SlideShare una empresa de Scribd logo
1 de 32
MANAGEMENT INFORMATION
       SYSTEM
          JUNE-JULY 2011
   Presented by:- Acharya Pradeep
   External forces:-
   Cut throat competition
   Insistence on customization
   Continuous tech-breakthrough
   Changing capabilities of business partner

 Internal factors:-
 Pressure to increase effectiveness
 Understanding of cognitive behaviour
 Need of knowledge intensive work
 Need to move to sharable inteligence

B] mis system means computers?
Discuss.
Information Systems
5




        Why Do People Need Information?

            Individuals - Entertainment and enlightenment


            Businesses - Decision making, problem solving and
             control




                             MIS 715 Eaton Fall 2001
Components of information
system/ model



              Control of sys
                  perf

                   proc
        i/p        essi        o/p
                    ng

                    Data
                 processing

              Network resources
System ??????
 Generally used for group of actions, personnel &
 procedures, used for processing data

 Non involvement of computers – manual systems


 Group of interrelated or interacting elements forming
 a unified whole.
C] Steps in system analysis and design
 (SDLC)
 SYSTEM DEVELOPMENT LIFE CYCLE

                                              Analyse
                             Identify                          Test And
             Collection                          &
Problem                     Alternative                       Implement
              Data &                           Select
Definition                  Solutions
              Infrmn                            Best


                                                        YES
                          Evaluate        Successful            Stop
                          Solution

                                                   NO
5. B] advantages and disadvantages
of ERP?
ADVANTAGES OF ERP
•   Better management

•   Planning

•   Customer satisfaction

•   Decision making

•   Transparency
 Information

 Utilization of human resource

 Alert decision or action

 Fast process

 Faster communication

 Changes carried out easily
   Inadequate requirements definition

   Poor ERP package selection

   Inadequate resources

   Miscalculation of time and efforts
   Misfit of application software with business
    process
   Inadequate training and education
   Poor project design and management
7].B distinguish between system
software and application software?
Software refers to a program that makes
 the computer to do something
 meaningful. It is the planned step-by-step
 instruction required to turn data into
 instruction.




SOFTWARE
Types of software
1)   System software
     Includes programs that are designed carry out
     general routine operation such as loading a file,
     copying a file, managing memory resources Etc.

 It provides support to
     Running of other software
    Communicating with peripheral devices
     development of other software
    Monitoring the uses of various hardware
     resources.
 Operating Software
 Programming language translator
 Utility programs
 Performance monitoring software
 Communications softwares
Application softwares

Types:
Application specific software

General purpose application software.
Eg:
  1)Office productivity applications
  2)Hypermedia and multimedia
  3)Groupware
  4)Virtual Reality
  5)3D Geographic software
Q No. 5(c)
Various network securities
defences that must be placed in
IT? Roll of firewall?
PREVENTION
METHODS
Control against Salami Attack:

   If proper auditing of accounts is done then
    salami attack can be easily caught.
   If proper rounding operation is done then
    Salami attack will not exist.
   If proper testing is done by the user it can be
    prevented.
          Firewalls
 Protect from unauthorized access
 Provide access to only known users
 Allow the people whom the user permit
ELECTRONIC SIGNATURES
   Electronic signatures are used to authenticate
    electronic records.
   Digital signatures are one type of electronic
    signature.
   Digital signatures satisfy three major legal
    requirements –
    Signer authentication, message authentication
    and message integrity.
   The technology and efficiency of digital signatures
    makes them more trustworthy than hand written
    signatures
EMAIL MONITORING

   Employers should be aware
   Org has to secure information such as trade
    secrets, intellectual property, customer ,
    employee and financial data
   To keep sensitive data secure
   To make a complex password use numbers ,
    letters ,and symbols
Safe surfing
 Means:
   keeping ones email address private
   not chatting in an open system
   visiting secure sites
   accepting data from only known users
   downloading carefully & from known
  sites
 Frequent virus checks
   Floppy disks , CD ROM, pen drives must be
    scanned before running
 Checks inflow of mails to inbox
 Suspicious mails are prevented




Email filters
General information to be
protected from virus
   Do not download from untrustworthy sources
   Before start trading files ensure your client
    has a safe system
   Don’t download E mail until you are 100% sure
   If email has an attachment with email go to
    headers and look----------
   If pif or src extension or .jpg.scr extension it is
    a virus
    Set computer in a safe way so it will not auto
    launch files, updates, security checks, html
    pages, cookies etc without your permission
   Get a quality spyware program
   Set up software firewall and make sure all in
    LAN are set up it
   Set up hard ware fire wall ie easy to set up
Don’t let kid on the net
 on your system if you
 don’t protect your
 system nobody else
 will------------------

Más contenido relacionado

La actualidad más candente

Data Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesData Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Manoj Kumar
 
Business intelligence ppt
Business intelligence pptBusiness intelligence ppt
Business intelligence pptsujithkylm007
 
IT impact on organization
IT impact on organizationIT impact on organization
IT impact on organizationHarnoor Singh
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
Types Of Information System
Types Of Information SystemTypes Of Information System
Types Of Information Systemguestead93f3
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and misAlsufaacademy
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explainationAlana Abraham
 

La actualidad más candente (20)

Data Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesData Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation Slides
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
The role of information system
The role of information system The role of information system
The role of information system
 
Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Management Information System (MIS) unit-1
Management Information System (MIS) unit-1
 
Basic concepts in mis
Basic concepts in mis Basic concepts in mis
Basic concepts in mis
 
Business intelligence ppt
Business intelligence pptBusiness intelligence ppt
Business intelligence ppt
 
Foundation Of Information Systems In Business
Foundation Of Information Systems In BusinessFoundation Of Information Systems In Business
Foundation Of Information Systems In Business
 
IT impact on organization
IT impact on organizationIT impact on organization
IT impact on organization
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
Mis lecture ppt
Mis lecture pptMis lecture ppt
Mis lecture ppt
 
Types Of Information System
Types Of Information SystemTypes Of Information System
Types Of Information System
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Management Information Systems MGMT205
Management Information Systems MGMT205Management Information Systems MGMT205
Management Information Systems MGMT205
 
Business information system with explaination
Business information system with explainationBusiness information system with explaination
Business information system with explaination
 

Similar a Management information system question and answers

INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxSharumathiR1
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWebJosep Arroyo
 

Similar a Management information system question and answers (20)

MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 

Más de pradeep acharya

Más de pradeep acharya (13)

Smsindia4blood
Smsindia4bloodSmsindia4blood
Smsindia4blood
 
Business Quiz Round 3
Business Quiz Round 3Business Quiz Round 3
Business Quiz Round 3
 
Business Quiz Round 2
Business Quiz Round 2Business Quiz Round 2
Business Quiz Round 2
 
BUSINESS QUIZ -Round 1
 BUSINESS QUIZ -Round 1 BUSINESS QUIZ -Round 1
BUSINESS QUIZ -Round 1
 
Stock market scam
Stock market scamStock market scam
Stock market scam
 
Ing vysya
Ing vysyaIng vysya
Ing vysya
 
Horizontal merging
Horizontal mergingHorizontal merging
Horizontal merging
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Abdul kalam
Abdul kalamAbdul kalam
Abdul kalam
 
Uniq power batteries
Uniq power batteriesUniq power batteries
Uniq power batteries
 
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTDSRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
SRI RAMAKRISHNA CREDIT CO-OPERATIVE SOCIETY LTD
 
B.communication ppt
B.communication pptB.communication ppt
B.communication ppt
 

Último

NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 

Último (20)

NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 

Management information system question and answers

  • 1. MANAGEMENT INFORMATION SYSTEM JUNE-JULY 2011 Presented by:- Acharya Pradeep
  • 2. External forces:-  Cut throat competition  Insistence on customization  Continuous tech-breakthrough  Changing capabilities of business partner 
  • 3.  Internal factors:-  Pressure to increase effectiveness  Understanding of cognitive behaviour  Need of knowledge intensive work  Need to move to sharable inteligence 
  • 4. B] mis system means computers? Discuss.
  • 5. Information Systems 5  Why Do People Need Information?  Individuals - Entertainment and enlightenment  Businesses - Decision making, problem solving and control MIS 715 Eaton Fall 2001
  • 6. Components of information system/ model Control of sys perf proc i/p essi o/p ng Data processing Network resources
  • 7.
  • 8. System ??????  Generally used for group of actions, personnel & procedures, used for processing data  Non involvement of computers – manual systems  Group of interrelated or interacting elements forming a unified whole.
  • 9. C] Steps in system analysis and design (SDLC)  SYSTEM DEVELOPMENT LIFE CYCLE Analyse Identify Test And Collection & Problem Alternative Implement Data & Select Definition Solutions Infrmn Best YES Evaluate Successful Stop Solution NO
  • 10. 5. B] advantages and disadvantages of ERP?
  • 11. ADVANTAGES OF ERP • Better management • Planning • Customer satisfaction • Decision making • Transparency
  • 12.  Information  Utilization of human resource  Alert decision or action  Fast process  Faster communication  Changes carried out easily
  • 13. Inadequate requirements definition  Poor ERP package selection  Inadequate resources  Miscalculation of time and efforts
  • 14. Misfit of application software with business process  Inadequate training and education  Poor project design and management
  • 15. 7].B distinguish between system software and application software?
  • 16. Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction. SOFTWARE
  • 17. Types of software 1) System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to  Running of other software  Communicating with peripheral devices  development of other software  Monitoring the uses of various hardware resources.
  • 18.  Operating Software  Programming language translator  Utility programs  Performance monitoring software  Communications softwares
  • 19. Application softwares Types: Application specific software General purpose application software. Eg: 1)Office productivity applications 2)Hypermedia and multimedia 3)Groupware 4)Virtual Reality 5)3D Geographic software
  • 20. Q No. 5(c) Various network securities defences that must be placed in IT? Roll of firewall?
  • 22. Control against Salami Attack:  If proper auditing of accounts is done then salami attack can be easily caught.  If proper rounding operation is done then Salami attack will not exist.  If proper testing is done by the user it can be prevented.
  • 23. Firewalls  Protect from unauthorized access  Provide access to only known users  Allow the people whom the user permit
  • 24. ELECTRONIC SIGNATURES  Electronic signatures are used to authenticate electronic records.  Digital signatures are one type of electronic signature.  Digital signatures satisfy three major legal requirements –  Signer authentication, message authentication and message integrity.  The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures
  • 25. EMAIL MONITORING  Employers should be aware  Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data
  • 26. To keep sensitive data secure  To make a complex password use numbers , letters ,and symbols
  • 27. Safe surfing Means:  keeping ones email address private  not chatting in an open system  visiting secure sites  accepting data from only known users  downloading carefully & from known sites
  • 28.  Frequent virus checks  Floppy disks , CD ROM, pen drives must be scanned before running
  • 29.  Checks inflow of mails to inbox  Suspicious mails are prevented Email filters
  • 30. General information to be protected from virus  Do not download from untrustworthy sources  Before start trading files ensure your client has a safe system  Don’t download E mail until you are 100% sure  If email has an attachment with email go to headers and look----------  If pif or src extension or .jpg.scr extension it is a virus
  • 31. Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission  Get a quality spyware program  Set up software firewall and make sure all in LAN are set up it  Set up hard ware fire wall ie easy to set up
  • 32. Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------