Management information system question and answers

pradeepacharya4 40,162 views 32 slides Aug 10, 2012
Slide 1
Slide 1 of 32
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32

About This Presentation

No description available for this slideshow.


Slide Content

JUNE-JULY 2011 Presented by:- Acharya Pradeep MANAGEMENT INFORMATION SYSTEM

External forces:- Cut throat competition Insistence on customization Continuous tech-breakthrough Changing capabilities of business partner 2 .A] Driving forces of knowledge management

Internal factors:- Pressure to increase effectiveness Understanding of cognitive behaviour Need of knowledge intensive work Need to move to sharable inteligence

B] mis system means computers? Discuss.

MIS 715 Eaton Fall 2001 5 Information Systems Why Do People Need Information? Individuals - Entertainment and enlightenment Businesses - Decision making, problem solving and control

Components of information system/ model Control of sys perf i /p processing o/p Data processing people Software resources Data resources Network resources Hardware resources

C] Steps involved in SDLC?

System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of computers – manual systems Group of interrelated or interacting elements forming a unified whole.

C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLE Problem Definition Collection Data & Infrmn Identify Alternative Solutions Analyse & Select Best Test And Implement Evaluate Solution Successful Stop YES NO

5. B] advantages and disadvantages of ERP?

ADVANTAGES OF ERP Better management Planning Customer satisfaction Decision making Transparency

Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carried out easily

DISADVANTAGES OF ERP Inadequate requirements definition Poor ERP package selection Inadequate resources Miscalculation of time and efforts

Misfit of application software with business process Inadequate training and education Poor project design and management

7].B distinguish between system software and application software?

SOFTWARE Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction.

Types of software System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to Running of other software Communicating with peripheral devices development of other software Monitoring the uses of various hardware resources.

Types of system software Operating Software Programming language translator Utility programs Performance monitoring software Communications softwares

Application softwares Types: Application specific software General purpose application software. Eg : 1)Office productivity applications 2)Hypermedia and multimedia 3)Groupware 4)Virtual Reality 5)3D Geographic software

Q No. 5(c) Various network securities defences that must be placed in IT? Roll of firewall?

PREVENTION METHODS

Control against Salami Attack: If proper auditing of accounts is done then salami attack can be easily caught. If proper rounding operation is done then Salami attack will not exist. If proper testing is done by the user it can be prevented.

Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user permit

ELECTRONIC SIGNATURES Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – Signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures

EMAIL MONITORING Employers should be aware Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data

Frequent password changing To keep sensitive data secure To make a complex password use numbers , letters ,and symbols

Safe surfing Means: keeping ones email address private not chatting in an open system visiting secure sites accepting data from only known users downloading carefully & from known sites

Frequent virus checks Floppy disks , CD ROM, pen drives must be scanned before running

Email filters Checks inflow of mails to inbox Suspicious mails are prevented

General information to be protected from virus Do not download from untrustworthy sources Before start trading files ensure your client has a safe system Don’t download E mail until you are 100% sure If email has an attachment with email go to headers and look---------- If pif or src extension or . jpg.scr extension it is a virus

Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission Get a quality spyware program Set up software firewall and make sure all in LAN are set up it Set up hard ware fire wall ie easy to set up

Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------
Tags