0% found this document useful (0 votes)
99 views45 pages

Mis Unit-1

The document outlines the Master of Business Administration course on Management Information Systems at Mass College of Arts & Science, detailing its curriculum, including IT trends, organizational applications, systems analysis, business intelligence, and IT security. It defines Management Information Systems (MIS) as crucial for decision-making and operational efficiency, emphasizing its components, functions, benefits, and limitations. Additionally, it highlights the importance of MIS in providing accurate data for strategic decisions and the skills required for a career in this field.

Uploaded by

nonoob728
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views45 pages

Mis Unit-1

The document outlines the Master of Business Administration course on Management Information Systems at Mass College of Arts & Science, detailing its curriculum, including IT trends, organizational applications, systems analysis, business intelligence, and IT security. It defines Management Information Systems (MIS) as crucial for decision-making and operational efficiency, emphasizing its components, functions, benefits, and limitations. Additionally, it highlights the importance of MIS in providing accurate data for strategic decisions and the skills required for a career in this field.

Uploaded by

nonoob728
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

MASS COLLEGE OF ARTS & SCIENCE

(affiliated to Bharathidasan University-Trichy-24)


(Recognized under section 2(f ) & 12(B) of the UGC Act, 1956)
(An ISO 9001:2005 Certified Institution)
Chennai salai, Kallapuliyur, Kumbakonam – 612 501

MASTER OF BUSINESS ADMINISTRATION

SUBJECT NAME : MANAGEMENT INFORMATION SYSTEM

SUBJECT CODE : P16MBA7

CLASS : IIMBA

SEM : IV EVEN

STAFF NAME : D pathmapriya


Management Information system

UNIT-1 IT TRENDS: Information System Concepts, Classification of IS, Computer


hardware, Computer software, Database Management System, Internet Technologies,
trends in Network computing. Messaging and Collaboration. SMAC (Social, Mobility,
Analytics and Cloud)

UNIT-II ORGANIZATIONAL APPLICATIONS: Functional Information Systems, Decision


Support Systems, Expert Systems, Knowledge Management System, Enterprise
systems, RFID.

UNIT-III SYSTEMS ANALYSIS & DESIGN: Developing IS and System Development life
Cycle, Structuring system process requirements, Structuring system logic
requirements, Structuring system data requirements. Normalization in databases.

UNIT-IV BUSINESS INTELLIGENCE: Data Warehousing, Business Intelligence


Framework, Business Analytics, OLAP, Data Mining. Business Performance
Management, Dashboards, Balance scorecards.

UNIT-V ECONOMICS OF IT AND MANAGING IT SECURITY: Evaluating IT investments-


Methods, Benefits, Costs & Issues, IT Economic strategies, Securing the enterprise, IS
vulnerabilities and threats, Network security, Implementing security- Auditing and
Risk Management.
Management information system

Meaning:

A management information system (MIS) is an information system[1] used for decision-


making, and for the coordination, control, analysis, and visualization of information in an
organization. The study of the management information systems involves people,
processes and technology in an organizational context. In other words, it serves, as the
functions of controlling, planning, decision making in the management level setting.[

Management Information Systems is the study of people, technology, organizations,


and the relationships among them. MIS professionals help firms realize maximum
benefit from investment in personnel, equipment, and business processes. MIS is a
people-oriented field with an emphasis on service through

Concepts:

Management information systems (MIS) are an organized method of collecting


information from various sources, compiling it, and presenting it in a readable format.
It helps business leaders and managers make strategic management decisions.

Today’s management information systems rely heavily on technology to compile and


present data. An MIS consists of interconnected hardware, software, personnel, and
processes that work together to collect, store, process, and distribute information
relevant to a company’s operations and decision-making.

Functions of MIS

The primary function of MIS is to report on business operations to support decision-


making and ensure that the organization is managed more efficiently. This will help the
company reach its full potential and thus gain a competitive advantage. Listed below
are some of the crucial functions of MIS.

Provide Easy Access to the Information


MIS allows teams convenient access to marketing, financial or operational
information. MIS reports strategically storing large amounts of information about the
business in a central location that managers can easily access over a network.

Data Collection

Data from the company’s day-to-day operations are collected and combined with data
from outside sources. This allows a healthy and functional relationship between
distributors, points of sale, and any other supply chain member.

Performance Tracking

As production and sales numbers are recorded and stored in a central database, MIS
plays a crucial role in keeping track of the performance of the employees. This
information helps detect issues early and make the right decisions quickly using the
latest information.

Foster Collaboration in the Workplace

In any large company, many situations require the involvement of multiple people or
departments in decision-making.

MIS is an effective communication channel for the teams to collaborate and ensure
that the decision-making group can access all the data required for effective decision-
making, even working from different locations.

Company Projections

These management information systems come with trend analysis features that will
allow you to project how a business will perform in its current configuration and how it
will be affected once you have implemented the changes you are considering.

Even the ones without the trend analysis function will still offer sufficient information
to carry out the analysis accurately using external tools.
Track the Implementation of Decisions

MIS systems help project expectations for a particular decision. If they decide to
implement the changes, it will be necessary to continue monitoring performance to
see if the teams are on track to achieve the desired results.

Improve Company Reporting

One reason large companies prefer management information systems is the


effectiveness of the reporting functions. MIS reports contain easy-to-understand
information, allowing management to make timely decisions.

The system's accessibility to people from different parts of the organization makes it
an effective communication and reporting tool. The results and all the necessary
supplementary data can be shared among colleagues.

It is also possible to create short executive summaries that explain the entire situation
for company executives to review in situations that require their approval.

