14
1 | Page SUGGESTED SOLUTION (Date : 06 May, 2014) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai 69. Tel : (022) 26836666

SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

1 | P a g e

SUGGESTED SOLUTION

(Date : 06 May, 2014)

Head Office : Shraddha, 3rd Floor, Near Chinai College, Andheri (E), Mumbai – 69.

Tel : (022) 26836666

Page 2: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

2 | P a g e

SECTION - A

Ans. 1 (a)

(1) Transaction Log is a file that records database modifications. (2) Database modifications consist of inserts, updates, deletes, commits, rollbacks, and

database schema changes. (3) A Transaction Log is not required, but it is recommended. (4) The Database Engine uses a Transaction Log, to apply any changes made between the

most recent checkpoint and the system failure. (5) The checkpoint ensures that all committed transactions are written to disk. ; (6) During recovery, the Database Engine must find the log file at specified location. (7) When the Transaction Log file is not specifically identified, then the Database Engine

presumes that the Log File is in the same directory as the Database File.

(b) (1) Modem is an encoding / decoding device that is used to convert digital signals from

computers to analog telephone signals (to modulate the signal), and convert analog telephone signal into a digital computer signal (de-modulate the signal).

(2) Internal Modems are fit into the computer, and are not accessible to the User. But, External Modems are generally connected to the serial port of the computer.

(3) Modems are connected to Receivers that can actually be any device such as Computer or Multiplexer.

(c)

(1) Operation System is a master control program of a computer that manages its internal function, provides means to control the computer's operations and file system.

(2) It automatically loads the operating system parts, recognizes hardware devices and loads other application software programs. Thus, it optimizes man-machine capabilities, i.e. human intervention is minimized.

(3) Operating Systems work in mufti-programming mode. Multi-programming means interleaved execution of several programs to enhance the productivity of the computer.

(4) The scheduling for execution of these programs in parts is handled by a special program in the Operating System known as the Supervisory Program.

(d) (1) Browser is an Application Program that provides a way to look at and interact with all the

information on the World Wide Web. (2) Web Browser is a Client Program that uses the Hypertext Transfer Protocol (HTTP) to make

requests of Web Servers throughout the Internet on behalf of the browser User. (3) Examples:

I. Internet Explorer (IE) - It is a series of proprietary graphical web browsers developed by Microsoft and is used to browse the information on WWW.

II. Netscape Navigator, III. Opera, etc.

(e)

(1) There is a large number of Database in the Internet, which has been compiled from various sources and put together in a usable form.-

(2) Such Databases are put together by commercially run Data Providers, as well as individuals or groups with special interest in particular areas.

(3) They can be retrieved by accessing the Web Page / Web Address of the Service Provider. (4) The Internet Library (Database) is huge, dynamic because of regular updating, and entirely

electronic.

Ans. 2 (a)

(1) Meaning: Firewalls are systems which control the flow of traffic between the Internet and the Firm's internal LANs and systems.

(2) Role: Firewalls are packaged as turnkey hardware / software packages and are set up to

enforce the specified security policies that are desired.

Page 3: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

3 | P a g e

(3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal

resources from unauthorized and unwanted intrusion. (4) Requirements: (1) All traffic between the outside network and the organizations Intranet must pass through the

Firewall. (2) Only authorized traffic between the organization and the outside, as specified by formal

Security Policy, is allowed to pass through the Firewall. (3) The Firewall must be immune to penetration from both outside and inside the organization.

(b) Customer Relationship Management (CRM) Programs improves customer relationship due to

the following reasons – (1) Interests Analysis: Interest CRM Technology tracks customer interests, needs and buying

habits as they progress through their life cycles and tailors the marketing effort accordingly. Thus, the customers get exactly what they want as per their changing requirements.

(2) Product Use Analysis: CRM Technology tracks Customer's Product Use as the product progresses through its life cycle and tailors the service strategy accordingly. Thus, Customers get what they need as the product ages.

