SlideShare a Scribd company logo
1 of 16
Download to read offline
Sample MS-54 Jan June 2017
Course Code MS - 54
Course Title Management Information Systems
Assignment Code MS-54/TMA/SEM - I/2017
Assignment Coverage All Blocks
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/
KIAN PUBLICATION
ignousolvedassignmentsmba@gmail.com
kianpublication1@gmail.com
ignou4you@gmail.com
School of Management Studies
INDIRA GANDHI NATIONAL OPEN UNIVERSITY
MAIDAN GARHI, NEW DELHI – 110 068
1. What is the relevance of the Nolan’s Stage Growth Model for the study of information systems in
today’s organisation?
Information systems cannot deliver value from ---------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------- levels of maturity in dealing with
information systems. Nolan has provided a model for such information systems using maturity in organizations. However,
empirical evidence is not available in ---------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------. This requires a change in the mindset and way of working.
Organization culture needs to change to accommodate this -------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------- in dealing with information systems.
Nolan's Six-stage Model
Nolan (1979) -------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------The stages are:
The structure of the final, six-stage model is depicted in the diagram below:
Figure 1: Diagram showing the SGM continuum for growth/maturity
The diagram ------------------------------------------------------------------ suggests that:
 Stage 1: Evolution ----------------------------------------------- initiation stage.
 Stage 2: This is followed ---------------------------------------- IT in a contagion stage.
 Stage 3: After -------------------------------------------------- arises.
 Stage 4: Next, ------------------------------------------------------------------------ solutions evolves.
 Stage 5: Administration/--------------------------------------------------------------------- increasing IT expenditures.
 Stage 6: Finally, -------------------------------------------------------------------------------- will occur.
Structure ------------------------- Model
Stage 1 – Initiation
In this stage, --------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------companies for two reasons:
(a) The first reason deals with the -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------justifies large investment in specialized equipment.
(b) The second reason deals with --------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------, users tend to take a "Hands Off" approach to new technology.
This introductory technology is simple -------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------management, and works in a "carefree" atmosphere.
Stage 1 key points:
 ------------------------------------------------ "Hands Off".
 IT personnel are ------------------------------------------- learning".
 IT ------------------------------------------------- is lax.
 ------------------------------------------ applications to reduce costs.
Stage 2 – Contagion
Even though computer systems ----------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------by a managerial need to explain the potential of computer
applications to alienated users. This leads to the adoption of computers in a range of different areas.
Stage 2 presents some difficulties:
 Project and -----------------------------------------------------------------------------------------------------------------------------
----------------------------------------------systems being obtained.
 System sophistication ----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------in higher salaries.
 The budget for the -----------------------------------------------------------------, and causes management concern.
 Although the price --------------------------------------------------------------------------------------------------------------------
------------------------------------------------------- is necessary.
Stage 2 key points:
 ----------------------------------------------------- of applications.
 ---------------------------------------------------- about using data processing.
 ----------------------------- control --------------------------------- lax.
 --------------------------------------- of budgets.
 ---------------------------------------- regard the computer as "just a machine".
 --------------------------- of computer use throughout the ------------------------------- functional areas.
 ------------------------------- is plagued by --------------------- crisis.
Stage 3 – Control
Stage 3 is a reaction against --------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------for control of computer operating costs. In this stage, project management and
management report systems --------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------of computers to management of data resources. This shift:
 Is an outcome of the analysis of how ----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------for data processing operations.
 Provides flexibility -------------------------------------------------------------------- new controls.
The major ------------------------------------------------------------------------- of data processing operations.
Stage 3 key points:
 ----------------------------------------- in computer use.
 -------------------------------------- importance of the IT division ----------------------------------------.
 --------------------------------------------- controls put in place.
 ------------------------------------- often incompatible or inadequate.
 use of database --------------------------------------------- negative general management reaction.
 ------------------------ frustration with the IT --------------------------- provided.
Stage 4 – Integration
Stage 4 features the adoption of new ----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------that of Stage 2. In the latter half of Stage 4, exclusive reliance on
computer controls leads to ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------in his initial (1973) draft of the stages of growth.
Stage 4 key points:
 --------------------------------- by the users.
 large data ------------------------------------------------ growth.
 ---------------------------------------line database facilities.
 data processing ----------------------------------- like a computer utility.
 formal planning --------------------------------------------- processing.
 users more ----------------------------------------------------.
 use of -----------------------------------------------, applications financial planning.
 data processing has --------------------------------------------------, project management.
Stage 5 – Data ----------------------------
Nolan determined that four stages -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------corporate data rather than IT. Like the proceeding Stage 4, it is marked
by the development and maturity of the new concept of data administration.
Stage 5 key points:
 data ad--------------------------- is introduced.
 ------------------------------------------, its usage, and its meanings within the whole organisation.
 applications -------------------------------------- the organisation.
 data processing ------------------------------------------------------- than of machines.
 use of term IT/-------------------------------------------- processing".
Stage 6 – Maturity
In Stage 6, the application portfolios - tasks like --------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------and its information flows. During this stage, tracking sales
growth becomes an important aspect. Typically:
 10% of the work ---------------------------------------------------------- remote job entry.
 60% of the work relates to ------------------------------------------------------- processing.
 5% of the ---------------------------------------------------------- computing.
 25% of the work -------------------------------------------- processing.
Management control systems are estimated as being 40% of Stage 6. There are three aspects of management control;
manufacturing, marketing and financial:
 ----------------------------------------------- future needs.
 Marketing --------------------------------------- with research.
 Financial control ----------------------------------------- flow requirements.
Stage 6 exercises a high degree ----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------high levels of efficiency and effectiveness.
Stage 6 key points:
 systems that ------------------------------------------- needs of the organisation.
 use of data resources to ---------------------------------------------------- applications.
 data processing --------------------------------------------- as a data resource function.
 data processing ---------------------------------------------------- strategic planning.
 ultimately, users and DP --------------------------------------------------------- resources within the organization.
 manager of IT system takes on the same ----------------------------------------------------- of finance or director of HR.
Discussion on significance of model
1. Though Nolan’s Stages of -----------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------- it would probably now be perceived to have several
shortcomings and to be old-fashioned or out-of-date.
2. The model had as a main focus the change in IT budget, but critics questioned whether it was “reasonable to assume
that a single variable serves as a suitable surrogate for so much."
Though it would seem reasonable that this single variable could be an indicator of other variables such as the
organisational --------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------that would make that main focus a valid one.
3. Nolan stated that the force -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------are additional factors that should be considered. Most
important are the ‘demand-side’ factors that create a ripe environment for technological changes to be considered
and adopted." As proposed, ---------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------circumstances. Unwarranted change would
result in excess costs and potential failure of the process.
4. The Stages of Growth Model --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------naïve from the user perspective. King and Kraemer state,
“...the question of whether organizational goals are uniform and consistent guides for the behavior of organizational
actors, as opposed to ------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------attention in the literature on computing.”
Clearly, ---------------------------------------------------------------------------------------------------------------------------------
------------------------------------------not subject to change.
5. Thus, though as time has -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------analysis into the growth of IT within organisations.
2. What are the various stages of a system development life cycle and how are the efforts distributed
over these phases?
The system-development life cycle enables users to transform a newly-developed project into an operational one.
The System Development ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------and non-technical activities to deliver a quality system which meets or exceeds a
business"s expectations or manage decision-making progression.
Traditionally, the systems-development life -------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------to define clearer actions to achieve specific goals.
Similar to a project ------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------under development.
The SDLC highlights different ----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------a given step. It is also used to let them know that at any time, steps can be
repeated or a previous step can be reworked when needing to modify or improve the system.
Following are the seven phases of the SDLC: Planning ---------------------------------------------------------------------------------
---------------------------- Development (4), Testing (5), Implementation (6) and Maintenance (7)
1. ---------------------------
This is the first phase in the systems ----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------plan (or a feasibility study) for a company"s business initiative to
acquire the resources to build on an infrastructure to modify or improve a service. The company might be trying to meet or
exceed expectations for their employees------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------
-------------and other items should be considered at this stage.
2. Systems ------------------------ Requirements
The second phase is where businesses --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------the best fit for the ultimate goal(s) of the project. This is where teams
consider the functional requirements of the project or solution. It is also where system analysis takes place—or analyzing the
needs of the end users to ensure the new -----------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------will be responsible for individual pieces of the project,
and what sort of timeline should be expected.
There are several ----------------------------------------------- to the second phase. They include:
 CASE (------------------------------------- Engineering)
 Requirements ------------------------------
 ------------------------------- analysis
3. -------------------- Design
The third phase describes, in detail, -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------place. This is the step for end users to discuss and determine their
specific business information needs for ------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------- (networking capabilities), processing and procedures for the
system to accomplish its objectives.
4. Development
The fourth phase is when the real -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------. This work includes using a flow chart to ensure that the process of the
system is properly organized. The development phase marks the ------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------by instillation and change. Focusing on
training can be a huge benefit during this phase.
5. -------------------and Testing
The fifth phase involves systems integration ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------design meets the initial set of business goals. Testing may be
repeated, specifically to check for errors, bugs and -----------------------------------------------------------------------------------------
----------------------------------------------------------------------------------, both of which will help ensure the program"s
successful completion.
6. Implementation
The sixth phase is when the majority ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------the new system into operations, a test run of the system is done
removing all the bugs, if any. It is an important phase of a --------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------. The output of the test run should match the
expected results. Sometimes, system testing is considered as a part of implementation process.
Using the test data following test run are carried out:
 Program test
 System test
Program test : When the -----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------and validation be checked and any undesirable happening must be noted and
debugged (error corrected).
System Test : After carrying out the ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------complete system is executed on the actual data. At each stage of the
execution, the results or output of the system is analyzed. ---------------------------------------------------------------------------------
------------------------------------------------------------------------------------------in the particular programs are identified and are
fixed and further tested for the expected output----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------to establish that all modules work together correctly as an
application or system or package.
When it is -----------------------------------------------------------------------------------------------------------------------------------------
----------------------------------per their requirements.
7. Operations and Maintenance
Maintenance is necessary to eliminate --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------enhancement, future functionality and any other added functional
features to cope up with the latest future needs. It has been -------------------------------------------------------------------------------
--------------------------------------------------------------------------------time to time. The review of the system is done for:
 knowing ------------------------------- system
 knowing the ------------------------ requirements
 Studying --------------------------------------------.
If a major change --------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------above life cycle phases.
EFFORT ---------------------------------------------- LIFE CYCLE
If a business determines a change is needed -------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------project is a time-consuming process. Even
though some steps are more difficult than others, none are to be overlooked. An oversight could prevent the entire system
from functioning as planned.
Systems development specialists at Innovative Architects possess extensive experience in managing these type of projects. If
you have a situation at your organization ----------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------guide you through each of these steps, ensuring you can have
your new system online as soon as possible.
The distribution of the organisational ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------the efforts are devoted to maintenance after implementation and half
the efforts in the system. ------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------information system before it is implemented.
Systems Development Life Cycle (SDLC----------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------of business processes, functional requirements, and economic and
technical feasibility. The primary objectives of any SDLC is to deliver quality system which meets or exceed customer
expectations and within cost estimates, work ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------of events for conducting system development that is
controlled, measured, documented, and ------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------- rooms to add new features to existing software.
3. What are the various ways in which serial transmission can be achieved? Explain each way in
detail.
In serial transmission, bits are sent sequentially on ----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------is needed since bits must be assembled and sent as a
unit and then disassembled at the receiver.
Serial transmission can be either synchronous or asynchronous . -------------------------------- bits are combined into frames
and frames are sent continuously with or -----------------------------------------------------------------------------------------------------
----------------------------------------------------------------------synchronization, to allow for arbitrary size gaps between frames.
However, start/stop bits maintain physical bit level synchronization once detected.
When transferring data between two ----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------. Data is transmitted as a single bit at a time using a fixed time interval
for each bit. This mode of transmission is known as bit-serial transmission.
 In serial transmission, the -------------------------------------- serially one after the other.
 It requires only one --------------------------------------------- data from sender to receiver.
 Thus all the bits of ------------------------------------------ line in serial fashion.
 In serial transmission, --------------------------------------- clock pulse.
 As shown in fig., suppose an 8-bit --------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------. The most significant bit (MSB) i.e. 1 will be
transmitted in the end via single communication line.
 The internal ----------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------are used.
 These conversion devices ------------------------------------------------------------------------ over single line.
 On receiver side, serial data ----------------------------------------------------------- of computer can accept it
• Serial ----------------------------------------------- communication.
Advantage --------------------------------- transmission
Use of single communication line ---------------------------------------------------------------------- to parallel transmission.
Disadvantages of Serial transmission
1. Use of conversion devices at -------------------------------------------------------------- transmission cost.
2. This method is slower ---------------------------------------------------------------- serially one after the other.
Examples of serial mode transmission include connections between a computer and a modem using the RS-232 protocol .
Although an RS-232 cable can theoretically ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------serial transmission in either direction. In this case, a computer may not be
close to a modem, -------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------of serial transmission.
Ways of Serial Transmission
There are two ways of serial -------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------the beginning and end of the data transmission occurs.
Bit --------------------------------------------------------------------------------------------------------------------------------------------------
-------------------------control.
1. Asynchronous Transmission
 Asynchronous -------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------sends one byte of data at a time.
 Bit ----------------------------------------------------- possible using start bit and stop bit.
 Start bit indicates ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------of each byte.
 Stop bit indicates the -----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------bits, usually 1s are called stop bits.
 Addition of start and stop --------------------------------------------------------------- in asynchronous transmission.
 There is idle time between the ----------------------------------------------------- is also known as Gap
 The gap or idle ------------------------------------------------------------------------------------------------------------------------
------------------------------------within each byte, receiver must be synchronized with the incoming bit stream.
Application of Asynchronous Transmission
1. Asynchronous transmission -----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------computer as transmission takes place character by character.
2. Asynchronous ---------------------------------------------------------------------------------------------------------------------------------
------------------------------------------modems.
Advantages of Asynchronous transmission
1. This method of data --------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------would be low and idle time will not be expensive.
2. In this approach each -------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------will not be affected.
3. It is possible to --------------------------------------------------------- different bit rates.
4. The transmission ------------------------------------------------------------- becomes available.
5. Moreover, this -------------------------------------------------------- to implement.
Disadvantages of asynchronous transmission
1. This method is less ---------------------------------------------------------------------------------------------------------------------------
------------------------------------------------insertion of gaps into bit stream.
2. Successful transmission ---------------------------------------------------- be missed or corrupted.
2. Synchronous Transmission
 Synchronous ----------------------------------------------------- and stop bits.
 In this method bit --------------------------------------------------------- multiple bytes.
 There is no -------------------------------------------------------------- in the data stream.
• In the absence of start & ------------------------------------------------------------------------- the transmission of each bit.
• Since the various bytes ------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------original information.
• In order to receive the --------------------------------------------------------- at the same clock frequency.
Application ------------------------------------------- transmission
• Synchronous -------------------------------------------------------------------------------- between computers.
Advantage ------------------------------------------ transmission
1. This method is faster as ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------is no gap between the individual data bytes.
Disadvantages of Synchronous transmission
1. It is costly as compared to -------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------both ends. This lead to increase in the cost.
2. The sender and receiver have ---------------------------------------------------------------------------------------------------------------
------------------------------------------------------------makes the system complicated.
3. Iso-chronous
Iso-chronous is a technique which ------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------between the transmission of two characters will always be an integer
multiple of the length of time required to transmit one -------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------than asynchronous transmission between the end
devices. Iso-chronous transmission -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------transmission.
A circuit is a path for transmission of ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------; these are simplex, half-duplex and full duplex.
In a simplex transmission, signals are --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------of VCR or a Television. Here, the remote control unit sends a signal
to the television or VCR to ---------------------------------------------------------------------------------------------------------------------
------------------------------------------------------is a one way road.
In half-duplex transmission both the stations ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------is complete from the first station and then it initiates
transmission to the first station. In other -----------------------------------------------------------------------------------------------------
----------------------------------------------------------------------the example of crossing of a narrow bridge. While the cars from
one side cross the bridge, the cars on the other side wait. After completion, the cars from the other direction pass over the
bridge to the opposite side.
In full-duplex transmission both ------------------------------------ is a simple example of full duplex transmission.
Half-duplex operation is possible on both two-----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------must deal with turn around time, i.e.,. the time required to
change the direction. During that time --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------full duplex transmission on two-wire circuits.
4. List the five problems which may motivate an organization to move toward the database approach.
Explain the significance of each one to a manager to an organization.
Since computer professionals have ------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------may think it must be embraced at any cost for their organization to
remain efficient, modern, and competitive. Neither position is entirely acceptable, yet both contain some truth.
Growing recognition of data as a valuable ---------------------------------------------------------------------------------------------------
------------------------------------------------------------------------Management" which have responsibility for data processing,
management information systems, ------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------top management and users to change the way they view the EDP
department.
Several problems may motivate ---------------------------------------------------------------------------------------------------------------
------------------------------------------------------------in an inability to get something done, or do economically, quickly, and
accurately. Though this need may initially justify ------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------must look at the application environment and the data
processing requirements from a global perspective.
Five major ---------------------------------------------- approach:
1. Inability to get --------------------------------------" ad hoc requests.
2. High d----------------------------------------t costs.
3. Low res------------------------------ to change.
4. Low ---------------------------------------------- quality.
5. Inadequate data model of the real world.
1. Inability to --------------------------------------" ad hoc requests.
In the lack of proper database ------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------made by client or customers as database was managed manually and it was
time consuming and hectic work. A lot of request came -----------------------------------------------------------------------------------
----------------------------------------------------------------------------------------big problem for the organizations and because of
that they decided to move towards database approach.
2. High development costs
In lack of database -------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------Searching data was also a time consuming process. Maintaining record was also costly
that why we can say that development cost ---------------------------------------------------------- approach.
3. Low ------------------------------ change.
It was become necessary for -------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------and to give quick response, and to manage large data, thus responsiveness for
any change became low. Managers strongly --------------------------------------------------- to move towards database approach.
4. Low ----------------------------------------- and quality.
Without good database approach data --------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------or improve quality of data and also big threat of data security.
These were some issues which forced organizations to move towards good database management system.
5. Inadequate -------------------------------- real world.
Another problem faced by ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------managers faced difficulties an organizing and manipulating data from records.
These are common five problems which forced organizations to move towards good database management approach.
Management and organizations ----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------computer based information systems. MIS uses computer technology to
provide information and ------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------management style.
Computer technology, ---------------------------------------------------------------------------------------------------------------------------
------------------------------------------------machine system for providing information to support operations, management,
analysis, and decision making -----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------and decision making and a data base.
Managers at all levels use ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------, external as well as internal, future oriented as well as historical and covering a
longer span time. An effective MIS cannot --------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------not effectively use DBMS technology until two decades before.
An important key to a successful MIS is the effective management of an organization’s data resources.
Role of ----------------------------------- an Organization:
An organization is traditionally ----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------and policy making in top management. The corporate database contains
data relating to the organization, its operations, its plan and its environment.
State of Database ----------------------------- Organizations:
The needs of organizations ---------------------------------------------------------------------------------------------------------------------
------------------------------------------------------authorities, federal securities agencies and legislators making privacy laws.
Both internal and external forces demand that organizations exercise control over their data resources.
Decisions and actions in the --------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------and produce plans and expectations which are formally captured and stored in
the --------------------------------------------------------------------------------------------------------------------------------------------------
-------------------------a current image.
People in the organization ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------plans and expectations. The corporate database provides data for modeling and
forecasting which --------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------and the management process.
While management seeks -----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------instance, computer applications begin to penetrate into higher management levels.
With comprehensive ----------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------, an organization must appoint a DBA to manage its data resources.
While an organization’s -------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------fall substantially short of ideal capabilities, making their acquisition an interim
measure - a move to help -----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------for large organizations with special needs, such as a very large database or large
volumes of known transactions requiring rapid online response.
Data is a vital resource in an -------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------of a data processing system, attention to data has lagged behind the
development of machines and -----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------and application systems which use it.
Four major ----------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------the new technology.
1) Increase in --------------------------------------------------------------------- products
2) Recognition of relational ------------------------------------------------------------------- needs of organisation.
3) Emergence of ---------------------------------------------------------------------- business Requirements.
4) Increasing possibility of ------------------------------------------------------ of relational databases.
5. (a) “Compute virus is a major threat to compute security.” Justify the statement.
We all know that there are ----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------. They just use computers for work and entertainment. This computer threats
overview will give you the basic ------------------------------------------------------ protect yourself from common threats.
Viruses: One of ------------------------------------- Threats
A computer virus is a small program ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------viruses. Not all of them are particularly troublesome, but some of
them can cause significant damage, -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------email attachments and download from malicious web sites.
Trojans: the ------------------------------------------ Threats
If you use an operating --------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------small viruses that hide within other programs. They can essentially exist anywhere.
Funny pictures, illegal downloads, and -------------------------------------------------------------------------------------------------------
---------------------- programs may disable antivirus software and remove firewalls.
Worms: The ------------------------------------- Threats
Worms are similar to viruses in that ----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------programs use the internet to search for vulnerable computers. Once
they locate them, they move in. The ----------------------------------------------------------------------------------------------------------
---------------------------------------------programs can clog networks and can make loading web pages take a long time.
Spyware: ----------------------------------------- Computer
Spyware might seem like viruses, -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------. This common threat is usually contracted through peer-to-peer file
sharing. If you download music, movies, or -------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------your computer to change your homepage, add additional
programs and can cause your computer to crash.
A computer virus is a type of malicious ----------------------------------------------------------------------------------------------------
----------------------------------------------------------------------- by modifying them. Infecting computer programs can include as
well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be
"infected" with a computer virus. The --------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------viruses along with many other forms of malicious software, such as -
------------------------------------------------------------------------------------------------------------------------------------------------------
-------------------- malicious software.
The majority of active malware ----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------- in 1985, is a misnomer. Viruses often perform some type of harmful
activity on infected host computers, such as -------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------data, displaying political or humorous messages on the user's
screen, spamming their e-mail contacts, logging their keystrokes, or even rendering the computer useless. However, not all
viruses carry a ------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------which install themselves without user consent.
What are the ------------------------------------- virus?
Your ------------------------------------------- any of these malware symptoms:
 Slow ----------------------------------------------
 Erratic -----------------------------------ehavior
 ------------------------------data loss
 Frequent ------------------------- crashes
Computer Virus Help: ------------------------------------- virus protection?
When you arm yourself with -------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------with the best computer virus protection:
Make sure that you have the best security software products installed on your computer:
 Use antivirus --------------------------------- a firewall
 Get a-------------------------------- software
 Always keep ----------------------------------------- software up-to-date
 Update ------------------------------------------------ regularly
 Increase ------------------------------------------------ settings
 Avoid ----------------------------------------------- Web sites
 Only download ------------------------------------------------------------------- applications before downloading them.
Practice --------------------------------------- protocol:
 Don't open ------------------------------------------------------------ senders
 Immediately -------------------------------------------------- to be spam
An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in and out of your
computer and hide your PC from --------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------protection from the two most dangerous threats on the Internet – spyware
and computer viruses. They thwart threats before they -------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------the most damaging and devious strains.
While free antivirus downloads are -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------forms of can often do the most damage, so it’s critical to have up-to-
the-minute, guaranteed antivirus protection.
=======================================================================================
(b) Why should there be law against benign computer virus maker? What harm can it cause to your
computer?
There should be strong law against virus -----------------------------------------------------------------------------------------------------
---------------------------------------------------------------------- to gain access to their hosts' computers and computing resources.
The vast majority of viruses target systems running Windows, employing a variety of mechanisms to infect new hosts, and
often using complex anti-detection/stealth ---------------------------------------------------------------------------------------------------
------------------------------------------------------------------------, personal amusement, to demonstrate that a vulnerability exists
in software, for sabotage and denial of service, or simply because they wish to explore cyber security issues, artificial
life and evolutionary algorithms.
Computer viruses currently cause billions of dollars' worth of -----------------------------------------------------------------------
----------------------------------------------------------------------------------------------------In response, free, open-source antivirus
tools have been developed, and an industry of ----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------though no currently existing antivirus software was able to
uncover all computer viruses (especially new ones), computer security -----------------------------------------------------------------
-------------------------------------------------------------------------------------------have already become widely distributed.
These computer threats can cause lots of problems------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------account numbers, passwords, and credit card numbers.
This makes it much easier for them to commit fraud ---------------------------------------------------------------------------------------
------------------------------------------------------------------------------------your bank accounts, sign up for credit cards in your
name, or even purchase high ticket items from online retailers.
Other viruses take over small parts of your --------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------requests until their owners pay off the criminal to regain control
of his or her site. Chances are that you won’t see these activities taking place. Your computer or internet connection,
however, will usually slow down: a -----------------------------------------------------------------------------------------------------------
----------------------------------------------------------------, installing a network firewall and using antivirus and antimalware
programs. Free programs include SVG antivirus and Malware bytes.
A computer virus crime usually involves the ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------is just general cybercrime legislation. In the United States, the
distribution of a virus that affects -------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------Morris computer worm case, there have been other successes. In
December of 1999, David L. Smith pleaded guilty to --------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------prison and a $250,000 fine. The "Melissa" virus was
so devastating and widespread that it affected both computers belonging to individuals and those belonging to the
government. This is -----------------------------------------------------------------------------------------------------------------------------
----------------------------------------------be stricter when dealing with personal computers.
As evident, the legal implications of computer ----------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------the writing of viruses is not an offence in itself. In others
even the sharing of virus code between anti-virus researchers could potentially be considered an offense. To make matters
more -----------------------------------------------------------------------------------------------------------------------------------------------
----------------------------or her action under a very different legal system.
The newsgroup alt.comp.virus -----------------------------------------------------------------------------------------------------------------
------------------------------------------------------- or distribution may be found to be illegal:
 Unauthorized access - you may ---------------------------------------------------------------------------------------------------
------------------------------------------------------------------------a virus which infects that machine.
 Unauthorized modification - this ---------------------------------------------------------------, or partition sector.
 Loss of data - this --------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------public safety
 Incitement - includes ------------------------------------------------------------, and virus engines.
 Denial --------------------------------------------------------------------
 Application of any of -----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------has an interest.
The question of distribution is an interesting ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------they are getting into, can the distributor be held accountable?
The consensus is that if the file is labeled then the person will probably not face criminal charges, although he or she may be
sued for damages. The distributor could also ------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------these media practically force viruses onto people who do not
know what they are receiving. In addition, ---------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------the virus was spread due to "carelessness".
Laws Still Need to Improve
Although legislation against computer -------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------computer college student accused of having released the "I Love
You" virus that attacked email systems around the world and caused an estimated $10 billion in damages. The reason for the
dismissal of the charges was the lack of applicable legislation ---------------------------------------------------------------------------
------------------------------------------------------------------------------------------------could not be applied retroactively to the
"Love Bug" author. Unfortunately, this is not an isolated incident. According to the report "Cyber Crime and Punishment?",
conducted by the technology management ---------------------------------------------------------------------------------------------------
------------------------------------------------------------------------does not yet reach across the global Internet, “stated Bruce
McConnell, president of McConnell International. "Organizations must rely on their own defences for now."
So what is being done to improve the ---------------------------------------------------------------------------------------------------------
------------------------------------------------------------------in Europe, released its draft Convention on Cyber-Crime. This
represents the first multiparty attempt to address the ---------------------------------------------------------------------------------------
------------------------------------------------------------------------------------on Unlawful Conduct on the Internet. The group,
chaired by the Attorney General, was created in order to provide an initial analysis of legal and policy issues surrounding the
misuse of the Internet. There seems to be a common ---------------------------------------------------------------------------------------
------------------------------------------------------------------------------------. Cybercrime is a problem that defies all borders and
boundaries, hence so must the law enforcement tools used against it.
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/

More Related Content

What's hot

MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENTignou4you
 
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENTMS-08 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENTMS-52 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENTignou4you
 
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENTMS-06 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENTignou4you
 
Comm 102 Motivated Minds/newtonhelp.com
Comm 102 Motivated Minds/newtonhelp.comComm 102 Motivated Minds/newtonhelp.com
Comm 102 Motivated Minds/newtonhelp.comamaranthbeg45
 

What's hot (11)

MS-53 Jan June 2017
MS-53 Jan June 2017MS-53 Jan June 2017
MS-53 Jan June 2017
 
MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-07 JULY DECEMBER 2016 SOLVED ASSIGNMENT
 
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENTMS-08 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-08 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENTMS-52 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-52 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-91 JULY DECEMBER 2016 SOLVED ASSIGNMENT
 
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENTMS-06 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-06 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-62 Jan June 2017
MS-62 Jan June 2017MS-62 Jan June 2017
MS-62 Jan June 2017
 
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-29 JULY DECEMBER 2016 SOLVED ASSIGNMENT
 
MS-52 Jan June 2017
MS-52 Jan June 2017MS-52 Jan June 2017
MS-52 Jan June 2017
 
MS-65 Jan June 2017
MS-65 Jan June 2017MS-65 Jan June 2017
MS-65 Jan June 2017
 
Comm 102 Motivated Minds/newtonhelp.com
Comm 102 Motivated Minds/newtonhelp.comComm 102 Motivated Minds/newtonhelp.com
Comm 102 Motivated Minds/newtonhelp.com
 

Viewers also liked

3Com 07-0405-000
3Com 07-0405-0003Com 07-0405-000
3Com 07-0405-000savomir
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy managementAlgoSec
 
Презентация к уроку по рассказу К.Паустовского "Телеграмма"
Презентация к уроку по рассказу К.Паустовского "Телеграмма"Презентация к уроку по рассказу К.Паустовского "Телеграмма"
Презентация к уроку по рассказу К.Паустовского "Телеграмма"Roman-13
 
Serverless JavaScript
Serverless JavaScriptServerless JavaScript
Serverless JavaScriptgojkoadzic
 
2017 loreal pre case study va-riance
2017 loreal pre case study va-riance2017 loreal pre case study va-riance
2017 loreal pre case study va-riance以霖 凃
 
Agribonds for finance –comoros perspective
Agribonds for finance –comoros perspectiveAgribonds for finance –comoros perspective
Agribonds for finance –comoros perspectiveKenneth Kabue
 
Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...
 Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน... Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...
Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...nawaporn khamseanwong
 
Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...
 Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส... Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...
Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...nawaporn khamseanwong
 
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)nawaporn khamseanwong
 
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)nawaporn khamseanwong
 
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)nawaporn khamseanwong
 
3Com 3C0EP2100VCX
3Com 3C0EP2100VCX3Com 3C0EP2100VCX
3Com 3C0EP2100VCXsavomir
 
גילתה את האור עליזה שינזון
גילתה את האור  עליזה שינזוןגילתה את האור  עליזה שינזון
גילתה את האור עליזה שינזוןAlisa Sheinson
 

Viewers also liked (20)

ActionCOACH portugal - expansão
ActionCOACH portugal - expansãoActionCOACH portugal - expansão
ActionCOACH portugal - expansão
 
3Com 07-0405-000
3Com 07-0405-0003Com 07-0405-000
3Com 07-0405-000
 
Jisha murder case
Jisha murder caseJisha murder case
Jisha murder case
 
acerca de una empresa
acerca de una empresaacerca de una empresa
acerca de una empresa
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
Презентация к уроку по рассказу К.Паустовского "Телеграмма"
Презентация к уроку по рассказу К.Паустовского "Телеграмма"Презентация к уроку по рассказу К.Паустовского "Телеграмма"
Презентация к уроку по рассказу К.Паустовского "Телеграмма"
 
Serverless JavaScript
Serverless JavaScriptServerless JavaScript
Serverless JavaScript
 
2017 loreal pre case study va-riance
2017 loreal pre case study va-riance2017 loreal pre case study va-riance
2017 loreal pre case study va-riance
 
Agribonds for finance –comoros perspective
Agribonds for finance –comoros perspectiveAgribonds for finance –comoros perspective
Agribonds for finance –comoros perspective
 
Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...
 Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน... Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...
Loadแนวข้อสอบ ครูผู้ช่วย เอกสังคมศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน...
 
Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...
 Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส... Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...
Loadแนวข้อสอบ ครูผู้ช่วย เอกฟิสิกส์ สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (ส...
 
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย ศิลปศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
 
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย สุขศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
 
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
Loadแนวข้อสอบ ครูผู้ช่วย พลศึกษา สำนักงานคณะกรรมการการศึกษาขั้นพื้นฐาน (สพฐ.)
 
