Академический Документы
Профессиональный Документы
Культура Документы
Group No- 20
Roll No. from 96 to 101
Prototyping model works very much well in cases whereby all the details of
requirements are not known well in advance. It is majorly a trial-and-error process
which works in an iterative manner. Prototype model is used:
1. In online systems and web interfaces that normally have a high amount of
interaction with end users.
2. When desired system requires having a lot of interaction with end users.
3. When the system feedback is required from end users.
Financials
Inventory
Personnel
Project timelines
Manufacturing
Real estate
Marketing
Raw materials
R&D
The MIS collects the data, stores it, and makes it accessible to managers who want
to analyse the data by running reports.
Running reports that pull together disparate data points is an MIS’ key
contribution. That feature, however, comes with a significant cost. MIS
implementation is an expensive investment that includes the hardware and
software purchases, as well as the integration with existing systems and training of
all employees.
The points given below are important, so far as the difference between information
and knowledge is concerned:
It is the process of finding patterns and correlations within large data sets to
identify relationships between data. Data mining tools allow a business
organization to predict customer behaviour. Data mining tools are used to build
risk models and detect fraud. Data mining is used in market analysis and
management, fraud detection, corporate analysis and risk management.
Comparison between data mining and data warehousing:
MIS(MANAGEMENT DSS(DECISION
PARAMETER
INFORMATION SYSTEM) SUPPORT SYSTEM)
Main stress is on
2. Main stress Main stress is on efficiency.
effectiveness.
3. Type of database
Uses corporate database. Uses special database.
used
It is also to be noted that the programmed decisions are taken at the lowest level
whereas the non-programmed decisions are taken at the highest level of the
organization hierarchy.
Intranets and extranets both provide businesses with a central place to store and
share information that’s critical to business organization and operation such as
project information, documents, group calendars and accounting. Both also
permit users to collaborate more effectively across the company whether it’s
employees in one branch speaking to another or human resources personnel
giving out important information.
The differences between intranet and extranet are more subtle to an average user.
An intranet is only accessible through an in-house server – in other words, an
employee has to be onsite to gain access to the company intranet. An extranet is
accessible to employees or other authorized users anywhere in the world as long
as they have a user ID and password or another secure method to access the
intranet portal. Extranet users usually access the company portal via a virtual
private network (VPN). A VPN creates a secure, encrypted way for the company
and its authorized users to share data even though users are accessing the extranet
from the public internet.
2. External and internal analysis: Once you know what your goals are,
gathering data is vital to your success. Analyse what is happening inside of
your company, outside your company and with the competition. This
information will inform how you proceed and help you make wise choices.
3. Creating strategies: Use your goals and data to come up with a strategy
for meeting your organization's goals. For instance, your strategy for
increasing the sales of home fragrance might involve packaging and more.
Price: When two companies offer comparable products but one company can sell
it at a lower price and still make a profit, they might gain a competitive
advantage. When faced with two nearly identical products, customers are likely to
choose the lower-priced option. For instance, if superstore A and superstore B
sell the same quality paper plates for your next big cookout, customers might
choose to purchase from superstore A, which consistently offers a lower price on
most things.
Differentiation: Sometimes, a company can charge more for a product than their
competition and still get more business, resulting in a competitive advantage.
This is because something about their brand, product or service is more attractive
to their target audience. For instance, iPhones are not the least expensive
smartphones on the market, but the brand is known for being innovative, sleek
and user-friendly, so they have gained a competitive advantage that is hard to
beat.
Ans. B) Computer security vulnerability can harm five kinds of system securities
that include: Reliability, confidentiality, entirety, usability, and undeniableness.
The communications lines: The common threats are tapping, sniffing, message
alteration, theft and fraud and radiation.
The Corporate Servers: The most common threats are hacking, viruses and
worms, theft and fraud, vandalism and denial-of-service attacks.
The Corporate Systems: The most common threats are theft of data, copying
data, alteration of data, hardware failure and software failure.