Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views11 pages

FuNDAMENTALS Reviewer

The document outlines the role of Information Systems (IS) in transforming business operations across different management levels, emphasizing their importance in decision-making, efficiency, and competitive advantage. It describes the components of IS, the types of systems used for various business processes, and the ethical considerations surrounding data use and privacy. Additionally, it highlights the impact of IS on organizational structure and the necessity of complementary assets for maximizing IS benefits.

Uploaded by

Patricia Garcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views11 pages

FuNDAMENTALS Reviewer

The document outlines the role of Information Systems (IS) in transforming business operations across different management levels, emphasizing their importance in decision-making, efficiency, and competitive advantage. It describes the components of IS, the types of systems used for various business processes, and the ethical considerations surrounding data use and privacy. Additionally, it highlights the impact of IS on organizational structure and the necessity of complementary assets for maximizing IS benefits.

Uploaded by

Patricia Garcia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Module 1 Lesson 1 - The Role of Information Systems ● Senior Management – Sets strategy

in Business Today ● Middle Management – Analyzes


reports for decision-making
How Information Systems are transforming business? ● Operational Management – Handles
day-to-day operations
● Increase in wireless technology use, Web sites
● Business processes, policies, and
● Increased business use of Web 2.0
standard procedures are part of this
● technologies Cloud computing, mobile digital
dimension.
platform allow more distributed work, decision-
Example: UPS using IS for tracking and logistics.
making, and collaboration

2 Management Dimension
2️⃣

Definition of Information System (IS)


● Managers use IS for decision-making,
● A set of components (hardware, software, data,
setting business strategies, and
people, and processes) that collect, process,
evaluating company performance.
store, and distribute information for decision-
● IS helps in problem-solving,
making.
forecasting, and competitive analysis.

Example: Amazon uses IS for AI-based product


Importance of Information Systems in Business recommendations.
● Enhances efficiency – Automates tasks,
reduces costs
● Supports decision-making – Provides
3️⃣Technology Dimension
accurate, real-time data
● Improves customer & supplier relationships
– Personalization, faster response ● Includes hardware, software, networks, and
data management systems.
● Gains competitive advantage – Innovation,
● Supports business operations, transactions, and
market leadership innovations.
● Enables globalization – Cloud computing,
online platforms Example: Netflix’s AI-powered streaming
recommendations use IS technology to improve customer
experience.
Three activities of Information Systems produce
information organizations need: Complementary assets
- are additional assets that businesses invest in to
(1)Input (data collection) → (2)Processing maximize the benefits of Information Systems. Without
(conversion into useful info) →(3) Output
these, IS alone cannot provide full business value.
(distribution to users) → Feedback (improvement &
correction). Three Types of Complementary Assets:

1️⃣Organizational Assets
Six strategic business objectives:
1. Operational Excellence – Boosts efficiency & ● Appropriate business model
productivity (e.g., Walmart’s supply chain) ● Efficient business processes
2. New Products, Services & Business Models
– Innovation (e.g., Apple’s iTunes, Uber) 2 Managerial Assets
2️⃣
3. Customer & Supplier Intimacy – Builds loyalty
(e.g., Amazon recommendations) ● Incentives for management innovation
4. Improved Decision-Making – Real-time data ● Teamwork and collaborative work environments
prevents errors (e.g., Google Analytics)
5. Competitive Advantage – Lowers costs,
3️⃣Social Assets
improves quality (e.g., Netflix’s AI-based
recommendations)
● The Internet and telecommunications
6. Survival – Adapts to industry trends &
infrastructure
regulations (e.g., Banks adopting online ● Technology standards
banking)

Data vs. information


● Data are streams of raw facts
Two Main Approaches:
● Information is data shaped into meaningful form

1️⃣Technical Approach

Three Dimensions of Information Systems


● Emphasizes mathematically based models
● Computer science, management science,
1. Organizational Dimension operations research
Behavioral Approach: ● Definition: Large software systems that
integrate business functions across
● Behavioral issues (strategic business departments.
integration, implementation, etc.) ● Four Major Types:
1. Enterprise Systems (ERP) – Centralizes
● Psychology, economics, sociology data across departments.
2. Supply Chain Management Systems
Management Information Systems (MIS) (SCM) – Manages supplier relations.
3. Customer Relationship Management
Systems (CRM) – Manages customer
- Combines computer science, management science, interactions.
operations research and practical orientation with 4. Knowledge Management Systems (KMS)
behavioral issues – Captures and shares company knowledge.

