1. In an enterprise-class database system, business users interact directly with database applications, which directly access the database data.



Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->There are 50 students in a class. In a class test 22 students get 25 marks each, 18 students get 30 marks each. Each of the remaining gets 16 marks. The average mark of the whole class is :....
QA->In a class of 20 students the average age is 16 years.If the age of the class teacher is added to that of students,the average age of the class becomes 17 years.What is the age of the teacher?....
QA->A subset of data in a warehouse in the form of summary data, related to a particular department of business function:....
QA->TRAI hasmade it compulsory for Broadband providers to ensure minimum speed of how manyKbps after users exhaust their initial data quota?....
QA->Which data communications standard provided broadband access in a wireless network?....
MCQ->In an Enterprise-class database system, business users interact directly with database applications that interact with the DBMS, which directly accesses the database data.....
MCQ->In an enterprise-class database system, business users interact directly with database applications, which directly access the database data.....
MCQ-> on the basis of the information given in the following case. Teknik Group of industries had businesses in different sectors ranging from manufacturing, construction, fish farming and hotels. These different businesses operated as semi-independent units managed by the unit level managers. Teknik’s management had an internal consultancy group called as Business Advisory Group (known internally as BAG). The 15 experts in BAG were hired personally by Mr. Teknikwala, the owner of Teknik, who wanted this core group of experts to help his organization grow fast without facing the typical growth hurdles. Most of them were specialists in fields like law, information technology, human resource management, and operations management. Almost all of them had experience spanning decades in the industry. Whenever any of the units faced any significant all units and it represented an extra work for those who were involved. This coordination was required to understand the different work processes and the users’ requirements. This coordination activity was being extensively managed by the old timers as they were familiar with internal processes and people in the different units. An external consultant was also hired for customization and implementation After two months, BAG teams had to fortnightly present their progress to Ms. Teknikwali’s team. In the last meeting Ms. Teknikwali was dissatisfied. She explained her thinking that since ERP impacted every aspect of the business, the roll out had to be done faster. She wanted Mr. Shiv to get the implementation completed ahead of schedule. In the meeting she asked Mr. Shiv to get the people in IT team to be more productive. Not willing to disagree, Mr. Shiv committed to a roll-out schedule of complete ERP system in 6 months instead of earlier decided 14 months. Next day, Mr. Shiv presented the revised project milestone to BAG members. He told them that in order to meet the deadline, the members were expected to work on week-ends till the completion of the project. Along with that, they were also expected to maintain their earlier standards of delivery time and quality for the normal trouble-shooting and internal advisory work. Mr. Shiv also pointed out that anyone whose performance did not meet the expectations would be subjected to formal disciplinary action. The meeting ended without any member commenting on Shiv’s ideas, although Mr. Shiv heard a lot of mumbling in the corridor. Over the week, Shiv noticed that the members seemed to avoid him and he had to make extra effort to get ideas from them. After a fortnight Shiv reviewed the attendance register and found the Mr. Lal, an old time member, had not come during the week-ends and certain decisions were held up due to lack of inputs from Mr. Lal. Mr. Shiv issued a written reprimand to Mr. Lal. He was speechless on receiving the reprimand but kept silent. It has been three days since that incident. Some of the senior members had put in request for transfer to other business units. It was rumoured that four problems, the unit level managers would put up a request for help to BAG. The problems ranged from installation of internal MIS systems, to financial advice related to leasing of equipment, to handling of employee grievances. Over a period of 20 years, Teknik’s revenues grew from 100 crore 10,000 crore with guidance of BAG and due to Mr. Tekinwala’s vision. Given its reputation in the industry, many people wanted to start their careers in BAG. Often young MBAs fresh out of business schools would apply. However their applications used to be rejected by Mr. Teknikwala, who had a preference for people with extensive industry experience. Things changed after the unfortunate demise of Mr. Teknikwala. His daughter Miss. Teknikwali took up the family business. She was an MBA from one of the premier business schools, and was working in a different company when Mr. Tekinwala passed away. She preferred that BAG developed new ideas and therefore inducted freshly graduated MBAs from premier business schools. She personally