0% found this document useful (0 votes)
43 views

Part A

The document discusses data, information, and information systems. It provides examples of raw data collected from various sources like student admission forms, census data, and survey results. It explains how raw data is processed and organized to become meaningful information that can be used for decision making, like student address labels generated from student data or census reports. The document also describes the five key components of an information system as hardware, software, data, procedures, and people. It notes information systems allow for storage, updating, and analysis of large amounts of company data to help identify solutions and keep the company informed. However, implementation costs, job elimination risks, and security breaches are disadvantages to consider.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Part A

The document discusses data, information, and information systems. It provides examples of raw data collected from various sources like student admission forms, census data, and survey results. It explains how raw data is processed and organized to become meaningful information that can be used for decision making, like student address labels generated from student data or census reports. The document also describes the five key components of an information system as hardware, software, data, procedures, and people. It notes information systems allow for storage, updating, and analysis of large amounts of company data to help identify solutions and keep the company informed. However, implementation costs, job elimination risks, and security breaches are disadvantages to consider.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

PART A

(A1)
Data: Information in raw or unorganized form (such as alphabets, numbers, or symbols) that
refer to, or represent, conditions, ideas, or objects. Data is limitless and present everywhere in
the universe. See also information and knowledge.
Data that is accurate and timely, specific and organized for a purpose, presented within a
context that gives it meaning and relevance, and can lead to an increase in understanding and
decrease in uncertainty.
Examples of Data

1) Student Data on Admission Forms


When students get admission in A college. They fill admission form. This form
facts (data of student) like name, fathers name, address of student etc.

2)

contains raw

Data of Citizens

During census, data of all citizens is collected.

3)

Survey Data

Different companies collect data by survey to know the opinion of people about their product.

4)

Students Examination data

In examination data about obtained marks of different subjects for all students is collected.

1 FAUZA SAEED- DHRM05

Information:
Processed data is called information. When raw facts and figures are processed and arranged
in some order then they become information. Information has proper meanings. Information is
useful in decision-making. Actually we process data to convert it into information. Here are some
clear easy to understand differences between data and information.
Information is valuable because it can affect behavior, a decision, or an outcome. For example,
if a manager is told his/her company's net profit decreased in the past month, he/she may use
this information as a reason to cut financial spending for the next month. A piece of information
is considered valueless if, after receiving it, things remain unchanged. For a technical definition
of information see information theory.
Examples of Information:

1)

Student Address Labels

Stored data of students can be used to print address labels of students.

2)

Census Report (Total population, Literacy Rate, Male / Female ratio etc.)

Census data is used to get report/information about total population of a country and literacy
rate etc.

3)

Survey Reports and Results

Survey data is summarized into reports/information to present to management of the company.

2 FAUZA SAEED- DHRM05

(B)
Information Storage and Analysis
At the date of publication, many companies no longer manage their data and
information manually with registers and hard-copy formats. Through the
adoption of information systems, companies can make use of sophisticated
and comprehensive databases that can contain all imaginable pieces of data
about the company. Information systems store, update and even analyze the
information, which the company can then use to pinpoint solutions to current
or future problems. Furthermore, these systems can integrate data from
various sources, inside and outside the company, keeping the company up to
date with internal performance and external opportunities and threats.
Assist With Making Decisions
The long-term success of a company depends upon the adequacy of its
strategic plans. An organizations management team uses information
systems to formulate strategic plans and make decisions for the
organization's longevity and prosperity. The business uses information
systems to evaluate information from all sources, including information from
external references such as Reuters or Bloomberg, which provide information
on the general economy. This analysis of and comparison to market trends
helps organizations analyze the adequacy and quality of their strategic
decisions.
Assist With Business Processes
Information systems aid businesses in developing a larger number of value
added-systems in the company. For example, a company can integrate
information systems with the manufacturing cycle to ensure that the output
it produces complies with the requirements of the various quality
management standards. Adoption of information systems simplifies business
processes and removes unnecessary activities. Information systems add
controls to employee processes, ensuring that only users with the applicable
rights can perform certain tasks. Further, information systems eliminate
repetitive tasks and increase accuracy, allowing employees to concentrate
on more high-level functions. Information systems can also lead to better
project planning and implementation through effective monitoring and
comparison against established criteria.

3 FAUZA SAEED- DHRM05

Considerations

Implementing information systems within an organization can prove to be


costly. Implementation costs include not only installation of the systems but
also employee training sessions. In addition, employees may see the
adoption of information systems as an unwarranted change and, thus, may
resist this change. Resistance to change can hinder business operations and
can cause employee turnover. Companies should have leadership in place to
assess the adequacy of the decision to have an information system and to
guide the company through the transition phase and weigh information
systems cost against the potential benefits.

(C)
The 5 components of INFORMATION SYSTEM :

1.

The term hardware refers to machinery. This category includes


the computer itself, which is often referred to as the central
processing unit (CPU), and all of its support equipment. Among
the support equipment are input and output devices, storage
devices and communications devices.

2.

Software: The term software refers to computer programs and


the manuals (if any) that support them. Computer programs are
machine-readable instructions that direct the circuitry within the
hardware parts of the CBIS to function in ways that produce
useful information from data. Programs are generally stored on
some input / output medium, often a disk or tape.

4 FAUZA SAEED- DHRM05

3.

Data are facts that are used by programs to produce useful


information. Like programs, data are generally stored in
machine-readable form on disk or tape until the computer
needs them.

4.

Procedures are the policies that govern the operation of a


computer system. "Procedures are to people what software is to
hardware" is a common analogy that is used to illustrate the
role of procedures in a CBIS.

5.

Every CBIS needs people if it is to be useful. Often the most


over-looked element of the CBIS are the people, probably the
component that most influence the success or failure of
information systems.

(A2)

5 FAUZA SAEED- DHRM05

(A3)
(A)
Implementation Expenses
Every business must consider startup costs when implementing any type of
information technology system. In addition to the cost of hardware and
software, some technology vendors require businesses to purchase user
licenses for each employee that will be operating the system. Businesses
must examine the cost of training employees in unfamiliar technology.
Although basic information technology systems may be user friendly,
advanced programs still require formal instruction by an expert consultant.
In addition to the startup expenses, information technology systems are
expensive to maintain. Systems malfunction, and when they do, businesses
must engage skilled technicians to troubleshoot and make the necessary
repairs. These expenses present a major disadvantage of information
technology in business, particularly to businesses that are entering the
technology era for the first time.

Job Elimination
Implementing information technology into business operations can save a
great deal of time during the completion of daily tasks. Paperwork is
processed immediately, and financial transactions are automatically
calculated. Although businesses may view this expediency as a boon, there
are untoward effects to such levels of automation.
As technology improves, tasks that were formerly performed by human
employees are now carried out by computer systems. For example,
automated telephone answering systems have replaced live receptionists in
many organizations. This leads to the elimination of jobs and, in some cases,
6 FAUZA SAEED- DHRM05

alienation of clients. Unemployed specialists and once-loyal employees may


have difficulty securing future employment.

Security Breaches
The ability to store information in an electronic database facilitates quicker,
more efficient communication. In the past, an individual would sift through
stacks of paper records to retrieve data. With properly implemented
technology, information can be recovered at the touch of a button.
Although information technology systems allow business to be conducted at
a faster pace, they are not without their flaws. Information technology
systems are vulnerable to security breaches, particularly when they are
accessible via the Internet. If appropriate measures are not in place,
unauthorized individuals may access confidential data. Information may be
altered, permanently destroyed or used for unsavory purposes.

7 FAUZA SAEED- DHRM05

(B)
telecommunication occurs when the exchange of information between two or more
entities (communication) includes the use of technology. Communication technology
uses channels to transmit information (as electrical signals),
telecommunications, because it involves many different technologies.

Early means of communicating over a distance included visual signals, such as


beacons, smoke signals, semaphore telegraphs, signal flags, and optical
heliographs. Other examples of pre-modern long-distance communication included
audio messages such as coded drumbeats, lung-blown horns, and loud whistles.
Modern technologies for long-distance communication usually involve electrical and
electromagnetic technologies, such as telegraph, telephone, and teleprinter,
networks, radio, microwave transmission, fiber optics, and communications
satellites.

A revolution in wireless communication began in the first decade of the 20th


century with the pioneering developments in radio communications by Guglielmo
Marconi, who won the Nobel Prize in Physics in 1909. Other highly notable
pioneering inventors and developers in the field of electrical and electronic
telecommunications include Charles Wheatstone and Samuel Morse (telegraph),
Alexander Graham Bell (telephone), Edwin Armstrong, and Lee de Forest (radio), as
well as Vladimir K. Zworykin, John Logie Baird and Philo Farnsworth (television).

Types of Networks:

8 FAUZA SAEED- DHRM05

There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the
number of computers that are part of the network. Networks can cover anything
from a handful of devices within a single room to millions of devices spread across
the entire globe.

Some of the different networks based on size are:

Personal area network, or PAN


Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which


means they are used for everything from sending files to a printer to accessing the
Internet. Some types of networks, however, serve a very particular purpose. Some
of the different networks based on their main purpose are:

Personal Area Network:


A personal area network, or PAN, is a computer network organized around an
individual person within a single building. This could be inside a small office or
residence. A typical PAN would include one or more computers, telephones,
peripheral devices, video game consoles and other personal entertainment devices.
If multiple individuals use the same network within a residence, the network is
sometimes referred to as a home area network, or HAN. In a very typical setup, a
residence will have a single wired Internet connection connected to a modem. This
modem then provides both wired and wireless connections for multiple devices. The
network is typically managed from a single computer but can be accessed from any
device.

9 FAUZA SAEED- DHRM05

This type of network provides great flexibility. For example, it allows you to:
Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
Upload the photo from your cell phone to your desktop computer.
Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house without having
called it by its name.

Local Area Network:


A local area network, or LAN, consists of a computer network at a single site,
typically an individual office building. A LAN is very useful for sharing resources,
such as data storage and printers. LANs can be built with relatively inexpensive
hardware, such as hubs, network adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can accommodate
thousands of computers. A LAN typically relies mostly on wired connections for
increased speed and security, but wireless connections can also be part of a LAN.
High speed and relatively low cost are the defining characteristics of LANs.
LANs are typically used for single sites where people need to share resources
among themselves but not with the rest of the outside world. Think of an office
building where everybody should be able to access files on a central server or be
able to print a document to one or more central printers. Those tasks should be
easy for everybody working in the same office, but you would not want somebody
just walking outside to be able to send a document to the printer from their cell
phone! If a local area network, or LAN, is entirely wireless, it is referred to as a
wireless local area network, or WLAN.

Metropolitan Area Network:


A metropolitan area network, or MAN, consists of a computer network across an
entire city, college campus or small region. A MAN is larger than a LAN, which is
typically limited to a single building or site. Depending on the configuration, this
type of network can cover an area from several miles to tens of miles. A MAN is
often used to connect several LANs together to form a bigger network. When this
10 FAUZA SAEED- DHRM05

type of network is specifically designed for a college campus, it is sometimes


referred to as a campus area network, or CAN.

Wide Area Network:


A wide area network, or WAN, occupies a very large area, such as an entire country
or the entire world. A WAN can contain multiple smaller networks, such as LANs or
MANs. The Internet is the best-known example of a public WAN.
Private Networks
One of the benefits of networks like PAN and LAN is that they can be kept entirely
private by restricting some communications to the connections within the network.
This means that those communications never go over the Internet.