Access
AccessAccess
Access
 
3Com 3C0EP2100VCX
3Com 3C0EP2100VCX3Com 3C0EP2100VCX
3Com 3C0EP2100VCX
 
Envirotech
EnvirotechEnvirotech
Envirotech
 
אגף ספריות ומידע - הצעה
אגף ספריות ומידע -  הצעהאגף ספריות ומידע -  הצעה
אגף ספריות ומידע - הצעה
 
גילתה את האור עליזה שינזון
גילתה את האור  עליזה שינזוןגילתה את האור  עליזה שינזון
גילתה את האור עליזה שינזון
 
Stadiums
StadiumsStadiums
Stadiums
 

Similar to MS-54 Jan June 2017

MS-91 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-91 JAN JUNE 2016 SOLVED ASSIGNMENTMS-91 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-91 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENTignou4you
 
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENTMS-54 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
PLM STRATEGY IN MANUFACTURING INDUSTRY
PLM STRATEGY IN MANUFACTURING INDUSTRYPLM STRATEGY IN MANUFACTURING INDUSTRY
PLM STRATEGY IN MANUFACTURING INDUSTRYDeepak Bal
 
PROGRAMI PER KURSIN ALPHA BUSINESS
PROGRAMI PER KURSIN ALPHA BUSINESSPROGRAMI PER KURSIN ALPHA BUSINESS
PROGRAMI PER KURSIN ALPHA BUSINESSSelf-employed
 
Tr electronic products assembly and servicing nc ii
Tr electronic products assembly and servicing nc iiTr electronic products assembly and servicing nc ii
Tr electronic products assembly and servicing nc iiMarlon Sibayan
 
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC II
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC IITR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC II
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC IIReden Pagdato
 
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENTMS-51 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENTMS-21 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
MS-92 JAN JUNE 2016 SOLVED ASSIGNMEN
MS-92 JAN JUNE 2016 SOLVED ASSIGNMENMS-92 JAN JUNE 2016 SOLVED ASSIGNMEN
MS-92 JAN JUNE 2016 SOLVED ASSIGNMENDharmendra Sikarwar
 
J An Gutierrez Credentials
J An Gutierrez CredentialsJ An Gutierrez Credentials
J An Gutierrez CredentialsJ. An Gutierrez
 
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENTMS-95 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENTDharmendra Sikarwar
 
Lifetime total cost of ownership of an Application
Lifetime total cost of ownership of an ApplicationLifetime total cost of ownership of an Application
Lifetime total cost of ownership of an ApplicationAspire Systems
 

Similar to MS-54 Jan June 2017 (20)

MS-91 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-91 JAN JUNE 2016 SOLVED ASSIGNMENTMS-91 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-91 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENTMS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENT
MS-57 JULY DECEMBER 2016 SOLVED ASSIGNMENT
 
Automated Examination system
Automated Examination systemAutomated Examination system
Automated Examination system
 
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENTMS-54 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-54 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-01 Jan June 2017
MS-01 Jan June 2017 MS-01 Jan June 2017
MS-01 Jan June 2017
 
PLM STRATEGY IN MANUFACTURING INDUSTRY
PLM STRATEGY IN MANUFACTURING INDUSTRYPLM STRATEGY IN MANUFACTURING INDUSTRY
PLM STRATEGY IN MANUFACTURING INDUSTRY
 
MS-04 Jan June 2017
MS-04 Jan June 2017MS-04 Jan June 2017
MS-04 Jan June 2017
 
PROGRAMI PER KURSIN ALPHA BUSINESS
PROGRAMI PER KURSIN ALPHA BUSINESSPROGRAMI PER KURSIN ALPHA BUSINESS
PROGRAMI PER KURSIN ALPHA BUSINESS
 
MS-04 Jan June 2016 IGNOU MBA
MS-04 Jan June 2016 IGNOU MBA MS-04 Jan June 2016 IGNOU MBA
MS-04 Jan June 2016 IGNOU MBA
 
Tr electronic products assembly and servicing nc ii
Tr electronic products assembly and servicing nc iiTr electronic products assembly and servicing nc ii
Tr electronic products assembly and servicing nc ii
 
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC II
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC IITR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC II
TR ELECTRONICS PRODUCTS ASSEMBLY AND SERVICING NC II
 
MS-22 Jan June 2017
MS-22 Jan June 2017MS-22 Jan June 2017
MS-22 Jan June 2017
 
MS-22 Jan June 2017
MS-22 Jan June 2017MS-22 Jan June 2017
MS-22 Jan June 2017
 
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENTMS-51 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-51 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENTMS-21 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-21 JAN JUNE 2016 SOLVED ASSIGNMENT
 
MS-92 JAN JUNE 2016 SOLVED ASSIGNMEN
MS-92 JAN JUNE 2016 SOLVED ASSIGNMENMS-92 JAN JUNE 2016 SOLVED ASSIGNMEN
MS-92 JAN JUNE 2016 SOLVED ASSIGNMEN
 
J An Gutierrez Credentials
J An Gutierrez CredentialsJ An Gutierrez Credentials
J An Gutierrez Credentials
 
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENTMS-95 JAN JUNE 2016 SOLVED ASSIGNMENT
MS-95 JAN JUNE 2016 SOLVED ASSIGNMENT
 
Lifetime total cost of ownership of an Application
Lifetime total cost of ownership of an ApplicationLifetime total cost of ownership of an Application
Lifetime total cost of ownership of an Application
 
MS-423 Jan June 2017
MS-423 Jan June 2017MS-423 Jan June 2017
MS-423 Jan June 2017
 

More from Dharmendra Kumar Singh (18)

ignou mba solved assignments 2018
ignou mba solved assignments 2018ignou mba solved assignments 2018
ignou mba solved assignments 2018
 
Ignou mba solved assignments for january 2018
Ignou mba solved assignments for january 2018Ignou mba solved assignments for january 2018
Ignou mba solved assignments for january 2018
 
Ignou July-December 2017 solved assignments @ 160 per assignment
Ignou July-December 2017 solved assignments @ 160 per assignmentIgnou July-December 2017 solved assignments @ 160 per assignment
Ignou July-December 2017 solved assignments @ 160 per assignment
 
MS-64 Jan June 2017
MS-64 Jan June 2017MS-64 Jan June 2017
MS-64 Jan June 2017
 
MS-63 Jan June 2017
MS-63 Jan June 2017MS-63 Jan June 2017
MS-63 Jan June 2017
 
MS-61 Jan June 2017
MS-61 Jan June 2017MS-61 Jan June 2017
MS-61 Jan June 2017
 
MS-93 Jan June 2017
MS-93 Jan June 2017 MS-93 Jan June 2017
MS-93 Jan June 2017
 
MS-92 Jan June 2017
MS-92 Jan June 2017MS-92 Jan June 2017
MS-92 Jan June 2017
 
MS-95 Jan June 2017
MS-95 Jan June 2017MS-95 Jan June 2017
MS-95 Jan June 2017
 
MS-43 Jan June 2017
MS-43 Jan June 2017MS-43 Jan June 2017
MS-43 Jan June 2017
 
MS-42 Jan June 2017
MS-42 Jan June 2017MS-42 Jan June 2017
MS-42 Jan June 2017
 
MS-24 Jan June 2017
MS-24 Jan June 2017MS-24 Jan June 2017
MS-24 Jan June 2017
 
MS-23 Jan June 2017
MS-23 Jan June 2017MS-23 Jan June 2017
MS-23 Jan June 2017
 
MS-25 Jan June 2017
MS-25 Jan June 2017MS-25 Jan June 2017
MS-25 Jan June 2017
 
MS-21 Jan June 2017
MS-21 Jan June 2017MS-21 Jan June 2017
MS-21 Jan June 2017
 
MS-11 Jan June 2017
MS-11 Jan June 2017MS-11 Jan June 2017
MS-11 Jan June 2017
 
MS-10 Jan June 2017
MS-10 Jan June 2017MS-10 Jan June 2017
MS-10 Jan June 2017
 
MS-09 Jan June 2017
MS-09 Jan June 2017 MS-09 Jan June 2017
MS-09 Jan June 2017
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