● Suppliers of hardware and software


● Business firms 7. Enterprise Systems (ERP)
● Managers and employees
● Firm’s environment (legal, social, cultural ● Purpose: It collects data from different firm
functions and stores data in a single central
context) data repository, resolves problems of
fragmented data, and enables coordination of
MODULE 1 LESSON 2 - BUSINESS PROCESS AND daily activities, efficient response to customer
TYPES OF INFORMATION SYSTEMS orders (production, inventory), and helps
managers make decisions about daily
What is a Business Process? operations and longer-term planning.
- Businesses are collections of business
processes that can either be assets (efficient processes) 8. Supply Chain Management Systems (SCM)
or liabilities (inefficient processes).
● Manages relationships with suppliers and
✔ Flows of material, information, and knowledge optimizes inventory

✔ Sets of activities that can be functional (specific to a 9. Customer Relationship Management Systems
department) or cross-functional (involving multiple (CRM)
areas).
● Coordinates customer-related business
processes like sales, marketing, and support.
10 Major Types of Information Systems (IS):
10. KNOWLEDGE MANAGEMENT SYSTEMS
1. Transaction Processing Systems (TPS)
● It support processes for capturing and applying
● Purpose: Handles daily routine transactions knowledge and expertise such as how to create,
(e.g., sales, payroll, hotel reservations). produce, and deliver products and services.

2. Systems for Business Intelligence

● Purpose: Supports decision-making by USED TO INCREASE INTEGRATION AND EXPEDITE


analyzing data. THE FLOW OF INFORMATION
● Three Types:
✔ Management Information Systems (MIS) –
Provides reports on performance. Intranets – Internal websites accessible only to
✔ Decision-Support Systems (DSS) – Helps employees.
managers solve unique, complex
problems. Extranets – Private websites accessible to external
✔ Executive Support Systems (ESS) – Helps
partners like suppliers.
senior executives make strategic decisions.

3. Management Information Systems (MIS)

● Purpose: Provides summary reports on the


company’s current performance.
E-BUSINESS, E-COMMERCE, AND E-GOVERNMENT

4. Decision-Support Systems (DSS) E-business: Use of digital technology and Internet to


drive major business processes
● Purpose: Analyzes data for decision-making in
complex or rapidly changing environments. E-commerce: Subset of e-business; Buying and selling
goods and services through Internet
5. Executive Support Systems (ESS)
E-government: Using Internet technology to deliver
● Purpose: Helps senior managers with long- information and services to citizens, employees, and
term, strategic decisions.
businesses.

6. Enterprise Applications
SYSTEMS FOR COLLABORATION AND SOCIAL ● Standard Operating Procedures
BUSINESS ● Politics
● Management Decisions
BENEFITS OF COLLABORATION:

● PRODUCTIVITY
● QUALITY
What is an Organization?
● INNOVATION
● CUSTOMER SERVICE
Technical Definition: A formal structure that processes
● FINANCIAL PERFORMANCE resources from the environment to produce outputs.
Behavioral Definition: A system of rights, privileges,
WHAT IS SOCIAL BUSINESS? obligations, and responsibilities maintained through
conflict resolution.
● THE USE OF SOCIAL NETWORKING
PLATFORMS, INCLUDING FACEBOOK,
TWITTER, AND INTERNAL CORPORATE
SOCIAL TOOLS—TO ENGAGE THEIR
EMPLOYEES, CUSTOMERS, AND The Impact of Information Systems on Organizations

SUPPLIERS. Economic Impact

TWO DIMENSIONS OF COLLABORATION IS as a Production Factor – IT can replace capital and


TECHNOLOGIES labor, reducing costs.
Transaction Cost Theory – IT helps firms reduce costs
● Space (or location)—remote or co-located by allowing external sourcing.
Agency Cost Theory – IT reduces management
● Time—synchronous or asynchronous supervision costs, allowing firms to grow while cutting
expenses.
The Information Systems (IS) Department

1️⃣ Programmers – Write software codes.


