Ch02

487 views

Published on

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
487
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Basic Operating System Functions: There are five core tasks of an OS: 1 - Processor management : The OS must ensure that each process and application receives the right amount of the processor’s time to function properly. 2 - Memory and storage management : The operating system must make sure that each process has enough memory to perform its job. In addition, the OS must also make sure that each type of memory available in the system is used properly and efficiently. 3 - Device management : The OS must also manage the hardware resources of the computer system. To do this, the OS uses special programs known as drivers . A driver's main task is to convert software commands into the right electrical signals to hardware. 4 - Application interface : The application program interfaces (APIs) of the operating system function much like hardware drivers. To perform their tasks, application programs request services from the operating system using an API. 5 - User interface : The operating system also manages the interaction between the user and the computer through the user interface which provides a consistent way for the user to interact with the computer.
  • Ch02

    1. 1. Information Systems: Creating Business Value by Mark Huber, Craig Piercy, and Patrick McKeown Chapter 2: IT for the Organization
    2. 2. What We Will Cover: <ul><li>The technological infrastructure of an organization </li></ul><ul><li>Databases: the primary data storage for organizations </li></ul><ul><li>Beyond databases: using other methods to store data, information, and knowledge </li></ul><ul><li>The IS integration problem </li></ul><ul><li>Information systems that support business activities </li></ul><ul><li>Business intelligence </li></ul>
    3. 3. Student ROI (Return on Investment) <ul><li>Your investment of time and effort in this course will result in your being able to answer these questions: </li></ul><ul><li>How do organizations use processors, networks, software, and storage? </li></ul><ul><li>What are the key concepts of data organization for an IS? </li></ul><ul><li>In what ways can organizations use IT to store and share data, information and knowledge? </li></ul><ul><li>What is the IS integration problem and how are organizations solving it? </li></ul><ul><li>How do organizations use IT to support transactions and business processes? </li></ul><ul><li>How does business intelligence enhance organizational decision making? </li></ul>
    4. 4. The Components of IT <ul><li>Accepting and storing data and information </li></ul><ul><li>Performing mathematical calculations </li></ul><ul><li>Applying logic to make decisions </li></ul><ul><li>Retrieving, displaying, and sending information </li></ul><ul><li>Consistently repeating the above actions many times </li></ul>
    5. 5. Information Technology Categories <ul><li>Hardware : the electronic and mechanical components you can see and touch </li></ul><ul><li>Software : the set of instructions that direct the hardware </li></ul><ul><li>Network technology : increases the power of IT by allowing the sharing of resource </li></ul>
    6. 6. IT Platform
    7. 7. Hardware Components <ul><li>Processing: Directs execution of instructions and the transformation of data </li></ul><ul><li>Memory: Temporarily stores data and instructions before and after processing </li></ul><ul><li>Input: Provides the interface used for data entry into a device </li></ul><ul><li>Output: Provides the interface to retrieve information from a device </li></ul><ul><li>Storage: Stores data, information, and instructions for the long term </li></ul><ul><li>Communications: Connects one IT device to another </li></ul>
    8. 8. The Central Processing Unit <ul><li>Core of all computing operations is a chip composed of millions of transistors called the central processing unit (or CPU ). </li></ul><ul><li>A transistor is an electronic switch that can be on (1) or off (0). </li></ul><ul><li>By combining multiple transistors we can represent data in a binary format. </li></ul><ul><li>The CPU works together with memory to control the execution of instructions and the processing of data. </li></ul><ul><li>CPU speed is measured by its clockspeed in billions of cycles per second ( gigahertz ). </li></ul>
    9. 9. Memory <ul><li>There are two types of memory—long term (ROM) memory and short-term (RAM) memory </li></ul><ul><li>Both types of memory are built onto memory chips </li></ul><ul><li>Both are measured in number of bytes stored: </li></ul><ul><ul><li>1000’s (kilobytes—KB) </li></ul></ul><ul><ul><li>Millions (megabytes—MB </li></ul></ul><ul><ul><li>Billions (gigabytes—GB) </li></ul></ul>
    10. 10. Read Only Memory <ul><li>Read Only Memory (ROM) contains instructions that are not meant to be changed or changed only infrequently </li></ul><ul><li>ROM is present in most IT devices </li></ul><ul><li>In computers, ROM holds instructions used to control the startup process </li></ul><ul><li>There are far fewer ROM chips than RAM chips in a computer </li></ul>
