Professional Documents
Culture Documents
MIS
Component : of mis
Internal records : The first component of MIS is Internal Record.
Marketing managers get lots of information from the internal-records of
the company. These records provide current information about sales,
costs, inventories, cash flows and account receivable and payable. Many
companies maintain their computerized internal records. Inside records
help marketing managers to gain faster access to reliable information.
Marketing intelligence :
The second component of MIS is Marketing Intelligence. It collects
information from external sources. It provides information about current
marketing-environment and changing conditions in the market. This
information can be easily gathered from external sources like; magazines,
trade journals, commercial press, so on. This information cannot be
collected from the Annual Reports of the Trade Association and Chambers
of Commerce, Annual Report of Companies, etc. The salesmens report
also contains information about market trends.
Marketing research :
The third important component of MIS is Marketing Research. MR is
conducted to solve specific marketing problems of the company. It collects
data about the problem. This data is tabulated, analyzed and conclusions
are drawn. Then the recommendations are given for solving the problem.
Marketing research also provides information to the marketing managers.
Information Technology," IT
Marketing
Large and small businesses are on a level playing field on the Internet.
You can have a Web presence, take orders, buy merchandise, sell excess
or even operate some businesses entirely online. A marketing tool that
uses information technology is the Quick Response or QR Code that looks
like a bar code but is square.
Information
Whether you learned business management by the book or by practical
experience, youll need updates all of your life. The Internet is a wealth of
information to keep you current with trends, techniques, software and
human resources. You can draw on online databases and websites to
locate potential employees, compare insurance proposals, tackle
employee issues or check out the competition. Managing your business
with information gleaned from the Internet keeps you knowledgeable and
on the cutting edge.
Communication
Information system
An information system is any organized system for the collection,
organization, storage and communication of information. Such a system
may be as simple as a 3x5 card catalog system on a desk, a Rolodex, a
desktop calendar, or a Daytimer. Or, it may be as complicated as a multinode computer database system used to manage vast quantities of
related information.
A computer Information System (IS) is a system composed of people and
computers that processes or interprets information.[1][2][3][4] The term
is also sometimes used in more restricted senses to refer to only the
software used to run a computerized database or to refer to only a
computer system.
Information system is an academic study of systems with a specific
reference to information and the complementary networks of hardware
and software that people and organizations use to collect, filter, process,
create and also distribute data. An emphasis is placed on an Information
System having a definitive Boundary, Users, Processors, Stores, Inputs,
Outputs and the aforementioned communication networks
2.Software:
The term software refers to computer programs and the manuals (if any)
that support them. Computer programs are machine-readable instructions
that direct the circuitry within the hardware parts of the CBIS to function
in ways that produce useful information from data. Programs are
generally stored on some input / output medium,often a disk or tape.
3.Data:
Data are facts that are used by programs to produce useful
information.Like programs,data are generally stored in machine-readable
form on disk or tape until the computer needs them.
4.Procedures
Procedures are the policies that govern the operation of a computer
system. "Procedures are to people what software is to hardware" is a
common analogy that is used to illustrate the role of procedures in a CBIS.
5.People:
Every CBIS needs people if it is to be useful. Often the most over-looked
element of the CBIS are the people, probably the component that most
influence the success or failure of information systems.
Networking definition
In information technology, networking is the construction, design, and use
of a network, including the physical (cabling, hub, bridge, switch, router,
and so forth), the selection and use of telecommunication protocol and
computer software for using and managing the network, and the
establishment of operation policies and procedures related to the
network.
the exchange of information or services among individuals, groups, or
institutions; specifically : the cultivation of productive relationships for
employment or business
the establishment or use of a computer network : types of
networking
Personal Area Network
A personal area network, or PAN, is a computer network organized around
an individual person within a single building. This could be inside a small
office or residence. A typical PAN would include one or more computers,
telephones, peripheral devices, video game consoles and other personal
entertainment devices.
. In a very typical setup, a residence will have a single wired Internet
connection connected to a modem. This modem then provides both wired
and wireless connections for multiple devices. The network is typically
managed from a single computer but can be accessed from any device.
5
resources, such as data storage and printers. LANs can be built with
relatively inexpensive hardware, such as hubs, network adapters and
Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. A LAN typically relies mostly on
wired connections for increased speed and security, but wireless
connections can also be part of a LAN. High speed and relatively low cost
are the defining characteristics of LANs.
stages os investigation
1.
Problem definition:
5
6
The first responsibility of a system analyst is to prepare a written
statement of the objectives of the problem. Based on interviews with the
user, the analyst writes a brief description of his/her
understanding of the problem and reviews it with both the groups. People
respond to written statements. Following are some possible definitions of
problems:
a.
b.
c.
d.
e.
f.
2.
Feasibility study:
Database
Often abbreviated DB, a database is basically a collection of information
organized in such a way that a computer program can quickly select
desired pieces of data. You can think of a database as an electronic filing
system.
Traditional databases are organized by fields, records, and files. A field is
a single piece of information; a record is one complete set of fields; and a
file is a collection of records. For example, a telephone book is analogous
6
7
to a file. It contains a list of records, each of which consists of three fields:
name, address, and telephone number.
An alternative concept in database design is known as Hypertext. In a
Hypertext database, any object, whether it be a piece of text, a picture, or
a film, can be linkedto any other object. Hypertext databases are
particularly useful for organizing large amounts of disparate information,
but they are not designed for numerical analysis.
Since computers are often smart enough to run themselves, you may
wonder why they need people to help them manage data. You'll often find
a database administrator, or DBA, in an organization that manages a large
DBMS. One of a DBA's primary roles is in ensuring that database
information is secure. In addition to designing a database, a DBA may be
the only person in an organization who can perform certain database
tasks such as archiving data tables. DBAs also help resolve problems that
a system's users encounter.
Not every database has a DBA. You probably know this if you manage a
simple database that powers your website. Some organizations may hire
programmers who also serve as database administrators. Smaller
organizations may even allow developers to design databases and manage
them. On the opposite end of the scale you'll find large companies that
hire database architects. These highly trained professionals assume the
design role that DBAs often have. Database architects also work with
departments within an organization to ensure that all DBMSs meet
everyone's needs.
expert system
A computer application that performs a task that would otherwise be
performed by a human expert. For example, there are expert systems that
can diagnose human illnesses, make financial forecasts, and schedule
routes for delivery vehicles. Some expert systems are designed to take
the place of human experts, while others are designed to aid them.
Expert systems are part of a general category of computer applications
known as artificial intelligence . To design an expert system, one needs a
knowledge engineer, an individual who studies how human experts make
decisions and translates the rules into terms that a computer can
understand.
8
logs into the network, it contacts the Xbox Live servers to retrieve gaming
resources like updates, video and game demos.
Transaction Processing Systems
A transaction is an elementary activity conducted during business
operations. Transaction processing systems (TPS) process the company's
business transactions and thus support the operations of an enterprise. A
TPS records a non-inquiry transaction itself, as well as all of its effects, in
the database and produces documents relating to the transaction.
TPS are necessary to conduct business in almost any organization today.
TPSs bring data into the organizational databases, these systems are also
a foundation on which management oriented information systems rest.
9
5:The mesh network topology employs either of two schemes, called full
mesh and partial mesh. In the full mesh topology, each workstation is
connected directly to each of the others. In the partial mesh topology,
some workstations are connected to all the others, and some are
connected only to those other nodes with which they exchange the most
data.
6:The tree network topology uses two or more star networks connected
together. The central computers of the star networks are connected to a
main bus. Thus, a tree network is a bus network of star networks.
Direct access
In computer storage, direct access is the ability to obtain data from a
storage device by going directly to where it is physically located on the
device rather than by having to sequentially look for the data at one
physical location after another. A direct access storage device (DASD) has
the electrical or electromechanical means to be immediately positioned
for reading and writing at any addressable location on the device
Sequential access
In computer science, sequential access means that a group of elements
(such as data in a memory array or a disk file or on magnetic tape data
storage) is accessed in a predetermined, ordered sequence. Sequential
access is sometimes the only way of accessing the data, for example if it
is on a tape. It may also be the access method of choice, for example if all
that is wanted is to process a sequence of data elements in order.
End-user computing
10
End-user computing can range in complexity from users simply clicking a
series of buttons, to writing scripts in a controlled scripting language, to
being able to modify and execute code directly.
Examples of end-user computing are systems built using fourthgeneration programming languages, such as MAPPER or SQL, or one of the
fifth-generation programming languages, such as ICAD.
Feasibility study:
Thus, feasibility study provides an overview of the problem and acts as an
important checkpoint that should be completed before committing more
resources. The feasibility of a proposed system can be assessed in terms
of four major categories as given below:
a)
Organizational feasibility: the extent to which a proposed
information system supports the objective of the organizations strategic
plan for information systems determines the organizational feasibility of
the system project.
b)
Economic feasibility: In this study, costs and returns are evaluated
to know whether returns justify the investment in the system project.
c)
Technical feasibility: whether reliable hardware and software,
capable of meeting the needs of the proposed system can be acquired or
developed by the organizations in the required time is a major concern of
the technical feasibility.
DBMS
workgroup computing
A workgroup is a collection of individuals working together on a task.
Workgroup computing occurs when all the individuals have computers
connected to a network that allows them to send e-mail to one another,
share data files, and schedule meetings. Sophisticated workgroup
systems allow users to define workflows so that data is automatically
forwarded to appropriate people at each stage of a process.
10
11
media. These are different types of transmission media (i) Guided media
(ii) Unguided media
Guided media
In guided media communication device are directly connected with each
other by using some physical media like wires. It also called bounded
media.
Some example of bounded media for communication is as follows:
Twisted Pair Coaxial Cable Fiber Optics Twisted Pair
Unguided Media
DOS
The term DOS can refer to any operating system, but it is most often used
as a shorthand for MS-DOS (Microsoft disk operating system). Originally
developed by Microsoft for IBM, MS-DOS was the standard operating
system for IBM-compatible personal computers.
The initial versions of DOS were very simple and resembled another
operating system called CP/M. Subsequent versions have became
increasingly sophisticated as they incorporated features of minicomputer
operating systems. However, DOS is still a 16-bit operating system and
does not support multiple users or multitasking.
11