MS-54 Jan June 2017

  • 1. Sample MS-54 Jan June 2017 Course Code MS - 54 Course Title Management Information Systems Assignment Code MS-54/TMA/SEM - I/2017 Assignment Coverage All Blocks To buy MBA assignments please use below link https://ignousolvedassignmentsmba.blog.spot.in/ KIAN PUBLICATION ignousolvedassignmentsmba@gmail.com kianpublication1@gmail.com ignou4you@gmail.com School of Management Studies INDIRA GANDHI NATIONAL OPEN UNIVERSITY MAIDAN GARHI, NEW DELHI – 110 068
  • 2. 1. What is the relevance of the Nolan’s Stage Growth Model for the study of information systems in today’s organisation? Information systems cannot deliver value from --------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------- levels of maturity in dealing with information systems. Nolan has provided a model for such information systems using maturity in organizations. However, empirical evidence is not available in --------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------. This requires a change in the mindset and way of working. Organization culture needs to change to accommodate this ------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------- in dealing with information systems. Nolan's Six-stage Model Nolan (1979) ------------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------The stages are: The structure of the final, six-stage model is depicted in the diagram below: Figure 1: Diagram showing the SGM continuum for growth/maturity The diagram ------------------------------------------------------------------ suggests that:  Stage 1: Evolution ----------------------------------------------- initiation stage.  Stage 2: This is followed ---------------------------------------- IT in a contagion stage.  Stage 3: After -------------------------------------------------- arises.
  • 3.  Stage 4: Next, ------------------------------------------------------------------------ solutions evolves.  Stage 5: Administration/--------------------------------------------------------------------- increasing IT expenditures.  Stage 6: Finally, -------------------------------------------------------------------------------- will occur. Structure ------------------------- Model Stage 1 – Initiation In this stage, -------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------companies for two reasons: (a) The first reason deals with the ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------justifies large investment in specialized equipment. (b) The second reason deals with -------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------, users tend to take a "Hands Off" approach to new technology. This introductory technology is simple ------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------management, and works in a "carefree" atmosphere. Stage 1 key points:  ------------------------------------------------ "Hands Off".  IT personnel are ------------------------------------------- learning".  IT ------------------------------------------------- is lax.  ------------------------------------------ applications to reduce costs. Stage 2 – Contagion Even though computer systems ---------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------by a managerial need to explain the potential of computer applications to alienated users. This leads to the adoption of computers in a range of different areas. Stage 2 presents some difficulties:  Project and ----------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------systems being obtained.  System sophistication ---------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------in higher salaries.  The budget for the -----------------------------------------------------------------, and causes management concern.  Although the price -------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------- is necessary. Stage 2 key points:  ----------------------------------------------------- of applications.  ---------------------------------------------------- about using data processing.  ----------------------------- control --------------------------------- lax.  --------------------------------------- of budgets.  ---------------------------------------- regard the computer as "just a machine".  --------------------------- of computer use throughout the ------------------------------- functional areas.  ------------------------------- is plagued by --------------------- crisis. Stage 3 – Control Stage 3 is a reaction against -------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------for control of computer operating costs. In this stage, project management and management report systems -------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------of computers to management of data resources. This shift:  Is an outcome of the analysis of how ---------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------for data processing operations.
  • 4.  Provides flexibility -------------------------------------------------------------------- new controls. The major ------------------------------------------------------------------------- of data processing operations. Stage 3 key points:  ----------------------------------------- in computer use.  -------------------------------------- importance of the IT division ----------------------------------------.  --------------------------------------------- controls put in place.  ------------------------------------- often incompatible or inadequate.  use of database --------------------------------------------- negative general management reaction.  ------------------------ frustration with the IT --------------------------- provided. Stage 4 – Integration Stage 4 features the adoption of new ---------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------that of Stage 2. In the latter half of Stage 4, exclusive reliance on computer controls leads to ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------in his initial (1973) draft of the stages of growth. Stage 4 key points:  --------------------------------- by the users.  large data ------------------------------------------------ growth.  ---------------------------------------line database facilities.  data processing ----------------------------------- like a computer utility.  formal planning --------------------------------------------- processing.  users more ----------------------------------------------------.  use of -----------------------------------------------, applications financial planning.  data processing has --------------------------------------------------, project management. Stage 5 – Data ---------------------------- Nolan determined that four stages ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------corporate data rather than IT. Like the proceeding Stage 4, it is marked by the development and maturity of the new concept of data administration. Stage 5 key points:  data ad--------------------------- is introduced.  ------------------------------------------, its usage, and its meanings within the whole organisation.  applications -------------------------------------- the organisation.  data processing ------------------------------------------------------- than of machines.  use of term IT/-------------------------------------------- processing". Stage 6 – Maturity In Stage 6, the application portfolios - tasks like -------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------and its information flows. During this stage, tracking sales growth becomes an important aspect. Typically:  10% of the work ---------------------------------------------------------- remote job entry.  60% of the work relates to ------------------------------------------------------- processing.  5% of the ---------------------------------------------------------- computing.  25% of the work -------------------------------------------- processing. Management control systems are estimated as being 40% of Stage 6. There are three aspects of management control; manufacturing, marketing and financial:  ----------------------------------------------- future needs.  Marketing --------------------------------------- with research.  Financial control ----------------------------------------- flow requirements.
  • 5. Stage 6 exercises a high degree ---------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------high levels of efficiency and effectiveness. Stage 6 key points:  systems that ------------------------------------------- needs of the organisation.  use of data resources to ---------------------------------------------------- applications.  data processing --------------------------------------------- as a data resource function.  data processing ---------------------------------------------------- strategic planning.  ultimately, users and DP --------------------------------------------------------- resources within the organization.  manager of IT system takes on the same ----------------------------------------------------- of finance or director of HR. Discussion on significance of model 1. Though Nolan’s Stages of ----------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------- it would probably now be perceived to have several shortcomings and to be old-fashioned or out-of-date. 2. The model had as a main focus the change in IT budget, but critics questioned whether it was “reasonable to assume that a single variable serves as a suitable surrogate for so much." Though it would seem reasonable that this single variable could be an indicator of other variables such as the organisational -------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------that would make that main focus a valid one. 3. Nolan stated that the force ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------are additional factors that should be considered. Most important are the ‘demand-side’ factors that create a ripe environment for technological changes to be considered and adopted." As proposed, --------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------circumstances. Unwarranted change would result in excess costs and potential failure of the process. 4. The Stages of Growth Model -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------naïve from the user perspective. King and Kraemer state, “...the question of whether organizational goals are uniform and consistent guides for the behavior of organizational actors, as opposed to ------------------------------------------------------------------------------------------------------------------ ---------------------------------------------------------attention in the literature on computing.” Clearly, --------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------not subject to change. 5. Thus, though as time has ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------analysis into the growth of IT within organisations. 2. What are the various stages of a system development life cycle and how are the efforts distributed over these phases? The system-development life cycle enables users to transform a newly-developed project into an operational one. The System Development ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------and non-technical activities to deliver a quality system which meets or exceeds a business"s expectations or manage decision-making progression. Traditionally, the systems-development life ------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------to define clearer actions to achieve specific goals. Similar to a project ------------------------------------------------------------------------------------------------------------------------------ ---------------------------------------------under development. The SDLC highlights different ---------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------a given step. It is also used to let them know that at any time, steps can be repeated or a previous step can be reworked when needing to modify or improve the system.
  • 6. Following are the seven phases of the SDLC: Planning --------------------------------------------------------------------------------- ---------------------------- Development (4), Testing (5), Implementation (6) and Maintenance (7) 1. --------------------------- This is the first phase in the systems ---------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------plan (or a feasibility study) for a company"s business initiative to acquire the resources to build on an infrastructure to modify or improve a service. The company might be trying to meet or exceed expectations for their employees------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------ -------------and other items should be considered at this stage. 2. Systems ------------------------ Requirements The second phase is where businesses -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------the best fit for the ultimate goal(s) of the project. This is where teams consider the functional requirements of the project or solution. It is also where system analysis takes place—or analyzing the needs of the end users to ensure the new ----------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------will be responsible for individual pieces of the project, and what sort of timeline should be expected. There are several ----------------------------------------------- to the second phase. They include:  CASE (------------------------------------- Engineering)  Requirements ------------------------------  ------------------------------- analysis 3. -------------------- Design The third phase describes, in detail, ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------place. This is the step for end users to discuss and determine their specific business information needs for ------------------------------------------------------------------------------------------------------ --------------------------------------------------------------------- (networking capabilities), processing and procedures for the system to accomplish its objectives. 4. Development The fourth phase is when the real ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------. This work includes using a flow chart to ensure that the process of the system is properly organized. The development phase marks the ------------------------------------------------------------------------ ---------------------------------------------------------------------------------------------------by instillation and change. Focusing on training can be a huge benefit during this phase. 5. -------------------and Testing The fifth phase involves systems integration ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------design meets the initial set of business goals. Testing may be repeated, specifically to check for errors, bugs and ----------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------, both of which will help ensure the program"s successful completion. 6. Implementation The sixth phase is when the majority --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------the new system into operations, a test run of the system is done removing all the bugs, if any. It is an important phase of a -------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------. The output of the test run should match the expected results. Sometimes, system testing is considered as a part of implementation process. Using the test data following test run are carried out:
