0% found this document useful (0 votes)
145 views15 pages

System Internal Controls Management Accountants

A management information system (MIS) is a system or process that provides information needed to manage organizations effectively. MIS systems integrate computer systems with organizational aims and objectives. They assist executives and employees in processing information and producing reports for decision making. Some key applications of MIS include strategy support through data analysis and simulations, data processing to save time, and management by objectives tracking. Benefits of MIS include enhanced supply chain management, quick reflexes to market changes, and gaining core competencies. Features to consider when selecting a programming language for an online system include the language's functions, target system, abstractions for data and flow control, expressive power, and syntax and semantics.

Uploaded by

sidansar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views15 pages

System Internal Controls Management Accountants

A management information system (MIS) is a system or process that provides information needed to manage organizations effectively. MIS systems integrate computer systems with organizational aims and objectives. They assist executives and employees in processing information and producing reports for decision making. Some key applications of MIS include strategy support through data analysis and simulations, data processing to save time, and management by objectives tracking. Benefits of MIS include enhanced supply chain management, quick reflexes to market changes, and gaining core competencies. Features to consider when selecting a programming language for an online system include the language's functions, target system, abstractions for data and flow control, expressive power, and syntax and semantics.

Uploaded by

sidansar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 15

A management information system (MIS) is a system or process that provides information

needed to manage organizations effectively [1]. Management information systems are regarded to
be a subset of the overall internal controls procedures in a business, which cover the application
of people, documents, technologies, and procedures used by management accountants to solve
business problems such as costing a product, service or a business-wide strategy.

Definition: Management Information Systems (MIS) is the term given to the discipline focused
on the integration of computer systems with the aims and objectives on an organisation.

The development and management of information technology tools assists executives and the
general workforce in performing any tasks related to the processing of information. MIS and
business systems are especially useful in the collation of business data and the production of
reports to be used as tools for decision making.

Applications of MIS

With computers being as ubiquitous as they are today, there's hardly any large business that does
not rely extensively on their IT systems.

However, there are several specific fields in which MIS has become invaluable.

* Strategy Support

While computers cannot create business strategies by themselves they can assist management in
understanding the effects of their strategies, and help enable effective decision-making.

MIS systems can be used to transform data into information useful for decision making.
Computers can provide financial statements and performance reports to assist in the planning,
monitoring and implementation of strategy.

MIS systems provide a valuable function in that they can collate into coherent reports
unmanageable volumes of data that would otherwise be broadly useless to decision makers. By
studying these reports decision-makers can identify patterns and trends that would have remained
unseen if the raw data were consulted manually.

MIS systems can also use these raw data to run simulations – hypothetical scenarios that answer
a range of ‘what if’ questions regarding alterations in strategy. For instance, MIS systems can
provide predictions about the effect on sales that an alteration in price would have on a product.
These Decision Support Systems (DSS) enable more informed decision making within an
enterprise than would be possible without MIS systems.

* Data Processing

Not only do MIS systems allow for the collation of vast amounts of business data, but they also
provide a valuable time saving benefit to the workforce. Where in the past business information
had to be manually processed for filing and analysis it can now be entered quickly and easily
onto a computer by a data processor, allowing for faster decision making and quicker reflexes for
the enterprise as a whole.

Management by Objectives

While MIS systems are extremely useful in generating statistical reports and data analysis they
can also be of use as a Management by Objectives (MBO) tool.

MBO is a management process by which managers and subordinates agree upon a series of
objectives for the subordinate to attempt to achieve within a set time frame. Objectives are set
using the SMART ratio: that is, objectives should be Specific, Measurable, Agreed, Realistic and
Time-Specific.

The aim of these objectives is to provide a set of key performance indicators by which an
enterprise can judge the performance of an employee or project. The success of any MBO
objective depends upon the continuous tracking of progress.

In tracking this performance it can be extremely useful to make use of an MIS system. Since all
SMART objectives are by definition measurable they can be tracked through the generation of
management reports to be analysed by decision-makers.

Benefits of MIS

The field of MIS can deliver a great many benefits to enterprises in every industry. Expert
organisations such as the Institute of MIS along with peer reviewed journals such as MIS
Quarterly continue to find and report new ways to use MIS to achieve business objectives.

