The data flow diagram shows the system as a PROJECT MANAGEMENT SYSTEM with two main processes: Process Project and Process Task. It depicts the flow of data between external entities (Project Manager and Team Members), the data store (Project Database), and the two processes. The diagram is drawn with 3 sentences describing the key components and data flows.
The system: Here is a data flow diagram for the process of project management:
The system is represented as a PROJECT MANAGEMENT SYSTEM with two main processes: Process Project and Process Task.
Process flow for a PROJECT: The Project Manager provides project details to the Process Project, which stores the data in
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
MIS uses computer technology to process and analyze large amounts of data, quickly search and retrieve information, and communicate information to users in a timely manner. It supports management functions like planning, organizing, staffing, directing, coordinating, and controlling. MIS helps ensure the appropriate data is collected, processed, and distributed to where it is needed. It provides information to support strategic planning, management control, operational control, and transaction processing.
This document provides an overview of management information systems (MIS). It defines MIS as a system that collects, processes, and disseminates data to provide information to support management decision making. The document describes the key components of an MIS including marketing research, intelligence and internal record systems. It also outlines the characteristics, aims, types of outputs and benefits of implementing an effective MIS.
The document discusses the structure and components of a management information system (MIS). It can be described in various ways, such as by its physical components, processing functions, outputs for users, and organizational functions. An MIS typically includes hardware, software, databases, procedures, and operating personnel. It processes transactions, maintains master files, produces reports and inquiries, and provides decision support. The outputs of an MIS include documents, reports, and results from user-machine dialogs. Effective implementation of an MIS requires planning, organizing tasks and timelines, training users, and evaluating the system once completed.
The document discusses how information systems are transforming business careers. It explains that information systems skills will be important for many career fields as businesses increasingly rely on technology. Careers in accounting, finance, marketing, operations management, and management are highlighted as examples of fields that depend heavily on information systems. The document emphasizes the need for job candidates to have both technical skills and problem-solving abilities to be successful in today's business environment.
1st solve assignment Management information systemDanish Saqi
Information systems are essential for running and managing modern businesses. They help reduce costs, improve efficiency and productivity, minimize litigation risks, safeguard vital information, support better decision making, and preserve corporate memory. Porter's competitive forces model examines how five competitive forces - traditional competitors, new market entrants, substitute products/services, suppliers, and customers - shape a firm's competitive strategies. Firms can use information systems to develop strategies to deal with these competitive forces, such as by creating new products/services, improving customer intimacy and gaining competitive advantages.
An MIS aims to provide information to support decision making for planning, organizing, and controlling firm operations. It involves collecting, processing, and disseminating data. An MIS includes people, hardware, software, networks, and data. It supports business processes, decision making, and competitive advantage. Common types of IS include transaction processing systems, management information systems, and decision support systems. The success of an IS depends on how well it supports the organization's strategies, business processes, structure, and customer value.
This document provides an introduction to information systems. It defines an information system as a combination of hardware, software, infrastructure, and personnel used to generate, process, store, and transmit electronic data to facilitate planning, control, and decision making within an organization. The document then discusses the history of information systems, highlighting the roles of mainframe computers, personal computers, networks, and the internet. It also outlines the importance of information systems in communication, operations, decision making, and record keeping for organizations. Finally, it briefly describes common types of information systems like transaction processing systems, management information systems, and decision support systems.
Management Information System (MIS) is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. A Management Information System is an information system that evaluates, analyzes, and processes an organization's data to produce meaningful and useful information based on which the management can take right decisions to ensure future growth of the organization.
MIS uses computer technology to process and analyze large amounts of data, quickly search and retrieve information, and communicate information to users in a timely manner. It supports management functions like planning, organizing, staffing, directing, coordinating, and controlling. MIS helps ensure the appropriate data is collected, processed, and distributed to where it is needed. It provides information to support strategic planning, management control, operational control, and transaction processing.
This document provides an overview of management information systems (MIS). It defines MIS as a system that collects, processes, and disseminates data to provide information to support management decision making. The document describes the key components of an MIS including marketing research, intelligence and internal record systems. It also outlines the characteristics, aims, types of outputs and benefits of implementing an effective MIS.
The document discusses the structure and components of a management information system (MIS). It can be described in various ways, such as by its physical components, processing functions, outputs for users, and organizational functions. An MIS typically includes hardware, software, databases, procedures, and operating personnel. It processes transactions, maintains master files, produces reports and inquiries, and provides decision support. The outputs of an MIS include documents, reports, and results from user-machine dialogs. Effective implementation of an MIS requires planning, organizing tasks and timelines, training users, and evaluating the system once completed.
The document discusses how information systems are transforming business careers. It explains that information systems skills will be important for many career fields as businesses increasingly rely on technology. Careers in accounting, finance, marketing, operations management, and management are highlighted as examples of fields that depend heavily on information systems. The document emphasizes the need for job candidates to have both technical skills and problem-solving abilities to be successful in today's business environment.
1st solve assignment Management information systemDanish Saqi
Information systems are essential for running and managing modern businesses. They help reduce costs, improve efficiency and productivity, minimize litigation risks, safeguard vital information, support better decision making, and preserve corporate memory. Porter's competitive forces model examines how five competitive forces - traditional competitors, new market entrants, substitute products/services, suppliers, and customers - shape a firm's competitive strategies. Firms can use information systems to develop strategies to deal with these competitive forces, such as by creating new products/services, improving customer intimacy and gaining competitive advantages.
An MIS aims to provide information to support decision making for planning, organizing, and controlling firm operations. It involves collecting, processing, and disseminating data. An MIS includes people, hardware, software, networks, and data. It supports business processes, decision making, and competitive advantage. Common types of IS include transaction processing systems, management information systems, and decision support systems. The success of an IS depends on how well it supports the organization's strategies, business processes, structure, and customer value.
This document provides an introduction to information systems. It defines an information system as a combination of hardware, software, infrastructure, and personnel used to generate, process, store, and transmit electronic data to facilitate planning, control, and decision making within an organization. The document then discusses the history of information systems, highlighting the roles of mainframe computers, personal computers, networks, and the internet. It also outlines the importance of information systems in communication, operations, decision making, and record keeping for organizations. Finally, it briefly describes common types of information systems like transaction processing systems, management information systems, and decision support systems.
Enterprise management systems (EMS) are large-scale software packages that support business processes, information flows, reporting, and data analytics in complex organizations. EMS include components like ERP for operational systems, CAD/CAM/CAE for engineering drawings and design information, AMS for employee attendance tracking, DMS for document management, CMS for communication management, and SMS for security management of people, vehicles, and materials. These systems integrate various business functions and provide inputs for planning and control across the organization.
The evolution of management information systemCheryl Asia
The document discusses the evolution of management information systems (MIS) from the early use of punch cards through five eras of centralized and decentralized systems to today's cloud-based systems. It traces the progression from manual looms using punch cards in the early 1800s to the emergence of mainframe computers in the 1960s enabling the first centralized MIS. By the 1980s, systems became more decentralized as departments obtained their own computers, followed by widespread internet adoption in the 1990s integrating information across companies. The current era is defined by ubiquitous access to cloud-based systems on multiple platforms, blurring the lines between information producers and consumers.
An information system is any organized combination of people, hardware, software, networks, and policies that collects, manages and disseminates information to support business processes and decision making. There are different types of information systems that support various levels and functions within an organization, including transaction processing systems, knowledge work systems, office automation systems, management information systems, decision support systems, and executive information systems. Businesses invest in information systems to achieve objectives like operational excellence, new products and services, customer intimacy, improved decision making, competitive advantage, and organizational survival.
Different Types of Information Systems Alexis Chua SYANDES K31Alexis Chua
This document discusses several types of information systems used in business. It describes transaction processing systems as systems that handle business transactions by collecting, modifying, and retrieving transaction data. It also outlines office automation systems, which use computer hardware and software to digitally manage office tasks. Additionally, the document discusses knowledge work systems that help capture and share organizational knowledge, as well as decision support systems and executive support systems that aid various levels of management in decision making. Finally, it summarizes group decision support systems that are designed to facilitate meetings and group work through collaboration technology.
Three dimensions of information systemsSuleyman Ally
An information system is a set of interconnected components that collect, process, store, and disseminate information to support decision making and coordination in an organization. Information systems are critical to business operations and success, ensuring improved decision making, operational excellence, competitive advantage, and organizational survival. An information system incorporates three dimensions: organizational, management, and technology. The organizational dimension involves business processes and culture. The management dimension supplies tools and information for managers. The technology dimension consists of hardware, software, storage, and networking that underpin information systems.
MODEL- DRIVEN DSS
includes system that use accounting, financial models, and representational models.
2. DATA DRIVEN DSS
file drawer & management reporting system, data warehousing, geographical information.
Management Information System (Full Notes)Harish Chand
This document provides a summary of key topics related to Management Information Systems (MIS). It discusses the importance of information systems for businesses and defines different types of systems, including Transaction Processing Systems, Knowledge Work Systems, Management Information Systems, and Decision Support Systems. It also outlines some of the challenges of implementing effective information systems, such as realizing digital transformation and addressing globalization.
Management Information System-Process Control systemAloshy cheriyan
The document discusses process control systems as a type of management support information system. It defines process control systems as monitoring and controlling physical processes through electronic sensors linked to computers that make adjustments based on continual monitoring of industrial processes. As an example, it provides a petroleum refinery that uses process control systems to monitor chemical processes and make instant adjustments to control the refinery process. The presentation was given by Mr. Aloshy Cheriyan on process control systems as part of a management information systems topic.
The document provides an overview of management information systems (MIS). It defines key concepts such as data, information, and systems. It explains that an MIS is a system for collecting, processing, storing, and distributing data to managers within an organization. The main outputs of an MIS are scheduled reports, key indicator reports, demand reports, and exception reports. These help managers monitor performance and make decisions. Overall, the document serves as an introduction to MIS, covering essential elements like the relationship between data, information, and systems.
The document provides an introduction to management information systems (MIS). It defines MIS as a computer-based system that presents both internal and external information to support the decision-making process. MIS utilizes hardware, software, and manual procedures to analyze, plan, control, and make decisions. While MIS does not make decisions itself, it assists managers by providing consistent, accurate, timely, and relevant information as an input to the decision-making process. The document also discusses the components, functions, uses, and types of information systems.
The document defines a system as an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective. It provides examples of computer systems, hotel systems, and business systems. It describes the key elements of a system as including organization, interaction, and interdependence between components, as well as integration and a central objective. Systems have structure and order to help achieve their goals, and components function interdependently, like departments in a business. A system's parts depend on one another, with the output of one subsystem becoming the required input of another to achieve the overall goal of the system.
A transaction processing system (TPS) collects, stores, modifies, and retrieves data about business transactions. It must pass the ACID test, ensuring atomicity, consistency, isolation, and durability of transactions. There are two types - batch processing, where data is collected and processed periodically, and real-time processing, where data is processed immediately. The transaction processing cycle involves data entry, processing transactions, maintaining databases, generating documents and reports, and allowing for inquiries. The overall purpose is to keep records of the organization, process transactions that affect those records, and produce reports.
This document discusses Management Information Systems (MIS). It defines MIS as a system that converts data from internal and external sources into meaningful information to help managers make timely decisions. The document outlines the importance of MIS in providing the right information to the right people at the right time. It also discusses the components, characteristics, establishment and performance evaluation of effective MIS.
Decision Making and Information SystemsAriful Saimon
Premier University
[B.B.A]
Submitted To : Lecturer MS. Samima Parvez
Subject : Decision Making and Information
Semester: 5th Section: “A” Batch :22nd
Group Name: D’5
E-mail : Saimonchy20@gmail.com
Sub systems of information system - MISSanaRiaz789
This document provides information about various subsystems of a management information system (MIS). It discusses transaction processing systems, management reporting systems, and decision support systems. It describes transaction processing systems as collecting, storing, modifying and retrieving organizational transaction data. Management reporting systems are defined as mechanisms for monitoring organizational goals and metrics over time through periodic, exception, and on-demand reports. Decision support systems are computerized systems that assist with decision making by helping to gather intelligence, generate alternatives, and make choices.
Decision making involves selecting a course of action from various options. Business decision making models include SWOT analysis, buyer decision processes, and cost-benefit analysis. The decision making process involves phases like intelligence gathering, problem definition, alternative identification, choice, and implementation. Management information systems, decision support systems, executive support systems, and group decision support systems can provide information and tools to support decision making. Intelligent techniques like artificial intelligence and expert systems are also used for decision support.
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
This document discusses information system security and controls. It begins by defining an information system as the organized collection, processing, transmission, and spreading of information according to defined procedures. Security policies, procedures, and technical measures are used to prevent unauthorized access, alteration, theft, or damage to information systems. Controls ensure the safety of organizational assets, accuracy of records, and adherence to management standards. The document then examines principles of security including confidentiality, integrity, and availability. It also discusses system vulnerabilities, threats, and various security measures.
This document summarizes six major information systems: Executive Support System (ESS), Management Information System (MIS), Decision Support System (DSS), Knowledge Management System (KMS), Transaction Processing System (TPS), and Office Automation System (OAS). ESS helps senior executives make strategic decisions. MIS provides reports to support middle management decisions. DSS provides tools to support semi-structured decision making. KMS manages organizational knowledge and experiences. TPS processes business transactions and generates reports. OAS automates office tasks like communication and scheduling.
“Intranet implementation in the company – the most important aspects”: from s...Ideo Software
Embark on an all-encompassing expedition through the crucial stages of Intranet implementation with the comprehensive “Intranet implementation in the company – the most important aspects” guide meticulously crafted by Ideo Software. It features an array of essential components, discussing the rudiments of the subject and a pre-implementation analysis coupled with a user-centric design, culminating in a more intricate examination of strategic promotional measures alongside the platform’s launch and continuous development monitoring. If you want to navigate the complete spectrum of Intranet, you have found the perfect place!
This document provides a cover sheet and table of contents for a 17 page assignment on information technology management submitted by Sumeet Duhan, a student at the Graduate Business School. The assignment discusses problems facing Jameson whiskey related to communications and technology, and provides recommendations including implementing Web 2.0 tools and an ERP system to address the issues.
Enterprise management systems (EMS) are large-scale software packages that support business processes, information flows, reporting, and data analytics in complex organizations. EMS include components like ERP for operational systems, CAD/CAM/CAE for engineering drawings and design information, AMS for employee attendance tracking, DMS for document management, CMS for communication management, and SMS for security management of people, vehicles, and materials. These systems integrate various business functions and provide inputs for planning and control across the organization.
The evolution of management information systemCheryl Asia
The document discusses the evolution of management information systems (MIS) from the early use of punch cards through five eras of centralized and decentralized systems to today's cloud-based systems. It traces the progression from manual looms using punch cards in the early 1800s to the emergence of mainframe computers in the 1960s enabling the first centralized MIS. By the 1980s, systems became more decentralized as departments obtained their own computers, followed by widespread internet adoption in the 1990s integrating information across companies. The current era is defined by ubiquitous access to cloud-based systems on multiple platforms, blurring the lines between information producers and consumers.
An information system is any organized combination of people, hardware, software, networks, and policies that collects, manages and disseminates information to support business processes and decision making. There are different types of information systems that support various levels and functions within an organization, including transaction processing systems, knowledge work systems, office automation systems, management information systems, decision support systems, and executive information systems. Businesses invest in information systems to achieve objectives like operational excellence, new products and services, customer intimacy, improved decision making, competitive advantage, and organizational survival.
Different Types of Information Systems Alexis Chua SYANDES K31Alexis Chua
This document discusses several types of information systems used in business. It describes transaction processing systems as systems that handle business transactions by collecting, modifying, and retrieving transaction data. It also outlines office automation systems, which use computer hardware and software to digitally manage office tasks. Additionally, the document discusses knowledge work systems that help capture and share organizational knowledge, as well as decision support systems and executive support systems that aid various levels of management in decision making. Finally, it summarizes group decision support systems that are designed to facilitate meetings and group work through collaboration technology.
Three dimensions of information systemsSuleyman Ally
An information system is a set of interconnected components that collect, process, store, and disseminate information to support decision making and coordination in an organization. Information systems are critical to business operations and success, ensuring improved decision making, operational excellence, competitive advantage, and organizational survival. An information system incorporates three dimensions: organizational, management, and technology. The organizational dimension involves business processes and culture. The management dimension supplies tools and information for managers. The technology dimension consists of hardware, software, storage, and networking that underpin information systems.
MODEL- DRIVEN DSS
includes system that use accounting, financial models, and representational models.
2. DATA DRIVEN DSS
file drawer & management reporting system, data warehousing, geographical information.
Management Information System (Full Notes)Harish Chand
This document provides a summary of key topics related to Management Information Systems (MIS). It discusses the importance of information systems for businesses and defines different types of systems, including Transaction Processing Systems, Knowledge Work Systems, Management Information Systems, and Decision Support Systems. It also outlines some of the challenges of implementing effective information systems, such as realizing digital transformation and addressing globalization.
Management Information System-Process Control systemAloshy cheriyan
The document discusses process control systems as a type of management support information system. It defines process control systems as monitoring and controlling physical processes through electronic sensors linked to computers that make adjustments based on continual monitoring of industrial processes. As an example, it provides a petroleum refinery that uses process control systems to monitor chemical processes and make instant adjustments to control the refinery process. The presentation was given by Mr. Aloshy Cheriyan on process control systems as part of a management information systems topic.
The document provides an overview of management information systems (MIS). It defines key concepts such as data, information, and systems. It explains that an MIS is a system for collecting, processing, storing, and distributing data to managers within an organization. The main outputs of an MIS are scheduled reports, key indicator reports, demand reports, and exception reports. These help managers monitor performance and make decisions. Overall, the document serves as an introduction to MIS, covering essential elements like the relationship between data, information, and systems.
The document provides an introduction to management information systems (MIS). It defines MIS as a computer-based system that presents both internal and external information to support the decision-making process. MIS utilizes hardware, software, and manual procedures to analyze, plan, control, and make decisions. While MIS does not make decisions itself, it assists managers by providing consistent, accurate, timely, and relevant information as an input to the decision-making process. The document also discusses the components, functions, uses, and types of information systems.
The document defines a system as an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective. It provides examples of computer systems, hotel systems, and business systems. It describes the key elements of a system as including organization, interaction, and interdependence between components, as well as integration and a central objective. Systems have structure and order to help achieve their goals, and components function interdependently, like departments in a business. A system's parts depend on one another, with the output of one subsystem becoming the required input of another to achieve the overall goal of the system.
A transaction processing system (TPS) collects, stores, modifies, and retrieves data about business transactions. It must pass the ACID test, ensuring atomicity, consistency, isolation, and durability of transactions. There are two types - batch processing, where data is collected and processed periodically, and real-time processing, where data is processed immediately. The transaction processing cycle involves data entry, processing transactions, maintaining databases, generating documents and reports, and allowing for inquiries. The overall purpose is to keep records of the organization, process transactions that affect those records, and produce reports.
This document discusses Management Information Systems (MIS). It defines MIS as a system that converts data from internal and external sources into meaningful information to help managers make timely decisions. The document outlines the importance of MIS in providing the right information to the right people at the right time. It also discusses the components, characteristics, establishment and performance evaluation of effective MIS.
Decision Making and Information SystemsAriful Saimon
Premier University
[B.B.A]
Submitted To : Lecturer MS. Samima Parvez
Subject : Decision Making and Information
Semester: 5th Section: “A” Batch :22nd
Group Name: D’5
E-mail : Saimonchy20@gmail.com
Sub systems of information system - MISSanaRiaz789
This document provides information about various subsystems of a management information system (MIS). It discusses transaction processing systems, management reporting systems, and decision support systems. It describes transaction processing systems as collecting, storing, modifying and retrieving organizational transaction data. Management reporting systems are defined as mechanisms for monitoring organizational goals and metrics over time through periodic, exception, and on-demand reports. Decision support systems are computerized systems that assist with decision making by helping to gather intelligence, generate alternatives, and make choices.
Decision making involves selecting a course of action from various options. Business decision making models include SWOT analysis, buyer decision processes, and cost-benefit analysis. The decision making process involves phases like intelligence gathering, problem definition, alternative identification, choice, and implementation. Management information systems, decision support systems, executive support systems, and group decision support systems can provide information and tools to support decision making. Intelligent techniques like artificial intelligence and expert systems are also used for decision support.
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
This document discusses information system security and controls. It begins by defining an information system as the organized collection, processing, transmission, and spreading of information according to defined procedures. Security policies, procedures, and technical measures are used to prevent unauthorized access, alteration, theft, or damage to information systems. Controls ensure the safety of organizational assets, accuracy of records, and adherence to management standards. The document then examines principles of security including confidentiality, integrity, and availability. It also discusses system vulnerabilities, threats, and various security measures.
This document summarizes six major information systems: Executive Support System (ESS), Management Information System (MIS), Decision Support System (DSS), Knowledge Management System (KMS), Transaction Processing System (TPS), and Office Automation System (OAS). ESS helps senior executives make strategic decisions. MIS provides reports to support middle management decisions. DSS provides tools to support semi-structured decision making. KMS manages organizational knowledge and experiences. TPS processes business transactions and generates reports. OAS automates office tasks like communication and scheduling.
“Intranet implementation in the company – the most important aspects”: from s...Ideo Software
Embark on an all-encompassing expedition through the crucial stages of Intranet implementation with the comprehensive “Intranet implementation in the company – the most important aspects” guide meticulously crafted by Ideo Software. It features an array of essential components, discussing the rudiments of the subject and a pre-implementation analysis coupled with a user-centric design, culminating in a more intricate examination of strategic promotional measures alongside the platform’s launch and continuous development monitoring. If you want to navigate the complete spectrum of Intranet, you have found the perfect place!
This document provides a cover sheet and table of contents for a 17 page assignment on information technology management submitted by Sumeet Duhan, a student at the Graduate Business School. The assignment discusses problems facing Jameson whiskey related to communications and technology, and provides recommendations including implementing Web 2.0 tools and an ERP system to address the issues.
The document provides details about a summer project report for a Bachelor in Information Management program. It discusses the background and objectives of the study, which is to develop an online store management system for Universal Computer and Mobile Center to modernize their record keeping. The organization currently uses a manual system but needs a computerized system for improved reliability, security, and customer convenience like online ordering. The report outlines the system design, implementation, findings from surveys that customers lack information and ordering options, and concludes the new system will address these issues.
Technology integration
TECHNOLOGY INTEGRATION
Student’s name: Unit 1: Critical Concepts and Competencies for the IT Professional
Tutor:
Institution: Kaplan University
Date of submission:
Table of Contents
Introduction
3
Current Infrustructure
3
Types of Networks
3
Types of business software
4
Benefits of an integrated Network
6
Conclusion
6
Bibliography
6
Introduction
As you all know by now we recently acquired the online widget retailer Widgets – R – Us. The payoff from joining with them is that it puts us into the position to become the world’s leading widget supplier, The acquisition of a retailer aspect to our already successful manufacturing company is a positive move and puts us ahead, especially after the recent bankruptcy of We Sell U Widgets thus management revolution through integration of these two ventures is no longer in doubt but a necessity.
1. Current infrastructure.
Widgets R Us or Widgets USA are both not in a technological position to handle the type of expansion we are considering undertaking. Our individual hardware and software needs as a company we are enlisting your help and advice to put us into a position to move forward. Integrating our business support systems managed by the IT department and operations support systems handled by the network team will boost the operational capacity and efficiency and thus better synchronizing of the technology backbone.
2. Network Types.
We have 3 different network types manly (Internet, intranet, extranet).
· Internet
This is the world-wide network of computers accessible to anyone who knows their Internet Protocol also called the ip address. All you need to access the Internet is your ip address and a computer. IP address is a unique set of numbers that defines the computer's location (e.g. 100.3.9.1) .The Internet is now global and can be accessed by anyone who can get access from an Internet service provider.
· Intranet
This network that is not available to the world outside of the Intranet it’s a personal network owned by the organization. The Intranet network is connected to the Internet then the Intranet will be hidden behind a firewall and thus if it allows access from the Internet it becomes an Extranet. The firewall helps in controlling access in between the Intranet and Internet and to permit access and control traffic to the Intranet and allow only the people who are members of our organization to gain access. The company mostly uses t for printing purposes to the central networked printers.
· Extranet
An Extranet is an Intranet that’s partially accessible to people authorized but outside the organizations intranet. The actual server, the computer that serves up the web pages, will reside behind a firewall that protects any intrusion. Access levels can be changed for different individuals and groups and this is done through access usernames and passwords.
3. Types of business software
· ERP (Enterprise Resource Planning) SYSTEMS ...
Managing Valuable Ip Assets Owned By Their Clients EssayJessica Howard
This document discusses whether social business is working out based on a case study. Some of the major challenges discussed include lack of support from executive management, who must set the pace of adoption. Most companies also do not provide sufficient incentives for staff to be motivated to use social tools. Only 22% of users believe social tools are necessary for their jobs. Therefore, training and clearly communicating the importance of social tools is critical for success. Addressing these implementation challenges is important for social business to provide advantages to an organization's bottom line.
Information Retrieval And Evaluating Its UsefulnessDiane Allen
This document discusses information retrieval and evaluating its usefulness. It covers topics like the ETL process, creation of a data warehouse using SQL, OLAP operations, data mining techniques like cluster analysis and association rule mining. It also discusses data analytics and its usefulness for business, as well as using production logs to test and engineer an application's performance. The document contains an introduction, table of contents, and sections on the discussed topics with some content removed for brevity.
This document discusses issues related to implementing information technology systems. It begins with an abstract that outlines the context of examining information technology development and deployment issues. The document is then divided into two main sections - a general background literature review on management information systems, information technology, and local government; and a section on planning and information technology implementation issues. Research was conducted to analyze factors affecting successful information technology projects. The document appears to be a dissertation that analyzes and addresses challenges with developing and rolling out new information systems based on a review of relevant literature.
The document discusses the advantages of using responsive web design over separate mobile and desktop websites. Responsive design allows a single website to automatically adapt to different screen sizes and devices. This improves the user experience by loading pages faster and avoiding separate mobile sites that are often poorly designed. The document recommends techniques for responsive design like responsive images, lazy loading, minifying code, and setting a performance budget to optimize page loading speeds across all devices.
IBM MaaS360 being recognized as a leader in yet another UEM research reportŁukasz Piotrowicz
Unified endpoint management may be a new industry term, but MaaS360 is no stranger to the concept – being recognized as a leader in yet another UEM research report.
"Establishing positive user experience and responsible security controls begins with effective endpoint management that consolidates support for all devices used to perform business tasks," noted Steve Brasen, EMA Research Director and author of the EMA Radar for Unified Endpoint Management.
"Our evaluation has clearly identified IBM Maas360 with Watson as a market value leader for providing a feature-rich product set, outstanding cost-efficiencies, and broad heterogenous support for PCs, mobile devices, wearables, and IoT endpoints."
See why MaaS360 continues to earn top recognition in this exciting new space.
summer internship report on HCL infosystem at regional head office in chennai
at No 196 Old No 756 Habeeb Towers No 151/1 B Ground Floor, Opposite TVS & Near Ananda Vikatan, Vasan Avenue Anna Salai, Mount Road, Chennai - 600002
This document provides an overview of information systems including:
1. The definition of an information system as a set of interconnected people, technology, and processes to collect, process, store, and distribute information to help coordination, analysis, and decision making.
2. The need for efficient information systems to store data securely, enhance decision making and productivity, and provide data analytics tools.
3. The main types of information systems including transaction processing systems, management information systems, decision support systems, and expert systems.
4. The information requirements for planning including monitoring, evaluation, and careful planning before projects.
5. The importance of coordination and control at various levels of business and industry to harmonize activities
The document outlines plans by an IT consultant to develop IT systems for a food company. The consultant will:
1. Create a secure ecommerce website and links between departments to improve online ordering and sales.
2. Train 8 staff members on using the new systems over 8 months through cooperative training.
3. Purchase necessary equipment like computers, servers, and security systems within the £50,000 budget.
The project “Billing system” is an application to automate the process of ordering
And billing of a restaurant .This application is developed for the established restaurants in the city to manage the billing operations. It has the entire basic module to operate the billing modules. This application also administrates its users and customers.
This project will serve the following objectives:-
• Add and maintain records of available products.
• Add and maintain customer details.
• Add and maintain description of new products.
• Add and maintain admin and employee details.
• Provides a convenient solution of billing pattern.
• Make an easy to use environment for users and customers.
• Create membership for customers.
Business Information Systems by Patrick LinhartPatrick Linhart
About Business Information Systems and how they benefit to the companies.
https://www.facebook.com/pages/Digital-Communications-for-Business/1417495205132193
Mobitel is Sri Lanka's first mobile service provider established in 1993 as a fully owned subsidiary of Sri Lanka Telecom. With over 5 million customers, Mobitel offers a variety of mobile and internet services. The organization utilizes information systems at strategic, tactical, and operational levels for functions like marketing, accounting, and management decision making. Mobitel has implemented ERP, CRM, and other systems to automate processes and improve communication, efficiency, and decision making across the large organization.
The document discusses Lyn Murnane's journey as a knowledge manager and the challenges of implementing knowledge management systems. It summarizes Lyn's experience at Medibank Private redesigning their intranet to make information more accessible and useful for frontline staff. Key challenges included engaging subject matter experts, training staff to use new systems, and ensuring accurate and consistent content. The redesigned intranet improved search capabilities and centralized information to reduce call times and costs.
Management information systems (MIS) are integrated systems that collect, store, and distribute data to support decision making and control in organizations. An MIS combines hardware, software, data, procedures, and people to provide timely and accurate information to managers at all levels. It helps managers analyze problems, visualize complex topics, and create new products and services. While MIS provides advantages like improved decision making and productivity, challenges include costs, training needs, and ensuring systems have necessary features. Careful planning of needs, vendor evaluation, training, and testing are needed for successful MIS installation.
final presentation Presentation (MBS).pptx [Autosaved].pptxAnwarAhmed93
The document proposes automating the Dessie menafesha micro-bank's paper-based saving and loan system. It will analyze the current system, identify problems like data redundancy and loss of documents, and design a computer-based system using tools like PHP and MySQL. The new system aims to improve efficiency, minimize time and costs, and provide up-to-date information to users and management. It will manage customer accounts, loans, deposits and other operations in a centralized, secure database.
The Application of Information Technology in the Preparation and Presentation...IOSRJBM
Much of the activities in the preparation and presentation of financial statements are now driven by ICT. The enormous advantages (ICT) has accrued to the delivery of information and communication around the World, as well as the central role of ICT in the new global economy, means that ICT will indeed shape the dynamics of the new millennium. The role of and potential for ICTs in private and public sector accounting, auditing, investigation and reporting is enormous and cannot be over emphasized. This paper therefore assesses the types, benefits, challenges of using electronic accounting processing systems in the preparation and presentation of financial statements in Nigeria. The paper also highlights the Web based accounting system as well as the Peachtree accounting package; the Peachtree accounting package was practically illustrated and the results were presented in Spreadsheet. Secondary sources of data is mostly used. The paper concludes that the losers in this era of digital and information revolution will be organizations and professionals who fails to meet the challenges of Information and Communication Technology (ICT). Based on the findings and conclusion, the paper recommends that Accountants/Professionals should adequately equip themselves with the practical knowledge of information technology relevant in preparing and presenting financial statements.
This document discusses the importance of crisis management in data centers. It proposes that all companies need disaster recovery plans and crisis management strategies to deal with IT failures, security threats, natural disasters and other issues. The document outlines objectives like risk assessment and maintaining operations during a crisis. It reviews literature on data center environments, layouts, crisis management frameworks and examples. The importance of preparedness, response and review is highlighted to minimize impacts and losses from crises in data centers.
Similar to Management Information systems – Assignments (20)
This document provides an overview of operations management at a wellness center that utilizes barcoding technology. It discusses how barcoding is used to track customers, appointments, inventory, payments and various processes across multiple centers. The key modules of the operations system including reception, service providers, laboratory, stock, and business concepts are outlined. It also describes the processes from the customer's perspective such as booking an appointment, receiving a service, payments and follow up. The document aims to explain how barcoding technology enables smooth and integrated operations both within and across various wellness centers.
This document provides a summary of a case study on XYLYS, a premium watch brand in India. It begins with an introduction and disclaimer about the original case study.
It then analyzes Indian consumer behavior regarding premium watch purchases, noting that consumers increasingly seek brands that reflect their personality over utility. When purchasing premium watches, consumers seek symbolic and experiential benefits over functional benefits.
The document also briefly summarizes how XYLYS has built its brand in India. XYLYS is positioned as a premium luxury watch priced between 10,000-35,000 rupees. Though an Indian brand, XYLYS watches are made in Switzerland and designed by renowned Swiss designers.
Here is my opinion on the profitability of the proposed heat treatment plant project for M/s JBS Ltd:
Based on the information provided, some key assumptions I would make are:
- Machinery cost is Rs. 50 lakhs as per quotations received.
- Other fixed assets like AC, furniture etc. would cost Rs. 10 lakhs as estimated.
- Total project cost is machinery cost + other fixed assets = Rs. 50 lakhs + Rs. 10 lakhs = Rs. 60 lakhs
- Land costing Rs. 20 lakhs is being acquired through issue of equity shares.
- Existing bank balance is Rs. 20 lakhs which can be used
The document provides an overview of the World Trade Organization (WTO). It discusses that the WTO is an international organization that deals with global trade rules between nations. It was established in 1995 to liberalize trade and provide a framework for negotiating trade agreements and resolving disputes. The document also summarizes the evolution of the WTO from the Great Depression era protectionism, through the creation of GATT in 1948 to establish rules for international trade.
Manohar M. M. Iyer conducted a survey to collect feedback on his behavior from people he interacts with. The survey rated him on 18 attributes. He found that he excels in taking initiative, being a team player, providing motivation, communication, and ability to learn. However, the feedback indicated he needs to improve flexibility, adaptability, attitude, and personality. Comparing the feedback to his self-assessment found some gaps, which will help him work on becoming a better person. The annex contains the full survey results and comments.
The document discusses the negative effects of globalization on the United States. It argues that globalization has contributed to job losses and economic insecurity for American workers due to outsourcing and competition from foreign workers. This has led to rising unemployment, fiscal crisis for the government as tax revenues decline, and growing inequality as corporate profits rise while wages stagnate. Overall, the document claims that unregulated globalization has generated discontent by prioritizing corporate interests over workers' welfare.
This document analyzes the annual report of Ackruti City Limited for the period of 2009-2010. It provides an overview of the company and its board of directors. It summarizes the company's financial results, operational highlights, and analysis of the Indian economy and real estate industry during this period. It also includes an analysis of the company's balance sheet, profit and loss statement, cash flow statement, and key financial ratios for the period.
The finance manager of a company resigned after being questioned by the MD about why the company suffered losses, had excess inventory, unpaid bills, and a damaged reputation in one area while other areas were profitable. The new finance manager called a meeting of all department heads to gather past, present, and future data in order to understand the financial situation and create a budget to address the company's issues. The managers presented financial statements showing costs, expenses, sales, assets, and interest payments that revealed the sources of the company's problems.
The document provides an overview of ITC Limited, a diversified company in India. It discusses ITC's various business segments including cigarettes, food, personal care, hotels, paper, and agribusiness. It also summarizes ITC's financial performance in recent years, showing increasing revenues and profits across most business segments. Finally, it attempts to suggest future strategies for ITC, such as further diversifying away from tobacco into non-tobacco FMCG and agriculture through mergers and acquisitions.
The document provides tips for giving an effective presentation. It advises understanding the topic and knowing the audience. The presenter should set an agenda, create content tailored to the agenda and audience, and rehearse. When presenting, the speaker should open strongly, speak confidently, explain topics clearly, and retain the audience's interest through various engagement techniques. The presentation should involve participants, be timed well, check for understanding, summarize key points, and push the audience to take action.
The document describes a case study of process re-engineering efforts at a telecom firm's duplicate bill dispatch unit. The unit was facing challenges of high backlogs, long processing times, and insufficient staff. The key problems were identified as high request inflow, long processing times per case, and lack of manpower. Root causes were analyzed and solutions implemented, such as reducing unnecessary case creation, improving access to billing systems, training staff, and allocating roles more efficiently. These changes led to a 50% reduction in new case inflow, 60% faster processing times, and overall case handling time reduced from 9.5 to 5.7 minutes. Costs per case were lowered from Rs. 55.54 to Rs.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firm’s foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...jamalseoexpert1978
Farman Ayaz Khattak and Ehtesham Matloob are government officials in CTW Counter terrorism wing Islamabad, in Federal Investigation Agency FIA Headquarters. CTW and FIA kidnapped crypto currency owner from Islamabad and snatched 200 Bitcoins those worth of 4 billion rupees in Pakistan currency. There is not Cryptocurrency Regulations in Pakistan & CTW is official dacoit and stealing digital assets from the innocent crypto holders and making fake cases of terrorism to keep them silent.
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
Industrial Tech SW: Category Renewal and CreationChristian Dahlen
Every industrial revolution has created a new set of categories and a new set of players.
Multiple new technologies have emerged, but Samsara and C3.ai are only two companies which have gone public so far.
Manufacturing startups constitute the largest pipeline share of unicorns and IPO candidates in the SF Bay Area, and software startups dominate in Germany.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Management Information systems – Assignments
1. Prepared by Manohar M. M. Iyer
Ref. No. VAS2010XMBA15P005
Batch XMBA – 15
Term I
Faculty Mr. Ravi Miranda
Prepared on February 6, 2011
2. Computer Information Systems - Assignments
February 2011
Disclaimer:
This document is prepared purely as an educational project assignment to be submitted as a component of
the XMBA curriculum being conducted by ITM (Institute for Technology and Management) at Vashi, Navi
Mumbai. The information contained within this document is for sample representation purposes only.
Though this document is prepared by taking due references from various websites, including the website of
ICANN. However, no information contained in this document should be considered by any individual,
investor, share holder, group, organization, company or any other entity as true & correct information.
The reader of this document is strongly advised not to use this document as a guide that may influence any
of your ideas/views/interests/feedback related to any of the companies/ business interests.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 2
3. Computer Information Systems - Assignments
February 2011
Contents
List of Assignments ....................................................................................................................................... 4
1. Paper on "how will computerization help my department”- Health care & Comfort services. ....................5
Why computerize? ...................................................................................................................................5
Activities related to health care & comfort services ..................................................................................5
How computerization helped the department ..........................................................................................6
2. Learn Excel Macros & create one...............................................................................................................8
Macro.......................................................................................................................................................8
Macro Example:........................................................................................................................................9
3. Study office network diagram and draw a WAN. ..................................................................................... 10
4. Draw Data flow Diagram for any process ................................................................................................. 11
The system ............................................................................................................................................. 11
Process flow for a PROJECT ..................................................................................................................... 12
Process flow for a Task ........................................................................................................................... 13
5. Find out one topic on internet & write a paper ........................................................................................ 14
ICANN..................................................................................................................................................... 14
DNS ........................................................................................................................................................ 14
IP addresses & Root Servers ................................................................................................................... 15
ICANN’s role ........................................................................................................................................... 15
ICANN decisions ..................................................................................................................................... 16
Accountabilities ...................................................................................................................................... 16
Effect of ICANN's role and work on the Internet ..................................................................................... 17
6. Analysis of different SDLC models............................................................................................................ 18
Water Fall Model .................................................................................................................................... 18
Spiral Model ........................................................................................................................................... 19
Note from Author. ...................................................................................................................................... 21
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 3
4. Computer Information Systems - Assignments
February 2011
List of Assignments
Individual Assignments
1. Write a paper on "how will computerization help your department/ any department"
2. Learn Excel Macros & create one
3. Study office network diagram and draw a WAN
4. Draw Data flow Diagram for any process
5. Find out one topic on internet & write a paper
6. Analysis of different SDLC models
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 4
5. Computer Information Systems - Assignments
February 2011
1. Paper on "how will computerization help my department”- Health care &
Comfort services.
This paper written based on my experience I gained while working for a company that was starting a new
business unit, a chain of health care & comfort services. My role in the organization was that of a
SME/Analyst involved in process designing, conducting pre release functional Tests & UATs, designing user
support manuals and training multi-located staff via web conference, net meeting & in class on the
business critical applications.
I will start the paper with a small note on why computerize, a brief on the company’s activities related to
health care & comfort services and then describe how computerization helped the department.
Why computerize?
Computerization is essential to modern life to manage our important data in an organized way, to work on
and execute various projects related to our respective fields, to get instant access to vast information on
almost any possible topic, get the requests reserved in an easy and efficient manner, mass communication
and the list continues. Also modern information requirements are so complicated to handle that only
computers can be used to provide them and it is the speed of the computer that makes such tasks possible.
Activities like store, transmit and manipulate large amounts of information are only possible with the
computer technology. Traditional methods of exchange of information like via paper medium are
expensive, cumbersome and even if it did work it had its own limitations.
Computerization can help any business:
- It is easy for all stakeholders in an organization to access & update information within the network.
- It allows employees to share files, view other people's work, and exchange ideas more efficiently
using tools like e-mail and instant messaging.
- They can also store messages for future reference.
- Using the remote access feature officials can also access the same files, data, and messages even
when they're not in the office through devices like mobiles, palmtops, etc.
- Using scheduling software it is possible to arrange meetings using features like Shared address
books and to-do lists.
- Multi-located staffs can attend meetings using web conference & net meetings
- It easier to protect & store company's data on a set of tapes, CDs, or other backup systems.
- It also allows sharing of resources like printers, etc.
Thus we can see computerization helps business to work efficiently.
Activities related to health care & comfort services
The company’s objective for the new business unit is to improve & maintain customer’s health, by
rendering all services under one roof, like Clinical diagnostics, Ayurveda, Homoeopathy, Gymnasium,
Consultations, Skin & Beauty, etc.
The company wished:
- To provide facility to book for services in advance.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 5
6. Computer Information Systems - Assignments
February 2011
- To allow customers to choose service centre for every sitting from a list of multi located service
centre as per his convenience including services that required multi sittings.
- To keep track of availability of rooms & service attendants including doctors across all centers.
- To maintain customer records, history and make it available to all service attendants including
doctors across all centers.
- To keep complete track of services rendered to the customer at every point of service starting from
the time he walks in to the centre, till the time he walks out after availing the service.
- To keep track of all ingredients, materials, facilities, resources, etc. used for providing service to
every customer and the cost incurred for the same.
- To keep track of the material stocks used & ordered.
- To keep track of reports generated & issued to the customers
- To bill every customer based on the services rendered to him
All above mentioned tasks & activities can be done efficiently with the help of computerization.
How computerization helped the department
The above requirements were studied in detail & a system of rendering the services was developed. The
main backbone used to track this entire activity was BARCODING.
Computerization activities
The following computerization activities were done:
- A bar code reader was installed in every room at every centre that is used for providing services like
Clinical diagnostics, Ayurveda, Homoeopathy, Gymnasium, Consultations, Skin & Beauty, etc.
- The bar code reader was connected to a computer having a tailor made software application.
- The tailor made software application was developed with following modules covering various
processes:
• A Reception/ front desk module managing Appointments, Orders, Payments, Delivery &
Order Completion
• A Service provider/ Consultant module managing Room activity & Questionnaire
• A Lab process module catering to Clinical diagnostic services
• A Stock module managing Procurement, Consumption, Adjustment, Intra centre Transfer &
Standard Costing
- All the rooms were categorized & numbered.
- All the computers in all the rooms and the reception desk were interconnected and all the
information was stored automatically in a centralized server.
- All the centers located across the country were connected to a master server.
Processes & procedures used:
1. Customer requests for a appointment
2. Details like Name, Address, contact information, service customer wants to avail, preferred time,
preferred centre, any promotional code are taken from the prospect.
3. Availability of service is ensured and an appointment number is provided.
4. When customer visits the center to avail the service an order is booked against the appointment
number and an itinerary with a barcode is generated with all details related to the chosen service.
5. Customer is guided to the room where he can avail of the service along-with the itinerary.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 6
7. Computer Information Systems - Assignments
February 2011
6. The consultant or technician who will attend the customer will scan the bar code on the itinerary
using the bar code reader and all the details related to the service and the customer is auto
populated in the computer screen available In the room.
7. The consultant or technician will provide the service to the customer.
8. Depending on the service the service provider will update the system with their notes,
recommendations, any required information taken from the customer or information on any
additional ingredient, material or resource used for providing the service.
9. If any sample is collected from the customer then a bar code sticker is generated & attached on the
sample container.
10. The bar code on the itinerary is scanned again using the reader to indicate that the service is
completed.
11. The Stock will get reduced automatically with the total amount of ingredient or material used to
provide the service.
12. The relevant cost will get automatically added to the customer account and bill is generated.
13. Customer is guided to back to the front desk along-with the itinerary where he can make the
payments for the availed services and also provide information on how and where h/she can
collect the reports, if any.
14. Next time when customer requests for an appointment or books a service the system automatically
tracks from the server whether h/her Name, Address, contact information is already available in
the server which will help the front desk, service providers/ consultants to get the complete
customer records & history, based on which they can offer discounts, recommendations,
consultations, etc.
The using the computerization activities & the process mentioned above the computer could achieve its
requirements very efficiently.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 7
8. Computer Information Systems - Assignments
February 2011
2. Learn Excel Macros & create one
Macro
A macro is a series of steps that is grouped together as a single step and then executed when necessary.
VBA (Visual Basic for Applications) is the programming language that macros use to create custom
procedures or automate tasks in all the MS-Office applications. You can create macros without learning
VBA using the record macro feature. But, if you create a macro and cannot quite get it to do everything you
want it to do, then edit the macro using VBA to create additional commands for the macro to carry out.
Before you record or write a macro, plan the steps and commands you want the macro to perform.
If you want to use the macro you're recording in other documents, make sure that the macro doesn't
depend on the current document's contents. If you use a particular macro often, assign it to a toolbar
button, a menu, or shortcut keys. That way, you can run the macro directly without having to open the
Macros dialog box.
The easiest way to quickly create a simple macro in Excel is to use the macro recorder. The Macro Recorder
creates a copy of the commands you select with your mouse.
Create a macro
When you record a macro, all steps that are needed to complete the actions that you want to record are
recorded by the macro recorder. Navigation on the Ribbon is not included in the recorded steps.
- If the Developer tab is not available, do the following to display it:
• Click the Microsoft Office Button available on the top left corner, and then click Excel
Options.
• In the Popular category, under Top options for working with Excel, select the Show
Developer tab in the Ribbon check box, and then click OK.
- To set the security level temporarily to enable all macros, do the following:
• On the Developer tab, in the Code group, click Macro Security.
•
• Under Macro Settings, click Enable all macros (not recommended, potentially dangerous
code can run), and then click OK.
Record a macro
- On the Developer tab, in the Code group, click Record Macro.
- In the Macro name box, enter a name for the macro. ( The first character of the macro name must
be a letter. Following characters can be letters, numbers, or underscore characters. Spaces are not
allowed in a macro name; an underscore character works well as a word separator. If you use a
macro name that is also a cell reference, you may get an error message that the macro name is not
valid.)
- To assign a CTRL combination shortcut key to run the macro, in the Shortcut key box, type any
lowercase letter or uppercase letter that you want to use.
- In the Store macro in list, select the workbook in which you want to store the macro.
- To include a description of the macro, in the Description box, type the text that you want.
- Click OK to start recording.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 8
9. Computer Information Systems - Assignments
February 2011
- Perform the actions that you want to record.
- On the Developer tab, in the Code group, click Stop Recording .
Assign a macro to an object, graphic, or control
After you create a macro, you can assign it to an object (such as a toolbar button, graphic, or control) so
that you can run it by clicking the object.
On a worksheet, right-click the object, graphic, or control to which you want to assign an existing macro,
and then click Assign Macro on the shortcut menu. In the Macro name box, click the macro that you want
to assign.
Delete a macro
If you no longer need to use a macro, you can delete it.
- Open the workbook that contains the macro that you want to delete.
- On the Developer tab, in the Code group, click Macros.
- In the Macros in list, select This Workbook.
- In the Macro name box, click the name of the macro that you want to delete.
- Click Delete.
Macro Example:
This macro will create and format the days of the week.
Record a New Macro
1. Macro Name = days
2. Short cut = Ctrl + d
3. Store Macro In = Personal Macro Book
4. OK
5. Click the Relative Reference button on the Record Macro toolbar
6. Type Monday
7. Use the fill handle to drag across 6 more cells thereby completing the series to Sunday
8. Click Format, Cells
9. Click the Alignment tab
10. Horizontal & Vertical alignment = Center
11. Orientation = 90 degrees
12. Click the Font tab
13. Font = Bold, 12
14. Click the Border tabs
15. Click between each Text block to place vertical lines between cells
16. Click OK
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 9
10. Computer Information Systems - Assignments
February 2011
3. Study office network diagram and draw a WAN.
This diagram was taken from the model used in a BPO organization where I was working as an
SME/Information Analyst. Our organization had offices in Navi Mumbai, Malad, Mumbai, Bangalore,
Kolkatta and Jalandhar. The diagram depicts how the various offices were inter connected.
Office 1
Desktop
Core Switch
Desktop Firewall
Access Switch
Desktop
Router
Database Server
Desktop
MPLS
Cloud
Office 2
Desktop
Core Switch
Desktop Firewall
Access Switch
Desktop
Router
Database Server
Desktop
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 10
11. Computer Information Systems - Assignments
February 2011
4. Draw Data flow Diagram for any process
This data flow was drawn based on my experience I gained while working for a multi located MNC that was
involved in Marketing Pharmaceuticals across world. My role in the organization was that of a SME/Analyst
involved in process designing, and information processing.
Every business initiative was considered as a project & the related activities were considered as tasks. We
had developed a system called PATTS.
The system
PATTS is a standard platform for everyone to document and share their PROJECTS and tasks. This system
helps in managing and tracking of PROJECTS and tasks in the organization. It also helps in ensuring that the
PROJECTS and tasks are executed within the target date and all stakeholders are aware about the progress
of a PROJECT or task.
There are two activities in the system:
a. PROJECT
b. Task
PROJECT is a stand alone entity while task is dependent on a PROJECT or another task. Both PROJECT and
task function in a same way except for one difference, which is, in the PROJECT process flow we can define
tasks whereas in the task process flow we cant define a sub tasks.
A PROJECT/Task has following Stake Holders:
a. Sponsor
Associate who is requesting the PROJECT/task.
Any associates (except Sales Associate) can be a sponsor.
b. Reporter
Associate who documents the PROJECT/task.
Any associate can be a reporter.
c. Owner
Associate who is responsible for execution & completion of the PROJECT/task.
Any associates (except Sales Associate) can be a Owner.
d. Contributors
Associates who can contribute to the PROJECT/task.
Any associate can be a contributor.
Stake holders are intimated through message on the Mail for certain actions taken on the PROJECT/Task.
After changing the status of a PROJECT/task to Completed, sponsor has to rate the execution of the
PROJECT/task as Excellent/ Satisfactory.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 11
12. Computer Information Systems - Assignments
February 2011
Process flow for a PROJECT
PROJECTS Created
Status: Open
Owner Accepts Owner Rejects
Status: Accepted Status: Open
TASK/Dependent Do not
Recommend Owner
TASK/Actions added Recommend Owner
Status: Pending Status: Open Status: Open
Owner Fulfills
PROJECT
Status: Under Observation
PROJECT Sponsor not
PROJECT Sponsor satisfied
satisfied
Status: Completed Status: Pending
Rate PROJECT
Note: A PROJECT can be closed only if the TASK dependent on that PROJECT (if
any) is closed/ abandoned
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 12
13. Computer Information Systems - Assignments
February 2011
Process flow for a Task
TASK Created
Status: Open
Owner Accepts Owner Rejects
Status: Accepted Status: Open
TASK updated/ Do not
Recommend Owner
actions added Recommend Owner
Status: Pending Status: Open Status: Open
Owner Fulfills
TASK
Status: Under Observation
TASK Sponsor satisfied TASK Sponsor not
satisfied
Status: Completed Status: Pending
Rate TASK
Note: If a TASK is dependent on another TASK, then the dependent Task can be
closed only if the Parent TASK is closed.
Thus a record of all business initiatives & the related activities could be tracked by all stake holders at every
stage using the above process model.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 13
14. Computer Information Systems - Assignments
February 2011
5. Find out one topic on internet & write a paper
ICANN
To reach another person on the Internet you have to type an address into your computer - a name or a
number. That address has to be unique so computers know where to find each other.
The Internet Corporation for Assigned Names and Numbers (ICANN) coordinates these unique identifiers
across the world and is responsible for managing and coordinating the Domain Name System (DNS) to
ensure that every address is unique and that all users of the Internet can find all valid addresses. It does
this by overseeing the distribution of unique IP addresses and domain names. It also ensures that each
domain name maps to the correct IP address.
Without ICANN coordination we wouldn't have one global Internet.
ICANN's role is very limited, and it is not responsible for many issues associated with the Internet, such as
financial transactions, Internet content control, spam (unsolicited commercial email), Internet gambling, or
data protection and privacy.
DNS
The domain name system, or DNS, is a system designed to make the Internet accessible to human beings.
The main way computers that make up the Internet find one another is through a series of numbers, with
each number (called an “IP address”) correlating to a different device. However it is difficult for the human
mind to remember long lists of numbers so the DNS uses letters rather than numbers, and then links a
precise series of letters with a precise series of numbers.
The end result is that ICANN’s website can be found at “icann.org” rather than “192.0.34.163” – which is
how computers on the network know it. One advantage to this system – apart from making the network
much easier to use for people – is that a particular domain name does not have to be tied to one particular
computer because the link between a particular domain and a particular IP address can be changed quickly
and easily. This change will then be recognised by the entire Internet within 48 hours thanks to the
constantly updating DNS infrastructure. The result is an extremely flexible system.
A domain name itself comprises two elements: before and after “the dot”. The part to the right of the dot,
such as “com”, “net”, “org” and so on, is known as a “top-level domain” or TLD. One company in each case
(called a registry), is in charge of all domains ending with that particular TLD and has access to a full list of
domains directly under that name, as well as the IP addresses with which those names are associated. The
part before the dot is the domain name that you register and which is then used to provide online systems
such as websites, email and so on. These domains are sold by a large number of “registrars”, free to charge
whatever they wish, although in each case they pay a set per-domain fee to the particular registry under
whose name the domain is being registered.
ICANN draws up contracts with each registry. It also runs an accreditation system for registrars. It is these
contracts that provide a consistent and stable environment for the domain name system, and hence the
Internet.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 14
15. Computer Information Systems - Assignments
February 2011
In summary then, the DNS provides an addressing system for the Internet so people can find particular
websites. It is also the basis for email and many other online uses.
IP addresses & Root Servers
ICANN plays a similar administrative role with the IP addresses used by computers as it does with the
domain names used by humans. In the same way that you cannot have two domain names the same
(otherwise you never know where you would end up), for the same reason it is also not possible for there
to be two IP addresses the same.
Again, ICANN does not run the system, but it does help co-ordinate how IP addresses are supplied to avoid
repetition or clashes. ICANN is also the central repository for IP addresses, from which ranges are supplied
to regional registries who in turn distribute them to network providers.
Root servers
Root servers are a different case again. There are 13 root servers – or, more accurately, there are 13 IP
addresses on the Internet where root servers can be found (the servers that have one of the 13 IP
addresses can be in dozens of different physical locations). These servers all store a copy of the same file
which acts as the main index to the Internet’s address books. It lists an address for each top-level domain
(.com, .de, etc) where that registry’s own address book can be found.
In reality, the root servers are consulted fairly infrequently (considering the size of the Internet) because
once computers on the network know the address of a particular top-level domain they retain it, checking
back only occasionally to make sure the address hasn’t changed. Nonetheless, the root servers remain vital
for the Internet’s smooth functioning.
The operators of the root servers remain largely autonomous, but at the same time work with one another
and with ICANN to make sure the system stays up-to-date with the Internet’s advances and changes.
ICANN’s role
As mentioned earlier, ICANN’s role is to oversee the huge and complex interconnected network of unique
identifiers that allow computers on the Internet to find one another.
This is commonly termed “universal resolvability” and means that wherever you are on the network – and
hence the world – that you receive the same predictable results when you access the network. Without
this, you could end up with an Internet that worked entirely differently depending on your location on the
globe.
ICANN structure
ICANN is made up of a number of different groups, each of which represent a different interest on the
Internet and all of which contribute to any final decisions that ICANN’s makes.
There are three “supporting organisations” that represent:
• The organisations that deal with IP addresses
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 15
16. Computer Information Systems - Assignments
February 2011
• The organisations that deal with domain names
• The managers of country code top-level domains (a special exception as explained at the bottom).
Then there are four “advisory committees” that provide ICANN with advice and recommendations. These
represent:
• Governments and international treaty organisations
• Root server operators
• Those concerned with the Internet’s security
• The “at large” community, meaning average Internet users.
And finally, there is a Technical Liaison Group, which works with the organisations that devise the basic
protocols for Internet technologies.
ICANN’s final decisions are made by a Board of Directors. The Board is made up of 21 members: 15 of
which have voting rights and six are non-voting liaisons. The majority of the voting members (eight of
them) are chosen by an independent Nominating Committee and the remainder are nominated members
from supporting organisations.
ICANN then has a President and CEO who is also a Board member and who directs the work of ICANN staff,
who are based across the globe and help co-ordinate, manage and finally implement all the different
discussions and decisions made by the supporting organisations and advisory committees. An ICANN
Ombudsman acts as an independent reviewer of the work of the ICANN staff and Board.
ICANN decisions
When it comes to making technical changes to the Internet, here is a simplified rundown of the process:
- Any issue of concern or suggested changes to the existing network is typically raised within one of
the supporting organisations (often following a report by one of the advisory committees), where it
is discussed and a report produced which is then put out for public review. If the suggested
changes impact on any other group within ICANN’s system, that group also reviews the suggested
changes and makes its views known. The result is then put out for public review a second time.
- At the end of that process, the ICANN Board is provided with a report outlining all the previous
discussions and with a list of recommendations. The Board then discusses the matter and either
approves the changes, approves some and rejects others, rejects all of them, or sends the issue
back down to one of the supporting organisations to review, often with an explanation as to what
the problems are that need to be resolved before it can be approved.
- The process is then rerun until all the different parts of ICANN can agree a compromise or the
Board of Directors make a decision on a report it is presented with.
Accountabilities
ICANN has external as well as internal accountabilities.
Externally, ICANN is an organisation incorporated under the law of the State of California in the United
States. That means ICANN must abide by the laws of the United States and can be called to account by the
judicial system i.e. ICANN can be taken to court.
ICANN is also a non-profit public benefit corporation and its directors are legally responsible for upholding
their duties under corporation law.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 16
17. Computer Information Systems - Assignments
February 2011
Internally, ICANN is accountable to the community through:
• Its bylaws
• The representative composition of the ICANN Board from across the globe
• An independent Nominating Committee that selects a majority of the voting Board members
• Senior staff who must be elected annually by the Board
• Three different dispute resolution procedures (Board reconsideration committee; Independent
Review Panel; Ombudsman)
Effect of ICANN's role and work on the Internet
ICANN plays a unique role in the infrastructure of the Internet. Through its contracts with registries (such as
dot-com or dot-info) and registrars (companies that sell domains names to individuals and organisations),
ICANN helps define how the domain name system functions and expands.
Registrars
ICANN created the registrar market (together with an accreditation system) in order to introduce greater
competition on the Internet. The result has been several hundred companies able to sell domains which
itself led to a dramatic reduction in the cost of domains - an 80 percent fall. There is now a diverse and
vibrant market in the supply of the Internet’s basic building block.
That accreditation process is currently undergoing reform in order to keep in up-to-date with a rapidly
changing domain name market.
Dispute resolution
ICANN helped design and implement a low-cost system for resolving disputes over domain name
ownership. The Uniform Domain Name Dispute Resolution Policy (UDRP) has been used tens of thousands
of times to resolve ownership disputes, avoiding the need for costly and complex recourse to the courts.
New top-level domains
ICANN approves the introduction of new "generic top-level domains" to the Internet - a process that
expands the online space available. So far, ICANN has introduced 13 new top-level domains to the Internet,
ranging from dot-asia to dot-travel, accounting for over six million domains. ICANN has also developed a
refined process to introduce further TLDs that is being finalised with applications expected in early 2010.
Internationalized domain names
Through its decision-making processes, ICANN has adopted guidelines for the introduction of
internationalised domain names (IDNs), opening the way for domain registrations in hundreds of the
world’s languages - something that will expand the use and the influence of the Internet globally to new
heights.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 17
18. Computer Information Systems - Assignments
February 2011
6. Analysis of different SDLC models
We will be discussing Water fall model & Spiral model.
Water Fall Model
The water fall model is linear and sequential with a purpose for each phase of development. The
development proceeds to the next phase, only when the prior phase of development is completed.
This allows room for departmentalization & managerial control and we can set a schedule with deadlines
for each stage of development.
The product can proceed through the development process, and can be delivered on time.
The development starts from concept & moves through design, implementation, testing, installation,
troubleshooting, and ends up at operation and maintenance. Each phase of development proceeds in
disciplined order without any repetition steps. However it does not allow room for a revisit, once the
application is in the testing stage. One cannot amend something in prior stage.
Since in this model Phases are processed and completed one at a time this works well for smaller projects
where requirements are very well understood. However, it is a poor model where initial requirements can
change even during lifecycle of the project. Also since no working software is produced until late during the
life cycle this indicates that high amounts of risk and uncertainty are involved and this model proves to be a
poor model for long and ongoing projects.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 18
19. Computer Information Systems - Assignments
February 2011
Spiral Model
The Spiral model uses features of water fall model, however, it is also includes features of prototyping.
Each stage (round) in this model consists of four phases:
- Objective determination: Definition of Product, business objects, constraints and generation of
alternatives
- Alternatives evaluation: Analysis of risks & prototyping
:
- Product development: D Designing, coding, testing & Integration
- Next cycle guidance: customer evaluation, design, implementation & customer delivery
: design
The Steps used in spiral model are given below:
- Requirements are defined in details via interviewing external or internal users and other aspects of
the existing system.
- A preliminary design is created & a first prototype is constructed which is an approximation of the
requirements in the product.
- The first prototype is evaluating for strengths, weaknesses, and risks.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 19
20. Computer Information Systems - Assignments
February 2011
- This leads to requirement analysis for the second prototype including planning, design,
construction and testing
- The customer can foresee Risk factors & the development costs
- The second prototype is evaluated in the same manner as was the previous prototype.
- All the above steps are repeated till the customer is satisfied and agrees that the prototype
represents the final product desired.
- The final system is constructed, based on the agreed prototype.
- The final system is thoroughly evaluated and tested.
- The final product is released for operation
The spiral model gives due importance to high risk analysis which is good for large mission-critical projects.
A prototype of the software is produced very early in the life cycle. The model’s success largely depends on
the analysis phase. However, this model can be costly in practice and may not be feasible for small projects.
Thus we conclude that for smaller projects we can adopt the water fall model & for larger projects it makes
sense to use the spiral model.
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 20
21. Computer Information Systems - Assignments
February 2011
Note from Author.
Dear Reader & user of this document,
I hope I was able to attempt to complete the Computer Information Systems Assignments correctly to the
fullest of my knowledge, abilities and by taking due references from the sources mentioned in this
document. I request the reader & user of this document once again to read and understand the disclaimer
mentioned at the start of the document for your own best interests.
I thank one and all who have provided me the knowledge & support to do this analysis including Mr.
Miranda, various websites, the ITM management & my class mates from XMBA 15 batch at ITM & most
Important of all my mom Mrs. Manjula M. Aiyer, my dad Mr. Mani P. Aiyer & My brother Mr. Manoj M.
Aiyer.
Please feel free to forward your valuable feedback, comments, queries and suggestions related to this
analysis at mumbai_man1977@yahoo.com.
Thank you,
Warm regards,
Manohar M. M. Iyer
Prepared by: Manohar M. M. Iyer, VAS2010XMBA15P005 Page 21