(3) Market Segmentation: In industrial markets, CRM Technology can be used to micro-

segment the buying centres, and help coordinate the conflicting purchase criteria of its members.

(4) General Benefits to Customers: It ensures long term customer satisfaction resulting into repeat purchases, improved customer relationships, increased customer loyalty, decreased customer turnover, decreased marketing costs, increased sales revenue and thereby increase in profit margins.

Ans. 3 (a)

Bit Byte

1. It is the smallest unit of storage measurement.

It is a combination of 8 bits used as a unit for storing data.

2. It represents a "0" or "1" binary digit.

It represents an alphabet, character or special symbol.

3. It is represented as ON or OFF in the memory.

It is used to represent several combinations of bits that indicate a character. It is the working unit of data.

4. It is used in representing small memories.

It is used to represent large memories. A Byte can represent a decimal equivalent value of upto 256 different values.

(b)

(1) Meaning: TCP / IP is the acronym of Transmission Control Protocol / Internet Protocol, used on the Internet.

(2) Parts: TCP / IP have two parts- I. TCP - deals with exchange of sequential data. II. IP - handles packet forwarding and is used on the Internet.

(3) Layers: TCP/ IP has four layers-

Layers Functions

I. Application Layer Provides services directly to the users such as e-mail.

II. Transport Layer Provides end-to-end communication between applications and verifies correct packet arrival.

III. Internet Layer Provides packet routing for error checking and addressing and integrity.

IV. Data Link Layer Provides an interface to the network hardware and device drivers. This can also be called the Network Interface Layer.

Page 4: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

4 | P a g e

(4) Steps in transmission of data:

I. TCP / IP creates a packet-switching network. II. TCP Protocol breaks a message into small packets. III. Each Packet is provided with a Header containing the destination address. IV. Each Packet is then sent individually over the Internet. V. IP acts as a guide for the Packet to arrive at the proper destination. VI. Then, TCP re-assembles the packet into the original message.

Ans. 4

(a) As technology improved (lower cost for more performance) and user requirements increased (faster data load cycle times and more functionality), Data Warehouses have evolved through several fundamental stages-

Stage Description

1. Offline Operational Databases

(a) In the initial stage, Data Warehouse were developed to simply copy the database of an operational system to an Off-Line Server,

(b) Thus, the processing load of reporting does not have any impact on the operational system's performance.

2. Offline Data Warehouse

(a) Data Warehouses in this stage, were updated on a regular time cycle (usually daily, weekly or monthly) from the operational systems.

(b) These data are then, stored in an integrated reporting-oriented data structure.

3. Real Time Data Warehouse

Data Warehouses at this stage were updated on a transaction or event basis, every time an operational system performs a transaction, e.g. an order or a delivery or a booking takes place.

4. Integrated Data Warehouse

Data Warehouses at this stage are used to generate activity or transactions that are passed back into the operational systems for use in the daily activity of the organization.

(b)

(1) Fourth Generation Languages are higher level languages than Compiler Languages, and are designed to work with an application, producing spectacular effects with a minimum programming effort.

(2) They are non-procedural languages and they make it easier to access and use the computer. The User is not required to construct any detailed steps in writing a program.

(3) They use English instructions, limited mathematical manipulation of data, automatic report formatting, sorting and selection of record by a given criteria.

(4) However, these languages are slower than Third Generation Languages, and also require more computer storage capacity to perform a particular operation.

Ans. 5 (a)

1. Reduced Time for Transactions: Since each and every transaction, from delivery to payment, Can be done electronically, the time taken to complete these transactions has reduced substantially.

2. Reduced Operational Costs: Costs to Buyers have reduced due to increased competition in procurement as more Suppliers are able to compete in an electronically open market place. Even Suppliers can electronically access on- line databases of bid opportunities, on-line abilities to submit bids, and on-line review of rewards, thereby reducing their costs.

3. Reduced Overhead Costs: Overhead Costs are reduced through uniformity, automation and large-scale integration of management processes.

4. Reduced Inventories: As the demand for goods and services is electronically linked through just-in-time inventory and integrated manufacturing techniques, the holding and ordering costs of inventories has also gone down.

5. Reduced Delivery Costs: For goods that can also be delivered electronically, the cost of delivery has reduced.

Page 5: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

5 | P a g e

6. Data Management: By eliminating the requirements for re-entering data in processing of information, the Overhead Costs, Errors and Time in managing data have reduced.

7. Market Intelligence and Strategic Planning: Business via Internet serves as a useful tool to search for information about Competitors, Customers and Suppliers. This information helps in managerial decision-making and strategic planning.

8. New Markets: Since millions of people are using internet and the number is Increasing day-by-day, business Via Internet has opened the door to new markets and easy-to-reach potential customers.

9. Access: Use of a public network-based infrastructure can "level the playing field" for both small and large businesses This allows Companies of all sizes to extend their reaction to a board customer basis.

10. Global Reach: Companies are able to undertake major global programs in which the cost and personnel needed to manage a non-automated system would be unreasonable or prohibitive.

11. Standardisation of Products: Better quality of goods are made available since specifications are standardized and competition has increased, and improved variety of goods through expanded markets and the ability to produce customized goods exists.

12. Design and Manufacturing Cost: With the use of CAD and CAM technology, better products can be designed faster and manufactured at lower costs.

13. Improved Advertising: Products and Services can now be advertised on the home pages of the organizations. Advising the potential customers to access the information on web site of the organization, rather than responding them with brochures and literature can attend to even queries.

(b) (1) Meaning:

I. Query Language is a set of commands for creating, updating and accessing data from a database.

II. Structured Query Language (SQL) is the retrieval language for end-user. SQL offers mechanism of universal database access. For example, if the DBMS used by a person translates the Query Language entered by him into SQL commands, it could then retrieve data on a different system, so long as they both use the same dialect.

III. Query Languages allow Users to retrieve data from database without having detailed information about the structure of the records and without being concerned about the DBMS processes.

IV. SQL is the common thread in a large number of database management systems for all types of computers. SQL is used as an intermediary and a standard in accessing a large number of different types of database systems.

(2) Structure of SQL: The structure of SQL expression has three parts -

I. SELECT Clause lists the attributes desired in answer to the query. II. FROM Clause is a list of relations or tables that the Query Language Processor should

consult in filling the request. III. WHERE Clause describes the attributes desired in the answer.

(3) Example:

I. SELECT branch-name from deposit: This is an SQL expression to obtain a list of all Branch Names from a Bank Table (Branch-Name) containing data about Branches and Customers.

II. One might find all Customers having an account in "Mylapore' Branch with the following expression- SELECT customer-name from deposit where branch-name = "Mylapore"

III. SQL expression can be more specific / complicated as the User qualifies his retrieval requests,

Page 6: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

6 | P a g e

e.g. - (SELECT customer-name from deposit where branch-name = "Mylapore") inter-sect (SELECT customer-name from borrow where branch-name = "Mylapore") The above query produces a table of all customers who have both a loan (from the "borrow" table) and an deposit account in the Mylapore branch.

Ans. 6 (a)

(1) Database Monitoring: Data Centers provide Database Monitoring Service via Database Agents. Database Agents enable high availability of database through comprehensive yet automated management.

(2) Web Monitoring: Web Monitoring services encompasses the following activities — I. Assess and monitor website performance, availability, integrity and response from

site visitor's perspective. II. Report on HTTP, FTP Service Status. III. Monitor URL availability. IV. Verify web content accuracy and changes.

(3) Backup and Restore:

I. Data Centres provide centralized multi-system management capabilities. II. They provide an integrated solution for Enterprise Data Storage using specialized

backup agents.

(4) Intrusion Detection System (IDS): They can be either - (a) Host Based ID Systems, i.e. detect malicious activity on the host, or (b) Network based ID Systems i.e. they operate on a network data flows. IDS operates to detect incorrect activity or attacks from outside the system, etc.

(5) Data on demand: I. Data Centres provide back-end infrastructure and expertise to give useful and cost-

effective storage strategy. II. They also provide access information at any given time.

(b)

(1) Internet Surfing: I. Many of the Servers on the Internet provide information, specializing on a topic or a

subject. II. When a User is looking for some information, it may be necessary for him to look for

such information from more than one Server. III. WWW links the computers on the Internet, like a spider web, facilitating Users to go from

one computer to another directly. IV. When a User keeps hopping from one computer to another, it is called 'surfing'.

(2) Uniform Resource Locator (URL) I. Uniform Resource Locator (URL) is the address of a file (resource) accessible on the

Internet. II. The type of resource depends on the Internet Application Protocol. III. Using the World Wide Web's Protocol, i.e. the Hypertext Transfer Protocol, the resource

can be an HTML Page, an Image File, a Program such as a common gateway interface application or Java applet, or any other file supported by HTTP.

IV. The URL contains the name of the protocol required to access the resource, a domain name that identifies a specific computer on the Internet, and a hierarchical description of a file location on the computer.

V. An HTTP URL can be for any Web page, not just a Home Page, or any individual file. Example:

• http://www.incometaxindia.gov.in/ARCHIVE/CHALLAN280.PDF. This URL will bring the user the Acrobat Format of the Tax Remittance Challan No. ITNS 280. • http://www.icai.org/common/banner.html. Here, the web page to be accessed is banner.html which is located in the computer named www.icai.org.

Page 7: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

7 | P a g e

Ans. 7 EN (I) where I = 1,2,3,4 ....... ..1000 denotes Employee Names (Input) S (I) where I = 1,2,3,4 ............ 1000 denotes Salary (Input) Max denotes Maximum Salary (Output)

Page 8: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

8 | P a g e

SECTION - B

Ans. 8 (a) Meaning: A Multinational Company (MNC) or a Transnational Company (TNC) is one, that by

operating in more than one country, gains R&D, production, marketing and financial advantages in its costs and reputation, that are not available to purely domestic competitors. Features: I. MNC is a conglomerate of multiple units (located in different parts of the globe) but all linked

by common ownership. II. Multiple units draw on a common pool of resources, such as money, credit, information,

patents, trade names and control systems. III. Inspite of pressure in different nations, the units or divisions of MNC may have a common

strategy in certain areas. IV. MNC - (i) views the world as one market, (ii) minimises the importance of national

boundaries, and (iii) raises its capital and markets its products, wherever it can do the job best.

V. Some examples of industries that reveal global pattern in today's world include automobiles, television sets, commercial aircrafts and boats, sporting equipment, watches, clothing, semiconductors, copiers, etc.

(b) Meaning: A Strategic Group consists of rival Firms with similar competitive approaches and positions in the market. Areas: Companies in the same strategic Group have commonality in any one or more of following aspects –

I. Product-lines, II. Distributions and Marketing Channels, III. Product attributes, IV. Technological approaches, V. Price/Quality range, VI. Services and Technical assistance to Buyers.

Factors: The number of Strategic Groups in an industry varies with the strategies pursued by

the various sellers and their comparable market positions.

(c)

(1) Market Penetration: In this strategy, the Firm directs its resources to the profitable growth of a single product, in a single market, and with a single technology. It is the most common form of expansion in the current business.

(2) Market Development: This Strategy involves marketing existing products, to customers in related market areas, by adding different channels of distribution or by changing the content of advertising or the promotional media.

(3) Product Development: This involves substantial modification of existing products or creation of new but related products that can be marketed to current customers through established channels.

