You are on page 1of 13

LONDON SCHOOL OF BUSINESS MANAGEMENT

[PGDBA-4]

MANAGEMENT INFORMATION SYSTEM


ASSIGNMENT By Pushya mitra koyala

Q1, The software that can anticipate needing for staring an Internet marketing and data mining are 1. Application Software and Desktop Productivity Tools 2. System Software Application software Application software is a subclass of computer software that employs the capabilities of a computer directly and thoroughly to a task that the user wishes to perform. The basic application programming languages required for business are COBOL C, C++ Visual Basic: i.e., visual programming language

Software packages and Desktop Productivity Tools Software packages and Desktop Productivity Tools include 1. Word processing software A word processor is a computer application used for the production of any sort of printable material [2]. 2. Spreadsheet software A spreadsheet is a computer application that simulates a paper, accounting worksheet. It displays multiple cells that together make up a grid consisting of rows and columns, each cell containing alphanumeric text, numeric values or formulas.

3. Data management software

A Database Management System (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of a database. It allows organizations to place control of database development in the hands of database administrators (DBAs) and other specialists. A DBMS is a system software package that helps the use of integrated collection of data records and files known as databases. It allows different user application programs to easily access the same database. A DBMS also provides the ability to logically present database information to users. 4. Presentation graphics A presentation program is a computer software package used to display information, normally in the form of a slide show. 5. Web browsers A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web [5].

System software
System software includes 1. Operating system These are the software that manages and controls the computers activities. Personal computer operating systems and graphical user interfaces, which includes

Windows XP, Windows Vista and Windows Server 2003 Unix Linux and Open- source software

2. Language translators

Language translators convert programming source code into language that the computer processor understands. Programming source code has various structures and commands, but computer processors only understand machine language. Different types of translations must occur to turn programming source code into machine language, which is made up of bits of binary data. The three major types of language translators are compilers, assemblers, and interpreters

3. Utility programs Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. A single piece of utility software is usually called a utility.

Q.2 Database technology is an important factor for achieving the product differentiation. The company can use data base for purchasing the products online which is nothing but online database. Also, company will have suppliers data base in order to access the records immediately whenever required. So that it does not take much time for accessing the name, address, phone numbers etc. Also for achieving the product differentiation, company should have sales database in order to have a track on the products which have been sold. Also company should have the service database in order to improve the service either it might be customer service or quick delivery service etc. Lastly, it is very important for company to have customers record or database and the product they buy every time so that the company can send the new products online for promotion and for purchasing.

Q.3

Data mining software is an analytical tool for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases [1]. Data mining also helps for finding the hidden patterns and relationships in large database and inferring rules to predict future behavior. The types of information obtained from data mining includes: Associationswhich is linked to a single event. Sequenceswhich are linked over time. Classificationsrecognizes the patterns which describes the group to which an item belongs to by finding existing items which has been classified and by inferring a set of rules. Clustersis similar to classification when no groups are defined. Forecasting uses predictions in different way. Data mining can be used in to determine the new customers and

also to evaluate the performances of every store, consumers reactions to new products and services. Also for predictive analysis for historical data [2].

Q.4,

Nowadays, the VoIP service is in high demand in small and medium business enterprises. Due to advanced features and functionalities, the system offers

significant advantages for any business in terms of cost and productivity. As we all know, Communication plays an very important role in the

development of any business. The VoIP service provides all the comprehensive telecommunication features found in an expensive,

traditional phone system, but at a lower price. This helps to raise the profit and return on investment. 1. The main business advantages of using VoIP technology are: Saves time: VoIP service provides an advanced called interface,

where the features are oriented towards saving the valuable time and hence forth building a strong customer relation which is the base for any business. Voicemail, voice to email, fax to email, find me follow me, local telephone numbers and toll-free numbers are some of the features of the system. 2. Provides flexibility: VoIP provides flexibility as they keep the

employees connected with the office even when travelling. Also, calls coming to the office are redirected to cell phones, home phones or other designated numbers. 3. Provides an advanced communication features: The VoIP phone

system functions on an IP-based telephone network. All calls are efficiently transmitted using the packet-switching technology. Packet switching allows several telephone calls to occupy the amount of space that just one call takes up in a circuit-switched network. So many calls arriving simultaneously can be effectively transferred to the desired extensions without delay. 4. Reduces overheads: As VoIP functions mainly through a web-based

interface, there is no need to install expensive hardware to set up the VoIP phone service in the office. A large number of additional extensions can be easily connected on through a single phone line and Internet connection. Thereby, a reliable service provider can help to choose the VoIP

phone service that provides the advantages for any business. Also, they help compare the plans, set up the system, offer timely upgrades and provide the VoIP phone service at an affordable monthly charge [1].

Q5. The internet is a worldwide network of networks that uses the client/server model of computing and the TCP/IP network reference model. Every computer on the internet is assigned a unique numeric IP address.

