SlideShare uma empresa Scribd logo
1 de 23
UNIT: II
  I.  COMPUTER SOFTWARE
   The term software refers to set of computer programs, procedures and
   associated programs, documents describing the programs and how
   they are used.
   A software package is a group of programs that solve a specific
   problem or performs a specific type of job eg: a word processing
   package may contain programs for text editing, formatting, drawings,
   graphics,etc. hence,a multipurpose computer syatem has a several
   software package one each foe each type of job it can perform.


APPLICATION & SYSTEM SOFTWARE
Software refers to a collection of programmes & associated documents.
There are two types of software:-
   o System Software: It is a set of 1 or more programs, which controls
      the operation &/or extends the processing capability of a computer
      system. It makes the operation of a computer system more effective
      & efficient. It helps hardware components work together & provide
      support for the development & execution of application software
      (programs).Good system software enables development & execution
      of application packages on a computer system with less time &
      efforts. A computer without some kind of system would be very
      ineffective & most likely impossible to operate. Programs included
      in a system software package are called system programs &
      programmers who prepare system software are referred as system
      programmer.

   o Application Software: It is a set of 1 or more programs, which
     solves a specific problem, or does a specific task. Programs
     included in an application software package are called application
     programs & programmers who prepare system software are
     referred as application programmer.

   1. PROGRAMMING LANGUAGES AND THEIR SOFTWARE

   A programming language is an artificial language designed to
   communicate instructions to a machine, particularly a computer.
   Programming languages can be used to create programs that control
   the behavior of a machine and/or to express algorithms precisely.

      o Object-Oriented Programming Languages:




                                   1
Known as the newest and most powerful paradigms, object-oriented
programming requires the designer to specify the data structures as well
as the types of operations to be applied on those data structures. The
pairing of data, and the operations that can be done on it is called an
object. A program made using this language is therefore made up of a set
of cooperating objects instead of an instructions list. The most famous
object-oriented programming these days are C#, C , Visual Basic, Java,
and Python.

     o   Structured Programming Languages:

An exceptional type of procedural programming, structured programming
provides programmers with additional tools to handle the problems
created by larger programs. When using this language, programmers are
required to cut program structure into small pieces of code that can
easily be understood. Instead of using global variables, it employs
variables that are local to every subroutine. Among the popular features
of structured programming is that it doesn't accept GOTO statement
which is usually associated with the top-down approach. Such approach
starts with an opening overview of the system with minimal details about
the various parts. To add these details, design iterations are then
included to complete the design. Commonly used structured languages
include C, Pascal, and ADA.

     o Procedural Programming Languages:

     Procedural Programming involves a list of operations the program
     needs to complete to be able to attain the preferred state. It is a
     simple programming paradigm where every program comes with a
     starting phase, a list of tasks and operations, and an ending stage.
     Also called imperative programming, this approach comes with
     small sections of code that perform certain functions. These
     sections are made up of procedures, subroutines, or methods. A
     procedure is made up of a list of computations that should be
     done. Procedural programming lets a part of the code to be used
     again without the need to make several copies. It achieves this by
     dividing programmatic tasks into small sections. Because of this,
     programmers are also capable of maintaining and understanding
     program structure. Among the known procedural languages are
     BASIC and FORTRAN.


  2. ASSEMBLERS, COMPILERS & INTERPRETERS




                                   2
o Assemblers: For an assembly language, a computer program
           to translate between lower-level representations of computer
           programs. An assembler          converts basic computer
           instructions into a pattern of bits which can be easily
           understood by the computer and the processor can use it to
           perform its basic operations.

         o Compilers: A compiler is a computer program (or set of
           programs) that transforms source written in a programming
           language (the source language) into another computer
           language (the target language, often having a binary form
           known as object code). The most common reason for wanting
           to transform source code is to create an executable program.
           The name "compiler" is primarily used for programs that
           translate source code from a high-level programming
           language to a lower level language (e.g., assembly
           language or machine code). If the compiled program can run
           on a computer whose CPU or operating system is different
           from the one on which the compiler runs, the compiler is
           known as a cross-compiler. A program that translates from a
           low level language to a higher level one is adecompiler. A
           program that translates between high-level languages is
           usually called a language translator, source to source
           translator, orlanguage converter. A language rewriter is
           usually a program that translates the form of expressions
           without a change of language.
         o Interpreters: An interpreter normally means a computer
           program that executes, i.e. performs, instructions written in
           a programming language. An interpreter may be a program
           that either
                 Executes the source code directly
                 translates        source      code       into     some
                   efficient intermediate   representation (code)     and
                   immediately executes this
                 explicitly executes stored precompiled code made by
                   a compiler which is part of the interpreter system


OPERATING SYSTEMS
Meaning
Operating system is a integrated set of programs that control the
resources (cpu,i/o devices etc. ) of a computer system and provides its
users with an interface or virtual machine that is easier to use than the
bare machine. it has two main objectives :-
1) make a computer system easier to use


                                   3
2) manage the resources of computer system.

7. TYPES OF OPERATING SYSTEMS
  •   Batch Processing Operating System:In a batch processing operating
      system interaction between the user and processor is limited or
      there is no interaction at all during the execution of work. Data
      and programs that need to be processed are bundled and collected
      as a ‘batch’ and executed together.

  •   Multi-Tasking Operating System:In this type of OS several
      applications maybe simultaneously loaded and used in the
      memory. While the processor handles only one application at a
      particular time it is capable of switching between the applications
      effectively to apparently simultaneously execute each application.
      This type of operating system is seen everywhere today and is the
      most common type of OS, the Windows operating system would be
      an example.

  •   Real-time Operating System:A real-time operating system processes
      inputs simultaneously, fast enough to affect the next input or
      process. Real-time systems are usually used to control complex
      systems that require a lot of processing like machinery and
      industrial systems.

  •   Single User Operating System:A single user OS as the name
      suggests is designed for one user to effectively use a computer at a
      time.

  •   Multi-User Operating System:This type of OS allows multiple users
      to simultaneously use the system, while here as well, the processor
      splits its resources and handles one user at a time, the speed and
      efficiency at which it does this makes it apparent that users are
      simultaneously using the system, some network systems utilize
      this kind of operating system.

  •   Distributed Operating System:In a distributed system, software and
      data maybe distributed around the system, programs and files
      maybe stored on different storage devices which are located in
      different geographical locations and maybe accessed from different
      computer terminals.



                                    4
DBMS
COMPONENTS OF DATABASE SYSTEM
A database system is composed of four components;
• Data
• Hardware
• Software
• Users

1. Data - It is a very important component of the database system. Most
of the organizations generate, store and process 1arge amount of data.
The data acts a bridge between the machine parts i.e. hardware and
software and the users which directly access it or access it through some
application programs.

2. Hardware - The hardware consists of the secondary storage devices
such as magnetic disks (hard disk, zip disk, floppy disks), optical disks
(CD-ROM), magnetic tapes etc. on which data is stored together with the
Input/Output devices (mouse, keyboard, printers), processors, main
memory etc. which are used for storing and retrieving the data in a fast
and efficient manner. Since database can range from those of a single
user with a desktop computer to those on mainframe computers with
thousand of users, therefore proper care should be taken for choosing
appropriate hardware devices for a required database.

3. Software - The Software part consists of DBMS which acts as a bridge
between the user and the database or in other words, software that
interacts with the users, application programs, and database and files
system of a particular storage media (hard disk, magnetic tapes etc.) to
insert, update, delete and retrieve data. For performing these operations
such as insertion, deletion and updation we can either use the Query
Languages like SQL, QUEL, Gupta SQL or application softwares such as
Visual 3asic, Developer etc.

4. Users - Users are those persons who need the information from        the
database to carry out their primary business responsibilities           i.e.
Personnel, Staff, Clerical, Managers, Executives etc. On the basis of   the
job and requirements made by them they are provided access to           the
database totally or partially.


Database management system concepts

1) Data Definition Language (DDL) statements are used to define the
database structure or schema. A popular data manipulation language is



                                    5
that of Structured Query Language (SQL), which is used to retrieve and
manipulate data in arelational database.Some examples:

   o   CREATE - to create objects in the database
   o   ALTER - alters the structure of the database
   o   DROP - delete objects from the database
   o   TRUNCATE - remove all records from a table, including all spaces
       allocated for the records are removed
   o   COMMENT - add comments to the data dictionary
   o   RENAME - rename an object

    Syntax : The create table statement does exactly that:
       CREATE TABLE <table name> (
       <attribute name 1> <data type 1>,
       ...
       <attribute name n> <data type n>);
           The data types that you will use most frequently are character
           strings, which might be called VARCHAR or CHAR for variable or
           fixed length strings; numeric types such as NUMBER or
           INTEGER, which will usually specify a precision; and DATE or
           related types. Data type syntax is variable from system to
           system; the only way to be sure is to consult the documentation
           for your own software.




2) Data Manipulation Language (DML) statements are used for managing
data within schema objects. The Data Manipulation Language (DML) is a
subset of SQL programming language used to retrieve, insert and modify
database information. These commands will be used by all database
users during the routine operation of the database Some examples:

   o   SELECT - retrieve data from the a database
   o   INSERT - insert data into a table
   o   UPDATE - updates existing data within a table
   o   DELETE - deletes all records from a table, the space for the records
       remain
   o   MERGE - UPSERT operation (insert or update)
   o   CALL - call a PL/SQL or Java subprogram
   o   EXPLAIN PLAN - explain access path to data
   o   LOCK TABLE - control concurrency

   Syntax :



                                     6
1)The insert statement is used, obviously, to add new rows to a table.
       INSERT INTO <table name>
       VALUES (<value 1>, ... <value n>);
          The comma-delimited list of values must match the table
          structure exactly in the number of attributes and the data type
          of each attribute. Character type values are always enclosed in
          single quotes; number values are never in quotes; date values
          are often (but not always) in the format 'yyyy-mm-dd' (for
          example, '2006-11-30').
         Yes, you will need a separate INSERT statement for every row.
    2) The update statement is used to change values that are already in
    a table.
       UPDATE <table name>
       SET <attribute> = <expression>
       WHERE <condition>;
         The update expression can be a constant, any computed value,
         or even the result of a SELECT statement that returns a single
         row and a single column. If the WHERE clause is omitted, then
         the specified attribute is set to the same value in every row of the
         table (which is usually not what you want to do). You can also
         set multiple attribute values at the same time with a comma-
         delimited list of attribute=expression pairs.
    3) The delete statement does just that, for rows in a table.
       DELETE FROM <table name>
       WHERE <condition>;
         If the WHERE clause is omitted, then every row of the table is
         deleted (which again is usually not what you want to do)—and
         again, you will not get a “do you really want to do this?”
         message.



3) Data Control Language (DCL) statements DCL is abbreviation of Data
Control Language. It is used to create roles, permissions, and referential
integrity as well it is used to control access to database by securing it..
Some examples:

   o   GRANT - gives user's access privileges to database
   o   REVOKE - withdraw access privileges given with the GRANT
       command




                                      7
9.   TRADITIONAL                   FILE        CONCEPTS              AND
ENVIORNMENT
The traditional file-oriented approach to information processing has for
each application a separate master file and its own set of personal files.
COBOL language supported these file-oriented applications. It was used
for developing applications such as of payroll, inventory, and financial
accounting. However, in general an organization needs flow of
information across these applications also and this requires sharing of
data, which is very difficult to implement in the traditional file approach.
In addition, a major limitation of file-based approach is that the
programs are dependent on the files and the files are dependent upon
the programs.These file-based approaches, which came into being as the
first commercial applications of computers, suffered from the following
significant disadvantages:

   1. Data Redundancy: In a file system if an information is needed by
      two distinct applications, then it may be stored in two or more
      files. For example, the particulars of an employee may be stored in
      payroll and leave record applications separately. Some of this
      information may be changing, such as the address, the pay drawn,
      etc. It is therefore quite possible that while the address in the
      master file for one application has been updated the address in the
      master file for second application may have not been. Sometimes,
      it may not be easy to find that in how many files the repeating
      items such as the address has occurred. The solution, therefore, is
      to avoid this data redundancy by storing the address at just one
      place physically, and making it accessible to all applications.

   2. Program/Data Dependency: In the traditional file oriented
      approach if a data field (attribute) is to be added to a master file,
      all such programs that access the master file would have to be
      changed to allow for this new field that would have been added to
      the master record. This is referred to as data dependence.



   3. Lack of Flexibility: Since the data and programs are strong
      coupled in a traditional system, most information retrieval
      requests would be limited to well anticipated and pre-determined.
      The system would normally be capable of producing scheduled
      records and queries that it has been programmed to create. In the
      fast moving and competent business environment of today, apart
      from such regularly scheduled records, there is a need for


                                     8
responding to un-anticipatory queries and some kind of
      investigative analysis that could not have been envisaged
      professionally.




11. ER MODELLING
An entity-relationship model (ERM) is an abstract and conceptual
representation of data. Entity-relationship modeling is a database
modeling method,      used     to   produce      a    type    of conceptual
schema or semantic data model of a system, often a relational database,
and its requirements in atop-down fashion. Diagrams created by this
process are called entity-relationship diagrams, ER diagrams,
or ERDs. An entity may be defined as a thing which is recognized as
being capable of an independent existence and which can be uniquely
identified. An entity is an abstraction from the complexities of some
domain. When we speak of an entity we normally speak of some aspect of
the real world which can be distinguished from other aspects of the real
world. An entity may be a physical object such as a house or a car, an
event such as a house sale or a car service, or a concept such as a
customer transaction or order. Although the term entity is the one most
commonly used, following Chen we should really distinguish between an
entity and an entity-type. An entity-type is a category. An entity, strictly
speaking, is an instance of a given entity-type. Examples: a computer, an
employee, a song, a mathematical theorem.A relationship captures how
two or more entities are related to one another. Relationships can be
thought of as verbs, linking two or more nouns. Examples:
an owns relationship    between     a    company      and    a    computer,
a supervises relationship between an employee and a department,
a performs relationship     between     an     artist    and     a    song,
a proved relationship between a mathematician and a theorem.


                                : Two related entities


Entities and relationships can both have attributes. Examples:
an employee entity might have a Social Security Number (SSN) attribute;
the proved relationship may have a date attribute.Every entity (unless it
is a weak entity) must have a minimal set of uniquely identifying
attributes, which is called the entity's primary key.Entity-relationship
diagrams don't show single entities or single instances of relations.
Rather, they show entity sets and relationship sets. Example: a
particular song is an entity. The collection of all songs in a database is


                                     9
an entity set. The eaten relationship between a child and her lunch is a
single relationship. The set of all such child-lunch relationships in a
database is a relationship set. In other words, a relationship set
corresponds to a relation in mathematics, while a relationship
corresponds to a member of the relation.


                           : An entity with an attribute


                       : A relationship with an attribute


       : Primary key




12. INTEGRITY CONSTRAINTS

Integrity constraints are used to ensure accuracy and consistency of data
in a relational database. Data integrity is handled in a relational
database through the concept of referential integrity. There are many
types of integrity constraints that play a role in referential integrity.
Codd initially defined two sets of constraints but, in his second version of
the relational model, he came up with five integrity constraints:
   • Entity integrity
The entity integrity constraint states that no primary key value can be
null. This is because the primary key value is used to identify individual
tuples in a relation . Having null value for the primary key implies that
we cannot identify some tuples.This also specifies that there may not be
any duplicate entries in primary key column key row.
   •   Referential Integrity
The referential integrity constraint is specified between two relations and
is used to maintain the consistency among tuple's in the two relations.
Informally, the referential integrity constraint states that a tuple in one
relation that refers to another relation must refer to an existing tuple in
that relation.It is a rule that maintains consistency among the rows of
the two relations
   • Domain Integrity
The domain integrity states that every element from a relation should
respect the type and restrictions of its corresponding attribute. A type


                                       10
can have a variable length which needs to be respected. Restrictions
could be the range of values that the element can have, the default value
if none is provided, and if the element can be NULL.
   • User Defined Integrity
e.g.: Age>=18 && Age<=60
Different keys in DBMS
1)Alternate key: An alternate key is any candidate key which is not
selected to be the primary key . This is done to prevent incorrect data
from entering a table (a duplicate entry is not valid in a unique column)
and to make the database more complete and useful. These could be
called alternate keys.
2) Candidate key - A candidate key is a field or combination of fields that
can act as a primary key field for that table to uniquely identify each
record in that table. Eg:The table: Emloyee (Name, Address, Ssn,
Employee_Id, Phone_ext ) In the above example Ssn no. and employee
identity               are                 candidate                  keys.

3) Compound key :compound key (also called a composite key or
concatenated key) is a key that consists of 2 or more attributes.
4) Primary key - a primary key is a value that can be used to identify a
unique row in a table. Attributes are associated with it. Examples of
primary keys are Social Security numbers (associated to a specific
person) or ISBNs (associated to a specific book). In the relational model
of data, a primary key is a candidate key chosen as the main method of
uniquely identifying a tuple in a relation. For Eg: Emloyee
(Name,Address,Ssn,Employee_Idprimary_key,Phone_ext)

5) Foreign key - a foreign key (FK) is a field or group of fields in a
database record that points to a key field or group of fields forming a key
of another database record in some (usually different) table. Usually a
foreign key in one table refers to the primary key (PK) of another table.
6) Surrogate keys : A surrogate key can be used as the primary key. In
other situations there may be more than one candidate key for a relation,
and no candidate key is obviously preferred. A surrogate key may be
used as the primary key to avoid giving one candidate key artificial
primacy over the others.
Since primary keys exist primarily as a convenience to the programmer,
surrogate primary keys are often used—in many cases exclusively—in
database application design.
7) Unique key : a unique key can uniquely identify each row in a table,
and is closely related to the Superkey concept. A unique key comprises a


                                    11
single column or a set of columns. No two distinct rows in a table can
have the same value (or combination of values) in those columns if NULL
values are not used. Depending on its design, a table may have
arbitrarily many unique keys but at most one primary key.




                                  12
UNIT III
DATA COMMUNICATION & NETWORK

  1. CONCEPT OF DATA COMMUNICATION

These basic concepts of data communications are:

1.1. Send and Receive Data

     Send/write data: A program sends a value for a data point, and
     the Data Hub records, or writes, the value for that point. This type
     of communication is synchronous. The send and the write are
     essentially two parts of a single process, so we use the terms pretty
     much interchangeably. You can write a value to the Data Hub
     manually using the Data Browser.

     A typical write command from a program using DDE protocol
     is DDEPoke.

     Receive/read data: A program requests to receive the value of a
     data point. The Data Hub then responds by sending the current
     value of the point. We call this reading the value from the Cascade
     Data Hub. Again, we sometimes use the two terms
     interchangeably, and again, this type of communication
     is synchronous.

     A typical read command from a program using DDE protocol
     is DDERequest.

     'Automatic' Receive: It is possible to set up live data channels,
     where a program receives updates on data points sent from the
     Cascade Data Hub. How it works is the program sends an initial
     request to the Data Hub to register for all changes to a data point.
     The Data Hub immediately sends the current value of the point,
     and then again whenever it changes. The Data Hub can receive
     data automatically in a similar way. This asynchronous type of
     communication is sometimes referred to as publish-subscribe.



                                   13
A DDEAdvise command sets up this type of connection, which is
      called an advice loop.

1.1.2. Client - Server

Exchanging data with the Cascade DataHub is done through a client-
server   mechanism,     where     the client requests   a   service,    and
the server provides the service. Depending on the programs it interacts
with, the DataHub is capable of acting as a client, as a server, or as both
simultaneously.

The client-server relationship itself does not determine the direction of
data flow. For example, a client may read data from the server, or it
might write data to the server. The data can flow either way; the client
might initiate a read or a write, and the server would respond.

1.1.3. Synchronous and Asynchronous Communication

Every type of communication, natural or man made comes in two basic
forms: synchronous or asynchronous.

      Synchronous communication means that for each message, the
      sender expects to get a reply from the receiver, like a telephone
      call. There is a back-and-forth exchange, so that each party knows
      that the other is receiving the message. If there is no response, you
      can be pretty sure that communication didn't occur.

      Asynchronous communication means that a message gets sent but
      the receiver is not expected to reply, like a radio broadcast or a
      newspaper.

Each of these communication types has its own value and purpose in
data communications, and the Cascade Data Hub is capable of both. The
specific circumstances and application will determine which form of
communication you end up using.

