Post on 04-Apr-2018
7/31/2019 General IT Concepts
1/66
7/31/2019 General IT Concepts
2/66
A system may be defined as a set of socia l, biological,technologica l or material partners co-operating on acommon purpose. System theory is a philosophicaldoctrine of describing systems as abstract organizationsindependent of substance, type, time and space. Systemstheories are connected to both ontological and
epistemological views. The ontological view imply thatthe world consist of systems or integrative levels. Theepistemological view implies a holistic perspectiveemphasizing the interplay between the systems and their
elements in determining their respective functions. It isthus opposed to more atomistic approaches in whichobjects are investigated as individual phenomena
7/31/2019 General IT Concepts
3/66
System theory everything that everything is a system in thesense that the concept system can be applied to everything ina meaningful and practical sense . Every thing is a system thatis composed of sub systems that interact to create that system
The name Information System Theory has previously beenused to describe theoretical computer science, whereby acomputer is a system that processes information, butinformation is far more general that just the contents of computer files or data structures. Every system is composedof information and it also processes information, regardless of
what form that information takes, whether its medium iscomputer files, light rays, particles of matter and so on.Information is simply discernible difference and may thereby manifest in any medium whatsoever.
www.iva.dk/jni/lifeboat_old/Positions/ Systems %20 theory .htm
7/31/2019 General IT Concepts
4/66
System analysis System: An organized relationship among the functioning units orcomponents, which work in sync to achieve a common goal.System Study: A study of operations of a set of connected elements andthe inter connections between these elements. It clearly shows that noone can ignore an element while doing a system study.System Approach: Shows a set of procedure to solve a particularproblem, It applies scientific methods to understand the interrelationship between the elements to solve the problem.System analysis: It is a management exercise, which helps us indesigning a new system or improving the existing system.Characteristics of a System1. Organization: It says the Structure or order of built.
2. Interaction: Procedure in which the components interact.3. Interdependence.4. Integration5. Central Objective
7/31/2019 General IT Concepts
5/66
Elements of System AnalysisThere are 4 basic elements of System analysis, they
are1. Outputs
Inputs : The essential elements of Inputs are
Accuracy of dataTimelinessProper formatEconomy.
3. Files4. Process
7/31/2019 General IT Concepts
6/66
Types of Systems1. Physical or abstract systems
2. Open or closed systems3. Deterministic or probabilistic4. Man made systems
Formal systems Organization
representationInformal systems Employee based systemComputer based information systems
Computer handling business applications.These are collectively known as ComputerBased Information systems (CBIS).
7/31/2019 General IT Concepts
7/66
A system architecture or systems architecture is the conceptualmodel that defines the structure, behavior, and more views of asystem.
Types of systems architecturesSeveral types of systems architectures (underlain by the samefundamental principles have been identified as follows
1. Collaborative Systems Architectures(such as the Internet,intelligent transportation systems, and joint air defense systems)
2. Manufacturing Systems Architectures3. Social Systems4. Software and Information Technology Systems(Architectures)
5. Strategic Systems Architecture[3]
6. Hardware architecture7. Software architecture8. Enterprise architecture
7/31/2019 General IT Concepts
8/66
7/31/2019 General IT Concepts
9/66
www.Googlebooks.com
http://www.googlebooks.com/http://www.googlebooks.com/http://www.googlebooks.com/http://www.googlebooks.com/7/31/2019 General IT Concepts
10/66
TimelinessTimeliness is the degree to which information is up-to-date. It can be seenin an objective fashion, meaning that information represents the current
state of the real world. Timeliness can also be seen as task-dependent,meaning that the information is timely enough to be used for a specific task.
Attributes of Information
Security Security has been identified as another important information quality dimension. If information is not secure, it can be easily intercepted by any intelligent opponent (e.g., terrorists, criminals) and used in a harmfulmanner. For example, if there is a huge fire that needs to draw police,medical and fire responders from surrounding areas, and if a criminalcomes to know this, (s)he can take undue advantage of this information:
Accessibility For information to be utilized in an effective manner, it must be accessible. Accessibility implies the degree to which information is available, easily obtainable or quickly retrievable when needed. But this availability of information to the users is generally within the constraints of policy andconfidentiality
7/31/2019 General IT Concepts
11/66
CompletenessCompleteness is the degree to which information is notmissing. Incomplete information can be hazardous.
However, complete information for one person may beincomplete for another
Accuracy Accuracy is the degree of correctness and precision with which information in an automatedsystem represents states of the real world
CoherenceCoherent information is what gels or blends with
itself consistently. Incoherent information canlead to confusion and panic during a disaster
RelevanceRelevancy is the extent to which information isapplicable and helpful for the task at hand.
7/31/2019 General IT Concepts
12/66
Validity
Information should be valid in the sense that it must be trueand verified; it must satisfy the set standards related to other
dimensions such as accuracy, imeliness, completeness andsecurity. The most common form of information validation isauditing. Auditing can uncover mistakes and is a good way tomeasure the quality of information (WhiteHouse, 2006).
Validity is a resultant rather than a causal dimension of information quality. This means that even though someinformation may be classified as being highly valid, it still may fall under poor quality information if other crucial dimensionslike accuracy, timeliness etc. is absent (H. Miller, 1996)...When indicators possess high degree of reliability and
validity, the data and information they generate is more usefulin continuously improving performance. Conversely, indicatorsthat are unreliable and invalid produce confusing, irrelevantand useless data and information while consuming preciousresources... (O'Leary, 2004)
http://www.som.buffalo.edu/isinterface/papers/IA%20_080917-1.pdf
http://www.som.buffalo.edu/isinterface/papers/IA%20_080917-1.pdfhttp://www.som.buffalo.edu/isinterface/papers/IA%20_080917-1.pdfhttp://www.som.buffalo.edu/isinterface/papers/IA%20_080917-1.pdfhttp://www.som.buffalo.edu/isinterface/papers/IA%20_080917-1.pdf7/31/2019 General IT Concepts
13/66
Usability Delivery
11 Attributes of Information
Relevant Simple Flexible Economical
Timely Accessible Secure
Quality Accurate Verifiable Complete Reliable
James Hall AIS
7/31/2019 General IT Concepts
14/66
Role of Information in Business
Support for the business process andoperations: An 'Information System' helpsmanagers to conduct daily activities andfunctions properly. For example in a bank different activities, which involve but are notlimited to: account creation, the withdrawal of money, statement generation among others,the Information System helps mangers toconduct such activities accurately and in atimely manner
7/31/2019 General IT Concepts
15/66
Support for decision making in terms of employees and managers: An Information System will take data as an input and process itthus generating information. Managers can then use this
information for to better their organisation. As an example, anInformation System can analyse existing historical data aboutcustomers in a bank and generate information such as whichcustomers were 'good', which were 'bad' as well as other attributes,Managers could then use this information while deciding toprovide a loan for new customers, whether it be the restrictionsthereof, the amount the loan is for or even whether a loan can begiven at all support in making decision for competitiveadvantages. IS can give information like which items to launch in
which location by analysing data collected from different sourcessuch that company can have advantage by using these informationover their competitors . IS also can help business houses inconducting their business process differently than theircompetitors.http://wiki.answers.com/Q/What_is_the_strategic_role_of_an_information_system_
http://wiki.answers.com/Q/What_is_the_strategic_role_of_an_information_system_in_businesshttp://wiki.answers.com/Q/What_is_the_strategic_role_of_an_information_system_in_businesshttp://wiki.answers.com/Q/What_is_the_strategic_role_of_an_information_system_in_business7/31/2019 General IT Concepts
16/66
Human Information Processing Theories
View of humanity Information Processing Theory views humansas information processing systems, with
memory systems (a stimulus) is inputted(sensed) and the brain then performs processessuch as comparing the information to
previously stored information (schemas),transforming information (encoding), or storinginformation in long-term memory.
http://en.wikipedia.org/wiki/Information
_processing_theory
http://en.wikipedia.org/wiki/Information_processing_theoryhttp://en.wikipedia.org/wiki/Information_processing_theoryhttp://en.wikipedia.org/wiki/Information_processing_theoryhttp://en.wikipedia.org/wiki/Information_processing_theory7/31/2019 General IT Concepts
17/66
7/31/2019 General IT Concepts
18/66
Executive Support System ("ESS") -is designed to helpsenior management make strategic decisions. It gathers,analyses and summarises the key internal and externalinformation used in the business . Uses what -if" analysis tohelp strategic decision-making.Management Information Systems- (MIS) is mainly concerned with internal sources of information. MIS usually take data from the transaction processing systems (see below)
and summarise it into a series of management reports.MISreports tend to be used by middle management andoperational supervisors.
Decision-Support System ("DSS") -are specifically
designed to help management make decisions in situations where there is uncertainty about the possible outcomes of those decisions. DSS comprise tools and techniques to helpgather relevant information and analyse the options andalternatives. DSS often involves use of complex spreadsheetand databases to create "what-if" models
l d ( ) h l b
7/31/2019 General IT Concepts
19/66
Knowledge Management Systems ("KMS")- exist to help businessescreate and share information. These are typically used in a business whereemployees create new knowledge and expertise - which can then be shared by other people in the organisation to create further commercialopportunities. Good examples include firms of lawyers, accountants andmanagement consultants. KMS are built around systems which allow efficient categorisation and distribution of knowledge. For example, theknowledge itself might be contained in word processing documents,spreadsheets, PowerPoint presentations. internet pages or whatever. Toshare the knowledge, a KMS would use group collaboration systems such as
an intranet.Transaction Processing Systems - As the name implies, TransactionProcessing Systems ("TPS") are designed to process routine transactionsefficiently and accurately. A business will have several (sometimes many)TPS; for example:
- Billing systems to send invoices to customers- Systems to calculate the weekly and monthly payrol l and tax payments- Production and purchasing systems to calculate raw materialrequirements- Stock control systems to process all movements into, within and out of
the business
7/31/2019 General IT Concepts
20/66
Office Automation Systems - Office AutomationSystems are systems that try to improve the productivity
of employees who need to process data and information.Perhaps the best example is the wide range of softwaresystems that exist to improve the productivity of employees working in an office (e.g. Microsoft Office2010) or systems that allow employees to work fromhome or whilst on the move.
7/31/2019 General IT Concepts
21/66
7/31/2019 General IT Concepts
22/66
7/31/2019 General IT Concepts
23/66
23
Hardware and Processors
Mainframes are large computers used forcentralized information systems.
Microcomputers or PCs are computers used by
one person. Processor (CPU) is where data processing is
performed. Processor speed is measured by the number of
cycles that occur per second.
7/31/2019 General IT Concepts
24/66
24
Processors
MHz stands for millions of cycles per second . Word is the measure of how many bits can be
moved with one cycle of the processor. Word size is how many characters, A, can be
moved in a single cycle of the processor. Power is affected by both word size and processor
speed.
25
7/31/2019 General IT Concepts
25/66
25
Table 5.1 Major Computer Components
26
7/31/2019 General IT Concepts
26/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
26
Memory and Storage Memory (primary storage or RAM ) is the
storage area on the computers circuit board. Volatile Extremely fast
Fixed storage is permanently installed in thecomputer.
Removable storage media tape, disk, CD,DVD, USB flash drive, etc.
7/31/2019 General IT Concepts
27/66
Microcomputer Circuit Board, also known as a Motherboard
7/31/2019 General IT Concepts
28/66
Personal Computers What is a desktop computer? Designed so the system unit,
input devices, output devices,and any other devices fitentirely on or under a desk or
table
p. 1.20 Fig. 1-23
7/31/2019 General IT Concepts
29/66
7/31/2019 General IT Concepts
30/66
Personal Computers
What are some desktopcomputer variations?
