19
DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV Specialization: Information Technology Management __________________________________________________________________________ Course Name: 403-IT : SOFTWARE PROJECT MANAGEMENT Course Code: 403 Faculty Name : Prof. Dhananjay Bhavsar Concurrent Evaluation Components Sr. No. Components Converted Final Marks A. Written Home Assignment 10 B. Thematic Presentation 10 C. In-depth Viva 10 Total 30 1. The submission has to be in the format prescribed for each component. 2. Answers should be in own words, copied answers will be not be marked. 3. Student Name, Contact number & Specialization must be clearly mentioned on the submission sheets. A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets Q1. Discuss activities to be carried out for technical project management. Q2. Explain Dynamic systems development process. Q3. Discuss steps followed for software project planning and project evaluation. Q4. Explain difference between software project management and contract management. Q5. Discuss software project estimation techniques. Q6. Define software quality and explain process and product standards. Q7. Explain risk management in software project. Q8. Explain primavera and PERT tool used for software project management. Q9) Explain software project sequencing and scheduling. Q10) Draw PERT diagram for following project and calculate critical path :

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

  • Upload
    others

  • View
    31

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV

Specialization: Information Technology Management __________________________________________________________________________

Course Name: 403-IT : SOFTWARE PROJECT MANAGEMENT Course Code: 403

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No. Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. In-depth Viva 10

Total 30

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on the

submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q1. Discuss activities to be carried out for technical project management.

Q2. Explain Dynamic systems development process.

Q3. Discuss steps followed for software project planning and project evaluation.

Q4. Explain difference between software project management and contract

management.

Q5. Discuss software project estimation techniques.

Q6. Define software quality and explain process and product standards.

Q7. Explain risk management in software project.

Q8. Explain primavera and PERT tool used for software project management.

Q9) Explain software project sequencing and scheduling.

Q10) Draw PERT diagram for following project and calculate critical path :

Page 2: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Activity Description Duration Predecessors

A Develop project plan

3 -

B Assign project task

4 -

C Obtain hardware 5 A

D Coding 6 A

E Hardware installation

7 C

F Testing 8 D

G User acceptance 9 B

H Support & maintenance 3 E, F, G

B. Thematic Presentation (Any one)

a) Dynamic systems development process used in inventory management system.

b) Software project management and contract management which one is suitable for

developing Student admission System? How ?

c) Define software quality and explain process and product standards while

developing commercial application.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. In-depth Viva

Note: Viva will be conducted on the entire syllabus. Student has to prepare thoroughly and appear for the viva.

Page 3: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/

__________________________________________________________________________

Course Name: ENTERPRISE RESOURCE PLANNING (ERP) Course Code: 404

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No. Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. In-depth Viva 10

Total 30

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on the

submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q1) Explain vendor selection strategy for ERP Implementation.

Q2) Explain the ERP implementation life cycle?

Q3) Explain the details about ERP functional modules like purchase & inventory.

Q4) Explain the data ware housing and data mining in details.

Q5) "E-Market" is online shopping company providing various buying selling of

products to many customer. However currently the company is facing lot of

problem due to huge competition in E-commerce sector. You as ERP consultant

suggest how ERP implementation can prove as better tool to improve companies

overall functioning. Discuss all modules & sub modules of ERP which will be

suitable for E-Commerce companies.

Q6) Explain the architecture of ERP for any business organisation.

Q7) Define business process re-engineering. What are three important concept

of BPR?

Q8) Define CRM. Explain CRM in Current scenario of Globalisation.

Page 4: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Q9) Discuss emerging trends in ERP applications.

Q10) You as a ERP consultant, suggest how to implement ERP for textile

business for improving business overall functions. List all technical and

functional modulus to be implemented.

B. Thematic Presentation (Any one)

1. Use ERP functional modules in purchase & Inventory System.

2. Use of Data ware housing and data mining in Management institute.

3. "E-Market" is online shopping company providing various buying selling of as an owner

of shop how you promote your product for e market.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. In-depth Viva

Note: Viva will be conducted on the entire syllabus. Student has to prepare thoroughly and appear for the viva .

Page 5: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV

__________________________________________________________________________

Course Name -Network Technology and Security Course Code: 406

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No.

Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. Caselet 10

D. Model Development 10

E. In-depth Viva 10

Total 50

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on the

submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q.1) What is Topology? Explain different types of topology in details.

Q.2) Explain Transmission Technique with suitable example.

