2 Information Technology and Computers have brought information age. The spread of Internet & relative ease of access made Information Breach easier. Our future is not secure, if our information is not secure. Information Resources need to be guarded, protected and controlled. List the precautionary measures to be considered to prevent cybercrime? Answer: Prevention of cybercrime:
The followings are the precautionary and preventive measures to be taken into consideration: Use passwords to prevent unauthorised use of the business information systems. Also enforce the users to adopt a password which is of certain length, contains special characters, uppercase and lowercase letters by implementing a security. Use a firewall to prevent the employees from accessing risky sites and downloading certain types of files.
3 a. While implementing MIS in any organization change can occur in number of ways. List and explain the steps in the process as suggeste
d by Lewin’s model.
Implementation of the MIS in an organisation is a process where change can occur in a number of ways.
b. Compare between prototype approach and Life Cycle approach
4 There is an information explosion in today’s society. There
are lot of advantages of DBMS like proper maintenance of the data and maintaining security. Explain the process of data transition using diagram and an example of your own. Answer:
MIS is an important resource required to execute the operations of the business unit. Business decision to be taken by the managers depends on the valuable insight from
company’s data through MIS. The formats have been changed but the managers still rely on
these systems to perform their day-to-day activities. MIS managers are in charge of the systems development within the firm.
5 Write short note on a. World wide web b. Voice over IP c. Intranet