PESIT Bangalore South Campus

Size: px
Start display at page:

Download "PESIT Bangalore South Campus"

Transcription

1 1) 2)a) INTERNAL ASSESSMENT TEST SOLUTION KEYS 3 Explain four basic analytical modeling activities involved in DSS? What-If Analysis: - In what-if-analysis, an end user makes changes to variables, or relationships among variables, and observes the resulting changes in the values of other variables. Sensitivity Analysis: - Is a special case of what-if analysis. Typically, the value of only one variable is changed repeatedly, and the resulting changes on other variables are observed. So sensitivity analysis is really a case of what-if analysis involving repeated changes to only one variable at a time. Typically, sensitivity analysis is used when decision makers are uncertain about the assumptions made in estimating the value of certain key variables. Goal Seeking Analysis: - Reverses the direction of the analysis done in what-if and sensitivity analysis. Instead of observing how changes in a variable affect other variables, goal seeking analysis sets a target value for a variable and then repeatedly changes other variables until the target value is achieved. Optimization Analysis: - Is a more complex extension of goal seeking analysis. Instead of setting a specific target value for a variable, the goal is to find the optimum value for one or more target variables, given certain constraints. Then one or more other variables are changed repeatedly, subject to the specified constraints, until the best values for the target variables are discovered. Explain Management Reporting Alternatives MIS provide a variety of information products to managers. Three major reporting alternatives are provided by such systems: Periodic scheduled reports - this traditional form of providing information to managers uses a prespecified format designed to provide managers with information on a regular basis. Exception Reports - reports are produced only when exceptional conditions occur. Demand Reports & Responses - information is provided whenever a manager demands it. Push Reporting - information is pushed to a manager s networked workstation. (10Marks) (5Marks) (5Marks)

2 b) 3) Explain any5 Applications in the cognitive science area of AI Expert Systems - A computer-based information system that uses its knowledge about a specific complex application area to act as an expert consultant to users. The system consists of a knowledge base and software modules that perform inferences on the knowledge, and communicates answers to a user s questions. Knowledge-Based Systems - An information system which adds a knowledge-base and some reasoning capability to the database and other components found in other types of computer-based information systems. Adaptive Learning Systems - An information system that can modify its behaviour based on information acquired as it operates. Fuzzy Logic Systems - Computer-based systems that can process data that are incomplete or only partially correct. Such systems can solve unstructured problems with incomplete knowledge by developing approximate inferences and answers. Neural Network - software can learn by processing sample problems and their solutions. As neural nets start to recognize patterns, they can begin to program themselves to solve such problems on their own. Genetic Algorithm - software uses Darwinian (survival of the fittest), randomizing, and other mathematical functions to simulate evolutionary processes that can generate increasingly better solutions to problems. Intelligent Agents - Use expert system and other AI technologies to serve as software surrogates for a variety of end user applications. Describe OLAP and its operations in detail with neat block diagram (10Marks) Online Analytical Processing (OLAP) Definition: Enables mangers and analysts to interactively examine and manipulate large amounts of detailed and consolidated data from many perspectives

3 Analytical Operations Online analytical processing is a capability of management, decision support, and executive information systems that enables managers and analysts to interactively examine and manipulate large amounts of detailed and consolidated data from many perspectives. Online analytical processing involves several basic analytical operations including: Consolidation - Involves the aggregation of data. This can involve simple roll-ups or complex groupings involving interrelated data. Drill-Down - OLAP can go in the reverse direction and automatically display detail data that comprises consolidated data. Slicing & Dicing - Refers to the ability to look at the database from different viewpoints. Slicing and dicing is often performed along a time axis in order to analyse trends and find patterns. OLAP applications: 1. Access very large amounts of data. 2. Analyse the techniques between many types of business elements. 3. Involves aggregated data. 4. Compare aggregated data over hierarchical time periods. 5. Present data in different perspectives. 6. Involve complex calculations between data elements. 7. Are able to respond quickly to user requests so that managers or analysts can pursue an analytical or decision thought process without being hindered by the system. 4) Write Short notes on: a) Neural Networks Neural networks are computing systems modelled on the human brain's mesh-like network of interconnected processing elements, called neurons. Of course, neural networks are much simpler than the human brain (estimated to have more than 100 billion neuron brain cells). Like the brain, however, such networks can process many pieces of information simultaneously and can learn to recognize patterns and programs themselves to solve related problems on their own. Neural networks can be implemented on microcomputers and other computer systems via software packages which simulate the activities of a neural network of many processing elements. Specialized neural network coprocessor circuit boards are also available. Special-purpose neural net microprocessor chips are used in some application areas. Uses include: 1. Military weapons systems 2. Voice recognition (2Marks Each)

4 3. Check signature verification 4. Manufacturing quality control 5. Image processing 6. Credit risk assessment 7. Investment forecasting b) Fuzzy logic Definition: Method of reasoning that resembles human reasoning since it allows for approximate values and inferences and incomplete or ambiguous data instead of relying only on crisp data Fuzzy Logic is a method of reasoning that resembles human reasoning since it allows for approximate values and inferences (fuzzy logic) and incomplete or ambiguous data (fuzzy data) instead of relying only on crisp data, such as binary (yes/no) choices. C)Genetic algorithms The use of genetic algorithms is a growing application of artificial intelligence. Genetic algorithm software uses Darwinian (survival of the fittest), randomizing, and other mathematical functions to simulate an evolutionary process that can yield increasingly better solutions to a problem. Genetic algorithms were first used to simulate millions of years in biological, geological, and ecosystem evolution in just a few minutes on a computer. Now genetic algorithm software is being used to model a variety of scientific, technical, and business processes. Genetic algorithms are especially useful for situations in which thousands of solutions are possible and must be evaluated to produce an optimal solution. Genetic algorithm software uses sets of mathematical process rules (algorithms) that specify how combinations of process components or steps are to be formed. d) Intelligent Agents. An intelligent agent (also called intelligent assistants/wizards) is a software surrogate for an end user or a process that fulfills a stated need or activity. An intelligent agent uses a built-in and learned knowledge base about a person or process to make decisions and accomplish tasks in a way that fulfills the intentions of a user. One of the most well-known uses of intelligent agents are the Wizards found in Microsoft Word, Excel, Access, and Powerpoint. The use of intelligent agents is expected to grow rapidly as a way to for users to: 1. Simplify software use.

5 5)a) b) 2. Access network resources. 3. Information screening and retrieval e) Virtual Reality Virtual reality (VR) is computer-simulated reality. VR is the use of multisensory human/computer interfaces that enable human users to experience computer-simulated objects, entities, spaces, and "worlds" as if they actually existed (also called cyberspace and artificial reality). VR Applications: 1. Computer-aided design (CAD) 2. Medical diagnostics and treatment 3. Scientific experimentation in many physical and biological sciences 4. Flight simulation for training pilots and astronauts 5. Product demonstrations 6. Employee training 7. Entertainment (3-D video games) Explain ethical responsibilities of business professionals. Business professionals have a responsibility to promote ethical uses of information technology in the workplace. As a manager or business professional, it will be your responsibility to make decisions about business activities and the use of information technologies, which may have an ethical dimension that must be considered. For example, Should you electronically monitor your employees work activities and ? Should you let employees use their work computers for private business or take home copies of software for their personal use? Should you electronically access your employees personnel records or workstation files? Should you sell customer information extracted from transaction processing systems to other companies? The impact of IT on employment is a major ethical concern justify with an example. (5Marks) (5Marks)

6 The impact of information technologies on employment is directly related to the use of computers to achieve automation of work activities. It has created new jobs and increased productivity, while also causing a significant reduction in some types of job opportunities. Jobs require different skills and education. Therefore, individuals may become unemployed unless they can be retrained with new positions or responsibilities. Many new jobs, including Internet webmasters, e-commerce directors, system analysts, and user consultants, have been created to support e-business and e- commerce applications. Jobs have been created by activities that are heavily dependent on information technology, in such areas as space exploration, micro-electronic technology and telecommunications. 6) List 10 tools used for security management (10Marks) The goal of security management is the accuracy, integrity and safety of all information system processes and resources. Thus, effective security management can minimize errors, fraud, and losses in the information systems that interconnect today s companies and their customers, suppliers, and other stakeholders. As figure illustrates, security management is a complex task.

7 7) What is hacking. Explain common hacking tactics assault the companies? Hacking - The obsessive use of computers, or the unauthorized access and use of networked computer systems. Hackers can be outsiders or company employees who use the Internet and other networks to steal or damage data and programs. A hacker may also use remote services that allow one computer on a network to execute programs on another computer to gain privileged access within a network. (10Marks) Common Hacking Tactics Denial of Service hammering a website s equipment with too many requests for information, effectively clogging the system, slowing performance or even crashing the site Scans widespread probes of the Internet to determine types of computers, services, and connections Sniffer programs that covertly search individual packets of data as they pass through the Internet, capturing passwords or entire contents Spoofing faking an address or Web page to trick users into passing along critical information like passwords or credit card numbers Trojan Horse a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software Back Doors a point hidden point of entry to be used in case the original entry point has been detected or blocked Malicious Applets tiny programs that misuse your computer s resources, modify files on the hard disk, send fake , or steal passwords War Dialling programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection Logic Bombs an instruction in a computer program that triggers a malicious act Buffer Overflow a technique for crashing or gaining control of a computer

8 by sending too much data to the buffer in a computer s memory Password Crackers software that can guess passwords Social Engineering a tactic used to gain access to computer systems by talking unsuspecting company employees out of valuable information such as passwords Dumpster Diving sifting through a company s garbage to find information to help break into their computers. Cyber Theft Computer crime involving the theft of money * * * * * *