DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf ·...
Transcript of DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf ·...
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV
Specialization: Information Technology Management __________________________________________________________________________
Course Name: 403-IT : SOFTWARE PROJECT MANAGEMENT Course Code: 403
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No. Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. In-depth Viva 10
Total 30
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on the
submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q1. Discuss activities to be carried out for technical project management.
Q2. Explain Dynamic systems development process.
Q3. Discuss steps followed for software project planning and project evaluation.
Q4. Explain difference between software project management and contract
management.
Q5. Discuss software project estimation techniques.
Q6. Define software quality and explain process and product standards.
Q7. Explain risk management in software project.
Q8. Explain primavera and PERT tool used for software project management.
Q9) Explain software project sequencing and scheduling.
Q10) Draw PERT diagram for following project and calculate critical path :
Activity Description Duration Predecessors
A Develop project plan
3 -
B Assign project task
4 -
C Obtain hardware 5 A
D Coding 6 A
E Hardware installation
7 C
F Testing 8 D
G User acceptance 9 B
H Support & maintenance 3 E, F, G
B. Thematic Presentation (Any one)
a) Dynamic systems development process used in inventory management system.
b) Software project management and contract management which one is suitable for
developing Student admission System? How ?
c) Define software quality and explain process and product standards while
developing commercial application.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. In-depth Viva
Note: Viva will be conducted on the entire syllabus. Student has to prepare thoroughly and appear for the viva.
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/
__________________________________________________________________________
Course Name: ENTERPRISE RESOURCE PLANNING (ERP) Course Code: 404
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No. Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. In-depth Viva 10
Total 30
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on the
submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q1) Explain vendor selection strategy for ERP Implementation.
Q2) Explain the ERP implementation life cycle?
Q3) Explain the details about ERP functional modules like purchase & inventory.
Q4) Explain the data ware housing and data mining in details.
Q5) "E-Market" is online shopping company providing various buying selling of
products to many customer. However currently the company is facing lot of
problem due to huge competition in E-commerce sector. You as ERP consultant
suggest how ERP implementation can prove as better tool to improve companies
overall functioning. Discuss all modules & sub modules of ERP which will be
suitable for E-Commerce companies.
Q6) Explain the architecture of ERP for any business organisation.
Q7) Define business process re-engineering. What are three important concept
of BPR?
Q8) Define CRM. Explain CRM in Current scenario of Globalisation.
Q9) Discuss emerging trends in ERP applications.
Q10) You as a ERP consultant, suggest how to implement ERP for textile
business for improving business overall functions. List all technical and
functional modulus to be implemented.
B. Thematic Presentation (Any one)
1. Use ERP functional modules in purchase & Inventory System.
2. Use of Data ware housing and data mining in Management institute.
3. "E-Market" is online shopping company providing various buying selling of as an owner
of shop how you promote your product for e market.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. In-depth Viva
Note: Viva will be conducted on the entire syllabus. Student has to prepare thoroughly and appear for the viva .
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV
__________________________________________________________________________
Course Name -Network Technology and Security Course Code: 406
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No.
Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. Caselet 10
D. Model Development 10
E. In-depth Viva 10
Total 50
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on the
submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q.1) What is Topology? Explain different types of topology in details.
Q.2) Explain Transmission Technique with suitable example.
Q.3) Explain ISO-OSI Reference Model in details.
Q.4) What is TCP / IP ? What TCP does?
Q.5) Integrated Service Digital Networks.
Q.6) What is Domain Network Services? Explain different types of DNS.
Q.7) Explain different communication medium and their characteristics.
Q.8) Explain IP routing Concepts.
Q.9) Explain Multipurpose Internet Mail Extensions.
Q.10) Common Problem with Packet Filtering.
