- What are the characteristics of a closed system?
- In a closed system, interaction only occurs among the elements in the system.
- The boundaries are rigid, restricting the inflow or outflow of information.
iii. In a closed system, disintegration is the final result.
- State and explain some of the policies/measures that need to be addressed in case of avoiding internal security threats.
- Educating employees about security measures- this involves communicating to all employees of the threats and dangers that a company faces. Conducting awareness training to all employees about the threats and the prevention measures is also necessary.
- Implementing best practices for password security- Password sharing is one of the overlooked issues that cause bleach in password security. After password sharing, the password should be changed as soon as possible to guarantee its security.
iii. Install user action monitoring software- It allows monitoring of every user’s action by monitoring all the activities. The program can be installed to all user computers and, it records all activities by recording screens.
- Protect the physical location of your data- Servers located in a data center are safe from the bleach. However, those located on a site should be guarded by a security guard or by a reliable digital lock.
- MIS always refers to; Management Information Systems. It is the department that controls the hardware and software that are used in the organization for decision making within an enterprise.
- MIS as a function should be flexible enough to changing environment. Discuss.
MIS should be flexible enough to maximize the efficiency of the working. The efficiency of the system helps in minimizing its degradation. Also, MIS should be flexible to enhance its responsiveness to the environmental changes affecting the enterprise. Responsiveness refers to quickness and swiftness of actions of being proactive in guarding against threats and exploring opportunities. MIS should also be versatile in a way that shows how much an enterprise is ready to respond to the changing environment. It is also essential that the system estimates the capacity to which it can be responsive to these changes.
- The computer hardware consists of;
It is a collection of physical parts of a computer system, which includes the computer case, monitor, keyboard, and mouse. The computer case also has other hardware, which includes; hard drive, video card, motherboard, and drive.
- State and explain five characteristics of GOOD INFORMATION
Good information should be easily accessible to the management of the enterprise.
It should also be reliable or based on a particular objective.
Good information should be accurate to make sure that it will be of help to the intended intentions of the management, such as in critical decision making.
It should be concise. That is, it should be brief and direct to the point.
Finally, good information should be presentable and available to the desired audience promptly.
- Information systems have a capacity to help an organization gain a competitive advantage. Discuss.
An information system can help the enterprise achieve low cost-leadership. This is through attaining the lowest operational cost, thereby making the enterprise to sell its products at a lower price than its competing firms. This helps to achieve a competitive advantage. Information systems also help in product differentiation. The differentiation of the product helps the enterprise to acquire a new market more than its competitors. It also helps the enterprise to achieve focus on a market niche. This ensures that an enterprise narrows the market to make sure it focuses on its market strongholds, thereby gaining a competitive advantage over its customers. Finally, an information system also strengthens customer and supplier intimacy, therefore, gaining the trust and loyalty of the customers.
- A management information system is made up of five major components. Discuss how these components relate to each other.
The five components are; business, processes, people, hardware, and software.
People – these are the users who use the information system to record the day to day business transactions. The users are usually qualified professionals such as accountants, human resource managers. The ICT department usually has the support staff who ensure that the system is running properly. Business Procedures – these are agreed-upon best practices that guide the users and all other components on how to work efficiently. Business procedures are developed by the people i.e., users, consultants, etc. Data – the recorded day to day business transactions. For a bank, data is collected from activities such as deposits, withdrawals. Hardware – hardware is made up of computers, printers, networking devices, etc. The hardware provides the computing power for processing data. It also provides networking and printing capabilities. The hardware speeds up the processing of data into information. Software – these are programs that run on the hardware. The software is broken down into two major categories, namely system software, and applications software. System software refers to the operating system i.e., Windows, Mac OS, and Ubuntu, etc. Applications software refers to specialized software for accomplishing business tasks such as a Payroll program, banking system, point of sale system, etc.