Professional Documents
Culture Documents
Notes On Chapters 1, 2, 3, 6, 7, 8 & 10
Notes On Chapters 1, 2, 3, 6, 7, 8 & 10
Hardware
Input: entering data into a computer e.g. mouse, keyboard
Control: Coordinates the operations of input, processing, output and storage. Part of the CPU
organises the flow of data.
Analysing
It is the process which interprets data, transferring it into information. It involves examining data
and giving meaning to it. When data has been ordered and given some meaning by people, it is
called information.
Processing
Processing is the manipulation of data and information. It occurs whenever the data or information
is modified and updated. It carried out by the CPU.
Displaying
Displaying is the presentation of information from an information system. It must be well organised,
attractively presented and easy to read and understand. It can be displayed via screens, printers,
speakers and plotters.
Data needs to be entered into the information system in correct form. When data is entered into the
information system it is organised as a particular video type. The data type describes the kind of
data, such as images, audio, video, text or numbers.
Images are data in the form of pictures, such as drawings, paintings or photographs
Audio is the data in the form of sounds
Video is the data in the form of pictures AND sounds combined and displayed over time
Text is the data in the form of predefined characters, letters and numbers
Numbers are the data in the form of predefined characters whose meaning and format are
specified
Information
Information is an important factor in an organisations current and future success. Information is an
asset and there are substantial costs associated with its collection, maintenance and storage.
Information will be valuable if it is:
Examples
Powers 26 25 24 23 22 21 20
of 2
Value 64 32 16 8 4 2 1
Binary 1 0 0 1 1 1 0
Number
64 + 8 + 4 + 2
= 7810
Powers 26 25 24 23 22 21 20
of 2
Value 64 32 16 8 4 2 1
64 + 32 + 8 + 4 + 1
= 11011012
So, the decimal number 109 equals to the binary number 1101101
Examples
= 691710
= 1A716
Passwords
PIN numbers
Biometric devices
Data encryption
Firewalls
Waste/ shredding
Backup procedures
People in the information system
Computer crime provides our society with a different issue. First, even though hundreds of cases of
computer crimes are reported each year, many crimes go unreported.
Data Accuracy
Organisations can provide access to information they have not created, for example, by including a
link to their Website. Today, there is a huge amount of information and it is relatively easy to publish
on the internet. As a result, there is no guarantee that all information is accurate or reliable, and it is
difficult to check in a reasonable amount of time.
Data validation
The accuracy of the data must be checked before it is processed into information. This is called data
validity. Data validation can be built into a software application. Some of the examples are listed
below:
Range checks are used if the data we restricted to a small range of a particular value. E.g.
21/02/2001 is acceptable whereas 21/13/2001 is not
List checks are used when the data can be compared to a set of accepted data. NSW is
accepted but 2SW is not
Type checks are used to determine whether the data is correct
Check digits are a number calculated from the digits of a code number and then added to
that number as an extra digit
Copyright
Copyright is the right to use copy or control the work of authors and artists, including software
developers. It is indicated by the © symbol. In Australia, the copyright act regards any original work
as the intellectual property of the person who created the work. Copyright ownership is automatic
and applies whether or whether not the work is accompanied by the copyright symbol.
Copyright protection is not the same for every piece of software. Site licenses permit an organisation
to make a limited number of copies of the software for use on the same site. A site can refer to a
number of buildings, such as a school. Purchasing a site license is cheaper than buying individual
copies of a program. Similarly, a network license allows people to use a program or a network.
Chapter 2- Tools for Information Processes
2.1- Collecting
Hardware
There are many types of hardware collection devices used for different types of data. The devices
that are used specifically to enter data into a computer system are referred to as input devices. An
input device should be convenient to use, reliable and allow data to be entered accurately. The data
may be in a number of forms, including text, numbers, images, audio and video.
Software
Operating Systems
The operating system is the software that supervises and controls the hardware. It is responsible for
controlling all the peripheral devices (input and output devices). The operating system contains
specific software for each type of peripheral device.
On a personal computer, the operating system is usually stored on a hard disk and starts
automatically when the computer is turned on. Loading the operating system into the
computer’s memory is referred to as booting the system. Diagnostic checks on memory
and peripheral devices are performed when booting the system. A small program that initiates the
loading of the operating system is contained in memory.
The operating system provides a convenient interface between the hardware and its user. This is
referred to as the user interface. The first widely used operating system was the OS/360 system. It
was developed in 1964 for all computers in the IBM System/360 family. UNIX is a popular operating
system that can be used on everything from personal computers to mainframes. Like many
mainframe operating systems, UNIX time-shares the host central processing unit (CPU) to be able to
run multiple tasks and support multiple users.
Data Entry
The collection of data involves entering images, audio, video, numbers and text.
Images are created using graphics programs or are captured using a scanner, digital camera,
video camera or the Internet. Clip art refers to prepared pictures that are grouped into
topics such as technology, animals and education. There are millions of clip art drawings and
photos available to suit most purposes.
Video and audio are used in multimedia productions. Data collection should be carefully
planned before any data is entered. The user should clarify a purpose, identify the audience
and gather ideas.
Text and numbers are entered into most software applications. The collection of data for a
database often requires a great deal of research and the use of non-computer tools such as
surveys and interviews. Spread sheets should be carefully planned before data is collected. It
is important to understand the relationships between the data, and how a spread sheet will
solve the problem.
Data needs to be free from bias. Bias means that the data is unfairly skewed or gives too
much weight to a particular result. For example, if a survey about television habits was only
completed by teenagers and the results were generalised to the entire population, it would
have a bias. Several checks should be made to limit the impact of bias.
The accuracy of the collected data is a vital ingredient of an information system. It depends
on the source of the data and whether the data is entered correctly. The accuracy of data is
often difficult to check in a reasonable time. It is often necessary to compare data from a
number of different sources and determine which data is accurate. Data validation
techniques used to check the entry of data includes range checks, list checks, and type
checks and check digits.
Copyright is the right to use copy or control the work of authors and artists. It is against the
law to infringe copyright. You are not allowed to use or copy the work of another person
without their permission. If data is collected from the Internet, it is protected by copyright.
Text and images obtained from a Web site should not be used without acknowledgement or
permission from the owner.
Privacy is the ability of an individual to control personal data. Data collected on individuals is
not always accurate. Inaccuracies can be caused by mistakes in gathering or entering the
data, by a mismatch of the data and the person, or by information being out-of-date. For
example, a car is recorded as stolen, but is later recovered and returned to the owner. If the
data has not been quickly updated, the legal owner runs the risk of being arrested as a car
thief. What opportunities exist to check and change data if it is wrong? Physical privacy is the
ability of an individual to avoid invasion of their personal time, space and property.
Information technology increases the opportunities to invade physical privacy by such
means as computer-generated phone calls, junk mail and electronic junk mail (spamming).
Ergonomics refers to the relationship between people and their work environment. It is the
process of designing or arranging workplaces, products and systems so that they fit the
people who use them. The way a computer is used and the work environment can affect the
body. Participants who enter large volumes of data into information systems need to be
aware of ergonomic issues.
2.2- Analysing
Analysing is the interpretation of data. It involves examining the data and giving meaning to it. When
data has been ordered and given meaning by people it is called information.
Hardware
Analysis depends on the storage and processing capabilities of the information system
Large amounts of storage are needed to receive and retain data over a period of time. If the
primary storage (memory) and secondary storage (storage) resource are abundant, then first
processing is possible
Fast processing is needed to complete the many calculations often required for analysis. This
performed by the Central Processing Unit. Applications requiring complex analysis use
parallel processing. This is the simultaneous processing of instructions using multiple
processors or CPU's. Parallel processing is much faster than using one CPU. This type of
processing is examined later in the computer.
Software
Searching is the process of locating data and information. Most information have a "find"
and "search" command
Sorting is the process of arranging data in a particular order. Sorts are either performed in
ascending order (A-Z or 0-9) or descending order (Z-A or 9-0)
Modelling and simulations are used to make predictions and examine discussions concerning
real situations. A model is a representation of some aspect of the real world and a simulation
is the use of a model
"What- if" predictions are a powerful feature of spread sheet software. The software allows
the user to make changes to one item of data and observing the effects on other items
Charts are a graphical representation of numerical data. The convert data in rows
and columns into a picture that can be read at a glance. Charts make data easier to
understand
Unauthorised analysis of data occurs when people gain access to an information system
The incorrect analysis of data results in accurate information. If data has been poorly
organised or an inappropriate model used to represent a situation, the analysis will be
wrong
Privacy is eroded by linking databases for analysis: Most people in pursuit of society's
benefits readily give information about themselves to selected organisations. They may also
leave a trail or electronic data when they use a credit card, visit the doctor, use the library,
access the internet or subscribe to a magazine
2.3- Organisation
Organisation is the process that arranges, represents and formats data for use by other information
processes. It is carried after the data is collected. Data is digitised using hardware of collection
device.
What is digitalising?
Digitalising is the process of translating data into the binary digits (bits) that can be stored and
processed by a computer. The fact that all data is represented in a series of bits means that a
computer can organise and transmit data of any type.
Hardware
Hardware collection devices organise data by digitising it. Digitising is the process of translating data
into the binary digits (bits) that can be stored and processed by a computer. Every type of data must
be represented digitally in the form of bits to be used by a computer.
Text: All characters such as letters, numerals, punctuation keys, spaces and special symbols
are converted into binary using a standard method of conversion such as ASCII or EBCDIC.
These work by assigning each character with a decimal number and converting this number
into binary code
Images: Images are divided into tiny dots called pixels. One or more bits are assigned to each
pixel. The relationship between the image and the bits in memory is called bit-mapping. The
number of bits assigned to each pixel depends on the number of tones and colours used.
The quality of a digitised image is improved by increasing the number of pixels or increasing
the tones and colour.
Audio: Sound is digitised using a method called sampling. This involves taking a number of
samples or ‘slices’ of the sound wave. This is called the sampling rate. Each sample is
assigned a number of bits. This is called the sample size. Better quality sound is achieved by
increasing the sampling rate and/or the sampling size
Software
Application software organises data.
Multimedia is the presentation of information using text, graphics, animation, audio and
video. It uses at least three of these media types. Data is organised by combining data in
different formats. Audio software is used to organise audio and animation software for
video.
Word processing is the most widely used application software. It allows characters to be
entered and documents to be created. Word processing is used to write letters, reports,
assignments, articles and books. Data is organised when creating and saving a document.
Desktop publishing is the use of specialised software to combine text and graphics to create
a document. It is used to create many different types of publications such as magazines,
newspapers and books. Data is organised by combining data in different formats.
Publications are built by arranging different design elements such as headings, columns of
text and graphics.
A spreadsheet uses a rectangular grid made up of rows and columns to organise and store
data that requires some type of calculation. A cell is the intersection of a row and column.
The organisation of data involves entering data into a cell as a label, value or formula.
Spreadsheets perform calculations on values (numbers) and not labels (text).
Hardware
Volatile means that when the computer is switched off, or the power supply is interpreted, the
contents of the memory are lost. Secondary storage provides a non-volatile and more permanent
storage area than memory
Partition
A partition is area that functions as a separate disk. Each partition is assigned a letter as though it
were a separate disk drive. The size of each partition is variable and must be specified. On IBM
compatible computers, hard disk partitions usually start with the letter "c".
Removable Cartridges
Removable cartridges are disks encased in a metal or plastic cartridge that are removed like a floppy
disk. They are fast, though usually not as fast as fixed cartridges. Zip disks are slightly larger than a 3
and half inch floppy disk and about twice as thick. They can store 100-250Mb of data and have a
transfer rate of 1.4 megabytes per second. Jaz disks can store up to 2GB of data and have a transfer
rate of 5.5MB per second. Jaz disks are suited to storing large files for multimedia graphics and
sound.
Virtual Memory
Virtual memory is a technique used by an operating system to increase the amount of memory. It
works by setting aside part of the hard disk and treating it as though it were memory. A common
method used by operating systems to perform virtual memory is called paging.
Magnetic Tape
Magnetic tape is a long thin strip of plastic coated with a thin layer of magnetic material. This type is
wound onto reels, sometimes in a cartridge. Tape is read, written on a tape device that winds the
tape from one reel to another, causing it to pass a read/write head.
The main disadvantage with magnetic tape is that it uses sequential access to retrieve data. This
form of access starts at the beginning of the tape and reads all the data until the required item is
found. Sequential access is slow, making magnetic tapes unsuitable for data that is updated often.
Optical Disks
An optical disk is storage medium on which data is read and written using laser technology. They are
polycarbonate plastic disks whose surface is coated with a reflected layer of metal.
CD-ROM disks are 12cm wide and capable of storing 650Mb. However, once the data has
been stored on the CD, it is read only and cannot be changed or added to
CD-R disks allow data to be written once but read many times. They are also called WORM
disks. A CD-R drive is required to write data
CD-RW disks allow the user to write, erase and rewrite data. Erasing the disk is achieved by
heating the disk and quickly cooking it. A CD-RW is slower than a hard disk and after
frequent use of areas of the disk tend to become inaccessible
Flash Memory
Flash memory is a non-volatile memory chip that retains data when the power is removed. Flash
memory is erased and written in fixed blocks ranging from 512 bytes to 256 kilobytes. Flash memory
cards look similar to a credit card and some in a variety of formats such as PC cards, Compact Flash
and Smart Media. They are widely used in digital cameras, modems, mobile phones and portable
computers.
Hardware interface software controls the hardware devices used for storage. It is usually
classified as part of the operating system. Each storage device has particular specifications
that are controlled by the hardware interface software.
File management software organises files on a storage medium such as a hard disk. It is
usually part of the operating system. In general, a file is recognised by a file name and
contains either a program or data. Depending on the operating system, the file name can be
between 8 and 255 characters long. There may be thousands of files on a hard disk and to
work effectively the user will need quick access to these files. The files are stored and
organised in folders or directories.
File formats are used for different data types. On many types of computer systems, a file-
name extension is used to identify a file format. Some of the common extensions are BMP,
JPG, GIF and PCT for graphics; WAV, MID and MP3 for audio; MPG and QT for video; and
DOC, TXT and RTF for text files. Image, video and audio files require significantly more
storage than text and numbers.
Security of data and information is a major issue. The cost of replacing stored data that
is deliberately or accidentally damaged is enormous. Data security involves a series
of safeguards to protect data, such as passwords, personal objects, biometric devices,
firewalls, data encryption, and securing waste, carefully screening employees and having
appropriate backup procedures.
Unauthorised retrieval of data refers to people gaining illegal access to information systems.
These people are called hackers. Hackers are often involved in information theft or financial
theft. Their crimes are often not reported due to adverse publicity and are not regarded in
the same light as conventional robbery
2.6- Transmitting and Receiving
Communication Concepts
Serial transfer transmits data 1 bit at a time through a single line. Parallel transfer transmits more
than one bit of data simultaneously using separate lines. Obviously parallel transfer is much quicker
than serial transfer because it can send more than one bit at a time. However parallel transfer is only
used for distances less than a few metres otherwise errors can occur in transmitting the data and the
cabling is too expensive. Serial transmission can be either asynchronous or synchronous. In
asynchronous transmission each byte is identified with special stop and start bits. This has become
the standard for all personal computers. A party is used to check for errors in transmission require all
data to be sent at the same time.
An internal bus is located on the motherboard and links the CPU and memory. These buses
are photochemically edited layers of metal that create electrical channels
An expansion bus connects peripheral devices to the CPU and memory. If the expansion bus
connects directly to the CPU and bypasses RAM it is called a local bus. There are different
types of buses, such as ISA, EISA, and VESA AND PCI.
Peripheral devices are linked to the CPU using expansion slots and plots. An expansion slot is an
opening where the circuit board can be inserted into the motherboard to extend the capabilities of
the computer. The circuit board that is inserted is called an expansion card or expansion board.
A part is a socket to connect peripheral devices; it is usually located at the rear of the system unit.
Parts are either parallel or serial.
Parallel parts transmit 8 bits (1 byte) at a time along an 8 parallel line. They are used to
connect devices that send and receive large amounts of data such as printers and disk drives
Serial parts transmit data one bit at a time using only one communication line. Serial parts
are often called COM or communications parts and assigned a number such as COMI and
CONZ. Serial parts connect any peripheral device, such as a mouse, keyboard, modem or
plotter
Modem
A modem is a device that enables data to be transmitted from one computer to another. The word
modem stands for modulator/demodulator. A modem converts digital signals sent from a computer
into analogue signals suitable for transmission along a telephone line. Analogues systems are pulses
in the form of waves. Depending on the modem uses, they can be electrical pulses or light pulses.
When the signal is received by another modem, it reverses the process by converting the analogue
signal into a digital signal suitable for the receiving computer.
Networks
When a number of computers (or terminals) and their peripheral devices are connected it is called a
network. The devices used to send data to a computer system or receive data from a processor
called terminals. Terminals can either be smart or intelligent or dumb
Smart terminals can be done same low-level processing such as text editing
Intelligent terminals have both memory and processing capabilities
Dumb terminals do not contain a processor and consist of keyboards and monitors
Local Area Networks (LAN'S) connect computers or terminals within a building or group of buildings
on one site. There are 3 advantages of using a LAN.
They allow limited hardware resources such as printers, hard disks and modems to be
shared
They allow application software to be shared
They improve communication among users on the network by allows messages to be sent
and received
Wide Area Networks (WAN's) connect computers over hundreds or thousands of kilometres. WAN's
relied on links such as coaxial cables, fibre optic cables and microwave devices.
2.7- Displaying
Displaying is presenting the output from an information system to meet a given purpose. It is the
presentation of information in the form of text, numerals, images, audio and video. A range of
hardware and software combinations are used to display different types of information.
Hardware
CRT Monitor
A monitor is a screen that uses cathode ray tube (CRT) technology similar to a television. Images are
produced by firing a beam of electrons onto the inside of the screen, which contains a coating
of phosphor The electron beam usually starts in the upper hand corner and moves from left to right
and top to bottom in a series of zig zag lines called a raster scan.
LCD Monitor
The most common types of technology used in flat screens are a liquid crystal display (LCD). It
consists of a layer of crystal material placed between 2 polarising sheets. Light is passed through a
liquid crystal material and current is applied at particular points. This causes the pixel to be
activated.
Lazer Printers
Laser printers use data from the computer to direct a laser beam at a positively charged revolving
drum. Where the drum is charged by the laser beam it attracts toner (powdered ink). The toner is
transferred onto the paper and fused using heat and pressure to form the image. Laser printers print
a complete page at a time. Laser printers used with personal computers print from 4 to 20 pages
per minute while high-speed laser printers can print more than 100 pages per minute. Most laser
printers offer 600–1200 dpi output and use standard size paper. The highest quality models produce
output to rival commercial printing processes.
Speakers
Sounds are produced using a speaker. A small speaker is usually located in most personal computers
inside the system unit. However, high-quality stereo speakers are often connected to the computer
using a port and a sound card. The speakers are sometimes built into the sides of the monitor. In
addition to sounds and music, speakers work with voice output.
Plotters
A plotter is an output device used to produce high-quality drawings such as maps, charts and
building plans. The drawings are often larger than the available paper sizes of a standard printer.
Plotters are operated using commands from the computer and can be used to draw an amazing
array of shapes and figures. There are two different types of plotters: pen plotters and electrostatic
plotters.
A pen plotter produces images using coloured ink pens on the surface of the paper.
Depending on the output, pen plotters are either flatbed or drum. A flatbed plotter looks like
a drafting table with pens suspended over it. The movement of the pens is controlled by the
plotter software. Most flatbed plotters have different coloured pens of different widths.
They are used in engineering and drafting applications. A drum plotter works in the same
way except that the paper is rolled around a drum or cylinder. The pens only move to the
left and right as the drum rotates. The drawings from a drum plotter are restricted to the
width of the printer but are unlimited in length.
An electrostatic plotter creates images by moving paper under a row of wires. When the
wires are given an electrostatic charge they touch the paper and create the drawing.
Electrostatic plotters produce high-quality output and are faster than pen plotters.
Software
Each piece of application software displays data. The chapters in Part 2: Application software
contains detailed information on the display features of various applications. The following is brief
summary.
Reporting is used to organise and display data from a database for printing. Database
management systems allow complete control in the design of a report in either a tabular or
column layout. It is possible to insert headings, sort data, choose fields, switch fields, change
column width and select records. The purpose of the report determines its content, format
and style.
Formatting changes the appearance of the data. Text is formatted by changing the font,
alignment, tabs, indenting, bullets, numbering and style. Additional design elements include
headers and footers, colour, drop caps, text effects, call outs and borders. Numbers in a
spreadsheet are displayed using built-in formats such as currency, percentage or fixed. Page
layout is the arrangement of text and graphics on a page. A publication that is well designed
will convey its message effectively and efficiently.
Spacing between lines of text is altered to improve the appearance and readability of a
document. Character spacing refers to the spacing between individual letters. It is changed
in a number of ways such as scale, points, position and kerning.
Mail merge combines a letter written on a word processor with data from another document
such as a database. It saves time and makes final documents more personal.
Tables are rows and columns of cells that are filled with text and graphics. Text can be
displayed horizontally or vertically, and the width or height of the rows and columns can be
altered. Tables can be sorted in alphabetic, numeric or date order.
Charts are a graphical representation of numerical data. They convert data in rows and
columns into a picture that can be read at a glance. Charts make data easy to understand.
Understanding the
problem- identifying the
requirements of a
system that would solve the
problem
Making decisions-
determining the feasibility of a
new system to solve the problem
Designing solutions- creating the new system
Implementing- using the system to solve the problem
Testing, evaluating and maintaining- the ongoing operation of the system
Requirement report
The requirement report is a statement about the needs of a new system. It outlines the aims and
objectives of the new system and how it will help the organisation. The requirement report also
provides an overview of the new system in terms of the data/information to be used, the
information processes and the information technology required.
Project Plan
A project plan organises the project be specifying who, what, how and when. It includes Gantt
charts, scheduling of tasks, journal and diary entries, a funding management plan and a
communication management plan
Gantt chart
A Gantt cart is a popular way of managing a project. It provides a quick method of determining if the
project is on schedule. Gantt charts are used in meeting to review progress and identify problems. A
Gantt chart is a bar chart with each bar representing a task.
Feasibility Study
A feasibility study is a short report that analyses potential solutions and makes a recommendation
Sections Content
1. Title Page Project name, report title, authors, date
2. Contents A list of report sections and page numbers
3. Problem Definition Exact nature of the problem
4. Requirement Report Aims and objectives of the new system
5. Summary of investigation Overview of the existing system: benefits, costs
and constraints
6. Alternative solutions Details of each new proposed system
7. Recommendations Recommended course of action with justification
8. Project Plan Schedule
9. Appendix Supplementary material such as surveys, Gantt
charts and diagram
The recommendation is based on a number of criteria, such as economic, technical, schedule and
organisational.
Economic: Compares the costs of developing the new system with expected benefits. A
financial analyst is often used to assess economic feasibility. Economic feasibility is also
called cost/benefit analysis.
Technical: Determines the information’s technology requirements of the new system and
the technical demands that will be placed on the new system.
Schedule: Determines whether time is available to implement the new system
Organisational: Determines whether the new system will fit into the organisation and meet
its current goals. It determines if the new system will have enough support to be successfully
implemented.
Analysis
When the detailed analysis is completed, an analysis report is written. It provides more detail than
the feasibility study.
3.4- Designing Solutions
Context Diagrams
A context diagram is a graphical method of representing a system using a single process together
with inputs and outputs (external entities). There are only three symbols in a context diagram: the
process, the data flow and the external entity.
3.5- Implementing
Conversion
Conversion involves changing from the old system to the new system. It must be carefully planned
and executed to avoid errors.
Direct Conversion
Direct conversion involves an immediate change to the new system. A date is chosen on which the
old system ends and the new system begins. All data from the old system is transferred to the new
system. Direct conversion is not popular even though there are minimal transition costs. It does not
allow time to check whether the new system will operate correctly and that participants understand
the system. If the new system fails or problems occur, the old system is not available as a backup.
Parallel Conversion
Parallel conversion involves the old and new systems working together for some time. Participants
can compare the two systems and obtain a good under-standing of the differences between them. If
there are any problems with the new system they can be solved before the old system is
discontinued. However, parallel conversion results in additional workloads for participants as they
must operate both systems. It may also result in confusion about which system has the correct data.
Phased Conversion
Phased conversion involves the gradual implementation of the new system. Certain operations of
the new system are implemented while the remaining operations are completed by the old system.
When one operation of the new system is successful, another operation is implemented until the
new system is fully operational. Each operation is individually tested. If there is a problem with a
certain operation it is possible to switch back to the old system. Unfortunately phased conversion is
often confusing, with some participants working on the old system and some on the new system.
Pilot Conversion
Pilot conversion involves trialling the new system in a small part of the organisation. The old system
is still available if the new fails or experiences problems. Pilot conversion is usually undertaken by a
keen group of participants who appreciate the benefits of the new system. If pilot implementation
works, it is usually easier to motivate the other participants of the organisation to adopt the new
system.
Training Specialist
Training specialists teach participants how to operate their system. Training is needed in the
installation of a new sys-tem and to ensure that the computer is being used efficiently.
Managers
The managers are responsible for the effective use of the system. They oversee the computer
operation and ensure that participants and machines work efficiently. There are many different
types of managers with slightly different roles.
Evaluation
The evaluation determines whether the system is working as expected or if changes are requires. It
occurs after the new system is established and minor problems have been fixed. The systems analyst
often completes an evaluation in consultation with participants
Maintenance
Maintenance is the modification of the system by taking minor improvements. During the operation
of the system, participants may discover deficiencies and suggest improvements. Maintenance may
also involve installing new hardware and upgrading software packages.
Human centred systems are those that make participants work as effective and satisfying as
possible. They allow people to do their work without wasting time and effort dealing with the
information technology
Ergonomics
Ergonomics refers to the relationship between people and their work environment. It is the process
of designing or arranging workplaces, products and systems so that they fit the people that use
them.
Impact of systems on work
Work that is satisfying is the result of a job design that involves a variety of tasks and a balance
between work and rest. When appropriate rest pauses are taken, the effects of fatigue are reduced
and efficiency improves.
Work pressure can cause high levels of stress and adversely affect health and efficiency. There are a
number of factors that influence work pressure, such as workload, job design, social relations and
job security. Undue pressure may result in feelings of anxiety, depression, anger, fatigue, lack of
vigour and confusion.
Multiskilling
The introduction of information systems has improved the skills of people in a number of jobs. It has
also forced people to retrain or risk long term unemployment. When people retrain or learn new
skills it is called multiskilling.
Deskilling
Information systems may have the opposite effect on some jobs, resulting in a job requiring fewer
skills. This is called deskilling.
Telecommuting
Telecommuting is where people work on a personal computer at home and use electronic mail to
communicate with people in the office. It provides participants with flexible hours and savings on
transport, clothing, food and time.
Chapter 6- Databases
6.1- Basic Features
A database is an organised collection of data. Some examples of databases are taxation records,
library catalogue systems, car registration records, student records, CD-ROM encyclopaedias and
census reports.
Data structures
A file is a block of data. When you have done some work on the computer it is stored in a
file. The L-Z telephone book would represent a file. A file in a database is divided into a set of
related records
A record is a collection of facts about one specific entry in a database. Information about a
person in the telephone book is a record. A record is divided into one or more related fields
A field is a specific category of data. The family name, address and telephone number in the
telephone book are all fields. Fields are known as data items or categories, and are made up
of characters
A character is the smallest unit of data that people can handle, and includes letters,
numbers and special symbols
Data dictionaries
The field name is the name of the field. It should be carefully selected to avoid confusion.
Field names should be relatively short, clear and unambiguous.
The data type or field type is the kind of data in the field. Each field stores data of a single
data type. Some common data types are text, number, currency, yes/no and date/time.
The field size, or field width, is the number of characters in each field. To keep the size of the
database small and to help it work faster, the field size should be limited to the smallest
number of characters that can be expected for that field.
The field description specifies the contents of the field.
Database keys
A single key is a field where each item of data is unique. Care must be taken when choosing
a single key, as some fields (such as family name) are not always unique
A composite key, or compound key, is made by joining 2 or more fields together. It is used
when no item in any field can be guaranteed to be unique. For example, a compound key
can be made from fields such as Gender and Date of Birth.
A primary key is a single key or compound key that must have a value. Primary keys cannot
be empty or null
A secondary key is a field that contains useful items of data often used in searches.
Secondary keys are not always unique.
Tables
A table or list organises data into columns (fields) or rows (records). It will display more than one
record but only the number of fields that will fit across the screen.
A form, or label, is used to view enter and change data in a table. It is often used to display the data
for every field in a single record. In most databases, the layout of the form can be changed.
6.2- Modifying a Database
Data is inserted into a field in a table or form by placing the cursor in the desired location. New
records are inserted by moving to the last record and typing in the new data. The user can insert
new records by choosing an appropriate command. It does not matter where the new records are
inserted, as the records can be rearranged by sorting.
Data is deleted from a field in a table or form by placing the cursor to the right of the character to be
deleted and pressing the ‘Backspace’ key. A block of characters can be deleted by selecting the data
and pressing the ‘Delete’ key. The user can replace existing data by selecting the data and typing in
the new data.
To add a field, the user must first decide on the field name, field size and data type. The user will
then need to go back to each record and enter data into that field. Remember, it is convenient to
use a table to enter new data into a single field across many records.
A filter is used to limit the records viewed in the database. Records are filtered by selecting the
records or specifying a certain condition.
Searching
Searching is the process of examining a database in order to retrieve data. The user types in a word
or a string of characters and the DBMS searches though the data looking for a match. It is often
possible to limit the search to a particular field.
Query
A query is a search of a database for records that meet a certain condition. It is a question you ask of
the database.
The data in the query is often called the criteria. There are 3 methods in entering a simple query:
Menu: This is often the easiest way to pose a query but is the least flexible. The DBMS
presents the user with a list of options from which to choose.
Query by example (QBE): This requires the user to enter the criteria against a field. For
example, if you were looking for people who lived in Eastwood, you would type ‘Eastwood’
in the ‘Suburb’ field and leave the remaining fields blank. The DBMS would then search the
database and select all records that have Eastwood in the ‘Suburb’ field.
Query language (QL): This is a specialised language designed to allow users to access
information from the database. It is the most complex method because the user must learn
the language but it provides the most power and flexibility. Different DBMS’s support
different query languages. SQL (Structured Query Language) is a standard query language
but there are different versions of it in use.
Operators
Rational operators (=, <>, <, > <=, >=) are characters or symbols indicating the relationship between
2 expressions.
Wildcard characters represent one or more unknown characters. Some common wildcard characters
are the asterisk (*) that substitutes for any number of characters and the question mark (?) that
substitute for 1 character.
Logistical operators (AND, OR, NOT) are used to combine simple queries so that a search is carried
out on one or more fields.
Operator Description
Relational
= Equal to
<> Not equal to
< Less than
> Greater than
<= Less than or equal to
>= Greater than or equal to
Contains
Does not contain
Begins with
Ends with
Is blank
Is not blank
Logical
AND Together
OR Either one
NOT Exact opposite
6.4- Reporting
A report is the formatted and organised presentation of data. The purpose of a report will determine
its content, format and style.
Report Sections
Report header: Appears once at the beginning of a report.
Page header: Displays information such as title, column headings or any other information
needed at the top of every page.
Page footer: Displays information such as the date, page number or any other information
the user wants at the bottom of every page.
Report footer: Appears once at the end of a report. It displays items such as report totals.
Chapter 7- Spreadsheets
7.2- Formulas
Operator Description Example
Arithmetic
+ addition =6+2 gives 8
- subtraction =6-2 gives 4
* multiplication =6*2 gives 12
/ division =6/2 gives 3
^ exponentiation =6^2 gives 36
% Per cent =15% gives 0.15
Relational
= equal to =3+2=4 gives FALSE
<> not equal to =22-1<> gives TRUE
< less than =22<20 gives FALSE
> greater than =22>20 gives TRUE
<= less than or equal to =15+4<= gives TRUE
>= greater than or equal =15+4>=20 gives FALSE
Text
& text joining =’A=’&FALSE gives A=FALSE
Functions
Functions make calculations easier. Spread sheet programs contain about 100 built-in formulas
known as functions. Functions are used to perform simple or complex calculations. To use a function
you must follow special rules or syntax. Functions consist of a function name such as SUM, a set of
parentheses () and arguments
Relative referencing allows you to copy the mathematical processes in a formula (such as the
operators and functions) while changing the cell references so that they relate to the new
destination cell. Relative referencing is the default option, so no special symbol is required.
The easiest way to create a macro is to record it. The user selects the appropriate “Record macro”
command and enters a name for the macro, so it can be saved as a file. The user then carries out the
desired series of actions which are recorded by the macro recorder. When the actions are
completed, the user stops the macro recorder by selecting the appropriate command or button.
Chapter 8- Graphics
8.3- Bit-mapped Graphics
Graphic format name Extension Description
Bit- map BMP A standard format used by
Microsoft Windows
applications.
PC Paintbrush PCX A common, older format,
compatible with BMP.
Tagged Image File Format TIF A format used for scanned
(TIFF) images up to 300 dpi.
Joint Photographic Experts JPG A compression format used for
Group high quality still images. Widely
used on the internet.
Graphics Interchange GIF A format used mainly for Web
Format graphics
Hypertext is text that includes an embedded link to another piece of text, an image or another web
page.
In lossy compression, some data is actually removed from the file. The resulting file is smaller in size
but the quality is reduced. In lossless compression, no data is deleted, which means the file can be
recovered in its original state. This type of compression works by replacing repeated data with
something that takes up less room.
Cell-based animation involves drawing and displaying individual frames or cells. Each frame is stored
separately and is loaded into a graphics page in primary memory. The animation works by displaying
the first frame from a graphics page while creating the second frame in another graphics page. The
second frame is slightly different to the first frame, depending on the items to be animated. The
second frame is then displayed and the third frame created in the graphics page of the first frame.
Animation occurs by alternating the display of graphics pages. This method of animation requires a
very powerful computer to achieve 30 frames per second.
The sampling rate is the number of times a sample (slice) is taken from the sound wave. During a
sample, the amplitude of the wave (volume) is measured and converted to a number. The higher the
sampling rate, the better the sound. The sampling rate is expressed in kilohertz (kHz), which is
thousands of cycles per second.
The sample size (or bit resolution) is the number of bits per sample. The most common sampling
sizes are 8-bit sound and 16-bit sound. Better quality sound is recorded using 16-bits but for voices
8-bit sound is usually sufficient.
Morphing is the smooth change between two different images. It involves transforming the shape,
size, dimension and colour of one image so it appears to merge into another image.
Warping involves transforming or distorting a portion of an image. It divides the image into objects
that can be manipulated.