2️⃣Systems Analysts - Bridge between business needs & Organizational and Behavioral Impacts
technology.
3️⃣IS Managers – are leaders of teams of programmers IT Flattens Organizations – Fewer management levels,
more direct access to information.
and analysts, project managers, physical facility Postindustrial Organizations – Emphasize knowledge
managers, telecommunications managers, or database and competence over hierarchy.
specialists.
Organizational Resistance to Change – Employees
4️⃣ Chief Information Officer (CIO) - is in charge of resist IS due to:
Information Systems security for the firm and is
responsible for enforcing the firm’s information security 1️⃣ IT innovation impact
policy. 2️⃣ Organizational structure
5️⃣ Chief Privacy Officer (CPO) – Ensures compliance 3️⃣ Culture
with data privacy laws. 4️⃣Task changes
6️⃣ Chief Knowledge Officer (CKO) – Manages
knowledge-sharing programs. Example: Employees resisting AI-driven automation in
HR and customer service.
7️⃣End Users –are representatives of departments outside
of the Information Systems group for whom applications
are developed.

MODULE 1 LESSON 4 - Ethical and Social Issues


Related to Information Systems

MODULE 1 LESSON 3 - Information Systems Impact to


Definition of Ethics:
Organizations

● Ethics refers to principles of right and wrong


Organizations and Information Systems
that guide individuals and organizations in
making decisions.
● Organizations and Information Systems (IS)
affect each other.

The Relationship Between Ethical, Social, and Political


Issues:
Factors Impacting IS & Organizations:
● Ethical issues → Affect individual rights and
● Environment privacy.
● Culture
● Structure
● Social issues → Affect how information is Liability: Refers to the existence of laws that allow
accessed and used. individuals to improve the damages done to them by other
● Political issues → Relate to laws and actors, systems, or organizations
regulations about IS. Due process: Requires that laws are known and
understood by all, which individuals can appeal to higher
authorities to guarantee laws were properly applied

Six conventional principles can be utilized to assist


Five Moral Dimensions of the Information Age
shaping an ethical decision:

1️⃣Information Rights & Obligations Golden Rule – Treat others as you would like to be
treated.
● Who has the right to access, collect, and use Immanuel Kant's Categorical Imperative: In the event
information? that an action is not right for everyone to require, it is not
● Example: Facebook's data privacy policies and right for anyone.
user data collection. Descartes' rule of change: In the event that an activity
cannot be taken over and over, it ought to not be taken at
any time.
2️⃣Property Rights & Obligations Utilitarian Principle – Choose the option that benefits the
most people.
● How are intellectual property rights protected in Risk Aversion Principle – Choose the option with the
the digital world? least potential harm.
● Example: Software piracy and illegal No Free Lunch Rule – Assume all intellectual property is
downloads.
owned unless stated otherwise.

3️⃣Accountability & Control The three different legal traditions that intellectual
property is protected:
● Who is responsible for damages caused by IS
failures or misuse? 1. Trade secret - Trade secret law secures the real ideas
● Example: Self-driving car accidents – who is in a work product, not only their manifestation.
liable?
2. Copyright - Copyright secure against copying of entire
software programs or their parts.
4️⃣System Quality

3. Patent - grants the proprietor an exclusive monopoly on


● Ensuring accurate, reliable, and secure data.
● Example: Airline ticketing systems causing the ideas behind the innovation for 20 years.
overbooked flights.

5️⃣Quality of Life

● The impact of IS on jobs, health, and human


well-being. The Internet Challenges to privacy:
● Example: Digital divide – unequal access to
Cookies - are small text files downloaded by Web site to
technology. visitor’s hard drive
-Identify visitor’s web browser software and track visits to
site
-Allow web sites to create profiles on visitors

Web beacons or Web bugs


are tiny software programs or graphic files embedded into
Non-Obvious Relationship Awareness (NORA) email messages and Web pages

is a data analysis technology used by governments and Spyware


corporations to identify hidden connections between It is small applications that can secretly install itself on an
Internet user's computer by piggybacking on larger
individuals by analyzing multiple sources of data.
applications.
How Does NORA Work?
Laws and Regulations on IS Ethics
Collects and combines data from various sources
● The Digital Millennium Copyright Act (DMCA)
(employment records, social media, phone records, etc.). –provides a few copyright protection. The
DMCA implemented a World Intellectual
What are the main features of ethical choice? Property Organization Treaty that makes it
illegal to circumvent technology-based
Responsibility: Accepting the potential costs, duties, and protections of copyrighted materials.
obligations of one's decisions accountability.
Accountability: A feature of systems and social
institutions, accountability implies that mechanisms are in ● Accountability, Liability, Control
place to determine who took responsible action and who is - A Computer –related liability problems If
responsible for an action
- software fails, who is held liable? Computer hardware platforms - client machines and
server machines, as well as modern mainframes produced
● A System Quality: Data Quality and System by IBM.
Errors
- What is an acceptable, technologically Enterprise and other software applications - include
attainable level of system quality? SAP, Oracle, and PeopleSoft, and middleware software
-Flawless software is economically not feasible that are used to link a firm's existing application systems.
Three principal sources of poor system
performance: Data management and storage - is handled by database
1. Software bugs, and errors management software and storage devices include
2. Hardware or facility failures traditional storage methods, such as disk arrays and tape
3. Poor input data quality (most common source libraries, and newer network-based storage technologies
of business system failure) such as storage area networks (SANs).