    11. 11. Random Access Memory <ul><li>Random Access Memory (RAM) is the predominant form of memory in a computer. </li></ul><ul><li>The CPU can access any item stored in RAM directly (randomly). </li></ul><ul><li>RAM is temporary memory so anything in RAM is lost when the computer is shut down. </li></ul><ul><li>Increasing RAM capacity is the easiest way to increase effectiveness of a computer. </li></ul>
    12. 12. Input Hardware <ul><li>Input devices provide one interface between the internal processes of an IS and its environment. </li></ul><ul><li>It allows us to enter data and commands. </li></ul><ul><li>Input devices include: </li></ul><ul><ul><li>Keyboards </li></ul></ul><ul><ul><li>Pointing devices such as a mouse </li></ul></ul><ul><ul><li>Scanning devices such a barcode scanner </li></ul></ul>
    13. 13. Keyboard <ul><li>Most widely used input device for computers. </li></ul><ul><li>Highly versatile, providing the capability to enter all types of data as well as instructions. </li></ul><ul><li>Ergonomic keyboards are keyboards that are designed to keep users safe as well as enabling them to be more productive. </li></ul>
    14. 14. Pointing and Scanning Devices <ul><li>Pointing devices such as a mouse allow users to provide instructions to a computer using physical movements, such as “point” and “click”. </li></ul><ul><li>Pointing devices tend to require less training than a keyboard. </li></ul><ul><li>More useful to entering commands than for entering data. </li></ul><ul><li>Scanning devices such as barcode readers improve speed and efficiency or perform a task more efficiently. </li></ul>
    15. 15. Output Hardware <ul><li>Output devices convert IT-processed information into a form usable by knowledge workers (or other machines) </li></ul><ul><li>Quality and speed of output is important in choosing an output device. </li></ul><ul><li>Common output devices include </li></ul><ul><ul><li>Display devices such as liquid crystal displays (LCDs) </li></ul></ul><ul><ul><li>Printers, typically laser or ink-jet as well as plotters </li></ul></ul><ul><ul><li>Speakers </li></ul></ul>
    16. 16. IT Storage Hardware <ul><li>Storage refers to hardware media and devices used to contain large amounts of data and instructions for the long term. </li></ul><ul><li>Storage is much slower to access than memory. </li></ul><ul><li>Examples include: </li></ul><ul><ul><li>Hard drive </li></ul></ul><ul><ul><li>CD and DVDs </li></ul></ul><ul><ul><li>USB flash memory </li></ul></ul>
    17. 17. Communications Hardware <ul><li>Network interface card (NIC) provides the physical connection between the computer and a local network </li></ul><ul><ul><li>Wired </li></ul></ul><ul><ul><li>Wireless </li></ul></ul><ul><li>Modems allow you to connect to a remote network over a telecommunications line (telephone line or cable TV service) </li></ul>
    18. 18. Software <ul><li>Software is information that specifies how the device should work with other data, information, and knowledge. </li></ul><ul><li>Software is legally protected just like music and books. </li></ul><ul><li>Firmware is software built into chips (hardware) like that in cell phones and PDAs </li></ul><ul><li>Software gets the job done! </li></ul><ul><ul><li>System Software </li></ul></ul><ul><ul><li>Application Software </li></ul></ul>
    19. 19. System Software <ul><li>Controls the hardware associated with a system </li></ul><ul><li>Supports the execution of application software </li></ul><ul><li>Two main types of systems software </li></ul><ul><ul><li>Operating Systems (OS) Software – coordinates and handles the details of working with the computer hardware. </li></ul></ul><ul><ul><li>Utility software – provides additional tools to maintain and service your system (many utility software tasks are now included in the OS). </li></ul></ul>
    20. 20. Basic OS Tasks
    21. 21. Application Software <ul><li>Application software is a complete, self-contained program or set of programs for performing a specific job. </li></ul><ul><li>Application software is the software you use to get things done. </li></ul><ul><li>Productivity software – software used by knowledge workers to work with data, information, and knowledge. For example, MS Office and Intuit’s Quicken software. </li></ul>
    22. 22. Types of Productivity Software <ul><li>Document Preparation Software : used in creating documents composed of text, images, and graphics. </li></ul><ul><li>Electronic Spreadsheet Software : used to perform general calculations and analyses. </li></ul><ul><li>Presentation Graphics Software : used for preparing slides and graphics for business presentations. </li></ul><ul><li>Database Management System (DBMS) software: used to design, create, update, and query data. </li></ul><ul><li>Personal Information Management (PIM) software: used to manage personal information. </li></ul>
    23. 23. Connecting over Networks <ul><li>Networks are everywhere! In this section, we concentrate on a computer networks. </li></ul><ul><li>A computer network consists of nodes that represent computer hardware and network user with hardware, software, and communications media forming links between nodes. </li></ul><ul><li>Network consists of 4 primary components: </li></ul><ul><ul><li>Data </li></ul></ul><ul><ul><li>Special hardware </li></ul></ul><ul><ul><li>Software that allows computers to share data. </li></ul></ul><ul><ul><li>Communications media to link computers together. </li></ul></ul>
