Intro IS Module
Intro IS Module
Intro IS Module
The module is organized into 6 chapters. Each chapter is comprised of subtopics. At the end of the
subtopics, exercises are included to assist the students in improving their understanding of the
course..
In this module reader expected to understand an overview of computer and Information Systems
(IS). It includes: the development of computers, data representation, and logical organization of a
computer system, computer software, computer arithmetic, computer system architecture, internet,
computer network and communication, problem solving using computers, operating systems,
windows environment and office application.
Theoretical and conceptual foundations of Information Systems (IS); organizational and
technological aspects of IS; development of IS; overview of database design and management;
telecommunications and networks; applications of IS in business: TPS, MIS, DSS, electronic
commerce, AI, expert systems, virtual reality and other specialized systems; management of IS
resources; overview of software quality and project management; legal, security, social, and ethical
issues in IS; contemporary trends in IS
1|Page
4.4 IS development phases .............................................................................................................. 95
4.5 IS development methodologies ................................................................................................. 97
Chapter 5: Major Issues in Computer and IS ............................................................................................ 106
5.1 Impact of IS ............................................................................................................................. 106
5.2 Computer Ethics, Crime, and Privacy .................................................................................. 108
5.3 Security concerns and security management strategies in e-business applications .......... 112
5.4 Ethical issues in Information system ..................................................................................... 117
Chapter 6: Major Applications and Current trends of Computer and Information Systems ..................... 119
6.1 Office Automation System........................................................................................................ 120
6.2 Transaction Processing System ............................................................................................... 121
6.3 Management Information System ......................................................................................... 122
6.4 Decision Support System ........................................................................................................ 122
References ................................................................................................................................................ 127
The term ‘computer’ is derived from the word ‘compute’, which means to calculate.
Computer is defined as an electronic devices, operating under control of instruction (software)
2|Page
stored in its own memory unit, that can accept data(input), manipulate data (process), and
produce information(output) from processing.
A computer can also be defined as an electronic device which accepts an input, process the
input according the instruction provided and produce the desired output. Computer composed
of hardware device, Software and electric circuit.
Generally, Computer is a device or set of devices that work under the control of a stored
program, automatically accepts and processes data to provide information. It simplifies human
works by automating
A computer is a machine that can:
Accept input. Input could be entered by a human typing at a keyboard, received over
a network, or provided automatically by sensors attached to the computer.
Execute a mechanical procedure, that is, a procedure where each step can be executed
without any thought.
Produce output. Output could be data displayed to a human, but it could also be
anything that effects the world outside the computer such as electrical signals that
control how a device operates.
Functionalities of a Computer
If we look at it in a very broad sense, any digital computer carries out the following five
functions
Step 1 − Takes data as input.
Step 2 − Stores the data/instructions in its memory and uses them as required.
Step 3 − Processes the data and converts it into useful information.
Step 4 − Generates the output.
Step 5 − Controls all the above four steps.
Advantages of Computers
3|Page
Following are certain advantages of computers.
High Speed
Unlike human beings, a computer is free from monotony, tiredness, and lack of
concentration.
It can work continuously without any error and boredom.
It can perform repeated tasks with the same speed and accuracy.
Versatility
4|Page
Computers are designed to make maintenance easy.
Automation
The use of computers for data processing in an organization leads to reduction in paper
work and results in speeding up the process.
As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of paper files gets reduced.
Though the initial investment for installing a computer is high, it substantially reduces
the cost of each of its transaction.
Disadvantages of Computers
The operating environment of the computer should be dust free and suitable.
No Feeling
The history of computers starts out about 2000 years ago in Babylonia (Mesopotamia), at the
birth of the abacus, a wooden rack holding two horizontal wires with beads strung on them.
The first counting device was used by the primitive people. They used sticks, stones and
5|Page
bones as counting tools. As human mind and technology improved with time more
computing devices were developed. Some of the popular computing devices starting with the
first to recent ones are described below;
Abacus
The history of computer begins with the birth of abacus which is believed to be the first
computer. It is said that Chinese invented Abacus around 4,000 years ago.
It was a wooden rack which has metal rods with beads mounted on them. The beads were
moved by the abacus operator according to some rules to perform arithmetic calculations.
Abacus is still used in some countries like China, Russia, Japan and etc . An image of this
tool is shown below;
Napier's Bones
It was a manually-operated calculating device which was invented by John Napier (1550-
1617) of Merchiston. In this calculating tool, he used 9 different ivory strips or bones
marked with numbers to multiply and divide. So, the tool became known as "Napier's
Bones. It was also the first machine to use the decimal point.
6|Page
Pascaline
Pascaline is also known as Arithmetic Machine or Adding Machine. It was invented between
1642 and 1644 by a French mathematician-philosopher Biaise Pascal. It is believed that it
was the first mechanical and automatic calculator.
Pascal invented this machine to help his father, a tax accountant. It could only perform
addition and subtraction. It was a wooden box with a series of gears and wheels. When a
wheel is rotated one revolution, it rotates the neighboring wheel. A series of windows is
given on the top of the wheels to read the totals. An image of this tool is shown below;
Difference Engine
In the early 1820s, it was designed by Charles Babbage who is known as "Father of Modern
Computer". It was a mechanical computer which could perform simple calculations. It was
a steam driven calculating machine designed to solve tables of numbers like logarithm tables.
Analytical Engine
This calculating machine was also developed by Charles Babbage in 1830. It was a
mechanical computer that used punch-cards as input. It was capable of solving any
mathematical problem and storing information as a permanent memory.
8|Page
Tabulating Machine
Differential Analyzer
It was the first electronic computer introduced in the United States in 1930. It was an analog
device invented by Vannevar Bush. This machine has vacuum tubes to switch electrical
signals to perform calculations. It could do 25 calculations in few minutes.
9|Page
Mark I
The next major changes in the history of computer began in 1937 when Howard Aiken
planned to develop a machine that could perform calculations involving large numbers. In
1944, Mark I computer was built as a partnership between IBM and Harvard. It was the first
programmable digital computer.
10 | P a g e
First Generation Computers
The first generation (1946-1959) computers were slow, huge and expensive. In these
computers, vacuum tubes were used as the basic components of CPU and memory. These
computers were mainly depended on batch operating system and punch cards. Magnetic tape
and paper tape were used as output and input devices in this generation; Some of the popular
first generation computers are;
The second generation (1959-1965) was the era of the transistor computers. These computers
used transistors which were cheap, compact and consuming less power; it made transistor
computers faster than the first generation computers.
In this generation, magnetic cores were used as the primary memory and magnetic disc and
tapes were used as the secondary storage. Assembly language and programming languages like
COBOL and FORTRAN, and Batch processing and multiprogramming operating systems
were used in these computers. Some of the popular second generation computers are;
o IBM 1620
o IBM 7094
o CDC 1604
o CDC 3600
o UNIVAC 1108
11 | P a g e
The third generation computers used integrated circuits (ICs) instead of transistors. A single
IC can pack huge number of transistors which increased the power of a computer and reduced
the cost. The computers also became more reliable, efficient and smaller in size. These
generation computers used remote processing, time-sharing, multi programming as operating
system. Also, the high-level programming languages like FORTRON-II TO IV, COBOL,
PASCAL PL/1, ALGOL-68 were used in this generation. Some of the popular third generation
computers are;
o IBM-360 series
o Honeywell-6000 series
o PDP(Personal Data Processor)
o IBM-370/168
o TDC-316
The fourth generation (1971-1980) computers used very large scale integrated (VLSI) circuits;
a chip containing millions of transistors and other circuit elements. These chips made this
generation computers more compact, powerful, fast and affordable. These generation
computers used real time, time sharing and distributed operating system. The programming
languages like C, C++, DBASE were also used in this generation. Some of the popular fourth
generation computers are;
o DEC 10
o STAR 1000
o PDP 11
o CRAY-1(Super Computer)
o CRAY-X-MP(Super Computer)
12 | P a g e
In fifth generation (1980-till date) computers, the VLSI technology was replaced with ULSI
(Ultra Large Scale Integration). It made possible the production of microprocessor chips with
ten million electronic components. This generation computers used parallel processing
hardware and AI (Artificial Intelligence) software. The programming languages used in this
generation were C, C++, Java, .Net, etc. Some of the popular fifth generation computers are;
o Desktop
o Laptop
o NoteBook
o UltraBook
o ChromeBook
Man developed computers so that he could perform intricate operations such as calculation
and data processing or simply for entertainment. Today, computers are everywhere – in
our offices, homes, appliances, automobiles – the list is endless. Much of the world runs
on computers, and computers have profoundly changed our lives, mostly for the better. Let
us discuss some of the characteristics of a computer, which make them an essential part
of every emerging technology and such a desirable tool in human development.
Speed: The computers process data at an extremely fast rate, that is, to the tune of million
instructions per second. In a few seconds, computers can perform such a huge task that a
normal human being may take days or even years to complete. The speed of a computer
is calculated in MHz (Megahertz), that is, one million instructions per second. At present,
a powerful computer can perform billions of operations in just on second.
Accuracy: -Besides the efficiency, the computers are also very accurate. The level of
accuracy depends on the instructions and the type of machines being used. Since we know
that the computer is capable of doing only what it is instructed to do, faulty instructions for
processing the data automatically lead to faulty results. This is known as GIGO, that is,
Garbage In Garbage Out. Errors may occur in the results, but due to increased efficiency
of error-detecting techniques, they can be minimized. Thus, the probability of errors in a
13 | P a g e
computer is negligible. Computers can performing millions of instructions without
commuting any error, or they done their activities without any error/mistake.
Reliability: Generally, reliability is the measurement of the performance of a computer,
which is measured against some predetermined standard for operation without any failure.
The major reason behind the reliability of the computers is that, at hardware level, it does
not require any human intention between its processing operations. Moreover, computers
have the built-in diagnostic capabilities, which help in continuous monitoring of the
system.
It refers to a computer is a trustfulness (acceptance) machine.
Storage Capability: Computers can store large amounts of data and it can recall the required
information almost instantaneously. Anyone can store data in a computer for several years
and you will find it the same whenever you came back your data. Different computers have
different memory and storage capacity. The memory of the computer is relatively small
and it can hold only a certain amount of information, therefore, the data is stored on storage
devices such as CD-ROM and a hard disk. A single CD-ROM can store up the 700 MB of
data while a hard disk can have a capacity of around 80 GB (1 GB=1024 MB). Storage
capacity of a computer is measured by bite, bytes, kilobytes, megabytes, gigabytes and
terabytes. Bite: is the smallest measurement unit of data either 0 or 1 (off or on). Gigabytes
and Terabytes: are the largest measurement units of data. A group of bites is called byte.
8 bites = 1 byte = 1 character, 1KB = 1024 byte, 1MB = 1024 KB , 1GB = 1024 MB ,
1TB = 1024 GB
Versatility: Computers are quite versatile in nature. They can perform multiple tasks
simultaneously with equal ease. For example, at one moment it can be used to prepare a
letter, the other moment it can be used to play music and in between you can print a
document as well. All this work is possible by changing the program (sequence of
instructions for computers). In brief, we can say that a computer can perform various tasks
by reducing the task to a series of logical steps.
Diligence: Computer, being a machine, does not suffer from the human traits of tiredness
and lack of concentration. If four million calculations have to be performed, then the
computer will perform the last four-millionth calculation with the same accuracy and
speed as the first calculation.
14 | P a g e
Automatic: A computer can work without human involvement after starting the
programming.
Computers have certain limitations too. As a machine, a computer can only perform what
it is programmed to do, nothing more and nothing less. It can only operate on the user
provided data, that is, it can accept data, process it, and communicate the results to the
user. In addition, a computer needs well-defined instructions to perform any operation.
Therefore, computers are unable to give anywhere qualitative considerations are important.
For instance, it can make plans based on situations and information though it cannot foresee
whether they will succeed or not. Other limitations of a computer are:
Interpretation of data and implementation of decision is left for human.
Do not provide their own input, unless people provide it with the input.
For the last few decades, computer technology has revolutionized the businesses and other
aspects of human life all over the world. Practically, every company, large or small, is now
directly or indirectly dependent on computers for information processing. Computer systems
also help in the efficient operations of railway and airway reservation, hospital records,
accounts, electronic banking, and so on computers not only save paper work.
The following are some of the capability of Computers, which are reasons to use
Computers.
Store and process large amount of information with high speed and accuracy;
Transmit information across continents via communication channels;
Simulate events;
Perform complex mathematical computations and make comparisons;
Monitor ongoing industrial operations;
Perform repetitive processes with great ease, speed, and reliability;
Therefore, computers are applicable for any functions or process that requires these
abilities. Some of the areas where computers are being used are listed below.
15 | P a g e
Education:
Computers have also revolutionized the whole process of education currently, the
classrooms, libraries, and museums are efficiently utilizing computers to make the
education much more interesting. Unlike recorded television shows, computer-aided
education (CAE) and Computer Based Training (CBT) packages are making learning
much more interactive.
Medicine and Health Care:
There has been an increasing use of computers in the field of medicine. Now, doctors
are using computers right from diagnosing the illness to monitoring patient’s status
during complex surgery. By suing automated imaging techniques, doctors are able to
look inside a person’s body and can study each organ in detail (such as CAT scans
or MRI scans), which was not possible few years ago. There are several examples of
special purpose computers that can operate within the human body such as a cochlear
implant, a special kind of hearing aid that makes it possible for deaf people to hear.
Entertainment:
Computers are finding greater use in entertainment industry. Computers are used to
control the images and sounds. The special effects, which mesmerize the audience,
would not have been possible without the computers. In addition, computerized
animation and colorful graphics have modernized the film industry.
Communication:
E-Mail or Electronic Mail is one of the communication media in which computer is
used. Through e-mail the messages and reports are passed from one person to one or
more persons by the aid of computer and the telephone line. The advantage of this
service is that while transferring the messages it saves time, avoids wastage of paper,
and so on. Moreover, the person who is receiving the messages can read the messages
whenever he is free and can save it, reply it, forward it or delete it from the computer.
Commercial or business applications
Computers are needed to perform business operations that require handling large
amounts of data. Several computer applications are available to assist business in working
with large volumes of data.
Examples are:
16 | P a g e
Text processing
Accounting and Finance management
Inventory control
Database management
Statistical analysis
Scientific-engineering and research application
Computers are using for scientific research, complex mathematical calculations,
design work, and analysis and control of physical system.
Examples are:
o Space technology
o Meteorological observatory system
o Astronomical investigations
o Design of machines and
o Control of manufacturing process
Weather and Environment
Computer equipment may show temperature ranges, precipitation levels and wind flow and
can used in weather forecasting. Computer can also help in overcoming environmental
hazards.
Transportation
Computers have affected almost every kind of transportation. Many aircraft can fly under
the control of the computer; in this situation, the captain simply serves as a manger by
telling the computer what to do. In Cars, computers have provided functional controls such
as spark and fuel control
Household Control
A growing number of the newer houses hold devices are computers controlled. For
example: Security systems, refrigerators, microwave ovens, washers, stereos, and
televisions. This computer controlled home security system monitors movements, broken
17 | P a g e
glass, unlawful entry without a security code, and so on, and alerts the local police
department.
Banking:
In the field of banking and finance, computers are extensively used. People can use the
ATM (Automated Teller Machine) services 24 hours of the day in order to deposit and
withdraw cash. When the different branches of the bank are connected through the
computer networks, then the inter branch transaction such as check and draft can be done
by the computers without any delay.
1.6. Types of computers
These days, computers are available in many sizes and types. You can have a computer
that can fit in the palm of your hand to those that can occupy the entire room; single user
computers can be used by hundreds of users simultaneously. Computers also differ based
on their data processing abilities. Hence, computers can be classified according to purpose,
data handling, and functionality.
1.6.1 Classification of computers According to Purpose
Computers are designed for different purposes. They can be used either for general
purposes or for specific purposes.
A. General Purpose computers:
A general-purpose compute, as the name suggests, is designed to perform a range of
tasks. These computers have the ability to store numerous programs. These machines may
be used for various applications, ranging from scientific as well as business purpose
applications. Even though such computers are versatile, they generally lack in speed and
efficiency. The computers that you use in your schools and homes are general-purpose
computers.
Examples:
Desktops, laptops, smartphones, and tablets are used on daily basis for general purposes.
18 | P a g e
These computers are designed to handle specific problems or to perform a single specific
task. A set of instruction for the specific task is built the machine. Hence, they cannot be
used for other applications unless their circuits are redesigned, that is, they lacked
versatility. However, being designed for specific tasks, they can provide the result very
quickly and efficiently. These computers are used for airline reservations, satellite tracking,
and air traffic control.
Examples:
Different types of computers process the data in a different manner. According to the
basic data handling principle, computers can be classified into three categories: analog,
digital, and hybrid.
1. Analogue Computer
Analogue computers are designed to process analogue data. Analogue data is continuous
data that changes continuously and cannot have discrete values. We can say that analogue
computers are used where we don't need exact values always such as speed, temperature,
pressure and current.
Analogue computers directly accept the data from the measuring device without first
converting it into numbers and codes. They measure the continuous changes in physical
quantity and generally render output as a reading on a dial or
scale. Speedometer and mercury thermometer are examples of analogue computers.
19 | P a g e
Advantages of using analogue computers:
o It allows real-time operations and computation at the same time and continuous
representation of all data within the rage of the analogue machine.
o In some applications, it allows performing calculations without taking the help of
transducers for converting the inputs or outputs to digital electronic form and vice
versa.
o The programmer can scale the problem for the dynamic range of the analogue
computer. It provides insight into the problem and helps understand the errors and their
effects.
o Slide Rules: It is one of the simplest types of mechanical analogue computers. It was
developed to perform basic mathematical calculations. It is made of two rods. To
perform the calculation, the hashed rod is slid to line up with the markings on another
rod.
o Differential Analysers: It was developed to perform differential calculations. It
performs integration using wheel-and-disc mechanisms to solve differential
calculations.
o Castle Clock: It was invented by Al-Jarazi. It was able to save programming
instructions. Its height was around 11 feet and it was provided with the display of time,
the zodiac, and the solar and lunar orbits. This device also could allow users to set the
length of the day as per the current season.
o Electronic Analogue Computer: In this type of analogue computer, electrical signals
flow through capacitors and resistors to simulate physical phenomena. Here, the
mechanical interaction of components does not take place. The voltage of the electrical
signal generates the appropriate displays.
20 | P a g e
2. Digital Computer
Digital computer is designed to perform calculations and logical operations at high speed.
It accepts the raw data as input in the form of digits or binary numbers (0 and 1) and
processes it with programs stored in its memory to produce the output. All modern
computers like laptops, desktops including smartphones that we use at home or office are
digital computers.
21 | P a g e
3. Hybrid Computer
Hybrid computer has features of both analogue and digital computer. It is fast like an
analogue computer and has memory and accuracy like digital computers. It can process
both continuous and discrete data. It accepts analogue signals and convert them into digital
form before processing. So, it is widely used in specialized applications where both
analogue and digital data is processed. For example, a processor is used in petrol pumps
that converts the measurements of fuel flow into quantity and price. Similarly, they are
used in airplanes, hospitals, and scientific applications.
o Its computing speed is very high due to the all-parallel configuration of the
analogue subsystem.
o It produces precise and quick results that are more accurate and useful.
o It has the ability to solve and manage big equation in real-time.
o It helps in the on-line data processing
22 | P a g e
1.6.3 Classification According to Functionality
Based on physical size, performance and application areas, we can divide computers
generally into four major categories: micro, mini, mainframe, and super computers.
A. Supercomputer
Supercomputers are the biggest and fastest computers. They are designed to process huge
amount of data. A supercomputer can process trillions of instructions in a second. It has
thousands of interconnected processors.
o It has the ability to decrypt your password to enhance protection for security
reasons.
o It produces excellent results in animations.
o It is used for virtual testing of nuclear weapons and critical medical tests.
o It can study and understand climate patterns and forecast weather conditions. It can
run in NOAA's system (National Oceanic and Atmospheric Administration) that
can execute any type of simple and logical data.
23 | P a g e
o It helps in designing the flight simulators for pilots at the beginner level for their
training.
o It helps in extracting useful information from data storage centres or cloud system.
For example, in insurance companies.
o It has played a vital role in managing the online currency world such as stock
market and bitcoin.
o It helps in the diagnosis of various critical diseases and in producing accurate results
in brain injuries, strokes, etc.
o It helps in scientific research areas by accurately analysing data obtained from
exploring the solar system, satellites, and movement of Earth.
o It also used in a smog control system where it predicts the level of fog and other
pollutants in the atmosphere.
Super computer
A. Mainframe computer
24 | P a g e
Mainframe computers are designed to support hundreds or thousands of users
simultaneously. They can support multiple programs at the same time. It means they can
execute different processes simultaneously. These features of mainframe computers make
them ideal for big organizations like banking and telecom sectors, which need to manage and
process a high volume of data that requires integer operations such as indexing, comparisons,
etc.
o It can process huge amount of data, e.g. millions of transactions in a second in the
banking sector.
o It has a very long life. It can run smoothly for up to 50 years after proper installation.
o It gives excellent performance with large scale memory management.
o It has the ability to share or distribute its workload among other processors and
input/output terminals.
o There are fewer chances of error or bugs during processing in mainframe computers. If
any error occurs it can fix it quickly without affecting the performance.
o It has the ability to protect the stored data and other ongoing exchange of information
and data.
25 | P a g e
o In the retail sector, the retail companies that have a huge customer base and branches
use mainframe computers to handle and execute information related to their inventory
management, customer management, and huge transactions in a short duration.
B. Miniframe or Minicomputer
Applications of minicomputers:
A minicomputer is mainly used to perform three primary functions, which are as follows:
26 | P a g e
o Process control: It was used for process control in manufacturing. It mainly performs
two primary functions that are collecting data and feedback. If any abnormality occurs
in the process, it is detected by the minicomputer and necessary adjustments are made
accordingly.
o Data management: It is an excellent device for small organizations to collect, store
and share data. Local hospitals and hotels can use it to maintain the records of their
patients and customers respectively.
o Communications Portal: It can also play the role of a communication device in larger
systems by serving as a portal between a human operator and a central processor or
computer.
C. Micro Computers:
A microcomputer is a small, low cast digital computer, which usually consists of a
microprocessor, a storage unit, an input channel, and an output channel, all of which may be on
one chip inserted into one or several PC boards. The addition of a power supply and connecting
cables, appropriate peripherals (keyboard, monitor, printer, disk drives, et.) an operating system
and the software programs can provide a complete micro computer system. The microcomputer
is generally the smallest of the computer family. Originally, they were designed for individual
users only, but nowadays they have become powerful tools for many businesses that, when
networked together, can serve more than one user. Microcomputers include desktop, laptop and
hand-held models such as PDAs (Personal Digital Assistants.)
i. Desktop Computer:
Desktop computer or PC (personal Computer) is the most common microcomputer. It is principally
intended for stand-alone use by an individual. These microcomputers typically consist of a system
27 | P a g e
unit, a display monitor, a keyboard, internal hard disk storage, and other peripheral devices. The
major criterion behind the importance of the PCs is that they are not very expensive to purchase
by the individuals or the small businesses.
ii. Laptop:
A laptop is a portable computer that a user can carry it around. Since the laptop computer resembles
a notebook, they are also known as notebooks. Laptops are small computers enclosing all the basic
features of normal desktop computer. The biggest advantage of this computer is that one can use
this computer anywhere and at anytime. Moreover, these computers do not need any external
power supply, as a rechargeable battery is completely self-supply as them. These computers are
expensive as compared to desktop computers.
iii.Hand-Held Computers:
A hand-held, also called personal Digital Assistant (PDA), is a computer that can conveniently be
stored in a pocket (of sufficient size) and used while the user is holding it. PDAs are essentially
small portable computers and are slightly bigger than the common calculators. Since, these
computers can be easily fitted on the palmtop, they are also known as palmtop computers.
In general, microcomputers are used for
a. Word processing (automated, electronic typing and editing) to prepare letters, reports,
memos and other documents.
b. Computerized worksheet analysis and modeling. This computerizes business planning,
budgeting, and analysis of business performance and assists decision-making activities.
c. Graphics in the generation of charts and other graphic images. This visually enhances
both the analysis and presentation of information in reports and group presentations.
d. Engineering activities. Computer-aided design and analysis can be performed by the use
of powerful microcomputers.
e. Personal and home use. Entertainment, home management, personal finances, education,
and other activities can easily supported by the use of personal computers.
28 | P a g e
Iv Workstation
Any computer that has the following five features, can be termed as a workstation or can be
used as a workstation.
o Multiple Processor Cores: It has more processor cores than simple laptops or
computers.
o ECC RAM: It is provided with Error-correcting code memory that can fix memory
errors before they affect the system's performance.
o RAID (Redundant Array of Independent Disks): It refers to multiple internal hard
drives to store or process data. RAID can be of different types, for example, there can
29 | P a g e
be multiple drives to process data or mirrored drives where if one drive does not work
than other starts functioning.
o SSD: It is better than conventional hard-disk drives. It does not have moving parts, so
the chances of physical failure are very less.
o Optimized, Higher end GPU: It reduces the load on CPU. E.g., CPU has to do less
work while processing the screen output.
30 | P a g e
Chapter 2: Computer Systems
The computer system refers to the computer itself and all the components interconnected to it.
Basically, the computer system is categorized into two components.
Hardware – the physical architecture of the computer or the physical devices that
carry out the activities of capturing, processing, storing and communicating to other
computer.
2.1 Hardware
A hardware upgrade refers to a new hardware, or a replacement for the old one, or
additional hardware developed to improve the performance of the existing hardware. A
common example of a hardware upgrade is a RAM upgrade that increases the computer's
total memory, and video card upgrade, where the old video card is removed and replaced
with the new one. Some of the commonly used hardware in your computer are described
below.
31 | P a g e
CPU is installed or inserted into a CPU socket located on the motherboard.
Furthermore, it is provided with a heat sink to absorb and dissipate heat to keep the
CPU cool and functioning smoothly. Generally, a CPU has three components:
Control Unit: It is the circuitry in the control unit, which makes use of electrical
signals to instruct the computer system for executing already stored instructions. It
takes instructions from memory and then decodes and executes these instructions.
So, it controls and coordinates the functioning of all parts of the computer. The
Control Unit's main task is to maintain and regulate the flow of information across
the processor. It does not take part in processing and storing data.
ALU: It is the arithmetic logic unit, which performs arithmetic and logical
functions. Arithmetic functions include addition, subtraction, multiplication
division, and comparisons. Logical functions mainly include selecting, comparing,
and merging the data. A CPU may contain more than one ALU. Furthermore, ALUs
can be used for maintaining timers that help run the computer.
32 | P a g e
Memory or Storage Unit/ Registers: It is called Random access memory (RAM).
It temporarily stores data, programs, and intermediate and final results of
processing. So, it acts as a temporary storage area that holds the data temporarily,
which is used to run the computer.
Types of CPU:
CPUs are mostly manufactured by Intel and AMD, each of which manufactures its own
types of CPUs. In modern times, there are lots of CPU types in the market. Some of the
basic types of CPUs are described below:
Single Core CPU: Single Core is the oldest type of computer CPU, which was used in the
1970s. It has only one core to process different operations. It can start only one operation
at a time; the CPU switches back and forth between different sets of data streams when
more than one program runs. So, it is not suitable for multitasking as the performance will
be reduced if more than one application runs. The performance of these CPUs is mainly
dependent on the clock speed. It is still used in various devices, such as smartphones.
Dual Core CPU: As the name suggests, Dual Core CPU contains two cores in a single
Integrated Circuit (IC). Although each core has its own controller and cache, they are linked
together to work as a single unit and thus can perform faster than the single-core processors
and can handle multitasking more efficiently than Single Core processors.
Quad Core CPU: This type of CPU comes with two dual-core processors in one integrated
circuit (IC) or chip. So, a quad-core processor is a chip that contains four independent units
called cores. These cores read and execute instructions of CPU. The cores can run multiple
instructions simultaneously, thereby increases the overall speed for programs that are
compatible with parallel processing.
Quad Core CPU uses a technology that allows four independent processing units (cores) to
run in parallel on a single chip. Thus by integrating multiple cores in a single CPU, higher
performance can be generated without boosting the clock speed. However, the performance
increases only when the computer's software supports multiprocessing. The software which
33 | P a g e
supports multiprocessing divides the processing load between multiple processors instead
of using one processor at a time
Input device enables the user to send data, information, or control signals to a
computer. The Central Processing Unit (CPU) of a computer receives the input and
processes it to produce the output. Some of the popular input devices are:
1. Keyboard
2. Mouse
3. Scanner
4. Joystick
5. Light Pen
6. Digitizer
7. Microphone
8. Magnetic Ink Character Recognition (MICR)
9. Optical Character Reader (OCR)
10. Digital Camera
11. Paddle
12. Steering Wheel
13. Gesture recognition devices
14. Light Gun
15. Touch Pad
16. Remote
17. Touch screen
18. VR
19. Webcam
20. Biometric Devices
1. Keyboard
The keyboard is a basic input device that is used to enter data into a computer or any other
electronic device by pressing keys. It has different sets of keys for letters, numbers,
34 | P a g e
characters, and functions. Keyboards are connected to a computer through USB or a
Bluetooth device for wireless communication.
Types of keyboards: There can be different types of keyboards based on the region and
language used. Some of the common types of keyboards are as follows:
i) QWERTY Keyboard:
Typing Keys: these keys work just like a conventional typewriter. These keys include
English Alphabets A-Z, digits 0-9, the Enter key, Space, the backspace key, the Shift
key, the Caps Lock key, etc.
Function Keys: these keys perform different tasks based on the type of software being
used. These keys are labeled as F1, F2, …, and F12.
Numeric Keys: these keys let you enter numerical data more easily when you are
working on number intensive tasks. To use this section of the keyboard make sure that
the Num lock key is on.
Navigation Keys: these are keys that are used to navigate through your document. The
following are navigation keys.
Page Up, Page Down, Home, End, ,,,, etc.
35 | P a g e
Computer Keys: these are keys not found on typewriters. They perform different tasks
when used alone or in conjunction with other keys.
Esc, Alt, Ctrl, Print Screen, Scroll lock, Pause, Insert, Delete
Its name is derived from the first six letters that appear on the top left row of the keyboard.
The Q and W keys in AZERTY keyboard are interchanged with A and Z keys in QWERTY
keyboard. Furthermore, in AZERTY keyboard M key is located to the left of the L key.
AZERTY keyboard differs from QWERTY keyboard not only in the placement of letters
but also in many other ways, e.g., it gives emphasis on accents, which is required for
writing European languages like French.
This type of keyboard layout was developed to increase the typing speed by
reducing the finger movement while typing. The most frequently used letters are
kept in a home row to improve typing
2. Mouse
36 | P a g e
The mouse is a hand-held input device which is used to move cursor or pointer across the
screen. It is designed to be used on a flat surface and generally has left and right button and
a scroll wheel between them. Laptop computers come with a touchpad that works as a
mouse. It lets you control the movement of cursor or pointer by moving your finger over
the touchpad. Some mouse comes with integrated features such as extra buttons to perform
different buttons.
The mouse was invented by Douglas C. Engelbart in 1963. Early mouse had a roller ball
integrated as a movement sensor underneath the device. Modern mouse devices come with
optical technology that controls cursor movements by a visible or invisible light beam. A
mouse is connected to a computer through different ports depending on the type of
computer and type of a mouse.
i) Trackball Mouse:
It is a stationary input device that has ball mechanism to move the pointer or cursor on the
screen. The ball is half inserted in the device and can be easily rolled with finger, thumb or
the palm to move the pointer on the screen. The device has sensor to detect the rotation of
ball. It remains stationary; you don't need to move it on the operating surface. So, it is an
ideal device if you have limited desk space as you don't need to move it like a mouse.
37 | P a g e
It has a system of a ball and several rollers to track its movement. It is a corded type of
mouse. A mechanical mouse can be used for high performance. The drawback is that they
tend to get dust into the mechanics and thus require regular cleaning.
An optical mouse uses optical electronics to track its movement. It is more reliable than a
mechanical mouse and also requires less maintenance. However, its performance is
affected by the surface on which it is operated. Plain non-glossy mouse mat should be used
for best results. The rough surface may cause problems for the optical recognition system,
and the glossy surface may reflect the light wrongly and thus may cause tracking issues.
As the name suggests, this type of mouse lacks cable and uses wireless technology such
as IrDA (infrared) or radio (Bluetooth or Wi-Fi) to control the movement of the cursor. It
38 | P a g e
is used to improve the experience of using a mouse. It uses batteries for its power supply.
3. Scanner
The scanner uses the pictures and pages of text as input. It scans the picture or a document.
The scanned picture or document then converted into a digital format or file and is
displayed on the screen as an output. It uses optical character recognition techniques to
convert images into digital ones. Some of the common types of scanners are as follows:
Types of Scanner:
i) Flatbed Scanner:
It has a glass pane and a moving optical CIS or CCD array. The light illuminates
the pane, and then the image is placed on the glass pane. The light moves across
the glass pane and scans the document and thus produces its digital copy. You will
need a transparency adapter while scanning transparent slides.
It is a small manual scanning device which is held by hand and is rolled over a
flat image that is to be scanned. The drawback in using this device is that the hand
should be steady while scanning; otherwise, it may distort the image. One of the
39 | P a g e
commonly used handheld scanners is the barcode scanner which you would have
seen in shopping stores.
iii) Sheetfed Scanner:
In this scanner, the document is inserted into the slot provided in the scanner. The main
components of this scanner include the sheet-feeder, scanning module, and calibration
sheet. The light does not move in this scanner. Instead, the document moves through the
scanner. It is suitable for scanning single page documents, not for thick objects like
books, magazines, etc.
iv) Drum Scanner:
Drum scanner has a photomultiplier tube (PMT) to scan images. It does not have a
charge-coupled device like a flatbed scanner. The photomultiplier tube is extremely
sensitive to light. The image is placed on a glass tube, and the light moves across
the image, which produces a reflection of the image which is captured by the PMT
and processed. These scanners have high resolution and are suitable for detailed
scans.
v) Photo Scanner:
40 | P a g e
It is designed to scan photographs. It has high resolution and color depth, which are
required for scanning photographs. Some photo scanners come with in-built
software for cleaning and restoring old photographs.
4. Joystick
A joystick is also a pointing input device like a mouse. It is made up of a stick with a
spherical base. The base is fitted in a socket that allows free movement of the stick. The
movement of stick controls the cursor or pointer on the screen.
The frist joystick was invented by C. B. Mirick at the U.S. Naval Research Laboratory. A
joystick can be of different types such as displacement joysticks, finger-operated joysticks,
hand operated, isometric joystick, and more. In joystick, the cursor keeps moving in the
direction of the joystick unless it is upright, whereas, in mouse, the cursor moves only when
the mouse moves.
5. Light Pen
41 | P a g e
A light pen is a computer input device that looks like a pen. The tip of the light pen contains
a light-sensitive detector that enables the user to point to or select objects on the display
screen. Its light sensitive tip detects the object location and sends the corresponding signals
to the CPU. It is not compatible with LCD screens, so it is not in use today. It also helps
you draw on the screen if needed. The first light pen was invented around 1955 as a part of
the Whirlwind project at the Massachusetts Institute of Technology (MIT)
6. Digitizer
Digitizer is a computer input device that has a flat surface and usually comes with a stylus.
It enables the user to draw images and graphics using the stylus as we draw on paper with
a pencil. The images or graphics drawn on the digitizer appear on the computer monitor or
display screen. The software converts the touch inputs into lines and can also convert
handwritten text to typewritten words.
42 | P a g e
It can be used to capture handwritten signatures and data or images from taped papers.
Furthermore, it is also used to receive information in the form of drawings and send output
to a CAD (Computer-aided design) application and software like AutoCAD. Thus, it
allows you to convert hand-drawn images into a format suitable for computer processing.
7. Microphone
The microphone is a computer input device that is used to input the sound. It receives
the sound vibrations and converts them into audio signals or sends to a recording
medium. The audio signals are converted into digital data and stored in the computer.
The microphone also enables the user to telecommunicate with others. It is also used
to add sound to presentations and with webcams for video conferencing. A microphone
can capture audio waves in different ways; accordingly the three most common types
are described below:
i) Dynamic:
It is the most commonly used microphone with a simple design. It has a magnet which is
wrapped by a metal coil and a thin sheet on the front end of the magnet. The sheet transfers
vibrations from sound waves to the coil and from coil to electric wires which transmit the
sound like an electrical signal.
ii) Condenser:
43 | P a g e
It is designed for audio recording and has a very sensitive and flat frequency response. It has a
front plate called diaphragm and a back plate parallel to the front plate. When sound hits the
diaphragm, it vibrates the diaphragm and alters the distance between the two plates. The
changes in distance are transmitted as electric signals.
iii) Ribbon:
It is known for its reliability. It has a thin ribbon made of aluminum, duraluminum, or
nanofilm suspended in a magnetic field. The sound waves cause vibrations in the ribbon,
which generate a voltage proportional to the velocity of the vibration. The voltage is
transmitted as an electrical signal. Early ribbon microphones had a transformer to increase
the output voltage, but modern ribbon microphones come with advanced magnets to
produce a strong signal.
44 | P a g e
MICR computer input device is designed to read the text printed with magnetic ink. MICR is a
character recognition technology that makes use of special magnetized ink which is sensitive to
magnetic fields. It is widely used in banks to process the cheques and other organizations where
security is a major concern. It can process three hundred cheques in a minute with hundred-percent
accuracy. The details on the bottom of the cheque (MICR No.) are written with magnetic ink. A
laser printer with MICR toner can be used to print the magnetic ink.
The device reads the details and sends to a computer for processing. A document printed in
magnetic ink is required to pass through a machine which magnetizes the ink, and the magnetic
information is then translated into characters.
OCR computer input device is designed to convert the scanned images of handwritten,
typed or printed text into digital text. It is widely used in offices and libraries to convert
documents and books into electronic files.
It processes and copies the physical form of a document using a scanner. After copying the
documents, the OCR software converts the documents into a two-color (black and white),
45 | P a g e
version called bitmap. Then it is analyzed for light and dark areas, where the dark areas are
selected as characters, and the light area is identified as background. It is widely used to
convert hard copy legal or historic documents into PDFs. The converted documents can be
edited if required like we edit documents created in ms word.
It is a digital device as it captures images and records videos digitally and then stores them
on a memory card. It is provided with an image sensor chip to capture images, as opposed
to film used by traditional cameras. Besides this, a camera that is connected to your
computer can also be called a digital camera.
It has photosensors to record light that enters the camera through the lens. When the light
strikes the photosensors, each of the sensors returns the electrical current, which is used to
create the images.
11. Paddle:
It is a simple input device that is widely used in games. It is a wheel that is held by
hand and looks like a volume knob on a stereo that is used to increase or decrease
the volume. Paddle moves or controls cursor or any other objects in the game in a
back-and-forth motion. It is widely used as an alternative to the joystick. Besides
46 | P a g e
this, the term paddle also refers to many handheld devices designed to control a
function in an electronic device, computer, etc.
It is used as an input device in racing video games such as car racing games or in driving
programs as virtual simulators to steer a vehicle. It works like the real steering wheel by
allowing you to take a right or left turn. A steering wheel may be provided with acceleration
and brake pedal devices and a mechanism for shifting gears. Thus, it makes racing games
more adventurous and entertaining.
These devices take human gestures as input. There are many such devices that respond to
gestures. For example, Kinect is one such device that observes the movement of a player's
body and interprets these movements as inputs to video games. This feature is also
available in certain tablets and smartphones where you can perform certain tasks such as
taking pictures using finger gestures such as swiping, pinching, etc.
47 | P a g e
As the name suggests, it is a pointing input device that is designed to point at and shoot the targets
on the screen in a video game, or arcade, etc. The light gun was used for the first time on the MIT
Whirwind computer. When the gun is pointed at the target on the screen and the trigger is pulled,
the screen goes blank for a fraction of a second. During this moment, the photodiode, which is
present in the barrel, determines where the gun is pointed. For example, shooting ducks in a duck
hunt game.
15. Touchpad:
It is usually found in laptops as a substitute for the mouse. It allows you to move or
control the cursor on the screen using your finger. Just like a mouse, it also has two
buttons for right and left click. Using the touchpad, you can perform all the tasks that
you do with a mouse, such as selecting an object on the screen, copy, paste, delete,
open a file or folder, and more.
16. VR:
48 | P a g e
VR stands for virtual reality. It is an artificial or virtual environment which is generated
by computers. A person can interact with virtual objects of this artificial environment
using some input devices such as headsets, gloves, headphones, etc. For example, he
or she can find himself or herself walking on a beach, watching a football match,
walking in the sky, etc., without actually doing all this.
17. Webcam
Any camera which is connected to a computer is called a webcam. The in-built camera provided
on a computer can also be considered a webcam. It is an input device as it can take pictures, and
can be used to record videos if required. The pictures and videos are stored in the computer
memory and can be displayed on the screen if required. Although it works almost the same as the
digital camera, it is different from a digital camera, as it is designed to take compact digital photos
that can be uploaded easily on the webpages and shared with others through the internet.
Biometrics refers to a process in which a person is identified through his or her biological features
such as fingerprints, eye cornea, face structure, etc. It is done by using biometric devices, which
can be of different types based on their scanning features and abilities, such as:
i) Face Scanner:
49 | P a g e
It is designed to identify a person by scanning his or her face. It takes the face measurements of a
person. For example, the distance between eyes, nose, and mouth, etc., accordingly, it confirms
the identity of a person. Besides this, it is smart enough to differentiate between a person's picture
and the real person.
The hand of a person can also be used to verify his or her identity as every person has a unique
pattern of veins in the palm, just like fingerprints. This device takes advantage of this feature; it
identifies a person by scanning the palm of his hand. It uses infrared light to scan veins' patterns
and blood flowing in them. Palm is even more unique than fingerprints.
It scans the fingerprints to identify people or for biometric authentication. This device is
developed, keeping in mind the fact that no two persons in the world can have the same
fingerprints. It is widely used in companies as a fingerprint attendance system to mark the
attendance of employees. This type of scanners captures the pattern of valleys and ridges found on
a finger and store it in the memory or database. When you press your finger on the given space, it
verifies the identity by using its pattern-matching software.
50 | P a g e
It scans the retina or iris of a person's eye to confirm the identity. This device is more secure than
others as it is next to impossible to copy the retina or iris. It works by mapping the retina's blood
vessel patterns of the eye. The blood vessels of retina absorb light more easily as well as can be
identified with appropriate lighting.
In this scan, a beam of low-energy infrared light falls on the retina through the scanner's eyepiece.
Then, the software captures the network of blood vessels in the retina and uses it to verify a person's
identity.
v) Voice Scanner:
It records the voice of a person and digitizes it to create a distinctive voice print or
template. The voiceprints are stored in the database, and are used to verify the voice of
a person to confirm his or her identity. The person is required to speak in the normal or
same voice that was used to create a voice template. It is not much reliable as it can be
misused using a tape recording.
The output device displays the result of the processing of raw data that is entered in the
computer through an input device. There are a number of output devices that display output
in different ways such as text, images, hard copies, and audio or video. Some of the popular
output devices are:
51 | P a g e
1. Monitor
The monitor is the display unit or screen of the computer. It is the main output device that
displays the processed data or information as text, images, audio or video. The types of
monitors are given below.
I. CRT Monitor
CRT monitors are based on the cathode ray tubes. They are like vacuum tubes which
produce images in the form of video signals. Cathode rays tube produces a beam of
electrons through electron guns that strike on the inner phosphorescent surface of the screen
to produce images on the screen. The monitor contains millions of phosphorus dots of red,
green and blue color. These dots start to glow when struck by electron beams and this
phenomenon is called cathodoluminescence.
The main components of a CRT monitor include the electron gun assembly, deflection
plate assembly, fluorescent screen, glass envelope, and base.The front (outer surface) of
the screen onto which images are produced is called the face plate. It is made up of fiber
optics.
There are three electron beams that strike the screen: red, green, and blue. So, the colors
which you see on the screen are the blends of red, blue and green lights.The magnetic field
guides the beams of electrons. Although LCDs have replaced the CRT monitors, the CRT
monitors are still used by graphics professionals because of their color quality.
52 | P a g e
The LCD monitor is a flat panel screen that is compact and light-weight as compared to CRT
monitors. It is based on liquid crystal display technology which is used in the screens of laptops,
tablets, smart phones, etc. An LCD screen comprises two layers of polarized glass with a liquid
crystal solution between them. When the light passes through the first layer, an electric current
aligns the liquids crystals. The aligned liquid crystals allow a varying level of light to pass through
the second layer to create images on the screen.
The LCD screen has a matrix of pixels that display the image on the screen.Old LCDs had passive-
matrix screens in which individual pixels are controlled by sending a charge. A few electrical
charges could be sent each second that made screens appear blurry when the images moved quickly
on the screen.
Modern LCDs use active-matrix technology and contain thin film transistors (TFTs) with
capacitors. This technology allows pixels to retain their charge. So, they don?t make screen blurry
when images move fast on the screen as well as are more efficient than passive-matrix displays.
The LED monitor is an improved version of an LCD monitor. It also has a flat panel display and
uses liquid crystal display technology like the LCD monitors. The difference between them lies in
the source of light to backlight the display. The LED monitor has many LED panels, and each
panel has several LEDsto backlight the display, whereas the LCD monitors use cold cathode
fluorescent light to backlight the display.Modern electronic devices such as mobile phones, LED
53 | P a g e
TVs, laptop and computer screens, etc., use a LED display as it not only produces more brilliance
and greater light intensity but also consumes less power.
The plasma monitor is also a flat panel display that is based on plasma display technology. It has
small tiny cells between two glass panels. These cells contain mixtures of noble gases and a small
amount of mercury. When voltage is applied, the gas in the cells turns into a plasma and emits
ultraviolet light that creates images on the screen, i.e., the screen is illuminated by a tiny bit of
plasma, a charged gas. Plasma displays are brighter than liquid crystal displays (LCD) and also
offer a wide viewing angle than an LCD.
Plasma monitors provide high resolutions of up to 1920 X 1080, excellent contrast ratios, wide
viewing angle, a high refresh rate and more. Thus, they offer a unique viewing experience while
watching action movies, sports games, and more.
2. Printer
A printer produces hard copies of the processed data. It enables the user, to print images, text or
any other information onto the paper. Based on the printing mechanism, the printers are of two
types: Impact Printers and Non-impact Printers.
A. Character Printers
i. Dot Matrix printers
ii. Daisy Wheel printers
B. Line printers
54 | P a g e
i. Drum printers
ii. Chain printers
Impact Printer
The impact printer uses a hammer or print head to print the character or images onto the paper.
The hammer or print head strikes or presses an ink ribbon against the paper to print characters and
images.
A. Character Printers
B. Line printers
A. Character Printers
Character printer prints a single character at a time or with a single stroke of the print head or
hammer. It does not print one line at a time. Dot Matrix printer and Daisy Wheel printer are
character printers. Today, these printers are not in much use due to their low speed and because
only the text can be printed. The character printers are of two types, which are as follows:
Dot Matrix Printer is an impact printer. The characters and images printed by it are the patterns of
dots. These patterns are produced by striking the ink soaked ribbon against the paper with a print
55 | P a g e
head. The print head contains pins that produce a pattern of dots on the paper to form the individual
characters. The print head of a 24 pin dot matrix contains more pins than a 9 pin dot matrix printer,
so it produces more dots which results in better printing of characters. To produce color output,
the black ribbon can be changed with color stripes. The speed of Dot Matrix printers is around
200-500 characters per second.
Daisy Wheel Printer was invented by David S. Lee at Diablo Data Systems.It consists of a wheel
or disk that has spokes or extensions and looks like a daisy, so it is named Daisy Wheel printer. At
the end of extensions, molded metal characters are mounted. To print a character the printer rotates
the wheel, and when the desired character is on the print location the hammer hits disk and the
extension hits the ink ribbon against the paper to create the impression. It cannot be used to print
graphics and is often noisy and slow, i.e., the speed is very low around 25-50 characters per second.
Due to these drawbacks,these printers have become obsolete.
B. Line Printers:
Line printer, which is also as a bar printer, prints one line at a time. It is a high-speed impact printer
as it can print 500 to 3000 lines per minute. Drum printer and chain printer are examples of line
printers.
i) Drum Printer:
56 | P a g e
Drum printer is a line printer that is made of a rotating drum to print characters. The drum has
circular bands of characters on its surface. It has a separate hammer for each band of characters.
When you print, the drum rotates, and when the desired character comes under the hammer, the
hammer strikes the ink ribbon against the paper to print characters. The drum rotates at a very high
speed and characters are printed by activating the appropriate hammers. Although all the characters
are not printed at a time, they are printed at a very high speed. Furthermore, it can print only a
predefined style as it has a specific set of characters. These printers are known to be very noisy
due to the use of hammering techniques.
Chain printer is a line printer that uses a rotating chain to print characters. The characters are
embossed on the surface of the chain. The chain rotates horizontally around a set of hammers, for
each print location one hammer is provided, i.e., the total number of hammers is equal to the total
number of print positions.
57 | P a g e
The chain rotates at a very high speed and when the desired character comes at the print location,
the corresponding hammer strikes the page against the ribbon and character on the chain.They can
type 500 to 3000 lines per minute. They are also noisy due to the hammering action.
Non-Impact Printer:
Non-impact printers don't print characters or images by striking a print head or hammer on the ink
ribbon placed against the paper. They print characters and images without direct physical contact
between the paper and the printing machinery. These printers can print a complete page at a time,
so they are also known as page printers. The common types of non-impact printers are Laser printer
and Inkjet printer:
i. Laser Printer:
A laser printer is a non-impact printer that uses a laser beam to print the characters. The
laser beam hits the drum, which is a photoreceptor and draws the image on the drum by
altering electrical charges on the drum. The drum then rolls in toner, and the charged image
on the drum picks the toner. The toner is then printed on the paper using heat and pressure.
Once the document is printed, the drum loses the electric charge,and the remaining toner
is collected. The laser printers use powdered toner for printing instead of liquid ink and
produce quality print objects with a resolution of 600 dots per inch (dpi) or more.
58 | P a g e
The inkjet printer is a non-impact printer that prints images and characters by spraying
fine,ionized drops of ink. The print head has tiny nozzles to spray the ink. The printer head
moves back and forth and sprays ionized drops of ink on the paper, which is fed through
the printer. These drops pass through an electric field that guides the ink onto the paper to
print correct images and characters.
An inkjet printer has cartridges that contain ink. Modern inkjet printers are color printers
that have four cartridges containing different colors: Cyan, Magenta, Yellow, and Black.
It is capable of printing high-quality images with different colors. It can produce print
objects with a resolution of at least 300 dots per inch (dpi).
3. Projector
A projector is an output device that enables the user to project the output onto a large
surface such as a big screen or wall. It can be connected to a computer and similar devices
to project their output onto a screen. It uses light and lenses to produce magnified texts,
images, and videos. So, it is an ideal output device to give presentations or to teach a large
number of people.
Modern projects (digital projectors) come with multiple input sources such as HDMI ports
for newer equipment and VGA ports that support older devices. Some projectors are
designed to support Wi-Fi and Bluetooth as well. They can be fixed onto the ceiling, placed
on a stand, and more and are frequently used for classroom teaching, giving presentations,
home cinemas, etc.
Liquid Crystal Display (LCD) digital projector: This type of digital projectors are very
popular as they are lightweight and provide crisp output. An LCD projector uses
59 | P a g e
transmissive technology to produce output. It allows the light source, which is a standard
lamp, to pass through the three colored liquid crystal light panels. Some colors pass through
the panels and some are blocked by the panels and thus images are on the screen.
Digital Light Processing (DLP) digital projector: It has a set of tiny mirrors, a separate
mirror for each pixel of the image and thus provide high-quality images. These projectors
are mostly used in theatres as they fulfill the requirement of high-quality video output.
4. PLOTTERS
A plotter can be used to produce high quality, accurate, A3 size or bigger drawings. They
are usually used for Computer Aided Design (CAD) and Computer Aided Manufacture
(CAM) applications such as printing out plans for houses or car parts. Plotters are ideal
output devices for architects, engineers, city planners, others who need to routinely
generate high precision, hard copy, graphic output for widely varying sizes.
1. Primary Storage
2. Secondary Storage
1. PRIMARY STORAGES/INTERNAL STORAGES
Primary storage (memory) holds the immediate instructions that are to be performed by the
CPU. It is therefore very important that the primary storage can be accessed quickly so that the
CPU is not waiting for the next set of instructions.
A. RAM
RAM (Random Access memory) is a temporary storage device for the current data and
instructions that are required by the current program being processed by the CPU and for
storing the results. Therefore, RAM can both be written to and read from. It is called Random
Access because the time taken to access data within the RAM does not depend upon the
location at which the data is stored. A typical RAM has an access time of 70 ns that means that
14 million words of data can be accessed from the RAM in one second. However, RAM is
volatile, which means that any data stored in it is lost when the computer is turned off or when
60 | P a g e
there is a power failure. RAM comes in varying sizes, measured in megabytes (MB). The more
RAM you have, the faster your applications will run.
Using slots attached to the motherboard it is possible to increase the amount of RAM available
to your computer system.
Features of RAM
Features of ROM
The contents of ROM are not losing even in case of a sudden power failure, making it
non-volatile in nature.
It is also random access in nature.
It reads only, but cannot write.
It contains permanent recorded instruction.
Difference between ROM and RAM
ROM RAM
The contents of ROM are always known The contents are not known
61 | P a g e
and can be verified
ROM serves as permanent data storage RAM can serve as temporary data storage
Secondary storage devices are a permanent storage area for your data. They allow a large amount
of data to be stored, although the time taken to access it is longer than that taken to access primary
storage (although the time difference is not usually noticeable)
Most computers have one hard disk drive (HDD) installed within the systems case. They are used
to store the operating system, applications (Word, Excel, Turbo C) and files written by the user.
The HDD is usually a stack of rigid magnetic disks contained within a sealed unit so that dust and
dirt will not damage the disks. Data is transferred to or from the disk using read/write heads close
to the surface of each disk (top and bottom) that detect magnetic variations on the disk surfaces as
they rotate.
The operating system uses letters to identify the different types of secondary storage installed in
the computer. The HDD is allocated the letter C and is known as the root drive. It is possible to
separate the HDD to include virtual drives D, E according to the user’s wishes.
Floppy disks (floppy or diskettes) contain a single small magnetic disk housed within a protective
plastic case. They are used to transfer data between computers or to provide back-up copies of data
stored on the HDD. Data is transferred from or to a floppy by using read/write heads in the floppy
disk drive (FDD) that detect magnetic variations on the disk surface.
62 | P a g e
The standard 3 ½ inch floppy has a storage capacity of 1.44 MB. The FDD is always allocated the
letter A and so is known as the A drive. If another FDD is installed (rarely) then it is allocated the
letter B.
Compact disk (CD) drives allow data to be read from compact disks. A CD is usually about 12
inches in diameter and data is transferred to or from a CD by using a laser. A typical CD has a
storage capacity of 650 MB. There are 3 types of compact disk
CD-ROM - Compact Disk – Read Only Memory. They are mainly used by manufacturers
to distribute their software. Therefore, Microsoft Windows (operating system) and Office
(applications) are supplied to the user on CD-ROM with the programs then being installed
onto the HDD of the computer.
CD-R - Compact Disk Recordable. Allows the computer user to write data to a CD. Each
area of the CD can only be written to once and once data is written to the CD it cannot be
removed. The CD can be written to as many times as the user likes until the CD is full.
CD-RW - Compact Disk – Re-Writeable. Allows the user to perform multiple read/write
operations on the same CD until it is full. Data can be later removed from the CD-RW and
other data placed on it.
DIGITAL VERSATILE DISK DRIVE
Digital video disk (DVD) drives look similar to a CD except that they can store from 4.7 – 17 GB
of data. A standard DVD can store over 2 hours of high quality video and CD quality audio.
63 | P a g e
indicating 1 or “OFF” indicating 0;
In the computer “ON” is represented by the existence of current and “OFF” is
represented by the non existence of current
On a magnetic disk, the same information is stored by changing the polarity or
magnetized particles on the disk’s surface;
3. BYTE
Bits can be organized into large units to make them represent more and meaningful
information;
This large unit is called a byte and is the basic “unit of data representation” in a
computer system;
The commonly used byte contains 8 bits;
Since each bit has two states and there are 8 bits in a byte, the total amount of data that
can be represented is 28 or 256 possible combinations;
Each byte can represent a character(a character is either a letter, a number or a special
symbol such as +,-,?,*, $, etc
A byte is then used as a unit of measurement in the computer memory, processing unit,
external storage and during communication;
If the computer memory is 524288 byte, this is expressed in short by saying 512KB,
where KB stands for kilobyte.
Word refers the number of bits that a computer process at a time or a transmission
media transmits at a time
Although bytes can store or transmit information, the process can even be faster if more
than one byte is processed at a once;
A combination of bytes, then form a “word”
A word can contain one, two, three or four bytes based on the capacity of the computer;
64 | P a g e
Word length is usually given in bits
We say that a computer is an 8-bits, a 16 bit, a 32 bit or a 64 bit computer to indicate
that the amount of data it can process at a time;
The larger the word length a computer has, the more powerful and faster it is.
A. Data Representation
Objectives:
To understand how actually data are represented, flow, stored and processed
inside the computer.
To know the different coding systems & unit of data representation.
We enter data into a computer or review (see) output data from a computer using the
letter of alphabet, various special symbols, and the numerals in the decimal number
system. But since computer is an electronic device which understands electrical flow
(signal) there is no letter, symbol or number inside the computer. Computer works
with binary numbers. As a semiconductor is conducting or isn’t conducting; a switch
is closed or opened.
So data are represented in the form of a code which can have a corresponding
electrical signal.
B. Number System
A number system is a set of symbols used for counting
There are various number systems
E.g. Decimal, Binary, octal-decimal, hexadecimal etc.
For the purpose of understanding how data are represented, stored and
processed in computer, we will discuss only two of them, the Decimal and
the binary number system.
The Decimal Number System
The Decimal number system is based on the ten different digits (or symbols)
0,1,2,3,4,5,6,7,8,9.
We say it is a base ten number system
65 | P a g e
Though it is widely used, it is inconvenient for computer to represent data. So we
need another number system.
The Binary number system
0 0
1 1
10 2
11 3
100 4
101 5
110 6
111 7
1000 8
1001 9
The most elementary form to organize data within a computer (an electronic device) is in the
form of a code which utilizes the “ON” and “OFF” states of electric switches or there is
“current” and “no current” condition of the electronic components;
We see that the nature of the electronic devices has similarity with the binary number system
in that both represent only two elementary states;
It is therefore convenient to use binary number system to represent data in a computer;
An “ON” corresponds to a 1;
An “OFF” corresponds to a 0;
In the computer “ON” is represented by the existence of a current and “OFF” is represented by
non existence of current
On a magnetic disk, the same information is stored by changing the polarity of magnetized
particles on the disk’s surface.
66 | P a g e
Conversion via Decimal
A. Decimal to Binary:
2 4706
470610 = _________________ 2 2 2353 0
Answer: 10010011000102 2 1176 1
More examples: 2 588 0
▪ 169410 = ?2
▪ 13510 = ?2 2 294 0
2 147 0
2 73 1
2 36 1
2 18 0
2 9 0
2 4 1
2 2 0
2 1 0
B. Decimal to Octal number 0 1
Example: 250210 = ________ 8
Answer: 47068
8 2502
More Examples:
▪ 56210 = ?8
▪ 261410 = ?8
8 312 6
8 39 0
8 4 7
0 4
67 | P a g e
C. Decimal to Hexadecimal
16 428
Example: 42810 = _______ 16
Answer: 1AC16
More samples: 16 26 12 = C
257310 = ?16
456310 =?16
16 1 10 = A
0 1
D. Binary to Decimal:
Example:
110012 = _______ 10
Answer: 2510
More Examples:
• 1111012 = ?10
• 101010102 = ?10
E. Octal to Decimal
Example:
5628 = ________ 10
Answer: 37010
More samples:
• 7628 = ?10
• 51278 = ?10
F. Hexadecimal to Decimal
Example:
2A3B16 = _________ 10
Answer: 1081110
More samples:
• A2BD416 =?10
• CFFE216 = ?10
68 | P a g e
Other Conversions
a. Binary to Octal
Octal Binary
Example:
0 000
1011102 = _____ 8 1 001
Answer: 568 2 010
3 011
b. Octal to Binary
4 100
Example:
5 101
5628 = _____ 2
6 110
Answer: 101 110 0102
7 111
c. Binary to Hexadecimal
Example: 110100112 = _______ 16 1101 0011
Answer: D316
D 3
Example: 1110001102 = ______ 16
Answer: 1D316 0001 1100
1
0110 D 3
d. Hexadecimal to Binary
69 | P a g e
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
A 1010
B 1011
C 1100
D 1101
E 1110
F 1111
Fractional Numbers
70 | P a g e
Find the decimal equivalent of the hexadecimal number 2B.C416.
1 0 -1 -2
2B.C416 = 2x16 + Bx16 + cx16 + 4x16
= 32 + 11 + 12/16 + 4/256
= 43 + 0.75 + 0.015625
= 43. 76565210
Another example:
Find the decimal equivalent of the octal number 127.548.
Solution:
71 | P a g e
A. Binary Addition
Is performed in the same manner as in decimal arithmetic.
Since 1 is the largest digit in the binary number system, any sum greater than 1 requires a
digit to be carried over.
0 +0 0
0+1 1
1+0 1
1+1 0 plus a
carry of 1
Example:
1.) 1012 + 102
Binary Decimal
101 5
+ 10 +2
111 7
2.) 100112 + 10012
carry - 1 1
10011 19
+ 1001 + 9
28
11100
B. Binary Subtraction – is applied to subtraction of numbers in other number systems.
a. Determine if it is necessary to borrow.
72 | P a g e
b. If the subtrahend (the lower digit) is larger than the minuend (the upper digit), it is
necessary to borrow from the column to the left.
c. It is important to note here that the value borrowed depends upon the base of the
number system.
Example:
Multiply the binary numbers 1010 and 1001
Solution:
1010 Multiplicand
X 1001 Multiplier
1010 Partial product
0000 Partial product
0000 Partial product
1010 Partial product
1011010 Final
product
C. Binary Division – it is similar to decimal division. The rules for binary division are:
73 | P a g e
5. Bring down the next digit to add to the remainder digits. Proceed as before in a manner
similar to long division.
0÷1 0
1÷1 1
Example:
Divide binary 100001 by 110.
2.2 Software
System software is a set of one or more program, designed to control the operation and
extend the processing capability of a computer system. System software helps run the
computer hardware and computer system.
74 | P a g e
1. Supports the development of other application program
2. Support the execution of other application software.
3. Monitors the effective use of various hardware resources, such as CPU,
memory, peripherals, etc.
4. Communicates with and controls the operation of peripheral devices, such as
printer, disk, etc.
5. System software helps run the computer hardware and computer system.
Types of System Software:
1. Operating system
a. Operating system is the most important component of the computer’s
software system that manages and coordinates the overall operations of the
computer.
b. Operating system acts as a host for application software. By handling the
details of the computer’s hardware operations, it eases the burden of the
application software.
c. Generally, it is the operating system that loads the application software
themselves to the RAM. It helps to store and retrieve data from the storage
media. .
2. Programming language software
Programming language software usually provides tools to assist a programmer in
writing computer programs and software using different programming languages in a
more convenient way.
Machine language- There is the only language that the computer understands
directly zero. A machine language is a set of machine instructions which consists
of zeros and ones. A machine instruction contains two parts an operation code (op
code) and an address. The OP code tells the microprocessor system what operation
it should perform, add, transfer, compare, or move data to output device, etc.
The address identifies the location (memory, register) holding the required operands
that is, the data to be operated upon. The address part may contain one, two or more
75 | P a g e
addresses that is, there may be one (or single address, two (double) address, and
three (or triple) address instructions.
Low-level Languages - In machine language we have seen that the OP code and the
address are represented as a binary sequence but it is difficult for the programmer to
write a big program using binary sequence and it is difficult to debug an error from
such program so instead of representing the OP code and the adders as a binary
sequence we can represent them in mnemonics (terms). A low-level language is a
programming language which uses mnemonics to write in program Low-level
languages are machine dependent.
Ex: Assembly language
Application Software - allows end users to accomplish one or more specific (non-computer
related) tasks. Typical applications include industrial automation, business software,
educational software, medical software, databases, and computer games. Businesses are
probably the biggest users of application software, but almost every field of human activity
76 | P a g e
now uses some form of application software. Some most commonly known application soft
wares are
77 | P a g e
Database enforce standards.
The use of Databases can ensure data security.
Integrity can be managed using the database
78 | P a g e
Chapter 3: Computer networks
A network set up by connecting two or more computers and other supporting hardware devices
through communication channels is called a computer network. It enables computers to
communicate with each other and to share commands, data, etc., including the hardware and
software resources.
Data transmission mode refers to the direction of signal flow between two linked devices.
There are three types of transmission modes: simplex, half-duplex, and full–duplex.
i. Simplex: transmission is unidirectional. The information flows in one direction across the
circuit, with no capability to support response in the other direction. Only one of the
communicating devices transmits information, the other can only receive it. Television
transmission can be considered as an example of simplex mode of transmission where the
satellite only transmits the data to the television, vice versa is not possible.
SENDER RECIEVER
Fig: Simplex
ii. Half-duplex, in half-duplex mode, each communicating device can receive and transmit
information, but not at the same time. When one device is sending the other can only receive
at that point of time. In half-duplex transmission mode, the entire capacity of the transmission
medium is taken over by the device, which is transmitting at that moment. The most common
example of half-duplex transmission is the wireless handsets (generally used by military
personnel) where one user talks at a time and another listens.
SENDER RECIEVER
79 | P a g e
iii. Full-duplex: Full-duplex transmission mode, also known as the duplex mode, allows both
communicating devices to transmit and receive data simultaneously. A full-duplex mode can
be compared to a two-way road with traffic flowing in both directions. A common example
of full-duplex transmitting mode is the telephone network, where two people communicate
over a telephone line; both can talk as well as listen at the same time.
SENDER RECIEVER
Transmission Media
Transmission media refers to the physical or logical media through which communication
signals (data and information are transmitted. Transmission media can be divided in to two
broad categories: guided media and unguided media.
A. Guided media
Guided transmission media use a cabling system that guide the data signals along a specific
path. The data signals are bound by the cabling system. Cabling refers to transmission medium
that consists of cables.
There are four basic types of guided media. These are
Open wire
Twisted pair
Coaxial cable
Optical fiber
Open wire:
Traditionally used to describe the electrical wire system or power transmission wire
strung along power pole.
No shielding or protection from noise interface.
It suffers from lose of energy problem and it can be easily tapped.
Twisted Pair:
80 | P a g e
o In this kind of cabling, pairs of wires are twisted together which are surrounded by an
insulating material and an outer layer called Jacket.
o Each pair consists of a wire, used for receiving data signal, and for transmission data signal.
o The wires are twisted in order to reduce noise (unwanted signal) and interface for external
sources.
o Used in short distance communication (<=100 meters).
Forms of Twisted Pair: There are two forms of Twisted Pair. These are
Fig: UTP
Fig: STP
Coaxial cable:
Has a single central conductor, which is made up of solid wire (usually copper). This
conductor is surrounded by an insulator.
It is very robust and is commonly used in cable TV network.
81 | P a g e
As compared to twisted pair, it offers higher band width.
Transmitting data at a rate of 10mbps.
Types of Coaxial cable:
Copper
core
Insulation Metal connector
Protective plastic
covering Fig: Coaxial cable
Optical fiber:
Both twisted pair and coaxial cable transmit data in the form of current, but optical fiber
carry information in the form of visible light.
Has three parts, i.e. Core, cladding , and jacket
82 | P a g e
It is more secure because cable cannot be tapped.
They are smaller and lighter than copper wire and are free from corrosion as well.
Disadvantages of Optical fiber
It is expensive
They are more fragile.
B. Unguided media
Unguided transmission media is data signals that flow through air. They are not bounded to a
fixed channel to follow. The most common unguided Medias are radio frequency propagation,
Microwave and Satellite.
83 | P a g e
A WAN, or Wide Area Network, is a system of interconnecting many computers over a
large geographical area such as cities, states, countries or even the whole world. These kinds
of networks use telephone lines, satellite links, and other long-rang communications
technologies to connect. Such networks are designed to serve an area of hundreds or
thousands of miles such as public and private packet switching networks and national
telephone networks.
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology. The various network topologies are :
1. Bus Topology
Bus topology uses a common bus or backbone ( a single cable) to connect all devices with
terminators at both ends. The backbone acts as a shared communication medium and each
node (file server,
84 | P a g e
2. Ring Topology
In ring topology, computers are placed on a circle of cable without any terminated ends since there
are no unconnected ends. Every node has exactly two neighbors for communication purposes. All
messages travel through a ring in the same direction (clockwise or counterclockwise) until it
reaches its destination. Each node in the ring incorporates a repeater.
Failure in any cable or node breaks the loop and can take down the entire
network.
Maximum ring length and number of nodes are limited.
3. Star Topology
In star topology, devices are not directly linked to each other but they are connected via a
centralized network component known as hub or concentrator.
85 | P a g e
The hub acts as a central controller and if a node wants to send data to another node, it boosts up
the message and sends the message to the intended node. This topology commonly uses twisted
pair cable, however, coaxial cable or fiber optic cable can also be used.
4. Mesh Topology
In the mesh topology, every node has a dedicated point-to-point link to every other node.
Messages sent on a mesh network can take any of several possible paths from source to
destination.
86 | P a g e
The use of large number of links eliminates network congestion.
If one link becomes unusable, it does not disable the entire system.
Disadvantages of Mesh Topology
The amount of required cabling is very large.
As every node is connected to the other, installation and reconfiguration is very difficult.
The amount of hardware required in this type of topology can make it expensive to
implement
3.4 Internet and the World Wide Web
The word Internet is derived from two words: Interconnection and Networks. Also referred to
as ‘the Net’. Internet is a worldwide system of computer networks, that is, a network of
networks, which allows the participants (users) to share information on those linked computers.
Web page: The World Wide Web consists of files, called pages which contain information
and links to resources throughout the Internet. A web page is an electronic document written
in a computer language called HTML (Hypertext Markup Language)
Web Site: A web site is a set of related (linked through hypertext links) web pages, published
by an organization or individual. Normally a web site contains a home page along with other
additional web pages. Each web site is owned and updated by an individual, company or
organization..
Home page:. A home page is the starting point or a doorway to the web site. Like the table of
contents of a book, the home page usually provides an overview of what could be found at the
web site.
Browser: A browser (short for web browser) is a computer program that accesses web pages
and displays them on the computer screen.
Uniform resource locator (URL): Each web page has a unique address, called a Uniform
Resource Locator (URL) that identifies its location on the Internet. Web browsers utilize the
URL to retrieve a file from the computer on which it resides. Usually, the format of an URL
87 | P a g e
consists of four parts: protocol, server (or domain), path, and filename. Here is an example,
http://www.xyz.com/tutor/start/main.htm. The structure of this URL
Protocol: http
Host computer name: www
Domain name: xyz
Domain type: com
Path: tutor/Start/
File name: main.htm
Hypertext: Hypertext refers to the text that connects to other documents. These texts are
known as hypertext link, hyperlink, hotlink or simply links. A hyperlink is used to “jump” to
another part of the same page or to load a different web page. Hypertext is a method of instant
cross-referencing. It is used for organizing information and to link related documents together
using words and graphics (also known as image maps).
Internet service provider (ISP): An Internet Service Provider (ISP) is an organization that
provides the required software, which is used to connect to the Internet.
Web server: A server is a computer equipped with server software, which provides a specific
kind of service to client software running on other computers.
88 | P a g e
Chapter 4: Fundamentals of Information Systems
4.1 Overview of IS
The term "information" has become a universal keyword in almost all areas of our modern
world – be it in science or society in general. This is not only obvious from the naming of
whole scientific branches like Information theory, Informatics but even more from common
speaking-characterizing our present time and society as information age viz. information
society. However, what "information" might mean, is by no means clear and there is a wide
range of interpretations covering, among others, its technical, communicational, educational,
mental, and scientific aspects.
Usually, the terms “data” and “information” are used interchangeably. However, there is a
subtle difference between the two. These terms can no longer be taken as synonymous or
interchangeable terms. This requires a careful use of these terms and is often in conflict with
currently common, mostly non-reflecting, and ambiguous speaking. In a nutshell, data can be
a number, symbol, character, word, codes, graphs, etc. On the other hand, information is data
put into context. Information is utilized by humans in some significant way (such as to make
decisions, forecasts etc). Let us have a detailed look at the difference between data and
89 | P a g e
information in a tabular column below.
90 | P a g e
Why is information overload an increasing problem?
1. The Advancement Of Technology
o New systems, software programs and devices create/deliver MASSIVE amounts of data.
o Hyper-connectivity puts an endless flow of information at our fingertips
o Anyone can share or access information instantaneously
Additional Contributing Factors:
• People
– people produce information
– phone calls / email
– conversation / interaction
• our surroundings: environment
– we are sensory beings;
– everything we see
– everything we hear
– everything we smell
– everything we feel or sense in any way
To help reduce some of the negative effects, and begin a path to winning the fight against
Information Overload, we must first focus on personal practices that will help improve
91 | P a g e
cognitive performance and help ‘filter’ through the daily mass of information.
Thinking Straight:
1. Brain Dump: Write down thoughts that interrupt your workflow, Once on paper,
prioritize
2. DO NOT multitask: Our brains use oxygenated glucose as fuel,Staying engaged
in a centrally focused mode uses less energy
3. Lump together similar tasks: Completing similar tasks is another way of being
efficient with your mental resources, Get more done and finish with more.
4. Only spend as much time and effort on a task or information as it is worth:
Conserve your brain’s energy, don’t go overboard on things that don’t mean that
much.
5. Take Breaks: 15 min breaks, every couple of hours, Relax and allow your mind
to wander, Avoid social media during breaks
Information systems can be viewed as having five major components: hardware, software,
data, people, and processes. The first three are technology. These are probably what you
thought of when defining information systems. The last two components, people and
processes, separate the idea of information systems from more technical fields, such as
computer science. In order to fully understand information systems, you will need to
understand how all of these components work together to bring value to an organization.
Hardware: Hardware is the tangible, physical portion of an information system – the part
92 | P a g e
you can touch. This category includes the computer itself and all of its support equipment
like keyboards, disk drives, and flash drives are all examples of information systems
hardware.
Software: it comprises the set of instructions that tell the hardware what to do (i.e to
function in ways that produce useful information from data).
• For example, your address (street, city state, postal code), your phone number, and your
social networking account are all pieces of data. Pieces of unrelated data are not very
useful. But aggregated, indexed, and organized together into a database, data can become
a powerful tool for businesses. Organizations collect all kinds of data and use it to make
decisions which can then be analyzed as to their effectiveness. The analysis of data is then
used to improve the organization’s performance.
People
• When thinking about ISs, it is easy to focus on the technology components and forget to
look beyond these tools to fully understand their integration into an organization.
• It is associated with the manpower required to run and manage the system.
• People are the end user of the information system, end-user use information produced for
their own purpose, the main purpose of the information system is to benefit the end user.
• The end user can be accountants, engineers, salespersons, customers, clerks, or managers
etc.
• People are also responsible to develop and operate information systems.
• They include systems analysts, computer operators, programmers, and other clerical IS
personnel, and managerial techniques.
• The telecommunication networks like intranet, extranet and the internet.
• These resources facilitate the flow of information in the organization.
• Networks consists of both the physicals devises such as networks cards, routers, hubs and
cables and software such as operating systems, web servers, data servers and application
servers.
Process
94 | P a g e
• Businesses hoping to gain a competitive advantage over their competitors are highly
focused on this component of information systems
4.4 IS development phases
95 | P a g e
B. System Analysis
In this phase, one or more system analysts work with different stakeholder groups
to determine the specific requirements for the new system. No programming is
done in this step.
Instead, procedures are documented, key players are interviewed, and data
requirements are developed in order to get an overall picture of exactly what the
system is supposed to do. The result of this phase is a system-requirements
document.
C. System Design
The code finally gets written in the programming phase. Using the system-design
document as a guide, a programmer (or team of programmers) develop the
program.
The result of this phase is an initial working program that meets the requirements
laid out in the system-analysis phase and the design developed in the system-
design phase.
E. Testing
In the testing phase, the software program developed in the previous phase is put
through a series of structured tests. The first is a unit test, which tests individual
parts of the code for errors or bugs.
Next is a system test, where the different components of the system are tested to
ensure that they work together properly.
96 | P a g e
Finally, the user-acceptance test allows those that will be using the software to test
the system to ensure that it meets their standards. Any bugs, errors, or problems
found during testing are addressed and then tested again.
F. Implementation
Once the new system is developed and tested, it has to be implemented in the
organization.
This phase includes training the users, providing documentation, and conversion
from any previous system to the new system. Implementation can take many
forms, depending on the type of system, the number and type of users, and how
urgent it is that the system become operational.
G. Maintenance
This final phase takes place once the implementation phase is complete.
In this phase, the system has a structured support process in place: reported bugs
are fixed and requests for new features are evaluated and implemented; system
updates and backups are performed on a regular basis.
The whole purpose of system development is the enhancement of the productivity of the
organization and the group of people working in that organization, as system development got
bigger there was a need to systemize the process of system development and come up with a
set of steps that are required for any system development. The system development life cycle
is a common methodology used in all most every organization, as the system development
projects got bigger and the discipline of software engineering begun to set some standards to
its own a lot of methodologies have seen light and were put together by organizations seeking
success according to their own measurement of success. Before we get to further details about
various system development methodologies, we would like to give a basic definition of a
system development methodology.
• It's " a standard process followed by an organization to conduct all the steps necessary to
analyze, design, implement, and maintain information systems“. A methodology is also
defined as follows " A method describes the activities involved in defining, building, and
97 | P a g e
implementing a system; a method is a framework”. Since a method is a logical process
for constructing systems (process), it is known as a meta-process (a process for modeling
processes). The definition does not mention the reason why the organizations want to
follow those steps in system development,
• but it seems very obvious that one of the goals was to facilitate tracking problems whenever
they might occur, and build better and successful systems.
A methodology has micro and macro components. The macro components define the
overall flow and time-sequenced framework for performing work. The micro components
include general design rules, patterns and rules of thumb. General design rules state
properties to achieve or to avoid in the design or general approaches to take while building
a system. Patterns are solutions that can be applied to a type of development activity; they
are solutions waiting for problems that occur during an activity in a method. Rules of
thumb consist of a general body of hints and tips. A rule of thumb is a rule or principle
that you follow which is not based on exact calculations, but rather on experience and
common sense..
98 | P a g e
The RAD methodology consists of four phases:
A. Requirements Planning.
This phase is similar to the preliminary-analysis, system-analysis, and design phases of the
SDLC. In this phase, the overall requirements for the system are defined, a team is
identified, and feasibility is determined.
B. User Design.
In this phase, representatives of the users work with the system analysts, designers, and
programmers to interactively create the design of the system. One technique for working
with all of these various stakeholders is the so-called JAD session. JAD is an acronym for
joint application development. A JAD session gets all of the stakeholders together to have
a structured discussion about the design of the system. Application developers also sit in
on this meeting and observe, trying to understand the essence of the requirements.
C. Construction.
99 | P a g e
In the construction phase, the application developers, working with the users, build the next
version of the system. This is an interactive process, and changes can be made as
developers are working on the program. This step is executed in parallel with the User
Design step in an iterative [the repetition of a process in order to generate an outcome]
fashion, until an acceptable version of the product is developed.
D. Cutover.
In this step, which is similar to the implementation step of the SDLC, the system goes live.
All steps required to move from the previous state to the use of the new system are
completed here.
As you can see, the RAD methodology is much more compressed than SDLC. Many of the SDLC
steps are combined and the focus is on user participation and iteration. This methodology is much
better suited for smaller projects than SDLC and has the added advantage of giving users the ability
to provide feedback throughout the process. SDLC requires more documentation and attention to
detail and is well suited to large, resource-intensive projects. RAD makes more sense for smaller
projects that are less resource-intensive and need to be developed quickly.
Agile Methodologies
• Agile methodologies are a group of methodologies that utilize incremental changes with a
focus on quality and attention to detail.
• Each increment is released in a specified period of time (called a time box), creating a
regular release schedule with very specific objectives.
• While considered a separate methodology from RAD, they share some of the same
principles: iterative development, user interaction, ability to change.
• The agile methodologies are based on the “Agile Manifesto,” first released in 2001.
100 | P a g e
• Short time-frame increments (from days to one or two weeks) for each change to be
completed; and at the end of each iteration, a working project is completed to demonstrate
to the stakeholders.
• The goal of the agile methodologies is to provide the flexibility of an iterative approach
while ensuring a quality product.
Lean Methodology
• One last methodology we will discuss is a relatively new concept taken from the business
bestseller The Lean Startup, by Eric Reis.
• In this methodology, the focus is on taking an initial idea and developing a minimum viable
product (MVP).
• The MVP is a working software application with just enough functionality to demonstrate
the idea behind the project.
• A MVP is the first form of a product that you can release to users.
• It provides core functionality without any additional features.
• Once the MVP is developed, it is given to potential users for review.
• Feedback on the MVP is generated in two forms:
• direct observation and discussion with the users, and
• Usage statistics gathered from the software itself.
• Using these two forms of feedback, the team determines whether they should continue in
the same direction or rethink the core idea behind the project, change the functions, and
create a new MVP. This change in strategy is called a pivot.
• Several iterations of the MVP are developed, with new functions added each time based
on the feedback, until a final product is completed.
• The biggest difference between the lean methodology and the other methodologies is that
the full set of requirements for the system are not known when the project is launched.
• As each iteration of the project is released, the statistics and feedback gathered are used to
determine the requirements.
• The lean methodology works best in an entrepreneurial environment where a company is
interested in determining if their idea for a software application is worth developing.
Sidebar: The Quality Triangle
• Quality triangle, also known as a project management triangle, iron triangle, or project
101 | P a g e
triangle.
• When developing software, or any sort of product or service, there exists a tension between
the developers and the different stakeholder groups, such as management, users, and
investors.
• This tension relates to how quickly the software can be developed (time), how much money
will be spent (cost), and how well it will be built (quality).
• The quality triangle is a simple concept. It states that for any product or service being
developed, you can only address two of the following: time, cost, and quality.
• So what does it mean that you can only address two of the three? It means that you cannot
complete a low-cost, high-quality project in a small amount of time.
• However, if you are willing or able to spend a lot of money, then a project can be completed
102 | P a g e
quickly with high-quality results (through hiring more good programmers).
• If a project’s completion date is not a priority, then it can be completed at a lower cost with
higher-quality results.
• Of course, these are just generalizations, and different projects may not fit this model
perfectly.
• But overall, this model helps us understand the tradeoffs that we must make when we are
developing new products and services.
Criteria for system development methodologies comparison
• In the following section we would list and define some criteria that would be helpful for
any IS professional involved in a system development project to choose among the existing
methodologies to determine which one would fit the project he/she is working on based on
a predefined objective. So, all the criteria would be related to a component of a
methodology or one of its phases. As stated in the definition above, a methodology is a set
of steps to follow for a system development.
• One of the difference between the step by step methodologies and the SCURM
methodology is that the latter has only two defined processes planning and closure, whereas
the waterfalls admit that all processes are defined and well known, and the various step are
implemented in a linear fashion.
– note: SCURM is an agile development methodology used in the development of
Software based on an iterative and incremental processes
Processes definition
• By process definition we mean does the methodology assume that every step in the
development life cycle is well known? And that there is no room for environmental
changes? Or does the methodology allow a big deal of flexibility in all stages of the
development cycle to incorporate those changes that needs to be incorporated in the project
before its closure.
• Another criteria would be related to the final product. Does the methodology define the
final product early on in the planning stage or does it define it during the project and close
103 | P a g e
to project closure time.
Project cost
• This criterion is related to the estimation of the cost of the project and at what stage of the
project it's done.
Responsiveness to environment
• This criterion measures the flexibility that the methodology allows to incorporate changes
during the project, changes due to the environment, technology, competition or other.
• The steps predefined by the methodology could be an obstacle to creativity among teams,
as the linear model suggests that some work needs to be done first by a small group and
then the project moves to the next stage.
• This criterion try to measure the ability of allowing some team work and interactions
among the team members.
• Does the methodology steps allow training and knowledge transfer during the project or
does it put a limitations to what a team member can do and learn?
Probability of success
• This criterion measures the probability of success of a project using a certain methodology
104 | P a g e
by embracing a certain degree of complexity and unpredictability. (a successful project is
defined as a system that is useful when delivered).
105 | P a g e
Chapter 5: Major Issues in Computer and IS
5.1 Impact of IS
An IS in an organization is like the nervous system in the human body: it is the link that
connects all the organization's components (human resource, marketing, accounting and
finance, operations (i.e. production and service) etc.) together and provides for better operation
and survival in a competitive environment. For this reason, the right amount of information at
the right time is a key factor for every organization. Every person in the company needs or
generates information, and therefore no person in an organization can be totally detached from
its IS.
Impact of IS on managers: IS can change the manner in which many decisions are made, and
consequently change managers’ jobs. Every organization’s management makes decision,
prepare, plans, and controls activities by using information which is obtained from two major
sources namely: formal and informal sources such as face-to-face conversations e.g. telephone
calls, social contacts and so on.
Impact of IS on employees:
• People in all jobs benefits in many ways from IS even they are not computer specialists.
Since the IS works on the basic systems such as transaction processing and databases, the
labor of the clerical work is transferred to the computerized system, and relieving the
human mind for better work.
– Also it creates an information- based work culture in the organization
• Each day IS helps a million of peoples do their jobs more effectively with:
– greater efficiency,
– higher quality product or services,
– better information retrieval,
– eliminate paper works,
– Instant share of information etc.
• In spite of its positive impact IS has its own negative impact.
• The major limitation or negative impact of IS includes:
– displace employees (eliminate jobs),
106 | P a g e
– violate privacy,
– Information anxiety i.e. frustration, stress, injuries etc.
The impact of IS on organizational performance
107 | P a g e
Organizational performance comprises the actual output or results of an organization as measured
against its intended outputs
Manager’s measure and control organization performance because it leads to:
– better asset management,
– an increased ability to provide customer value,
– improve measures of organizational knowledge and measure of organizational
performance do have an impact on an organization’s status.
When the performance of the organization is assessed:
– the past management decisions that shaped investments,
– operations and financing are measured to know whether all resources were used
effectively, weather the profitability of the business met or even exceeded
expectations, and whether financing choice were made prudently.
In general, ISs helps every business company to maintain and provide good service satisfaction
for customers & make it possible for companies to manage all their information, make better
decisions, and improve their business processes.
Information Systems Ethics: is a set of concepts or principles that guides us on proper use of
information.
108 | P a g e
• Information accuracy
– Deals with authentication and fidelity of information
• Information property
– Deals with who owns information about individuals and how information can be
sold and exchanged
• Information accessibility
– Deals with what information a person has the right to obtain about others and how
the information can be used
– Issues in information accessibility
• Carnivore: software application designed to be connected to Internet
Service Providers’ computers and eavesdrops on all communications.
• Electronic Communications Privacy Act (ECPA): it offered stronger
109 | P a g e
support for voice mail than it did for e-mail. No other laws at federal or
state levels protect e-mail privacy
• Monitoring e-mail
• The need for a code of ethical conduct
– Business ethics
– Plagiarism
– Cybersquatting: registering a domain name and then trying to sell the name for
big bucks to a person, company. Domain names are a scarce resource – one of the
few scarce resources in cyberspace
Computer Crime: the act of using a computer to commit an illegal act
110 | P a g e
– Cloning: cellular phone fraud using scanners
– Carding: stealing credit card numbers online
– Piggybacking: stealing credit card numbers by spying
– Social engineering: tricking employees to gain access
– Dumpster diving: finding private info in garbage cans
– Spoofing: stealing passwords through a false login page
• Computer viruses and destructive code
– Virus – a destructive program that disrupts the normal functioning of computer
systems
– Types:
• Worm: usually does not destroy files; copies itself
• Trojan horses: Activates without being detected; does not copy itself
• Logic or time bombs: A type of Trojan horse that stays dormant for a
period of time before activating
Computer Security – precautions taken to keep computers and the information they contain safe
from unauthorized access
Recommended Safeguards
o Implement a security plan to prevent break-ins, Have a plan if break-ins do occur
o Make backups!, Only allow access to key employees
o Change passwords frequently, Keep stored information secure
o Use antivirus software, Use biometrics for access to computing resources
o Hire trustworthy employees
Encryption – the process of encoding messages before they enter the network or
airwaves, then decoding them at the receiving end of the transfer
Internet Security
o Firewall – hardware and software designed to keep unauthorized users out of
network systems
Virus prevention
o Install antivirus software, Make backups
o Avoid unknown sources of shareware, Delete e-mails from unknown sources
o If your computer gets a virus…
111 | P a g e
How to maintain your privacy online
o Choose Web sites monitored by privacy advocates
o Avoid “cookies”, Visit sites anonymously
o Use caution when requesting confirming e-mail
Avoid getting conned in cyberspace
o Internet auctions, Internet access, International modem dialing
o Web cramming, Multilevel marketing (pyramid schemes)
o Travel/vacations, Business opportunities
o Investments, Health-care products
5.3 Security concerns and security management strategies in e-business applications
Electronic (e-) business, refers to the use of digital technology and the Internet to carry out key
business processes within the company. It includes activities for the company's internal
management and for coordination with suppliers and other business partners. This also includes
e-commerce and it is a part of e-business that deals with the purchase and sale of goods and
services through the internet.
E-Business Security Concerns
• Internet can seem like an entrepreneur's dream come true. The Web offers instant access
to millions of consumers around the world and the ability to set up a virtual store, which
can limit start-up costs. While the Web does offer a powerful platform for launching new
venture, e-businesses are subject to a variety of unique security concerns.
112 | P a g e
The term software bug sounds similar to a virus or worm, which are themselves types of
malicious programs, but it means something different entirely. A software bug is simply a
mistake or oversight in a computer program or website coding that makes the site or
program behave in an unintended way. A bug could result in something relatively benign,
like minor aesthetic errors on a website. On the other hand, a bug could potentially cause
major problems like site crashes and allowing users access to data that they are not
supposed to see.
Active Malicious Threats
While malware can passively infect computers, outside parties can also actively attack web
companies. An e-businesses usually lets users interact with a website, possibly by
registering for an account and submitting various forms to the business's web server.
Experienced computer users may be able to exploit weaknesses in a website to gain access
to or "hack" into data that they are not supposed to be able to access. Hackers can
potentially steal information like customer names, credit card numbers and passwords, or
they may inject malicious code into a website that causes data loss.
For example, Sony's PlayStation Network was the victim of a major hacking operation in
2011 that resulted in the theft of millions of users' personal information.
Malicious users may also pretend to be trusted authorities or friends in an attempt to trick
employees or managers into divulging sensitive information. This method of stealing data
is called "phishing."
Physical Data Theft
Most of the threats to e-businesses come through the Internet itself, but businesses can also
be subject to physical data theft. If a thief steals the physical hardware that a company uses
to conduct business, such as hard drives or Web servers, he may be able to recover
confidential information. Since there are several ways e-businesses can potentially lose
important data, it is important to make backup copies of data on a regular basis and ensure
that physical plants are secure.
Wireless and Mobile Security
Many businesses use wireless Internet connections and mobile devices to access the Web.
Wireless networks present a security hazard, since outside users can attempt to connect to
113 | P a g e
a wireless network, allowing them to potentially eavesdrop on communications. Securing
a wireless network with a password can make it more difficult for outside users to connect
to the network and access sensitive information, but a wireless connection is not as secure
as a wired connection, even if it has password protection. Mobile devices can be a security
concern both because they use wireless communication and because they are easy to
misplace.
Security management strategies in e-business applications
114 | P a g e
Both involve poorly written code, leaving “holes” or gaps that attackers can
use to carry out malicious activities, such as modifying the code to extract
sensitive data or damage the system.
Recent research found that vulnerabilities in open source libraries are
growing rapidly.
That’s where software composition analysis comes in.
Tools like tCell and InsightVM look at all third-party packages to see if
any borrowed code has vulnerabilities.
2. Earlier dynamic web application testing
Given how fast many web apps have been created over these past few
weeks and months, as well as how much traffic they are receiving, it’s
important to test your web apps pre-production to identify security
weaknesses earlier in the software development lifecycle and ensure your
business and users are protected.
Having the ability to continuously scan for potential issues, especially on
apps that drive revenue or are at the forefront of your customer
experience, can help mitigate issues before they become one, and keep
your business and customers safe.
It also helps mitigate a breach that could land you in the not-so-favorable
news headlines (and can ruin your brand reputation).
Dynamic Application Security Testing (DAST) solutions
like InsightAppSec and AppSpider are built to dynamically scan and test
modern applications with fewer false positives and are scalable across
your entire application portfolio.
InsightAppSec, for example, is designed to detect more than 95 attack
types and offers Attack Replay,
a feature that allows you to reproduce an issue after you implement a fix to
immediately test the work and close out the ticket.
Want to make sure that you build application security into your
development lifecycles?
Integrate your DAST tool with a Continuous Integration and Continuous
115 | P a g e
Delivery or Continuous Development (CI/CD) platform so as new features
are released, they are being tested for both quality assurance and any
potential security weaknesses.