Features of MIS
MIS have several vital features, including:
• Data integration: MIS integrates data from various departments and
functions, giving decision-makers a comprehensive view of the organization’s
data.
• Data storage: MIS stores vast data in databases, making it accessible and
retrievable when needed.
• Data processing: MIS processes data to generate meaningful information. It
can perform calculations, comparisons, and other data transformations to
produce reports and insights.
• User-friendly interface: MIS systems typically have user-friendly interfaces
that allow non-technical users to easily access and interact with data.
• Customization: MIS systems can be customized to meet an organization’s
needs. Users can define the type of information they want to access and how it
is presented.
• Real-time information: Many MIS systems offer real-time or near-real-time
data updates, ensuring decision-makers can access the most current
information to make timely decisions.
• Report generation: MIS generates various reports, including standard
reports, ad-hoc reports, and exception reports. These reports help managers
monitor performance and make informed decisions.
• Security: Access to sensitive information is restricted, and measures are in
place to protect data from unauthorized access or breaches.
• Accessibility: MIS can be accessed remotely, allowing decision-makers to
retrieve information from various locations.
• Integration with other systems: MIS systems can integrate with other
organizational software and systems, such as ERP (Enterprise Resource
Planning) systems, Customer relationship management (CRM) systems, and
Human capital management (HCM) systems.
• Mobile compatibility: Many modern MIS systems are compatible with mobile
devices, allowing users to access critical information on the go.
• Data analytics: Advanced MIS systems may incorporate data analytics and
business intelligence tools to provide deeper insights and support predictive
analytics.
Components of MIS
There are five major components of a Management Information System.
• People: People prepare and analyze MIS to achieve organizational goals.
• Data: Day-to-day business transactions of an organization.
• Hardware: Input and output devices, such as keyboards, mice, monitors,
printers, etc., help input data and display information.
• Software and Business Processes: MIS depends on software and business
processes such as MS Office, Banking Software, ERP systems, CRM
systems, etc.
• Reports: The MIS output provides managers with insights through various
reports, such as routine, on-demand, or exception reports, aiding in decision-
making.
Characteristics of MIS
The general characteristics of an MIS are:
• Use a variety of internal data sources.
• Provide reports on the routine operations of an organization.
• Allow users to develop custom reports, such as detailed reports.
• Provide a variety of different reports, both scheduled and on demand.
• Must be accurate and avoid including estimates or probable expenses.
• Provide reports in various formats, including hard copies and electronic copies.
• The information must be relevant for making a strategic decision.
Typically, an MIS is organized according to an organization's functional areas. So, the
finance department will have a financial MIS, the HR department will have a human
resources MIS, etc.
Benefits of MIS
• Allows company management access to a single database to manage all
transactions and planning processes.
• It saves time and increases work effectiveness considerably.
• Ensures improved data analysis and decision-making.
• Maintains an accurate record of the system’s inputs and outputs and
tracks employee performance.
• Critically analyze a company’s and its employee’s strengths and weaknesses.
• The CEOs or executives can take greater company financial and operational
control.
Limitations of MIS
Even though MIS has many benefits, it also has its limitations, which are discussed
below:
• While MIS may solve some acute problems, it is not the only solution to all
organizational problems.
• Involves maintenance and employee training costs.
• It cannot meet everyone's particular demands.
• If misdesigned, MIS does not serve the management and is irrelevant.
• The MIS is only good if the primary data is updated.
• The MIS provides most information in quantitive form. Hence, it ignores
qualitative information, such as an employee's behaviour.

A management information system (MIS) is a system that collects a


company's data and uses it to make more nimble, informed, and impactful
business decisions. It's also an academic discipline you can study if you're
interested in this type of work. If you enjoy using technology to solve business
problems or answer important business questions, then a career in MIS may
be a good fit.

s about a company's operations. The MIS gathers data from various sources
(employees, processes, inventory, and more) and analyzes it to provide
tailored information to managers and their staff.

For a management information system to be effective, business processes


must be carefully mapped out, data must be accurate and timely, and
hardware and software must be able to store and manipulate it. A good MIS
depends on the people who design, implement, and use it.
While businesses use different types of systems, they all share one common
goal: to provide managers with information to make better decisions. In
today's fast-paced business environment, having access to accurate and
timely information is critical for success. MIS allows managers to track
performance indicators, identify trends, and make informed decisions about
where to allocate resources.

The importance of MIS for businesses

Management information systems provide businesses with accurate data and


powerful analytical tools, which they can use to quickly identify opportunities
or problems, and make decisions accordingly. A management information
system should do the following:
• Provide you with the information you need to make decisions
• Give you a competitive edge by providing timely, accurate information
• Help you improve operational efficiency and productivity
• Allow you to keep track of customer activity and preferences
• Enable you to develop targeted marketing campaigns and improve

You may notice some overlap between MIS and computer science, but the two disciplines differ in
one core detail: perspective. Management information systems (MIS) is the study of how people use
technology to manage information. It includes both the hardware and software used to store,
process, and retrieve information. Computer science is the study of how computers work. It includes
the design and implementation of computer systems.

Key skills for an MIS career

Because MIS professionals often apply technology to business problems, they


need a firm understanding of both areas. Some key job skills you can expect
to develop as an MIS professional include analytical, critical thinking, and
problem-solving skills. You'll also need to be able to communicate effectively
with other MIS team members and others who use the system.

The technical skills you'll need include:


• Programming
• Databases
• Data warehousing techniques
• Data visualization
• Networks
• Software development

Essential skills you'll need to develop to advance to management include:


• Understanding the role of information systems in organizations
• Expertise with various information systems concepts and tools
• Analyzing business problems and identifying potential solutions using
information systems
• Designing, implementing, and evaluating information systems solutions for
business problems
• An understanding of the ethical, legal, and regulatory implications of
information systems

MIS classification is a broad concept; this article facilitates you to have a crystal
clear understanding about the MIS classification. Here, we categories MIS into
three main categories, these are,

1. Classification as per Information Characteristics


2. Classification as per Application
3. Classification as per Business Function

The below image is depicting about the classification with its sub categories,

• company reduces its uncertainty by collecting, managing, and using this


information carefully. This information is used by everybody in the
organization; examples of such information are employee and payroll
information.
• Functional/Operational Information: This is operation-specific
information where the organization assists to perform its functions of day-
day transactions. Mainly preserves technical make-up, For example, daily
schedules in a manufacturing plant that indicated the detailed assignment
of jobs to machines or machines to operators. In a value-oriented business,
it would constitute the duty roster of various personnel. This information is
mostly internal to the organization.
• Database Information: Database information as we know that it is a
collection of related data that is stored, retrieved, and managed to name
databases. It stores large quantities of information that has multiple
ownership and application. For example, the tangible substance that goes
into the makeup of physical thing specification or supplier information is
stored for multiple users. It is a type of software program.

