SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
CONCEPTS AND
COMPONENTS OF
INFORMATION SYSTEM
What is a system?
 A system is defined a set of interrelated components, with a
clearly defined boundary, working together to achieve a
common set of objectives by accepting input and producing
outputs.
 It has three basic functions:
 INPUT
 PROCESSING
 OUTPUT
 INPUT : involves capturing and assembling elements that enter
the system to be processed.
Ex-raw materials, energy and data.
 PROCESSING: involves transformation processes that convert
input into output.
Ex-manufacturing processes, mathematical calculation.
 OUTPUT: involves transferring elements that have been
produced by transformation process to there ultimate
destination.
Ex-finished products, human services.
FEEDBACK AND
CONTROL
 The system concept becomes more useful by including to
elements, feedback and control. A system with feedback and
control functions is called a cybernetic system.
 FEEDBACK: is data about the performance about the system.
Ex-data about sale performance are feedback to sales manager.
 CONTROL: involves monitoring and evaluating feedback to
determine whether a system is moving towards the
achievements of its goal.
 It makes necessary adjustments to a system input and
processing components. Ex-a sales manager exercise control
when reassigning sales person to new sales territories
INFORMATION SYSTEM
 A model that expresses a fundamental conceptual framework
for the major components and activities is called IT system. it
highlighted the relationships among the components and
activities of information system. It also provides a framework
that emphasis concepts that can be applied to all types of
information system.
INFORMATION SYSTEM
RESOURCE
PEOPLE
RESOURCES
NETWORK
RSOURCES
DATA
RESOURCES
SOFTWARE
RESOURCES
HARDWARE
RESOURCES
PEOPLE RESOURCE
 People are the essential ingredient for the successful operation
of all information system. It includes end users and IS
specialist.
 END USERS are people who use an information system or the
information it produces. They can be customers , sales person
are found at all levels.
 IS SPECIALIST are people who develop and operate
information system. It includes system analysts, software
developers etc.
HARDWARE
RESOURCES
 It includes all physical devices and material used in
information processing. It includes not only machines, such as
computers but also all data media, i.e. tangible objects on
which data is recorded. Ex-
 COMPUTER SYSTEM : consist of central processing units
containing micro processors and a variety of interconnected
devices such as printers , scanners etc.
 COMPUTER PERIPHERALS: are devices such as
keyboard, electronic mouse for the input of data and
commands , a video screen or printers for the output of the
information.
SOFTWARE RESOURCES
 It includes all sets of information processing instructions. This
generic concept includes not only the sets of operating
instructions called programs which direct and control computer
hardware but also the set of information processing instruction
called procedure that people need.
 Example:
 System software
 Application software
 procedures
DATA RESOURCES
 This concept has been broadened by managers and information
system professionals. They realize the data constitute valuable
organizational resources. It resulted in variety of changes in
modern organization. Under this data can take many forms
including traditional numeric data composed of numbers etc.
The data resources of information system are typically
organized, stored, accessed by a variety of data resource
management technologies into:
 Data base that hold processed and organize data.
 Knowledge bases that hold knowledge in a variety of forms
such as facts.
NETWORK RESOURCES
 It emphasizes that communications technologies and networks
are fundamental resource components of all information
system. It includes:
 Communication Media- includes twisted pair
wire, microwave, cellular wireless technologies.
 Network Infrastructure- emphasizes that many
hardware, software and data technologies are needed to
support the operations and use of communication network.
Ex-communication processors such as modems.
TYPES OF COMPUTER SYSTEMS
There are three categories of computer systems:
 Microcomputer systems
 Midrange systems
 Mainframe systems
COMPUTER
HARDWARE
MICROCOMPUTER
SYSTEMS
 Microcomputers are the most important category of computer
systems for both business people and consumers.
 Microcomputers have become powerful networked
professional workstations for business professionals.
 Examples: personal computers, networked
computers, technical workstations, information appliances.
MIDRANGE
COMPUTERS
 Midrange systems are primarily are high-end network servers
that can handle the large scale processing of many business
applications.
 Midrange systems first became popular as minicomputers for
scientific research, engineering analysis, instrumentation
systems, and industrial process monitoring and control.
 Midrange systems are used as front-end servers to assist
mainframe computers in telecommunications processing and
network management.
 Examples: network servers, minicomputers, web servers and
multiuser systems
MAINFRAME COMPUTER
SYSTEMS
 Mainframe systems are large, fast and powerful computer
systems.
 They have large primary storage capacity.
 They handle the information processing needs of major
corporations and government agencies with high transaction
processing volumes or complex computational problems.
 Examples: enterprise systems, super servers, and super
computers.
PERIPHERALS
 Peripherals is a generic name given to all input , output and
secondary storage devices that are a part of a computer
system.
 Peripherals depend on direct connections or
telecommunications link to the central processing unit of a
computer system .
INPUT TECHNOLOGIES
 Input technologies now provide a more natural user interface
for computer systems you can enter the data directly & easily
into computer through pointing devices like electronic mice
and touch pads and with technologies like optical scanning
, handwriting recognition , voice recognition .
Pointing devices
 Pointing devices are used for issuing commands , making
choices .
 They include devices such as electronic mouse, trackball and
touch pads .
 Electronic mouse: It is most popular device used to move the
cursor on the screen to issue commands and make selections .
 Touch pads: It is a small rectangular touch sensitive surface
usually placed below the keyboard the cursor moves in
direction your fingers move on pad.
Pen based computing
 Instead of using keyboard or clipboard you can use a pen to
make selections, send e-mails, draw or write.
 Various pen devices are available such as digitizer pen and
graphics tablet.
Speech recognition systems
 Speech recognition systems analyze and classify your speech
and sound patterns . Software compares your speech patterns
to a database of sound patterns and passes the recognized
words to your application software
 Devices in workplace allow operators to perform data entry
without their hands on keys .
Optical scanning
 Optical scanning devices read text or graphics and convert
them into digital input for your computer .
 OCR (optical character recognition) is also a type of optical
scanning technology . OCR scanners can read characters and
codes on product labels, airline tickets etc
STORAGE TRADE-OFFS
 Computer users depend on memory circuits and secondary
storage devices of computer systems to meet storage
requirements.
 Progress in very-large-scale integration (VLSI), which packs
millions of memory circuit elements on tiny semi-conductor
memory chips, is responsible for continuing increases in main
memory capacity of computers.
 High speed storage media cost more per byte and provide
lower capacities.
 Large capacity storage media cost less per byte but are slower.
 Primary storage circuits use RAM chips, which loose their
contents when electrical power is interrupted while secondary
storage devices provide a more permanent type of storage
media.
Computer storage fundamentals
 Data are processed and stored in a computer system through
the presence or absence of electronic or magnetic signals in
the computer circuitry or in the media it uses.
 This character is called two-state or binary representation of
data because the computer and media can exhibit only two
possible states or conditions, similar to a common light
switch: “on” or “off”.
 The smallest element of data is called bit, which can have a
value of either zero or one.
 The capacity of memory chips is usually expressed in terms of
bits.
 A byte is a basic grouping of bits that the computer operates as
a single unit.
 Storage capacities can be measured in
kilobytes, megabytes, gigabytes or terabytes.
 There are four types of storage trade-offs-
o Semiconductor memory
o Magnetic disks
o Optical disks
o Magnetic tape
Direct and sequential access
 Primary storage media such as semiconductor memory chips
are called direct access memory or random access memory.
 Secondary storage media such as magnetic tape cartridges are
known as sequential access devices.
 The concepts described by Direct and sequential access are as
follows-
 An element of data or instructions can be directly stored and
retrieved by selecting and using any of the locations on
storage media.
 Each storage position has a unique address and can be
individually accessed in approximately the same length of
time without having to search through other storage positions.
Semiconductor memory
 The primary storage of a computer consists of microelectronic
semiconductor chips.
 It provides with the working storage a computer needs to
process applications.
 Attractions of semiconductor memory are-
o Small size
o Great speed
o Shock resistance
o Temperature resistance
 Two basic types of semiconductor memory are-
 Random Access Memory(RAM): These memory chips are
most widely used primary storage medium. Each memory
position can be both sensed(read) and changed(written), so it
is called read/write memory. This is a volatile memory.
 Read Only Memory(ROM): Non-volatile memory chips are
used for permanent storage; ROM can be read but not erased
or overwritten.
Magnetic disks
 Magnetic disks are the most common form of secondary
storage for a computer system.
 They provide fast access and high storage capacities at a
reasonable cost.
 Data are recorded on tracks in the form of tiny magnetized
spots to form the binary digits of common computer codes.
 Thousands of bytes can be recorded on each track, and there
are several hundred data tracks on each disk surface, thus
providing us with billions of storage positions for software
and data.
RAID storage
 Redundant Arrays of Independent Disks(RAID) combine from
6 to more than 100 small hard disk drives and their control
microprocessors into a single unit.
 RAID units provide large capacities with high access speeds
because data are accessed in parallel over multiple paths from
many disks.
 They provide a fault-tolerant capacity, in which their
redundant design offers multiple copies of data on several
disks.
 If one disk fails, data can be recovered from backup copies
automatically stored on other disks.
MAGNETIC TAPE
 Tape storage is moving beyond backup. Although disk
subsystems provide the fastest response time for mission-
critical; data, the sheer amount of data that users need to
access these days as part of huge enterprise applications, such
as data warehouse, requires affordable (magnetic tape)
storage.
 On growing business application of magnetic tape involves
the use of high-speed 36-track magnetic tape cartridges in
robotic automated drive assemblies that can directly access
hundreds of cartridges.
 Other major applications for magnetic tape include long-term
archival storage and backup storage for PCs and other
systems.
OPTICAL DISKS
 Optical disk technology has become a necessity. Most
software companies now distribute their elephantine programs
o CD-ROMs.
 It is a fast-growing type of storage media.
 Examples :- CD-ROM, CD-RW, DVD, DVD-ROM etc.
Business Applications
 One of the use of optical disks in mainframe and midrange
systems is in image processing, where long-term archival
storage of historical files of document images must be
maintained.
 Interactive multimedia applications in
business, education, and entertainment area another major use
of optical disks.
 Financial institutions, among others, are using optical
scanners to capture digitized document images and store them
on optical disks as an alternative to microfilm media.
RADIO FREQUENCY
IDENTIFICTAION
 One of the newest and most rapidly growing storage
technologies is radio frequency identification [RFID] a system
for tagging and identifying mobile objects such as store
merchandise, postal packages, and sometimes even living
organisms.
 Using special device called an RIFD reader, RFID allows
objects to be labeled and tracked as they move from place to
place.
 RFID technology works using small pieces of hardware
called RFID chips. These chips feature an antenna to transmit
and receive radio signals. These are of 2 types passive and
active.
 Passive chips do not have a power source and active chips
are self powered and do not need to be close to the reader to
transmit their signal.
 The RIFD systems were created as an alternative to common
bar codes.
RFID Privacy Issues
 The use of RFID technology has caused considerable
controversy and even product boycotts by consumer privacy
advocates who refer to RFID tags as spy chips.
 The 2 main privacy concerns are:
1. Since the owner of an item will not necessarily be aware of
the presence of an RFID tag, and the tag can be read at a distance
without the knowledge of the individual, it becomes possible to
gather sensitive data about an individual without consent.
2. If a customer pays by a credit card, then it would be
possible to deduce the identity of the purchaser indirectly by
reading the globally unique ID of that item.
Enhancing Security using RFID
 RFID presents the potential for enormous efficiencies and
cost savings.
 It also presents significant challenges to privacy and security.
example-Chennai air port
1. Components of Information Systems.pdf

Contenu connexe

Similaire à 1. Components of Information Systems.pdf

computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer systemloveobi25
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information systemNareshBabu285920
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Sami Khan
 
CS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfCS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfAsst.prof M.Gokilavani
 
Computer Organization and Architecture for engineering
Computer Organization and Architecture for engineeringComputer Organization and Architecture for engineering
Computer Organization and Architecture for engineeringallwynanands1
 
introduction to computer
introduction to computerintroduction to computer
introduction to computerarehkelvin
 
Management Information System (mis)- unit-3
Management Information System (mis)- unit-3Management Information System (mis)- unit-3
Management Information System (mis)- unit-3Manoj Kumar
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptxmehrajdin18
 

Similaire à 1. Components of Information Systems.pdf (20)

Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
computers and nursing and computer system
computers and nursing and computer systemcomputers and nursing and computer system
computers and nursing and computer system
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2
 
CS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdfCS304PC:Computer Organization and Architecture UNIT I.pdf
CS304PC:Computer Organization and Architecture UNIT I.pdf
 
Computer Organization and Architecture for engineering
Computer Organization and Architecture for engineeringComputer Organization and Architecture for engineering
Computer Organization and Architecture for engineering
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Lecture
LectureLecture
Lecture
 
Lecture
LectureLecture
Lecture
 
IT Lecture
IT LectureIT Lecture
IT Lecture
 
Lecture-It104
Lecture-It104Lecture-It104
Lecture-It104
 
It
ItIt
It
 
1.TechieNest embedded systems
1.TechieNest embedded systems1.TechieNest embedded systems
1.TechieNest embedded systems
 
1.techie nest embedded systems
1.techie nest embedded systems1.techie nest embedded systems
1.techie nest embedded systems
 
Management Information System (mis)- unit-3
Management Information System (mis)- unit-3Management Information System (mis)- unit-3
Management Information System (mis)- unit-3
 
Grade 10_QUARTER 1_WEEK 1-2.pptx
Grade 10_QUARTER 1_WEEK 1-2.pptxGrade 10_QUARTER 1_WEEK 1-2.pptx
Grade 10_QUARTER 1_WEEK 1-2.pptx
 
Computers part 1
Computers   part 1Computers   part 1
Computers part 1
 
Computers part 1
Computers   part 1Computers   part 1
Computers part 1
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
 
Computers
ComputersComputers
Computers
 

Plus de calf_ville86

Lesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptxLesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptxcalf_ville86
 
Logistics and Managing Transportion.pptx
Logistics and Managing Transportion.pptxLogistics and Managing Transportion.pptx
Logistics and Managing Transportion.pptxcalf_ville86
 
Lesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxLesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxcalf_ville86
 
Lesson 3 - The Kimbal Lifecycle.pptx
Lesson 3 - The Kimbal Lifecycle.pptxLesson 3 - The Kimbal Lifecycle.pptx
Lesson 3 - The Kimbal Lifecycle.pptxcalf_ville86
 
Lesson 3 - Basic Application Software.pptx
Lesson 3 - Basic Application Software.pptxLesson 3 - Basic Application Software.pptx
Lesson 3 - Basic Application Software.pptxcalf_ville86
 
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptx
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptxLesson 2 - The Internet, the Web, and Electronic Commerce.pptx
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptxcalf_ville86
 
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxLESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxcalf_ville86
 
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfLesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfcalf_ville86
 
Lessoon 1 - Information Technology, The Internet and You.pptx
Lessoon 1 - Information Technology, The Internet and You.pptxLessoon 1 - Information Technology, The Internet and You.pptx
Lessoon 1 - Information Technology, The Internet and You.pptxcalf_ville86
 
DATA WAREHOUSING.pptx
DATA WAREHOUSING.pptxDATA WAREHOUSING.pptx
DATA WAREHOUSING.pptxcalf_ville86
 
Definition of requirements for each project phases.pdf
Definition of requirements for each project phases.pdfDefinition of requirements for each project phases.pdf
Definition of requirements for each project phases.pdfcalf_ville86
 
3. System development life cycle.ppt
3. System development life cycle.ppt3. System development life cycle.ppt
3. System development life cycle.pptcalf_ville86
 
1. Transaction Processing and Concurrency Control.pptx
1. Transaction Processing and Concurrency Control.pptx1. Transaction Processing and Concurrency Control.pptx
1. Transaction Processing and Concurrency Control.pptxcalf_ville86
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptxcalf_ville86
 
sybca-bigdata-ppt.pptx
sybca-bigdata-ppt.pptxsybca-bigdata-ppt.pptx
sybca-bigdata-ppt.pptxcalf_ville86
 
1. Business logic.pptx
1. Business logic.pptx1. Business logic.pptx
1. Business logic.pptxcalf_ville86
 

Plus de calf_ville86 (19)

Lesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptxLesson 3 - Network Security.pptx
Lesson 3 - Network Security.pptx
 
Logistics and Managing Transportion.pptx
Logistics and Managing Transportion.pptxLogistics and Managing Transportion.pptx
Logistics and Managing Transportion.pptx
 
Lesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptxLesson 3 - Enterprise System Architecture.pptx
Lesson 3 - Enterprise System Architecture.pptx
 
Lesson 3 - The Kimbal Lifecycle.pptx
Lesson 3 - The Kimbal Lifecycle.pptxLesson 3 - The Kimbal Lifecycle.pptx
Lesson 3 - The Kimbal Lifecycle.pptx
 
Lesson 3 - Basic Application Software.pptx
Lesson 3 - Basic Application Software.pptxLesson 3 - Basic Application Software.pptx
Lesson 3 - Basic Application Software.pptx
 
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptx
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptxLesson 2 - The Internet, the Web, and Electronic Commerce.pptx
Lesson 2 - The Internet, the Web, and Electronic Commerce.pptx
 
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptxLESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
LESSON 1 - DATABASE MANAGEMENT SYSTEM.pptx
 
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfLesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
 
Lessoon 1 - Information Technology, The Internet and You.pptx
Lessoon 1 - Information Technology, The Internet and You.pptxLessoon 1 - Information Technology, The Internet and You.pptx
Lessoon 1 - Information Technology, The Internet and You.pptx
 
DATA WAREHOUSING.pptx
DATA WAREHOUSING.pptxDATA WAREHOUSING.pptx
DATA WAREHOUSING.pptx
 
Definition of requirements for each project phases.pdf
Definition of requirements for each project phases.pdfDefinition of requirements for each project phases.pdf
Definition of requirements for each project phases.pdf
 
3. System development life cycle.ppt
3. System development life cycle.ppt3. System development life cycle.ppt
3. System development life cycle.ppt
 
1. Transaction Processing and Concurrency Control.pptx
1. Transaction Processing and Concurrency Control.pptx1. Transaction Processing and Concurrency Control.pptx
1. Transaction Processing and Concurrency Control.pptx
 
Introduction to Information Management.pptx
Introduction to Information Management.pptxIntroduction to Information Management.pptx
Introduction to Information Management.pptx
 
sybca-bigdata-ppt.pptx
sybca-bigdata-ppt.pptxsybca-bigdata-ppt.pptx
sybca-bigdata-ppt.pptx
 
