Exam Details

Subject technology and business
Paper
Exam / Course mba
Department
Organization Gujarat Technological University
Position
Exam Date April, 2016
City, State gujarat, ahmedabad


Question Paper

Page 1 of 3
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MBA SEMESTER 4 • EXAMINATION WINTER 2016
Subject Code: 2840008 Date: 21/10/2016
Subject Name: Technology Business
Time: 02:30 pm to 05:30 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1

Answer the following multiple choice questions:
06
1.
Productivity is measured by:
A.
The growth in output of a firm
B.
The growth in profits of a firm
C.
Total output/total input
D.
Total amount of investment in capital goods
2. What type of commerce occurs when a business sells its products over the Internet to other businesses?
A.
B2B
B.
B2C
C.
C2B
D.
C2C
3. When two companies are linked together by computers and they send business transactions through these computers, they are probably using
A. RFID
B. Electronic data interchange
C. B2C
D. Smart cards
4.
If a university sets up a web-based information system that faculty could access to record student grades and to advise students, that would be an example of a/an
A.
CRM
B.
Intranet
C.
Extranet
D.
ERP
5.
Which is not a typical business function?
A.
Sales
B.
Service
C.
Benefits and Compensation
D.
Manufacturing
6.
What is the full form of IPR?
A.
Intellectual Property Rights
B.
Intelligent Property Rights
C.
Internet Private Review
D.
None of the above
Q.1

Define following terms briefly:
1. Cookie
2. Counterfeit Software
3. Horizontal Vertical Software
4. Outsourcing
04
Q.1

What do you mean by" Knowledge Management"? Discuss two types of knowledge in brief.
04
Q.2

What do you mean by "CRM"? Explain different types of CRM. And also discuss successful CRM implementation strategy in the organization.
07

What are the most important factors that you would use in evaluating computer hardware computer software? Explain why? And explain different types of computer categories in brief.
07
OR
Page 2 of 3

What do you mean by "Porter's Five Force Model"? Explain this model with example of any IT industry sector.
07
Q.3

Explain in brief different kinds of technologies KMS that firm can use to support its Knowledge Management infrastructure.
07

One of the reasons for reluctance to the use of e-commerce is information security threat. Which are the various security threats to e-business?
07
OR
Q.3

Short note on: Enterprise Resource Planning
07

"Business Intelligence has become a primary requirement in business now days Explain.
07
Q.4

What do you mean by "ePolicies", list down major ePolicies available for managing the information security also explain any three ePolicies in detail.
07

It is said that supply chains are essentially "a series of linked suppliers and customers; every customer is in turn a supplier to the next downstream organization, until the ultimate end-user." Explain. Use of a diagram is recommended.
07
OR
Q.4

Short note: Content Management Systems
07

What do you mean by Collaborative Partnership? What are the functions of a typical collaborative business?
07
Q.5
Discuss the case study with answers of following questions.
14
Thinking Like the Enemy
David Barry Kaufman, the founders of the Intense School, recently added several security courses, including the five-day "Professional Hacking Boot Camp" "Social Engineering in Two Days".
Information technology departments must know how to protect organizational information. Therefore, organizations must teach their IT personal how to protect their systems, especially in light of the many new government regulations, such as the Health Insurance Portability Accountability Act that demand secure systems. The concept of sending IT professionals to a hacking school seems counterintuitive; it is somewhat similar to sending accountants to an Embezzling 101 course. The Intense School does not strive to breed the next generation of hackers, however, but to teach its students how to be "ethical" hackers: to use their skills to build better locks, and to understand the minds of those who would attempt to crack them.
The main philosophy of the security course at the Intense School is simply "To know the enemy". In fact, one of the teachers at the Intense School is none other than Kevin Mitnick, the famous hacker who was imprisoned from 1995 to 2000. Teaching security from the hacker's perspective, as Mitnick does, is more difficult than teaching hacking itself. A hacker just needs to know one way into a system, but security professional needs to know all of the system's vulnerabilities. The two courses analyze those vulnerabilities from different perspectives.
The hacking course, which costs teaches ways to protect against typically associated with hackers: worming through computer systems through vulnerabilities that are susceptible to technical, or computer-based, attacks. Mitnick's $1,950 social engineering course, by contrast, teaches the more frightening art of worming through the vulnerabilities of
Page 3 of 3
the people using maintaining systems-getting passwords access through duplicity, not technology. People that take this class, or read Mitnick's book, The Art of Deception, never again think of passwords or the trash bin the same way.
So how does the Intense School teach hacking? With sessions of dumpster diving (the unsavoury practice of looking for passwords other bits of information on discarded papers), with field trips case target systems, and with practice runs at the company's in-house "target range," a network of computers set up to thwart educate students.
One feature of the Intense School that raises a few questions is that the school does not check on morals at the door: Anyone paying the tuition can attend the school. Given the potential danger that an unchecked graduate of a hacking school could represent, it is surprising that FBI does not collect the names of the graduates. But perhaps it gets them any how-several governmental agencies have sent students to the school.
Questions:
1. How could an organization benefit from attending one of the courses offered at the Intense School?
2. If your employer sent you to take a course at the Intense School, which one would you choose why?
OR
Q.5
Discuss the case study with answers of following questions.
14
Security Loopholes
Utpal had just joined SystemX as Systems Manager. But he was a worried man looking at the current state of affairs at SystemX. As a part of assessing hardware and software requirements, it was found that out of the 364 desktops at the corporate office; more than half did not have their antivirus
software updated with recent virus signature files. Three fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, he wondered about the situation at the seven branch offices across the country.
SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. Utpal's first thought was that he would recommend that SystemX bring in a security consultant. But the budget constraints meant that his recommendation was unlikely to find favour. He was beginning to feel a bit out of depth and was wondering what he should do to ensure that SystemX's data remained safe and secure.
Questions:
1. What security loopholes come to the fore in the situation described? How can these be plugged?
2. What is the importance of a "security budget" in the context of the given situation?



