eis quick bites: nov 2018 by prof. om trivediomtrivedi.com/admins/pic/20190504095412_chapter...

12
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course) Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI . (9958300572, [email protected]) Data Information Process System Collection of raw facts and figures. Consists of numbers, words, or images, particularly as measurements or observations of a set of variables. Data that have been processed so that they are meaningful. Organized data that has been arranged for better comprehension, understanding and/or retrieval. BP is a sequence of co- ordinated activities to transforms input into output which creates some value to the customer as well as the organization. A group of mutually related, cooperating elements working towards reaching a common goal by taking inputs and producing outputs in organized transformation processes. Information System: It refers to a system that collects, stores, analyses, processes and distributes information in the enterprise for decision-making, co-ordination and control. It can be manual as well as computer-based information system (CIS). Information Technology: It refers to the applications of Computer systems – Hardware and Software, Telecommunications and Networks, DBMS and Other Information Processing Technologies to collect, store, transmit and manipulate data for processing of information in the enterprise. Data Vs. Information Data Information Data is raw facts and figures. Information is facts or figures ready for communication or use. Data is unorganized. Information is meaningful and recorded by human intellect. Components of IS Key: (PHD IN Sw.) Why IS? Key: (OBC 2 ) 1. People Resources (Specialists and End Users) 2. Hardware (Machine and Media) 3. Data (DBMS) 4. Information Products 5. Network (Devices, Media, Software and Protocols) 6. Software (Programs and Procedures) 1. Operational excellence 2. Better decision-making 3. Competitive advantage 4. Customer-supplier intimacy Chapter 3: Information System Components

Upload: others

Post on 25-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

Data Information Process System

• Collection of raw facts

and figures.

• Consists of numbers,

words, or images,

particularly as

measurements or

observations of a set of

variables.

• Data that have been

processed so that

they are

meaningful.

• Organized data that

has been arranged

for better

comprehension,

understanding

and/or retrieval.

BP is a sequence of co-

ordinated activities to

transforms input into

output which creates

some value to the

customer as well as the

organization.

A group of mutually

related, cooperating

elements working

towards reaching a

common goal by taking

inputs and producing

outputs in organized

transformation processes.

Information System: It refers to a system that collects, stores, analyses, processes and distributes information

in the enterprise for decision-making, co-ordination and control. It can be manual as well as computer-based

information system (CIS).

Information Technology: It refers to the applications of Computer systems – Hardware and Software,

Telecommunications and Networks, DBMS and Other Information Processing Technologies to collect, store,

transmit and manipulate data for processing of information in the enterprise.

Data Vs. Information

Data Information

• Data is raw facts and figures. • Information is facts or figures ready for communication or use.

• Data is unorganized. • Information is meaningful and recorded by human intellect.

Components of IS Key: (PHD IN Sw.) Why IS? Key: (OBC2)

1. People Resources (Specialists and End Users)

2. Hardware (Machine and Media)

3. Data (DBMS)

4. Information Products

5. Network (Devices, Media, Software and Protocols)

6. Software (Programs and Procedures)

1. Operational excellence

2. Better decision-making

3. Competitive advantage

4. Customer-supplier intimacy

Chapter 3: Information System Components

Page 2: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

LAYERS IN INFORMATION SYSTEMS

HARDWARE

Page 3: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

PROCESSING DEVICES

CPU CU ALU Registers

• CPU is the processor

that computes and

processes data and

delivers the results

based on the

instructions that are fed

to the PC.

• Every CPU has two

basic parts, the Control

Unit and the

Arithmetic Logic Unit.

• Computer’s

resources are

managed by CU.

• It is the logical

hub of the

computer.

• CPU’s

instructions for

carrying out

commands are

built into CU.

• Carries out

mathematical

operations.

• Arithmetic: Addition,

subtraction,

multiplication, division,

etc.

• Logical: Comparisons,

such as, whether one

number is equal to,

greater than, or less

than another number.

Internal memory within

CPU, which are very fast

and very small.

Types of Registers:

a) Accumulators (AR) b) Data Registers (DR) c) Instruction Registers

(IR) d) Memory Registers

(MR) e) Index Registers

Memory Unit

Primary Memory

RAM ROM CMOS

Secondary Memory

Internal Memory

External Memory

Virtual Memory

Page 4: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

Cache Memory (Pronounced as ‘Cash’)

• There is a huge speed difference between Registers and Primary Memory.

• To bridge these speed differences, we have cache memory.

• Cache is a smaller, faster memory, which stores copies of the data from the most frequently used main

memory locations so that Processor/Registers can access it more rapidly than main memory.

PRIMARY MEMORY

1. Read Only Memory (ROM):

• It is only readable memory.

• The data written on it cannot be modified.

• The instructions required during booting of a system are retrieved from ROM.

2. Random Access Memory (RAM):

• RAM is temporary and is erased when computer is switched off.

• RAM is read/write type of memory, and thus, can be written by user.

3. Complementary Metal Oxide Semiconductor Memory (CMOS):

• CMOS is used to store the system configuration, date, time and another important data.

• When computer is switched on, BIOS (Basic Input/Output System) matches the information of

CMOS with the peripheral devices and displays error in case of mismatching.

SECONDARY MEMORY Because the storage capacity of primary memory is limited so additional memory called auxiliary memory is

used in computer systems.

Bubble Memory Flash Memory

• Made of thin crystal film - synthetic garnet.

• This crystal film contains large number of

magnetic domains (bubbles).

• The presence or absence of bubbles indicates

whether bit is on or off.

• Non-volatile Memory

• Credit or Debit card use bubble memory.

• Latest technology in semi-conductor memories.

• Made of a small board. (PCB – Printed Circuit

Board).

• A very high speed memory.

• Portable memory for carrying data and

programmes.

Virtual Memory

• VM is not a separate device; but an imaginary memory area

• Supported by operating systems in conjunction with the hardware.

• If a computer, that lacks RAM, needs to run a program or operation, Windows uses virtual memory to

compensate.

• Virtual memory combines computer’s RAM with temporary space on the hard disk.

• When RAM runs low, virtual memory moves data from RAM to a space called a paging file.

• Moving data to and from the paging file frees up RAM to complete its work.

• Virtual memory is an allocation of hard disk space to help RAM.

Page 5: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

SOFTWARE System Software Application Software

A computer software designed to operate the

computer hardware and to provide and maintain a

platform for running any application software.

Application software has been created to perform a

specific task for a user.

Functions of OS Key: (PUsH MTNL File) Types of Application Software Key: (Content and

Media for AIEEE)

1. Performing hardware functions

2. User Interfaces

3. Hardware Independence

4. Memory Management

5. Task Management

6. Networking Capability

7. Logical access security

8. File management

1. Content Access Software

2. Media Development Software

3. Application Suite

4. Information Worker Software

5. Enterprise Software

6. Enterprise Infrastructure

7. Educational Software

Advantages and Disadvantages of Application Software Key: (User needs virus updated

to avoid cost and Malware)

Advantages Disadvantages

1. Addressing User needs

1. Less threat from virus

2. Regular updates

1. Development is costly

2. Infection from Malware

Application Areas of Computer Based Applications

1. Finance and Accounting

2. Marketing and Sales

3. Production and Manufacturing

4. Human Resource Management

5. Inventory or Stores Management

Page 6: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

DATABASE MANAGEMENT SYSTEM (DBMS)

Database Database System DBMS Objectives of DBMS

• A collection of

interrelated data

stored together to

serve multiple

applications.

• Data is stored in such

a way that it is

independent of the

programs which use

the data.

Computer Based Record-

Keeping System.

• A set of computer

programs that

controls the creation,

maintenance, and

utilization of the

databases of an

organization.

• A System software

that provides facility

to create and maintain

a well-organized

database.

• Example: SQL,

Oracle, DB2, etc.

1. To know its

information needs.

2. To acquiring that

information.

3. To organize the

acquired information

in a meaningful way.

4. To assure

information quality.

5. To provide software

tools so that users in

the enterprise can

access the information

they require.

Page 7: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

Hierarchical DBM Network DBM Relational DBM Object Oriented DBM

• Records are logically

organized into a

hierarchy of

relationships.

• In an inverted tree

pattern.

• Records in the

hierarchy are called

nodes.

• Each node is related to

the others in a parent-

child relationship.

• Implements one-to-

one and one-to-many

relationships.

• The top parent record

in the hierarchy is

called the root record.

• It views all records in

sets.

• Each set is composed

of an owner record

and one or more

member records.

• A logical data

structure that allows

many-to-many

relationships among

data records.

• It allows entry into a

database at multiple

points, because any

data element or

record can be related

to many other data

elements.

A relational database is

structured into a series of

two-dimensional tables.

• Object-oriented has its

origins in Object

oriented

programming

languages. (C++,

Ruby, Python, etc.)

• An object typically has

two components; state

(value) and behaviour

(operations).

• Object oriented

databases provide a

Unique Object

Identifier (OID) for

each object.

Advantages of DBMS Key: (SIR has CIA’s

Security Data for Us.

Disadvantages of DBMS

1. Permits Data Sharing

2. Maintains Integrity

3. Minimizing data Redundancy

4. Program and file Consistency

5. Achieving program/data Independence

6. Faster Application Development

7. Improved security

8. User-friendly

1. Cost

2. Security

Big Data Data Warehouse (DW) Data Mining Knowledge Discovery

Big data is high-volume

and high-velocity and/or

high-variety information

assets that demand cost-

effective, innovative

forms of information

DW is a small database

extracted from the larger

database.

Extract data from one or

more of the

organization’s databases

Data mining is a major

use of data warehouse

databases and the static

data they contain.

The data in a data

warehouse are analyzed

Knowledge Discovery in

Databases systems also

assist us establish, contact,

and communicate with

experts (knowledgeable

people) on various

Page 8: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

processing that enable

enhanced insight,

decision-making, and

process automation.

and load it into the data

warehouse for storage

and analysis.

to reveal hidden patterns

and trends in historical

business activity.

subjects, surrounded by

our organization, or

perhaps even outside.