B. Thematic Presentation (Any one)
a) Which topology is suitable for conducting online exam in management
Institute.
b) ISO-OSI Reference Model can be used effectively transferring data in
various format.
c) TCP / IP used for setting firewall.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. Caselet
Caselet-1
For any organization, having a secure network is the primary thing to reach their business
requirements. A network is said to be secure when it can sustain from attacks, which may damage
the whole network. Over the last few decades, internetworking has grown tremendously and lot
of importance is given to secure the network. To develop a secure network, network
administrators must have a good understanding of all attacks that are caused by an intruder and
their mitigation techniques. Choosing a particular mitigation technique for an attack has an
impact on the overall performance of the network, because each attack has different ways for
mitigation. By performing risk analysis, network administrators will identify the assets that need
to be protected, threats and vulnerabilities that the network may posse. With the help of risk
analysis administrators will have sufficient information about all risks which helps to build a
network with high security. After risk analysis, designing a set of security policies is very
important to provide high level of security. Security policies provide information for network
users for using and auditing the network.
identify various tools , Technique and methods for secure network..
Caselet-2
Technological advances have great societal benefits and make it easier for people to access
information, and to collaborate with their communities. They also expose users to risks such as
cybercrime, identity theft or misuse of personal data. Software companies share a responsibility
to design and operate products and services in a manner that both helps protect customers from
these harms and promotes respect for fundamental rights. And software companies share, with
many other stakeholders, a collective responsibility to help make the Internet more reliable and
trustworthy. The steps appropriate for a software company to take, however, must recognize the
appropriate role for private sector actors. Policy considerations regarding economic incentives
must be borne in mind – the impact on innovation and competition of investing private actors
with responsibility for public goods. Accountability is important as well – in many cases, steps are
best undertaken by democratically elected governments rather than private actors, particularly
actors with market power. Finally, when striving towards these goals, public policy objectives
such as governance, security, privacy and freedom of expression may sometimes seem at odds.
That is why integrated processes in developing software as well cooperation and dialogue with
all stakeholders is crucial to ensure fundamental rights and the safety of users.
As an network security administrator just different options and security levels
Caselet-3
Secure Network has now become a need of any organization. The security threats are increasing
day by day and making high speed wired/wireless network and internet services, insecure and
unreliable. Now – a -days security measures works more importantly towards fulfilling the cutting
edge demands of today's growing industries. The need is also induced in to the areas like defense,
where secure and authenticated access of resources are the key issues related to information
security. In this paper Author has described the important measures and parameters regarding
large industry/organizational requirements for establishing a secure network. Wi-Fi networks are
very common in providing wireless network access to different resources and connecting various
devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network
hacking attempts. This paper explores important security measures related to different network
scenarios, so that a fully secured network environment could be established in an organization.
As an security administrator Suggest the minimal set of measures required for establishing
network security in any organization.
D Model Development
Q. 1 IT manager of a company wants to replace the ‘existing system of 500 computers connected
in bus topology’ with a more suitable topology. Suggest the right topology and justify your suggestion.
Q2. For the back office for 400 plus computers, IT manager wants to design a highly reliable
computer network with better expandability. Suggest a right topology. student needs to draw suitable network topologies diagram of any of the above given topic, diagram must be drawn by using any of the diagram tools and print out of the diagram must be submitted to Prof. Bhavsar Dhananjay
E. In-depth Viva
viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV
__________________________________________________________________________
Course Name : Database Administration Course Code: 407
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No.
Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. Caselet 10
D. Model Development 10
E. In-depth Viva 10
Total 50
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on the
submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q.1) Explain process structure and storage structure of Oracle ?
Q.2) how to create and manage database user accounts, privileges, role and profiles
Q.3) Describe any four Codd’s rules/laws of RDBMS.
Q.4) Explain Three Tier architecture with suitable diagram.
Q.5) What is Relational Model? Give Suitable example.
Q.6) Xpress Logistic private Limited is having a worldwide business. They are currently facing
problem to maintain the database of around 1 lakh dealers throughout the world. Being an IT
manager, how will you design database using DBCA which will help company to maintain a good
relation with their dealers.
Q.7) Assume that you have appointed as a advisor for database management of a HSBD Bank
Pvt Ltd . as this is newly started Bank , give your advice to top management about database
administration and job specification of database administrator.
Q.8) What is RDBMS ? how it is powerful as compare to traditional DBMS , comment on this .
Q.9) Explain Referential Integrity constraint and On Delete Cascade with suitable example
Q.10) What are the locks? Give its importance. Explain its types.
B. Thematic Presentation (Any one)
a) Effective use of setting privileges, role and profiles in database administration.
b) Effective use Three Tier architecture in developing student attendance system.
c) Effective use of Relational Model in employee payroll system.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. Caselet
Caselet-1
The challenge was to create an enterprise installer that seamlessly installs the third party
database server (Oracle® 10G R2 Enterprise Edition), does appropriate configurations, and
creates the application schema. The deployment needed to be easy and seamless, working well
with the application installation process and conforming to existing standards. Additionally, the
database configuration should be optimized to handle exponential growth in usage and data
size. And, the day-to-day administration would need to be minimal since there would be either
limited DBA expertise or no on-site DBA to manage the database.
As database administrator suggest the proper structure by considering the following points.
• Location for Oracle binaries
• Location for Data
• Location for Flashback recovery area
• Features such as RMAN, ASM and OFA
• Transaction volume per day.
Caselet-2
With operations in more than 25 countries, this drug development services company is one of
the world’s largest and most comprehensive. The company’s web response service system
allows real-time data access and visibility to its customers. This in turn, reduces drug
overproduction costs, allows flexibility in study schedules and results in substantial reductions
in drug waste and distribution costs. When utilizing their services, customers have the added
flexibility to move drug supply between depots and warehouses − in real-time − online. Optimal
efficiency and minimal downtime are clearly critical to this business
As database administrator suggest the proper structure
Caselet-3
HEALTHCARE INSURANCE SAAS DATA WAREHOUSE ORGANIZATION
Our Client is a top Insurance provider in a major metropolitan area in Midwest United States. It
covers 32 counties in two Midwest States and offers 40 health insurance plans for individuals,
families and employers. The Client has a data warehouse built on a platform which was used for
reporting and adhoc analysis needs. The process of updating the warehouse involves collecting
patient, insurance data from different subject areas, sending data to third party for grouper
processing, and updating the warehouse with the output coming from the grouper processing.
CHALLENGE
The current data warehouse platform could not support the growing adhoc and data mining
needs and they do not have an automated ETL process that can consolidate all the required data
for grouper processing. Our client envisioned and analytics (OLAP) solution where in other
partners can use the warehouse in a SaaS model. The current Data warehouse platform would
not be able to scale to the needs of future business and proposed SaaS solution. In addition to
this the objective was also to save costs by reducing dependency on third party grouper
processing vendors. This was proposed to be done by buying a groper product and fully
integrating it with the SaaS solution to be used by prospective clients.
D Model Development
1. Bus Ticket Booking System.
2. Sale/Purchase items System.
3. Hospital management System.
4. Leave management System.
Model Development -student needs to design database and tables with cardinality and primary and candidate key of any of the above given topic, print out of the tables must be submitted to Prof. Bhavsar Dhananjay
E. In-depth Viva
viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV
__________________________________________________________________________
Course Name -Information Security and Audit Course Code: 409
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No.
Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. Caselet 10
D. Literature Review 10
E. In-depth Viva 10
Total 50
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on
the submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q.1) What is Information Security Audit? Explain detail Phases of the ISA.
Q.2) Why do companies need security audits?
Q.3) Explain IS audit Methodology in details.
Q.4) How do you measure a client system’s vulnerabilities?
Q .5) Explain Information Risk Management Process in detail.
Q.6) What is CAAT? Explain how CAAT’s used in SDLC Q.7) What is Cobit ? Explain IT governance Model. Q.8) Explain Cryptographic Techniques and Encryption.
Q.9) Intrusion Detection Systems and Firewalls. Q.10) Security of Virtual Private Networks.
B. Thematic Presentation (Any one)
a) Implementation of COBIT in software development and security.
b) Cryptographic Techniques and Encryption uses in digital signature.
c) Implementation of Firewalls in Hospital management.
d) Security of Virtual Private Networks with reference to SKP Campus.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. Caselet
Caselet-1
Cybercrime is a threat that is facing every organization and there is a growing concern on how to counter it. Each day, cybercrime hits organizations’ information systems and causes them trauma, significant financial loss and reputation damage. There is no place to be complacent. A cybercrime can attack your business’s information system at any time and you certainly dislike
the idea that your organization’s data will be breached like more than 43% of businesses in UK experienced a cyber-security breach or attack in the last 12 months(Cyber Security Breaches Survey 2018). A better information system security is crucial to protect an organization’s IT
against cybercrime, fraud and data breach. It is the duty of every organization to ensure that the organization’s data is secure, confidential and its integrity is not compromised. The security of an organization depends Micky Barzilay (May 2019) 3 of 20 on the user practices, the software and the information handling processes.
How would organization know what should be protected?
How should it be protected?
Where should the organization start from?
Does an IT security audit really help the organization to improve the information security and mitigate potential cyber security risks?
Caselet-2
Information security in healthcare is a major topic of interest today given the high value of
electronic protected health information (ePHI) on the black market. Healthcare organizations of
all sizes must comply with the Health Insurance Portability and Accountability Act (HIPAA)
Security Rule (HHS, 2003) or potentially face large fines that result from a security breach. No
company wants to be the next data breach victim due to a lack of common sense security controls
and suffer reputational damage as a result. Figure 1: Maximum Possible Fines for HIPAA
Violations The Security Risk Assessment (SRA) Tool provided by HealthIT.gov is designed to meet
this challenge for healthcare companies of all sizes. (ONC, 2016) Using the updated version of the
tool released in October 2016, we visited a small dental clinic to conduct an information security
risk assessment. An important feature to note is the clinic’s use of a cloud service provider (CSP)
as the primary method to handle patient ePHI. In subsequent sections, we will further evaluate
the implications of ePHI being managed in the cloud. We chose a small healthcare clinic because
we felt this type of research is needed to benefit small healthcare providers. Medium-to-large
healthcare organizations often have more resources to assess and manage the risks that they
face while small healthcare firms typically are more limited in their ability to protect patient ePHI
within the context of their overall business and compliance obligations. This has made them a
relative afterthought in the information security conversation to date. Common sense informs
us that there is variability of IT knowledge, technical implementation, and the degree to which
appropriate best practices are used among providers. Therefore, through this case study we aim
to advance the interests of all parties to more effectively manage these risks by moving towards
best practices and compliance with the HIPAA Security Rule.
Caselet-3
Information Security becomes imperative for an organization when a growing number of its employees gain access to business resources. Organ on India Ltd tackled this issue through a security audit. When bulk pharmaceutical giant Organon India Ltd (OIL), wanted to gain an edge over its rivals, it decided that the best way to do it was to provide its employees with higher levels of access to business critical resources and the Internet. Maintaining an acceptable standard for information assurance however, was equally important.
This was achieved by conducting a third-party information security audit. At the end of the audit exercise the company was able to make a number of process improvements and devise various strategic policies for better information security
D Literature Review
Read any 5 research Paper/articles on Information Security and Audit, write a literature review on assignment paper and submit to Prof. Bhavsar Dhananjay
E. In-depth Viva
viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV
__________________________________________________________________________
Course Name -E-Governance Course Code: 412
Faculty Name : Prof. Dhananjay Bhavsar
Concurrent Evaluation Components
Sr. No.
Components Converted Final Marks
A. Written Home Assignment 10
B. Thematic Presentation 10
C. Caselet 10
D. Literature Review 10
E. In-depth Viva 10
Total 50
1. The submission has to be in the format prescribed for each component.
2. Answers should be in own words, copied answers will be not be marked.
3. Student Name, Contact number & Specialization must be clearly mentioned on
the submission sheets.
A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets
Q.1 What is E-Governance ? Explain different E-Governance model in detail.
