SlideShare a Scribd company logo
Information system is a mechanism that helps
people collect, store, organise and use
information.
Information system can be any organized
organise combination of people, hardware,
software, communications networks and data
resources that collects, transforms, and
disseminates information in an organization.
The basic purpose of any information system is to
help its users get a certain type of value from the
information in the system, regardless of the type
of information that is stored or the type of value
desired.
The Purpose of Information
systems
For many businesses data storage can be an
enormous requirement that involves large computer
systems with terabytes of disk space. Therefore the
physical means of storing information in file cabinets,
notebooks or hard disks will not be enough.
The procedures for handling information is to ensure
its integrity. So, regardless of the size of the
information system, data-management rules must be
followed to eliminate duplicate entries, validate the
accuracy or format of data and to avoid the loss of
information.
The rules regarding information’s use and
distribution. The rules govern what information
should be distributed to whom, at what time, and in
what format.
Types of Information
Processing
As more business functions have been automated,
information systems have become increasingly
specialized. For example a company’s system may be
designed to help users gather and store sales orders.
Another system may be designed to help managers
analyze data. These specialized systems can operate
alone, or they can be combined to create a larger
system that performs different functions for different
people.
Transaction Processing Systems
A Transaction is a complete event, which may occur
as a series of many steps such as taking an order form
a customer. (Allow responses for taking an order)
All these steps can be processed through an
information system. A system that handles the
processing and tracking of transactions is called a
transaction processing system (TPS)
Decision Support Systems
Decision support system (DSS) is a special application
that collects and reports certain types of business
data, which can help mangers make better decisions.
Business managers often use decision support systems
to access and analyze data in the company’s
transaction processing system.
These systems can also include or access other types
of data, such as stock market reports or data about
competitors.
Many decision support systems are spreadsheet or
database applications that have been customized for a
certain business.

More Related Content

Viewers also liked

Rise of the hybrids
Rise of the hybridsRise of the hybrids
Rise of the hybridsOron Ben Zvi
 
Thai52
Thai52Thai52
Lesson 10 assignment
Lesson 10 assignmentLesson 10 assignment
Lesson 10 assignment
Oneil Powers
 
Lesson 6 value & importance of information
Lesson 6 value & importance of informationLesson 6 value & importance of information
Lesson 6 value & importance of information
Oneil Powers
 
Sci152
Sci152Sci152
Thai52
Thai52Thai52
Cablevision description
Cablevision descriptionCablevision description
Cablevision descriptionHank Forbes
 
nơi nào làm phim quảng cáo tốt nhất
nơi nào làm phim quảng cáo tốt nhấtnơi nào làm phim quảng cáo tốt nhất
nơi nào làm phim quảng cáo tốt nhấtteodoro578
 
nơi nào làm tvc quảng cáo ấn tượng
nơi nào làm tvc quảng cáo ấn tượngnơi nào làm tvc quảng cáo ấn tượng
nơi nào làm tvc quảng cáo ấn tượngjune847
 
Eğitimde Small Basic Kullanımı
Eğitimde Small Basic KullanımıEğitimde Small Basic Kullanımı
Eğitimde Small Basic Kullanımı
erdemcelik26
 
Deep in the sea ลึกลงไป ไกลสุดแสง
Deep in the sea ลึกลงไป ไกลสุดแสงDeep in the sea ลึกลงไป ไกลสุดแสง
Deep in the sea ลึกลงไป ไกลสุดแสง
Apisit Sangatid
 
LAVA Brands YEAR 2016 CALENDAR
LAVA Brands YEAR 2016 CALENDARLAVA Brands YEAR 2016 CALENDAR
LAVA Brands YEAR 2016 CALENDAR
Lava Brands
 
Film production risk assessment
Film production risk assessmentFilm production risk assessment
Film production risk assessment
Elliott BC
 
Oferta PSOE a partidos izquierda En Comú Podem
Oferta PSOE a partidos izquierda En Comú PodemOferta PSOE a partidos izquierda En Comú Podem
Oferta PSOE a partidos izquierda En Comú Podem
20minutos
 

Viewers also liked (16)

Rise of the hybrids
Rise of the hybridsRise of the hybrids
Rise of the hybrids
 
Vizebh Linkedin
Vizebh LinkedinVizebh Linkedin
Vizebh Linkedin
 
Thai52
Thai52Thai52
Thai52
 
Eng52
Eng52Eng52
Eng52
 
Lesson 10 assignment
Lesson 10 assignmentLesson 10 assignment
Lesson 10 assignment
 
Lesson 6 value & importance of information
Lesson 6 value & importance of informationLesson 6 value & importance of information
Lesson 6 value & importance of information
 
Sci152
Sci152Sci152
Sci152
 
Thai52
Thai52Thai52
Thai52
 
Cablevision description
Cablevision descriptionCablevision description
Cablevision description
 
nơi nào làm phim quảng cáo tốt nhất
nơi nào làm phim quảng cáo tốt nhấtnơi nào làm phim quảng cáo tốt nhất
nơi nào làm phim quảng cáo tốt nhất
 
nơi nào làm tvc quảng cáo ấn tượng
nơi nào làm tvc quảng cáo ấn tượngnơi nào làm tvc quảng cáo ấn tượng
nơi nào làm tvc quảng cáo ấn tượng
 
Eğitimde Small Basic Kullanımı
Eğitimde Small Basic KullanımıEğitimde Small Basic Kullanımı
Eğitimde Small Basic Kullanımı
 
Deep in the sea ลึกลงไป ไกลสุดแสง
Deep in the sea ลึกลงไป ไกลสุดแสงDeep in the sea ลึกลงไป ไกลสุดแสง
Deep in the sea ลึกลงไป ไกลสุดแสง
 
LAVA Brands YEAR 2016 CALENDAR
LAVA Brands YEAR 2016 CALENDARLAVA Brands YEAR 2016 CALENDAR
LAVA Brands YEAR 2016 CALENDAR
 
Film production risk assessment
Film production risk assessmentFilm production risk assessment
Film production risk assessment
 
Oferta PSOE a partidos izquierda En Comú Podem
Oferta PSOE a partidos izquierda En Comú PodemOferta PSOE a partidos izquierda En Comú Podem
Oferta PSOE a partidos izquierda En Comú Podem
 

Similar to Lesson 7 information systems

Information system
Information systemInformation system
Information system
Anjum Azika
 
Information System(IS).pptx
Information System(IS).pptxInformation System(IS).pptx
Information System(IS).pptx
PoojaRai661885
 
IPM Test.docx
IPM Test.docxIPM Test.docx
IPM Test.docx
Mikealay Desta
 
MODULE - I.pptx
MODULE - I.pptxMODULE - I.pptx
MODULE - I.pptx
saneesh kumar
 
Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What
JinElias52
 
System and System Information System
System and System Information SystemSystem and System Information System
System and System Information System
Harry Pott
 
Mis for share
Mis for shareMis for share
Mis for share
honeyshah
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for share
honeyshah
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
sparkeyrob
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
khawlamuseabd
 
p22252ppt1.pptx
p22252ppt1.pptxp22252ppt1.pptx
p22252ppt1.pptx
AROMALASHOKRCBS
 
Mis classification By Ram K Paliwal
Mis classification By Ram K PaliwalMis classification By Ram K Paliwal
Mis classification By Ram K Paliwal
Ram Paliwal
 
SYANDES K32 - Types of Information Systems Quiz #3
SYANDES K32 - Types of Information Systems Quiz #3SYANDES K32 - Types of Information Systems Quiz #3
SYANDES K32 - Types of Information Systems Quiz #3alysimplina
 
MIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HAMIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HA
Hepsijeba
 
Information system new
Information system new Information system new
Information system new
cristina jane penaso
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
vinitanf
 
2 information system in business
2 information system in business2 information system in business
2 information system in businessMichelle Cuestas
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Heru Ramadhon
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
Suleyman Ally
 

Similar to Lesson 7 information systems (20)

Information system
Information systemInformation system
Information system
 
Information System(IS).pptx
Information System(IS).pptxInformation System(IS).pptx
Information System(IS).pptx
 
IPM Test.docx
IPM Test.docxIPM Test.docx
IPM Test.docx
 
MODULE - I.pptx
MODULE - I.pptxMODULE - I.pptx
MODULE - I.pptx
 
Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What Chapter 6Systems6.1 Information Systems6.1.1 What
Chapter 6Systems6.1 Information Systems6.1.1 What
 
System and System Information System
System and System Information SystemSystem and System Information System
System and System Information System
 
Information system
Information systemInformation system
Information system
 
Mis for share
Mis for shareMis for share
Mis for share
 
MIS assignment for share
MIS assignment for shareMIS assignment for share
MIS assignment for share
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
 
p22252ppt1.pptx
p22252ppt1.pptxp22252ppt1.pptx
p22252ppt1.pptx
 
Mis classification By Ram K Paliwal
Mis classification By Ram K PaliwalMis classification By Ram K Paliwal
Mis classification By Ram K Paliwal
 
SYANDES K32 - Types of Information Systems Quiz #3
SYANDES K32 - Types of Information Systems Quiz #3SYANDES K32 - Types of Information Systems Quiz #3
SYANDES K32 - Types of Information Systems Quiz #3
 
MIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HAMIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HA
 
Information system new
Information system new Information system new
Information system new
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
 
2 information system in business
2 information system in business2 information system in business
2 information system in business
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Lesson 7 information systems

  • 1. Information system is a mechanism that helps people collect, store, organise and use information. Information system can be any organized organise combination of people, hardware, software, communications networks and data resources that collects, transforms, and disseminates information in an organization.
  • 2. The basic purpose of any information system is to help its users get a certain type of value from the information in the system, regardless of the type of information that is stored or the type of value desired.
  • 3. The Purpose of Information systems For many businesses data storage can be an enormous requirement that involves large computer systems with terabytes of disk space. Therefore the physical means of storing information in file cabinets, notebooks or hard disks will not be enough.
  • 4. The procedures for handling information is to ensure its integrity. So, regardless of the size of the information system, data-management rules must be followed to eliminate duplicate entries, validate the accuracy or format of data and to avoid the loss of information.
  • 5. The rules regarding information’s use and distribution. The rules govern what information should be distributed to whom, at what time, and in what format.
  • 6. Types of Information Processing As more business functions have been automated, information systems have become increasingly specialized. For example a company’s system may be designed to help users gather and store sales orders. Another system may be designed to help managers analyze data. These specialized systems can operate alone, or they can be combined to create a larger system that performs different functions for different people.
  • 7. Transaction Processing Systems A Transaction is a complete event, which may occur as a series of many steps such as taking an order form a customer. (Allow responses for taking an order) All these steps can be processed through an information system. A system that handles the processing and tracking of transactions is called a transaction processing system (TPS)
  • 8. Decision Support Systems Decision support system (DSS) is a special application that collects and reports certain types of business data, which can help mangers make better decisions. Business managers often use decision support systems to access and analyze data in the company’s transaction processing system. These systems can also include or access other types of data, such as stock market reports or data about competitors. Many decision support systems are spreadsheet or database applications that have been customized for a certain business.