Sei sulla pagina 1di 24

Management Information System 2 Marks UNIT 1 MIS Introduction 1.

Data: Raw facts such as an employees name and number of hours worked in a week, inventory part numbers or sales orders. Information: A collection of facts organized in such a way that they have additional value beyond the value of the facts themselves. Data
$35,000 12 Units $12,000 J. Jones Western Region $100,000 100 Units 35 Units

Information
Salesperson: J. Jones Sales Territory: Western Region. Current Sales: $147,000 Units = 147

Data Processing

2. Management information systems: Def 1: Information system at the management level of an organization that serves the functions of planning, controlling, and decision making by providing routine summary and exception reports. Def 2: MIS provide information in the form of pre-specified reports and displays to support business decision making. Examples: sales analysis, production performance and cost trend reporting systems. Objectives: Routine information for routine decisions Operational efficiency Use transaction data as main input Databases integrate MIS in different functional areas. 3. Describe three levels of information in managerial level Management Support Systems provide information and support needed for effective decision making by managers Major categories are:
K. Padmavathi MIS 1

i) ii) iii)

Management Information System Decision Support Systems Executive Information System

4. What are the various trends in the evolution of the MIS concept? MIS: Many companies are now using their computers to provide information for decision making; that is, they are using a management information system. MIS can provide managers with information in a usable from. A MIS is a formal Information network using computers to provide management information for decision making .The goal of MIS is to provide the correct information to the appropriate manager at the right, in a useful from. Successful MIS must provide information that can be applied: MIS should know who the users are MIS should provide the information the user needs MIS should provide the information in the format the user can understand. 5. What is Information System? An information system (IS) is typically considered to be a set of interrelated elements or components that collect (input), manipulate (processes), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. 6. What is the role of information system in todays competitive business environment? Data Processing: 1950s-1960s Management Reporting: 1960s-1970s Decision support: 1970s-1980s Strategic and End User Support: 1980s-1990s Global Internetworking: 1990s-2000s 7. State the principle which dictates how is system built from sub-system? System: A set of components that work together to achieve a common goal Subsystem: One part of a system where the products of more than one system are combined to reach an ultimate goal

K. Padmavathi

MIS

Closed system: Stand-alone system that has no contact with other systems Open system: System that interfaces with other systems 8. Compare Traditional Information Systems Vs Modern Information Systems Until the 1960s, the role of most information systems was simple. They were mainly used for electronic data processing, purposes such as transactions processing, record-keeping and accounting, use of computers in recording, classifying, manipulating, and summarizing data. It is also called transaction processing systems (TPS). Transaction processing systems these process data resulting from business transactions, update operational databases, and produce business documents. Examples: sales and inventory processing and accounting systems. In the 1960s, another role was added to the use of computers. The concept of management information systems (MIS) was born. This new role focused on developing business applications. Management information systems provide information in the form of pre-specified reports and displays to support business decision making. Examples: sales analysis, production performance and cost trend reporting systems. 9. What are the principle sources of Information? Data (raw material) Alpha-numeric Symbolic Image Stored facts Inactive (they exist) Technology based Gathered from various places 10. What is the purpose of creating Management Information System? Routine information for routine decisions Operational efficiency Use transaction data as main input Databases integrate MIS in different functional areas

K. Padmavathi

MIS

11. What is Intelligence? The ability to acquire and apply knowledge and skills. A very general mental capability that, among other things, involves the ability to reason, plan, solve problems, think abstractly, comprehend complex ideas, learn quickly and learn from experience. 12. What is Artificial Intelligence? Artificial intelligence (AI): Is both the intelligence of machines and the branch of computer science which aims to create it. Achievements in artificial intelligence include: constrained and welldefined problems such as games, crossword-solving and optical character recognition. 13. Who is System Analyst? A systems analyst researches problems, plans solutions, recommends software and systems, at least at the functional level, and coordinates development to meet business or other requirements. The systems analysts are the liaisons between vendors and information technology professionals. They may be responsible for developing cost analysis, design considerations, staff impact amelioration, and implementation time-lines. 14. System analyst in an organization
MANAGEMENT

USER

SYSTEM ANALYST

PROGRAMMER

15. Role of System Analyst The analyst must be able to work with people of all descriptions and be experienced in working with computers. Three primary roles: Consultant. Supporting expert. Agent of change. In detail.
K. Padmavathi MIS 4

Investigate, analyze, design, develop, installs, evaluate, and maintains a companys information systems. A business problem solver The solution to the problem is generally a new information system Help translate business requirements into IT projects. 16. Functions of System Analyst Identifying Problems, Opportunities, and Objectives. Determining Human Information Requirements. Analyzing System Needs. Designing the Recommended System. Developing and Documenting Software. Testing and Maintaining the System. Implementing and Evaluating the System. 17. What is the role of information system in an organization? Focuses on competitive priorities Support business processes and operations Provide access to information Enhance communication Provide decision assistance Supports strategies for competitive advantage. 18. 3 As of intelligence Ability Present competence to perform a task. Skill you have, e.g., reading or mechanical ability Achievement Present competence that reflects specific learning experience or instruction. Given instruction what do you now know? E.g., exam in Psy3135 Aptitude Potential to acquire particular skills, with reference toward future performance. How well might you performance given appropriate instruction & motivation? E.g., SAT and college performance.

K. Padmavathi

MIS

UNIT 2 Systems Analysis and Design 19. Differentiate between DBMS and OODBMS DBMS- Database Management System Interfaces between application programs and physical data files Separates logical and physical views of data A system whose overall purpose is to record and maintain information A database is a repository for stored data and programs to manipulate it. Solves problems of traditional file environment Controls redundancy Eliminated inconsistency Uncouples programs and data Enables central management and security. Some popular DBMS solutions include DB2, Oracle, FileMaker and Microsoft Access. OODBMS- Object Oriented DBMS Stores data and procedures as objects Capable of managing graphics, multimedia, Java applets Relatively slow compared with relational DBMS for processing large numbers of transactions Hybrid object-relational DBMS: Provide capabilities of both OODBMS and relational DBMS. 20. Advantages of DBMS Centralized control. No Data Redundancy Data Consistency Data can be shared Standards can be enforced Security can be enforced Integrity can be maintained Data independence.

K. Padmavathi

MIS

21. What is RDBMS? The database system in which the relationships among different tables are maintained is called Relational Database Management System. It represents data as two-dimensional tables called relations or files. Each table contains data on entity and attributes. RDBMS solution is required when large amounts of data are to be stored as well as maintained. A relational data model consists of indexes, keys, foreign keys, tables and their relationships with other tables. Relational DBMS enforces the rules even though foreign keys are support by both RDBMS and DBMS. Table: Grid of columns and rows Rows (tuples): Records for different entities Fields (columns): Represents attribute for entity Key field: Field used to uniquely identify each record Primary key: Field in table used for key fields Foreign key: Primary key used in second table as look-up field to identify records from original table. 22. Advantages of RDBMS Improved conceptual simplicity Easier database design, implementation, management, and use Powerful database management system 23. What is SDLC-System Development Life Cycle? The Systems development life cycle (SDLC), or Software development process : It is a process of creating or altering information systems. It involves models and methodologies that people use to develop these systems. In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system: the software development process. "The Systems Development Life Cycle" is the waterfall model: a sequence of stages in which the output of each stage becomes the input for the next.

K. Padmavathi

MIS

Initiation System Development Concept Planning Requirement analysis Design Development Integration &Test Implementation Operations &maintenance Disposition.

24. What is System Design? Designing forms and reports Designing interfaces and dialogues Designing databases and files Designing processing and logic 25. What are the advantages of SDLC? Focus on tradeoffs Focus on goals Controls: milestones, checklist, accountability Tools, models, CASE Hierarchical decomposition Designed for user & manager involvement 26. What is Data Flow Diagram DFD? A DFD is a graphic representation of the flow of data or information through a system. Main Elements: External entity - people or organisations that send data into the system or receive data from the system.

External Entity
Process - models what happens to the data i.e. transforms incoming data into outgoing data

Process Box
K. Padmavathi MIS 8

Data store - represents permanent data that is used by the system. Data Store D Data flow - models the actual flow of the data between the other elements.
Data Flow

27. What is Entity Relationship Model? The E-R model is a detailed, logical representation of the data for an organisation or business area. It should be understandable to both the user and to the IT technologist.The model must be as open as possible and not tied to any technology or to any particular business methodology. It must be flexible enough so that it can be used and understood in practically any environment where information is modelled. Entity: An entity is a business object that represents a group, or category of data. Attribute: An attribute is a sub-group of information within an entity. 28. SDLC Phases

K. Padmavathi

MIS

29. Strength and Weakness of SDLC

Strength Control. Monitor large projects Detailed steps Evaluate costs and completion targets Documentation Well defined user input Ease of maintenance Development and design standards Tolerates changes in MIS staffing

Weakness Increased development time Increased development cost Systems must be defined up front Rigidity Hard to estimate costs, project overruns User input is sometimes limited

30. What is the difference between DBMS and RDBMS? Relationship among tables is maintained in a RDBMS whereas this not the case DBMS as it is used to manage the database. DBMS accepts the flat file data that means there is no relation among different data whereas RDBMS does not accepts this type of design. DBMS is used for simpler business applications whereas RDBMS is used for more complex applications. Although the foreign key concept is supported by both DBMS and RDBMS but its only RDBMS that enforces the rules. RDBMS solution is required by large sets of data whereas small sets of data can be managed by DBMS.

