Protocol
(HTTP). This protocol uses TCP/IP to manage the Web transmission.
A related protocol is Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), first introduced by
Netscape. It provides for the transmission in encrypted form to provide security for sensitive data. A Web
page using this protocol will have https: at the front of its URL.
File Transfer Protocol
File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network from
one computer to another. More generally, it provides for some simple file management on the contents of a
remote computer. It is an old protocol and is used less than it was before the Word Wide Web came along.
Today, Its primary use is uploading files to a Web site. It can also be used for downloading from the Web but,
more often than not, downloading is done via HTTP. Sites that have a lot of downloading (software sites, for
example) will often have an FTP server to handle the traffic. If FTP is involved, the URL will have ftp: at the
front.
Q.46.

How data is organized in hard disk?


The hard disk is the primary storage unit of the computer. A hard disk consists of a stack of disk platters that
are made up of aluminium alloy of glass coated with a magnetic material. The surface of a disk is divided into
imaginary tracks and sectors. Tracks are concentric circles where the data is stored. These tracks are
numbered from the outermost ring to the innermost ring, starting from zero. Disk sectors refer to the
number of fixed size areas that can be accessed by one of the disk drives read/write heads, in one rotation
of the disk, without the head having to change its position. An intersection of a track and a disk sector is
known as track sector. Each sector is uniquely assigned a disk address before a disk drive can access a piece
of data. In order to make the disk usable, first it must be formatted to create tracks and sectors. The track
sectors are grouped into a collection known as cluster. It refers to the basic allocation unit for storage on a
disk.

Syed M Hoq, ACCA

Page 27

Information Technology
Lesson 07: Software
Q.47.

What is the difference between system software and application software package?
System software and application software are computer programs. The system software is also installed
during the installation of the operating system. However, the application software utilizes the capabilities of
the computer on which it is installed.
System Software
The programs and the file that comprises the operating system are called system software. These files
include configuration files, system preferences, system services, libraries of functions and the drivers for the
hardware installed on the computer. The computer programs in system software include compilers, system
utilities, assemblers, debuggers and file management tools.
Once you install the operating system, the system software is also installed. Program such Software
update or Windows update can be used to update the system software. However, the end user does not
run the system software. For example, while using the web browser, you dont need to use the assembler
program.
System software is also called low-level software as it runs at most basic level of the computer. It just creates
a graphical user interface thorough which the user can interact with hardware with the help of operating
system. System software just runs at the back so you dont need to bother about it.
The system software provides an environment to run application software and it controls the computer as
well as the applications installed on the machine.
Application software
The subclass of a computer program which utilizes the capabilities of computer is called application
software. Application here means the application software and the implementation. The example of
application software programs includes media players, spreadsheets and word processors. When multiple
applications are packaged together then it is called application suite.
There is a common user interface in each application suite which makes it easier for the user to learn
different applications. In some cases, such as Microsoft Office, the various application programs have the
ability to interact with each other. This facility is very handy for the user. For example, a user can embed the
spreadsheet in a word processor using the application software. Application software cannot run without
the presence of system software.
Difference between system software and application software
a) System software gets installed when the operating system is installed on the computer while
application software is installed according to the requirements of the user.
b) System software includes programs such as compilers, debuggers, drivers, assemblers while
application software includes media players, word processors, and spreadsheet programs.
c) Generally, users do not interact with system software as it works in the background whereas users
interact with application software while doing different activities.
d) A computer may not require more than one type of system software while there may be a number
of application software programs installed on the computer at the same time.
e) System software can run independently of the application software while application software
cannot run without the presence of the system software.

Syed M Hoq, ACCA

Page 28

Information Technology
Q.48.

What is programming language? Describe the different generation of programming language.


A programming language is an artificial language designed to communicate instructions to a machine,
particularly a computer. Programming languages can be used to create programs that control the behavior
of a machine and/or to express algorithms precisely.
Ever since the invention of Charles Babbages different engine in 1822, computers had to be instructed to
perform a specific task. This way of instructing machines is known as a programming language.
Computer languages were first composed of a series of steps to wire a particular program these changed
into a series of steps keyed into the computer and then executed later these languages acquired features
such as logical branching and object orientation.
First generation Language
When computers were no longer being rewired but rather programmed using some form of input, computer
programming took the form of numbers and numbers alone. This exclusive use of numbers to command or
instruct computers in their operations was called first -generation language. It is a low - level language.
A first generation language (1GL) is a machine language, that is, programs are coded in 0s and 1s. The main
benefit of 1GL is that code written by a user can run very fast and efficiently due to the fact that the Central
Processor Unit (CPU) executes the instructions directly. However, there were many drawbacks to 1GL.
In the first place, portability is a problem because of various architectural considerations, for example, if two
CPUs differ in their architecture, the program has to be rewritten completely. It is also very difficult to code
and even more difficult to debug.
Second generation Language
Second generation language (2GL) refers to some form of assembly language but the code, unlike 1GL, can
be fairly easily written or read by a programmer. It must be converted into machine-readable form before
running it on a computer. This means converting the assembly language into binary machine language. This
low level language has major speed advantages but requires a great deal of programming effort and is
difficult to use effectively in large applications.
Third generation Language
A third generation language (3GL) is a high level programming language designed to be easier to
understand for the user and includes named variables and structured programming. 3GL uses a compiler to
convert the statements or instructions of a specific language into machine language. A 3GL language
requires a great deal of programming language.
Fourth generation Language
A fourth generation language (4GL) is designed to be closer to natural language than a 3GL language. 4GL
programs were developed with a specific purpose in mind, such as the development of commercial business
software. Most 4GL languages are used to access databases and are typically non procedural. They are
designed to be used by end users and to develop applications quickly.
Fifth generation Language
A fifth generation language (5GL) is a programming language based on solving problems using constraints
given to the problem, rather than using algorithm written by a programmer. An algorithm is like a recipe
used to bake a cake. In 4GL the programming adds all the ingredients together to bake the cake, but a fifth
generation language is itself a master cook that uses the given ingredients to bake a cake.

Syed M Hoq, ACCA

Page 29

Information Technology
The different between 4GL and 5GL is that the programmer only needs to worry about which problem to
solve and which conditions to meet. Today fifth generation languages have lost part of their initial appeal
and are mostly used in academic circles
Q.49.

How do you choose appropriate software and programming language of your company?
While managers need not become programming specialists, they should know the differences between
programming languages and should be able to use clear criteria in deciding which language to use. The most
important criteria are as follows;
Appropriateness
Some languages are general-purpose languages that can be used on solving all kinds of problems, while
others are special purpose languages suitable for only solving special purposes. Special purposes graphics
programs are excellent at creating tables but pool BASIC, tine processing of transactions. COBOL is excellent
for business data processing poor at mathematical calculations. Language selection involves identifying the
sucrose and the users.
Sophistication
High-level languages should have sophistic control structures and data structures. Control structures shape
the outcome of programs by providing clear, logical, structured programs that are easy to read and maintain.
It may be impossible to create a table and then look up values in it unless the language has a table data
structure capability. Languages should be selected that support many different data structures.
Organizational considerations
In order to be effective, a language must be easily learned by the firms programming staff, easy to maintain
and change, and flexible enough so that it can grow with the organization. These organizational
considerations have direct long term cost implications. In general, sophisticated, well-structured languages
are easier to learn and much easier to maintain over the long-term than less sophisticated languages.
Support
It is important to purchase software that has widespread use in other organizations and is supported by
many consulting firms and services. It is often less expensive to purchase software written elsewhere, or to
have a service firm write it, than to develop the software internally. In these situations, it is crucial to have
software that is widely used.
Efficiency
Although a less important feature than in the past, the efficiency with which language compiles and executes
remains a consideration when purchasing software. Languages with slow compilers, or interpreters like
BASIC can be used efficiently.

Q.50.

Outline some factors to consider on a successful ERP software implementation with merits and demerits
of such software.
ERP systems are complex, time consuming and expensive. Instances of failure of ERP projects abound
including some high ticket failures such as Hershey, (largest chocolate maker of USA), where a SAP
implementation was abandoned after three years. There are various Dos and Donts effecting success or
failures of an ERP implementation. Some of critical success factors, needing focused initiative, are appended
below:
Commitment from project sponsor: Project sponsors normally belong to top echelon of the
organization. A deep commitment and active involvement is needed from them and bare monitoring and
oversight may not suffice. Their vigorous engagement should get other executives in board. One of their
important roles will be to resolve any inter departmental conflict which is bound to occur during the

Syed M Hoq, ACCA

Page 30

Information Technology

course of implementation. They should also ensure that most knowledgeable executives are engaged in
the project and released from routine functions whenever needed.
Commitment of resources: An ERP project needs a significant financial commitment and budgetary
support. Expenditure involves not only direct expenditure relating to ERP package but a host of indirect
cost such as integration with other software, gathering and cleaning of input data, archiving data from
legacy system, engaging expert/consultant, additional support need, provision for contingency etc.
Selection of package and consultant: The selection of ERP package should be absolutely need based, as
detailed on business requirement analysis, done beforehand. Selection should not be influenced by
extraneous factors such as glamour involved in the name of big ERP packages. Selection of a consultant,
who will provide advice independent of the interest of vendor and guide the entire process of
implementation, should be done carefully and with due diligence. The consultant should be truthfully
independent and should not be linked to a particular ERP vendor. This is also applicable to consultants
from big named consulting firms as they may have tendency to recommend a complex product,
requiring added consulting effort during implementation process.
Project Management: An empowered project manager, supported by IT and functional experts and
appropriate project management methodology, is key to success of ERP implementation. Setting up of
project team, resource allocation, milestones and deliverables etc form important part of project
management. Tailor made training programme for different type of users and a predefined change
management process, are also crucial.
Legacy Data: Legacy data are stored manually, in excel files or in legacy system. Collection of legacy data
is needed to be planned carefully to avoid the syndrome known as garbage in and garbage out which
will undermine the confidence on the system after implementation. Cleaning of data should be done by
removing duplicate and unnecessary information, before importing to ERP system.

Critical failure factors: Critical factors for failure may be defined as contrary to critical success factors. Some
specific concerns of failures are mentioned below:
Creeping in of additional functionality: Pressure often mounts for additional functionalities not
envisaged earlier during implementation. This may lead to conflict with ERP vendor. Dealing through
change management process also involves additional cost and time and should be avoided as far as
possible.
Unrealistic expectations: ERP system is not an all cure silver bullet. Users often like to see an immediate
improvement after installation. There are bound to be initial period of frustration which may snowball,
undermining confidence on the system.
Information overload: An ERP system contains hundreds of reports and queries. Too much information
creates a lot of confusion amongst users. Notwithstanding information overload, many a time, users feel
cheated as the system fail to generate identical reports to which they are accustomed.
Resistance to Change: Users are overwhelmed by all the new features of the system. Some of the aged
employees may be unwilling to adopt a new way of working. Some may be uncomfortable with the
awareness that their supervisor will now keep a better trail on what they are doing.
Conclusions
Success and failure factors encompass pre-implementation planning, phases of implementation and
managing post implementation scenario. There are many instances of failures resulting bitter legal battle
with the vendor. Although vendor plays an important role, organisations are mostly responsible for success
or otherwise of the project.
Enterprise resource planning, or ERP, manages a company's resources via a software system. ERP is designed
to promote smoother, more efficient work flow among all parties, both internal and external, of a given
corporation. For corporations seeking to consolidate all business functions and increase overall productivity,
the advantages and disadvantages of ERP are worth considering.
Syed M Hoq, ACCA

Page 31

Information Technology
Advantage: Integration
ERP's most important advantage is arguably its ability to integrate virtually all business departments of a
given company into a single, cohesive platform. In addition to synchronization of work flow, ERP also leads
to global decision optimization, a clearer overview of enterprise functioning and quicker performance.
Disadvantage: Startup Cost
A major disadvantage of ERP is its overall startup cost. The implementation requires new hardware, training
and consultants to give instruction in addition to the software itself. This creates a high price tag that may
not be acceptable to a company---especially for a system that cannot guarantee profit.
Advantage: Reduced Operating Costs
Once the startup costs of ERP are navigated, users may discover rewards for their efforts in the form of
reduced operating costs. ERP enables companies to have greater control over marketing, production and
inventory. This reduces costs as well as reliance on help desk support.
Disadvantage: External Security
Designed with internal security as a No. 1 priority, ERP is disadvantaged by its vulnerability to external
security threats. External attacks can come in the form of dictionary attacks that aim to crack weak
passwords or applications flooded by buffer overflows allowing hackers easy access. Other methods include
duping users into divulging credentials---this can lead to hackers entering a system as authorized users.
Advantages:
Integration
Integration can be the highest benefit of them all. The only real project aim for implementing ERP is reducing
data redudancy and redudant data entry. If this is set as a goal, to automate inventory posting to G/L, then it
might be a successful project. Those companies where integration is not so important or even dangerous,
tend to have a hard time with ERP. ERP does not improve the individual efficiency of users, so if they expect
it, it will be a big disappointment. ERP improves the cooperation of users.
Efficiency
Generally, ERP software focuses on integration and tend to not care about the daily needs of people. I think
individual efficiency can suffer by implementing ERP. the big question with ERP is whether the benefit of
integration and cooperation can make up for the loss in personal efficiency or not.
Cost reduction
It reduces cost only if the company took accounting and reporting seriously even before implementation and
had put a lot of manual effort in it. If they didn't care about it, if they just did some simple accounting to fill
mandatory statements and if internal reporting did not exists of has not been fincancially-oriented, then no
cost is reduced.
Less personnel
Same as above. Less reporting or accounting personnel, but more sales assistants etc.
Accuracy
No. People are accurate, not software. What ERP does is makes the lives of inaccurate people or
organization a complete hell and maybe forces them to be accurate (which means hiring more people or
distributing work better), or it falls.
Disadvantages:
Expensive

Syed M Hoq, ACCA

Page 32

Information Technology
This entails software, hardware, implementation, consultants, training, etc. Or you can hire a programmer or
two as an employee and only buy business consulting from an outside source, do all customization and enduser training inside. That can be cost-effective.
Not very flexible
It depends. SAP can be configured to almost anything. In Navision one can develop almost anything in days.
Other software may not be flexible.
Q.51.

Discuss the Enterprise Resource Planning (ERP) and process of ERP usage in manufacturing firms.
Enterprise resource planning (ERP) systems integrate internal and external management information across
an entire organizationembracing finance/accounting, manufacturing, sales and service, customer
relationship management, etc. ERP systems automate this activity with an integrated software application.
The purpose of ERP is to facilitate the flow of information between all business functions inside the
boundaries of the organization and manage the connections to outside stakeholders.
In modern businesses, these three goals are identified:
1. Integration of financial data:
When managers depend on their functions or units perspective of financial data, conflicting interpretations
will arise (e.g., finance will have one set of sales figures, while marketing will have another). Using an ERP
system provides a single version of sales.
2. Standardization of manufacturing processes:
A manufacturing company that has grown through acquisitions is likely to find that different units use
different methods to build the same product. Standardizing processes and using an integrated computer
system can save time, increase productivity, and reduce head count. It may also enable collaborating and
scheduling production across different units and sites.
3. Standardization of human resource information:
This is especially useful in a multi-site company. A unified method for tracking employee time and
communicating benefits is extremely beneficial, because it promotes a sense of fairness among the
workforce as well as streamlines the company as a whole.
25 benefits may be achieved from applying ERP system
The following benefits are consolidated across five benefit dimensions:
Dimension
Operational

Managerial

Strategic

Syed M Hoq, ACCA

Sub-dimension
1. Cost reduction
2. Cycle time reduction
3. Productivity improvement
4. Quality improvement
5. Customer services improvement
6. Better resource management
7. Improved decision making and
planning
8. Performance improvement
9. Support business growth
10 Support business alliance
11. Build business innovations
12. Build cost leadership
13.Generate
product
differentiation
(including

Explanation
Because ERP systems automate business
processes and enable process changes, one would
expect ERP systems to offer all of these types of
benefits.
With a centralized database and built in data
analysis capabilities, it seems likely that ERP
systems will provide informational benefits to
management.
ERP systems, with their large-scale business
involvement and internal and external integration
capabilities, could assist in achieving these
strategic benefits.

