SlideShare a Scribd company logo
1 of 26
MANAGEMENT INFORMATION
SYSTEM
Chapter 5
Computing and Communications Resources
1
OVERVIEW
 Hardware, Processor, Memory, Storage, I/O Devices
 Multimedia
 Personal Computing Devices
 Cell Phones with Interactive Messaging and Video
 Home Networks
 Home Computing Security
 Software
 Communication Networks
 LAN, VLAN, VPN
 Data Organization
 The Data Hierarchy 2
HARDWARE AND PROCESSORS
 Mainframes
 are large computers used for centralized information
systems.
 Microcomputers or PCs
 are computers used by one person.
 Processor (CPU)
 is where data processing is performed.
 Processor
 speed is measured by the number of cycles that occur
per second.
3
PROCESSORS
 MHz
 stands for millions of cycles per second.
 Word
 is the measure of how many bits can be moved with one
cycle of the processor.
 Word size
 is how many characters, “A”, can be moved in a single
cycle of the processor.
 Power
 is affected by both word size and processor speed.
4
MAJOR COMPUTER COMPONENTS
5
MEMORY AND STORAGE
 Memory (primary storage or RAM)
 is the storage area on the computer’s circuit board.
 Volatile
 Extremely fast
 Fixed storage
 is permanently installed in the computer.
 Removable storage
 media–tape, disk, CD, DVD, USB flash drive, etc.
6
INPUT DEVICES
 Human-captured data
 refers to input captured by a person typing on a
keyboard, clicking a mouse, speaking into a
microphone, or a similar interaction.
 Machine-captured data
 is data captured by an electronic or mechanical device.
 Point-of-sale terminals
 are scanners used in retail stores.
7
OUTPUT DEVICES
 Monitor
 Screen resolution, size 17-19’’ diagonals
 Graphic user interface (GUI)
 Printers
 Lasers are like copier machines.
 Ink-jets spray ink.
 Multimedia is the use of more than one medium at
a time.
8
PERSONAL COMPUTING DEVICES
 Cell phones with interactive messaging and video
 Smart cell phones are phones that perform tasks
associated with PCs, i.e., BlackBerry 7270, Treo
650.
 Global Systems for Mobile Communications (GSM)
digital cellular phone protocol
9
HOME NETWORKS
 Home computer networks assess the Internet via
cable modems or DSL modems.
 Setup usually requires the modem, network card(s),
wireless router.
 Wireless security uses Wired equivalent privacy
(WEP) which encrypts the data transferred between
the computer and wireless router.
10
HOME COMPUTING SECURITY
 Updates for OS and application software.
 For security and efficiency
 Microsoft Update
 Hackers are people who try to break into computer
systems in order to
 Gather information;
 Deny the owner access to his resources;
 Delete files;
 Disrupt the use by the owner.
 Viruses
 are small computer programs that replicate by inserting
themselves into computer resources such as programs
or files. 11
HOME COMPUTING SECURITY (CONT’D)
 Worms
 are self-contained files or programs
 Does not have to attach to program or file.
 Can delete, change files, send e-mails, and cause
problems.
 Denial-of-service attack
 is when the user is denied access to the services of the
computer because it is overwhelmed with e-mail.
 Antivirus software
 Norton, MacAfee, etc. Keep virus definitions updated.
 Spyware
 Microsoft Defender, Lava_soft Ad-Aware, etc. Free from
Microsoft. 12
SOFTWARE
 System software (OS)
 performs certain tasks that all computers
require.
 Hardware interfaces, device drivers
 Manage computer’s processes
 OS–Windows XP, Unix, Mac OS X, Linux
 Application software
 processes the user’s data.
 Prewritten application software
 is produced by suppliers and sold to users.
13
APPLICATION SOFTWARE
 Custom application software
 is when programmers for the business write the
software.
 User-written software
 in End-User Computing is created by the user,