PART 1.docx
PART 1.docxPART 1.docx
PART 1.docx
 
Lesson 2.docx
Lesson 2.docxLesson 2.docx
Lesson 2.docx
 
1. Business logic.pptx
1. Business logic.pptx1. Business logic.pptx
1. Business logic.pptx
 
LESSON 1.pdf
LESSON 1.pdfLESSON 1.pdf
LESSON 1.pdf
 

Dernier

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 

Dernier (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 

1. Components of Information Systems.pdf

  • 2. What is a system?  A system is defined a set of interrelated components, with a clearly defined boundary, working together to achieve a common set of objectives by accepting input and producing outputs.  It has three basic functions:  INPUT  PROCESSING  OUTPUT
  • 3.  INPUT : involves capturing and assembling elements that enter the system to be processed. Ex-raw materials, energy and data.  PROCESSING: involves transformation processes that convert input into output. Ex-manufacturing processes, mathematical calculation.  OUTPUT: involves transferring elements that have been produced by transformation process to there ultimate destination. Ex-finished products, human services.
  • 4. FEEDBACK AND CONTROL  The system concept becomes more useful by including to elements, feedback and control. A system with feedback and control functions is called a cybernetic system.  FEEDBACK: is data about the performance about the system. Ex-data about sale performance are feedback to sales manager.  CONTROL: involves monitoring and evaluating feedback to determine whether a system is moving towards the achievements of its goal.  It makes necessary adjustments to a system input and processing components. Ex-a sales manager exercise control when reassigning sales person to new sales territories
  • 5. INFORMATION SYSTEM  A model that expresses a fundamental conceptual framework for the major components and activities is called IT system. it highlighted the relationships among the components and activities of information system. It also provides a framework that emphasis concepts that can be applied to all types of information system.
  • 7. PEOPLE RESOURCE  People are the essential ingredient for the successful operation of all information system. It includes end users and IS specialist.  END USERS are people who use an information system or the information it produces. They can be customers , sales person are found at all levels.  IS SPECIALIST are people who develop and operate information system. It includes system analysts, software developers etc.
  • 8. HARDWARE RESOURCES  It includes all physical devices and material used in information processing. It includes not only machines, such as computers but also all data media, i.e. tangible objects on which data is recorded. Ex-  COMPUTER SYSTEM : consist of central processing units containing micro processors and a variety of interconnected devices such as printers , scanners etc.  COMPUTER PERIPHERALS: are devices such as keyboard, electronic mouse for the input of data and commands , a video screen or printers for the output of the information.
  • 9. SOFTWARE RESOURCES  It includes all sets of information processing instructions. This generic concept includes not only the sets of operating instructions called programs which direct and control computer hardware but also the set of information processing instruction called procedure that people need.  Example:  System software  Application software  procedures
  • 10. DATA RESOURCES  This concept has been broadened by managers and information system professionals. They realize the data constitute valuable organizational resources. It resulted in variety of changes in modern organization. Under this data can take many forms including traditional numeric data composed of numbers etc. The data resources of information system are typically organized, stored, accessed by a variety of data resource management technologies into:  Data base that hold processed and organize data.  Knowledge bases that hold knowledge in a variety of forms such as facts.
  • 11. NETWORK RESOURCES  It emphasizes that communications technologies and networks are fundamental resource components of all information system. It includes:  Communication Media- includes twisted pair wire, microwave, cellular wireless technologies.  Network Infrastructure- emphasizes that many hardware, software and data technologies are needed to support the operations and use of communication network. Ex-communication processors such as modems.
  • 12. TYPES OF COMPUTER SYSTEMS There are three categories of computer systems:  Microcomputer systems  Midrange systems  Mainframe systems
  • 14. MICROCOMPUTER SYSTEMS  Microcomputers are the most important category of computer systems for both business people and consumers.  Microcomputers have become powerful networked professional workstations for business professionals.  Examples: personal computers, networked computers, technical workstations, information appliances.
  • 15. MIDRANGE COMPUTERS  Midrange systems are primarily are high-end network servers that can handle the large scale processing of many business applications.  Midrange systems first became popular as minicomputers for scientific research, engineering analysis, instrumentation systems, and industrial process monitoring and control.  Midrange systems are used as front-end servers to assist mainframe computers in telecommunications processing and network management.  Examples: network servers, minicomputers, web servers and multiuser systems
  • 16. MAINFRAME COMPUTER SYSTEMS  Mainframe systems are large, fast and powerful computer systems.  They have large primary storage capacity.  They handle the information processing needs of major corporations and government agencies with high transaction processing volumes or complex computational problems.  Examples: enterprise systems, super servers, and super computers.
  • 17. PERIPHERALS  Peripherals is a generic name given to all input , output and secondary storage devices that are a part of a computer system.  Peripherals depend on direct connections or telecommunications link to the central processing unit of a computer system .
  • 18. INPUT TECHNOLOGIES  Input technologies now provide a more natural user interface for computer systems you can enter the data directly & easily into computer through pointing devices like electronic mice and touch pads and with technologies like optical scanning , handwriting recognition , voice recognition .
  • 19. Pointing devices  Pointing devices are used for issuing commands , making choices .  They include devices such as electronic mouse, trackball and touch pads .  Electronic mouse: It is most popular device used to move the cursor on the screen to issue commands and make selections .  Touch pads: It is a small rectangular touch sensitive surface usually placed below the keyboard the cursor moves in direction your fingers move on pad.
  • 20. Pen based computing  Instead of using keyboard or clipboard you can use a pen to make selections, send e-mails, draw or write.  Various pen devices are available such as digitizer pen and graphics tablet.