Page 33

Information Technology

IT Infrastructure

Organizational

customization)
14.
Build external linkages
(customers and suppliers)
15. Worldwide expansion
16. Enabling e-commerce
17. Build business flexibility for
current and future changes
18. IT cost reduction
19. Increased IT infrastructure
capability
20. Support organizational changes
21. Facilitate business learning
22. Empowerment
23. Build common visions
24. Change employee behaviour
25. Better employee morale and
satisfaction

ERP systems, with their integrated and standard


application architecture, provide an infrastructure
that could support this dimension.

The integrated information processing capabilities


of ERP systems could affect the establishment of
organizational capabilities.

The big winner: Inventory Control


The significant importance of material/inventory control is that for most organizations providing products or
services to customers, materials account for about 75% to 85% of the total cost of provision of the product
or service.
An example of the costs for a typical manufacturing organization is as follows:
Total cost of manufacturing

100 %

Material cost of manufacturing

75 %

Labor and salaries

15 %

Overhead

5%

Profit

5%

This shows the significance of materials in the overall cost of manufacturing. To illustrate the point further, a
1% savings in the cost of materials in the above example leads to a 15% increase in profit. Conversely, an
addition of 1% to the cost of materials means a reduction in profits of 15%, and hence, the importance of the
contribution of materials and inventory control for business performance is clear.
The cost of materials includes not only the purchase price but also the cost of physical loss of material, scrap,
mishandling and overhandling, purchasing too much, paying too far in advance of usage, storage, labor in
stores and purchasing departments, loss due to obsolescence, and additional handling charges and transport
costs as a result of inefficient scheduling and purchasing management. This complexity, coupled with the
scope for significant benefits if improvements can be made in the efficiency of the purchase and use of
materials, prompted organizations to acquire computer systems that can support better managerial
practices in this domain. This is the source of the movement toward implementation of MRP, MRPII, and,
later, ERP systems.

Syed M Hoq, ACCA

Page 34

Information Technology
Q.52.

Is SAP the best ERP software? Why?


In today's challenging business environment, best-run companies have clarity across all aspects of their
business, which allows them to act quickly with increased insight, efficiency, and flexibility. This is
particularly true if your business includes SAP.
SAP is the world's largest business software company and the third-largest independent software provider in
terms of revenues. Even though the competition is fierce with a lot of new entrants in the marketplace from
large and small vendors over this time, SAP is still a leader in enterprise software. Here are some reasons
which explain why SAP continues to be the market leader in the enterprise space:
1. The first reason is simply the fact that SAP solutions are scalable and can be customized according to the
evolving business requirements of an enterprise. It can be easily integrated with future applications giving
users a significant competitive advantage in the market. SAP solutions have become integral to the
foundation of international businesses, as almost half of the world's Fortune1000 companies have
implemented ERP solutions from SAP.
2. SAP has been mainly focusing on enterprise applications for the last 30 years, the area where they hold
the market leader spot today across the globe. While the other large ERP software vendors, tend to have
multiple business focuses - like, databases as an example.
3. SAP continues to focus its ERP applications on maximizing resources, reducing costs and optimizing
performance that is customized for businesses and industries. SAP provides a comprehensive range of
business software and enterprise applications - designed for global operations and supported with
globalization services - to empower every aspect of your business.
4. SAP architecture is extremely strong with a process-centric focus and a foundation that operates in real
time communication with enterprise wide business processes that is highly flexible.
5. Lastly, with the experience of the last 30 years SAP has afforded their enterprise applications to be
extremely industry and business specific. They have already built and refined these industry specific
solutions with real customers and real implementations carrying the knowledge base and enhancing their
technology and application offerings each year for the last three decades.
SAP not only helps to manage day to day operations efficiently; it also sharpens business insight by providing
real time access to timely information. As there are more solutions available on the marketplace to choose
from, and even given the increasing competitive landscape, SAP has kept their market dominance.

Q.53.

How does ERP differ from the integrated accounting package software?
Accounting package handles only individual business functions of accounts whereas Enterprise Resource
Planning (ERP) package handles the entire range of business functions of an organization.
ERP system is a fully integrated business management system covering functional areas of an enterprise like
Finance, Human Resources, Production, Sales and Logistics etc. It organizes and integrates operation
processes and information flows to make optimum use of resources such as men, material, money and
machine. ERP is a tightly integrated closed loop business solution package.
ERP system enhances a manufacturer ability to accurately schedule production, fully utilize capacity, reduce
inventory, and meet promised shipping dates.
Businesses use computer systems to organize their data. Computer systems allow companies to store data,
create reports or download data into spreadsheets. Users can choose which type of data they wish to access,
and the computer system provides the information that meets the users' criteria. Two common types of

Syed M Hoq, ACCA

Page 35

Information Technology
computer systems used by companies are ERP systems and integrated accounting systems. When deciding
which type of computer system to implement in a business, management needs to consider the differences
between them.
ERP
Enterprise resource planning systems, or ERP systems, refer to a computer system that integrates data from
several departments in the organization. These include the production department, human resources,
finance and shipping. This allows employees throughout the company to access information. For example, a
customer service representative can access shipping details through the ERP and alert the customer when
their order ships. The company stores parameters in the ERP system restricting access to confidential
information. For example, employee wage rates should only be accessible to human resource personnel.
Integrated Accounting Systems
Integrated accounting systems refer to a computer system that integrates various functions of the
accounting department. These functions include accounts payable, fixed assets, general ledger and the
inventory system. This allows anyone in the accounting department to access financial data. For example, an
employee who works with inventory accounting can see which vendor invoices need to be paid. The
accounting system includes security features that limit access to confidential information, such as vendor
Social Security numbers.
Data Included
One primary difference between an ERP system and an integrated accounting system revolves around the
data included in the system. ERP systems access department information from throughout the organization.
Integrated accounting systems only access information from the accounting department.
Purpose
ERP systems and integrated accounting systems serve different purposes for businesses. ERP systems
provide detailed information for managers to use in their own work. For example, a manager in shipping
who needs to determine how many employees to schedule the following week can access customer orders.
By knowing how many customers orders will need to be shipped, the manager determines how many
employees to schedule. An integrated accounting system feeds financial information to the general ledger
from each accounting function. This allows the company to create financial statements that reflect the
financial results from each area within accounting.
Q.54.

What kind of software and software tools do we need to run our business organization?
Application software is developed to aid in any task that benefits from computation. It is a broad category,
and encompasses software of many kinds, including the internet browser being used to display this page.
This category includes:
Business software

Computer-aided design

Databases

Decision making software

Educational software

Image editing

Industrial automation

Mathematical software

Medical software

Molecular modeling software

Simulation software

Spreadsheets

Word processing

Telecommunications

Syed M Hoq, ACCA

Page 36

Information Technology
Q.55.

Classify the software.


Computer software can be defined as a set of instructions that are given to the computer in the machine
code in order to control various operations as well as to solve user problems. Software is actually the
language of computer. Read this article to know about different types of computer software.
3 Types of computer software:
Depending on its use and application, computer software can be broadly classified into the following.
1. System software: System software controls computer operations along with the devices attached to the
computer. This software actually creates links between the user and the computer. It controls the execution
of the application programs as well. System software comprises of the following.
* Operating system It helps different parts of a computer to work together along with providing a platform
to run different high-level system software.
* Utility software In short, utility software helps to configure, analyze, optimize as well maintain a
computer.
* Computer BIOS and device firmware They offer the functionality to operate as well as control the various
hardware that are either built into or connected to the computer.
2. Programming software: This software basically assists a programmer to write computer programs, which
can be defined as set/sets of logical instructions to make a computer perform various tasks. Programming
software is a set of tools comprising of compilers, text editors and interpreters. Linux and Java are two of the
most commonly used programming software.
3. Application software: Application software is a set of programs that help to solve particular problems of
the user through the computer. It is also sometimes referred to as application package. There are different
types of computer software that fall under the category of application software. Some of them are discussed
below.
* Database Management Software- They are used to create as well as manage databases, such as, student
information, library records, etc. This software also helps to retrieve data quickly.
* Word Processing Software It is used to create and edit documents, such as, reports, letters, etc. It
enables users to apply different formats in order to make the document look attractive. Microsoft Word is
one of the common examples of such application software.
* Spreadsheet software This is generally used for business applications as the software helps to record
transactions and execute financial calculations.

Q.56.

What are the factors one should consider in selecting an operating system?
The following factors should be considered in selecting an operating system:
1) Compatibility of application software to be used;
2) Compatibility of hardware; and Speed;
3) Easy to learn and use;
4) Single or multiple users;
5) Multi-tasking capabilities;
6) Reliability;
7) Cost; and
8) Availability of technical support to run and install.

Syed M Hoq, ACCA

Page 37

Information Technology
Lesson 08: Application Software
Q.57.

What do you mean by systems and application software?


System software is a program that manages and supports the computer resources and operations of a
computer system while it executes various tasks such as processing data and information, controlling
hardware components, and allowing users to use application software. That is, systems software functions
as a bridge between computer system hardware and the application software. System software is made up
of many control programs, including the operating system, communications software and database
manager. There are many kinds of computers these days. Some of them are easier to learn than others.
Some of them perform better than others. These differences may come from different systems software.
Application software is all the computer software that causes a computer to perform useful tasks beyond
the running of the computer itself. A specific instance of such software is called a software application,
application or app.
The term is used to contrast such software with system software, which manages and integrates a
computer's capabilities but does not directly perform tasks that benefit the user. The system software serves
the application, which in turn serves the user.
Examples include enterprise software, accounting software, office suites, graphics software and media
players. Many application programs deal principally with documents. Applications may be bundled with the
computer and its system software, or may be published separately.

Q.58.

What is software? Shortly discuss on some application software.


Software is organized information in the form of operating systems, utilities, programs, and applications that
enable computers to work. Software consists of carefully-organized instructions and code written by
programmers in any of various special computer languages. Software is divided commonly into two main
categories: (1) System software: controls the basic (and invisible to the user) functions of a computer and
comes usually preinstalled with the machine. See also BIOS and Operating System. (2) Application software:
handles multitudes of common and specialized tasks a user wants to perform, such as accounting,
communicating, data processing, word processing.
Application software utilizes the capacities of a computer directly for a dedicated task. Application software
is able to manipulate text, numbers and graphics. It can be in the form of software focused on a certain
single task like word processing, spreadsheet or playing of audio and video files. Here we look at the
application software types along with some examples of application software of each type.
Different Types of Application Software
Word Processing Software: This software enables users to create and edit documents. The most popular
examples of this type of software are MS-Word, WordPad and Notepad among other text editors.
Database Software: Database is a structured collection of data. A computer database relies on database
software to organize data and enable database users to perform database operations. Database software
allows users to store and retrieve data from databases. Examples are Oracle, MSAccess, etc.
Spreadsheet Software: Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software.
Spreadsheet software allows users to perform calculations using spreadsheets. They simulate paper
worksheets by displaying multiple cells that make up a grid.

Syed M Hoq, ACCA

Page 38

Information Technology
Multimedia Software: They allow users to create and play audio and video files. They are capable of playing
media files. Audio converters, audio players, burners, video encoders and decoders are some forms of
multimedia software. Examples of this type of software include Real Player and Media Player.
Presentation Software: The software that is used to display information in the form of a slide show is known
as presentation software. This type of software includes three functions, namely, editing that allows
insertion and formatting of text, methods to include graphics in the text and a functionality of executing
slide shows. Microsoft PowerPoint is the best example of presentation software.
Enterprise Software: It deals with the needs of organization processes and data flow. Customer relationship
management or the financial processes in an organization are carried out with the help of enterprise
software.
Information Worker Software: Individual projects within a department and individual needs of creation and
management of information are handled by information worker software. Documentation tools, resource
management tools and personal management systems fall under the category of this type of application
software.
Educational Software: It has the capabilities of running tests and tracking progress. It also has the
capabilities of collaborative software. It is often used in teaching and self-learning. Dictionaries like
Britannica and Encarta, mathematical software like Matlab and others like Google Earth and NASA World
Wind are some of the well-known names in this category.
Simulation Software: Used to simulate physical or abstract systems, simulation software finds applications
in both, research and entertainment. Flight simulators and scientific simulators are examples of simulation
software.
Content Access Software: It is used to access content without editing. Common examples of content access
software are web browsers and media players.
Application Suites: An application suite is an important type of application software. It consists of a group of
applications combined to perform related functions. OpenOffice.org and Microsoft Office are the best
examples of this type of application software. These application suites, as you know, come as bundles of
applications like word processors, spreadsheets, presentation software, etc. Applications in the suite can
work together or operate on each other's files.
Software that aid Engineering and Development of Products: These software are used in the design and
development of hardware and software products. Integrated development environments (IDE) and
computer language editing tools falls under this type of application software. Interestingly, software
products are developed using other software, and software communicate with one another through
software. Application programming interfaces which aid the communication of two or more software, are
examples of this application software type.
Q.59.

Discuss how an inventory software package is going to serve the purpose of your inventory management.
Inventory management software is a computer-based system for tracking inventory levels, orders, sales and
deliveries. It can also be used in the manufacturing industry to create a work order, bill of materials and
other production-related documents. Companies use inventory management software to avoid product
overstock and outages. It is a tool for organizing inventory data that before was generally stored in hardcopy form or in spreadsheets. It is often associated with and is similar to distribution software.
Features

Syed M Hoq, ACCA

Page 39

Information Technology
Inventory management software is made up of several key components, all working together to create a
cohesive inventory for many organisations' systems. These features include:
Order management
Should inventory reach a certain threshold, a company's inventory management system can be programmed
to tell managers to reorder that product. This helps companies avoid running out of products or tying up too
much capital in inventory.
Asset tracking
When a product is in a warehouse or store, it can be tracked via its barcode and/or other tracking criteria,
such as serial number, lot number or revision number. Nowadays, inventory management software often
utilizes barcode, radio-frequency identification (RFID), and/or wireless tracking technology.
Service management
Companies that are primarily service-oriented rather than product-oriented can use inventory management
software to track the cost of the materials they use to provide services, such as cleaning supplies. This way,
they can attach prices to their services that reflect the total cost of performing them.
Product identification
Barcodes are often the means whereby data on products and orders is inputted into inventory management
software. A barcode reader is used to read barcodes and look up information on the products they
represent. Radio-frequency identification (RFID) tags and wireless methods of product identification are also
growing in popularity.
Purpose
Companies often use inventory management software to reduce their carrying costs. The software is used to
track products and parts as they are transported from a vendor to a warehouse, between warehouses, and
finally to a retail location or directly to a customer.
Inventory management software is used for a variety of purposes, including:
1. Maintaining a balance between too much and too little inventory.
2. Tracking inventory as it is transported between locations.
3. Receiving items into a warehouse or other location.
4. Picking, packing and shipping items from a warehouse.
5. Keeping track of product sales and inventory levels.
6. Cutting down on product obsolescence and spoilage.
Manufacturing uses
Manufacturers primarily use inventory management software to create work orders and bills of materials.
This facilitates the manufacturing process by helping manufacturers efficiently assemble the tools and parts
they need to perform specific tasks. For more complex manufacturing jobs, manufacturers can create
multilevel work orders and bills of materials, which have a timeline of processes that need to happen in the
proper order to build a final product. Other work orders that can be created using inventory management
software include reverse work orders and auto work orders. Manufacturers also use inventory management
software for tracking assets, receiving new inventory and additional tasks businesses in other industries use
it for.
Advantages
There are several advantages to using inventory management software in a business setting.
Cost savings

Syed M Hoq, ACCA

Page 40

Information Technology
In many cases, a companys inventory represents one of its largest investments, along with its workforce and
locations. Inventory management software helps companies cut expenses by minimizing the amount of
unnecessary parts and products in storage. It also helps companies keep lost sales to a minimum by having
enough stock on hand to meet demand.
Increased efficiency
Inventory management software often allows for automation of many inventory-related tasks. For example,
software can automatically collect data, conduct calculations, and create records. This not only results in
time savings, cost savings, but also increases business efficiency.
Warehouse organization
Inventory management software can help distributors, wholesalers, manufacturers and retailers optimize
their warehouses. If certain products are often sold together or are more popular than others, those
products can be grouped together or placed near the delivery area to speed up the process of picking,
packing and shipping to customers.
Updated data
Up-to-date, real-time data on inventory conditions and levels is another advantage inventory management
software gives companies. Company executives can usually access the software through a mobile device,
laptop or PC to check current inventory numbers. This automatic updating of inventory records allows
businesses to make informed decisions.
Data security
With the aid of restricted user rights, company managers can allow many employees to assist in inventory
management. They can grant employees enough information access to receive products, make orders,
transfer products and do other tasks without compromising company security. This can speed up the
inventory management process and save managers time.
Insight into trends
Tracking where products are stocked, which suppliers they come from, and the length of time they are
stored is made possible with inventory management software. By analysing such data, companies can
control inventory levels and maximize the use of warehouse space. Furthermore, firms are more prepared
for the demands and supplies of the market, especially during special circumstances such as a peak season
on a particular month. Through the reports generated by the inventory management software, firms are also
able to gather important data that may be put in a model for it to be analyzed.
Disadvantages
The main disadvantages of inventory management software are its cost and complexity.
Expense
Cost can be a major disadvantage of inventory management software.[16] Many large companies use
inventory management software, but small businesses can find it difficult to afford it. Barcode readers and
other hardware can compound this problem by adding even more cost to companies. The advantage of
allowing multiple employees to perform inventory-management tasks is tempered by the cost of additional
barcode readers.
Complexity
Inventory management software is not necessarily simple or easy to learn. A companys management team
must dedicate a certain amount of time to learning a new system, including both software and hardware, in
order to put it to use. Most inventory management software includes training manuals and other
information available to users. Despite its apparent complexity, inventory management software offers a
degree of stability to companies. For example, if an IT employee in charge of the system leaves the company,
Syed M Hoq, ACCA

Page 41

Information Technology
a replacement can be comparatively inexpensive to train compared to if the company used multiple
programs to store inventory data
Q.60.

What are the most important factors you would use in evaluating payroll software?
Here are numerous factors to consider when evaluating payroll software applications.
Upgrade current software or purchase a new solution
Should you upgrade the current software or purchase a new software package? This generally is the starting
point for the evaluation process. Upgrading the current software will depend upon the software
manufacturer. Ask if your current software provider has an upgraded version and request a demonstration.
Determine if the upgraded software will accommodate future expansion and reporting requirements. Is the
software keeping up with the demands of the industry? If the answer to any of these questions is no, then it
is time to start looking for a new payroll software.
Features and Functions
Develop a list of functions and features required for processing the company payroll. A software package
with hundreds of bells and whistles is worthless if it is complex and difficult to use or if you cannot get the
needed information out of the system. Look for functionality and flexibility. Make a list of essential and
required reports, and then make a list of items you would like, but are not necessarily vital. If you process
multiple state payrolls, ask if the additional states are included or if you need to purchase each state
individually. Look for the ability to customize reports for your company's particular needs. When reviewing
the customizable reports, ask if the process of customizing the reports is easy and quick. Does the software
provide general ledger information? Are export features available? Time invested in obtaining the necessary
information is very important to avoid a false start with software not capable of satisfying all of your
companys needs. Time spent setting up a new system and training your employees takes away from their
primary functions and must be kept to a minimum.
Integration
Will the new payroll software package integrate smoothly with the accounting system and other software
packages you are currently using? It is rare there will be a conflict between two different software packages,
but it is wise to run your other software packages after installing the new software to make sure everything
will run smoothly. Some software packages make changes to your printer setup affecting the print out of
reports and checks in other applications. Take the time to open and run other applications on the system
prior to going live to reduce the risk of potential problems.
Licensing Agreements
Inquire about licensing agreements, software maintenance, and updates. Ask about the cost of multiple
licensing agreements and software maintenance. Inquire if updates are automatically sent out for changes in
the tax code and if there is an additional cost for the update. Each software manufacturer has their own
policies regarding these issues. Communication is the key to understanding the cost and requirements to
comply with the software agreement.
Program Support
Customer Support is a critical aspect of purchasing any new software. Take time to talk to the technical
support staff prior to making your final purchasing decision. The most important question is the accessibility
of technical support. Determine the hours of operation for technical support and the method the company
uses for handling support calls. Do you speak directly to a support technician or do you have to use a menu
system? What is the anticipated response time for support? Inquire about the qualification of the support
staff. Ask for references of customers so you can talk directly to another end user. What is the cost of

Syed M Hoq, ACCA

Page 42

Information Technology
technical support services? Look for a software company who is prepared to offer the highest quality of
technical support from trained personnel.
Future Growth
Technology is constantly changing and it is important to make sure the software package is capable of
handling the current and future demands of your company. Inquire if the software is an annual subscription
renewal or will the company be responsible for updating the tax tables. This can have a big impact on the
time it takes to implement an update. New software should be tested on your network system and with
current hardware prior to purchasing. Even though the type of network may be the same, from company to
company the setup can be as unique as the individual company. Information specialists each have their own
method when setting up a network or installing hardware so it is important to see the impact of installing
new software. Evaluation copies of the software can allow for this type of testing.
Software Training
Education and product training is an ever-expanding market. Training can greatly decrease the learning
curve involved with a new payroll software package. Inquire about training packages available. Training
formats are unlimited. Customized on-site training programs can be expensive depending on the level of
training offered. Many software manufacturers' are now offering web-training seminars. This can be the
least expensive and most convenient method of training for your company. Most software packages offer
extensive on-line help to assist customers in setting up and using the payroll program.
Q.61.

List and discuss disadvantages of software packages.


A software package is a group of programs which are bundled together to serve a common purpose. Often, a
software package will also include the source code that built the executable programs as well as a variety of
documentation for the programs themselves. Some software packages will also include example files that
can further illustrate how the other components of the package work.

Syed M Hoq, ACCA

Page 43

Information Technology
Lesson 09: Database management
Q.62.

What is database and database management system? What are the advantages and disadvantages of
database management system?
A database is a collection of occurrence of multiple record types containing the relationship between
records, data aggregate and data items. A database may be defined as A database is a collection of
interrelated data store together without harmful and unnecessary redundancy (duplicate data) to serve
multiple applications.
A database management system is a set of software programs that allows users to create, edit and update
data in database files, and store and retrieve data from those database files. Data in a database can be
added, deleted, changed, sorted or searched all using a DBMS.
ADVANTAGES OF DBMS
One of the major advantages of using a database system is that the organization can be handled easily and
have centralized management and control over the data by the DBA. Some more and main advantages of
database management system are given below: The main advantages of DBMS are:
1. Controlling Redundancy
In a DBMS there is no redundancy (duplicate data). If any type of duplicate data arises, then DBA can control
and arrange data in non-redundant way. It stores the data on the basis of a primary key, which is always
unique key and have non-redundant information. For example, Roll no is the primary key to store the
student data.
In traditional file processing, every user group maintains its own files. Each group independently keeps files
on their db e.g., students. Therefore, much of the data is stored twice or more. Redundancy leads to several
problems:
Duplication of effort
Storage space wasted when the same data is stored repeatedly
Files that represent the same data may become inconsistent (since the updates are applied independently
by each users group).
2. Restricting Unauthorized Access
A DBMS should provide a security and authorization subsystem.
Some db users will not be authorized to access all information in the db (e.g., financial data).
Some users are allowed only to retrieve data.
Some users are allowed both to retrieve and to update database.
3. Providing Persistent Storage for Program Objects and Data Structures
Data structure provided by DBMS must be compatible with the programming languages data structures.
E.g., object oriented DBMS are compatible with programming languages such as C++, SMALL TALK, and the
DBMS software automatically performs conversions between programming data structure and file formats.
4. Permitting Inferencing and Actions Using Deduction Rules
Deductive database systems provide capabilities for defining deduction rules for inferencing new
information from the stored database facts.
5. Inconsistency can be reduced
In a database system to some extent data is stored in, inconsistent way. Inconsistency is another form of
delicacy. Suppose that an em1oyee Japneet work in department Computer is represented by two

Syed M Hoq, ACCA

Page 44

Information Technology
distinct entries in a database. So way inconsistent data is stored and DBA can remove this inconsistent data
by using DBMS.
6. Data can be shared
In a database system data can be easily shared by different users. For example, student data can be share by
teacher department, administrative block, accounts branch arid laboratory etc.
7. Standard can be enforced or maintained
By using database system, standard can be maintained in an organization. DBA is overall controller of
database system. Database is manually computed, but when DBA uses a DBMS and enter the data in
computer, then standard can be enforced or maintained by using the computerized system.
8. Security can be maintained
Passwords can be applied in a database system or file can be secured by DBA. Also in a database system,
there are different coding techniques to code the data i.e. safe the data from unauthorized access. Also it
provides login facility to use for securing and saving the data either by accidental threat or by intentional
threat. Same recovery procedure can be also maintained to access the data by using the DBMS facility.
9. Integrity can be maintained
In a database system, data can be written or stored in integrated way. Integration means unification and
sequencing of data. In other words it can be defined as the data contained in the data base is both accurate
and consistent. Data can be accessed if it is compiled in a unique form. We can take primary key ad some
secondary key for integration of data. Centralized control can also ensure that adequate checks are
incorporated in the DBMS to provide data integrity.
10. Confliction can be removed
In a database system, data can be written or arranged in a well-defined manner by DBA. So there is no
confliction between the databases. DBA select the best file structure and accessing strategy to get better
performance for the representation and use of the data.
11. Providing Multiple User Interfaces
For example query languages, programming languages interfaces, forms, menu- driven interfaces, etc.
12. Representing Complex Relationships Among Data
It is used to represent Complex Relationships Among Data
13. Providing Backup and Recovery
The DBMS also provides back up and recovery features.
DISADVANTAGES OF DBMS
Database management system has many advantages, but due to some major problem arise in using the
DBMS, it has some disadvantages. These are explained as:
1. Cost
A significant disadvantage of DBMS is cost. In addition to the cost of purchasing or developing the software,
the organization also purchase or upgrade the hardware and so it becomes a costly system. Also additional
cost occurs due to migration of data from one environment of DBMS to another environment.
2. Problems associated with centralization
Centralization also means that data is accessible from a single source. As we know the centralized data can
be accessed by each user, so there is no security of data from unauthorized access and data can be damaged
or lost.
3. Complexity of backup and recovery
Syed M Hoq, ACCA

Page 45

Information Technology
Backup and recovery are fairly complex in DBMS environment. As in a DBMS, if you take a backup of the data
then it may affect the multi-user database system which is in operation. Damage database can be recovered
from the backup floppy, but iterate duplicacy in loading to the concurrent multi-user database system.
4. Confidentiality, Privacy and Security
When information is centralized and is made available to users from remote locations, the possibilities of
abuse are often more than in a conventional system. To reduce the chances of unauthorized users accessing
sensitive information, it is necessary to take technical, administrative and, possibly, legal measures. Most,
databases store valuable information that must be protected against deliberate trespass and destruction.
5. Data Quality
Since the database is accessible to users remotely, adequate controls are needed to control users updating
data and to control data quality. With increased number of users accessing data directly, there are
enormous opportunities for users to damage the data. Unless there are suitable controls, the data quality
may be compromised.
6. Data Integrity
Since a large number of users could be using .a database concurrently, technical safeguards are necessary to
ensure that the data remain correct during operation. The main threat to data integrity comes from several
different users attempting to update the same data at the same time. The database therefore needs to be
protected against inadvertent changes by the users.
7. Enterprise Vulnerability
Centralizing all data of an enterprise in one database may mean that the database becomes an indispensable
resource. The survival of the enterprise may depend on reliable information being available from its
database. The enterprise therefore becomes vulnerable to the destruction of the database or to
unauthorized modification of the database.
8. The Cost of using a DBMS
Conventional data processing systems are typically designed to run a number of well-defined, preplanned
processes. Such systems are often tuned to run efficiently for the processes that they were designed for.
Although the conventional systems are usually fairly inflexible in that new applications may be difficult to
implement and/or expensive to run, they are usually very efficient for the applications they are designed for.
The database approach on the other hand provides a flexible alternative where new applications can be
developed relatively inexpensively. The flexible approach is not without its costs and one of these costs is
the additional cost of running applications that the conventional system was designed for. Using
standardized software is almost always less machine efficient than specialized software.
Q.63.

Briefly discuss the elements of database management system (DBMS).


The elements of DBMS are as follows;
Database Administrator (DBA):
DBA is the Person responsible for the design, implementation and management of a database. The DBA
determines database access rights and other matters of concern to users.
Data definition language:
The component of DBMS that defines each data element as it appears in the database.
Data manipulation language:
A language associated with database management system that is employed by end users and programmers
to manipulate data in the database.

Syed M Hoq, ACCA

Page 46

Information Technology
Structured Query Language (SQL):
It is the emerging standard data manipulation language for relational database management systems.

Q.64.

Data Dictionary:
It is an automated or manual tool for sorting and organizing information about the data maintained in a
database.
Mention some commonly used database management software.
Some commonly used database management software are as follows;
i) Dabase III+
ii) Xbase
iii) Microsoft Access
iv) Fox Pro
v) Visual Basic
vi) Clipper
vii) Pascal
viii) C++
ix) Oracle
x) MySQL
xi) PostgreSQL
xii) SQL Server
xiii) FileMaker
xiv) RDBMS
xv) dBASE

Q.65.

Describe the three principal database models and their advantage.


The types of the database models generally used in the business organizations can be categorized as follows:
1. Hierarchical Data Base Model (HDBM)
a. Is one of the earliest data base management systems.
b. This model has data logically as one to many relationship.
c. Follows a structured organizational mode.
d. Requires a controlled, finite and a rule based approach.
e. Represents data in a pyramidal or a tree like structure.
f. Each record appears to be like an organizational chart with one top level segment, called the root,
spreading downwards into the branches and the leaves.
g. There is a record.
h. Within each record, the data elements are organized into the pieces of record which are referred to as the
segments.
i. An upper segment is linked to a lower segment in a parent child relationship.
j. A parent segment may have more than one child.
k. A child can have only one parent.
l. The most common hierarchical data base management system has been the Information Management
System (IMS) released by the IBM in the year 1968.
2. Network Data Base Model (NDBM)
a. Acts as the variation of the above Hierarchical Data Base Model.
b. This model has data logically as manyto many relationship.
c. Helps in understanding and also helps in analyzing the sales Zone performance.
d. Analysis the sales and the recovery position.

Syed M Hoq, ACCA

Page 47

Information Technology
e. Analysis the product wise sales performance.
3. Relational Database Model (RDBM)
a. Most recent of the three database models.
b. Was proposed by Dr. E.F Cod in the year 1970.
c. Consists of the data in the database as simple two dimensional tables called as the relations.
d. The table consists of the rows and also the columns.
e. Rows represent the individual records.
f. The columns represent the attributes of each of the record.
g. The information in more than one file can be easily extracted.
h. This information can be further combined to suit the users specific requirements.
i. The three basic operations of this model are Select, Project, Join.
Q.66.

