MICS IMPORTANRT QUESTION FOR JUNE'09

Final 1070 views 4 replies

HI FRIEND'S, FIND CHAPTERWISE IMPORTANT TOPIC FOR JUNE'09 EXAMINATION IN MICS.

Replies (4)

 u havent posted anything...

FINAL-MICS


Lesson 1
  1. Characteristics of information
  2. decomposition/subsystem principles
Lesson 2
  1. Components of TPS
  2. Direct Processing
Lesson 3
  1. Features of a computer based MIS
  2. Programmed & Non programmed decisions
  3. Pre-requisites of MIS
  4. Limitations of MIS
Lesson 4
  1. MRP
  2. Model and its advantages
  3. systems approach to problem solving
Lesson 5
  1. Characteristics of Information used by executives
  2. DSS software tools
  3. DSS examples
Lesson 6
  1. Traditional computing models
  2. Client/Server model
  3. Server centric model
  4. Characteristics of C/S
Lesson 7
  1. Systems development approaches
  2. data dictionary
  3. Fact finding techniques
  4. Costs/Benefits of CBIS
Lesson 8
  1. Designing systems output
  2. systems manual
  3. Data communications design
  4. printed output/visual display output
Lesson 9
  1. Bench marking problem testing
  2. program design tools
  3. advantages of pre-written software
  4. PDLC
Lesson 10
  1. Personal training
  2. Conversion activities
  3. systems evaluation
Lesson 12
  1. Evaluation of ERP
  2. Business engineering
  3. characteristics of ERP
  4. ERP benefits
Lesson 13
  1. OS-Security components
  2. SPLMS
  3. Firewalls
  4. DBMS controls


Lesson 14
  1. Field level interrogation
  2. source document controls
  3. error handling techniques
Lesson 15
  1. Making fraud difficult to perpetrate
  2. Disk imaging and analysis technique
  3. Frauds at input
Lesson 16
  1. Powers of controller
  2. duties of certifying authorities
  3. Powers of central government
Lesson 17
  1. Concurrent audit techniques
  2. Audit framework program development and acquisition
  3. Program analysis
  4. IS audit objectives
Lesson 18
  1. Core principles of information security
  2. example of information security policy statement
  3. types of information protection
Lesson 19
  1. Programming work bench
  2. levels of integration
  3. Meta –CASE workbench
 

Originally posted by :Rupesh Kumar
" HI FRIEND'S, FIND CHAPTERWISE IMPORTANT TOPIC FOR JUNE'09 EXAMINATION IN MICS. "


 

 

FINAL-MICS


Lesson 1
  1. Characteristics of information
  2. decomposition/subsystem principles
Lesson 2
  1. Components of TPS
  2. Direct Processing
Lesson 3
  1. Features of a computer based MIS
  2. Programmed & Non programmed decisions
  3. Pre-requisites of MIS
  4. Limitations of MIS
Lesson 4
  1. MRP
  2. Model and its advantages
  3. systems approach to problem solving
Lesson 5
  1. Characteristics of Information used by executives
  2. DSS software tools
  3. DSS examples
Lesson 6
  1. Traditional computing models
  2. Client/Server model
  3. Server centric model
  4. Characteristics of C/S
Lesson 7
  1. Systems development approaches
  2. data dictionary
  3. Fact finding techniques
  4. Costs/Benefits of CBIS
Lesson 8
  1. Designing systems output
  2. systems manual
  3. Data communications design
  4. printed output/visual display output
Lesson 9
  1. Bench marking problem testing
  2. program design tools
  3. advantages of pre-written software
  4. PDLC
Lesson 10
  1. Personal training
  2. Conversion activities
  3. systems evaluation
Lesson 12
  1. Evaluation of ERP
  2. Business engineering
  3. characteristics of ERP
  4. ERP benefits
Lesson 13
  1. OS-Security components
  2. SPLMS
  3. Firewalls
  4. DBMS controls


Lesson 14
  1. Field level interrogation
  2. source document controls
  3. error handling techniques
Lesson 15
  1. Making fraud difficult to perpetrate
  2. Disk imaging and analysis technique
  3. Frauds at input
Lesson 16
  1. Powers of controller
  2. duties of certifying authorities
  3. Powers of central government
Lesson 17
  1. Concurrent audit techniques
  2. Audit framework program development and acquisition
  3. Program analysis
  4. IS audit objectives
Lesson 18
  1. Core principles of information security
  2. example of information security policy statement
  3. types of information protection
Lesson 19
  1. Programming work bench
  2. levels of integration
  3. Meta –CASE workbench

 Tanx yar


CCI Pro

Leave a Reply

Your are not logged in . Please login to post replies

Click here to Login / Register