  • 21. Speech recognition systems  Speech recognition systems analyze and classify your speech and sound patterns . Software compares your speech patterns to a database of sound patterns and passes the recognized words to your application software  Devices in workplace allow operators to perform data entry without their hands on keys .
  • 22. Optical scanning  Optical scanning devices read text or graphics and convert them into digital input for your computer .  OCR (optical character recognition) is also a type of optical scanning technology . OCR scanners can read characters and codes on product labels, airline tickets etc
  • 23. STORAGE TRADE-OFFS  Computer users depend on memory circuits and secondary storage devices of computer systems to meet storage requirements.  Progress in very-large-scale integration (VLSI), which packs millions of memory circuit elements on tiny semi-conductor memory chips, is responsible for continuing increases in main memory capacity of computers.  High speed storage media cost more per byte and provide lower capacities.  Large capacity storage media cost less per byte but are slower.  Primary storage circuits use RAM chips, which loose their contents when electrical power is interrupted while secondary storage devices provide a more permanent type of storage media.
  • 24. Computer storage fundamentals  Data are processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computer circuitry or in the media it uses.  This character is called two-state or binary representation of data because the computer and media can exhibit only two possible states or conditions, similar to a common light switch: “on” or “off”.  The smallest element of data is called bit, which can have a value of either zero or one.  The capacity of memory chips is usually expressed in terms of bits.  A byte is a basic grouping of bits that the computer operates as a single unit.  Storage capacities can be measured in kilobytes, megabytes, gigabytes or terabytes.
  • 25.  There are four types of storage trade-offs- o Semiconductor memory o Magnetic disks o Optical disks o Magnetic tape
  • 26. Direct and sequential access  Primary storage media such as semiconductor memory chips are called direct access memory or random access memory.  Secondary storage media such as magnetic tape cartridges are known as sequential access devices.  The concepts described by Direct and sequential access are as follows-  An element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on storage media.  Each storage position has a unique address and can be individually accessed in approximately the same length of time without having to search through other storage positions.
  • 27. Semiconductor memory  The primary storage of a computer consists of microelectronic semiconductor chips.  It provides with the working storage a computer needs to process applications.  Attractions of semiconductor memory are- o Small size o Great speed o Shock resistance o Temperature resistance
  • 28.  Two basic types of semiconductor memory are-  Random Access Memory(RAM): These memory chips are most widely used primary storage medium. Each memory position can be both sensed(read) and changed(written), so it is called read/write memory. This is a volatile memory.  Read Only Memory(ROM): Non-volatile memory chips are used for permanent storage; ROM can be read but not erased or overwritten.
  • 29. Magnetic disks  Magnetic disks are the most common form of secondary storage for a computer system.  They provide fast access and high storage capacities at a reasonable cost.  Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes.  Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, thus providing us with billions of storage positions for software and data.
  • 30. RAID storage  Redundant Arrays of Independent Disks(RAID) combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit.  RAID units provide large capacities with high access speeds because data are accessed in parallel over multiple paths from many disks.  They provide a fault-tolerant capacity, in which their redundant design offers multiple copies of data on several disks.  If one disk fails, data can be recovered from backup copies automatically stored on other disks.
  • 31. MAGNETIC TAPE  Tape storage is moving beyond backup. Although disk subsystems provide the fastest response time for mission- critical; data, the sheer amount of data that users need to access these days as part of huge enterprise applications, such as data warehouse, requires affordable (magnetic tape) storage.  On growing business application of magnetic tape involves the use of high-speed 36-track magnetic tape cartridges in robotic automated drive assemblies that can directly access hundreds of cartridges.  Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems.
  • 32. OPTICAL DISKS  Optical disk technology has become a necessity. Most software companies now distribute their elephantine programs o CD-ROMs.  It is a fast-growing type of storage media.  Examples :- CD-ROM, CD-RW, DVD, DVD-ROM etc.
  • 33. Business Applications  One of the use of optical disks in mainframe and midrange systems is in image processing, where long-term archival storage of historical files of document images must be maintained.  Interactive multimedia applications in business, education, and entertainment area another major use of optical disks.  Financial institutions, among others, are using optical scanners to capture digitized document images and store them on optical disks as an alternative to microfilm media.
  • 34. RADIO FREQUENCY IDENTIFICTAION  One of the newest and most rapidly growing storage technologies is radio frequency identification [RFID] a system for tagging and identifying mobile objects such as store merchandise, postal packages, and sometimes even living organisms.  Using special device called an RIFD reader, RFID allows objects to be labeled and tracked as they move from place to place.
  • 35.  RFID technology works using small pieces of hardware called RFID chips. These chips feature an antenna to transmit and receive radio signals. These are of 2 types passive and active.  Passive chips do not have a power source and active chips are self powered and do not need to be close to the reader to transmit their signal.  The RIFD systems were created as an alternative to common bar codes.
  • 36. RFID Privacy Issues  The use of RFID technology has caused considerable controversy and even product boycotts by consumer privacy advocates who refer to RFID tags as spy chips.  The 2 main privacy concerns are: 1. Since the owner of an item will not necessarily be aware of the presence of an RFID tag, and the tag can be read at a distance without the knowledge of the individual, it becomes possible to gather sensitive data about an individual without consent. 2. If a customer pays by a credit card, then it would be possible to deduce the identity of the purchaser indirectly by reading the globally unique ID of that item.
  • 37. Enhancing Security using RFID  RFID presents the potential for enormous efficiencies and cost savings.  It also presents significant challenges to privacy and security. example-Chennai air port