SlideShare a Scribd company logo
1 of 44
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
1
Management
Information Systems,
10/e
Raymond McLeod and George
Schell
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
2
Chapter 5
Computing and Communications
Resources
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
3
Learning Objectives
► Know the various computer components.
► Know about personal computing devices.
► Understand the implications of the rapid advances
in information and communication technologies.
► Be familiar with input and output resources.
► Recognize how different storage media differ and
the advantages of each.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
4
Learning Objectives (Cont’d)
► Know the advantages of prewritten software.
► Understand the different computer networking
strategies.
► Understand how communications over the public
telephone system and networks differ.
► Know about network protocols.
► Distinguish between intranets, extranets, and the
Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
5
Hardware & Processors
►Mainframes are large computers used for
centralized information systems.
►Microcomputers or PCs are computers
used by one person.
►Processor (CPU) is where data processing
is performed.
►Processor speed is measured by the # of
cycles that occur per second.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
6
Processors
►MHz stands for millions of cycles per
second.
►Word is the measure of how many bits can
be moved with one cycle of the processor.
►Word size is how many characters, “A”,
can be moved in a single cycle of the
processor.
►Power is affected by both word size &
processor speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
7
Table 5.1 Major Computer
Components
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
8
Memory & Storage
►Memory (primary storage or RAM) is
the storage area on the computer’s circuit
board.
 Volatile
 Extremely fast
►Fixed storage is permanently installed in
the computer.
►Removable storage media – tape, disk,
CD, DVD, USB flash drive, etc.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
9
Figure 5.2 Motherboard
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
10
Input Devices
►Human-captured data refers to input
captured by a person typing on a keyboard,
clicking a mouse, speaking into a
microphone, or a similar interaction.
►Machine-captured data is data captured
by an electronic or mechanical device.
►Point-of-sale terminals are scanners
used in retail stores.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
11
Output Devices
►Monitor
 Screen resolution, size 17-19’’ diagonals.
 Graphic user interface (GUI).
►Printers
 Lasers are like copier machines.
 Ink-jets spray ink.
►Multimedia is the use of more than 1
medium at a time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
12
Personal Computing Devices
►Cell phones with interactive messaging &
video
►Smart cell phones are phones that perform
tasks associated with PCs i.e. BlackBerry
7270, Treo 650.
►Global Systems for Mobile
Communications (GSM) digital cellular
phone protocol.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
13
Home Networks
►Home computer networks assess the
Internet via cable modems or DSL
modems.
►Setup usually requires the modem, network
card(s), wireless router.
►Wireless security uses Wired equivalent
privacy (WEP) which encrypts the data
transferred between the computer &
wireless router.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
14
Home Computing Security
►Updates for OS an application software.
 For security & efficiency.
 Microsoft Update.
►Hackers are people who try to break into
computer systems in order to
 Gather information;
 Deny the owner access to his resources;
 Delete files;
 Disrupt the use by the owner.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
15
Home Computing Security (Cont’d)
►Viruses are small computer programs that
replicate by inserting themselves into
computer resources such as programs or
files.
►Worms are self-contained files or programs
 Does not have to attach to program or file.
 Can delete, change files, send e-mails, and
cause problems.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
16
Home Computing Security (Cont’d)
►Denial-of-service attack is when the user
is denied access to the services of the
computer because it is overwhelmed with e-
mail.
►Antivirus software – Norton, MacAfee,
etc. Keep virus definitions updated
►Spyware – Microsoft Defender, Lavasoft
Ad-Aware, etc. Free from Microsoft.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
17
Software
►System software (OS) performs certain
tasks that all computers require.
 Hardware interfaces, device drivers.
 Manage computer’s processes.
 OS – Windows XP, Unix, Mac OS X, Linux.
►Application software processes the user’s
data.
►Prewritten application software is
produced by suppliers and sold to users.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
18
Application Software
►Custom application software is when
programmers for the business write the
software.
►User-written software in End-User
Computing is created by the user, such as
Excel Macros, Access Wizards.
►User-friendly software is computer
software that is simple & intuitive to use.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
19
Communications
►Protocol is the specification for formatting
data to be transferred between
communications equipment.
►Public connections
 Telephone modems
 Integrated Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
20
Table 5.4 Connecting to the Internet
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
21
Communications (Cont’d)
►Packet is a piece of the total data to be
communicated, includes sender & receiver
addresses.
►Cable modems connect to the Internet via
coaxial cable.
►Asynchronous transfer mode (ATM)
 Improve data transmission rates.
 Increased speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
22
Private Line
►Circuit is a connection that is always
connected.
►Private line is a circuit that is always open
to your communication traffic.
 T-1 line over 1.5 Mbps; T-3 at 43 Mbps.
 Multiplexed is when the line is broken into
separate lanes of communication.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
23
Virtual Private Networks
► Virtual Private Networks (VPNs) allow you to
use the security & speed of a private line but still
use the low-cost Internet.
► Tunneling software establishes the set of
intermediary locations of the telephone equipment
that will host a given data communications
transfer.
► Privacy is attained because the tunnel is not
established unless the sending & receiving
computers authenticate one another.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
24
Communications - Networks
► Open Systems Interconnection (OSI)
standard architecture for network connections
established by the ISO.
► Terminal is a device that has no storage or
processor; it allows for entering & displaying data
for the computer.
► Systems Network Architecture (SNA) is a
protocol for large computers; it polls other
computers connected by the network for transfers.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
25
Table 5.5 OSI Reference Model
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
26
Networks (Cont’d)
►Token ring is a peer-to-peer protocol
that allows each computer to act as its own
controller.
►Ethernet is an open protocol for peer-to-
peer communications.
 IEEE endorses
►Data transmission crash is when two
peer computers try to send data at the
same time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
27
Figure 5.11 Token Ring Protocol
Example
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
28
Networks (Cont’d)
►Data packet is a piece of the total data to
be communicated, combined with the
address of the destination computer, the
sending computer, and other control
information.
►Transmission Control
Protocol/Internet Protocol (TCP/IP)
 TCP conducts communication over the network.
 IP handles the packets so they can be routed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
29
Networks (Cont’d)
►IP address is a four-part set of numbers
(each from 0 to 255), separated by periods.
►Network interface card (NIC) is used to
attach a device to the communications
medium.
►Local Area Networks (LANs) is a group
of computers and other devices that are
connected together by a communications
medium.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
30
Table 5.6 Communications Network
Hardware
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
31
Networks (Cont’d)
►Medium used by LANs can be copper wire,
wireless, fiber-optics, or other media.
►LANs join computers that are physically
located together.
 Same room or building.
 Total distance is less than ½ mile.
 60 ft. between devices.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
32
Networks (Cont’d)
►Metropolitan area network (MAN) is a
network that has a physical distance limit of
roughly 30 miles.
►Wide are networks (WANs) are used to
connect computers and other devices when
the distance exceeds the constraints of
LANs & MANs.
 Uses common carrier, public telephone system.
 WANs have been replaced by the Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
33
Internet, Intranet & Extranet
►Internet is just a collection of networks
that can be joined together; Public.
►Intranet uses the same network protocols
as the Internet but limits accessibility to
computer resources to a select group of
persons in the organization.
►Extranet is when the intranet is expanded
to include users beyond the firm; Trusted
customers & business partners.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
34
Convergence of Computing &
Communications
►Computing devices & communications
devices are now incorporating features of
the other into themselves.
►Voice over Internet Protocol (VoIP) is
the routing of voice communications over
the Internet as if they were digital
communications.
 WWW.SKYPE.COM – free software
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
35
Mainframe Computer
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
36
Personal Computer (PC)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
37
PC System
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
38
Static RAM / SRAM Dinamic RAM / DRAM
EDORAM
(Extended Data
Out RAM )
72 pin
SDRAM
168 pin
PROM
EPROM
EEPROM
Memory
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
39
Hard disk
Removable Storage
Floppy disk
Floppy drive
CD
Flash disk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
40
Cylinder, sector, track pada harddisk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
41
Hard disk layout
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
42
Input Device
Keyboard
Mouse
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
43
Monitor
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
44
Printer & Plotter
Printer Dot Matrik
Printer Ink Jet
Plotter

More Related Content

What's hot

What's hot (20)

Data Modeling & Metadata Management
Data Modeling & Metadata ManagementData Modeling & Metadata Management
Data Modeling & Metadata Management
 
‏‏‏‏‏‏‏‏‏‏‏‏Chapter 13: Professional Development
‏‏‏‏‏‏‏‏‏‏‏‏Chapter 13: Professional Development‏‏‏‏‏‏‏‏‏‏‏‏Chapter 13: Professional Development
‏‏‏‏‏‏‏‏‏‏‏‏Chapter 13: Professional Development
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
 
Tugas besar 1 ppt sim - kelompok 2
Tugas besar 1 ppt   sim - kelompok 2Tugas besar 1 ppt   sim - kelompok 2
Tugas besar 1 ppt sim - kelompok 2
 
Sistem Informasi Manajemen
Sistem Informasi ManajemenSistem Informasi Manajemen
Sistem Informasi Manajemen
 
Business Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data StrategiesBusiness Value Through Reference and Master Data Strategies
Business Value Through Reference and Master Data Strategies
 
Big Data Fabric Capability Maturity Model
Big Data Fabric Capability Maturity ModelBig Data Fabric Capability Maturity Model
Big Data Fabric Capability Maturity Model
 
Webinar Vault IT: Analítica avanzada y Machine Learning con virtualización de...
Webinar Vault IT: Analítica avanzada y Machine Learning con virtualización de...Webinar Vault IT: Analítica avanzada y Machine Learning con virtualización de...
Webinar Vault IT: Analítica avanzada y Machine Learning con virtualización de...
 
4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem4 pengguna dan pengembang sistem
4 pengguna dan pengembang sistem
 
Sim, nadhifa hanan maulani, hapzi ali, implementasi sistem informasi pada sta...
Sim, nadhifa hanan maulani, hapzi ali, implementasi sistem informasi pada sta...Sim, nadhifa hanan maulani, hapzi ali, implementasi sistem informasi pada sta...
Sim, nadhifa hanan maulani, hapzi ali, implementasi sistem informasi pada sta...
 
Glossaries, Dictionaries, and Catalogs Result in Data Governance
Glossaries, Dictionaries, and Catalogs Result in Data GovernanceGlossaries, Dictionaries, and Catalogs Result in Data Governance
Glossaries, Dictionaries, and Catalogs Result in Data Governance
 
Enterprise Master Data Architecture
Enterprise Master Data ArchitectureEnterprise Master Data Architecture
Enterprise Master Data Architecture
 
OLAP
OLAPOLAP
OLAP
 
Sistem Basis Data 1
Sistem Basis Data 1Sistem Basis Data 1
Sistem Basis Data 1
 
Perilaku Dalam Organisasi
Perilaku Dalam OrganisasiPerilaku Dalam Organisasi
Perilaku Dalam Organisasi
 
Capturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And ReportsCapturing Business Requirements For Scorecards, Dashboards And Reports
Capturing Business Requirements For Scorecards, Dashboards And Reports
 
Decision support system
Decision support systemDecision support system
Decision support system
 
Analisis laporan keuangan
Analisis laporan keuanganAnalisis laporan keuangan
Analisis laporan keuangan
 
Sessi 7 sistem informasi manajemen
Sessi 7   sistem informasi manajemenSessi 7   sistem informasi manajemen
Sessi 7 sistem informasi manajemen
 
MATERI VALUE AT RISK (VAR)
MATERI VALUE AT RISK (VAR)MATERI VALUE AT RISK (VAR)
MATERI VALUE AT RISK (VAR)
 

Similar to SIM - Mc leod ch05

SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
Welly Tjoe
 
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
Welly Tjoe
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
cockekeshia
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 

Similar to SIM - Mc leod ch05 (20)

MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
 
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
 
Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_
 
Netwoking
NetwokingNetwoking
Netwoking
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
 
Mini final docmtn final
Mini final docmtn finalMini final docmtn final
Mini final docmtn final
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
5[1]
5[1]5[1]
5[1]
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Modules1
Modules1Modules1
Modules1
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 

More from Welly Tjoe

SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
Welly Tjoe
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
Welly Tjoe
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
Welly Tjoe
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
Welly Tjoe
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
Welly Tjoe
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
Welly Tjoe
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
Welly Tjoe
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
Welly Tjoe
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
Welly Tjoe
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
Welly Tjoe
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edar
Welly Tjoe
 

More from Welly Tjoe (12)

Etika bisnis
Etika bisnisEtika bisnis
Etika bisnis
 
SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edar
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

SIM - Mc leod ch05

  • 1. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and George Schell
  • 2. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 2 Chapter 5 Computing and Communications Resources
  • 3. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 3 Learning Objectives ► Know the various computer components. ► Know about personal computing devices. ► Understand the implications of the rapid advances in information and communication technologies. ► Be familiar with input and output resources. ► Recognize how different storage media differ and the advantages of each.
  • 4. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 4 Learning Objectives (Cont’d) ► Know the advantages of prewritten software. ► Understand the different computer networking strategies. ► Understand how communications over the public telephone system and networks differ. ► Know about network protocols. ► Distinguish between intranets, extranets, and the Internet.
  • 5. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 5 Hardware & Processors ►Mainframes are large computers used for centralized information systems. ►Microcomputers or PCs are computers used by one person. ►Processor (CPU) is where data processing is performed. ►Processor speed is measured by the # of cycles that occur per second.
  • 6. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 6 Processors ►MHz stands for millions of cycles per second. ►Word is the measure of how many bits can be moved with one cycle of the processor. ►Word size is how many characters, “A”, can be moved in a single cycle of the processor. ►Power is affected by both word size & processor speed.
  • 7. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 7 Table 5.1 Major Computer Components
  • 8. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 8 Memory & Storage ►Memory (primary storage or RAM) is the storage area on the computer’s circuit board.  Volatile  Extremely fast ►Fixed storage is permanently installed in the computer. ►Removable storage media – tape, disk, CD, DVD, USB flash drive, etc.
  • 9. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 9 Figure 5.2 Motherboard
  • 10. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 10 Input Devices ►Human-captured data refers to input captured by a person typing on a keyboard, clicking a mouse, speaking into a microphone, or a similar interaction. ►Machine-captured data is data captured by an electronic or mechanical device. ►Point-of-sale terminals are scanners used in retail stores.
  • 11. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 11 Output Devices ►Monitor  Screen resolution, size 17-19’’ diagonals.  Graphic user interface (GUI). ►Printers  Lasers are like copier machines.  Ink-jets spray ink. ►Multimedia is the use of more than 1 medium at a time.
  • 12. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 12 Personal Computing Devices ►Cell phones with interactive messaging & video ►Smart cell phones are phones that perform tasks associated with PCs i.e. BlackBerry 7270, Treo 650. ►Global Systems for Mobile Communications (GSM) digital cellular phone protocol.
  • 13. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 13 Home Networks ►Home computer networks assess the Internet via cable modems or DSL modems. ►Setup usually requires the modem, network card(s), wireless router. ►Wireless security uses Wired equivalent privacy (WEP) which encrypts the data transferred between the computer & wireless router.
  • 14. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 14 Home Computing Security ►Updates for OS an application software.  For security & efficiency.  Microsoft Update. ►Hackers are people who try to break into computer systems in order to  Gather information;  Deny the owner access to his resources;  Delete files;  Disrupt the use by the owner.
  • 15. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 15 Home Computing Security (Cont’d) ►Viruses are small computer programs that replicate by inserting themselves into computer resources such as programs or files. ►Worms are self-contained files or programs  Does not have to attach to program or file.  Can delete, change files, send e-mails, and cause problems.
  • 16. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 16 Home Computing Security (Cont’d) ►Denial-of-service attack is when the user is denied access to the services of the computer because it is overwhelmed with e- mail. ►Antivirus software – Norton, MacAfee, etc. Keep virus definitions updated ►Spyware – Microsoft Defender, Lavasoft Ad-Aware, etc. Free from Microsoft.
  • 17. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 17 Software ►System software (OS) performs certain tasks that all computers require.  Hardware interfaces, device drivers.  Manage computer’s processes.  OS – Windows XP, Unix, Mac OS X, Linux. ►Application software processes the user’s data. ►Prewritten application software is produced by suppliers and sold to users.
  • 18. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 18 Application Software ►Custom application software is when programmers for the business write the software. ►User-written software in End-User Computing is created by the user, such as Excel Macros, Access Wizards. ►User-friendly software is computer software that is simple & intuitive to use.
  • 19. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 19 Communications ►Protocol is the specification for formatting data to be transferred between communications equipment. ►Public connections  Telephone modems  Integrated Services Digital Network (ISDN)  Digital Subscriber Line (DSL)
  • 20. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 20 Table 5.4 Connecting to the Internet
  • 21. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 21 Communications (Cont’d) ►Packet is a piece of the total data to be communicated, includes sender & receiver addresses. ►Cable modems connect to the Internet via coaxial cable. ►Asynchronous transfer mode (ATM)  Improve data transmission rates.  Increased speed.
  • 22. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 22 Private Line ►Circuit is a connection that is always connected. ►Private line is a circuit that is always open to your communication traffic.  T-1 line over 1.5 Mbps; T-3 at 43 Mbps.  Multiplexed is when the line is broken into separate lanes of communication.
  • 23. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 23 Virtual Private Networks ► Virtual Private Networks (VPNs) allow you to use the security & speed of a private line but still use the low-cost Internet. ► Tunneling software establishes the set of intermediary locations of the telephone equipment that will host a given data communications transfer. ► Privacy is attained because the tunnel is not established unless the sending & receiving computers authenticate one another.
  • 24. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 24 Communications - Networks ► Open Systems Interconnection (OSI) standard architecture for network connections established by the ISO. ► Terminal is a device that has no storage or processor; it allows for entering & displaying data for the computer. ► Systems Network Architecture (SNA) is a protocol for large computers; it polls other computers connected by the network for transfers.
  • 25. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 25 Table 5.5 OSI Reference Model
  • 26. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 26 Networks (Cont’d) ►Token ring is a peer-to-peer protocol that allows each computer to act as its own controller. ►Ethernet is an open protocol for peer-to- peer communications.  IEEE endorses ►Data transmission crash is when two peer computers try to send data at the same time.
  • 27. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 27 Figure 5.11 Token Ring Protocol Example
  • 28. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 28 Networks (Cont’d) ►Data packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information. ►Transmission Control Protocol/Internet Protocol (TCP/IP)  TCP conducts communication over the network.  IP handles the packets so they can be routed.
  • 29. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 29 Networks (Cont’d) ►IP address is a four-part set of numbers (each from 0 to 255), separated by periods. ►Network interface card (NIC) is used to attach a device to the communications medium. ►Local Area Networks (LANs) is a group of computers and other devices that are connected together by a communications medium.
  • 30. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 30 Table 5.6 Communications Network Hardware
  • 31. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 31 Networks (Cont’d) ►Medium used by LANs can be copper wire, wireless, fiber-optics, or other media. ►LANs join computers that are physically located together.  Same room or building.  Total distance is less than ½ mile.  60 ft. between devices.
  • 32. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 32 Networks (Cont’d) ►Metropolitan area network (MAN) is a network that has a physical distance limit of roughly 30 miles. ►Wide are networks (WANs) are used to connect computers and other devices when the distance exceeds the constraints of LANs & MANs.  Uses common carrier, public telephone system.  WANs have been replaced by the Internet.
  • 33. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 33 Internet, Intranet & Extranet ►Internet is just a collection of networks that can be joined together; Public. ►Intranet uses the same network protocols as the Internet but limits accessibility to computer resources to a select group of persons in the organization. ►Extranet is when the intranet is expanded to include users beyond the firm; Trusted customers & business partners.
  • 34. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 34 Convergence of Computing & Communications ►Computing devices & communications devices are now incorporating features of the other into themselves. ►Voice over Internet Protocol (VoIP) is the routing of voice communications over the Internet as if they were digital communications.  WWW.SKYPE.COM – free software
  • 35. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 35 Mainframe Computer
  • 36. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 36 Personal Computer (PC)
  • 37. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 37 PC System
  • 38. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 38 Static RAM / SRAM Dinamic RAM / DRAM EDORAM (Extended Data Out RAM ) 72 pin SDRAM 168 pin PROM EPROM EEPROM Memory
  • 39. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 39 Hard disk Removable Storage Floppy disk Floppy drive CD Flash disk
  • 40. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 40 Cylinder, sector, track pada harddisk
  • 41. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 41 Hard disk layout
  • 42. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 42 Input Device Keyboard Mouse
  • 43. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 43 Monitor
  • 44. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 44 Printer & Plotter Printer Dot Matrik Printer Ink Jet Plotter