Management information system question and answers

Click here to load reader

download Management information system question and answers

of 32

Transcript of Management information system question and answers

  • 1. MANAGEMENT INFORMATION SYSTEMJUNE-JULY 2011 Presented by:- Acharya Pradeep

2. External forces:- Cut throat competition Insistence on customization Continuous tech-breakthrough Changing capabilities of business partner 3. Internal factors:- Pressure to increase effectiveness Understanding of cognitive behaviour Need of knowledge intensive work Need to move to sharable inteligence 4. B] mis system means computers?Discuss. 5. Information Systems5 Why Do People Need Information? Individuals - Entertainment and enlightenment Businesses - Decision making, problem solving and control MIS 715 Eaton Fall 2001 6. Components of informationsystem/ modelControl of sysperf proci/pessio/pngData processingNetwork resources 7. System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of computers manual systems Group of interrelated or interacting elements forming a unified whole. 8. C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLEAnalyse IdentifyTest And Collection&Problem Alternative ImplementData & SelectDefinitionSolutionsInfrmnBestYESEvaluateSuccessfulStopSolution NO 9. 5. B] advantages and disadvantagesof ERP? 10. ADVANTAGES OF ERP Better management Planning Customer satisfaction Decision making Transparency 11. Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carried out easily 12. Inadequate requirements definition Poor ERP package selection Inadequate resources Miscalculation of time and efforts 13. Misfit of application software with businessprocess Inadequate training and education Poor project design and management 14. 7].B distinguish between systemsoftware and application software? 15. Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction.SOFTWARE 16. Types of software1) System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to Running of other softwareCommunicating with peripheral devices development of other softwareMonitoring the uses of various hardware resources. 17. Operating Software Programming language translator Utility programs Performance monitoring software Communications softwares 18. Application softwaresTypes:Application specific softwareGeneral purpose application software.Eg:1)Office productivity applications2)Hypermedia and multimedia3)Groupware4)Virtual Reality5)3D Geographic software 19. Q No. 5(c)Various network securitiesdefences that must be placed inIT? Roll of firewall? 20. PREVENTIONMETHODS 21. Control against Salami Attack: If proper auditing of accounts is done thensalami attack can be easily caught. If proper rounding operation is done thenSalami attack will not exist. If proper testing is done by the user it can beprevented. 22. Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user permit 23. ELECTRONIC SIGNATURES Electronic signatures are used to authenticateelectronic records. Digital signatures are one type of electronicsignature. Digital signatures satisfy three major legalrequirements Signer authentication, message authenticationand message integrity. The technology and efficiency of digital signaturesmakes them more trustworthy than hand writtensignatures 24. EMAIL MONITORING Employers should be aware Org has to secure information such as tradesecrets, intellectual property, customer ,employee and financial data 25. To keep sensitive data secure To make a complex password use numbers ,letters ,and symbols 26. Safe surfing Means: keeping ones email address private not chatting in an open system visiting secure sites accepting data from only known users downloading carefully & from knownsites 27. Frequent virus checks Floppy disks , CD ROM, pen drives must bescanned before running 28. Checks inflow of mails to inbox Suspicious mails are preventedEmail filters 29. General information to beprotected from virus Do not download from untrustworthy sources Before start trading files ensure your clienthas a safe system Dont download E mail until you are 100% sure If email has an attachment with email go toheaders and look---------- If pif or src extension or .jpg.scr extension it isa virus 30. Set computer in a safe way so it will not autolaunch files, updates, security checks, htmlpages, cookies etc without your permission Get a quality spyware program Set up software firewall and make sure all inLAN are set up it Set up hard ware fire wall ie easy to set up 31. Dont let kid on the net on your system if you dont protect your system nobody else will------------------