supervised the recruitment and selection process. Now the entire group constituted of 50 specialists, out of which 35 were the old time members. She also changed the reporting relationships in the BAG group with some of the older members being made to report to the new members. In IT team, Mr. Shiv, a newly recruited MBA, was made in-charge. For the older members it was a shock. However, as most of them were on the verge of retirement, and it would be challenging to search for new jobs while competing with younger professionals, they decided to play along. After one month, all business units were caught up in the ERP fever. This was an idea pushed by Ms. Teknikwali who the need the need to replace the old legacy systems with latest ERP system integrating all the units of Teknik. This was heavily influenced by her experience in the previous where an ERP system was already up and running. Therefore she was not aware of the difference between installing an ERP system and working on an already installed one. The ERP mplementation in Teknik Group required extensive coordination with senior level managers of senior legal experts had agreed to an offer from a law firm. Other senior members would sporadically come in late to work, citing health reasons. Almost all senior members now wanted a weekly work-routine to be prepared and given to them in advance so that they could deliver as per the schedule. This insistence on written communication was a problem as urgent problems or ad-hoc requests could not be foreseen and included. Also normal services to other business units were being unattended to, and there were complaints coming from the unit heads.Which of the following could have been a better response of Mr. Shiv to Ms. Teknikwali’s request to re-schedule the ERP implementation?....
MCQ->A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words have been printed in ‘’bold’’ to help you locate them while answering some of the questions.The evolution of Bring Your Own Device (BYOD) trend has been as profound as it has been rapid. It represents the more visible sign that the boundaries between personal life and work life are blurring. The 9 a.m. - 5 p.m. model of working solely from office has become archaic and increasingly people are working extended hours from a range of locations. At the very heart of this evolution is the ability to access enterprise networks from anywhere and anytime. The concept of cloud computing serves effectively to extend the office out of office. The much heralded benefit of BYOD is greater productivity. However, recent research has suggested that this is the greatest myth of BYOD and the reality is that BYOD in practise poses new challenges that may outweigh the benefits. A worldwide commissioned by Fortinet choose to look at attitudes towards BYOD and security from the user’s point of view instead of the IT managers. Specifically the survey was conducted in 15 territories on a group of graduate employees in their early twenties because they represent the first generation to enter the workplace with an expectation of own device use. Moreover, they also represent tomorrow’s influences and decision markers. The survey findings reveals that for financial organizations, the decision to embrace BYOB is extremely dangerous. Larger organizations will have mature IT strategies and policies in place. But what about smaller financial business? They might not have such well developed strategies to protect confidential data. Crucially, within younger employee groups, 55% of the people share an expectation that they should be allowed to use their own devices in the workplace or for work purposes. With this expectation comes the very real risk that employees may consider contravening company policy banning the use of own devices. The threats posed by this level of subversion cannot be overstated. The survey casts doubt on the idea of BYOD leading to greater productivity by revealing the real reason people want to use their own devices. Only 26% of people in this age group cite efficiency as the reason they want to use their own devices, while 63% admit that the main reason is so they have access to their favourite applications. But with personal applications so close to hand, the risks to the business must surely include distraction and time wasting. To support this assumption 46% of people polled acknowledged time wasting as the greatest threat to the organization, while 42% citing greater exposure to theft or loss of confidential data. Clearly, from a user perspective there is great deal of contradiction surroundings BYOB and there exists an undercurrent of selfishness where users expect to use their own devices, but mostly for personal interest. They recognize the risks to the organization but are adamant that those risks are worth talking.According to the passage, for which of the following reasons did Fortinet conduct the survey on a group of graduate employees in their early twenties?A: As this group represents the future decision makers B: As this group represents the first generation who entered the workforce with a better understanding of sophisticated gadgets C: As this group represents the first generation to enter the workplace expecting that they can use their own devices for work purpose....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions