Beruflich Dokumente
Kultur Dokumente
UNIT 1
SECTION B
REASONING QUESTIONS
2. Identify and discuss the major factors that affect the cost of information.
Information that cannot be explicitly cost justified must at least influence decisions
acquiring or processing this information is to warrant consideration. Given that information
requested does influence decisions, several factors that affect the cost of interval. They are
discussed and illustrated below
Factors That Affect the Cost of Information
FACTOR Consideration
First generation computers were vacuum tube / thermionic valves-based machines. These
computers used vacuum tubes for circuitry and magnetic drums for memory. A magnetic drum is
a metal cylinder coated with magnetic iron-oxide material on which data and programs can be
stored. Input was based on punched cards and paper tape, and output was displayed on printouts.
In the sixties, there was lot of development in semiconductor field - a field of materials.
In vacuum tubes, a filament is heated to emit electrons,(the basic component of an atom)that
carry current. In 1946,Willam Shockley and a few of his colleagues invented transistors, which
do not need any heating to liberate electrons in addition to being smaller in size, they saved
power due to the absence of heating and hence the cooling needed. the smaller size resulted in
smaller distances that the electrons have to travel to transmit information from one part of the
computer to another. Hence calculations became faster. The reliability also increased. Today you
cannot see any second generation computers.
The smaller size of components saw mass production of computers which became
cheaper. Many companies started buying and using them increasing the demand. Computer
programming languages developed further to make programming easier and user friendly. yet if
you compare todays computers, they were a lot behind. The increased use of computers and the
consequent mass production sent the prices crashing down. Computer scientists and electronic
engineers were developing more sophisticated computers.
Characteristics of second generation computers:
Simple model
Environment
Entity Entity
Entity Entity
Expanded model
Inputs Outputs
Transformation
process
known, defined,
and Predictable
Known, Defined, Known, Defined
predictable Predictable
Inputs Outputs
SECTION C
REASONING QUESTIONS
1. Categorize the following functions as pertaining to transaction processing,
information- providing, programmed decision making or decision support.
a) Credit is automatically rejected because a customer has a balance past due.
Information providing systems provide information necessary for decision making. This
information is generally gleaned from transaction summary in the form of summary and
exception reports. Summary reports are tabulations of detail in categories such as sales by store,
by department and by inventory item. Exception reports isolate detail or summary information
that significantly deviates from normal. For example, an exception report may indicate large
credit transactions, inventory item that are out of stock, or departmental payrolls that are
exceeding the budget. Both summary and exception reporting is powerful dimension of
information systems, they highlight and isolate important detail information. This saves decision
makers considerable time.
A closed / stable / mechanistic system does not necessarily have to interact with its environment
to continue to exist. However, in the long run, it will have to interact to continue its normal
operation.
An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern. The interactions of these entities
are probabilistic and changing in nature and are consequently less predictable than those in a
closed / stable /mechanistic system. The operation of an open / adaptive / mechanistic system. An
excellent example of an open / adaptive / organic system is a business organization.
An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.
An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.
An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.
An open / adaptive / organic system continually interacts with its environment for
replenishment of material, energy, and information. Therefore, in open / adaptive /organic
systems, entities internal and external to the system are concern.
3. Analyze the major misconceptions about information systems and the role
they play in organizations.
Because information systems are able to process transitions. Provide information for
decision making, support decision making, and even make decisions, people in organizations
have developed(often unrealistically)high expectations. Unfortunately, there is a gap between
what organizations expect of information systems and the performance of the systems.
This expectation gap results from six basic misconceptions about information systems
and role they play in organizations. These misconceptions are identified and explained.
Misconception Explanation
More information means better decisions Though most managers lack a good deal
of the information they should have, many
information systems provide them with an
overabundance receive voluminous reports
that are unused because the reports are not
relevant to decision-making processes.
Managers need the information they want For manager to know what information they
need, they must be aware of each decision
they should and do make. They also must
define the process and variables required
to make each decision. This situation is
seldom the case. Consequently, managers
tend to play it safe and ask for more
information than they really need.
Give managers the information they need, Managers may not be aware of the best way
and their decision making will improve. to use information to make the best decision.
For example, several managers given the
same information make different decisions,
and some of the decisions are better than
others. Since all managers had the same
information, the better decisions makers
performance, not of the information.
Managers always welcome and encourage Often, improved information reveals that an
improved information for decision making. Operation is poorly managed
(e.g., incompetence, missed opportunities
over-ups).Improved information about
threatening and, therefore, resisted by
managers.
First generation computers were vacuum tube / thermionic valves-based machines. These
computers used vacuum tubes for circuitry and magnetic drums for memory. A magnetic drum is
a metal cylinder coated with magnetic iron-oxide material on which data and programs can be
stored. Input was based on punched cards and paper tape, and output was displayed on printouts.
First generation computers relied on binary-coded language (language of 0s and 1s) to perform
operations and were able to solve only one problem at a time. Each machine was fed with
different binary codes and hence were difficult to program. This resulted in lack of versatility and
speed. In addition, to run on different types of computers, instructions must be rewritten or
recompiled
In the sixties, there was lot of development in semiconductor field - a field of materials.
In vacuum tubes, a filament is heated to emit electrons,(the basic component of an atom)that
carry current. In 1946,Willam Shockley and a few of his colleagues invented transistors, which
do not need any heating to liberate electrons in addition to being smaller in size, they saved
power due to the absence of heating and hence the cooling needed. the smaller size resulted in
smaller distances that the electrons have to travel to transmit information from one part of the
computer to another. Hence calculations became faster. The reliability also increased. Today you
cannot see any second generation computers.
The smaller size of components saw mass production of computers which became
cheaper. Many companies started buying and using them increasing the demand. Computer
programming languages developed further to make programming easier and user friendly. yet if
you compare todays computers, they were a lot behind. The increased use of computers and the
consequent mass production sent the prices crashing down. Computer scientists and electronic
engineers were developing more sophisticated computers.
In second generation computers, one could recognize the circuit components such as
transistors, resistors and capacitors distinctly. There were physically separate or discreet.
Slowly scientists started integrating these components together so that they are not separate.
They were fused into the circuits. People called it large scale integrated circuits (LSI).
Computers using such components were called third generation computers. Since components
were packed together more densely, the size of computers became smaller. Programmers also
developed more sophisticated software. By 1970, engineers developed a device called
microprocessor. Lot of circuits was packed into it. Intel 4004 was one such chip.
Computers using such VLSI chips progressively shrunk in size. Computers using the
microprocessors are termed as microcomputers. The software technology also developed further.
Programmers developed more sophisticated and user friendly software. In course of time, the
cost of these computers have come down so much that even individuals bought them so they
came to be known as personal computers.
Up to fourth generation, the classification was based purely on hardware. Fifth generation
computers are classified based on software also. VLSI technology is used in fifth generation
computers. They have large main memories. The speed is also high. In addition to all this, Fifth
generation computers run software called expert systems.
Fifth generation computers will use super large Scale integrated (SLSI) chips, which will result
in the production of microprocessor having millions of electronic components on a single chip.
In order to store instructions and information, fifth generation computers require a great amount
of storage capacity. Mega chips may enable the computer to approximate the memory capacity of
the human mind.
It refers to a series of related technologies that tries to simulate and reproduce human behavior,
including thinking, speaking and reasoning. AI comprises a group of related technologies: expert
systems (ES), natural language processing (NLP), speech recognition, vision recognition, and
robotics.
In most situations, the benefits of improved information systems are not measurable.
This makes it difficult to justify the cost of obtaining the information. An example of this
situation is the current move by financial institutions to implement electronic funds transfer
systems. Such systems minimize the need for checks, greatly expedite the flow of money
between businesses, and improve the timeliness of financial information, Though these systems
are very costly, little attempt has been made to cost justify them. There seems to be a general
consensus that faster is better new technology is good, and everyone (i.e., banks, stores, and
customers) benefits.
Information that cannot be explicitly cost justified must at least influence decisions
acquiring or processing this information is to warrant consideration. Given that information
requested does influence decisions, several factors that affect the cost of interval.
UNIT II
SECTION-B
1. Suggest input devices for the following purpose and explain how your
suggestion will be useful for the purpose?
(i)Recording attendance for employee is an organization system
Biometric attendance system used to track each and every person coming to your place is
actually who he claims to be or not with its time and other details if uses fingers and face
preconisation system to verify person identify and record its time in and time act with all
required details.
Biometric technology
The biometrics technology used to measure and analyze personal characters both
physiological and behaviour these characteristics can uniquely identify a person updating
supplementing tradition security method manage issue and maintained of books in a library.
Barcode recorder
The application of barcode technology in circulation system of a library
and information technologys most successful due to it speed accuracy and reliability.
The Unique Identification Authority of India (UIDAI) was set up by the Govt. of India on
28 January 2009. The purpose of the UIDAI is to issue Unique Identification numbers to all
residents in the country. The Authority set up a Biometrics Standards Committee in order to
frame biometrics standards for use by the UIDAI and its partners. The first deliverable of the
Committee was to frame biometric standards based on existing national and international
standards, with the consensus of various government stakeholders. The second deliverable was to
recommend appropriate biometrics parameters to achieve the UIDAIs mandate.
Track ball
It is like upside down is mouse used similarly the main advantages of a track ball is
that is request less space than mouse and the apple power book user the track ball mostly.
Joystick
It is pointing device which is often used for playing games the joystick has a can
shift level that is used to mouse the pointer on the screen is manufacturing industry the joystick
of used to control the code
Touch screen enable user to select on option by pressing as specific industries the
joystick of the screen
Light pen
It is similar aspect that can move the pointer and select object on the display screen by
directly pointing to object with a pen.
3. Suggest output devices for the following purpose and justify your choice
(i) For a conference of the academic nature whose an expect resources person gives
input on a concept using presentation
LCD projectors
The two contenders liquid crystal display (led) Projectors and digital processing projectors LCD
projectors often people will favour one of the two technology because they are familiar with it
and have used it
Cash is the most voltile and liquid current asset of the balance sheet and as such it
demands special attention of efficient management. Printer is the most commonly used output
device. It is used to prepare permanent documents in human readable form [hard copy]. The
are several types of printers that are designed for different types of applications.
A computer peripheral is a device that is connected to a computer but is not part of the
core computer architecture. The core elements of a computer are the central processing unit,
power supply, motherboard and the computer case that contains those three components.
Technically speaking, everything else is considered a peripheral device. However, this is a
somewhat narrow view, since various other elements are required for a computer to actually
function, such as a hard drive and random-access memory (or RAM).
5. Show the differences between the concurrent, time sharing and multiprocessing operating
systems.
Multiprocessing
A computer using more than one CPU at a time. Multiprocessing sometimes refers to
executing multiple processes (programs) at the same time. This might be misleading because we
have already introduced the term multiprogramming to describe that before.
In fact, multiprocessing refers to the hardware (i.e., the CPU units) rather than the software (i.e.,
running processes). If the underlying hardware provides more than one processor then that is
multiprocessing.
Time-sharing
Time sharing is a technique which enables many people, located at various terminals, to
use a particular computer system at the same time. Time-sharing or multitasking is a logical
extension of multiprogramming. Processor's time which is shared among multiple users
simultaneously is termed as time-sharing. The main difference between Multiprogrammed Batch
Systems and Time-Sharing Systems is that in case of multiprogrammed batch systems, objective
is to maximize processor use, whereas in Time-Sharing Systems objective is to minimize
response time.
Concurrent
A concurrent operating system allows a single CPU to execute what appears to be more
than one program at same time when, in fact, only one program is being executed. The CPU
switches its attention between programs as it receives requests for processing, executing
statements from one program and then from another. This processing happens so fast that it
appears that the programs are being executed simultaneously.
SECTION -C
1. Analyze the operating system MS DOS Microsoft window and apple iOS
based on the category of users that each of these
MS DOS
MS DOS known as Microsoft disk operating system .Microsoft operating system is a non
graphical command line operating system defined from 86-dos that was created for the IDM
compatible computer today MS DOS is the no longer used however the command shall more
commonly known as the windows command like is still used by menu user for example if you
countered to sell all the tells in a folders in a window explorer.
Microsoft windows
Microsoft windows are a graphical operating system category of marketing is the risk
developed of window has registered several trade markets of windows.
Apple iOS
Most information in online is very technical apple iOS is current the main software that
runs on the all models of the phones iPod touch iPod and mobile phones how all the apple new
watch left you cannot to your network with at home so you can online with your devices
2. Cloud storage technology has stormed the IT industry with the idea of
outsourcing storage space for large set of data and how it is slowly entering
the personal storage demand as well. Do you agree this is superior to all prior
existing storage devices? Scrutinize each of the previous technologies in
comparison to the cloud storage technology.
Could storage is model of data in which the digital data is stored in logical the physical
storage spends multiple servers and the physical environment is typically owned and
management by a hosting company could computing is model for enabling continent on
demand network access to or shared poll of configurable computing source cost reduction
demand provide by a public could delivery model convents capital expenditure to operations
expenditure network client such as desktop computer laptops tablets and smart phone sand any
there are not enable device such as home automatic budgets private could is instances operated
society for a single organization whether for a managed internally by a third party and nested
either internally or externally.
Enterprise software
Enterprise infrastructure
Information worker
Educational
Product engineering
Entertainment software
An impact printer makes contact with the paper. It usually forms the print image by pressing an
inked ribbon against the paper using a hammer or pins. Following are some examples of impact
printers.
Dot-Matrix Printers
The dot-matrix printer uses print heads containing from 9 to 24 pins. These pins produce patterns
of dots on the paper to form the individual characters. The 24 pin dot-matrix printer produces
more dots that a 9 pin dot-matrix printer, which results in much better quality and clearer
characters. The general rule is: the more pins, the clearer the letters on the paper. The pins strike
the ribbon individually as the print mechanism moves across the entire print line in both
directions, i-e, from left to right, then right to left, and so on. The user can produce a color output
with a dot-matrix printer (the user will change the black ribbon with a ribbon that has color
stripes). Dot-matrix printers are inexpensive and typically print at speeds of 100-600 characters
per second.
Daisy-wheel printers
In order to get the quality of type found on typewriters, a daisy-wheel impact printer can be used.
It is called daisy-wheel printer because the print mechanism looks like a daisy; at the end of each
Petal is a fully formed character which produces solid-line print. A hammer strikes a petal
containing a character against the ribbon, and the character prints on the paper. Its speed is slow
typically 25-55 characters per second.
Line printers
In business where enormous amount of material are printed, the character-at-a-time printers are
too slow; therefore, these users need line-at-a-time printers. Line printers, or line-at-a-time
printers, use special mechanism that can print a whole line at once; they can typically print the
range of 1,200 to 6,000 lines per minute. Drum, chain, and band printers are line-at-a-time
printers.
Drum printer
A drum printer consists of a solid, cylindrical drum that has raised characters in bands on its
surface. The number of print positions across the drum equals the number available on the page.
This number typically ranges from 80-132 print positions. The drum rotates at a rapid speed. For
each possible print position there is a print hammer located behind the paper. These hammers
strike the paper, along the ink ribbon, against the proper character on the drum as it passes. One
revolution of the drum is required to print each line. This means that all characters on the line are
not printed at exactly the same time, but the time required to print the entire line is fast enough to
call them line printers. Typical speeds of drum printers are in the range of 300 to 2000 lines per
minute.
Chain printers
A chain printer uses a chain of print characters wrapped around two pulleys. Like the drum
printer, there is one hammer for each print position. Circuitry inside the printer detects when the
correct character appears at the desired print location on the page. The hammer then strikes the
page, pressing the paper against a ribbon and the character located at the desired print position.
An impression of the character is left on the page. The chain keeps rotating until all the required
print positions on the line have filled. Then the page moves up to print the next line. Speeds of
chain printers range from 400 to 2500 characters per minute.
Non-impact printers
Non-impact printers do not use a striking device to produce characters on the paper; and because
these printers do not hammer against the paper they are much quieter. Following are some non-
impacted printers.
Ink-jet printers
Ink-jet printers work in the same fashion as dot-matrix printers in the form images or characters
with little dots. However, the dots are formed by tiny droplets of ink. Ink-jet printers form
characters on paper by spraying ink from tiny nozzles through an electrical field that arranges the
charged ink particles into characters at the rate of approximately 250 characters per second. The
ink is absorbed into the paper and dries instantly. Various colors of ink can also be used.
One or more nozzles in the print head emit a steady stream of ink drops. Droplets of ink are
electrically charged after leaving the nozzle. The droplets are then guided to the paper by
electrically charged deflecting plates [one plate has positive charge (upper plate) and the other
has negative charge (lover plate)]. A nozzle for black ink may be all thats needed to print text,
but full-color printing is also possible with the addition of needed to print text, but full-color
printing is also possible with the addition three extra nozzles for the cyan, magenta, and yellow
primary colors. If a droplet isnt needed for the character or image being formed, it is recycled
back to its input nozzle.
Several manufacturers produce color ink-jet printer. Some of these printers come with all their
color inks in a cartridge; if you want to replace on color, you must replace all the colors. Other
color ink-jet printers allow you to replace ink individually. These printers are a better choice if
user uses one color more than other colors. These printers produce less noise and print in better
quality with greater speed.
Laser printers
A laser printer works like a photocopy machine. Laser printers produce images on paper
by directing a laser beam at a mirror which bounces the beam onto a drum. The drum has a
special coating on it to which toner (an ink powder) sticks. Using patterns of small dots, a laser
beam conveys information from the computer to a positively charged drum to become
neutralized. From all those areas of drum which become neutralized, the toner detaches. As the
paper rolls by the drum, the toner is transferred to the paper printing the letters or other graphics
on the paper. A hot roller bonds the toner to the paper.
Laser printers use buffers that store an entire page at a time. When a whole page is loaded, it will
be printed. The speed of laser printers is high and they print quietly without producing much
noise. Many home-use laser printers can print eight pages per minute, but faster and print
approximately 21,000 lines per minute, or 437 pages per minute if each page contains 48 lines.
When high speed laser printers were introduced they were expensive. Developments in the last
few years have provided relatively low-cost laser printers for use in small businesses.
The main advantage of Laser printer is its speed & efficiency at which it prints high-
quality quality graphics & text.
The main disadvantage of Laser printer is its cost, they are relatively costly as compared
to other printers.
The maintenance, repair & servicing charges are also high of these printers.
Laser printers emit small amount of ozone and are hazardous to health and the
atmosphere.
UNIT III
SECTION-B
1. Assume you are the network adminstrar of a company that function in two
floors of a building suggest a type of network justify your suggestion
If I am the network of the company i would like to suggest LAN covers only the building.
LAN
Local area network that thinks a number of independent electronic devices located with a in a
morale size geographic usually with a radius of 1 to 10 miles primarily connect devices within
things and offices to share data information etc.
Ethernet (10mpbs)
Token ring(4mpbs)
Ethernet network is a standard way of connecting equipment using coaxial cables. A typical
Ethernet network has a maximum speed of 10 Mbps.The new fast Ethernet network will
operate at 100 Mbps or more.
A Token ring network is another standard way of connecting computer equipment using
twisted pair cable. it had a maximum capacity of 4 Mbps and new one have a maximum
speed of 16 Mbps.
AppleTalk is a networking system that is all Macintosh computers.it can be used on twisted
pair cable, coaxial or fiber optic cable but it is mostly used on twisted pair. It has a top speed
of 230 Kbps.
2. Imagine a team of employees performing a set of tasks that to be executed
one person after another which type of network topology would you suggest
Topology is the geometric configuration of devices on a network .The suggestion for this
situation is Bus topology. It is a connection of all condition on a network through a single request
which is called central channel or communication by signal that are transmitted over the channel
are called massages is transmitted to all the competitor on the networks although only the
forgetted device has an address the primarily advantages of bus topology is that it is easy to add
device to the network or remove them without effectively network performance another
advantages of that if one of the devices on the network fail the network is one not affected since
the bus topology does not reason a central host computer the disadvantages however is that the
performance of the network decrease as the number of messages increase since each node has to
check every messages whether or not the message is addressed to it .
3. For a group of workers who perform jobs in same database which are to be
constantly monitor by the project leaders prescribe the ideal type of network
topology with justification
One of the oldest network topologies central host computer receivers messages and
forwards them to various computers on the network for one node to communicate with another
mode on the network
Star topology
Star topology is useful in environment in which some tasks are centralized and others are
decentralized so many business applications work well with star topology an advantages of
topology is that it can be ready expanded by adding nodes to the lost computer. For one node to
communicate with another node.
Conclusion
Also if the distance between the nodes and the central computer is very large the cost of
sending a message over the network increases significantly.
4. List three facts that must be known in order to communicate with a large
computer system.
A channel is the part of the data communication system that constitutes the link between
message source and message destination. The channels are identified according to transmission
rate, transmission mode, and transmission direction.
Transmission mode is the mode in which data are transmitted over the network. There are two
modes synchronous and asynchronous.
Simplex,
Full duplex.
5. Compare and contrast between the Wide area network and Local area
network.
Local area networks (LANs) allow computers and devices that are near each other and
usually making use of the same switch or router to connect to share files and complete tasks.
Consisting only of everyday devices (e.g., desktops, laptops, tablets, and printers), router and/or
switch, and Ethernet cables or wireless cards, LANs are relatively inexpensive to set up and are
commonly used in homes.
A wide area network (WAN) is used to connect computers that are not close to one another. It is
possible and almost always the case that LANs are connected to WANs. This enables small
home or office networks to connect to wider networks, such as those across state or country
lines. Most WANs connect through public networks, like the telephone system, or via leased
lines. The Internet, which connects computers all around the world, can be considered the largest
WAN in existence.
LAN
1. LAN (Local Area Network) is a computer network covering a small geographic area, like a
home, office, schools, or group of buildings.
2. LAN has high speed (up to 1000mbps)
3. The best example for a LAN is the network in an organization.
4. The LAN is build using the layer 2 devices like switches, bridges and layer1 devices like hubs.
5. LAN is owned, controlled, and managed by a single person or organization
6. LAN is easier to maintain at relatively low costs.
7. LAN experiences fewer data transmission errors
WAN
1. WAN (Wide Area Network) is a computer network that covers a broad area.
2. WAN has less speed (up to 150mbps).
3. The best example for a WAN is the Internet
4. The WAN is build using the layers 3 devices Routers and Multi-layer Switches.
5. WAN's are not owned by any one organization but rather exist under distributed ownership.
6. Maintaining WAN is difficult because of its wider geographical coverage and higher
maintenance costs.
7. WAN experiences more data transmission errors.
SECTION-C
Meaning of network:
Type of networks
LAN
WAN
MAN
VAN
Wide area network is a network that covers wide geographically are same time even countries for
data and voice Communication WAN is owned by both organization and common or special
purpose carrier there are several way step wan.
A link the electronic device over a metro Politian area man are used for bytes tan to
LAN location which helps high speed.
Value added network public data networks that odd value to basic communication
services provided common currier by offering specialized services.
To move the data and information from one location to another by telephone and tele-
communication Company are called data communication carriers.
I common carriers
II special purpose carriers
Common carriers
A common carrier is a company that furnished communication services to business and together
central public which is regulated by state government and federal agency
The company that add features to the basic communication service provided by a common
carrier it can add a mentis such as e-mail video conference correction of transmission errors
solution services back up and network management
(i)The computer to receive process and send information which is called the host computer
which usually a main frame or large computer.
(iii)Telecommunication channels that link geographically separated devices using media such as
telephone lines and cables.
Application layer
An end to end protocol, in the sense that a direct link is established between the sending
device and the receiving device. Facilitates the use of network application programs, such as E-
mail. By adhering to a set of protocols (embedded in software), users can communicate with one
another, regardless of the terminal or the hardware platform on which the application resides.
Presentation layer
Ensures the smooth transmission of information. It receives the input from the sending
device, attaches a header to it, and sends information to the session layer, Any decryption
(opposite of encryption) is also done in this layer. This layer uses an end-to-end protocol.
Session layer
Primary responsibilities are to establish or terminate links between computers. If a file has
to be transferred between two computers, the session layer ensures smooth transmission. This
layer uses an end-to-end protocol.
Transport layer
Uses an end-to-end protocol. To ensure the smooth transfer of data over the entire
transmission path, from the sending device to the receiving device. It receives data from the
session layer, performs the necessary services, such as multiplexing, and passes the data to the
network layer.
Network layer
Receives the data from the transport layer and adds a header that identifies the data path.
The data, along with the path that they should take, become the data frame that is handed over to
the data link layer.
Data link
Receives the data from of frames from the network layer. Puts boundaries around the data
frames, sends them to the physical layer, and acknowledges receipt of data.