● Quality of Life: Equity, Access, and Networking and telecommunications platforms -


Boundaries include Windows server operating systems, Novell, Linux,
and UNIX. Nearly all LAN and many wide area networks
- Negative social consequences of systems
(WANs) use the TCP/IP standards for networking.

Computer crime
Internet platforms - overlap with, and must relate to, the
is the commission of illegal acts involving the use of a
firm's general networking infrastructure and hardware and
computer against a computer system.
software platforms. Internet-related infrastructure includes
Computer abuse
the hardware, software, and services to maintain
is the commission of acts including a computer that may
corporate Web sites, intranets, and extranets, including
not be illegal, but are considered unethical, that are
Web hosting services and Web software application
primarily committed by people inside the organization.
development tools.
Spam- is unrequested junk email sent either by
organization or individual to thousands of Internet users.

Consulting and system integration services - are


relied on for integrating a firm's legacy systems with new
technology and infrastructure and providing expertise in
implementing new infrastructure along with relevant
changes in business processes, training, and software

MODULE 2 LESSON 1 - IT INFRASTRUCTURE integration.

ERAS in the IT Infrastructure Evolution: MODULE 2 LESSON 2 - Contemporary Hardware and


Software
● Main Frame and Mini computer(1959-present)
● Personal Computer (1981-Present) Eight (8) current trends for hardware platform:
● Client/Server(1983-Present)
● Enterprise Computing(1992-present) 1.Mobile Digital Platform - Brought up that new portable
● Cloud & Mobile Computing(2000-present) computerized processing stages have risen as options in
contrast to PCs and bigger PCs. Cell phones, for example,
the iPhone, Android, and BlackBerry cell phones have
taken on numerous elements of PCs, including the
transmission of information, displaying on the Web,
Technology Drivers of Infrastructure Evolution sending email and texts, showing advanced substance,
and sending information through emails.
1. Moore's Law and Microprocessing Power: Moore's
law stated in 1965 that microprocessing power doubles 2. Consumerization of IT and BYOD - well-known
every two years. Variations of this law assert that: "consumer market" Bring your own device (BYOD)
alludes to the pattern of representatives utilizing individual
● Microprocessing power doubles every 18 gadgets to interface with their hierarchical systems and
months access business related frameworks and conceivably
● Computer power doubles every 18 months The touchy or private information. Individual gadgets could
● price of computing every 18 months. incorporate cell phones, PCs, tablets, or USB drives.

Nanotechnology - uses individual atoms and molecules 3. Grid Computing - Grid computing offers expanded cost
to create computer chips thousands of times smaller than reserve funds, computational speed, and readiness.
current technologies permit.
4. Virtualization - it is the way of introducing a lot of
2. The Law of Mass Digital Storage - sees that while the computing resources, (for example, computing power or
amount of digital information produced worldwide doubles information stockpiling) with the goal that they would all be
every year, the cost of storing digital information is falling accessible in manners that are not limited by the physical
arrangement or geographic location.
at an exponential rate.
5. Cloud computing - – it is the distribution of different
Components of IT Infrastructure services through the Internet.
Enterprise Application Integration (EAI) software
versus traditional integration - EAI software (a) uses
special middleware that creates a common platform with
Types of Cloud Services: which all applications can freely communicate with each
other.
● Email
● Storage, backup, and data retrieval 4. Web services and Service-oriented Architecture -
● Creating and testing apps Web services, inexactly coupled software parts that
● Analyzing data utilization Web correspondence norms can trade data
● Audio and video streaming between various frameworks regardless of the operating
● Delivering software on demand system of programming language.

