Management information system question and answers
pradeepacharya4
40,162 views
32 slides
Aug 10, 2012
Slide 1 of 32
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
About This Presentation
No description available for this slideshow.
Size: 657.8 KB
Language: en
Added: Aug 10, 2012
Slides: 32 pages
Slide Content
JUNE-JULY 2011 Presented by:- Acharya Pradeep MANAGEMENT INFORMATION SYSTEM
External forces:- Cut throat competition Insistence on customization Continuous tech-breakthrough Changing capabilities of business partner 2 .A] Driving forces of knowledge management
Internal factors:- Pressure to increase effectiveness Understanding of cognitive behaviour Need of knowledge intensive work Need to move to sharable inteligence
B] mis system means computers? Discuss.
MIS 715 Eaton Fall 2001 5 Information Systems Why Do People Need Information? Individuals - Entertainment and enlightenment Businesses - Decision making, problem solving and control
Components of information system/ model Control of sys perf i /p processing o/p Data processing people Software resources Data resources Network resources Hardware resources
C] Steps involved in SDLC?
System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of computers – manual systems Group of interrelated or interacting elements forming a unified whole.
C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLE Problem Definition Collection Data & Infrmn Identify Alternative Solutions Analyse & Select Best Test And Implement Evaluate Solution Successful Stop YES NO
5. B] advantages and disadvantages of ERP?
ADVANTAGES OF ERP Better management Planning Customer satisfaction Decision making Transparency
Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carried out easily
DISADVANTAGES OF ERP Inadequate requirements definition Poor ERP package selection Inadequate resources Miscalculation of time and efforts
Misfit of application software with business process Inadequate training and education Poor project design and management
7].B distinguish between system software and application software?
SOFTWARE Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction.
Types of software System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to Running of other software Communicating with peripheral devices development of other software Monitoring the uses of various hardware resources.
Types of system software Operating Software Programming language translator Utility programs Performance monitoring software Communications softwares
Application softwares Types: Application specific software General purpose application software. Eg : 1)Office productivity applications 2)Hypermedia and multimedia 3)Groupware 4)Virtual Reality 5)3D Geographic software
Q No. 5(c) Various network securities defences that must be placed in IT? Roll of firewall?
PREVENTION METHODS
Control against Salami Attack: If proper auditing of accounts is done then salami attack can be easily caught. If proper rounding operation is done then Salami attack will not exist. If proper testing is done by the user it can be prevented.
Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user permit
ELECTRONIC SIGNATURES Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – Signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures
EMAIL MONITORING Employers should be aware Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data
Frequent password changing To keep sensitive data secure To make a complex password use numbers , letters ,and symbols
Safe surfing Means: keeping ones email address private not chatting in an open system visiting secure sites accepting data from only known users downloading carefully & from known sites
Frequent virus checks Floppy disks , CD ROM, pen drives must be scanned before running
Email filters Checks inflow of mails to inbox Suspicious mails are prevented
General information to be protected from virus Do not download from untrustworthy sources Before start trading files ensure your client has a safe system Don’t download E mail until you are 100% sure If email has an attachment with email go to headers and look---------- If pif or src extension or . jpg.scr extension it is a virus
Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission Get a quality spyware program Set up software firewall and make sure all in LAN are set up it Set up hard ware fire wall ie easy to set up
Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------