Criteria to Create DW DW Design Approaches Benefits of DW Key: (CTC Trend)

A. Uses non-operational data

B. Data is time-variant

C. Data is standardized

A. Bottom-Up Approach

B. Top-Down Approach

A. Consistency in Data

B. Truth Finding

C. Clear Understanding of Databases

D. Trend Analysis

Page 9: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

NETWORKING AND COMMUNICATION SYSTEMS

Computer Network Types of Networks Network Principles

Key: (R2BC)

Benefits of Networks

A network is a set of

devices (also known as

nodes, terminals or

stations) interconnected

by a communication link.

1. Connection Oriented

networks

2. Connectionless

Networks

1. Routing

2. Resilience

3. Bandwidth

4. Contention

A. Distributed nature of

information

B. Resource Sharing

C. Computational

Power

D. User communication

E. Reliability

F. Shared Databases

G. Remote Access

H. Fault Tolerance

I. Internet and Security

THE BUSINESS VALUE OF TELECOMMUNICATIONS Key: (GST Cost)

Overcome Geographical

Barriers

Overcome Structural

Barriers

Overcome Time

Barriers

Overcome Cost

Barriers

Page 10: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

NETWORK RELATED CONCEPTS Hub:

• Hub is a port-switching communications processor.

• This allows for the sharing of the network resources

such as servers, LAN workstations, printers, etc.

Switch:

• Also called switching hub, bridging hub, officially

MAC bridge.

• The switch connects to the rest of the network.

• Number of ports on a Switch: 8 or 16.

• Switches can be connected to each other to build

larger networks.

Repeater:

• Repeater is a communications processor that boosts

or amplifies the signal before passing it to the next

section of cable in a network.

• It is needed when the total length of a single span of

network cable is larger than the maximum allowed

for your cable type.

Bridge:

• A bridge as a kind of smart repeater.

• Bridge is a communication processor that connects

number of Local Area Networks (LAN).

• Used to partition one large network into two

smaller networks for performance reasons.

• It magnifies the data transmission signal while

passing data from one LAN to another.

NIC:

• A network interface card or controller, also known

as network adapter, LAN adapter or

physical network interface is a computer hardware

component that connects a computer to a

computer network.

• NICs implement a networking standard called

Ethernet (In-built with the motherboard).

Modem:

• Modulator-demodulator

• Computers use modems to talk to each other

Page 11: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

Router:

• Router is a communications processor

• It interconnects networks based on different rules

or protocols.

• So that a telecommunications message can be

routed to its destination.

Packet:

• A packet is a message that is sent over the network from one node to another node.

• Includes the address of the node that sends the packet, the address of the node the packet is being sent to,

and the data.

Node:

• A node is a device that is connected to the network.

MAC Address:

• MAC Address is assigned by the manufacturer of a Network Interface Controller (NIC) and are stored in

its hardware, such as the card’s read-only memory or some other firmware mechanism.

• If assigned by the manufacturer, a MAC address usually encodes the manufacturer’s registered

identification number.

NETWORK TOPOLOGY

The arrangement in which the computers and other network components are connected to each other.

Bus Topology

• The nodes are strung together in a line.

• Commonly used for LANs.

• Every node on the network can see every packet that

is sent on the cable.

• Each node looks at each packet to determine whether

the packet is intended for it.

• If so, the node claims the packet.

• If not, the node ignores the packet.

Ring Topology

• Packets are sent around the circle from

computer to computer.

• Each computer looks at each packet to decide

whether the packet was intended for it.

• If not, the packet is passed on to the next

computer in the ring.

Page 12: EIS Quick Bites: NOV 2018 by Prof. Om Trivediomtrivedi.com/admins/pic/20190504095412_Chapter 3_EIS_Charts f… · EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate –

EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)

Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])

Star Topology

• Each network node is connected to a central device

called a hub or a switch.

• Commonly used with LANs.

• If a cable in a star network breaks, only the node

connected to that cable is isolated from the network.

Mesh Topology

• Multiple connections between each of the nodes

on the network.

• If one cable breaks, the network can use an

alternative route to deliver its packets.

• Not very practical in a LAN setting.

• Common for MAN or WAN.

Packet Switching:

• Data is communicated in the form of packets between

sender and receiver.

• Provides efficient utilization of communication channel.

• Users’ data packets can be transmitted simultaneously.

• Internet communication is based on packets switching techniques.

Voice Over Internet Protocol (VOIP):

A protocol called VoIP enables sounds to be converted to a digital format for transmission over the Internet

and then recreated at the other end.

Voice communication over the Internet is now available to everyone with a browser access (think Skype,

Google Hangouts, and WhatsApp calls).

IP Address:

Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or

anything else, is assigned a unique identifying number called an IP (Internet Protocol) address.

Let’s say the domain wikipedia.org has the IP address of 107.23.196.166.