Web services communicate through XML messages


over standard Web protocols, such as:
Deployment Models
SOAP (Simple Object Access Protocol) is a set of rules
for structuring messages that enables applications to pass
Public clouds provide their services on servers and
data and instructions to one another.
storage on the Internet.
Private clouds are reserved for specific clientele, usually
one business or organization. WSDL (Web Services Description Language) is a
Hybrid clouds are, as the name infers, a mix of both common framework for describing the tasks performed by
open and private services. This sort of model permits the a Web service and the commands and data it will accept
client greater adaptability and improves the client's so that it can be used by other applications.
framework and security. UDDI (Universal Description, Discovery, and
Integration) enables a Web service to be listed in a
directory of Web services so that it can be easily located.

Other software trends include:


6. Green computing - or “Green IT”, refers to practices
and advances for structuring, assembling, utilizing, and
discarding PCs, servers, and related gadgets, for ● Ajax (Asynchronous JavaScript and XML)
example, monitors, printers, data storage, and systems Ajax, and a related arrangement of strategies
network and interchanges frameworks to limit the effect on called RIA ("rich Internet applications") use
nature. JavaScript or Macromedia Flash projects
downloaded to your client to keep up a close to
consistent discussion with the server you are
7. High-performance and power-saving processors –
utilizing.
or Multicore Processor - refers to engineering where a
● Web-based applications Software firms are
single physical processor consolidates the center logic of
conveying software services over the Web to
more than one processor.
client PCs and their client's destinations.
● Mashups Web mashups join the abilities of at
8. Autonomic computing - - is an industry-wide exertion least two online applications to make a sort of
to create frameworks that can design, improve, fix, and mixed or hybrid that gives more client value than
insure themselves against intruders and viruses, with an the first sources alone.
end goal to the free system networks from the routine ● Web 2.0 refers to "the new Web applications"
like those above and is additionally the name of
system management, decrease system crashes cost.
a yearly meeting.

There are five major themes in contemporary software


5. Software outsourcing and Cloud Services
platform evolution:
three external sources for software:

1. Linux and open-source software - – Linux is an open- Software Packages and Enterprise Software - A
sourced programming delivered by a network of a few software package is a prewritten monetarily accessible set
hundred vast numbers of software engineers in the world, of programs that dispenses with the requirement for a firm
and is accessible complimentary to be changed by clients. to compose its own software programs for specific
capacities, for example, payroll preparing or request
2. Software for the Web (Java, HTML and HTML 5) – handling.
Java, is a working independent framework, object-oriented
programming language, has become the main Enterprise application software sellers, for example,
programming environment for the Web. SAP and Oracle-PeopleSoft have grown ground-breaking
software bundles that can bolster the essential business
HTML (Hypertext Markup Language) is a page depiction procedures of a firm worldwide from warehousing, client
language for determining how text, designs, video, and relationship management, and supply chain management,
sound are put on a Web page and for making dynamic to fund and human resource.
links to other Web pages and items.
Software Outsourcing empowers a firm to contract
HTML5, solve this issue by making it embedded pictures, custom software advancement or upkeep of existing
sound, video, and different components into a document legacy projects to outside firms, which frequently work
without processor-intensive additional items. offshore in low-wage zones of the world.

3. Enterprise Software - - Software for business is an Cloud-Based Software Services and Tools, previously,
integration of one of the most pressing application needs software, for example, Microsoft Word or Adobe Illustrator
today for U.S. firms who need to coordinate existing arrived in a case and was intended to work on a single
legacy software with innovation. machine.
Cloud-based software and the data it utilizes are Data independence - DBMS uncouples data and
facilitated on ground-breaking clients in huge data servers programs, allowing data to stand alone. DBMS helps the
and can be gotten to with an Internet connection and organization centrally manage data, its use, and its
standard Web program. security.

Mashups and Apps


The subsequent software applications are called Data Sharing – Integrating all the data into a database
mashups. The thought is to take various sources and system has many advantages, for an organization, it
produce new work that is "greater than" the entirety of its facilitates data sharing between employees and others
parts. who have access to the system and gives users the ability
to generate more information from a given amount of data
Web mashups consolidate the capacities of at least two than without integration would be possible.
online applications to make a sort of mixture that gives Integrity constraints – DBMS is capable of identifying
more client value than the first sources alone. and implementing restrictions in order to ensure users
enter valid information and preserve data integrity.
Apps are little bits of software that run-in demand for the Self-describing nature of Database System -DBMS not
Internet, on your PC, or on your cell phone or tablet and only includes the database itself but also metadata which
defines the data and relationship between the tables in the
are commonly conveyed over the Internet. database.
Restriction of unauthorized access –Not all database
users would have the same rights for access. One user
may have the access to read a file but not make changes,
MODULE 2 LESSOn 3 DATA MANAGEMENT while another may have privileges to both reads and edit a
file.
File - is a collection of records that have common
properties.
Relational Database Management System
File-based System – a collection of application programs
that perform services to the users such as production of
reports. Relational Database - represents data as tables of two
dimensions (so-called relations). Each table contains
Problems in Traditional File-System information regarding an entity and its attributes.
Relational DBMS examples
Data redundancy – duplication of data, same data stored
in multiple locations. ● Microsoft access for desktop computer
Data inconsistency – same attributes or data fields have ● DB2, Oracle Database, MySQL (open source)
different values. for large mainframes and midrange servers
Program-data dependence - the coupling of stored data ● Oracle Database Lite for mobile computing
files and the particular application programs. devices
Lack of flexibility - A traditional file system can deliver
scheduled routine reports but it cannot deliver ad hoc
(random) reports or respond to unexpected information
requirements in a timely manner.
Poor Security – Since there is no data monitoring or Relational Database Tables
management, access to and information dissemination
can be outreach.
Table – consist of a grid of columns and rows, also called
Lack of Data Sharing and Availability – Since pieces of
relation, and every table has a name that is distinct from
information in various files and various sections of the
all other tables in the database.
organization can’t be linked to each other, exchanging or
Entity – any data to be processed, stored, and
accessing information in a timely manner is nearly
maintained.
impossible Data can’t flow freely through various
Attribute – every column or field in the table.
functional areas of the organization.
Tuples – every row in a table and generally called as
records.
Database Management Approach
Primary key - identifies each record uniquely and cannot
be duplicated.
Database – is a shared collection of related data designed Foreign key – an attribute or field that points to the
to efficiently support multiple applications. primary key in the other table. This key will connect the
Database Management System (DBMS) – is a software tables to each other.
that helps an organization to centralize, handle data
effectively and provide applications with access to stored
data.

How does DBMS solve Traditional File System


Problems?

Support for multiple views of data – A database is


designed to support multiple views. A view is a database
subset that is specified and dedicated to specific system
users.
Concurrency control – current database
implementations are configured for multiple users. That is,
a database gives multiple users simultaneous access to
the same database.
Data redundancy control- DBMS reduces the
redundancy and inconsistency of data by minimizing
isolated files that repeat the same data.
Data Definition - the capability to define the database
information content or structure. It will be used to construct
database tables and to define the fields in every table.

Data Dictionary - is an automated or manual which stores


definitions and characteristics of the data elements.

Data manipulation language (DML) –a specialized


language for adding, changing, deleting, and retrieving
data in the database. This language includes commands
that allow endusers and programming specialists to
extract data from the database to satisfy requests for
information and to develop applications. The most popular
language for manipulation today is Structured Query
Language, or SQL.

Report generation capabilities allow data to be viewed in


a more organized and polished format than would be
possible simply by querying. Access also has the
functionality to develop desktop system applications.
These include tools to build data entry screens, reports
Three Basic Relational Database Operations
and develop the transaction logic.

Select - extracts data and generates a subset composed


● Crystal Reports- is a common report generator
of all records that match the requirements in the query.
for large corporate DBMS that can be used with
Join - combines relational tables to give more records to
Access.
the user than is available in single tables.
Project – creates a subset of columns in a table, which
allows the user to generate new tables containing only
necessary records.

Designing Databases

The database requires both conceptual and physical


Non-relational databases and Cloud Databases
design.

Non-relational database management systems - use a


Conceptual design - is an abstract database model from
more versatile data model and are designed to handle
a business perspective. This explains which data are
massive data sets across several distributed computers,
stored in the database and the data relationships.
and scaling up and down easily.
Physical design - shows how the database is actually
arranged on storage devices with direct access.
● NoSQL database Normalization - This is the process of organizing a
Amazon’s Simple DB - – one of Amazon’s relational database’s fields and tables to minimize
cloud-based web services, SimpleDB provides a redundancy and ensure data dependence. And also, it Is
simple Web services interface for creating and the process of organizing data efficiently within a
storing multiple data sets, easily querying data, database.
and returning results. Unnormalized table - the table contains repeating groups
Amazon Relational Database Service Referential integrity- relational database systems try to
(Amazon RDS) - offers MySQL, SQL Server, or enforce the rules of referential integrity to ensure
Oracle Database as database engines consistent relationships between coupled tables. If one
Oracle NoSQL Database - Oracle has its own table has a foreign key that points to another table, you
Database Cloud Service using its Oracle may not add a record to the table with the foreign key
Database 11g and Microsoft SQL Azure
Database is a cloud-based relational database unless the linked table contains a corresponding record.
service based on Microsoft’s SQL Server
DBMS. Database designers monitor their data model with an
entity relationship diagram

Entity-relationship Diagram (ERD) –shows the


relationships of entity sets stored in a database. Boxes
Database Management System Capabilities represent entities and the lines connecting the boxes
represent the
TYPES OF NETWORKS

relationships: the one-to-one relationship is


represented by a line connecting two entities that end in
two short marks while the one-to-many relationship is
represented by a line connecting two entities that end with
a crow’s foot topped by a short mark.

MODULE 2 LESSON 4 NETWORK TECHNOLOGIES


AND MANAGEMENT

Key Digital Networking Technologies TRANSMISSION MEDIA AND TRANSMISSION SPEED

Client/Server Computing - has largely replaced Bandwidth: Transmission Speed The total amount of
centralized mainframe computing in which nearly all of the digital information that can be transmitted through any
processing takes place on a central large mainframe telecommunications medium is measured in bits per
computer. Client/server computing has extended second (bps).
computing to departments, workgroups, factory floors, and
other parts of the business that could not be served by a
centralized architecture. Table 2.4.1. Physical Transmission Media
Packet Switching - is a method of slicing digital
messages into parcels called packets, sending the
packets along different communication paths as they
become available, and then reassembling the packets
once they arrive at their destinations.

TCP/IP and Connectivity


In a typical telecommunications network, diverse hardware
and software components need to work together to
transmit information.

TCP/IP uses a suite of protocols, the main ones being


TCP and IP. TCP refers to the Transmission Control The Global Internet
Protocol, which handles the movement of data between
computers. TCP establishes a connection between the
computers, sequences the transfer of packets, and What is the Internet?
acknowledges the packets sent.
The Internet has become the world’s most extensive,
1. Application layer public communication system that now rivals the global
The Application layer enables client application programs telephone system in reach and range. It’s also the world’s
to access the other layers and defines the protocols that largest implementation of client/server computing and
applications use to exchange data. internetworking, linking millions of individual networks all
2. Transport layer over the world.
The Transport layer is responsible for providing the
Application layer with communication and packet services. An Internet service provider (ISP) is a commercial
organization with a permanent connection to the Internet
3. Internet layer that sells temporary connections to retail subscribers.
The Internet layer is responsible for addressing, routing,
and packaging data packets called IP datagrams. Digital subscriber line (DSL) technologies operate over
4. Network Interface layer existing telephone lines to carry voice, data, and video at
At the bottom of the reference model, the Network transmission rates ranging from 385 Kbps all the way up
Interface layer is responsible for placing packets on and
receiving them from the network medium, which could be to 40 Mbps, depending on usage patterns and distance.

any networking technology. INTERNET ADDRESSING AND ARCHITECTURE

COMMUNICATIONS NETWORKS SIGNALS: DIGITAL The Internet is based on the TCP/IP networking protocol
VS. ANALOG suite described earlier in this chapter.

The Domain Name System


There are two ways to communicate a message in a converts domain names to IP addresses. The domain
network: either using an analog signal or a digital signal. name is the English-like name that corresponds to the
unique 32-bit numeric IP address for each computer
An analog signal is represented by a continuous connected to the Internet.
waveform that passes through a communications medium
and has been used for voice communication. top-level domains that use non-English characters
(ICANN, 2010). In the future, this list will expand to include
A digital signal is a discrete, binary waveform, rather than many more types of organizations and industries.
a continuous waveform. Digital signals communicate
information as strings of two discrete states: one bit and
zero bits, which are represented as on-off electrical ● .com - Commercial organizations/businesses
pulses. ● .edu - Educational institutions
● .gov - U.S. government agencies meter area using low-power, radio-based communication
● .mil - U.S. military and can transmit up to 722 Kbps in the 2.4-GHz band.
● .net - Network computers .org - Nonprofit
organizations and foundations Wi-Fi and Wireless Internet Access
● .biz - Business firms The 802.11 sets of standards for wireless LANs and
● .info - Information providers wireless Internet access is also known as Wi-Fi. The first
of these standards to be widely adopted was 802.11b,
which can transmit up to 11 Mbps in the unlicensed 2.4-
GHz band and has an effective distance of 30 to 50
meters.
INTERNET SERVICES AND COMMUNICATION TOOLS
Hotspots typically consist of one or more access points
The Internet is based on client/server technology. providing wireless Internet access in a public place. Some
Individuals using the Internet control what they do through hotspots are free or do not require any additional software
client applications on their computers, such as Web to use; others may require activation and the
browser software. The data, including e-mail messages establishment of a user account by providing a credit card
and Web pages, are stored on servers. number over the Web.

