MIS Exam Review: Revision Notes for Exam Preparation for Management Information Systems Midterm Exam

student celebrating passing the mis exam

This article reviews key concepts and topics to help you excel in your Introduction to Management Information Systems midterm exam.

There are three primary areas that we have covered so far in this course, and they are detailed below. These are:

  • An Introduction to Management Information Systems
  • An Introduction to Computer Systems: Hardware and Software
  • An Introduction to Network Systems and Security

Information Systems

  • information
  • systems
  • decision making
  • increased need for information systems
  • types of information systems
  • enterprise information systems

Computer Systems

  • inside a computer
  • input and output devices
  • system software (operating systems)
  • application software (device apps)

Network Systems

  • networks
  • system protection
  • authentication
  • access control
  • threats – malware
  • threats – hacking

Management Information Systems

What is an Information System?

An information system is a set of hardware, software, data, people, and procedures that work together to produce information

  • a system
  • provides information
  • needed by managers
  • to support activities
  • in achieving business objectives

system

  • a system provides information needed by managers to support activities in achieving business objectives system
  • a collection of interrelated components that work together towards a collective goal

management information system (MIS)

a system provides information needed by managers to support activities in achieving business objectives

business information system (BIS)

 A business information system (BIS) is a group of interrelated components that work collectively to carry out input, processing, output, storage and control actions in order to convert data into information products that can be used to support forecasting, planning, control, coordination, decision making and operational activities in an organization.

Information Value

Right information, in the right form, at the right time,  given to the right person

  • The value of information lies in its accuracy, relevance, timeliness, and completeness.
  • High-quality information supports better strategic and operational decisions, providing a competitive advantage.
  • It enables managers to evaluate performance, forecast trends, and identify opportunities.
  • Poor-quality information, in contrast, can lead to costly errors and inefficiencies.

See the full information on the Introduction to Information Systems page

Tangible value

  • Financial value

Intangible value

  • Can’t always calculate value
  • Improved decision
  • Example : Savings implementing a new system

Good Information

  • Accurate  correct and verifiable
  • Complete   yet concise
  • Cost effective  affordable, beneficial
  • Current  up-to-date, relevant
  • Accessible  easy to use

Formal Information

  • Consistent, same format, structured
  • Accurate, relevant, comprehensive, use templates
  • Inflexible, limited, can overlook information
  • Ignores opinions, important context

Informal Information

  • Flexible, freedom, more details
  • Liked by some clients – builds relationships
  • Can lack accuracy & relevance, slow & inefficient
  • Restricted (can’t deal with large volumes of data)
  • Can be ignored, highly selective

Decision Making

Structured decisions

  • Rules & constraints known
  • Routine
  • Re-ordering stock
  • Analytical
  •  can provide justification

Unstructured decisions

  • More complex
  • Rely on experience, judgement, knowledge
  • E.g. open a new branch?
  •  intuitive
  • Based on experience

Decision Levels

Strategic level

Top managers concerned with strategic or long- term planning and decisions

  • Unstructured
  • Infrequent
  • Large impact
  • e.g. new market

Tactic level

Middle level managers who make decisions to implement the strategic goals set for the organization

  • Medium term planning
  • Monitor performance
  • Budget & resources
  • Set policies – apply to meet strategic goals
  • e.g. set department budget

Operational level

Low-level supervisors make daily operational decisions

  • Short term, day-to-day control
  • Meet the tactical goals
  • Highly structured, little impact (organization-wide)
  • e.g. daily schedule

Need for Information Systems

The growing complexity of business operations necessitates robust information systems. These systems address critical needs such as automating processes, managing vast data volumes, enhancing customer experience, and improving communication. In a globalized economy, information systems enable scalability, integration across geographies, and real-time analytics to adapt to dynamic market conditions.

The official list of 10 areas (see below) includes the increase in competition such as with globalization, more focus on customers especially with the increased power of social media comments and public pressure, and the speed of change with the uncertainty in the marketplace.

We covered ou thoughts on the increased need for information systems at the beginning of the course. Below is the mind map from that lesson to help remind you of our findings.

  1. Competition
  2. Globalization
  3. Uncertainty in the Marketplace
  4. Tendency of Outsourcing
  5. Clout of Civil Society and Media
  6. Reduced Hierarchy and Improved Transparency
  7. Focus on Knowledge in Business
  8. Awareness of the Value from Managing Information
  9. Customer Focus
  10. Investment on Information Technology
the increasing need for information systems in a mind map

See the full information on the need for information systems page

Types of Information Systems

Information systems are categorized into various types, each serving a distinct function. Transaction Processing Systems (TPS) handle daily operational tasks, while Management Information Systems (MIS) summarize and analyze data for middle management.

Decision Support Systems (DSS) aid complex decision-making processes, and Executive Information Systems (EIS) provide strategic insights for top-level executives. Knowledge Management Systems (KMS) and Enterprise Systems further streamline processes and improve knowledge sharing.

We will cover the different types of information systems throughout this course. For example, the entrerise systems are covered next.

Enterprise Information Systems

Enterprise Information Systems (EIS) integrate all parts of an organization’s operations. Systems like Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), Supplier Relationship Management (SRM), and Supply Chain Management (SCM) improve coordination, streamline workflows, and enhance decision-making. EIS supports cross-functional integration, real-time information sharing, and scalability in business operations.

It is expected that you understand the basics of these 4 enterprise systems and have a good knowledge of at least one of these systems. Remember we had the lesson that you learnt at least two of the four systems and explained them to other students. It is important that you understand these enterprise systems:

  1. Enterprise Resource Planning (ERP)
  2. Customer Relationship Management (CRM)
  3. Supply Chain Management (SCM)
  4. Supplier Relationship Management (SRM)

For a comprehensive guide to these systems, and enterprise systems in general, please visit the what are enterprise systems webpage.

