wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Article on different management system

profile
Bhavika Barvadia
Aug 21, 2022
0 Likes
0 Discussions
142 Reads

A management information system is an advanced system to manage a company’s or an institution’s information system. it is a computerized database to organize and program in such a way so that it generates methodical reports for each level of a company.

Reports for some special events can easily be obtained from the management information system. in simple words, the Management information system or MIS provides feedbacks to managers themselves about their performances. With the help of this system, top management can supervise the whole company.

This system compares the “actual” results with the planned results and also with the results of last year. In this way, it is helpful to measure the progress of the company compared to last year’s performance and targeted goal. Management information system collects data from different units of the company and functions.

 

However, some data is collected on its own through connected computer counters and remailing data entered into the system periodically. Reports are generated on intervals and can also be obtained on-demand using built-in query language.

Advantages of using management information system.

i) Provides an inclusive picture of an organization.

 

ii) MIS enhance the operational productivity of an organization.


Comments ()


Sign in

Read Next

MY FIRST BLOG?

Blog banner

A Journey By Train

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

All you need to know about Website Traffic

Blog banner

The most common internet security threats

Blog banner

Decoding Modern Assessment: Why We Look Beyond the Grade Sheet

Blog banner

Deadlock

Blog banner

Heart Fulness Meditation

Blog banner

Life of an army person

Blog banner

Fault Tolerance

Blog banner

Service transistion under difficult conditions

Blog banner

Types of email

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

10 Types of Friends in every friend group

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

The seven-step improvement process

Blog banner

Best password managers: Reviews of the top products

Blog banner

Harsh Rathod

Blog banner

Memory Management Techniques

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Online Education

Blog banner

Android Flashlight Application

Blog banner

PPT methodology

Blog banner

Access management

Blog banner

ASANA- A Management System.

Blog banner

Paging

Blog banner

Deadlock

Blog banner

Health and fitness

Blog banner

About myself

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

SECURITY TOOLS

Blog banner

Getting into anime My anime suggestions

Blog banner

Security issues

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Who decides your overthinking, anyway?

Blog banner

All you need to know about Cassandra

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

How Cyber Forensics use in AI

Blog banner