Define field, record and database. What are the components of database? What will be your functions
when you will become a database administrator of a company?
Filed: A field is typically a name, number, or combination of characters that describes an aspect of a business
object or activity.
Record: A collection of related data fields is a record.
Database: A database is a collection of occurrence of multiple record types containing the relationship
between records, data aggregate and data items. A database may be defined as A database is a collection
of interrelated data store together without harmful and unnecessary redundancy (duplicate data) to serve
multiple applications.
Components of database
A database has four components. These four components are important for understanding and designing
the database system. These are:
1) Data;
2) Hardware;
3) Software; and
4) Users
1. Data
Data is raw hand information collected by us. Data is made up of data item or data aggregate. A Data item is
the smallest unit of named data: It may consist of bits or bytes. A Data item is often referred to as field or
data element. A Data aggregate is the collection of data items within the record, which is given a name and
referred as a whole. Data can be collected orally or written. A database can be integrated and shared. Data
stored in a system is partition into one or two databases. So if by chance data lost or damaged at one place,
then it can be accessed from the second place by using the sharing facility of data base system. So a shared
data also cane be reused according to the users requirement. Also data must be in the integrated form.
Integration means data should be in unique form i.e. data collected by using a well-defined manner with no
redundancy, for example Roll number in a class is non-redundant form and so these have unique resistance,
but names in class may be in the redundant form and can create lot of problems later on in using and
accessing the data.
2. Hardware
Hardware is also a major and primary part of the database. Without hardware nothing can be done. The
definition of Hardware is which we can touch and see, i.e. it has physical existences. All physical quantity
or items are in this category. For example, all the hardware input/output and storage devices like keyboard,

Syed M Hoq, ACCA

Page 48

Information Technology
mouse, scanner, monitor, storage devices (hard disk, floppy disk, magnetic disk, and magnetic drum) etc. are
commonly used with a computer system.
3. Software
Software is another major part of the database system. It is the other side of hardware. Hardware and
software are two sides of a coin. They go side by side. Software is a system. Software are further subdivided
into two categories, First type is system software (like all the operating systems, all the languages and
system packages etc.) and second one is an application software (payroll, electricity billing, hospital
management and hostel administration etc.). We can define software as which we cannot touch and see.
Software only can execute. By using software, data can be manipulated, organized and stored. 4. Users
Without user all of the above said components (data, hardware & software) are meaningless. User can
collect the data, operate and handle the hardware. Also operator feeds the data and arranges the data in
order by executing the software.
One of the main reasons for using DBMS is to have a central control of both data and the programs accessing
those data. A person who has such control over the system is called a Database Administrator (DBA). The
following are the functions of a Database administrator.
Schema Definition;
Storage structure and access method definition;
Schema and physical organization modification;
Granting authorization for data access; and
Routine Maintenance.
Schema Definition
The Database Administrator creates the database schema by executing DDL statements. Schema includes
the logical structure of database table (Relation) like data types of attributes, length of attributes, integrity
constraints etc.
Storage structure and access method definition
Database tables or indexes are stored in the following ways: Flat files, Heaps, B+ Tree etc.
Schema and physical organization modification
The DBA carries out changes to the existing schema and physical organization.
Granting authorization for data access
The DBA provides different access rights to the users according to their level. Ordinary users might have
highly restricted access to data, while you go up in the hierarchy to the administrator, you will get more
access rights.
Routine Maintenance
Some of the routine maintenance activities of a DBA are given below.
Taking backup of database periodically;
Ensuring enough disk space is available all the time;
Monitoring jobs running on the database;
Ensure that performance is not degraded by some expensive task submitted by some users; and
Performance Tuning

Syed M Hoq, ACCA

Page 49

Information Technology
Q.67.

What do you mean by object oriented programming? How does it differ from conventional software
development?
Object-oriented programming (OOP) is a programming paradigm that represents concepts as "objects" that
have data fields (attributes that describe the object) and associated procedures known as methods. Objects,
which are usually instances of classes, are used to interact with one another to design applications and
computer programs.
Object-oriented programming (OOP) is a programming language model organized around "objects" rather
than "actions" and data rather than logic. Historically, a program has been viewed as a logical procedure that
takes input data, processes it, and produces output data.
Object-oriented programming may be seen as a collection of cooperating objects, as opposed to a traditional
view in which a program may be seen as a group of tasks to compute ("subroutines"). In OOP, each object is
capable of receiving messages, processing data, and sending messages to other objects.
Each object can be viewed as an independent little machine with a distinct role or responsibility. The actions
or "operators" on the objects are closely associated with the object.
For example, in object oriented programming, the data structures tend to carry their own operators around
with them (or at least "inherit" them from a similar object or "class"). The traditional approach tends to view
and consider data and behavior separately.

Q.68.

What is SQL? Write SQL statement to display the name and balance from account database.
SQL (short for Structured Query Language) is a special-purpose programming language designed for
managing data held in a relational database management system (RDBMS).
Originally based upon relational algebra and tuple relational calculus, SQL consists of a data definition
language and a data manipulation language. The scope of SQL includes data insert, query, update and
delete, schema creation and modification, and data access control. Although SQL is often described as, and
to a great extent is, a declarative language (4GL), it also includes procedural elements.

Q.69.

Name and describe the three most important SQL commands.


The three most important SQL commands are SELECT, FROM, and WHERE. The SELECT statement lists the
columns from tables that will appear in the result table. The FROM statement identifies the tables or views
from which the columns will be selected. The WHERE statement specifies the conditions for selecting specific
rows within a single table and conditions for joining multiple tables.
See text book page # 192.

Q.70.

What is Data Flow Diagram (DFD)? Describe the rules of constructing a DFD with figure.
The Data Flow Diagram (DFD) is a graphical representation of the flow of data through an information
system. It enables you to represent the processes in your information system from the viewpoint of data.
The DFD lets you visualize how the system operates, what the system accomplishes and how it will be
implemented, when it is refined with further specification.

Q.71.

Explain in brief the differences between the File Management System and Database Management
System.
Computers store and retrieve information using file management systems and databases, but they are both
designed to handle data in different ways. Databases and file management systems are software-based and

Syed M Hoq, ACCA

Page 50

Information Technology
can be used on both personal computers and large mainframes. Both systems have largely replaced their
paper-based equivalents, and without them many tasks that computers do would be impossible.
Databases
Databases are used to store data records, such as customer names, ages, and addresses. This data can be
queried to provide sets of information based on search criteria. For example, a list of all customers who live
in a certain city or all customers of a certain age could be retrieved from a company's customer database.
File Management Systems
File management systems record the location of files saved on a computer's hard disk rather than individual
data records. They store information about the location of files on the hard disk, their size, and associated
attributes--such as whether the file is read-only.
Displaying Data
Database systems can present the information they store in spreadsheets or charts. Data can also be output
in the form of reports via report writing software. This information can vary depending on how the data is
queried. File management systems show files stored on a computer hard disk via a graphical user interface,
displaying a representative organized structure. Windows Explorer is an example of this type of interface.
Data Manipulation
Database systems can change the data they store using transactions. Each record can be deleted or
modified, or new records can be added. Although files can be deleted using a file management system, the
data held within them requires additional software--such as a word processor to manipulate the information
stored within them.
Q.72.

What is data modelling? What is its purpose?


Data modelling is a way to structure and organize data so it can be used easily by databases. Unstructured
data can be found in word processing documents, email messages, audio or video files, and design
programs. Data modelling doesn't want these "ugly" data; rather, data modelling wants data that is all made
up in a nice, neat package for processing by a database. So in a way, data modelling is concerned with how
the data looks.
The purpose of data modelling is the formalization and documentation of existing processes and events that
occur during application software design and development. Data modelling techniques and tools capture
and translate complex system designs into easily understood representations of the data flows and
processes, creating a blueprint for construction and/or re-engineering.

Q.73.

What is the difference between a data definition language (DDL) and a data manipulation language
(DML)?
Data Manipulation Language (also known as DML) is a family of computer languages. They are used by
computer programs, and/or database users, to manipulate data in a database that is, insert, delete and
update this data in the database.
Data Definition Language (also known as DDL) is a computer language used to define data structures as its
namesake suggests. It first made its appearance in the CODASYL database model (a model pertaining to the
information technology industry consortium, known as Conference on Data Systems Languages). DDL was
used within the schema of the database in order to describe the records, fields, and sets that made up the
user Data Model. It was at first a way in which programmers defined SQL. Now, however, it is used
generically to refer to any formal language used to describe data or information structures (for example,
XML schemas).

Syed M Hoq, ACCA

Page 51

Information Technology
The most popular form of DML is the Structured Query Language (or SQL). This is a language used for
databases, and is designed specifically for managing data in relational database management systems (or
RDBMS). There are also other forms in which DML is used, for instance IM S/DLI, CODASYL databases
(IDMS, for example), and a few others. DML comprises of SQL data change statements, meaning that stored
data is modified, but the schema or database objects remain the same. The functional capability of the DML
is organised by the initial word in a statement. This word is most generally a verb giving the page a specific
action to fulfil. There are four specific verbs that initiate an action: SELECTINTO, INSERT, UPDATE, and
DELETE.
The DDL is used mainly to create that is to make a new database, table, index or stored query. A CREATE
statement in SQL literally creates an object inside any RDBMS. As such, the types of objects able to be
created are completely dependent on which RDBMS is currently in use. Most RDBMS support the table,
index, user, synonym and database creation. In some cases, a system will allow the CREATE command and
other DDL commands inside a specific transaction. This means that these functions are capable of being
rolled back. The most common CREATE command is the CREATE TABLE command.
DMLs are quite various. They have different functions and capabilities between database vendors. There are
only two DML languages, however: Procedural and Declarative. While there are multiple standards
established for SQL, most vendors provide their own extensions to the standard without implementing it
entirely.
Summary:
1) DML is a grouping of computer languages used by computer programs to manipulate data in a
database; DDL is a computer language used specifically to define data structures.
2) The most popular form of DML is SQL, and is comprised of various change statements; DDL mainly
uses the CREATE command.
Q.74.

Compare the traditional data entry with source data automation.


Source Data Automation:
Source Data Automation is the use of automated methods of data entry that attempt to reduce or eliminate
many of the activities, people and data media required by traditional data entry methods. It is basically the
process of collecting data at the point of origin in digital form. Automated data entry eliminates much of the
effort and delay in the extra handling involved in traditional data entry methods and therefore the potential
for error in duplicated entries etc.. The data can then be collected straight from the Source Data Automation
device, which is ready to process the transaction and it is possible to instantly check for accuracy during the
data entry process. Its many benefits have made source data automation a compelling choice for many types
of commercial data entry today. Source data automation has transformed a number of information handling
tasks. For example, workers who take orders over the phone today usually enter needed input directly into a
display workstation, so they don't have to record the same data twice.
Source data automation also speeds up checkout lines and inventory taking at supermarkets, quality control
operations in factories and check processing in banks. Examples of source data automation include bar code
scanners, (otherwise known as Optical Character Readers), Magnetic Ink Character Recognition (MICR codes)
on bank checks, the magnetic stripe on credit cards, touch screens and voice recognition systems. Source
Data Automation is used because of its cost effectiveness; it contains accurate and complete data and
provides quick availability of data. It is also easy to track operational trends and can support decisions.
Traditional Data Entry: Capture data on source documents such as purchase orders, payroll time sheets, and
sales order forms

Syed M Hoq, ACCA

Page 52

Information Technology
Source Data Automation:
Capture data as early as possible
Capture data as close as possible to the source
Capture data by using machine readable media (bar codes, magnetic stripes)
Transaction Terminals: Point-of-sale/ATM terminals, OCR devices
Q.75.

Discuss briefly the multidimensional data analysis.


Multi-dimensional Data Analysis (MDDA) refers to the process of summarizing data across multiple levels
(called dimensions) and then presenting the results in a multi-dimensional grid format. This process is also
referred to as OLAP, Data Pivot., Decision Cube, and Crosstab.

Q.76.

What are the four key organizational elements of a database environment? Describe each briefly.
The four key organizational elements of a database environment are data administration, data planning and
modelling methodology, database technology and management, and users. Data administration is the
organizational function for managing the organization's data resources and is concerned with information
policy, data planning, maintenance of data dictionaries, and data quality standards.
A data planning and modelling methodology focuses on enterprise-wide planning and analysis of data. The
database technology and management element is responsible for defining and organizing the structure and
content of the database as well as maintaining the database. The user element references the fact that end
users have a wider role with DBMS than in traditional systems and must be trained.

Q.77.

What are the basic components of a data warehouse? Explain how a data warehouse can benefit a
manager?
A data warehouse is a database with archival, querying, and data exploration tools (i.e., statistical tools) and
is used for storing historical and current data of potential interest to managers throughout the organization
and from external sources (e.g. competitor sales or market share).
Data Warehousing Components
A data warehouse always consists of a number of components, including:
Operational data sources.
Design/development tools.
Data extraction and transformation tools.
Database management system (DBMS).
Data access and analysis tools.
System management tools.

Q.78.

What are primary key and foreign key in database?


A foreign key is a relationship or link between two tables which ensures that the data stored in a database is
consistent. The foreign key link is set up by matching columns in one table (the child) to the primary key
columns in another table (the parent).
A primary key is an attribute (or combination of attributes) that uniquely identifies each row in a relation. A
primary key is designated by underlining the attribute name. The primary key of an entity set allows us to
distinguish among the various entities of the set.

Syed M Hoq, ACCA

Page 53

Information Technology
Lesson 10: Telecommunication
Q.79.

What is telecommunication system? What are the main functions of all telecommunication system?
A telecommunication system is a collection of compatible hardware and software arranged to communicate
information from one location to another. Telecommunications systems can transmit text, graphic images,
voice, or video information.
Functions of telecommunications
1) Transmission: Media, networks, and path
2) Interface: Path-Sender-Receiver
3) Routing: Choosing the most efficient path
4) Processing: Getting the right message to the right receiver
5) Editorial: Checking for errors, formats, and editing speeds and codes from one device to another
6) Control: Routing messages, polling receivers, providing network structure maintenance.

Q.80.

What are the telecommunication software and hardware?


Telecommunication hardware devices include modems, multiplexers and front-end processors. For more
details see text book page # 225.

Q.81.

What is significance of telecommunication for managers and organizations?


Telecommunications comes from Greek words meaning "far off" and "information exchange." All
telecommunications systems have four primary elements, though in practice they get quite complicated. The
basics include transmitters, a signal, transmission medium and a receiver. Telecommunications technology
has changed dramatically over the past century. Before the Internet and data networks, that technology
primarily surrounded the telephone, which is voice communication exchanged over distance. Early
telecommunication built from telephone technology, including faxing. However, fueled by advances in
semiconductors, analog communications, like the telephone, have been replaced by digital communications.
Data, whether voice, information or images, is represented by bit streams and carried across a common
infrastructure, which you might know as Internet Protocol (NAP), and can be transported over wired cable,
microwave, satellite or broadband fibers.
Transmit Data
Perhaps the most important role of telecommunications is fulfilling its most basic purpose of transmitting
data. The technology includes telephony and video conferencing, facsimile, broadcast and interactive
television, instant messaging, email, distributed electronic collaboration, a host of Web- and Internet-based
communication and data transmission. It transmits and stores your intellectual property and it also
comprises the means through which you connect to your partners, suppliers and customers. The technology
allows your firm to gather, collate, analyze, share and act on information in a variety of ways that ultimately
bear on your bottom line.
Improve Efficiency & Productivity
Telecommunications has radicalized the phrase "do more with less." It essentially reduces the costs of all
transactions. For example, your customers can use the phone or the Internet to make and cancel orders
without an employee being involved. Telecommunications technology can make your shipping operations
smoother by automating many of the basic processes that people once handled. With the vast amount of
information available to each employee of your firm, telecommunications technology allows more
employees to access and harness that information and make decisions based on it. This frees up time once
spent in face-to-face communications to get directives on how to act. Instead, your firm can hire more

Syed M Hoq, ACCA

Page 54

Information Technology
specialized employees who perform more complex work that requires human brain power. Mobile and
wireless telecommunications technology has also freed employees and helped with costs. No longer is an
employee required to be in any particular location to get work done. Moreover, the technology helps
coordinate and dispatch "roaming" employees to sites as needed, eliminating the centrality of the home
base office.
Reach More Customers
Arguably the greatest contribution of telecommunications technology is its empowering firms to reach more
customers with fewer resources and manpower. Online credit card processing and phone payment, virtual
meetings, queued customer service lines, remote monitoring -- even basic home and network security
monitoring and the like are examples of how your firm can service more clients. Even healthcare firms stand
to be innovated with telemedicine allowing remote diagnostics and remote surgery. The power of
telecommunications technology is driving businesses out of dense city centers and allowing people in rural
and remote regions of the world to get connected.
Q.82.

Name and briefly discuss each of the components of a telecommunication system.


The components of a telecommunications system include computers to process information; terminals and
other input/output devices to send or receive data; communications channels to link sending and receiving
devices in networks; communications processors to provide support functions for data transmission; and
communications software to control input and output activities and to manage other functions of the
communications network.

Q.83.

What are the principle factors to consider when designing and developing a good and sound
telecommunication plan?
See manual page # 78.

Q.84.

Describe different types of topologies that are used in telecommunication. What are the functions of
communication software and hardware?
The three principal network topologies are star, bus, and ring. A star network consists of a central host
computer connected to a number of smaller computers or terminals. All communication between points in
the network must pass through the host computer. A bus network links a number of computers by a single
circuit made of twisted wire, cable, or optical fibre. All messages are transmitted to the entire network and
can travel in both directions along the cable. There is no need to have a host computer controlling the
network. The ring network is similar to a bus network except that the connecting wire, cable, or optical fibre
forms a ring. Data are passed along the ring from one computer to another, flowing in a single direction, and
the network does not rely on a central host computer.

Q.85.

What technologies are used in telecommunication system?


Telecommunications technology includes anything used by humans to communicate information over a
distance. The concept has been around since the early days of human history, when smoke signals and
drums were used to inform a person or groups of people of an event or situation. Major breakthroughs since
the late 1800s have brought the field of telecommunications into the modern age, however. As early as the
telegraph, long distances could be traversed with information. More recent developments include the
telephone, radio, television, fax machine, and computer, each with its own unique properties to benefit the
information exchange of mankind.
In order for something to be considered a telecommunications technology, it needs to maintain three
specific properties that define its actions. First, some sort of transmitter must adapt information into a

Syed M Hoq, ACCA

Page 55

Information Technology
signal, such as a drummer beating a specific combination of beats to represent an event. This signal must
then be transmitted over some sort of medium, such as the echo caused by a valley in which the drummer is
located. Third, a receiver captures the signal and converts it into information usable by the recipient. Like
the drum beating example, all modern forms of telecommunications from cellular phones to Internet
connections use this same concept.
One of the most prevalent telecommunications device is the telephone, an instrument that transfers vocal
information from place to place. Two main types of phones are used in modern society: the analog-based,
fixed-line telephone and the satellite-based, cellular phone. Fixed-line telephones were first established as a
telecommunications network in the late 1800s using a complex system of wires placed around the world.
Cellular technology was first implemented in the 1970s using a network of satellites and radio towers. Fax
machines, which utilize the fixed-line telephony network, also use the same method to transfer paper-based
information.
The broadcast system, which features the radio and television networks, uses a different format to transmit
information. Both systems use electromagnetic waves that send audio and video information from one
location to another. This can either be accomplished through an analog or digital method. The basic
methodology for both principles were created during the early 1900s and quickly became primary methods
of information transfer throughout the next century. One challenge with this form of technology is the fact
that different frequencies are used for different platforms and locations around the world.
Networked computers are very common in the modern world and are either connected to a local-area
network or the world wide web. This telecommunications technology allows users to send and receive a
variety of formatted information such as text via emails or video with webcams. Different types of
connections are available to make this technology function. Early connective techniques included fixed-line
analog-to-digital modems, while newer methods including Ethernet lines and wireless connections using
electromagnetic waves.

Syed M Hoq, ACCA

Page 56

Information Technology
Lesson 11: Enterprise-wide Computing and Networking
Q.86.

Differentiate between LAN, WAN & MAN.


LAN, WAN, and MAN are the 3 networks that all computers are a part of. A network is a group of hardware
components and computers that are connected for the sole purpose of sharing information and resources.
For example, if five (5) computers and one printer were joined together within a network, all 5 computers
would have access to use the one printer. If we were addressing wireless networks, they would simply be
referred to as WWAN, WLAN, and WMAN. WAN, LAN, MAN for wired cabling networks, and WWAN, WLAN,
WMAN for wireless networks.
What is a LAN?
A LAN (local area network) is a group of computers and network devices connected together, usually within
the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token
ring or Ethernet). A department store for example runs on a LAN. Most connections are either Ethernet
(10Mbps) or Fast Ethernet (100Mbps), and more locations are now moving to Gigabit Ethernet (1000Mbps)
connections (for greater speed).
What is a MAN?
A Man (metropolitan area network) is a larger network of computers. Large universities that span across
multiple buildings or large corporations would set their computers and network devices on a MAN network.
What is a WAN?
A WAN (wide area network) is a group of computers and network devices connected together, usually within
a whole country of geographical area. The internet would be considered a worldwide public WAN. WAN
were set up to connect MAN networks together.
A bit more information:
More and more companies are moving to wireless networks. At this time wired networks offer the
capability to handle the highest speeds. But as technology moves forward, wireless networks will eventually
be able to handle top speeds just like their wired cousins. And without the cabling mess! MAN networks like
GSM, GPRS, 3G, 4G, are becoming the next generations of fast networks. These are the networks our cell
phones run on!

Q.87.

Network design is a key business decision as well as a technology decision, why?


The design of a network and its capabilities can affect what an organization can and cannot do, how well it
operates in multiple locations, what kind of information it can exchange internally and with customers and
suppliers. Some business models are dependent on networking. Although managers are not networking
experts, they should know the business implications of the networks they choose for their firms.
The world entered the 21st century on a wave of technology optimism. Today, information and
communications technologies seem capable of generating a new level of global prosperity for businesses.
Successful network design can raise productivity, create jobs, and increase incomes. Diligent firms will
examine each specific key business decision carefully, and management should make sound network design
and technology decisions

Q.88.

Discuss the advantages and disadvantages of client/server network.


Advantages of Client/Server:
Centralised Resources:
All data stored in one location

Syed M Hoq, ACCA

Page 57

Information Technology

Easier to backup files and data


Easier to find files and data
Efficient
Software optimised for multiple users
Hardware optimised for multiple users
Security
One machine can secure entire network
One central login
Scalability
Easy to add new resources

Disadvantages of Client/Server
If the server goes down, it takes part or the whole network with it.
It is more expensive to install.
Needs to be maintained by staff with high IT skills.
Peer-to-Peer
Advantages
Easy and simple to set up only requiring a hub or a switch to connect all computers together.
You can access any file on the computer as-long as it is set to a shared folder.
If one computer fails to work all the other computers connected to it still continue to work.
Disadvantages
Security is not good other than setting passwords for files that you don't want people to access.
If the connections are not connected to the computers properly then there can be problems accessing
certain files.
It does not run efficient if you have many computers, it is best to used two to eight computers.
Client/Server
Advantages
A client server can be scaled up to many services that can also be used by multiple users.
Security is more advanced than a peer-to-peer network, you can have passwords to own individual profiles
so that nobody can access anything when they want.
All the data is stored onto the servers which generally have far greater security controls than most clients.
server can control the access and resources better to guarantee that only those clients with the appropriate
permissions may access and change data.
Disadvantages
More expensive than a peer-to-peer network you have to pay for the start up cost.
When the server goes down or crashes all the computers connected to it become unavailable to use.
When you expend the server it starts to slow down due to the Bit rate per second.
When everyone tries to do the same thing it takes a little while for the server to do certain tasks.
Q.89.

Define neural networks and show how they are used in business.
A neural network is a system of programs and data structures that approximates the operation of the human
brain. A neural network usually involves a large number of processors operating in parallel, each with its own
small sphere of knowledge and access to data in its local memory. Typically, a neural network is initially
"trained" or fed large amounts of data and rules about data relationships (for example, "A grandfather is
older than a person's father"). A program can then tell the network how to behave in response to an

Syed M Hoq, ACCA

Page 58

Information Technology
external stimulus (for example, to input from a computer user who is interacting with the network) or can
initiate activity on its own (within the limits of its access to the external world).
In making determinations, neural networks use several principles, including gradient-based training, fuzzy
logic, genetic algorithms, and Bayesian methods. Neural networks are sometimes described in terms of
knowledge layers, with, in general, more complex networks having deeper layers. In feedforward systems,
learned relationships about data can "feed forward" to higher layers of knowledge. Neural networks can also
learn temporal concepts and have been widely used in signal processing and time series analysis.
Current applications of neural networks include: oil exploration data analysis, weather prediction, the
interpretation of nucleotide sequences in biology labs, and the exploration of models of thinking and
consciousness. In his novel, Galatea 2.2, Richard Powers envisioned a neural network (named "Helen") that
could be taught to pass a comprehensive exam in English literature.
Q.90.

What is user interface?


The user interface, in the industrial design field of humanmachine interaction, is the space where
interaction between humans and machines occurs. The goal of this interaction is effective operation and
control of the machine on the user's end, and feedback from the machine, which aids the operator in making
operational decisions. Examples of this broad concept of user interfaces include the interactive aspects of
computer operating systems, hand tools, heavy machinery operator controls, and process controls. The
design considerations applicable when creating user interfaces are related to or involve such disciplines as
ergonomics and psychology.
A user interface is the system by which people (users) interact with a machine. The user interface includes
hardware (physical) and software (logical) components. User interfaces exist for various systems, and
provide a means of:
Input, allowing the users to manipulate a system
Output, allowing the system to indicate the effects of the users' manipulation

Syed M Hoq, ACCA

Page 59

Information Technology
Lesson 12: The Internet
Q.91.

What is internet? What are its principal functions?


The internet is a worldwide network of computers linked together to provide information to people
everywhere. The most popular services on the internet are e-mail and World Wide Web (WWW).
The principal functions of internet are;

Q.92.

Communication
Information retrieval
Easy-to use offerings of information and products

What is electronic payment system? Discuss the different types of electronic payment system.
Electronic Payment is a financial exchange that takes place online between buyers and sellers. The content
of this exchange is usually some form of digital financial instrument (such as encrypted credit card numbers,
electronic cheques or digital cash) that is backed by a bank or an intermediary, or by a legal tender.
Electronic payment systems have become more popular thanks to increased use of Internet shopping. These
systems do not just involve Internet transactions, as there are more and more ways being developed to
facilitate electronic money transfers. With increasing technology, the range of devices and processes used to
transact electronically continues to increase while the use of cash and check transactions is decreasing. This
is mainly because it is much easier to carry cards or use cell phones to pay for purchases compared to cash.
Cards
These are the most common form of electronic payments. There are three types of cards: credit, debit and
prepaid cards. They typically are made of plastic and have a magnetic stripe on the back of the card. The
customer gives the merchant the card while shopping, and the merchant swipes the card through a terminal
or puts the relevant information into a database, which is then delivered to the credit card company, who
relays a confirmation message back to the merchant that the purchase was completed. This process typically
takes only a few seconds to complete. Credit cards are an extremely popular form of electronic payment
because you can use them almost anywhere for almost any kind of purchase, and you do not have to have
cash on hand to pay for things.
Internet
Internet payments involve a person transferring money or making a purchase online. Consumers have a
choice of either transferring the money directly from their bank account, which can easily be accessed
online, or they can use a credit, debit or prepaid card. Most people prefer to use the second option,
especially when making online purchases. This form of payment continues to increase in popularity with the
ever-growing e-commerce industry.
Mobile Payments
Although the number of transactions that can be carried out via a cell phone are limited, they still can be
used to facilitate some electronic transactions. Mobile phone manufacturers have enabled their phones'
software to allow users to access electronic commerce. In some countries, mobile service providers allow
their customers to have a bank account on their cell phone numbers and can use the funds in their accounts
to carry out transactions.
Person-to-Person Payments
These payments enable a person to pay another using an online account, a prepaid card or another
mechanism that stores value. Various companies facilitating such payments are PayPal, Alertpay and

Syed M Hoq, ACCA

Page 60

Information Technology
Q.93.

Moneybookers. These services can easily be accessed over the Internet via computers, phones and other
devices. They provide an easy and secure means of making transactions online.
Discuss advantages and disadvantages of electronic payment system.
Advantages of Electronic Payment System are:
1) Electronic payment is very convenient for the consumer.
In most cases, you on y need to enter your account information such as your credit card the page
released on the use of Web server.
When you come back to the your username and password. Completing a transaction is as simple as
clicking your mouse: All you have to do is confirm your purchase and youre done.
2) Electronic payment lowers costs for businesses.
The more payments they can process electronically, the less patent can also help business one customer
retention customer is more
Likely to run to the same e-commerce is e where his or her information has already
Written and stored. With all the benefits of electronic payment, its no wonder of use is on the rise.
In order to better serve their customers, banks are swiftly moving to offer online bill pay services. Grant
Thorntons 2005 survey of bank executives found that 65 percent of community banks and 94 percent of
large banks offer 24/7 online bill payment. Most of these services are free to members and coordinate
easily with personal software programs such as Quicken or MS Money.
Alternatively, consumers can subscribe to online bill pay services such as Pay trust or Yahoo Bill Pay.
These services charge a monthly fee in exchange for the convenience of paperless bill paying.
3) Capacity! Throughput - A study of ETC on the Tappan Zee Bridge in New York City it could process 1,000
vehicles/hour (vph), while a manual lane could handle only 400450 pHs.
4) Customer Satisfaction - Twenty percent of travellers on two bridges in Lee County, used their departure
times as a result of value pricing and electronic toys.
5) Productivity- Based on changes in traffic conditions after deployment of E-Z Pass, passenger cars on the
New Jersey turnpike saved an estimated $19 million in delay costs and $1.5 million in fuel costs each year.
6)Energy Environment - Model calculations of emissions using the EPA Mobile File of a model and traffic
field data indicated ETC decreased CO by 7.3%, decreased hydrocarbons by 7.2%, and increased NOT by
33.8% at the Holland East Toll Plaza in Florida. NOT increased as a result of higher engine speeds.
Disadvantages
1. Lack of security:
The main drawbacks to electronic payments are concerns over privacy and the possibility of identity
theft.
Fortunately, there are many safeguards available to protect your sensitive personal information from
falling into the wrong hands.
You can defend yourself against identity theft by using virus protection software and a firewall on your
computer.
You should also make sure that you send your credit card information over a secure server.
Your Internet browser will notify you when a server is secure by showing a lock or key icon.
In addition, the URL on a secure site is usually designated by the prefix https instead of http.
Retailers do their part by using data encryption, which codes your information in such a way that only
the key holder can decode it.
2.Lack of applicability:
Not all the web sites support a particular payment method, thus limiting customers ability to pay.

Syed M Hoq, ACCA

Page 61

Information Technology

Credit cards work only with merchants who have signed-up to the services of corresponding credit card
Company, and do not supports direct B2B to interpersonal payments.

3.Lack of eligibility:
Not every potential customer with money and intention to pay can make use of certain payment
methods.
Not all potential buyers can obtain credit cards due to credit history limitations, low income or other
reasons.
4. High usage costs for customers and merchants:
existing payment systems use rather expensive infrastructure to facilitate the payment process.
Credit cards are expensive for end users, not in the least because of the enormous and growing size of
fraud which amounts to billion dollars pr rear this loss is invisibly re financed by users by the higher
costs of credit card services.
In addition, credit card payments are still heavily paper dependent. Most credit card bills are sent in a
paper form to customers by post, and the bills are mostly settled by posting paper documents.
5.lack of efficiency:
Some payments over the internet can be too small to be handled by existing payment systems, because
of overheads included in the processing of payments and transaction.
Credit cards are too expensive for effecting small payments and are unsuited for small transactions.
The minimum fixed fee charged to the retailer for processing a transaction could even surpass the value
of the goods sold.
Privacy concerns aside, some people simply dislike making electronic payments. They find the setup too
time-consuming and dont want more logons and passwords to remember
Others simply prefer the familiarity of writing checks and dropping envelopes in the mail.
Regardless of these concerns, electronic payment will likely continue to rise in popularity.
Q.94.

Describe intranet and extranet.


An "intranet" is the generic term for a collection of private computer networks within an organization. An
"extranet" is a computer network that allows controlled access from the outside for specific business or
educational purposes. Intranets and extranets are communication tools designed to enable easy information
sharing within workgroups.

Q.95.

Describe HTML, http, FTP and URL.


