System maintenance operations, Management Information Sys

System Maintenance Operations

System maintenance is concerned with keeping the hardware and software working. This .involves the following operations: 20 Information System and Networks  

  1. Monitoring the quality and integrity of databases  
  2. Dealing with any malfunctioning such as faulty workstations 
  3. Ensuring that adequate back-ups of files are kept 
  4. Implementing of upgrades of software and hardware 
  5. Having liaison with hardware and software suppliers. 

User support is concerned with ensuring that users know how to make the most optimum use of the system, and providing necessary training to the users of the system. Also, user documentation and help-desk facilities form important user support tools. Security is one of the important considerations for the proper and continued functioning of an information system. 

Loss of security may originate in accidental and deliberate threats. Accidental threats arise due to poor system features like overloading, or software bugs. Deliberate threats arise from human intent, and include theft, computer fraud, vandalism and other attempts to break the system. Such threats may lead to: 

  1. The interruption of data preparation and data input, 
  2. The destruction or corruption of stored data,
  3. The destruction or corruption of software, 
  4. The disclosure of proprietary information, 
  5. Injury to system personnel, 
  6. The removal of equipment or information. 

In order to prevent security threats, .the organisation should have a carefully formulated security policy. It is also essential that each one of the staff members associated with the system acknowledge their responsibility for security.  

Posted Date: 10/24/2012 3:41:54 AM | Location : United States







Related Discussions:- System maintenance operations, Assignment Help, Ask Question on System maintenance operations, Get Answer, Expert's Help, System maintenance operations Discussions

Write discussion on System maintenance operations
Your posts are moderated
Related Questions
Question: i) Briefly describe the major ICT infrastructure components. ii) Discuss the tools available to protect from Information Security breaches. iii) Describe the ma

Describe the meaning and Procedure of grievance. Discuss various approaches to grievance resolution. In your opinion which approach is most effective and why? Explain with help of

Information System in Management An attempt has been made in this Unit to explain to you the concept of a system , particularly computer-based Information Storage and Retrieva

Management information   The provision of useful management information is now an important requirement in the efficient and effective running of library and information servic

Current Lists: Current books - those that are published during the year - represent the majority of materials usually acquired by most libraries, although it may not always be

Take two different MISs from the current business world as examples and compare the differences to show how organization to organization MIS differs. Propose a MIS for a company

QUESTION 1 a) Explain what you understand by the following terms i) Enterprise Resource Planning ii) Supply Chain Management Systems Illustrate your answer by means of

Problem: (a) IT will be used to maintain a competitive edge in the market place. Give the five main factors which enable this to happen. You will take an example of your own t


The phrase called information overload may be a bit of a problem because it used so often, but the fact remain that managers & support staff are merged in information of all kinds.