3) Classification as per Business Function


• Transaction Processing System: TPS processes transactions and produces
reports. It refers to the automation of basic, repetitive processing that
underpins business operations. It does not afford any information to the
user for his/her decision-making.
TPS uses data and produces data as proposed in the coming after or as a
result of the diagram.
Previously, TPS was invited as the administration Information System. Data
processing was used by manual processes or with simple machines prior to
the invention of computers. The TPS domain is located at the bottom of an
organization's management hierarchy.
• Management Information System (MIS): As MIS is a well-known
information system to organize the information, which processes data and
converts it into meaningful information. A supervision information system
uses TPS for its data inputs. The information generated by the information
system may live used for sources of operations, strategic and long-range
planning. Short-term planning, supervision control, and other managerial
problem solving encompass processing in assist of a wide range of
organizational functions & management processes. MIS is capable of
providing analysis, planning & decision developing support. Marketing,
manufacturing, human resources, finance, and accounting are some of the
functional areas of a company.
• Decision Support System (DSS): A decision help system (DSS) is an
information system a formal request to be considered for a position or to
be allowed to do or have something. That assists decision-making. DSS be
inclined with planning, analyzing alternatives, and trial and error search for
the solution. The elements of the decision support system include a
database & software. Finance, Production, and marketing are some of the
main application areas of DSS.
Based on how information is processed, DSS can be distinguished from
MIS. MIS processes data to restyle it into information. DSS processes
information to support the decision creating process of a manager.
• Executive Support System (ESS): Executive Support System (ESS) is a
reference of the management information system, which is a special kind
of DSS; An ESS is specially tailored for the ownership of the chief executive
of an association to support his decision-making. It includes various types
of decision-making but it is more specific and adult-oriented.
• Office Automation Systems (OAS): Office automation is referenced to the
application of computes and communication technology to office
functions. Office automation systems are meant to improvements the
productivity of frameworks at various levels of management by providing
secretarial assistance and better communication facilities.
Below mentioned are the two main classes to categories Office activities,
namely
o Activities executed by clerical staff like clerks, secretaries, typist etc
o Activities performed by the executives (managers, engineers or other
experienced like economist, researches etc.)

• The major functional activities of OAS are -


a. Typing
b. Mailing
c. Scheduling of meetings and conferences,
d. Calendar keeping, and
e. Retrieving documents

Below is a list of activities in the moment category (managerial category)

f. Conferencing.
g. Controlling output and producing information (messages, memos,
reports, and so on).

An individual who is employed in or trained for a job is referred to as a


businessperson. Systems: These systems are one of the leading types of
knowledge-based information systems. These systems are based on artificial
intelligence, and are contemporary information systems. A business professional
system is a strategic based information system that uses its strategic about a
specific, complex application area to act as an expert. The main components of a
professional system are:

a. Knowledge Base
b. Interface Engine
c. User Interface

Classification by Characteristic
Based on Anthony's classification of Management, information used in business
for decision-making is generally categorized into three types −

• Strategic Information − Strategic information is concerned with long term


policy decisions that defines the objectives of a business and checks how
well these objectives are met. For example, acquiring a new plant, a new
product, diversification of business etc, comes under strategic information.
• Tactical Information − Tactical information is concerned with the information
needed for exercising control over business resources, like budgeting,
quality control, service level, inventory level, productivity level etc.
• Operational Information − Operational information is concerned with
plant/business level information and is used to ensure proper conduction
of specific operational tasks as planned/intended. Various operator specific,
machine specific and shift specific jobs for quality control checks comes
under this category.

Classification by Application
In terms of applications, information can be categorized as −

• Planning Information − These are the information needed for establishing


standard norms and specifications in an organization. This information is
used in strategic, tactical, and operation planning of any activity. Examples
of such information are time standards, design standards.
• Control Information − This information is needed for establishing control
over all business activities through feedback mechanism. This information
is used for controlling attainment, nature and utilization of important
processes in a system. When such information reflects a deviation from the
established standards, the system should induce a decision or an action
leading to control.
• Knowledge Information − Knowledge is defined as "information about
information". Knowledge information is acquired through experience and
learning, and collected from archival data and research studies.
• Organizational Information − Organizational information deals with an
organization's environment, culture in the light of its objectives. Karl
Weick's Organizational Information Theory emphasizes that an
organization reduces its equivocality or uncertainty by collecting, managing
and using these information prudently. This information is used by
everybody in the organization; examples of such information are employee
and payroll information.
• Functional/Operational Information − This is operation specific information.
For example, daily schedules in a manufacturing plant that refers to the
detailed assignment of jobs to machines or machines to operators. In a
service oriented business, it would be the duty roster of various personnel.
This information is mostly internal to the organization.
• Database Information − Database information construes large quantities of
information that has multiple usage and application. Such information is
stored, retrieved and managed to create databases. For example, material
specification or supplier information is stored for multiple users.
Computer hardware includes the physical parts of a computer, such as a case, central
processing unit (CPU), random access memory (RAM), monitor, and mouse which
processes the input according to the set of instructions provided to it by the user and
gives the desired output.

The computer has mainly has two major components:

Hardware

Software

In this article, we only discuss computer hardware.

What is Computer Hardware?

Computer hardware is a physical device of computers that we can see and touch. For
e.g. Monitor, Central Processing Unit, Mouse, Joystick, etc. Using these devices, we
can control computer operations like input and output.

Computer Hardware Parts

These hardware components are further divided into the following categories, which
are:

Input Devices

Output Devices

Storage Devices

Internal Components

1. Input Devices

Input devices are those devices with the help of which the user interacts with the
computer. Or, In other words, with the help of input devices, the user enters the data
or information into the computer. This information or data is accepted by the input
devices and converted into a computer-acceptable format, which is further sent to the
computer system for processing.

Now we discuss some input devices:

Keyboard: It is the most common and main input device for computers. The data is
inputted by typing on the keyboard. It consists of 104 keys in total. It contains numeric
keys, alphabet keys, and different function keys as well. Earlier, it was connected to
the computer via cable, now as technology has advanced, you can connect a keyboard
using Bluetooth.

Mouse: A mouse is a kind of pointing device which is rolled over to control the cursor
on the screen and it has functional keys like left, middle, and right buttons. Using
these functional keys, on by the click of which an object is selected or to open a file by
just a click of a mouse. It also consists of a sensor inside which notifies its speed to
the computer and according to which the cursor is moved on the screen.

Scanner: As the name suggests, it scans images, documents, etc., and converts them
into digital form and that can be further edited and used. It works just like a Xerox
machine.

Track Ball: It is a device much like an upside-down mouse. It does not use much space
for movement like a mouse. As the trackball remains stationary and the user moves
the ball in various directions, it affects the screen movements directly.

Open In App

Computer Hardware
Last Updated : 01 Sep, 2023
••
Computer hardware includes the physical parts of a computer, such as a case,
central processing unit (CPU), random access memory (RAM), monitor, and mouse
which processes the input according to the set of instructions provided to it by the
user and gives the desired output.
The computer has mainly has two major components:
1. Hardware
2. Software
In this article, we only discuss computer hardware.

What is Computer Hardware?


Computer hardware is a physical device of computers that we can see and touch.
For e.g. Monitor, Central Processing Unit, Mouse, Joystick, etc. Using these devices,
we can control computer operations like input and output.
Computer Hardware Parts
These hardware components are further divided into the following categories,
which are:
1. Input Devices
2. Output Devices
3. Storage Devices
4. Internal Components
1. Input Devices
Input devices are those devices with the help of which the user interacts with the
computer. Or, In other words, with the help of input devices, the user enters the
data or information into the computer. This information or data is accepted by the
input devices and converted into a computer-acceptable format, which is further
sent to the computer system for processing.
Now we discuss some input devices:
• Keyboard: It is the most common and main input device for computers.
The data is inputted by typing on the keyboard. It consists of 104 keys
in total. It contains numeric keys, alphabet keys, and different function
keys as well. Earlier, it was connected to the computer via cable, now as
technology has advanced, you can connect a keyboard using Bluetooth.
• Mouse: A mouse is a kind of pointing device which is rolled over to
control the cursor on the screen and it has functional keys like left,
middle, and right buttons. Using these functional keys, on by the click of
which an object is selected or to open a file by just a click of a mouse. It
also consists of a sensor inside which notifies its speed to the computer
and according to which the cursor is moved on the screen.
• Scanner: As the name suggests, it scans images, documents, etc., and
converts them into digital form and that can be further edited and used.
It works just like a Xerox machine.
• Track Ball: It is a device much like an upside-down mouse. It does not
use much space for movement like a mouse. As the trackball remains
stationary and the user moves the ball in various directions, it affects
the screen movements directly.
• Light Pen: It is a light-sensitive device and it is touched to theCRT
screenwhere it can detect, a raster on the screen as it passes by and,
with the help of this user can draw anything like lines, figures, or any
objects.
• Microphone: It is a kind of voice input system that can be attached to a
computer system to record sounds. It converts human speech or voice
intoelectrical signals. This electrical signal is processed by the computer
and the word is recognized.
• Optical Character Reader: It is used to detect alphanumeric characters
that are written or printed on paper using a low-frequency light source.
This light is absorbed by the dark areas and reflected by the light areas,
now this reflected light is received by the photocells. It is like a scanner.
• Bar Code Reader: It is used to read bar codes and convert them into
electric pulse which will further processed by the computer. Here,
thebarcodeis data that is coded into white and black lines(or light and
dark lines).
2. Output Devices
These are the devices that are used to display the output of any task given to the
computer in human-readable form.
Now we discuss some output devices:
• Monitor: The monitor is the main output device. It is also
calledVDU(visual display unit)and it looks like a TV screen. The Monitor
displays the information from the computer. It is used to display text,
video, images, etc.
• Printer: Aprinteris anoutput devicethat transfers data from the
computer in a printed format by using text or images on paper. There
are both colored and black & white printers. Further, there are also
different types of printers, likeLaser Printer, Dot-matrixprinters, and
Inkjet printers.
• Plotter: It is similar to a printer but potters are large in size. A plotter is
used to generate large drawings, architectural blueprints, etc. on paper
and these are high-quality images and drawings and large in size.
• Speakers: It is a very common output device and it gives sound as an
output. Speaker is generally used to play music or anything having
sound.
3. Storage Devices
There are some devices that are used for storage purposes and are known as
secondary storage devices. Some of them were discussed below:
1. CD (Compact disc): A CD is circular in shape and made up of thin platted glass
and plastic polycarbonate material. It has a storage capacity of 600 MB to 700 MB
of data. It has a standard size of 12 cm with a hole in the center of about 1.5 cm and
1.2 mm in thickness. There are basically 3 types of CDs, which are:
• CD-ROM (CD – Read Only Memory): Contents of this type of CD cannot
be erased by the user. Only the publisher is allowed to access the data
imprinted on this CD.CD-ROMis basically used for commercial purposes
like for a music album or any application package by a software
company.
• CD-R (CD-Recordable): In this, content or data can be stored once.
After that, they can be read many times but the data or content cannot
be rewritten or erased. (Kind of one-time use)
• CD-RW(CD-Rewritable): As the name suggests, this type of CD is used
to rewrite the content or erase previous content and again write new
content many times.
2. DVD (Digital Video/Versatile Disc): A DVD is the same as a CD but with some
more features. A DVD comes in single and dual-layer formats. It has much greater
storage capacity in comparison to CD. The storage capacity of a DVD with one-sided
single layer is – 4.7 GB, one-sided double layer – 8.5 GB, double-sided single layer
– 9.4 GB, and double-sided double layer – 17 GB. There are also some types in DVDs,
which are :
• DVD-ROM: In this type, the contents of the DVD cannot be written on or
erased by the user.DVD ROMis used for applications and database for
distributing them in large amounts.
• DVD-R / DVD+R:DVD-R (DVD minus R) and DVD+R (DVD plus R)are
two different kinds of discs and they are once recordable format. Also,
they have no difference virtually.
• DVD-RW / DVD+RW: This is a kind of rewritable disc and it allows up
to 1,000 rewrites.
• DVD-RAM:DVD RAMis accessed like a hard disk. It provides highdata
securityand storage capacity. This is a kind of rewritable disc and it
allows up to 1,00,000 rewrites.
3. Hard Disk: An hard disk is a non-volatile storage device that uses its read/write
heads to store digital data on a magnetic surface of a rigid plate. It is generally 3.5
inches in size for desktops and 2.5 inches in size for laptops. A hard disk can be
classified further into 3 types, which are:
• Internal Hard Disk: It has a common storage capacity stated as GB or
TB. A system case or cabinet is the place where it is located. It can
perform faster operations and its storage is fixed. It is mainly used to
store large datafiles and programs.
• Internal Cartridges: The Internal hard disk can’t be removed from the
system cabinet easily. To resolve this problem Internal Cartridges are
introduced. So, Internal cartridges are easy to remove CDs. It has a
storage capacity of 2 GB to 160 GB. It is used as an alternative to an
internal hard disk.
• Hard Disk Packs: It is used by organizations such as banks, and
government sector organizations to store large amounts of data. It has a
storage capacity of a range of PB( Peta Bytes).
Hardware Components
Some important hardware devices known as the internal components are
discussed below:
1. CPU (Central Processing Unit
The CPU is also known as the heart of the computer. It consists of three units,
generally known as the control unit, Arithmetic Logical Unit (ALU), and
the memory unit. Below is the block diagram of the CPU is given:
As shown in the diagram input is given to the CPU through input devices. This
input goes to memory and the control unit gets instructions from memory. The
control unit now decides what to do with the input or instructions and transfers
it to ALU. Now, ALU performs various operations like addition, subtraction,
multiplication, division, logical operations, etc. After that, the final result gets
stored in memory and finally passed to output devices to give the output. So,
this is how the CPU works.
2. Motherboard
It is the main circuit board inside a computer and it contains most of the
electronic components together. All the components of the computer are
directly or indirectly connected to the motherboard. It includes RAM slots,
controllers, system chipsets, etc.
3. RAM (Random Access Memory)
It is also known as temporary or volatile memory. It holds the program and data,
which are currently in process or processing. All the data is erased as soon as
the computer is turned off or in case of a power failure. Data stored in this
memory can be changed. There are two types of RAM:-
1. SRAM (Static RAM): SRAM basically consists of a flip-flop using a
transistor or Mosfet (MOS). It is fast and has less access time. In this
refreshing circuits are not required. But it is costly and requires more
space. For e.g. cache memory.
2. DRAM (Dynamic RAM): DRAM consists of capacitors and the data is
stored in the form of capacitors. Capacitors charge when data is 1 and
don’t charge if data is 0. It requires refreshing circuits, as leakage of
current in the capacitor can occur, so they need to be refreshed to the
data. It is slower and has a higher access time. It is cheaper in
comparison with SRAM. For e.g. Main memory.
3. Video Graphics Array Port

A video input commonly used on computer monitors is called a video graphics array
(VGA) port. Verifying that there isn’t a loose connection, a damaged cable, or a broken
display is one step in troubleshooting a VGA port. Compressed air can also be sprayed
inside the VGA port by a computer expert to make sure it’s dust-free.

4. Power Supply

All of a computer system’s parts are powered by a power source. Typically, a power
cord is used to connect a computer tower to an electrical outlet. By turning off the
computer, unplugging and separating the power supply cord, or trying a different cord
or socket, a technician can diagnose the power supply.

5. Cooling Fan

A computer’s system to prevent overheating uses cooling fans. To aid customers who
use their computers intensively, such as when streaming video or playing games,
many computers contain more than one cooling fan. If a user detects their computer
overheating, a computer expert might need to repair the cooling fan. The blades may
be examined for any damage and cleared of any foreign objects. A technician’s
standard method of troubleshooting may involve replacing computer fans.

6. Hard Drive

On a computer system, files, programs, and other types of information are stored on
hard drives, which are data storage devices. They utilise hard drives, which are
magnetically coated discs used to store digital versions of information. A computer
technician can suspect a corrupt hard disk when a hard drive dies.

Relationship Between Computer Hardware and Software

Both the

Hardware and software

Are mutually dependent on each other. Each should function properly so that the
computer produces an output.

Software utilization can not be done without supporting of the hardware.

Relevant software should be loaded into the hardware to get the latest software.

Hardware is a one-time expense while software is not.

Software development is very expensive while hardware cant be developed if in use


once.

Many software applications and their sub-applications can be loaded on hardware to


run different jobs.

The software acts as an interface between the user and the hardware.

Database management system


Meaning:
Database is a collection of interrelated data that helps in the efficient retrieval,
insertion, and deletion of data from the database and organizes the data in the form of
tables, views, schemas, reports, etc. For Example, a university database organizes the
data about students, faculty, admin staff, etc. which helps in the efficient retrieval,
insertion, and deletion of data from it.

What is DBMS?

A Database Management System (DBMS) is a software system that is designed to


manage and organize data in a structured manner. It allows users to create, modify,
and query a database, as well as manage the security and access controls for that
database. DBMS provides an environment to store and retrieve data in convenient and
efficient manner.

Key Features of DBMS

Data modeling: A DBMS provides tools for creating and modifying data models, which
define the structure and relationships of the data in a database.

Data storage and retrieval: A DBMS is responsible for storing and retrieving data from
the database, and can provide various methods for searching and querying the data.

Concurrency control: A DBMS provides mechanisms for controlling concurrent access


to the database, to ensure that multiple users can access the data without conflicting
with each other.

Data integrity and security: A DBMS provides tools for enforcing data integrity and
security constraints, such as constraints on the values of data and access controls
that restrict who can access the data.

Backup and recovery: A DBMS provides mechanisms for backing up and recovering the
data in the event of a system failure.

DBMS can be classified into two types: Relational Database Management System
(RDBMS) and Non-Relational Database Management System (NoSQL or Non-SQL)

RDBMS: Data is organized in the form of tables and each table has a set of rows and
columns. The data are related to each other through primary and foreign keys.

NoSQL: Data is organized in the form of key-value pairs, documents, graphs, or


column-based. These are designed to handle large-scale, high-performance
scenarios.

Types of DBMS
Relational Database Management System (RDBMS): Data is organized into tables
(relations) with rows and columns, and the relationships between the data are
managed through primary and foreign keys. SQL (Structured Query Language) is used
to query and manipulate the data.

NoSQL DBMS: Designed for high-performance scenarios and large-scale data, NoSQL
databases store data in various non-relational formats such as key-value pairs,
documents, graphs, or columns.

Object-Oriented DBMS (OODBMS): Stores data as objects, similar to those used in


object-oriented programming, allowing for complex data representations and
relationships

Database Languages

Data Definition Language

Data Manipulation Language

Data Control Language

Transactional Control Language

Data Definition Language (DDL)

DDL is the short name for Data Definition Language, which deals with database
schemas and descriptions, of how the data should reside in the database.

CREATE: to create a database and its objects like (table, index, views, store procedure,
function, and triggers)

ALTER: alters the structure of the existing database

DROP: delete objects from the database

TRUNCATE: remove all records from a table, including all spaces allocated for the
records are removed

COMMENT: add comments to the data dictionary

RENAME: rename an obje

Data Manipulation Language (DML)


DML is the short name for Data Manipulation Language which deals with data
manipulation and includes most common SQL statements such SELECT, INSERT,
UPDATE, DELETE, etc., and it is used to store, modify, retrieve, delete and update
data in a database. Data query language(DQL) is the subset of “Data
Manipulation Language”. The most common command of DQL
is SELECT statement. SELECT statement help on retrieving the data from the table
without changing anything in the table.
• SELECT: retrieve data from a database
• INSERT: insert data into a table
• UPDATE: updates existing data within a table
• DELETE: Delete all records from a database table
• MERGE: UPSERT operation (insert or update)
• CALL: call a PL/SQL or Java subprogram
• EXPLAIN PLAN: interpretation of the data access path
• LOCK TABLE: concurrency Control
Data Control Language (DCL)
DCL is short for Data Control Language which acts as an access specifier to the
database.(basically to grant and revoke permissions to users in the database
• GRANT: grant permissions to the user for running DML(SELECT,
INSERT, DELETE,…) commands on the table
• REVOKE: revoke permissions to the user for running DML(SELECT,
INSERT, DELETE,…) command on the specified table
Transactional Control Language (TCL)
TCL is short for Transactional Control Language which acts as an manager for all
types of transactional data and all transactions. Some of the command of TCL are
• Roll Back: Used to cancel or Undo changes made in the database
• Commit: It is used to apply or save changes in the database
• Save Point: It is used to save the data on the temporary basis in the
database
Data Query Language (DQL)
Data query language(DQL) is the subset of “Data Manipulation Language”.
The most common command of DQL is the SELECT statement. SELECT statement
helps us in retrieving the data from the table without changing anything or
modifying the table. DQL is very important for retrieval of essential data from a
database.
Paradigm Shift from File System to DBMS
File System manages data using files on a hard disk. Users are allowed to create,
delete, and update the files according to their requirements. Let us consider the
example of file-based University Management System. Data of students is available
to their respective Departments, Academics Section, Result Section, Accounts
Section, Hostel Office, etc. Some of the data is common for all sections like Roll No,
Name, Father Name, Address, and Phone number of students but some data is
available to a particular section only like Hostel allotment number which is a part
of the hostel office. Let us discuss the issues with this system:
• Redundancy of data: Data is said to be redundant if the same data is
copied at many places. If a student wants to change their Phone number,
he or she has to get it updated in various sections. Similarly, old records
must be deleted from all sections representing that student.
• Inconsistency of Data: Data is said to be inconsistent if multiple copies
of the same data do not match each other. If the Phone number is
different in Accounts Section and Academics Section, it will be
inconsistent. Inconsistency may be because of typing errors or not
updating all copies of the same data.
• Difficult Data Access: A user should know the exact location of the file
to access data, so the process is very cumbersome and tedious. If the
user wants to search the student hostel allotment number of a student
from 10000 unsorted students’ records, how difficult it can be.
• Unauthorized Access: File Systems may lead to unauthorized access to
data. If a student gets access to a file having his marks, he can change it
in an unauthorized way.
• No Concurrent Access: The access of the same data by multiple users
at the same time is known as concurrency. The file system does not
allow concurrency as data can be accessed by only one user at a time.
• No Backup and Recovery: The file system does not incorporate any
backup and recovery of data if a file is lost or corrupted.
These are the main reasons which made a shift from file system to DBMS. Also
See, Advantages of DBMS over File System
Advantages of DBMS
• Data organization: A DBMS allows for the organization and storage of
data in a structured manner, making it easy to retrieve and query the
data as needed.
• Data integrity: A DBMS provides mechanisms for enforcing data
integrity constraints, such as constraints on the values of data and
access controls that restrict who can access the data.
• Concurrent access: A DBMS provides mechanisms for controlling
concurrent access to the database, to ensure that multiple users can
access the data without conflicting with each other.
• Data security: A DBMS provides tools for managing the security of the
data, such as controlling access to the data and encrypting sensitive
data.
• Backup and recovery: A DBMS provides mechanisms for backing up
and recovering the data in the event of a system failure.
• Data sharing: A DBMS allows multiple users to access and share the
same data, which can be useful in a collaborative work environment.
Disadvantages of DBMS
• Complexity: DBMS can be complex to set up and maintain, requiring
specialized knowledge and skills.
• Performance overhead: The use of a DBMS can add overhead to the
performance of an application, especially in cases where high levels of
concurrency are required.
• Scalability: The use of a DBMS can limit the scalability of an
application, since it requires the use of locking and other
synchronization mechanisms to ensure data consistency.
• Cost: The cost of purchasing, maintaining and upgrading a DBMS can be
high, especially for large or complex systems.
• Limited Use Cases: Not all use cases are suitable for a DBMS, some
solutions don’t need high reliability, consistency or security and may be
better served by other types of data storage.
Applications of DBMS
• Enterprise Information: Sales, accounting, human resources,
Manufacturing, online retailers.
• Banking and Finance Sector: Banks maintaining the customer details,
accounts, loans, banking transactions, credit card transactions. Finance:
Storing the information about sales and holdings, purchasing of
financial stocks and bonds.
• University: Maintaining the information about student course enrolled
information, student grades, staff roles.
• Airlines: Reservations and schedules.
• Telecommunications: Prepaid, postpaid bills maintance.
Conclusion
A Database Management System (DBMS) is an essential tool for efficiently
managing, organizing, and retrieving large volumes of data across various
industries. Its ability to handle data securely, ensure integrity, support
concurrent access, and provide backup and recovery options makes it
indispensable for modern data-driven applications. While DBMSs come with
complexities and costs, their benefits in terms of data management and security
far outweigh the challenges, making them a crucial component in any data-centric
environment

Internet Technology
Internet technology refers to the network of networks that allows
computers to communicate with each other. It’s based on several key
technologies, including:
TCP/IP
A set of protocols that govern how data moves through a network. It’s
designed to work well in both local and wide area networks.
Hypertext Transfer Protocol (HTTP)
A network protocol that allows web browsers to send requests to a server
to load webpages, files, images, and more.
File Transfer Protocol (FTP)
A network protocol that allows users to upload and download files between
computers on the internet.
Domain Name Server (DNS)
A computer that translates IP addresses into names so that users can locate
computers by name.

• Selected Reading

Internet Technologies - Quick Reference Guide

Internet
• Internet is a world-wide global system of interconnected computer networks.
• Internet uses the standard Internet Protocol (TCP/IP).
• Every computer in internet is identified by a unique IP address.
• IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer
location.
• A special computer DNS (Domain Name Server) is used to give name to the IP Address so
that user can locate a computer by a name.
• For example, a DNS server will resolve a name http://www.tutorialspoint.com to a
particular IP address to uniquely identify the computer on which this website is hosted.
• Internet is accessible to every user all over the world.
Internet Evoloution
The concept of Internet was originated in 1969 and has undergone several technological &
Infrastructural changes as discussed below:

• The origin of Internet devised from the concept of Advanced Research Project Agency
Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
• Basic purpose of ARPANET was to provide communication among the various bodies of
government.
• Initially, there were only four nodes, formally called Hosts.
• In 1972, the ARPANET spread over the globe with 23 nodes located at different countries
and thus became known as Internet.
• By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW,
browsers, scripting languages etc.,Internet provided a medium to publish and access
information over the web.

Internet Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss some of the
advantages of Internet:
Internet Disadvantages

Extranet
Extranet refers to network within an organization, using internet to connect to the outsiders in
controlled manner. It helps to connect businesses with their customers and suppliers and
therefore allows working in a collaborative manner.
Extranet Benefits
Extranet proves to be a successful model for all kind of businesses whether small or big. Here are
some of the advantages of extranet for employees, suppliers, business partners, and customers:
Extranet Issues
Apart for advantages there are also some issues associated with extranet. These issues are
discussed below:

Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this context there
are two choices:

• Host it on your own server.


• Host it with an Internet Service Provider (ISP) in the same way as web pages.

But hosting extranet pages on your own server requires high bandwidth internet connection
which is very costly.

Security
Additional firewall security is required if you host extranet pages on your own server which
result in a complex security mechanism and increase work load.
Accessing Issues
Information can not be accessed without internet connection. However, information can be
accessed in Intranet without internet connection.

Decreased Interaction
It decreases the face to face interaction in the business which results in lack of communication
among customers, business partners and suppliers.

Extranet vs. Intranet


The following table shows differences between Extranet and Intranet:

Extranet Intranet

Internal network
Internal network that
that can not be
can be accessed
accessed
externally.
externally.

Extranet is extension Only limited users


of company's Intranet. of a company.

For limited external


communication Only for
between customers, communication
suppliers and within a company.
business partners.

Explore our latest online courses and learn new skills at your own pace. Enroll and become a
certified expert to boost your career.
Internet Reference Models
OSI Reference Model
OSI is acronym of Open System Interface. This model is developed by the International
organization of Standardization (ISO) and therefore also referred as ISO-OSI Model.

The OSI model consists of seven layers as shown in the following diagram. Each layer has a
specific function, however each layer provide services to the layer above.

Physical Layer

The Physical layer is responsible for the following activities:

• Activating, maintaining and deactivating the physical connection.


• Defining voltages and data rates needed for transmission.
• Converting digital bits into electrical signal.
• Deciding whether the connection is simplex, half duplex or full duplex.
Data Link Layer

The data link layer performs the following functions:

• Performs synchronization and error control for the information which is to be transmitted
over the physical link.
• Enables error detection, and adds error detection bits to the data which are to be transmitted.
Network Layer

Following are the functions of Network Layer:

• To route the signals through various channels to the other end.


• To act as the network controller by deciding which route data should take.
• To divide the outgoing messages into packets and to assemble incoming packets into
messages for higher levels.
Transport Layer

The Transport layer performs the following functions:

• It decides if the data transmission should take place on parallel paths or single path.
• It performs multiplexing, splitting on the data.
• It breaks the data groups into smaller units so that they are handled more efficiently by the
network layer.
The Transport Layer guarantees transmission of data from one end to other end.

Session Layer

The Session layer performs the following functions:

• Manages the messages and synchronizes conversations between two different applications.
• It controls logging on and off, user identification, billing and session management.
Presentation Layer

The Presentation layer performs the following functions:

<="" ul="" style="box-sizing: border-box; margin-top: 0rem !important; margin-right:


0px; margin-bottom: 1rem !important; margin-left: 0px; padding: 1rem; font: inherit;
list-style: none; background-color: var(--clr-orange-100); border-radius: 0rem; gap:
0.5rem; display: grid;">

• This layer makes it sure that the information is delivered in such a form that the receiving
system will understand and use it.
Application Layer

The Application layer performs the following functions:

• It provides different services such as manipulation of information in several ways,


retransferring the files of information, distributing the results etc.
• The functions such as LOGIN or password checking are also performed by the application
layer.

TCP/IP Reference Model


TCP/IP model is practical model and is used in the Internet. TCP/IP is acronym of Transmission
Control Protocol and Internet Protocol.

The TCP/IP model combines the two layers (Physical and Data link layer) into one layer
i.e. Host-to-Network layer. The following diagram shows the various layers of TCP/IP model:

Application Layer

This layer is same as that of the OSI model and performs the following functions:
It provides different services such as manipulation of information in several ways,
retransferring the files of information, distributing the results etc.

The functions such as LOGIN or password checking are also performed by the
application layer.

Protocols used: TELNET, FTP, SMTP, DN, HTTP, NNTP are the protocols employed in this
layer.

Transport Layer

It does the same functions as that of transport layer in OSI model. Here are the key
points regarding transport layer:

It uses TCP and UDP protocol for end to end transmission.

TCP is reliable and connection oriented protocol.

TCP also handles flow control.

The UDP is not reliable and a connection less protocol also does not perform flow
control.

Protocols used: TCP/IP and UDP protocols are employed in this layer.

Internet Layer

The function of this layer is to allow the host to insert packets into network and then
make them travel independently to the destination. However, the order of receiving
the packet can be different from the sequence they were sent.

Protocols used: Internet Protocol (IP) is employed in Internet layer.


Host-to-Network Layer

This is the lowest layer in TCP/IP model. The host has to connect to network using
some protocol, so that it can send IP packets over it. This protocol varies from host to
host and network to network.

The field of computer networking is constantly evolving, driven by


advancements in technology and the growing demand for connectivity.
As we move further into the digital age, several trends are shaping the
future of computer networking. This article explores key trends and
innovations expected to impact the networking landscape.

1. Increased Adoption of 5G Technology


5G technology is set to revolutionize wireless networking by offering
significantly higher speeds, lower latency, and greater capacity compared
to previous generations.

Impact on Applications: The rollout of 5G will enhance applications such


as augmented reality (AR), virtual reality (VR), and Internet of Things
(IoT), enabling seamless connectivity and real-time data processing.

Enhanced Connectivity: 5G networks will support a larger number of


connected devices, facilitating the growth of smart cities, autonomous
vehicles, and advanced industrial automation.

2. Growth of Internet of Things (IoT)


The IoT continues to expand, with billions of devices connected to the
internet, from smart home appliances to industrial sensors.

Networking Challenges: The increasing number of connected devices will


require advanced networking solutions to manage bandwidth, latency,
and security effectively.
Trends in Network computing Messaging Collaboration
Here are some trends in network computing, messaging, and collaboration:
• Edge computing
Moves computation and storage closer to the end-user, which can
improve network performance and reliability. It can also improve data
privacy and security.
• Software-defined networking (SDN)
Uses software to manage and optimize network resources and
functions. SDN can improve flexibility, scalability, automation, and
innovation in network operations.
• Cloud networking
A subset of cloud computing that focuses on hosting network capabilities
and resources in the cloud.
• Wi-Fi technology
Wi-Fi 6 is a recent development in Wi-Fi technology. The WiFi Alliance
predicts that the total economic value of Wi-Fi 6 in the United States will
be nearly $1.6 trillion by 2025.

Other trends in network computing include:


• Internet of Things (IoT)
• Artificial Intelligence
• 4D Network
• 5G
• IPv6
• Automation and orchestration

What is SMAC?
SMAC is something of a buzzword in the IT industry. In the past, all business information
was generally kept on a centralised database and accessed via a client server model. This
meant that employees would have to log in to a SCM, ERP or CRM system. Prior to that, the
employee would usually have to undertake a training programme to help them understand
all of the complicated workflows, processes and interfaces.

Today, this has been addressed by the arrival of data visualisation tools and customised
ISVs that are built with industry specific templates, improving the user’s experience and
allowing executives to quickly gain access to the latest business information. Added to this
have been the integration of analytics tools and a host of social and collaborative
procedures: all of which can be accessed via mobile devices.

This combination of new technologies is known as Social, Mobile, Analytics and Cloud: or
SMAC for short. Social helps people to find their colleagues, who they can then collaborate
with; mobile provides access to other data sources and the cloud; the cloud contains the
information and the applications that people use; and analytics allows people to make
sense of this data. The broad idea of SMAC is that social networks like Facebook and Twitter
can be used for brand building and customer engagement; big data analytics can be used
to analyse large volumes of data; cloud computing provides a shared pool of resources;
and mobile applications provide access to services on the go.

Why SMAC is so important for businesses


In the coming years, it is widely expected that there will be three major trends that emerge
and affect not only IT technologies but also the way we do business: all of which will be
heavily impacted by SMAC. These include:

• New working styles: Today in business, both employees and customers expect
a style of content, collaboration and commerce that offers the same “anytime,
anywhere” convenience that they enjoy related to their personal lives with
companies such as Facebook and Amazon. It is expected that there will be an
increase in the mobile elite workforce; especially as wearable devices such as
watches and glasses add to user’s options.In terms of SMAC, business
applications will be required to embrace this approach in order to maximise
productivity and convenience. It is expected that SMAC architectures will
become the new way forward for interaction and the preferred application
paradigm. IT departments will need to offer a contextually relevant experience
that will support new working styles – seamlessly integrating mobile
application management with device management and social platforms.
• Digitisation of processes and business models: With society and nations
migrating towards the internet economy, entire business processes are
becoming increasingly digitised. Many media and entertainment industries
have made the digital switch – such as music and movies – and now it is likely
that other industries will see their physical chain become increasingly
digitised.In the SMAC era, the role of the CIO will change from an engineer to a
pioneer with processes set to be broken down into individual components and
redesigned from a digital perspective. Business process analysts will become
more like business process scientists needing to combine analytic skills with
an understanding of
• how to make the most of emerging technologies. Hybrid cloud environments
will also be needed to support these dynamic services and help create flexible
models for these digital services.
• Information overload: According to Cisco, the number of devices that are
connected to IP networks will actually be three times higher than the population
by 2017. This exponential growth, which will include the emergence of the internet
of things, will place new burdens on data centres and existing information
infrastructures.As such, within the SMAC area, IT departments will need to supply
an infrastructure layer that is capable of dealing with vast amounts of data
streaming as well as making informative and intelligent decisions.

Ans in one word


1.management is an _____system
2.MIS used computer_______
3.Dcision support system a ____request to be considered.
4.______ to design to run a computer hardware.
5.DB MS creating and managing____

1.Management information systems (MIS)?


1. create and share documents that support day-today office activities
2. process business transactions (e.g., time cards, payments, orders, etc.)
3. capture and reproduce the knowledge of an expert problem solver
4. use the transaction data to produce

2. To develop, operate, and maintain the information system is?


1. information worker
2. internal system user
3. systems owner
4. external system user

3 The person who ensures that systems are developed on time, within budget, and with
acceptable quality is a?
1. systems designer
2. project manager
3. systems owner
4. external system user

4 Which one of the following is not a business driver for an information system?
1. business process redesign
2. knowledge asset management
3. proliferation of networks and the Internet
4. security and privacy
5. ______________ converts ciphertext back into plaintext.
1.Encryption

2.A firewall

3.An encoder

4.Decreption

Answer in two marks


1.Define Management information system ?

2.Define DBMS?

3.Define Hardware?

4.Define Internet?

5.Define webpage?

6.Define website?

7.Define Networkcomputing?

8.Define System Software?

9.Define Application Software?

10.Short notes on Operating system?


Answer in Five marks Questions

1.Write Classification of MIS?

2.Explain DBMS?

3.Detail in Network computing?

4.Charactertics of MIS?

5. Details in types DBMs

Answer in Ten Marks Questions

1.Explain Fuctions of DBMS?

2.Explain to Internet Technology?


3.Explain computer hardware and Software?

4. Detail in SMAC

5.Short notes :on website, webpage

Web hosting ,webterms?

Common questions

Powered by AI

MIS supports performance tracking by collecting, storing, and analyzing data on business operations, such as sales figures and employee productivity. This information allows managers to identify performance issues early and make strategic decisions to address them. By providing timely and relevant data, MIS enables continuous performance monitoring and management, contributing to organizational efficiency and effectiveness .

Integration capability of MIS allows seamless data flow and sharing across various organizational systems such as ERP and CRM. This integration provides managers with a holistic view of organizational data, which is crucial for informed decision-making. It ensures that data from different departments can be combined to give a comprehensive view, improving the accuracy and speed of decision-making processes .

Organizations face challenges such as high implementation costs, resistance to change, and the need for ongoing maintenance and training when implementing MIS. These challenges can be mitigated by conducting thorough needs assessments, securing management support, investing in change management programs, and providing ongoing training and support to ensure that users are comfortable and adept at using the new system .

Investing in MIS involves evaluating both tangible and intangible benefits, such as increased efficiency and improved information quality, against costs like acquisition, implementation, and training. An accurate assessment of these factors influences decision-making by providing a clear view of the return on investment (ROI) and long-term benefits, enabling organizations to make justified investments in technology that align with their strategic goals .

Input devices like keyboards and scanners allow users to enter data into the MIS, which is then processed and used for decision-making. Output devices like monitors and printers display or print this information, making it accessible for users. These devices are essential as they facilitate the interaction between users and the MIS, ensuring that data is correctly inputted and that processed information is effectively communicated back to the users .

Security measures, such as access control and encryption, protect sensitive data within MIS and address vulnerabilities such as unauthorized access and data breaches. The implications for risk management include the need for regular security audits and risk assessments to identify and mitigate potential threats. By securing MIS, organizations can protect their data integrity and confidentiality, thereby maintaining stakeholder trust and ensuring compliance with regulatory standards .

SMAC technologies are transforming MIS by enhancing their capability to collect, manage, and analyze information. Social platforms facilitate collaboration and customer interactions. Mobility ensures that data and applications are accessible from anywhere. Analytics provides deep insights through data analysis, while Cloud enhances storage and processing capabilities, allowing MIS to handle large datasets efficiently. These technologies together create more agile and responsive MIS, facilitating better decision-making and operational efficiency .

Real-time information from MIS allows decision-makers to access current data, enhancing their ability to respond swiftly to changes in the business environment. This capability is significant for strategic decision-making as it enables organizations to take timely actions, capitalize on opportunities, and mitigate risks effectively, thereby maintaining a competitive edge .

Normalization in Database Management Systems organizes data into tables to reduce redundancy and improve data integrity. In an MIS framework, this process ensures that data is consistent and reliable, which is crucial for generating accurate and meaningful reports. By eliminating unnecessary duplication of data, normalization enhances database performance and efficiency, leading to better decision support .

Business Intelligence (BI) in MIS provides frameworks for processing and analyzing data, turning it into actionable insights. BI tools like data warehousing, OLAP, and data mining allow businesses to uncover patterns and trends. This leads to improved decision-making by providing timely, relevant, and accurate insights, enabling businesses to anticipate market trends, optimize operations, and enhance strategic planning .

You might also like