HTML
HyperText Markup Language (HTML) is the main markup language for creating web pages and other
information that can be displayed in a web browser. HTML is written in the form of HTML elements
consisting of tags enclosed in angle brackets (like <html>), within the web page content. HTML tags most
commonly come in pairs like <h1> and </h1>, although some tags, known as empty elements, are unpaired,
for example <img>. The first tag in a pair is the start tag, the second tag is the end tag (they are also called
opening tags and closing tags). In between these tags web designers can add text, tags, comments and other
types of text-based content. The purpose of a web browser is to read HTML documents and compose them
into visible or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret
the content of the page.
HTTP
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia
information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a

Syed M Hoq, ACCA

Page 62

Information Technology
multi-linear set of objects, building a network by using logical links (the so-called hyperlinks) between the
nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext.

FTP
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another
host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses
separate control and data connections between the client and the server. FTP users may authenticate
themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can
connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the
username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File
Transfer Protocol ("SFTP") is sometimes also used instead, but is technologically different.
URL
A uniform resource locator, abbreviated URL, also known as web address, is a specific character string that
constitutes a reference to a resource. In most web browsers, the URL of a web page is displayed on top
inside an address bar. An example of a typical URL would be "http://en.example.org/wiki/Main_Page". A
URL is technically a type of uniform resource identifier (URI), but in many technical documents and verbal
discussions, URL is often used as a synonym for URI.
Q.96.

What is the difference between e-business and e-commerce?


Internet has made business interactions multi-faceted. People can now do business such as buy things,
transact, and carry out business functions over the internet. Consumers and business owners/managers
nowadays can now get and do what they want without leaving the confines of their rooms as long as they
are connected to the internet.
The terms e-business and e-commerce are now often seen and used interchangeably. However, though
related, they have different meanings. The e prefix means electronic which connotes any activity or
transaction done without any physical exchanges or contact. The dealings are done electronically or digitally,
a thing made possible with the leaps and bounds development of digital communications.
E-commerce implies business transactions over the internet where the parties involve are either selling or
buying. The transactions conducted in e-commerce basically involve the transfer or handing over ownership
and rights to products or services.
Technically, e-commerce is only a part of e-business because, by definition, e-business refers to all online
business transactions including selling directly to consumers (e-commerce), dealing with manufacturers and
suppliers, and conducting interactions with partners. Information exchange via centralized database is also
done in e-commerce. Business functions are only limited to the companies technological resources.
E-commerce principally involves money exchanges in the transactions. In e-business, as it is broader, it is not
limited to monetary transactions. All aspects in business are included like marketing, product design, supply
management, etc.
E-business is more about making great products, brainstorming and giving quality service, planning about
product exposure and executing it. Well, of course, e-commerce is an integral part of the e-business process
but in strict terms, it is the activity of selling and buying.
Summary:
1) E-business is broader in scope and e-commerce is just an aspect or a subset of it.

Syed M Hoq, ACCA

Page 63

Information Technology
2)
3)
4)
Q.97.

E-commerce only covers business transactions such as buying and selling of goods and services over
the internet.
E-commerce essentially involves monetary trade while in e-business, money transactions are not
necessary.
E-business involves marketing, product design, consumer service evaluation, and more.

What is EDI? Describe how EDI is used in E-commerce.


Electronic Data Interchange (EDI) refers to the structure transmission of data between organizations by
electronic means. It is more than mere E-mail; for instance, organizations might replace bills of lading and
even checks with appropriate EDI messages. It also refers specifically to a family of standards, including the
X12 series. However, ED1 also exhibits its pre-Internet roots, and the standards tend to focus on ASCIIformatted single messages rather than the whole sequence of conditions and exchanges that make up an
inter-organization business process.

Q.98.

What is cybermall? How it is different from an electronic exchange?


Cybermall is a Web site that links to hundreds of online shopping sites. The cybermall may provide the
shopping cart and handle the financial transactions for all affiliated sites. Cybermall is a commercial website
through which a range of goods may be purchased; a virtual shopping mall on the Internet. It is a term
commonly used to describe an electronic site shared by a number of commercial interests. It is a single web
site which gives online access to goods from a range of shops in similar way to how physical shopping malls
enable shoppers to make purchases in one location.
Electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell
goods, trade market information, and run back-office operations.

Q.99.

What are the steps to be taken to digitalize NBR of Bangladesh?


Background
The phrase "Digital Bangladesh", although is composed of the catching word "Digital", stands for a concept
which benefits the country as a whole by using Information and Communication Technology for
management, administration and governance in order to ensure transparency, accountability and
answerability at all levels of society and state. Digital Bangladesh will provide us an ICT driven knowledgebased society where information will be readily available on line and where all possible tasks of the
government, semi-government and also private spheres will be processed using the state of the art
technology.
So, in order to build a digital Bangladesh, we should emphasis on efficient and effective use of modern ICT in
all spheres of the society with a view to establish technology driven e-governance, e-commerce, eproduction, e-agriculture, e-health etc. for emphasizing the overall development of the common people, the
major stakeholders of the country.
Backbone of Digital Bangladesh
ICT is the backbone of any digital initiative. It covers the vast area of information ensuring connectivity
through the information technology, communication technology and of course the telecommunication
technology. Without the development of the ICT sector, the dream of a Digital Bangladesh would not be
possible. The main factors of ICT are the physical backbone and the intellect. Computer Systems, Network
Machineries, Software, Wire and Wireless Connectivity Systems, Broadcast Hardware and many other
Hardware and Accessories are the physical backbone. The trained human behind the backbone are the
intellect. To materialize the idea of digital Bangladesh, development of countrywide backbone and expected
number of human recourses are the basic needs. On the other hand, while mass people are concern,

Syed M Hoq, ACCA

Page 64

Information Technology
availability, accessibility and affordability must be ensured; otherwise the objective of building a digital
Bangladesh could not be achieved properly. Due to globalization, more specifically due to booming of ICT
like most of the country of the globe, Bangladesh has already been connected with the outside world
through the information super highway.
Relationship between development and digitization
Information technology reduces costs, saves time, improves efficiency, raises comfort levels and increases
the confidence of citizens. Hence, developing countries such as Bangladesh should leverage the power of IT
to leapfrog poverty barriers, and promote economic and social development. But we have to keep in mind
that technology (ICT) alone can not alleviate economy, nor guarantee dynamic service delivery to citizens. It
is important to understand that ICT facilities Good Governance but ICT itself do not guarantee Good
Governance.
Status of our country
Telecommunication and Internet: backbone of communication
Until recently, International Telecommunication System of Bangladesh has been dependent on satellite
which was slow and had narrow band width. According to Telecommunication Policy of the government,
International Telecommunication Network system is being regulated now by BTCL. Bangladesh has presently
been connected with Information Super Highway through Submarine Cable since May, 2006. International
Voice Circuits have been increased by more than 200 percent. IPLC (International Private Leased Circuit) has
been opened with different companies. BTCL is connected with Singapore and France and Italy for Internet
through 12 X STM-1.
The Router capacity of BTCL has been enhanced through up-gradation of digital Data Network. Installation of
NGN TAX (Next Generation Trunk Auto Exchange) is going on. It will enhance the inter district
Telecommunication facilities. Access Network through Copper Cable, Optical Fiber, x-DSL, Wi-MAX is under
process with a view to bring broadband connectivity and other facilities of the Submarine Cable System to
the door-step of the subscribers.
Mobile phone: media of communication
Over last few years, a great revolution has taken place in the cellular phone usage in Bangladesh.
It is evident from the table that the number of cell phone subscribers is growing rapidly compared with the
fixed phone subscribers in Bangladesh. The growth rate of fixed phone subscriber was 15.26 percent in 2008.
Against this, the growth rate of cell phone subscribers stood at 117.57 percent in 2004 and 35 percent in
June 2008.
Computer: tool of digitization
Human Resources: work force for digitization
World Scenario
This digital revolution has created a brand new economic sector that simply did not exist before. Computers,
modern telecommunication and the Internet all reduce communication costs and break down geographical
borders. In addition, ICT can be an important driver in poverty reduction and assure sustained economic
growth, better public welfare, and strong social solidity and democratic forms of government. In the
developed nations government policies are being established which attempts to ensure that all citizens will
get opportunity to access the effective use of ICT in order to enable them to participate in the educational,
social and economic activities and democratic process. Developed countries are getting much benefit from
the advancement of ICT. People living in developed countries have the best access to the fastest computers,

Syed M Hoq, ACCA

Page 65

Information Technology
best telephone services, competitive Internet Service Providers, and a wealth of content and training
relevant to their lives. For example (Legard, 2001):
The total Internet bandwidth in Africa is equal to that in the Brazilian city of Sao Paolo.
The total Internet bandwidth in all of Latin America is equal to that in Seoul, South Korea.
As a proportion of monthly income, Internet access in the United States is 250 times cheaper than in
Nepal and 50 times cheaper than in Sri Lanka.
In the United States, gn 1e6 54.3 percent of citizens use the Internet, compared to a global average
of 6.7 percent. In the Indian subcontinent, the proportion is 0.4 percent.
The digital divide around the world is usually measured through statistical indices such as the number of
telephone lines, personal computers, websites and Internet users and their ratio to the total population.
Table:1 shows a picture of such type of statistics of some world including Bangladesh.
Although, there is an overall increment that has been enjoyed throughout the years in various areas of
information and communication technologies, the improvement is very minimal in terms of global
progression and not as good to be mentioned as an upcoming information society of the world. In fact,
despite all these improvements, according to the ICT Development Index, Bangladesh moved down 6 places,
from rank 132 in 2002 to rank 138 in 2007. This clearly indicates that there were countries that were ranked
below Bangladesh in the 2002 index and they achieved significant improvements to exceed our rank in 2007.
The examples include some developing and least developed countries like Pakistan, Gambia, Cote d'Ivoire,
Senegal, Madagascar, Mauritania and Benin. The country that expanded most worldwide in ranking is
Pakistan, moving up to 19 places, from the rank 146 in 2002 to rank 127 in 2007. Though the rank is still low,
the progress has been significant in the past five years because in 2002 there was almost no ICT access and
usage in the country, whereas in 2007, 8% households had computers and internet penetration reached
10.7%. This proves that the country has improved in two areas of ICT while Bangladesh improved
significantly in one area, which ranked us below Pakistan. So, an overall consistent increment in penetration
levels starting from mobile telephones to fix telephone lines and from internet to personal computers is
highly needed for making Bangladesh the digital one.
India has led the use of remote sensing satellite information for locating irrigation projects. The Internet has
been effectively used in some of the villages to ensure effective dissemination of agricultural commodity
price information. The National Dairy Development Board (NDDB) in India has used IT effectively, to enhance
competitiveness of the dairy industry and to provide benefits to the rural masses. Towards digital
Bangladesh we can use the Indian experience of using ICT in different sectors of the agriculture. Since more
than half of our population is employed in agriculture, our planner should put ICT to good use in agriculture.
The Simputer was developed by scientists from the Indian Institute of Science, and a software company
called Encore. One can get computing facilities at a drastically lower cost as simputer only cost US$150 per
piece compared to US$ 400 for a PC. Further, it has a local language interface. This is an instance of how the
scientist, academia and industry can collaborate to develop technology to suit a particular economy. We can
learn this lesson also from our neighboring country.
In Bangladesh, 51% of the population does not have access to essential drugs. Further, there are only 26
physicians per 100,000 population compared to 279 for US and 162 for China. ICT can help bring medical
expertise to Upazilla and District headquarters. Tele-medicine, for instance may link healthcare centers in
remote locations, through satellites, with super specialty hospitals at major towns / cities. Thus it can bring
connectivity between patients at remote end, with specialist doctors, for medical consultations and
treatment.

Syed M Hoq, ACCA

Page 66

Information Technology
Our shortcomings
Access to the Technology
Inadequate technical and policy capacity is a fundamental barrier to digital Bangladesh. In Bangladesh, the
lack of technical capacity and public managers' perceptions of ICT is problematic in regard to issues such as
migration to IP-based networks, implementation of mobile communication systems, and e-commerce
applications, though capacity building measures do exist. One of the chief obstacles to effective egovernance is a lack of awareness about the usefulness of the Internet in policy making, coordination of
policy implementation, creating portals in engaging important actors in the policy process, and in building an
open and transparent public platform for wider participation. The reason for Digital Divide in Bangladesh is
that the telecommunications infrastructure is deficient. In Bangladesh, the telephone density is only about
0.5%, which is the main reason for insignificant internet connection in the country. ICT infrastructure
support is inadequate as compared to other countries in this region there is lack of any centralized policy to
progress of ICT in the country. There is also some lack of holistic approach to infrastructure creation. The
Internet facilities in sub-urban and district level are lag behind. No suitable network among the research
institutes is established.
Economic Barriers
The economic condition of the people is one of the vital issues for computer use and internet connectivity.
Generally, on average wealthy and educated as well as young, urban and male have the internet access,
which appears that economic solvency & education are the major factor during internet diffusion. Most of
which are not favorable in Bangladesh. The budget provision for establishment, maintenance and expansion
of computer networks in the country is inadequate. Reliable power supply is a major hindrance to develop
telecom infrastructure in the rural areas.
Literacy Barrier
The Bangladesh is facing acute crisis of skilled computer user due to literacy problem. Lack of skilled
manpower in public and private sectors is created. Information in the net is designed in the advanced
technology which requires adequate knowledge for the user. Moreover, overall less educated community
who are not very computer friendly. There is also some lack of proper motivational activities to promote ecommerce and e-government
Language Barrier
Language problem is another vital issue for the local user of the internet/web. There are very few web sites
available in local language i.e. in Bengali. Local people are not very much frequent / efficient in English as
language.
Content Barrier
Lack of Local & Social Issues in the Net Contents in the web is not sufficiently enriched with information and
services required by the local user. Still, local webs are concentrated with their product & service promotion.
Information based web services have not yet available in the net with local information.
Social & Cultural Environment
As male group of the society can avail the web access facility from commercial centers or outside the home
but the local women community of Bangladesh has limited access due to some social and cultural
environment. Unfortunately, due to family obligation & service, they can not spare sufficient time for using
the net. Use of ICT within the government is still limited as only a small number of civil servants have
Internet access.
The high cost of IT equipment
The high cost of IT equipment accessories which acts a barrier towards proliferation of IT accessneeds to be
lowered. Due to high tariff levels, the cost of hardware and software in Bangladesh is significantly higher as
Syed M Hoq, ACCA

Page 67

Information Technology
compared to the rest of the world. For instance, A PC in Bangladesh costs around 12-15 months of average
per-capita income as compared to China's 4 months and USA's 12 days. Hence, we need to reduce the tariff
levels of ICT equipment and accessories to bring even a bigger population under Internet coverage. So the
Inadequacy has been created in the man machine ratio.
Steps to be taken
Development of mobile applications
As mass people in the urban as well as in the rural area use the cellular phone, we have to establish different
kinds of mobile application. So they can easily enter into the information world. Most of our people live in
with a lower economic condition, so the house hold computer is a dream for them. As the literacy rate is
very poor and a person must has a minimum level of knowledge to operate a computer, so it is not feasible
for our country that most of the people have access of computer in his house and also use the internet. But a
mobile could easily be operated by all level of people.
Those applications must be developed locally with relevant content and languages that promote advanced
technology uptake. It is a knowledge driven technology; so, we need the people who have skill, knowledge,
information and a level of education. For a future Bangladesh a tech shabby generation is significantly
important. This generation would be the driving force for a digitized, prosperous and humane nation. To
develop this kind of generation it needs to an education policy and national human resource policy. It is
another hard truth that this objective could not be achieved over night, but a good beginning is essential,
which will create the expected human resource that will manage, administer and govern future Bangladesh.
Ensure a wide range of value added services (VAS). People could be instructed about product feature and
cost clearly by avoiding elusive ideas or language. The services that are made available through the use of
ICT should be freely available to all who might wish to make use of them. Awareness building program could
be launched for everyone in phase by phase or categorically or geographically to aware them how they could
be benefited from the use of the ICT.
ICT Education and Human Resources
Different types of IT education program could be launched for different people of the different level of
education. It may be the IT discipline, Diploma courses, Training programs, only the introductory courses etc.
Technology is important but not works without a person behind. Building of an IT educated work force is the
most important segment of digital Bangladesh initiative.
It needs strong commitment and strategic planning for sustainable Digital Bangladesh. The beginning must
concentrate on the development of infrastructure in terms of hardware, software and manpower. Merely
buying several lakhs of computers and distributing them among several thousand workstations located in
colleges, schools, hospitals and clinics will not digitise Bangladesh. Locally produced qualified manpower
must be available to keep the system running without depending on foreign "experts." The project
presupposes that Bangladesh will be able to build its technical and managerial capacity to design the
necessary digital network system, procure and install all the equipment properly, and to educate, train and
deploy necessary personnel to operate and maintain the nationwide ICT network. To produce such human
resources, the government must assign highest priority to the promotion of science, technology and
management education. We must prepare a separate plan to produce adequate number of scientists,
computer and communication engineers, software engineers, technology management experts, etc.
Distance education has tremendous potential to spread learning in any country. E-learning is a cost-effective
way of providing education at a distance. This is especially important considering that around 80% of our
illiterate population is from the rural areas. In this context, it is essential that the government, the industry,
NGOs and academia forms partnership to accelerate the Digitalization process. Together, they need to
create an 'enabling environment' for the proliferation of ICT in Bangladesh. There are some basic steps that
Syed M Hoq, ACCA

