suggested solution - j.k. shah classes · suggested solution (date: 19 april,2014) head office :...

15
1 | Page SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai 69. Tel : (022) 26836666

Upload: others

Post on 14-Jun-2020

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

1 | P a g e

SUGGESTED SOLUTION

(Date: 19 April,2014)

Head Office : Shraddha, 3rd Floor, Near Chinai College, Andheri (E), Mumbai – 69.

Tel : (022) 26836666

Page 2: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

2 | P a g e

Section - A Ans. 1

1. A file pointer is a data item in a record that identifies the storage location of another logically related record. File pointers establish linkage between records and are a basic part of the file organization of all the database models except the relational model. A pointer is placed in the last field of a record, if more than one pointer is used, then in the last fields.

2. (a) Disaster Recovery is the process of regaining access to the data, hardware and software

necessary to resume critical business operations after a natural or human-induced disaster. (b) It differs from a database recovery scenario, because the operating system and all related

software must be recovered before any database recovery can begin.

3. (a) Mirror log is an optional file and has a file extension of .mlg (b) It is a copy of a transaction log, and provides additional protection against the loss of data in

the event of Transaction Log file becoming unusable. 4.

(a) Web clients view the pages with a program called a web Browser. Some popular Web-Browser are Internet Explorer, Netscape Navigator, Mozilla Firefox, Opera etc.

(b) A Browser fetches a web page from a server by a request. This request is a standard HTTP Request containing a page Address.

(c) A Page Address is in the format : http://www.name.com, e.g. http://www.shrigurukripa.com. 5.

(a) An Internet Service Provider (ISP) is a business or organization that provides consumer access to the internet and related services.

(b) They makes internet access available on a local telephone call, and help the user to avoid direct long distance or international calls to connect to computers in other parts of the world.

6. (a) Hub is a hardware that provides a common wiring point in a LAN. (b) Each node is connected to the Hub by means of simple twisted pair wires. Then, it connects

over a higher speed link to other networks (LAN, WAN or Internet). (c) It works on a half-duplex mode, i.e. only one computer can talk at a time.

7. (a) Multiplexer is a device that combines a large number of low-speed transmission lines into a

high-speed line. (b) It permits a single transmission link to perform as it it were several separate links. (c) Multiplexing is a form of data transmission in which one communication channel carries

several transmissions at the same time. 8.

(a) By using drive technology or web casting, users can passively receive broadcast information rather than actively searching the web for information.

(b) This technology allows Users to choose from a menu of sources, specifying what kind of information they want to receive. Once selected, the information is automatically forwarded to the user.

(c) Push technology differs from the traditional uses of the internet. The internet is, for the most part a pull environment where a user opens a browser application and searches for information. This is time-consuming and frustrating. Push technology eliminates this frustration.

9. (a) Information required by others can either be posted in a usenet site or forwarded to specific

email addresses. (b) Internet discourages sending unsolicited E-Mails to the web users.

10. (a) Bluetooth is a telecommunications industry specification. (b) It describes how mobile phones, computers and personal Digital Assistants (PDAs) can be

easily inter-connected using a short-range wireless connection. (c) The technology got its unusual name in honor of Harald Bluetooth, king of Denmark in the

mid-tenth century.

Page 3: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

3 | P a g e

Ans. 2 (a) Meaning

1. An Operation System is defined as an integrated system of programs which –(i) supervises the operation of CPU, (ii) controls of the Input / Output functions of the computer system, (iii) translates programming languages into machine language, and (iv) provide various support services.

2. Operation system is a master control program of a computer that manages its internal function, and provides means to control the computer’s operations and file system.

3. Programs are held in the computer memory, thereby freeing the operator from inputting a program for each application. The codes of the operating system of a computer are stored externally in a series of Program Files, on the Computer’s hard disk or external Memory.

4. Operation systems are based on the concept of modularity. 5. Operating Systems are usually the creation of computer Manufactures, who design the OS

to suit the capabilities of that particular system. Example- Ms-Windows and DOS. Functions: 1. Schedule jobs: Os gives priorities to different work based on user needs, and can

determine the sequence in which they the job needs to be managed.

2. Manage Hardware and Software Resources: the programs required by the user gets loaded in the primary storage, and then cause the various hardware units to perform as specified by the program.

3. Maintain System Security: A password is created for every user, to ensure that unauthorized persons are denied access to data and system.

4. Enable Multiple User Resource Sharing: Many Users can share the programs at the same time.

5. Handling Interrupts: it is a technique used by the operation system to temporarily suspend processing of one program and enable the other program to be executed.

6. Maintain Usage records: This is useful in companies where the usage of system resources by various departments have to be recorder and also charged sometimes.

(b) (i)

64 32 0 8 4 0 1 0 1/4 0 1/16 (109.3125)10

(ii)

2+0.625 0.0625 (2.6875)10

Ans. 3

(a) The limitations of DBMS are- 1. Complexity: DBMS requires sophisticated data processing personnel, and constant

orientation and re-education of users, in order to use the system effectively.

2. Extra Storage and Memory: The software requires extra computer time to execute, disk space for storage of software, etc. and therefore places additional burden on the computer system.

3. Extra Resources: DBMS requires use of more terminals to put managers and other users on-line and make it available to managers. Communication devices may be needed to

Page 4: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

4 | P a g e

connect the extra terminals to the database processing facilities have to be upgraded to run the extra software required by the DBMS.

4. Expensive: Installation of a new database system or conversion of existing file processing system into DBMS approach is expensive and time consuming process.

5. Concurrent Access: If the DBMS is not designed for multiple users at the same time, problems of concurrent access will arise if more than one user utilizes the DBMS. Chances of data corruption are higher.

6. Ownership: The data created in a DBMS is not the specific property of the Application Users, but is owned by the entire set of users. The authority to handle data of portions thereof may sometimes not be clear.

(b) Meaning: 1. It is a decentralized network topology, in which a number of nodes are arranged around a

closed loop cable. 2. The network cable passes from one node to another until all nodes are connected in the

form of a loop or ring. 3. There is a direct point-to-point link between two neighboring nodes which are uni-directional.

This ensures that transmission by a node traverse the whole ring and comes back to the node, which made the transmission.

Advantages 1. It offers high performance for a small number of workstations. 2. It is more reliable since communication between two computers is not dependent on a single

computer like the host computer. 3. This type of network can span longer distances than any other type of network. 4. It is easily extendable. Disadvantages 1. It is relatively expensive and difficult to install. 2. Failure of one node disrupts the entire network. 3. Troubleshooting is difficult. 4. Addition or removal of a node can disrupt the network. 5. Addition of computers to the network increases the communication time between two

computers.

Ans. 4 (a)

1. Information on the business and services is placed in an assembled fashion in a common location.

2. It reduces communication costs of an organization since access to information is provided at a reasonable cost.

3. Employees are able to access more information. 4. Professionals like Chartered Accountant, Doctors, Lawyers, Research Analysis, etc. can get

the latest in their field by surfing the internet. 5. It is a tool for effective enhancing of communication and coordinating activities in remote

locations. 6. It is efficient means of updating and disseminating current information to customers and

internal staff of organization. 7. It promotes interactive dialogues between organizations and their target customers for direct

marketing of products and services. 8. Business houses can provide details of their services and products on the network which

can be viewed by prospective customers. 9. The present day job-market is thriving on the internet recruiting. Recruiting companies post

advertisement of vacancies on the internet and get applications from the intending candidates through the net.

Page 5: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

5 | P a g e

(b)

Data Definition Language (DDL) Data manipulation Language (DML)

1. Data definition language is the link between the logical and physical structures of the databases.

Data manipulation Language provides techniques for processing the database.

2. DDL is used to define the physical characteristics of each record.

DML is used to perform operations on data such as retrieval sorting and display.

3. DDL provides for physical & logical data independence.

DML provides for independence of programming languages.

4. DDL Describes the schema and sub-schemas.

DML enables the user and application programs to process data on a logical basis rather than on physical location basis.

5. DDL takes care as to how the data is maintained in physical storage.

DML separates the user from physical storage.

Ans. 5

(a) The components of a Decision Support System are: 1. Users: the user of a DSS is the manager who has an unstructured or semi-structured

problem to solve. He does not need a computer background to use the DSS for solving a problem.

2. Databases: Databases contain routine as well as non routine data from both internal and external sources. The data may relate to the operating environment surrounding the organization like economic conditions, industry competition etc.

3. Model Base: The model Base of the DSS performs data manipulations and computations with the data provided to it by the user and the database. It includes mathematical models and analytical techniques to process and manipulate the database.