Computer Systems

Although computer systems is a wide, complex and important aspect of information systems, in this course we cover the basics of hardware ,software and how computers work.

Hardware: Inside a Computer

The internal hardware of a computer includes critical components such as the CPU, Random Access Memory (RAM), motherboard, and storage drives. The CPU performs calculations and processes instructions, while RAM temporarily holds data for active applications. Storage devices like Hard Disk Drives (HDD) and Solid-State Drives (SSD) retain data persistently.

We studied the inside of a computer and explained the purpose of each of the components on the motherboard. These included:

  • motherboard
  • CPU
  • fan (heat sink)
  • memory stick (RAM)
  • hard drive storage
  • power unit
  • communications & input / output (I/O)
  • slots / cables

The box that houses all these components is called the system unit. If you want to study more information to prepare for the exam questions then visit the computer hardware page about the system unit.

Hardware Input and Output Devices

We also looked at the range of devices used for input and output to the computer.

System Software

System software, including operating systems (OS) and utility programs, is essential for managing hardware resources and enabling software applications to run. Popular OS examples include Windows, macOS, and Linux. System software also provides critical services like memory management, process scheduling, and file handling, ensuring efficient system operation.

Application Software

Application software is designed to perform specific tasks for users, ranging from productivity tools like word processors and spreadsheets to specialized software for accounting, graphic design, and data analytics. Cloud-based applications and Software as a Service (SaaS) models have revolutionized accessibility and collaboration, enabling users to work from anywhere.

In our lesson we listed the types of software ‘apps’ that are on our devices and listed the actual apps themselves. In the following lesson, we covered system software which includes operating systems and utility programs.

For revision visit the IT software page.

Network Systems and Security

Introduction to Network Systems

Network systems connect multiple computers and devices, enabling data sharing and collaboration. They are classified into Local Area Networks (LAN), Wide Area Networks (WAN), and wireless networks. Network topology, bandwidth, and latency significantly affect performance. Emerging technologies like 5G and edge computing are transforming networking capabilities.

network architecture image with client server and peer to peer P2P examples
  • A group of devices that can communicate with
    one another – hosts
  • Physical connections between devices are called links
  • Connections
    • Wired – twisted-pair, coaxial cable, or fiber-optic
    • Wireless – infrared, microwave (Bluetooth), broadcast (Wi-Fi) or satellite
  • Hosts & Nodes
    • Host: the central computer that controls the network
    • Node: a device that is attached to the network
  • Packets
    • The format for sending electronic messages
    • A fixed-length block of data for transmission
  • WAN – Wide Area Network: Covers a wide geographic area, such as a country or the world
  • LAN – Local Area Network: Connects computers and devices in a limited geographic area such as an office, building, or group of nearby buildings
  • Intranets
    • An organization’s private network that uses the infrastructure and standards of the Internet and the web
  • Extranets
    • Private internets that connect not only internal personnel but also selected suppliers and other strategic parties
  • Virtual Private Networks (VPN)
    • Private networks that use a public network, usually the Internet, to connect remote sites

Information Assurance and Security

Information assurance ensures the availability, integrity, and confidentiality of data. Security measures such as encryption, authentication, and disaster recovery planning are vital for protecting information assets. Compliance with standards like GDPR and ISO 27001 is essential for maintaining trust and regulatory adherence.

principles : encryption = cryptography
CIA
• confidentiality
• integrity
• availability

in practice:
firewalls and intrusion detection systems

Authentication

Two Factor Authentication
First factor: what user knows
Second factor: what user has
Password token
Passcode creator (every n minutes)
USB key
Digital certificate
Smart card

How a User Should Treat Userids and Passwords –

  • Like a toothbrush
    • don’t let anyone else use it,
    • change it every month or so
  • Keep it secret
  • Do not share with others
  • Do not leave written down where someone else can find it
  • Store in an encrypted file or vault

Information Security Threats

Information systems face threats from malware, phishing, ransomware, and denial-of-service (DoS) attacks. Insider threats and human error also pose significant risks. A proactive approach, including regular security updates, employee training, and threat monitoring, is crucial for mitigating these risks.

Risk
• something bad might happen to an asset
• losing data, losing business
Threat
• an action that could damage an asset
• natural (earthquake, flood)
• human-induced
• businesses need to plan to deal with threats

hacking stages

Human-caused threats include:

  • viruses – a program written to cause damage
  • malicious code – a program to cause a specific action to occur
  • Vulnerability – A weakness that allows a threat to have access to an asset
  • Security Mechanisms – Prevention, Detection, Recovery

• Viruses: Self-replicating code that attaches to files.
• Worms: Standalone malware that replicates across networks.
• Trojans: Malicious software disguised as legitimate applications.
• Spyware: Software that collects user information without consent.
• Adware: Software that displays unwanted advertisements.
• Ransomware: Malware that encrypts files and demands payment for decryption.
• Rootkits (Backdoors)

Information Systems Access Control

Access control restricts unauthorized access to systems and data. Methods include authentication (passwords, biometrics) and authorization protocols (role-based access control). Advanced measures like multi-factor authentication (MFA) and identity management systems further enhance security. Proper access control reduces data breaches and ensures system integrity.

User – Any person accessing a computer system
Group – Multiple users that are granted access to a resource at the same time Role – Access is granted or denied based on a person’s job or function within the
organization

Final Exam Review

The final exam will focus on the subjects after midterm that include data systems and databases, business processes and a closer look at information systems. The mis final exam will be based solely on this material after the midterm exam.