MS - 54 Management Information Systems

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )



ASSIGNMENT


Course Code                                                                      :               MS - 54
Course Title                                                                       :               Management Information Systems
Assignment Code                                                            :               MS-54/TMA/SEM - I /2015
Coverage                                                                             :               All Blocks


Note : Attempt all the questions and submit this assignment on or before 30th April, 2015 to the coordinator of your study center.


Q. 1. What is the role played by business information in an organization? Define Management Information System and discuss various characteristics expected of a good MIS.

Answer:Information is vitally important to the successful functioning of any organization.  The absence of organization can be taken to mean many things that is not intended.  For example, if a vendor does not hear from a supplier, it could be interpreted as rudeness as something not intended.  The absence of organization could also be interpreted as a sense of disorder and a lack of precision in the way business is conducted. In contrast, the constant and steady stream of communication and information helps to build credibility, reflect a sense of transparency in business interactions, and can probably do more good than not




Q. 2. Explain and distinguish the following concepts with reference to their use in real-time systems:

Answer:Real-time locating systems (RTLS) are used to automatically identify and track the location of objects or people in real time, usually within a building or other contained area. Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location. Examples of real-time locating systems include tracking automobiles through an assembly line, locating pallets of merchandise in a warehouse, or finding medical equipment in a hospital.  The



Q. 3. What are expert systems and how do they help in decision-making? Can you give examples to illustrate the same? What kinds of decisions can be appropriately programmed on expert systems? Give examples.

Answer:Expert Systems for Management (ESM) is a software system designed to improve decision-making in management. It can make inferences and conclusions based on stored human knowledge. The ESM is useful in such management tasks as analyzing a wide variety of information, production scheduling, and diagnosing and troubleshooting. However, the ESM cannot perform tasks involving the use of creativity, common sense, discovery, innovation, and other functions requiring human intelligence. The use of this system offers




Q. 4. Identify the most important factors inhibiting an organization’s move towards a DBMS. Why should an organization be careful about placing over reliance on “benchmark” tests in selecting a DBMS?

Answer:Probably the most important general features to consider in your DBMS hunt are security-related. Consider how thoroughly the DBMS requires authentication from users and keeps an audit trail of the accesses. But security goes beyond keeping out malicious users. Be sure your backup supports backup and restore, not just by archiving




Q. 5. Differentiate among Trojans, Worms and Viruses. Give one example for each. “Computer virus is a major threat to computer security.” Justify the statement.

Answer:One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.