System maintenance operations, Management Information Sys

System Maintenance Operations

System maintenance is concerned with keeping the hardware and software working. This .involves the following operations: 20 Information System and Networks  

  1. Monitoring the quality and integrity of databases  
  2. Dealing with any malfunctioning such as faulty workstations 
  3. Ensuring that adequate back-ups of files are kept 
  4. Implementing of upgrades of software and hardware 
  5. Having liaison with hardware and software suppliers. 

User support is concerned with ensuring that users know how to make the most optimum use of the system, and providing necessary training to the users of the system. Also, user documentation and help-desk facilities form important user support tools. Security is one of the important considerations for the proper and continued functioning of an information system. 

Loss of security may originate in accidental and deliberate threats. Accidental threats arise due to poor system features like overloading, or software bugs. Deliberate threats arise from human intent, and include theft, computer fraud, vandalism and other attempts to break the system. Such threats may lead to: 

  1. The interruption of data preparation and data input, 
  2. The destruction or corruption of stored data,
  3. The destruction or corruption of software, 
  4. The disclosure of proprietary information, 
  5. Injury to system personnel, 
  6. The removal of equipment or information. 

In order to prevent security threats, .the organisation should have a carefully formulated security policy. It is also essential that each one of the staff members associated with the system acknowledge their responsibility for security.  

Posted Date: 10/24/2012 3:41:54 AM | Location : United States







Related Discussions:- System maintenance operations, Assignment Help, Ask Question on System maintenance operations, Get Answer, Expert's Help, System maintenance operations Discussions

Write discussion on System maintenance operations
Your posts are moderated
Related Questions
(a) A body is subjected to the two Harmonic motions as x 1 = 15 sin(cot + π/6), x 2 = 8 cos(cot + π/3) What extra motion could be given to the body to bring it to the stati

Question 1: i. What do you meant by an information system? ii. Distinguish between a computer, an information system and a computer program. iii. What is the differenc

QUESTION (a) Who is a ‘whistle blower'? (b) What are the conditions for an invention to be ‘patentable'? (c) Can a patent obtained in Mauritius be enforced in another cou

Question 1: (a) How an appropriate telecommunications infrastructure help better exploit Information Systems within and outside an organisations? (b) How can information sys

what are the challenges and opportunities of mis

WHAT ARE THE STEP REQUIRED TO BUILD A NEW INFORMATION SYSTEM FOR A TYPICAL BUSINESS FUNCTION IN YOUR ORGANIZATION. DESCRIBED ANY ALTERNATIVE METHOD IF ANY CARRYING OUT THIS ACTIVIT

Question 1: A bank is in the process of reviewing its IT Systems. It currently hosts a number of legacy systems which supports different aspects of its business functions namel

Question: ‘E-government should lead to a new and transformed relationship between the government and citizens enabled by computer networks'. (i) Show the benefits which e-go

SAHARA used utility-based resource allocation for demand-driven load sharing across provider resources. Critically discuss how utility based resource allocation operates in wireles

QUESTION As virtually every aspect of society becomes increasingly dependent on information and communications technology, our vulnerability to attacks on this technology incre