Documente Academic
Documente Profesional
Documente Cultură
2.1 Introduction
Organizations need different types of information to support the work activities and decision
making for various and organizational levels. To generate the information needed organizations
use different information systems.
Information system is becoming the foundation as well as necessity for many firms. The major
reason for organizations to pursue information system is because the global economy has shifted
from being a manufacturing, product based economy to service economy. All types of business,
both large and small are using information systems, networking and internet technology to
conduct their business electronically. Evidently, this has helped firms achieve new levels of
efficiency, competitiveness and profitability.
Structured Decisions:
Those decisions which can be predicted in advance are structured decisions
Semi-structured decisions:
Those decisions which can be predicted in advance but all the variables influencing the decision
cannot be considered. E.g. it is predictable that the share prices will go up but the most essential
variable which contributes to the price rise is unknown.
Unstructured Decisions:
Those decisions which cannot be predicted in advance are unstructured decisions.
Page 1
Strategic level Senior
(DSS, ESS) manager
Knowledge
Knowledge
level
workers
(KWS)
Operational Operational
level(TPS) manager
TPS produces output in the form of detailed reports, lists and summaries by processing the input
by sorting, listing, updating and merging etc.
STEPS IN TPS
1. Data Entry: Data relating to the transactions are taken as input by the system.
2. Data Validation: TPS checks the validity of the data and makes sure that they are
within the parameters set in the system.
3. Data Processing and Revalidation: The valid data taken as input are processed by
the system. While processing the data, the TPS also revalidates them with the fields in
the storage
Page 2
4. Data Storage: Data after being processed are stored systematically so that they can
be extracted whenever required.
5. Output Generation: TPS generates output which may be in the form of reports, list,
tables etc. Generally, these reports are elaborate and present the operational level
transactions. However, the reports prepared by TPS are fundamental source for other
systems.
6. Query Support: Query is the request send by the user to the database to get some
specific information. The query enables the user to get the required information that
has been stored in the database.
DSS are built explicitly with a variety of models to analyze data, or they can compress large
volume of data which can be analyzed by decision makers. DSS are designed in such ways that
users can work with them directly because they include user friendly, graphic oriented and
Page 3
interactive software. The user of DSS can change assumptions, ask new questions and include
new data. The user can control the input or output of the system e.g. setting different values for
the variables to predict the trends. It is not necessary for the user to understand complex
programming or computing. DSS operates on powerful desktop personal computer, providing a
system of menus that make it easy for users to enter data or obtain information.
Administrat
ion Cost
File
Revenue
File
Analytical
Graphic
Model
PC Report
Database
Inventory
file
Liabilities
File
ESS serves the senior manager of strategic level. The decisions made by them are highly non-
routine because there is no agreed on procedure for arriving to a solution. ESS takes highly
critical data from internal sources along with skimmed information from internal sources
like MIS and DSS and filter, compress them to produce information useful for high level
Page 4
executives. The emphasis of ESS is reducing the time and effort of executives to obtain
information. ESS employs the most advanced graphics software and can deliver graphs and
data from many sources immediately to the senior officer’s office or to a boardroom.
However, unlike other types of information systems, ESS is not designed primarily to
solve specific problems. Instead, ESS provides a generalized computing and
telecommunication capacity that can be applied in solving array of problems. ESS answers
questions like what business should we are doing? What are the competitors doing? Etc.
There is less use of analytical tools (as compared to DSS) in ESS. It is not necessary for user to
be an expert in computer-based information system to be able to use them
Page 5
NETWORKING
3.1 Concept of Networking
In information technology, a network is a series of points or nodes interconnected by communication
paths. Networks can interconnect with other networks and contain sub networks.
The most common topology or general configurations of networks include the bus, star, Token Ring, and
mesh topologies. Networks can also be characterized in terms of spatial distance as local area networks
(LANs), metropolitan area networks (MANs), and wide area networks (WANs).
Alternatively we can define networking: If two or more than two computers are connected to each other
to let the user share the resources.
Network topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a
network, especially the physical (real) and logical (virtual) interconnections between nodes. A local area
network (LAN) is one example of a network that exhibits both a physical topology and a logical topology.
Any particular network topology is determined only by the graphical mapping of the configuration of
physical and/or logical connections between nodes. LAN Network Topology is technically a part of graph
theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may
Fig. 3.1: differ in two networks and yet their topologies may be identical.
Topologies
3.2.1 Star Topology
All the devices are connected to a central hub. Nodes communicate across the network by passing data
through the hub.
Page 6
Fig:3.1: Topology
Fig 3.1 Star topology
Advantages:
• Easy to install
• Inexpensive Disadvantages:
• Easy to troubleshoot • Data transmission is low
• Easy to reconfiguration • No dejure standard
• Lots of cable
Devices are connected with many redundant interconnections between network nodes. In a true mesh
topology every nodes has a connection to every other node in the network.
Page 7
• Not used in practical life.
• Partially connected
Disadvantages:
All the devices are connected to a central cable, called the bus or backbone. In it, the stations are
connected to the medium, which can be run in any convent shape.
Advantages: Disadvantages:
• Easy to install • If the main cable break down overall
• Doesn’t use much cable network will be down
• Individual computer may fail • Hard to troubleshoot
without affecting to others. • Hard to reconfiguration
All the devices are connected to one another in the shape of a closed loop, so that each device is
connected directly to two other devices, one on either side of it.
Page 8
Fig 3.4 Ring topology
Advantages: Disadvantages:
• No loss in signal quality • If main ring is damaged or collapsed
• Easy to install overall layout is damaged
• Easy to troubleshoot • Hard to reconfigure
• Uses more cable than the bus
topology
Page 9
Most telecommunication systems consist, in part, of some combination of input, output, processing and
storage devices that are linked together through some sort of communications media. Some of the most
essential telecommunication technologies and concepts are described in the following sections.
There is variety of media link devices in a communications network. The communications channels that
these provide can carry either analog or digital signals. All communications media fall into one of the two
broad classes; physical lines or wireless media. These media are as follows.
a. Physical Lines:
The three principal types of physical lines that dominate today’s telecommunication systems are
twisted-wire pairs, coaxial cable, and fiber optic cable. While both twisted-wire pairs, coaxial cable
are still commonly used, fiber optic cable is the wave of the future.
Page 10
Fiber optic cable
It is relatively new among the media technologies, consists of thousands of hair-thin strands of glass that
are bound together as a cable. Data are sent along the cable as light, from a high powered, laser beam
source. Compared to coaxial cable, fiber optic cable has greater channels capacity and is lighter, faster
and compacter. Transmission speeds in excess of 5 gb (5 billion bits) per second are reported. Such rates
would make it possible to transmit the entire contents of 30-volume encyclopedia from coast-to-coast in
less than a second.
Page 11
Telecommunications that do not involve physical wires are becoming more widely used. This category
includes microwaves transmission ( both terrestrial and satellite), cellular radio, and wireless local area
networks based on radio waves.
Broadcast Radio
Broadcast radio is a wireless or unguided transmission media that distributes radio signals
through air over long distances. For a radio transmission, we need a transmitter to send the
broadcast radio signal and a receiver to accept it. To receive the radio signal, an antenna is
placed in the range of the signal. There is a device which can be used as transmitter and receiver
as well which is known as transceiver. AM and FM radio uses broadcast radio for transmitting
signals of various frequency. Broadcast radio can also be used to support mobile communication
network.
Bluetooth:
Another wireless transmission media is Bluetooth. We are familiar with this media as it is
available in our cell phones. Generally, Bluetooth is used for short range communication i.e. upto
100 meters. To use Bluetooth technology, each device must include transceiver chip and it
should be within specified range.
Microwaves
Microwaves are radio waves that provide high-speed signal transmission. Microwave
transmission involves sending signals from one microwave station to another. A microwave
station is an earth-based reflective dish that contains the antenna, transceivers and other
important device necessary for microwave communications. Microwaves are limited to line-of-
sight transmission, which means that microwave must be transmitted in a straight line without
any obstructions in between. It is mainly used for short distance transmission. Repeaters are used
at regular intervals of about 25 to 30 km between transmitting and receiving station. Data
transmission rate is about 16 Gbps.
Communication Satellite
A communication satellite is a space station that receives microwave signals from an earth-based
station, amplifies the signals and broadcasts the signal back over wide area to any number of
earth-based station. It is much like the microwave transmission but one of its stations is a
satellite orbiting the earth. The principle is the same as the microwave system, with a satellite
acting as a supertall antenna and repeater. Satellite communication can provide transmission
capability to and from any location on earth. The satellites are basically positioned 36000 km
above equator with an orbit speed that exactly matches the earth's rotation speed. The process of
transferring data to satellite is called uplink and the process of obtaining data from the satellite is
called downlink.
Page 12
Infrared
Infrared (IR) is a wireless transmission media that sends signals using infrared light waves. Like
microwaves, infrared transmission requires a line-of-sight transmission. Many computer devices
like mouse, printers etc have an IrDA port that enables the transfer of data from one device to
another using infrared light waves. Generally, IR is used for very short distance data
transmission.
