SlideShare ist ein Scribd-Unternehmen logo
1 von 32
MANAGEMENT INFORMATION
       SYSTEM
          JUNE-JULY 2011
   Presented by:- Acharya Pradeep
   External forces:-
   Cut throat competition
   Insistence on customization
   Continuous tech-breakthrough
   Changing capabilities of business partner

 Internal factors:-
 Pressure to increase effectiveness
 Understanding of cognitive behaviour
 Need of knowledge intensive work
 Need to move to sharable inteligence

B] mis system means computers?
Discuss.
Information Systems
5




        Why Do People Need Information?

            Individuals - Entertainment and enlightenment


            Businesses - Decision making, problem solving and
             control




                             MIS 715 Eaton Fall 2001
Components of information
system/ model



              Control of sys
                  perf

                   proc
        i/p        essi        o/p
                    ng

                    Data
                 processing

              Network resources
System ??????
 Generally used for group of actions, personnel &
 procedures, used for processing data

 Non involvement of computers – manual systems


 Group of interrelated or interacting elements forming
 a unified whole.
C] Steps in system analysis and design
 (SDLC)
 SYSTEM DEVELOPMENT LIFE CYCLE

                                              Analyse
                             Identify                          Test And
             Collection                          &
Problem                     Alternative                       Implement
              Data &                           Select
Definition                  Solutions
              Infrmn                            Best


                                                        YES
                          Evaluate        Successful            Stop
                          Solution

                                                   NO
5. B] advantages and disadvantages
of ERP?
ADVANTAGES OF ERP
•   Better management

•   Planning

•   Customer satisfaction

•   Decision making

•   Transparency
 Information

 Utilization of human resource

 Alert decision or action

 Fast process

 Faster communication

 Changes carried out easily
   Inadequate requirements definition

   Poor ERP package selection

   Inadequate resources

   Miscalculation of time and efforts
   Misfit of application software with business
    process
   Inadequate training and education
   Poor project design and management
7].B distinguish between system
software and application software?
Software refers to a program that makes
 the computer to do something
 meaningful. It is the planned step-by-step
 instruction required to turn data into
 instruction.




SOFTWARE
Types of software
1)   System software
     Includes programs that are designed carry out
     general routine operation such as loading a file,
     copying a file, managing memory resources Etc.

 It provides support to
     Running of other software
    Communicating with peripheral devices
     development of other software
    Monitoring the uses of various hardware
     resources.
 Operating Software
 Programming language translator
 Utility programs
 Performance monitoring software
 Communications softwares
Application softwares

Types:
Application specific software

General purpose application software.
Eg:
  1)Office productivity applications
  2)Hypermedia and multimedia
  3)Groupware
  4)Virtual Reality
  5)3D Geographic software
Q No. 5(c)
Various network securities
defences that must be placed in
IT? Roll of firewall?
PREVENTION
METHODS
Control against Salami Attack:

   If proper auditing of accounts is done then
    salami attack can be easily caught.
   If proper rounding operation is done then
    Salami attack will not exist.
   If proper testing is done by the user it can be
    prevented.
          Firewalls
 Protect from unauthorized access
 Provide access to only known users
 Allow the people whom the user permit
ELECTRONIC SIGNATURES
   Electronic signatures are used to authenticate
    electronic records.
   Digital signatures are one type of electronic
    signature.
   Digital signatures satisfy three major legal
    requirements –
    Signer authentication, message authentication
    and message integrity.
   The technology and efficiency of digital signatures
    makes them more trustworthy than hand written
    signatures
EMAIL MONITORING

   Employers should be aware
   Org has to secure information such as trade
    secrets, intellectual property, customer ,
    employee and financial data
   To keep sensitive data secure
   To make a complex password use numbers ,
    letters ,and symbols
Safe surfing
 Means:
   keeping ones email address private
   not chatting in an open system
   visiting secure sites
   accepting data from only known users
   downloading carefully & from known
  sites
 Frequent virus checks
   Floppy disks , CD ROM, pen drives must be
    scanned before running
 Checks inflow of mails to inbox
 Suspicious mails are prevented




Email filters
General information to be
protected from virus
   Do not download from untrustworthy sources
   Before start trading files ensure your client
    has a safe system
   Don’t download E mail until you are 100% sure
   If email has an attachment with email go to
    headers and look----------
   If pif or src extension or .jpg.scr extension it is
    a virus
    Set computer in a safe way so it will not auto
    launch files, updates, security checks, html
    pages, cookies etc without your permission
   Get a quality spyware program
   Set up software firewall and make sure all in
    LAN are set up it
   Set up hard ware fire wall ie easy to set up
Don’t let kid on the net
 on your system if you
 don’t protect your
 system nobody else
 will------------------

Weitere ähnliche Inhalte

Was ist angesagt?