It also provides compliance-specific report templates for an immediate
understanding of the compliance risk of your web applications.
Tools like InisghtAppSec are specifically designed to automatically assess
modern web apps and APIs,
fast-track fixes with rich reporting and integrations, keep compliance and
development stakeholders informed, and effortlessly scale as your
application portfolio grows.
APIs (Application Programming Interfaces), which is a software
intermediary that allows two applications to talk to each other.
Each time you use an app like Facebook, send an instant message, or
check the weather on your phone, you're using an API.
3. Application monitoring and protection
With secure code that’s been tested for potential vulnerabilities or issues,
the last (but equally important) piece is continually monitoring and
protecting your application from future issues.
It’s not enough to scan or test once and consider yourself secure. Today,
attackers are continuously looking for holes and adapting their attack
strategies, so your application needs a way to keep up.
As e-commerce applications are being used more than ever before, these
are prime targets for attack, and it’s your job to ensure your apps are
protected in order to keep your business and customers safe, and your
company name out of the headlines.
Monitoring and protecting your applications with Next-Gen Web
Application Firewalls (WAFs) and Runtime Application Self-Protection
(RASP) tools allow you to know that your application is protected in
production.
Tools like tCell by Rapid7 are specifically designed to provide visibility
into your application and protection at runtime.
116 | P a g e
There are many ways to get a handle on application security, and securing
your web applications should be one of the first.
To get started, check out InsightAppSec and tCell for production and live
code scanning to ensure you’re not carrying around unwanted
vulnerabilities.
Ethics in ISs can be defined as "ethics that focuses on the relationship between the
creation, organization, dissemination, and use of information, and the ethical standards
and moral codes governing human conduct in society".
These ethical issues include:
Information Rights: Privacy and Freedom in the Information Rights
o Privacy: Most people have their personal data spread throughout the digital world.
o Even things thought to be secure, such as email or private accounts, can be
accessed by unintended sources.
o Most employers actively check their employees’ computer habits.
o Privacy has evolving legal implications, but there are also ethical considerations.
o Do people know how their accounts are monitored? To what extent is such
monitoring occurring?
Intellectual Property Rights
• Trade secrets
• Copyright
• Patents
Accountability, liability, and control
• Who is liable (legally responsible) for injuries that result from machines
controlled by software?
• Computer-related liability problems
System quality: data quality and system errors
• Software bugs and errors
• Hardware or facility failures caused by natural or other causes
• Poor input data quality
117 | P a g e
The Spamming Problem
o What are its causes?
o What techniques/ solutions do you use to shield yourself from spam?
o How affective are these techniques/solutions?
118 | P a g e
Chapter 6: Major Applications and Current trends of Computer and
Information Systems
As stated in previous chapter, an IS is a set of interrelated components that collect (or retrieve),
process, store and distribute information to support decision making and control in an organization.
Its role is to support the key aspects of running an organization, such as communication, record-
keeping, decision making, data analysis and more. Companies use this information to improve
their business operations, make strategic decisions and gain a competitive edge.
Using ISs effectively requires an understanding of the organization, management, and IS shaping
the systems. All ISs can be described as organizational and management solutions to challenges
posed by the environment. Three basic activities—input, processing, and output—produce the
information organizations need. Feedback is output returned to appropriate people or activities in
the organization to evaluate and refine the input. Environmental actors, such as customers,
suppliers, competitors, stockholders, and regulatory agencies, interact with the organization and
its information systems.
IS handles the flow and maintenance of information that supports a business or some other
operation in the following ways and more.
Information Storage: Keeping a log of activities is important for all the organizations, to
understand the reason for the problems and so to provide solution to the same.
it simple to store operational data, revision histories, communication records and
documents.
It simplifies the process of finding the data easily.
Simplified Decision Making: eases the process of decision making and simplifies the
process of delivering the required information and hence assists in taking better decisions
instantly.
helping decision makers by providing accurate and time based information helping
them in making the right decisions
Behavioral Change: help communication better between the employers and the employees.
as it stores documents and files in folders that can be accessed and shared by the
employees.
119 | P a g e
This ensures to oversee the flow of information between the management and the
lower-level employees.
This also allows the front-line employees to be a part of the decision making
process and hence feel motivated and committed towards doing a task.
An understanding of the effective and responsible use and management of IS is important for
managers, business professionals, and other knowledge workers in today’s internetworked
enterprises. ISs play a vital role in the e-business and e-commerce operations, enterprise
collaboration and management, and strategic success of businesses that must operate in an
internetworked global environment. E-business is a very broad concept that involves a business
organization to use electronic medium to carry out all specialized or overall business activities.
It includes any process that a business organization conducts over electronic and
computer enabled network.
E-commerce is the buying and selling of products and services via the internet. Thus, the field of
ISs has become a major functional area of business administration. In the business environment
there is a range of requirements for information.
Senior managers need information to help with their corporate planning. Middle management
needs more detailed information to help monitor and control business actions. Teams with
operational roles need information to help carry out their duties. Thus, companies tend to have
several IS operating at the same time. The most common types of IS include: Office Automation
System, Transaction Processing System, Management Information System, and Decision Support
System.
120 | P a g e
processing, electronic filing, and e-mail are integrated into the office automation systems.
Word Processing
• Word processing is used for the preparation of documents like letters, reports, memos, or
any type of printable material by electronic means. The text is entered by keyboard and
displayed on the computer’s display unit and can be edited, stored, and reproduced with
the help of commands present in the word processor.
• Word processors have facilities for spell checking, grammar checking, counting (character,
lines, pages, etc.), automatic page numbering, index creation, header, and footer, etc
Email
• E-mail or electronic mail facilitates the transfer of messages or documents with the help
of computers and communication lines. This helps in the speedy delivery of mails and
also reduces the time and cost of sending paper mail.
• E-mail supports not only the transfer of text messages but also has options for sending
images, audio, video, and many other types of data.
Voice Mail
• Voice mail, an important call service, allows the recording and storing of telephone
messages into the computer’s memory. The intended person can retrieve these messages
at any time.
6.2 Transaction Processing System
Every firm needs to process transactions in order to perform its daily business operations. A
transaction refers to any event or activity that affects the organization. Transaction process is
a term that refers to the adding, changing, deleting, or looking up of a record in a data file or
database by entering the data at a terminal or workstation. Depending on the organization’s
business, transactions may differ from one organization to another.
In a manufacturing unit, for example, transactions include order entry, receipt of goods,
shipping, etc., while in a bank, transactions include deposits and withdrawals, cashing of
cheques, etc. However, some transactions, including placing orders, billing customers, hiring
employees, employee record keeping, etc., are common to all organizations.
To support the processing of business transactions, transaction processing systems (TPS) are
121 | P a g e
used in organizations.
Management information systems (MIS) are specially developed to support the planning,
controlling, and decision-making functions of middle managers. MISs extracts transaction data
from underlying TPSs, compiles them, and produces information products in the form of reports,
displays, or responses. These information products provide information that conforms to the
decision-making needs of managers and supervisors.
MISs use simple routines like summaries and comparisons which enable managers to take
decisions for which the procedure of reaching a solution has been specified in advance.
Generally, the format of reports produced by MIS is pre-specified.
A typical MIS report is a summary report, such as a report on the quarterly sales made by each
sales representative of the organization. Another type of MIS report is an; for example, exception
report that specifies the exception conditions the sales made by some sales representative is far
below than expected. Usually, MISs are used to produce reports on a monthly, quarterly, or yearly
basis. However, if managers want to view the daily or hourly data, MIS enables them to do so.
In addition, they provide managers online access to the current performance as well as past records
of the organization. Many different types of report are produced in MIS. Some of the reports are
a summary report, on-demand report (user selects a particular profile and then clicks the "Report"
button), ad-hoc reports (create reports on an as-needed basis one time) and an exception report.
A decision support system (DSS) is an interactive computer-based IS that, like MIS, also serves at
the management level of an organization. However, in contrast to MIS, it processes information to
support the decision-making process of managers. It provides middle managers with the
information that enables them to make intelligent decisions. A DSS in a bank, for example, enables
a manager to analyze the changing trends in deposits and loans in order to find out the yearly
122 | P a g e
targets.
DSSs are designed for every manager to execute a specific managerial task or problem.
Generally, they help managers to make semi-structured decisions, the solution to which can be
arrived at logically. However, sometimes, they can also help in making complex decisions.
To support such decisions, they use the information generated by OASs and TPSs. DSSs have
more analytical power as compared to other ISs. They employ a wide variety of decision
models to analyze data or summarize a vast amount of data into a form (usually form of tables
or charts) that make the comparison and analysis of data easier for managers.
They provide an interactive environment so that the users could work with them directly, add
or change data as per their requirements, and ask new questions.
Example: Financial planning systems, Bank loan management systems.
Current trends of Information Systems
An IS is a complex decision support system which is used by firms to enhance and improve their
business operations. It is a tool used to help management make informed decisions for their
business based on information gathered from all business departments. There are many more
trends emerging through advances in ISs.
Globalization
• The first trend to note is the continuing expansion of globalization.
• The use of the Internet is growing all over the world, and with it the use of digital
devices.
Data mining is used by companies to collect data regarding consumer purchases and
other economic trends.
• An important trend in ISs is the ability for firms to use data mining.
• Using a broad range of techniques, you can use this information to increase revenues,
cut costs, improve customer relations
• This allows management to use the information gathered to establish goals and
directions for future business operations
Collaborative: is the ability for firms to network with other companies for business
purposes.
• Electronic data interchange (EDI) is used by manufacturing firms to shorten their
123 | P a g e
supply chain.
• EDI is used to transfer the necessary information for ordering more products.
• Networking also allows companies to transfer money through different bank
accounts which gives firms the opportunity to pay bills and purchase materials
much quicker.
• Advances in ISs have led to the creation of new careers in both database
management and consultancy.
Social media
• Social media growth is another trend that continues. Facebook now has over one
billion users!
Personalization
• Ever since the advent of Web 2.0 and e-commerce, users of ISs have expected to be
able to modify their experiences to meet their personal tastes.
• From custom backgrounds on computer desktops to unique ringtones on mobile
phones, makers of digital devices provide the ability to personalize how we use them.
• More recently, companies such as Netflix have begun assisting their users with
personalizations by making suggestions.
Mobile
• Perhaps the most impactful trend in digital technologies in the last decade has been
the advent of mobile technologies.
• Beginning with the simple cellphone in the 1990s and evolving into the smartphones
and tablets of today, the growth of mobile has been overwhelming.
• Here are some key indicators of this trend: Mobile device sales, Internet access via
mobile, The rise of tablets.
Wearable
• The average smartphone user looks at his or her smartphone 150 times a day for
functions such as messaging (23 times), phone calls (22), listening to music (13), and
social media (9).
• Many of these functions would be much better served if the technology was worn on,
or even physically integrated into, our bodies.
• This technology is known as a “wearable.”
124 | P a g e
• Wearables have been around for a long time, with technologies such as hearing aids
and, later bluetooth earpieces.
• But now, we are seeing an explosion of new wearable technologies.
• Perhaps the best known of these is Google Glass, an AR device that you wear over
your eyes like a pair of eyeglasses.
• Visible only to you, Google Glass will project images into your field of vision based
on your context and voice commands.
• Another class of wearables are those related to health care.
• The UP by Jawbone consists of a wristband and an app that tracks how you sleep,
move, and eat, then helps you use that information to feel your best.
• It can be used to track your sleep patterns, moods, eating patterns, and other aspects
of daily life, and then report back to you via an app on your smartphone or tablet.
• As our population ages and technology continues to evolve, there will be a large
increase in wearables like this.
Findable
• The “Internet of Things (IoTs)” refers to the idea of physical objects being connected
to the Internet.
• Advances in wireless technologies and sensors will allow physical objects to send and
receive data about themselves.
• Many of the technologies to enable this are already available – it is just a matter of
integrating them together.
Autonomous
• A final trend that is emerging is an extension of the IoTs: autonomous robots and
vehicles.
• By combining software, sensors, and location technologies, devices that can operate
themselves to perform specific functions are being developed.
• These take the form of creations such as medical nanotechnology robots (nanobots),
self-driving cars, or unmanned aerial vehicles (UAVs).
• A nanobot is a robot whose components are on the scale of about a nanometer, which
is one-billionth of a meter.
• While still an emerging field, it is showing promise for applications in the medical
125 | P a g e
field.
• For example, a set of nanobots could be introduced into the human body to combat
cancer or a specific disease.
126 | P a g e
References
Text book
1. Belle, Jean-Paul Van et al. 2001.Discovering Information Systems. California, USA.
2. Jason, Charvat. 2003. Project Management Methodologies: Selecting, Implementing, and
Supporting Methodologies and Processes for Projects. John Wiley & Sons.
3. Satzinger, John W.,Jackson, Robert B., and Burd, Stephen D.2007. Systems Analysis and
Design. Course Technology,Australia.
4. Hoffer, Jeffrey A., George, Joey F., and Valacich, Joseph S.1999. Modern Systems Analysis
and Design.5th ed. Addison-wesley,inc, Reading.
5. Project Cycle Management Technical Guide. 2001. FAO. Rome, Italy.
6. Whitten, Jeffer L. and Bentley, Lonnie D. 2007.Systems Analysis & Design Methods.7th ed.
McGraw-Hill, New York.
7. Informaiton systems Today, By Leonard, M. JessupReferences
8. Computer Science: An Overview: International Edition, (10 ed), Pearson Higher Education,
2007
127 | P a g e