Sie sind auf Seite 1von 20

Short Notes on : 1) Distributed databases 223 A database that consists of two or more data files located at different sites

on a computer network. Because the database is distributed, different users canaccess it without interfering with one another. However, the DBMS must periodically synchronize the scattered databases to make sure that they all have consistent data. Distributed databases ----- ch 10, slide 20 A distributed database system is a collection of logically related databases that cooperate in a transparent manner. Transparent implies that each user within the system may access all of the data within all of the databases as if they were a single database There should be location independence i.e.- as the user is unaware of where the data is located it is possible to move the data from one physical location to another without affecting the user. Types of ddbms Distributed Databases

Partitioned: Separate locations store different parts of database Replicated: Central database duplicated in entirety at different locations

Advantages Reduced Communication Overhead Most data access is local, less expensive and performs better. Improved Processing Power Instead of one server handling the full database, we now have a collection of machines handling the same database. Removal of Reliance on a Central Site If a server fails, then the only part of the system that is affected is the relevant local site. The rest of the system remains functional and available. Expandability It is easier to accommodate increasing the size of the global (logical) database. Disadvantages Drawbacks Departures from using standard definitions Security problems 2) Wireless Computer Networks 281 WPAN WLAN 802.11 WMAN 802.16 Mobile telecommunicaion-GSM 3) Ajax 189a new software techniques for enabling Web applications. Introduction-In the world of Web development, the move from HTML to Ajaxpowered HTML often can be achieved at a relatively low cost, but there are both direct and indirect costs associated with Ajax that must be taken into account. A close analysis of these factors will enable business managers to make more well-informed decisions when considering Ajax adoption within a particular application and across their organization. Let's first look at the expected benefits from Ajax. Ajax is all about ways to create a more interactive and productive connection between a user and a Web-based application. Because Ajax provides similar advanced user interface features to those in desktop applications (such as advanced UI controls, animated effects and adjustable layout controls) -- thereby providing the visual and interaction tools needed to make the application self-explanatory -- users spend less time learning and operating the application. The Ajax partial page update feature minimizes user delays by eliminating the "click, wait, and refresh" approach of preAjax HTML applications. Beyond better user interfaces for existing applications, Ajax enables new classes of applications that fall under the umbrella term "Web 2.0" and that also fit into a service-

oriented architecture (SOA). Among the next-generation applications that will power the enterprise and the Internet of the future are the following:

Users as co-developers - New Ajax-powered environments, such as "application wikis," are empowering users to create their own customized mashups that include personalized dashboards and situational composite applications. Collaboration - Ajax technologies are typically the centerpiece of Web 2.0 information collection and sharing environments that harness the collective intelligence of disparate communities. Software above the level of a single device - Web 2.0 is accelerating the movement from installable desktop applications to Web-based applications, thereby leveraging the advantages of networks and information sharing. Cross-device applications and mobility - Simultaneous with the adoption of Web 2.0 is the growing proliferation of Web-capable mobile devices. Ajax technologies enable Web 2.0 applications across both large-screen desktops and small-screen mobile devices. Because of competitive pressures, vendors often vie for your Ajax business based on the developer productivity benefits they offer. Two common productivity features are UI markup languages (UIMLs) and IDE integration. The UIMLs allow for the use of declarative approaches using HTML and/or XML for large parts of an Ajax application. IDEs can provide source code completion, source code highlighting, drag-and-drop authoring, Javascript debugging, XHR monitors, run-time stack views, and variable watching. Ajax deployment offers several additional long-term strategic benefits, including:

Replacement for desktop applications - Ajax offers a desktop-like user experience while retaining the benefits of server-based application deployment, centralized infrastructure administration, easier scalability, and immediate availability of application updates to all users. As a result, Ajax helps accelerate the movement away from installable, two-tier, client-server applications to multi-tier web applications. Higher customer expectations around user interface - The industry is embracing richer, more desktop-like, user interfaces for customer-facing Web applications. In many circumstances, adopting Ajax techniques is becoming a business requirement to maintain parity with the rest of the industry and match growing user expectations about Web-based user experiences. Operations efficiencies - In today's global economy, cost efficiency is more important than ever. Ajax techniques can help maintain efficiency and competitiveness of internal systems. http://www.slideshare.net/JayaPrakash.m/Ajaxppt1 (http://www.sitepoint.com/build-your-own-ajax-web-apps/).

4) Global Supply Chains 351 With increased globalization and offshore sourcing, global supply chain management is becoming an important issue for many businesses. Like traditional, supply chain management, the underlying factors behind the trend are reducing the costs of procurement and decreasing the risks related to purchasing activities. The big difference is that global supply chain management involves a company's worldwide interests and suppliers rather than simply a local or national orientation. Because global supply chain management usually involves a plethora of countries, it also usually comes with a plethora of new difficulties that need to be dealt with appropriately. One that companies need to consider is the overall costs. While local labor costs may be significantly lower, companies must also focus on the costs of space, tariffs, and other expenses related to doing business overseas. Additionally, companies need to factor in the exchange rate. Obviously, companies must do their research and give serious consideration to all of these different elements as part of their global supply management approach. Time is another big issue that should be addressed when dealing with global supply chain management. The productivity of the overseas employees and the extended shipping times can either positively or negatively affect the company's lead time, but either way these times need to be figured into the overall procurement plan. Other factors can also come into play here as well. For example, the weather conditions on one side of the world often vary greatly from those on the other and can impact production and shipping dramatically. Also, customs clearance time and other governmental red tape can add further delays that need to be planned for and figured into the big picture. Besides contemplating these issues, a business attempting to manage its global supply chain must also ask itself a number of other serious questions. First, the company needs to make decisions about its overall outsourcing plan. For whatever reason, businesses may desire to keep some aspects of supply chain closer to home. However, these reasons are not quite as important as other countries advance technologically. For example, soe parts of India have now become centers for high-tech outsourced services which may once have been done in-house only out of necessity. Not only are provided to companies by highly qualified, overseas workers, but they are being done at a fraction of the price they could be done in the United States or any other Western country. Another issue that must be incorporated into a global supply chain management strategy is supplier selection. Comparing vendor bids from within the company's parent-country can be difficult enough but comparing bids from an array of global suppliers can be even more complex. How to make these choices is one of the first decisions companies must make, and it should be a decision firmly based on research. Too often companies jump on the lowest price instead of taking the time to factor in all of the other elements, including those related to money and time which were discussed above. Additionally, companies must make decisions about the number of

suppliers to use. Fewer supplies may be easier to manage but could also lead to potential problems if one vendor is unable to deliver as expected or if one vendor tries to leverage its supply power to obtain price concessions. Finally, companies who choose to ship their manufacturing overseas may have to face some additional considerations as well. Questions regarding the number of plants that are needed, as well as the locations for those plants can pose difficult logistical problems for companies. However, it often helps to examine these issues in terms of the global supply chain. For example, if a business uses a number of vendors around Bangalore, India than it may make sense to locate the manufacturing plant that would utilize those supplies in or around Bangalore as well. Not only will this provide lower employee costs, but overall shipping and tariff expenses should also be reduced. This would then save the company money. 5) Cloud Computing 171 +184 Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You dont need software or a server to use them. All a consumer would need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud (internet) and is totally managed by the cloud service provider Yahoo, Google etc. The consumer gets to use the software alone and enjoy the benefits. The analogy is, 'If you need milk, would you buy a cow?' All the users or consumers need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just to get this benefit (milk) why should a consumer buy a (cow) software /hardware? Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2011, a study conducted by Version One found that 91% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by the concept, highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study found that disciplined companies achieved on average an 68% increase in

their IT expense because cloud computing and only a 10% reduction in data center power costs. Basically implies that the software & h/W capabilities are provided as a service over the internet Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet).[1]

Cloud computing provides computation, software applications, data access,data management and storage resources without requiring cloud users to know the location and other details of the computing infrastructure. End users access cloud based applications through a web browser or a light weight desktop or mobile app while the business software and data are stored on servers at a remote location. Cloud application providers strive to give the same or better service and performance as if the software programs were installed locally on end-user computers. At the foundation of cloud computing is the broader concept of infrastructure convergence (or Converged Infrastructure) and shared services.[2] This type of data centre environment allows enterprises to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to more rapidly adjust IT resources (such as servers, storage, and networking) to meet fluctuating and unpredictable business demand.[3][4] Infrastructure as a Service (IaaS) See also: Category:Cloud infrastructure In this most basic cloud service model, cloud providers offer computers as physical or more often as virtual machines , raw (block) storage, firewalls, load balancers, and networks. IaaS providers supply these resources on demand from their large pools installed in data centers. Local area networks including IP addresses are part of the offer. For the wide area connectivity, the Internet can be used or - in carrier clouds - dedicated virtual private networks can be configured. To deploy their applications, cloud users then install operating system images on the machines as well as their application software. In this model, it is the cloud user who is responsible for patching and maintaining the operating systems and application software. Cloud providers typically bill IaaS services on a utility computing basis, that is, cost will reflect the amount of resources allocated and consumed. [edit] Platform as a Service (PaaS) Main article: Platform as a Service See also: Category:Cloud platforms In the PaaS model, cloud providers deliver a computing platform and/or solution stack

typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying compute and storage resources scale automatically to match application demand such that the cloud user does not have to allocate resources manually. [edit] Software as a Service (SaaS) Main article: Software as a Service In this model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. What makes a cloud application different from other applications is its elasticity. This can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand. Load balancers distribute the work over the set of virtual machines. This process is transparent to the cloud user who sees only a single access point. To accomodate a large number of cloud users, cloud applications can be multitenant, that is, any machine serves more than one cloud user organization. It is common to refer to special types of cloud based application software with a similar naming convention: desktop as a service, business process as a service, Test Environment as a Service, communication as a service.

6) Moores law and Microproceesing power 171 7) RFID 284 Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies. RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZPass through a toll booth, or paid for gas using Speed Pass, you've used RFID. In addition, RFID is increasingly used with biometric technologies for security. Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or line of sight for communication. RFID data can be read through the human body, clothing and non-metallic materials. COMPONENTS A basic RFID system consists of three components:

An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information

The antenna emits radio signals to activate the tag and to read and write data to it. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. RFID technology has been used by thousands of companies for a decade or more. . RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive - and invasive - uses for RFID tags are in the works. A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate. The chip can store as much as 2 kilobytes of data. To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that has one or more antennas that emit radio waves and receive signals back from the tag. The reader then passes the information in digital form to a computer system. CURRENT AND POTENTIAL USES OF RFID Asset Tracking It's no surprise that asset tracking is one of the most common uses of RFID. Companies can put RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to locate at the time they are needed. Just about every type of RFID system is used for asset

management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system that uses active RFID beacons to locate container to within 10 feet. Manufacturing RFID has been used in manufacturing plants for more than a decade. It's used to track parts and work in process and to reduce defects, increase throughput and manage the production of different versions of the same product. Supply Chain Management RFID technology has been used in closed loop supply chains or to automate parts of the supply chain within a company's control for years. As standards emerge, companies are increasingly turning to RFID to track shipments among supply chain partners. Retailing Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID adoption. These retailers are currently focused on improving supply chain efficiency and making sure product is on the shelf when customers want to buy it. Payment Systems RFID is all the rage in the supply chain world, but the technology is also catching on as a convenient payment mechanism. One of the most popular uses of RFID today is to pay for road tolls without stopping. These active systems have caught on in many countries, and quick service restaurants are experimenting with using the same active RFID tags to pay for meals at drivethrough windows. Security and Access Control RFID has long been used as an electronic key to control who has access to office buildings or areas within office buildings. The first access control systems used low-frequency RFID tags. Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather than looking for a key or swiping a magnetic stripe card) and because there is no contact between the card and reader, there is less wear and tear, and therefore less maintenance. As RFID technology evolves and becomes less expensive and more robust, it's likely that companies and RFID vendors will develop many new applications to solve common and unique business problems.

8) Fuzzy logic systems. 433

9) Types of information systems. 45 --- Check note book

An information system is a collection of hardware, software, data, people and procedures that are designed to generate information that supports the day-to-day, short-range, and long-range activities of users in an organization. Information systems generally are classified into five categories: office information systems, transaction processing systems, management information systems, decision support systems, and expert systems.

2. Transaction Processing Systems A transaction processing system (TPS) is an information system that captures and processes data generated during an organizations day-to-day transactions. A transaction is a business activity such as a deposit, payment, order or reservation. Clerical staff typically perform the activities associated with transaction processing, which include the following: 1. Recording a business activity such as a students registration, a customers order, an employees timecard or a clients payment. 2. Confirming an action or triggering a response, such as printing a students schedule, sending a thank-you note to a customer, generating an employees paycheck or issuing a receipt to a client. 3. Maintaining data, which involves adding new data, changing existing data, or removing unwanted data. Transaction processing systems were among the first computerized systems developed to process business data a function originally called data processing. Usually, the TPS computerized an existing manual system to allow for faster processing, reduced clerical costs and improved customer service. The first transaction processing systems usually used batch processing. With batch processing, transaction data is collected over a period of time and all transactions are processed later, as a group. As computers became more powerful, system developers built online transaction processing systems. With online transaction processing (OLTP) the computer processes transactions as they are entered. When you register for classes, your school probably uses OLTP. The registration administrative assistant enters your desired schedule and the computer immediately prints your statement of classes. The invoices, however, often are printed using batch processing, meaning all student invoices are printed and mailed at a later date.

Today, most transaction processing systems use online transaction processing. Some routine processing tasks such as calculating paychecks or printing invoices, however, are performed more effectively on a batch basis. For these activities, many organizations still use batch processing techniques. 3. Management Information Systems While computers were ideal for routine transaction processing, managers soon realized that the computers capability of performing rapid calculations and data comparisons could produce meaningful information for management. Management information systems thus evolved out of transaction processing systems. A management information system, or MIS (pronounced em-eye-ess), is an information system that generates accurate, timely and organized information so managers and other users can make decisions, solve problems, supervise activities, and track progress. Because it generates reports on a regular basis, a management information system sometimes is called a management reporting system (MRS). Management information systems often are integrated with transaction processing systems. To process a sales order, for example, the transaction processing system records the sale, updates the customers account balance, and makes a deduction from inventory. Using this information, the related management information system can produce reports that recap daily sales activities; list customers with past due account balances; graph slow or fast selling products; and highlight inventory items that need reordering. A management information system focuses on generating information that management and other users need to perform their jobs. An MIS generates three basic types of information: detailed, summary and exception. Detailed information typically confirms transaction processing activities. A Detailed Order Report is an example of a detail report. Summary information consolidates data into a format that an individual can review quickly and easily. To help synopsize information, a summary report typically contains totals, tables, or graphs. An Inventory Summary Report is an example of a summary report. Exception information filters data to report information that is outside of a normal condition. These conditions, called the exception criteria, define the range of what is considered normal activity or status. An example of an exception report is an Inventory Exception Report is an Inventory Exception Report that notifies the purchasing department of items it needs to reorder. Exception reports help managers save time because they do not have to search through a detailed report for exceptions. Instead, an exception report brings exceptions to the managers attention in an easily identifiable form. Exception reports thus help them focus on situations that require immediate decisions or actions.

4. Decision Support Systems Transaction processing and management information systems provide information on a regular basis. Frequently, however, users need information not provided in these reports to help them make decisions. A sales manager, for example, might need to determine how high to set yearly sales quotas based on increased sales and lowered product costs. Decision support systems help provide information to support such decisions. A decision support system (DSS) is an information system designed to help users reach a decision when a decision-making situation arises. A variety of DSSs exist to help with a range of decisions. A decision support system uses data from internal and/or external sources. Internal sources of data might include sales, manufacturing, inventory, or financial data from an organizations database. Data from external sources could include interest rates, population trends, and costs of new housing construction or raw material pricing. Users of a DSS, often managers, can manipulate the data used in the DSS to help with decisions. Some decision support systems include query language, statistical analysis capabilities, spreadsheets, and graphics that help you extract data and evaluate the results. Some decision support systems also include capabilities that allow you to create a model of the factors affecting a decision. A simple model for determining the best product price, for example, would include factors for the expected sales volume at each price level. With the model, you can ask what-if questions by changing one or more of the factors and viewing the projected results. Many people use application software packages to perform DSS functions. Using spreadsheet software, for example, you can complete simple modeling tasks or what-if scenarios. A special type of DSS, called an executive information system (EIS), is designed to support the information needs of executive management. Information in an EIS is presented in charts and tables that show trends, ratios, and other managerial statistics. Because executives usually focus on strategic issues, EISs rely on external data sources such as the Dow Jones News/Retrieval service or the Internet. These external data sources can provide current information on interest rates, commodity prices, and other leading economic indicators. To store all the necessary decision-making data, DSSs or EISs often use extremely large databases, called data warehouses. A data warehouse stores and manages the data required to analyze historical and current business circumstances. 5. Expert Systems

An expert system is an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decisionmaking processes for those who have less expertise. Expert systems are composed of two main components: a knowledge base and inference rules. A knowledge base is the combined subject knowledge and experiences of the human experts. The inference rules are a set of logical judgments applied to the knowledge base each time a user describes a situation to the expert system. Although expert systems can help decision-making at any level in an organization, nonmanagement employees are the primary users who utilize them to help with job-related decisions. Expert systems also successfully have resolved such diverse problems as diagnosing illnesses, searching for oil and making soup. Expert systems are one part of an exciting branch of computer science called artificial intelligence. Artificial intelligence (AI) is the application of human intelligence to computers. AI technology can sense your actions and, based on logical assumptions and prior experience, will take the appropriate action to complete the task. AI has a variety of capabilities, including speech recognition, logical reasoning, and creative responses. Experts predict that AI eventually will be incorporated into most computer systems and many individual software applications. Many word processing programs already include speech recognition. Integrated Information Systems With todays sophisticated hardware, software and communications technologies, it often is difficult to classify a system as belonging uniquely to one of the five information system types discussed. Much of todays application software supports transaction processing and generates management information. Other applications provide transaction processing, management information, and decision support. Although expert systems still operate primarily as separate systems, organizations increasingly are consolidating their information needs into a single, integrated information system. 10) Business Intelligence as an Information Management tool 228

11) CRM systems increase profits for a company. 354

12) Digital certificates. 323 An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA). The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509

13) TCP/IP Networks 256 14) Networking Topologies 258 http://www.csl.mtu.edu/cs4451/www/notes/Network%20Topologies.pdf 15) Object Oriented databases 217

Questions :
1) Benefits of enterprise systems.What are the challenges of enterprise systems? 53 + 344 (http://e-learning.mfu.ac.th/mflu/1203371/chapter2_3.htm)

Challenges

Generally, enterprise systems have a lifespan of 10 to 20 years, after which point they can be upgraded. Although this might seem like a long time, data within organizations accumulates exponentially and may prove too difficult to manage and store using a single software system. Data overflow and a subsequent slowdown in one department will certainly have a ripple effect in other functions of an organization. One challenge is the expense of purchasing, installing, and maintaining the hardware and software that enables the enterprise system. First challenge: delivering flexibility The first challenge, delivering flexibility, stems (arise) from the way Enterprise Systems manufacturing companies are being forced to respond to fast changes in customer requirements and technology. This has placed huge demands on the flexibility of supply chain systems. Key issues revolve around managing outsourced manufacturing partners and suppliers, product transition (NPI, new products introduction), exception handling and change management in orders, forecasting for capacity planning and long-lead time components, product quality amongst others.

Second challenge: managing configuration complexity The second challenge, configuration complexity, has been a growing issue since the 1980s. Before then, most elements of the systems configuration the hardware, operating system, database and storage, and applications were simple and easily tied together in one system. Now, however, the typical configuration consists of several separate mini-systems. For example, a complex high-end server solution has separate storage area networks, networking equipment, and software stacks for the middleware, database, portals, application servers and web servers. Managing this explosion in complexity (especially the software components) has become a nightmare for Enterprise Systems manufacturers. Another reason for the increase in system complexity is that customers demand more exact specifications, and more customization, than ever before. Yet another is that the software complexity has increased. And finally, solutions to today's complex requirements tend to emphasize hardware and software equally, rather than one or the other as in the 1980s.

Third challenge: optimally servicing the installed equipment base The third challenge, optimally servicing the installed equipment base, revolves around the difficult task of support and warranties and servicing them cost effectively, both proactively and reactively. The installed base is a huge potential source of upgrade revenue, especially for software upgrades.

2) How does the Internet benefit the development of a global information system? Should all global systems be based on the Internet? http://www.decisionsciences.org/decisionline/vol30/30_2/intl30_2.pdf

3) How do cultural, legal, political, and social expectations affect global business? 558 4) Discuss the role and influence the user plays in software development. 5) What is a GIS? Describe at least three ways in which a GIS could be used by modern business. 465 Ch 15 Geographic information systems are a special category of DSS that use data visualization technology to analyze and display data for planning and decision-making in the form of digitized maps. GIS can best be used to support decisions that require knowledge about the geographic distribution of people or other resources in scientific research, resource management, and development planning. GIS have modeling capabilities, allowing managers to change data and automatically revise business scenarios to find better solutions. For instance, a company could display its customers on a map and then design the most efficient delivery route for its products. A second way in which it could be used would be to analyze demographic information to decide where to open branch restaurants. A third use could be customer demographic data and map information to locate people who are likely to become customers for the companys services. 6) How does a company's use of information systems affect its corporate strategies? Provide an example. 94 7) How is the security of a firm's information system and data affected by its people, organization, and technology? 12 8) Describe MIS and DSS and differentiate between them. 45 + ppt + note book 9) What types of relationships are possible in a relational database? Describe and give an example of each. These tables can be related in one of three different ways: one-to-one, one-to-many or many-to-many. One-to-One Relationships

Two tables are related in a one-to-one (11) relationship if, for every row in the first table, there is at most one row in the second table. True one-to-one relationships seldom occur in the real world. This type of relationship is often created to get around some limitation of the database management software rather than to model a real-world situation. In Microsoft Access, one-to-one relationships may be necessary in a database when you have to split a table into two or more tables because of security or performance concerns or because of the limit of 255 columns per table. For example, you might keep most patient information in tblPatient, but put especially sensitive information (e.g., patient name, social security number and address) in tblConfidential (see Figure 3). Access to the information in tblConfidential could be more restricted than for tblPatient. As a second example, perhaps you need to transfer only a portion of a large table to some other application on a regular basis. You can split the table into the transferred and the non-transferred pieces, and join them in a one-to-one relationship.

Figure 3. The tables tblPatient and tblConfidential are related in a one-to-one relationship. The primary key of both tables is PatientId. Tables that are related in a one-to-one relationship should always have the same primary key, which will serve as the join column. One-to-Many Relationships Two tables are related in a one-to-many (1M) relationship if for every row in the first table, there can be zero, one, or many rows in the second table, but for every row in the second table there is exactly one row in the first table. For example, each order for a pizza delivery business can have multiple items. Therefore, tblOrder is related to tblOrderDetails in a one-to-many relationship (see Figure 4). The one-to-many relationship is also referred

to as a parent-child or master-detail relationship. One-to-many relationships are the most commonly modeled relationship.

Figure 4. There can be many detail lines for each order in the pizza delivery business, so tblOrder and tblOrderDetails are related in a one-to-many relationship. One-to-many relationships are also used to link base tables to information stored in lookup tables. For example, tblPatient might have a short one-letter DischargeDiagnosis code, which can be linked to a lookup table, tlkpDiagCode, to get more complete Diagnosis descriptions (stored in DiagnosisName). In this case, tlkpDiagCode is related to tblPatient in a one-to-many relationship (i.e., one row in the lookup table can be used in zero or more rows in the patient table). Many-to-Many Relationships Two tables are related in a many-to-many (MM) relationship when for every row in the first table, there can be many rows in the second table, and for every row in the second table, there can be many rows in the first table. Many-to-many relationships can't be directly modeled in relational database programs, including Microsoft Access. These types of relationships must be broken into multiple one-to-many relationships. For example, a patient may be covered by multiple insurance plans and a given insurance company covers multiple patients. Thus, the tblPatient table in a medical database would be related to the tblInsurer table in a many-to-many relationship. In order to model the relationship between these two tables, you would create a third, linking table, perhaps called tblPtInsurancePgm that would contain a row for each insurance program under which a patient was covered (see Figure 5). Then, the many-to-many relationship between tblPatient and tblInsurer could be broken into two one-to-many relationships (tblPatient would be related to

tblPtInsurancePgm and tblInsurer would be related to tblPtInsurancePgm in one-to-many relationships).

Figure 5. A linking table, tblPtInsurancePgm, is used to model the many-to-many relationship between tblPatient and tblInsurer. In Microsoft Access, you specify relationships using the EditRelationships command. In addition, you can create ad-hoc relationships at any point, using queries.

10) You are a Manager of a company,How could you use information systems to achieve greater customer intimacy?

Das könnte Ihnen auch gefallen