Physical layer
5. Does internet provide the necessary tools to satisfy if multiple needs of users- Justify.
Ftp File transfer protocol (ftp), which was one of the first tools on the internet, allows
users to move files, such as text, graphics, sound, and so on, from one computer to another. It is a
command that activates a type of client-server relationship. Ftp works as follows. The user first
uses the software on his or her machine(or service provider), called the client, to gain access to
the remote machine, called the server. The users client program communicates with a program
on the remote computer or download (receive)certain requested files from it.
Another popular way to retrieve files is by using what is called an anonymous ftp server. In
this case, the user logs on to the server using the special user ID anonymous. If the server then
asks for a password, the user types in his or her user ID. Freeware and shareware-programs that
are available at no cost on the Net-can be obtained once the site is located, Sometimes it is
difficult to locate an ftp site or identify the files available on that site.
Gopher The second type of information retrieval tool available on the internet is Gopher, a
menu based interface that provides easy access to information residing on special servers,
command, its interface is much more user-friendly and it provides additional functions, can
move, retrieve, or display files from remote sites. the menu also allows users to move from one
gopher space (which refers to the interconnected gopher servers)can by easily expanded by
adding more servers.
Communication tools
E-mail E-mail, which refers to sending messages or files electronically, was one of the first
internet tools.
Telnet Telnet is a command that connects the user to a remote machine which may be located
anywhere on the internet and the user can then type of commands to the remote machine, for
example to change directories in search of certain files. While the ftp only allows users to move
or transfer files, the services provided by the lost machine, which may include much more than
simple file transfer. For example, some servers are dedicated to the playing of board games,
such as chess or go.
Usenet
Usenet is a network that provides users with discussion groups, or forums. A user posts
an article to a chosen newsgroup on the Usenet, where each newsgroup is devoted to a particular
topic such as politics, the environment, gun control, surfing, and so on. The article is routed only
to those sites that have expressed an interest in receiving information on the topic.
The World Wide Web (WWW) is one of the newest and most popular hypertext based internet
tool. It allows users to access and display documents and graphics stored on any server on the
internet. In 1989, Tim Berners-Lee, a computer scientist at the CERN particle physicists
exchange findings and information related to their research. It because popular only in late 1993,
when WWW software was delivered for desktops that used popular operating systems, such a
windows, allowing users easy and friendly access to the internet, Some WWW terms are given.
There are many interface to the WWW, such as Mosaic, a GUI-based hypertext browser,
and Netscape, that allows users to easily navigate the internet and access its many services.
WAIS: Wide area information server accesses servers all over the world to locate requested
files. The WAIS database has an index of keywords that helps users locate files in topic areas of
interest to them.
Archie: Archie one of the first information search tools developed on the internet, periodically
searches anonymous ftp servers that participate in the Archie database and identies all files on
these servers.
Veronica: Veronica is a search tool designed specifically to locate all files on gopher sites and it
is listed under other gopher and information servers on the gopher menu. Users who have access
to a gopher server and veronica server can then access the database.
UNIT-IV
SECTION-B
c) Data Dictionary
Data is processed and updated using a language called the data Manipulation language
(DML), whose command process, update and retrieve data. It allows a user to query a database
and receive summary reports or customized reports.SL is a non procedural language that deals
exclusively with data: data integrity, data manipulation, data access, data retrieval, data query
and data security.
c) Data dictionary
A data dictionary is a collection of descriptions of the data objects or items in a data model
for the benefit of programmers and others who need to refer to them. A first step in analyzing a
system of objects with which users interact is to identify each object and its relationship to other
objects. This collection can be organized for reference into a book called a data dictionary.
One of the most fundamental ways to think of a database system is in terms of its structure.
Three layers, or levels of abstraction, are identified: the physical database (or physical level), the
conceptual database (or conceptual level), and the users view. They are only the physical
database actually contains data. The other two levels are logical in nature and sometimes reduce
to just one level, when the users view coincides with part of the conceptual database.
This separation of physical and logical levels occurs frequently. For example, when a customer
calls in with an order to a departmental store clerk, the customer has a logical view of how the
stores stock is maintained. This view may be similar to or distinct from that of the clerk. Both
logical views are different from the way the stock is physically stored.
The physical database, or internal level, pertains to the actual data and how it is stored on
physical devices. It consists of two major parts: (1) a set of programs that interact with the
operating systems to help manage the database; and (2) the records and files stored. In external
and main memory. Data types, sorting, searching, merging techniques and physical
characteristics of storage media pertain to the physical database.
The conceptual database, or conceptual level, has a relationship to both the physical
database and the application environment. As exemplified earlier, it presents a logical model of
the physical database to the users. Structures, such as hash tables, B-trees, indexed sequential
files, and multi key organizations, pertain to the conceptual database.
The conceptual database makes use of a high-level language referred to as a data definition
language (DDL) which specifies how the physical database should look. The DDL consists of
notation and statements that describe the kinds of distinguishable items, called entities, in the
database and the kinds of relationship that exist among them. When the description is processed,
a stored data description, called a schema, is produced.
The DDL does not manipulate the database. A data manipulation language (DML) carries
out that function. Only the actual database designs, and any design modifications, are achieved
with the DDL. This separation of functions, design to implementation, is one of the
characteristics (and conveniences) of a DBMS. It enables changes to be made to the physical
database without altering programs or affecting a users communication with the database. The
separation is possible because the data and structures in a database are maintained apart from the
software required to manipulate them.
3. Furnish the ERD of your project for your degree completion Entity
Relationship Diagram
An entity relationship diagram (ERD) is a graphical tool that identifies and represents the
entities in an enterprise or system and the logical relationship among these entities. An ERD is
very useful to capture the data elements in a system. An entity is a person, place, thing, or idea
about which data is gathered. Entities in a university include teachers, students, administrators,
courses, and classrooms. In a restaurant, entities include waiters, mangers, customers, food
items, and the kitchen. An attribute is an item of data that describes an entity. Attributes for a job
include job code, wage class, job title, minimum salary, and maximum salary. Attributes for a
student include the students name, social security number, number of credits per semester, and
so on. The value assigned to each attribute is called the attribute value (e.g., the students name is
Mary Joe).
Since entities are linked to each other through relationships (a relationship is the way
entities interact with one another), a graphical tool that depicts the entities and their
interrelationships plays a very useful role in gaining a better understanding of the bit picture.
For example, an ERD can be used to show graphically how sales commission is related to salary,
taxes, and take home pay.
An ERD represents static data and is used for many modeling tasks, such as modeling an
enterprise, its entities, and the relationships among them. (This is also referred to as enterprise
modeling). The ERD also plays a very important role in the design and development of
information systems, since it gives a good overview of the elements in a system and their
interrelationships and is hence used extensively to design information systems and capture
different data elements.
There are two types of design: physical design and logical design. Physical design
addresses issues related to the physical location of data; logical design addresses the logical
relationship among various data items in the database and captures the essence of data
interactions. The logical design presents the data from a users perspective; the physical design
presents the data from the computers perspective. The user is not concerned about where the
data is located in memory, but is concerned about the role of data in decision making (logical
design). The computer, on the other hand, has no knowledge of how the data is used in decision
making; it knows only where that data is stored in the system (physical design).
The ERD is a useful tool in the logical design of a database, because it graphically portrays the
entities and their interrelationships.
There are also differences in the expected level of service provided by file systems and
databases. While databases must be self consistent at any instant in time , provide isolated
transactions and durable writes, a file system provides much looser guarantees about consistency,
isolation and durability. The database uses sophisticated algorithms and protocols to implement
reliable storage on top of potentially unreliable file systems. It is these algorithms that make
database storage more expensive in terms of processing and storage costs that make general file
systems an attractive option for data that does not require the extra guarantees provided by a
database.
As technology moves forward, though, the lines are blurring, as some file systems pick
up features previously the domain of databases (transactions, advanced queries) and some
databases relax the traditional constraints of consistency, isolation and durability. ZFS and
BTRFS might be considered examples of the former, Mongo DB and Couch DB examples of the
latter.
5. Due to situations, databases are beneficial and where they are not?
A database is a collection of data that is saved and organized to allow easy retrieval when
needed. In order to maintain and access the database you will need a DBMS (database
management system). This kind of system manages and protects data so that the database is safe
and secure. Databases consist of tables that include groups of related data fields that are known
as records. Databases are not limited to only computers; in fact, a phone book is an example of a
database. All of the names alphabetized and each column has its own category. There is a column
for your name, phone number, and possibly a street address. With a relational database, all of the
data within the row can be pulled up when you are looking for the specific attribute. There are a
few advantages to using a database management system. On the plus side, it has the ability to
control redundancy, the integrity of the information being stored can be maintained, it can restrict
access, it can share data, and can backup/recover information. to learn some basic SQL
(Structured Query Language) commands which are the commands that allow you to "talk" to the
DBMS. This will allow you to add, delete, update and retrieve the information you need. Only
certain languages support database connectivity. Probably the most popular language in use on
the web these days is ASP. ASP allows you to create pages that are dynamic and easily
maintained.
SECTION C
Applications
EIS helps executives find data according to user-defined criteria and promote
information-based insight and understanding. Unlike a traditional system presentation, EIS can
distinguish between vital and seldom-used data, and track different key critical activities for
executives, both which are helpful in evaluating if the company is meeting its corporate
objectives. After realizing its advantages, people have applied EIS in many areas, especially, in
manufacturing, marketing, and finance areas.
Manufacturing
Manufacturing is the transformation of raw materials into finished goods for sale, or
intermediate processes involving the production or finishing of semi-manufactures. It is a large
branch of industry and of secondary production. Manufacturing operational control focuses on
day-to-day operations, and the central idea of this process is effectiveness and efficiency.
Marketing
In an organization, marketing executives duty is managing available marketing resources
to create a more effective future. For this, they need make judgments and uncertainty of a project
and its impact on the company in short term and long term. To assist marketing executives in
making effective marketing decisions, an EIS can be applied. EIS provides sales forecasting,
which can allow the market executive to compare sales forecast with past sales. EIS also offers
an approach to product price, which is found in venture analysis. The market executive can
evaluate pricing as related to competition along with the relationship of product quality with
price charged. In summary, EIS software package enables marketing executives to manipulate
the data by looking for trends, performing audits of the sales data, and calculating totals,
averages, changes, variances, or ratios.
Financial
Financial analysis is one of the most important steps to companies today. Executives
needs to use financial ratios and cash flow analysis to estimate the trends and make capital
investment decisions. An EIS integrates planning or budgeting with control of performance
reporting, and it can be extremely helpful to finance executives. EIS focuses on financial
performance accountability, and recognizes the importance of cost standards and flexible
budgeting in developing the quality of information provided for all executive levels.
This class comprises systems that deduce faults and suggest corrective actions for a
malfunctioning device or process. Medical diagnosis was one of the first knowledge areas to
which ES technology was applied (for example, see Shortliffe 1976), but diagnosis of engineered
systems quickly surpassed medical diagnosis. There are probably more diagnostic applications of
ES than any other type. The diagnostic problem can be stated in the abstract as: given the
evidence presenting itself, what is the underlying problem/reason/cause?
Planning and Scheduling
Systems that fall into this class analyze a set of one or more potentially complex and
interacting goals in order to determine a set of actions to achieve those goals, and/or provide a
detailed temporal ordering of those actions, taking into account personnel, materiel, and other
constraints. This class has great commercial potential, which has been recognized. Examples
involve airline scheduling of flights, personnel, and gates; manufacturing job-shop scheduling;
and manufacturing process planning.
The financial services industry has been a vigorous user of expert system techniques.
Advisory programs have been created to assist bankers in determining whether to make loans to
businesses and individuals. Insurance companies have used expert systems to assess the risk
presented by the customer and to determine a price for the insurance. A typical application in the
financial markets is in foreign exchange trading.
Knowledge Publishing
This is a relatively new, but also potentially explosive area. The primary function of the
expert system is to deliver knowledge that is relevant to the user's problem, in the context of the
user's problem. The two most widely distributed expert systems in the world are in this category.
The first is an advisor which counsels a user on appropriate grammatical usage in a text. The
second is a tax advisor that accompanies a tax preparation program and advises the user on tax
strategy, tactics, and individual tax policy.
Systems falling in this class analyze real-time data from physical devices with the goal of
noticing anomalies, predicting trends, and controlling for both optimality and failure correction.
Examples of real-time systems that actively monitor processes can be found in the steel making
and oil refining industries.
These systems assist in the design of physical devices and processes, ranging from high-
level conceptual design of abstract entities all the way to factory floor configuration of
manufacturing processes.
