16
Sample MS-54 Jan June 2017 Course Code MS - 54 Course Title Management Information Systems Assignment Code MS-54/TMA/SEM - I/2017 Assignment Coverage All Blocks To buy MBA assignments please use below link https://ignousolvedassignmentsmba.blog.spot.in / KIAN PUBLICATION [email protected] [email protected] [email protected] School of Management Studies INDIRA GANDHI NATIONAL OPEN UNIVERSITY MAIDAN GARHI, NEW DELHI – 110 068

MS-54 Jan June 2017

Embed Size (px)

Citation preview

Page 1: MS-54 Jan June 2017

Sample MS-54 Jan June 2017

Course Code MS - 54 Course Title Management Information Systems Assignment Code MS-54/TMA/SEM - I/2017 Assignment Coverage All Blocks

To buy MBA assignments please use below link

https://ignousolvedassignmentsmba.blog.spot.in/

KIAN PUBLICATION

[email protected]

[email protected]

[email protected]

School of Management Studies

INDIRA GANDHI NATIONAL OPEN UNIVERSITY MAIDAN GARHI, NEW DELHI – 110 068

Page 2: MS-54 Jan June 2017

1. What is the relevance of the Nolan’s Stage Growth Model for the study of information systems in today’s organisation? Information systems cannot deliver value from ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- levels of maturity in dealing with information systems. Nolan has provided a model for such information systems using maturity in organizations. However, empirical evidence is not available in ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------. This requires a change in the mindset and way of working. Organization culture needs to change to accommodate this ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ in dealing with information systems.

Nolan's Six-stage Model

Nolan (1979) ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------The stages are:

The structure of the final, six-stage model is depicted in the diagram below:

Figure 1: Diagram showing the SGM continuum for growth/maturity

The diagram ------------------------------------------------------------------ suggests that:

Stage 1: Evolution ----------------------------------------------- initiation stage. Stage 2: This is followed ---------------------------------------- IT in a contagion stage. Stage 3: After -------------------------------------------------- arises.

Page 3: MS-54 Jan June 2017

Stage 4: Next, ------------------------------------------------------------------------ solutions evolves. Stage 5: Administration/--------------------------------------------------------------------- increasing IT expenditures. Stage 6: Finally, -------------------------------------------------------------------------------- will occur.

Structure ------------------------- Model

Stage 1 – Initiation

In this stage, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------companies for two reasons:

(a) The first reason deals with the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------justifies large investment in specialized equipment.

(b) The second reason deals with ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------, users tend to take a "Hands Off" approach to new technology.

This introductory technology is simple ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------management, and works in a "carefree" atmosphere.

Stage 1 key points:

------------------------------------------------ "Hands Off". IT personnel are ------------------------------------------- learning". IT ------------------------------------------------- is lax. ------------------------------------------ applications to reduce costs.

Stage 2 – Contagion

Even though computer systems ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------by a managerial need to explain the potential of computer applications to alienated users. This leads to the adoption of computers in a range of different areas.

Stage 2 presents some difficulties:

Project and ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------systems being obtained.

System sophistication ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------in higher salaries.

The budget for the -----------------------------------------------------------------, and causes management concern. Although the price --------------------------------------------------------------------------------------------------------------------

------------------------------------------------------- is necessary.

Stage 2 key points:

----------------------------------------------------- of applications. ---------------------------------------------------- about using data processing. ----------------------------- control --------------------------------- lax. --------------------------------------- of budgets. ---------------------------------------- regard the computer as "just a machine". --------------------------- of computer use throughout the ------------------------------- functional areas. ------------------------------- is plagued by --------------------- crisis.

Stage 3 – Control

Stage 3 is a reaction against ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------for control of computer operating costs. In this stage, project management and management report systems ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of computers to management of data resources. This shift:

Is an outcome of the analysis of how ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------for data processing operations.

Page 4: MS-54 Jan June 2017

Provides flexibility -------------------------------------------------------------------- new controls.

The major ------------------------------------------------------------------------- of data processing operations.

Stage 3 key points:

----------------------------------------- in computer use. -------------------------------------- importance of the IT division ----------------------------------------. --------------------------------------------- controls put in place. ------------------------------------- often incompatible or inadequate. use of database --------------------------------------------- negative general management reaction. ------------------------ frustration with the IT --------------------------- provided.

Stage 4 – Integration

Stage 4 features the adoption of new ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------that of Stage 2. In the latter half of Stage 4, exclusive reliance on computer controls leads to ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------in his initial (1973) draft of the stages of growth.

Stage 4 key points:

--------------------------------- by the users. large data ------------------------------------------------ growth. ---------------------------------------line database facilities. data processing ----------------------------------- like a computer utility. formal planning --------------------------------------------- processing. users more ----------------------------------------------------. use of -----------------------------------------------, applications financial planning. data processing has --------------------------------------------------, project management.

Stage 5 – Data ----------------------------

Nolan determined that four stages ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------corporate data rather than IT. Like the proceeding Stage 4, it is marked by the development and maturity of the new concept of data administration.

Stage 5 key points:

data ad--------------------------- is introduced. ------------------------------------------, its usage, and its meanings within the whole organisation. applications -------------------------------------- the organisation. data processing ------------------------------------------------------- than of machines. use of term IT/-------------------------------------------- processing".

Stage 6 – Maturity

In Stage 6, the application portfolios - tasks like ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and its information flows. During this stage, tracking sales growth becomes an important aspect. Typically:

10% of the work ---------------------------------------------------------- remote job entry. 60% of the work relates to ------------------------------------------------------- processing. 5% of the ---------------------------------------------------------- computing. 25% of the work -------------------------------------------- processing.

Management control systems are estimated as being 40% of Stage 6. There are three aspects of management control; manufacturing, marketing and financial:

----------------------------------------------- future needs. Marketing --------------------------------------- with research. Financial control ----------------------------------------- flow requirements.

Page 5: MS-54 Jan June 2017

Stage 6 exercises a high degree ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------high levels of efficiency and effectiveness.

Stage 6 key points:

systems that ------------------------------------------- needs of the organisation. use of data resources to ---------------------------------------------------- applications. data processing --------------------------------------------- as a data resource function. data processing ---------------------------------------------------- strategic planning. ultimately, users and DP --------------------------------------------------------- resources within the organization. manager of IT system takes on the same ----------------------------------------------------- of finance or director of HR.

Discussion on significance of model

1. Though Nolan’s Stages of -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- it would probably now be perceived to have several shortcomings and to be old-fashioned or out-of-date.

2. The model had as a main focus the change in IT budget, but critics questioned whether it was “reasonable to assume that a single variable serves as a suitable surrogate for so much." Though it would seem reasonable that this single variable could be an indicator of other variables such as the organisational -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------that would make that main focus a valid one.

3. Nolan stated that the force ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------are additional factors that should be considered. Most important are the ‘demand-side’ factors that create a ripe environment for technological changes to be considered and adopted." As proposed, -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------circumstances. Unwarranted change would result in excess costs and potential failure of the process.

4. The Stages of Growth Model ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------naïve from the user perspective. King and Kraemer state, “...the question of whether organizational goals are uniform and consistent guides for the behavior of organizational actors, as opposed to ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------attention in the literature on computing.” Clearly, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------not subject to change.

5. Thus, though as time has ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------analysis into the growth of IT within organisations.

2. What are the various stages of a system development life cycle and how are the efforts distributed over these phases? The system-development life cycle enables users to transform a newly-developed project into an operational one.

The System Development ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and non-technical activities to deliver a quality system which meets or exceeds a business"s expectations or manage decision-making progression.

Traditionally, the systems-development life ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------to define clearer actions to achieve specific goals.