Core Competencies

Every market leading enterprise will have at least one core competency – that is, a function they
perform better than their competition. By building an exceptional management information
system into the enterprise it is possible to push out ahead of the competition. MIS systems
provide the tools necessary to gain a better understanding of the market as well as a better
understanding of the enterprise itself.

Enhance Supply Chain Management

Improved reporting of business processes leads inevitably to a more streamlined production


process. With better information on the production process comes the ability to improve the
management of the supply chain, including everything from the sourcing of materials to the
manufacturing and distribution of the finished product.

Quick Reflexes

As a corollary to improved supply chain management comes an improved ability to react to


changes in the market. Better MIS systems enable an enterprise to react more quickly to their
environment, enabling them to push out ahead of the competition and produce a better service
and a larger piece of the pie.

Further information about MIS can be found at the Bentley College Journal of MIS and the US
Treasury’s MIS handbook, and an example of an organisational MIS division can be found at the
Department of Social Services for the state of Connecticut

Question
Q.1) what are the features of a language which should be considered for its selection in the
design of a system? Explain your answer with special reference to online systems.

Q.2) what are the hardware requirements to get onto the communication media? What are the
main function of data communication structure?

Q.3) List the five problems which may motivate an organization to move toward the database
approach. Explain the significance of each one to a manager to an organization?

Q.4) Different among Trojans, Worsens, Viruses. Justify that "computer virus is a major treat to
computer security".

Answer

GURMEET,
HERE IS SOME USEFUL MATERIAL.
REGARDS
LEO LINGHAM
=============================
Q.2 What are the features of a language which should be considered for its selection in the
design of a system? Explain your answer with special reference to online systems.

A language is an artificial language designed to express computations that can be performed


by a machine, particularly a computer . Languages can be used to create PROGRAMS that
control the behavior of a machine, to express algorithms precisely, or as a mode of human
communication.
Many languages have some form of written specification of their syntax (form) and semantics
(meaning). Some languages are defined by a specification document. For example, the C
programming language is specified by an ISO Standard. Other languages, such as perl , have a
dominant implementation that is used as a reference.
A language is a notation for writing programs , which are specifications of a computation or
algorithm. Some, but not all, authors restrict the term "programming language" to those
languages that can express all possible algorithms. Traits often considered important for what
constitutes a programming language include:
Function and target: A computer language is a language used to write computer programs ,
which involve a computer performing some kind of computation and possibly control external
devices such as printers,disk drives ,robots, and so on. More generally, language may describe
computation on some, possibly abstract, machine. It is generally accepted that a complete
specification for a programming language includes a description, possibly idealized, of a
machine or processor for that language. In most practical contexts, a programming language
involves a computer; consequently languages are usually defined and studied this way.
Abstractions: Languages usually contain abstractions for defining and manipulating data
structures or controlling the flow of execution. The practical necessity that a language support
adequate abstractions is expressed by the ABSTRACTION PRINCIPLE.
Expressive power: The theory of computation classifies languages by the computations they are
capable of expressing.

The term computer language is sometimes used interchangeably with programming language.
However, the usage of both terms varies among authors, including the exact scope of each. One
usage describes programming languages as a subset of computer languages. In this vein,
languages used in computing that have a different goal than expressing computer programs are
generically designated computer languages. For instance, markup languages are sometimes
referred to as computer languages to emphasize that they are not meant to be used for
programming. Another usage regards programming languages as theoretical constructs for
programming abstract machines, and computer languages as the subset thereof that runs on
physical computers, which have finite hardware resources.
Elements
All programming languages have some primitive building blocks for the description of data and
the processes or transformations applied to them (like the addition of two numbers or the
selection of an item from a collection). These primitives are defined by syntactic and semantic
rules which describe their structure and meaning respectively.
Syntax
A language's surface form is known as its syntax. Most programming languages are purely
textual; they use sequences of text including words, numbers, and punctuation, much like written
natural languages. On the other hand, there are some programming languages which are more
graphical in nature, using visual relationships between symbols to specify a program.
The syntax of a language describes the possible combinations of symbols that form a
syntactically correct program. The meaning given to a combination of symbols is handled by
semantics . Since most languages are textual.
This grammar specifies the following:
an expression is either an atom or a list;
an atom is either a number or a symbol;
a number is an unbroken sequence of one or more decimal digits, optionally preceded by a plus
or minus sign;
a symbol is a letter followed by zero or more of any characters (excluding whitespace); and
a list is a matched pair of parentheses, with zero or more expressions inside it.

Static semantics
The static semantics defines restrictions on the structure of valid texts that are hard or impossible
to express in standard syntactic formalisms. For compiled languages, static semantics essentially
include those semantic rules that can be checked at compile time.
.
Type system
A type system defines how a programming language classifies values and expressions into types,
how it can manipulate those types and how they interact. The goal of a type system is to verify
and usually enforce a certain level of correctness in programs written in that language by
detecting certain incorrect operations. Any decidable type system involves a trade-off: while it
rejects many incorrect programs, it can also prohibit some correct, albeit unusual programs. In
order to bypass this downside, a number of languages have type loopholes, usually unchecked
casts that may be used by the programmer to explicitly allow a normally disallowed operation
between different types. In most typed languages, the type system is used only to type check
programs, but a number of languages, usually functional ones, perform type inference , which
relieves the programmer from writing type annotations.

Typed versus untyped languages


A language is typed if the specification of every operation defines types of data to which the
operation is applicable, with the implication that it is not applicable to other types. For example,
"this text between the quotes" is a string . In most programming languages, dividing a number
by a string has no meaning. Most modern programming languages will therefore reject any
program attempting to perform such an operation. In some languages, the meaningless operation
will be detected when the program is compiled ("static" type checking), and rejected by the
compiler, while in others, it will be detected when the program is run ("dynamic" type checking),
resulting in a runtime exception.

Static versus dynamic typing


In static typing all expressions have their types determined prior to the program being run
(typically at compile-time). For example, 1 and (2+2) are integer expressions; they cannot be
passed to a function that expects a string, or stored in a variable that is defined to hold dates.

DYNAMIC TYPING , also called latent typing, determines the type-safety of operations at
runtime; in other words, types are associated with runtime values rather than textual expressions.
As with type-inferred languages, dynamically typed languages do not require the programmer to
write explicit type annotations on expressions. Among other things, this may permit a single
variable to refer to values of different types at different points in the program execution.
However, type ERRORS cannot be automatically detected until a piece of code is actually
executed, making debugging more difficult.

Weak and strong typing


weak typing allows a value of one type to be treated as another, for example treating a string as
a number.

strong typing prevents the above. An attempt to perform an operation on the wrong type of
value raises an error. Strongly typed languages are often termed type-safe .

Execution semantics
The execution semantics (also known as dynamic semantics) of a language defines how and
when the various constructs of a language should produce a program behavior. There are many
ways of defining execution semantics. Natural language is often used to specify the execution
semantics of languages commonly used in practice.

Core library
Most programming languages have an associated core library(sometimes known as the 'standard
library', especially if it is included as part of the published language standard), which is
conventionally made available by all implementations of the language. Core libraries typically
include definitions for commonly used algorithms, data structures, and mechanisms for input and
output.

Design and implementation


languages share properties with natural languages related to their purpose as vehicles for
communication, having a syntactic form separate from its semantics, and showing language
families of related languages branching one from another. But as artificial constructs, they also
differ in fundamental ways from languages that have evolved through usage. A significant
difference is that a programming language can be fully described and studied in its entirety, since
it has a precise and finite definition. By contrast, natural languages have changing meanings
given by their users in different communities. While constructed languages are also artificial
languages designed from the ground up with a specific purpose, they lack the precise and
complete semantic definition that a programming language has.

Specification
The specification of a programming language is intended to provide a definition that the
language usersand the implementors can use to determine whether the behavior of a program is
correct, given its source code .
Implementation
An implementation of a programming language provides a way to execute that program on one
or more configurations of hardware and software. There are, broadly, two approaches to
programming language implementation: compilation and interpretation . It is generally possible
to implement a language using either technique.

Usage
Thousands of different programming languages have been created, mainly in the computing
field. Programming languages differ from most other forms of human expression in that they
require a greater degree of precision and completeness. When using a natural language to
communicate with other people, human authors and speakers can be ambiguous and make small
errors, and still expect their intent to be understood. However, figuratively speaking, computers
"do exactly what they are told to do", and cannot "understand" what code the programmer
intended to write. The combination of the language definition, a program, and the program's
inputs must fully specify the external behavior that occurs when the program is executed, within
the domain of control of that program.

####################################################################

Q.3 What are the Hardware requirements to get onto the communication media? What are the
main functions of data communication structure?

Hardware Requirements

The hardware requirements for the modules are as follows:


•Catalyst 6500 series switch.
•Cisco 7600 series router.
•252.0 Watts (6.00 A @ 42 V) of available system power
•A Supervisor Engine 2, Supervisor Engine 720, or Supervisor Engine 32—The supervisor
engine can have an MSFC, MSFC2, or MSFC3, but the CMM does not require one for
configuration or operation.
•Supervisor Engine 32—The minimum version for the CMM is 12.4(3) and the recommended
version is 12.4(7a). The minimum version for the Supervisor Engine 32 is 12.2(18)SXF4 and the
recommended version is 12.2(18)SXF4.
•Port adapters—You can install up to three T1, E1, or FXS port adapters into slots 1 through 3
on either base module.
You can install up to four ACT port adapters into either base module. (The internally located slot
4 is reserved for the ACT port adapter.)

Note You cannot mix T1 port adapters with E1 port adapters, but any other combination of port
adapters is supported.
•Module blank filler plate (WS-SVC-CMM-BLANK) for unused port adapter slots.
=======================

MAIN FUNCTIONS

1) Routine collection and dissemination service for time and operation-critical data and products
This service is based on real-time “push” mechanism including multicast and broadcast.
(2) Data Discovery, Access and Retrieval (DAR) service
This service is based on request/reply “pull” mechanism with sophisticated data management and
standardization.
(3) Timely delivery service for data and products
This service is based on delayed mode “push” mechanism with trigger functions such as
scheduling by time-table and monitoring the accumulation amount of required data.
Table 1 Required characteristics of WIS services

(1) Routine collection and dissemination service (2) DAR service (3) Timely delivery service

Main use WWW operation


Operation of other WMO and related international programmes Research use
Exploring new data for operation
Verification of NWP models Research use
Monitoring and statistic programmes
participants NMHSs
Organizations authorized as NC and DCPC (Non-NMHSs) NMHSs
Organizations authorized as NC and DCPC (Non- NMHSs)
WIS individual users (persons and institutions) NMHSs
Organizations authorized as NC and DCPC (Non- NMHSs)
WIS individual users (persons and institutions)
Timeliness Severe real-time (e.g. global exchange within 1 min) Human tolerable level (e.g.
portal initial response within a few minutes) Dependent on specific user requirement (e.g.
delivery within 5-10 minutes)
Traffic predictability Predictable by analysis of requirements Unpredictable except statistic
prediction by monitoring Predictable by analysis of requirements
Reliability Extremely required (e.g. coordinated backup scheme for 24x7 no-interruption)
Generally required (e.g. short or partial service suspension is allowable) Required (e.g.
alternative remedy for recovery )
Security Indispensable (introducing security measures in every aspect) Indispensable (data
integrity, preventing attack of denial of service) Indispensable (data integrity)

From the functional view, the WIS comprises three major components, i.e. National Centres
(NC), Data Collection or Product Centres (DCPC) and Global Information System Centres
(GISC). The components are linked together by the WIS data communication network.
At the fifth meeting of the Inter-Programme Task Team on Future WMO Information Systems in
2003, the roles of the components were summarized as Table 2. The table shows that the
fundamental services are realized by combination of all WIS components.
There is apprehension about inheritance of the GTS deficiencies as follows:
The WIS functional structure (i.e. GISC-DCPC-NC) is similar to the GTS one (i.e. WMC-RTH-
NMC or RTH on MTN-RTH not on MTN-NMC) in hierarchical design principle;
Thus the WIS may inherit the deficiencies of the current GTS such as garbling bulletins,
imperfect dissemination of global exchange data, undesirable message loop and serious delay.
However it should be clarified that the current GTS deficiencies are caused by not hierarchical
design but defects of implementation and operation. The WIS functional structure is appropriate
to map the WIS components through a smooth evolution from the current components.