  • 7.  Program test  System test Program test : When the ----------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------and validation be checked and any undesirable happening must be noted and debugged (error corrected). System Test : After carrying out the --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------complete system is executed on the actual data. At each stage of the execution, the results or output of the system is analyzed. --------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------in the particular programs are identified and are fixed and further tested for the expected output---------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------to establish that all modules work together correctly as an application or system or package. When it is ----------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------per their requirements. 7. Operations and Maintenance Maintenance is necessary to eliminate -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------enhancement, future functionality and any other added functional features to cope up with the latest future needs. It has been ------------------------------------------------------------------------------- --------------------------------------------------------------------------------time to time. The review of the system is done for:  knowing ------------------------------- system  knowing the ------------------------ requirements  Studying --------------------------------------------. If a major change -------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------above life cycle phases. EFFORT ---------------------------------------------- LIFE CYCLE If a business determines a change is needed ------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------project is a time-consuming process. Even though some steps are more difficult than others, none are to be overlooked. An oversight could prevent the entire system from functioning as planned. Systems development specialists at Innovative Architects possess extensive experience in managing these type of projects. If you have a situation at your organization ---------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------guide you through each of these steps, ensuring you can have your new system online as soon as possible. The distribution of the organisational --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------the efforts are devoted to maintenance after implementation and half the efforts in the system. ------------------------------------------------------------------------------------------------------------------------ ---------------------------------------------------information system before it is implemented. Systems Development Life Cycle (SDLC---------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------of business processes, functional requirements, and economic and
  • 8. technical feasibility. The primary objectives of any SDLC is to deliver quality system which meets or exceed customer expectations and within cost estimates, work ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------of events for conducting system development that is controlled, measured, documented, and ------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------- rooms to add new features to existing software. 3. What are the various ways in which serial transmission can be achieved? Explain each way in detail. In serial transmission, bits are sent sequentially on ---------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------is needed since bits must be assembled and sent as a unit and then disassembled at the receiver. Serial transmission can be either synchronous or asynchronous . -------------------------------- bits are combined into frames and frames are sent continuously with or ----------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------synchronization, to allow for arbitrary size gaps between frames. However, start/stop bits maintain physical bit level synchronization once detected. When transferring data between two ---------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------. Data is transmitted as a single bit at a time using a fixed time interval for each bit. This mode of transmission is known as bit-serial transmission.  In serial transmission, the -------------------------------------- serially one after the other.  It requires only one --------------------------------------------- data from sender to receiver.  Thus all the bits of ------------------------------------------ line in serial fashion.  In serial transmission, --------------------------------------- clock pulse.  As shown in fig., suppose an 8-bit -------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------. The most significant bit (MSB) i.e. 1 will be transmitted in the end via single communication line.  The internal ---------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------are used.  These conversion devices ------------------------------------------------------------------------ over single line.  On receiver side, serial data ----------------------------------------------------------- of computer can accept it • Serial ----------------------------------------------- communication. Advantage --------------------------------- transmission Use of single communication line ---------------------------------------------------------------------- to parallel transmission. Disadvantages of Serial transmission 1. Use of conversion devices at -------------------------------------------------------------- transmission cost. 2. This method is slower ---------------------------------------------------------------- serially one after the other.
  • 9. Examples of serial mode transmission include connections between a computer and a modem using the RS-232 protocol . Although an RS-232 cable can theoretically --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------serial transmission in either direction. In this case, a computer may not be close to a modem, ------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------of serial transmission. Ways of Serial Transmission There are two ways of serial ------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------the beginning and end of the data transmission occurs. Bit -------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------control. 1. Asynchronous Transmission  Asynchronous ------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------sends one byte of data at a time.  Bit ----------------------------------------------------- possible using start bit and stop bit.  Start bit indicates ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------of each byte.  Stop bit indicates the ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------bits, usually 1s are called stop bits.  Addition of start and stop --------------------------------------------------------------- in asynchronous transmission.  There is idle time between the ----------------------------------------------------- is also known as Gap  The gap or idle ------------------------------------------------------------------------------------------------------------------------ ------------------------------------within each byte, receiver must be synchronized with the incoming bit stream. Application of Asynchronous Transmission 1. Asynchronous transmission ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------computer as transmission takes place character by character. 2. Asynchronous --------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------modems. Advantages of Asynchronous transmission 1. This method of data -------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------would be low and idle time will not be expensive. 2. In this approach each ------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------will not be affected. 3. It is possible to --------------------------------------------------------- different bit rates. 4. The transmission ------------------------------------------------------------- becomes available. 5. Moreover, this -------------------------------------------------------- to implement. Disadvantages of asynchronous transmission
  • 10. 1. This method is less --------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------insertion of gaps into bit stream. 2. Successful transmission ---------------------------------------------------- be missed or corrupted. 2. Synchronous Transmission  Synchronous ----------------------------------------------------- and stop bits.  In this method bit --------------------------------------------------------- multiple bytes.  There is no -------------------------------------------------------------- in the data stream. • In the absence of start & ------------------------------------------------------------------------- the transmission of each bit. • Since the various bytes ------------------------------------------------------------------------------------------------------------------------ ---------------------------------------------------original information. • In order to receive the --------------------------------------------------------- at the same clock frequency. Application ------------------------------------------- transmission • Synchronous -------------------------------------------------------------------------------- between computers. Advantage ------------------------------------------ transmission 1. This method is faster as ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------is no gap between the individual data bytes. Disadvantages of Synchronous transmission 1. It is costly as compared to ------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------both ends. This lead to increase in the cost. 2. The sender and receiver have --------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------makes the system complicated. 3. Iso-chronous Iso-chronous is a technique which ------------------------------------------------------------------------------------------------------------ ---------------------------------------------------------------between the transmission of two characters will always be an integer multiple of the length of time required to transmit one ------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------than asynchronous transmission between the end devices. Iso-chronous transmission ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------transmission. A circuit is a path for transmission of --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------; these are simplex, half-duplex and full duplex. In a simplex transmission, signals are -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------of VCR or a Television. Here, the remote control unit sends a signal to the television or VCR to --------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------is a one way road.
  • 11. In half-duplex transmission both the stations ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------is complete from the first station and then it initiates transmission to the first station. In other ----------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------the example of crossing of a narrow bridge. While the cars from one side cross the bridge, the cars on the other side wait. After completion, the cars from the other direction pass over the bridge to the opposite side. In full-duplex transmission both ------------------------------------ is a simple example of full duplex transmission. Half-duplex operation is possible on both two----------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------must deal with turn around time, i.e.,. the time required to change the direction. During that time -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------full duplex transmission on two-wire circuits. 4. List the five problems which may motivate an organization to move toward the database approach. Explain the significance of each one to a manager to an organization. Since computer professionals have ------------------------------------------------------------------------------------------------------------ ---------------------------------------------------------------may think it must be embraced at any cost for their organization to remain efficient, modern, and competitive. Neither position is entirely acceptable, yet both contain some truth. Growing recognition of data as a valuable --------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------Management" which have responsibility for data processing, management information systems, ------------------------------------------------------------------------------------------------------------ ---------------------------------------------------------------top management and users to change the way they view the EDP department. Several problems may motivate --------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------in an inability to get something done, or do economically, quickly, and accurately. Though this need may initially justify ------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------------must look at the application environment and the data processing requirements from a global perspective. Five major ---------------------------------------------- approach: 1. Inability to get --------------------------------------" ad hoc requests. 2. High d----------------------------------------t costs. 3. Low res------------------------------ to change. 4. Low ---------------------------------------------- quality. 5. Inadequate data model of the real world. 1. Inability to --------------------------------------" ad hoc requests.
  • 12. In the lack of proper database ------------------------------------------------------------------------------------------------------------------ ---------------------------------------------------------made by client or customers as database was managed manually and it was time consuming and hectic work. A lot of request came ----------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------big problem for the organizations and because of that they decided to move towards database approach. 2. High development costs In lack of database ------------------------------------------------------------------------------------------------------------------------------- --------------------------------------------Searching data was also a time consuming process. Maintaining record was also costly that why we can say that development cost ---------------------------------------------------------- approach. 3. Low ------------------------------ change. It was become necessary for ------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------and to give quick response, and to manage large data, thus responsiveness for any change became low. Managers strongly --------------------------------------------------- to move towards database approach. 4. Low ----------------------------------------- and quality. Without good database approach data -------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------or improve quality of data and also big threat of data security. These were some issues which forced organizations to move towards good database management system. 5. Inadequate -------------------------------- real world. Another problem faced by ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------managers faced difficulties an organizing and manipulating data from records. These are common five problems which forced organizations to move towards good database management approach. Management and organizations ---------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------computer based information systems. MIS uses computer technology to provide information and ------------------------------------------------------------------------------------------------------------------------ ---------------------------------------------------management style. Computer technology, --------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------machine system for providing information to support operations, management, analysis, and decision making ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------and decision making and a data base. Managers at all levels use ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------, external as well as internal, future oriented as well as historical and covering a longer span time. An effective MIS cannot -------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------not effectively use DBMS technology until two decades before. An important key to a successful MIS is the effective management of an organization’s data resources. Role of ----------------------------------- an Organization: An organization is traditionally ---------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------and policy making in top management. The corporate database contains data relating to the organization, its operations, its plan and its environment.