Hub
A network hub is a fairly unsophisticated broadcast device. Hubs do not manage any of the
traffic that comes through them, and any packet entering any port is broadcast out on all other
ports. Since every packet is being sent out through all other ports, packet collisions result—
which greatly impedes the smooth flow of traffic
Page 13
Fig 3.9 Hub
Switch
A network switch, commonly referred to as just a switch, is a network device that is used to
connect segments of a LAN (local area network) or multiple LANs and to filter and
forward packets among them. Switches have an appearance similar to hubs (because both are
box-like devices that contain a number of RJ-45 jacks), but they are actually multi-port bridges.
Router
A router is a device that connects multiple networks –including those with different protocols. A
router is an intelligent communicating device that sends or routes communication traffic to
appropriate work using fastest available path.
Page 14
Fig 3.11 Router
Page 15
Chapter-Four
4.1.1 Overview
Structured analysis uses a technique called the systems development life cycle (SDLC) to plan
and manage the systems development process. Although it is primary identified with the
structured analysis, the SDLC describes activities and functions that systems developers typically
perform, regardless of how those activities and functions fit into a particular methodology.
Fig: 4.1 System Development Life Cycle
Analysis
Analysis
Implem
Plannin
System
System
System
System
ent
g
System
operati
Succes
suppor
on and
sful
St
t
op
Review NO
Page 16
Traditionally, the SDLC is pictured as a waterfall model, where the result of phase, often called
an end product or deliverable, flows down into the next phase. In reality, the systems
development process is dynamic, and constant change is common.
Page 17
documented, and the system is installed. If the system was purchased as a package, systems
analysts perform any necessary modifications and configurations.
The objective of the implementation phase is to deliver a completely functioning and
documented information system.
There are several methodologies or models that can be used to guide the software development
lifecycle. Some of these include:
• the linear or waterfall model (which was the original SDLC method);
• the prototyping model;
• The spiral model;
• rapid application development (RAD);
• joint application development (JAD);
Page 18
4.2.1 The waterfall model
The waterfall model derives its name due to the cascading effect from one phase to the other as
mentioned in figure. In this model each phase well defined starting and ending point, with
identifiable deliveries to the next phase. This model is sometimes referred to as the linear
sequential model or the software life cycle as shown in figure 4.2.
1. In the requirements analysis phase the problem is specified along with the desired
service objectives (goals) and the constraints to them are identified
2. In the specification phase the system specification is produced from the detailed
definitions of requirement analysis above. This document should clearly define the
product function.
3. In the system and software design phase, the system specifications are translated into a
software representation. The software engineer at this stage is concerned with:
• Data structure
• Software architecture
• Interface representations
The hardware requirements are also determined at this stage along with a picture of the overall
system architecture. By the end of this stage the software engineer should be able to identify the
relationship between the hardware, software and the associated interfaces. Any faults in the
specification should ideally not be passed ‘downstream’.
Page 19
Fig: 4.2 Waterfall Model
4. In the implementation and testing phase stage the designs are translated into the
software domain
• Detailed documentation from the design phase can significantly reduce the coding
effort.
• Testing at this stage focuses on making sure that any errors are identified and that the
software meets its required specification.
5. In the integration and system testing phase all the program units are integrated and
tested to ensure that the complete system meets the software requirements. After this stage
the software is delivered to the customer [Deliverable – The software product is delivered
to the client for acceptance testing.]
6. The maintenance phase is usually the longest stage of the software. In this phase the
software is updated to:
Page 20
• Adapted to accommodate changes in the external environment
Observe that feed back loops allow for corrections to be incorporated into the model. For
example a problem/update in the design phase requires a ‘revisit’ to the specifications phase.
When changes are made at any phase, the relevant documentation should be updated to reflect
that change.
Advantages
Disadvantages
The waterfall model is the oldest and the most widely used paradigm.
However, many projects rarely follow its sequential flow. This is due to the inherent problems
associated with its rigid format. Namely:
• As The client usually only has a vague idea of exactly what is required from the
software product, this WM has difficulty accommodating the natural uncertainty that
exists at the beginning of the project.
• The customer only sees a working version of the product after it has been coded. This
may result in disaster if any undetected problems are precipitated to this stage.
Page 21
version of an information system but it meant to be only a preliminary model. Once, operational
prototype will be refined until it confirms, precisely to user requirement.
The process of developing a prototype can be broken down into following steps:
The system designer (usually an information system specialist) work with the user
along enough to capture basic information needs.
The system designer creates a working prototype quickly, using fourth generation
software, iterative multimedia, computer aided design(CAD) tools.
Page 22
• Step 3: Use the prototype
The user is encouraged to work with the system in order to determine how well the
prototype meets his/her needs and to make suggestion for improving the prototype.
The system builder notes all changes the user requests and refines the prototype
accordingly. After the prototype has been revised, the cycle returns to step 3. Step 3
and step 4 are repeated till users are not satisfied.
When no more iteration is required, the approved prototype then becomes operational prototype
that furnishes the final specification for the operations.