RFID and wireless sensor networks

Radio Frequency Identification (RFID) Radiofrequency


identification (RFID) systems provide a powerful
technology for tracking the movement of goods throughout
the supply chain. RFID systems use tiny tags with
embedded microchips containing data about an item and
its location to transmit radio signals over a short distance
to RFID readers.

Voice over IP
delivers voice information in digital form using packet
switching, avoiding the tolls charged by local and long-
distance telephone networks.
A virtual private network (VPN) is a secure, encrypted,
private network that has been configured within a public
network to take advantage of the economies of scale and
management facilities of large networks, such as the
Internet.

THE WEB
The Web is the most popular Internet service. It’s a
system with universally accepted standards for storing,
retrieving, formatting, and displaying information using a
client/server architecture.

uniform resource locator (URL). When typed into a MODULE 2 LESSON 5 - PEOPLEWARE
browser, a URL tells the browser software exactly where
to look for the information. Systems Analyst
The major role of a systems analyst is to identify the
business needs of the organization and come up with new
or improved computer-based systems to address the
needs identified during the analysis phase. In general, an
Web Servers analyst should have a thorough understanding of the
A Web server is a software for locating and managing business, its business processes, and the ability to
stored Web pages. It locates the Web pages requested by document them.
a user on the computer where they are stored and delivers
the Web pages to the user’s computer. Programmer
Programmers are responsible for writing the computer
Google search engine code of the information system. They should be adept at
is continuously crawling the Web, indexing the content of solving complex processes and converting them into code
each page, calculating its popularity, and storing the snippets. Most programmers are intelligent in
pages so that it can respond quickly to user requests to mathematical concepts since most of the programming
see a page. The entire process takes about one-half languages have this.

second. Computer Engineer


design the devices that we are using in our daily life.
THE WIRELESS REVOLUTION There are several computer engineers who are skilled in
different types of systems and devices.
Bluetooth
is the popular name for the 802.15 wireless networking They are categorized on nature of their jobs:
standard, which is useful for creating small personal area
networks (PANs). It links up to eight devices within a 10- Hardware engineer Designing hardware components like
microprocessors is one of the fortes of a hardware
engineer. Their aim is to create an edge in computing
technology by working on existing hardware components
to work faster.
Software engineer Creating programming languages and
operating systems are the responsibilities of a software
engineer. They develop new software that runs on the
hardware developed by other engineers.
Systems engineer Networking requirements are usually
studied by network engineers.They need to comprehend
the organization’s needs and help design a
communications system to meet its needs using
networking software and hardware available in the market.

Information-Systems Operations and Administration

The second group of professionals is responsible to keep


the systems running in the data to day operations and
administration of IT.

Computer Operator
One of the major jobs of a computer operator is to keep
the large computers running and to oversee the
mainframe computers and data centers in organizations.

Database Administrator
are responsible for the creation and maintenance of
databases in an organization that are used as part of the
applications or data warehouse.

Helpdesk/Support Analyst
Helpdesk workers are responsible for answering queries
from computer users who are experiencing problems or
need assistance about a certain issue.

Trainer
When an information system is ready for deployment,
trainers conduct classes to teach people specific computer
skills.

Managing Information Systems


The management of information-systems functions is
critical to the success of information systems within the
organization.

Here are some of the jobs associated with the


management of information systems.

Chief Information Officer (CIO)


His tasks include budgeting, personnel decisions, and
strategic planning for the information system. He also
oversees what technology should be integrated into the
organization. He also aligns the plans and operations of
information systems to the strategic goals of the
organization.

Project Managers
are the ones who ensure that they keep the project on
time and on budget. He works with the stakeholders of the
project to keep the team in order and based on the
stipulated completion time, he communicates the status of
the project to the management.

Information Security Officer


The one who oversees setting information security policies
and guidelines for an organization is the information
security officer.

You might also like