Professional Documents
Culture Documents
Module 1. Introduction To Information System
Module 1. Introduction To Information System
Definition of terms:
INFORMATION is termed to as processed data, while data is
considered as raw facts. SYSYTEM is an interrelationship of
resources leading to the achievement of a goal.
COMPONENTS of a SYSTEM
a. GOAL— the objective of the firm
b. RESOURCES — can be considered as your, hardware, software and peopleware.
b.l. Hardware - Physical equipment that makes up a computer system.
b.2. Software - Organized information in the form of operating systems, utilities,
programs, and applications that enable computers to work.
b.3. Peopleware - refer to anything that has to do with the role of people in the
development or use of computer software and hardware systems, including such
issues as developer productivity, teamwork, group dynamics, the psychology of
programming, project management, organizational factors, human interface design,
and human-machine-interaction.
c. INTER-RELATIONSHIP - the means by which every resource communicate with each other.
EDP (electronic data processing) is an infrequently used term for what is today usually called
"IS" (information services or systems) or "MIS" (management information services or systems),
is the processing of data by a computer and its programs in an environment involving electronic
communication. EDP evolved from "DP" (data processing), a term that was created when most
computing input was physically put into the computer in punched card form and output as
punched cards or paper reports.
DATA PROCESSING - Manipulation of input data with an application program to obtain desired output as
an audio/video, graphic, numeric, or text data file.
INPUT — data feed to a system that is transformed by the system to become an output.
2. PROCESS - Sequence of interdependent and linked procedures which, at every stage,
consume one or more resources to convert inputs into outputs.
3. OUTPUT - A result produced by a computer that is internal to the system
One of the important tools in an EDP Environment is the use of electronic devices
which may consist of different types of computers.
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
COMPUTER
Computer is an electronic device that is designed to work with Information. The term
computer is derived from the Latin term 'computare', this means to calculate. Computer
cannot do anything without a Program. Computer is an advanced electronic device that
takes raw data as input from the user and processes these data under the control of set
of instructions (called program) and gives the result (output) and saves output for the
future use.
TYPES OF A COMPUTER
A. Supercomputer
Supercomputer is a broad term for one of the fastest computers currently available. A
supercomputer is a computer that performs at or near the currently highest operational
rate for computers. A supercomputer is typically used for scientific and engineering
applications that must handle very large databases or do a great amount of computation
(or both). Supercomputers are very expensive and are employed for specialized
applications that require immense amounts of mathematical calculations (number
crunching). For example, weather forecasting requires a supercomputer. Other uses of
supercomputers scientific simulations, (animated) graphics, fluid dynamic calculations,
nuclear energy research, electronic design, and analysis of geological data (e.g. in
petrochemical prospecting). As of November 2012, the Titan supercomputer is the fastest
in the world. It is almost 20 billion times faster than the first supercomputer (the CDC
6600).
B. Mainframe was a term originally referring to the cabinet containing the central processor
unit or "rnain frame" of a room-filling Stone Age batch machine. After the emergence of
smaller "minicomputer" designs in the early 1970s, the traditional big iron machines were
described as "mainframe computers" and eventually just as mainframes. Nowadays a
Mainframe is a very large and expensive computer capable of supporting hundreds, or even
thousands, of users simultaneously. The chief difference between a supercomputer and a
mainframe is that a supercomputer channels all its power into executing a few programs as
fast as possible, whereas a mainframe uses its power to execute many programs
concurrently. In some ways, mainframes are more powerful than supercomputers because
they support more simultaneous programs. But supercomputers can execute a single
program faster than a mainframe. The distinction between small mainframes and
minicomputers is vague, depending really on how the manufacturer wants to market its
machines.
Minicomputer
It is a midsize computer. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the distinction
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
D. Workstation
It is a type of computer used for engineering applications (CAD/CAM) , desktop
publishing, software development, and other types of applications that require a
moderate amount of computing power and relatively high quality graphics capabilities.
Workstations generally come with a large, high-resolution graphics screen, at large
amount of RAM, built-in network support, and a graphical user interface. Most
workstations also have a mass storage device such as a disk drive, but a special type of
workstation, called a diskless workstation, comes without a disk drive.
A computer designed for technical or scientific applications. Intended primarily to
be used by one person at a time, they are commonly connected to a local area network
and run multi-user operating systems. Like personal computers, most workstations are
single-user computers. However, workstations are typically linked together to form a
local-area network, although they can also be used as stand-alone systems.
E. Personal computer
It can be defined as a small, relatively inexpensive computer designed for an individual
user. In price, personal computers range anywhere from a few hundred pounds to over
five thousand pounds. All are based on the microprocessor technology that enables
manufacturers to put an entire CPU on one chip. Businesses use personal computers for
word processing, accounting, desktop publishing, and for running spreadsheet and
database management applications. At home, the most popular use for personal
computers is for playing games and recently for surfing the Internet.
1. Tower model The term refers to a computer in which the power supply , motherboard,
and mass storage devices are stacked on top of each other in a cabinet. This is in contrast
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
to desktop models, in which these components are housed in a more compact box. The
main advantage of tower models is that there are fewer space constraints, which makes
installation of additional storage devices easier.
2. Desktop model A computer designed to fit comfortably on top of a desk, typically with
the monitor sitting on top of the computer. Desktop model computers are broad and low,
whereas tower model computers are narrow and tall. Because of their shape, desktop
model computers are generally limited to three internal mass storage devices. Desktop
models designed to be very small are sometimes referred to as slimline models.
S. Subnotebook computer A portable computer that is slightly lighter and smaller than a
full-sized notebook computer. Typically , subnotebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.
6. Hand-held computer A portable computer that is small enough to be held in one's hand.
Although extremely convenient to carry, handheld computers have not replaced
notebook computers because of their small keyboards and screens. The most popular
hand-held computers are those that are specifically designed to provide PIM (personal
information manager) functions, such as a calendar and address book. Some
manufacturers are trying to solve the small keyboard problem by replacing the keyboard
with an electronic pen. However, these pen-based devices rely on handwriting
recognition technologies, which are still in their infancy. Hand-held computers are also
called PDAs, palmtops and pocket computers.
7. Palmtop A small computer that literally fits in your palm. Compared to full-size
computers, palmtops are severely limited, but they are practical for certain functions such
as phone books and calendars. Palmtops that use a pen rather than a keyboard for input
are often called hand-held computers or PDAs. Because of their small size, most palmtop
computers do not include disk drives. However, many contain PCMCIA slots in which you
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
can insert disk drives, modems, memory, and other devices. Palmtops are also called
PDAs, hand-held computers and pocket computers.
8. PDA Short for personal digital assistant, a handheld device that combines computing,
telephone/fax, and networking features. A typical PDA can function as a cellular phone,
fax sender, and personal organizer. Unlike portable computers, most PDAs are pen-based,
using a stylus rather than a keyboard for input. This means that they also incorporate
handwriting recognition features. Some PDAs can also react to voice input by using voice
recognition technologies. The field of PDA was pioneered by Apple Computer, which
introduced the Newton MessagePad in 1993. Shortly thereafter, several other
manufacturers offered similar products. To date, PDAs have had only modest success in
the marketplace, due to their high price tags and limited applications. However, many
experts believe that PDAs will eventually become common gadgets. PDAs are also called
palmtops, hand-held computers and pocket computers.
2. Motherboard - The motherboard is an underlying circuit board that holds all the computer
components together. Computer components, including the CPU, RAM, hard drive and optical
drives, plug into the motherboard. This allows the separate components to interact with each
other to create a fully functional machine. While each computer part has a unique function,
they would be utterly useless without the unifying motherboard.
3. DATA STORAGE — Every computer requires additional storage space, such as hard disk.
Data storage may be fixed, semi fixed or even removable. When a computer is turned on, initial
start-up is executed from storage disks, these is usually called the process of boot strapping or
initial program load. The operating system is then loaded together with the BIOS Setup (Basic
Input/Output System)
then processes the file and replaces it in the memory. The memory provides a
temporary storage that will be eliminated if power is removed from the machine. It is
important to save modified files to the hard drive so that they will be retained if the
power turns off.
2. ROM — Read Only Memory. Data stored in ROM cannot be modified, or can be
modified only slowly or with difficulty, so it is mainly used to distribute firmware
(software that is very closely tied to specific hardware, and unlikely to need frequent
updates).
b. Mass storage device (slower, cheaper, long-term memory): Allows a computer to
permanently retain large amounts of data and programs between jobs. Common mass
storage devices include disk drives and tape drives.
1. Hard Drive - A hard drive provides permanent storage for the operating system,
programs and files on a machine. When files are saved to the hard drive, they are
retained through power outages. New computers are usually equipped with SATA
drives, which have replaced the older IDE drive technology. These drives use slimmer
cables, smaller power connections, and have numerous performance benefits over the
older hard drive types. SATA hard drives do not get as hot and can transfer data faster.
2. CD and DVD drives
3. Floppy disk drive
5. INPUT/OUTPUT DEVICES
The I/O components are used to pass instructions/ information to the computer and to display
or record the output generated by the computer.
a. Input device: Usually a keyboard, a mouse or a touchscreen, the input device is the conduit
through which data and instructions enter a computer.
b. Output device: A display screen (monitor), printer, speaker, or other device that lets you
see what the computer has accomplished.
Website Server Performs the same function as the Stores file on the web. Example: Google
file server. Provides information and Docs
services to external customers and
internal em 10 eesthrou h web a es.
DNS Server Converts server domain names into Converts an easy to remember name such as
their matching IP addresses. www.google.com into its corresponding IP
address. Domain Name System is a program
to find the IP addresses matching the name
you entered. DNS works like an automated
honebook.
Database Server Stores raw data and organizes it in Accounting software, sales automation, and
tables for authorized users to access. online shopping carts. Can exist on a file
server, web server, or dedicated machine.
May be internally developed or built using a
commercial product such as ORACLES L,
IBM Informix DB2.
Application server Application or program server
typically host software programs
that provide application access to
client computers, including
processing of the application
business logic and communication
with the application's database.
Consolidation of applications and
licenses in servers enables
centralized management and a more
secure environment
Print servers Businesses of all sizes requires that
tin ca abili be made available to
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
6. No Intelligence
§ It possess no intelligence of its own. It can only perform what is programmed to
do. Hence, only the user can determine what tasks a computer will perform.
Computers have no sense of meaning, cannot perceive and are only able to make
simple robotic decision about the data they receive.
7. Common Data Used
One item can be involved in several different procedures or accessed, update and
inspected by a number of different users. This can hinder the work of those who need
access to data. As the time is changing, more and more facilities are being added to the
computers they can perform but in practical life many tasks are limited to these basic
operations.
8. Diligence
§ The computer is a machine, does not suffer from the human traits of tiredness. Nor
does it loses concentration even after working continuously for a long time.
§ This characteristic is especially useful for those jobs where same tasks is done again
and again. It can perform long and complex calculations with same speed and accuracy
from the start till the end.
9. Several Storage Capacity
§ The computers have a lot of storage devices which can store a tremendous amount
of data. Data storage is essential function of the computer. Second storage devices
like floppy disk can store a large amount of data permanently.
10. Consistency
§ same output shall be provided as long as same input and program is used
11. No Fee1ing
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
Tape management systems (TMS) and Disk Management Systems (DMS) are used to help retain
control over data files. These automated systems can provide label and tracking management. The
following are some of the common types of data storage media.
1. MAGNETIC HARD DISK
These, metal disks mounted inside a sealed disk drive are high speed devices that are
designed for permanent installation. Hard disks are the most common method of online
data storage. By using a special software, you can cluster drives into high availability
storage arrays. An example is RAID (Redundant Array of Independent Disks)
3. MAGNETIC TAPE
Available in reel or cartridge design, most common method of long term data
storage. Examples include DLT (digital linear tape, 3590 cartridge, VHS videos.
5. FLASH MEMORY
A special type of electronically erasable programmable read-only memory (EEPROM) which
is used for flash BIOS, video cameras and USB hand held memory sticks. The small size
and high capacity can really be a security concern.
6. OPTICAL DISK
With every new application and software there is greater demand for memory capacity. It
is the necessity to store large volume of data that has led to the development of optical
disk storage medium. Optical disks can be divided into the following categories:
a. Compact Disk/ Read only Memory (CD-ROM)
b. Write once, Read Many (WORM)
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
HIERARCHY OF MEMORY
STORAGE
Registers - a small amount of storage
available as part of a CPU that is
preloaded for instant access. A, special,
high-speed storage area within the
CPU. All data must be represented in a
register before it can be processed. For
example, if two numbers are to be
multiplied, both numbers must be in
Areas
registers, and the result is also placed
in a register. (The register can contain
the address of a memory location
where data is stored rather than the
actual data itself.)
• Random Access Memory (RAM): The primary storage is referred to as random access
memory (RAM) because it is possible to randomly select and use any location of the
memory directly store and retrieve data. It takes same time to any address of the
memory as the first address. It is also called read/write memory. The storage of data
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
and instructions inside the primary storage is temporary. It disappears from RAM as
soon as the power to the computer is switched off. The memories, which lose their
content on failure of power supply , are known as volatile memories .
• Read Only Memory (ROM): There is another memory in computer, which is called
Read Only Memory (ROM). The storage of program and data in the ROM is
permanent. The ROM stores some standard processing programs supplied by the
manufacturers to operate the personal computer. The ROM can only be read by the
CPU but it cannot be changed. The basic input/output program is stored in the ROM
that examines and initializes various equipment attached to the PC when the power
switch is ON. The memories, which do not lose their content on failure of power
supply, are known as non-volatile memories.
OTHER DEVICES
Universal Serial Bus (USB) - The most widely used hardware interface for attaching
peripherals to a single standardized interface socket and to improve the plug and play
capabilities by allowing hot swapping; that is, by allowing devices to be connected and
disconnected without rebooting the computer or turning off the device.
The most common type of computer port used in today's computers. It can be used
to connect keyboards, mice, game controllers , printers, scanners , digital cameras,
and removable media drives.
c. Airplane luggage - RFID tags may be placed on checked bags so they can be
easily tracked and located.
d. Toll booth passes - E-ZPass and I-Pass receivers may be placed in automobiles,
allowing cars and trucks to pass through toll booths without needing to stop.
This enables drivers to make toll payments automatically.
e. Credit cards - Some credit cards have built-in RFIDs so they can be "waved"
rather than "swiped" near compatible readers. The SpeedPass wand is an
example of an RFID-only payment device.
f. Animal tags - RFID tags can be placed pet collars to make help identify pets if
they are lost. Tags may also be placed on birds and other animals to help track
them for research purposes.
3. Memory card or flash card is an electronic flash memory data storage device used for
storing digital information. They are commonly used in many electronic devices, including
digital cameras, mobile phones, laptop computers, MP3 players and video game consoles.
They are small, re-recordable, and able to retain data without power.
• A USB flash drive is a data storage device that includes flash memory with an integrated
Universal Serial Bus (USB) interface. USB flash drives are typically removable and
rewritable, and physically much smaller than an optical disc.
RISKS
§ Viruses and other malicious software- Users can bring infected documents from
home to their place of employment or take home a business document to their
infected PC, update the document and return the document to a corporate file
server. Flash drives present a vector for computer viruses that is very difficult to
defend against.
Whenever files are transferred between two machines there is a risk that malware
will be transmitted, and USB memory sticks are no exceptions. Some USB memory
sticks include a physical switch that can put the drive in read-only mode. When
transferring files to an untrusted machine, a drive in read-only mode will prevent
any data to be written to the device.
§ Data Theft- Hackers, corporate spies and disgruntled employees steal data and,
in many cases, there are crimes of opportunity. With a flash drive, any
unattended and unlocked PC with a USB port provides an opportunity for
criminal activity. Social engineering is a tool that can give a hacker physical
access to a corporate PC in order to steal data and plant spyware
§ Data and media loss-The portability of USB flash drives opens another door for
crime-the potential for lost data that can fall into the wrong hands. Most of these
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
devices have little or no security features. If you happen to lose your flash drives
during your morning commute, anyone who picks up the device may be able to
access data on the drive. Corruption of Data- If the drive is improperly unplugged,
then data loss can occur to corruption.
§ Loss of confidentiality
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
Overview
Cloud computing represents a new way to deploy computing technology to give users the ability
to access, work on, share, and store information using the internet. The ideal way to describe
Cloud Computing would be to term it as 'Everything as a Service' (abbreviated as XaaS). The cloud
itself is a complex network of data centers, each composed of thousands of computers working
together that can perform and achieve the functions of a software on a personal or business
computer units by providing users access to a vast number of applications, platforms and services
delivered over the Internet.
physically located at the company's on-site data center or can also be managed and hosted by a
third-party provider.
PUBLIC CLOUD
Public Cloud, also known as External Cloud, is available to the public where data are created and
stored on third-party servers. Service infrastructure belongs to service providers that manage
them and administer pool resources. The need for user companies to buy and maintain their own
hardware is eliminated. It is based on a shared cost model for all the users or in the form of a
licensing policy such as pay per use.
HYBRID CLOUD
Hybrid Cloud encompasses the best features of the above-mentioned cloud computing
deployment models. It allows companies to mix and match the facets of public and private cloud
that best suit their requirements.
IOT
Huawei Cloud is the chosen partner of Fasttrack IT Academy for the deployment of SAP Business
One on Cloud to our university and collegiate partners. Huawei Cloud now distills 30+ years of
accumulated technology, innovation, and expertise in the ICT infrastructure field to offer
customers everything as a service. You can grow your enterprise in the best environment with
stable, secure, and ever-improving Huawei Cloud services and affordable, inclusive Al. It provides
a powerful computing platform and easy-to-use development platform to support Huawei's
fullstack, all-scenario Al strategy.
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
By the end of 2019, Huawei Cloud had launched 200+ cloud services and 190+ solutions. News
agencies, social media platforms, law enforcement, automobile manufacturers, gene sequencing
organizations, financial institutions, and a long list of other industry customers are all benefiting
in significant ways from Huawei Cloud. 3,500 applications were added to the Huawei Cloud
marketplace with offerings from more than 10,000 business partners.
Introduction to SAP
SAP (stands for Systems, Applications and Products in data processing) is a European
multinational software corporation founded in 1972, headquartered in Walldorf,
BadenWurttemberg, Germany with regional offices in 180 countries.
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
It is founded by five IBM engineers namely Hasso Plattner, Klaus Tschira, Claus Wellenreuther,
Dietmar Hopp and Hans-Werner Hector.
It is the recognized leader in providing collaborative business solutions for all types of industries
and for every major market globally.
sponeBusiness
SAP Business One is an ERP (Enterprise Resource Planning) Solution. It is arranged into 15
functional modules, automating the major functions in a business organization. This system
prides itself on having the following characteristics:
Integrated
Real-time
Flexible
Easy to use
Benefits
SAP Business One: On Premise vs. On Cloud
Fasttrack IT Academy formerly offers SAP Business One — On premise with our university and
collegiate partners. To be able to provide our partners with the most recent business solution
trends in the industry, we have decided to open the doors on the latest cloud computing
developments, thus offering SAP Business One on Cloud. The following are the differences
between SAP Business on Premise and SAP Business on Cloud:
Measures On Premise On Cloud
Deployment On premise installation of SAP Business One Through the internet
Accounting Localized / Independent Branch Accounting
Accessibility Limited (within the premises of the installation) Remote access through the internet
Data Storage Hardware Cloud Server
CMPC 323 INTORDUCTION TO INFORMATION SYSTEM
The leader in ERP market share, and the one that invented the market to an extent, is the German
company SAP AG with its R/3 software. Other big players include PeopleSoft Inc., Oracle Corp.,
Baan Co. NV and J.D. Edwards & Co.