Beruflich Dokumente
Kultur Dokumente
1.1 BUSINESS
IN
THE
INFORMATION
Organizational
Responses
to
Business
Information Age
Strategic systems
Customer focus and service
Continuous improvement efforts
Business process reengineering
Empowering employees and fostering collaborative work
Pressures
in
the
KNOW
ABOUT
INFORMATION
TECHNOLOGY
IT is Generally Interesting
The more you know about the power of the technologies, the more you will want to know about how
they work. The more you learn about how they work, the more you will be able to see how they can
accomplish what they do.
Hardware: a set of devices, such as a processor, monitor, keyboard, and printer that accept
computers.
Procedures: the strategies, policies, methods, and rules for using the information system.
People: the most important element in information systems; include those persons who work
with the information system or use its output.
CHAPTER 2
computer
technology continues to leapfrog forward, computer-based information systems are changing rapidly.
These changes are having enormous impact on the capabilities of organizational information
systems.
.1 INFORMATION SYSTEMS
INFRASTRUCTURE AND ARCHITECTURE
Information Infrastructure
An information infrastructure consists of the physical facilities, services, and management that
support all computing resources in an organization. There are five components of infrastructure:
computer hardware, general-purpose software, networks and communication facilities, databases,
and information management personnel.
Information Architecture
An information architecture is a high-level map or plan of the information requirements in an
organization and the manner in which these requirements are being satisfied.
In preparing information architecture, the designer needs similar information, which can be divided
into two parts:
1. The business needs for information.
2. The existing and planned information infrastructure and applications in the organization.
Traditional Architectures
Mainframe environment
PC environment
Distributed environment
New Architectures
Client/server architecture
Enterprisewide architecture
Internet-based architectures
Departmental structure is most wisely used in business organizations. Most organizations have, at
minimum, the following departments:
Accounting
Finance
Marketing and Sales
Production or Operations Management (POM)
Human Resources Management
Information Systems
Support systems
Managers are not the only organizational employees who can benefit from information systems.
Support systems for office employees began to emerge in the late 1960s and early 1970s when
networked computing and electronic communication became more prevalent.
.4 IT
SUPPORT
AT
ORGANIZATIONAL LEVELS
Managers
Knowledge Workers
Clerical Staff
Chapter 3
DIFFERENT
COMPUTER HARDWARE
By : Angelini / 016201200020 / IR 2
Computer-based information systems (CBIS) are composed of hardware, software,
databases, telecommunications, people, and procedures. The components are organized to
input, process, and output data and information. The hardware components of a computer
system consists of the following:
1.
2.
3.
4.
5.
Memory
Memory Capacity:
a.
b.
c.
d.
Read-only Memory (ROM): is the place where certain critical instructions are
safeguard. These instructions can be read only by the computer and cannot be
changed by the user.
Secondary Storage: where much larger amounts of data and information are stored
for extended periods of time
- Magnetic Media: magnetic tape (is kept on a large open reel or in a smaller
cartridge or cassette), magnetic disks (is like a phonograph record in that it has
tracks), hard drives (hard disks), magnetic diskettes (not rigid, much slower than
hard drives, much less capacity).
- Optical storage devices: CD-ROM (can only be read and not written on), WORM (can
be written on, but requires the laser technology to do so.
Primary storage has much less capacity than secondary storage, and is faster and
more expensive per byte stored. Primary storage is located much closer to the CPU than os
secondary storage. Sequential-access secondary storage media such as magnetic tape is
much slower and less expensive than direct-access media
Input Technologies
1. Human Data Entry Devices: allow people to communicate with the computer, such
as keyboards, mouse, mice and trackballs, stylus, joy stick, microphone.
2. Source Data Automation: to input data with minimal human intervention. Bellow are
the common types:
- Cash transaction device: Automated Teller Machines (ATMs), Point-of-sale (POS)
terminals.
- Optical scanners: Bar code scanners, optical mark reader, optical character
recognition (OCR).
- Other source data automation devices: Sensors, cameras.
Output Technologies
The output generated by a computer can be transmitted to the user via several devices
and media. Bellow is a discussion of common types of output technologies:
Monitors
Printers (impact printers, nonimpact printers, plotters)
Voice output
Multifunction devices
Multimedia
Supercomputers are the most powerful, designed to handle the maximum computional
demands of science and the military. Mainframes are not as powerful as supercomputers, but
are powerful enough for use by large organization for centralized data processing and large
databases. Minicomputers are smaller and less powerful versions of mainframes, often
Chapter 4
COMPUTER SOFTWARE
By : Angelini / 016201200020 / IR 2
Software Fundamentals
Software consists of computer programs that control the functions of computer
hardware. The process of writing programs is called programming, and individuals who
perform this task are called programmers. There are two main categories of software:
1. Systems Software: manages the hardware resources of the computer system and
functions between the hardware and the application software. System software
includes the system control programs and system support programs.
2. Application Software: enables users to perform specific tasks and information
processing activities. Application software may be proprietary or off the shelf.
Application Software
Proprietary software can be developed in house to address the specific needs of an
organization. Existing software programs can be purchased off the shelf from vendors that
sell programs to many organizations and individuals. Or a combination of these two methods
Programming Languages
Software and programming languages continue to become more user-oriented.
Programming languages have evolved from the first generation of machine languages that is
directly understandable to the CPU to higher levels that use more natural language and that
do not require users to specify the detailed procedures for achieving desired results. This
trend ensures that end users and the information systems staff will become more productive.
In addition, software is becoming much more complex, expensive, and time-consuming to
develop. As a result, the trend is toward purchasing off-the-shelf software rather than
developing it in house. In the future, organizations will tend to buy component-based
software modules to reduce costs and development time.
Enterprise Software
Organizations want packaged applications that support integration between functional
modules, that can be quickly changed or enchanced, and that present a common graphical
look and feel. In addition, organizations want individual components that can be combined as
necessary to meet changing business needs. Enterprise software consists of programs that
manage a companys vital operations, such as supply-chain management, inventory
CHAPTER 5
By : Cornelius Susanto / 016201200005 / IR 2
File
Record
Field
Byte
Record
Field
Field
Byte
Byte
Bit
Field
Bit
Bit
Byte
Bit
Which in addition some parts can be assumed as another same meaning, such as :
Every record in a file should contain at least one field that uniquely identifies that record so that the record can be
retrieved, updated, and sorted, which this kind of field is called as the primary key, for example: every
student in university has a different number of student number. And also there are Secondary keys that are
other fields that have some identifying information, for example: every students has a last name that might be
same with other students.
Also in Storing and accessing records, there are 2 ways of accessing method, they are:
1. Indexed sequential access method (ISAM) that uses an index of key fields to locate individual
records
2. Direct file access method that uses the key field to locate the physical address of a record.
Also, many people are confused the different between database and DBMS, heres a different between it
Database
Collection of file
Using one name
DBMS
Database Management System (the Software)
A SOFTWARE to manage database ex: Ms.
Word
Users INSTALL DBMS
The managing one
DBMS bring many advantages to the organization, such as: improved strategic use of corporate
data, improved security, enhanced data integrity, and etc.
Hierarchical Database Model rigidly structures data into an inverted tree in which records contain a key
field and a number of other fields. All records have only one parent and each parent may have many children.
This structure characterized by one to many relationships among data.
In Network Model records can be linked to more than one parent, allowing many-to-many relationship among
the data.
And the Relational Model uses tables to capitalize on characteristics of rows and columns of data that are
consistent with real world business situations.
Hierarchical and Network
Database Model
Relational Database
Advantage
Processing Efficiency,
which means that database
model relatively easy for users
to understand because they
reflect the pattern of many real
world business relationships.
High Flexibility in regard
to ad hoc queries, power to
combine information from
different sources,
simplicity of design and
maintenance.
Disadvantage
Have low flexibility,
time-consuming,
difficult to install,
difficult to remedy if
design errors occur.
They are relatively low
processing efficiency.
CHAPTER 6
By : Cornelius Susanto / 016201200005 / IR 2
Twisted-pair wire
Coaxial cable
Fiber optic cable
Microwave
Satellite transmission
Hardware
Level
CO M PUTER
1.
2.
3.
4.
5.
Cable Media
Broadcast
Media
Hierarchy
of Computer and Host
HOST
HOST
Software
Level
HOST
6.2 Network
Network Categorization
Networ
k
Networ
k
Networ
k
Public
Global
Wired
Private
Local
Wirele
ss
Network can be also categorized into more than categorization, such as public and global, private and
local, and so on. For example: Internet is a public and global network because it can be used by many
people and its available for people from around the world. But Wifi network isnt a global, its a local
network even its a public network, because it can only used in specific areas.
Heres some list of network hardware:
1.
2.
3.
4.
Antenna
Bluetooth hardware
SIM Card
Cellphone
5.
6.
7.
8.
Tablet
Telephone
Access Point
Router
9. Switch
10. Network Wire
11. Network Board
12.
21. Finally protocols are made in layers because it is too complex if protocols are in one layer.
22.
23.
Application Layer
Transport Layer
Software
Layers
Network Layer
Data Link Layer
Physical Layer
24.
Hardware
Layers
25. Chapter 7
26. THE INTERNET AND INTRANETS
27. By : Sharen Nataha Putri / 016201200039/ IR 2
28.
29.
30.
The internet is largest computer network in the world ( a network ofnetwrks),
connecting millions of computers to exchange information seamlessly by open, nonpropretary standards and protocols. A network is a group of two or more computer
systems linked togethers.
31.
32.
The Internet in frist time called ARPANET in 1969. ARPANET originally linked a
lagrgely technical audience composed of the military, government agencies, and
academic research and scientist. Original ARPANET split into two networks in early 1980
(ARPANET and milnet)
33.
34.
The number of computers and networks connected to the internet continues to
grow rapidly. In the early days, most people just used the internet to search for
information. Todays internet is a constantly envolving tool, that not only contains an
amazing variety of information, but also provides new ways of accessing, interacting and
connecting with people and content. As a result, new terms are constantly appearing as
new tochnologies are introduced.
35.
36.
The infrastructure of the Internet is supplied by network service providers, such
as UUNET, and MCI WorldCom company, GTE Internetworking, sprint, and others.
Businesses and individual subscribers connect to the internet through these and other
smaller Internet service providers.Backbone providers charge customers for various
combinations of bandwidth, traffic, and access time.
37.
Backbone providers must be connected to oe another and to access providers,
and this is done over banckbone network.
38.
39.
The set of rues used to send and receive pakets from one machine to another
over the internet is known as the internet protocol (IP). Best known of which is the
transport control protocol (TCP). IP and TCP are commonly used together that they
are referred to as the TCP/IP.
40.
41.
Each computer on the internet has an assigned address, called the IP address,
that uniquely identifies it from the other computers. The IP numbers have four parts,
separated by dots. For example, the IP address on one computer may be 125.62.128.91.
42. Easier peope to remember IP addresses. These names are derived from naming system
called the domain name system (DNS).
43.
44.
45.
46.
Communications services
Information retrieval
and the World Wide Web.
47.
48.
49.
Browser
Offline Browserr
search Engines
Push Technology
Information filters
Clipping services
Personalized Web Services
Collaborative filtering
Web Authoring
F. INTERNET CHALLENGES
New Technologies
Internet Regulation
Internet Expansion
Internet Privacy
50.
51.
52.
G. INTRANETS
53.
An internet is a private network that uses Internet software and TCP/IP protocols.
In essence, an internet is a private Internet, or group of private segments of the public
Internet network, reserved for use bt people who havee been given the authority to use
that network.
a Team
ware
is an add- on to group ware, used for team building, sharing ideas and documents,
brainstorming, scheduling, and archiving decisions to facilitate productivity. Intranets
present an alternative to existng groupware products such as Lotus Notes.
b Security
with this number and variety of applications, intranet security is critically important.
Companies can prevent unwanted intrusion into their intranets in several ways.Public
key security is used to broker authorization to enter into a privete internet. Another
important way for companies to protect their intranets is with the use of firewalls. A
firewalls is device located between a firms internal network and external networks.
54.
55.
56.
57.
58. Chapter 8
59. INTERORGANIZATION AND GLOBAL INFORMATION
SYSTEMS
60. By : Sharen Nataha Putri / 016201200039/ IR 2
61.
62.
63.
An interorganizational information system (IOS) involves information flow
among two or more organization.
C. EXTRANETS
EXTRANETS enable people who are located outside a company to work together with
the companys internally located employees. Although extranets continue to evolve,
they are generally understood to be networks that link business partners to one another
over the internet by providing access to certain areas of each others corporate intranets.