Table 2 Roles of WIS components

NC Collect observational data from within their country [S-1]


Provide observations and products intended for global dissemination to their responsible GISC
(possibly via a DCPC) [S-1, S-3]
Provide observations and products intended for regional or specialised distribution to the
responsible DCPC [S-1, S-3]
Collect, generate and disseminate products for national use [S-1, S-3]
Participate in monitoring the performance of the system [S-1, S-2 ,S-3]
Authorize their national users to access WIS, as required [S-1, S-2 ,S-3]
DCPC Collect information intended for dissemination to NCs within its area of responsibility
(i.e. regional collections) [S-1]
Collect special programme-related data and products [S-1]
Produce regional or specialized data and products [RSMC like]
Provide information intended for global exchange to their responsible GISC [S-1, S-3]
Disseminate information not intended for global exchange [S-1, S-3]
Support access to their products via WMO request/reply (”Pull”) mechanisms in an appropriate
manner [S-2]
Describe their products according to an agreed WMO standard and provide access to this
catalogue of products and provide this information as appropriate to other centres, in particular a
GISC [S-2]
Ensure that they have procedures and arrangements in place to provide swift recovery or backup
of their essential services in the event of an outage (due to, for example, fire or a natural disaster)
[S-1, S-2 ,S-3]
Participate in monitoring the performance of the system [S-1, S-2 ,S-3]
GISC Receive observational data and products that are intended for global exchange from NCs
and DCPCs within their area of responsibility, reformat as necessary and aggregate into products
that cover their responsible area [S-1, S-3]
Exchange information intended for global dissemination with other GISCs [S-1, S-3]
Disseminate, within its area of responsibility, the entire set of data and products agreed by WMO
for routine global exchange (this dissemination can be via any combination of the Internet,
satellite, multicasting, etc. as appropriate to meet the needs of Members that require its products)
[S-1, S-3]]
Hold the entire set of data and products agreed by WMO for routine global exchange for at least
24 hours and make it available via WMO request/reply (”Pull”) mechanisms [S-1,S-2]
Maintain, in accordance to the WMO standards, a catalogue of all data and products for global
exchange and provide access to this catalogue to locate the relevant centre
Provide around-the-clock connectivity to the public and private networks at a bandwidth that is
sufficient to meet its global and regional responsibilities. [S-1, S-2 ,S-3]
Ensure that they have procedures and arrangements in place to provide swift recovery or backup
of their essential services in the event of an outage (due to, for example, fire or a natural disaster)
[S-1, S-2 ,S-3]
Participate in monitoring the performance of the system, including monitoring the collection and
distribution of data and products intended for global exchange [S-1, S-2 ,S-3]
Where;
S-1 : Routine collection and dissemination service
S-2 : Data Discovery, Access and Retrieval (DAR) service
S-3 : Timely delivery service
Information : various kind of data, products and their metadata catalogue

It is slightly more complicate. Basically, a client posts n (n=1, 2, 3, .... or more) requests into a
buffer of the local client machine and is immediately released (non-blocking/asynchronous) for
processing other user requests. Socket stack sends all of requests to a buffer of a remote server at
a proper time, and later a server application uses the data inside the buffer to process all of
requests by distributing/assigning all of requests into different threads/queues. All of
threads/queues processes their assigned requests independently and in parallel. Whenever a
request is finished, the returned result is posted into a buffer of the server machine. Once the
buffer collects an enough number of binary data or at a specific time frame, the server socket
sends the buffer containing multiple returned results using one full packet back to the client. The
client is automatically singled when the returned results arrives at the client machine, and
retrieves returned results. As you can see with pattern 2, if the network is considered as a water
channel, the requests are continuously flowed to a server through one channel, the multiple
requests are processed in parallel, and returned results are continuously flowed back to a client
through the other channel. Sending and processing could happens concurrently at client and
server sides if multiple requests are available.

