Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignent: EA Management Information System

1. A college registrar keeps the registration records on students and their courses to take in the spread sheet with the column headings: LastName, FirstName, Phone, CourseTitle, CourseDate, CourseFee, and AmountPaid.

a. The registrar can keep the records in this way on the spreadsheet, but they will soon find inconveniences in handling the pets information. What kind of problems or issues may occur if they keep recording in this way? Think in terms of data entery, updating data, or deleting data.

b. To avoid the above problems, the registration records may need to be kept in separate "tables" in the Microsoft Access terms. How the tables should be set up to keep the registration information? You can write the table name and its contents such as TableName(fieldname1, fieldname2, etc).

c. For the tables you set up in b, assign or add appropriate primary keys and foreign keys for each table. Some table wouldn't need a foreign key. The primary key should be underlined, and foreign key in italic such as TableName(primarykeyname, fieldname1, fieldname2, foreignkeyname, etc).

[Chapter 7Telecommunications]

2. For the given Figure 7-3, explain how the original message can reach to the destination as follows.

1580_Packet Switched Network.jpg
Figure 7-3 Packet Switched Network

a. Explain why the original message is divided into packets.

b. Describe how the packets can be composed to make the original message.

c. Explain why some packets travel different route on the way to the destination.

d. Some cases, a packet can be lost on the way to the destination. If the destination computer finds a packet is lost, what prototcol will correct situation? How does it recover the lost packet?

[Chapter 8Securing Information System]

3. Describe the processes how the Digital Certificate is working to confirm a person's indentity involved in the financial transaction. How can the digital certificate processes be safe guarded?

[Chapter 11Managing Knowledge]

4. How the Fuzzy Logic for Temparature Control (Figure 11-8) would work better than the ON-OFF switching method in controlling the thermostat?

55_Fuzzy Logic for Temparature Control.jpg
FIGURE 11-8

[Chapter 12Enhancing Decision Making]

[Chapter 13Building Information System]

[Chapter 14Managing Projects]

5. The US Army has planned to develop an intelligent warfighting capability by providing continuous wireless communication capability to update the current battle situtaion and to deliver directions to the warfighters in realtime. In the consideration of its importance, the Army started as a huge sized program that contains numerous projects from tank redesign, communication equipment development, logistics system, to training all at once. The necessary technologies of the combined wireless communications are yet to be developed. Software development was not easy to define.

a. In this case, what kind of problems or risks would arise as the program proceeds?

b. As the whole program is not progressing as expected, the Army determined to cancel the Program. If the program is stopped, all previous efforts might be lost. To salvage the previous works and continuously pursue the development goal, the Army plans to contnue in a much smaller scale project. If you are in the project management team, describe how the team would develop the project management strategies.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92818013

Have any Question?


Related Questions in Management Information System

Your final research paper assignment is to write a research

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen counterme ...

Q you are to analyze the strategic objectives of your

Q: You are to analyze the strategic objectives of your organization and reflect on your contribution towards achieving such objectives. Illustrate your understanding of the organization's marketing strategy, competitive ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

It is an accepted truth that without risk there can be no

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Network security and its impact on risk management is not about not taking risk ...

Instructionsin this final assignment you will develop a

Instructions In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below. Identify the components of an information ...

Question research how a risk assessment methodology process

Question : Research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page (do not count the abstract and reference page). The paper should have Abs ...

Assignment read and use the link racism and discrimination

Assignment Read and use the link Racism and discrimination in health care: Providers and patients Question 1. Are some cultures receiving a lower level of care simply because of their culture? Question 2. What are your t ...

Question 1 how are digital technologies changing family

Question : 1.) How are digital technologies changing family life? 2.) How are digital technologies changing the following social institutions: politics, education, the economy, and religion to make them better and worse? ...

Evaluate performance requirements along with protocols that

Evaluate performance requirements, along with protocols that will allow CloudCrushers to work efficiently for their customers. In addition, using Microsoft® Visio®, begin to design the infrastructure required within the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As