Tower model
Tall andnarrow system unitthat can sit
on the floor vertically
p. 1.20 Fig. 1-23
7/31/2019 General IT Concepts
31/66
Personal Computers
What are some desktopcomputer variations? All-in-one computer
Less expensivedesktop thatcombines themonitor andsystem unitinto a singledevice
p. 1.21 Fig. 1-24
7/31/2019 General IT Concepts
32/66
Mid-Range Servers
What is a mid-rangeserver? More powerful and
larger than a
workstation computer Supports up to 4,000
users Often connected via a
personal computer orterminal Once known as a
minicomputerp. 1.25 Fig. 1-32
7/31/2019 General IT Concepts
33/66
Sometimes called dumbterminals
No processing power
Cannot stand alone Must be connected
to a server to operate
Mid-Range Servers What is a terminal?
Device with a monitor and keyboard used toaccess a server
7/31/2019 General IT Concepts
34/66
Mainframes What is a mainframe? Large, expensive,
very powerfulcomputer
Can handlehundreds orthousands of connected userssimultaneously
Stores tremendousamounts of data,
instructions, andinformation
7/31/2019 General IT Concepts
35/66
Company on the Cutting EdgeInternational Business Machines(IBM)
Incorporated in 1911
The first family of computers withinterchangeable software andperipherals
Worlds largest information technologycompany
36
7/31/2019 General IT Concepts
36/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Personal Computing Devices Cell phones with interactive messaging and video
Smart cell phones are phones that perform tasksassociated with PCs, i.e., BlackBerry 7270, Treo650.
Global Systems for MobileCommunications (GSM) digital cellularphone protocol
37
7/31/2019 General IT Concepts
37/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Home Networks Home computer networks assess the Internet via
cable modems or DSL modems .
Setup usually requires the modem, network card(s), wireless router.
Wireless security uses Wired equivalentprivacy ( WEP ) which encrypts the data
transferred between the computer and wirelessrouter.
38
7/31/2019 General IT Concepts
38/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Home Computing Security Updates for OS and application software.
For security and efficiency
Microsoft Update Hackers are people who try to break into
computer systems in order to Gather information;
Deny the owner access to his resources; Delete files; Disrupt the use by the owner.
39
7/31/2019 General IT Concepts
39/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Home Computing Security (Contd) Viruses are small computer programs that
replicate by inserting themselves into computerresources such as programs or files.
Worms are self-contained files or programs Does not have to attach to program or file.
Can delete, change files, send e-mails, and causeproblems.
40
7/31/2019 General IT Concepts
40/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Home Computing Security (Contd) Denial-of-service attack is when the user is
denied access to the services of the computer because it is overwhelmed with e-mail.
Antivirus software Norton, MacAfee, etc.Keep virus definitions updated.
Spyware Microsoft Defender, Lavasoft Ad- Aware, etc. Free from Microsoft.
41
7/31/2019 General IT Concepts
41/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Software System software (OS ) performs certain tasks
that all computers require. Hardware interfaces, device drivers Manage computers processes OS Windows XP, Unix, Mac OS X, Linux
Application software processes the users
data. Prewritten application software is
produced by suppliers and sold to users.
42
7/31/2019 General IT Concepts
42/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Application Software Custom application software is when
programmers for the business write thesoftware.
User-written software in End-User Computing is created by the user, such asExcel Macros, Access Wizards.
User-friendly software is computer softwarethat is simple and intuitive to use.
43
7/31/2019 General IT Concepts
43/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Communications Protocol is the specification for formatting data
to be transferred between communicationsequipment.
Public connections Telephone modems
Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL)
44
7/31/2019 General IT Concepts
44/66
Table 5.4 Connecting to the Internet
45
7/31/2019 General IT Concepts
45/66
Communications (Contd) Packet is a piece of the total data to be
communicated, includes sender and receiveraddresses.
Cable modems connect to the Internet viacoaxial cable.
Asynchronous transfer mode (ATM) Improve data transmission rates Provides increased speed
46
7/31/2019 General IT Concepts
46/66
Private Line Circuit is a connection that is always connected. Private line is a circuit that is always open to your communication traffic. T-1 line over 1.5 Mbps; T-3 at 43 Mbps Multiplexed is when the line is broken into
separate lanes of communication.