  • 13. State of Database ----------------------------- Organizations: The needs of organizations --------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------authorities, federal securities agencies and legislators making privacy laws. Both internal and external forces demand that organizations exercise control over their data resources. Decisions and actions in the -------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------and produce plans and expectations which are formally captured and stored in the -------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------a current image. People in the organization ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------plans and expectations. The corporate database provides data for modeling and forecasting which -------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------and the management process. While management seeks ----------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------instance, computer applications begin to penetrate into higher management levels. With comprehensive ---------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------, an organization must appoint a DBA to manage its data resources. While an organization’s ------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------fall substantially short of ideal capabilities, making their acquisition an interim measure - a move to help ----------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------for large organizations with special needs, such as a very large database or large volumes of known transactions requiring rapid online response. Data is a vital resource in an ------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------of a data processing system, attention to data has lagged behind the development of machines and ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------and application systems which use it. Four major ---------------------------------------------------------------------------------------------------------------------------------------- -----------------------------------the new technology. 1) Increase in --------------------------------------------------------------------- products 2) Recognition of relational ------------------------------------------------------------------- needs of organisation. 3) Emergence of ---------------------------------------------------------------------- business Requirements. 4) Increasing possibility of ------------------------------------------------------ of relational databases. 5. (a) “Compute virus is a major threat to compute security.” Justify the statement. We all know that there are ---------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------. They just use computers for work and entertainment. This computer threats overview will give you the basic ------------------------------------------------------ protect yourself from common threats. Viruses: One of ------------------------------------- Threats A computer virus is a small program --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------viruses. Not all of them are particularly troublesome, but some of them can cause significant damage, ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------email attachments and download from malicious web sites. Trojans: the ------------------------------------------ Threats
  • 14. If you use an operating -------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------small viruses that hide within other programs. They can essentially exist anywhere. Funny pictures, illegal downloads, and ------------------------------------------------------------------------------------------------------- ---------------------- programs may disable antivirus software and remove firewalls. Worms: The ------------------------------------- Threats Worms are similar to viruses in that ---------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------programs use the internet to search for vulnerable computers. Once they locate them, they move in. The ---------------------------------------------------------------------------------------------------------- ---------------------------------------------programs can clog networks and can make loading web pages take a long time. Spyware: ----------------------------------------- Computer Spyware might seem like viruses, ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------. This common threat is usually contracted through peer-to-peer file sharing. If you download music, movies, or ------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------your computer to change your homepage, add additional programs and can cause your computer to crash. A computer virus is a type of malicious ---------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------- by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus. The -------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------viruses along with many other forms of malicious software, such as - ------------------------------------------------------------------------------------------------------------------------------------------------------ -------------------- malicious software. The majority of active malware ---------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------- in 1985, is a misnomer. Viruses often perform some type of harmful activity on infected host computers, such as ------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------data, displaying political or humorous messages on the user's screen, spamming their e-mail contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a ------------------------------------------------------------------------------------------------------------------------------------ ---------------------------------------which install themselves without user consent. What are the ------------------------------------- virus? Your ------------------------------------------- any of these malware symptoms:  Slow ----------------------------------------------  Erratic -----------------------------------ehavior  ------------------------------data loss  Frequent ------------------------- crashes Computer Virus Help: ------------------------------------- virus protection? When you arm yourself with ------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------with the best computer virus protection: Make sure that you have the best security software products installed on your computer:  Use antivirus --------------------------------- a firewall  Get a-------------------------------- software  Always keep ----------------------------------------- software up-to-date  Update ------------------------------------------------ regularly  Increase ------------------------------------------------ settings  Avoid ----------------------------------------------- Web sites  Only download ------------------------------------------------------------------- applications before downloading them.
  • 15. Practice --------------------------------------- protocol:  Don't open ------------------------------------------------------------ senders  Immediately -------------------------------------------------- to be spam An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in and out of your computer and hide your PC from -------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------protection from the two most dangerous threats on the Internet – spyware and computer viruses. They thwart threats before they ------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------the most damaging and devious strains. While free antivirus downloads are ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------forms of can often do the most damage, so it’s critical to have up-to- the-minute, guaranteed antivirus protection. ======================================================================================= (b) Why should there be law against benign computer virus maker? What harm can it cause to your computer? There should be strong law against virus ----------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------- to gain access to their hosts' computers and computing resources. The vast majority of viruses target systems running Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth --------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cyber security issues, artificial life and evolutionary algorithms. Computer viruses currently cause billions of dollars' worth of ----------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------In response, free, open-source antivirus tools have been developed, and an industry of ---------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security ----------------------------------------------------------------- -------------------------------------------------------------------------------------------have already become widely distributed. These computer threats can cause lots of problems------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------------account numbers, passwords, and credit card numbers. This makes it much easier for them to commit fraud --------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------your bank accounts, sign up for credit cards in your name, or even purchase high ticket items from online retailers. Other viruses take over small parts of your -------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------requests until their owners pay off the criminal to regain control of his or her site. Chances are that you won’t see these activities taking place. Your computer or internet connection, however, will usually slow down: a ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------, installing a network firewall and using antivirus and antimalware programs. Free programs include SVG antivirus and Malware bytes. A computer virus crime usually involves the ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------is just general cybercrime legislation. In the United States, the distribution of a virus that affects ------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------Morris computer worm case, there have been other successes. In December of 1999, David L. Smith pleaded guilty to -------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------prison and a $250,000 fine. The "Melissa" virus was so devastating and widespread that it affected both computers belonging to individuals and those belonging to the government. This is ----------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------be stricter when dealing with personal computers. As evident, the legal implications of computer ---------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------the writing of viruses is not an offence in itself. In others
  • 16. even the sharing of virus code between anti-virus researchers could potentially be considered an offense. To make matters more ----------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------or her action under a very different legal system. The newsgroup alt.comp.virus ----------------------------------------------------------------------------------------------------------------- ------------------------------------------------------- or distribution may be found to be illegal:  Unauthorized access - you may --------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------a virus which infects that machine.  Unauthorized modification - this ---------------------------------------------------------------, or partition sector.  Loss of data - this -------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------public safety  Incitement - includes ------------------------------------------------------------, and virus engines.  Denial --------------------------------------------------------------------  Application of any of ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------has an interest. The question of distribution is an interesting ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------they are getting into, can the distributor be held accountable? The consensus is that if the file is labeled then the person will probably not face criminal charges, although he or she may be sued for damages. The distributor could also ------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------these media practically force viruses onto people who do not know what they are receiving. In addition, --------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------the virus was spread due to "carelessness". Laws Still Need to Improve Although legislation against computer ------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------computer college student accused of having released the "I Love You" virus that attacked email systems around the world and caused an estimated $10 billion in damages. The reason for the dismissal of the charges was the lack of applicable legislation --------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------could not be applied retroactively to the "Love Bug" author. Unfortunately, this is not an isolated incident. According to the report "Cyber Crime and Punishment?", conducted by the technology management --------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------does not yet reach across the global Internet, “stated Bruce McConnell, president of McConnell International. "Organizations must rely on their own defences for now." So what is being done to improve the --------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------in Europe, released its draft Convention on Cyber-Crime. This represents the first multiparty attempt to address the --------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------on Unlawful Conduct on the Internet. The group, chaired by the Attorney General, was created in order to provide an initial analysis of legal and policy issues surrounding the misuse of the Internet. There seems to be a common --------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------. Cybercrime is a problem that defies all borders and boundaries, hence so must the law enforcement tools used against it. To buy MBA assignments please use below link https://ignousolvedassignmentsmba.blog.spot.in/