0% found this document useful (0 votes)
2 views6 pages

MIS Assign 5

The document outlines the concept of systems, their characteristics, and types, including open and closed systems, physical and abstract systems, and deterministic and probabilistic systems. It details the phases of the Software Development Life Cycle (SDLC), distinguishing between initial investigation and feasibility study, and explains the importance of output and input design. Additionally, it covers form design, types of file organization, and control measures in system security.

Uploaded by

ronak.sajnani123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views6 pages

MIS Assign 5

The document outlines the concept of systems, their characteristics, and types, including open and closed systems, physical and abstract systems, and deterministic and probabilistic systems. It details the phases of the Software Development Life Cycle (SDLC), distinguishing between initial investigation and feasibility study, and explains the importance of output and input design. Additionally, it covers form design, types of file organization, and control measures in system security.

Uploaded by

ronak.sajnani123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1. What is system and its characteristics?

ANS: - System is set of components which interact with each other to accomplish a specific
goal.
1 Human body and its subsystem could be nervous system, digestive system and cardiac
system etc
2 Computer system and it has various subsystem like ALU, CU, Memory, Input unit and
Output unit etc.

Characteristics of system
• Every system has a purpose.
• Every system is made up of components like input process output, feedback and control
etc.
• System is made up of subsystem, whose goals are referred to as sub goals.
• Goal of a system is more important than subsystem goal.
• Systems whether open or closed have an element of control associated with them

2. What are types of system?


ANS: - Ans: Open & Closed Systems –An open system interfaces and interacts with other
system. An open system needs to receive feedback to change and continue to exist in its
environment. Example – A marketing system is an open system. A closed system does not
exchange the information with its environment. It does not have any connection to the other
system. Example – Research & development of organization, ICU dept. of hospital, etc.

Physical & Abstract System – Physical system are tangible entities that may be static or
dynamic in operations. For example the physical parts of the computer center are the
computers, desk, chair, etc. that facilitate operation of the computer.
Abstract systems are conceptual and non physical entities. They may be formulas of
relationship among set of variables or models, software / program.

Deterministic & Probabilistic System – A deterministic system works with certainty in


predictable manner. The interaction among its subsystem is known in advance. One state
of the system determines the next state of the system. Example – A computer system which
works on the principal GIGO. A probabilistic system operates with uncertainty as certain
degree of error is always attached with prediction of what the system will do. Example –
A student admission system in a college is probable in nature. Systems approach is an
organized way of dealing with a problem..

3. Explain phases of SDLC?


ANS: - There are 6 Phases of SDLC
1) Recognition of need
One must know what the problem is before it can be solved. Recognition of need can be done by
following two steps: -
Preliminary survey.
Initial investigation.
2) Feasibility Study
A feasibility study is carried out to select the best system that meets performance requirements.
This entails identification, description and evaluation of candidate system and selection of the best
system for the job
3) Analysis
Analysis is a detailed study of the various operations performed by a system and their relationship
within and outside of the system. One aspect of analysis is defining the boundaries of the system
and determining whether or not a candidate system should consider other related systems
4) Design
The most creative and challenging phase of the system life cycle is system design. Design is
actually a multistep process that focuses on four distinct attributes of a program. 1. Data structure.
2. Software architecture. 3. Interface representation. 4. Procedural detail. In design phase testing is
included.
5) Implementation
The implementation phase is creative than system design. It is primarily concerned with user
training, site preparation and file conversion. Depending on the nature of the system, extensive user
training may be required. Conversion usually takes place at about the same time the user is being
trained or later.
6) Post Implementation & Maintenance
After the installation phase is completed and the user staff is adjusted to the changes created by the
candidate system, evaluation and maintenance begin. Like any system, there is an aging process that
requires periodic maintenance of hardware and software.

4. Distinguish between initial investigation and feasibility study?


ANS: - It is the 1st step of SDLC which tries to define all the required steps of software
development by gathering information.
• It is to determine whether an alternative system can solve the problem.
• It is for improving an information system or a procedure.
• It is the 2nd step of SSDLC which is caried out to select the best system that
meets performance requirements.
• It is to determine whether the system fit in the organisations master
MIS(Managerial Information System) plan.
• It is for improving economic of worth growth.
5. Explain output design?
ANS:- OUTPUT DESIGN
The term output necessarily implies to information printed or displayed by an information
system. Following are the activities that are arried out in the output design stage: Identification
of the specific outputs required to meet the information requirements.
Selection of methods required for presenting information.
Designing of reports, formats or other documents that acts as carrier of information.
The most important source of information is the output, efficient, intelligible output design should
improve the system’s relationship with the user and help in decision making.
Objectives of output design:-
• Carry information about past activities, current affairs or projection of the future
• Mark important events
• Take an action
• Confirm an action
Principles of output design:-
• Too many details should be avoided
• Design should be used from top to bottom approach
• All pages must have heading and page number
• All column must be labeled
• Abbreviations should be avoided
Types of output
• Report
• Document
• Message

6. Explain Input Design?


ANS: - INPUT DESIGN The data base is the data that must be obtained and stored for later
retrieval for managerial decision making. The most common cause of error during the data
processing is inaccurate input. The inaccurate input is entered by data entry operators but it can
be controlled by input design.
Objectives of input design:
• Avoiding errors in data
• Avoiding delay
• Avoiding duplication of data
• Avoiding extra steps
• Controlling the amount of input required
• Keeping the process simple
Activities involved in input design:
• Collection of data
• Conversion of the input data to computer acceptable form
• Checking the conversion
• Transmitting the data to computer
• Checking the input data
• Correct the error if error occur
Similar to the output design, input design is equally important for a system designer. This is
because output from a system is regarded as the foremost determinant for defining the
performance of a system. The output of the system greatly affects the input design of the
system.
Input layout
The layout of the input design must contain the following items.
• Headings and date of data entry.
• Data heading and value
• Data type and width of the column
• Initials of data entry operator

7. What is form design and its requirements?


ANS: - Form design is a specific component of user interface design and involves the
creation of a system used by people to interact with an object such as a microwave, cell
phone, or computer. Form design ergonomic factors, ease of use, and understandability
are all combined to create the science of user interface design.

Form design requirements: -


• Form Colors
• Form Fonts
• Form Layout
• Form Buttons
• Form Navigation

8. Explain types of forms?


Ans Classification of forms: A printed form is generally classified by what it does in the
system. There are three primary classifications
1. Action: This type of form requests the user to do something.
Example: purchase orders.
2. Memory: This form is a record of historical data that remains in a file, is used for
reference, and serves as control on key details.
Example: Inventory records, purchase records
3. Report: This form guides supervisors and other administrators in the activities. It
provides data on a project or a job.
Example: profit and loss statements, sales analysis report

9. Explain types of file organization?


1) Sequential organization: Sequential organization means storing and sorting in
physical, contiguous blocks within files on tape or disk. Records are also in sequence
within each block. To access a record previous records within the block are scanned. In a
sequential organization, records can be added only at the end of the file. It is not possible
to insert a record in the middle of the file without rewriting the file. In a sequential file
update, transaction records are in the same sequence as in the master file.
2) Indexed sequential organization: Like sequential organization, keyed sequential
organization stores data in physically contiguous blocks. The difference is in the use of
indexes to locate records. There are three areas in disk storage: prime area, overflow area
and index area.
3) Inverted list organization: The indexed sequential method has a multiple index for a
given key, where as the inverted list method has a single index for each key type. In an
inverted list, records are not necessarily stored in a particular sequence. They are placed
in the data storage area, but indexes are updated for the record key and location. The
inverted keys are best for applications that request specific data on multiple keys. They
are ideal for static files because additions and deletions cause expensive pointer updating.

4) Direct access organization: In direct access file organization, records are placed
randomly throughout the file. Records need not be in sequence because they are updated
directly and rewritten back in the same location. New records are added at the end of the
file or inserted in specific locations based on software commands.

10. Explain control measures in system security?


ANS: - Control measures: -
1 Identification
2. Access controls
3. Audit controls
4. System integrity
1. Identification: There are three schemes for identifying persons to the computer. They are:
1. Password: A password is the most commonly used means for authenticating the identity to
the people. Passwords should be hard to guess and easy to remember.
2. Something you are, such as fingerprints or voice prints. Voice prints is a reliable method for
verifying authorized users. The technique essentially analyzes a person’s voice against
prerecorded voice patterns of the same person. An exact match allows access to the system.
3. Something you have, such as the credit card, key, or a special terminal. Magnetic stripe credit
card readers on terminals identify the operator to the system. The card along with a password
gives added assurance of the authentication of the user.
2. Access Control: Various steps have been taken to control the access to a computer facility.
One way is to use an encoded card system with a log-keeping capability. The card serves as a
key to unlock doors, including tape storage and other classified areas. The card is essentially a
magnetic key and a “Keyport” is a lock. Inserting the card into the lockport unlocks the door. A
card that includes a photograph of the bearer may double as an employee ID badge.

Encryption: An effective and practical way to safeguard data transmitted over the telephone
lines is by encryption. Data are scrambled during transmission from one computer or terminal to
the other. A plaintext message is transmitted over an unprotected communications channel. To
prevent unauthorized acquisition of the message, it is enciphered with a reversible
transformation to produce a cryptogram or ciphertext. When it arrives at an authorized receiver,
it is decrypted back to the plaintext data form.
3. Audit Controls: Audit controls protect a system from external security breaches and internal
fraud or embezzlement.

Neither the auditor nor the user can verify the system activities adequately, so the system must
check itself. The internal controls required mean that programmers and analysts build controls
into every system.
4. System Integrity: The costliest software loss is the program error. It is possible to eliminate
such error through proper testing routines. Parallel runs should be implemented whenever
possible. Physical security provides safeguards against the destruction of the hardware,
databases, and the documentation; fire , flood, theft, sabotage, and eavesdropping; and the loss
of power through proper backup.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy