new mis

4
20. Explain Business Intelligence using RTM. Remember the example I gave while planning to watch a movie when not in vicinity of the theater where RTM system finds out using GPS and decides not to going you a reminder for watching a movie as a task« as the priority level of this task is LOW. 22. Explain Knowledge Management using Augmented Reality as technology? Remember the example I gave you of TajMahal where person stands in front of it to find other juice bards, restaurants and hotel. Using Internet based knowledge management services (Wikipedia, Yelp, Google Map, Yatra.com, Meru) you can check the menu, order or book the hotel suite as well as find out reviews about hotel or rent a car for commute. 23. Explain Application Integration using Evernote Trunk. Get this URL - http://www .evernote.com/about/tru nk/ Go to µHardware¶ Tab.. Look for any product ± 1.FujuitsuScanSnap 2. Eye-Fi 3. Nokia N-900 Explain how µEvernote¶ service can integrate with above hardware. 29. What are the important factors to remember in Report Design? Please refer any search engine«should be in n otes given by me«It¶s a general question. 32.Write a short note on security of a system Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collecti ve processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events r espective ly. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior. 33.Explain what is data independence. Techniques that allow data to be changed without affecting the applications that process it. There are two kinds of data independence. The first type is data independence for data, which is accomplished in a database management system (DBMS). It allows the database to be structurally changed without affecting most existing programs. Programs access data in a DBMS by field and are concerned with only the data fields they use, not the format of the complete record. Thus, when the record layout is updated (fields added, deleted or changed in size), the only  programs that must be changed are those that use those n ew fields. The second type of data independence relates to processing and refers to miscellaneous data used in programs that might change in the future, such as discount rates, product descriptions and error messages. Such data should be stored in asthe database item is altered, a much simpler task than r ecompili ng numerous programs.

Upload: akbaromeo

Post on 09-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

8/8/2019 new mis

http://slidepdf.com/reader/full/new-mis 1/4

20. Explain Business Intelligence using RTM.

Remember the example I gave while planning to watch a movie when not in vicinity of the theater where RTM

system finds out using GPS and decides not to going you a reminder for watching a movie as a task« as the priority

level of this task is LOW.

22. Explain Knowledge Management using Augmented Reality as technology?

Remember the example I gave you of TajMahal where person stands in front of it to find other juice bards,

restaurants and hotel.

Using Internet based knowledge management services (Wikipedia, Yelp, Google Map, Yatra.com, Meru) you can

check the menu, order or book the hotel suite as well as find out reviews about hotel or rent a car for commute.

23. Explain Application Integration using Evernote Trunk.

Get this URL - http://www.evernote.com/about/trunk/

Go to µHardware¶ Tab..

Look for any product ± 

1.FujuitsuScanSnap

2. Eye-Fi

3. Nokia N-900

Explain how µEvernote¶ service can integrate with above hardware.

29. What are the important factors to remember in Report Design?

Please refer any search engine«should be in notes given by me«It¶s a general question.

32.Write a short note on security of a system 

Computer security is a branch of computer technology known as information security as applied to computers and

networks. The objective of computer security includes protection of information and property from theft, corruption,

or natural disaster, while allowing the information and property to remain accessible and productive to its intended

users. The term computer system security means the collective processes and mechanisms by which sensitive and

valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security

often differ from most other computer technologies because of its somewhat elusive objective of preventing

unwanted computer behavior instead of enabling wanted computer behavior.

33.Explain what is data independence.

Techniques that allow data to be changed without affecting the applications that process it. There are two kinds of 

data independence. The first type is data independence for data, which is accomplished in a database management

system (DBMS). It allows the database to be structurally changed without affecting most existing programs.Programs access data in a DBMS by field and are concerned with only the data fields they use, not the format of thecomplete record. Thus, when the record layout is updated (fields added, deleted or changed in size), the only

 programs that must be changed are those that use those new fields.

The second type of data independence relates to processing and refers to miscellaneous data used in programs thatmight change in the future, such as discount rates, product descriptions and error messages. Such data should be

stored in asthe database item is altered, a much simpler task than recompiling numerous programs.

8/8/2019 new mis

http://slidepdf.com/reader/full/new-mis 2/4

The disjointing of data descriptions from the application programs (or user-interfaces) that uses the data is called

data independence. Data independence is one of the main advantages of DBMS. The three-schema architecture

 provides the concept of data independence, which means that upper-levels are unaffected by changes to lower-

levels. The three schemas architecture makes it easier to achieve true data independence. There are two kinds of data independence.

- Physical data independence

* The ability to modify the physical scheme without causing application programs to be rewritten.* Modifications at this level are usually to improve performance.

- Logical data independence

* The ability to modify the conceptual scheme without causing application programs to be rewritten.

* Usually done when logical structure of database is altered.

Logical data independence is harder to achieve as the application programs are usually heavily dependent on the

logical structure of the data. An analogy is made to abstract data types in programming languages.

34. What are the advantages of database management system?

Database is a software program, used to store, delete, update and retrieve data. Adatabase can be limited to a single

desktop computer or can be stored in large server machines, like the IBM Mainframe. There are various database

management systems available in the market. Some of them are Sybase, Microsoft SQL Server, Oracle RDBMS,PostgreSQL, MySQL, etc.

The advantages of the database management systems can be enumerated as under:

Warehouse of Information The database management systems are warehouses of information, where large amount of data can be stored. The

common examples in commercial applications are inventory data, personnel data, etc. It often happens that a

common man uses a database management system, without even realizing, that it is being used. The best examples

for the same, would be the address book of a cell phone, digital diaries, etc. Both these equipments store data in their 

internal database.

Defining Attributes 

The unique data field in a table is assigned a primary key. The primary key helps in the identification of data. It alsochecks for duplicates within the same table, thereby reducing data redundancy. There are tables, which have a

secondary key in addition to the primary key. The secondary key is also called 'foreign key'. The secondary keyrefers to the primary key of another table, thus establishing a relationship between the two tables.

Systematic Storage The data is stored in the form of tables. The tables consists of rows and columns. The primary and secondary key

help to eliminate data redundancy, enabling systematic s

Changes to Schema The table schema can be changed and it is not platform dependent. Therefore, the tables in the system can be edited

to add new columns and rows without hampering the applications, that depend on that particular database.

No Language Dependence The database management systems are not language dependent. Therefore, they can be used with

various languages and on various platforms.

Table Joins The data in two or more tables can be integrated into a single table. This enables to reduce the size of the database

and also helps in easy retrieval of data.

Multiple Simultaneous Usage The database can be used simultaneously by a number of users. Various users can retrieve the same data

simultaneously. The data in the database can also be modified, based on the privileges assigned to users.

8/8/2019 new mis

http://slidepdf.com/reader/full/new-mis 3/4

Data Security Data is the most important asset. Therefore, there is a need for data security. Database management systems help to

keep the data secured.

Privileges Different privileges can be given to different users. For example, some users can edit the database, but are not

allowed to delete the contents of the database.

Abstract View of Data and Easy Retrieval DBMS enables easy and convenient retrieval of data. A database user can view only the abstract form of data; the

complexities of the internal structure of the database are hidden from him. The data fetched is in user friendly

format.

Data Consistency Data consistency ensures a consistent view of data to every user. It includes the accuracy, validity and integrity of 

related data. The data in the database must satisfy certain consistency constraints, for example, the age of a

candidate appearing for an exam should be of number datatype and in the range of 20-25. When the database isupdated, these constraints are checked by the database systems.

The commonly used database management system is called relational database management system (RDBMS). Themost important advantage of database management systems is the systemetic storage of data, by maintaining the

relationship between the data members. The data is stored as tuples in a RDBMS.

The advent of object oriented programming gave rise to the concept of object oriented database managementsystems. These systems combine properties like inheritance, encapsulation, polymorphism, abstraction with

atomicity, consistency, isolation and durability, also called ACID properties of DBMS.

Database management systems have brought about systematization in data storage, along with data security.

36. What are the possible challenges while setting up Information Systems? 

When talking about the vast field of Information Systems there is not just one pressing issue, there are three:Accuracy, Usability, and Time. Without the combination of these three factors a business would go under in the

matter of months.

The first of these three and probably the most important of these is the accuracy of the information. The information

that you provide someone with in order to make vital decisions must be precisely accurate. If one piece of data is

incorrect it could mean the difference between life and death, literally. For example, if a doctor receives false

information about a patient¶s allergies he may give that patient medicine that could eventually kill them. Another 

recent instance where inaccurate information caused a catastrophe is with Enron. They falsified financial

information causing the company to collapse. If a news station were to give a report that was invalid, they would

lose their credibility and respect from the people. Accuracy is a must when it comes to information that is provided

to make decisions of any kind.

Another major issue involving information systems is the information¶s usability. If the business uses software to

access the information it has to be easy to use and understand for the end-user as well as the executives. The

information needs to be easily accessible from the hardware where it is stored. Also, if the information is generatedinto a report form of some kind, the report must be made so that it can be interpreted effortlessly in order to make

 precise decisions. The information provided should have value to the decisions at hand.

The final of the three most significant challenges of the field of Information Systems is the time factor. As time

 progresses everything is built bigger and faster and people seem to be always operating at a faster pace, therefore

information needs to be received at a faster rate. If a person or business does not get the information in time to make

a prompt decision they could lose out on many opportunities. This concept all started when the phone was

introduced and people could be connected to each other in an instant, instead of waiting a week for a letter in themail. Now as the internet has evolved, people and businesses can send documents and other information to one

another in matter of seconds, causing decision-making times to decrease dramatically. A good example of this high

information transfer rate is a cash register. At Sam¶s Club, where I work, within one minute the computer can check 

8/8/2019 new mis

http://slidepdf.com/reader/full/new-mis 4/4

on the member¶s status, scan the items decreasing the inventory, calculate the total, send the transaction to the

database, verify the member¶s credit card, check, or debit card, and even connect to a bank and pre-approve them for 

another credit card. As people remain to progressively become more frantically fast paced the challenge of 

information getting to them will need also to become faster.

These three aspects of Information Systems must be used in conjunction with one another. Information may bereceived quickly and easy to use, but if it is inaccurate it is worthless. Just the same if the information is either tooslow or incomprehensible it is useless as well. ³Being an information services provider, we especially understand

the importance of speed, accuracy, flexibility, technology and the highest level of customer service as being key

components of a successful marketing strategy in a competitive environment,´ states Berkshire Information Systems

Inc. The biggest challenge of these three issues is combining them together in an efficient effective manner.

37. What is Personal Information management system. Explain with an example.

Personal information management (PIM) refers to both the practice and the study of the activities people

 perform in order to acquire, organize, maintain, retrieve and use information items such as documents (paper-based

and digital), web pages and email messages for everyday use to complete tasks (work-related or not) and fulfill a

 person¶s various roles (as parent, employee, friend, member of community, etc.).

One ideal of PIM is that we always have the right information in the right place, in the right form, and of sufficient

completeness and quality to meet our current need. Technologies and tools such as personal information managers

help us spend less time with time-consuming and error-prone activities of PIM (such as looking for information).We then have more time to make creative, intelligent use of the information at hand in order to get things done, or to

simply enjoy the information itself.

Example : Couldn¶t find the example«. Example is MicrosoftOutlook or Apple Mobileme services

38. What are the characteristics of effective MIS?

39. What are the constraints in operating MIS?

40. What are inputs and output of MIS?

Above all three are the part of Notes given by you« make sure you get those from your friends«.I have also

referred a book for this.

MIS Paper - (Total Marks - 60 Marks)

Q 1- (Any 2 - 5 Marks)

Q 2- (Any 2 - 5 Marks)

Q 3- (Any 2 - 5 Marks)

Q 4. (Compulsory - 10 Marks)

Q 5. (Any 2 - 10 Marks)