System maintenance operations, Management Information Sys

Assignment Help:

System Maintenance Operations

System maintenance is concerned with keeping the hardware and software working. This .involves the following operations: 20 Information System and Networks  

  1. Monitoring the quality and integrity of databases  
  2. Dealing with any malfunctioning such as faulty workstations 
  3. Ensuring that adequate back-ups of files are kept 
  4. Implementing of upgrades of software and hardware 
  5. Having liaison with hardware and software suppliers. 

User support is concerned with ensuring that users know how to make the most optimum use of the system, and providing necessary training to the users of the system. Also, user documentation and help-desk facilities form important user support tools. Security is one of the important considerations for the proper and continued functioning of an information system. 

Loss of security may originate in accidental and deliberate threats. Accidental threats arise due to poor system features like overloading, or software bugs. Deliberate threats arise from human intent, and include theft, computer fraud, vandalism and other attempts to break the system. Such threats may lead to: 

  1. The interruption of data preparation and data input, 
  2. The destruction or corruption of stored data,
  3. The destruction or corruption of software, 
  4. The disclosure of proprietary information, 
  5. Injury to system personnel, 
  6. The removal of equipment or information. 

In order to prevent security threats, .the organisation should have a carefully formulated security policy. It is also essential that each one of the staff members associated with the system acknowledge their responsibility for security.  


Related Discussions:- System maintenance operations

Who is a whistle blower, QUESTION (1) Who is a ‘whistle blower'? Expla...

QUESTION (1) Who is a ‘whistle blower'? Explain the main disadvantage a ‘whistle blower' may face. (2) What are the conditions for an invention to be ‘patentable'? (3) C

Describe the features of a transaction processing system, Question: (a)...

Question: (a) Identify the information needs of managers at the different levels of an organisation and discuss the different types of Information Systems which support those

Types of risks in implementing e-business strategies, Question 1: (i) ...

Question 1: (i) Firms have the support of many e-business applications. Describe, with examples and illustrations, FOUR e-business applications that can be used in a textile f

Economics, unions tie the hands of management and inhibit efficient decisi...

unions tie the hands of management and inhibit efficient decision making

What is the function of a code of ethics for engineers, QUESTION (1) D...

QUESTION (1) Define the following terms Professional ethics Scientific ethic Public accountability (2) What is the function of a Code of Ethics for engineers

National bibliographies, National Bibliographies: Ranganathan defines ...

National Bibliographies: Ranganathan defines the term National Bibliography as "A list of books, periodicals, and of their reprographs published in a country or on the country

Information services in computer environment, CATEGORISATION OF INFORMATION...

CATEGORISATION OF INFORMATION SERVICES IN COMPUTER ENVIRONMENT   Modern libraries and information centres provide a variety of documentation and information services to support

Risks to consider in information technology, QUESTION 1 In the case whe...

QUESTION 1 In the case where information has leaked or a third party has released information or disinformation detrimental to the organisation, then a reactive process must oc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd