Sie sind auf Seite 1von 56

MANAGEMENT INFORMATION SYSTEMS

UNIT 1

SECTION B

REASONING QUESTIONS

1. Evaluate the strengths and weaknesses of humans as information


processors?
The information processing theory approach to the study of cognitive
development evolved out of the American experimental tradition in psychology. Developmental
psychologists who adopt the information-processing perspective account for mental development
in terms of maturational changes in basic components of a childs mind. The theory is based on
the idea that humans process the information they receive, rather than merely responding to
stimuli. This perspective equates the mind to a computer, which is responsible for analyzing
information from the environment. According to the standard information-processing model for
mental development, the minds machinery includes attention mechanisms for bringing
information in, working memory for actively manipulating information, and long-term
memory for passively holding information so that it can be used in the future. [1] This theory
addresses how as children grow, their brains likewise mature, leading to advances in their ability
to process and respond to the information they received through their senses. The theory
emphasizes a continuous pattern of development, in contrast with Cognitive Developmental
theorists such as Jean Piaget that thought development occurred in stages at a time.

2. Identify and discuss the major factors that affect the cost of information.
Information that cannot be explicitly cost justified must at least influence decisions
acquiring or processing this information is to warrant consideration. Given that information
requested does influence decisions, several factors that affect the cost of interval. They are
discussed and illustrated below
Factors That Affect the Cost of Information

FACTOR Consideration

ACCURACY Increased accuracy generally means


increased cost. Therefore, accuracy should
only be increased to the point that it still
influences decisions.

TIMELINESS In general, the more quickly information is


provided after the occurrence of an event,
the more costly is that information. Timely
information can result in earlier problem
identification and resolution.

Reporting Interval In general. The more frequently information


is
updated and reported, the higher the cost. If
information that affects decisions is changing
quickly, then the need is greater for shorter
updating and reporting intervals.

3. Enumerate the characteristics that delineate the first and second


generations of computers.
1. First Generation (1940-1956): Vacuum Tubes

First generation computers were vacuum tube / thermionic valves-based machines. These
computers used vacuum tubes for circuitry and magnetic drums for memory. A magnetic drum is
a metal cylinder coated with magnetic iron-oxide material on which data and programs can be
stored. Input was based on punched cards and paper tape, and output was displayed on printouts.

First generation computers relied on binary-coded language (language of 0s and 1s) to


perform operations and were able to solve only one problem at a time. Each machine was fed
with different binary codes and hence were difficult to program. This resulted in lack of
versatility and speed. In addition, to run on different types of computers, instructions must be
rewritten or recompiled.

Examples: ENIAC, EDVAC, and UNIVAC.


Characteristics of first generations computers:.

These computers were based on vacuum tube technology.


These were the fastest computing devices of their times. (computation time was in
milliseconds)
These computers were very large, and required a lot of space for installation.
Since thousands of vacuum tubes were used, they generated a large amount of heat.
Therefore, air conditioning was essential.
These were non-portable and very slow equipments.
The lacked in versatility and speed.
They were very expensive to operate and used a large amount of electricity.
These machines were unreliable and prone to frequent hardware failures. Hence, constant
maintenance was required.
Since machine language was used, these computers were difficult to program and use.
Each individual component had to be assembled manually. Hence, commercial appeal of
these computers was poor
2. Second Generation Computers (1956-1963):Transistors

In the sixties, there was lot of development in semiconductor field - a field of materials.
In vacuum tubes, a filament is heated to emit electrons,(the basic component of an atom)that
carry current. In 1946,Willam Shockley and a few of his colleagues invented transistors, which
do not need any heating to liberate electrons in addition to being smaller in size, they saved
power due to the absence of heating and hence the cooling needed. the smaller size resulted in
smaller distances that the electrons have to travel to transmit information from one part of the
computer to another. Hence calculations became faster. The reliability also increased. Today you
cannot see any second generation computers.

The smaller size of components saw mass production of computers which became
cheaper. Many companies started buying and using them increasing the demand. Computer
programming languages developed further to make programming easier and user friendly. yet if
you compare todays computers, they were a lot behind. The increased use of computers and the
consequent mass production sent the prices crashing down. Computer scientists and electronic
engineers were developing more sophisticated computers.
Characteristics of second generation computers:

These machines were based on transistor technology.


These were smaller as compared to the first generation computers.
The computational time of these computers was reduced to microseconds form
milliseconds.
These were more reliable and less prone to hardware failure. Hence, such computers
required less frequent maintenance.
These were more portable and generated less amount of heat.
Assemble language was used to program computers. Hence, programming became more
time efficient and less cumbersome.
Second generation computers still required air conditioning.
Manual assembly of individual components into a functioning unit was still required.
4. Construct a general model of a system.

Simple model

Environment

Entity Entity

Entity Entity

Expanded model

Inputs Outputs
Transformation
process
known, defined,
and Predictable
Known, Defined, Known, Defined
predictable Predictable

Relatively closed / stable / Mechanistic system

Inputs Outputs

Known, Defined, Known, Defined


Transformation
predictable Predictable
process
Unknown,Un defined,
Inputs and Unpredictable Outputs
Interactions
Unknown, Unknown,
Un Defined, Un Defined,
Unpredictable Unpredictable

5. "Accuracy of the information affects the cost of information"-Criticize the


statement.
Information is the result of the capture and organization of data. In an Information system
data become information when they are the basis upon which efficient and effective decisions
can be made. That is, information is used to increase the probability that the right decision is
made. The transforming of data in to information is the primary function of an information
system. Increased accuracy generally means increased cost. Therefore, accuracy should only be
increased to the point that it still influences decisions.

SECTION C

REASONING QUESTIONS
1. Categorize the following functions as pertaining to transaction processing,
information- providing, programmed decision making or decision support.
a) Credit is automatically rejected because a customer has a balance past due.

It is related to a function of programmed decision making involves having a system make


a decision rather than that a person. Such decion making is preprogrammed according to very
specific decision rules. For example, customer credit is refused if a customer has exceeded his or
her credit. Before a system can be designed and implemented to program the computer for
decision making,. the decision making process must be highly structured and defined. the most
advance form of programmed decision making is artificial intelligence or expert systems. In
these systems computers are programmed to simulate human thinking.

b) Management is provided with a sales analysis by department.

Information providing systems provide information necessary for decision making. This
information is generally gleaned from transaction summary in the form of summary and
exception reports. Summary reports are tabulations of detail in categories such as sales by store,
by department and by inventory item. Exception reports isolate detail or summary information
that significantly deviates from normal. For example, an exception report may indicate large
credit transactions, inventory item that are out of stock, or departmental payrolls that are
exceeding the budget. Both summary and exception reporting is powerful dimension of
information systems, they highlight and isolate important detail information. This saves decision
makers considerable time.

2. Recognizing that closed/stable/mechanistic systems are easier to automate


than are open/adaptive/organic, identify the following organizational
processes as being relatively closed/stable/mechanistic or
open/adaptive/organic.
Systems can be viewed or classified in several ways. For the purposes of this text, the
most useful classification scheme consists of the categories of closed/stable/mechanistic systems
and open/adaptive/organic systems. Few systems are exclusively categorized one way or the
other. Rather, any given system can be defined as existing on a continuum between the two
categories.
Closed / Stable / Mechanistic Systems

A closed /stable /mechanistic system tends to be self-contained. It seldom interacts


with its environment to receive input or generate output. Therefore, the entities of primary
concern in a closed / stable / mechanistic system are those retained in the system. The
interactions of the entities are stable and predictable. Consequently, the operation of the system
tends to be highly structured and routine

A closed / stable / mechanistic system does not necessarily have to interact with its environment
to continue to exist. However, in the long run, it will have to interact to continue its normal
operation.

Open / Adaptive / Organic Systems

An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern. The interactions of these entities
are probabilistic and changing in nature and are consequently less predictable than those in a
closed / stable /mechanistic system. The operation of an open / adaptive / mechanistic system. An
excellent example of an open / adaptive / organic system is a business organization.

A distinctive feature of an open / adaptive / organic system is that it can adapt to


changing internal and environmental conditions. It can change the entities retained in or transient
to the system. It can also change the way that entities interact. An open / adaptive / organic
system is self-organizing, and it can change its organization, its personnel, equipment, or
products; it can also change the way in which they are organized and what they do.

a) Processing checking accounts in a bank-- open/adaptive/organic systems

An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.

b) Payroll processing- closed/stable/mechanistic systems

A closed /stable /mechanistic system tends to be self-contained. It seldom interacts with


its environment to receive input or generate output.
c) Advertising - open/adaptive/organic systems

An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.

d) Credit management- open/adaptive/organic systems

An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.

e) Strategic planning - open/adaptive/organic systems.

An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.

f) Reordering inventory- closed/stable/mechanistic systems.

A closed /stable /mechanistic system tends to be self-contained. It seldom interacts with


its environment to receive input or generate output.

g) Designing an information system - closed/stable/mechanistic systems

A closed /stable /mechanistic system tends to be self-contained. It seldom interacts with


its environment to receive input or generate output.

3. Analyze the major misconceptions about information systems and the role
they play in organizations.
Because information systems are able to process transitions. Provide information for
decision making, support decision making, and even make decisions, people in organizations
have developed(often unrealistically)high expectations. Unfortunately, there is a gap between
what organizations expect of information systems and the performance of the systems.

This expectation gap results from six basic misconceptions about information systems
and role they play in organizations. These misconceptions are identified and explained.
Misconception Explanation

Computer can quickly and conveniently Organizational information is not stored on


provide managers with information they computer files. It must be collected before
desire. it can be processed .Once information is
available compute programs are required
to access the information.

More information means better decisions Though most managers lack a good deal
of the information they should have, many
information systems provide them with an
overabundance receive voluminous reports
that are unused because the reports are not
relevant to decision-making processes.

Managers need the information they want For manager to know what information they
need, they must be aware of each decision
they should and do make. They also must
define the process and variables required
to make each decision. This situation is
seldom the case. Consequently, managers
tend to play it safe and ask for more
information than they really need.

Give managers the information they need, Managers may not be aware of the best way
and their decision making will improve. to use information to make the best decision.
For example, several managers given the
same information make different decisions,
and some of the decisions are better than
others. Since all managers had the same
information, the better decisions makers
performance, not of the information.

Managers do not have to understand Mangers may lack confidence in something


information systems work. they do not understand and consequently not
use it. Also managers are less apt to
recognize logic problems In the information
generated by an information system if they
do not understand how the information is
processed.

Managers always welcome and encourage Often, improved information reveals that an
improved information for decision making. Operation is poorly managed
(e.g., incompetence, missed opportunities
over-ups).Improved information about
threatening and, therefore, resisted by
managers.

4. Project how the computer systems have evolved over generations.


In computer terminology, the word generation is described as a stage of technological
development or innovation. A major technological development that fundamentally changed the
way computers operate resulting in increasingly smaller, cheaper, more powerful and more
efficient and reliable devices characterize each generation of computers.

1. First Generation (1940-1956): Vacuum Tubes

First generation computers were vacuum tube / thermionic valves-based machines. These
computers used vacuum tubes for circuitry and magnetic drums for memory. A magnetic drum is
a metal cylinder coated with magnetic iron-oxide material on which data and programs can be
stored. Input was based on punched cards and paper tape, and output was displayed on printouts.

First generation computers relied on binary-coded language (language of 0s and 1s) to perform
operations and were able to solve only one problem at a time. Each machine was fed with
different binary codes and hence were difficult to program. This resulted in lack of versatility and
speed. In addition, to run on different types of computers, instructions must be rewritten or
recompiled

Examples: ENIAC, EDVAC, and UNIVAC.

Characteristics of first generations computers:.

These computers were based on vacuum tube technology.


These were the fastest computing devices of their times. (computation time was in
milliseconds)
These computers were very large, and required a lot of space for installation.
Since thousands of vacuum tubes were used, they generated a large amount of heat.
Therefore, air conditioning was essential.
These were non-portable and very slow equipments.
The lacked in versatility and speed.
They were very expensive to operate and used a large amount of electricity.
These machines were unreliable and prone to frequent hardware failures. Hence, constant
maintenance was required.
Since machine language was used, these computers were difficult to program and use.
Each individual component had to be assembled manually. Hence, commercial appeal of
these computers was poor
2. Second Generation Computers (1956-1963): Transistors

In the sixties, there was lot of development in semiconductor field - a field of materials.
In vacuum tubes, a filament is heated to emit electrons,(the basic component of an atom)that
carry current. In 1946,Willam Shockley and a few of his colleagues invented transistors, which
do not need any heating to liberate electrons in addition to being smaller in size, they saved
power due to the absence of heating and hence the cooling needed. the smaller size resulted in
smaller distances that the electrons have to travel to transmit information from one part of the
computer to another. Hence calculations became faster. The reliability also increased. Today you
cannot see any second generation computers.

The smaller size of components saw mass production of computers which became
cheaper. Many companies started buying and using them increasing the demand. Computer
programming languages developed further to make programming easier and user friendly. yet if
you compare todays computers, they were a lot behind. The increased use of computers and the
consequent mass production sent the prices crashing down. Computer scientists and electronic
engineers were developing more sophisticated computers.

Characteristics of second generation computers:

These machines were based on transistor technology.


These were smaller as compared to the first generation computers.
The computational time of these computers was reduced to microseconds form
milliseconds.
These were more reliable and less prone to hardware failure. Hence, such computers
required less frequent maintenance.
These were more portable and generated less amount of heat.
Assemble language was used to program computers. Hence, programming became more
time efficient and less cumbersome.
Second generation computers still required air conditioning.
Manual assembly of individual components into a functioning unit was still required.
3. Third Generation Computers (1964 - early 1970s): Integrated circuits

In second generation computers, one could recognize the circuit components such as
transistors, resistors and capacitors distinctly. There were physically separate or discreet.
Slowly scientists started integrating these components together so that they are not separate.
They were fused into the circuits. People called it large scale integrated circuits (LSI).
Computers using such components were called third generation computers. Since components
were packed together more densely, the size of computers became smaller. Programmers also
developed more sophisticated software. By 1970, engineers developed a device called
microprocessor. Lot of circuits was packed into it. Intel 4004 was one such chip.

Characteristics of third generation computers:

These computers were based on integrated circuit (IC) technology.


They were able to reduce computational time from microseconds to nanoseconds.
They were easily portable and more reliable than the second generation.
These devices consumed less power and generated less heat. In some cases, air
conditioning was still required.
The size of these computers was smaller as compared to previous computers.
Since hardware rarely failed, the maintenance cost was quite low.
Extensive use of high- level languages became possible.
Manual assembling of individual components was not required, so it reduced the large
requirement of labour and cost. However, highly sophisticated technologies were
required for the manufacture of IC chips.
Commercial production became easier and cheaper.
4. Fourth Generation Computers (Early 1970s till date): Micro processors
More and more circuits were packed in a microprocessor. The components were
integrated further and very large scale integration (VLSI) technology revolutionized computer
field further. Intel Corporation made chips such as 8080 and 8086 to be followed by 80286,
80386, 80486 and now the Pentium processor. These chips perform calculations faster. They are
not only used in computers, but also in measuring devices and even in house hold devices such
as washing machines.

Computers using such VLSI chips progressively shrunk in size. Computers using the
microprocessors are termed as microcomputers. The software technology also developed further.
Programmers developed more sophisticated and user friendly software. In course of time, the
cost of these computers have come down so much that even individuals bought them so they
came to be known as personal computers.

Characteristics of Fourth generation computers:

Fourth generation computers are microprocessor-based systems.


These computers are very small.
Fourth generation computers are the cheapest among all the other generations.
They are portable and quite reliable.
These machines generate negligible amount of heat, hence they do not
require air conditioning.
Hardware failure is negligible so minimum maintenance is required.
The production cost is very low.
GUI and pointing devices enable users to learn to use the computer quickly.
Interconnection of computers leads to better communication and resource sharing.
5. Fifth Generation Computers (Present and beyond): Artificial Intelligence

Up to fourth generation, the classification was based purely on hardware. Fifth generation
computers are classified based on software also. VLSI technology is used in fifth generation
computers. They have large main memories. The speed is also high. In addition to all this, Fifth
generation computers run software called expert systems.

Characteristics of Fifth Generation computers:


Mega Chips:

Fifth generation computers will use super large Scale integrated (SLSI) chips, which will result
in the production of microprocessor having millions of electronic components on a single chip.
In order to store instructions and information, fifth generation computers require a great amount
of storage capacity. Mega chips may enable the computer to approximate the memory capacity of
the human mind.

Artificial Intelligence (AI):

It refers to a series of related technologies that tries to simulate and reproduce human behavior,
including thinking, speaking and reasoning. AI comprises a group of related technologies: expert
systems (ES), natural language processing (NLP), speech recognition, vision recognition, and
robotics.

5. Why it is often difficult to cost justify information? If information cannot be


cost justified, what should be the primary criteria in assessing the utility of
providing it?
There are two basic categories of cost justification for information: those cases where the
benefits can be calculated and those cases where they cannot. The benefits can be calculated
when the effect on profitability of altering a decision can be determined. In this case, if the cost
justified. For example, consider a department store chain that has a problem with lost or stolen
credit cards. These cards might illegally be used to run up large bills at several stores before a
stop-credit can be enforced. If the annual losses incurred by the company amount to $250,000
per year, an information system that can resolve the problem for a cost of $75,000 is quite
justifiable.

In most situations, the benefits of improved information systems are not measurable.
This makes it difficult to justify the cost of obtaining the information. An example of this
situation is the current move by financial institutions to implement electronic funds transfer
systems. Such systems minimize the need for checks, greatly expedite the flow of money
between businesses, and improve the timeliness of financial information, Though these systems
are very costly, little attempt has been made to cost justify them. There seems to be a general
consensus that faster is better new technology is good, and everyone (i.e., banks, stores, and
customers) benefits.

The task of assessing the benefits of additional information is particularly perplexing


since there is a tendency to seek or receive more information than is needed. Government
agencies are often criticized for generating voluminous reports that have questionable value for
decision making. Of course, since government agencies are nonprofit organizations, there is less
pressure to cost justify information in terms of its contribution to profit.

Information that cannot be explicitly cost justified must at least influence decisions
acquiring or processing this information is to warrant consideration. Given that information
requested does influence decisions, several factors that affect the cost of interval.

UNIT II

SECTION-B

1. Suggest input devices for the following purpose and explain how your
suggestion will be useful for the purpose?
(i)Recording attendance for employee is an organization system

Biometric attendance system

Biometric attendance system used to track each and every person coming to your place is
actually who he claims to be or not with its time and other details if uses fingers and face
preconisation system to verify person identify and record its time in and time act with all
required details.

Biometric technology

The biometrics technology used to measure and analyze personal characters both
physiological and behaviour these characteristics can uniquely identify a person updating
supplementing tradition security method manage issue and maintained of books in a library.

(ii)Managing issue and maintenance of books in a library.

Barcode recorder
The application of barcode technology in circulation system of a library
and information technologys most successful due to it speed accuracy and reliability.

(iii) Collecting data for Aadhar Unique Identification.

The Unique Identification Authority of India (UIDAI) was set up by the Govt. of India on
28 January 2009. The purpose of the UIDAI is to issue Unique Identification numbers to all
residents in the country. The Authority set up a Biometrics Standards Committee in order to
frame biometrics standards for use by the UIDAI and its partners. The first deliverable of the
Committee was to frame biometric standards based on existing national and international
standards, with the consensus of various government stakeholders. The second deliverable was to
recommend appropriate biometrics parameters to achieve the UIDAIs mandate.

2. Do all pointing devices have the same level of effectiveness in all


circumstances? If it is "yes ", justify your argument, if no", analyze cases
where of the pointing devices could be useful?
No because all the pointing devices doesn't have the same level of effectiveness in
all circumstances.

Track ball

It is like upside down is mouse used similarly the main advantages of a track ball is
that is request less space than mouse and the apple power book user the track ball mostly.

Joystick

It is pointing device which is often used for playing games the joystick has a can
shift level that is used to mouse the pointer on the screen is manufacturing industry the joystick
of used to control the code

Touch sensitive screen

Touch screen enable user to select on option by pressing as specific industries the
joystick of the screen

Light pen

It is similar aspect that can move the pointer and select object on the display screen by
directly pointing to object with a pen.

3. Suggest output devices for the following purpose and justify your choice
(i) For a conference of the academic nature whose an expect resources person gives
input on a concept using presentation

LCD projectors

The two contenders liquid crystal display (led) Projectors and digital processing projectors LCD
projectors often people will favour one of the two technology because they are familiar with it
and have used it

(ii)For cash counter in a bank

Cash is the most voltile and liquid current asset of the balance sheet and as such it
demands special attention of efficient management. Printer is the most commonly used output
device. It is used to prepare permanent documents in human readable form [hard copy]. The
are several types of printers that are designed for different types of applications.

4. Analyze one of the upcoming peripherals in the input devices.

A computer peripheral is a device that is connected to a computer but is not part of the
core computer architecture. The core elements of a computer are the central processing unit,
power supply, motherboard and the computer case that contains those three components.
Technically speaking, everything else is considered a peripheral device. However, this is a
somewhat narrow view, since various other elements are required for a computer to actually
function, such as a hard drive and random-access memory (or RAM).

5. Show the differences between the concurrent, time sharing and multiprocessing operating
systems.

Multiprocessing

A computer using more than one CPU at a time. Multiprocessing sometimes refers to
executing multiple processes (programs) at the same time. This might be misleading because we
have already introduced the term multiprogramming to describe that before.
In fact, multiprocessing refers to the hardware (i.e., the CPU units) rather than the software (i.e.,
running processes). If the underlying hardware provides more than one processor then that is
multiprocessing.
Time-sharing
Time sharing is a technique which enables many people, located at various terminals, to
use a particular computer system at the same time. Time-sharing or multitasking is a logical
extension of multiprogramming. Processor's time which is shared among multiple users
simultaneously is termed as time-sharing. The main difference between Multiprogrammed Batch
Systems and Time-Sharing Systems is that in case of multiprogrammed batch systems, objective
is to maximize processor use, whereas in Time-Sharing Systems objective is to minimize
response time.

Concurrent

A concurrent operating system allows a single CPU to execute what appears to be more
than one program at same time when, in fact, only one program is being executed. The CPU
switches its attention between programs as it receives requests for processing, executing
statements from one program and then from another. This processing happens so fast that it
appears that the programs are being executed simultaneously.

SECTION -C

1. Analyze the operating system MS DOS Microsoft window and apple iOS
based on the category of users that each of these
MS DOS

MS DOS known as Microsoft disk operating system .Microsoft operating system is a non
graphical command line operating system defined from 86-dos that was created for the IDM
compatible computer today MS DOS is the no longer used however the command shall more
commonly known as the windows command like is still used by menu user for example if you
countered to sell all the tells in a folders in a window explorer.

Microsoft windows

Microsoft windows are a graphical operating system category of marketing is the risk
developed of window has registered several trade markets of windows.

Apple iOS
Most information in online is very technical apple iOS is current the main software that
runs on the all models of the phones iPod touch iPod and mobile phones how all the apple new
watch left you cannot to your network with at home so you can online with your devices

2. Cloud storage technology has stormed the IT industry with the idea of
outsourcing storage space for large set of data and how it is slowly entering
the personal storage demand as well. Do you agree this is superior to all prior
existing storage devices? Scrutinize each of the previous technologies in
comparison to the cloud storage technology.

Could storage is model of data in which the digital data is stored in logical the physical
storage spends multiple servers and the physical environment is typically owned and
management by a hosting company could computing is model for enabling continent on
demand network access to or shared poll of configurable computing source cost reduction
demand provide by a public could delivery model convents capital expenditure to operations
expenditure network client such as desktop computer laptops tablets and smart phone sand any
there are not enable device such as home automatic budgets private could is instances operated
society for a single organization whether for a managed internally by a third party and nested
either internally or externally.

3. Consider that you are working in an Educational institution. Identify


practical areas of application for each of the types of application software
while also explaining the same.

Application software program is designed to perform a group of co ordinate function


taker or activities for the benefit of the user the contracts with systems which is mainly involved
with tuning the computer examples of an application include a word processor a spreadsheet act
accounting application can be also be seen as being either horizontal or vertical horizontal
application move population and wide spread because they are general purpose for example
word processor or database vertical application are itch product designed for a particular type of
industry or business department with an organization
There are many types of application

Enterprise software

Enterprise infrastructure

Information worker

Educational

Constant access simulation

Simulation media development

Product engineering

Entertainment software

The collection known application software refer to all application


collectively this contrast with system software which is mainly involves with running the
computer.

4. Narrate the evolution of the storage devices over time.


Storage devices hold data, even when the computer is turned off. The physical material
that actually holds data is called storage medium. The surface of a floppy disk is a storage
medium. The hardware that writes data to or reads data from a storage medium is called a storage
device. A floppy disk drive is a storage device. The two primary storage technologies are
magnetic and optical.

The primary types of magnetic storage are:


Hard disks
High-capacity floppy disks
Disk cartridges
Magnetic tape
The primary types of optical storage are:
Compact Disk Read-Only Memory (CD-ROM)
Digital Video Disk Read-Only Memory (DVD-ROM)
CD-Recordable (CD-R)
CD-Rewritable (CD-RW)
A magnetic disk's medium contains iron particles, which can be polarizedgiven a
magnetic chargein one of two directions. Each particle's direction represents a 1 (on) or 0 (off),
representing each bit of data that the CPU can recognize. A disk drive uses read/write heads
containing electromagnets to create magnetic charges on the medium. Diskette drives, also
known as floppy disk drives, read and write to diskettes (called floppy disks or
floppies).Diskettes are used to transfer files between computers, as a means for distributing
software, and as a backup medium. Diskettes come in two sizes: 5.25-inch and 3.5-inch. Hard
disks use multiple platters, stacked on a spindle. Each platter has two read/write heads, one for
each side. Hard disks use higher-quality media and a faster rotational speed than diskettes.
Removable hard disks combine high capacity with the convenience of diskettes.
Optical disk is high-capacity storage medium. An optical drive uses reflected light to read data.
To store data, the disk's metal surface is covered with tiny dents (pits) and flat spots (lands),
which cause light to be reflected differently. When an optical drive shines light into a pit, the
light cannot be reflected back. This represents a bit value of 0 (off). A land reflects light back to
its source, representing a bit value of 1 (on).
Hard disk is still the most common storage device for all computers. Like diskettes hard
drives store data in tracks divided into sectors. Physically however they look quite different to
diskettes includes one or more metal platters mounted on a central spindle, like a stack of rigid
diskettes. Each platter is covered with a metal coating and the entire unit is contained in a sealed
chamber. The hard disk and drive are a single unit which includes the hard disk, the motor that
spins the platters and a set of read/write heads. Because you cannot remove the disk from the
drive the terms hard disk and hard drive are used interchangeably. Hard drives have become the
primary storage devices for PCs because they are convenient and cost effective. They outperform
diskettes in both speed and capacity. Hard disks offer capacities from several hundred MB and
more. Most entry level PCs now come with hard disks of at least 6.8MB.In 1980s most PCs
used 5.25-inch diskettes. Now almost completely replaced by the 3.5-inch.The size refers to
the diameter of the disk and is not an indication of capacity. The 5.25 type is encased in a flexible
vinyl envelope with an oval cutout that allows read/write heads access to the disk. The 3.5 type is
encased in a hard plastic shell with a sliding shutter. On insertion into the drive the shutter slides
back to expose the surface to the read/write heads. Hard disk spin between 3600 rpm and 7200
rpm compared to a diskette 300 rpm. The speed at which the disk spins is a major factor in
overall performance. The rigidity of the disk and the high-speed rotation allows more data to be
recorded on the surface. In the computer world, the medium is called compact disk read only
memory (CD-ROM).This uses the same technology used to produce music CDs.
The CD-ROM drive for music or data reads 0s and 1s from a spinning disk by
focusing a laser on the disks surface. Some areas of the disk reflect the laser light into
a sensor, other areas scatter the light. A spot that reflects the laser beam is interpreted
as a 1 and the absence of a reflection is interpreted as a 0.
Data is laid out on a CD-ROM disk in a long, continuous spiral that starts at the outer
edge and winds inwards towards the centre. Data is stored in the form of lands,
which are flat areas on the metals surface, and pits, which are depressions or hollows.
A land reflects the laser light into the sensor (a data bit of 1) and a pit scatters the light
(a data bit of 0).

5."Non- impact printers are superior to impact printers"- Critically evaluate


the statement with an inclusion discussion of all the types of printers.
"A printer is an external output device that takes data from a computer and generates
output in the form of graphics / text on a paper".
There are two types of printers.
Impact printers

An impact printer makes contact with the paper. It usually forms the print image by pressing an
inked ribbon against the paper using a hammer or pins. Following are some examples of impact
printers.

Dot-Matrix Printers

The dot-matrix printer uses print heads containing from 9 to 24 pins. These pins produce patterns
of dots on the paper to form the individual characters. The 24 pin dot-matrix printer produces
more dots that a 9 pin dot-matrix printer, which results in much better quality and clearer
characters. The general rule is: the more pins, the clearer the letters on the paper. The pins strike
the ribbon individually as the print mechanism moves across the entire print line in both
directions, i-e, from left to right, then right to left, and so on. The user can produce a color output
with a dot-matrix printer (the user will change the black ribbon with a ribbon that has color
stripes). Dot-matrix printers are inexpensive and typically print at speeds of 100-600 characters
per second.

Daisy-wheel printers

In order to get the quality of type found on typewriters, a daisy-wheel impact printer can be used.
It is called daisy-wheel printer because the print mechanism looks like a daisy; at the end of each
Petal is a fully formed character which produces solid-line print. A hammer strikes a petal
containing a character against the ribbon, and the character prints on the paper. Its speed is slow
typically 25-55 characters per second.

Line printers

In business where enormous amount of material are printed, the character-at-a-time printers are
too slow; therefore, these users need line-at-a-time printers. Line printers, or line-at-a-time
printers, use special mechanism that can print a whole line at once; they can typically print the
range of 1,200 to 6,000 lines per minute. Drum, chain, and band printers are line-at-a-time
printers.

Drum printer

A drum printer consists of a solid, cylindrical drum that has raised characters in bands on its
surface. The number of print positions across the drum equals the number available on the page.
This number typically ranges from 80-132 print positions. The drum rotates at a rapid speed. For
each possible print position there is a print hammer located behind the paper. These hammers
strike the paper, along the ink ribbon, against the proper character on the drum as it passes. One
revolution of the drum is required to print each line. This means that all characters on the line are
not printed at exactly the same time, but the time required to print the entire line is fast enough to
call them line printers. Typical speeds of drum printers are in the range of 300 to 2000 lines per
minute.

Chain printers
A chain printer uses a chain of print characters wrapped around two pulleys. Like the drum
printer, there is one hammer for each print position. Circuitry inside the printer detects when the
correct character appears at the desired print location on the page. The hammer then strikes the
page, pressing the paper against a ribbon and the character located at the desired print position.
An impression of the character is left on the page. The chain keeps rotating until all the required
print positions on the line have filled. Then the page moves up to print the next line. Speeds of
chain printers range from 400 to 2500 characters per minute.

Non-impact printers

Non-impact printers do not use a striking device to produce characters on the paper; and because
these printers do not hammer against the paper they are much quieter. Following are some non-
impacted printers.

Ink-jet printers

Ink-jet printers work in the same fashion as dot-matrix printers in the form images or characters
with little dots. However, the dots are formed by tiny droplets of ink. Ink-jet printers form
characters on paper by spraying ink from tiny nozzles through an electrical field that arranges the
charged ink particles into characters at the rate of approximately 250 characters per second. The
ink is absorbed into the paper and dries instantly. Various colors of ink can also be used.

One or more nozzles in the print head emit a steady stream of ink drops. Droplets of ink are
electrically charged after leaving the nozzle. The droplets are then guided to the paper by
electrically charged deflecting plates [one plate has positive charge (upper plate) and the other
has negative charge (lover plate)]. A nozzle for black ink may be all thats needed to print text,
but full-color printing is also possible with the addition of needed to print text, but full-color
printing is also possible with the addition three extra nozzles for the cyan, magenta, and yellow
primary colors. If a droplet isnt needed for the character or image being formed, it is recycled
back to its input nozzle.

Several manufacturers produce color ink-jet printer. Some of these printers come with all their
color inks in a cartridge; if you want to replace on color, you must replace all the colors. Other
color ink-jet printers allow you to replace ink individually. These printers are a better choice if
user uses one color more than other colors. These printers produce less noise and print in better
quality with greater speed.

Laser printers

A laser printer works like a photocopy machine. Laser printers produce images on paper
by directing a laser beam at a mirror which bounces the beam onto a drum. The drum has a
special coating on it to which toner (an ink powder) sticks. Using patterns of small dots, a laser
beam conveys information from the computer to a positively charged drum to become
neutralized. From all those areas of drum which become neutralized, the toner detaches. As the
paper rolls by the drum, the toner is transferred to the paper printing the letters or other graphics
on the paper. A hot roller bonds the toner to the paper.

Laser printers use buffers that store an entire page at a time. When a whole page is loaded, it will
be printed. The speed of laser printers is high and they print quietly without producing much
noise. Many home-use laser printers can print eight pages per minute, but faster and print
approximately 21,000 lines per minute, or 437 pages per minute if each page contains 48 lines.
When high speed laser printers were introduced they were expensive. Developments in the last
few years have provided relatively low-cost laser printers for use in small businesses.

Advantages of Laser Printer

The main advantage of Laser printer is its speed & efficiency at which it prints high-
quality quality graphics & text.

Laser printers produce high-quality output as compared to other printers.

Laser printer is quite and does not produce disturbing sounds.

They are also capable to produce color prints.

Disadvantages of Laser Printer

The main disadvantage of Laser printer is its cost, they are relatively costly as compared
to other printers.

The maintenance, repair & servicing charges are also high of these printers.

Laser printers emit small amount of ozone and are hazardous to health and the
atmosphere.
UNIT III

SECTION-B

1. Assume you are the network adminstrar of a company that function in two
floors of a building suggest a type of network justify your suggestion

If I am the network of the company i would like to suggest LAN covers only the building.

LAN

Local area network that thinks a number of independent electronic devices located with a in a
morale size geographic usually with a radius of 1 to 10 miles primarily connect devices within
things and offices to share data information etc.

Internal LAN connection- wired or wireless

External LAN connection connecting to the two or more LAN

LAN connects through 3 ways:

Ethernet (10mpbs)

Token ring(4mpbs)

Apple talk (236mbps)

Ethernet network is a standard way of connecting equipment using coaxial cables. A typical
Ethernet network has a maximum speed of 10 Mbps.The new fast Ethernet network will
operate at 100 Mbps or more.

A Token ring network is another standard way of connecting computer equipment using
twisted pair cable. it had a maximum capacity of 4 Mbps and new one have a maximum
speed of 16 Mbps.

AppleTalk is a networking system that is all Macintosh computers.it can be used on twisted
pair cable, coaxial or fiber optic cable but it is mostly used on twisted pair. It has a top speed
of 230 Kbps.
2. Imagine a team of employees performing a set of tasks that to be executed
one person after another which type of network topology would you suggest

Topology is the geometric configuration of devices on a network .The suggestion for this
situation is Bus topology. It is a connection of all condition on a network through a single request
which is called central channel or communication by signal that are transmitted over the channel
are called massages is transmitted to all the competitor on the networks although only the
forgetted device has an address the primarily advantages of bus topology is that it is easy to add
device to the network or remove them without effectively network performance another
advantages of that if one of the devices on the network fail the network is one not affected since
the bus topology does not reason a central host computer the disadvantages however is that the
performance of the network decrease as the number of messages increase since each node has to
check every messages whether or not the message is addressed to it .

3. For a group of workers who perform jobs in same database which are to be
constantly monitor by the project leaders prescribe the ideal type of network
topology with justification

One of the oldest network topologies central host computer receivers messages and
forwards them to various computers on the network for one node to communicate with another
mode on the network

Star topology

Star topology is useful in environment in which some tasks are centralized and others are
decentralized so many business applications work well with star topology an advantages of
topology is that it can be ready expanded by adding nodes to the lost computer. For one node to
communicate with another node.

Conclusion

Also if the distance between the nodes and the central computer is very large the cost of
sending a message over the network increases significantly.
4. List three facts that must be known in order to communicate with a large
computer system.

A channel is the part of the data communication system that constitutes the link between
message source and message destination. The channels are identified according to transmission
rate, transmission mode, and transmission direction.

Transmission rate is the capacity of a telecommunication channel, it depends on the bandwidth,


which is the difference between the highest and lowest frequency carried over the channel.

Transmission mode is the mode in which data are transmitted over the network. There are two
modes synchronous and asynchronous.

Transmission direction is the direction in which data is transmitted. It is categorized in three


ways:

Simplex,

Half duplex and

Full duplex.

5. Compare and contrast between the Wide area network and Local area
network.
Local area networks (LANs) allow computers and devices that are near each other and
usually making use of the same switch or router to connect to share files and complete tasks.
Consisting only of everyday devices (e.g., desktops, laptops, tablets, and printers), router and/or
switch, and Ethernet cables or wireless cards, LANs are relatively inexpensive to set up and are
commonly used in homes.

A wide area network (WAN) is used to connect computers that are not close to one another. It is
possible and almost always the case that LANs are connected to WANs. This enables small
home or office networks to connect to wider networks, such as those across state or country
lines. Most WANs connect through public networks, like the telephone system, or via leased
lines. The Internet, which connects computers all around the world, can be considered the largest
WAN in existence.

Difference between LAN and WAN

LAN

1. LAN (Local Area Network) is a computer network covering a small geographic area, like a
home, office, schools, or group of buildings.
2. LAN has high speed (up to 1000mbps)
3. The best example for a LAN is the network in an organization.
4. The LAN is build using the layer 2 devices like switches, bridges and layer1 devices like hubs.
5. LAN is owned, controlled, and managed by a single person or organization
6. LAN is easier to maintain at relatively low costs.
7. LAN experiences fewer data transmission errors

WAN

1. WAN (Wide Area Network) is a computer network that covers a broad area.
2. WAN has less speed (up to 150mbps).
3. The best example for a WAN is the Internet
4. The WAN is build using the layers 3 devices Routers and Multi-layer Switches.
5. WAN's are not owned by any one organization but rather exist under distributed ownership.
6. Maintaining WAN is difficult because of its wider geographical coverage and higher
maintenance costs.
7. WAN experiences more data transmission errors.
SECTION-C

1. Evaluate each of the type of networks based on two factors

Meaning of network:

An arrangement of inter seating Horizontal lines A group or system of inter


connected people or things connect as or operate with a network Interact with other to exchange
information and develop professional or social contracts

Type of networks
LAN

WAN

MAN

VAN

Local area network (LAN)

Local area network is a network that links in number of independent electronic


devices located within a size geographical area usually with reduce of one to hundred miles
Primary key connect devices with in building and officers to share data information etc.......

WAN (wide area network)

Wide area network is a network that covers wide geographically are same time even countries for
data and voice Communication WAN is owned by both organization and common or special
purpose carrier there are several way step wan.

MAN (metro Politian area network)

A link the electronic device over a metro Politian area man are used for bytes tan to
LAN location which helps high speed.

VAN (value added network)

Value added network public data networks that odd value to basic communication
services provided common currier by offering specialized services.

2. Evaluate the various provides of channel services based on which of them


would be best suited for domestic use?

Providers of channel services

To move the data and information from one location to another by telephone and tele-
communication Company are called data communication carriers.

I common carriers
II special purpose carriers

Common carriers

A common carrier is a company that furnished communication services to business and together
central public which is regulated by state government and federal agency

Special purpose carrier

The company that add features to the basic communication service provided by a common
carrier it can add a mentis such as e-mail video conference correction of transmission errors
solution services back up and network management

3. Draft a budget for buildings a simple data communication model based on


the components required

Data communication model

(i)The computer to receive process and send information which is called the host computer
which usually a main frame or large computer.

(ii) Devices to send and receive information.

(iii)Telecommunication channels that link geographically separated devices using media such as
telephone lines and cables.

(iv) Various types of computer hardware.

(v) Various types of computer software.

Budget for data communication model


4. Sender 40000
Channel and media 20000
Hardware 50000
Software 70000
Output device 25000
Total 385000

Throw light on the functions of Open System Interconnection layers.


One of the most widely used network architectures is the open systems
interconnection (OSI), developed by the international standards Organization (ISO). The OSI is
popular because it uses a seven-layered functional approach to achieve the primary goals of
network architecture: modularity, simplicity, flexibility, and openness. The various tasks
associated with network communication are distributed among the seven functional layers; each
layer is responsible for a set of tasks and is guided by a set of protocols.
The seven layers of the OSI model, starting with the topmost layer, are the application layer,
the presentation layer, the session layer, the transport layer, the network layer, the data link layer,
and the physical layer.

Application layer

An end to end protocol, in the sense that a direct link is established between the sending
device and the receiving device. Facilitates the use of network application programs, such as E-
mail. By adhering to a set of protocols (embedded in software), users can communicate with one
another, regardless of the terminal or the hardware platform on which the application resides.

Presentation layer

Ensures the smooth transmission of information. It receives the input from the sending
device, attaches a header to it, and sends information to the session layer, Any decryption
(opposite of encryption) is also done in this layer. This layer uses an end-to-end protocol.

Session layer

Primary responsibilities are to establish or terminate links between computers. If a file has
to be transferred between two computers, the session layer ensures smooth transmission. This
layer uses an end-to-end protocol.

Transport layer

Uses an end-to-end protocol. To ensure the smooth transfer of data over the entire
transmission path, from the sending device to the receiving device. It receives data from the
session layer, performs the necessary services, such as multiplexing, and passes the data to the
network layer.
Network layer

Receives the data from the transport layer and adds a header that identifies the data path.
The data, along with the path that they should take, become the data frame that is handed over to
the data link layer.

Data link

Receives the data from of frames from the network layer. Puts boundaries around the data
frames, sends them to the physical layer, and acknowledges receipt of data.

Physical layer

Composed of hardware to effect actual connection between hardware components.

5. Does internet provide the necessary tools to satisfy if multiple needs of users- Justify.

Information retrieval tools (ftp and gopher)

Communication tools (E-mail, telnet, Usenet)

Multimedia information tools ( World wide web)

Information search tools (WAIS, Archie, veronica)

Information retrieval tools

Ftp File transfer protocol (ftp), which was one of the first tools on the internet, allows
users to move files, such as text, graphics, sound, and so on, from one computer to another. It is a
command that activates a type of client-server relationship. Ftp works as follows. The user first
uses the software on his or her machine(or service provider), called the client, to gain access to
the remote machine, called the server. The users client program communicates with a program
on the remote computer or download (receive)certain requested files from it.

Another popular way to retrieve files is by using what is called an anonymous ftp server. In
this case, the user logs on to the server using the special user ID anonymous. If the server then
asks for a password, the user types in his or her user ID. Freeware and shareware-programs that
are available at no cost on the Net-can be obtained once the site is located, Sometimes it is
difficult to locate an ftp site or identify the files available on that site.
Gopher The second type of information retrieval tool available on the internet is Gopher, a
menu based interface that provides easy access to information residing on special servers,
command, its interface is much more user-friendly and it provides additional functions, can
move, retrieve, or display files from remote sites. the menu also allows users to move from one
gopher space (which refers to the interconnected gopher servers)can by easily expanded by
adding more servers.

Communication tools

Communication tools facilitate written communications, and in this section we discuss


three types of communication tools: E-mail, Telnet, and Usenet,

E-mail E-mail, which refers to sending messages or files electronically, was one of the first
internet tools.

Telnet Telnet is a command that connects the user to a remote machine which may be located
anywhere on the internet and the user can then type of commands to the remote machine, for
example to change directories in search of certain files. While the ftp only allows users to move
or transfer files, the services provided by the lost machine, which may include much more than
simple file transfer. For example, some servers are dedicated to the playing of board games,
such as chess or go.

Usenet

Usenet is a network that provides users with discussion groups, or forums. A user posts
an article to a chosen newsgroup on the Usenet, where each newsgroup is devoted to a particular
topic such as politics, the environment, gun control, surfing, and so on. The article is routed only
to those sites that have expressed an interest in receiving information on the topic.

Multimedia information tools

World Wide Web:

The World Wide Web (WWW) is one of the newest and most popular hypertext based internet
tool. It allows users to access and display documents and graphics stored on any server on the
internet. In 1989, Tim Berners-Lee, a computer scientist at the CERN particle physicists
exchange findings and information related to their research. It because popular only in late 1993,
when WWW software was delivered for desktops that used popular operating systems, such a
windows, allowing users easy and friendly access to the internet, Some WWW terms are given.

There are many interface to the WWW, such as Mosaic, a GUI-based hypertext browser,
and Netscape, that allows users to easily navigate the internet and access its many services.

Information search tools:

WAIS: Wide area information server accesses servers all over the world to locate requested
files. The WAIS database has an index of keywords that helps users locate files in topic areas of
interest to them.

Archie: Archie one of the first information search tools developed on the internet, periodically
searches anonymous ftp servers that participate in the Archie database and identies all files on
these servers.

Veronica: Veronica is a search tool designed specifically to locate all files on gopher sites and it
is listed under other gopher and information servers on the gopher menu. Users who have access
to a gopher server and veronica server can then access the database.

UNIT-IV

SECTION-B

1. Describe an application for which each of the following database system is


best suited:
a) Data Definition language

b) Data Manipulation language

c) Data Dictionary

a) Data definition language


The concept of the data definition language and its name was first introduced in relation
to the database model, where the schema of the database was written in language describing
the records, fields and sets of the user data model. The contents of a database are created using
the data definition language which defines the relationships between different data elements and
as an interface for application programs that use the data.
b) Data Manipulation language

Data is processed and updated using a language called the data Manipulation language
(DML), whose command process, update and retrieve data. It allows a user to query a database
and receive summary reports or customized reports.SL is a non procedural language that deals
exclusively with data: data integrity, data manipulation, data access, data retrieval, data query
and data security.

c) Data dictionary

A data dictionary is a collection of descriptions of the data objects or items in a data model
for the benefit of programmers and others who need to refer to them. A first step in analyzing a
system of objects with which users interact is to identify each object and its relationship to other
objects. This collection can be organized for reference into a book called a data dictionary.

2. Identify any two levels of database management System.


Levels of Abstraction of a Database

One of the most fundamental ways to think of a database system is in terms of its structure.

Three layers, or levels of abstraction, are identified: the physical database (or physical level), the
conceptual database (or conceptual level), and the users view. They are only the physical
database actually contains data. The other two levels are logical in nature and sometimes reduce
to just one level, when the users view coincides with part of the conceptual database.
This separation of physical and logical levels occurs frequently. For example, when a customer
calls in with an order to a departmental store clerk, the customer has a logical view of how the
stores stock is maintained. This view may be similar to or distinct from that of the clerk. Both
logical views are different from the way the stock is physically stored.

The internal level

The physical database, or internal level, pertains to the actual data and how it is stored on
physical devices. It consists of two major parts: (1) a set of programs that interact with the
operating systems to help manage the database; and (2) the records and files stored. In external
and main memory. Data types, sorting, searching, merging techniques and physical
characteristics of storage media pertain to the physical database.

The conceptual level

The conceptual database, or conceptual level, has a relationship to both the physical
database and the application environment. As exemplified earlier, it presents a logical model of
the physical database to the users. Structures, such as hash tables, B-trees, indexed sequential
files, and multi key organizations, pertain to the conceptual database.

The conceptual database makes use of a high-level language referred to as a data definition
language (DDL) which specifies how the physical database should look. The DDL consists of
notation and statements that describe the kinds of distinguishable items, called entities, in the
database and the kinds of relationship that exist among them. When the description is processed,
a stored data description, called a schema, is produced.

The DDL does not manipulate the database. A data manipulation language (DML) carries
out that function. Only the actual database designs, and any design modifications, are achieved
with the DDL. This separation of functions, design to implementation, is one of the
characteristics (and conveniences) of a DBMS. It enables changes to be made to the physical
database without altering programs or affecting a users communication with the database. The
separation is possible because the data and structures in a database are maintained apart from the
software required to manipulate them.
3. Furnish the ERD of your project for your degree completion Entity
Relationship Diagram
An entity relationship diagram (ERD) is a graphical tool that identifies and represents the
entities in an enterprise or system and the logical relationship among these entities. An ERD is
very useful to capture the data elements in a system. An entity is a person, place, thing, or idea
about which data is gathered. Entities in a university include teachers, students, administrators,
courses, and classrooms. In a restaurant, entities include waiters, mangers, customers, food
items, and the kitchen. An attribute is an item of data that describes an entity. Attributes for a job
include job code, wage class, job title, minimum salary, and maximum salary. Attributes for a
student include the students name, social security number, number of credits per semester, and
so on. The value assigned to each attribute is called the attribute value (e.g., the students name is
Mary Joe).

Since entities are linked to each other through relationships (a relationship is the way
entities interact with one another), a graphical tool that depicts the entities and their
interrelationships plays a very useful role in gaining a better understanding of the bit picture.
For example, an ERD can be used to show graphically how sales commission is related to salary,
taxes, and take home pay.

An ERD represents static data and is used for many modeling tasks, such as modeling an
enterprise, its entities, and the relationships among them. (This is also referred to as enterprise
modeling). The ERD also plays a very important role in the design and development of
information systems, since it gives a good overview of the elements in a system and their
interrelationships and is hence used extensively to design information systems and capture
different data elements.

There are two types of design: physical design and logical design. Physical design
addresses issues related to the physical location of data; logical design addresses the logical
relationship among various data items in the database and captures the essence of data
interactions. The logical design presents the data from a users perspective; the physical design
presents the data from the computers perspective. The user is not concerned about where the
data is located in memory, but is concerned about the role of data in decision making (logical
design). The computer, on the other hand, has no knowledge of how the data is used in decision
making; it knows only where that data is stored in the system (physical design).

The ERD is a useful tool in the logical design of a database, because it graphically portrays the
entities and their interrelationships.

4. Project how databases are superior to traditional files.


A database is generally used for storing related, structured data, with well defined data
formats, in an efficient manner for insert, update and/or retrieval (depending on application).On
the other hand, a file system is a more unstructured data store for storing arbitrary, probably
unrelated data. The file system is more general, and databases are built on top of the general data
storage services provided by file systems.

There are also differences in the expected level of service provided by file systems and
databases. While databases must be self consistent at any instant in time , provide isolated
transactions and durable writes, a file system provides much looser guarantees about consistency,
isolation and durability. The database uses sophisticated algorithms and protocols to implement
reliable storage on top of potentially unreliable file systems. It is these algorithms that make
database storage more expensive in terms of processing and storage costs that make general file
systems an attractive option for data that does not require the extra guarantees provided by a
database.

As technology moves forward, though, the lines are blurring, as some file systems pick
up features previously the domain of databases (transactions, advanced queries) and some
databases relax the traditional constraints of consistency, isolation and durability. ZFS and
BTRFS might be considered examples of the former, Mongo DB and Couch DB examples of the
latter.

5. Due to situations, databases are beneficial and where they are not?
A database is a collection of data that is saved and organized to allow easy retrieval when
needed. In order to maintain and access the database you will need a DBMS (database
management system). This kind of system manages and protects data so that the database is safe
and secure. Databases consist of tables that include groups of related data fields that are known
as records. Databases are not limited to only computers; in fact, a phone book is an example of a
database. All of the names alphabetized and each column has its own category. There is a column
for your name, phone number, and possibly a street address. With a relational database, all of the
data within the row can be pulled up when you are looking for the specific attribute. There are a
few advantages to using a database management system. On the plus side, it has the ability to
control redundancy, the integrity of the information being stored can be maintained, it can restrict
access, it can share data, and can backup/recover information. to learn some basic SQL
(Structured Query Language) commands which are the commands that allow you to "talk" to the
DBMS. This will allow you to add, delete, update and retrieve the information you need. Only
certain languages support database connectivity. Probably the most popular language in use on
the web these days is ASP. ASP allows you to create pages that are dynamic and easily
maintained.

SECTION C

1. Project a few practical applications of Executive Information system.

Applications
EIS helps executives find data according to user-defined criteria and promote
information-based insight and understanding. Unlike a traditional system presentation, EIS can
distinguish between vital and seldom-used data, and track different key critical activities for
executives, both which are helpful in evaluating if the company is meeting its corporate
objectives. After realizing its advantages, people have applied EIS in many areas, especially, in
manufacturing, marketing, and finance areas.

Manufacturing
Manufacturing is the transformation of raw materials into finished goods for sale, or
intermediate processes involving the production or finishing of semi-manufactures. It is a large
branch of industry and of secondary production. Manufacturing operational control focuses on
day-to-day operations, and the central idea of this process is effectiveness and efficiency.

Marketing
In an organization, marketing executives duty is managing available marketing resources
to create a more effective future. For this, they need make judgments and uncertainty of a project
and its impact on the company in short term and long term. To assist marketing executives in
making effective marketing decisions, an EIS can be applied. EIS provides sales forecasting,
which can allow the market executive to compare sales forecast with past sales. EIS also offers
an approach to product price, which is found in venture analysis. The market executive can
evaluate pricing as related to competition along with the relationship of product quality with
price charged. In summary, EIS software package enables marketing executives to manipulate
the data by looking for trends, performing audits of the sales data, and calculating totals,
averages, changes, variances, or ratios.

Financial
Financial analysis is one of the most important steps to companies today. Executives
needs to use financial ratios and cash flow analysis to estimate the trends and make capital
investment decisions. An EIS integrates planning or budgeting with control of performance
reporting, and it can be extremely helpful to finance executives. EIS focuses on financial
performance accountability, and recognizes the importance of cost standards and flexible
budgeting in developing the quality of information provided for all executive levels.

2. Represent a few practical applications of Expert system.

THE APPLICATIONS OF EXPERT SYSTEMS

The spectrum of applications of expert systems technology to industrial and commercial


problems is so wide as to defy easy characterization. The applications find their way into most
areas of knowledge work. They are as varied as helping salespersons sell modular factory-built
homes to helping NASA plan the maintenance of a space shuttle in preparation for its next flight.

Applications tend to cluster into seven major classes.

Diagnosis and Troubleshooting of Devices and Systems of All Kinds

This class comprises systems that deduce faults and suggest corrective actions for a
malfunctioning device or process. Medical diagnosis was one of the first knowledge areas to
which ES technology was applied (for example, see Shortliffe 1976), but diagnosis of engineered
systems quickly surpassed medical diagnosis. There are probably more diagnostic applications of
ES than any other type. The diagnostic problem can be stated in the abstract as: given the
evidence presenting itself, what is the underlying problem/reason/cause?
Planning and Scheduling

Systems that fall into this class analyze a set of one or more potentially complex and
interacting goals in order to determine a set of actions to achieve those goals, and/or provide a
detailed temporal ordering of those actions, taking into account personnel, materiel, and other
constraints. This class has great commercial potential, which has been recognized. Examples
involve airline scheduling of flights, personnel, and gates; manufacturing job-shop scheduling;
and manufacturing process planning.

Configuration of Manufactured Objects from Subassemblies

Configuration, whereby a solution to a problem is synthesized from a given set of


elements related by a set of constraints, is historically one of the most important of expert system
applications. Configuration applications were pioneered by computer companies as a means of
facilitating the manufacture of semi-custom minicomputers (McDermott 1981). The technique
has found its way into use in many different industries, for example, modular home building,
manufacturing, and other problems involving complex engineering design and manufacturing.

Financial Decision Making

The financial services industry has been a vigorous user of expert system techniques.
Advisory programs have been created to assist bankers in determining whether to make loans to
businesses and individuals. Insurance companies have used expert systems to assess the risk
presented by the customer and to determine a price for the insurance. A typical application in the
financial markets is in foreign exchange trading.

Knowledge Publishing

This is a relatively new, but also potentially explosive area. The primary function of the
expert system is to deliver knowledge that is relevant to the user's problem, in the context of the
user's problem. The two most widely distributed expert systems in the world are in this category.
The first is an advisor which counsels a user on appropriate grammatical usage in a text. The
second is a tax advisor that accompanies a tax preparation program and advises the user on tax
strategy, tactics, and individual tax policy.

Process Monitoring and Control

Systems falling in this class analyze real-time data from physical devices with the goal of
noticing anomalies, predicting trends, and controlling for both optimality and failure correction.
Examples of real-time systems that actively monitor processes can be found in the steel making
and oil refining industries.

Design and Manufacturing

These systems assist in the design of physical devices and processes, ranging from high-
level conceptual design of abstract entities all the way to factory floor configuration of
manufacturing processes.

3. Predict a few practical applications of DSS.


As mentioned above, there are theoretical possibilities of building such systems in any
knowledge domain.

One is the Clinical decision support system for medical diagnosis

There are four stages in the evolution of clinical decision support system (CDSS). The
primitive version is standalone which does not support integration. The second generation of
CDSS supports integration with other medical systems. The third generation is standard-based
while the fourth is service model-based.[

Other examples include a bank loan officer verifying the credit of a loan applicant or an
engineering firm that has bids on several projects and wants to know if they can be competitive
with their costs.

DSS is extensively used in business and management. Executive dash board and other
business performance software allow faster decision making, identification of negative trends,
and better allocation of business resources. Due to DSS all the information from any organization
is represented in the form of charts, graphs i.e. in a summarized way, which helps the
management to take strategic decision. For example, one of the DSS applications is the
management and development of complex anti-terrorism systems.

A growing area of DSS application, concepts, principles, and techniques is in agricultural


production, marketing for sustainable development. For example, the DSSAT4
package developed through financial support of USAID during the 80s and 90s has allowed rapid
assessment of several agricultural production systems around the world to facilitate decision-
making at the farm and policy levels. There are, however, many constraints to the successful
adoption on DSS in agriculture.

DSS are also prevalent in forest management where the long planning horizon and the
spatial dimension of planning problems demands specific requirements. All aspects of Forest
management, from log transportation, harvest scheduling to sustainability and ecosystem
protection have been addressed by modern DSSs. In this context the consideration of single or
multiple management objectives related to the provision of goods and services that traded or
non-traded and often subject to resource constraints and decision problems. The Community of
Practice of Forest Management Decision Support Systems provides a large repository on
knowledge about the construction and use of forest Decision Support Systems.

A specific example concerns the Canadian National Railway system, which tests its
equipment on a regular basis using a decision support system. A problem faced by any railroad is
worn-out or defective rails, which can result in hundreds of derailments per year. Under a DSS,
CN managed to decrease the incidence of derailments at the same time other companies were
experiencing an increase.

4. Characterize decision making information used in relational databases


better than the flat -files.

The differences between flat files and relational database.

Flat-Files Relational Database

Store data in one-dimensional files. Store data in two-dimensional tables.

Store, organize, and retrieve information from Store, organize, and retrieve information from
one file at a time. tables in which information is linked by a
common column or field.

Leave the management of data relationships Establish relationship between files with
field to the applications that access the data. foreign keys and view within the database
itself.

Require the programmer to write code for Have a database engine that handles different
data management functions functions.

Are typically created and maintained by Are typically created and maintained
application programs by database administrators.

Are often associated with older programs on Are popular on UNIX processors and
mainframe and midrange systems. Powerful servers within a client/server
Architectural framework.

5."DSS are limited in their support of decision making under condition of


uncertainty"- Express your opinion on this with judicious explanation.

Decision support system are increasingly providing capabilities which represent an


advanced dimension of computer based information system that are most useful and better
accepted by operating, middle and top management. A DSS goes beyond translations processing
and reporting. It actually assists management in making decisions.

There is a relationship among the degree of certainty in decision making with characteristics of
management levels. The open/adaptive processes that higher-level management must cope with
the increase the uncertainty associated with decision making.Conversly, the relatively
closed/stable processes that lower level management must cope with reduce the uncertainty
associated with decision making.

In decision making under certainty the objective is to determine which is the best solution to a
problem or the best opportunity. Since the decision variables and their relationships are known,
the best solution can usually be computed. In decision making under uncertainty the probabilities
of outcomes are not known. Therefore, the decision maker must assign arbitrary probabilities or
assume on probabilities.
UNIT V

SECTION B

REASONING QUESTIONS
1. Justify Transaction processing System being considered the data lifeline of
an organization by explaining how it support operational decision making.

A TPS is the data life-line for a company because it is the source of data for other
information systems, such as MIS and DSS (Decision Support Systems). Hence, if the TPS
shuts down, the consequences can be serious for the organization. A TPS is also the main link
between the organization and external entities, such as customers, suppliers, distributors, and
regulatory agencies.

As shown in transaction systems exist for the various functional areas in an organization,
such as finance, accounting, manufacturing, production, human resources, marketing quality
control, engineering, and research and development.

Let us look at an example of real-world TPS. Carenet, the TPS of travelers insurance
company, is an advanced system that records and processes insurance related transactions.
Filing and processing insurance claims is a highly information intensive process in which
every step generates new data or modifies existing data. Care net allows the company to
accurately capture this data and disseminate it at the right time to its 7 million clients. The
information generated by care net is useful both to employees of travelers insurance and to its
clients. A travelers employee can access the system and look at the latest transaction; an
authorized client can also access care net to study the status of his or her insurance claim.
This system therefore, spans organizational boundaries and provides information to both
internal external entities.
2. Introspect the possibility of an organization being able to better manage its
information resources with the help of IRM.

Companies that are successful users of information, information systems, and information
technologies follows well-established IRM policies and principles, and in particular, they share
the four principles described next. The IS department should be managed like any other unit or
division of the business.

Basic principles of management, such as planning organizing, staffing directing, and


controlling that are applied to the various disciplines in an organization, (e.g., finance,
production, marketing, and human resources) should also be applied to information systems and
management. The argument that the IS department and its technical personnel cannot be
managed using classic management principles is weak and disruptive and often leads to gross
inefficiencies and mismanaged growth. This is not to say that the IS department does not have
certain unique characteristics that separate it from other departments; only that these differences
should not be used as excuses for managing the IS department poorly.

3. Assuming you work in the front office of a domestic manufacturing


company. Build an office automation system for the office.

Office automation systems (OAS) are configurations of networked computer hardware


and software. A variety of office automation systems are now applied to business and
communication functions that used to be performed manually or in multiple locations of a
company, such as preparing written communications and strategic planning. In addition,
functions that once required coordinating the expertise of outside specialists in typesetting,
printing, or electronic recording can now be integrated into the everyday work of an
organization, saving both time and money. Types of functions integrated by office automation
systems include (1) electronic publishing; (2) electronic communication; (3) electronic
collaboration; (4) image processing; and (5) office management. At the heart of these systems is
often a local area network (LAN).The LAN allows users to transmit data, voice, mail, and
images across the network to any destination, whether that destination is in the local office on the
LAN, or in another country or continent, through a connecting network. An OAS makes office
work more efficient and increases productivity. The office systems, generally, facilitate the
following activities:

a) Producing outgoing documents (using text processors)

b) Storage and retrieval of documents (using document management systems)

c) Transmission of messages (using message communication systems)

d) Scheduling and meeting management (using video-conferencing systems).

4. Characterize a Transaction processing system in an organization.

A TPS records internal and external transaction for a company. it is a repository of data
that is frequently accessed by other system .

A TPS performs routine, repetitive task .it is mostly used by lower level managers to
make operational decisions.

Updated periodically; in online mode each transaction is recorded as it occurs.

There are six steps in processing a transaction. They are data entry, data validation, data
processing and revalidation, storage, output generation and query support.

5. Justify Teleconferencing as a tool of office automation system.

Teleconferencing is conducting a business meeting involving more than two persons


located at two or more different places. The teleconferencing helps in reducing the time and cost
of meeting as the participants do not have to travel to attend the meeting. Teleconferencing may
be audio or video conferencing with or without use of computer systems.

The computer based teleconferencing has the advantage of flexibility in terms of pre-recorded
presentations and integration with other information systems. With the advancements in multi-
media technologies, desk top teleconferencing systems are now available at affordable prices.

These systems are based on Personal Computers featuring a digital camera and run on visual
communication software. The communication links are still quite expensive making the desktop
video conferencing useful only for selected applications. The meetings best suited for tele /video
conferencing are those which are low in conflicts as they are not as effective as personal contact
meetings.

The effectiveness can, however, be improve by providing proper training to the users regarding
the systems and the gestures that are part of the body language. The most common applications
of computer based teleconferencing include management communications and training, budget
meetings, its potential to reduce the cost of group meetings. Savings come primarily from
reduced travel costs.

Some more advantages to teleconferencing are:

Attend a business meeting hundreds of miles away without leaving your office

Reduce travel expenses

Reduce travel time requirements

Schedule meetings minutes ahead of time instead of days or weeks

Keep in touch with other branches of your business

Technical consultations, project reviews, contract negotiations, etc

SECTION C

1. When you deposit your paycheck in a bank, a transaction takes place.


Describe the six steps in processing and show how they apply to your bank
deposit.

The six steps in processing a transaction are:

Data entry

Data validation

Processing and revalidation

Storage

Output generation
Query support

Data entry

Transaction data must be entered into the system. There are number of input devices for
entering the data including the keyboard and mouse. A document generated at the point of
transaction occurs are called source documents .The use of automated methods of data entry is
known as source data automation. Major types of hardware include transaction terminals, OCR,
MICR etc.

Data validation

Data validation is an essential step in transaction processsing.It ensures the accuracy and
reliability of data by comparing actual data with predetermined standards or known results.
There are two steps in validation: error detection and error correction. Error detection is
performed by one set of control mechanisms; error correction is performed by another. Error
detection procedures are checking the data for appropriate format, checking for aberrations and
checking for missing data, invalid data and inconsistent data. Error correction procedures are
designed to ensure all errors have been corrected and that no new errors have been introduced
during the process.

Data processing and revalidation

Once the accuracy and reliability of the data are validated, the data are ready for processing.
There are two ways of process transaction

Online
Batch processing

Online transaction processing:

Online transaction processing is almost instantaneous processing of data. Online means that the
data input device is directly linked to the TPS and therefore the data processed as soon as it is
entered into the system. Since there is little or no time lack between data creation and data
processing in an oline system the information is always current.

Batch processing
The second type of v processing is batch processing in which transaction are accumulated over
time and processed periodically. Batch processing may be done on daily, weekly or monthly
basis of any other time period appropriate to the given application.

Data storage

Once the data is processed through the processing method, the processed data should be
carefully and properly stored for future use. data storage is critical consideration for many
organization because the value and the usefulness of data diminish if data are not properly
stored. The kind of processing and type of storage mean are extending to related issues.

Output generation

Once data has been input and validated, processed, revalidated and storage, the output can be
communicated to the decision maker in two ways

Documents and reports

Forms; panels

Documents are a popular output method. they can be processed further, either to generate
additional information or to present the same information in a different format.

Query support

The last step in processing a transaction is querying a system. Querying facilities allow the users
to access the data and information that mean otherwise not be readily available. For example a
sales manager may query a system for the number of damaged items in a given store.

2. Predict the problems that could manifest in companies that do not have well
established IRM Policies and procedures.

Companies that are successful users of information, information systems, and information
technologies follow well-established IRM policies and principles, and in particular, they share
the four principles described next.
Principle 1: The IS department should be managed like any other unit or division of the
business.

Basic principles of management, such as planning organizing, staffing directing, and controlling
that are applied to the various disciplines in an organization, (e.g., finance, production,
marketing, and human resources) should also be applied to information systems and
management. The argument that the IS department and its technical personnel cannot be
managed using classic management principles is weak and disruptive and often leads to gross
inefficiencies and mismanaged growth. This is not to say that the IS department does not have
certain unique characteristics that separate it from other departments; only that these differences
should not be used as excuses for managing the IS department poorly.

Principle 2: The sole purpose of information systems is to help the organization meet its
goals and objectives.

A common complaint of CEOs and other top managers is that the CIO and the IS
personnel have a limited understanding of the business and the industry in which it operates. Top
management often complains that IS personnel are more interested in acquiring the latest
technology than in fully utilizing existing technologies.

Principle 3: IRM is the responsibility of all managers, regardless, of their discipline or


function.

IRM is the responsibility of all functional managers who are involved, directly or
indirectly, in the creation, collection, storage, use, manipulation, and dissemination of
information. Treating IRM as a function of the IS department reflects a narrow and limited and
information-related resources. In chapter 3, business information systems, we looked at the
effects of information systems on the various functional areas in an organization; many examples
showed the positive impact of information systems on profits, productivity, and people,
emphasizing the active participation of all employees.

Principle 4: The commitment of top management is the key to realizing the full potential of
information resources.
Throughout they have emphasized that the success of information systems and
information technologies in new ways to achieve the goals of the organization. A short-term
commitment to some technologies will not do; neither will technology investments for the sole
purpose of immediate gains help the organization. If top management is lukewarm in its
commitment to IRM as a buzzword that will eventually be forgotten. Good IRM policies will
shift technical responsibilities and decisions to the IS department, while providing top managers
with good technology management skills.

3. Analyze the Information system life cycle with its phases based on the type
of system for which it will be appropriate.

The concept of life cycle of a system is central to system investigation. These are they
preliminary study phase, the system analysis phase, the system design phase, the implementation
phase, and the systems maturity and maintenance phase, which includes a separate activity called
a "post audit". The life cycles of systems vary greatly in terms of length, but typically the life
cycle of an information system ranges from 3 to 8 years. The first four phases of this life cycle
may properly be termed the "systems investigation phases".

Large and medium-sized organizations usually have full time systems investigation specialists
including programmers and analysts. Typically, for all but minor systems investigations, a team
will be formed at the time the preliminary study phase begins.

The preliminary study phase: during the phase, a problem with an existing information system
or an opportunity to usefully develop a new system is discovered, and a limited amount of initial
investigation takes place to see whether a system a project is warranted.

The system analysis phase: during the analysis phase a problem or opportunity associated with
the system is identified the strengths and weaknesses of the old system are examined and what a
new system could accomplish is determined

The system design phase: during the design phase a new system or computer application is
designed to satisfy the needs that have been determined during the analysis phases
The implementation phase: this phase involves the programming, equipment,installation,othe
activities related to implementing a newly designed system

The systems maturity and maintenance phase: this phase involves the continuous operation of
the system after installation usually the systems achieve peak performance and then its cost
effectiveness.

4. Summarize the various tools could use in an office automation system.

Text processing
Text processing systems are the most commonly used components of the office
automation systems. This is so because a large proportion of office communication takes place in
writing using words of a natural language. The proportion of written communication is higher in
case of external communication.

Text processing systems automate the process of development of documents such as


letters, reports, memos, etc. They permit use of standard stored information to produce
personalized documents. Such automation reduces keying effort and minimizes the chances of
errors in the document. Generally, the text processors are able to get information directly from
the databases and spreadsheets and incorporate them into a document.

Desktop-Publishing
Professional-looking documents such as newsletters, advertisements, annual reports,
brochures, and business cards can be designed with most modern word-processing software.

Graphical images from clip-art collections, digital photographs, and scanned images, and
drawings created with graphics programs, can be integrated easily into word-processing
documents. Pages and paragraphs can be enclosed with decorative borders. Background images
and colors can be added to pages within a document. Graphical elements such as lines, boxes,
arrows, and artistic textual headings can be created quickly and easily within most word-
processing programs.

Electronic mail:
The difference between the normal mail,interpersonal communication of information
in the form of text and images as against the other forms of interpersonal communication such as
the telephone-e-mail is its non simultaneous communication wherein the presence of the receiver
is not essential at the time of transmission.

The mail has been used by business enterprises for long and is still one of the most
popular non-simultaneous communication medium. However, the electronic mail has
substantially changed the way messages are exchanged between individuals and business
enterprises.

The electronic mail, popularly called E-mail, is a computer based electronic mailing
system for electronic transmission of information, including messages, documents and images
between two or more individuals.

Voice mail is a variation of the E-mail. The voice mail transmits messages as digitized
voice. The recipient of the voice mail has to dial a voice mail service or access the electronic
mail box using the specified equipment and he can hear the spoken message in the voice of the
sender.

Teleconferencing

Teleconferencing is conducting a business meeting involving more than two persons


located at two or more different places. The teleconferencing helps in reducing the time and cost
of meeting as the participants do not have to travel to attend the meeting. Teleconferencing may
be audio or video conferencing with or without use of computer systems.

Image Processing
Image processing systems include electronic document management, presentation
graphics, and multimedia systems. Imaging systems convert text, drawings, and photographs into
digital form that can be stored in a computer system. This digital form can be manipulated,
stored, printed, or sent via a modem to another computer. Imaging systems may use scanners,
digital cameras, video capture cards, or advanced graphic computers.

5. Manage the Information resources is not an easy task-justify the


statement with examples.

Information resource management (IRM) refers to policies principles, and processes that
effectively manage all components of an organization that collect store process, retrieve, and
disseminate information.
The components include hardware, software, databases, tele communication different
type of information systems, such as TPS,MIS,ISS, and OAS, management structures, strategic,
information systems(SIS),IS personal and end users

IRM can be defined as the planning, budgeting, organizing, directing, training and control of
information system.

To effectively utilize information resources in order to achieve the overall goals and
mission of the organization.

To inventory, document and control all resources that create, process, store, and
disseminate information.

To create model of the enterprise from an information point of view in order to improve
communication both within and outside the orations.

To emphasize the reusability of information eliminate or reduce data redundancy and


ensure that all internal systems are developed within a common framework so that
systems developed on different platforms can communicate with each other.

Das könnte Ihnen auch gefallen