    24. 24. Network Categories <ul><li>Computer networks are commonly described by the physical size of the network. </li></ul><ul><li>The most commonly use types are LANs and WANs. </li></ul><ul><li>A Local Area Network (LAN) is confined to a relatively small area like a building. </li></ul><ul><li>A Wide Area Network (WAN) connects computers over regions, countries, and continents. </li></ul>
    25. 25. Network Hardware <ul><li>There are three basic categories of network hardware </li></ul><ul><ul><li>Hardware to connect a device to a network. </li></ul></ul><ul><ul><li>Specialized hardware for handling network traffic. </li></ul></ul><ul><ul><li>Specialized computers that control the network and delivery of data on the network. </li></ul></ul>
    26. 26. Network Connection Hardware <ul><li>Modems, cable modems, network interface cards, and wireless cards </li></ul><ul><li>The physical link that creates the network connection is referred to as the carrier or communications medium. </li></ul><ul><ul><li>Copper wire for telephone systems </li></ul></ul><ul><ul><li>Coaxial cable or fiber-optic cables for faster transmission </li></ul></ul><ul><ul><li>Wireless technologies including infrared light, radio waves, and microwaves. </li></ul></ul>
    27. 27. Network Traffic Hardware <ul><li>A bridge is a device that lets you connect to networks or break a large network into two smaller, more efficient networks. </li></ul><ul><li>A router is an intelligent bridge that connects, translates, and then directs data that cross between two networks. </li></ul><ul><li>A hub (or concentrator ) serves as a central connection point for devices on a a network. </li></ul><ul><li>A wireless Access Point ( AP ) is a special bridge that connects between wireless devices and a wired network. </li></ul>
    28. 28. Specialized Network Computers <ul><li>Servers are specialized computers that manage the various functions on a network. </li></ul><ul><li>A file server is a fast computer with large amount of RAM and storage. </li></ul><ul><li>File servers run the network operating system as well as storing shared software applications and data files. </li></ul><ul><li>Computers connected to a file server are called clients or workstations. </li></ul>
    29. 29. Network Software <ul><li>Network operating system software manages network functions and the flow of data over a computer network. </li></ul><ul><li>Network application software provides the instructions that allow for the creation of data and for transformation to fit appropriate protocols for transmission over a network. </li></ul><ul><li>A protocol is a standard set of rules that allows the communication of data between nodes on a network. </li></ul>
    30. 30. Network Benefits <ul><li>Efficient communication: E-mail and instant messaging are just two ways that networks allow us to communicate more efficiently. </li></ul><ul><li>Effective resource management: Networks allow easy sharing of software, hardware, and data resources. </li></ul><ul><li>Complete, accurate, reliable, and timely information: Multiple users can access or update data quickly from a central database. </li></ul><ul><li>Expanded marketing and customer service capabilities: Businesses and individuals can carry out remote business transactions anytime and anywhere. </li></ul>
    31. 31. The Internet <ul><li>Any computer network that connects several networks together is an internet . </li></ul><ul><li>Typically we refer to the single largest and most popular internet as the “Internet.” </li></ul><ul><li>Over 1 billion people had access to the Internet in 2006. </li></ul><ul><li>The Internet uses the TCP/IP suite of packet switching protocols. </li></ul><ul><li>Any computer using software compatible with TCP/IP, regardless of OS, can connect and communicate over the Internet. </li></ul>
    32. 32. Access the Internet <ul><li>Home users access the Internet through dial-up over traditional telephone lines or broadband through cable or DSL. </li></ul><ul><li>Most users connect through an Internet Service Provider (ISP) using Internet access software. </li></ul><ul><li>Internet access has moved into libraries, airports, or coffee shops using Wi-Fi. </li></ul><ul><li>Wi-fi stands for 802.11 standards for wireless network access. </li></ul>
    33. 33. The World Wide Web <ul><li>The World Wide Web (WWW) is one the two most popular Internet applications (e-mail is the other.) </li></ul><ul><li>The Web provides a hypertext system that operates over the Internet. </li></ul><ul><li>Hypertext provides an easy way to publish information on a network in documents that incorporate hyperlinks to other information on the network. </li></ul><ul><li>Web browser software enables user to view hypertext document and use hyperlinks to browse other related documents. </li></ul>
    34. 34. Web Standards <ul><li>The Web relies on three basic standards: </li></ul><ul><li>A Uniform Resource Locator (URL) which specifies a unique address for each page that indicates the location of a document. </li></ul><ul><li>The Hypertext Transfer Protocol (HTTP) provides rules used by browsers and servers as they respond to each other. </li></ul><ul><li>Hypertext Markup Language (HTML) provides a language for encoding the information so a variety of IT devices can display it. </li></ul>
    35. 35. Copyright 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein.

    ×