new mis
TRANSCRIPT
8/8/2019 new mis
http://slidepdf.com/reader/full/new-mis 1/4
20. Explain Business Intelligence using RTM.
Remember the example I gave while planning to watch a movie when not in vicinity of the theater where RTM
system finds out using GPS and decides not to going you a reminder for watching a movie as a task« as the priority
level of this task is LOW.
22. Explain Knowledge Management using Augmented Reality as technology?
Remember the example I gave you of TajMahal where person stands in front of it to find other juice bards,
restaurants and hotel.
Using Internet based knowledge management services (Wikipedia, Yelp, Google Map, Yatra.com, Meru) you can
check the menu, order or book the hotel suite as well as find out reviews about hotel or rent a car for commute.
23. Explain Application Integration using Evernote Trunk.
Get this URL - http://www.evernote.com/about/trunk/
Go to µHardware¶ Tab..
Look for any product ±
1.FujuitsuScanSnap
2. Eye-Fi
3. Nokia N-900
Explain how µEvernote¶ service can integrate with above hardware.
29. What are the important factors to remember in Report Design?
Please refer any search engine«should be in notes given by me«It¶s a general question.
32.Write a short note on security of a system
Computer security is a branch of computer technology known as information security as applied to computers and
networks. The objective of computer security includes protection of information and property from theft, corruption,
or natural disaster, while allowing the information and property to remain accessible and productive to its intended
users. The term computer system security means the collective processes and mechanisms by which sensitive and
valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security
often differ from most other computer technologies because of its somewhat elusive objective of preventing
unwanted computer behavior instead of enabling wanted computer behavior.
33.Explain what is data independence.
Techniques that allow data to be changed without affecting the applications that process it. There are two kinds of
data independence. The first type is data independence for data, which is accomplished in a database management
system (DBMS). It allows the database to be structurally changed without affecting most existing programs.Programs access data in a DBMS by field and are concerned with only the data fields they use, not the format of thecomplete record. Thus, when the record layout is updated (fields added, deleted or changed in size), the only
programs that must be changed are those that use those new fields.
The second type of data independence relates to processing and refers to miscellaneous data used in programs thatmight change in the future, such as discount rates, product descriptions and error messages. Such data should be
stored in asthe database item is altered, a much simpler task than recompiling numerous programs.
8/8/2019 new mis
http://slidepdf.com/reader/full/new-mis 2/4
The disjointing of data descriptions from the application programs (or user-interfaces) that uses the data is called
data independence. Data independence is one of the main advantages of DBMS. The three-schema architecture
provides the concept of data independence, which means that upper-levels are unaffected by changes to lower-
levels. The three schemas architecture makes it easier to achieve true data independence. There are two kinds of data independence.
- Physical data independence
* The ability to modify the physical scheme without causing application programs to be rewritten.* Modifications at this level are usually to improve performance.
- Logical data independence
* The ability to modify the conceptual scheme without causing application programs to be rewritten.
* Usually done when logical structure of database is altered.
Logical data independence is harder to achieve as the application programs are usually heavily dependent on the
logical structure of the data. An analogy is made to abstract data types in programming languages.
34. What are the advantages of database management system?
Database is a software program, used to store, delete, update and retrieve data. Adatabase can be limited to a single
desktop computer or can be stored in large server machines, like the IBM Mainframe. There are various database
management systems available in the market. Some of them are Sybase, Microsoft SQL Server, Oracle RDBMS,PostgreSQL, MySQL, etc.
The advantages of the database management systems can be enumerated as under:
Warehouse of Information The database management systems are warehouses of information, where large amount of data can be stored. The
common examples in commercial applications are inventory data, personnel data, etc. It often happens that a
common man uses a database management system, without even realizing, that it is being used. The best examples
for the same, would be the address book of a cell phone, digital diaries, etc. Both these equipments store data in their
internal database.
Defining Attributes
The unique data field in a table is assigned a primary key. The primary key helps in the identification of data. It alsochecks for duplicates within the same table, thereby reducing data redundancy. There are tables, which have a
secondary key in addition to the primary key. The secondary key is also called 'foreign key'. The secondary keyrefers to the primary key of another table, thus establishing a relationship between the two tables.
Systematic Storage The data is stored in the form of tables. The tables consists of rows and columns. The primary and secondary key
help to eliminate data redundancy, enabling systematic s
Changes to Schema The table schema can be changed and it is not platform dependent. Therefore, the tables in the system can be edited
to add new columns and rows without hampering the applications, that depend on that particular database.
No Language Dependence The database management systems are not language dependent. Therefore, they can be used with
various languages and on various platforms.
Table Joins The data in two or more tables can be integrated into a single table. This enables to reduce the size of the database
and also helps in easy retrieval of data.
Multiple Simultaneous Usage The database can be used simultaneously by a number of users. Various users can retrieve the same data
simultaneously. The data in the database can also be modified, based on the privileges assigned to users.
8/8/2019 new mis
http://slidepdf.com/reader/full/new-mis 3/4
Data Security Data is the most important asset. Therefore, there is a need for data security. Database management systems help to
keep the data secured.
Privileges Different privileges can be given to different users. For example, some users can edit the database, but are not
allowed to delete the contents of the database.
Abstract View of Data and Easy Retrieval DBMS enables easy and convenient retrieval of data. A database user can view only the abstract form of data; the
complexities of the internal structure of the database are hidden from him. The data fetched is in user friendly
format.
Data Consistency Data consistency ensures a consistent view of data to every user. It includes the accuracy, validity and integrity of
related data. The data in the database must satisfy certain consistency constraints, for example, the age of a
candidate appearing for an exam should be of number datatype and in the range of 20-25. When the database isupdated, these constraints are checked by the database systems.
The commonly used database management system is called relational database management system (RDBMS). Themost important advantage of database management systems is the systemetic storage of data, by maintaining the
relationship between the data members. The data is stored as tuples in a RDBMS.
The advent of object oriented programming gave rise to the concept of object oriented database managementsystems. These systems combine properties like inheritance, encapsulation, polymorphism, abstraction with
atomicity, consistency, isolation and durability, also called ACID properties of DBMS.
Database management systems have brought about systematization in data storage, along with data security.
36. What are the possible challenges while setting up Information Systems?
When talking about the vast field of Information Systems there is not just one pressing issue, there are three:Accuracy, Usability, and Time. Without the combination of these three factors a business would go under in the
matter of months.
The first of these three and probably the most important of these is the accuracy of the information. The information
that you provide someone with in order to make vital decisions must be precisely accurate. If one piece of data is
incorrect it could mean the difference between life and death, literally. For example, if a doctor receives false
information about a patient¶s allergies he may give that patient medicine that could eventually kill them. Another
recent instance where inaccurate information caused a catastrophe is with Enron. They falsified financial
information causing the company to collapse. If a news station were to give a report that was invalid, they would
lose their credibility and respect from the people. Accuracy is a must when it comes to information that is provided
to make decisions of any kind.
Another major issue involving information systems is the information¶s usability. If the business uses software to
access the information it has to be easy to use and understand for the end-user as well as the executives. The
information needs to be easily accessible from the hardware where it is stored. Also, if the information is generatedinto a report form of some kind, the report must be made so that it can be interpreted effortlessly in order to make
precise decisions. The information provided should have value to the decisions at hand.
The final of the three most significant challenges of the field of Information Systems is the time factor. As time
progresses everything is built bigger and faster and people seem to be always operating at a faster pace, therefore
information needs to be received at a faster rate. If a person or business does not get the information in time to make
a prompt decision they could lose out on many opportunities. This concept all started when the phone was
introduced and people could be connected to each other in an instant, instead of waiting a week for a letter in themail. Now as the internet has evolved, people and businesses can send documents and other information to one
another in matter of seconds, causing decision-making times to decrease dramatically. A good example of this high
information transfer rate is a cash register. At Sam¶s Club, where I work, within one minute the computer can check
8/8/2019 new mis
http://slidepdf.com/reader/full/new-mis 4/4
on the member¶s status, scan the items decreasing the inventory, calculate the total, send the transaction to the
database, verify the member¶s credit card, check, or debit card, and even connect to a bank and pre-approve them for
another credit card. As people remain to progressively become more frantically fast paced the challenge of
information getting to them will need also to become faster.
These three aspects of Information Systems must be used in conjunction with one another. Information may bereceived quickly and easy to use, but if it is inaccurate it is worthless. Just the same if the information is either tooslow or incomprehensible it is useless as well. ³Being an information services provider, we especially understand
the importance of speed, accuracy, flexibility, technology and the highest level of customer service as being key
components of a successful marketing strategy in a competitive environment,´ states Berkshire Information Systems
Inc. The biggest challenge of these three issues is combining them together in an efficient effective manner.
37. What is Personal Information management system. Explain with an example.
Personal information management (PIM) refers to both the practice and the study of the activities people
perform in order to acquire, organize, maintain, retrieve and use information items such as documents (paper-based
and digital), web pages and email messages for everyday use to complete tasks (work-related or not) and fulfill a
person¶s various roles (as parent, employee, friend, member of community, etc.).
One ideal of PIM is that we always have the right information in the right place, in the right form, and of sufficient
completeness and quality to meet our current need. Technologies and tools such as personal information managers
help us spend less time with time-consuming and error-prone activities of PIM (such as looking for information).We then have more time to make creative, intelligent use of the information at hand in order to get things done, or to
simply enjoy the information itself.
Example : Couldn¶t find the example«. Example is MicrosoftOutlook or Apple Mobileme services
38. What are the characteristics of effective MIS?
39. What are the constraints in operating MIS?
40. What are inputs and output of MIS?
Above all three are the part of Notes given by you« make sure you get those from your friends«.I have also
referred a book for this.
MIS Paper - (Total Marks - 60 Marks)
Q 1- (Any 2 - 5 Marks)
Q 2- (Any 2 - 5 Marks)
Q 3- (Any 2 - 5 Marks)
Q 4. (Compulsory - 10 Marks)
Q 5. (Any 2 - 10 Marks)