The process involved in this prototype can be summarized in figure. This model helps to counter
problem in waterfall model.
4.2.2.1 Advantages
4.2.2.2 Disadvantages
Page 23
4.2.3 Spiral Model
The spiral model is a software development process combining elements of both design and
prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts.
Also known as the spiral lifecycle model, it is a systems development method (SDM) used in
information technology (IT). This model of development combines the features of the
prototyping model and the waterfall model. The spiral model is intended for large, expensive and
complicated projects.
The spiral model was defined by Barry Boehm in his 1988 article "A Spiral Model of Software
Development and Enhancement". This model was not the first model to discuss iterative
development, but it was the first model to explain why the iteration matters.
As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts
with a design goal and ends with the client (who may be internal) reviewing the progress thus
far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward
the end goal of the project.
The steps in the spiral model looks like in figure 4.4 and can be generalized as follows:
1. The new system requirements are defined in as much detail as possible. This usually
involves interviewing a number of users representing all the external or internal users and
other aspects of the existing system.
2. A preliminary design is created for the new system.
3. A first prototype of the new system is constructed from the preliminary design. This is
usually a scaled-down system, and represents an approximation of the characteristics of
the final product.
4. A second prototype is evolved by a fourfold procedure:
• Evaluating the first prototype in terms of its strengths, weaknesses, and risks;
• Defining the requirements of the second prototype;
• Planning and Designing the second prototype;
• Constructing and Testing the second prototype.
Advantages
Page 24
Promotes quality assurance through prototyping at each stage in systems development
The term rapid application development (RAD) is used to describe the process of creating
workable systems much in a short period of time. This makes the use of object oriented
software tools, reusable software, prototyping, and fourth generation tools. RAD can also
include the use of visual programming and other tools for building graphical interfaces, iterative
prototyping of key system elements, the automation of program code generation, and close
teamwork between end users and information system specialists. Simple systems can be
assembled from prebuilt components. The process doesn’t have to be sequential, and key parts
of development can occur simultaneously.
Page 25
Page 26
Chapter –Five
Graphical Representations
5.1 System Concepts
A system in a simplest form can be defined as a group of interrelated or interacting elements
forming a unified whole. It is a group of interrelated components working together toward a
common goal by accepting inputs and producing outputs in an organized transformation process.
A system is defined and determined by its boundaries and objectives. A large system can be split
or decomposed into smaller sub-system up to a certain level.
• Black Box System: If the process of input transformation is not visible and
understandable, the system is said to be the black box system.
• Deterministic System: If in a system, inputs processes and output can be known with
certainty then it is called as deterministic system.
• Probabilistic system: A system is called probabilistic system if outputs can only be
predicted in probability form.
• Closed system: If the system doesn’t interact with the environment, then it is called
closed system.
• Open system: If the system has exchange with the environment and is influenced by
the environment, then it is called open system.
•
Fig 5.1 System diagram
Employee Inventory
data report
Page 27
5.3 Data Flow Diagram (DFD)
Fig 5.2: Data Flow Diagram of Inventory Management
Customer
2.0
Purchase Enter
Purchase
data and
Receipt generate
receipt
Inventory
3.0 Sales data
data 4.0
Update
sales Product data Update
record inventory
Formatted used
Formatted Inventory
Sales data data
D1 Inventory Summarized
inventory
5.0 report
Inventory
added Inventory Generate Supervisor
data inventory
1.0
level report
Product
Update
data
inventory
Store added and
assign
Bar code barcode
Page 28
Chapter-Six
Ethical and Social Issues in Information System
6.1 Introduction
Ethics means the way which guide individuals to judge their behaviors as right or wrong. New
different ethical issues are raised by the information systems for both individual and societies as
information system create new opportunities for individuals and make easy in lots of issues
which make subject of legal operations. With the rise of the Internet and electronic commerce it
has been easy to assemble, integrate, and distribute information, unleashing information about
customers. This has raised the issues of the protection of personal privacy, and the protection of
intellectual property.
Ethical issues raised by information systems are:
Page 29
Information Rights and Obligations: What information rights do individuals and organizations
posses with respect to information about themselves? What they protect? What obligations do
individuals and organizations have concerning this information?
Property Rights and Obligations: How will traditional Intellectual Property Rights be
protected in a digital society in which tracing and accounting for ownership is difficult and
ignoring such property rights is so easy
Accountability And Control: Who can and will be held accountable and liable for the harm
done to individual and collective information and property rights?
System Quality: What standards of data and system quality should we demand to protect
individual rights and safety of society?
Quality Of Life: What values should be preserved in information and knowledge based society?
Which institutions should we protect from violation? Which cultural values and practices are
supposed by the new information technology?
Page 30