Page 68

Information Technology
Bangladesh needs to foster online education to be offered by Open University and our National University.
Private companies and NGOs can partner, in order to enhance awareness and utilization of ICT at the grassroots level. For instance, NGO's can work to bring elementary computer literacy to the people of rural
Bangladesh. They can make arrangements so that IT professionals and educators visit rural schools and help
students get familiar with technology.
Conclusion
Digitization helps increase operational efficiency and productivity provided the supporting infrastructures
work properly. This is a tool that will help accelerate economic development and increase competitive edges
of Bangladesh in the world market.
Wide-scale digitisation is likely to help Bangladesh become a mid-income country sooner than otherwise
possible. However, for proper management the government needs to define its vision, mission and goals and
formulate strategies and prepare action plans supported by necessary financial and human resources so that
the plans can be implemented.
The forces of globalization and technology are continuously reshaping our economy. The impact of
information and communication technology (ICT) is giving rise to a new type of economy - the knowledge
based economy.
It is necessary to mention that in the short run "Digital Bangladesh" aims at E-Governance and service
delivery through utilizing ICT. But the vision "Digital Bangladesh" encompasses the whole arena of a
knowledge based Digital Economy. Bangladesh can't afford to achieve that goal in the short and medium
run. The thinkers, technocrats and IT experts have to focus on the short run issues and measures the present
Government should undertake to digitalize Bangladesh. It is important to start digitalizing service delivery
organs like Police, City corporation, Land Department, Tax Department, PDB, Water supply, Gas and other
authorities also including sectors like Banking, Insurance, Customs, Tax Collection. Urgent steps should be
taken to digitalize institutions like Bangladesh Bank, NBR, PSC, UGC, EC, ACC and other vital institution to go
a step ahead towards Good Governance.
Our government must take proactive steps to take technology to rural citizens. However our dream towards
digital Bangladesh has a long way to go. Digitalization of Bangladesh will depend how best the Government
can leverage the power of ICT to increase the access to information of its population.
Q.100.

What do you understand by bandwidth alternatives?


The communications speed and capacity of telecommunications networks can be classified by bandwidth.
This is the frequency range of a telecommunications channel; it determines the channels maximum
transmission rate (voiceband, medium-band, and broadband).

Q.101.

Internet is business tool justify the statement.


There are many debates about whether or not the internet has been developed enough to be used as a
business tool. New technologies are often subject to constant changes and revisions and the internet is no
exception. Despite this technological turmoil, here are some basic features of the internet which can be
utilized to make your company more effective and efficient. Some of these features will require the creation
of a web site on the internet, while others merely require that you have access to the internet and a valid Email account.
Communication:
An E-mail account allows you to send/receive messages to/from almost anyone. Recent software
developments actually allow you to send messages to people who only have fax machines. There are no:

Syed M Hoq, ACCA

Page 69

Information Technology
long distance telephone charges, letters written on expensive company stationery, mail delivery schedules,
voice mail/answering machine "phone tag" games, etc. You can also "attach" computer files to your E-mail
messages, allowing you to transmit lengthy messages and/or data.
You can send a message to 1 person as easily as sending the same message to 1,000 people. You can
accomplish this with some of the standard browser software, or by using one of the many bulk E-mail
programs. Just imagine, no more bulk mail handling, printing, stuffing, sorting, delivery to the post office!
The ability to reduce existing communication costs is significant. Global communication, bulk
communication, all are possible at a fraction of the cost. If you spend a great deal of time and money
communicating via: telephone, fax, mail; you might find that an E-mail account allows you to communicate
to a greater number of people at a fraction of the cost. Response time to your communication is also
significantly reduced.
Research:
Access to the internet allows you to "check out" potential or existing customers and competitors by
reviewing their web sites, or, information about them on other sites. This critical information should allow
you to make more timely and informed decisions. You can also use this research information to support the
services/products which your company is offering. Access to "real time" news and company information is
made relatively easy via the many internet search engines which have been developed.
Marketing:
You can use the internet to market your products/services via E-mail. You can also market this information
by creating a web site which allows people to actually view information about your company. The ability to
provide definitive information about your company without having to actually "talk" to someone, or mail out
collateral material is a significant cost savings in many areas. Additionally, traditional methods of marketing
require that you "go after" your target market. A web site on the internet allows them to "come after" you!
Just imagine receiving numerous requests for information from previously unknown pre-qualified leads.
There is no other way to globally market your company as inexpensively as on the internet.
These are just some of the benefits available by utilizing the internet. While it is a rapidly changing
technology, there is no excuse to not take advantage of these cost saving features. A reduction of operating
expenses should enhance the bottom line! Increased marketing capability should increase revenues. The
internet has been designed to be as easy as "point and click"! Why not "point and click" your way to
increased business and enhanced performance!
But remember, every tool is only as good as the person that uses it. Do your homework, research the
options, and constantly re-evaluate your internet program. You'll be surprised at what you can do with a well
developed internet program!
Q.102.

How does an enterprise information portal differ from an intranet in terms of technologies used and
application provided?
An enterprise portal, also known as an enterprise information portal (EIP) or corporate portal, is a
framework for integrating information, people and processes across organizational boundaries. It provides a
secure unified access point, often in the form of a web-based user interface, and is designed to aggregate
and personalize information through application-specific portlets. One hallmark of enterprise portals is the
de-centralized content contribution and content management, which keeps the information always updated.
The enterprise information portal (EIP), also known as a business portal, is a concept for a Web site that
serves as a single gateway to a companys information and knowledge base for employees and possibly for
customers, business partners, and the general public as well.

Syed M Hoq, ACCA

Page 70

Information Technology
Access/search: Access/search allows a user to get all the information needed (but no more) in the desired
context. For example, a loan officer does not need marketing information to approve a loan. An EIP makes
sure the loan officer gets only the information needed.
Categorization: An EIP categorizes all information so that it is delivered to the user within the context
needed (think of the subject structure on Yahoo)
Collaboration: An EIP allows individuals to collaborate regardless of geographical location.
Personalization: The information provided to individuals using an EIP is personalized to that persons role,
preferences, and habits.
Expertise and profiling: Expertise and profiling is essential for the collaboration element of an EIP.
Individuals within an enterprise are profiled according to their experience and competencies. If an individual
needs to collaborate with others, he can choose those that are qualified for the project.
Application integration: This allows individuals to deliver, access, and share information regardless of
applications used.
Security: This provides information to users based on security clearance. The user logs on and is given access
only to information that the user is authorized to access.
An intranet
An intranet is a private computer network that uses Internet Protocol technology to securely share any part
of an organizations information or network operating system within that organization. The term is used in
contrast to internet, a network between organizations, and instead refers to a network within an
organization. Sometimes
Intranet is the generic term for a collection of private computer networks within an organization. An intranet
uses network technologies as a tool to facilitate communication between people or workgroups to improve
the data sharing capability and overall knowledge base of an organizations employees.
An intranet is a private network that is contained within an enterprise. It may consist of many interlinked
local area networks and also use leased lines in the wide area network. Typically, an intranet includes
connections through one or more gateway computers to the outside Internet. The main purpose of an
intranet is to share company information and computing resources among employees. An intranet can also
be used to facilitate working in groups and for teleconferences.
An intranet uses TCP/IP, HTTP
Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can
send private messages through the public network, using the public network with special
encryption/decryption and other security safeguards to connect one part of their intranet to another.
Typically, larger enterprises allow users within their intranet to access the public Internet through firewall
servers that have the ability to screen messages in both directions so that company security is maintained.
When part of an intranet is made accessible to customers, partners, suppliers, or others outside the
company, that part becomes part of an extranet.
Q.103.

What special security measures must be taken by organizations linking to the internet?
Special measures must be taken because the purpose of the original design of the Internet was to allow easy
access and to make sure the Internet is safe from any attempt to disrupt or destroy it. The organizations or
individuals connected to the Internet must take action to protect their own data and computers. For
example, they must take action to block viruses from disrupting their systems or destroying their data. The

Syed M Hoq, ACCA

Page 71

Information Technology
networking protocol that forms the foundation of the Internet, TCP/IP, is insecure. If systems are not
specially protected against the openness of TCP/IP, and often the openness of UNIX, systems connected to
the Internet are vulnerable to hackers and computer viruses.
Firewalls and intrusion detection systems should be installed to protect networks including the Internet.
Encryption can help protect sensitive information. Newer technology has also become available, including
authentication, message integrity, digital signatures, digital certificates, and secure electronic transaction
(SET) systems can also add security for certain types of communication.
Q.104.

How is internet changing the economics of information and business models?


The Internet radically reduces the cost of creating, sending, and storing information while making that
information more widely available. The Internet reduces search costs, allowing customers to locate
products, suppliers, prices, and delivery terms. Considering the wide spread Internet access available now,
businesses are now able to reach untouched potential customers. However, to maximize any business
medium, one first needs to understand what the positive potential can be.
Employee Options
With an Internet business firms can offer its employees work options that other companies may not be able
to offer. They can offer employees the option to work from home, create their own hours and create their
own work environment.
Business Hours
An Internet business offers flexibility to the customer as well, according to the e-Business Guide. Firms can
set their online business to accept orders 24 hours a day, seven days a week and 365 days a year. They can
offer a library of information to customers about their business that can be available at all times, and
customers can send in emails with questions any time they want.
Global Presence
The Internet reaches millions of people all over the world at any point of time. An online business can create
an international presence at once without the need to pay for costly retail or office space in a foreign
country. An online company can also segment the business and create specific websites to appeal to
different cultures throughout the world.
Dynamic Marketplace
The Internet offers businesses the ability to update product information, change product design and
specifications, and introduce pricing promotions and specials instantly. Firms can take feedback from
customers and quickly make changes to their website user interface to help make the customers experience
easier.

Q.105.

Define World Wide Web.


The World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages
that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks.

Q.106.

What do you mean by search engine? Explain the benefits of using it.
A search engine is a web-based tool that enables users to locate information on the World Wide Web.
Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize automated
software applications (referred to as robots, bots, or spiders) that travel along the Web, following links from
page to page, site to site. The information gathered by the spiders is used to create a searchable index of the
Web.

Syed M Hoq, ACCA

Page 72

Information Technology
Search engines provide some popular ways of finding information on the Internet. There is a wide variety of
search engines and features. Some search engines are on specific websites, allowing visitors to the site to
search for specific words or phrases. Others are broader in scope.
Variety
An Internet search can generate a variety of sources for information. Results from online encyclopedias,
news stories, university studies, discussion boards, and even personal blogs can come up in a basic Internet
search. This variety allows anyone searching for information to choose the types of sources they would like
to use, or to use a variety of sources to gain a greater understanding of a subject.
Precision
Search engines do have the ability to provide refined or more precise results. Putting quotations marks
around a set of words will bring up results with the exact same words, excluding others. Some search
engines, such as Google or Yahoo, enable you to specify the type of web sources to be searched. Being able
to search more precisely allows you to cut down on the amount of information generated by your search.
Search engines within a website allow you to search information only on that website, filtering out
information from other web sources and giving more precision in a user's search for information.
Organization
Internet search engines help to organize the Internet and individual websites. Search engines aid in
organizing the vast amount of information that can sometimes be scattered in various places on the same
web page into an organized list that can be used more easily.
Q.107.

List several web search engine.


General
Baidu (Chinese, Japanese)
Bing
Blekko
Google
Sogou (Chinese)
Soso.com (Chinese)
Volunia
Yahoo!
Yandex.com
Yodao (Chinese)
P2P search engines
FAROO
Seeks (Open Source)
YaCy (Free and fully decentralized)

Syed M Hoq, ACCA

Page 73

Information Technology
Lesson 13: System Development and System Implementation
Q.108.

What is system and system development?


System is a collection of related components that interact to perform a task in order to accomplish a goal.
The point of systems analysis and design is to ascertain how a system works and then take steps to make it
better.
System development means activities that go into producing an information systems solution to an
organizational problem or opportunity. System development is structured kind of problem solving with
distinct activities. These activities consist of system analysis, system design, programming, testing
conversion, production and maintenance.

Q.109.

What factors affect the system development success? Explain.


Factors that affect system development success include
Degree of change
Quality and standard
Use of project management tools
Use of computer aided and software engineering (CASE) models
Object oriented systems development

Q.110.

Differentiate between system analysis and system design.


System Analysis
Systems analysis is a process of collecting factual data, understand the processes involved, identifying
problems and recommending feasible suggestions for improving the system functioning. This involves
studying the business processes, gathering operational data, understand the information flow, finding out
bottlenecks and evolving solutions for overcoming the weaknesses of the system so as to achieve the
organizational goals. System Analysis also includes subdividing of complex process involving the entire
system, identification of data store and manual processes.
The major objectives of systems analysis are to find answers for each business process: What is being done,
How is it being done, Who is doing it, When is he doing it, Why is it being done and How can it be improved?
It is more of a thinking process and involves the creative skills of the System Analyst. It attempts to give birth
to a new efficient system that satisfies the current needs of the user and has scope for future growth within
the organizational constraints. The result of this process is a logical system design. Systems analysis is an
iterative process that continues until a preferred and acceptable solution emerges.
System Design
Based on the user requirements and the detailed analysis of the existing system, the new system must be
designed. This is the phase of system designing. It is the most crucial phase in the developments of a system.
The logical system design arrived at as a result of systems analysis is converted into physical system design.
Normally, the design proceeds in two stages:
Preliminary or General Design: In the preliminary or general design, the features of the new system
are specified. The costs of implementing these features and the benefits to be derived are
estimated. If the project is still considered to be feasible, we move to the detailed design stage.
Structured or Detailed Design: In the detailed design stage, computer oriented work begins in
earnest. At this stage, the design of the system becomes more structured. Structure design is a blue
print of a computer system solution to a given problem having the same components and inter-

Syed M Hoq, ACCA

Page 74

Information Technology
relationships among the same components as the original problem. Input, output, databases, forms,
codification schemes and processing specifications are drawn up in detail.
In the design stage, the programming language and the hardware and software platform in which the new
system will run are also decided. There are several tools and techniques used for describing the system
design of the system. These tools and techniques are:
Flowchart
Data flow diagram (DFD)
Data dictionary
Structured English
Decision table
Decision tree
The system design involves:
i) Defining precisely the required system output;
ii) Determining the data requirement for producing the output;
iii) Determining the medium and format of files and databases;
iv) Devising processing methods and use of software to produce output;
v) Determine the methods of data capture and data input;
vi) Designing Input forms;
vii) Designing Codification Schemes;
viii) Detailed manual procedures; and
ix) Documenting the Design
Q.111.

Why is file management important for overall system performance?


Information cannot be used effectively if it is stored in a disorganized, inflexible manner. Without proper file
management, it may be difficult and even impossible to extract information from an automated system.
Retrieving a simple report can be timely and costly if the information is not properly managed. File
management must also be flexible enough to accommodate new pieces of information or to combine
different pieces of information in changing ways. When computer files are poorly managed, poor
performance, high costs, and minimal flexibility will result.

