Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
MANAGEMENT INFORMATION       SYSTEM          JUNE-JULY 2011   Presented by:- Acharya Pradeep
   External forces:-   Cut throat competition   Insistence on customization   Continuous tech-breakthrough   Changing...
 Internal factors:- Pressure to increase effectiveness Understanding of cognitive behaviour Need of knowledge intensiv...
B] mis system means computers?Discuss.
Information Systems5        Why Do People Need Information?            Individuals - Entertainment and enlightenment    ...
Components of informationsystem/ model              Control of sys                  perf                   proc        i/p...
System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of c...
C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLE                                              ...
5. B] advantages and disadvantagesof ERP?
ADVANTAGES OF ERP•   Better management•   Planning•   Customer satisfaction•   Decision making•   Transparency
 Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carrie...
   Inadequate requirements definition   Poor ERP package selection   Inadequate resources   Miscalculation of time and...
   Misfit of application software with business    process   Inadequate training and education   Poor project design an...
7].B distinguish between systemsoftware and application software?
Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instructio...
Types of software1)   System software     Includes programs that are designed carry out     general routine operation such...
 Operating Software Programming language translator Utility programs Performance monitoring software Communications s...
Application softwaresTypes:Application specific softwareGeneral purpose application software.Eg:  1)Office productivity ap...
Q No. 5(c)Various network securitiesdefences that must be placed inIT? Roll of firewall?
PREVENTIONMETHODS
Control against Salami Attack:   If proper auditing of accounts is done then    salami attack can be easily caught.   If...
          Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user...
ELECTRONIC SIGNATURES   Electronic signatures are used to authenticate    electronic records.   Digital signatures are o...
EMAIL MONITORING   Employers should be aware   Org has to secure information such as trade    secrets, intellectual prop...
   To keep sensitive data secure   To make a complex password use numbers ,    letters ,and symbols
Safe surfing Means:   keeping ones email address private   not chatting in an open system   visiting secure sites   a...
 Frequent virus checks   Floppy disks , CD ROM, pen drives must be    scanned before running
 Checks inflow of mails to inbox Suspicious mails are preventedEmail filters
General information to beprotected from virus   Do not download from untrustworthy sources   Before start trading files ...
    Set computer in a safe way so it will not auto    launch files, updates, security checks, html    pages, cookies etc ...
Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------
Management information system question and answers
Prochain SlideShare
Chargement dans…5
×

Management information system question and answers

41 107 vues

Publié le

Publié dans : Business, Technologie
  • Login to see the comments

Management information system question and answers

  1. 1. MANAGEMENT INFORMATION SYSTEM JUNE-JULY 2011 Presented by:- Acharya Pradeep
  2. 2.  External forces:- Cut throat competition Insistence on customization Continuous tech-breakthrough Changing capabilities of business partner
  3. 3.  Internal factors:- Pressure to increase effectiveness Understanding of cognitive behaviour Need of knowledge intensive work Need to move to sharable inteligence
  4. 4. B] mis system means computers?Discuss.
  5. 5. Information Systems5  Why Do People Need Information?  Individuals - Entertainment and enlightenment  Businesses - Decision making, problem solving and control MIS 715 Eaton Fall 2001
  6. 6. Components of informationsystem/ model Control of sys perf proc i/p essi o/p ng Data processing Network resources
  7. 7. System ?????? Generally used for group of actions, personnel & procedures, used for processing data Non involvement of computers – manual systems Group of interrelated or interacting elements forming a unified whole.
  8. 8. C] Steps in system analysis and design (SDLC) SYSTEM DEVELOPMENT LIFE CYCLE Analyse Identify Test And Collection &Problem Alternative Implement Data & SelectDefinition Solutions Infrmn Best YES Evaluate Successful Stop Solution NO
  9. 9. 5. B] advantages and disadvantagesof ERP?
  10. 10. ADVANTAGES OF ERP• Better management• Planning• Customer satisfaction• Decision making• Transparency
  11. 11.  Information Utilization of human resource Alert decision or action Fast process Faster communication Changes carried out easily
  12. 12.  Inadequate requirements definition Poor ERP package selection Inadequate resources Miscalculation of time and efforts
  13. 13.  Misfit of application software with business process Inadequate training and education Poor project design and management
  14. 14. 7].B distinguish between systemsoftware and application software?
  15. 15. Software refers to a program that makes the computer to do something meaningful. It is the planned step-by-step instruction required to turn data into instruction.SOFTWARE
  16. 16. Types of software1) System software Includes programs that are designed carry out general routine operation such as loading a file, copying a file, managing memory resources Etc. It provides support to Running of other software Communicating with peripheral devices development of other software Monitoring the uses of various hardware resources.
  17. 17.  Operating Software Programming language translator Utility programs Performance monitoring software Communications softwares
  18. 18. Application softwaresTypes:Application specific softwareGeneral purpose application software.Eg: 1)Office productivity applications 2)Hypermedia and multimedia 3)Groupware 4)Virtual Reality 5)3D Geographic software
  19. 19. Q No. 5(c)Various network securitiesdefences that must be placed inIT? Roll of firewall?
  20. 20. PREVENTIONMETHODS
  21. 21. Control against Salami Attack: If proper auditing of accounts is done then salami attack can be easily caught. If proper rounding operation is done then Salami attack will not exist. If proper testing is done by the user it can be prevented.
  22. 22.  Firewalls Protect from unauthorized access Provide access to only known users Allow the people whom the user permit
  23. 23. ELECTRONIC SIGNATURES Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – Signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures
  24. 24. EMAIL MONITORING Employers should be aware Org has to secure information such as trade secrets, intellectual property, customer , employee and financial data
  25. 25.  To keep sensitive data secure To make a complex password use numbers , letters ,and symbols
  26. 26. Safe surfing Means: keeping ones email address private not chatting in an open system visiting secure sites accepting data from only known users downloading carefully & from known sites
  27. 27.  Frequent virus checks Floppy disks , CD ROM, pen drives must be scanned before running
  28. 28.  Checks inflow of mails to inbox Suspicious mails are preventedEmail filters
  29. 29. General information to beprotected from virus Do not download from untrustworthy sources Before start trading files ensure your client has a safe system Don’t download E mail until you are 100% sure If email has an attachment with email go to headers and look---------- If pif or src extension or .jpg.scr extension it is a virus
  30. 30.  Set computer in a safe way so it will not auto launch files, updates, security checks, html pages, cookies etc without your permission Get a quality spyware program Set up software firewall and make sure all in LAN are set up it Set up hard ware fire wall ie easy to set up
  31. 31. Don’t let kid on the net on your system if you don’t protect your system nobody else will------------------

×