E readiness assessment framework
E readiness assessment frameworkE readiness assessment framework
E readiness assessment frameworkPrasanna Rasal
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)Nirajan Silwal
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayVan Chau
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03Faisal14H
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01Norazila Mat
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision MakingArun Mishra
 

Was ist angesagt? (20)

Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
E readiness assessment framework
E readiness assessment frameworkE readiness assessment framework
E readiness assessment framework
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business today
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
Role of IT in Business
Role of IT in BusinessRole of IT in Business
Role of IT in Business
 
Information system
Information systemInformation system
Information system
 
E- business how businesses use information systems
E- business how businesses use information systemsE- business how businesses use information systems
E- business how businesses use information systems
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision Making
 

Ähnlich wie Management information system question and answers

INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxSharumathiR1
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWebJosep Arroyo
 

Ähnlich wie Management information system question and answers (20)

MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 

Mehr von pradeep acharya

Mehr von pradeep acharya (13)

Smsindia4blood
Smsindia4bloodSmsindia4blood
Smsindia4blood
 
Business Quiz Round 3
Business Quiz Round 3Business Quiz Round 3
Business Quiz Round 3
 
Business Quiz Round 2
Business Quiz Round 2Business Quiz Round 2
Business Quiz Round 2
 
BUSINESS QUIZ -Round 1
 BUSINESS QUIZ -Round 1 BUSINESS QUIZ -Round 1
BUSINESS QUIZ -Round 1
 
Stock market scam
Stock market scamStock market scam
Stock market scam
 
Ing vysya
Ing vysyaIng vysya
Ing vysya
 
Horizontal merging
Horizontal mergingHorizontal merging
Horizontal merging
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Abdul kalam
Abdul kalamAbdul kalam
Abdul kalam
 
Uniq power batteries
Uniq power batteriesUniq power batteries
Uniq power batteries
 
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTDSRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
 
B.communication ppt
B.communication pptB.communication ppt
B.communication ppt
 

Kürzlich hochgeladen

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 

Kürzlich hochgeladen (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

Management information system question and answers

  • 1. MANAGEMENT INFORMATION SYSTEM JUNE-JULY 2011 Presented by:- Acharya Pradeep
  • 2. External forces:-  Cut throat competition  Insistence on customization  Continuous tech-breakthrough  Changing capabilities of business partner 
  • 3.  Internal factors:-  Pressure to increase effectiveness  Understanding of cognitive behaviour  Need of knowledge intensive work  Need to move to sharable inteligence 
  • 4. B] mis system means computers? Discuss.
  • 5. Information Systems 5  Why Do People Need Information?  Individuals - Entertainment and enlightenment  Businesses - Decision making, problem solving and control MIS 715 Eaton Fall 2001
  • 6. Components of information system/ model Control of sys perf proc i/p essi o/p ng Data processing Network resources
  • 7.
  • 8. System ??????  Generally used for group of actions, personnel & procedures, used for processing data  Non involvement of computers – manual systems  Group of interrelated or interacting elements forming a unified whole.
  • 9. C] Steps in system analysis and design (SDLC)  SYSTEM DEVELOPMENT LIFE CYCLE Analyse Identify Test And Collection & Problem Alternative Implement Data & Select Definition Solutions Infrmn Best YES Evaluate Successful Stop Solution NO
  • 10. 5. B] advantages and disadvantages of ERP?
  • 11. ADVANTAGES OF ERP • Better management • Planning • Customer satisfaction • Decision making • Transparency
  • 12.  Information  Utilization of human resource  Alert decision or action  Fast process  Faster communication  Changes carried out easily
  • 13. Inadequate requirements definition  Poor ERP package selection  Inadequate resources  Miscalculation of time and efforts
  • 14. Misfit of application software with business process  Inadequate training and education  Poor project design and management
  • 15. 7].B distinguish between system software and application software?
  • 16. Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction. SOFTWARE
  • 17. Types of software 1) System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to  Running of other software  Communicating with peripheral devices  development of other software  Monitoring the uses of various hardware resources.
  • 18.  Operating Software  Programming language translator  Utility programs  Performance monitoring software  Communications softwares
  • 19. Application softwares Types: Application specific software General purpose application software. Eg: 1)Office productivity applications 2)Hypermedia and multimedia 3)Groupware 4)Virtual Reality 5)3D Geographic software
  • 20. Q No. 5(c) Various network securities defences that must be placed in IT? Roll of firewall?
  • 22. Control against Salami Attack:  If proper auditing of accounts is done then salami attack can be easily caught.  If proper rounding operation is done then Salami attack will not exist.  If proper testing is done by the user it can be prevented.
  • 23. Firewalls  Protect from unauthorized access  Provide access to only known users  Allow the people whom the user permit
  • 24. ELECTRONIC SIGNATURES  Electronic signatures are used to authenticate electronic records.  Digital signatures are one type of electronic signature.  Digital signatures satisfy three major legal requirements –  Signer authentication, message authentication and message integrity.  The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures
  • 25. EMAIL MONITORING  Employers should be aware  Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data
  • 26. To keep sensitive data secure  To make a complex password use numbers , letters ,and symbols
  • 27. Safe surfing Means:  keeping ones email address private  not chatting in an open system  visiting secure sites  accepting data from only known users  downloading carefully & from known sites
  • 28.  Frequent virus checks  Floppy disks , CD ROM, pen drives must be scanned before running
  • 29.  Checks inflow of mails to inbox  Suspicious mails are prevented Email filters
  • 30. General information to be protected from virus  Do not download from untrustworthy sources  Before start trading files ensure your client has a safe system  Don’t download E mail until you are 100% sure  If email has an attachment with email go to headers and look----------  If pif or src extension or .jpg.scr extension it is a virus
  • 31. Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission  Get a quality spyware program  Set up software firewall and make sure all in LAN are set up it  Set up hard ware fire wall ie easy to set up
  • 32. Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------