4. Planning Language: (a) General Purpose Planning Language: They allow the users to perform many routine

tasks like data retrieval analyzing, etc. Example: Excel Spreadsheet. (b) Special Purpose Planning Language: Their task is limited to performance of pre-

defined/ pre-programmed instructions. They can do their jobs better. Example: SAS, SPSS.

(b) Meaning: 1. Wide Area Network (WAN) is a digital communication system, which interconnects different

sites, computer installations and user terminals spread over great distances (nationwide or even world-wide), and may also enable LANs to communicate with each other.

2. It is a commercial data network that provides data communications services for business & government agencies.

3. It covers a large geographical area with various communication facilities such as long distance telephone service, satellite transmission and user-sea cables.

Features: 1. Larger Geographical Area: WAN is spread over a large geographical area. 2. Interconnection: The computers are generally connected to each other through

telecommunication channels (telephone or satellite links). 3. Control: A Public Authority normally holds the control over the data transmission amongst

the users. 4. Transfer Speed: The data is transmitted at relatively slower seeds as that of a LAN. Example: Airline Reservation: When seats are reserved on an airplane flight, the agent enters the reservation on a terminal connected to the airline’s computer. Since the computer is usually located far from the agent (sometimes several thousands of kilometers away), data communication must be used to relay from the terminal to the computer and back.

Page 6: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

6 | P a g e

Ans. 6 (a)

Aspect TCP/ IP Model OSI Model

1. No of Layers Four Seven

2. Relationship Here, application layer includes application Layer, presentation Layer and most of the session Layer of OSI.

Application, Presentation & Session Layer of OSI is different from each other.

3. Evolution In this model, protocols came first and the model was evolved subsequently.

The OSI Conceptual model was devised before the protocols were invented.

(b)

Aspect Serial Transmission Parallel Transmission

1. Path The bits of each byte are sent along a Single path one after the other.

There are separate parallel paths corresponding to each bit of the byte.

2. Data Trans-mission

Character bits are transmitted one bye one.

All character bits are transmitted simultaneously.

3. Distance Serial Transmission is best suited for transmitting data over long distance.

Useful when data are transmitted to short distance. It is not practical to use for long distance communication since crosstalk occurs in parallel transmission.

4. Speed Since communication between computers is almost always serial and therefore slow, this mode is not efficient.

Parallel Transmission is faster than serial transmission since all the bits are sent or transmitted at the same time.

5.Cost Cost of Transferring data is very low. It is most expensive than serial transmission.

(c) The Shortcomings of traditional file-oriented data processing system are-

1. Data Redundancy: since the data files were independent, it is possible that the same data will be stored in different files. This results in duplicated data and the need for a separate file maintenance program to update each file.

2. Data integrity: The same data will be found in different forms in different files. It is not possible to check the validity of data, so data in one file may be correct and in another file wrong. This writing of special computer programs to retrieve data from independent files, which was time consuming and expensive.

3. Data Dependence: The components of a file processing system depend on one another. If changes were made in the format and structure of data in a file, changes had to be made in all programs that use this file.

4. Data Availability: since data is scattered in many files, it would be necessary to look into many files before relying on a particular data. Due to non-uniformity in the file design, the data may have different identification number in different files and obtaining the necessary data will be difficult.

5. Management Control: Uniform policies and standards cannot be set since the data is scattered in different files. It is difficult to relate such files and implement a decision due to non-uniform coding of data files.

Ans. 7 (a) Sequential Access:

1. Sequential Access refers to the method in which records are accessed in a sequence, i.e. in the order in which they are stored.

2. Under this method, all records are kept in sequences, either in ascending order or in descending order, determined by the value of key field of the records.

3. Example: Tape Device.

Page 7: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

7 | P a g e

Direct Access: 1. In Direct Access method (or Random access Method), access of data is independent of the

storage sequence, i.e. individual records can be accessed at random, in no particular order or sequence.

2. Under this method, the time to access any location is the same, and the Disk Drive can access any point at random without passing through intervening points.

3. Example: Magnetic Disk.

(b)

Page 8: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

8 | P a g e

Section – B

Ans. 8 (a)

1. The extent, to which the business thrives, depends on the manner in which it interacts with the elements of the environment, and adapts or manages its influence on them.

2. To be successful, a business has to identify, appraise, and respond to the various opportunities and threats in its environment.

3. To survive, grow and prosper, the business must continuously monitor and adapt to the environment.

(b) 1. Large co-operative networks of businesses are known as Kieretsus. These are formed by

companies in related industries, in order to enhance the abilities of individual member businesses to compete in their respective industries.

2. Kieretsu members are peers and may own significant amounts of each other’s capital, and may have Board members in common.

3. In Kieretsu, members remain independent Companies in their own right. The only strategy they have in common is to prefer to do business with other kieretsu members, both when buying and when selling.

4. Kieretsu are different from conglomerates (common in western countries and also found in India) wherein all members are lineated through ownership pattern.

5. A Kieretsu also differs from a Consortium or an Association, as the primary purpose of a kieretsu is not to share information or agree industry standards, but to share purchasing, distribution or any other function.

(c) Meaning: A Strategic Vision is- 1. A road map of a Company’s future. 2. Providing specifics about technology and customer focus, the geographic and product

markets to be pursued, & 3. The capabilities it plans to develop, and the kind of Company that the Management is trying

to create. Elements: The three elements of a strategic vision are- 1. Coming up with a mission statement that defines what business the company is presently in,

and conveys the essence of “who we are where we are now?” 2. Using the mission Statement as basis for deciding on a long-term course making choices

about “where we are going?” 3. Communicating the strategic vision in clear, exciting terms, that initiates Firm-wide

commitment.

(d) 1. A company can outperform its rivals only by monitoring their actions, understanding their

strategies, and anticipating what moves they are likely to make next. 2. Competitive intelligence about the strategies rival are deploying, their latest moves, their

resource strengths and weakness, and the plans they have announced is essential to anticipate the actions they are likely to take next, and what bearing their moves might have on a company’s own best strategic moves.

3. Competitive intelligence can help a Company determine whether it needs to defend against specific moves taken by rivals or whether those moves provide an opening for a new offensive thrust.

(e) Meaning: stability, Expansion and Retrenchment alternative are not mutually exclusive. Hence a combination thereof can be adopted. An enterprise may seek stability in R&D area of activity, expansion in some product lines and retrenchment in the less profitable products. Retrenchment of ailing products followed by stability and capped by expansion in some situations. Reasons: Some reasons for adopting Combination Strategy are- 1. The organization is large and faces complex environment. 2. The organization is composed of different businesses, each of which lies in a different

industry requiring a different purpose.

Page 9: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

9 | P a g e

Ans. 9 (a)

1. Conclusion: Correct Reason: Strategic Planning is process of determining organizational strategy. It gives direction to the organization and involves making decisions and allocating resources to pursue the strategy. It is the formal consideration of future course of an organization. It determines where an organization if going over the future periods and the ways for going there.

2. Conclusion: Correct Reason: Management of Funds can play a pivotal role in Strategy Implementation, as it aims at the conservation and optimum utilization of Funds-i.e. objectives which are central to any strategic action. Good management of funds creates the difference between a strategically successful and unsuccessful company. Firms that implement strategies of stability, growth or retrenchment should have proper management of funds.

(b) Meaning: Retrenchment or Retreat Strategy is resorted to save the enterprise’s vital interests, to minimize the adverse effects of advancing forces, or even to regroup and recoup the resources before a fresh assault and ascent on the growth ladder is launched. Approach: The firm retrenches some of the activities in a given business (es), or drops the business as such through sell-out or liquidation. The firm reduces the scope of it business (es). Redefinition: Retrenchment Strategy constitutes re-definition of the business of the Firm. Ways of retrenchment: 1. Cutting back on capital and revenue expenditure, e.g. R&D projects, advertising, executives

perks, etc. 2. Reduction in inventory levels, production volumes, manpower, dividend rates, etc. 3. Withdrawal of some products/ product versions, winding up some branch office, etc. 4. Disposal/ Sale of manufacturing facilities and product divisions. 5. Retirement either from the production or the marketing stage. 6. Offering itself for take-over by another more viable enterprise. 7. Seeking liquidation or winding up(corporate death). Types: Retrenchment may be done either- (a) internally (i.e. Turnaround) or (b) Externally (i.e. divestment or Liquidation)

Ans. 10 Micro Environment Elements

Competitors Organizations Itself Suppliers market intermediaries customers

Competitors: 1. Competitors refer to the other business entities that compete for resources as well as markets. 2. Competition may be direct or indirect.

Direct Competition is between firms, which are is in same business activity.

Indirect competition is between firms in different areas of activity, e.g. a holiday resort and car manufacturing company competing for available discretionary income of affluent customers.

3. The major aspects to be considered for analyzing competitions are-

Number of competitors Long-term objectives of competition

Nature of products/ product versions Present strategies adopted

Organizations itself: 1. The objectives, goals, strengths, and resource availabilities of a firm occupy a critical position in

the micro-environment. So, internal analysis or self-analysis is an important aspect of micro environment analysis.

2. The following organizations or groups affect the organization’s environment-

Page 10: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

10 | P a g e

Owners: Individuals, shareholders, Groups, or Organizations, who have a major stake in the organization, have a vested interest in the well-being of the company.

Governing Body: Board of Director or Governing Body is charged with overseeing the general management of the organization, to ensure that it is being run in a way that best serves the shareholders’ interests.

Employees: Employees are a major force who actually execute and perform work in the firm. There should be synchronization between the values and goals of the employees with that of the firm, irrespective of the difference in beliefs, education, attitudes, and capabilities.

Suppliers: 1. Suppliers provide inputs like Raw Material, Components, Equipments, Services, etc. 2. Firms have to take decisions on “ make or buy”, i.e. own production vs. outsourcing, depending

on the Supplier Environment. 3. Aspects of Supplier Environment that have an impact on the business are-

Availability of material & services Quality

Extent of competition/ availability of more suppliers Bargaining Power

Cost structure of materials & services Timeliness of Supply

Market: Market is a wider term than customers. The manager should study the trends and development and the key success factors of the market in which the business is operating. Important issues relating to the market are-

(a) Actual and potential size (e) Technological structure of the market

(b) Growth prospects and attractiveness (f) Existing distribution system of the market

(c) Cost Structure of the market (g) Maturity Level of the market

(d) Price Sensitivity of the market (h) Possibility of Market Segmentation & Differentiation

Intermediaries: 1. Intermediaries in the marketing channel, i.e. Wholesalers, Retailers and Dealers, establish an

important link between the organization and its customers. 2. Aspects of the environment that have an impact on the business are-

Availability of intermediaries

Cost-push effect of intermediaries

Effect of direct dealing with customers on the business operations Consumers/ Customers 1. Consumer is the one who ultimately consumes or uses the product or service produced by an

enterprise. A consumer occupies the central position in the marketing environment. 2. Aspects to be considered in respect of Consumers are-

Potential consumers / customer Groups,

Benefits & utilities that consumers/ customers expect,

Buying patterns of consumers,

Changes in consumer tastes, preferences and expectations.

Ans. 11 (a) The important characteristics of Business Environment are-

1. Pervasive: No Business Enterprise can operate in a vacuum, Every business, irrespective of its size, objectives, nature of business, products/services, years of standing etc. has to interact with its environment.

2. Complexity: Business environment consist of a number of factors, events, conditions, and influences arising from different sources, which interact with each other continuously to create entirely new sets of complex influences.

3. Dynamism: Business environment is ever-changing in nature. Due to the operation of multivarious influences, there is total dynamism in the environment, causing it to continuously change its shape, nature and character.

Page 11: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

11 | P a g e

4. Multi-faceted: the shape and character of an environment depends on the perception of the

observer. A particular change in the environment, or a new development, may be welcomed as an opportunity by one Firm while another Firm perceives it as a threat (e.g. Introduction of VAT).

5. Impact: Environment has a far reaching impact on business. The growth and profitability of a Firm depends critically on the environment in which it exists. Every environment change has an impact on the Firm in several ways.

(b) The strategy making and implementing process consists of five inter-related managerial tasks. These are- 1. Setting vision and mission: Forming a strategic vision of where the organization is headed,

so as provide long-term direction, identify what kind of enterprise the company is trying to become, and infuse the organization with a sense of purposeful action.

2. Setting objectives: converting the strategic vision into specific performance outcomes or goals for the company to achieve.

3. Crafting a strategy to achieve the desired outcomes. 4. Implementing and executing the chosen strategy efficiently and effectively. 5. Evaluating performance & initiating corrective adjustments in vision, long-term direction,

objectives, strategy, of execution in light of actual experience, changing conditions, new ideas, and new opportunities.

Ans. 12 (a) SWOT Analysis enables a Firm in the identification of strategic alternatives by analyzing its

various internal strengths and weakness, external opportunities and threats. The components of SWOT Analysis are- 1. Strength – an inherent capability of the Firm to gain strategic advantage over its

competitors.

2. Weakness- an inherent limitation or constraint of the firm which creates a strategic disadvantage to it.

3. Opportunity – a favorable condition in the Firm’s environment which enables it to strengthen its position.

4. Threat – An unfavorable condition in the firm’s environment which causes a risk for, or damage to, the Firm’s position.

SWOT Analysis

(b) 1. Improved customer satisfaction, and opportunities to retain customers. 2. Reduction in cycle time and defectives. 3. Significant cost savings. 4. Opportunities to capture new markets. 5. Creation of reputation for top performing products or services. 6. Gives a new approach to think, planning and executing. It leads to working smarter, not

harder.

Strength Weakness Opportunity Threat

Potential Resource

Strengths and

competitive Capability

Potential Resource

Weakness and

Competitive Deficiencies

Potential Opportunities

and favorable Situation

in the environment

Potential

unfavorable situation

in the environment

Page 12: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

12 | P a g e

Ans. 13

(a)

Business process Re-engineering Conventional Methods of improving operational efficiency

1. Total re-designing of business processes. Partial modification of processes.

2. Dramatic improvements in performance. Marginal improvements in performance.

3. Re-engineering leads to re-structuring of the organization.

All re-structuring ideas does not necessarily mean re-engineering.

4. Existing process, procedures, way of doing things, etc are questioned and challenged.

Existing process and time-tested procedures are not challenged. They are only modified & improvised.

5. Altogether new processes are identified New processes may not be identified as such

6. Fundamental re-thinking and discontinuous thinking is involved.

Focus is on re-designing certain aspects of processes, without fundamentally modifying the same.

7. BPR is a cross-functional and multi-dimentional approach. It affects all functions, departments and sub-system.

It may be restricted to a certain function (e.g. purchase or production or marketing) or a certain geographical area.

8. Leads to massive organizational change. May not involve substantial change, as seen in BPR.

(b)

1. Planning: An SBU can be taken up for strategic planning distinct from the rest of the businesses. Products/businesses within an SBU receive same strategic planning treatment and properties.

2. Regrouping: The assortment of businesses/portfolios handled by a Company are analyzed, segregated and regrouped into a few, well-defined, distinct, scientifically demarcated business units, assembled together as a distinct SBU.

3. Identify: In the basic factor, viz. mission, objective, competition and strategy –each SBU will be distinct from another. Each SBU is thus, a separate business.

4. Unrelated: If unrelated products/ businesses could be assigned to any other SBU applying the criterion of functional relation, they are assigned accordingly, otherwise they are made into separate SBUs.

5. Competition: Each SBU will have its own distinct set of competitors and its own distinct strategy to deal with rivals.

6. Manager: Each SBU will have a Head/ Incharge, who will be responsible for strategic planning and profit performance.

Ans. 14

(a) The following are the characteristics of a Corporate Strategy – 1. Long-Range: Strategy is generally long-range in nature, though it is valid for short-range

situations also and may have short-range implications.

2. Action Oriented: It is action- oriented and is more specific than objectives.

3. integrated: It is multi-pronged and integrated.

4. Flexible: It is flexible and dynamic as it gives importance to combination, sequence, timing, direction and depth of various moves and action initiatives taken by Managers to handle environmental uncertainties and complexities.

5. Formulated at Top Level: Strategy is formulated at the Top Management Level, though Middle and Operational Level Managers are associated in their formulation and in designing sub-strategies.

Page 13: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

13 | P a g e

6. Purposive: It is generally meant to cope with a competitive and complex setting. 7. Goal-Oriented: It flows out of the goals and objectives of the enterprise and is meant to

translate them into realities.

8. Efficiency: Strategy is concerned with efficiency, i.e. perceiving opportunities and threats and seizing initiatives to cope with them. It is also concerned with deployment of limited organizational resources in the best possible manner.

9. Harmonised: It provides an integrated and unified framework for Managers, for effective decision-making affecting all sub-systems in an organisation.

