MIS 2 Marks

28
MANAGEMENT INFORMATION SYSTEMS 2 Marks UNIT I 1. Define MIS. A management information system (MIS) is a system or process that provides information needed to manage organizations effectively. An 'MIS' is a planned system of the collecting, processing, storing and disseminating data in the form of information needed to carry out the functions of management. 2. Goals of MIS Provide managers with information Regular, routine operations Control, organize and plan better 3. Benefits of MIS Effective and efficient coordination between Departments Quick and reliable referencing Access to relevant data and document Use of less labour Improvement in organizational and departmental techniques Management of day-to-day activities 4. Data Data is the raw material in the production of information. It represents a fact; a number, a statement, or a picture. A single piece of data has no meaning unless the context is understood. 5. Information Information is the data that have meaning within a context. Data in relationships and pattern gives information. Data after manipulation is called information. 6. Knowledge 1

Transcript of MIS 2 Marks

Page 1: MIS 2 Marks

MANAGEMENT INFORMATION SYSTEMS2 Marks

UNIT I

1. Define MIS.A management information system (MIS) is a system or process that provides information needed to manage organizations effectively. An 'MIS' is a planned system of the collecting, processing, storing and disseminating data in the form of information needed to carry out the functions of management.

2. Goals of MIS• Provide managers with information• Regular, routine operations• Control, organize and plan better

3. Benefits of MIS• Effective and efficient coordination between Departments • Quick and reliable referencing• Access to relevant data and document• Use of less labour • Improvement in organizational and departmental techniques• Management of day-to-day activities

4. Data Data is the raw material in the production of information. It represents a fact; a number, a statement, or a picture. A single piece of data has no meaning unless the context is understood.

5. InformationInformation is the data that have meaning within a context. Data in relationships and pattern gives information. Data after manipulation is called information.

6. KnowledgeKnowledge is seen as a dynamic human process of justifying personal beliefs as part of an aspiration for the “truth”. Knowledge is the acquisition and even the understanding that one has acquired information.

7. Intelligence

1

Page 2: MIS 2 Marks

Intelligence is the processes and the products that lead to understanding and taking decisions related to reality. Intelligence is a way of manipulating information.8. Information TechnologyInformation technology (IT) is concerned with technology to treat information. It is a contemporary term that describes the combination of computer technology (hardware and software) with telecommunications technology. (Data, image and voice networks)

9. Information SystemAn information system (IS) is an arrangement of people, processes, data, and technology that interact to collect, process, store and provide as output the information needed to support an organization.

10. Transaction Processing SystemTransaction Processing Systems (TPS) are operations support systems that record and process data resulting from business transactions. Process data resulting from business transactions, update operational databases, and produce business documents. They process transaction in to two basic ways. In batch processing, transactions data are accumulated over a period of time and processed periodically. In real time processing, data are processed immediately after a transaction occurs.

11. Decision Support Systems DSS give direct computer support to managers during the decision making process. For example, an advertising manager may use a DSS to perform a what-if analysis as part of a decision to determine where to spend advertising dollars.

12. Executive Information System EIS provide critical information from a variety of internal and external sources in easy – to – use displays to executives and managers. For example, top executives may use touch screen terminals to instantly view text and graphics that highlight key areas of organizational and competitive performance.

13. System AnalystA systems analyst is responsible for searching, planning co-ordinating and recommending software and system choices to meet an organisation’s business requirements.

2

Page 3: MIS 2 Marks

UNIT II1. System analysisSystem analysis is a process of investigating a system, identifying problems and using the information to recommend improvements to the system. Here the responsibility includes only requirement determination, not the design of the system.

2. System DesignSystem design is a process of designing a new system based on the user requirements and the detailed analysis of the existing system. It is the most crucial phase in the developments of a system. The logical system design arrived at as a result of systems analysis is converted into physical system design.

3. System Analysis Vs System DesignSystem Analysis System Design

System analysis describes what a system should do to meet the information needs of users

Systems design specifies how the system will accomplish this objective

Analyze the resources, products and activities of any information systems presently used

Develop general specification for how input, processing output storage and control activities.

Determine the information system capabilities that will meet the information needs of an end user.

Develop detailed specification for user interface products and methods, database structures and processing and control procedures.

Document and communicate the logical input, processing and output storage and control requirements of a proposed new or improved information system

Document and communicate the detailed specification of the proposed system to end user.

4. DFDA data flow diagram (DFD) is a design tool to represent the flow of data through an information system. A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects.

5. ER DiagramThe Entity-Relationship (ER) model is a conceptual data model, capable of describing the data requirements for a new information system in a direct and easy to understand graphical notation.

6. EntitiesEntities represent classes of objects (facts, things, people,...) that have properties in common and an autonomous existence.

3

Page 4: MIS 2 Marks

7. AttributesAttribute describe the elementary properties of entities or relationships.For example, Surname, Salary and Age are possible attributes of the Employee entity.

Attributes Example

8. Data DictionaryIn database management systems, a file that defines the basic organization of a database is called Data Dictionary. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field.

9. PseudocodePseudocode is a compact and informal high-level description of a computer programming algorithm that uses the structural conventions of a programming language, but is intended for human reading rather than machine reading.

Ex: IF <condition> DO stuff; ELSE DO other stuff;

10. Data flow diagramsA data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing.

Ex:

4

Page 5: MIS 2 Marks

11. Data dictionariesA data dictionary is an integral part of a database, which holds information about the database and the data that it stores.

12. NormalisationDatabase normalization is the process of removing redundant data from the tables in order to improve storage efficiency, data integrity, and scalability.

13. Object ModelingObject modeling is the technique for identifying objects within the system environment, and the relationships between those objects.

13. DBMSA collection of programs that enables one to store, modify, and extract information from a database.

14. DatabaseA database is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databases can be classified according to types of content: bibliographic, full-text, numeric, and images.

15. RDBMS RDBMS is a DBMS in which data is stored in tables and the relationships among the data are also stored in tables. The data can be accessed or reassembled in many different ways without having to change the table forms.

Relation – TableTuple -Record/RowAttributes - Field/Columns Domain - Set of valid values of attributesDegree -Number of columns in a tableCardinality -Number of rows in a table

16. Primary keyThe column or set of columns which can uniquely identify every row in a table is termed as a Candidate key. Every candidate key satisfies the following two properties. 1. Uniqueness-No two rows have the same value for the column or the set of columns. 2. Minimality-None of the columns can be removed from the key without violating the uniqueness property.

17. Foreign keyIt is possible for one table to contain a column, or a set of columns, that contains data elements values drawn from the same domains as the

5

Page 6: MIS 2 Marks

columns that form the primary key of some other table. This column or set of columns is called the Foreign key.

18. Candidate keyCandidate key is a column in a table which has the ability to become a primary key. 

19. Alternate KeyAny of the candidate keys that are not part of the primary key is called an alternate key. 

20. Secondary key: Alternate of primary key. 

21. Benefits of SDLC Proven framework Facilitates information exchange Defines and focuses roles and responsibilities Pre define degree of precision Enforced planning and control

22. Tools for System Design Flowchart Data Flow Diagram Structured English Decision Table Decision Tree

23. SystemA system is a group of interrelated components working together towards common goals by accepting inputs and producing outputs in an organized transformation process. 24. Object Oriented DBMSAn object oriented database management system (OODBMS) is a database management system that supports the modeling and creation of data as objects.

25. SQLSQL often referred as structured query language is a database computer language designed for managing data in relational database management systems and originally based upon relational algebra.

26. MiddlewareMiddleware is computer software that provides services to software applications beyond those available from the operating system. Middleware can be described as "software glue" that binds between the software component.

6

Page 7: MIS 2 Marks

UNIT III

1. HRISThe Human Resource Information System (HRIS) is a software or online solution for the data entry, data tracking, and data information needs of the Human Resources, payroll, management, and accounting functions within a business.

2. DSSDecision support systems (DSS) are computer-based information system that supports business or organizational decision-making activities. DSS serve the management, operations and planning levels of an organization and help to make decisions.

3. Knowledge Management Systems (KMS)KM is a process of capturing and making use of firm’s collective expertise anywhere in business – on paper, in document, in database or in people’s head. Knowledge management is about connecting people to people and people to information to create competitive advantage.

4. Knowledge Knowledge is nothing but application of data and information; answers "how" questions. Knowledge is the appropriate collection of information, such that its intent is to be useful.

5. Artificial IntelligenceThe sub-field of computer science concerned with understanding the concepts and methods of human reasoning, and the application of this understanding to the development of computer programs that exhibit intelligent behavior.