Note: Product-Market Relationship: Students may refer to Igor Ansoff's Product-Market Matrix for a discussion on various methods of Intensification Strategies.

(d) (1) Scientific: It is a scientific method of grouping the businesses of a multi-business Firm.

(2) Improvement: It is an improvement over the territorial grouping of businesses and strategic

planning based on territorial units.

(3) Clarity: Grouping the businesses into SBUs help the Firm in strategic planning, by removing the vagueness and confusion in grouping.

(4) Resource Allocation: It facilitates the right setting for correct strategic planning and facilitates correct relative priorities and resources to the various businesses.

Page 9: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

9 | P a g e

(e) The objectives of Business Process Re-engineering are -

(1) To obtain quantum gains in the performance of the process in terms of time, cost, output, quality, and responsiveness to customers.

(2) To simplify and streamline the process by - (a) eliminating all redundant and non-value adding steps, activities and transactions, (b) reducing drastically the number of stages or transfer points of work, and (c) speeding up the work-flow through the use of info-tech systems.

(3) To obtain dramatic improvement in operational effectiveness, by re-designing core business processes and supporting business systems.

Ans. 9

(a) The success of the efforts and activities of the enterprise depends heavily on the quality of Strategic Management, i.e. the vision, insight, experience, quality of judgment and the perfection of methods and measures. The importance of Strategic Management is highlighted as under- (1) Decision-making: Strategic Management provides the framework for all major business

decisions as to nature of products and markets, manufacturing facilities, investments and organizational structure.

(2) Pathfinder: Strategic Planning works as the pathfinder to various business opportunities and also serves as a corporate defence mechanism, helping the Firm avoid costly mistakes in product market choices or investments.

(3) Core Competencies: Strategic Management provides a Firm with certain core competencies and competitive advantages in its fight for survival and growth.

(4) Future-driven: Strategic Management is not mere forecasting, it is concerned with ensuring a good future for the Firm. It seeks to prepare the Firm to face the future, and even shape the future in its favour.

(5) Influences and Adaptation: Strategic Management plays a vital role in influencing the environmental forces in its favour, working into the environs and shaping it, instead of getting carried away by its turbulence or uncertainties.

(b) Meaning: (1) Corporate Strategy consists of competitive moves and business approaches to produce

successful performance. It is the objective-strategy design of the Firm. (2) Corporate Strategy is the growth design of the Firm and it spells out the growth objective of

the Firm, i.e. the direction, extent, pace and timing of the Firm's growth.

Features of Corporate Strategy:

(1) Alignment: It ensures that the Firm aligns itself with the external environment effectively.

(2) Balance: It helps in achieving a balance between the Firm's objectives and actual

performance.

(3) Competitive Advantages: It helps in identifying, creating and maintaining competitive

advantage for the Firm.

(4) Decision-Making: It is concerned with choice, i.e. changes / additions / deletions to the

Firm's products, markets, distribution channels, production technologies, etc.

(5) Enterprise-wide effect: It has entity-wise effect, i.e. any corporate strategy has its effect on

every department/ activity of the Firm.

(6) Futuristic: Corporate Strategy focuses on shaping the future of the Firm. It has a futuristic

approach.

Page 10: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

10 | P a g e

(7) Growth: Strategy is intended to facilitate the Firm's growth by gainfully using the

opportunities available and effectively managing the threats.

(8) Proactive and Reactive: A Company's strategy is a combination of - (a) pro-active actions

of the Firm to improve its market position and performance, and (b) re-active measures to

face unanticipated developments and new environmental conditions.

