Beruflich Dokumente
Kultur Dokumente
LTP
31Basic concepts - understanding information
Information is data that has been processed in such a way as to be meaningful to the person
who receives it. It is processed data on which decisions and actions are based.
Example: Marks Obtained in different subjects in a particular examination of a student act as
data . By processing this data, results may be obtained. The result is information teacher used to
declare.
Data
Processing
Unprocessed Information
Result(Information)
Useful information
An information system is software that helps you organize and analyze data. This makes it possible to
answer questions and solve problems relevant to the mission of an organization.
Different Types
The many different types of information system can be divided into categories based on the where they
are used in the hierarchy of an organization. This is illustrated in the figure below.
Hardware
Chapter 4
Information Systems Hardware
http://www.umsl.edu/~joshik/msis480/chapt04.htm
http://www.umsl.edu/~joshik/msis480/chapt04.htm
4.1 Organization of Computer Systems
Almost all computer systems have a similar, rather simple, structure consisting of a processor, main memory, and
peripheral devices such as secondary storage, and input and output devices.
What is the Structure of a Computer System? [Figure 4.1][Slide 4-1]
A computer system is a set of devices that can accept and store programs and data, execute programs by applying
their instructions to the data, and reporting the results.
Figure 4.1 explains the general organization of computer system hardware. The principal components of a computer
system are the processor, main memory, input and output devices, and secondary storage. Stress to students that the
same organization is used to build a microcomputer for a desktop or for a mainframe.
The Processor (CPU)
The central processing unit is the most important hardware component of a computer system. It is known as the
CPU, the centralprocessor or instruction processor, and the main microprocessor in a microcomputer. Data is
processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the
computer's circuitry of the media it uses. This is called a Atwo-state or binary representation of data, since the
computer and media can exhibit only two possible states or conditions (1s and 0s).
The CPU can be divided into two major subunits which include the arithmetic-logic unit (ALU) which performs the
arithmetic and logic functions required in processing and the control unit which interprets computer program
instructions and transmits directions to the other components of the computer system.
Main Memory [Figure 4.2][Slide 4-4]
The main memory is a fast electronic component of the computer system that serves to store programs to be
executed by the CPU and the data these programs require. A main memory consists of a large number of locations,
identified by their addresses, as shown inFigure 4.2.
A bit is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity of memory
chips is usually expressed in terms of bits, whereas a byte is the basic grouping of bits that the computer operates as
a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding
schemes (e.g., 8 bits = 1 byte). The capacity of a computer's memory and secondary storage devices is usually
expressed in terms of bytes. A word is the largest number of consecutive bytes that can be accessed at one time in
the main memory.
Commonly used codes for representing characters in computer systems through various arrangements of bits are:
1. ACSII (American Standard Code for Information Exchange)
2. EBCDIC (Extended Binary Coded Decimal Interchange Code) - pronounced: EB SEE DICK
Multimedia computing integrates various media, such as text, graphics, sound, and video, is becoming more popular
and therefore, images are often stored as well. A memory representation of an image is the equivalent of a grid of
dots called pixels (picture elements).
The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory
circuits, referred to as RAM (random access memory). Memory chips with capacities of 256K bits, 1 megabit, 4
megabits, 16 megabits, and 32 megabits are now being used in many computers.
Advantages of semiconductor memory are:
1. Small size
2. Fast speed
3. Shock and temperature resistance
4. Reasonably low cost due to mass production.
Disadvantage of semiconductor memory are:
1. Volatility (uninterrupted electric power must be supplied or the contents of memory will be lost (except with read
only memory, which is permanent)).
Two basic types of semiconductor memory:
1. Random Access Memory (RAM):
- these memory chips are the most widely used primary storage mediums. Each memory position can be both read
and written, so it is also called read/write memory. This is a volatile memory.
2. Read Only Memory (ROM):
- Nonvolatile random access memory chips are used for permanent storage. ROM can be read but not erased or
overwritten. Instructions and programs in primary storage can be permanently "burned in" to the storage cells during
manufacturing.
Peripherals
Secondary storage devices (such as disks and tape drives), along with input and output devices are
called peripherals, input and output devices transfer programs and data between the outside world and the main
memory.
4.2 Computer Categories: Microcomputers, Mainframes, and Supercomputers
Computer system hardware is now available in a spectacular variety of capabilities and costs. The relative cost of
hardware as compared to software has declined no less impressively. The challenge consists in using information
technology to increase operational efficiency and managerial effectiveness, and, ultimately, to deploy it to seek
competitive advantage.
What are the Categories of Computers:
Computer systems have evolved through several major stages or generations. Each generation is characterized by
major changes in technology and processing power. As well, each generation has become smaller, faster, more
reliable, and less costly to purchase and maintain. The principal characteristic of a computer generation is the
fundamental technology employed to build computer circuits.Very large-scale integration (VLSI) made it feasible
to place millions of semiconductor devices on a single silicon chip. This translates into the high speeds of processor
chips and the high capacities of memory chips.
Computer Generations: [Figure 4.3]
Generation Time Period Based On
First generation 1951-1958 Vacuum tubes
Second generation 1959-1963 Transistors
Third generation 1964-1979 Integrated circuits
Fourth generation 1979-present LSI/VLSI (large scale integration)
Fifth generation 1990s
Computer systems are typically classified in four categories: [Figure 4.3]
1. Microcomputers
2. Minicomputers (midrange) computers
3. Mainframe computers
4. Supercomputers.
Microcomputers [Figure 4.4][Slide 4-5]
Microcomputers are the smallest but most important categories of computers systems for end users. They are also
referred to as personal computers (or PC's). The computing power of current microcomputers exceeds that of the
mainframe computers of previous generations at a fraction of their cost. They have become powerful professional
and technical workstations being used by end users in businesses and other organizations such as industrial design
where high-resolution graphic processing is required.
Some microcomputers and almost all technical workstations are now built around microprocessors called reduced
instruction set computers (RISC). RISC processors optimize a CPU=s processing speed by using a smaller number
instruction set. Basically, this means that they use a smaller number of the basic machine instructions that a
processor is capable of executing. By keeping the instruction set simpler and using more complex software, RISC
processors can reduce the time needed to execute program instructions. The majority of popular computers use CISC
(Complex Instruction Set Computer).
Microcomputers Microcomputers Microcomputers
categorized by size categorized by use categorized by special purpose
1. Handheld 1. Home 1. Personal Digital Assistants
2. Notebook 2. Personal 2. Network Computers
3. Laptop 3. Professional
4. Portable 4. Workstation
5. Desktop 5. Multiuser
6. Floor-standing
Minicomputers (midrange)
Minicomputers entered the business scene from scientific and engineering applications.
1. Are general purpose computers that are larger and more powerful than most microcomputers but are smaller and
less powerful than most large mainframes.
2. Are often used as dedicated processors for computer-assisted design (CAD) or on-line transaction processing
(OLTP), where real-time demands of fast response have to be met.
3. Often employed as corporate computers in mid-size organizations or as departmental computers in larger firms,
where they communicate with personal computers on the one hand and with corporate mainframes on the other.
4. Cost less to buy and maintain than mainframe computers.
5. Can function in ordinary operating environments (do not need air conditioning or electrical wiring).
6. Smaller models of minicomputers do not need a staff of specialists to operate them.
Applications:
1. Used for a large number of business and scientific applications (scientific research, instrumentation systems,
engineering analysis, and industrial process monitoring and control)
2. Serve as industrial process-control and manufacturing plant computers, and they play a major role in computeraided manufacturing (CAM), and computer-aided design (CAD) applications.
3. Used as front-end computers to help mainframe computers control data communications networks and large
numbers of data entry terminals.
4. Are popular as powerful network servers in department, offices, and work sites.
Mainframes
The traditional sharp distinction between minicomputers and mainframes is becoming cloudy. However, mainframes
are still considered the largest computers in general use.
1. Are large, powerful computers that are physically larger and more powerful than micros and minis.
2. Usually have one or more central processors with faster instruction processing speeds (MIPS).
3. Have large primary storage capacities.
4. Can support more input/output and secondary storage devices.
A demand for computer memory has grown steadily throughout the history of computers. A variety of memory
technologies offer a tradeoff between high speed on the one hand and low costs and high capacity on the other.
Computer memories are therefore organized into a hierarchy. Explanation of memory hierarchy:
Semiconductor Memories: [Figure 4.8][Slide 4-6]
1. At the top of this hierarchy, the fastest memory units are actually registers included in the CPU, where data are
brought in to be manipulated by the ALU which performs the arithmetic and logic functions required in processing.
The registers in the CPU are specialized circuits which are used for high-speed, temporary storage of instruction or
data elements during the execution of an instruction.
2. Cache memory is a high-speed temporary storage area in the CPU for storing parts of a program or data during
processing.
3. Main memory is used to store the programs currently being processed, as well as the data they currently need or
produce.
4. Semiconductor memory is volatile - their contents are lost when power is turned off.
Advantages of semiconductor memory are:
1. Small size
2. Fast speed
3. Shock and temperature resistance
4. Reasonably low cost due to mass production.
Disadvantage of semiconductor memory are:
1. Volatility (uninterrupted electric power must be supplied or the contents of memory will be lost (except with read
only memory, which is permanent)).
Secondary Storage (lower stages of the memory hierarchy)
Magnetic disk or erasable optical disk & Magnetic tape or nonerasable optical disk
1. These devices offer nonvolatile, permanent means of storing large volumes of programs and data.
2. To be used by the processor, these programs and data items must first be transferred to the main memory.
3. These devices offer nonvolatile, permanent means of storing large volumes of programs and data.
4. The principal device for on-line storage today is the magnetic disk. The medium used for archival storage is
magnetic tape. Optical disks suffer from the disadvantage of slower speeds, but their higher storage capacities make
them a competitor of the magnetic media as a means for secondary storage.
Computer storage elements: [Table 4.3]
Bit The smallest element of data, (binary digit) which can have a value of zero or one. The capacity of memory
chips is usually expressed in terms of bits.
Byte Is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is
used to represent one character of data in most computer coding schemes (e.g., 8 bits = 1 byte) . The capacity of a
computer=s memory and secondary storage devices is usually expressed in terms of bytes.
Kilobytes Is a measurement of storage capacity. Abbreviated as KB or K = one thousand bytes (1,024 or 2 10)
E.g., 640K = 640 x 1024 = 655,360 NOT 640,000
Megabytes Is a measurement of storage capacity. Abbreviated as MB or M = one million bytes (1,024 or 220)
Gigabyte Is a measurement of storage capacity. Abbreviated as GB or G = one billion bytes (1,024 or 2 30)
Terabyte Is a measurement of storage capacity. Abbreviated as TB or T = one trillion bytes ((1,024 or 2 40)
Magnetic Disks
Magnetic disks are secondary storage devices that afford the capability of both direct (random) and sequential access
to records.Sequential access means that all records must be accessed in the sequence in which they are stored until
the desired record is reached.Direct access to a record means that the record can be accessed by its disk address,
without the need to access any intermediate records.
Advantages of magnetic disk storage:
1. Fast access
2. High storage capacities
3. Reasonable cost.
The two basic types of magnetic disk media are:
1. Conventional (hard) metal disks
2. Flexible (floppy) diskettes.
Magnetic Disks are thin metal or plastic disks that are coated on both sides with an iron oxide recording material.
They record data on circular tracks in the form of tiny magnetized sports representing binary digits. All tracks with
equal radiuses on a disk make up acylinder. A disk surface is divided into pie-shared sectors.
There are several types of magnetic disk arrangements, including removable disk packs and cartridges as well as
fixed disk units. The removable disk devices are popular because they can be used interchangeable in magnetic disk
units and stored offline for convenience and security when not in use.
Floppy Disks: A small plastic disk coated with iron oxide that resembles a small phonograph record enclosed in a
protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability
for microcomputer systems.
Hard Disk Units: A combination of magnetic disks coated with iron oxide, and sealed into a module. These
nonremovable devices allow higher speeds, greater data-recording densities, and closer tolerances within a sealed,
more stable environment.
RAID: Large-capacity mainframe disk drives are being challenged by disk arrays of interconnected microcomputer
hard disk drives to provide many gigabytes of online storage. RAID (Redundant arrays of inexpensive disks).
Advantages:
1. Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many
disks.
2. Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If
one disk fails, data can be recovered from backup copies automatically stored on other disks.
Magnetic Tape
Magnetic Tape is a plastic tape with a magnetic surface on which data can be stored by selective magnetization of
portions of the surface. Magnetic tape has an obvious limitation - it permits only sequential access. However, it is
the least expensive of the commonly used storage media and is widely used to back up magnetic disks, although it
has also been employed for on-line secondary storage in the batch applications of many legacy systems.
Optical Disks
Optical technologies, which offer far higher storage densities and thus far higher capacities than magnetic devices,
are revolutionizing secondary storage. Most exciting is the expansion of computer capabilities in the direction of
multimedia.
Optical disks offer direct access to information. The technology is based on using a laser to read tiny spots on a
plastic disk. The disks are currently capable of storing billions of characters of information. The main disadvantage
is slower access as compared to magnetic disks.
CD-ROM
A most common type of optical disk used on microcomputers. There are used for read only storage. Storage is more
than 600 megabytes per disk. This is equivalent of more than 400 (1.44 megabyte floppy) disks or 300,000 doublespaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device.
WORM - Write Once, Read Many.
The data is stored once on the disk, however, it can be read an infinite number of times. They are used mainly to
store archival information.
Disadvantage of CD-ROM, WORM:
1. Recorded data cannot be erased.
Major use of optical disks in mainframe and midrange systems is:
1. Image processing, where long-term archival storage of historical files of document images must be maintained.
Major use of CD-ROM disks is:
1. Provide companies with fast access to reference materials in a convenient, compact form.
2. Interactive multimedia applications in business, education, and entertainment. Multimedia is the use of a variety
of media, including text and graphics displays, voice, music, and other audio, photographs, animation, and video
segments.
Erasable Optical Disks
Erasable optical disks are full-fledged competitors of magnetic disks. Their access time is slower than magnetic
disks. However, their capacities are high for a microcomputer configuration. They offer unlimited capacity because
the cartridge is removable, and they also can be securely stored away from the compute
4.4 Input Devices
More and more data and instructions are entered into a computer system directly through input devices such as
keyboards, electronic mice, pens, touch screens, optical scanning wands etc.
Keyboards
The keyboard is the principal input device in virtually all microcomputers. A variety of special-purpose keyboards
are used for data input in various applications, such as securities trading or fast-food outlets.
The general trend is away from keyboarding and toward direct capture of data at the source with devices for source
data automation:the use of input technologies that capture data in a computer-readable form as the data are created.
Pointing Devices:
Pointing devices allow end users to issue commands or make choices by moving a cursor on the display screen.
Pointing devices such as the mouse enables users to easily choose from menu selections and icon displays
using point-and-click or point-and-dragmethods. Icons - are small figures that look like familiar devices. E.g., file
folders, wastebaskets, calculators, calendars etc. Using icons helps simplify computer use since they are easier to use
with point devices than menus and other text-based displays.
Devices for Direct Date Entry [Figures 4.11 & 4.12]
Image Scanners: Input device that digitizes and enters into computer memory images of figures, photographs, or
signed documents.
OCR Scanner: Optical Character Recognition Scanners consist of a combination of hardware and software that can
recognize printed or typed text and various codes and enter the corresponding characters into computer memory.
Bar-Code Scanner Input device that reads bar code.
Smart Card Plastic cards that carries data on a built-in semiconductor chip, or on a laser-optic or magnetic strip.
Voice Data Entry Relying on the devices that can accept spoken input.
4.5 Output Devices
The principal output devices are video displays for soft-copy and printers for hard-copy output.
Video Displays
Video displays are the most common type of computer output. Most video displays use a cathode ray tube (CRT)
technology. Liquid crystal displays (LCD's) are commonly used for portable microcomputers and terminals. They
use less electricity that the CRT and provide a thin, flat display. Plasma display - use electrically charged particles of
gas (plasma) trapped between glass plates. They are significantly more expensive than CRT and LCD units.
However, they use less power and provide for faster display speed and better quality displays.
An X-terminal can be utilized by a user from a workstation other than their own. An X terminal has a limited
processing capability, is used to access services provided by other computers to which it is connected. Such a
terminal includes a keyboard and a mouse, but no disk drive, and gives its user a window-type interface.
Printers and Other Hard-Copy Output Devices
After video displays, printed output is the most common form of visual output for the user interface. Most
computers use printers to produce permanent (hard copy) output in human-readable form.
Impact Printers
Are printers that form characters and other images on paper through the impact of a printing mechanism that presses
a printing element and an inked ribbon or roller against the face of a sheet of paper (e.g., dot matrix printers, highspeed line printers).
Non-Impact Printers
Are printers which do not utilize a printing mechanism (e.g., laser printers and ink jet printers).
Plotters
Are output devices that draw graphics displays on paper. Also, produce printed paper output.
4.6 Enriching Business Systems with Multimedia [Figure 4.15][Slide4-7]
As computing power and storage capacities are matched by the growing telecommunications capabilities,
multimedia computing increasingly enters business life. Multimedia computing integrates various media, such as
text, data, graphics, sound, still images, and motion video, and enables the user to interact with such a system.
The most advanced applications of multimedia computing are the virtual reality (VR) systems that immerse users in
three-dimensional artificial worlds, creating an illusion of an alternative reality.
Multimedia computing is increasingly enabling innovative systems in various business domains such as:
1. Marketing
2. Engineering and manufacturing
3. Human resource management
4. Training
, Software,
Chapter 5
Information Systems Software
http://www.umsl.edu/~joshik/msis480/chapt05.htm
5.1 Software Overview
Computer hardware is virtually useless without computer software. Software is the programs that are needed to
accomplish the input, processing, output, storage, and control activities of information systems.
Computer software is typically classified into two major types of programs: system software and application
software.
System Software
Systems software are programs that manage the resources of the computer system and simplify applications
programming. They include software such as the operating system, database management systems, networking
software, translators, and software utilities.
Application Software
Application software are programs that direct the performance of a particular use, or application, of computers to
meet the information processing needs of end users. They include Aoff-the-shelf@ software such as word
processing and spreadsheet packages, as well as internally or externally developed software that is designed to meet
the specific needs of an organization.
Software trends have been away from custom-designed one-of-kind programs developed by the professional
programmers or end users of an organization toward the use of Aoff-the-shelf@ software packages acquired by end
users from software vendors.
Two types of packages are available:
1. Vertical packages - assist users within a specific industry segment. Examples include packages that help to
manage construction projects, keep track of inventory of hospitals, or fast-food outlets.
2. Horizontal packages - can perform a certain general function, such as accounting, or office automation, for a
range of businesses.
Relationships between Hardware and Software Components [Figure 5.1][Slide 5-3]
Figure 5.1 is an excellent tool to use to explain the relationship that exists between computer systems hardware,
systems software, and application software. This Aonion-skin@ model indicates that the outer layers rely on the
facilities furnished by the inner ones.
