Survey of Management Information Systems: A Comprehensive Overview

Survey of Management Information Systems

1. Defining an Office

An office is an organization embedded within a larger entity, serving specific functions and purposes. It processes and reports information according to objectives set by the larger organization.

2. What is Office Automation?

Office automation is the use of computers in the office to support information workers.

3. Integration Levels of the Office

Integration Intranivel (Horizontal)

Applications should not be a single toolset.

Integration Between Levels (Vertical)

Tools must not be isolated from the rest of the company’s computer system.

Human Integration

The tools should be helpful and easy to use.

4. Differences Between Text Editors, Word Processors, and Desktop Publishing

  • Text Editors: Substitute typewriters.
  • Word Processors: Usually WYSIWYG (What You See Is What You Get).
  • Desktop Publishing: Focuses on the end result, opposed to compiled word processors. Differentiates between format and content. The result is not seen until compiled.

5. Why are Microsoft Office Automation Tools Considered WYSIWYG?

Because they allow for text editing, word processing, and desktop publishing with a visual representation of the final output.

6. Basic and Useful Functions of Office Tools

a. Word Processors

Basic Functions:
  • Setting pages
  • Document Management (versions)
  • Subdocuments
Useful Functions:
  • Macros
  • Cross-references (bibliographies)
  • Management Indices

b. Spreadsheets

Basic Functions:
  • Working with different data types
  • Defining formulas of varying complexity
  • External Data
Useful Functions:
  • Representation format
  • Extensive library of predefined functions
  • Export data to different formats

c. Filing Managers

Basic Functions:
  • Versatility in the representation of information
  • Incorporate information from different sources
  • Charts and graphs
  • Tables
Useful Functions:
  • Language tools
  • Macros
  • Adding videos

7. Communication Tools in the Office

Tools that facilitate human interaction in communication:

  • Videoconferencing
  • Calls (VoIP)
  • Chats

8. What is Security?

Security is the discipline that deals with design standards, procedures, methods, and techniques aimed at providing safe and reliable conditions for data processing in computer systems.

9. Three Principles of Computer Security

Confidentiality: Refers to the privacy of the information stored and processed on a computer system.

Integrity: Refers to the validity and consistency of the information stored and processed on a computer system.

Availability: Refers to the continuity of access to the information stored and processed on a computer system.

10. Three Types of Risk Factors

Environment: External factors like rain, floods, earthquakes, storms, lightning, dust, humidity, and heat.

Technology: Hardware and/or software failures, air conditioning failures, electrical service failures, and computer virus attacks.

Human: Theft, forgery, fraud, modification, disclosure, loss, sabotage, vandalism, crackers, hackers, password theft, intrusion, and alteration.

11. What is a Virus?

A computer virus is a program (code) that replicates by inserting a copy of itself into other program(s).

12. Characteristics and Purposes of Computer Viruses

Characteristics:

  • Auto-play: The ability to replicate without user intervention.
  • Infection: The ability to embed itself in other programs.

Purposes:

  • Affect software: Add new files or manipulate existing files.
  • Affect hardware: Manipulate physical components.

13. Classification of Computer Viruses

  • Generic or file virus
  • Mutant virus
  • Recombined virus
  • Bounty Hunter virus
  • Network-specific virus
  • Boot sector virus
  • Macro virus
  • Internet virus

14. What is a Trojan Horse?

Trojan Horses are impostors, files that appear benign but are harmful. Unlike viruses, they do not replicate themselves.

15. What is a Worm?

Worms are programs that replicate themselves from system to system without using a file. They differ from viruses, which require an infected file to spread.

16. Hackers vs. Crackers

Hackers: Individuals with advanced computer expertise who focus on invading systems without authorized access to prove their skills or expose system flaws.

Crackers: Individuals with advanced computer expertise who focus on invading systems without authorized access to destroy the system or gain personal benefits.

17. What is a Security Mechanism?

A computer security mechanism is a technique or tool used to strengthen the confidentiality, integrity, and/or availability of a computer system.

Classification by function:

  • Preventive
  • Detective
  • Corrective

18. Examples of Security Mechanisms

  • Anti-virus software
  • Firewall software
  • Software to synchronize transactions
  • Recovery plans or contingency plans
  • Data Backup

19. Physical Security

Physical security protects all hardware devices (CPU, memory, input/output devices, storage devices) and backups by restricting access to computer areas, printers, and installing security measures like smoke detectors, fire extinguishers, and proper device placement.

20. Security Mechanism for Human Risk Factors

Legal sanctions, such as the Special Law Against Cybercrime.

21. Internal Control in Information Technology

Internal control in IT aims to prevent deviations from the management plan, protect company assets, promote good performance, and ensure the collection of accurate, reliable, and timely information for efficient company operation.

22. Criteria of Successful Systems

  • User satisfaction with the system
  • User-friendly activities within information systems

23. Implementing a System

Implementing a system involves all efforts to implement, manage, and routinize innovation.

24. Four Basic Concepts of Enterprise Computing

  • Portfolio investment in information technology: Capital investment in IT.
  • Information technology infrastructure: Purchase of IT equipment, software, and human resources.
  • Business logic: How the company intends to make money and the business processes defined to achieve it.
  • Information architecture design: Real-world applications, systems, and networks that support key business processes.