0% found this document useful (0 votes)
31 views8 pages

BA 227 Midterm Exam - Tibay, Krismar

Uploaded by

ram tibay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views8 pages

BA 227 Midterm Exam - Tibay, Krismar

Uploaded by

ram tibay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Management Information System

Midterm Examination

By

Krismar D. Tibay

MBA 2-1A-1

An Examination Submitted to the Graduate School in


Partial Fulfillment of the Requirements in the Subject

BA 227 - Management Information System

Professorial Lecturer: Mr. Efren Victor Tolentino Jr.

October 26, 2024


Midterm Examination
1. Selecting a Data Base Management System (DBMS)
In any organization that plans to manage data with efficiency, it is also important to select the
proper Database Management System (DBMS.) This is software, which means it works with
the end user and with the data itself, to input and process data. This software helps keep the
data in an orderly fashion and also allows retention of such data.

Here are some of the important factors when deciding on a particular DBMS:

1. Data Model Compatibility - The type of data model that a DBMS can support comes first.
One can use traditional databases for structured or relational data, whereas non-traditional
databases are the best solution for non-structured or big data use cases with systems. This is
something you would want to consider in terms of your data and what its use cases are like.
2. Scalability – It is another critical factor. When talking about enterprises that expect to grow
within a short period, it becomes essential to have a DBMS that can accommodate the ever-
increasing volume of data and number of users.
3. Performance – Measurements such as speed of querying and throughput of transactions are
very important. High-speed retrieval of data by the use of in-memory databases such as
Redis may work well for systems that need to carry out processing of data in an order of a
few seconds. Assessing your performance requirements can ease the burden of selecting an
appropriate DBMS that also meets the expected criteria for speed and efficiency.
4. Security - The security of data is another important aspect to look at. Encryption and user
access levels, including access control, are very important. To prevent any unauthorized
access or theft of private information stored within their database system, companies that
provide DBMSs have additional security measures installed.
5. Cost - Cost is a factor that cannot be avoided. Free to use of open-source DBMSs that come
with plenty of features without the need to pay for any licenses, making them suitable for
young enterprises and small companies. Enterprise solutions, however, come with a large
cost but also offer many more features and support that could make the cost worth it.

Choosing the appropriate database management system is based on a number of criteria such as
data model fit, scalability, effectiveness, security, and cost which have to be critically analyzed.
Bringing these factors on board and coupled with your organizational goals and objectives,
contributes to sensible and constructive data management.

2. Storing and Retrieving Data


Storage of data is one of the basic requirements in computing. This includes the recording of
information in different formats and mediums. Changes in technology and consumers’ needs
have made it necessary to increase the speed, reliability, and capacity of the stored data.

The two fundamental types of data storage are: Primary and Secondary:

1. Primary or Volatile Memory, which is basically RAM and similar components that hold
temporary data and information for fast access by the system.

1
2. Secondary or Non-volatile memory, for example, hard disk, solid state drives, etc. are the
ones used for secondary media storage and help in keeping information for extended
periods of time. The choice of which of these types to use will however depend on speed,
cost, and data persistence.

The future brings with it such technologies as quantum computers and cloud storage, both of
which seem to alter the conception of data management. Cloud storage is flexible and
affordable while quantum computing, when it realizes its potential, will help in solving a
certain class of complex data retrieval problems in polynomial time which classical computers
strive endlessly to solve within exponential limits. Lastly, saving and accessing information is
very complicated but an important component of today’s computing. The determination of
different storage types, retrieval methods, problems, and appreciation of present and future
improvement in this field have been provided.

3. Network Data Base Model


The network database model is a database model that resolves the issues of defining and
organizing data appropriately with geographical structures in mind. Therefore, the network
model: could simply be said to be the highly improved form of the hierarchical model, which is
bound by structures. Here, all types of relationships between data is supported and thus, the
possibilities of dealing with data stored in binary form in what is called archives improve
greatly and rapidly.

The data in the network model is summarized as records connected to each other through links.
The structure is shown graphically in the form of a graph, where records are the nodes and
relationships among the records are the edges.

The main elements of the network model include:


1. Records: They are similar to the rows of a table and denote the unique data within the
table.
2. Sets: These give meaning to the different record types that can occur in the same structure
without being in one-to-one relationships.
3. Owners and Members: In these organizational structures, there is always one record type
which is the owner of the set, and other record types which are members.

The network database model is highly important in those cases where the data structure is
highly interconnected and where quick access to such data is necessary. While it has some
benefits due to how flexible and cohesive the model is, it also poses some challenges due to its
complexity and low popularity. The knowledge of the planning and elements of the network
model can help us understand the scope of its use, and more importantly, the problems that it
can solve within the context of database management.