The domain name system converts the IP addresses to domain names so that the users only need to specify a domain name to access a computer on a internet instead of typing in the numeric IP address. No one owns the internet and it has no formal management organisation. However, worldwide internet policies are established by organisations and government bodies, such s internet architecture board and the worldwide web consortium. The internet also confirm to the laws of the sovereign nation-states in which it operate, as well as the technical infrastructures that exists within the nation-state. Major internet services include email, usenet, chatting, instant messaging, telnet, FTP and the World wide web. Web pages are based on the hypertext markup language (HTML) and display text, graphic, video and audio. Website directories, search engines and RSS technologies help users to locate the information they need on the web. RSS, blogs and wikis are features of web 2.0. web technology and internet networking standards provide the connectivity and interfaces for internal private intranet and private extranets that can be accessed by many different kinds of computers that is inside and outside of the organisation. Internet-based group wares and electronic conferencing software provide tools to support communication and collaboration a when people work together in groups or work in teams, often in different locations. Firms are also starting to release economies by using internet telephony, which enables internet technology to be used for telephone voice transmission. Internet technology can also reduce communication cost by enabling companies to create a virtual private network (VPNs) as low cost alternatives to private WANs.

Q.6,

As we all know, software quality measures how well the software quality is designed and how well the software quality conforms that

design. For any software, quality is the most important aspect to be considered. Software quality is important to security in order to keep the data

very confidential, so that the hackers cannot access any ones account and use their informations. Customers always prefer better quality software which is a secure one. Ex: HSBC, NatWest Bank etc. Any personal bank accounts will have good software quality for security purpose. The steps taken by an organisation to ensure software quality are as

follows. Step 1: Make sure all software metrics are met I.e. number of transactions, online response time, payroll checks printed per hour etc. Step 2: Early and regular testing should be done. This step secures the quality of the software, if and only if regularly followed. Step 3: Walkthrough Review of specification or design document by small group of qualified people. Step 4: Debugging It is nothing but a process by which errors are eliminated. Security:

Implement the policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Q.7,

As we all know, security plays an important role in any information system for that matter. Also, hackers are getting smarter every day. Therefore any organisation has to take certain steps to secure their information from hackers. For example, Megamalls Inc., which is a national chain of retail malls have to make sure their information systems, is up to par. The steps taken to secure their information systems are as follows: Step 1: Make sure there are no hardware, software or disasters problems in the information systems. Step 2: Make sure the information system is having MALICIOUS software. This software is referred as malware, which includes variety of threats such as computer viruses, worms, and Trojan horses. This software actually protects the system and does safely save the information in the system. Step 3: Spoofing All organisations should have knowledge on Spoofing. As nowadays, hackers attempts to hide their true identities. As spoofing involve redirecting a web link to an address different from the intended one. Ex: hackers effectively steal businesses as well as sensitive customers information from true site.

Step 4: Internal Threats Employees Security threats also often originate inside an organisation; hence an organisation should be aware of inside knowledge, sloppy security procedures, Social Engineering etc. Step 5: Information system control Every system in an organisation should have control on their information systems in order to secure the information. The control may be of general controls such as software controls, hardware controls, Data security controls, Computer operations controls etc, and Application controls such as input controls, processing control and output controls [1].

Q.8, The security of a firms information system and data is affected by its people, organisation, and technology only if the following criterias are not met in any firm. People: Monitoring security Develop anti-hacker strategy Organisation: Monitor hacker activities Implement security policy Educate consumers Technology: Deploy anti-phishing software Use anti-phishing services Deploy multi-level authentication system [2] The contribution of each and every dimension is very important in any firm, as these are interlinked to each other. To any firm these dimensions play an important role, especially in terms of securing information systems. One cannot survey without the other. Ex: people is important for monitoring the activities, also unless the technology deploy, an organisation cannot implement any software. Hence, each dimension is interlinked and is important in a firm.

Q.9, The benefits of an enterprise system is basically they are based on a suite of integrated software modules and a common central database which collects the data from different divisions and departments in a firm, and

also from a large business number of key business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources, making the data available for applications that support the internal business activities. Yes, it is appropriate for this company to have enterprise system. The steps to determine enterprise system is as shown below.

Finance and accounting processes includes general ledger, accounts payable, accounts receivable, fixed assets, cash management and forecasting, product-cost accounting, cost-centre accounting, asset accounting, tax accounting, credit management and financial reporting. Human resources processes includes personnel administration, time accounting, payroll, personnel planning and development, benefits accounting, applicant tracking, time management, compensation, workforce planning, performance management, and travel expense reporting. Manufacturing and production processes includes procurement, inventory management, purchasing, shipping, production planning, production scheduling, material requirements planning, quality control, distribution, transportation, and equipment maintenance. Sales and manufacturing processes includes order processing, quotations, contracts, product configuration, pricing, billing, credit checking, incentive and commission management, and sales planning [1]. Q.10, As a small architectural firm is interested in implementing knowledge management system, it is beneficial to implement knowledge work system to implement. The knowledge work system is a specialised system which is built for engineers, scientists, and other knowledge work applications [1]. Ex: CAD, 3D Visualisation, Virtual reality, Investment workstations etc.

The features that this firm can benefit is that, they have try implementing the below steps shown.

REFERENCE; http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/pal ace/datamining.htm http://www.hideipeasy.com/advantages-of-voip-phone-service-for-yourbusiness-2.html- accessed on 18/10/20 www.Slidefinder.net/E/ess8_ch07/12198002. Management Information System, by Kenneth C. Laudon & Jane P. Laudon, Tenth Management Information System, by Kenneth C. Laudon & Jane P. Laudon, Tenth Management Information System, by Kenneth C. Laudon & Jane P. Laudon, Tenth Management Information System, by Kenneth C. Laudon & Jane P. Laudon, Tenth Edition, Management Information System, by Kenneth C. Laudon & Jane P. Laudon, Tenth Edition, .

You might also like