Ans. 10

(a) Meaning: Six Sigma means maintenance of the desired quality in processes and end products by taking systematic and integrated efforts in that direction. Features: (1) Highly disciplined process that helps in developing and delivering near-perfect products and

services. (2) Strives to meet & improve the firm's goals on quality, cost, scheduling, manpower, new

products, etc. (3) Based on the concept of probability and normal distribution in statistics. (4) Seeks to ensure that 99.99966% of products manufactured are defect-free. (5) Puts the customer first and uses facts and data to drive better solutions. (6) Full or Total Business Initiative, not merely a quality initiative. (7) Seeks to achieve breakthroughs in every area of operation, not merely small marginal

improvements. (8) Philosophy of management commitment, customer focus, process improvement and rule of

measurement. (9) Makes every area of the Firm ready to meet the changing needs of customers, markets &

technologies.

(b) (1) Pervasiveness: Competition is prevalent in any business environment, irrespective of size

of Firm, nature of product or service, type of customer groups, or other factors. (2) Effect of Competition: When preparing and implementing their plans, businesses have to

consider competitors' strategies, profits levels, costs, products and services. As the adage goes, "necessity is the mother of invention", Competition brings the test out of the BusinessEnterprise, in its quest for survival and growth.

(3) Business Response: Every Business Firm has to recognize the impact of competitive environment, and strive to maintain and improve its profit levels. Competition leads to newer products, processes, better quality in products, and improved customer service. Competition is not bad for organizations, but serves as a stimulator for their growth.

Ans. 11 TOP DOWN APPROACH TO SYSTEMS DEVELOPMENT

Step Description

1. Identify Firm's goals

Identify the Firm's objectives and goals, and determine where it is going and what its Management wants to accomplish.

2. Identify Firm's functions

Identify the functions of the organisation like Marketing, Production, R&D, etc.

Examine how these functions support the Firm in achieving its goals.

3. Ascertain functional activities

Ascertain the major activities, decisions and duties of Managers, at various levels of hierarchy, in each of the organisational functions.

Analyse - (a) what decisions are made, (b) what decisions need to be made, and (c) when they should be made.

4. Identify decisions & information Requirements

Identify the models that guide managerial decision processes, and find out the information requirements for activities and decisions.

Provide an insight into what information is needed, when it is needed, and what forms is most useful. These factors provide the design specifications for application system.

5. Draft System program

Prepare specific information processing programs in detail, & modules within these programmes.

Identify files and database for various decision applications.

Obtain Managers' and Users' approval, and implement the system.

Page 11: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

11 | P a g e

BOTTOM UP APPROACH TO SYSTEMS DEVELOPMENT

Step Description

1. Life Stream Systems

Life Stream Systems are those, which are essential for the day-to-day business activities, e.g. Payroll, Sales Order, Inventory Control, Purchasing, Production, etc.

2. Information requirements

Identify - (a) the basic transactions, (b) information file requirements, and (c) information processing programs, for each Life Stream System.

3. Info. System Develop an information system for each life stream system.

4. Data integration

Examine in detail the applications, files and records and integrate the data of each information system kept in different files. File integrated data -

• Enhances the shareability arid evolvability of the database, • Ensures that all programs use uniform data, and • Provides added capability for inquiry processing and adhoc requests

for reports.

5. Supporting Models

Add Decision Models & Planning Models for supporting the planning activities of management control.

6. Main Model Integrate all the models to evolve a complete model base. The models - • Facilitate and support higher management activities, and • Help to analyse different factors, understand difficult situations and

formulate alternative strategies and options to deal them.

This is the reverse of the top-down approach. Here, the Supervisory Level Management's involvement is more.

Ans. 12 (a)

(1) Heinz Weihrich has developed a matrix called TOWS Matrix by comparing the strengths and weaknesses of an organization (internal) with that of market opportunities and threats (external).

(2) TOWS Matrix uses the inputs viz. Strengths, Weaknesses, Opportunities and Threats, reorganizes them and integrates them into the strategic planning process.

(3) This matrix takes into account various environmental and organizational factors, so as to facilitate strategy formulation and ensure efficient utilization of organizational resources.

(4) The various combinations in TOWS Matrix are given below –

(5)

(b) (1) Benchmarking is the process of identifying and learning from the best industry practices and

the processes by whidi they are achieved.

