wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Article on different management system

profile
Bhavika Barvadia
Aug 21, 2022
0 Likes
0 Discussions
142 Reads

A management information system is an advanced system to manage a company’s or an institution’s information system. it is a computerized database to organize and program in such a way so that it generates methodical reports for each level of a company.

Reports for some special events can easily be obtained from the management information system. in simple words, the Management information system or MIS provides feedbacks to managers themselves about their performances. With the help of this system, top management can supervise the whole company.

This system compares the “actual” results with the planned results and also with the results of last year. In this way, it is helpful to measure the progress of the company compared to last year’s performance and targeted goal. Management information system collects data from different units of the company and functions.

 

However, some data is collected on its own through connected computer counters and remailing data entered into the system periodically. Reports are generated on intervals and can also be obtained on-demand using built-in query language.

Advantages of using management information system.

i) Provides an inclusive picture of an organization.

 

ii) MIS enhance the operational productivity of an organization.


Comments ()


Sign in

Read Next

How GIS in Agriculture Eliminates Guesswork

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Business Intelligence v/s Big Data

Blog banner

E-Cash (Electronic Cash)

Blog banner

Processing Crime and Incident Scenes

Blog banner

Objectives and Functions of Operating System

Blog banner

Memory Management

Blog banner

Embedded Operating System

Blog banner

Vulnerability Assessment

Blog banner

MEMORY HIERARCHY

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Deadlock

Blog banner

Note Taker App

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

S-Tool : Steganography

Blog banner

APACHE KAFKA

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Virtual memory

Blog banner

RAID

Blog banner

Starvation

Blog banner

Indian Culture and Tradition

Blog banner

Mumbai famous street food

Blog banner

Uber

Blog banner

Emerging threats in cyber Forensics

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Dos (Denial of service) Attack

Blog banner

Deadlocks

Blog banner

Deadlocks in operating system

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

RAID

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

ahh wait a min

Blog banner

INTRANET

Blog banner

LISP - Library Management System

Blog banner

Operating system

Blog banner

Data Structures

Blog banner

Why we should do reading

Blog banner

Virtual machine.

Blog banner