Q.3) Explain ISO-OSI Reference Model in details.

Q.4) What is TCP / IP ? What TCP does?

Q.5) Integrated Service Digital Networks.

Q.6) What is Domain Network Services? Explain different types of DNS.

Q.7) Explain different communication medium and their characteristics.

Q.8) Explain IP routing Concepts.

Q.9) Explain Multipurpose Internet Mail Extensions.

Q.10) Common Problem with Packet Filtering.

Page 6: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

B. Thematic Presentation (Any one)

a) Which topology is suitable for conducting online exam in management

Institute.

b) ISO-OSI Reference Model can be used effectively transferring data in

various format.

c) TCP / IP used for setting firewall.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. Caselet

Caselet-1

For any organization, having a secure network is the primary thing to reach their business

requirements. A network is said to be secure when it can sustain from attacks, which may damage

the whole network. Over the last few decades, internetworking has grown tremendously and lot

of importance is given to secure the network. To develop a secure network, network

administrators must have a good understanding of all attacks that are caused by an intruder and

their mitigation techniques. Choosing a particular mitigation technique for an attack has an

impact on the overall performance of the network, because each attack has different ways for

mitigation. By performing risk analysis, network administrators will identify the assets that need

to be protected, threats and vulnerabilities that the network may posse. With the help of risk

analysis administrators will have sufficient information about all risks which helps to build a

network with high security. After risk analysis, designing a set of security policies is very

important to provide high level of security. Security policies provide information for network

users for using and auditing the network.

identify various tools , Technique and methods for secure network..

Page 7: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Caselet-2

Technological advances have great societal benefits and make it easier for people to access

information, and to collaborate with their communities. They also expose users to risks such as

cybercrime, identity theft or misuse of personal data. Software companies share a responsibility

to design and operate products and services in a manner that both helps protect customers from

these harms and promotes respect for fundamental rights. And software companies share, with

many other stakeholders, a collective responsibility to help make the Internet more reliable and

trustworthy. The steps appropriate for a software company to take, however, must recognize the

appropriate role for private sector actors. Policy considerations regarding economic incentives

must be borne in mind – the impact on innovation and competition of investing private actors

with responsibility for public goods. Accountability is important as well – in many cases, steps are

best undertaken by democratically elected governments rather than private actors, particularly

actors with market power. Finally, when striving towards these goals, public policy objectives

such as governance, security, privacy and freedom of expression may sometimes seem at odds.

That is why integrated processes in developing software as well cooperation and dialogue with

all stakeholders is crucial to ensure fundamental rights and the safety of users.

As an network security administrator just different options and security levels

Caselet-3

Secure Network has now become a need of any organization. The security threats are increasing

day by day and making high speed wired/wireless network and internet services, insecure and

unreliable. Now – a -days security measures works more importantly towards fulfilling the cutting

edge demands of today's growing industries. The need is also induced in to the areas like defense,

where secure and authenticated access of resources are the key issues related to information

security. In this paper Author has described the important measures and parameters regarding

large industry/organizational requirements for establishing a secure network. Wi-Fi networks are

very common in providing wireless network access to different resources and connecting various

devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network

hacking attempts. This paper explores important security measures related to different network

scenarios, so that a fully secured network environment could be established in an organization.

As an security administrator Suggest the minimal set of measures required for establishing

network security in any organization.

Page 8: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

D Model Development

Q. 1 IT manager of a company wants to replace the ‘existing system of 500 computers connected

in bus topology’ with a more suitable topology. Suggest the right topology and justify your suggestion.

Q2. For the back office for 400 plus computers, IT manager wants to design a highly reliable

computer network with better expandability. Suggest a right topology. student needs to draw suitable network topologies diagram of any of the above given topic, diagram must be drawn by using any of the diagram tools and print out of the diagram must be submitted to Prof. Bhavsar Dhananjay

E. In-depth Viva

viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.

Page 9: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV

__________________________________________________________________________

Course Name : Database Administration Course Code: 407

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No.

Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. Caselet 10

D. Model Development 10

E. In-depth Viva 10

Total 50

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on the

submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q.1) Explain process structure and storage structure of Oracle ?

Q.2) how to create and manage database user accounts, privileges, role and profiles

Q.3) Describe any four Codd’s rules/laws of RDBMS.

Q.4) Explain Three Tier architecture with suitable diagram.