There are four stages in the evolution of clinical decision support system (CDSS). The
primitive version is standalone which does not support integration. The second generation of
CDSS supports integration with other medical systems. The third generation is standard-based
while the fourth is service model-based.[
Other examples include a bank loan officer verifying the credit of a loan applicant or an
engineering firm that has bids on several projects and wants to know if they can be competitive
with their costs.
DSS is extensively used in business and management. Executive dash board and other
business performance software allow faster decision making, identification of negative trends,
and better allocation of business resources. Due to DSS all the information from any organization
is represented in the form of charts, graphs i.e. in a summarized way, which helps the
management to take strategic decision. For example, one of the DSS applications is the
management and development of complex anti-terrorism systems.
DSS are also prevalent in forest management where the long planning horizon and the
spatial dimension of planning problems demands specific requirements. All aspects of Forest
management, from log transportation, harvest scheduling to sustainability and ecosystem
protection have been addressed by modern DSSs. In this context the consideration of single or
multiple management objectives related to the provision of goods and services that traded or
non-traded and often subject to resource constraints and decision problems. The Community of
Practice of Forest Management Decision Support Systems provides a large repository on
knowledge about the construction and use of forest Decision Support Systems.
A specific example concerns the Canadian National Railway system, which tests its
equipment on a regular basis using a decision support system. A problem faced by any railroad is
worn-out or defective rails, which can result in hundreds of derailments per year. Under a DSS,
CN managed to decrease the incidence of derailments at the same time other companies were
experiencing an increase.
Store, organize, and retrieve information from Store, organize, and retrieve information from
one file at a time. tables in which information is linked by a
common column or field.
Leave the management of data relationships Establish relationship between files with
field to the applications that access the data. foreign keys and view within the database
itself.
Require the programmer to write code for Have a database engine that handles different
data management functions functions.
Are typically created and maintained by Are typically created and maintained
application programs by database administrators.
Are often associated with older programs on Are popular on UNIX processors and
mainframe and midrange systems. Powerful servers within a client/server
Architectural framework.
There is a relationship among the degree of certainty in decision making with characteristics of
management levels. The open/adaptive processes that higher-level management must cope with
the increase the uncertainty associated with decision making.Conversly, the relatively
closed/stable processes that lower level management must cope with reduce the uncertainty
associated with decision making.
In decision making under certainty the objective is to determine which is the best solution to a
problem or the best opportunity. Since the decision variables and their relationships are known,
the best solution can usually be computed. In decision making under uncertainty the probabilities
of outcomes are not known. Therefore, the decision maker must assign arbitrary probabilities or
assume on probabilities.
UNIT V
SECTION B
REASONING QUESTIONS
1. Justify Transaction processing System being considered the data lifeline of
an organization by explaining how it support operational decision making.
A TPS is the data life-line for a company because it is the source of data for other
information systems, such as MIS and DSS (Decision Support Systems). Hence, if the TPS
shuts down, the consequences can be serious for the organization. A TPS is also the main link
between the organization and external entities, such as customers, suppliers, distributors, and
regulatory agencies.
As shown in transaction systems exist for the various functional areas in an organization,
such as finance, accounting, manufacturing, production, human resources, marketing quality
control, engineering, and research and development.
Let us look at an example of real-world TPS. Carenet, the TPS of travelers insurance
company, is an advanced system that records and processes insurance related transactions.
Filing and processing insurance claims is a highly information intensive process in which
every step generates new data or modifies existing data. Care net allows the company to
accurately capture this data and disseminate it at the right time to its 7 million clients. The
information generated by care net is useful both to employees of travelers insurance and to its
clients. A travelers employee can access the system and look at the latest transaction; an
authorized client can also access care net to study the status of his or her insurance claim.
This system therefore, spans organizational boundaries and provides information to both
internal external entities.
2. Introspect the possibility of an organization being able to better manage its
information resources with the help of IRM.
Companies that are successful users of information, information systems, and information
technologies follows well-established IRM policies and principles, and in particular, they share
the four principles described next. The IS department should be managed like any other unit or
division of the business.
A TPS records internal and external transaction for a company. it is a repository of data
that is frequently accessed by other system .
A TPS performs routine, repetitive task .it is mostly used by lower level managers to
make operational decisions.
There are six steps in processing a transaction. They are data entry, data validation, data
processing and revalidation, storage, output generation and query support.
The computer based teleconferencing has the advantage of flexibility in terms of pre-recorded
presentations and integration with other information systems. With the advancements in multi-
media technologies, desk top teleconferencing systems are now available at affordable prices.
These systems are based on Personal Computers featuring a digital camera and run on visual
communication software. The communication links are still quite expensive making the desktop
video conferencing useful only for selected applications. The meetings best suited for tele /video
conferencing are those which are low in conflicts as they are not as effective as personal contact
meetings.
The effectiveness can, however, be improve by providing proper training to the users regarding
the systems and the gestures that are part of the body language. The most common applications
of computer based teleconferencing include management communications and training, budget
meetings, its potential to reduce the cost of group meetings. Savings come primarily from
reduced travel costs.
Attend a business meeting hundreds of miles away without leaving your office
SECTION C
Data entry
Data validation
Storage
Output generation
Query support
Data entry
Transaction data must be entered into the system. There are number of input devices for
entering the data including the keyboard and mouse. A document generated at the point of
transaction occurs are called source documents .The use of automated methods of data entry is
known as source data automation. Major types of hardware include transaction terminals, OCR,
MICR etc.
Data validation
Data validation is an essential step in transaction processsing.It ensures the accuracy and
reliability of data by comparing actual data with predetermined standards or known results.
There are two steps in validation: error detection and error correction. Error detection is
performed by one set of control mechanisms; error correction is performed by another. Error
detection procedures are checking the data for appropriate format, checking for aberrations and
checking for missing data, invalid data and inconsistent data. Error correction procedures are
designed to ensure all errors have been corrected and that no new errors have been introduced
during the process.
Once the accuracy and reliability of the data are validated, the data are ready for processing.
There are two ways of process transaction
Online
Batch processing
Online transaction processing is almost instantaneous processing of data. Online means that the
data input device is directly linked to the TPS and therefore the data processed as soon as it is
entered into the system. Since there is little or no time lack between data creation and data
processing in an oline system the information is always current.
Batch processing
The second type of v processing is batch processing in which transaction are accumulated over
time and processed periodically. Batch processing may be done on daily, weekly or monthly
basis of any other time period appropriate to the given application.