4. Data Modeling
The practice of data modeling pertains to the activity of showing and considering a visual
picture of the system or the structure of a certain database in order to classify, outline, and
synchronize individual constituents of information and their interrelations. It is a graphic design

2
for the purpose of the development of databases and applications so that data is organized in a
proper way devoid of inaccuracies, inconsistencies, and inaccessibility.

The process of data modeling entails various elements, some of which include:
1. Entities: These can be considered as objects or concepts with a separate existence within
the system. Examples include customers, goods, and orders.
2. Attributes: These items are the various properties or characteristics of entities.
3. Relations: These state the ways through which entities interact. For example, a single
customer can place many orders, which means that the relationship between the customer
entities and order entities is a one-to-many relationship.
4. Data types: Each attribute is accompanied by a data type and an example would be a
number, string, or date which describes exactly what kind of data it is going to hold.
5. Constraints: These are the restrictions and limitations imposed on the data in order to
maintain its accuracy and reliability.

Data models, on the other hand, have a wide variety of representations which include, but are
not limited to:
1. Conceptual Models: These are general overview representations with diagrams that relate
to different aspects but do not include system technicalities.
2. Logical Models: Contain detailed descriptions of thanks of the data structures, without any
references to their future physical realization.
3. Physical Models: These models give specifications of how the data will be kept in the
Database including structures of the tables, index definitions as well as detail of the
storage.

In summation, data modeling serves a crucial role in data management in an organization as it


ensures that the organization relies on clean and well-structured data for business decisions.

5. Impact of the Internet on the Society


The spread of the Internet and the changes it has brought along to modern life are extensive,
going through every detail including communication, economy, education, and even culture.

Communication
Communication has reached another level due to the integration of the Internet into the
activities of people. Social media including Twitter, Facebook, Instagram, messengers, and
video calling devices have made communication easier across countries. Although this has
created a global village, the worry of intrusion, relationship management issues, and
propaganda has escalated.

Economy
The World Wide Web (WWW) has affected the economy positively in that, it has created room
for online, telecommuting, and business economies. Hence businesses can now operate in any
part of the world and customers have better access to products. Transformation attracts caution
as well in that people lose their traditional jobs to technology in other industries and worries
arise about consumers’ data.

3
Education
The advent of online learning platforms and resources has transformed education by making it
easier for people to take up classes wherever and whenever they want. It has empowered a lot,
however, it has also created a gap in international society, where access to technology in some
situations helps to aggravate inequalities.

Social Issues
The Internet has acted as a catalyst in some social movements, enabling mobilization and
outreach. In the same manner, this phenomenon has also led to the emergence of anti-social
practices such as cyberbullying, hate speech, and division of society.

In conclusion, undoubtedly, the Internet is one of the foundations of modern society, however,
it presents both advantages and disadvantages. Yes, it has made many people and sources
connected and more readily available than ever before, but it has also brought along problems
such as exposure, social inequities, and social relations. It is essential to weigh these pros and
cons as societies progress into the digital scope.

6. Digital Etiquette
The term ‘netiquette’ refers to Digital Etiquette as a broad reference towards respectful
interaction when engaging in any form of online communication. Netiquette helps in creating
and upholding the standards for healthy communication in any environment, especially online.

There are several components of Digital Etiquette:

1. Respectful Communication: As the golden rule suggests, one should treat others as he/she
would love to be treated. This entails politeness, avoiding abusive language, and accepting
varied views without hostility.
2. Positive Engagement: Avoid sending messages and making posts that are unnecessarily
harmful and false. Make your communications positive and honest.
3. Privacy Considerations: It is proper to respect other people’s confidentiality by not
divulging information without their consent. Seeking approval from individuals concerned
before circulating documents deemed personal.

”Digital etiquette” can be described as a collection of rules and behaviors one should observe
when communicating in an electronic format to remain respectful and responsible. This also
meant avoiding cryptic or abusive language, respecting others personally and their space as
well as their time, turning off all unnecessary distractions, especially spam messages and calls,
and acknowledging sources of information among others. Also, it is important to note that
without any physical presence or gestures, a person's voice can easily be misunderstood in
terms of its purpose and importance. Good digital etiquette is critical in ensuring that
individuals effectively interact and participate in online content within a healthy and positive
online space.

4
7. Network of Companies
The term network of companies refers to a set of interconnected firms striving to achieve a
common objective given that they represent different industries. Such a network can take the
form of joint ventures, strategic partnerships, or alliances and may include the exchange of
resources, knowledge, or technology.

Several reasons can be identified for the existence of a network of firms, such as promoting
innovation, expanding the customers’ reach in terms of location, reducing costs, and gaining
competitive advantage. Sufficient resources and capacities of each participant make it possible
to create such networks that facilitate efficiency and performance in the course of. Such
networks can be most effectively used in research and development or market responsiveness
and supply chain management. For example, within information technologies, software
companies may develop certain products jointly. Manufacturers of cars may join efforts to
develop electric vehicle technology. Healthcare providers may exchange information to
enhance health service quality.