Q.5) What is Relational Model? Give Suitable example.

Q.6) Xpress Logistic private Limited is having a worldwide business. They are currently facing

problem to maintain the database of around 1 lakh dealers throughout the world. Being an IT

manager, how will you design database using DBCA which will help company to maintain a good

relation with their dealers.

Page 10: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Q.7) Assume that you have appointed as a advisor for database management of a HSBD Bank

Pvt Ltd . as this is newly started Bank , give your advice to top management about database

administration and job specification of database administrator.

Q.8) What is RDBMS ? how it is powerful as compare to traditional DBMS , comment on this .

Q.9) Explain Referential Integrity constraint and On Delete Cascade with suitable example

Q.10) What are the locks? Give its importance. Explain its types.

B. Thematic Presentation (Any one)

a) Effective use of setting privileges, role and profiles in database administration.

b) Effective use Three Tier architecture in developing student attendance system.

c) Effective use of Relational Model in employee payroll system.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. Caselet

Caselet-1

The challenge was to create an enterprise installer that seamlessly installs the third party

database server (Oracle® 10G R2 Enterprise Edition), does appropriate configurations, and

creates the application schema. The deployment needed to be easy and seamless, working well

with the application installation process and conforming to existing standards. Additionally, the

database configuration should be optimized to handle exponential growth in usage and data

size. And, the day-to-day administration would need to be minimal since there would be either

limited DBA expertise or no on-site DBA to manage the database.

Page 11: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

As database administrator suggest the proper structure by considering the following points.

• Location for Oracle binaries

• Location for Data

• Location for Flashback recovery area

• Features such as RMAN, ASM and OFA

• Transaction volume per day.

Caselet-2

With operations in more than 25 countries, this drug development services company is one of

the world’s largest and most comprehensive. The company’s web response service system

allows real-time data access and visibility to its customers. This in turn, reduces drug

overproduction costs, allows flexibility in study schedules and results in substantial reductions

in drug waste and distribution costs. When utilizing their services, customers have the added

flexibility to move drug supply between depots and warehouses − in real-time − online. Optimal

efficiency and minimal downtime are clearly critical to this business

As database administrator suggest the proper structure

Caselet-3

HEALTHCARE INSURANCE SAAS DATA WAREHOUSE ORGANIZATION

Our Client is a top Insurance provider in a major metropolitan area in Midwest United States. It

covers 32 counties in two Midwest States and offers 40 health insurance plans for individuals,

families and employers. The Client has a data warehouse built on a platform which was used for

reporting and adhoc analysis needs. The process of updating the warehouse involves collecting

patient, insurance data from different subject areas, sending data to third party for grouper

processing, and updating the warehouse with the output coming from the grouper processing.

CHALLENGE

The current data warehouse platform could not support the growing adhoc and data mining

needs and they do not have an automated ETL process that can consolidate all the required data

for grouper processing. Our client envisioned and analytics (OLAP) solution where in other

partners can use the warehouse in a SaaS model. The current Data warehouse platform would

not be able to scale to the needs of future business and proposed SaaS solution. In addition to

this the objective was also to save costs by reducing dependency on third party grouper

processing vendors. This was proposed to be done by buying a groper product and fully

integrating it with the SaaS solution to be used by prospective clients.

Page 12: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

D Model Development

1. Bus Ticket Booking System.

2. Sale/Purchase items System.

3. Hospital management System.

4. Leave management System.

Model Development -student needs to design database and tables with cardinality and primary and candidate key of any of the above given topic, print out of the tables must be submitted to Prof. Bhavsar Dhananjay

E. In-depth Viva

viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.

Page 13: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV

__________________________________________________________________________

Course Name -Information Security and Audit Course Code: 409

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No.

Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. Caselet 10

D. Literature Review 10

E. In-depth Viva 10

Total 50

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on

the submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q.1) What is Information Security Audit? Explain detail Phases of the ISA.

Q.2) Why do companies need security audits?

Q.3) Explain IS audit Methodology in details.

Q.4) How do you measure a client system’s vulnerabilities?

Q .5) Explain Information Risk Management Process in detail.

Q.6) What is CAAT? Explain how CAAT’s used in SDLC Q.7) What is Cobit ? Explain IT governance Model. Q.8) Explain Cryptographic Techniques and Encryption.

Page 14: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Q.9) Intrusion Detection Systems and Firewalls. Q.10) Security of Virtual Private Networks.