For example, using a LAN, an employee is able to establish a fast and secure
connection to a company database without encryption since none of the
communications between the employee's computer and the database on the server
leave the LAN. But what happens if the same employee wants to use the database
from a remote location? What you need is a private network.

(A4)
(A)
Need for rapid information. Information is the key for decision making. Right information at the
right time, at the right place and faster. Hotel MIS became a backbone for any hotel business
today. Rapid growth of your hotel business.
A management information system (MIS) provides information that organizations need to
manage themselves efficiently and effectively. Hotel Management involves combination of
various skills like management, marketing, human resource development, and financial
management Use of information technology in hotels for ensuring that all operations, including
accommodation, food and drink and other hotel services run smoothly and effectively.
Point of Sale Systems Communication Systems Human Resources Management Systems
Financial Management Systems
Importance of MIS in Hotels Information Function Significance
Travel Inn Location: Sattur, Dharwad The Hotel has 36 well furnished Deluxe Air conditioned
rooms each one tastefully decorated. Conceived as a hotel management brand that lends its
brand equity The hotel has a record of nearly hundred percent of guests satisfaction The hotel

11 FAUZA SAEED- DHRM05

has gone for implementation of management information system for effective functioning of its
business.
Features of the software
By industry Hotel software Restaurants, lounge bars and cafes By product Hotel ERP &
property management solutions Restaurant management systems
Strategic consulting Business outcome service Internet and mobility Initiatives
Comfortable invoicing Multi-Client-Capability Exceptional flexibility Flexibility Central and/or
local administration Simple and intuitive usability Speedy check-in Easy and comfortable bill
splitting
Software Accounting Payment by debit or credit card Door locking system Other
information
With a good MIS support, the hotel management becomes more efficient, the tracking and
monitoring the functional targets becomes easy

HR:
As technology evolves, so does its impact on strategic human resource planning. Human
resource information systems are electronic systems that compile information in databases to be
easily accessed and analyzed. Some information systems allow automation of processes, such as
payroll tax calculations, while others streamline processes by minimizing the need for manual
data entry and paper records, thus increasing accuracy and efficiency.

(B)
Total Rewards
One HR function that can benefit from the use of human resource
information systems is total rewards, which refers to all components of the
overall compensation model, including salary and benefits. Your companys
HR department can more effectively track and plan for changes to
employees salary, insurance, retirement and other benefits options using an
HRIS. Electronic records keep track of current expenses, and many systems
offer projection models and calculators that can help you analyze the impact

12 FAUZA SAEED- DHRM05

of various changes. This is especially useful when preparing for annual


increases or benefits open enrollment.

Workforce Planning
Human resource information systems keep track of critical employee data
such as demographic information, job titles and Equal Employment
Opportunity Commission identification codes. Storing this information in an
electronic database allows you to analyze it more easily when working on
recruitment strategies, progression planning and affirmative action
programs. HR reps can quickly run reports to determine items such as how
many employees were hired last year, average length of tenure and a
breakdown of the employee population by specified EEOC criteria such as
gender and race.

Training and Development


Small businesses also may look to an HRIS to assist with training and
development initiatives. Depending on the needs of your company, you can
use an HRIS to facilitate the annual performance review process, to allow
employees to sign up for company-sponsored training classes or to build a
talent inventory of what education, experience and training each employee
has. Having this information readily accessible by managers and human
resources representatives is an asset when developing new training
programs or when restructuring departments or positions.

Risk Management
Human resource information systems also minimize risks and potential
liabilities. This is accomplished by keeping electronic records of items such
as employee discipline notices, safety training employees have received,
accident logs and workers compensation claims. This data is analyzed by
the HR department to identify ways to improve workplace conditions, safety
13 FAUZA SAEED- DHRM05

training classes and disciplinary processes to ensure compliance with all


federal and state labor laws.

(A6)

14 FAUZA SAEED- DHRM05

You might also like