8. AI and Machine Learning


Artificial Intelligence (AI) and Machine Learning (ML) can be considered two intertwined
branches of computer science concerned with building apparatuses and systems that can
perform activities that would ordinarily need cognitive skills from human intelligence.

Artificial intelligence (AI) is the theoretical capability of a machine to execute activities that
would otherwise require the intelligence of a human being. This includes activities such as
reasoning and solving complex problems, speech and language comprehension, pattern
recognition, and most importantly, decision-making. AI systems can either function based on
logical rules as in the case of expert systems or they can learn from experience in order to
provide better results than before.

Machine Learning (ML) is a branch of AI research that deals with Machine Learning
algorithms as well as statistical models in order for a computer to be able to perform a task
without explicit commands. In other words, instead of explicit codes being written for certain
issues, the systems and applications learn by themselves and eventually get better at what they
do with increased data.

All in all, the trends of both AI and ML are responsible for the progress of numerous
applications such as language processing, computer visualization, self-driving cars, and
forecasting, all of which impact sectors positively and also improve technology on a day-to-day
basis.

9. Cyber Security
Cyber security refers to the protection of systems, networks, and programs from cyber-crime.
Such attacks are often targeted at gaining access to, modifying, or destroying sensitive
information, making threats to the users (like through ransomware), or interfering with the
business performance of the organization. In general fact, the chief aim of cyber security is to

5
protect information and information systems from all possible threats. This includes the use of
technology, processes, and controls in defending such information systems from unauthorized
access and exploitation.

Importance of Cyber Security


In recent years, cyber threats have grown, starkly in sophistication and complexity, drawing on
advanced techniques such as social engineering, malware, and also, ransomware. The cost of a
cyber security breach is proportionate to the impact of retribution as organizations are likely to
suffer fines, legal costs, and losses in revenue. Organizations are governed by different
regulations, which outline the measures that need to be put in place, to ensure that sensitive
information is safeguarded, thus, it is a boardroom issue.

Some of the Typical Cyber Threats


1. Malware: A software program that is designed with the intention of causing damage to or
gaining unauthorized access to a device, for example, viruses, worms, and ransomware.
2. Phishing: Any form of communication pretending to be some legitimate organization with
the aim of obtaining sensitive information from an individual.
3. Insider Threats: Activities such as sabotage or espionage that compromise security,
especially those carried out by employees of the organization.

Cyber Security may keep your digital devices and information without the fear of any danger,
especially to individuals and organizations. With the growth of technological advancements,
one will need to develop new defense mechanisms against the strategies otherwise one would
be under threat of falling victim to cyber-crimes, hence there is continuous education and
learning because it is important in this profession.

10. Cloud Computing


The term cloud computing encompasses the provision of computing services, which can be
accessed almost on-demand through the internet. It includes a range of services that contains
but is not limited to processing power, storage of data, hosting of databases, virtual networking,
software applications, and analytics. With this technology, users do not have to rely on internal
storage or processing units since they can access such services over the cloud improving
functionality and efficiency.

Several Key Features of Cloud Computing:


1. Self-Service: A user can access the necessary computing resources via the Internet
anywhere, without interfacing personally with the service provider.
2. Broad Network Access: The services are made available in a broad network and are
accessed through the basic operations that enhance the usage of different subnetworks such
as mobile phones, tablets, and laptops.
3. Rapid Elasticity: The resources can be scaled up or down within a very short period of
time in response to the ever-changing requirements and demands thus offering businesses
flexibility.

6
4. Measured Service: Cloud systems automatically control and optimize resource usage at a
level regarding the service provided based on a built-in metering feature.

Advantages of Cloud Computing:


1. Cost Effectiveness: Minimizes large investment on hardware and infrastructure, as
payments are based on what is used.
2. Scalability: Resources can be scaled up or down fast depending on business demands,
making it possible to accommodate growth without heavy physical infrastructure.
3. Geographic Independence: Information and programs can be used from wherever there is
an internet connection, making remote working and teamwork possible.
4. Up-to-date: Users always have access to the newest features and protection because the
cloud service providers install and update any new versions as well as any security fixes of
the software.
5. Business Continuity: Data backup and restoration services are highly available in cloud
computing; thus, it is very possible to lose data and still have it secure and retrievable.

Cloud computing is a computer-based service – inclusive of storage, servers, databases,


networking, software, and analytics – which are provided through the internet known as the
‘cloud’. As opposed to the traditional use of servers and personal computers, such activities
can be carried out by users from anywhere without worrying about where information is stored
or what applications are in use as everything is run on the cloud of the providers. This method
also has its pros such that it is variable, easy to implement, and cost-effective because the
resources can be increased or decreased depending on the demand and only what is consumed
is paid for.

You might also like