Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views49 pages

Information System

The document outlines various types of information systems, including Transaction Processing Systems, Enterprise Resource Planning Systems, and Customer Relationship Management Systems. It also covers computer system components such as input devices, the Central Processing Unit, storage devices, and types of software, distinguishing between system software and application software. Additionally, it discusses network types, protocols, and security, emphasizing the importance of protecting sensitive data and ensuring effective communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views49 pages

Information System

The document outlines various types of information systems, including Transaction Processing Systems, Enterprise Resource Planning Systems, and Customer Relationship Management Systems. It also covers computer system components such as input devices, the Central Processing Unit, storage devices, and types of software, distinguishing between system software and application software. Additionally, it discusses network types, protocols, and security, emphasizing the importance of protecting sensitive data and ensuring effective communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 49
Ca Types of Information Systems ? v¥ Transaction Processing Systems (TPS): Manage day-to-day transactions. v Enterprise Resource Planning (ERP) Systems: Integrate core business processes across the organization. v Management Information Systems (MIS): Summarize transaction data for management decisions. v Decision Support Systems (DSS): Help with decision-making in complex situations. v¥ Customer Relationship Management (CRM) Systems: Manage interactions with customers. chapter 2 Computer System Components chapter 3 Input Devices Vv Input Devices: Entering Data into the System Vv Definition: Input devices allow users to send data into the computer system for processing. V Examples: ¥ Keyboard: Used for typing text and commands. ¥ Mouse: Used for pointing, selecting, and navigating. v Scanner: Converts physical documents into digital format. Vv Microphone: Captures audio data for processing. Central Processing Unit (CPU) V Arithmetic/logic unit (ALU) ¥_ Performs mathematical calculations V Makes logical comparisons ¥ Control unit v Sequentially accesses and decodes program instructions Vv Coordinates flow of data in and out of the ALU, registers, primary storage, secondary storage, output devices vRegisters Vv High-speed storage areas ¥ Temporarily hold small units of program instructions Storage Devices ¥ Storage Devices: Storing Data for Access and Retrieval ¥ Definition: Storage devices hold data either temporarily (in RAM) or permanently (in secondary storage). v Types of Storage: v Primary Storage (RAM): Temporarily stores data for fast access during processing. v Secondary Storage: Long-term data storage, including devices like: Hard Disk Drive (HDD) Solid-State Drive (SSD) VUSB Flash Drive Primary Storage ¥ Holds program instructions and data immediately before or immediately after the registers ¥A\Iso called memory or main memory ¥ Closely associated with the CPU Secondary Storage ¥ The portion of the computer that holds large amounts of data, instructions, and information more permanently than does main memory vVAlso called permanent storage Output Devices ¥ Output Devices: Communicating the Results of Processing ¥ Definition: Output devices display or send data after it has been processed by the system. v Examples: ¥ Monitor: Displays visual output such as text, images, and videos. Vv Printer: Produces hard copies of digital documents. ¥ Speakers: Provide audio output, such as sound or speech. v. Communication Devices ¥ Communication Devices: Enabling Data Exchange ¥ Slide Content: v Definition: Communication devices allow data to be transmitted between computers and external networks. v Example: Vv Modem: Converts digital signals from the computer to analog signals for transmission over phone lines (and vice versa). V Network Interface Card (NIC): Connects the computer to a network for data exchange. Execution of an Instruction ¥ The execution of any machine-level instruction involves two phases: the instruction phase and the execution phase. ¥ Instruction phase Vv Step 1: Fetch instruction : The instruction to be executed is accessed from the memory by the control unit. ¥ Step 2: Decode instruction: The instruction is decoded so the central processor can understand what is to be done, relevant data is moved from memory to the register area, and the location of the next instruction is identified. V Instruction time (I-time): The time to complete the instruction phase Execution of an Instruction vExecution phase Vv Step 3: Execute instruction: The ALU performs mathematical calculation or logical comparisons, if there are any. v Step 4: Store results: Store Results: The results are stored in registers or memory. vExecution time (E-time): The time to complete the execution phase Processing device (2) Decode (3) Execute | I-time E-time (1) Fetch (4) Stere | Machine Cycle Time Machine Cycle Time: Speed of Instruction Execution ¥ Definition: Machine cycle time refers to the time taken by the CPU to complete one cycle of fetching, decoding, and executing an instruction. ¥ Stages of Machine Cycle: 1. Fetch Retrieving the instruction from memory. 2. Decode: Interpreting the instruction. 3. Execute Carrying out the operation (e.g., arithmetic, logic), 4. Store: Saving the result in memory or registers. ¥ Importance: A faster machine cycle time leads to better performance and quicker execution of instructions. Machine Cycle Time V Measured in fractions of a second Vv Millisecond - one thousandth of one second y¥ Microsecond - one millionth of one second v Nanosecond - one billionth of one second y¥ Picosecond - one trillionth of one second V Or in terms of instructions per second ¥ MIPS- millions of instructions per second Clock Speed ¥ Definition: Clock speed refers to the rate at which the CPU's clock generates pulses, determining the number of cycles per second (measured in Hertz, Hz). ¥ Importance: A higher clock speed means that the CPU can execute more instructions per second, resulting in faster performance. ¥ Typical Clock Speeds: Modern processors typically have clock speeds ranging from 1 GHz (1 billion cycles per second) to 5 GHz. Clock Speed vV How It Affects Performance: Directly influences the speed of instruction execution. VA higher clock speed can lead to faster processing, but it must be balanced with other factors like heat dissipation and power consumption. v Microcode v Predetermined internal instructions executed in accordance with clock speed V Often measured in megahertz (MHz) or millions of cycles per second; ranges from 20 MHz to over 200 MHz for PCs e Wordlength VBit Vv Abinary digit: 0 or 1 ¥Wordlength Vv Refers to the number of bits the CPU can process or manipulate at one time (e.g., 32-bit, 64-bit). VA larger wordlength allows the CPU to process more data at once, leading to better performance and greater memory addressing capability. < es Storage Capacity and Units of Measurement ¥ Byte: A byte is a basic unit of storage in a computer system. V 1 Byte = 8Bits ¥ Abit is the smallest unit of data in computing, representing a binary value (0 or). ¥ Higher Storage Units: ¥_ Kilobyte (KB): 1,024 Bytes v¥ Megabyte (MB): 1,024 Kilobytes (KB) V_ Gigabyte (GB): 1,024 Megabytes (MB) V_ Terabyte (TB): 1,024 Gigabytes (GB) ¥ How It Works: The larger the unit, the greater the storage capacity. For example, a Terabyte (TB) can store much more data than a Gigabyte (GB), which stores more than a Megabyte (MB). Memory Vv Types of memory v Random access memory (RAM) VTemporary and volatile v Read-only memory (ROM) vPermanent and non-volatile v¥ Cache memory High-speed, quicker access than main memory Multiprocessing ¥ Processing that occurs using more than one processing unit ¥ Coprocessor v Aprocessor that speeds processing by executing specific types of instructions while the CPU works on another processing activity Parallel Processing Speeds processing by linking several processors to operate at the same time Parallel Processing V Shared memory processing (SMP) Vv Involves fewer processors and a common pool of main memory v_ An independent task runs on each processor ¥ Massively parallel processing (MPP) Vv Involves hundreds or thousands of microprocessor chips assigned to do the computing for a single program i Types of Software chapter s v System Software : The programs directly related to the computer hardware and perform tasks associated with controlling and utilizing computer hardware Vv Application Software: An application is a job or task a user wants to accomplish through a computer. Application software are programs that help a user perform a specific job. System software v System software is computer software designed to operate the computer hardware, to provide basic functionality, and to provide a platform for running application software. vSystem software includes device drivers, operating systems, servers, utilities, and window systems. vSystem software is responsible for managing a variety of independent hardware components, so that they can work together harmoniously. System Software v System control programs ¥ controls the execution of programs, manage the storage & processing resources of the computer & perform other management & monitoring function. ¥ The most important of these programs is the operating system. v System support programs ¥ provide routine service functions to the other computer programs & computer users: E.g. Utilities, libraries, Ex:Text editors, language translators such as BASIC interpreter v System Development Programs ¥ They assists in the creation of computer programs. v Examples of system development are - programming language, language Application software vV Application software are the software that are designed to satisfy a particular need of a particular environment. VAIl software prepared by us in the computer lab. v Examples of application software are-student record software, railway reservation software, income tax software, word processors etc. vExamples include enterprise software, accounting software, office suites, graphics software and media players. Application Software V Application Software Examples: v a4 444244 Opera (Web Browser) Microsoft Word (Word Processing) Microsoft Excel (Spreadsheet software) MySQL (Database Software) Microsoft Powerpoint (Presentation Software) iTunes (Music / Sound Software) VLC Media Player (Audio / Video Software) World of Warcraft (Game Software) Adobe Photoshop (Graphics Software) Types of Software Computer Games Internet Browsers Utilities Operating \ Application System } Software Hardware ‘System Software Databases s Application Software and Operating System v When the application software requires system resources (like memory, CPU time, or storage), it communicates with the operating system (OS). V The OS provides the application with the necessary resources and manages tasks like running processes, accessing files, and handling input/output requests. ¥ For instance, when the user saves a document in a word processor, the application sends a request to the OS to store the file on the hard drive. Types of Software v System Software : The programs directly related to the computer hardware and perform tasks associated with controlling and utilizing computer hardware V Application Software: An application is a job or task a user wants to accomplish through a computer. Application software are programs that help a user perform a specific job. The Basics of Application Software Software Ownership Rights: Specify the allowable use of the program ¥ Software license ¥ Gives you the right to use a software program ¥ Specifies the conditions under which the buyer can use the software. ¥ Open source software ¥ Programs with source code made available to the general public rae The Basi Basics of Application Software By ilad softwere develoned and adage “Bs CS Rec ical comes witha single-usercense Shareware Freeware Public Domain Software thats not copyrighted and ownership Software en Meera wubliedenn te ere > Installed vs. Cloud Software ¥ Installed Software ¥ Must be installed on the computer before itcan be run. v Can be purchased in physical form. v Canbe downloaded from the internet. Packaged varsion willbo Dowrlcadad vorsian will be ‘honed ath shal eh capa > Installed vs. Cloud Software ¥ Cloud Software gst / ¥ Is delivered on-demand via the Web FWD v Also called Software as a Service (SaaS) and cloudware v Includes free software and fee-based software V Advantages of cloud software Vv Files can be accessed from any computer with an internet connection ¥ Ease of implementation Vv Improved collaboration capabilities Vv Always working with the most current version of software Installed vs. Cloud Software v Potential disadvantages of cloud software Vv Online applications tend to run more slowly v Have file size limits Vv Cost may eventually exceed the cost of purchasing a similar installed version of the software Types of Transmission Media VWired Media: cha pter 5 v Twisted Pair Cable: ¥ Commonly used for telephone lines and networking Y Composed of two insulated copper wires twisted together. v_ Vulnerable to electromagnetic interference v Coaxial Cable: ¥_ Used for cable television, broadband internet, and networking, V_ Provides better shielding against interference than twisted pair. v Fiber Optic Cable: ¥ Uses light to transmit data, offering extremely high speeds and long-distance capabilities. V_ Less susceptible to interference, high bandwidth V Ideal for high-performance network backbones and long-distance commmunic: Types of Transmission Media vWireless Media: v Radio Waves: v Used in Wi-Fi, Bluetooth, and mobile networks. v Affected by range, interference, and obstructions. Vv Microwaves: Vv High-frequency signals for point-to-point communication. ¥ Used in satellite communications and terrestrial microwave systems. Vinfrared: y¥ Short-range communication, often used for remote controls and device pairing. Y¥ Limited by line-of-sight and distance. Telecommunications Equipment Vv Modems: Convert digital data to analog signals and vice versa for transmission over phone lines. VRouters and Switches: Direct data to the correct destination across networks. V Repeaters: Amplify signals to extend the range of transmission. Types of Networks v Personal Area Network (PAN): ¥ Small network for personal devices (e.9., Bluetooth between a smartphone and a laptop). ¥ Local Area Network (LAN): Vv Anetwork within a small geographic area (e.9., within a home, office, or building). V_ Typically connects computers and devices for resource sharing {e.g., printers, files). ¥ Wide Area Network (WAN): v Anetwork that spanslarge geographical areas, often connecting multiple LANs (e.9., the internet). ¥ Metropolitan Area Network (MAN): Vv Anetwork that covers a larger geegraphical area than a LAN but smaller than a WAN (e.g., city-wide networks). IP Address Vv Definition: An IP address is a unique identifier assigned to each device connected to a network, allowing it to communicate with other devices over the ¥ Key Functions: v¥ Routing: Helps route data to the correct destination device on the network. v Identification: Identifies devices on the internet and allows communication between them. Domain Name ¥ Adomain name is a human-readable address that maps to an IP address, making it easier for users to navigate the internet. ¥ Domain names are used to access websites (e.g., www.google.com). v Structure of a Domain Name: V¥ Top-Level Domain (TLD): The suffix (@.g.,.com, .org, .net, .edu). v_ Second-Level Domain: The part of the domain that identifies the organization or resource (e.g., google). V_ Subdomain: Optional prefix used! to organize or categorize content (e.9., mail.google. com). v DNS (Domain Name System): ¥ Asystem that translates domain names into IP addresses. V_ Allows usersto access websites using easy-to-remember names instead of numeric IP addresses. > Network Protocols and Standards v What are Protocols? v¥ Protocols define the rules and conventions for communication between devices ina network. ¥ TCP/IP (Transmission Control Protocol/Internet Protocol): The fundam ental protocol for the internet. v HTTP/HTTPS: Protocols for accessing web pages and secure communication over the web. v Common Network Protocols: ¥_ FTP (File Transfer Protocol): For transferring files over a network. ¥_ SMTP (Simple Mail Transfer Protocol): Used for email transmission. V¥_DNS (Domain Name System): Translates domain names into IP addresses, ¥ Standards Organizations: V_ IEEE Institute of Electrical and Electronics Engineers, responsible for networking standards tke WI-FI Network Architecture V Refers to the design of a network, including its components, structure, and protocols. ¥ Client-Server Architecture: A centralized approach where clients request services from a server. v Peer-to-Peer (P2P) Architecture: Decentralized architecture where devices share resources without a central server. >? Network Architecture veccrargonen aman, Sri a Client-Server Architecture Peer-to-Peer (P2P) Architecture (a _] tae Sl al hem aia ene a Network Topologies v Bus Topology: A single central cable connects all devices. v Star Topology: All devices connect to a central device (e.g., a switch or hub). Vv Ring Topology: Devices form a circular connection where data travels in one direction. ¥ Mesh Topology: Uses direct communications lines to connect some or all of the computers in the ring to each other. Every device is connected to every other device in the network. Network Topologies > Network Security V importance of network security V_ Protests sensitive data, prevents unauthorized access, and ensures the integrity of communications. vTypes of Threats: Vv Malware: Software designed to disrupt or damage systems (e.g., viruses, ransomware). ¥_ Phishing: Fraudulent atternptsto obtain sensitive information by pretendingtobea trustworthy entity. Denial of Service (DoS): Attacks that overwhelm a network or server, making it unavailable. < Security Measures ¥ Encryption: The process of encoding data to prevent unauthorized access. v Firewalls: Devices or software that monitor and control incoming and outgoing network traffic. Vv Antivirus and Anti-malware Software: Programs designed to detect and eliminate threats. > Comparing Internet, Intranet, and Extranet ¥ Internet: V_ Public: Opentoanyone with access, ¥ Global Scope: Connects users and devices worldwide. V_ Unrestricted Access: Anyone can access and use it. ¥ Intranet: Vv Private: Restricted to an organization's internalusers. V_ Local Scope: Limited to the organization's premises or network. Vv Secure: Requires authentication and is protected by firewalls. v Extranet: Vv Sermi-Private: Limited accessto external users (partners, ‘suppliers, customers). Vv Collaborative: Enables collaboration between internal and external users. V Controlled Access: Uses VPNs or secure login protocols for anrese INTERNET EXTRANET

You might also like