Similar to a project ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------under development.

The SDLC highlights different ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------a given step. It is also used to let them know that at any time, steps can be repeated or a previous step can be reworked when needing to modify or improve the system.

Page 6: MS-54 Jan June 2017

Following are the seven phases of the SDLC: Planning ------------------------------------------------------------------------------------------------------------- Development (4), Testing (5), Implementation (6) and Maintenance (7)

1. ---------------------------

This is the first phase in the systems ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------plan (or a feasibility study) for a company"s business initiative to acquire the resources to build on an infrastructure to modify or improve a service. The company might be trying to meet or exceed expectations for their employees-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------and other items should be considered at this stage.

2. Systems ------------------------ Requirements

The second phase is where businesses ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the best fit for the ultimate goal(s) of the project. This is where teams consider the functional requirements of the project or solution. It is also where system analysis takes place—or analyzing the needs of the end users to ensure the new --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------will be responsible for individual pieces of the project, and what sort of timeline should be expected.

There are several ----------------------------------------------- to the second phase. They include:

CASE (------------------------------------- Engineering) Requirements ------------------------------ ------------------------------- analysis

3. -------------------- Design

The third phase describes, in detail, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------place. This is the step for end users to discuss and determine their specific business information needs for --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- (networking capabilities), processing and procedures for the system to accomplish its objectives.

4. Development

The fourth phase is when the real ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. This work includes using a flow chart to ensure that the process of the system is properly organized. The development phase marks the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------by instillation and change. Focusing on training can be a huge benefit during this phase.

5. -------------------and Testing

The fifth phase involves systems integration ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------design meets the initial set of business goals. Testing may be repeated, specifically to check for errors, bugs and ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------, both of which will help ensure the program"s successful completion.

6. Implementation

The sixth phase is when the majority ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the new system into operations, a test run of the system is done removing all the bugs, if any. It is an important phase of a ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. The output of the test run should match the expected results. Sometimes, system testing is considered as a part of implementation process.

Using the test data following test run are carried out:

Page 7: MS-54 Jan June 2017

Program test System test

Program test : When the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and validation be checked and any undesirable happening must be noted and debugged (error corrected).

System Test : After carrying out the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------complete system is executed on the actual data. At each stage of the execution, the results or output of the system is analyzed. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------in the particular programs are identified and are fixed and further tested for the expected output---------------------------------------------------------------------------------------------------------------------------------------------------------------------------to establish that all modules work together correctly as an application or system or package.

When it is ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------per their requirements.

7. Operations and Maintenance

Maintenance is necessary to eliminate ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------enhancement, future functionality and any other added functional features to cope up with the latest future needs. It has been ---------------------------------------------------------------------------------------------------------------------------------------------------------------time to time. The review of the system is done for:

knowing ------------------------------- system

knowing the ------------------------ requirements

Studying --------------------------------------------.

If a major change ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------above life cycle phases.

EFFORT ---------------------------------------------- LIFE CYCLE

If a business determines a change is needed ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------project is a time-consuming process. Even though some steps are more difficult than others, none are to be overlooked. An oversight could prevent the entire system from functioning as planned.

Systems development specialists at Innovative Architects possess extensive experience in managing these type of projects. If you have a situation at your organization ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------guide you through each of these steps, ensuring you can have your new system online as soon as possible. The distribution of the organisational ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the efforts are devoted to maintenance after implementation and half the efforts in the system. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------information system before it is implemented.

Systems Development Life Cycle (SDLC---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of business processes, functional requirements, and economic and

Page 8: MS-54 Jan June 2017

technical feasibility. The primary objectives of any SDLC is to deliver quality system which meets or exceed customer expectations and within cost estimates, work ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of events for conducting system development that is controlled, measured, documented, and ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- rooms to add new features to existing software.

3. What are the various ways in which serial transmission can be achieved? Explain each way in detail.

In serial transmission, bits are sent sequentially on ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------is needed since bits must be assembled and sent as a unit and then disassembled at the receiver.

Serial transmission can be either synchronous or asynchronous . -------------------------------- bits are combined into frames and frames are sent continuously with or ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------synchronization, to allow for arbitrary size gaps between frames. However, start/stop bits maintain physical bit level synchronization once detected.

When transferring data between two ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. Data is transmitted as a single bit at a time using a fixed time interval for each bit. This mode of transmission is known as bit-serial transmission.

In serial transmission, the -------------------------------------- serially one after the other.

It requires only one --------------------------------------------- data from sender to receiver.

Thus all the bits of ------------------------------------------ line in serial fashion.

In serial transmission, --------------------------------------- clock pulse.

As shown in fig., suppose an 8-bit ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. The most significant bit (MSB) i.e. 1 will be transmitted in the end via single communication line.

The internal ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------are used.

These conversion devices ------------------------------------------------------------------------ over single line.

On receiver side, serial data ----------------------------------------------------------- of computer can accept it

• Serial ----------------------------------------------- communication.

Advantage --------------------------------- transmission Use of single communication line ---------------------------------------------------------------------- to parallel transmission. Disadvantages of Serial transmission 1. Use of conversion devices at -------------------------------------------------------------- transmission cost. 2. This method is slower ---------------------------------------------------------------- serially one after the other.

Page 9: MS-54 Jan June 2017

Examples of serial mode transmission include connections between a computer and a modem using the RS-232 protocol . Although an RS-232 cable can theoretically ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------serial transmission in either direction. In this case, a computer may not be close to a modem, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of serial transmission.

Ways of Serial Transmission There are two ways of serial ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the beginning and end of the data transmission occurs. Bit ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------control.

1. Asynchronous Transmission

Asynchronous ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------sends one byte of data at a time.

Bit ----------------------------------------------------- possible using start bit and stop bit. Start bit indicates ----------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------of each byte. Stop bit indicates the -----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------bits, usually 1s are called stop bits.

Addition of start and stop --------------------------------------------------------------- in asynchronous transmission. There is idle time between the ----------------------------------------------------- is also known as Gap The gap or idle ------------------------------------------------------------------------------------------------------------------------

------------------------------------within each byte, receiver must be synchronized with the incoming bit stream. Application of Asynchronous Transmission 1. Asynchronous transmission ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------computer as transmission takes place character by character.

2. Asynchronous ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------modems. Advantages of Asynchronous transmission 1. This method of data ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------would be low and idle time will not be expensive. 2. In this approach each ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------will not be affected. 3. It is possible to --------------------------------------------------------- different bit rates. 4. The transmission ------------------------------------------------------------- becomes available. 5. Moreover, this -------------------------------------------------------- to implement. Disadvantages of asynchronous transmission

Page 10: MS-54 Jan June 2017

1. This method is less ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------insertion of gaps into bit stream. 2. Successful transmission ---------------------------------------------------- be missed or corrupted.

2. Synchronous Transmission

Synchronous ----------------------------------------------------- and stop bits. In this method bit --------------------------------------------------------- multiple bytes. There is no -------------------------------------------------------------- in the data stream.

• In the absence of start & ------------------------------------------------------------------------- the transmission of each bit. • Since the various bytes ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------original information. • In order to receive the --------------------------------------------------------- at the same clock frequency. Application ------------------------------------------- transmission • Synchronous -------------------------------------------------------------------------------- between computers. Advantage ------------------------------------------ transmission 1. This method is faster as ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------is no gap between the individual data bytes. Disadvantages of Synchronous transmission 1. It is costly as compared to ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------both ends. This lead to increase in the cost. 2. The sender and receiver have ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------makes the system complicated.

3. Iso-chronous Iso-chronous is a technique which ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------between the transmission of two characters will always be an integer multiple of the length of time required to transmit one ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------than asynchronous transmission between the end devices. Iso-chronous transmission ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------transmission.

