SlideShare a Scribd company logo
1 of 11
INFORMATION SYSTEM
DATA INFORMATION INFORMATION SYSTEM process raw fact meaningful unprocessed fact is a collection of hardware, software, data, people and procedure that collects data, process data and provide information
DATA PROCEDURE HARDWARE SOFTWARE PEOPLE Information System Component
FIVE TYPE OF INFORMATION SYSTEM Transaction Processing System  Management Information System  Decision Support System  Executive Information System  Expert System  1 2 3 4 5
BIT BYTE FIELD RECORD 0 01000001 TABLE Afiqah bt. Salahudin 1 Afiqah bt. Salahudin 80 57 57 64 85 1 byte = 8 bits smallest unit  0 or 1 field is represented by a column record is represented by a row
DATABASE DATABASE MANAGEMENT SYSTEM Microsoft Access Oracle OpenOffice.org Base
SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE WORD PROCESSOR PRESENTATION SPREADSHEET DATABASE (DBMS) GRAPHIC UTILITY OPERATING SYSTEM GAMES
PRIMARY KEY FOREIGN KEY Primary key is a field that  contains a value uniquely  identifies each record  in the table.  A foreign key is a field in  a relational table that  matches the primary  key column of another table.
TABLE FORM QUERY REPORT RELATIONSHIP
BASIC OPERATION
Documentation 5 4 Implementation 3 2 Analysis 1 6

More Related Content

Viewers also liked

Input and Output
Input and OutputInput and Output
Input and OutputSean Chia
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Networkvasanthimuniasamy
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Satellite data network communication
Satellite data network communicationSatellite data network communication
Satellite data network communicationBowla
 
Network topologies
Network topologiesNetwork topologies
Network topologiesOnline
 
Block diagram of computer 02
Block diagram of computer 02Block diagram of computer 02
Block diagram of computer 02ZTE Nepal
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2Zafar Ayub
 
Network communication devices
Network communication devicesNetwork communication devices
Network communication devices774474
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shuklaananya_shukla
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devicesHarman Grewal
 
Communication network .ppt
Communication network  .pptCommunication network  .ppt
Communication network .pptNargis Ehsan
 

Viewers also liked (20)

Input and Output
Input and OutputInput and Output
Input and Output
 
Security
SecuritySecurity
Security
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Programming
ProgrammingProgramming
Programming
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Satellite data network communication
Satellite data network communicationSatellite data network communication
Satellite data network communication
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Block diagram of computer 02
Block diagram of computer 02Block diagram of computer 02
Block diagram of computer 02
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Network communication devices
Network communication devicesNetwork communication devices
Network communication devices
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
 
Multimedia
MultimediaMultimedia
Multimedia
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Communication network .ppt
Communication network  .pptCommunication network  .ppt
Communication network .ppt
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Similar to Information system

Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answersmkengkilili2011
 
Database Performance
Database PerformanceDatabase Performance
Database PerformanceBoris Hristov
 
Library management system
Library management systemLibrary management system
Library management systemParesh Gosavi
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Yashpal Rathore
 
Dfd over flowcharts
Dfd over flowcharts Dfd over flowcharts
Dfd over flowcharts Ashwathy Nair
 
eBay EDW元数据管理及应用
eBay EDW元数据管理及应用eBay EDW元数据管理及应用
eBay EDW元数据管理及应用mysqlops
 
Week 1 Lab Directions
Week 1 Lab DirectionsWeek 1 Lab Directions
Week 1 Lab Directionsoudesign
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifahalish sha
 
Chapter 6-information system
Chapter 6-information systemChapter 6-information system
Chapter 6-information systemAten Kecik
 
Chapter 5: Database Systems, Data Centers, and Business Intelligence
Chapter 5: Database Systems, Data Centers, and Business IntelligenceChapter 5: Database Systems, Data Centers, and Business Intelligence
Chapter 5: Database Systems, Data Centers, and Business Intelligencephak_09
 
System Data Modelling Tools
System Data Modelling ToolsSystem Data Modelling Tools
System Data Modelling ToolsLiam Dunphy
 
Prague data management meetup 2017-03-28
Prague data management meetup 2017-03-28Prague data management meetup 2017-03-28
Prague data management meetup 2017-03-28Martin Bém
 
Library management sytem
Library management sytemLibrary management sytem
Library management sytemashu6
 

Similar to Information system (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 6 (information system) answer
Chapter 6 (information system) answerChapter 6 (information system) answer
Chapter 6 (information system) answer
 
Database Performance
Database PerformanceDatabase Performance
Database Performance
 
Library management system
Library management systemLibrary management system
Library management system
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech)
 
Dfd over flowcharts
Dfd over flowcharts Dfd over flowcharts
Dfd over flowcharts
 
eBay EDW元数据管理及应用
eBay EDW元数据管理及应用eBay EDW元数据管理及应用
eBay EDW元数据管理及应用
 
Week 1 Lab Directions
Week 1 Lab DirectionsWeek 1 Lab Directions
Week 1 Lab Directions
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifah
 
Chapter 6-information system
Chapter 6-information systemChapter 6-information system
Chapter 6-information system
 
Chapter 5: Database Systems, Data Centers, and Business Intelligence
Chapter 5: Database Systems, Data Centers, and Business IntelligenceChapter 5: Database Systems, Data Centers, and Business Intelligence
Chapter 5: Database Systems, Data Centers, and Business Intelligence
 
Alteryx workflow 10,000 feet view
Alteryx workflow 10,000 feet viewAlteryx workflow 10,000 feet view
Alteryx workflow 10,000 feet view
 
System Data Modelling Tools
System Data Modelling ToolsSystem Data Modelling Tools
System Data Modelling Tools
 
Ch10
Ch10Ch10
Ch10
 
Database Basics
Database BasicsDatabase Basics
Database Basics
 
D.dsgn + dbms
D.dsgn + dbmsD.dsgn + dbms
D.dsgn + dbms
 
Prague data management meetup 2017-03-28
Prague data management meetup 2017-03-28Prague data management meetup 2017-03-28
Prague data management meetup 2017-03-28
 
01 Microsoft Access
01 Microsoft Access01 Microsoft Access
01 Microsoft Access
 
Library management sytem
Library management sytemLibrary management sytem
Library management sytem
 
27 fcs157al1
27 fcs157al127 fcs157al1
27 fcs157al1
 

More from Sean Chia

Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015Sean Chia
 
Network cabling
Network cablingNetwork cabling
Network cablingSean Chia
 
Generation of Computer
Generation of ComputerGeneration of Computer
Generation of ComputerSean Chia
 
Authentication
AuthenticationAuthentication
AuthenticationSean Chia
 
System software
System softwareSystem software
System softwareSean Chia
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and TestingSean Chia
 

More from Sean Chia (7)

Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015
 
Network cabling
Network cablingNetwork cabling
Network cabling
 
Generation of Computer
Generation of ComputerGeneration of Computer
Generation of Computer
 
Authentication
AuthenticationAuthentication
Authentication
 
System software
System softwareSystem software
System software
 
Motherboard
MotherboardMotherboard
Motherboard
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and Testing
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Information system

  • 2. DATA INFORMATION INFORMATION SYSTEM process raw fact meaningful unprocessed fact is a collection of hardware, software, data, people and procedure that collects data, process data and provide information
  • 3. DATA PROCEDURE HARDWARE SOFTWARE PEOPLE Information System Component
  • 4. FIVE TYPE OF INFORMATION SYSTEM Transaction Processing System Management Information System Decision Support System Executive Information System Expert System 1 2 3 4 5
  • 5. BIT BYTE FIELD RECORD 0 01000001 TABLE Afiqah bt. Salahudin 1 Afiqah bt. Salahudin 80 57 57 64 85 1 byte = 8 bits smallest unit 0 or 1 field is represented by a column record is represented by a row
  • 6. DATABASE DATABASE MANAGEMENT SYSTEM Microsoft Access Oracle OpenOffice.org Base
  • 7. SOFTWARE SYSTEM SOFTWARE APPLICATION SOFTWARE WORD PROCESSOR PRESENTATION SPREADSHEET DATABASE (DBMS) GRAPHIC UTILITY OPERATING SYSTEM GAMES
  • 8. PRIMARY KEY FOREIGN KEY Primary key is a field that contains a value uniquely identifies each record in the table. A foreign key is a field in a relational table that matches the primary key column of another table.
  • 9. TABLE FORM QUERY REPORT RELATIONSHIP
  • 11. Documentation 5 4 Implementation 3 2 Analysis 1 6