Designing computer based information systems-background, Basic Computer Science

Assignment Help:

DESIGNING COMPUTER BASED INFORMATION SYSTEMS

Background

The role of Management Information Systems (MIS) in an organization can be considered as providing management with required information in right time to help in their decision processes. Information systems are not restricted to any particular functional areas like production, finance, etc. or managerial level. It covers all segments of the company covering all areas. It is also known that additional role of providing required information to external agencies has to be fulfilled.

Information Systems does not necessarily imply usage of computers. However, in today’s context, where computers have become very common, generally information systems and computers go hand in hand.

All organizations have some form of MIS. The data originating daily is captured in some form, manually or using computers, stored and processed to fulfill necessary requirements. The main issue remains whether or not the existing MIS is able to fulfill the information needs within the required time frame and provide analyzed information to managers to arrive at a better decision.

Designing of an information system is not an easy task. Firstly, specific areas where computer application may help need to be identified. For each specific area, thorough understanding of the specific system is required, followed by information needs of managers. Only then any improvements can be conceptualized. This process is popularly known as “Systems Analysis and Design”.

Systems analysis is the process of evaluating and understanding a particular system and its environment. In a way, it will involve studying the inputs to a system, outputs required and the associated processing to convert inputs to desired outputs.

Understanding the existing system is often much more difficult than expected. It requires gathering a lot of information. This will include, interviews with key personnel, study of forms and reports, norms for evaluation and quite often direct observation of production/service processes. This phase involves dealing with human beings, who quite often resist any type of change and hence co-operation to the System Analyst may be rather low.

In the context of computers, the resistance is much more as there is always a fear in the mind of the concerned persons like fear of losing jobs, more control, etc.

Systems analysis is probably the most difficult part in the development of a computer-based system. A System Analyst is expected to have:

  •     Knowledge of information technology
  •     Understanding of management process
  •     Ability of effective communication with different levels.

The Analyst is expected to make a compromise between available technology and current business needs.

After the information has been collected, it is required to pinpoint the weaknesses of the system, if any. The information collected is quite large and it becomes essential to use systematic tools for documentation and analysis. Some of the commonly used tools are:

  •     System Flow Charts
  •     Decision Tables
  •     Grid Charts
  •     Data Flow Diagrams
  •     Warnier Diagrams.


Related Discussions:- Designing computer based information systems-background

Cryptography, Question 1 Consider the one-time pad encryption scheme to en...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the eve

Digitalelectronics, what duality principle and huntington postulates

what duality principle and huntington postulates

What is Load and store the assembly programs?, It would not emerge practica...

It would not emerge practical to type an entire program each time it is required, and to avoid this it is possible to store a program on the disk, with the vast advantage that by b

Magnetic memory, Magnetic Memory:  In the above section we have seen v...

Magnetic Memory:  In the above section we have seen various types of semiconductor RAMs. These high speed semiconductor storage devices (i.e. RAMs) are expensive. So we need s

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

What is fragmentation? explain its significance, Question A What is fragme...

Question A What is fragmentation? Explain its significance Question B Briefly discuss the functions of transport layer Question C What is CIDR? Explain Question D W

Gov problem, "The government is auctioning off oil leases at two sites: 1 a...

"The government is auctioning off oil leases at two sites: 1 and 2. At each site, 100,000 acres of land are to be auctioned. Cliff Ewing, Blake Barnes, and Alexis Pickens are biddi

Assignment 4, Briefly explain all the networking components and devices tha...

Briefly explain all the networking components and devices that are needed to set up a computer network. This is just a brief explanation of devices needed and their reason for usin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd