SlideShare a Scribd company logo
1 of 61
Kenneth J. Sousa Effy Oz
MANAGEMENT
INFORMATION
SYSTEMS
Seventh Edition
Chapter 6
Business Networks and
Telecommunications
© Cengage Learning 2015
Objectives
• Describe business and home applications of
digital telecommunications
• Identify the major media and devices used in
telecommunications
• Explain the concept of network protocols
• Compare and contrast various networking and
Internet services
© Cengage Learning 2015 2
Objectives (cont'd.)
• List networking technologies and trends that are
likely to have an impact on businesses and
information management in the near future
• Discuss the pros and cons of telecommuting
© Cengage Learning 2015 3
Telecommunications in Business
• Telecommunications: the transmittal of data and
information from one point to another
– Allows communications over large distances
• Telephone, e-mail, and the web rely on fast,
reliable telecommunications
• Networking technologies have brought about
several improvements to business processes
© Cengage Learning 2015 4
Telecommunications in Business (cont'd.)
• Telecommunications-supported improvements
– Business communication, including e-mail, voice
mail, instant messaging, faxing, file transfer,
mobile telephony, and teleconferencing
– Greater efficiency: information delivery is
immediate and not constrained by geographical
distance
– Better distribution of data: central storage with
both local and remote access
© Cengage Learning 2015 5
Telecommunications in Business (cont'd.)
• Improvements (cont'd.)
– Instant transactions, using web and wireless
technologies
– Flexible and mobile workforce: telecommuting
and wireless connectivity for remote workers
– Alternative channels: voice, radio, television now
available via the Web also
• Network security is a challenge
© Cengage Learning 2015 6
Telecommunications in Daily Use
• Cellular phones
• Videoconferencing
• Wireless payments and warehousing
• Peer-to-peer (P2P) file sharing
• Web-empowered commerce
© Cengage Learning 2015 7
Cellular Phones
• Name is derived from areas of service, called
cells
• Each cell has a computerized transceiver
– Transmits and receives signals
• Can transmit and receive calls almost anywhere
• Cell phones provide other capabilities, including:
– Email
– Digital cameras
– GPS
• Major advantage is mobility
© Cengage Learning 2015 8
Videoconferencing
• Videoconferencing: transmitted images and
speech
• Brings together conference rooms that are
thousands of miles apart
• Produces savings in multiple areas, including:
– Travel
– Lodging
– Car fleets
– Employees’ time
© Cengage Learning 2015 9
Wireless Payments and Warehousing
• Radio frequency identification (RFID):
– Enables rapid transactions and payments
– Used at gas stations for payment at pump
– Used in vehicles for automatic road toll payment
– Used to track and locate items in warehouses
• Near-field communication (NFC): a standard
communication protocol to create a radio
connection between two devices
– Mobile payment
– Electronic wallet
© Cengage Learning 2015 10
Peer-to-Peer File Sharing
• Peer-to-peer (P2P) file sharing: used to locate
and download files from any online computer
through Internet using applications such as:
– LimeWire
– BitTorrent
– Vuze
• Used extensively to download music and video
files, often in violation of copyright laws
• Concerns include security and malware
© Cengage Learning 2015 11
Web-Empowered Commerce
• Increasingly fast communication allows
organizations and individuals to:
– Conduct business
– Research
– Market
– Educate and train
– Shop, purchase, and pay
• Entire industries have been created by the web,
such as online exchanges and auctions
© Cengage Learning 2015 12
Bandwidth and Media
• Professionals should understand technology
concepts:
– To participate in decision making
– In order to select networking equipment and
services
• Bandwidth and networking media are important
considerations
© Cengage Learning 2015 13
Bandwidth
• Bandwidth: speed at which data is
communicated
– Also called transmission rate or bit rate
• Bits per second (bps): unit of measure for
bandwidth
• Broadband: communications medium that can
carry multiple transmissions simultaneously
– Examples: cable television, DSL (digital
subscriber line), fiber-optic cables, and most
wireless connections
© Cengage Learning 2015 14
© Cengage Learning 2015 15
Figure 6.1 Transmission speed measurement units © Cengage
Learning 2015
Media
• Several types of communications media
• Tangible media includes:
– Twisted pair cable
– Coaxial cable
– Optical fiber
• Intangible media includes:
– Microwave radio technologies
© Cengage Learning 2015 16
© Cengage Learning 2015 17
Figure 6.2 Networking media © Cengage Learning 2015
Media (cont'd.)
• Twisted pair cable: pairs of insulated copper
wires twisted together
– Flexible, reliable, and low cost
– Connects devices with RJ-45 plug-in connector
• Coaxial cable: for cable television transmission
– Used for Internet connections via cable
• Optical fiber: uses light to represent bits
– Not susceptible to EMI (electromagnetic
interference)
– Can carry signals for long distances
© Cengage Learning 2015 18
Media (cont'd.)
• Radio frequency (RF) technologies: use radio
waves to carry bits
– Popular examples: Wi-Fi and Bluetooth
• Microwaves: high-frequency radio waves that
can carry signals over long distances with high
accuracy
– For outside transmission, weather conditions may
degrade the quality
• Microwave signals can be transmitted by
satellite links
© Cengage Learning 2015 19
Media (cont'd.)
• Electrical power lines: electrical power grid can
be used for telecommunication
– Broadband over Power Lines (BPL) or Power
Line Communication (PLC)
• Network media acquisition considerations
– Availability
– Current and potential bandwidth
– Vulnerability to EMI or radio frequency
interference (RFI)
© Cengage Learning 2015 20
Networks
• Network: combination of devices (or nodes)
connected through a communication media
• Any compatible device that can transmit and
receive on a network can be part of a network
© Cengage Learning 2015 21
Types of Networks
• Computer networks are classified by reach and
complexity
• Basic types of networks: LANs, MANs, and
WANs
• Local area networks (LAN): established by a
single organization and shared among
employees
– Server-based LAN: central server controls
communications
– Peer-to-peer LAN: no central device
© Cengage Learning 2015 22
Types of Networks (cont'd.)
• Wireless LANs (WLANs) offer advantages
– Easier installation
– More scalable
– More flexible: equipment is easily moved
• Scalability: ease of expanding a system
• WLAN drawback: wireless networks are less
secure than wired LANs
© Cengage Learning 2015 23
Types of Networks (cont'd.)
• Metropolitan area network (MAN):
– Links multiple LANs within a large city
– Uses fiber optic or wireless broadband
connections between LANs
• Wide area network (WAN): far-reaching system
of networks composed of LANs or MANs
– May be public or private
© Cengage Learning 2015 24
Types of Networks (cont'd.)
• Value-added networks (VANs):
– Are networks with enhanced services offered by
outside vendors
– Provide reliability, management, and
maintenance of networks for an organization
• Internet service providers (ISPs)
– Preferred method of conducting e-commerce
– Less costly than VANs
© Cengage Learning 2015 25
PANs
• Personal area network (PAN): wireless network
designed for handheld and portable devices
– Used by one or two people
– Transmission speed is slower
– Maximum distance is about ten meters
© Cengage Learning 2015 26
Networking Hardware
• Networks use a variety of devices to connect
computers and peripheral devices
• Network interface card (NIC) connects a
device to a hub, switch, bridge, or router, which
connects to a LAN or WAN
• Switch: a common device often used as a
central location to connect computers or devices
to a local network
• Bridge: connects two networks
© Cengage Learning 2015 27
Networking Hardware (cont'd.)
• Router routes data packets to the next node on
the path to the final destination
• Repeater amplifies or regenerates signals
• Modem translates communication signals from
analog to digital and vice versa
• Dial-up connection: a slower type of
connection through modem, usually no faster
than 56 Kbps
© Cengage Learning 2015 28
Virtual Private Networks
• Virtual private network (VPN): a public network
connection that creates the illusion of a private
network connection
– Does not require leasing of lines
– Utilizes the Internet to simulate a private network
that only authorized users can access
– Enables the use of intranets and extranets
© Cengage Learning 2015 29
Protocols
• Protocol: set of rules governing communication
between computers
• Separate protocols are designed for:
– WANs
– LANs
– Wireless communications
• Most important set of protocols for
telecommunications and networks is called
TCP/IP
© Cengage Learning 2015 30
TCP/IP
• TCP/IP (Transmission Control Protocol/
Internet Protocol): a set of related protocols
– TCP ensures packets arrive accurately and in
proper order
– IP ensures efficient delivery of packets from node
to node
• Internet backbone: highest speed channels
• Host: a computer connected directly to a
backbone
• IP address: unique ID for each network device
© Cengage Learning 2015 31
TCP/IP (cont'd.)
• DNS (Domain Name System): associates a
character-based name with an IP address
• Static IP address: a permanent address
assigned to a device
• Dynamic IP address: temporary IP number
assigned to a device for the duration of the
connection
– Provides flexibility when the number of IP
addresses is limited
© Cengage Learning 2015 32
Ethernet
• Ethernet: LAN protocol using coaxial or Cat 5 or
6 twisted pair cable
• Gigabit Ethernet: faster Ethernet connection of
one Gbps or greater
© Cengage Learning 2015 33
Wireless Protocols
• IEEE 802.11: a family of wireless protocols
known as Wi-Fi (Wireless Fidelity)
– Supports wireless communication within 100
meters of router
– 802.11 subtypes support various distances and
speeds up to 248 Mbps
• Access point (AP): connection between
wireless device and a wired network
– Hotspot allows Internet access within range of
equipment
© Cengage Learning 2015 34
© Cengage Learning 2015 35
Figure 6.3 An example of a home using a wireless network ©
Cengage Learning 2015
Wireless Protocols (cont'd.)
• Encryption: function of protocols that scrambles
and encodes messages
– Encryption keys are shared only between sender
and receiver
• Bluetooth allows devices to communicate within
10 meters
– Transmits voice and data
– Considered a PAN technology
© Cengage Learning 2015 36
Wireless Protocols (cont'd.)
• Worldwide Interoperability for Microwave
Access (WiMAX) increases the range and
speed of wireless communication
– Works with metropolitan area networks (MANs)
– Would enable Internet connection while in a
moving vehicle
• Long-Term Evolution (LTE): a standard method
of wireless communications, specifically for high-
speed data transmission for mobile phones
– Also known as 4G LTE
© Cengage Learning 2015 37
© Cengage Learning 2015 38
Figure 6.4 How a WiMAX network works © Cengage Learning
2015
© Cengage Learning 2015 39
Figure 6.5 Wireless networking protocols © Cengage Learning
2015
Generations in Mobile Communications
• Networking professionals refer to generations of
mobile communication technologies
– First generation (1G): analog
– Second generation (2G): provided digital voice
encoding
– Third generation (3G): increased speeds that
support video, videoconferencing, and full
Internet access
– Fourth Generation (4G): digital only, with packet
switching and tighter security
© Cengage Learning 2015 40
Internet Networking Services
• Variety of options when subscribing to network
services
• Downstream: speed of receiving from network
• Upstream: speed of transmitting to network
• Services with lower rates for upstream than
downstream are suitable for most individuals
and businesses
© Cengage Learning 2015 41
© Cengage Learning 2015 42
Figure 6.6 Typical features and costs of Internet services ©
Cengage Learning 2015
© Cengage Learning 2015 43
Figure 6.6 (cont’d.) Typical features and costs of Internet
services © Cengage Learning 2015
Cable
• Internet links provided by television cable firms
• Cable connected to Internet server
• At residence, cable is split into TV set and
computer via a bridge called a cable modem
• Cable shared by all subscribers connected to
the node
– Communication speeds may slow during peak
times and as more subscribers join the service
© Cengage Learning 2015 44
Digital Subscriber Line (DSL)
• Digital subscriber line (DSL): data remains
digital through entire transmission
• Uses telephone lines connected to DSL bridge
(DSL modem)
• Transmission bit rates
– Closely related to distance from telephone
company’s central office
© Cengage Learning 2015 45
T1 and T3 Lines
• T1 and T3 lines: point-to-point dedicated digital
circuits provided by telephone companies
– T1 line is made up of 24 channels of 64 Kbps
each
– T3 line is made up of 672 channels of 64 Kbps
each
• T1 and T3 service is expensive
• Used by universities and large companies for
backbone and Internet connections
© Cengage Learning 2015 46
Satellite
• Satellite services use microwave radio
transmission
• Service provider installs dish antenna that is
tuned to a communications satellite
• Speeds up to 45 Mbps
• Used for private homes and for mobile uses
such as shipping and trucking
• Global positioning system (GPS): a free satellite
service that provides location information
© Cengage Learning 2015 47
Fixed Wireless
• Fixed wireless: point-to-point transmission
between two stationary devices, typically
between buildings
• Wireless Internet service provider (WISP)
– Specializes in fixed wireless service
• Highly modular
• Suitable for both rural and urban areas
© Cengage Learning 2015 48
Fiber to the Premises
• Connects a building to the Internet via optical
fibers
• Fiber to the Home (FTTH)
– Optical fiber reaches the subscriber’s living or
work space
• Subscribers connect computers or LAN routers
to an optical fiber socket
© Cengage Learning 2015 49
Optical Carrier
• Optical carrier (OC) provides services through
optical fiber lines
– Expensive
– Very high connection speeds
• Provides speeds in multiples of 51.84 Mbps (the
base rate bandwidth)
• Typically used by:
– ISPs
– Providers of search engines
– Content-rich or high-traffic Web sites
© Cengage Learning 2015 50
Broadband over Power Lines (BPL)
• Broadband over Power Lines (BPL) uses electric
power lines to carry digital signals
• Utility companies partner with
telecommunications companies to provide the
service
© Cengage Learning 2015 51
The Impact of Networking Technologies
• Trends likely to have a significant impact on
businesses and management of information
– Broadband telephony
– Radio frequency identification
– Convergence of digital technologies
© Cengage Learning 2015 52
Broadband Telephony
• Voice over Internet Protocol (VoIP): uses
Internet connection to conduct telephone
conversations
• Examples of companies offering IP telephony
– Vonage and Comcast
• Free services offered by Skype or iCall
• Cost effective for businesses and homes
• Experts predict convergence of cell phone and
VoIP phone
© Cengage Learning 2015 53
Radio Frequency Identification
• RFID tags are tiny and need little power
• Objects are embedded with tags that contain a
transponder (a radio transceiver activated by a
signal transmitted to it)
• Tags are encoded with electronic product code
(EPC)
• Readers decode data stored in tag’s memory
and pass the data to a host computer
• Efficient for large companies, but expensive for
smaller companies
© Cengage Learning 2015 54
© Cengage Learning 2015 55
Figure 6.7 Various examples of RFID applications in businesses
© Cengage Learning 2015
© Cengage Learning 2015 56
Figure 6.7 (cont’d.) Various examples of RFID applications in
businesses © Cengage Learning 2015
Converging Technologies
• Convergence occurs in networking technology
• Cell phones can act as Web phones using VoIP
• New television sets will connect to Internet,
cable, and satellites concurrently
• Single device to connect to any type of network
• “Smart appliances” interact with their owners
• Opportunities for businesses to provide new
information services and better manage the
salesforce
© Cengage Learning 2015 57
Converging Technologies (cont’d.)
• Portable music/video players communicate with
PCs via Wi-Fi to download files and transmit to
wireless earphones
• Cell phones read RFID tags on products
– Compare prices and make purchases
© Cengage Learning 2015 58
Summary
• Telecommunications is communication over
distance
• Telecommunications technology has changed
the business environment
• Different media have different bandwidths
• Networks are classified according to reach and
complexity
• Public network can be turned into a virtual
private network (VPN)
© Cengage Learning 2015 59
Summary (cont'd.)
• Network protocols are sets of rules to which all
devices on a network must adhere
– The Internet adheres to the TCP/IP protocol
• Wireless technologies make it easy and
affordable to create wireless LANs and hotspots
• Organizations and individuals have variety of
choices when subscribing to networking services
• As Internet links become faster, Internet
telephony, also known as Voice over Internet
Protocol (VoIP), is gaining in popularity
© Cengage Learning 2015 60
Summary (cont'd.)
• Wireless technologies support the increasingly
popular RFID technologies
• Much like hardware, telecommunications
technologies are merging
• Increasing numbers of employees now
telecommute
© Cengage Learning 2015 61
image1.png
image2.png
Kenneth J. Sousa Effy Oz
MANAGEMENT
INFORMATION
SYSTEMS
Seventh Edition
Chapter 5
Business Software
© Cengage Learning 2015
Objectives
• Explain the difference between application
software and system software
• Enumerate the different generations of
programming languages and explain how they
differ
• Cite the latest major developments in application
and system software
• Identify and explain the roles of Web
programming languages
© Cengage Learning 2015 2
Objectives (cont'd.)
• Explain the types and uses of Web site design
tools
• Clarify the differences between proprietary
software and open source software
• List characteristics that are important in
evaluating packaged software applications for
business use
• Understand the problem of software piracy and
how it affects businesses and consumers
© Cengage Learning 2015 3
Software: Instructions to the Hardware
• Applications: computer programs that
contribute to productivity
• Software: a series of instructions to a computer
to execute processes
• Two major categories of software:
– Application software: enables task completion
– System software:
• Enables applications to run on a computer
• Manages components and devices
© Cengage Learning 2015 4
Programming Languages
and Software Development Tools
• Programs are needed for every computer
operation
• Programming: process of writing programs
• Machine language: the only language that
hardware understands
– Consists of long strings of 0s and 1s
• Assembly language: easier to program than
machine language using “words” for commands
• High-level programming languages: use English-
like statements
© Cengage Learning 2015 5
Programming Languages and Software
Development Tools (cont'd.)
• Software development kits (SDKs): tools to
develop software with little knowledge of
programming languages
• Third-generation languages (3GLs): known as
“procedural” languages
– Programmer must detail logical procedure
– Includes languages such as COBOL, FORTRAN,
BASIC, RPG, Pascal, and C
– One 3GL statement = five to ten assembly
language statements
© Cengage Learning 2015 6
Programming Languages and Software
Development Tools (cont'd.)
• Fourth-generation languages (4GLs): use more
English-like statements
– Speed up the development process
– Built around database management systems
– Include many preprogrammed procedures
– One 4GL statement = several 3GL statements
– Structured Query Language (SQL) is an example
• Debugging: process of locating and fixing
program errors
© Cengage Learning 2015 7
© Cengage Learning 2015 8
Figure 5.1 The evolution of programming languages
© Cengage Learning 2015
© Cengage Learning 2015 9
Figure 5.2 Advantages and disadvantages of using higher-level
programming languages
© Cengage Learning 2015
Visual Programming
• Visual programming languages: create
graphical screen objects by selecting icons from
a palette
• Common visual programming languages
– Microsoft Visual Basic
– Embarcadero Delphi
– Micro Focus COBOL
– ASNA Visual RPG
– Visual C++
• Developer can still work at the code level
© Cengage Learning 2015 10
Object-Oriented Programming
• Object-oriented programming (OOP)
languages provide a modular approach to
programming
• Advantages:
– Ease of maintenance
– Efficiency in application development
• Object: contains data elements (data members)
and the methods to manipulate that data
– Data members can only be accessed through the
object’s methods
© Cengage Learning 2015 11
© Cengage Learning 2015 12
Figure 5.3 Advantages of object-oriented programming (OOP)
over procedural languages
© Cengage Learning 2015
Object-Oriented Programming (cont'd.)
• Objects are reusable and are combined to
create complex programs
• Popular OOP languages include Java, C++/C#,
and Visual Basic
• Increasing amount of software developed for the
Web using languages such as Java, JavaScript,
and PHP
• Applet: code produced by a Web programming
language
– Runs same way on different operating systems
© Cengage Learning 2015 13
Language Translation:
Compilers and Interpreters
• Source code: program as originally written by
the developer
• Object code: program in machine language that
can be run by the computer
• Types of programming language translators
– Compilers
– Interpreters
© Cengage Learning 2015 14
Language Translation:
Compilers and Interpreters (cont'd.)
• Compiler: translates entire source code to
object code but does not execute the code
– Scans for syntax errors
– Generates error messages if syntax errors found
• Interpreter: scans one statement at a time
– If error-free, interprets and executes the
statement
– Goes through the program until an error or end of
program is encountered
© Cengage Learning 2015 15
© Cengage Learning 2015 16
Figure 5.5 A compiler converts higher-level language code
(source code) into machine language (object
code), which the computer can execute © Cengage Learning
2015
Application Software
• Application software allows nonprogrammers to
develop their own tools
• Application-specific software: programs
designed to perform specific jobs
• General-purpose application software:
programs that serve multiple purposes
– Usually comes as packaged software
• Packaged software: software that is ready to
install from external storage media such as CDs
© Cengage Learning 2015 17
Office Productivity Applications
• Productivity tools assist normal office work
– Include word processors, spreadsheets,
presentation tools, file/database software,
graphics programs, desktop publishing tools, etc.
• Word processors create text documents
• Spreadsheets store numbers and perform
complex mathematical, statistical, and financial
analysis functions
© Cengage Learning 2015 18
Office Productivity Applications (cont'd.)
• Presentation tools develop impressive
presentations quickly
• File/database management tools create and
manipulate local or shared databases
• Graphics programs create intricate graphical
images and manipulate digital photographs
• Desktop publishing tools develop items for
publication, such as pamphlets, newsletters,
cards, calendars, etc.
© Cengage Learning 2015 19
Office Productivity Applications (cont'd.)
• Project management tools help plan projects
and track progress
• Suite: collection of various applications that
perform multiple interrelated functions
– Examples include Microsoft Office, IBM Lotus
SmartSuite, and the free Apache OpenOffice.org
© Cengage Learning 2015 20
Hypermedia and Multimedia
• Hypermedia: a feature that enables users to
access information by clicking text or graphics
• Web authoring tools enable hypermedia
features
– Often part of other applications such as word
processors and presentation tools
© Cengage Learning 2015 21
Hypermedia and Multimedia (cont'd.)
• Multimedia software handles many different
types of data
• Often used in:
– Education: lessons presented in multimedia
– Research: data compiled and integrated
– Training exercises: simulated real-world situations
– Business situations: compound documents filed
and used electronically; and interactive websites
© Cengage Learning 2015 22
Hypermedia and Multimedia (cont'd.)
• Mashup: an integrated application containing
some or all features from several applications
– Provides enhanced features for the end user
© Cengage Learning 2015 23
Web Site Design Tools
• Used to develop and change the content of Web
pages
• Popular packages include
– Microsoft SharePoint Designer and Expression
Web, Avanquest WebEasy Professional, and
Adobe CS2/Dreamweaver
• Newer software enables websites implemented
using a blog environment
© Cengage Learning 2015 24
Groupware
• An application that enables sharing of ideas and
information resources among group members
– Supports real-time collaboration via web
technologies
– Allows for remote collaboration
– Eliminates travel times and facilitates expression
and exchange of ideas
• Examples: Wiggio and Google Drive
© Cengage Learning 2015 25
3D Geographic Software
• Used to develop three-dimensional models of
geographic locations
• Models are created from land and aerial
photographs
• Helps with navigation when tied to global
positioning system software
• Can create virtual existing tangible items or
create new ones
© Cengage Learning 2015 26
System Software
• System software: deals with essential operations
between the user and computer such as:
– Loading, copying, and deleting files
– Managing memory resources
– Operating peripheral equipment
– Encompasses compilers and interpreters
• Applications must be compatible with system
software
© Cengage Learning 2015 27
Operating Systems
• Operating system (OS): most important
program on the computer
– Recognizes input from keyboard and mouse
– Sends output to computer display
– Keeps track of files and directories
– Runs applications
– Manages memory
• Usually developed using low-level programming
languages such as assembly languages
• Also known as “platforms”
© Cengage Learning 2015 28
© Cengage Learning 2015 29
Figure 5.6 The operating system mediates the computer
system’s resources and application software as
well as controls peripheral and network devices © Cengage
Learning 2015
Operating Systems (cont'd.)
• Application program interfaces (APIs):
software included in the OS that can be used by
application program developers
© Cengage Learning 2015 30
Operating Systems (cont'd.)
• OS’s position in the computer’s logical operation
– User interacts with user interface using menus,
icons, and application commands
– Application converts user input into commands
– OS commands the CPU to carry out the operation
– OS allows applications to use the CPU, memory,
input and output devices, and the file system
• Utilities perform other OS functions, e.g.,
hardware diagnostics, file comparison, and file
sorting
© Cengage Learning 2015 31
© Cengage Learning 2015 32
Figure 5.7 Computer systems operate on a number of layers,
beginning with the user interface and moving
into the computer’s hardware © Cengage Learning 2015
Operating Systems (cont'd.)
• OS must manage the system by allocating
hardware resources to applications
• OS provides several services, including:
– User interface
– Memory allocation, including the use of virtual
memory (hard disk used as an extension of
RAM)
– Plug-and-play (PnP): recognize and run a device
as soon as it is physically attached
© Cengage Learning 2015 33
Operating Systems (cont'd.)
• Driver: software that enables OS to control a
device
• Additional OS services include:
– Database management
– Networking
– Security
© Cengage Learning 2015 34
Operating Systems (cont'd.)
• Different computers and types of
microprocessors use different OSs
• Popular PC operating systems
– Windows
– Linux
– Mac OS
• OSs for mobile environments used with
smartphones and tablets
• OSs noted for stability include UNIX, Mac OS X,
and Linux
© Cengage Learning 2015 35
© Cengage Learning 2015 36
Figure 5.8 Popular operating systems for various hardware
platforms © Cengage Learning 2015
© Cengage Learning 2015 37
Figure 5.8 (cont’d.) Popular operating systems for various
hardware platforms © Cengage Learning 2015
Other System Software
• Other types of system software include:
– Compilers and interpreters
– Communications software
– Utilities
– Database management systems
• Communications software supports transmission
and reception of data across computer networks
• Utilities include antivirus programs, firewalls, and
other programs that detect and remove
unwanted files and applications
© Cengage Learning 2015 38
Open Source Software
• Proprietary software: sold/licensed for profit
– Source code is private and not available
– Developer retains all rights to the software; user
purchases a license to use the software
• Open source software: free source code
– Developed through voluntary collaboration of
programmers
– Reviewed by many programmers → fewer bugs
• Examples includes Mozilla Firefox, Drupal,
MySQL, PERL, and OpenOffice.org suite
© Cengage Learning 2015 39
Open Source Software (cont'd.)
• Linux: best known open source OS
– Includes free versions and versions that charge
for support and additional features
– Disadvantage: limited number of applications that
run on it
– Popular because of its stability and versatility
• Runs on mainframes, PCs, handhelds, and
electronic devices
© Cengage Learning 2015 40
Software Licensing
• Software is usually licensed
• Licensed software: provides limited permission
to use the software
– Time-limited license requires annual fees
© Cengage Learning 2015 41
Software Licensing
• Software licensing models
– Permissive model: anyone can use and sell
modified versions of the software
– General Public License (GPL): anyone can use
and make modified versions, but cannot sell
modified versions for profit
– Proprietary: code is owned by someone who has
the right to sell or license it to us
© Cengage Learning 2015 42
Software as a Service (SaaS)
• Provides application software developed and
maintained by a third-party provider
– Offered to organizations for a recurring fee
• Third-party provider: also referred to as
application service provider (ASP)
– Develops and maintains the software on their
hardware
– Provides maintenance, support, and hardware
operations
© Cengage Learning 2015 43
Considerations for Packaged Software
• Factors when purchasing large software
packages are complex, including:
– Cost
– Time to implement
– Cost of interrupting operations
– Modification costs to customize the software
© Cengage Learning 2015 44
© Cengage Learning 2015 45
Figure 5.9 Sample software evaluation form © Cengage
Learning 2015
© Cengage Learning 2015 46
Figure 5.9 (cont’d.) Sample software evaluation form ©
Cengage Learning 2015
Summary
• Software: a collective term for computer
programs
• Two categories of software: system or
application
• Programming languages and software
development tools are used to develop software
• Increasing amount of software is linked to the
Internet
• Code written in non-machine language must be
translated by compilers or interpreters
© Cengage Learning 2015 47
Summary (cont'd.)
• Some application programs are custom-
designed; many are packaged
• Office productivity tools such as word
processors and spreadsheets help improve
worker efficiency
• Hypermedia and multimedia technology are
useful for training, education, research, and
business
© Cengage Learning 2015 48
Summary (cont'd.)
• Groupware combines hypermedia and
multimedia with web technologies for
collaboration
• Three-dimensional geographic software helps
model maps and locations
• Many applications support web services and
access to information on the web
• Most important system software is operating
systems
© Cengage Learning 2015 49
Summary (cont'd.)
• Open source software is distributed freely via the
web
• Nearly all software is licensed; SaaS is an
alternative to traditional software licensing
• Ready-made software purchase decisions
should evaluate many factors, e.g., suitability,
ease of learning, ease of use, vendor reputation,
expected quality of vendor support, etc.
• Software piracy is still a significant problem
© Cengage Learning 2015 50

More Related Content

Similar to Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx

Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)trayyoo
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int123456naji
 
Internet & e mail slides
Internet & e mail slidesInternet & e mail slides
Internet & e mail slidesDominic Kandagor
 
Computer network
Computer networkComputer network
Computer networkRahul Das
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxRbalasubramani
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxlisbala
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxLuckyGoyal23
 
Comptia Security + Chapter 1 601
Comptia Security           + Chapter 1 601Comptia Security           + Chapter 1 601
Comptia Security + Chapter 1 601AbdulalimBhnsawy
 
computer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdfcomputer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdfmukeshkanna36
 
Computer Networks- 1st Lesson
Computer Networks- 1st LessonComputer Networks- 1st Lesson
Computer Networks- 1st LessonPranabBandhuNath
 
Computer networks 1st class
Computer networks   1st classComputer networks   1st class
Computer networks 1st classPranabBandhuNath
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxrocky781582
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networkingprashanna13
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 

Similar to Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx (20)

Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
 
Data analysis telecommunications the int
Data analysis telecommunications the intData analysis telecommunications the int
Data analysis telecommunications the int
 
Internet & e mail slides
Internet & e mail slidesInternet & e mail slides
Internet & e mail slides
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Comptia Security + Chapter 1 601
Comptia Security           + Chapter 1 601Comptia Security           + Chapter 1 601
Comptia Security + Chapter 1 601
 
UNIT 1 Part 1.pdf
UNIT 1 Part 1.pdfUNIT 1 Part 1.pdf
UNIT 1 Part 1.pdf
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
 
computer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdfcomputer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdf
 
Chap006
Chap006Chap006
Chap006
 
Computer Networks- 1st Lesson
Computer Networks- 1st LessonComputer Networks- 1st Lesson
Computer Networks- 1st Lesson
 
Computer networks 1st class
Computer networks   1st classComputer networks   1st class
Computer networks 1st class
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
It107 ch02
It107 ch02It107 ch02
It107 ch02
 

More from LaticiaGrissomzz

MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docxMGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docxLaticiaGrissomzz
 
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docxMEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docxLaticiaGrissomzz
 
Mass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docxMass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docxLaticiaGrissomzz
 
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docxMarketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docxLaticiaGrissomzz
 
MGT 4337 Business Policy and Decision Making Module 3 .docx
MGT 4337 Business Policy and Decision Making        Module 3 .docxMGT 4337 Business Policy and Decision Making        Module 3 .docx
MGT 4337 Business Policy and Decision Making Module 3 .docxLaticiaGrissomzz
 
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docxMedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docxLaticiaGrissomzz
 
Mass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docxMass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docxLaticiaGrissomzz
 
Memorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docxMemorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docxLaticiaGrissomzz
 
Minimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docxMinimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docxLaticiaGrissomzz
 
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docxMGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docxLaticiaGrissomzz
 
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docxMeeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docxLaticiaGrissomzz
 
Mental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docxMental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docxLaticiaGrissomzz
 
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
MEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docxMEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docx
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docxLaticiaGrissomzz
 
Memo ToSally JonesFromJames StudentDate Ja.docx
Memo        ToSally JonesFromJames StudentDate Ja.docxMemo        ToSally JonesFromJames StudentDate Ja.docx
Memo ToSally JonesFromJames StudentDate Ja.docxLaticiaGrissomzz
 
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docxMetabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docxLaticiaGrissomzz
 
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docxMcDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docxLaticiaGrissomzz
 
may use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docxmay use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docxLaticiaGrissomzz
 
master budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docxmaster budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docxLaticiaGrissomzz
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxLaticiaGrissomzz
 
Master of Business Analytics BUS5AP .docx
Master of Business Analytics                          BUS5AP .docxMaster of Business Analytics                          BUS5AP .docx
Master of Business Analytics BUS5AP .docxLaticiaGrissomzz
 

More from LaticiaGrissomzz (20)

MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docxMGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
 
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docxMEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
 
Mass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docxMass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docx
 
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docxMarketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
 
MGT 4337 Business Policy and Decision Making Module 3 .docx
MGT 4337 Business Policy and Decision Making        Module 3 .docxMGT 4337 Business Policy and Decision Making        Module 3 .docx
MGT 4337 Business Policy and Decision Making Module 3 .docx
 
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docxMedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
 
Mass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docxMass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docx
 
Memorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docxMemorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docx
 
Minimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docxMinimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docx
 
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docxMGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
 
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docxMeeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
 
Mental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docxMental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docx
 
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
MEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docxMEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docx
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
 
Memo ToSally JonesFromJames StudentDate Ja.docx
Memo        ToSally JonesFromJames StudentDate Ja.docxMemo        ToSally JonesFromJames StudentDate Ja.docx
Memo ToSally JonesFromJames StudentDate Ja.docx
 
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docxMetabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
 
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docxMcDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
 
may use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docxmay use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docx
 
master budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docxmaster budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docx
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docx
 
Master of Business Analytics BUS5AP .docx
Master of Business Analytics                          BUS5AP .docxMaster of Business Analytics                          BUS5AP .docx
Master of Business Analytics BUS5AP .docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx

  • 1. Kenneth J. Sousa Effy Oz MANAGEMENT INFORMATION SYSTEMS Seventh Edition Chapter 6 Business Networks and Telecommunications © Cengage Learning 2015 Objectives • Describe business and home applications of digital telecommunications • Identify the major media and devices used in telecommunications • Explain the concept of network protocols • Compare and contrast various networking and
  • 2. Internet services © Cengage Learning 2015 2 Objectives (cont'd.) • List networking technologies and trends that are likely to have an impact on businesses and information management in the near future • Discuss the pros and cons of telecommuting © Cengage Learning 2015 3 Telecommunications in Business • Telecommunications: the transmittal of data and information from one point to another – Allows communications over large distances • Telephone, e-mail, and the web rely on fast, reliable telecommunications • Networking technologies have brought about several improvements to business processes
  • 3. © Cengage Learning 2015 4 Telecommunications in Business (cont'd.) • Telecommunications-supported improvements – Business communication, including e-mail, voice mail, instant messaging, faxing, file transfer, mobile telephony, and teleconferencing – Greater efficiency: information delivery is immediate and not constrained by geographical distance – Better distribution of data: central storage with both local and remote access © Cengage Learning 2015 5 Telecommunications in Business (cont'd.) • Improvements (cont'd.) – Instant transactions, using web and wireless technologies
  • 4. – Flexible and mobile workforce: telecommuting and wireless connectivity for remote workers – Alternative channels: voice, radio, television now available via the Web also • Network security is a challenge © Cengage Learning 2015 6 Telecommunications in Daily Use • Cellular phones • Videoconferencing • Wireless payments and warehousing • Peer-to-peer (P2P) file sharing • Web-empowered commerce © Cengage Learning 2015 7 Cellular Phones • Name is derived from areas of service, called cells
  • 5. • Each cell has a computerized transceiver – Transmits and receives signals • Can transmit and receive calls almost anywhere • Cell phones provide other capabilities, including: – Email – Digital cameras – GPS • Major advantage is mobility © Cengage Learning 2015 8 Videoconferencing • Videoconferencing: transmitted images and speech • Brings together conference rooms that are thousands of miles apart • Produces savings in multiple areas, including: – Travel – Lodging
  • 6. – Car fleets – Employees’ time © Cengage Learning 2015 9 Wireless Payments and Warehousing • Radio frequency identification (RFID): – Enables rapid transactions and payments – Used at gas stations for payment at pump – Used in vehicles for automatic road toll payment – Used to track and locate items in warehouses • Near-field communication (NFC): a standard communication protocol to create a radio connection between two devices – Mobile payment – Electronic wallet © Cengage Learning 2015 10 Peer-to-Peer File Sharing • Peer-to-peer (P2P) file sharing: used to locate
  • 7. and download files from any online computer through Internet using applications such as: – LimeWire – BitTorrent – Vuze • Used extensively to download music and video files, often in violation of copyright laws • Concerns include security and malware © Cengage Learning 2015 11 Web-Empowered Commerce • Increasingly fast communication allows organizations and individuals to: – Conduct business – Research – Market – Educate and train – Shop, purchase, and pay
  • 8. • Entire industries have been created by the web, such as online exchanges and auctions © Cengage Learning 2015 12 Bandwidth and Media • Professionals should understand technology concepts: – To participate in decision making – In order to select networking equipment and services • Bandwidth and networking media are important considerations © Cengage Learning 2015 13 Bandwidth • Bandwidth: speed at which data is communicated – Also called transmission rate or bit rate
  • 9. • Bits per second (bps): unit of measure for bandwidth • Broadband: communications medium that can carry multiple transmissions simultaneously – Examples: cable television, DSL (digital subscriber line), fiber-optic cables, and most wireless connections © Cengage Learning 2015 14 © Cengage Learning 2015 15 Figure 6.1 Transmission speed measurement units © Cengage Learning 2015 Media • Several types of communications media • Tangible media includes: – Twisted pair cable – Coaxial cable
  • 10. – Optical fiber • Intangible media includes: – Microwave radio technologies © Cengage Learning 2015 16 © Cengage Learning 2015 17 Figure 6.2 Networking media © Cengage Learning 2015 Media (cont'd.) • Twisted pair cable: pairs of insulated copper wires twisted together – Flexible, reliable, and low cost – Connects devices with RJ-45 plug-in connector • Coaxial cable: for cable television transmission – Used for Internet connections via cable • Optical fiber: uses light to represent bits – Not susceptible to EMI (electromagnetic interference)
  • 11. – Can carry signals for long distances © Cengage Learning 2015 18 Media (cont'd.) • Radio frequency (RF) technologies: use radio waves to carry bits – Popular examples: Wi-Fi and Bluetooth • Microwaves: high-frequency radio waves that can carry signals over long distances with high accuracy – For outside transmission, weather conditions may degrade the quality • Microwave signals can be transmitted by satellite links © Cengage Learning 2015 19 Media (cont'd.) • Electrical power lines: electrical power grid can be used for telecommunication
  • 12. – Broadband over Power Lines (BPL) or Power Line Communication (PLC) • Network media acquisition considerations – Availability – Current and potential bandwidth – Vulnerability to EMI or radio frequency interference (RFI) © Cengage Learning 2015 20 Networks • Network: combination of devices (or nodes) connected through a communication media • Any compatible device that can transmit and receive on a network can be part of a network © Cengage Learning 2015 21 Types of Networks • Computer networks are classified by reach and
  • 13. complexity • Basic types of networks: LANs, MANs, and WANs • Local area networks (LAN): established by a single organization and shared among employees – Server-based LAN: central server controls communications – Peer-to-peer LAN: no central device © Cengage Learning 2015 22 Types of Networks (cont'd.) • Wireless LANs (WLANs) offer advantages – Easier installation – More scalable – More flexible: equipment is easily moved • Scalability: ease of expanding a system • WLAN drawback: wireless networks are less
  • 14. secure than wired LANs © Cengage Learning 2015 23 Types of Networks (cont'd.) • Metropolitan area network (MAN): – Links multiple LANs within a large city – Uses fiber optic or wireless broadband connections between LANs • Wide area network (WAN): far-reaching system of networks composed of LANs or MANs – May be public or private © Cengage Learning 2015 24 Types of Networks (cont'd.) • Value-added networks (VANs): – Are networks with enhanced services offered by outside vendors – Provide reliability, management, and
  • 15. maintenance of networks for an organization • Internet service providers (ISPs) – Preferred method of conducting e-commerce – Less costly than VANs © Cengage Learning 2015 25 PANs • Personal area network (PAN): wireless network designed for handheld and portable devices – Used by one or two people – Transmission speed is slower – Maximum distance is about ten meters © Cengage Learning 2015 26 Networking Hardware • Networks use a variety of devices to connect computers and peripheral devices • Network interface card (NIC) connects a
  • 16. device to a hub, switch, bridge, or router, which connects to a LAN or WAN • Switch: a common device often used as a central location to connect computers or devices to a local network • Bridge: connects two networks © Cengage Learning 2015 27 Networking Hardware (cont'd.) • Router routes data packets to the next node on the path to the final destination • Repeater amplifies or regenerates signals • Modem translates communication signals from analog to digital and vice versa • Dial-up connection: a slower type of connection through modem, usually no faster than 56 Kbps © Cengage Learning 2015 28
  • 17. Virtual Private Networks • Virtual private network (VPN): a public network connection that creates the illusion of a private network connection – Does not require leasing of lines – Utilizes the Internet to simulate a private network that only authorized users can access – Enables the use of intranets and extranets © Cengage Learning 2015 29 Protocols • Protocol: set of rules governing communication between computers • Separate protocols are designed for: – WANs – LANs – Wireless communications
  • 18. • Most important set of protocols for telecommunications and networks is called TCP/IP © Cengage Learning 2015 30 TCP/IP • TCP/IP (Transmission Control Protocol/ Internet Protocol): a set of related protocols – TCP ensures packets arrive accurately and in proper order – IP ensures efficient delivery of packets from node to node • Internet backbone: highest speed channels • Host: a computer connected directly to a backbone • IP address: unique ID for each network device © Cengage Learning 2015 31
  • 19. TCP/IP (cont'd.) • DNS (Domain Name System): associates a character-based name with an IP address • Static IP address: a permanent address assigned to a device • Dynamic IP address: temporary IP number assigned to a device for the duration of the connection – Provides flexibility when the number of IP addresses is limited © Cengage Learning 2015 32 Ethernet • Ethernet: LAN protocol using coaxial or Cat 5 or 6 twisted pair cable • Gigabit Ethernet: faster Ethernet connection of one Gbps or greater © Cengage Learning 2015 33
  • 20. Wireless Protocols • IEEE 802.11: a family of wireless protocols known as Wi-Fi (Wireless Fidelity) – Supports wireless communication within 100 meters of router – 802.11 subtypes support various distances and speeds up to 248 Mbps • Access point (AP): connection between wireless device and a wired network – Hotspot allows Internet access within range of equipment © Cengage Learning 2015 34 © Cengage Learning 2015 35 Figure 6.3 An example of a home using a wireless network © Cengage Learning 2015
  • 21. Wireless Protocols (cont'd.) • Encryption: function of protocols that scrambles and encodes messages – Encryption keys are shared only between sender and receiver • Bluetooth allows devices to communicate within 10 meters – Transmits voice and data – Considered a PAN technology © Cengage Learning 2015 36 Wireless Protocols (cont'd.) • Worldwide Interoperability for Microwave Access (WiMAX) increases the range and speed of wireless communication – Works with metropolitan area networks (MANs) – Would enable Internet connection while in a moving vehicle
  • 22. • Long-Term Evolution (LTE): a standard method of wireless communications, specifically for high- speed data transmission for mobile phones – Also known as 4G LTE © Cengage Learning 2015 37 © Cengage Learning 2015 38 Figure 6.4 How a WiMAX network works © Cengage Learning 2015 © Cengage Learning 2015 39 Figure 6.5 Wireless networking protocols © Cengage Learning 2015 Generations in Mobile Communications • Networking professionals refer to generations of mobile communication technologies – First generation (1G): analog – Second generation (2G): provided digital voice
  • 23. encoding – Third generation (3G): increased speeds that support video, videoconferencing, and full Internet access – Fourth Generation (4G): digital only, with packet switching and tighter security © Cengage Learning 2015 40 Internet Networking Services • Variety of options when subscribing to network services • Downstream: speed of receiving from network • Upstream: speed of transmitting to network • Services with lower rates for upstream than downstream are suitable for most individuals and businesses © Cengage Learning 2015 41
  • 24. © Cengage Learning 2015 42 Figure 6.6 Typical features and costs of Internet services © Cengage Learning 2015 © Cengage Learning 2015 43 Figure 6.6 (cont’d.) Typical features and costs of Internet services © Cengage Learning 2015 Cable • Internet links provided by television cable firms • Cable connected to Internet server • At residence, cable is split into TV set and computer via a bridge called a cable modem • Cable shared by all subscribers connected to the node – Communication speeds may slow during peak times and as more subscribers join the service © Cengage Learning 2015 44
  • 25. Digital Subscriber Line (DSL) • Digital subscriber line (DSL): data remains digital through entire transmission • Uses telephone lines connected to DSL bridge (DSL modem) • Transmission bit rates – Closely related to distance from telephone company’s central office © Cengage Learning 2015 45 T1 and T3 Lines • T1 and T3 lines: point-to-point dedicated digital circuits provided by telephone companies – T1 line is made up of 24 channels of 64 Kbps each – T3 line is made up of 672 channels of 64 Kbps each • T1 and T3 service is expensive
  • 26. • Used by universities and large companies for backbone and Internet connections © Cengage Learning 2015 46 Satellite • Satellite services use microwave radio transmission • Service provider installs dish antenna that is tuned to a communications satellite • Speeds up to 45 Mbps • Used for private homes and for mobile uses such as shipping and trucking • Global positioning system (GPS): a free satellite service that provides location information © Cengage Learning 2015 47 Fixed Wireless • Fixed wireless: point-to-point transmission
  • 27. between two stationary devices, typically between buildings • Wireless Internet service provider (WISP) – Specializes in fixed wireless service • Highly modular • Suitable for both rural and urban areas © Cengage Learning 2015 48 Fiber to the Premises • Connects a building to the Internet via optical fibers • Fiber to the Home (FTTH) – Optical fiber reaches the subscriber’s living or work space • Subscribers connect computers or LAN routers to an optical fiber socket © Cengage Learning 2015 49
  • 28. Optical Carrier • Optical carrier (OC) provides services through optical fiber lines – Expensive – Very high connection speeds • Provides speeds in multiples of 51.84 Mbps (the base rate bandwidth) • Typically used by: – ISPs – Providers of search engines – Content-rich or high-traffic Web sites © Cengage Learning 2015 50 Broadband over Power Lines (BPL) • Broadband over Power Lines (BPL) uses electric power lines to carry digital signals • Utility companies partner with telecommunications companies to provide the service
  • 29. © Cengage Learning 2015 51 The Impact of Networking Technologies • Trends likely to have a significant impact on businesses and management of information – Broadband telephony – Radio frequency identification – Convergence of digital technologies © Cengage Learning 2015 52 Broadband Telephony • Voice over Internet Protocol (VoIP): uses Internet connection to conduct telephone conversations • Examples of companies offering IP telephony – Vonage and Comcast • Free services offered by Skype or iCall • Cost effective for businesses and homes
  • 30. • Experts predict convergence of cell phone and VoIP phone © Cengage Learning 2015 53 Radio Frequency Identification • RFID tags are tiny and need little power • Objects are embedded with tags that contain a transponder (a radio transceiver activated by a signal transmitted to it) • Tags are encoded with electronic product code (EPC) • Readers decode data stored in tag’s memory and pass the data to a host computer • Efficient for large companies, but expensive for smaller companies © Cengage Learning 2015 54 © Cengage Learning 2015 55
  • 31. Figure 6.7 Various examples of RFID applications in businesses © Cengage Learning 2015 © Cengage Learning 2015 56 Figure 6.7 (cont’d.) Various examples of RFID applications in businesses © Cengage Learning 2015 Converging Technologies • Convergence occurs in networking technology • Cell phones can act as Web phones using VoIP • New television sets will connect to Internet, cable, and satellites concurrently • Single device to connect to any type of network • “Smart appliances” interact with their owners • Opportunities for businesses to provide new information services and better manage the salesforce © Cengage Learning 2015 57
  • 32. Converging Technologies (cont’d.) • Portable music/video players communicate with PCs via Wi-Fi to download files and transmit to wireless earphones • Cell phones read RFID tags on products – Compare prices and make purchases © Cengage Learning 2015 58 Summary • Telecommunications is communication over distance • Telecommunications technology has changed the business environment • Different media have different bandwidths • Networks are classified according to reach and complexity • Public network can be turned into a virtual private network (VPN)
  • 33. © Cengage Learning 2015 59 Summary (cont'd.) • Network protocols are sets of rules to which all devices on a network must adhere – The Internet adheres to the TCP/IP protocol • Wireless technologies make it easy and affordable to create wireless LANs and hotspots • Organizations and individuals have variety of choices when subscribing to networking services • As Internet links become faster, Internet telephony, also known as Voice over Internet Protocol (VoIP), is gaining in popularity © Cengage Learning 2015 60 Summary (cont'd.) • Wireless technologies support the increasingly popular RFID technologies
  • 34. • Much like hardware, telecommunications technologies are merging • Increasing numbers of employees now telecommute © Cengage Learning 2015 61 image1.png image2.png Kenneth J. Sousa Effy Oz MANAGEMENT INFORMATION SYSTEMS Seventh Edition Chapter 5 Business Software © Cengage Learning 2015
  • 35. Objectives • Explain the difference between application software and system software • Enumerate the different generations of programming languages and explain how they differ • Cite the latest major developments in application and system software • Identify and explain the roles of Web programming languages © Cengage Learning 2015 2 Objectives (cont'd.) • Explain the types and uses of Web site design tools • Clarify the differences between proprietary software and open source software • List characteristics that are important in
  • 36. evaluating packaged software applications for business use • Understand the problem of software piracy and how it affects businesses and consumers © Cengage Learning 2015 3 Software: Instructions to the Hardware • Applications: computer programs that contribute to productivity • Software: a series of instructions to a computer to execute processes • Two major categories of software: – Application software: enables task completion – System software: • Enables applications to run on a computer • Manages components and devices © Cengage Learning 2015 4
  • 37. Programming Languages and Software Development Tools • Programs are needed for every computer operation • Programming: process of writing programs • Machine language: the only language that hardware understands – Consists of long strings of 0s and 1s • Assembly language: easier to program than machine language using “words” for commands • High-level programming languages: use English- like statements © Cengage Learning 2015 5 Programming Languages and Software Development Tools (cont'd.) • Software development kits (SDKs): tools to develop software with little knowledge of
  • 38. programming languages • Third-generation languages (3GLs): known as “procedural” languages – Programmer must detail logical procedure – Includes languages such as COBOL, FORTRAN, BASIC, RPG, Pascal, and C – One 3GL statement = five to ten assembly language statements © Cengage Learning 2015 6 Programming Languages and Software Development Tools (cont'd.) • Fourth-generation languages (4GLs): use more English-like statements – Speed up the development process – Built around database management systems – Include many preprogrammed procedures – One 4GL statement = several 3GL statements
  • 39. – Structured Query Language (SQL) is an example • Debugging: process of locating and fixing program errors © Cengage Learning 2015 7 © Cengage Learning 2015 8 Figure 5.1 The evolution of programming languages © Cengage Learning 2015 © Cengage Learning 2015 9 Figure 5.2 Advantages and disadvantages of using higher-level programming languages © Cengage Learning 2015 Visual Programming • Visual programming languages: create graphical screen objects by selecting icons from a palette • Common visual programming languages – Microsoft Visual Basic
  • 40. – Embarcadero Delphi – Micro Focus COBOL – ASNA Visual RPG – Visual C++ • Developer can still work at the code level © Cengage Learning 2015 10 Object-Oriented Programming • Object-oriented programming (OOP) languages provide a modular approach to programming • Advantages: – Ease of maintenance – Efficiency in application development • Object: contains data elements (data members) and the methods to manipulate that data – Data members can only be accessed through the object’s methods
  • 41. © Cengage Learning 2015 11 © Cengage Learning 2015 12 Figure 5.3 Advantages of object-oriented programming (OOP) over procedural languages © Cengage Learning 2015 Object-Oriented Programming (cont'd.) • Objects are reusable and are combined to create complex programs • Popular OOP languages include Java, C++/C#, and Visual Basic • Increasing amount of software developed for the Web using languages such as Java, JavaScript, and PHP • Applet: code produced by a Web programming language – Runs same way on different operating systems © Cengage Learning 2015 13
  • 42. Language Translation: Compilers and Interpreters • Source code: program as originally written by the developer • Object code: program in machine language that can be run by the computer • Types of programming language translators – Compilers – Interpreters © Cengage Learning 2015 14 Language Translation: Compilers and Interpreters (cont'd.) • Compiler: translates entire source code to object code but does not execute the code – Scans for syntax errors – Generates error messages if syntax errors found
  • 43. • Interpreter: scans one statement at a time – If error-free, interprets and executes the statement – Goes through the program until an error or end of program is encountered © Cengage Learning 2015 15 © Cengage Learning 2015 16 Figure 5.5 A compiler converts higher-level language code (source code) into machine language (object code), which the computer can execute © Cengage Learning 2015 Application Software • Application software allows nonprogrammers to develop their own tools • Application-specific software: programs designed to perform specific jobs • General-purpose application software:
  • 44. programs that serve multiple purposes – Usually comes as packaged software • Packaged software: software that is ready to install from external storage media such as CDs © Cengage Learning 2015 17 Office Productivity Applications • Productivity tools assist normal office work – Include word processors, spreadsheets, presentation tools, file/database software, graphics programs, desktop publishing tools, etc. • Word processors create text documents • Spreadsheets store numbers and perform complex mathematical, statistical, and financial analysis functions © Cengage Learning 2015 18 Office Productivity Applications (cont'd.)
  • 45. • Presentation tools develop impressive presentations quickly • File/database management tools create and manipulate local or shared databases • Graphics programs create intricate graphical images and manipulate digital photographs • Desktop publishing tools develop items for publication, such as pamphlets, newsletters, cards, calendars, etc. © Cengage Learning 2015 19 Office Productivity Applications (cont'd.) • Project management tools help plan projects and track progress • Suite: collection of various applications that perform multiple interrelated functions – Examples include Microsoft Office, IBM Lotus SmartSuite, and the free Apache OpenOffice.org
  • 46. © Cengage Learning 2015 20 Hypermedia and Multimedia • Hypermedia: a feature that enables users to access information by clicking text or graphics • Web authoring tools enable hypermedia features – Often part of other applications such as word processors and presentation tools © Cengage Learning 2015 21 Hypermedia and Multimedia (cont'd.) • Multimedia software handles many different types of data • Often used in: – Education: lessons presented in multimedia – Research: data compiled and integrated – Training exercises: simulated real-world situations
  • 47. – Business situations: compound documents filed and used electronically; and interactive websites © Cengage Learning 2015 22 Hypermedia and Multimedia (cont'd.) • Mashup: an integrated application containing some or all features from several applications – Provides enhanced features for the end user © Cengage Learning 2015 23 Web Site Design Tools • Used to develop and change the content of Web pages • Popular packages include – Microsoft SharePoint Designer and Expression Web, Avanquest WebEasy Professional, and Adobe CS2/Dreamweaver • Newer software enables websites implemented
  • 48. using a blog environment © Cengage Learning 2015 24 Groupware • An application that enables sharing of ideas and information resources among group members – Supports real-time collaboration via web technologies – Allows for remote collaboration – Eliminates travel times and facilitates expression and exchange of ideas • Examples: Wiggio and Google Drive © Cengage Learning 2015 25 3D Geographic Software • Used to develop three-dimensional models of geographic locations • Models are created from land and aerial
  • 49. photographs • Helps with navigation when tied to global positioning system software • Can create virtual existing tangible items or create new ones © Cengage Learning 2015 26 System Software • System software: deals with essential operations between the user and computer such as: – Loading, copying, and deleting files – Managing memory resources – Operating peripheral equipment – Encompasses compilers and interpreters • Applications must be compatible with system software © Cengage Learning 2015 27
  • 50. Operating Systems • Operating system (OS): most important program on the computer – Recognizes input from keyboard and mouse – Sends output to computer display – Keeps track of files and directories – Runs applications – Manages memory • Usually developed using low-level programming languages such as assembly languages • Also known as “platforms” © Cengage Learning 2015 28 © Cengage Learning 2015 29 Figure 5.6 The operating system mediates the computer system’s resources and application software as well as controls peripheral and network devices © Cengage Learning 2015 Operating Systems (cont'd.)
  • 51. • Application program interfaces (APIs): software included in the OS that can be used by application program developers © Cengage Learning 2015 30 Operating Systems (cont'd.) • OS’s position in the computer’s logical operation – User interacts with user interface using menus, icons, and application commands – Application converts user input into commands – OS commands the CPU to carry out the operation – OS allows applications to use the CPU, memory, input and output devices, and the file system • Utilities perform other OS functions, e.g., hardware diagnostics, file comparison, and file sorting © Cengage Learning 2015 31
  • 52. © Cengage Learning 2015 32 Figure 5.7 Computer systems operate on a number of layers, beginning with the user interface and moving into the computer’s hardware © Cengage Learning 2015 Operating Systems (cont'd.) • OS must manage the system by allocating hardware resources to applications • OS provides several services, including: – User interface – Memory allocation, including the use of virtual memory (hard disk used as an extension of RAM) – Plug-and-play (PnP): recognize and run a device as soon as it is physically attached © Cengage Learning 2015 33 Operating Systems (cont'd.)
  • 53. • Driver: software that enables OS to control a device • Additional OS services include: – Database management – Networking – Security © Cengage Learning 2015 34 Operating Systems (cont'd.) • Different computers and types of microprocessors use different OSs • Popular PC operating systems – Windows – Linux – Mac OS • OSs for mobile environments used with smartphones and tablets • OSs noted for stability include UNIX, Mac OS X,
  • 54. and Linux © Cengage Learning 2015 35 © Cengage Learning 2015 36 Figure 5.8 Popular operating systems for various hardware platforms © Cengage Learning 2015 © Cengage Learning 2015 37 Figure 5.8 (cont’d.) Popular operating systems for various hardware platforms © Cengage Learning 2015 Other System Software • Other types of system software include: – Compilers and interpreters – Communications software – Utilities – Database management systems • Communications software supports transmission and reception of data across computer networks • Utilities include antivirus programs, firewalls, and
  • 55. other programs that detect and remove unwanted files and applications © Cengage Learning 2015 38 Open Source Software • Proprietary software: sold/licensed for profit – Source code is private and not available – Developer retains all rights to the software; user purchases a license to use the software • Open source software: free source code – Developed through voluntary collaboration of programmers – Reviewed by many programmers → fewer bugs • Examples includes Mozilla Firefox, Drupal, MySQL, PERL, and OpenOffice.org suite © Cengage Learning 2015 39 Open Source Software (cont'd.)
  • 56. • Linux: best known open source OS – Includes free versions and versions that charge for support and additional features – Disadvantage: limited number of applications that run on it – Popular because of its stability and versatility • Runs on mainframes, PCs, handhelds, and electronic devices © Cengage Learning 2015 40 Software Licensing • Software is usually licensed • Licensed software: provides limited permission to use the software – Time-limited license requires annual fees © Cengage Learning 2015 41 Software Licensing
  • 57. • Software licensing models – Permissive model: anyone can use and sell modified versions of the software – General Public License (GPL): anyone can use and make modified versions, but cannot sell modified versions for profit – Proprietary: code is owned by someone who has the right to sell or license it to us © Cengage Learning 2015 42 Software as a Service (SaaS) • Provides application software developed and maintained by a third-party provider – Offered to organizations for a recurring fee • Third-party provider: also referred to as application service provider (ASP) – Develops and maintains the software on their hardware
  • 58. – Provides maintenance, support, and hardware operations © Cengage Learning 2015 43 Considerations for Packaged Software • Factors when purchasing large software packages are complex, including: – Cost – Time to implement – Cost of interrupting operations – Modification costs to customize the software © Cengage Learning 2015 44 © Cengage Learning 2015 45 Figure 5.9 Sample software evaluation form © Cengage Learning 2015 © Cengage Learning 2015 46 Figure 5.9 (cont’d.) Sample software evaluation form ©
  • 59. Cengage Learning 2015 Summary • Software: a collective term for computer programs • Two categories of software: system or application • Programming languages and software development tools are used to develop software • Increasing amount of software is linked to the Internet • Code written in non-machine language must be translated by compilers or interpreters © Cengage Learning 2015 47 Summary (cont'd.) • Some application programs are custom- designed; many are packaged
  • 60. • Office productivity tools such as word processors and spreadsheets help improve worker efficiency • Hypermedia and multimedia technology are useful for training, education, research, and business © Cengage Learning 2015 48 Summary (cont'd.) • Groupware combines hypermedia and multimedia with web technologies for collaboration • Three-dimensional geographic software helps model maps and locations • Many applications support web services and access to information on the web • Most important system software is operating systems
  • 61. © Cengage Learning 2015 49 Summary (cont'd.) • Open source software is distributed freely via the web • Nearly all software is licensed; SaaS is an alternative to traditional software licensing • Ready-made software purchase decisions should evaluate many factors, e.g., suitability, ease of learning, ease of use, vendor reputation, expected quality of vendor support, etc. • Software piracy is still a significant problem © Cengage Learning 2015 50