such as Excel Macros, Access Wizards.
 User-friendly software
 is computer software that is simple and intuitive
to use.
14
COMMUNICATIONS
 Protocol
 is the specification for formatting data to be transferred
between communications equipment.
 Public connections
 Telephone modems
 Integrated Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
15
CONNECTING TO THE INTERNET
16
COMMUNICATIONS (CONT’D)
 Packet
 is a piece of the total data to be communicated, includes
sender and receiver addresses.
 Cable modems
 connect to the Internet via coaxial cable.
 Asynchronous transfer mode (ATM)
 Improve data transmission rates
 Provides increased speed
17
VIRTUAL PRIVATE NETWORKS
 Virtual Private Networks (VPNs)
 allow you to use the security and speed of a
private line but still use the low-cost Internet.
 Tunneling software
 establishes the set of intermediary locations of
the telephone equipment that will host a given
data communications transfer.
 Privacy is attained because the tunnel is not
established unless the sending and receiving
computers authenticate one another.
18
COMMUNICATIONS-NETWORKS
 Open Systems Interconnection (OSI)
 standard architecture for network connections
established by the ISO.
 Terminal
 is a device that has no storage or processor; it
allows for entering and displaying data for the
computer.
 Systems Network Architecture (SNA)
 is a protocol for large computers; it polls other
computers connected by the network for
transfers.
19
OSI REFERENCE MODEL
20
COMMUNICATIONS-NETWORKS (CONT’D)
 Token ring
 is a peer-to-peer protocol that allows each
computer to act as its own controller.
 Ethernet
 is an open protocol for peer-to-peer
communications.
 Data transmission crash
 is when two peer computers try to send data at
the same time.
21
COMMUNICATIONS-NETWORKS (CONT’D)
 Data packet
 is a piece of the total data to be communicated, combined
with the address of the destination computer, the sending
computer, and other control information.
 Transmission Control Protocol/Internet Protocol
(TCP/IP)
 TCP conducts communication over the network.
 IP handles the packets so they can be routed.
 IP address
 is a four-part set of numbers (each from 0 to 255), separated
by periods.
 Network interface card (NIC)
 is used to attach a device to the communications medium.
 Local Area Networks (LANs)
 is a group of computers and other devices that are connected
together by a communications medium. 22
COMMUNICATIONS NETWORK HARDWARE
23
COMMUNICATIONS-NETWORKS (CONT’D)
 Medium used by LANs can be copper wire, wireless,
fiber-optics, or other media.
 LANs join computers that are physically located
together.
 Same room or building
 Total distance is less than ½ mile.
 60 ft. between devices
 Metropolitan area network (MAN)
 is a network that has a physical distance limit of roughly 30
miles.
 Wide area networks (WANs)
 are used to connect computers and other devices when the
distance exceeds the constraints of LANs and MANs.
 Uses common carrier, public telephone system
 WANs have been replaced by the Internet. 24
INTERNET, INTRANET AND EXTRANET
 Internet
 is just a collection of networks that can be joined
together; Public.
 Intranet
 uses the same network protocols as the Internet but
limits accessibility to computer resources to a select
group of persons in the organization.
 Extranet
 is when the intranet is expanded to include users
beyond the firm; Trusted customers and business
partners.
25
THE CONVERGENCE OF COMPUTING AND
COMMUNICATIONS
 Computing devices and communications devices
are now incorporating features of the other into
themselves.
 Voice over Internet Protocol (VoIP) is the routing
of voice communications over the Internet as if they
were digital communications.
 WWW.SKYPE.COM – free software
26

More Related Content

What's hot

MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)Soetam Rizky
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
THE SAN FRANCISCO GIANTS WIN BIG WITH IT
THE SAN FRANCISCO GIANTS WIN BIG WITH ITTHE SAN FRANCISCO GIANTS WIN BIG WITH IT
THE SAN FRANCISCO GIANTS WIN BIG WITH ITMithinMadhu
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]mmuser2014
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyVan Chau
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologySukanya Ben
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01Norazila Mat
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 
Enterprise Resource Planning
Enterprise Resource PlanningEnterprise Resource Planning
Enterprise Resource PlanningAnkesh Gorkhali
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03Faisal14H
 
Management information systems
Management information systemsManagement information systems
Management information systemsnavin1
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integrationGoa App
 

What's hot (20)

MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Laudon Ch13
Laudon Ch13Laudon Ch13
Laudon Ch13
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
THE SAN FRANCISCO GIANTS WIN BIG WITH IT
THE SAN FRANCISCO GIANTS WIN BIG WITH ITTHE SAN FRANCISCO GIANTS WIN BIG WITH IT
THE SAN FRANCISCO GIANTS WIN BIG WITH IT
 
Laudon mis14 ch01
Laudon mis14 ch01Laudon mis14 ch01
Laudon mis14 ch01
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategy
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
MIS Chapter 3
MIS Chapter 3MIS Chapter 3
MIS Chapter 3
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
Enterprise Resource Planning
Enterprise Resource PlanningEnterprise Resource Planning
Enterprise Resource Planning
 
Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Chapter 6 MIS
Chapter 6 MISChapter 6 MIS
Chapter 6 MIS
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integration
 

Viewers also liked

Viewers also liked (6)

MIS Chap # 2.........
MIS Chap # 2.........MIS Chap # 2.........
MIS Chap # 2.........
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
 
Mis Chap # 1..........
Mis Chap # 1..........Mis Chap # 1..........
Mis Chap # 1..........
 
Sales management of NIKE
Sales management of NIKESales management of NIKE
Sales management of NIKE
 
Chapter 2 - the Firm and its Environment
Chapter 2 - the Firm and its EnvironmentChapter 2 - the Firm and its Environment
Chapter 2 - the Firm and its Environment
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 

Similar to MIS Chap # 5...

Computer Networks and Topologies.pptx
Computer Networks and Topologies.pptxComputer Networks and Topologies.pptx
Computer Networks and Topologies.pptxneymarjr65
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetTanvir Raihan
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introductionBaji Babu
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Computer networking
Computer networkingComputer networking
Computer networkingJayVerma35
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 

Similar to MIS Chap # 5... (20)

Computer networks
Computer networks   Computer networks
Computer networks
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Computer Networks and Topologies.pptx
Computer Networks and Topologies.pptxComputer Networks and Topologies.pptx
Computer Networks and Topologies.pptx
 
Networking
NetworkingNetworking
Networking
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Types of network
Types of networkTypes of network
Types of network
 
Types of network
Types of networkTypes of network
Types of network
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
City university
City universityCity university
City university
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Mmd2093 2 4
Mmd2093 2 4Mmd2093 2 4
Mmd2093 2 4
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer network
Computer networkComputer network
Computer network
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 

More from Syed Muhammad Zeejah Hashmi

Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Syed Muhammad Zeejah Hashmi
 
Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Syed Muhammad Zeejah Hashmi
 
Importance of learning business communication skills
Importance of learning business communication skillsImportance of learning business communication skills
Importance of learning business communication skillsSyed Muhammad Zeejah Hashmi
 
[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntationSyed Muhammad Zeejah Hashmi
 

More from Syed Muhammad Zeejah Hashmi (20)

Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 
Digital divide
Digital divideDigital divide
Digital divide
 
Human development index (HDI)
Human development index (HDI)Human development index (HDI)
Human development index (HDI)
 
Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)Meeting Scheduler using android and web application (UML Diagrams)
Meeting Scheduler using android and web application (UML Diagrams)
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]Android controller by SMS [control one android phone from another]
Android controller by SMS [control one android phone from another]
 
Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)Online Job Portal (UML Diagrams)
Online Job Portal (UML Diagrams)
 
Khalil Gibran by Zee Production
Khalil Gibran by Zee ProductionKhalil Gibran by Zee Production
Khalil Gibran by Zee Production
 
Can ethics be taught..!!
Can ethics be taught..!!Can ethics be taught..!!
Can ethics be taught..!!
 
Can ethics be taught.?
Can ethics be taught.?Can ethics be taught.?
Can ethics be taught.?
 