(2) Benchmarking involves –

I. comparing different aspects of the Firm's products, services, activities, processes and other aspects of performance with those of its competitors or other acknowledged leaders in their field, and the best prevailing practices,

II. identifying gaps and deficiencies in the Firm's own performance, III. finding out novel methods to reduce the gaps, and also to improve the situations, and IV. ensuring that these improved methods are implemented.

Ans. 13

(a)

Efficiency Effectiveness

1. To be efficient means "to do the things 1. To be effective means, "to do the right

Page 12: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

12 | P a g e

right". things".

2. Focusses on relationship between inputs and outputs.

2. Focusses on relationship between means and ends.

3. Short-run time horizon. 3. Long-run time horizon.

4. Introspective effect, i.e. within the Firm. 4. Highlights linkages between Firm and its external environment.

5. Operational Phenomenon. 5. Strategic Phenomenon.

6. Strategy Implementation viewpoint. 6. Strategy Formulation viewpoint.

(b)

Expansion Strategy Retrenchment Strategy

Meaning Expansion Strategy is implemented by re-defining the business by adding the scope of business, substantially increasing the efforts of the current business.

Retrenchment Strategy involves re-definition of business by divesting a major product line or market.

Nature of Environ-ment

Expansion is a promising and popular strategy that tends to be equated with dynamism, vigour, promise and success. It is particularly applicable in a promising environment offering scope for success.

Retrenchment or Retreat becomes necessary or expedient for coping with particularly hostile and adverse situations in the environment and when any other strategy is likely to be suicidal.

Effect Expansion may take the Enterprise along relatively unknown and risky paths, full of promises and pitfalls.

Retrenchment involves re-grouping and recouping of the resources, and is comparatively less risky.

Ans. 14

(a) 1. Outdated Processes: Most of the processes that Firms are engaged in, might have been

developed by their functional / units over a period of time. They might also have been evolved based on a series of unplanned decisions.

2. Sub-System view: Individual departments or divisions of a Firm may aim at optimizing their own performance, disregarding the resultant effect on other areas of operation. This will lead to sub-optimal performance by the Firm as a whole.

3. Time and Cost: Existing business processes may be lengthy, time-consuming, costly, inefficient, obsolete and irrational. This needs to be re-designed at the earliest.

4. Fragmentation: Fragmentation of work processes makes it difficult to improve the quality of work performance and also develops a narrow vision among the employees.

5. Inefficiency: Emerging critical issues may often remain unattended by traditional management systems, due to the narrow definitions of tasks or roles of an individual department.

6. Need for FT: Using information technology, it is possible to - (a) increase the speed of normal production, (b) increase asset turnover, i.e. utilize assets and machinery more effectively, and (c) reduce the customer response time and increase customer satisfaction. These advantages may not be available in the existing business processes. The above factors bring out the need for BPR.

(b) 1. Meaning:

i. Divestment Strategy involves the sale or liquidation of a portion of business, or a major division, profit centre or SBU.

ii. Divestment is a part of rehabilitation or restructuring plan, and is adopted when a turnaround has been attempted but has proved to be unsuccessful.

2. Reasons: Divestment Strategy may be adopted due the following reasons – i. Acquired business proves to be a mismatch and cannot be integrated within the

Company. ii. Negative cash flows from a particular business create financial problems for the whole

Company. iii. Inability to cope with the prevailing "severe/ Intense competition, iv. inability to invest in the technological upgradation required to survive in business. v. Availability of a better alternative for investment.

Page 13: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

13 | P a g e

MARKS ALLOCATION SHEET

Que. No.

