The document provides information about data, information, and information systems. It defines data as raw unorganized facts that have little meaning on their own. Information is organized data that is meaningful to a user. An information system is a set of related components that collects data, processes it, and provides information. It gives the example of a school grading system as an information system that collects student marks as input data, processes it by calculating grades, and outputs reports with grading information.
Concepts and components of information systemRohit Kumar
Â
The document discusses concepts related to information systems. It defines a system as having inputs, processing, and outputs. It describes the key components of an information system including people, hardware, software, data, and networks. It also discusses different types of computer systems such as microcomputers, midrange systems, and mainframe systems. Peripherals and storage technologies like semiconductor memory, magnetic disks, tapes, and optical disks are also summarized.
Mis 1st chapter notes foundation of is in businessHassan Samoon
Â
This document provides an overview of the foundations of information systems in business. It defines what an information system is and its key components: people, hardware, software, data, and network resources. An information system takes data as input, processes it, and produces output in the form of information. It also discusses the roles of end users and IS specialists. Managers need to understand how to effectively use IS for business operations and competitive advantage.
Management Information System (MIS)- unit-5Manoj Kumar
Â
This PPT is prepared for students and other professionals regarding Management Information System (MIS) subject as lecture notes.This PPT aims to help students to recognize, specify and communicate effectively to data processing personnel to about information system. It also helps students to interpret new developments in information technology and fit into an overall framework. OTHER TOPICS ARE DISCUSSED IN THE CONSECUTIVE PPTs
Management Information System (mis)- unit-3Manoj Kumar
Â
This PPT is prepared for students and other professionals regarding Management Information System (MIS) subject as lecture notes.This PPT aims to help students to recognize, specify and communicate effectively to data processing personnel to about information system. It also helps students to interpret new developments in information technology and fit into an overall framework. OTHER TOPICS ARE DISCUSSED IN THE CONSECUTIVE PPTs
This document provides information about data, information systems, and their components. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to users. An information system is a set of related components that collects data, processes it, and provides information. The key components of an information system are data, hardware, software, people, and procedures. Together these components work to input data, process it, and output useful information to meet users' needs.
This document provides an introduction to information technology. It defines information and technology, then defines information technology as any technology that helps produce, manipulate, store, or communicate information. It discusses the different parts of information technology, including computer technology and communication technology. It also describes computers, their basic components and operations, as well as types of computers like analog and digital. The document outlines the purposes and uses of computers in areas like science, business, education, and government. Finally, it defines management information systems (MIS) as computer-based systems that provide managers with tools to efficiently manage organizations.
An information system consists of 5 main components: 1) Computer hardware which includes the physical parts of a computer system like processors, memory, and input/output devices. 2) Computer software which are instructions that control the computer's operation and can be system software or application software. 3) Telecommunications which refers to electronic transmission of information over networks like LANs and WANs. 4) Databases which are organized collections of related data managed by database management systems. 5) Human resources and procedures which involve the people who use the system and the outlined processes for interacting with hardware, software, and databases.
Concepts and components of information systemRohit Kumar
Â
The document discusses concepts related to information systems. It defines a system as having inputs, processing, and outputs. It describes the key components of an information system including people, hardware, software, data, and networks. It also discusses different types of computer systems such as microcomputers, midrange systems, and mainframe systems. Peripherals and storage technologies like semiconductor memory, magnetic disks, tapes, and optical disks are also summarized.
Mis 1st chapter notes foundation of is in businessHassan Samoon
Â
This document provides an overview of the foundations of information systems in business. It defines what an information system is and its key components: people, hardware, software, data, and network resources. An information system takes data as input, processes it, and produces output in the form of information. It also discusses the roles of end users and IS specialists. Managers need to understand how to effectively use IS for business operations and competitive advantage.
Management Information System (MIS)- unit-5Manoj Kumar
Â
This PPT is prepared for students and other professionals regarding Management Information System (MIS) subject as lecture notes.This PPT aims to help students to recognize, specify and communicate effectively to data processing personnel to about information system. It also helps students to interpret new developments in information technology and fit into an overall framework. OTHER TOPICS ARE DISCUSSED IN THE CONSECUTIVE PPTs
Management Information System (mis)- unit-3Manoj Kumar
Â
This PPT is prepared for students and other professionals regarding Management Information System (MIS) subject as lecture notes.This PPT aims to help students to recognize, specify and communicate effectively to data processing personnel to about information system. It also helps students to interpret new developments in information technology and fit into an overall framework. OTHER TOPICS ARE DISCUSSED IN THE CONSECUTIVE PPTs
This document provides information about data, information systems, and their components. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to users. An information system is a set of related components that collects data, processes it, and provides information. The key components of an information system are data, hardware, software, people, and procedures. Together these components work to input data, process it, and output useful information to meet users' needs.
This document provides an introduction to information technology. It defines information and technology, then defines information technology as any technology that helps produce, manipulate, store, or communicate information. It discusses the different parts of information technology, including computer technology and communication technology. It also describes computers, their basic components and operations, as well as types of computers like analog and digital. The document outlines the purposes and uses of computers in areas like science, business, education, and government. Finally, it defines management information systems (MIS) as computer-based systems that provide managers with tools to efficiently manage organizations.
An information system consists of 5 main components: 1) Computer hardware which includes the physical parts of a computer system like processors, memory, and input/output devices. 2) Computer software which are instructions that control the computer's operation and can be system software or application software. 3) Telecommunications which refers to electronic transmission of information over networks like LANs and WANs. 4) Databases which are organized collections of related data managed by database management systems. 5) Human resources and procedures which involve the people who use the system and the outlined processes for interacting with hardware, software, and databases.
Information systems and its components 1Ashish Desai
Â
The document discusses various components of information systems including:
- Information which is processed data that has meaning
- Systems which take inputs, process them, and produce outputs
- Information systems which combine people, hardware, software, and networks to transform data into information products
It then describes key elements of information systems such as input/output devices, data storage, databases, database models including hierarchical, network, relational and object oriented models. Networking concepts like protocols and topologies are also covered at a high level.
Group members and an introduction to information systems are provided. Key concepts around data, information, and knowledge are defined. The document discusses the types of information systems used in organizations and how systems are developed. It also provides definitions for important terms like data, information, organization, and systems development.
An information system collects data, processes it into information, and provides information to users. It consists of hardware, software, data, people, and procedures. Information systems are used in education, business, and management to keep track of statistics, enable online learning and transactions, and analyze products.
The document defines an information system as a combination of hardware, software, infrastructure, and trained personnel organized to facilitate planning, control, coordination, and decision making in an organization. It notes information systems have advantages like making work easier, allowing real-time updates, and improving organizational quality, but also have disadvantages such as costs, system breakdowns, lack of IT skills, privacy issues, and unemployment. The document provides examples of how information systems are used in daily life and business.
The document discusses information systems and how computers process data. It defines an information system as a set of components that collect, process, and disseminate data to meet an objective. It also defines a computer as an electronic device that can accept, manipulate, and produce information under the control of stored software instructions. The document then provides examples of input, processing, output, and storage in information processing.
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
Â
Topics:
Introduction to Security and Privacy
Introduction to Operating System
Introduction to Artificial Intelligence
Objectives:
Distinguish the importance of cryptography.
Analyze decoding and encoding.
Engage in different Operating System.
Evaluate the role of Operating System in a device.
Know about Artificial Intelligence.
Identify the different types of Artificial Intelligence.
This document discusses managing and securing information systems in hospitality organizations. It covers the importance of computers, identifying mission critical systems like reservation and POS systems, maintaining these systems, common causes of system failure, and strategies for disaster recovery and business continuity planning. It also discusses security challenges like viruses, spyware, and data encryption. PCI compliance for payment card data is explained.
Master of business administration m.i.smusheer1234
Â
Management information system (MIS) provides information to support decision making and management functions. Value chain analysis examines the primary and support activities involved in a business process to understand how to better manage costs and create value. Business process reengineering (BPR) is a fundamental rethinking and radical redesign of business processes to achieve improvements in critical areas like cost, quality, and speed. Data warehousing and data mining allow organizations to analyze large amounts of data from various sources to identify patterns and make informed decisions. When used together, these tools can help organizations optimize processes, reduce costs and improve performance through effective use of information.
The document discusses different types of information systems used in organizations, including transaction processing systems, management information systems, decision support systems, executive support systems, and knowledge work systems. It describes how these systems integrate functions and business processes across departments like finance, human resources, manufacturing, and sales.
Information Processing system is a set of formal procedure by which data are collected, processed into information and distributed to users. Financial accounting collects financial data from different areas of the company.
The document discusses various in-room technologies used in hotels, including electronic locking systems, energy management systems, fire alarm and security systems, in-room minibars, and guestroom phone/entertainment systems. It describes the evolution of keycard technologies from mechanical keys to smart cards and RFID keys. It also explains different types of energy management systems that use sensors and controls to reduce energy usage when rooms are unoccupied.
This document contains 26 questions and their answers related to management information systems. The questions cover topics such as data resource management, databases, data warehousing, transaction processing, decision support systems, end user computing, information systems in various business functions like marketing, manufacturing, human resources, accounting, and financial management. Other topics include information resource management, file organization techniques, and humans as information processors.
This document defines key concepts in information systems, including data, information, and information systems themselves. It describes the five main components of information systems as data, hardware, software, people, and procedures. It also outlines five common types of information systems and explains the hierarchy of data from the bit level up to databases.
The document discusses the role and responsibilities of an information system manager. An information system manager may oversee standalone PCs, networks, or multi-user systems. Key responsibilities include understanding how hardware and software function, configuring systems for optimal performance, evaluating performance, training users, and maintaining the system. To be effective, an information system manager needs patience, communication skills, hands-on experience, and a working knowledge of hospitality operations. The role can be reactive, proactive, or coordinative in integrating business needs with technology. Well-managed systems provide accurate, accessible data to efficiently support operations.
1) An information system is a set of interrelated components that collect, process, store, and disseminate data and information to meet an objective.
2) Information systems can be classified as either operations support systems, which process data from business operations, or management support systems, which provide information to support managerial decision making.
3) Key types of information systems include transaction processing systems, process control systems, office automation systems, management information systems, decision support systems, and executive information systems.
1) An information system is a set of interrelated components that collect, process, store, and disseminate data and information to meet an objective.
2) Information systems can be classified as either operations support systems, which process data from business operations, or management support systems, which provide information to support managerial decision making.
3) Key types of information systems include transaction processing systems, process control systems, office automation systems, management information systems, decision support systems, and executive information systems.
Management Information System Complete Guide and Notes by muhammad Khurram ba...Muhammad Khurram Baig
Â
This is complete Guide of MIS Book by Muhammad Khurram Baig. MIS and ERP Consultant of RIBAMS Audit and Technology House
For more information please contact 00923138854562
or drkoi99@gmail.com
13099838 management-information-system-unit1-part2Ngaire Taylor
Â
The document provides information on management information systems (MIS). It begins with definitions of MIS, describing it as a formalized computer system that integrates data to provide information for management decision making. It then discusses the roles of MIS in supporting business operations and managerial decision making. The document also covers the history of the role of information systems and how they have evolved from electronic data processing to supporting electronic business and commerce. Finally, it discusses the functions of management and how MIS provides support to each management function like planning, organizing, staffing, directing, coordinating and controlling.
Office automation systems use computers and software to digitally manage office tasks like document creation, data storage, and information sharing. They allow tasks to be automated and make work more efficient. Key applications of office automation include data processing, digital information management, and information exchange. It emphasizes replacing manual tasks with automated computer processes. Common functions integrated by office automation systems are electronic publishing, communication, collaboration, imaging, and office management. This helps optimize existing office procedures through sophisticated electronic equipment and networks.
The document discusses the steps involved in producing an educational multimedia project, including defining the project title in the analysis phase, gathering materials such as text, graphics, audio and video, and using an authoring tool like Toolbook Assistant 2004 to integrate the elements and create an interactive multimedia program. A production team is typically involved consisting of roles such as project manager, subject matter expert, graphic artist, programmer, and more.
The document discusses the evolution and usage of information and communication technology (ICT). It covers the evolution of communication from early forms like sign language to modern technologies like the internet and smartphones. It then defines key ICT concepts like information, communication, and technology. The document also provides timelines showing the development of important technologies over history from the abacus to the computer. It discusses how ICT is used in different sectors like education, banking, industry, commerce, and others. Finally, it covers the impact of ICT on society through faster communication speed, lower communication costs, and more reliable communication.
Information systems and its components 1Ashish Desai
Â
The document discusses various components of information systems including:
- Information which is processed data that has meaning
- Systems which take inputs, process them, and produce outputs
- Information systems which combine people, hardware, software, and networks to transform data into information products
It then describes key elements of information systems such as input/output devices, data storage, databases, database models including hierarchical, network, relational and object oriented models. Networking concepts like protocols and topologies are also covered at a high level.
Group members and an introduction to information systems are provided. Key concepts around data, information, and knowledge are defined. The document discusses the types of information systems used in organizations and how systems are developed. It also provides definitions for important terms like data, information, organization, and systems development.
An information system collects data, processes it into information, and provides information to users. It consists of hardware, software, data, people, and procedures. Information systems are used in education, business, and management to keep track of statistics, enable online learning and transactions, and analyze products.
The document defines an information system as a combination of hardware, software, infrastructure, and trained personnel organized to facilitate planning, control, coordination, and decision making in an organization. It notes information systems have advantages like making work easier, allowing real-time updates, and improving organizational quality, but also have disadvantages such as costs, system breakdowns, lack of IT skills, privacy issues, and unemployment. The document provides examples of how information systems are used in daily life and business.
The document discusses information systems and how computers process data. It defines an information system as a set of components that collect, process, and disseminate data to meet an objective. It also defines a computer as an electronic device that can accept, manipulate, and produce information under the control of stored software instructions. The document then provides examples of input, processing, output, and storage in information processing.
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
Â
Topics:
Introduction to Security and Privacy
Introduction to Operating System
Introduction to Artificial Intelligence
Objectives:
Distinguish the importance of cryptography.
Analyze decoding and encoding.
Engage in different Operating System.
Evaluate the role of Operating System in a device.
Know about Artificial Intelligence.
Identify the different types of Artificial Intelligence.
This document discusses managing and securing information systems in hospitality organizations. It covers the importance of computers, identifying mission critical systems like reservation and POS systems, maintaining these systems, common causes of system failure, and strategies for disaster recovery and business continuity planning. It also discusses security challenges like viruses, spyware, and data encryption. PCI compliance for payment card data is explained.
Master of business administration m.i.smusheer1234
Â
Management information system (MIS) provides information to support decision making and management functions. Value chain analysis examines the primary and support activities involved in a business process to understand how to better manage costs and create value. Business process reengineering (BPR) is a fundamental rethinking and radical redesign of business processes to achieve improvements in critical areas like cost, quality, and speed. Data warehousing and data mining allow organizations to analyze large amounts of data from various sources to identify patterns and make informed decisions. When used together, these tools can help organizations optimize processes, reduce costs and improve performance through effective use of information.
The document discusses different types of information systems used in organizations, including transaction processing systems, management information systems, decision support systems, executive support systems, and knowledge work systems. It describes how these systems integrate functions and business processes across departments like finance, human resources, manufacturing, and sales.
Information Processing system is a set of formal procedure by which data are collected, processed into information and distributed to users. Financial accounting collects financial data from different areas of the company.
The document discusses various in-room technologies used in hotels, including electronic locking systems, energy management systems, fire alarm and security systems, in-room minibars, and guestroom phone/entertainment systems. It describes the evolution of keycard technologies from mechanical keys to smart cards and RFID keys. It also explains different types of energy management systems that use sensors and controls to reduce energy usage when rooms are unoccupied.
This document contains 26 questions and their answers related to management information systems. The questions cover topics such as data resource management, databases, data warehousing, transaction processing, decision support systems, end user computing, information systems in various business functions like marketing, manufacturing, human resources, accounting, and financial management. Other topics include information resource management, file organization techniques, and humans as information processors.
This document defines key concepts in information systems, including data, information, and information systems themselves. It describes the five main components of information systems as data, hardware, software, people, and procedures. It also outlines five common types of information systems and explains the hierarchy of data from the bit level up to databases.
The document discusses the role and responsibilities of an information system manager. An information system manager may oversee standalone PCs, networks, or multi-user systems. Key responsibilities include understanding how hardware and software function, configuring systems for optimal performance, evaluating performance, training users, and maintaining the system. To be effective, an information system manager needs patience, communication skills, hands-on experience, and a working knowledge of hospitality operations. The role can be reactive, proactive, or coordinative in integrating business needs with technology. Well-managed systems provide accurate, accessible data to efficiently support operations.
1) An information system is a set of interrelated components that collect, process, store, and disseminate data and information to meet an objective.
2) Information systems can be classified as either operations support systems, which process data from business operations, or management support systems, which provide information to support managerial decision making.
3) Key types of information systems include transaction processing systems, process control systems, office automation systems, management information systems, decision support systems, and executive information systems.
1) An information system is a set of interrelated components that collect, process, store, and disseminate data and information to meet an objective.
2) Information systems can be classified as either operations support systems, which process data from business operations, or management support systems, which provide information to support managerial decision making.
3) Key types of information systems include transaction processing systems, process control systems, office automation systems, management information systems, decision support systems, and executive information systems.
Management Information System Complete Guide and Notes by muhammad Khurram ba...Muhammad Khurram Baig
Â
This is complete Guide of MIS Book by Muhammad Khurram Baig. MIS and ERP Consultant of RIBAMS Audit and Technology House
For more information please contact 00923138854562
or drkoi99@gmail.com
13099838 management-information-system-unit1-part2Ngaire Taylor
Â
The document provides information on management information systems (MIS). It begins with definitions of MIS, describing it as a formalized computer system that integrates data to provide information for management decision making. It then discusses the roles of MIS in supporting business operations and managerial decision making. The document also covers the history of the role of information systems and how they have evolved from electronic data processing to supporting electronic business and commerce. Finally, it discusses the functions of management and how MIS provides support to each management function like planning, organizing, staffing, directing, coordinating and controlling.
Office automation systems use computers and software to digitally manage office tasks like document creation, data storage, and information sharing. They allow tasks to be automated and make work more efficient. Key applications of office automation include data processing, digital information management, and information exchange. It emphasizes replacing manual tasks with automated computer processes. Common functions integrated by office automation systems are electronic publishing, communication, collaboration, imaging, and office management. This helps optimize existing office procedures through sophisticated electronic equipment and networks.
The document discusses the steps involved in producing an educational multimedia project, including defining the project title in the analysis phase, gathering materials such as text, graphics, audio and video, and using an authoring tool like Toolbook Assistant 2004 to integrate the elements and create an interactive multimedia program. A production team is typically involved consisting of roles such as project manager, subject matter expert, graphic artist, programmer, and more.
The document discusses the evolution and usage of information and communication technology (ICT). It covers the evolution of communication from early forms like sign language to modern technologies like the internet and smartphones. It then defines key ICT concepts like information, communication, and technology. The document also provides timelines showing the development of important technologies over history from the abacus to the computer. It discusses how ICT is used in different sectors like education, banking, industry, commerce, and others. Finally, it covers the impact of ICT on society through faster communication speed, lower communication costs, and more reliable communication.
This document discusses multimedia concepts and definitions. It defines multimedia as the presentation of information using a combination of text, audio, graphics, video and animation. Multimedia involves both hardware and software used to communicate information, such as radios, TVs, computers, phones, email and video conferencing. Multimedia is commonly used in education, entertainment, business and scientific research. It can improve learning and make it more engaging through edutainment. The document also discusses interactivity in multimedia, distinguishing between linear and non-linear interactivity and how users can interact with and control multimedia content. Common mediums for delivering multimedia include web-based multimedia through websites and CD-based multimedia through discs like CD-ROMs and Blu
A computer system consists of four major hardware components: input devices, output devices, a processor, and storage devices. Input devices feed data into the processor, the processor processes the data, and storage devices hold both processed and unprocessed data. Common input devices include keyboards, mice, scanners, and digital cameras. Output devices like monitors display processed data for the user. A computer requires hardware, software, and a user to fully function.
This document discusses computer networks and communications. It begins by defining a computer network as a system that connects interconnected computers and peripheral devices to communicate and share information and resources. There are three main types of networks: local area networks (LANs) which cover a small area like a building; metropolitan area networks (MANs) which connect LANs within a larger area like a city; and wide area networks (WANs) which are the largest and connect LANs or MANs across large distances like countries or continents. The document then discusses network architectures, focusing on client/server networks where shared files and applications are stored on a server and accessed by client computers, and peer-to-peer networks where all nodes can
This document defines key concepts related to information systems including data, information, information systems, and the components and types of information systems. It also discusses database concepts like the hierarchy of data from the bit level up to files and records. The key components of information systems are identified as input, processing, and output. Examples are provided of how information systems are used in different fields like education and business.
This presentation is an overview and introduction to social media. Looking at Facebook, Twitter and LinkedIn we reveal a 10 minute social media formula for implementation in small business and particularly for health practitioners and sole traders. This presentation was given at the Australian Traditional Medicine Society AGM. We recorded the voice over the slide show afterwards. Ask your social media questions on our Facebook page www.facebook.com/socialmediologist
A foreign key is a field or group of fields in a table that links to the primary key of another table. It works like a cross-reference between two related tables. For example, a student registration system may have a Courses table with a primary key of CourseID. The Students table would then have a foreign key of CourseID to link each student record to the course they are enrolled in. Together the primary key and foreign key help define the relationship between tables and maintain data integrity.
The document provides information on data, information, and information systems. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to a user. An information system is a set of related components that collects data, processes it, and provides information. It gives examples of information systems used in education like learning management systems, and information systems used in business for online shopping, transportation, and hotel booking.
This document provides information on data, information, and information systems. It begins by defining data as raw unorganized material that has little value on its own. Data includes text, numbers, images, audio, and video. Information is organized data that is meaningful and valuable to a specific user. An information system is defined as a set of related components that collects data, processes it, and provides information. Examples of components include hardware, software, data, people, and procedures. School grading systems and other examples of information systems are provided.
1. The document discusses data, information, and information systems. It defines data as unorganized raw material with little value, while information is organized data that is meaningful to users.
2. An information system is described as a set of related components that collects data, processes it, and provides information. It includes input, processes, and output.
3. Examples of information systems include school grading systems, business retail systems, transportation delivery systems, and hotel booking systems.
Data is the raw material that is collected and organized into information. An information system collects, processes, and provides information by bringing together interrelated components like data, hardware, software, people, and procedures. For example, a school grading system collects student mark data from teachers, processes it by calculating grades, and outputs information like student report cards.
The document discusses the importance of information systems in decision making and strategy building for organizations. It defines information and information technology, and describes the difference between information systems and information technology. An information system is comprised of various components including hardware, software, data, people, and processes. Information systems help management make informed decisions, improve communication and business processes, and develop effective strategies. Managers play an important role in overseeing information systems and ensuring they meet the needs of the organization.
An information system combines people, processes, data and technology to support operations, management and decision-making. It processes data into information through input, processing, output, storage and control activities. An information system depends on resources like people, hardware, software, data and networks. It transforms data into information products through information processing. Transaction processing systems support routine tasks while management information systems and decision support systems aid management and complex decisions.
The document provides an overview of information systems, including their definition, components, types, functions, importance, and security considerations. It defines an information system as a set of components that collect, process, store and distribute information to support decision making in an organization. The key components are hardware, software, data, people, and networks. There are different types of information systems like transaction processing systems, management information systems, decision support systems, and expert systems that support various levels and functions within an organization. Ensuring security and privacy of information is also an important aspect.
Most schools do not realize full advantages of scaling up due to administrative challenges and manual processing of student data. MIS systems allow for great automation of most processes freeing up time for teachers to concentrate on core functions.
Introduction to IT, Introduction to IS, Difference be IS and IT, Need for Information System, Information Systems in the Enterprise, Impact of Information Technology on Business (Business Data Processing, Intra and Inter Organizational communication using network technology, Business process and Knowledge process outsourcing), Managers and Activities in IS, Importance of Information systems in decision making and strategy building, Information systems and subsystems.
An information system is a combination of hardware, software, infrastructure, and trained personnel that facilitates planning, control, coordination, and decision making within an organization. It turns raw data into useful information through organizing, processing, and analyzing the data stored in databases. Typical components of an information system include hardware, software, databases, networks, and procedures. Information systems support management activities like monitoring operations, achieving goals, and adapting to environmental trends to aid decision making.
Information systems are integral to modern organizations, supporting operations, knowledge work, and management. An information system consists of hardware, software, databases, telecommunications, procedures, and human resources. It collects, stores, and processes data and delivers information to users. Information systems allow organizations to manage their operations more efficiently and compete effectively. They also support individuals in conducting personal activities. However, ensuring security and controlling access to sensitive information is important.
Management information systems (MIS) are used to collect, process, store, and distribute
information to support decision making, coordination, control, analysis, and visualization in an
organization. MIS use hardware, software, networks, and data resources to transform data into
useful information. They provide outputs like scheduled reports, key indicator reports, and
demand reports to support management functions like planning, controlling, and decision making.
MIS help organizations gain competitive advantages through improved decision making and
performance monitoring. While MIS face challenges to build and maintain, they also create
opportunities to enhance productivity, quality, and global competitiveness.
1) Data refers to raw facts or numbers while information is data that has been organized and given meaning or context.
2) A system is defined as a group of interrelated components working together toward a common goal by accepting inputs, processing them, and producing outputs. Key components of systems include inputs, processing, outputs, feedback, and control.
3) Information systems can be classified as either operations support systems, which process business transactions and control processes, or management support systems, which provide information to support decision making.
This document provides definitions and information about various types of information systems:
- It defines data, information, intelligence, and information technology (IT).
- It discusses the need for and importance of IT in education.
- It explains functional information systems, decision support systems (DSS), executive support systems (ESS), knowledge management systems (KMS), geographic information systems (GIS), and international information systems.
- It provides overviews of the components, classifications, and purposes of these different information systems.
Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.
Many businesses use information technology to complete and manage their operations, interact with their consumers, and stay ahead of their competition. Some companies today are completely built on information technology, like eBay, Amazon and Google.
The document discusses management information systems (MIS) which use computer hardware and software to collect, process, store, and disseminate information to support decision making and problem solving within an organization. An MIS manages information through acquiring, using, and discarding data efficiently. It also discusses the differences between data and information, skills required for MIS including computer and information literacy, and various computer-based information subsystems like accounting, management, and marketing information systems. Information specialists that support MIS are also outlined.
This document provides an overview of information systems, including their components and types. It describes how information systems are composed of people, hardware, software, data, and telecommunications. It also explains the main types of information systems: transaction processing systems, management information systems, decision support systems, and executive information systems. Each type is used to support different levels of management in an organization.
The document discusses the evolution of management information systems (MIS). It describes how MIS have developed from early office automation systems used to support clerical workers, to modern systems that provide computer-based support for complex decision making. The key components of an information system are outlined as hardware, software, databases, networks, and human resources. Transaction processing systems record daily transactions, while management information systems guide tactical decisions and decision support systems aid strategic decision making by top managers.
The document discusses a seminar on management information systems. It defines an information system and its components, including resources of people, hardware, software, data, and networks. It then discusses the functions of management information systems and different types of systems, including decision support systems, group decision support systems, executive information systems, management information systems, transaction processing systems, and office systems. The document emphasizes the growing role of information systems in integrating and coordinating business processes across organizations.
This document discusses basic programming concepts including:
1) A program is a set of instructions that directs a computer to perform tasks. Programming involves writing programs using programming languages.
2) There are different generations of programming languages from low-level machine languages to high-level languages that are more abstract and portable.
3) The five basic elements in programming are: data types, variables, constants, operators, and control structures. Variables can be changed during program execution while constants remain fixed.
Computer networks allow interconnected computers and devices to share information and resources. They transmit digital data through physical transmission mediums like cables or wirelessly. Protocols define communication standards to minimize errors. Popular uses of networks include e-business, online education, and remote communication, which have benefited society through increased access and lower costs.
The document discusses various aspects of computer systems including:
1. It defines input devices, processors, storage devices, and output devices as the main components of computer hardware.
2. It explains that computer software includes system software like operating systems and utility programs, as well as application software for tasks like word processing.
3. It provides examples of different data storage units like kilobytes, megabytes, and gigabytes that are used to measure data and storage capacities.
ICT refers to the technologies required for information processing, including electronic computers, communication devices, and software applications. These technologies allow for information to be converted, stored, processed, transmitted, and retrieved from anywhere at any time. Key aspects of ICT include computers, the internet, email, video conferencing, phones, fax machines, radio, television, and satellites. ICT has evolved over time from early counting tools to modern computers and is now widely used in education, banking, industry, e-commerce, and other areas of daily life.
This document is an assessment checklist from the Malaysian Examinations Board for an assignment on current developments in computer information systems. The checklist contains 6 criteria to be completed by the candidate regarding web-based applications, including defining them, giving an example, stating functions and programming languages used, advantages over non-web applications, and vulnerabilities. The candidate must provide evidence and sources to be evaluated and scored by the assessor.
This document is an assessment checklist form for a database development project. It contains 7 criteria to be assessed: stating the project title and objectives, creating required tables with fields and primary keys and relating the tables, creating a form for each table, entering data, creating a query across two tables, creating a report from the query, and submitting the report and softcopy of the project. Candidates will be assessed on a scale of 1 to 3 for completing each criterion based on evidence provided and remarks from the assessor.
This document is an assessment checklist for a student project on the current and future development of the latest programming languages. The checklist contains 3 criteria for the student to complete: 1) Identify and name the two latest programming languages, 2) Provide details on one programming language including its developer, date of development, purpose, platform, approach, and translator used, and 3) State the source of reference used. The student's work will then be assessed and scored by an assessor based on this checklist.
This document is an assessment checklist form used by the Malaysian Examinations Board to evaluate a candidate's skills in program development. It contains 5 criteria: [1] problem analysis, [2] program design, [3] coding, [4] testing and debugging, and [5] documentation. For each criterion, the form lists evidence the candidate must provide and spaces for the assessor to check off completion and add remarks. The candidate's and assessor's signatures are required at the bottom.
This document is an assessment checklist form from the Malaysian Examinations Board for a multimedia learning area assignment. The form contains 5 criteria for gathering examples of immersive multimedia in education, business, or entertainment using a scrapbook. Candidates are to provide a front cover with topic and name, include at least 6 relevant pages citing sources and dates, and submit another related form for assessment of the assignment.
This document is an assessment checklist for a multimedia development project. It contains 6 criteria for evaluating the phases of multimedia production: analysis, design, implementation, testing, evaluation, and publishing. A candidate is to complete an interactive educational multimedia project by applying all phases of production based on a provided storyboard, and submit it for assessment using this checklist.
1. The document is an assessment checklist from the Malaysian Examinations Board for a student's written assignment on the latest developments in networks and communications.
2. It lists several criteria to be assessed, including describing mobile computing, internet technologies/services, types of networks, following the written assignment format, and displaying cooperation.
3. The student is to provide evidence for each criterion and the assessor will check off if it is completed and provide any remarks.
This document is an assessment checklist for a candidate demonstrating the ability to configure and test a network connection. It contains criteria for setting an IP address, subnet mask, choosing another computer to ping, and copying the ping result. The candidate is expected to provide evidence for meeting each criterion by writing the relevant information in the form. A score will then be given and signatures from the candidate and assessor are required.
This document contains:
1. An assessment checklist form for a written assignment on the latest open source software and developments in information and communication technology (ICT).
2. It lists 6 criteria to be assessed, including explaining open source operating systems and applications, recent hardware and software developments, pervasive computing examples, and assignment formatting.
3. Candidates are to fill in evidence and assessors mark completed criteria, with remarks and final scores signed by both the candidate and assessor.
This document contains:
1. An assessment checklist form for a written assignment on the latest open source software and developments in information and communication technology (ICT).
2. It lists 6 criteria to be assessed, including explaining open source operating systems and applications, recent hardware and software developments, pervasive computing examples, and assignment formatting.
3. Candidates are to fill in evidence and assessors will check off completed criteria and provide remarks. Scores and signatures are also included.
This document is an assessment checklist form from the Malaysian Examinations Board for a computer systems student. The form evaluates the student's ability to install an operating system, application software, and a utility program. It lists the criteria to be assessed, including writing the names of the software installed. Space is provided for evidence, assessor checks, remarks, and signatures from the candidate and assessor.
This document is an assessment checklist for assembling the components of a personal computer. It contains criteria for correctly installing the processor, RAM, power supply unit, hard disk, floppy/optical drives. The candidate must provide evidence for meeting each criterion, such as writing the processor specification or hard disk capacity. Upon completing the assembly, the computer should boot up successfully and the BIOS setup should detect all components. The assessor uses this form to evaluate the candidate's work and provide a score.
- A computer system consists of four major hardware components: input devices, output devices, a processor, and storage devices. It requires both hardware and software, as well as a user, to function fully.
- Common input devices include keyboards, mice, and digital cameras. Common output devices include computer screens and printers. The processor processes data and storage devices like hard disks store both processed and unprocessed data.
- A computer system's central processing unit (CPU) acts as its brain by controlling all processing activities. Data enters as input, is processed by the CPU and stored in storage, then exits as output.
This document is an assessment checklist form from the Malaysian Examinations Board for a candidate's verbal presentation on the impact of information and communication technology (ICT) on society. The form includes 4 criteria to be assessed: 1) locating information from more than one source, 2) presenting the information in 5 to 10 slides, 3) including the topic, content, conclusion, and sources in the presentation, and 4) displaying cooperation by including group members' names and verification. The candidate and assessor must sign the form and include the date.
This document is an assessment checklist form from the Malaysian Examinations Board for a candidate's verbal presentation on the impact of information and communication technology (ICT) on society. The form includes 4 criteria to be assessed: 1) locating information from more than one source, 2) presenting the information in 5 to 10 slides, 3) including the topic, content, conclusion, and sources in the presentation, and 4) displaying cooperation by including group members' names and verification. The candidate and assessor must sign the form and include the date.
1) The document is an assessment checklist form from the Malaysian Examinations Board for a candidate's demonstration of applying correct security procedures using anti-spyware.
2) It lists 4 criteria to be completed by the candidate and assessed by the evaluator, including choosing an anti-spyware software, running a scan and stating the mode, copying the scan summary, and taking action to remove or quarantine any detected spyware.
3) The candidate and assessor must sign the form once the assessment is completed.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
Â
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Â
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Â
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
Â
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...Edge AI and Vision Alliance
Â
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Fueling AI with Great Data with Airbyte WebinarZilliz
Â
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Â
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Â
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und ĂĽberflĂĽssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Â
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Leveraging the Graph for Clinical Trials and Standards
Â
La6 is notacd11
1. SMK Sultan Yahya Petra 1
INFORMATION SYSTEM
LESSON 41
DATA, INFORMATION AND INFORMATION SYSTEM
DATA
Data and information are used in our daily life. Each type of data has its own
importance that contribute toward useful information.
Data is like raw material. It is not organised and has little value. Data can
include text, numbers, images, audio and video.
Text data consists of sentences and paragraphs.
Number or numerical data consists of digits from 0 to 9.
Image data are graphical images.
Audio data can be sound, voice or tones
Video data consist of moving images
148
2. SMK Sultan Yahya Petra 1
INFORMATION
Information is organised data that is valuable and meaningful to a specific
user.
INFORMATION SYSTEM
Information system is a set of a related components
that collects data, processes data and provides
information.
For example: School Grading System is the information
system used in schools. In this system, student’s mark
are the input data that must be obtained from the class
teachers.
Process involves making calculations, comparing,
grading and storing data.
In a School Grading System, output usually in the form of documents.
Output can be digital or in printed format.
LESSON 42
USAGE OF INFORMATION SYSTEMS IN VARIOUS FIELDS
INFORMATION SYSTEMS IN EDUCATION
Keep track of students statistic and grades.
Help students and teachers in online learning and discussion –
Learning Management System, example : Moodle, University Sains
Malaysia and Open University Malaysia.
Store subject content – for Online Learning Portal.
USAGE OF INFORMATION SYSTEMS IN BUSINESS
Carry out online buying and selling :
In retail companies, information systems are used in online buying and
selling. Examples of information systems for a retail company are
Amazon.com, Lelong.com and Maybank2U.com.
Help plan the delivery of goods and services :
In the transportation industry, information systems are used to help
plan the delivery of goods and services. Examples of information
systems in the transportation industry are UPS.com, FedEx Express
and City-Link.
149
3. SMK Sultan Yahya Petra 1
Make room bookings and for checking the best rates :
In the hotel industry, information systems are used to make room
bookings and for checking the best rates. Examples of information
systems in the hotel industry are Genting Online booking, Booking.com
and Sabah Hotel Booking Center.
USAGE OF INFORMATION SYSTEMS IN
MANAGEMENT
See employee records : In human resource management,
information systems are used to see things like employee records.
Analyse product, services and product prices : In marketing
management information systems are used to analyse products,
services and product prices that give the best sales.
Process customer ordes, organise production times and keep
track of product inventory : In manufacturing management,
information systems are used to process customers orders, organise
production times and keep track of product inventory.
EXTENSION : INFORMATION SYSTEMS CAREERS
Graduates with information systems degrees usually
have a variety of job opportunities. Knowledge of
information systems will help you develop skills on
application software.
Examples of jobs in information systems are
database administrator, systems analysts and
system designer.
LESSON 43
INFORMATION SYSTEM COMPONENTS
COMPONENTS OF AN INFORMATION SYSTEM
An information system (IS) is a set of related
components that collects data, process data and
provide information.
150
4. SMK Sultan Yahya Petra 1
The components of information systems are: data, hardware, software,
people and procedures.
DATA
Data is very important in information systems. Without data, decision and
conclusion cannot be made. The right data in information systems helps us
to make the right decision.
For example, the stock status report in a book store helps the book store's
manager to decide when to reorder their stocks.
HARDWARE
The hardware component in an information system means all computer
equipment used to perform input, processing and output functions.
Hardware resources also include all media on which data is recorded, such
as paper, floppy disks and compact discs.
151
5. SMK Sultan Yahya Petra 1
SOFTWARE
The software component in an information system consists of programs for
the computers. These programs allow the computers to carry out most of
the instructions related to information processing.
There are two types of software: system software and application
software.
System software controls basic computer operations. For example, the
Operating Systems are Microsoft Windows, Linux and Macintosh.
152
6. SMK Sultan Yahya Petra 1
Application software are the programs that allow users to do specific tasks.
Examples of application software are Microsoft Excel, Microsoft Access and
SQL Server.
PEOPLE
People involved is information systems personnel and end users.
INFORMATION SYSTEMS PERSONNEL
People involve in IS are the database
administrator, system analyst and system
designer.
Database administrator : The database administrator monitors
database security and solves errors.
System analyst : A system analyst analyses the customer's needs by
providing specifications to customers.
System designer : A system designer designs database according to
the specifications given by systems analysts.
153
7. SMK Sultan Yahya Petra 1
INFORMATION SYSTEMS END USER
End users are people who use information
systems. They can be customers, managers
and clerks.
PROCEDURES
Procedures are operating instructions
for the user of an information system.
Procedures can be in the form of
guidelines in the user manuals.
154
8. SMK Sultan Yahya Petra 1
INTERRELATIONSHIP BETWEEN INFORMATION
SYSTEMS COMPONENT
An information system consists of the interrelated component of data,
hardware, software, people and procedures.
These components work together to perform input, process and output. This
provides information products in order to meet the needs of and information
system.
155
9. SMK Sultan Yahya Petra 1
For example, Dell Computer Corporation’s workers who receive input data,
will work on computers. This input data will be kept in the company’s
databases.
The database system stores information
about customer preferences on products
and also the technical problem faced.
Its customer service could give answers and suggestions quickly by having
the database.
EXTENSION : THE COMPONENTS OF A PORTAL
An enterprise portal is an information system which is a combination of
databases, software and procedures. The components of a portal are
documents, drawings, multimedia and data. These components have to be
processed, categorised, indexed and stored. This helps a company to
manage documents and media for future use.
156
10. SMK Sultan Yahya Petra 1
LESSON 44
TYPES OF INFORMATION SYSTEM
In the 70s, businessmen used a manual system to run their business. They
used traditional filing systems to keep track their daily transactions.
They produced their reports based on a manual system. This caused the
delays in making decisions and in planning strategies.
Today, there are so may information systems available to help organisations
in making better decisions in business.
TYPES OF INFORMATION SYSTEMS
157
11. SMK Sultan Yahya Petra 1
Organisations need different information systems for various levels of
management. There are three levels of management: Top management,
middle management and low level management.
MANAGEMENT INFORMATION SYSTEM (MIS)
Management Information Systems are used to provide regular information
about the daily activities of a business to the manager.
Management Information Systems are to help managers make the business
processes and activities more efficient compared to doing them manually.
TRANSACTION PROCESSING SYSTEMS (TPS)
Transaction Processing Systems are used to record business transaction.
Transaction Processing Systems keep track of daily transactions in a
database.
158
12. SMK Sultan Yahya Petra 1
DECISION SUPPORT SYSTEMS (DSS)
Decision Support Systems provide managers with information to make the
best decisions.
Decision Support Systems help to analyse information, recognise problems
and making decisions.
Most Decision Supports Systems reports are in the form of charts and
diagrams.
EXECUTIVE INFORMATION SYSTEM (EIS)
Executive Information System helps top-level management to plan
strategies.
An Executive Information System is used to forecast future trends.
159
13. SMK Sultan Yahya Petra 1
EXPERT SYSTEM (ES)
Expert system is used to store knowledge and make logical suggestions for
the user.
Expert System users can be professionals like doctors and scientist.
Example : An Expert System can suggest conditions and estimate the
probability of having illness.
EXTENSION : OFFICE INFORMATION SYSTEM (OIS)
Office Information System is also known as office automation. Office
Information System is an information system that uses hardware, software
and networks to enhance work flow among employees.
160
14. SMK Sultan Yahya Petra 1
For example, the administration department has a request to purchase a
printer toner.
The purchasing department will issue a purchase order to the supplier.
The supplier will email the administration department about the purchase
order and the status of delivery.
LESSON 45
HIERARCHY OF DATA
BIT, BYTE, FIELD, RECORD AND FILE
The bit is represented by 0 for OFF or 1 for ON. It is a binary digit. It is the
smallest unit of data the computer can store in a database.
161
15. SMK Sultan Yahya Petra 1
A byte is a collection of bits. Each byte consists of eight bits. Each byte
represents a character.
For example : The letter S is made up of 0101 0011
A field is a unit of data consisting of one or more characters (bytes).
A field is the smallest unit of meaningful information in the database. Each
field has a field name.
The field name describes the data that should be entered into the field, such
as StudentID (Student ID), Name, Address and MyKad Number.
162
16. SMK Sultan Yahya Petra 1
A record is a collection of related fields.
Example : Each record stores data about a students.
For example, a student record is a collection of fields about a student.
A file is a collection of related records. For example, a student file is a
collection of students’ records.
HIERARCHY OF DATA
Hierarchy is a series of ordered
groupings in a system, beginning
with the smallest unit to the
largest.
Data is organised in a hierarchy
that begins with the smallest to
the largest unit of data, as it
progresses up the hierarchy.
Together, bits, bytes, fields,
records, files and database form
the hierarchy of data.
163
17. SMK Sultan Yahya Petra 1
EXTENSION : HIERARCHICAL DATA MODEL
OF DATABASE
In a hierarchical database, data is organised in a family tree. As with a
family tree, the hierarchical database has branches made up of parent and
child records.
Each parent record can have multiple child records. Each child records,
however, can have only one parent.
This is also a parent and child record.
In this model, records are searched from top to down. For example, to
locate records of employees working in the IT department of a local
company, you starts with the Employees, then Local Company, and then IT.
164
18. SMK Sultan Yahya Petra 1
LESSON 46
DATABASE
A bookshop’s online system enables customers to search for books easily. A
person can receive search results in an instant. He selects his books,
registers details online and completes the purchase.
DATABASE
Database is structured collection of information on specific subjects. We can
think of a database as an electronic filing system.
An example of the database is a telephone book which contains records of
names, addresses and contact numbers.
A database allows its contents to be easily accessed, updated, stored and
retrieved.
165
19. SMK Sultan Yahya Petra 1
DATABASE MANAGEMENT SYSTEM (DBMS)
A Database management System is a program that accesses information
from a database.
A Database Management System provides an interface between the
database and the user.
A Database management System enables you to extract, modify and store
information from a database.
Examples of DBMS are Oracle, SQL Server and Microsoft Access.
166
20. SMK Sultan Yahya Petra 1
EXTENSION : SELECTING THE BEST DBMS
Guidelines to select the best DBMS
Performance : How fast the database is able to update records can
be the most important performance criteria for some companies.
Integration – A good DBMS must be able to integrate with other
applications and databases.
Features – Features such as security procedures, privacy protection
and other access tools are important considerations.
An important feature like Report Generator is not included in the DBMS
program. You have to buy it separately.
LESSON 47
BENEFITS OF USING DATABASE
BENEFITS OF USING DATABASE
Minimises Data Redundancy
Most data item stored in only one file. With a database there is no need to
repeat recording the same data. This minimises data redundancy.
167
21. SMK Sultan Yahya Petra 1
For example, a school database would record a student’s name. address and
other details only once when the student enrols in the school.
Data Integrity Is Assured
A database ensures that data is correct for all files. When a user modifies
data in one of the files in a database, the same data will change
automatically in all the files. This is called data integrity.
Data Can Be Shared
A database allows the ease of sharing data. Data can be shared over a
network, by a whole organisation.
Information Can Be Accessed Easily
A database makes information access easy.
Everyone can access and manage data in a database.
168
22. SMK Sultan Yahya Petra 1
LESSON 48
FEATURES OF MICROSOFT ACCESS
MICROSOFT ACCESS
We can use database software such as SQL Server, Oracle and Microsoft
Access to organise data.
Among the three, Microsoft Access is easy to use
with tools that enable you to build your own
database.
Microsoft Access is a database program that
allows users to store and manage large collections
of information.
Microsoft Access is a Database Management
System. It allows users to create tables, set
relationships, design forms, queries and reports
very easily.
169
23. SMK Sultan Yahya Petra 1
FEATURES OF MICROSOFT ACCESS
Microsoft Access is part of the Microsoft Office
Software, so the menus, toolbars and dialog
boxes work basically the same as other
Microsoft Windows applications.
EXTENSION : THE FEATURES OF DBMS
These are some features of Microsoft Access compared to SQL. Microsoft
Access is more suitable for a small number of users. It is commonly used on
desktop computers and is not suitable for database driven Websites.
SQL can be assessed by hundreds or thousands of users at the same time.
SQL is used in servers of developers and more suited for database driven
Websites.
Microsoft Access is cheaper as it comes along with Microsoft Office suite.
SQL requires extra cost to purchase.
170
24. SMK Sultan Yahya Petra 1
LESSON 49
FEATURES OF TABLE, QUERY, FORM AND REPORT
FEATURES OF A TABLE
A table stores a collection of information about specific topic. For example
you can use a table to store student’s information in your database.
FEATURES OF A QUERY
A query is a type of a database objects in Microsoft Access. A query is a
request for a specific data from a database.
When you create a query, Microsoft Access helps to find information that
meets user’s criteria quickly.
171
25. SMK Sultan Yahya Petra 1
FEATURES OF A FORM
A form is an interface to enter information such as students’ details in your
database.
FEATURES OF A REPORT
A report summarises information from the database.
LESSON 50
RELATIONSHIP BETWEEN FIELD, RECORD AND FILE
FIELD
Field is a specific category of information in a table. In a table, fields are
usually shown in columns and it has its own field name at the top.
172
26. SMK Sultan Yahya Petra 1
For example, StudentID, Name, MyKad Number, Date of Birth, Gender,
Address and Contact Number. All the data within the same field holds the
same data type.
For example, StudentID, Name, Gender, Address and ContactNumber use
text as data type.
MyKad Number uses number as data type.
Date Of Birth uses date as data type.
Several fields make up a record.
RECORD
Record is a collection of fields about one person, place or thing in a table.
Records are arranged in rows.
The records consist of several data type
such as of text, date or numerical data.
A record is also known as the row or tuple.
For example, we have a total of five records in this table.
173
27. SMK Sultan Yahya Petra 1
FILE
A file is a set of data arranged in columns and rows. They are grouped
together for a specific purpose. For example, this is a Student Registration
System which records all the students’ information.
To form a file, the file must have fields and records. A file is sometimes
called a table or relation.For example, a Book file and a Student file.
EXTENSION : GUIDELINES FOR PUTTING DATA IN A
FIELD
A field like address may contain a big
piece of data. It make the process of
data searching slower.
You can break down the address field
into several smaller fields like, a
house number, a street address, a
residential area, a post code, a town,
a state and even the country.
For example, if you want to know who lives in Damansara Jaya, you just key
in Damansara Jaya in the Residential Area field. A list of persons who stay in
Damansara Jaya will be displayed.
This will make the search of your contacts easy.
174
28. SMK Sultan Yahya Petra 1
LESSON 51
PRIMARY KEY AND FOREIGN KEY
DEFINE THE PRIMARY KEY
A primary key is the field that uniquely represents each record in a table.
These keys must not have null values. Meaning, you must not leave these
keys blank.Each table in the database must have at least one primary key.
There is also another name for a primary key: the unique identifier.
In the student table, student name might not be a good primary key. For
example there are two Sulaiman bin Yahya in this school.
So, the Student Name is not a good primary key.
175
29. SMK Sultan Yahya Petra 1
You may use the MyKad Number as the primary key. Some students might
not have their own MyKad Number yet, the MyKad Number is sometimes
rejected as the primary key.
To uniquely identify each student, you can add a special StudentID field to
be used as the primary key. For example, each StudentID represents a
student.
DEFINE FOREIGN KEY
A foreign key is the field that matches the primary key in another table. It
contains the same data as those of the primary key in the other table.
176
30. SMK Sultan Yahya Petra 1
Foreign key fields are linked to fields in other tables. While a primary key
must have unique values, a foreign key may have duplicate values.
For example, the StudentID is the primary key in the Student table, but
the StudentID is a foreign key in the Subject table.
Since a student may take more than one subject, the foreign key
(StudentID) will have a duplicate value in the subject table.
177
31. SMK Sultan Yahya Petra 1
THE IMPORTANCE OF THE PRIMARY KEY
A primary key ensures data integrity by uniquely identifying each record.
It helps to avoid duplicating records.
It prevents null values being entered in the unique field.
DIFFERENTIATE BETWEEN THE PRIMARY KEY AND
FOREIGN KEY
A foreign key links to a primary key in another table.
While primary keys must have unique values, foreign keys may have
duplicate values. These are the differences between the primary key and
foreign key.
178
32. SMK Sultan Yahya Petra 1
EXTENSION : TYPES OF PRIMARY KEYS
There are three kinds of primary keys in Microsoft Access such as
AutoNumber primary keys, Single-field primary keys and Multiple-field
primary keys.
AutoNumber
It can be set to automatically enter a sequential number as each record is
added to the table.
If you don't set a primary key before saving a newly created table, Microsoft
Access will ask if you want it to create a primary key for you.
If you answer Yes, Microsoft Access will create an AutoNumber primary key.
Single-field
If you have a field that contains unique values such as ID numbers or part
numbers, you can assign that field as the primary key.
You can specify a primary key for a field provided it does not contain
duplicate values.
Multiple-field
In situations where you are unsure of the uniqueness of any single field, you
may assign two or more fields as the primary key.
If you are unsure whether you can select a multiple-field primary key, you
should probably add an AutoNumber field and assign it as the primary key.
179
33. SMK Sultan Yahya Petra 1
LESSON 52
RELATIONSHIP BETWEEN PRIMARY KEY AND FOREIGN
KEY
RELATIONSHIP BETWEEN TWO TABLES
Connections between fields of related tables having common values are
called relationships.
A relationship works by matching data in key fields, usually a field with the
same name in both tables.
These matching fields are the primary key from one table and a foreign key
in the other table.
IMPORTANCE OF THE RELATIONSHIP BETWEEN
PRIMARY KEY AND FOREIGN KEY
The primary key of one table becomes a foreign key of the other table.
By matching a foreign key with a primary key, the data does not need to be
entered repeatedly.
180
34. SMK Sultan Yahya Petra 1
A primary key makes creating Queries, Forms and Reports easier.
A primary key improves data performance by relating smaller tables into
meaningful databases.
EXTENSION : ENFORCE REFERENTIAL INTEGRITY
Referential integrity is a set of rules that protect data from accidental
changes or deletions, if matching records still exist in a related table.
For example, if a patient wants to check out, the referential integrity will
check whether this patient has any outstanding bills. If there is, referential
integrity will protect data from being deleted.
181
35. SMK Sultan Yahya Petra 1
In Microsoft Access, to enforce referential integrity between two tables,
double-click the line that connects the tables.
The Relationships dialog box will appear.
Click on Enforce Referential Integrity
Microsoft Access provides two options of referential integrity.
When you change data in the primary key, Microsoft Access will
automatically update the matching data in all related records.
When you have deleted a record in the primary table, Microsoft Access will
automatically delete matching records in the related table.
182
36. SMK Sultan Yahya Petra 1
LESSON 53
RELATIONSHIP BETWEEN PRIMARY KEY AND FOREIGN
KEY
DEFINE THE TABLE AS ONE OF THE DATABASE
OBJECTS
Tables are one of the database objects in Microsoft Access. A Table is a
collection of data that is organised as rows and columns.
Every database object such as Queries, Forms and Reports are based on one
ore more Tables.
A database contains at least one Table.
183
37. SMK Sultan Yahya Petra 1
IDENTIFY A TABLE
You can create new Tables using one of three methods:
Design view
Wizard
Datasheet
CREATING A TABLE IN DESIGN VIEW
When creating a Table in Design view, you customise your fields, data types
and even enter descriptions for them.
In the Database window, click Tables on the Objects bar, and then double-
click the Create table in Design view icon.
To add a field, click on the Field Name cell and type a field name.
To change data type, click the Data Type drop-down menu, and choose the
data type.
Click on a Description cell, and then type a description.
After that, you can define the Field Properties.
184
38. SMK Sultan Yahya Petra 1
Assign Primary key.
Save the Table.
CREATING A TABLE BY USING WIZARD
Microsoft Access lets you create a new Table based on their templates. In
the Database window, click Tables on the Objects bar, and then double click
the Create table by using wizard icon.
There are templates for Business and Personal options.
Scroll through the list to find and choose Students.
Click Next to continue.
Type a name for the Table, or accept the suggested name.
Click No when Table Wizard wants to assign the primary key. Click Next to
continue.
In the final wizard dialog box, click Enter data directly into the Table. Click
Finish.
We can also add another new column. Follow these steps.
Click Insert and select Column to add columns. Rename the field.
Change the data type.
Save the table.
The table is displayed in the Database windows.
CREATING A TABLE BY ENTERING DATA
Create a Table in Database view, we can enter data into the Table.
In the Database window, click Tables on the Objects bar.
Double-click the icon for Create table by entering data.
Click to move from field to field.
To change a field name, double-click the field name, type the new name and
then press Enter.
Enter all the data.
Click the save button on the toolbar.
185
39. SMK Sultan Yahya Petra 1
Type a table name and then click OK.
When asked a primary key, choose No.
Assign Primary key.
Save the Table.
The table is displayed in the Database windows.
EXTENSION : ENFORCE REFERENTIAL INTEGRITY
The Table Analyzer is a tool that breaks a large Table into small Tables. It
remove redundant data in the large Table.
Then it generates smaller new Table only to keep the required data such as
address and telephone number.
The information in the new Table will be the same as the large table.
It reduces data redundancy and makes the data easier to maintain.
186