6. Knowledge GapThe difference between what the enterprise requires and what it currently has is called the Knowledge gap.

7. Explicit KnowledgeThe knowledge that individuals are able to express fairly, easily using language or other forms of communication are called explicit knowledge.

8. Tacit KnowledgeTacit knowledge is difficult to express and formalize and therefore difficult to share. Tacit knowledge is more likely to be personal and based on individual experience and activities.

7

Page 8: MIS 2 Marks

8

Page 9: MIS 2 Marks

9. ExternalizationExternalization involves converting tacit knowledge into explicit forms such as words, concepts, visuals or figurative language. Externalization also helps translate individuals’ tacit knowledge into explicit forms that can be more easily understood by rest of their group.

10. InternalizationInternalization is the conversion of explicit knowledge into tacit knowledge. It represents the traditional notion of learning. 11. SocializationSocialization facilitates the sharing tacit knowledge in cases in which new tacit knowledge is created as well as new tacit knowledge is not created.

12. RoutinesRoutines involve the utilization of knowledge embedded in procedures, rules and norms that guide future behavior. Routines economize on communication more than directions because they are embedded in procedures or technologies.

13. DirectionDirection refers to the process through which individuals possessing the knowledge, direct the action of another individual without transferring to that person the knowledge underlying the direction. Direction is the process used when a production worker calls experts to ask them how to solve a particular problem with a machine and then proceeds to solve the problem based on the instructions given the experts.

14. International Information System (IIS):Distributed information systems which support similar business activities in highly diverse environments commonly found across country boundaries is called International Information System.

15. Geographic Information System (GIS)A geographic information system is a system designed to capture, store, manipulate, analyze, manage, and present all types of geographical data. GIS allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts.

16. Characteristics of DSSIt integrates data and models so that it is easier for managers to make good decisionsIt support wide variety of decision makingIt allows the user to query the system for a specific answer.

9

Page 10: MIS 2 Marks

UNIT IV

1. Information SecurityInformation security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.

2. Data ValidationData validation is the process of ensuring that a program operates on clean, correct and useful data. It checks for validity, correctness and security of the data.

3. TamperingWhen a message is sent, sender usually wants it to arrive unaltered. Tampering is altering the message in between the sender and the receiver.

4. Denial of ServiceDenying the service to the authorized user by the attacker is called denial of service (DOS)

5. ConfidentialityConfidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems.

6. IntegrityIn information security, integrity means that data cannot be modified without authorization. Example: When a employee is able to modify his own salary in a payroll database.

7. AuthenticityThe process of ensuring the data, transactions, communications or documents (electronic or physical) are genuine is called authenticity. It is also important for authenticity to validate that both parties involved are who they claim they are.

8. Software testingSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing is any activity aimed at evaluating an attribute or capability of a program or system and determining that it meets its required results.

9. Unit testingUnit testing refers to tests that verify the functionality of a specific section of code, usually at the function level. Unit testing is also called

10

Page 11: MIS 2 Marks

component testing. Unit testing is a method by which individual units of source code, sets of one or more computer program modules are tested to determine if they are fit for use

10. Integration testingIntegration testing is any type of software testing that seeks to verify the interfaces between components against a software design. Software components may be integrated in an iterative way or all together ("big bang") and testing can be done.

11. System testingSystem testing tests a completely integrated system to verify that it meets its requirements.

12. System integration testingSystem integration testing verifies that a system is integrated to any external or third party systems defined in the system requirements. Strategies for integrating components in to a functioning product include the bottom up strategy and top down strategy.

13. Regression testingRegression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regressions, or old bugs that have come back.

14. Acceptance testingAcceptance testing performed by the customer, often in their lab environment on their own hardware, is known as user acceptance testing (UAT). The quality and fitness of the software will be tested by the user.

15. Computer CrimesComputer crime or cyber crime is unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.

16. Unauthorized accessUnauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

17. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack

11

Page 12: MIS 2 Marks

the target computer. They possess the desire to destruct and they get the kick out of such destruction.

18. Trojan Horse It is a program that act like something useful but do the things that are quiet damp. Trojan horse means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e-mail.

19. Virus A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.

20. WormPrograms that multiply like viruses but spread from computer to computer occupying the entire space of the computer are called as worms. Worms make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.

21. Email spoofingEmail spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.

22. Email spammingEmail "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.

23. Email bombingE-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address. This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. 

24. Data diddlingThis kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.

25. Salami attacksThis kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.g. the Ziegler case wherein a logic bomb was introduced in

12

Page 13: MIS 2 Marks

the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.

26. Logic bombsThese are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date.

27. Web jackingThis term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money.

28. FirewallsFirewall is a software or hardware or combination of both that prevents unauthorized users from accessing private networks. The two types of Firewalls are proxies and stateful inspection.

29. Intrusion Detection SystemIt is a device that monitors vulnerable points in network to detect and determine unauthorized intruders.

30. EncryptionCoding and scrambling of messages to prevent their access without authorization.

31. Digital signature: Digital code attached to electronically transmitted message to uniquely identify contents and sender. A Digital Signature means authentication of any electronic record by a subscriber by means of an ‘electronic method.’ It is using a combination of ‘Public Key’ and a ‘Private Key’, which convert the message into digital form. A private key will create a digital signature and one can use the public key to verify the digital signature.

13

Page 14: MIS 2 Marks

32. Digital certificateIt is an attachment to electronic message to verify the sender and to provide receiver with means to encode reply

33. Secure Electronic Transaction (SET)It is a standard for securing credit card transactions over Internet and other networks. It uses digital certificates, issued to merchants and other business and customers, to perform a series of security checks verifying that the identity of customer or sender of information is valid.

34. AntivirusVirus is program codes that introduce malicious logic into computer systems. Ex: worms, virus, Trojan horse etc. Antivirus software is specially written to defend a system against the threats that malware presents.

35. Biometric SecurityBiometric authentication uses the unique characteristics of individual users, such as fingerprints or retinal patterns, to grant access to resources. This is typically used in high security situations, such as defense installation.

36. IntranetIntranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data sharing capability and overall knowledge base of an organization's employees.

37. Wireless NetworkThe word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between

14

Page 15: MIS 2 Marks

sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.

38. TCP/IPThe Protocol used to connect a number different networks designed by different vendors into a network of networks (the "Internet"). IP - is responsible for moving packet of data from node to node. TCP - is responsible for verifying the correct delivery of data from client to server.

39. RouterA router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. 

40. DNS ServerThe Domain Name System (DNS) is a standard technology for managing the names of Websites and other Internet domains. DNS technology allows you to type names into your Web browser like compnetworking.about.com and your computer to automatically find that address on the Internet.

41. Local Area NetworkA Local Area Network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.

42. Wide Area NetworkA Wide Area Network (WAN) is a telecommunication network that covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries).

43. Value Added NetworkVAN is a simple communications network that offers additional services such as message routing and stock quote service.

44. Metropolitan Area NetworkA metropolitan area network (MAN) is a computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area Networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks (or WAN) and the Internet.

45. BluetoothBluetooth is a specification for the use of low-power radio communication to wirelessly link phones, computers and other network devices over short

15

Page 16: MIS 2 Marks

distances. Bluetooth technology was designed primarily to support simple wireless networking of personal consumer devices and peripherals, including cell phones, PDAs and wireless headsets.

46. Software AuditA software audit provides an independent evaluation of software products or processes to ascertain compliance to standards, specifications, and procedures based on objective criteria.

47. Information EthicsInformation ethics is the field that investigates the ethical issues arising from the development and application of information technologies.

48. Computer Ethics defined as the application of classical ethical principles to the use of computer technology.

49. Intellectual property (IP)IP is a term referring to a number of distinct types of creations of the mind for which property rights are recognized and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs.

50. PatentsA patent is a set of exclusive rights granted by a state (national government) to an inventor or their assignee for a limited period of time in exchange for a public disclosure of an invention. 

51. CopyrightsCopyright is a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work, including the right to copy, distribute and adapt the work.

52. TrademarksA trademark is typically a name, word, phrase, logo, symbol, design, image, or a combination of these elements.A trademark may be designated by the following symbols:

™ - for an unregistered trade mark, that is, a mark used to promote or brand goods

℠  - for an unregistered service mark, that is, a mark used to promote or brand services

® - for a registered trademark

53. Software metricsA software metric is a measure of some property of a piece of software or its specifications.

16

Page 17: MIS 2 Marks

Benefitsi. Measurement helps managers to identify, prioritize, track and

communicate project issues at all levels within the organization.ii. Metrics can accurately describe the status of software project

processes and products. iii. Metrics provides an effective rationale for selecting the best

alternatives.