Sub point No.(if any)

Name of Chapter Description of Concept Mark Allocatio

n

Total Marks

1(a) - Data Storage Meaning 1

1(a) - Retrieval & DBMS Other Details 1 2

1(b) - Computer network Meaning 1

1(b) - Network security Other Details 1 2

1(C) - Software Meaning 1

1(C) - Software Other Details 1 2

1(d) - Internet & other technology

Meaning 1

1(d) - Internet & other technology

Use 1 2

1(e) - Internet & other technology

Meaning 1

1(e) - Internet & other technology

Other Details 1 2

2(a) - Computer network & network security

Meaning 1

2(a) - Computer network & network security

Role 1

2(a) - Computer network & network security

Significance 1

2(a) - Computer network & network security

Requirements 1 4

2(b) - Internet & other technology

Any 4 improvements (each has 1 mark) 4 4

3(a) - Data Storage , Retrieval & DBMS

Any 4 Difference (each has 1 mark) 4 4

3(b) - Computer network & network security

Meaning 0.5

3(b) - Computer network & network security

Parts 0.5

3(b) - Computer network & network security

Layers 1.5

3(b) - Computer network & network security

Steps 1.5 4

4(a) - Data Storage , Retrieval & DBMS

Any 4 Stages (each has 1 mark) 4 4

4(b) - Software Any 4 Points (each has 1 mark) 4 4

5(a) - Internet & other Technology

Any 8 benefits(each has 0.5 mark) 4 4

5(b) - Data Storage , Retrieval & DBMS

Meaning 2

5(b) - Data Storage , Retrieval & DBMS

Structure 2 4

6(a) - Computer network & Security

Any 4 Services (each has 1 mark) 4 4

6(b) - Internet & Other technology

Internet Surfing 2

6(b) - Internet & Other technology

Uniform Resource Locator 2 4

7 - Flow Chart Drawing of Flowchart 8 8

8(a) - Business Environment

Meaning 1

Page 14: SUGGESTED SOLUTION - J.K. Shah Classes3 | P a g e (3) Significance: A Firewall is a proven and effective means of protecting the Firm's internal resources from unauthorized and unwanted

14 | P a g e

8(a) - Business Environment

Features (any 4 each has 0.5 mark) 2 3

8(b) - Strategic Analysis Meaning 1

8(b) - Strategic Analysis Areas 1

8(b) - Strategic Analysis Factors 1 3

8(c) - Strategy Formulation Market penetration 1

8(c) - Strategy Formulation Market Development 1

8(c) - Strategy Formulation Product Development 1 3

8(d) - Strategy Implementation &

Control

Any 3 advantages (each has 1 mark) 3 3

8(e) - Reaching Strategic edge

Any 3 objectives (each has 1 mark) 3 3

9(a) - Strategic Mgt. Process

Any 4 importance (each has 1 mark) 4 4

9(b) - Strategic Formulation Meaning 1

9(b) - Strategic Formulation Features (Any 4 each has 0.5mark) 2 3

10(a) - Reaching Strategic edge

Meaning 1

10(a) - Reaching Strategic edge

Features (Any 6 each has 0.5 mark) 3 4

10(b) - Business environment

Pervasiveness 1

10(b) - Business environment

Effect of competition 1

10(b) - Business environment

Business Response 1 3

11 - Strategy Formulation Steps and Description of top down approach

3.5

11 - Strategy Formulation Steps and Description of bottom up approach

3.5 7

12(a) - Strategic Analysis Meaning 1

12(a) - Strategic Analysis Use 1

12(a) - Strategic Analysis Components 2 4

12(b) - Reaching Strategic Edge

Meaning 1

12(b) - Reaching Strategic Edge

Inclusion(each has 0.5 mark) 2 3

13(a) - Strategy Implementation

Any 4 Differences (each has 1 mark) 4 4

13(b) - Strategy Formulation Any 3 Difference (each has 1 mark) 3 3

14(a) - Reaching Strategic edge

Any 4 need (each has 1 mark) 4 4

14(b) - Strategy Formulation Meaning 1

14(b) - Strategy Formulation Reason (any 4) (each has 0.5 mark) 2 3