10. Allowances for uncertainties: Strategy is the art of the 'possible'. It includes allowances for second-best choices, trade-offs, sudden emergencies, pervasive pressures, failures, miscalculation and unanticipated events.

(b)

Point Inbound Logistics Outbound Logistics

Meaning Inbound Logistics are the activities concerned with receiving, storing and distributing the inputs to the product/service.

Outbound Logistics relate to collection, storage and distribution of the product to customers.

Deals with

Raw Materials, Components, Party processed inputs, etc.

Finished Products.

Activities It includes activities like Materials Handling, Stock Control, Transport, etc.

It includes activities such as Storage / Warehousing of Finished Goods, Order Processing, Scheduling Deliveries, Operation of Delivery Vehicles, etc.

Page 14: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

14 | P a g e

MARKS ALLOCATION SHEET

Que. No.

Sub point No.(if any)

Name of Chapter Description of Concept Mark Allocatio

n

Total Marks

1 - - Each definition has 1 marks 10 10

2(a) - Software Meaning 1

2(a) - Software Functions 3 4

2(b) - Data storage, Retrieval & DBMS

Calc. of binary to decimal no. System 2

2(b) - Data storage, Retrieval & DBMS

Calc. of octal to decimal no. System 2 4

3(a) - Data storage, Retrieval & DBMS

Any 4 limitations (each has 1 marks) 4 4

3(b) - Computer network & network security

Meaning 1

3(b) - Computer network & network security

Advantages 1.5

3(b) - Computer network & network security

Disadvantages 1.5 4

4(a) - Internet & other Tech. Any 8 benefits (each has 0.5 marks) 4 4

4(b) - Data storage ,Retrieval & DBMS

Any 4 differences (each has 1 marks) 4 4

5(a) - Software Any 4 components (each has 1 marks)

4 4

5(b) - Computer network & network security

Meaning 1

5(b) - Computer network & network security

Features 2

5(b) - Computer network & network security

Examples 2 4

6(a) - Computer network & network security

Any 2 differences (each has 1 marks) 2 2

6(b) - Computer network & network security

Any 2 differences (each has 1 marks)

2 2

6(c) - Data storage , Retrieval & DBMS

Any 5 points (each has 1.25 marks ) 4 4

7(a) - Data storage , Retrieval & DBMS

Sequential access 1

7(a) - Data storage , Retrieval & DBMS

Direct access 1 2

7(b) - Flowchart Flowchart 6 6

-

8(a) - Business Environment Any 3 points (each has 1 marks) 3 3

8(b) - Business Environment Definition 1

8(b) - Business Environment Analysis 2 3

Page 15: SUGGESTED SOLUTION - J.K. Shah Classes · SUGGESTED SOLUTION (Date: 19 April,2014) Head Office : Shraddha, 3rd Floor, ... necessary to resume critical business operations after a

15 | P a g e

8(c) - Strategic management Process

Meaning 1

8(c) - Strategic management Process

Elements 2 3

8(d) - Strategic Analysis Any 3 points (each has 1 marks) 3 3

8(e) - Storage formulation meaning 1

8(e) - Storage formulation Reasons 2 3

9(a) (1) Strategic Implementation & Control

Correct/ incorrect 1

9(a) (1) Strategic Implementation & Control

Reasons 1

9(a) (2) Strategic Implementation & Control

Correct/ incorrect 1

9(a) (2) Strategic Implementation & Control

Reasons 1 4

9(b) - Storage formulation Meaning 1

9(b) - Storage formulation Approach 1

9(b) - Storage formulation Ways of retrenchment 1 3

10 - Business Environment Each element has 1.167 marks 7 7

11(a) - Business Environment Any 4 characteristics (each has 1 marks)

4 4

11(b) - Strategic mgt. process 5 tasks (each has 0.6 marks 3 3

12 (a) - Strategic Analysis 4 components (each has 1 marks) 4 4

12(b) - Reaching strategic edge Any 6 advantage (each has 0.5 marks)

3 3

13(a) - Reaching strategic edge Any 4 differences (each has 1 marks) 4 4

13(b) - Strategic Implementation & Control

Any 6 features (each has 0.5 Marks) 3 3

14(a) - Strategic management Process

Any 8 characteristics (each has 0.5 marks)

4 4

14(b) - Storage formulation Any 3 differences (each has 1 marks)

3 3