Escolar Documentos
Profissional Documentos
Cultura Documentos
should include various financial, statistical and background information for both
the internal operations and external influences of the organisation.
1. PRE-PLAN POSITON
4. STRATEGIC
EVALUATION
2. STRATEGY
FORMULATION
3. STRATEGIC
FORMULATION
Business Plan
MIS Plan
Ans.) Weve probably heard the adage information is power, and that is certainly
true when it comes to cybercrime. Access to your personal information is what gives
hackers the power to tap into your accounts and steal your money or your identity. But
the right information can also empower you to protect yourself from being caught up in
the thriving industry that is cybercrime.
With that in mind, here are following measures we can take to avoid becoming a victim
of cybercrime.
MEASURES TO PREVENT CYBER CRIME
1) EDUCATION: Hackers arent the only ones who can gain power from information.
By educating yourself about the types of scams that exist on the Internet and how to
avert them, you are putting yourself one step ahead of the cybercriminals.
Since phishing is prevalent, read up on the latest phishing scams and learn how to
recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you
into revealing personal information by pretending to be a legitimate organization or
person. These scams often play off major new stories, so keep informed on the latest
news-related scams.
2) USE A FIREWALL: Firewalls monitor traffic between your computer or network
and the Internet and serve as a great first line of defence when it comes to keeping
intruders out. Make sure to use the firewall that comes with your security software. And
if you have a home wireless network, enable the firewall that comes with your router.
3) CLICK WITH CAUTION: When youre checking your email or chatting over
instant messenger (IM), be careful not to click on any links in messages from people you
dont know. The link could take you to a fake website that asks for your private
information, such as user names and passwords, or it could download malware onto
your computer.
4) PRACTICE SAFE SURFING: When navigating the web, you need to take
precautions to avoid phony websites that ask for your personal information and pages
that contain malware. Use a search engine to help you navigate to the correct web
address since it will correct misspellings.
5) PRACTICE SAFE SHOPPING: In addition to practicing safe surfing, you also need
to be careful where you shop online. Be cautious when shopping at a site that youve
never visited before and do a little investigation before you enter your payment
information.
Q.3) a.) While implementing MIS in any organization change can occur in number of
ways. List and explain the steps in the process as suggested by Lewins model.
b.) Compare between prototype approach and Life Cycle approach.
Ans.) a.) KURT LEWINS CHANGE THEORY
Kurt Lewins change theory and Lewins three step model is very much a significant
part of change management strategies for managing change in the work place in the 21st
century. This change management model was developed during the 1940s and the
concept if Unfreezing-Transition-Freezing still remains very relevant today.
KURT LEWINS 3 PHASES CHANGE MANAGEMENT MODEL
Kurt lewins change management model is a fantastic change model for understanding
the basic concepts of a straight-forward change management process.
UNFREEZE
TRANSITION
FREEZE
PROTOTYPE APPROACH
In the above diagram, files are transferred between the client and server over a second
connection, a full duplex connection known as the "data connection." This connection is
between the client's "data transition process" and the server's data transfer process.
Both the client and the server have a protocol interpreter. The protocol interpreters
receive commands or replies, send commands or replies, and govern the data
connection. The server's protocol interpreter listens for a connection from a client's
protocol interpreter.
Q.6) Artificial intelligent system functions like a human being and helps a
manager in taking quick decisions. Explain the different applications AI
using diagram.
Ans.) MEANING OF ARTIFICIAL INTELLIGENCE
It is the science and engineering of making intelligent machines, es- pecially intelligent
computer programs. It is related to the similar task of using computers to understand
human intelligence, but AI does not have to conne itself to methods that are
biologically observable.
DIAGRAM OF ARTIFICIAL INTELLIGENCE
******