Syed M Hoq, ACCA

Page 75

Information Technology
Lesson 14: System Development Life Cycle
Q.112.

Discuss about system development life cycle.


The system development life cycle (SDLC) is a set of steps that serves as the basis for most systems analysis
and design methodologies. Systems design and analysis is a six-phase problem solving procedure for
examining an information system and improving it. The six phases make what is called the systems
development life cycle. The SDLC is defined as the step-by-step process that many organizations follow
during systems analysis and design.
The six phase of SDLC are as follows;
1) Preliminary investigation
2) System analysis
3) System design
4) System development
5) System implementation
6) System maintenance
The systems development life cycle is divided to important phases that are essential for developers such as
planning, analysis, design, and implementation. There are several models of SDLC exist, the oldest is the
waterfall model: a sequence of stages in which the output of each stage becomes the input for the next. He
number of steps seems to vary between four and seven and there is no correct model for SDLC because it
depends on each project you plan to develop.
1. Planning
The feasibility study is sometimes used to present the project to upper management to get the approval and
to have funding. Projects are evaluated in three main areas of feasibility: economical, organizational and
technical.
2. Analysis
The main objective of systems analysis is to determine where the problems in an attempt to help fix the
system.
3. Design
In systems, design functions and operations are described in detail, including screen layouts, business rules,
process diagrams and other documentation. The output of this stage will describe the new systems as a
collection of models or subsystems.
4. Build or coding
Modular and subsystem programming code will be accomplished during this stage. Unit testing and module
testing are done in this stage by the developers. This stage is intermingled with the next in that individual
modules will need testing before integration to the main project.
5. Testing
The code must be tested at various levels in software testing. Unit, system and user acceptance testings are
often performed. There are many types of testing such as: Data testing, integration testing, user acceptance
testing, performance testing and more.
6. Operations and maintenance
The deployment of the system includes changes and enhancements before the sunset of the system.
Maintaining the system is an important aspect of SDLC. As key personnel change positions in the
organization, new changes will be implemented, which will require system updates.

Syed M Hoq, ACCA

Page 76

Information Technology
Q.113.

What are the alternates to the traditional SDLC? Explain.


Systems development techniques used to address the lack of responsiveness of the traditional SDLC
prototyping, rapid applications development (RAD) (includes joint application development), end-user
development, and outsourcing (under some circumstances) are amongst the ones available in the
industry.
Prototyping is not an alternative to the traditional approach of the SDLC, by an aid generally used during the
design phase. Prototyping is based on an engineering approach whereby small scale models are built; these
help end-users define their requirements and preferred input-output interface.
Prototyping is sometimes used as an approach during the analysis phase of the traditional SDLC to speed up
development. The key to prototyping is to develop a working model quickly without detailed analysis and
design. There are two ways prototyping can be accomplished: 1) by the analyst working in conjunction with
users, or 2) by the users directly, and revised and enhanced by analysts. The latter is becoming more popular
as more user-friendly software becomes available for prototyping.
Sometimes, prototyping results in a simplified working model, which programmers can then implement
using more traditional computer languages. This is often the case when prototyping techniques are used in
conjunction with the traditional SDLC. This is done either to facilitate long-term maintenance or to improve
processing efficiency. (Prototyping languages are designed for ease of prototyping, not efficient processing.)
Numerous tools can be used for prototyping in addition to end-user programming languages, including
spreadsheet programs such as Microsoft Excel and database languages such as Microsoft Access. Report
generators are also often used for prototyping. Even word-processing programs can be used to develop
prototypes of reports.
Rapid application design (RAD) involves regular meetings between systems developers and system users
with the aim of rapidly developing a prototype of the information system until the users are statisfied with
capabilities and look of the system. Again this methodology is not an alternative to the SDLC, but a way of
quickly developing the user interfaces and has largely arisen because of the development of software tools
that now make this possible.

Syed M Hoq, ACCA

Page 77

Information Technology
Lesson 15: Quality and Information System
Q.114.
Q.115.

What is case? How can it promote quality in information system? Describe the different types of system
analysis tools.
What do you mean by TQM? Briefly discuss how information systems can contribute to it.

Lesson 16: Artificial Intelligence


Q.116.
Q.117.
Q.118.
Q.119.
Q.120.
Q.121.
Q.122.
Q.123.
Q.124.

Describe the concepts of artificial intelligence.


What are the limitations of AI?
What is expert system? What are the components of expert system?
Describe the benefits of use of artificial intelligence and expert system.
What are the major branches of Artificial Intelligence (AI)?
What are the comparisons between human and computer intelligence? Describe the application of fuzzy
logic and genetic algorithm in business.
Describe the application of expert system and artificial intelligence in business.
What is the difference between computer crime and computer abuse?
What are meant by privacy and fair information practice?

Lesson 17: Information System Failure and Remedies


Q.125.
Q.126.
Q.127.
Q.128.
Q.129.

What is ergonomics? What strategies we should take for preventing computer crimes?
What do you understand by emergency procedures and disaster recovery?
Explain with examples system review and system audits.
What is channel conflict? Why is it becoming a growing problem in electronic commerce?
Briefly discuss general and application control.

Syed M Hoq, ACCA

Page 78

Information Technology
Lesson 18: Short Questions and Key Differences
Q.130.

Write Short notes on the following:


1) Executive support system
An Executive Support System (ESS) is software that allows users to transform enterprise data into
quickly accessible and executive-level reports, such as those used by billing, accounting and staffing
departments. An ESS enhances decision making for executives.
An ESS facilitates access to organized enterprise and departmental data while providing analysis utilities
and performance assessment predictors. An ESS provides potential outcomes and quick statistical data
that are applied to decision making processes.
Ultimately, ESS reporting tools and results are contingent on developer and industry application. For
example, Cambridge Systematics, Inc. built an ESS that is integrated with the investment plan for the
Ministry of Transportation in Canada. This ESS version includes features that contrast the version used
by Medical Information Technology, Inc. (MEDITECH).
2) Bandwidth and speed
Internet speed and bandwidth are technically different. Bandwidth is referring the maximum amount of
data that can be transmitted in a fixed amount of time through the network while speed is the time
taken to reach the data (in form of packets) from source to destination. So we can see bandwidth is a
fixed one while network speed can vary. Network speed depends on many factors like the protocol
using to send data, server efficiency, network conjunction etc. In practical life a user feels the Internet
speed by downloading certain files from server to his computer. Yes it is true high bandwidth really
helps to download the file faster but there are some other factors are there. If he is downloading the file
(consider a big file like video) from a slow server, he feels his Internet speed is very less. Actually his
Internet bandwidth is good enough but the speed of data transfer is limited by the response delay of
the remote server.
Another factor really affects the Internet speed is the kind of protocol they use. The speed of data
transfer vary depends on whether this connection is using a connection oriented protocol (TCP) or
connection less protocol (UDP). As there is no error detection and synchronizing ,data transfer using
UDP is always faster than the same in TCP. Here Internet bandwidth is a constant but the Internet speed
vary. So in a nutshell Internet speed and Internet bandwidth are different. Internet bandwidth is the
one which is assigned by your ISP and which is a constant (as long as your ISP keeps its promise) while
Internet speed vary with remote server and the protocol they use to send data.
3) WIFI
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short
for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked term meaning IEEE
802.11x.
The Wi-Fi Alliance, the organization that owns the Wi-Fi (registered trademark) term specifically defines
Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical
and Electronics Engineers' (IEEE) 802.11 standards."
Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi Alliance has
expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on

Syed M Hoq, ACCA

Page 79

Information Technology
any of the 802.11 standards, including 802.11b, 802.11a, dual-band, and so on, in an attempt to stop
confusion about wireless LAN interoperability.
How Wi-Fi Works
Wi-Fi works with no physical wired connection between sender and receiver by using radio frequency
(RF) technology, a frequency within the electromagnetic spectrum associated with radio wave
propagation. When an RF current is supplied to an antenna, an electromagnetic field is created that
then is able to propagate through space. The cornerstone of any wireless network is an access point
(AP). The primary job of an access point is to broadcast a wireless signal that computers can detect and
"tune" into. In order to connect to an access point and join a wireless network, computers and devices
must be equipped with wireless network adapters (See "How Wireless Networks Work" in the "Did You
Know..." section of Webopedia).
Wi-Fi Support
Wi-Fi is supported by many applications and devices including video game consoles, home networks,
PDAs, mobile phones, major operating systems, and other types of consumer electronics. Any products
that are tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are
certified as interoperable with each other, even if they are from different manufacturers. For example, a
user with a Wi-Fi Certified product can use any brand of access point with any other brand of client
hardware that also is also "Wi-Fi Certified". Products that pass this certification are required to carry an
identifying seal on their packaging that states "Wi-Fi Certified" and indicates the radio frequency band
used (2.5GHz for 802.11b, 802.11g, or 802.11n, and 5GHz for 802.11a).
4) Virtual drive
A virtual disk (also known as a virtual drive or a RAM drive) is a file that represents as a physical disk
drive to a guest operating system. The file may be configured on the host and also on a remote file
system. The user can install a new operating system onto the virtual disk without repartitioning the
physical disk or rebooting the host machine.
5) Volatile memory
Volatile memory, also known as volatile storage, is computer memory that requires power to maintain
the stored information, in other words it needs power to reach the computer memory. Volatile memory
retains the information as long as power supply is on, but when power supply is off or interrupted the
stored memory is lost; unlike non-volatile memory which does not require a maintained power supply.
It has been more popularly known as temporary memory.
6) Digital signature
A digital signature (not to be confused with a digital certificate) is an electronic signature that can be
used to authenticate the identity of the sender of a message or the signer of a document, and possibly
to ensure that the original content of the message or document that has been sent is unchanged. Digital
signatures are easily transportable, cannot be imitated by someone else, and can be automatically timestamped. The ability to ensure that the original signed message arrived means that the sender cannot
easily repudiate it later.
A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that
the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate
contains the digital signature of the certificate-issuing authority so that anyone can verify that the
certificate is real.

Syed M Hoq, ACCA

Page 80

Information Technology
7) Executive information system
An executive information system (EIS) is a decision support system (DSS) used to assist senior executives
in the decision-making process. It does this by providing easy access to important data needed to
achieve strategic goals in an organization. An EIS normally features graphical displays on an easy-to-use
interface. Executive information systems can be used in many different types of organizations to
monitor enterprise performance as well as to identify opportunities and problems.
Early executive information systems were developed as computer-based programs on mainframe
computers to provide a companys description, sales performance and/or market research data for
senior executives. However, senior executives were not all computer literate or confident. Moreover,
EIS data was only supporting executive-level decisions but not necessarily supporting the entire
company or enterprise.
Current EIS data is available company- or enterprise-wide, facilitated by personal computers and
workstations on local area networks (LANs). Employees can access company data to help decisionmaking in their individual workplaces, departments, divisions, etc.. This allows employees to provide
pertinent information and ideas both above and below their company level. The typical EIS has four
components: hardware, software, user interface and telecommunication.
8) Foreign key
A foreign key is a field in a relational table that matches the primary key column of another table. The
foreign key can be used to cross-reference tables.
9) Computer waste and mistakes
Computer waste involves the inappropriate use of computer technology and resources.
From Solitaire to surfing the net
Applying a computer solution not because you should but because you can
Purchasing the full $10,000 multimedia system just to keep track of your addresses
Printouts, printouts, printouts
Computer mistakes refer to errors, failures, and other computer problems that make computer output
incorrect or not useful.
Data entry errors.
Errors in computer programs.
Mishandling of computer output.
Inadequate planning for and control of equipment malfunctions.
10) Audit trail
A record showing who has accessed a computer system and what operations he or she has performed
during a given period of time. Audit trails are useful both for maintaining security and for recovering lost
transactions. Most accounting systems and database management systems include an audit trail
component. In addition, there are separate audit trail software products that enable network
administrators to monitor use of network resources.
11) Wimax
WiMAX is a wireless technology put forth by the WiMAX Forum that is one of the technologies that is
being used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers.
Syed M Hoq, ACCA

Page 81

Information Technology
The two driving forces of modern Internet are broadband, and wireless. The WiMax standard combines
the two, delivering high-speed broadband Internet access over a wireless connection. Because it can be
used over relatively long distances, it is an effective "last mile" solution for delivering broadband to the
home, and for creating wireless "hot spots" in places like airports, college campuses, and small
communities.
Based on the IEEE 802.16 Air Interface Standard, WiMax delivers a point-to-multipoint architecture,
making it an ideal method for carriers to deliver broadband to locations where wired connections would
be difficult or costly. It may also provide a useful solution for delivering broadband to rural areas where
high-speed lines have not yet become available. A WiMax connection can also be bridged or routed to a
standard wired or wireless Local Area Network (LAN).
The so-called "last mile" of broadband is the most expensive and most difficult for broadband providers,
and WiMax provides an easy solution. Although it is a wireless technology, unlike some other wireless
technologies, it doesn't require a direct line of sight between the source and endpoint, and it has a
service range of 50 kilometers. It provides a shared data rate of up to 70Mbps, which is enough to
service up to a thousand homes with high-speed access.
12) Internet Protocol
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for
relaying datagrams across network boundaries. This function of routing enables internetworking, and
essentially establishes the Internet.
IP is the primary protocol in the Internet layer of the Internet protocol suite and has the task of
delivering packets from the source host to the destination host solely based on the IP addresses. For
this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines
addressing methods that are used to label the datagram source and destination.
The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another
on the Internet. Each computer (known as a host) on the Internet has at least one IP address that
uniquely identifies it from all other computers on the Internet.
13) Information super highway
The information superhighway or infobahn was a popular term used through the 1990s to refer to
digital communication systems and the Internet telecommunications network. It is associated with
United States Senator and later Vice-President Al Gore.
The McGraw-Hill Computer Desktop Encyclopedia defines the term as "a proposed high-speed
communications system that was touted by the Clinton/Gore administration to enhance education in
America in the 21st Century. Its purpose was to help all citizens regardless of their income level. The
Internet was originally cited as a model for this superhighway; however, with the explosion of the World
Wide Web, the Internet became the information superhighway" (464).
The Oxford English Dictionary (OED) defines the term as "a route or network for the high-speed transfer
of information; esp. (a) a proposed national fiber-optic network in the United States; (b) the Internet."
14) Digital subscribers line
Digital subscriber line (DSL) service is a broadband digital transmission service offered on ordinary
telephone lines. DSL is typically used by telephone companies to offer data, video, and voice services
Syed M Hoq, ACCA

Page 82

Information Technology
over these existing copper telephone lines. DSL does not displace or disrupt the operation and quality of
the existing analog telephone service offered on telephone lines, so that both analog phone and
broadband services can be simultaneously offered.
15) Virtual reality
virtual reality (VR) refers to the use of computer modeling and simulation that enables a person to
interact with an artificial three-dimensional (3-D) visual or other sensory environment. VR applications
immerse the user in a computer-generated environment that simulates reality through the use of
interactive devices, which send and receive information and are worn as goggles, headsets, gloves, or
body suits. In a typical VR format, a user wearing a helmet with a stereoscopic screen views animated
images of a simulated environment. The illusion of being there (telepresence) is effected by motion
sensors that pick up the users movements and adjust the view on the screen accordingly, usually in real
time (the instant the users movement takes place). Thus, a user can tour a simulated suite of rooms,
experiencing changing viewpoints and perspectives that are convincingly related to his own head
turnings and steps. Wearing data gloves equipped with force-feedback devices that provide the
sensation of touch, the user can even pick up and manipulate objects that he sees in the virtual
environment

Also read the following questions. Most of the answers can be found from
the ICMAB manual
Q.131.

Difference between
1) Update and Upgrade
2) Search engine and Browser
3) Wi-Fi and Bluetooth
4) WAP and Internet
5) Upload and Download
6) Bluetooth and Wireless
7) Netbook and Notebook
8) ESS and MIS
9) Compiler and Interpreter
10) Primary storage and secondary storage
11) Logical and physical view of data
12) Computer literacy and information literacy
13) Computer crime and computer abuse
14) Privacy and fair information practice

Syed M Hoq, ACCA

Page 83

Potrebbero piacerti anche