Multiprogramming is the capacity of a computer to executing several programs concurrently on the same processor
by having one of the programs using the processor while others are performing input or output.
Multiprogramming requires that the active parts of the programs competing for the processor be available in main
memory. Virtual memory is the seemingly expanded capacity of the main memory of the computer, and achieved by
keeping in the main memory only the immediately needed parts of programs, with the complete programs kept in
secondary storage.
Modes of Computer System Operation
Operating systems enable the system they manage to operate in various modes. These include batch processing, time
sharing, and real-time processing.
Batch processing Processing programs or transactions in batches, without a user's interaction.
Time Sharing Systems providing interactive processing by allocating a short time slice for the use of the server to
each user in turn.
Real-time Processing Systems that respond to an event within a fixed time interval; used for example, in
manufacturing plants or to collect data from several pieces of equipment in a laboratory.
With the move toward multiprocessors, in which several (or even many) processors are configured in a single
computer system, multiprocessing operating systems have been designed to allocate the work to the multiple
processors. These systems also support multiprogramming, which allows many programs to compete for the
processors.
- popular operating system that is available for micros, minis, and mainframe computer systems
User Interface
A user interface is a combination of means by which a user interacts with the computer system. It allows the end
user to communicate with the operating system so they can load programs, access files, and accomplish other tasks.
The three main types of user interfaces are:
1. Command drive
2. Menu drive
3. Graphical User Interface (GUI)
The most popular graphical user interface is that provided by Windows 95. The Windows environment has become
a standard platform for computers.
The Goal of Open Systems
A drive is to use open systems in organizational computing, so that the software and hardware of any vendor can
operate with those of any other, calls for an operating system that would run on any hardware platform. The
term Aopen system@ is used as the opposite of proprietary systems of a specific manufacturer.
In open systems, organizations want portability, scalability, and interoperability of applications software.
Portable application: can be moved from one computer system to another.
Scalable application: is one that can be moved without significant reprogramming.
Interoperability: means that machines of various vendors and capabilities can work together to produce needed
information.
5.3 Personal Productivity Software
Personal productivity software is the most common applications software. Run on personal computers, these
programs assist the user in a certain range of tasks. Taken together with professional support systems and systems
supporting groupwork, personal productivity software is a potent enabler of today's knowledge work.
Functions of Personal Productivity Software [Figure 5.3][Slide 5-4]
Personal productivity software enhances its user's performance on a specific range of common tasks. This software
supports database management and analysis, authoring and presentation, and activity and notes tracking. All these
are software applications. Data management is supported by database management systems, while spreadsheet
software assists in data analysis. For the needs of authoring and presentation, users employ the applications software
for word processing, desktop publishing, presentation, and multimedia authoring. Personal information management
software is used to track activities and personal notes. Communications software enables the user to connect to a
telecommunications network in order to exchange information with other users or systems. Web browsers are used
to access the resources of the Internet's World Wide Web.
Spreadsheets
Electronic spreadsheet packages are programs that are used for analysis, planning, and modelling. They provide
electronic replacement for more traditional tools such as paper worksheets, pencils, and calculators. In a worksheet
of rows and columns are stored in the computer's memory and displayed on the video screen. Data and formulas are
entered into the worksheet and the computer performs the calculations based on the formulas entered. A spreadsheet
package can also be used as a decision support tool to perform what-if analysis.
Database Management
Database management packages facilitate the storage, maintenance, and utilization of data in a database that is
shared by many users. Microcomputer DBMs enables the users to:
1. Create and maintain a database
2. Query a database with a query language
3. Prepare formatted reports
In addition, packages offer security features, network connectivity, and the ability to present graphical output, as
well as to perform spreadsheet-type computations.
Word Processing
Word processing packages are programs that computerize the creation, edition, and printing of documents by
electronically processing text data. Word processing is an important application of office automation. Word
processing is the most popular authoring and presentation activity. In fact, it is the most common personal
computing application.
Desktop Publishing
Organizations use desktop publishing software to produce their own printed materials like newsletters, brochures,
manuals, and books with several type styles, graphics, and colors on each page. The components required to set up a
modest desktop publishing system include: a high-resolution display, a laser printer, desktop publishing software,
and perhaps a scanner.
Presentation Software
The goal of presentation graphics is to provide information in a graphical form that helps end users and mangers
understand business proposals and performance and make better decisions about them. It is important to note that
presentation graphics does not replace reports and displays of numbers and text material.
Multimedia Authoring Software
Multimedia authoring software enables its users to design multimedia presentations. Using these packages, you can
develop attractive computer-based training (CBT) courseware or customer presentations. This software has superior
graphic imagery, computer animation, and motion video which may be combined with high-fidelity sound in
combination with the text.
Hypermedia are electronic documents that contain multiple forms of media, including text, graphics, video, voice
messages, or other units of information such as worksheets. In the hypermedia method of information delivery,
linkages may be established among various items in a large multimedia document. These linkages enable the user to
move from one topic directly to a related one, instead of scanning the information sequentially. Hypertext is a
methodology for the construction and interactive use of text databases. By definition, hypertext contains only text
and a limited amount of graphics.
Personal Information Management
Personal Information management (PIM) packages are tools that help knowledge workers track tasks, people,
projects, commitments, and ideas. These packages help end users store, organize, and retrieve text and numerical
data in the form of notes, lists, clippings, tables, memos, letters, reports, and so on.
Communications Software and Web Browser
Communications software enables the user to connect to a telecommunications network in order to exchange
information with other users or systems. The software provides the following capabilities:
1. Sending and receiving electronic mail
2. File transfer. You can download a program or a data file from a remote computer to your own workstation or
upload a file to the remote computer.
3. Terminal emulation - enabling the personal computer to act as a terminal when required in a particular
application.
4. Sending and receiving a fax
More and more frequently, the reason for connecting to a telecommunications network is to gain access to the
resources of the Internet. Web browsers are rapidly becoming one of the most popular categories of software
packages. A browser is a program that enables its user to access electronic documents in included in the Internet's
World Wide Web, a collection of interlinked hypermedia databases distributed among remote sites.
5.4 Programming Languages and their Translators [Figure 5.8][Slide 5-5]
Much of the applications software used in an organization needs to be programmed or customized. Programming
languages are the languages which computer programs are written int. A programming language allows a
programmer or end user to develop the sets of instructions that constitute a computer program. These languages
have evolved over four generations and can be grouped into five major categories:
1. Machine languages
2. Assembler languages
3. High-level languages
4. Fourth generation languages
5. Object-oriented languages
Machine Languages:
Machine languages are the most basic level of programming languages. They were the first generation of machine
languages.
Disadvantages of machine languages:
1. Programs had to be written using binary codes unique to each computer.
2. Programmers had to have a detailed knowledge of the internal operations of the specific type of CPU they were
using.
Assembler Languages:
Assembler languages are the second generation of machine languages. They were developed to reduce the
difficulties in writing machine language programs. Assembly language is also a low-level language (refers to
machine resources, such as registers and memory addresses), it is also specific to a computer model or a series of
models.
An assembly language program is translated into a machine language by a simple translator called an assembler.
Assembly languages are used today only when tight control over computer hardware resources is required, such as
in certain systems programs, particularly those for real-time computing.
Advantages:
1. Uses symbolic coded instructions which are easier to remember
2. Programming is simplified as a programmer does not need to know the exact storage location of data and
instructions.
3. Efficient use of computer resources is outweighted by the high costs of very tedious systems development and by
lock of program portability.
Disadvantage:
1. Assembler languages are unique to specific types of computers.
2. Programs are not portable to other computers.
High-Level Languages (procedural)
High-level languages are the third generation programming languages. These languages provide statements, each of
which is translated into several machine-language instructions. High-level languages include COBOL (business
application programs), BASIC (microcomputer end users), FORTRAN (scientific and engineering applications), and
more popular today are C, C++, and Visual Basic.
Advantages:
1. Easier to learn and understand than an assembler language as instructions (statements) that resemble human
language or the standard notation of mathematics.
2. Have less-rigid rules, forms, and syntaxes, so the potential for error is reduced.
3. Are machine-independent programs therefore programs written in a high-level language do not have to be
reprogrammed when a new computer is installed.
4. Programmers do not have to learn a new language for each computer they program.
Disadvantages:
1. Less efficient than assembler language programs and require a greater amount of computer time for translation
into machine instructions.
A variety of software packages are available to help programmers develop computer programs. For example,
programming language translators are programs that translate other programs into machine language instruction
codes that computers can execute. Other software packages called programming tools help programmers write
programs by providing program creation and editing facilities.Language translator programs (language processors)
are programs that translate other programs into machine language instruction codes the computer can execute. These
programs allow you to write your own programs by providing program creation and editing facilities.
Programming language translator programs are known by a variety of names.
Assembler: translates the symbolic instruction codes of programs written in an assembler language into machine
language instructions.
Compiler: translates (compiles) high-level language statements (source programs) to machine language programs.
Interpreter: translates and executes each program statement one at a time, instead of first producing a complete
machine language program, like compilers and assemblers do.
5.5 Fourth-Generation Languages: (4GL's)
4GL's include a variety of programming languages that are more nonprocedural and conversational than prior
languages. The use of fourth-generation languages permits a severalfold increase in productivity in information
systems development.
Categories of Fourth-Generation Languages and their Role in End-User Computing
The distinguishing feature of 4GLs is that they specify what is to be done rather than how to do it. Characteristics of
4GL's include:
1. The languages are nonprocedural
2. They do not specify the complete procedure for accomplishing the task (this is filled in by the software translator
for the 4GL).
3. About one-tenth of the number of instructions are required in 4GL as compared to procedural languages. [Figure
5.12]
4. Principal categories of 4GLs are query languages, report generators, and application generators - Figure 5.13
[Slide 5-6]
5. Query languages and report generators make it unnecessary to develop certain applications by providing direct
access to a database. Application generators make it relatively easy to specify in nonprocedural terms a system for
such access.
6. 4GLs also have software generators for producing decision support and executive information systems.
Three categories of 4GLs are:
1. Query language
2. Report generators
3. Application generators
Query Languages
Query languages enable end users to access databases directly. Characteristics of query language include:
1. Used online for ad-hoc queries, that is, queries that are not predefined
2. Result of the query is generally not formatted since it is displayed in a default format selected by the system itself.
3. Interaction is usually simple, only very simple computations are involved.
4. Most query languages also make it possible to update databases. With many query languages, it is possible to
request a graphical output to a query.
Six primary styles for querying a database:
1. Form fill-in
2. Menu selection
3. Command-type query language, such as SQL
4. Query by example (QBE)
5. Direct manipulation
6. Restricted natural language
Query languages are appropriate for:
1. Automatic teller machines
2. Electronic kiosks
Report Generators
A report generator enables an end user or an information systems professional to produce a report without detailing
all the necessary steps, such as formatting the document.
Characteristics of report generators include:
1. Offer users greater control over the content and appearance of the output than a query language.
2. Specified data may be retrieved from the specified files or databases, grouped, ordered, and summarized in a
specified way, and formatted for printing as desired.
Application Generators
An application generator makes it possible to specify an entire application, consisting of several programs, without
much detailed coding. Characteristics of application generators include:
1. Most generators produce (generate) code in a procedural language. This code may then be modified to meet the
precise needs of the application.
2. Generators targeted toward end users are simple to use. They are targeted to a limited application domain. They
produce the code mostly from a specification of the structure of files and databases and from the given layouts of
screens and reports. The requisite processing is specified in terms natural to the end users.
3. A screen-painting facility makes it possible to specify the graphical user interface for the system under
development.
4. Powerful application generators require the expertise of information systems professionals, and are generalpurpose tools. They often may run on mainframes and minicomputers.
5. Application generators are increasingly integrated into computer-aided software engineering (CASE)
environments.
Advantages:
1. Simplified the programming process.
2. Use nonprocedural languages that encourage users and programmers to specify the results they want, while the
computers determines the sequence of instructions that will accomplish those results.
3. Use natural languages that impose no rigid grammatical rules
Disadvantages:
1. Less flexible that other languages
2. Programs written in 4GLs are generally far less efficient during program execution that programs in high-level
languages. Therefore, their use is limited to projects that do not call for such efficiency.
b. WANs connect all the divisional minicomputers to the headquarters mainframe with a variety of local
microcomputers and terminals located at remote sites connected, in turn, to the minicomputers.
c. WANs provide the backbone through which all other nodes (computers and terminals) communicate.
d. WANs often use telecommunication links and equipment provided by specialized vendors, called common
carriers.
e. WANs serve to interconnect multiple LANs and can make specific resources available to a large number of
workstations.
Metropolitan Area Networks (MAN) - are telecommunications networks that interconnect various local area
networks within a metropolitan area, that is, within approximately a 50-mile range.
Characteristics of a WAN: [Figure 7.4]
a. Purpose of MANs is to interconnect various LANs within a metropolitan area, that is, within approximately a 50 mile range.
b. Generally, the speed of MANs is equal to that of LANs and they use similar technology.
Interorganizational Information Systems - are shared by two or more companies.
Characteristics of Interorganizational Information Systems: [Figure 7.5]
a. These systems help several firms share information in order to coordinate their work, collaborate on common
projects, or sell and buy products and services.
b. Internet has emerged as a global public network of networks
c. Some interorganizational systems are employed in knowledge work
d. Can be used to connect a firm's computers to the information systems of its customers, suppliers, and business
partners, and are also used to execute business transactions.
4. Terrestrial Microwave
5. Satellite Transmission
6. Radio Transmission
Three of the above transmission media are classified as guided media - in which the signal moves along an enclosed
path. Guided media require wiring. They include:
1. Twisted pair
2. Coaxial cable
3. Fiber optic cable
Three of the above transmission media are classified as wireless media - the signal is broadcast (radiated in many
directions) over the air or space and received through an antenna. They include:
1. Terrestrial Microwave
2. Satellite Transmission
3. Radio Transmission
Characteristics of Communications Media:
Twisted Pair a communications medium consisting of a pair of wires.
Coaxial Cable a communications medium that consists of a relatively thick central conductor shielded by several
layers of insulation and the second conductor just under the cable's shell
Fiber Optics high-capacity communications medium that consists of many strands of pure glass with a data
carrying core in the middle, surrounded by a reflective coating and a protective sheath.
Terrestrial Microwave long-distance telecommunications by means of microwave signals travelling on the surface
of the earth.
Satellite Transmission form of microwave transmission in which the signal is transmitted by an earth station to a
satellite which rebroadcasts the signal to the receiving station.
Radio Transmission wireless communications technology that transmits voice or data over the air using a lower
frequency band than microwaves.
Note: Transmission speeds keep on rising, particularly in the fiber optics area. We are now moving toward a global
infrastructure of gigabit-speed fiber optic links relying on digital transmission. In this multimedia environment, data,
text, voice, images, and video will travel at speeds of billions of bits per second.
Analog and Digital Communications [Figure 7.8][Slide 7-7]
Most of the lines in the telephone systems of the world at present are analog. Signals are transmitted as continuous
waves. This is a satisfactory way to transmit voice, but digital data sent by computers (sequences of pulses
representing 0s and 1s) must be converted into an analog signal for transmission over an analog line. The analog
data must then be converted back into digital before entering the memory of the receiving computer. The conversion
of data from digital form into analog for transmission and then back into digital at the receiving end is done by a pair
of interface devices called modems (modulator-demodulator).
Modem-based telecommunications have created a significant bottleneck in an environment where computer and
peripheral speeds have increased dramatically. The solution is end-to-end digital communications, in which signals
are sent as streams of on/off pulses. Digital lines are capable of much faster communication and digital circuitry is
now cheaper than analog. All the new equipment now installed in telephone networks is indeed digital.
Trend: There is a shift toward digital telecommunications is taking place throughout the world. A digital system for
telecommunications, called TI carrier, is in wide use in parts of the telephone network.
Future: Integrated Services Digital Network (ISDN) - a completely digital telecommunications network standardized
by an international committee. Although ISDN services are available in some areas, including most of the US,
worldwide ISDN is not expected to become operational until after the year 2000.
Multiplexing
Characteristics of multiplexing:
1. There are economies of scale in telecommunications systems: the higher the system capacity, the lower the unit
cost of transmissions.
2. Many individual transmissions can share a physical channel through a variety of techniques collectively
called multiplexing.
3. Multiplexing combines several lower-capacity transmissions into a single transmission, which is split at the
receiving end.
Signal Compression
Characteristics of signal compression:
1. Signal compression is the reduction of the need for channel capacity by removing redundancies from the signal.
2. To reduce the transmission needs, we can remove the redundancies at the sender site, transmit the compressed
signal, and then restore the signal at the receiving end.
d. The central node is a locus of vulnerability: it may be overloaded or it may fail, disabling the entire network.
Ring Network: [Figure 7.9b]
a. Each node in a ring network is connected to two of its neighbours.
b. The nodes are usually close to one another; this topology is frequently used in LANs.
c. When one node sends a message to another, the message passes through each intermediate node, which restores
the signal, as signals deteriorate in transmission.
d. If a node fails, the ring is out of service, unless the ring contains two channels transmitting in opposite directions.
Bus Network: [Figure 7.9c]
a. The nodes on a bus network are connected to a common link such as coaxial cable. This arrangement is used in
LANs.
b. A failing device does not affect the rest of the network; failure of the bus itself, of course, brings the network
down.
Switching in Networks
Many users can be connected at the same time to a network of communication channels. Switching devices establish
connections between nodes that need to communicate over a network. Principal techniques for switching include:
1. Circuit Switching
2. Packet Switching
3. Fast Packet Switching
Circuit Switching:
1. The circuit switching technique is employed in a telephone network.
2. Communication links are connected to switching centers, which connect to one node to another on demand.
3. The circuit is established for the entire duration of the communication
4. Circuit switching is suitable for file transfers and similar longer transmissions
Packet Switching: [Figure 7.10]
1. Packet switching is of particular importance for data communication owing to its speed and its superior utilization
of communication links when handling Abursty,@ intermittent, traffic. Indeed, data transmission involves short
bursts of activity by a computer or a terminal when the data are sent, followed by long periods when there is no
transmission.
2. Packet switching offers flexibility in connecting to a network. It is used by most of the public data networks
provided by value-added carriers.
3. In packet switching, messages are divided at the source into fixed-length chunks, called packets, that also include
bits identifying the receiver. Typically, a packet contains 128 bytes of data.
4. Each packet, can be transmitted independently, with routing determined at each node the packet passes through
(as opposed to circuit switching, where the route is predetermined).
Fast Packet Switching:
Traditional packet switching checks each packet for errors at every node the packet passes through. Modern
telecommunications equipment is far more noise-free than that for which packet switching was originally designed.
To take advantage of this, two fast packet-switching technologies are being introduced:
Frame Relay: Fast packet switching that checks a packet for errors only at the entry and exit nodes of the
telecommunications network, thus reducing transmission delay.
Cell Relay: (asynchronous transfer mode, or ATM) transfers very short fixed-length packets, called cells, over fast
LANs or WANs.
7.4 Communications Protocols in Computer Networks
Communication rules, called protocols, enable dissimilar hardware and software to communicate over a single
network.
Network Protocols [Figure 7.11][Slide 7-8]
Computer networks exist to provide connectivity among a variety of computers and access devices. To ensure
orderly communication over a network, all the nodes in the network must follow a set of rules called protocols.
These rules are complex. They extend from the electric connection to the network and the format of the message, all
the way to the interaction between application programs that run on different nodes.
Explain to students that with the globalization of telecommunications, the International Standards Organization
(ISO) has developed the OSI model in order to organizing protocols. The open system approach opens the field to a
broad array of competing vendors, a situation that benefits users to ensure that they are not locked into a closed,
proprietary protocol structure of a specific manufacturer.
1. Gives both users and vendors flexibility in conforming to a standard.
2. Users can select a protocol for any layer of the model, as long as the protocol performs the necessary services and
provides the same interface to the adjacent layers.
3. If a layer has to be changed, only the hardware or software implementing that layer need be modified.
4. A protocol layer in one node interacts with the corresponding layer in another one.
Table 7.2 explains the functions of the seven layers of protocol in the OSI model. They include:
Layer and its Function
1.Physical Provides access to the telecommunications medium and ensures transmission of the bit stream over it
2.Data Link Ensures error-free transmission of frames (blocks) of data over a network link
3.Network Routes messages (or packets) from source to destination by selecting connecting links
4.Transport Provides reliable end-to-end connection between two communicating nodes. When packet switching is
used this layer breaks a message into packets
5.Session Establishes, maintains, and terminates a connection (session) between two applications running on
communicating nodes. A session lasts, for example, from a long-on to a specific application to a log-off.
6.Presentation Provides any necessary conversions of the character being sent (encryption/decryption,
compression/decompression, or character code conversions). Issue requests for establishing and terminating a
session to the session layer
7.Application Provides services to communicating application programs; examples include file transfer, running a
remote program, allocating a remote peripheral, and ensuring integrity of remote databases.
Two protocol sets have gained importance:
SNA - IBM's Systems Network Architecture.
- its functions are broken down into five layers, basically performing the functions of the five middle OSI levels.
TCP/IP - Transmission Control Protocol/Internet Protocol
- its functions are broken down into five layers. TCP provides the higher-level services in connecting the
communicating applications, while IP ensures the lower-level functions of routing and addressing, guiding the
packets over the Internet.
Interconnections among Networks
As communication needs increase, network connectivity becomes a major issue as users want to access a remote
computer. Gateways such as routers and bridges help solve the problem.
Interconnection between two networks of the same type is accomplished by a relatively simple bridge, implemented
in hardware and software. Interconnection between dissimilar networks, for example, a LAN and a WAN, is
achieved through a more complex router. A router is a device that accepts messages in the format produced by one
of the networks and translates them into the format used by the other.
7.5 Local Area Networks
Organizations small and large use fast local area networks (LANs) to interconnect personal computers, and thus
make a basic workgroup tool.
Local Area Network: Workplace for a Workgroup
A LAN interconnects computers within a single site, such as an office building, a manufacturing plan, or a corporate
or university campus.
Characteristics of a LAN include:
1. Its scope is commonly measured in feet
The offerings of common carriers and of providers of value-added services may be combined with private networks
to create an overall organizational network.
Telecommunications Equipment for Wide Area Networks [Figure 7.15][Slide 7-9]
WANs include equipment that controls message transfer and makes it possible to share the links among a number of
transfers.
Host Computer
A WAN has a powerful host computer. The host runs a system program, called a telecommunications monitor,
which processes incoming messages, passing them to the appropriate application programs, and accepts outgoing
messages from the applications in order to transmit them into the network.
Front-End Processor
Relieves the host computer of most of the tasks involved in network control. Under the control of its own software,
the front-end processor accepts messages coming from the network and routes outgoing messages to their
destinations. It performs the necessary code conversions, encrypts and decrypts secure messages, and performs error
checking so that the host deals with Aclean@ messages.
Cluster Controller
Manages several terminals, connecting them to a single telecommunications link, and performs communication tasks
for them, such as screen formatting, code conversion, and error checking. A cluster controller may also allow the
terminals to share a high-speed printer and may handle electronic mail among the cluster terminals.
Multiplexor
Combines the data that terminals send to it over local low-speed links into a single stream. This stream is then
transmitted over a high-speed telecommunications channel and is split by another multiplexor on the opposite end of
the channel.
Concentrator
Combines transmission from several slower terminals that operate in a burst mode into a single transmission stream
that requires a link of lower speed than the sum of the speeds of all the terminals combined. A concentrator stores
messages from terminals and forwards them when warranted.
Switches
Establishes connections between nodes that need to communicate.
Access Terminals
Include a variety of dumb terminals, with no processing capacity and intelligent terminals with processing capacity,
such as personal computers.
Where do Facilities for Wide Area Networks Come From?
Some network facilities are owned by user organizations, others can be leased by them, or simply used on a pay-asyou-go basis. Among the typical facilities owned by user firms are workstations, host computers, and front-end
processors. The essential providers of telecommunications links and services are common carriers and the vendors
of enhanced services on value-added networks. These include:
1. Common carriers
2. Providers of value-added networks
3. Private lines and private networks
Common Carriers
Are companies licensed by a country's government to provide telecommunications services to the public. The vast
majority of common carriers provide telephone service. These carriers offer the use of a wide-area
telecommunications infrastructure, that is, facilities for the transmission of voice and data messages.
Common carriers offer a service called virtual private network where a user firm can purchase guaranteed access to
facilities with specified capabilities, such as transmission speed and access points.
Providers of Value-Added Networks
Value-added vendors lease facilities from the common carriers and provide telecommunications services to their
own customers. These vendors add value to the basic infrastructure furnished by the common carrier. The valueadded networks (VAN) provided by the vendors furnish services over and above those provided by common
carriers.
Private Lines and Private Networks
Instead of using a service that has to be shared with others, a firm may lease its own private lines or entire networks
from carriers. This can have economic advantages as compared with VAN use, as well as provide faster and more
secure communications.
7.8 The Internet and Electronic Commerce
The Internet has changed the face of individual and organizational computing. Driven by the possibilities offered by
the Internet and the Web, electronic commerce is expanding its reach.
Present and Future of the Internet
The Internet is the global network of computer networks without a centralized control that has become the
contemporary Ainformation highway.@
Characteristics of the Internet:
1. It is run in a decentralized fashion by a number of voluntary organizations, the principal of which is the Internet
Society.
2. It is a medium of communication, a source of information, and a developing means of electronic commerce.
3. A major obstacle to its development has become the limited capacity of the links interconnecting the networks.
Facilities for Communication and Information Access
The Internet provides several essential facilities that organizations can use for internal as well as interorganizational
information sharing and communication.
The principal categories of Internet use include:
1. Communication
Electronic mail (E-mail) facilitates quick exchange of information and ideas, and is the Internet facility in widest
use. E-mail can be used for one-to-one communications or to participate in larger communications forums
(newsgroups).
2. Information Access:
The Internet provides access to the largest organized (loosely) repository of information on earth: the collection of
electronic documents stored on sites all over the world. The main problem is finding the information. To help with
this problem Web search engines have been developed. Examples include Gopher sites, using indexes such as
Veronica, or via a WAIS (Wide Area Information Service) keyword search.
The World Wide Web
The World Wide Web (or simply, the Web) is an information service available over the Internet, providing access to
distributed electronic documents via hyper links.
Characteristics of the Web:
1. Grew out of the need of scientists who wanted to share information and to collaborate from geographically
dispersed locations.
2. Is a client/server system. The Web is a collection of electronic sites stored on many thousands of servers all over
the world. Each site consists of a home page and often other pages stored with it. Pages contain hyperlinks to related
pages, usually stored on other sites.
3. Access to the Web is through a client program, known as a browser. The browser sends out for the needed page
into the Internet, interprets the formatting directions on the retrieved page, and displays the page accordingly on the
screen.
4. To access a Web site, you provide the browser with the site's identifier, known as a URL (Uniform Resource
Locator).
5. A search engine is a Web facility that maintains its own information about the documents available on the Web.
Electronic Commerce
Electronic commerce is sharing business information, maintaining business relationships, and conducting business
transactions by means of telecommunications networks. In simple words, electronic commerce is doing business
electronically, replacing most of the paper and telephone work with computer-mediated information and transaction
exchange. The Internet, and the Web in particular, are emerging as the principal means for this new way of doing
business.
Some potential uses include:
1. Establishing an electronic site on the Web to promote your business
2. On-line marketplaces
3. Advertising at frequented Web sites
4. Establishing newsgroups
5. Job classified
One of the biggest drawbacks for the use of the Internet for conducting electronic commerce is the lack of financial
security.
The framework of electronic commerce is summarized in three levels:
1. Infrastructure
- the hardware, software, databases, and telecommunications that together deliver such functionality as the Web over
the Internet, and support EDI and other forms of messaging over the Internet or over value-added networks.
2. Services
- messaging and a variety of services enabling the finding and delivery of information, as well as negotiation,
transaction business, and settlement.
3. Products and structures
- direct provision of commercial services to consumers and business partners, intraorganizational information
sharing and collaboration, and organization of electronic markets and supply chains.
Intranets
Using the Internet, many firms have implemented internal networks of Web sites, known as intranets. Intranets are
set up on corporate LANs and WANs. An Intranet is separated from the public Internet by a facility called firewall.
The firewall program runs on the server computer, preventing access to the Intranet from the public Internet, but
allowing access to the Internet. Intranet is, in effect, the owner company's private Internet.
Intranets have become important business tools for:
1. Sharing information and knowledge among a company's employees
2. Accessing databases and data warehouses
3. Organizing the corporate workflow around electronic documents
4. Enabling collaboration
7.9 Information System Architecture: [Figure 7.17][Slide 7-10]
The high-level design of a blueprint for the organizational information system is known as the information system
architecture. This plan must support the present and future computing and communications needs of a business.
Today, the architectural blueprint of many organizations rests on internetworking: interconnecting a number of local
area networks with a corporate wide area network, or using the Internet connectivity. Fundamental components of
an architectural plan must address the following concerns:
1.
Customer relationship management (CRM) refers to the practices, strategies and technologies that
companies use to manage, record and evaluate customer interactions in order to drive sales growth
by deepening and enriching relationships with their customer bases.
Essentially CRM works by collecting leads or consumer information. Analyzing the collected information
to understand customer or market requirements. Adjusting marketing campaigns accordingly to increase
sales.
CRM also serves for customer service and support--making businesses efficient and improve customer
satisfaction.
In any business, the bottom-line of CRM work flow is to (1) Initiate Marketing, (2) Process Sales, (3)
Schedule Orders and (4) Provide Support .
Thus CRM is becoming increasingly important among businesses. With an ever increasing customer expectation
there is a need for organizations to adopt new business services and strategies - CRM provides this versatility in
enhancing sales, customer support and success in business.
2.
3.
Enterprise resource planning (ERP) is business processmanagement software that allows an organization to
use a system of integrated applications to manage the business and automate many back office functions
related to technology, services and human resources. ERP software integrates all facets of an operation,
including product planning, development, manufacturing, sales and marketing.
4.
ERP software is considered an enterprise application as it is designed to be used by larger businesses and
often requires dedicated teams to customize and analyze the data and to handle upgrades and deployment.
In contrast, Small business ERPapplications are lightweight business management software solutions,
customized for the business industry you work in.
Software life cycle -- important steps and effort distribution. Aspects of estimation and scheduling.
Software
evaluation techniques-modular design : coupling and cohesion, Software and complexity measures.
Issues in
software reliability. System Analysis: Requirement analysis. Specification languages. Feasibility analysis.
File and data structure design, Systems analysis tools. Software design methodologies, Data flow and
Data
Structure oriented design strategies. Software development, coding, verification, and integration. Issues
in
project management-team structure, scheduling, software quality assurance. Object Oriented
methodology:
object orineted paradigm, Object Oriented analysis and design, examples of methodologies.
Text/References :
1. R. S. Pressman, Software Engineering - A Practioner"s Approach,3rd Edition, McGrawHill,1992.
2. J. Martin, Rapid Application Development, Maxwell MacMillan, 1991.
3. B. Meyer, Object Oriented Software Construction, Prentice Hall, 1988.
4. G. G. Schulmeyer, Zero Defect Software, McGraw-Hill, 1992.
5. J. Rumbaugh et. al., Object Oriented Modeling and Design, Prentice Hall,1991.