1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
5

Read at least three (3) academically reviewed articles on Management Information Systems and complete the following activities:

(Wikipedia articles will not be accepted. Professor will check originality of all posts).
1. Summarize all three (3) articles in 300 words or more. Please use your own words. No copy-and-paste
2. Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
6 0

Answer:

https://cllax.com/top-5-best-management-information-systems-mis-software.html

This article clearly explains what is MIS. It is not just analyzing. It deals with all the three, and that is storing, searching and analyzing the data. And you are not just going to require the programming skills for working effectively on the MIS, you need the complete knowledge of business, and you need to understand the CRM, SCM and the ERP. You need to understand various designations in business as well as you need to understand the business modules and how all of them are being coupled together no matter to what level they can be coupled. You need to bind them together at the very end. And this can be quite tough if the coupling is high as you might not be able to study the modules separately. And you will be required to study them all together in that case, however, you will have to, and hence some businesses can be tough. Hence, you need to understand which MIS is best for your business. You should understand that all the MIS cannot suit your business, but the good thing is that you will find a long list of MIS available in the market. You will find one for your business, or else you might contact the company to provide you a customized version. Or you can contact Oracle, Microsoft or SAP or any such to make an MIS for your business. However, the top five in common are being listed in this article, and with what, when and why.

https://cllax.com/how-business-intelligence-can-help-your-company.html

Thanks to Krotov, this article helped me revise the basics. Certainly, if you are a small company, you will not require business intelligence software as you have limited data. However, if you are a big company then you need the BI software, and that comes with top MIS, as you need to study the data in detail, to find the information for yourself. And what means a piece of information for you might not be information for the Director. Hence, you need to understand the business levels properly, and then only you will be able to study the MIS, as the developers developing them are being provided the designs developed by the top business analysts, and they have detailed knowledge of the businesses they want to target.

https://cllax.com/top-6-best-router-monitoring-software-for-bandwidth-and-traffic.html

Thanks to Krotov again. Being a future MIS expert, I know I need to be ready to ensure the best level of security for the organization I will be serving. And for that, I regularly read the relevant books, and I do not miss the articles, journals, research papers as well, as I know they provide refined knowledge. And this article gave me an insight related to the router network management, and I was able to revise the details I have related to the Router network management. Krotov has listed the top software for this, and what services they provide. Also, he has briefed why and when we should you these. However, I am further looking for how, and I am not blaming Krotov as he was briefing, and how it does not seems to be like being in the domain of this article in general.

Explanation:

Please check the answer.

You might be interested in
You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal
Novay_Z [31]
A router, possibly. Thought I'm not for sure because I'm not in computers and technology

7 0
3 years ago
Read 2 more answers
Which of the following is the MOST important consideration when planning your budget?
nata0808 [166]
<span>Budget for fixed expenses before flexible expenses.</span>
5 0
3 years ago
Read 2 more answers
Rock, Paper, Scissors is a two-player game in which each player chooses one of three items. If both players choose the same item
mezya [45]

Answer:

The answer is c

Explanation:

7 0
3 years ago
Writing of a program to take two integer and print sum and product of them.
Bas_tet [7]

Answer:

1.)

def two(a, b) :

print(a+b)

print(a*b)

2.)

a = int(input('enter an integer values '))

b = int(input('Enter another integer value' ))

print(a+b)

print(a*b)

3.)

Take side of a square from user and print area and perimeter of it.

def square(a):

area = a**2

perimeter = 4*a

print(area, perimeter)

Explanation:

Code written in python :

The first function named two, takes to arguments a and b ;

The sum of integers a and b is taken and displayed using ; print(a+b)

The product of integers a and b is taken and displayed using ; print(a*b)

2.)

User can enter an input and converted to an integer value using the command ;

int(input()) ; the sum and product of these values are displayed using :

print(a*b) and print(a+b)

The Area and perimeter of a square requires the side length, which is taken as the argument a in the square function defined.

Area of square = a² = a**2

Perimeter = 4 * a

5 0
3 years ago
A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-unde
NNADVOKAT [17]

Answer:

A computer virus

Explanation:

A computer virus is categorized as malicious software that is built just like any other program out there to cause damage, steal, or disrupt a victim’s computer system. They infect systems and networks in various ways. Most are designed to move in stealth and attach themselves to other programs. Others, however, exploit an unpatched vulnerability and propagate themselves into harmful programs. Depending on how they are designed, most viruses insert a copy of themselves, spread rapidly from within files of a computer, and even extend to other computers in a network.

7 0
3 years ago
Other questions:
  • Windows server 2012 r2 includes hyper-v in which edition(s)?
    12·1 answer
  • Hope has now created her sublist. 1. Oxygen a. Helps living things produce energy b. Helps protect living things from harmful ra
    15·1 answer
  • You need to perform maintenance on a router and need to temporarily reroute traffic through another office. which would be the b
    6·1 answer
  • When a number gets assigned to a variable that already has a value __________?
    6·1 answer
  • Which heat transfer can be described as currents of warm air rising and cool air falling
    12·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • A nursing informatics specialist is preparing an in-service program for staff on healthcare informatics and information technolo
    13·1 answer
  • Apex
    5·2 answers
  • Read the introduction (paragraphs 1-3].
    7·1 answer
  • ANSWER QUICKLY!!! <br><br> What is an advantage of digital portfolios?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!