Q.2 Explain different strategies for success of E-Governance.
Q.3 What are the applications of Data Warehousing and Data Mining in Government
Organization.
Q.4 Explain the difference between Human infrastructural preparedness and Technological
infrastructural preparedness.
Q.5 Explain Maturity model of E-Governance.
Q.6 E-governance change the face of India comment.
Q.7 What is the difference between e government and e governance?
Q.8 Difference between G2B and B2G.
Q.9 List four advantages of e-governance.
Q.10 Role of ICT in e-governance.
B. Thematic Presentation (Any one)
a) Effective use of e governance in education sector.
b) Implementation of G2B and B2G in Dell’s sales system.
c) Role of ICT in e-governance.
Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .
C. Caselet
Caselet-1
Information communication technology (ICT) in government agencies as well as educational and research institutions facilitates an efficient, speedy and transparent dissemination of information to the public and other agencies for performance of government administration activities. The importance of ICT in governance has been recognized the world over. E-governance highlights several elements of good governance such as transparency, accountability, participation, social integration, public financial management reform and development. This study is based on research and personal interviews of selected representatives of the Government of National Capital Territory of Delhi. The findings of this study highlight the role of Internet, particularly the World Wide Web (WWW), which has made it easier for citizens to locate and download official information and to conduct transactions. Information management agencies such as libraries and knowledge centres play a vital role in supporting transparent and accountable governance in this digital era. E-government needs to be integrated into the broader public management framework so as to make a substantial change in the government to citizen (G2C) relationship.
Caselet-2 Information and communication technologies supporting human development have evolved rapidly since the 1990s. While ICT deployments were initially centred on infrastructure and connectivity, since the beginning of the new millennium they have helped to tackle issues related to cost, efficiency, effectiveness, transparency, universal service delivery and greater participation by stakeholders, offering innovative solutions for public institutions and private actors. The emergence of social networks, accompanied by the even more impressive and
explosive growth of mobile technologies across the world, has reinforced ICT’s strategic importance in human development, while at the same time bringing to billions of people access to a digital communications device for the first time in history. That said, important challenges remain. The lack of resources and skills, weak delivery of public services and deficiencies in basic infrastructure – not only ICT-related – are daily challenges in the public sector of most developing countries. The urbanrural divide is still a reality in most low-income countries, and is one that poses serious obstacles to reaching the poor and most vulnerable. Less developed regions that could benefit most from the adoption of ICTs are usually the last to receive services. Yet, ICT access alone does not guarantee human development. There is an important policy link that must be developed, and e-governance programmes that target the most vulnerable and marginalized are critical for enhancing human development. This is the area in which UNDP can provide the most leverage for supporting pro-poor policies through its ICT for development programme.
Caselet-3 In 1970 the Government of India (GoI) has established Department of Electronics and subsequently in 1977 GoI has taken first major step towards implementation of egovernance by establishment of National Informatics Centre (NIC). By 1980 most of the government offices were equipped with computers but their role was confined up to word processing. With the span of time and advent of ICT, the GoI has taken a remarkable step for fostering e-governance by launching the national satellite based network NICNET in 1987 followed by District Information System of the National Informatics Centre (DISNIC) and [1] NICNET was the first government informatics network across the world equipped with facilities like TELNET, FTP, internet along with database services (GISTNIC and MEDLARS). Up to 1990, NICNET has extended its extent from state headquarters to district headquarters. In year 2000, the GoI has established Ministry of Information Technology and identified minimum 12-points minimum agenda for e-governance. Finally in year 2006 the GoI has launched National e-Governance Plan (NeGP) with various Mission Mode Projects (MMPs) to automate essential mundane tasks. This paper attempts to define the meaning of e-governance in national and international perspective. Furthermore it tries to demystify about major challenges in implementation of e-governance in India. It also suggests some inferences to triumph the success of e-governance especially in context of India.
D Literature Review
Read any 5 research Paper/articles on e governance, write a literature review on assignment paper and submit to Prof. Bhavsar Dhananjay
E. In-depth Viva
viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.