MS – 54: Management Information Systems – ignou mba solved assignments

Dear students, get fully  solved assignments by professionals

Do send your query at :

help.mbaassignments@gmail.com

or call us at :08263069601

Management Programme

ASSIGNMENT

FIRST SEMESTER

 (January to June) 2020

MS – 54: Management Information Systems 

ASSIGNMENT

Course Code  :       MS-54
Course Title  :  Management Information Systems 
Assignment Code :MS-54/TMA/SEM – I /2020  
Coverage  :  All Blocks

Note : Attempt all the questions and submit this assignment to the coordinator of your study center on or before 30th April, 2020.

Question.1. “The way organizations cannot exist without MIS (Management Information System), even information does not exist without organization.” Discuss.

Answer: What is an Organization?

An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. This technical definition focuses on three elements of an organization. Capital and labor are primary production factors provided by the environment. The organization (the firm) transforms these inputs into

Question.2. What are the features of a language which should be considered for its selection in the design of a system? Explain your answer with special reference to on-line system. 

Answer: Just like our universe, the world of code is an ever-expanding one, with newer technologies coming into play, newer methods of solving old problems and newer opportunities to be explored. The benefits of top-notch coding practices and their results are almost endless, to say the least. It is no wonder the masses, especially the younger generation, are curious about code and a vast majority are turning to our learned friend Mr. Google for answers on how to become an expert coder and where to begin.

Question.3. “Switching systems are connected to each other through point-to-point media.” Explain in the light of the statement the concept of connectivity through switched networks.

Answer: In the simplest terms, a switch is a mechanism that allows us to interconnect links to form a larger network. A switch is a multi-input, multi-output device that transfers packets from an input to one or more outputs. Thus, a switch adds the star topology (see Figure 56) to the set of possible network structures. A star topology has several attractive properties:

  • Even though a switch has a fixed number of inputs and outputs, which limits the number of hosts that can be connected to a single switch, large networks can be built by interconnecting a number of switches.
  • We can connect switches to each other and
  •  
  •  

Question.4. “Several problems may motivate management in an organization to adopt the database approach- focusing on the problem of the data.” Discuss the major problems that motivate a database approach along with the taxonomy of data structures.

Answer: database approach is entirely new reflects a lack of historical perspective. Data has always existed in organisations, and accountants and bureaucrats have traditionally controlled it to provide information in support of operations and management. The approach may seem radically new to people in data processing, but it is not. Many electronic data processing (EDF) departments have been so over whelmed with the programming aspects, that they have not applied well-known, sound management practices such as accountability and control. This “radical new concept” is merely a return to good management-of an old resource.

Growing recognition of data as a valuable

Question.5. “Computer virus is a software code that can infect other computer programs by altering them to include a copy of it.” Discuss the concept of computer virus and its main characteristics. 

Answer: Computer Virus

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

One of the ideal methods by which viruses spread is through emails – opening the attachment in the email, visiting an infected website,

Dear students, get fully  solved assignments by professionals

Do send your query at :

help.mbaassignments@gmail.com

or call us at :08263069601

Leave a Reply