Co-factor matrix..
Co-factor matrix..Co-factor matrix..
Co-factor matrix..
 
Importance of learning business communication skills
Importance of learning business communication skillsImportance of learning business communication skills
Importance of learning business communication skills
 
Accounting Project
Accounting ProjectAccounting Project
Accounting Project
 
Poverty
PovertyPoverty
Poverty
 
MIS chap # 11.....
MIS chap # 11.....MIS chap # 11.....
MIS chap # 11.....
 
MIS chap # 10..
MIS chap # 10..MIS chap # 10..
MIS chap # 10..
 
MIS chap # 9.....
MIS chap # 9.....MIS chap # 9.....
MIS chap # 9.....
 
MIS chap # 6....
MIS chap # 6....MIS chap # 6....
MIS chap # 6....
 
[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation[Airline Information System] in Database Project presntation
[Airline Information System] in Database Project presntation
 
Emosfet slides....
Emosfet slides....Emosfet slides....
Emosfet slides....
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

MIS Chap # 5...

  • 1. MANAGEMENT INFORMATION SYSTEM Chapter 5 Computing and Communications Resources 1
  • 2. OVERVIEW  Hardware, Processor, Memory, Storage, I/O Devices  Multimedia  Personal Computing Devices  Cell Phones with Interactive Messaging and Video  Home Networks  Home Computing Security  Software  Communication Networks  LAN, VLAN, VPN  Data Organization  The Data Hierarchy 2
  • 3. HARDWARE AND PROCESSORS  Mainframes  are large computers used for centralized information systems.  Microcomputers or PCs  are computers used by one person.  Processor (CPU)  is where data processing is performed.  Processor  speed is measured by the number of cycles that occur per second. 3
  • 4. PROCESSORS  MHz  stands for millions of cycles per second.  Word  is the measure of how many bits can be moved with one cycle of the processor.  Word size  is how many characters, “A”, can be moved in a single cycle of the processor.  Power  is affected by both word size and processor speed. 4
  • 6. MEMORY AND STORAGE  Memory (primary storage or RAM)  is the storage area on the computer’s circuit board.  Volatile  Extremely fast  Fixed storage  is permanently installed in the computer.  Removable storage  media–tape, disk, CD, DVD, USB flash drive, etc. 6
  • 7. INPUT DEVICES  Human-captured data  refers to input captured by a person typing on a keyboard, clicking a mouse, speaking into a microphone, or a similar interaction.  Machine-captured data  is data captured by an electronic or mechanical device.  Point-of-sale terminals  are scanners used in retail stores. 7
  • 8. OUTPUT DEVICES  Monitor  Screen resolution, size 17-19’’ diagonals  Graphic user interface (GUI)  Printers  Lasers are like copier machines.  Ink-jets spray ink.  Multimedia is the use of more than one medium at a time. 8
  • 9. PERSONAL COMPUTING DEVICES  Cell phones with interactive messaging and video  Smart cell phones are phones that perform tasks associated with PCs, i.e., BlackBerry 7270, Treo 650.  Global Systems for Mobile Communications (GSM) digital cellular phone protocol 9
  • 10. HOME NETWORKS  Home computer networks assess the Internet via cable modems or DSL modems.  Setup usually requires the modem, network card(s), wireless router.  Wireless security uses Wired equivalent privacy (WEP) which encrypts the data transferred between the computer and wireless router. 10
  • 11. HOME COMPUTING SECURITY  Updates for OS and application software.  For security and efficiency  Microsoft Update  Hackers are people who try to break into computer systems in order to  Gather information;  Deny the owner access to his resources;  Delete files;  Disrupt the use by the owner.  Viruses  are small computer programs that replicate by inserting themselves into computer resources such as programs or files. 11
  • 12. HOME COMPUTING SECURITY (CONT’D)  Worms  are self-contained files or programs  Does not have to attach to program or file.  Can delete, change files, send e-mails, and cause problems.  Denial-of-service attack  is when the user is denied access to the services of the computer because it is overwhelmed with e-mail.  Antivirus software  Norton, MacAfee, etc. Keep virus definitions updated.  Spyware  Microsoft Defender, Lava_soft Ad-Aware, etc. Free from Microsoft. 12
