wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explain the concept of ( MIS) Management information systems

profile
Khushi Yadav
Aug 02, 2022
1 Like
0 Discussions
250 Reads

1) Management information systems (MIS) are used by tactical administration to supervise the association's present performance status. The information given by MIS can be used to construct small decisions

2) MIS takes data from transaction processing system and produces unchanging reports 

3) For example, data about last month's deals facilitate to identify which the goods are selling in highest number and which goods not selling in highest number

4) This information can be used to optimise store and also build up method to enhance sales of goods which are not selling in highest number

5) Examples of MIS consists of human resources management system, sales management system, budgeting system etc.

 

 


Comments ()


Sign in

Read Next

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Mumbai

Blog banner

City of Mumbai (Bombay):

Blog banner

Pandas Matrix Applications

Blog banner

What is Spyware?

Blog banner

Memory heirchy

Blog banner

Service Transition Process in ITSM

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Music is life

Blog banner

Oracle Corporation

Blog banner

Vulnerability Assessment

Blog banner

Wiretapping

Blog banner

MEMORY MANAGEMENT

Blog banner

Number Guessing game --lisp

Blog banner

Online Games

Blog banner

Memory Management

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Operating system

Blog banner

Environmental Management using GIS

Blog banner

Threat management

Blog banner

Cache memory

Blog banner

Paginng In OS

Blog banner

Direct Memory Access

Blog banner

Be you

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Types of threads

Blog banner

The Five Steps of Data Science

Blog banner

Meshoo

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Process Creation

Blog banner

Memory Management in Operating System

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Install Ubuntu Easily

Blog banner

Types of Malware in Cyber Security

Blog banner

Virtual Memory

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Malicious softwares

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Steganography and Steganalysis

Blog banner