Podcast
Questions and Answers
What is the purpose of ensuring complete data of all the transaction?
What is the purpose of ensuring complete data of all the transaction?
To achieve integrity of data with respect to the time period
Why is it important to have valid transaction and input data?
Why is it important to have valid transaction and input data?
To ensure the validity of data and to assure valid information
What does accuracy and precision in the context of quality parameters assure?
What does accuracy and precision in the context of quality parameters assure?
That the results are accurate and precisely correct based on rule, act or law using complete data
Why should information be relevant to the user for decision making?
Why should information be relevant to the user for decision making?
What is the significance of timely information?
What is the significance of timely information?
How does incomplete information affect decision making?
How does incomplete information affect decision making?
What is the purpose of conducting system audit from time to time?
What is the purpose of conducting system audit from time to time?
What are the two measures of quality mentioned in the text?
What are the two measures of quality mentioned in the text?
What is the basis for the MIS organization for handling the MIS function and management alternatives?
What is the basis for the MIS organization for handling the MIS function and management alternatives?
What are the major issues involved in the organization of the MIS?
What are the major issues involved in the organization of the MIS?
What are the factors of success and failures of MIS discussed in the text?
What are the factors of success and failures of MIS discussed in the text?
What is the role of intermediate processing checks in data processing?
What is the role of intermediate processing checks in data processing?
Why is due attention given to the proper file selection in data processing?
Why is due attention given to the proper file selection in data processing?
Why are system modifications approved by following a set procedure?
Why are system modifications approved by following a set procedure?
What is the role of access control in computer system processing?
What is the role of access control in computer system processing?
Why is the assurance of quality considered a continuing function?
Why is the assurance of quality considered a continuing function?
Complete data of all the transaction ensures ______ of data with respect to the time period
Complete data of all the transaction ensures ______ of data with respect to the time period
Valid transaction and input data ensures the ______ of data and in turn, assures valid information
Valid transaction and input data ensures the ______ of data and in turn, assures valid information
Accuracy and precision assures that the results are accurate and precisely correct based on ______, act or law using complete data
Accuracy and precision assures that the results are accurate and precisely correct based on ______, act or law using complete data
Relevance to the user - It should be relevant to the user for ______ making
Relevance to the user - It should be relevant to the user for ______ making
Timely information - If the information is received late, it becomes ______
Timely information - If the information is received late, it becomes ______
Meaningful and complete information - Incomplete information forces the user to infer or interpret erroneously leading to a ______ decision
Meaningful and complete information - Incomplete information forces the user to infer or interpret erroneously leading to a ______ decision
All updating and corrections are completed before the data processing begins. 3. Inputs (transactions, documents, fields and records) are subjected to ______ checks.
All updating and corrections are completed before the data processing begins. 3. Inputs (transactions, documents, fields and records) are subjected to ______ checks.
The access to the data files is protected and secured through an ______ scheme.
The access to the data files is protected and secured through an ______ scheme.
Intermediate processing checks are introduced to ensure that the complete data is processed right through, i.e., run to run ______.
Intermediate processing checks are introduced to ensure that the complete data is processed right through, i.e., run to run ______.
Due attention is given to the proper file selection in terms of data, periods and ______.
Due attention is given to the proper file selection in terms of data, periods and ______.
Back-up of the data and files are taken to safeguard corruption or loss of ______.
Back-up of the data and files are taken to safeguard corruption or loss of ______.
The system audit is conducted from time to time to ensure that the computer system specifications are not ______.
The system audit is conducted from time to time to ensure that the computer system specifications are not ______.
The system modifications are approved by following a set procedure which begins with ______ of a change to its implementation followed by an audit.
The system modifications are approved by following a set procedure which begins with ______ of a change to its implementation followed by an audit.
Computer system processing is controlled through program control, process control and ______ control.
Computer system processing is controlled through program control, process control and ______ control.
The assurance of quality is a continuing function and needs to be evolved over a period and requires to be ______ properly.
The assurance of quality is a continuing function and needs to be evolved over a period and requires to be ______ properly.
Utility of information and its relevance are the two other measures of ______.
Utility of information and its relevance are the two other measures of ______.