B. Thematic Presentation (Any one)

a) Implementation of COBIT in software development and security.

b) Cryptographic Techniques and Encryption uses in digital signature.

c) Implementation of Firewalls in Hospital management.

d) Security of Virtual Private Networks with reference to SKP Campus.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. Caselet

Caselet-1

Cybercrime is a threat that is facing every organization and there is a growing concern on how to counter it. Each day, cybercrime hits organizations’ information systems and causes them trauma, significant financial loss and reputation damage. There is no place to be complacent. A cybercrime can attack your business’s information system at any time and you certainly dislike

the idea that your organization’s data will be breached like more than 43% of businesses in UK experienced a cyber-security breach or attack in the last 12 months(Cyber Security Breaches Survey 2018). A better information system security is crucial to protect an organization’s IT

against cybercrime, fraud and data breach. It is the duty of every organization to ensure that the organization’s data is secure, confidential and its integrity is not compromised. The security of an organization depends Micky Barzilay (May 2019) 3 of 20 on the user practices, the software and the information handling processes.

How would organization know what should be protected?

How should it be protected?

Page 15: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Where should the organization start from?

Does an IT security audit really help the organization to improve the information security and mitigate potential cyber security risks?

Caselet-2

Information security in healthcare is a major topic of interest today given the high value of

electronic protected health information (ePHI) on the black market. Healthcare organizations of

all sizes must comply with the Health Insurance Portability and Accountability Act (HIPAA)

Security Rule (HHS, 2003) or potentially face large fines that result from a security breach. No

company wants to be the next data breach victim due to a lack of common sense security controls

and suffer reputational damage as a result. Figure 1: Maximum Possible Fines for HIPAA

Violations The Security Risk Assessment (SRA) Tool provided by HealthIT.gov is designed to meet

this challenge for healthcare companies of all sizes. (ONC, 2016) Using the updated version of the

tool released in October 2016, we visited a small dental clinic to conduct an information security

risk assessment. An important feature to note is the clinic’s use of a cloud service provider (CSP)

as the primary method to handle patient ePHI. In subsequent sections, we will further evaluate

the implications of ePHI being managed in the cloud. We chose a small healthcare clinic because

we felt this type of research is needed to benefit small healthcare providers. Medium-to-large

healthcare organizations often have more resources to assess and manage the risks that they

face while small healthcare firms typically are more limited in their ability to protect patient ePHI

within the context of their overall business and compliance obligations. This has made them a

relative afterthought in the information security conversation to date. Common sense informs

us that there is variability of IT knowledge, technical implementation, and the degree to which

appropriate best practices are used among providers. Therefore, through this case study we aim

to advance the interests of all parties to more effectively manage these risks by moving towards

best practices and compliance with the HIPAA Security Rule.

Caselet-3

Information Security becomes imperative for an organization when a growing number of its employees gain access to business resources. Organ on India Ltd tackled this issue through a security audit. When bulk pharmaceutical giant Organon India Ltd (OIL), wanted to gain an edge over its rivals, it decided that the best way to do it was to provide its employees with higher levels of access to business critical resources and the Internet. Maintaining an acceptable standard for information assurance however, was equally important.

This was achieved by conducting a third-party information security audit. At the end of the audit exercise the company was able to make a number of process improvements and devise various strategic policies for better information security

Page 16: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

D Literature Review

Read any 5 research Paper/articles on Information Security and Audit, write a literature review on assignment paper and submit to Prof. Bhavsar Dhananjay

E. In-depth Viva

viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.

Page 17: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV

__________________________________________________________________________

Course Name -E-Governance Course Code: 412

Faculty Name : Prof. Dhananjay Bhavsar

Concurrent Evaluation Components

Sr. No.

Components Converted Final Marks

A. Written Home Assignment 10

B. Thematic Presentation 10

C. Caselet 10

D. Literature Review 10

E. In-depth Viva 10

Total 50

1. The submission has to be in the format prescribed for each component.

2. Answers should be in own words, copied answers will be not be marked.

3. Student Name, Contact number & Specialization must be clearly mentioned on

the submission sheets.

A. WRITTEN HOME ASSIGNMENTS Assignments are to be written on Assignment sheets

Q.1 What is E-Governance ? Explain different E-Governance model in detail.

Q.2 Explain different strategies for success of E-Governance.

Q.3 What are the applications of Data Warehousing and Data Mining in Government

Organization.

Q.4 Explain the difference between Human infrastructural preparedness and Technological

infrastructural preparedness.

Q.5 Explain Maturity model of E-Governance.

Q.6 E-governance change the face of India comment.

Q.7 What is the difference between e government and e governance?

Q.8 Difference between G2B and B2G.

Page 18: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

Q.9 List four advantages of e-governance.

Q.10 Role of ICT in e-governance.

B. Thematic Presentation (Any one)

a) Effective use of e governance in education sector.

b) Implementation of G2B and B2G in Dell’s sales system.

c) Role of ICT in e-governance.

Note : Students have to prepare power point presentation on any one of the above topic, presentation contains minimum 10-15 slides, student must present it and submit print out of presentation to Prof. Dhananjay Bhavsar .

C. Caselet

Caselet-1

Information communication technology (ICT) in government agencies as well as educational and research institutions facilitates an efficient, speedy and transparent dissemination of information to the public and other agencies for performance of government administration activities. The importance of ICT in governance has been recognized the world over. E-governance highlights several elements of good governance such as transparency, accountability, participation, social integration, public financial management reform and development. This study is based on research and personal interviews of selected representatives of the Government of National Capital Territory of Delhi. The findings of this study highlight the role of Internet, particularly the World Wide Web (WWW), which has made it easier for citizens to locate and download official information and to conduct transactions. Information management agencies such as libraries and knowledge centres play a vital role in supporting transparent and accountable governance in this digital era. E-government needs to be integrated into the broader public management framework so as to make a substantial change in the government to citizen (G2C) relationship.

Caselet-2 Information and communication technologies supporting human development have evolved rapidly since the 1990s. While ICT deployments were initially centred on infrastructure and connectivity, since the beginning of the new millennium they have helped to tackle issues related to cost, efficiency, effectiveness, transparency, universal service delivery and greater participation by stakeholders, offering innovative solutions for public institutions and private actors. The emergence of social networks, accompanied by the even more impressive and

Page 19: DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH.dimr.edu.in/wp-content/uploads/2020/03/IT.pdf · DNYANSAGAR INSTITUTE OF MANAGEMENT AND RESEARCH. MBA-II/SEM-IV/ _____ Course Name:

explosive growth of mobile technologies across the world, has reinforced ICT’s strategic importance in human development, while at the same time bringing to billions of people access to a digital communications device for the first time in history. That said, important challenges remain. The lack of resources and skills, weak delivery of public services and deficiencies in basic infrastructure – not only ICT-related – are daily challenges in the public sector of most developing countries. The urbanrural divide is still a reality in most low-income countries, and is one that poses serious obstacles to reaching the poor and most vulnerable. Less developed regions that could benefit most from the adoption of ICTs are usually the last to receive services. Yet, ICT access alone does not guarantee human development. There is an important policy link that must be developed, and e-governance programmes that target the most vulnerable and marginalized are critical for enhancing human development. This is the area in which UNDP can provide the most leverage for supporting pro-poor policies through its ICT for development programme.

Caselet-3 In 1970 the Government of India (GoI) has established Department of Electronics and subsequently in 1977 GoI has taken first major step towards implementation of egovernance by establishment of National Informatics Centre (NIC). By 1980 most of the government offices were equipped with computers but their role was confined up to word processing. With the span of time and advent of ICT, the GoI has taken a remarkable step for fostering e-governance by launching the national satellite based network NICNET in 1987 followed by District Information System of the National Informatics Centre (DISNIC) and [1] NICNET was the first government informatics network across the world equipped with facilities like TELNET, FTP, internet along with database services (GISTNIC and MEDLARS). Up to 1990, NICNET has extended its extent from state headquarters to district headquarters. In year 2000, the GoI has established Ministry of Information Technology and identified minimum 12-points minimum agenda for e-governance. Finally in year 2006 the GoI has launched National e-Governance Plan (NeGP) with various Mission Mode Projects (MMPs) to automate essential mundane tasks. This paper attempts to define the meaning of e-governance in national and international perspective. Furthermore it tries to demystify about major challenges in implementation of e-governance in India. It also suggests some inferences to triumph the success of e-governance especially in context of India.

D Literature Review

Read any 5 research Paper/articles on e governance, write a literature review on assignment paper and submit to Prof. Bhavsar Dhananjay

E. In-depth Viva

viva is conducted on the entire syllabus, student has to prepare thoroughly and appear for the viva.