Efficient data movement over network:

In average, a client call just sends about a binary data with size of 50 bytes to a server for a
request, and gets a returned binary result with size of 50 bytes too. On an Ethernet network, the
MTU (Maximum Transmission Unit) for TCP is 1460 bytes. If the pattern 1 is used with your
applications, each of round trip can't fully use one data packet. The net efficiency, which is
calculated from the size of transferred binary data divided by MTU, is less than 0.035, and most
of packet is empty and wasted. The efficiency is just too low, and far way from 1! As you can
see, if your server supports many clients, such a low net work efficiency will kill the whole
network system. However, if your applications use pattern 2, the situation could be different. If a
client sends multiple requests to a server,or your code is able to coalesce all of requests into a big
one with one full package (1460), and the server assigns multiples requests into different
threads/queues for processing. If all of requests are not lengthy actions, all of returned results can
be also sent back to the client with one full package. The client sending, server processing and
server sending could be happens at the same time and in parallel if enough requests originates
from a client. As you can see, the net efficiency can be a data between 1 and 0.035 with pattern
2. The more requests from a client, the higher the net efficiency with pattern 2.

Client graphic user interfaces never frozen:

Unlike in-process and in-machine calls, cross machine calls are much slower. The time of a
round trip is 2.5 ms at the best for most of net hardware. Usually, it is around 30 ms per call. If
your client has to send 30 calls to a server continuously, your client user interfaces could be
frozen and be dead for about one second. If a request is a lengthy action, the server has to spend
a long time to process. For example, your server application starts a MTS object, which typically
costs you 2 seconds or more. Many more examples can be given with authentication, database
accessing, email accessing, and others. As you can see, if you use the pattern 1 for moving data
over internet, your client application runs badly. In order to solve this problem, you must design
your project very carefully so that the number of round-trips must be minimized. If not, your
whole network system runs slow if many client applications are connected to the server
application. If your applications use the pattern 1, in many cases you must use threads to do
background work and send requests to a server for processing in order to prevent graphic user
interfaces from being frozen. It is a common way to do so with all of painful thread problems
such as data synchronization, dead lock, and messy in coding logical. If your client applications
have too many threads, these problems will certainly hurt you when an application becomes
large and complicate. Right? In comparison to the pattern 1, Pattern 2 releases a client
application immediately after the client posts a set of requests into a local buffer of the client
machine. All of graphic user interfaces functions immediately and correctly because the pattern 2
uses non-blocking mode. There are no stay-still and waiting between a sending and a returning.
The client application just picks up an event sent from a client socket if one or a set of returned
results arrive in the buffer of the client machine. This feature is actually very important for your
client application development. You don't have to use threads now. Actually, there is no
necessity at all to use a threads for data communication over network if your application uses the
pattern 2. As you can imagine, all of threads problems are avoided. The end result dramatically
reduces the complexity of your client codes, data synchronization and dead lock etc.

Coding logic

Pattern 1 is better in coding logical sometimes, but not always. If your client applications are not
windows, pattern 1 will give your better coding logical. However, if your clients are window
applications, pattern 2 is more proper to you because pattern 2 is naturally in accordance with
window events.

##############################################

Q.4 List the five problems which may motivate an organization to move toward the database
approach. Explain the significance of each one to a manager to an organization.