A circuit is a path for transmission of ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------; these are simplex, half-duplex and full duplex. In a simplex transmission, signals are ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of VCR or a Television. Here, the remote control unit sends a signal to the television or VCR to ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------is a one way road.

Page 11: MS-54 Jan June 2017

In half-duplex transmission both the stations ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------is complete from the first station and then it initiates transmission to the first station. In other ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the example of crossing of a narrow bridge. While the cars from one side cross the bridge, the cars on the other side wait. After completion, the cars from the other direction pass over the bridge to the opposite side.

In full-duplex transmission both ------------------------------------ is a simple example of full duplex transmission.

Half-duplex operation is possible on both two----------------------------------------------------------------------------------------------------------------------------------------------------------------------------must deal with turn around time, i.e.,. the time required to change the direction. During that time ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------full duplex transmission on two-wire circuits.

4. List the five problems which may motivate an organization to move toward the database approach. Explain the significance of each one to a manager to an organization. Since computer professionals have ------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------may think it must be embraced at any cost for their organization to

remain efficient, modern, and competitive. Neither position is entirely acceptable, yet both contain some truth.

Growing recognition of data as a valuable ---------------------------------------------------------------------------------------------------

------------------------------------------------------------------------Management" which have responsibility for data processing,

management information systems, ------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------top management and users to change the way they view the EDP

department.

Several problems may motivate ---------------------------------------------------------------------------------------------------------------

------------------------------------------------------------in an inability to get something done, or do economically, quickly, and

accurately. Though this need may initially justify ------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------must look at the application environment and the data

processing requirements from a global perspective.

Five major ---------------------------------------------- approach:

1. Inability to get --------------------------------------" ad hoc requests.

2. High d----------------------------------------t costs.

3. Low res------------------------------ to change.

4. Low ---------------------------------------------- quality.

5. Inadequate data model of the real world.

1. Inability to --------------------------------------" ad hoc requests.

Page 12: MS-54 Jan June 2017

In the lack of proper database ------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------made by client or customers as database was managed manually and it was

time consuming and hectic work. A lot of request came -----------------------------------------------------------------------------------

----------------------------------------------------------------------------------------big problem for the organizations and because of

that they decided to move towards database approach.

2. High development costs

In lack of database -------------------------------------------------------------------------------------------------------------------------------

--------------------------------------------Searching data was also a time consuming process. Maintaining record was also costly

that why we can say that development cost ---------------------------------------------------------- approach.

3. Low ------------------------------ change. It was become necessary for -------------------------------------------------------------------------------------------------------------------

--------------------------------------------------------and to give quick response, and to manage large data, thus responsiveness for

any change became low. Managers strongly --------------------------------------------------- to move towards database approach.

4. Low ----------------------------------------- and quality.

Without good database approach data --------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------or improve quality of data and also big threat of data security.

These were some issues which forced organizations to move towards good database management system.

5. Inadequate -------------------------------- real world.

Another problem faced by ----------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------managers faced difficulties an organizing and manipulating data from records.

These are common five problems which forced organizations to move towards good database management approach.

Management and organizations ----------------------------------------------------------------------------------------------------------------

-----------------------------------------------------------computer based information systems. MIS uses computer technology to

provide information and ------------------------------------------------------------------------------------------------------------------------

---------------------------------------------------management style.

Computer technology, ---------------------------------------------------------------------------------------------------------------------------

------------------------------------------------machine system for providing information to support operations, management,

analysis, and decision making -----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------and decision making and a data base.

Managers at all levels use ----------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------, external as well as internal, future oriented as well as historical and covering a

longer span time. An effective MIS cannot --------------------------------------------------------------------------------------------------

-------------------------------------------------------------------------not effectively use DBMS technology until two decades before.

An important key to a successful MIS is the effective management of an organization’s data resources.