K. Padmavathi

MIS

10

UNIT 3 Information System 31. What is meant by Decision Support System DSS? DSS are interactive computer-based systems, which help decision makers utilize data and models to solve unstructured problems (Scott Morton, 1971). Decision support systems couple the intellectual resources of individuals with the capabilities of the computer to improve the quality of decisions. It is a computer-based support system for management decision makers who deal with semi-structured problems (Keen and Scott Morton, 1978). Decision support system (DSS) is an organized collection of people, procedures, software, databases, and devices working to support managerial decision making. 32. Decision making as a component of problem solving
Intelligence Decision Making Design Choice Implementation Monitoring Problem Solving

33. What are the problem solving factors in DSS? Multiple decision objectives Increased alternatives Increased competition The need for creativity Social and political actions International aspects Technology Time compression
K. Padmavathi MIS 11

34. What are all the solution types in DSS? Optimization model - Finding the best solution Satisfying model - Finding a good -- but not necessarily the best -- solution to a problem Heuristics - Commonly accepted guidelines or procedures that usually find a good solution. 35. What is Executive Information System EIS? An executive information system (EIS) is a type of management information system that facilitates and supports senior executive information and decision-making needs. It provides easy access to internal and external information relevant to organizational goals. It is commonly considered a specialized form of decision support system (DSS). EIS emphasizes graphical displays and easy-to-use user interfaces. They offer strong reporting and drill-down capabilities. In general, EIS are enterprisewide DSS that can help and monitor performance and identify opportunities and problems of top-level executives. EIS and data warehousing technologies are converging in the marketplace. In recent years, the term EIS has lost popularity in favor of business intelligence (with the sub areas of reporting, analytics, and digital dashboards). 36. Components of EIS EIS components can typically be classified as: Hardware Software User interface Telecommunications 37. What are the advantages and disadvantages of EIS? Advantages Disadvantages Easy for upper-level executives to System dependent use, extensive computer Limited functionality, by design experience is not required in Information overload for some operations managers Provides timely delivery of Benefits hard to quantify company summary information High implementation costs Information that is provided is System may become slow, large,
K. Padmavathi MIS 12

better understood EIS provides timely delivery of information. Management can make decisions made promptly. Improves tracking information Offers efficiency to decision makers. 38. Characteristics of EIS Drill down Critical success Factors (CSF) Status access Analysis Exception reporting Colors and audio Navigation of information Communication

and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

39. What is Executive Support System? Comprehensive support system that goes beyond EIS to include Communications Office automation Analysis support Intelligence 40. What is Enterprise Information System EIS? Corporate-wide system Provides holistic information From a corporate view Part of enterprise resource planning (ERP) systems For business intelligence Leading up to enterprise information portals and knowledge management systems. 41. What is International Information System IIS? An international information systems architecture consists of basic information systems required by organizations to coordinate worldwide trade and other tasks A business driver is an environmental force to which businesses must respond and that influence a businesss direction.
K. Padmavathi MIS 13

42. International Information System Architecture

43. What is Knowledge Management System KMS? Definition: Knowledge is intangible, dynamic, and difficult to measure, but without it no organization can survive. Tacit: which are unarticulated knowledge and more personal, experiential, context specific, and hard to formalize; is difficult to communicate or share with others; and is generally in the heads of individuals and teams. Explicit: explicit knowledge can easily be written down and codified. 44. Types of Knowledge Management System Enterprise-Wide Knowledge Management System Knowledge Work Systems Intelligent Techniques 45. What is Geographic Information System? A system for capturing, storing, checking, integrating, manipulating, analysing and displaying data which are spatially referenced to the Earth. This is normally considered to involve a spatially referenced computer database and appropriate applications software.

K. Padmavathi

MIS

14

UNIT 4 Security and Control 46. What are the ethical principles associated with the use of Information Technology IT? Protecting the public interest and maintaining integrity Maintaining confidential information and privacy Upholding responsibility to the IT profession Demonstrating competence and quality of service. 47. What is Ethics? Ethics - set of beliefs about right and wrong behavior Ethical behavior conforms to generally accepted social norms Virtues - Habits that incline people to do what is acceptable Vices - Habits of unacceptable behavior Value system - Scheme of moral values 48. Responsibilities/Duties of Corporate Ethics Officer o Complete oversight of the ethics function o Collecting and analyzing data o Developing and interpreting ethics policy o Developing and administering ethics education and training o Overseeing ethics investigations 49. 7 Steps to Ethical Decision Making Get the facts Identify stakeholders and their positions Consider the consequences of a decision Weigh various guidelines and principles Develop and evaluate options Review a decision Evaluate the results of a decision 50. What is meant by Computer Networks? A computer network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.

K. Padmavathi

MIS

15

Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. 51. Types of computer network LAN Local Area Network WAN Wide Area Network MAN Metropolitan Area Network CAN Campus Area Network PAN Personal Area Network GAN Global Area Network 52. Difference between LAN and WAN LAN Small area covered Use public communication links Usually low speed Uses Wi-Fi, Ethernet cables WAN Large area covered Use public communication links Usually fast speed Uses optic wires, microwaves, satellites

53. What is meant by Intranet? Private computer network Secure sharing organization's information or operational systems with its employees. The same architecture as in Internet private version of the Internet possible access to the Internet, then gateway with firewall is applied Intranet delivers o Tools and applications, o Collaboration (to facilitate working in groups and teleconferencing) o Sophisticated corporate directories o Sales and Customer relationship management tools o Project management etc. In large intranets, traffic is often similar to public website traffic

K. Padmavathi

MIS

16

54. What is meant by Extranet? Uses Internet protocols, network connectivity Share information as intranet The number of clients is extended to people outside the company interconnections are over a shared network rather than through dedicated physical lines as in intranet 55. Difference between Intranet and Extranet Intranet Connects users in company Shared network Single company's administrator Dont need so much security Extranet connects user inside and outside company Dedicated physical lines Multiple company's administrator Requires more security

56. What is meant by LAN? o Small geographic area (e.g. room, office) o Contrast to wide-area networks (WANs) o Controlled by one administrative authority o Usually high speed o Always shared

57. What is meant by WAN? o Computer network that covers a broad area o Crosses metropolitan, regional, or national boundaries o Uses routers and public communications links o Example: Internet o Used to connect LANs and other types of networks together o Option for WAN connectivity Leased Line Circuit switching
K. Padmavathi MIS 17

Packet switching Cell relay o Speed from 1200 bits/s to 6 Mbit/s

58. What is Internet? Global system of interconnected computer networks Consists of millions of private and public networks

59. What are all the functions of Internet? E-mail File-sharing Instant messaging Internet fax World Wide Web Voice over IP Mobile VoIP 60. What is meant by Wireless Network Wi Fi Cheap networking solution Radio waves instead of cables Three standards : 802.11a, 802.11b and 802.11g 2 modes Infrastructure, and Ad-hoc Hotspots easy internet access

K. Padmavathi

MIS

18

61. What is IS Vulnerability? In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit the vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. 62. Types of Information System Controls General Controls: Software and hardware Computer operations Data security Systems implementation process Application Controls: Input Processing Output 63. What are the tests conducted to check the security of information system? Vulnerability Scan Penetration Test Security Review Vulnerability Assessment Security Audit 64. Computer Crimes Hacking and Cracking Hacker: Hackers are often described as individuals who seek to break into systems as a test of their abilities. Few hackers attempt to cause damage to systems they access and few are interested in gaining any sort of financial profit. Cracker: A person who gains access to an information system for malicious reasons is often termed a cracker rather than a hacker. This is because some people draw a distinction between ethical hackers and malicious hackers.

K. Padmavathi

MIS

19

65. What are the types of Computer Viruses? Trojans and Worms Spyware and Adware Internet related viruses Denial of service Brand abuse Cybersquatting Cyber-stalking Cyber-terrorism Online stock fraud Phishing 66. What is meant by Internet Security? Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption. 67. Methods to Securing the Web Use Open Source Scripts Update Constantly Use Strong Passwords Secure Admin Email Address Delete the Installation Folder Change File & Folder Permissions Restrict Root Access Use security plugins Read leading Tech Blogs Stay away from Nulled Scripts & Themes
68. What is meant by MIS Audit?

Identifies the controls that govern information systems and assesses their effectiveness Auditor conducts interviews with key individuals Examines security, application controls, overall integrity controls, and control disciplines
K. Padmavathi MIS 20

69. What is meant by Software Audit? Software audit can mean:

A software licensing audit, where a user of software is audited for licence compliance Software quality assurance, where a piece of software is audited for quality A software audit review, where a group of people external to a software development organisation examines a software product A physical configuration audit A functional configuration audit Software Auditing is - A regular investigation of the software installed on all computers in an organisation to ensure that it is authorized or licensed. Software audits minimize the risk of prosecution for software theft, minimise the risk of viruses through uncontrolled software copying, and ensure technical support is available to all users. 70. What are the types of audit? First Party Audit o Within you company or organization Second Party Audit o Sometimes called external audits o By a Customer on his Supplier o By a Supplier on you. Third Party Audit o Outside third party is contracted to do the audit. 71. What is meant by CMM? Capability Maturity Model: A reference model of mature practices in a specified discipline, used to assess a groups capability to perform that discipline CMMs differ by o Discipline (software, systems, acquisition, etc.) o Structure (staged versus continuous) o How Maturity is Defined (process improvement path) o How Capability is Defined (institutionalization)

K. Padmavathi

MIS

21

UNIT 5 New IT Initiatives 72. What is meant by E-Business? E-Business means buying and selling, servicing customers, collaborating with business partners, and conducting electronic transactions within an organisation. E-Business refers primarily to the digital enablement of transactions and processes within a firm, involving only the information systems under the control of the firm. E-Business is those activities other than buying and selling via electronic channels. 73. Transaction types of E-Business Business-to-business (B2B) Collaborative commerce (c-commerce) Business-to-consumers (B2C) Consumers-to-businesses (C2B) Consumer-to-consumer (C2C) Intra-business (intra-organizational) commerce Government-to-citizens (G2C) Mobile commerce (m-commerce) 74. What is meant by E-Commerce? E-commerce describes the process of buying, selling, transferring, or exchanging products, services, and/or information via computer networks, including the Internet. 75. What is meant by E-Governance? It can be defined as the civil and political conduct of government, including service provision, using information and communication technologies. Government

Transactions

Government

Citizens
E-Gov solution
K. Padmavathi MIS 22

76. What is meant by Data Warehousing? Data Warehouse: A single, complete and consistent store of data obtained from a variety of different sources made available to end users in what they can understand and use in a business context. Data Warehousing: A process of transforming data into information and making it available to users in a timely enough manner to make a difference. 77. What is Data Mining? Data mining is the process of discovering interesting patterns (or knowledge) from large amounts of data. The data sources can include databases, data warehouses, the Web, other information repositories, or data that are streamed into the system dynamically. A methodology designed to perform knowledge-discovery expeditions over the database data with minimal end-user intervention 3 Stages of Data o Data o Information o Knowledge 78. What is ERP? Def 1: ERP stands for: Enterprise Resource Planning systems This is what it does: attempts to integrate all data and processes of an organization into a unified system. A typical ERP system will use multiple components of computer software and hardware to achieve the integration. A key ingredient of most ERP systems is the use of a unified database to store data for the various system modules. Def 2: ERP is a process of managing all resources and their use in the entire enterprise in a coordinated manner. ERP System is a set of integrated business applications, or modules which carry out common business functions such as general ledger, accounting, or order management. 79. What is SCM? Management of material and information flow in a supply chain to provide the highest degree of customer satisfaction at the lowest possible cost.
K. Padmavathi MIS 23

Supply chain management requires the commitment of supply chain partners to work closely to coordinate order generation, order taking, and order fulfillment. They thereby create an extended enterprise spreading far beyond the producer's location. SCM draws heavily from the areas of operations management, logistics, procurement, and information technology, and strives for an integrated approach 80. What is CRM? With the growth of the internet and related technologies, customers are concerned over the privacy and safety of their personal information. Therefore, businesses need to ensure that the storage and analysis of the customer data must have the highest levels of protection against cyber criminals, identity theft and other breaches of securities. CRM is often thought of as a business strategy that enables businesses to: Understand the customer Retain customers through better customer experience Attract new customer Win new clients and contracts Increase profitably Decrease customer management costs 81. What is meant by Pervasive Computing? Pervasive Computing is the ability to access information and software applications anytime and anywhere. Computing and communication capabilities are embedded in the infrastructure and disappeared from human users. People use computer-assisted task-specific devices, instead of computing devices. For example: SmartTV (Samsung), smartphone (android phone) 82. What is meant by Business Intelligence? The term Business Intelligence (BI) represents the tools and systems that play a key role in the strategic planning process of the corporation. These systems allow a company to gather, store, access and analyze corporate data to aid in decision-making. Generally these systems will illustrate business intelligence in the areas of customer profiling, customer support, market research, market segmentation, product profitability, statistical analysis, and inventory and distribution analysis to name a few.
K. Padmavathi MIS 24

Potrebbero piacerti anche