  • 13. SOFTWARE  System software (OS)  performs certain tasks that all computers require.  Hardware interfaces, device drivers  Manage computer’s processes  OS–Windows XP, Unix, Mac OS X, Linux  Application software  processes the user’s data.  Prewritten application software  is produced by suppliers and sold to users. 13
  • 14. APPLICATION SOFTWARE  Custom application software  is when programmers for the business write the software.  User-written software  in End-User Computing is created by the user, such as Excel Macros, Access Wizards.  User-friendly software  is computer software that is simple and intuitive to use. 14
  • 15. COMMUNICATIONS  Protocol  is the specification for formatting data to be transferred between communications equipment.  Public connections  Telephone modems  Integrated Services Digital Network (ISDN)  Digital Subscriber Line (DSL) 15
  • 16. CONNECTING TO THE INTERNET 16
  • 17. COMMUNICATIONS (CONT’D)  Packet  is a piece of the total data to be communicated, includes sender and receiver addresses.  Cable modems  connect to the Internet via coaxial cable.  Asynchronous transfer mode (ATM)  Improve data transmission rates  Provides increased speed 17
  • 18. VIRTUAL PRIVATE NETWORKS  Virtual Private Networks (VPNs)  allow you to use the security and speed of a private line but still use the low-cost Internet.  Tunneling software  establishes the set of intermediary locations of the telephone equipment that will host a given data communications transfer.  Privacy is attained because the tunnel is not established unless the sending and receiving computers authenticate one another. 18
  • 19. COMMUNICATIONS-NETWORKS  Open Systems Interconnection (OSI)  standard architecture for network connections established by the ISO.  Terminal  is a device that has no storage or processor; it allows for entering and displaying data for the computer.  Systems Network Architecture (SNA)  is a protocol for large computers; it polls other computers connected by the network for transfers. 19
  • 21. COMMUNICATIONS-NETWORKS (CONT’D)  Token ring  is a peer-to-peer protocol that allows each computer to act as its own controller.  Ethernet  is an open protocol for peer-to-peer communications.  Data transmission crash  is when two peer computers try to send data at the same time. 21
  • 22. COMMUNICATIONS-NETWORKS (CONT’D)  Data packet  is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information.  Transmission Control Protocol/Internet Protocol (TCP/IP)  TCP conducts communication over the network.  IP handles the packets so they can be routed.  IP address  is a four-part set of numbers (each from 0 to 255), separated by periods.  Network interface card (NIC)  is used to attach a device to the communications medium.  Local Area Networks (LANs)  is a group of computers and other devices that are connected together by a communications medium. 22
  • 24. COMMUNICATIONS-NETWORKS (CONT’D)  Medium used by LANs can be copper wire, wireless, fiber-optics, or other media.  LANs join computers that are physically located together.  Same room or building  Total distance is less than ½ mile.  60 ft. between devices  Metropolitan area network (MAN)  is a network that has a physical distance limit of roughly 30 miles.  Wide area networks (WANs)  are used to connect computers and other devices when the distance exceeds the constraints of LANs and MANs.  Uses common carrier, public telephone system  WANs have been replaced by the Internet. 24
  • 25. INTERNET, INTRANET AND EXTRANET  Internet  is just a collection of networks that can be joined together; Public.  Intranet  uses the same network protocols as the Internet but limits accessibility to computer resources to a select group of persons in the organization.  Extranet  is when the intranet is expanded to include users beyond the firm; Trusted customers and business partners. 25
  • 26. THE CONVERGENCE OF COMPUTING AND COMMUNICATIONS  Computing devices and communications devices are now incorporating features of the other into themselves.  Voice over Internet Protocol (VoIP) is the routing of voice communications over the Internet as if they were digital communications.  WWW.SKYPE.COM – free software 26