Subjects

  • accounting for managers
  • accounting for managers (afm)
  • advance marketing management
  • applied pharmaceutics
  • b2b marketing
  • banking and insurance
  • banking and insurance -ii
  • brand marketing
  • business analytics (ba)
  • business communication
  • business english (be)
  • business environment
  • business ethics
  • business ethics and corporate governance (becg)
  • business law for managers
  • business mathematics
  • business process reengineering
  • business process reengineering (bpr)
  • business statistics
  • business statistics (bs)
  • business structure and management
  • business structure and process
  • change management & organization development
  • change management and organizational development
  • company law
  • compensation management
  • computer applications
  • constitution of india
  • consumer behavior (cb)
  • consumer behaviour
  • cooperative management
  • corporate accounting (ca)
  • corporate restructuring
  • corporate tax planning
  • corporate taxation (ct)
  • corporate taxation and financial planning (ct & fp)
  • cost & management accounting (cma)
  • cost and management accounting
  • counseling skills for managers
  • creativity and innovation
  • creativity, incubation and innovation (cii)
  • cross continent business philosophy
  • cyber security and it governance (csitg)
  • database management
  • designing of operations system (dos)
  • development of human skills
  • digital marketing
  • e-commerce
  • ecological management & business
  • economics for managers (efm)
  • effective communication skills
  • elements of direct & indirect taxes
  • elements of financial accounting
  • english language
  • enterprise resource planning
  • entrepreneurial finance (ef)
  • entrepreneurship
  • environment for business
  • environment management
  • export – import policy, procedure documentation
  • export-import policy procedures & documentation
  • export-import procedures
  • family business management
  • financial accounting
  • financial management
  • financial planning
  • foreign exchange management
  • foreign language-french
  • french (foreign language)
  • fundamentals of information technology
  • fundamentals of marketing (fom)
  • gandhian philosophy for managing business (gpmb)
  • german (foreign language)
  • global human resource management (ghrm)
  • healthcare and hospital management
  • human resource development
  • human resource management
  • human resource management.
  • human skills
  • human values & business ethics (hvbe)
  • import export procedures
  • income tax (it)
  • indian economy
  • indian ethos & human quality development
  • information system audit and control
  • information systems
  • information technology and global business
  • integrated marketing communication
  • integrated marketing communication (imc)
  • intellectual property rights
  • international accounting practice
  • international business
  • international business (ib)
  • international commercial law (icl)
  • international economic environment (iee)
  • international economics (ie)
  • international finance
  • international financial management (ifm)
  • international human resource management
  • international human resource management (ihrm)
  • international marketing
  • international supply chain management
  • inventory management, material planning and management
  • inventory management, materials planning and management
  • investment banking (ib)
  • labor law
  • leadership
  • legal aspects business
  • legal aspects of business
  • legal aspects of business (lab)
  • macro economics (me)
  • management accounting
  • management control system
  • management control systems
  • management information system
  • management of cooperatives
  • management of financial planning (mfp)
  • management of financial services (mfs)
  • management of industrial relation and labour law
  • management of industrial relations and labour laws (mir & ll)
  • management principles
  • managerial communication
  • managerial communication (mc)
  • managerial economics
  • managerial economics(me)
  • managing digital innovation and transformation (mdit)
  • marketing management
  • marketing research (mr)
  • material management
  • mergers and acquisitions
  • micro economics
  • micro small and medium enterprise
  • multicultural organizational behavior (mob)
  • new entrepreneurship & innovation management
  • new venture creation
  • operation management
  • organisational dynamics
  • organizational behavior
  • organizational behaviour
  • performance management (pm)
  • principles of management (pm)
  • product & brand management (pbm)
  • product and brand management
  • product design and development
  • production & operations management (pom)
  • production and operations management
  • production management
  • project management
  • project management for entrepreneurs
  • public relation management
  • quantitative analysis - ii
  • quantitative analysis (qa)
  • quantitative analysis-i
  • relational database management system (rdbms)
  • research methodology
  • research methodology (rm)
  • retailing - ii
  • retailing and franchising (rf)
  • risk management
  • rural marketing
  • sales & distribution management
  • sales and distribution management (sdm)
  • security analysis & portfolio management
  • security analysis & portfolio management (sapm)
  • service marketing
  • services and relationship marketing (srm)
  • social entrepreneurship
  • social media analytics (sma)
  • strategic financial management
  • strategic financial management (sfm)
  • strategic human resource management
  • strategic information technology management
  • strategic management
  • supply chain & logistics management
  • supply chain and logistics management
  • supply chain management
  • supply chain management (scm)
  • system analysis and design
  • system analysis and design(sa&d)
  • talent management
  • technology and business
  • technology management
  • total quality management and world class manufacturing excellence (tqmwcme)
  • tourism and hospitality management (thm)
  • wto multilateral trading system and it’s impact on business
  • wto multilateral trading system and its impact on business(wmts-i)