Exam Ans - 306
Exam Ans - 306
In the Management Information Systems, the concept of the ‘Systems’ play a very essential and
a defining role and it can be surely referred to as the backbone of the management Information
Systems. The major concept of the systems involves basically the pattern or a way in which one
thinks about managing optimally.
A file processing system helps people keep track of files as they move throughout the various
departments of a business. The purpose of this sort of system is to keep things organized,
generally in alphabetical, numerical or chronological order. Companies that have effective file
processing systems have ways to find those files in an orderly manner, rather than having staff
members rifling through papers in order to find what they are looking for.
DDL is Data Definition Language which is used to define data structures. For example: create
table, alter table are instructions in SQL.
DML is Data Manipulation Language which is used to manipulate data itself. For example: insert,
update, delete are instructions in SQL.
6. What is MIS?
MIS is the use of information technology, people, and business processes to record, store and
process data to produce information that decision makers can use to make day to day decisions.
The full form of MIS is Management Information Systems.
Structured decision making is an approach for careful and organized analysis of natural resource
management decisions. Every decision consists of several primary elements – management
objectives, decision options, and predictions of decision outcomes.
9. Describe Information?
Data that is (1) accurate and timely, (2) specific and organized for a purpose, (3) presented
within a context that gives it meaning and relevance, and (4) can lead to an increase in
understanding and decrease in uncertainty. Information is valuable because it can affect
behavior, a decision, or an outcome.
Database administrators (DBAs) are primarily responsible for specific databases in the
subsystem. In some companies, DBAs are given the special group authorization, which gives
them the ability to do almost everything in the subsystem, and gives them jurisdiction over all the
databases in the subsystem.
SECTION - B
Q. 2. What is Intelligence, Design and choice phase in decision making?
Decision making phases involves 4 major phases: intelligence, design, choice and implementing.
The decision making process starts with the intelligence phase. In this phase, the decision maker
examines reality, identifies and defines the problem.
Intelligence Phase
Design Phase
Choice Phase
Implementation Phase
It’s important to say that first Simon’s model contained only three phases. Implementation Phase
was added later. Also, we could add a fifth phase - Monitoring, but monitoring can be viewed as
an input for the intelligence phase.
Intelligence Phase
The decision-making process starts with Intelligence Phase. In the first phase, decision makers
examine reality and try to identify problems or opportunities correctly. This phase is not only
related to the Simon’s decision-making process, but also to other fields and other methodologies.
Additionally, one of the Digital Transformation pillars is the data. Organizations should become
data-driven. That means proper usage and implementation of Business Intelligence (BI) systems.
Business Intelligence implementations are considered successful only if you have clear business
needs and see real benefits from it. Business Intelligence is not just about data. It should be
connected with organizational goals and objectives!
The intelligence phase can really last long. But, since decision-making process starts with this
phase, it should be long as it needs to be done properly. This is really important step and we are
going to write more about this phase in our future blog posts.
Design Phase
The main goal of the design phase is to define and construct a model which represent a system.
This is done by properly defining relationships between collected variables. Once we validate the
model, we define the criteria of choice and search for several possible solutions for defined
problem (opportunity). We wrap up the design phase by predicting the future outcomes for each
alternative.
Choice Phase
In this phase we are actually making decisions. The end product of this phase is a decision.
Decision is made by selecting and evaluating alternatives defined in previous step. If we are sure
that the decision we made can actually be achieved - we are ready for the next phase.
Implementation Phase
All the previous steps we’ve made (intelligence, design and choice) are now implemented.
Implementation can be either successful or not. Successful implementation results with a solution
to defined problem. On the other hand, failure returns us to an earlier phase.
Even Simon’s model was criticized as being general, that is why we need to be aware of
importance of decision-making. This model is a concept, a framework of how organizations and
managers make decisions. Plus, it is a good background for other topics like Business
Intelligence.
Description: These phases are - Planning: This phase starts with the gathering of business
requirements. In the subsequent spirals as the product matures, identification of system
requirements and unit requirements are done in this phase. This also includes understanding of
system requirements by continual communication between the customer and the analyst. At the
end of the spiral the product is deployed.
Design: Design phase starts with the design in the baseline spiral and involves architectural,
logical design of modules, physical product design and final design in the successive spirals.
Construct: Construct phase refers to development of the final software product at every spiral. In
the spiral when the product is just thought and the design is being developed, a Proof of Concept
(POC) is developed in this phase to get the users’ feedback. Then in the successive spirals with
higher clarity on requirements and design a working model of the software called build is
developed with a version number. These versions are sent to the users for feedback.
Evaluation and Risk Analysis: Risk analysis includes identifying, estimating, and observing
technical feasibility such as schedule slippage and cost overrun. After testing the build, at the
end of first iteration, user evaluates the software and provides the feedback. Based on the
customer assessment, development process enters into the next iteration and afterwards follows
the linear approach to implement the feedback provided by the user. The process of iterations
along the spiral carries on with throughout the life of the software.
Compared to the File Based Data Management System, Database Management System has
many advantages. Some of these advantages are given below:
The file based data management systems contained multiple files that were stored in many
different locations in a system or even across multiple systems. Because of this, there were
sometimes multiple copies of the same file which lead to data redundancy.
This is prevented in a database as there is a single database and any change in it is reflected
immediately. Because of this, there is no chance of encountering duplicate data.
Sharing of Data
In a database, the users of the database can share the data among themselves. There are
various levels of authorisation to access the data, and consequently the data can only be shared
based on the correct authorisation protocols being followed.
Many remote users can also access the database simultaneously and share the data between
themselves.
Data Integrity
Data integrity means that the data is accurate and consistent in the database. Data Integrity is
very important as there are multiple databases in a DBMS. All of these databases contain data
that is visible to multiple users. So it is necessary to ensure that the data is correct and
consistent in all the databases and for all the users.
Data Security
Data Security is vital concept in a database. Only authorised users should be allowed to access
the database and their identity should be authenticated using a username and password.
Unauthorised users should not be allowed to access the database under any circumstances as it
violates the integrity constraints.
Privacy
The privacy rule in a database means only the authorized users can access a database
according to its privacy constraints. There are levels of database access and a user can only
view the data he is allowed to. For example - In social networking sites, access constraints are
different for different accounts a user may want to access.
Database Management System automatically takes care of backup and recovery. The users
don't need to backup data periodically because this is taken care of by the DBMS. Moreover, it
also restores the database after a crash or system failure to its previous condition.
Data Consistency
Data consistency is ensured in a database because there is no data redundancy. All data
appears consistently across the database and the data is same for all the users viewing the
database. Moreover, any changes made to the database are immediately reflected to all the
users and there is no data inconsistency.
2. Analysis Read - the requirement and based on analysis define the schemas, models and
business rules.
4. Implementation Development of the software in the small units with functional testing.
5. Integration and Testing Integrating of each unit developed in previous phase and post
integration test the entire system for any faults.
6. Deployment of system - Make the product live on production environment after all functional
and nonfunctional testing completed.
7. Maintenance Fixing issues and release new version with the issue patches as required.
2. Easy to manage as each phase has specific outputs and review process,
3. Clearly-defined stages,
4. Works well for smaller projects where requirements are very clear,
5. Process and output of each phase are clearly mentioned in the document.
Disadvantages: 1. It doesn’t allow much reflection or revision. When the product is in testing
phase, it is very difficult to go back and change something which is left during the requirement
analysis phase.
5. As testing is done at a later phase. So, there is a chance that challenges and risks at earlier
phases are not identified.