Role of ----------------------------------- an Organization:

An organization is traditionally ----------------------------------------------------------------------------------------------------------------

-----------------------------------------------------------and policy making in top management. The corporate database contains

data relating to the organization, its operations, its plan and its environment.

Page 13: MS-54 Jan June 2017

State of Database ----------------------------- Organizations:

The needs of organizations ---------------------------------------------------------------------------------------------------------------------

------------------------------------------------------authorities, federal securities agencies and legislators making privacy laws.

Both internal and external forces demand that organizations exercise control over their data resources.

Decisions and actions in the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and produce plans and expectations which are formally captured and stored in the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------a current image.

People in the organization ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------plans and expectations. The corporate database provides data for modeling and forecasting which ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and the management process.

While management seeks ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------instance, computer applications begin to penetrate into higher management levels. With comprehensive ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------, an organization must appoint a DBA to manage its data resources.

While an organization’s ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------fall substantially short of ideal capabilities, making their acquisition an interim measure - a move to help ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------for large organizations with special needs, such as a very large database or large volumes of known transactions requiring rapid online response.

Data is a vital resource in an ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------of a data processing system, attention to data has lagged behind the development of machines and ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------and application systems which use it.

Four major ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the new technology.

1) Increase in --------------------------------------------------------------------- products

2) Recognition of relational ------------------------------------------------------------------- needs of organisation.

3) Emergence of ---------------------------------------------------------------------- business Requirements.

4) Increasing possibility of ------------------------------------------------------ of relational databases.

5. (a) “Compute virus is a major threat to compute security.” Justify the statement. We all know that there are ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. They just use computers for work and entertainment. This computer threats overview will give you the basic ------------------------------------------------------ protect yourself from common threats. Viruses: One of ------------------------------------- Threats A computer virus is a small program ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------viruses. Not all of them are particularly troublesome, but some of them can cause significant damage, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------email attachments and download from malicious web sites. Trojans: the ------------------------------------------ Threats

Page 14: MS-54 Jan June 2017

If you use an operating ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------small viruses that hide within other programs. They can essentially exist anywhere. Funny pictures, illegal downloads, and ----------------------------------------------------------------------------------------------------------------------------- programs may disable antivirus software and remove firewalls. Worms: The ------------------------------------- Threats Worms are similar to viruses in that ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------programs use the internet to search for vulnerable computers. Once they locate them, they move in. The -------------------------------------------------------------------------------------------------------------------------------------------------------programs can clog networks and can make loading web pages take a long time. Spyware: ----------------------------------------- Computer Spyware might seem like viruses, ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. This common threat is usually contracted through peer-to-peer file sharing. If you download music, movies, or ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------your computer to change your homepage, add additional programs and can cause your computer to crash.

A computer virus is a type of malicious --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus. The ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------viruses along with many other forms of malicious software, such as --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- malicious software.

The majority of active malware --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- in 1985, is a misnomer. Viruses often perform some type of harmful activity on infected host computers, such as ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------data, displaying political or humorous messages on the user's screen, spamming their e-mail contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------which install themselves without user consent.

What are the ------------------------------------- virus? Your ------------------------------------------- any of these malware symptoms:

Slow ---------------------------------------------- Erratic -----------------------------------ehavior ------------------------------data loss Frequent ------------------------- crashes

Computer Virus Help: ------------------------------------- virus protection? When you arm yourself with ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------with the best computer virus protection: Make sure that you have the best security software products installed on your computer:

Use antivirus --------------------------------- a firewall Get a-------------------------------- software Always keep ----------------------------------------- software up-to-date Update ------------------------------------------------ regularly Increase ------------------------------------------------ settings Avoid ----------------------------------------------- Web sites Only download ------------------------------------------------------------------- applications before downloading them.

