Professional Documents
Culture Documents
2 Marks in MIS PDF
2 Marks in MIS PDF
2 Marks
UNIT I
1. Define MIS.
A management information system (MIS) is a system or process that provides information needed to
manage organizations effectively. An 'MIS' is a planned system of the collecting, processing, storing and
disseminating data in the form of information needed to carry out the functions of management.
2. Goals of MIS
• Provide managers with information
• Regular, routine operations
• Control, organize and plan better
3. Benefits of MIS
• Effective and efficient coordination between Departments
• Quick and reliable referencing
• Access to relevant data and document
• Use of less labour
• Improvement in organizational and departmental techniques
• Management of day-to-day activities
4. Data
Data is the raw material in the production of information. It represents a fact; a number, a statement, or a
picture. A single piece of data has no meaning unless the context is understood.
5. Information
Information is the data that have meaning within a context. Data in relationships and pattern gives
information. Data after manipulation is called information.
6. Knowledge
Knowledge is seen as a dynamic human process of justifying personal beliefs as part of an aspiration for the
“truth”. Knowledge is the acquisition and even the understanding that one has acquired information.
7. Intelligence
Intelligence is the processes and the products that lead to understanding and taking decisions related to
reality. Intelligence is a way of manipulating information.
9. Information System
An information system (IS) is an arrangement of people, processes, data, and technology that interact to
collect, process, store and provide as output the information needed to support an organization.
UNIT II
1. System analysis
System analysis is a process of investigating a system, identifying problems and using the information to
recommend improvements to the system. Here the responsibility includes only requirement determination,
not the design of the system.
2. System Design
System design is a process of designing a new system based on the user requirements and the detailed
analysis of the existing system. It is the most crucial phase in the developments of a system. The logical
system design arrived at as a result of systems analysis is converted into physical system design.
Analyze the resources, products and activities of any Develop general specification for how input,
information systems presently used processing output storage and control activities.
Determine the information system capabilities that Develop detailed specification for user interface
will meet the information needs of an end user. products and methods, database structures and
processing and control procedures.
Document and communicate the logical input, Document and communicate the detailed
processing and output storage and control specification of the proposed system to end user.
requirements of a proposed new or improved
information system
4. DFD
A data flow diagram (DFD) is a design tool to represent the flow of data through an information system. A
data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system,
modeling its process aspects.
5. ER Diagram
The Entity-Relationship (ER) model is a conceptual data model, capable of describing the data requirements
for a new information system in a direct and easy to understand graphical notation.
6. Entities
7. Attributes
Attribute describe the elementary properties of entities or relationships.
For example, Surname, Salary and Age are possible attributes of the Employee entity.
Attributes Example
8. Data Dictionary
In database management systems, a file that defines the basic organization of a database is called Data
Dictionary. A data dictionary contains a list of all files in the database, the number of records in each file,
and the names and types of each field.
9. Pseudocode
Pseudocode is a compact and informal high-level description of a computer programming algorithm that
uses the structural conventions of a programming language, but is intended for human reading rather than
machine reading.
Ex: IF <condition>
DO stuff;
ELSE
DO other stuff;
12. Normalisation
Database normalization is the process of removing redundant data from the tables in order to improve
storage efficiency, data integrity, and scalability.
13. DBMS
A collection of programs that enables one to store, modify, and extract information from a database.
15. RDBMS
RDBMS is a DBMS in which data is stored in tables and the relationships among the data are also stored in
tables. The data can be accessed or reassembled in many different ways without having to change the table
forms.
Relation – Table
Tuple -Record/Row
Attributes - Field/Columns
Domain - Set of valid values of attributes
Degree -Number of columns in a table
Cardinality -Number of rows in a table
23. System
A system is a group of interrelated components working together towards common goals by accepting inputs
and producing outputs in an organized transformation process.
25. SQL
SQL often referred as structured query language is a database computer language designed for managing
data in relational database management systems and originally based upon relational algebra.
26. Middleware
Middleware is computer software that provides services to software applications beyond those available
from the operating system. Middleware can be described as "software glue" that binds between the
software component.
UNIT III
1. HRIS
The Human Resource Information System (HRIS) is a software or online solution for the data entry, data
tracking, and data information needs of the Human Resources, payroll, management, and accounting
functions within a business.
2. DSS
Decision support systems (DSS) are computer-based information system that supports business or
organizational decision-making activities. DSS serve the management, operations and planning levels of an
organization and help to make decisions.
4. Knowledge
Knowledge is nothing but application of data and information; answers "how" questions. Knowledge is the
appropriate collection of information, such that its intent is to be useful.
5. Artificial Intelligence
The sub-field of computer science concerned with understanding the concepts and methods of human
reasoning, and the application of this understanding to the development of computer programs that exhibit
intelligent behavior.
6. Knowledge Gap
The difference between what the enterprise requires and what it currently has is called the Knowledge gap.
7. Explicit Knowledge
The knowledge that individuals are able to express fairly, easily using language or other forms of
communication are called explicit knowledge.
8. Tacit Knowledge
Tacit knowledge is difficult to express and formalize and therefore difficult to share. Tacit knowledge is
more likely to be personal and based on individual experience and activities.
9. Externalization
10. Internalization
Internalization is the conversion of explicit knowledge into tacit knowledge. It represents the traditional
notion of learning.
11. Socialization
Socialization facilitates the sharing tacit knowledge in cases in which new tacit knowledge is created as well
as new tacit knowledge is not created.
12. Routines
Routines involve the utilization of knowledge embedded in procedures, rules and norms that guide future
behavior. Routines economize on communication more than directions because they are embedded in
procedures or technologies.
13. Direction
Direction refers to the process through which individuals possessing the knowledge, direct the action of
another individual without transferring to that person the knowledge underlying the direction. Direction is
the process used when a production worker calls experts to ask them how to solve a particular problem with
a machine and then proceeds to solve the problem based on the instructions given the experts.
Distributed information systems which support similar business activities in highly diverse environments
commonly found across country boundaries is called International Information System.
UNIT IV
1. Information Security
Information security means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification or destruction.
2. Data Validation
Data validation is the process of ensuring that a program operates on clean, correct and useful data. It checks
for validity, correctness and security of the data.
3. Tampering
When a message is sent, sender usually wants it to arrive unaltered. Tampering is altering the message in
between the sender and the receiver.
4. Denial of Service
Denying the service to the authorized user by the attacker is called denial of service (DOS)
5. Confidentiality
Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or
systems.
6. Integrity
In information security, integrity means that data cannot be modified without authorization. Example: When
a employee is able to modify his own salary in a payroll database.
7. Authenticity
The process of ensuring the data, transactions, communications or documents (electronic or physical) are
genuine is called authenticity. It is also important for authenticity to validate that both parties involved are
who they claim they are.
8. Software testing
Software testing is an investigation conducted to provide stakeholders with information about the quality of
the product or service under test. Software testing is any activity aimed at evaluating an attribute or
capability of a program or system and determining that it meets its required results.
9. Unit testing
Unit testing refers to tests that verify the functionality of a specific section of code, usually at the function
level. Unit testing is also called component testing. Unit testing is a method by which individual units of
source code, sets of one or more computer program modules are tested to determine if they are fit for use
17. Hacking
Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use
ready-made computer programs to attack the target computer. They possess the desire to destruct and they
get the kick out of such destruction.
19. Virus
A program that has capability to infect other programs and make copies of itself and spread into other
programs is called virus. Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network.
20. Worm
Programs that multiply like viruses but spread from computer to computer occupying the entire space of the
computer are called as worms. Worms make functional copies of themselves and do this repeatedly till they
eat up all the available space on a computer's memory.
30. Encryption
Coding and scrambling of messages to prevent their access without authorization.
31. Digital signature: Digital code attached to electronically transmitted message to uniquely identify
contents and sender. A Digital Signature means authentication of any electronic record by a subscriber by
means of an ‘electronic method.’ It is using a combination of ‘Public Key’ and a ‘Private Key’, which
convert the message into digital form. A private key will create a digital signature and one can use the public
key to verify the digital signature.
34. Antivirus
Virus is program codes that introduce malicious logic into computer systems. Ex: worms, virus, Trojan
horse etc. Antivirus software is specially written to defend a system against the threats that malware
presents.
36. Intranet
Intranet is the generic term for a collection of private computer networks within an organization. An intranet
uses network technologies as a tool to facilitate communication between people or work groups to improve
the data sharing capability and overall knowledge base of an organization's employees.
38. TCP/IP
The Protocol used to connect a number different networks designed by different vendors into a network of
networks (the "Internet").
IP - is responsible for moving packet of data from node to node.
TCP - is responsible for verifying the correct delivery of data from client to server.
39. Router
A router is a device or, in some cases, software in a computer, that determines the next network point to
which a packet should be forwarded toward its destination.
45. Bluetooth
Bluetooth is a specification for the use of low-power radio communication to wirelessly link phones,
computers and other network devices over short distances. Bluetooth technology was designed primarily to
support simple wireless networking of personal consumer devices and peripherals, including cell phones,
PDAs and wireless headsets.
48. Computer Ethics defined as the application of classical ethical principles to the use of computer
technology.
50. Patents
A patent is a set of exclusive rights granted by a state (national government) to an inventor or their assignee
for a limited period of time in exchange for a public disclosure of an invention.
51. Copyrights
Copyright is a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an
original work, including the right to copy, distribute and adapt the work.
52. Trademarks
A trademark is typically a name, word, phrase, logo, symbol, design, image, or a combination of these
elements.
A trademark may be designated by the following symbols:
™ - for an unregistered trade mark, that is, a mark used to promote or brand goods
℠ - for an unregistered service mark, that is, a mark used to promote or brand services
® - for a registered trademark
UNIT 5
1. e-business
Electronic business, commonly referred to as "eBusiness" or "e-business", or an internet business, may be
defined as the application of information and communication technologies (ICT) in support of all the
activities of business. It constitutes the exchange of products and services between businesses, groups and
individuals.
3. E-Business VS E-Commerce
E-Commerce E-Business
E-commerce describes the process of buying,
Compared with e-commerce, e-business is
selling, transferring or exchanging products,
more generic term; it refers not only to
service, and or information via computerinformation exchanges related to buying and
networks including the internet. selling but also to servicing the customers
and collaborating with business partners,
distributors and suppliers.
E-commerce can take several forms E-business encompasses sophisticated B2B
depending on degree of digitization. The interactions and collaboration activities at a
degree of digitization relates to: level of enterprise applications and business
• The product process.
• The process
• The delivery agent
4. M-Commerce
It refers to use of mobile devices for conducting the business transactions.
5. Objectives of e-governance
• To support and simply governance for all stakeholders - government, businesses and citizens
• To increase the efficiency and speed in a transparent manner
• To interconnect citizens, businesses and government to save significant cost
• Citizens have access to information and knowledge about the political.
6. ERP
ERP or Enterprise Resource Planning systems are software systems for businesses management
encompassing modules supporting functional areas such as sales and marketing, finance, production,
distribution accounting, human resource management, maintenance, inventory management, project
management, transportation and e-business etc
7. ERP Packages
ERP is a commodity -- product in the form of software
SAP, Oracle Applications, PeopleSoft, JD Edwards, Greatplains etc. are world’s leading ERP
packages
The market leader is “SAP”
8. Merits of ERP
Ensure quicker processing of information and reduce the burden of paperwork.
Serving the customers efficiently by way of prompt response and follow up
Disposing Queries immediately and facilitating payment from customers
Help to control data and facilitates the necessary contacts to acquire the same.
10. Datawarehousing
11. DataMart: A departmental data warehouse that stores only relevant data.
12. Operational Data Stores (ODS): A type of database often used as an interim area for a data warehouse,
especially for customer information files
13. MetaData: Data about data. In a data warehouse, metadata describe the contents of a data warehouse
and the manner of its use.
14. Extraction, Transformation, and Load (ETL): A data warehousing process that consists of extraction
(i.e., reading data from a database), transformation (i.e., converting the extracted data from its previous form
into the form in which it needs to be so that it can be placed into a data warehouse or simply another
database), and load (i.e., putting the data into the data warehouse)