47
7/31/2019 General IT Concepts
47/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Virtual Private Networks Virtual Private Networks (VPNs) allow you
to use the security and speed of a private line but
still use the low-cost Internet. Tunneling software establishes the set of intermediary locations of the telephoneequipment that will host a given data
communications transfer. Privacy is attained because the tunnel is notestablished unless the sending and receivingcomputers authenticate one another.
48
7/31/2019 General IT Concepts
48/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Communications-Networks Open Systems Interconnection (OSI)-
standard architecture for network connections
established by the ISO. Terminal is a device that has no storage orprocessor; it allows for entering and displayingdata for the computer.
Systems Network Architecture (SNA) is aprotocol for large computers; it polls othercomputers connected by the network fortransfers.
49
7/31/2019 General IT Concepts
49/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Table 5.5 OSI Reference Model
50
7/31/2019 General IT Concepts
50/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Networks (Contd) Token ring is a peer-to-peer protocol that
allows each computer to act as its own
controller. Ethernet is an open protocol for peer-to-peercommunications. IEEE endorses
Data transmission crash is when two peercomputers try to send data at the same time.
51
7/31/2019 General IT Concepts
51/66
Figure 5.11 Token Ring ProtocolExample
52
7/31/2019 General IT Concepts
52/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Networks (Contd) Data packet is a piece of the total data to be
communicated, combined with the address of
the destination computer, the sending computer,and other control information. Transmission Control Protocol/Internet
Protocol (TCP/IP )
TCP conducts communication over the network. IP handles the packets so they can be routed.
53
7/31/2019 General IT Concepts
53/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Networks (Contd) IP address is a four-part set of numbers (each
from 0 to 255), separated by periods.
Network interface card (NIC) is used toattach a device to the communications medium. Local Area Networks (LANs) is a group of
computers and other devices that are connected
together by a communications medium.
54
7/31/2019 General IT Concepts
54/66
Table 5.6 Communications NetworkHardware
55
7/31/2019 General IT Concepts
55/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Networks (Contd) Medium used by LANs can be copper wire, wireless, fiber-optics, or other media.
LANs join computers that are physically locatedtogether. Same room or building Total distance is less than mile. 60 ft. between devices
56
7/31/2019 General IT Concepts
56/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Networks (Contd) Metropolitan area network (MAN) is a
network that has a physical distance limit of
roughly 30 miles. Wide area networks (WANs) are used toconnect computers and other devices when thedistance exceeds the constraints of LANs and
MANs. Uses common carrier, public telephone system WANs have been replaced by the Internet.
57
7/31/2019 General IT Concepts
57/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
Internet, Intranet and Extranet Internet is just a collection of networks that
can be joined together; Public.
Intranet uses the same network protocols asthe Internet but limits accessibility to computerresources to a select group of persons in theorganization.
Extranet is when the intranet is expanded toinclude users beyond the firm; Trustedcustomers and business partners.
San
7/31/2019 General IT Concepts
58/66
San MiguelBrewing
PlantManilaPlastic
Company
Maltsupplier San
MiguelBottling
Plant
SanMiguel
Purefoods
Customer
7/31/2019 General IT Concepts
59/66
NokiaHeadquarter
(Finland)Nokia
Philippines
SunMicroSyste
m Smart
Communications
Customer
60
7/31/2019 General IT Concepts
60/66
2007 by Prentice Hall
ManagementInformation Systems,
10/e Raymond McLeodand George Schell
The Convergence of Computing andCommunications Computing devices and communications devices
are now incorporating features of the other intothemselves.
Voice over Internet Protocol ( VoIP ) is therouting of voice communications over theInternet as if they were digital communications. WWW.SKYPE.COM free software
http://www.skype.com/http://www.skype.com/7/31/2019 General IT Concepts
61/66
Network Topologies
7/31/2019 General IT Concepts
62/66
7/31/2019 General IT Concepts
63/66
7/31/2019 General IT Concepts
64/66
7/31/2019 General IT Concepts
65/66
7/31/2019 General IT Concepts
66/66