Basic Principles to Remember


1. Motivating employees starts with motivating yourself
It's amazing how, if you hate your job, it seems like everyone else does, too. If you are very
stressed out, it seems like everyone else is, too. Enthusiasm is contagious. If you're enthusiastic
about your job, it's much easier for others to be, too. Also, if you're doing a good job of taking
care of yourself and your own job, you'll have much clearer perspective on how others are doing
in theirs.
A great place to start learning about motivation is to start understanding your own motivations.
The key to helping to motivate your employees is to understand what motivates them. So what
motivates you? Consider, for example, time with family, recognition, a job well done, service,
learning, etc. How is your job configured to support your own motivations? What can you do to
better motivate yourself?
-----------------------------------------------------------------------------
THE MANAGER SHOULD THINK AND START A DATABASE
OF INFORMATIONS, WHICH WOULD HELP TO DESIGN
MOTIVATION PROGRAM.
------------------------------------------------------------------------------
2. Always work to align goals of the organization with goals of employees
As mentioned above, employees can be all fired up about their work and be working very hard.
However, if the results of their work don't contribute to the goals of the organization, then the
organization is not any better off than if the employees were sitting on their hands -- maybe
worse off! Therefore, it's critical that managers and supervisors know what they want from their
employees. These preferences should be worded in terms of goals for the organization.
Identifying the goals for the organization is usually done during strategic planning. Whatever
steps you take to support the motivation of your employees (various steps are suggested below),
ensure that employees have strong input to identifying their goals and that these goals are aligned
with goals of the organization. (Goals should be worded to be "SMARTER". More about this
later on below.)
-----------------------------------------------------------------------------
THE MANAGER SHOULD SET UP THE DATABASE
-corporate goals/ objectives.
-set up the standards for performance.
-set up the key performance indicators.
-align the kpi with the corporate goals.
-use it for the performance appraisal.
-------------------------------------------------------------------------------
3. Key to supporting the motivation of your employees is understanding what motivates each of
them
Each person is motivated by different things. Whatever steps you take to support the motivation
of your employees, they should first include finding out what it is that really motivates each of
your employees. You can find this out by asking them, listening to them and observing them.
------------------------------------------------------------------------
THE MANAGER SHOULD USE THE DATABASE
-to evaluate staff performance performance.
-update the performance data monthly.
------------------------------------------------------------------
4. Recognize that supporting employee motivation is a process, not a task
Organizations change all the time, as do people. Indeed, it is an ongoing process to sustain an
environment where each employee can strongly motivate themselves. If you look at sustaining
employee motivation as an ongoing process, then you'll be much more fulfilled and motivated
yourself.
------------------------------------------------------------
THE MANAGER SHOULD USE THE DATABASE
-to set up performance management system.
-to set up individual development system.
-----------------------------------------------------------------------
5. Support employee motivation by using organizational systems (for example, policies and
procedures) -- don't just count on good intentions
Don't just count on cultivating strong interpersonal relationships with employees to help
motivate them. The nature of these relationships can change greatly, for example, during times of
stress. Instead, use reliable and comprehensive systems in the workplace to help motivate
employees. For example, establish compensation systems, employee performance systems,
organizational policies and procedures, etc., to support employee motivation. Also, establishing
various systems and structures helps ensure clear understanding and equitable treatment of
employees.
-----------------------------------------------------------
THE MANAGER SHOULD USE THE DATABASE
-to set up the performance review system/ policies/procedures.
-to set up a performance recognition system.
-to set up the performance rewards system.
=======================================
###############################################
Q.5 Different among Trojans, Worsens and Viruses. Justify that “Computer Virus is a major
treat to computer security.”

A Trojan , is non-self-replicating malware that appears to perform a desirable function for the
user but instead facilitates unauthorized access to the user's computer system.

Purpose and operation


Trojan are designed to allow a hacker remote access to a target computer system. Once a Trojan
has been installed on a target computer system, it is possible for a hacker to access it remotely
and perform various operations. The operations that a hacker can perform are limited by user
privileges on the target computer system and the design of the Trojan .
Operations that could be performed by a hacker on a target computer system include:
Use of the machine as part of a botnet.
DATA THEFT(e.g. passwords, credit card information, etc.)
Installation of software (including other malware)
DOWNLOADING OR UPLOADING of files
Modification or DELETION OF FILES
Wasting computer storage space
ETC ETC
A trojan differs from a virus in that only a file specifically designed to carry it can do so.
===========
WORSENS
IS the damaging the process of recording video, as well as at its transmitting and transfer to
various carriers, different kinds of noise worsening the quality of video image can appear on the
tape.

===========
A computer virus is a computer program that can copy itself and infect a computer. A true
virus can only spread from one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet, or carried it on a
removable medium such as a disk or cd etc.Viruses can increase their chances of spreading to
other computers by infecting files on a network file system or a file system that is accessed by
another computer.

=========================
VIRUSES ARE A THREAT TO THE COMPUTER.

Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a
virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet
program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other
programs) or wreak havoc.
E-mail viruses - An e-mail virus travels as an attachment to e-mail messages , and usually
replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address
book. Some e-mail viruses don't even require a double-click -- they launch when you view the
infected message in the preview pane of your e-mail software .
Trojan - A Trojan is simply a computer program. The program claims to do one thing (it may
claim to be a game) but instead does damage when you run it . Trojan have no way to replicate
automatically.

Worms - A worm is a small piece of software that uses computer networks and security holes to
replicate itself. A copy of the worm scans the network for another machine that has a specific
security hole. It copies itself to the new machine using the security hole, and then starts
replicating from there, as well.

You might also like