Data storage
Once the data is processed through the processing method, the processed data should be
carefully and properly stored for future use. data storage is critical consideration for many
organization because the value and the usefulness of data diminish if data are not properly
stored. The kind of processing and type of storage mean are extending to related issues.
Output generation
Once data has been input and validated, processed, revalidated and storage, the output can be
communicated to the decision maker in two ways
Forms; panels
Documents are a popular output method. they can be processed further, either to generate
additional information or to present the same information in a different format.
Query support
The last step in processing a transaction is querying a system. Querying facilities allow the users
to access the data and information that mean otherwise not be readily available. For example a
sales manager may query a system for the number of damaged items in a given store.
2. Predict the problems that could manifest in companies that do not have well
established IRM Policies and procedures.
Companies that are successful users of information, information systems, and information
technologies follow well-established IRM policies and principles, and in particular, they share
the four principles described next.
Principle 1: The IS department should be managed like any other unit or division of the
business.
Basic principles of management, such as planning organizing, staffing directing, and controlling
that are applied to the various disciplines in an organization, (e.g., finance, production,
marketing, and human resources) should also be applied to information systems and
management. The argument that the IS department and its technical personnel cannot be
managed using classic management principles is weak and disruptive and often leads to gross
inefficiencies and mismanaged growth. This is not to say that the IS department does not have
certain unique characteristics that separate it from other departments; only that these differences
should not be used as excuses for managing the IS department poorly.
Principle 2: The sole purpose of information systems is to help the organization meet its
goals and objectives.
A common complaint of CEOs and other top managers is that the CIO and the IS
personnel have a limited understanding of the business and the industry in which it operates. Top
management often complains that IS personnel are more interested in acquiring the latest
technology than in fully utilizing existing technologies.
IRM is the responsibility of all functional managers who are involved, directly or
indirectly, in the creation, collection, storage, use, manipulation, and dissemination of
information. Treating IRM as a function of the IS department reflects a narrow and limited and
information-related resources. In chapter 3, business information systems, we looked at the
effects of information systems on the various functional areas in an organization; many examples
showed the positive impact of information systems on profits, productivity, and people,
emphasizing the active participation of all employees.
Principle 4: The commitment of top management is the key to realizing the full potential of
information resources.
Throughout they have emphasized that the success of information systems and
information technologies in new ways to achieve the goals of the organization. A short-term
commitment to some technologies will not do; neither will technology investments for the sole
purpose of immediate gains help the organization. If top management is lukewarm in its
commitment to IRM as a buzzword that will eventually be forgotten. Good IRM policies will
shift technical responsibilities and decisions to the IS department, while providing top managers
with good technology management skills.
3. Analyze the Information system life cycle with its phases based on the type
of system for which it will be appropriate.
The concept of life cycle of a system is central to system investigation. These are they
preliminary study phase, the system analysis phase, the system design phase, the implementation
phase, and the systems maturity and maintenance phase, which includes a separate activity called
a "post audit". The life cycles of systems vary greatly in terms of length, but typically the life
cycle of an information system ranges from 3 to 8 years. The first four phases of this life cycle
may properly be termed the "systems investigation phases".
Large and medium-sized organizations usually have full time systems investigation specialists
including programmers and analysts. Typically, for all but minor systems investigations, a team
will be formed at the time the preliminary study phase begins.
The preliminary study phase: during the phase, a problem with an existing information system
or an opportunity to usefully develop a new system is discovered, and a limited amount of initial
investigation takes place to see whether a system a project is warranted.
The system analysis phase: during the analysis phase a problem or opportunity associated with
the system is identified the strengths and weaknesses of the old system are examined and what a
new system could accomplish is determined
The system design phase: during the design phase a new system or computer application is
designed to satisfy the needs that have been determined during the analysis phases
The implementation phase: this phase involves the programming, equipment,installation,othe
activities related to implementing a newly designed system
The systems maturity and maintenance phase: this phase involves the continuous operation of
the system after installation usually the systems achieve peak performance and then its cost
effectiveness.
Text processing
Text processing systems are the most commonly used components of the office
automation systems. This is so because a large proportion of office communication takes place in
writing using words of a natural language. The proportion of written communication is higher in
case of external communication.
Desktop-Publishing
Professional-looking documents such as newsletters, advertisements, annual reports,
brochures, and business cards can be designed with most modern word-processing software.
Graphical images from clip-art collections, digital photographs, and scanned images, and
drawings created with graphics programs, can be integrated easily into word-processing
documents. Pages and paragraphs can be enclosed with decorative borders. Background images
and colors can be added to pages within a document. Graphical elements such as lines, boxes,
arrows, and artistic textual headings can be created quickly and easily within most word-
processing programs.
Electronic mail:
The difference between the normal mail,interpersonal communication of information
in the form of text and images as against the other forms of interpersonal communication such as
the telephone-e-mail is its non simultaneous communication wherein the presence of the receiver
is not essential at the time of transmission.
The mail has been used by business enterprises for long and is still one of the most
popular non-simultaneous communication medium. However, the electronic mail has
substantially changed the way messages are exchanged between individuals and business
enterprises.
The electronic mail, popularly called E-mail, is a computer based electronic mailing
system for electronic transmission of information, including messages, documents and images
between two or more individuals.
Voice mail is a variation of the E-mail. The voice mail transmits messages as digitized
voice. The recipient of the voice mail has to dial a voice mail service or access the electronic
mail box using the specified equipment and he can hear the spoken message in the voice of the
sender.
Teleconferencing
Image Processing
Image processing systems include electronic document management, presentation
graphics, and multimedia systems. Imaging systems convert text, drawings, and photographs into
digital form that can be stored in a computer system. This digital form can be manipulated,
stored, printed, or sent via a modem to another computer. Imaging systems may use scanners,
digital cameras, video capture cards, or advanced graphic computers.
Information resource management (IRM) refers to policies principles, and processes that
effectively manage all components of an organization that collect store process, retrieve, and
disseminate information.
The components include hardware, software, databases, tele communication different
type of information systems, such as TPS,MIS,ISS, and OAS, management structures, strategic,
information systems(SIS),IS personal and end users
IRM can be defined as the planning, budgeting, organizing, directing, training and control of
information system.
To effectively utilize information resources in order to achieve the overall goals and
mission of the organization.
To inventory, document and control all resources that create, process, store, and
disseminate information.
To create model of the enterprise from an information point of view in order to improve
communication both within and outside the orations.