54. Cyber stalkingCyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.

17

Page 18: MIS 2 Marks

UNIT 5

1. e-business Electronic business, commonly referred to as "eBusiness" or "e-business", or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. It constitutes the exchange of products and services between businesses, groups and individuals.

2. Models / Types of E-Commerce 1. Business to consumer (B2C)2. Business to Business (B2B)3. Business to Government (B2G)4. Consumer to consumer (C2C)5. Consumer to business (C2B)

3. E-Business VS E-CommerceE-Commerce E-Business

E-commerce describes the process of buying, selling, transferring or exchanging products, service, and or information via computer networks including the internet.

Compared with e-commerce, e-business is more generic term; it refers not only to information exchanges related to buying and selling but also to servicing the customers and collaborating with business partners, distributors and suppliers.

E-commerce can take several forms depending on degree of digitization. The degree of digitization relates to:

The product The process The delivery agent

E-business encompasses sophisticated B2B interactions and collaboration activities at a level of enterprise applications and business process.

4. M-CommerceIt refers to use of mobile devices for conducting the business transactions.

5. Objectives of e-governance To support and simply governance for all stakeholders - government,

businesses and citizens To increase the efficiency and speed in a transparent manner To interconnect citizens, businesses and government to save

significant cost Citizens have access to information and knowledge about the political.

18

Page 19: MIS 2 Marks

6. ERPERP or Enterprise Resource Planning systems are software systems for businesses management encompassing modules supporting functional areas such as sales and marketing, finance, production, distribution accounting, human resource management, maintenance, inventory management, project management, transportation and e-business etc

7. ERP Packages ERP is a commodity -- product in the form of software SAP, Oracle Applications, PeopleSoft, JD Edwards, Greatplains etc.

are world’s leading ERP packages The market leader is “SAP”

8. Merits of ERP Ensure quicker processing of information and reduce the burden of

paperwork. Serving the customers efficiently by way of prompt response and

follow up Disposing Queries immediately and facilitating payment from

customers Help to control data and facilitates the necessary contacts to acquire

the same.

9. SCM - Supply Chain ManagementA supply chain is a system of organisations, people, technology, activities, information and resources involved in moving a product or service from supplier to customer. Supply chain activities transform natural resources, raw materials and components into a finished product that is delivered to the end customer

10. Datawarehousing A data warehouse (DW) is a database used for reporting and analysis. Data warehousing is storing data effectively so that it can be accessed and used efficiently. A data warehouse is a centralized database that captures information from various parts of an organization's business processes.

11. DataMart: A departmental data warehouse that stores only relevant data.

12. Operational Data Stores (ODS): A type of database often used as an interim area for a data warehouse, especially for customer information files

13. MetaData: Data about data. In a data warehouse, metadata describe the contents of a data warehouse and the manner of its use.

19

Page 20: MIS 2 Marks

20

Page 21: MIS 2 Marks

14. Extraction, Transformation, and Load (ETL): A data warehousing process that consists of extraction (i.e., reading data from a database), transformation (i.e., converting the extracted data from its previous form into the form in which it needs to be so that it can be placed into a data warehouse or simply another database), and load (i.e., putting the data into the data warehouse)

15. Data MiningData Mining is an analytic process designed to explore data in search of consistent patterns and systematic relationships between variables, and then to validate the findings by applying the detected patterns to new subsets of data. The ultimate goal of data mining is prediction.

16. Business IntelligenceBusiness intelligence is the processes, technologies, and tools that help us change data into information, information into knowledge and knowledge into plans that guide organization.

17. List various Business Intelligence tools Spread sheets Reporting and querying OLAP Digital Dashboards Data mining Process mining

18. Pervasive ComputingPervasive Computing means “Convenient access, through a new class of applications, to relevant information with the ability to easily take action on it when and where you need to.” It refers to visionary new ways of applying information and communication technologies to our daily lives.

19. CMM-Capability Maturity ModelThe Capability Maturity Model for Software (CMM) is a framework that describes an evolutionary improvement path from an ad hoc, immature process to a mature, disciplined process. The CMM covers practices for planning, engineering, and managing software development and maintenance.

20. Flat FileFlat files are data files that contain records with no structured relationships. Additional knowledge is required to interpret these files such as the file format properties.

21