Page 15: MS-54 Jan June 2017

Practice --------------------------------------- protocol:

Don't open ------------------------------------------------------------ senders Immediately -------------------------------------------------- to be spam

An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in and out of your computer and hide your PC from ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------protection from the two most dangerous threats on the Internet – spyware and computer viruses. They thwart threats before they ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the most damaging and devious strains. While free antivirus downloads are ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------forms of can often do the most damage, so it’s critical to have up-to-the-minute, guaranteed antivirus protection. ======================================================================================= (b) Why should there be law against benign computer virus maker? What harm can it cause to your computer?

There should be strong law against virus --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- to gain access to their hosts' computers and computing resources. The vast majority of viruses target systems running Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cyber security issues, artificial life and evolutionary algorithms.

Computer viruses currently cause billions of dollars' worth of ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------In response, free, open-source antivirus tools have been developed, and an industry of ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security ------------------------------------------------------------------------------------------------------------------------------------------------------------have already become widely distributed.

These computer threats can cause lots of problems---------------------------------------------------------------------------------------------------------------------------------------------------------------------------account numbers, passwords, and credit card numbers. This makes it much easier for them to commit fraud ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------your bank accounts, sign up for credit cards in your name, or even purchase high ticket items from online retailers. Other viruses take over small parts of your ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------requests until their owners pay off the criminal to regain control of his or her site. Chances are that you won’t see these activities taking place. Your computer or internet connection, however, will usually slow down: a ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------, installing a network firewall and using antivirus and antimalware programs. Free programs include SVG antivirus and Malware bytes.

A computer virus crime usually involves the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------is just general cybercrime legislation. In the United States, the distribution of a virus that affects ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------Morris computer worm case, there have been other successes. In December of 1999, David L. Smith pleaded guilty to ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------prison and a $250,000 fine. The "Melissa" virus was so devastating and widespread that it affected both computers belonging to individuals and those belonging to the government. This is ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------be stricter when dealing with personal computers.

As evident, the legal implications of computer ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------the writing of viruses is not an offence in itself. In others

Page 16: MS-54 Jan June 2017

even the sharing of virus code between anti-virus researchers could potentially be considered an offense. To make matters more ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------or her action under a very different legal system.

The newsgroup alt.comp.virus ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ or distribution may be found to be illegal:

Unauthorized access - you may ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------a virus which infects that machine.

Unauthorized modification - this ---------------------------------------------------------------, or partition sector. Loss of data - this --------------------------------------------------------------------------------------------------------------------

-------------------------------------------------------public safety Incitement - includes ------------------------------------------------------------, and virus engines. Denial -------------------------------------------------------------------- Application of any of -----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------has an interest.

The question of distribution is an interesting ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------they are getting into, can the distributor be held accountable? The consensus is that if the file is labeled then the person will probably not face criminal charges, although he or she may be sued for damages. The distributor could also ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------these media practically force viruses onto people who do not know what they are receiving. In addition, ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------the virus was spread due to "carelessness".

Laws Still Need to Improve Although legislation against computer ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------computer college student accused of having released the "I Love You" virus that attacked email systems around the world and caused an estimated $10 billion in damages. The reason for the dismissal of the charges was the lack of applicable legislation ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------could not be applied retroactively to the "Love Bug" author. Unfortunately, this is not an isolated incident. According to the report "Cyber Crime and Punishment?", conducted by the technology management ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------does not yet reach across the global Internet, “stated Bruce McConnell, president of McConnell International. "Organizations must rely on their own defences for now."

So what is being done to improve the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------in Europe, released its draft Convention on Cyber-Crime. This represents the first multiparty attempt to address the ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------on Unlawful Conduct on the Internet. The group, chaired by the Attorney General, was created in order to provide an initial analysis of legal and policy issues surrounding the misuse of the Internet. There seems to be a common ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------. Cybercrime is a problem that defies all borders and boundaries, hence so must the law enforcement tools used against it.

To buy MBA assignments please use below link

https://ignousolvedassignmentsmba.blog.spot.in/