COMMUNICATION MEDIA

Computer networks can be classified according to the hardware and
associated software technology that is used to interconnect the individual
devices in the network, such as electrical cable (Home PNA, power line
communication, Ghn), optical fiber, and radio waves(wireless LAN).
A well-known family of communication media is collectively known
as Ethernet. It is defined by IEEE 802 and utilizes various standards and
media that enable communication between devices. Wireless LAN


                                    14
technology is designed to connect devices without wiring. These devices
use radio waves or infrared signals as a transmission medium.
Wired technologies
        1) Twisted pair wire is the most widely used medium for
           telecommunication. Twisted-pair cabling consist of copper
           wires that are twisted into pairs. Ordinary telephone wires
           consist of two insulated copper wires twisted into pairs.
           Computer networking cabling (wired Ethernet as defined
           by IEEE 802.3) consists of 4 pairs of copper cabling that can
           be utilized for both voice and data transmission. The use of
           two       wires       twisted     together       helps      to
           reduce crosstalk and electromagnetic        induction.    The
           transmission speed ranges from 2 million bits per second to
           10 billion bits per second. Twisted pair cabling comes in two
           forms which are Unshielded Twisted Pair (UTP) and Shielded
           twisted-pair (STP) which are rated in categories which are
           manufactured in different increments for various scenario.
        2) Coaxial cable is widely used for cable television systems,
           office buildings, and other work-sites for local area networks.
           The cables consist of copper or aluminum wire wrapped with
           insulating layer typically of a flexible material with a high
           dielectric constant, all of which are surrounded by a
           conductive layer. The layers of insulation help minimize
           interference and distortion. Transmission speed range from
           200 million to more than 500 million bits per second.
        3) ITU-T G.hn technology uses existing home wiring (coaxial
           cable, phone lines and power lines) to create a high-speed
           (up to 1 Gigabit/s) local area network.
        4) Optical fiber cable consists of one or more filaments of
           glass fiber wrapped in protective layers that carries data by
           means of pulses of light. It transmits light which can travel
           over extended distances. Fiber-optic cables are not affected
           by electromagnetic radiation. Transmission speed may reach
           trillions of bits per second. The transmission speed of fiber
           optics is hundreds of times faster than for coaxial cables and
           thousands of times faster than a twisted-pair wire.


Wireless technologies
  1) Terrestrial microwave – Terrestrial microwaves use Earth-based
     transmitter and receiver. The equipment looks similar to satellite
     dishes. Terrestrial microwaves use low-gigahertz range, which




                                   15
limits all communications to line-of-sight. Path between relay
      stations spaced approx, 48 km (30 mi) apart.
   2) Communications satellites – The satellites use microwave radio as
      their telecommunications medium which are not deflected by the
      Earth's atmosphere. The satellites are stationed in space, typically
      35,400 km (22,000 mi) (for geosynchronous satellites) above the
      equator. These Earth-orbiting systems are capable of receiving and
      relaying voice, data, and TV signals.
   3) Cellular and PCS systems – Use several radio communications
      technologies. The systems are divided to different geographic areas.
      Each area has a low-power transmitter or radio relay antenna
      device to relay calls from one area to the next area.
   4) Wireless LANs – Wireless local area network use a high-frequency
      radio technology similar to digital cellular and a low-frequency
      radio technology. Wireless LANs use spread spectrum technology
      to enable communication between multiple devices in a limited
      area.
   5) Infrared communication can transmit signals between devices
      within small distances of typically no more than 10 meters. In
      most cases,line-of-sight propagation is used, which limits the
      physical positioning of communicating devices.
   6) A global area network (GAN) is a network used for supporting
      mobile across an arbitrary number of wireless LANs, satellite
      coverage areas, etc. The key challenge in mobile communications
      is handing off the user communications from one local coverage
      area to the next. In IEEE Project 802, this involves a succession of
      terrestrial wireless LANs



CONCEPT OF COMPUTER NETWORKS

A computer network, often simply referred to as a network, is a collection
of   hardware  components      and    computers     interconnected      by
communication channels that allow sharing of resources and
information.
Networks may be classified according to a wide variety of characteristics
such as the medium used to transport the data, communications
protocol used, scale, topology, and organizational scope.




                                   16
INTRANET & EXTRANETS

13(B) EXTRANETS

An extranet is a computer network that allows controlled access from
the outside, for specific business or educational purposes. An extranet
can be viewed as an extension of a company's intranet that is extended
to users outside the company, usually partners, vendors, and suppliers.
It has also been described as a "state of mind" in which the Internet is
perceived as a way to do business with a selected set of other companies
(business-to-business, B2B), in isolation from all other Internet users. In
contrast, business-to-consumer (B2C) models involve known servers of
one or more companies, communicating with previously unknown
consumer users. An extranet is like a DMZ in that it provides access to
needed services for channel partners, without granting access to an
organization's entire network.

UNIT  –IV:           FUNCTIONAL              AND       ENTERPRISE
SYSTEMS

1. DATA, INFORMATION & KNOWLEDGE CONCEPTS

The term data refers to qualitative or quantitative attributes of
a variable or set of variables. Data (plural of "datum") are typically the
results of measurements and can be the basis of graphs, images, or
observations of a set of variables. Data are often viewed as the lowest
level of abstraction from which information and then knowledge are
derived. Raw data, i.e. unprocessed data, refers to a collection
of numbers, characters, images or other outputs from devices that collect
information to convert physical quantities into symbols.

Information in its most restricted technical sense is a message
(utterance or expression) or collection of messages that consists of
an ordered sequence of symbols, or it is the meaning that can be
interpreted from such a message or collection of messages. Information
can be recorded or transmitted. It can be recorded as signs, or conveyed
as signals by waves. Information is any kind of event that affects
the state of a dynamic system. The concept has numerous other
meanings in different contexts.



                                    17
Knowledge is a familiarity with someone or something, which can
include information, facts, descriptions,             and/or skills acquired
through experience or education. It can refer to the theoretical or
practical understanding of a subject. It can be implicit (as with practical
skill or expertise) or explicit (as with the theoretical understanding of a
subject); and it can be more or less formal or systematic.[1] In philosophy,
the    study     of   knowledge      is   called epistemology,    and    the
philosopher Plato famously defined knowledge as "justified true belief."
There is however no single agreed upon definition of knowledge, and
there are numerous theories to explain it. Knowledge acquisition involves
complex cognitive processes: perception, learning, communication,
association and reasoning; while knowledge is also said to be related to
the capacity of acknowledgment in human beings.
2. DECISION MAKING PROCESS
The figure given below suggests the steps in the decision-making
process:-




   •   Identifying the Problem: Identification of the real problem before
       a business enterprise is the first step in the process of decision-
       making. It is rightly said that a problem well-defined is a problem
       half-solved. Information relevant to the problem should be
       gathered so that critical analysis of the problem is possible. This is
       how the problem can be diagnosed. Clear distinction should be
       made between the problem and the symptoms which may cloud
       the real issue. In brief, the manager should search the 'critical
       factor' at work. It is the point at which the choice applies.
       Similarly, while diagnosing the real problem the manager should
       consider causes and find out whether they are controllable or
       uncontrollable.


                                     18
•   Analyzing the Problem: After defining the problem, the next step
    in the decision-making process is to analyze the problem in depth.
    This is necessary to classify the problem in order to know who
    must take the decision and who must be informed about the
    decision taken.
•   Uniqueness of the decision.: Collecting Relevant Data: After
    defining the problem and analyzing its nature, the next step is to
    obtain the relevant information/ data about it. There is
    information flood in the business world due to new developments
    in the field of information technology. All available information
    should be utilized fully for analysis of the problem. This brings
    clarity to all aspects of the problem.
•   Developing Alternative Solutions: After the problem has been
    defined, diagnosed on the basis of relevant information, the
    manager has to determine available alternative courses of action
    that could be used to solve the problem at hand. Only realistic
    alternatives should be considered. It is equally important to take
    into account time and cost constraints and psychological barriers
    that will restrict that number of alternatives. If necessary, group
    participation techniques may be used while developing alternative
    solutions as depending on one solution is undesirable.
•   Selecting the Best Solution:           After preparing alternative
    solutions, the next step in the decision-making process is to select
    an alternative that seems to be most rational for solving the
    problem. The alternative thus selected must be communicated to
    those who are likely to be affected by it. Acceptance of the decision
    by group members is always desirable and useful for its effective
    implementation.
•   Converting Decision into Action: After the selection of the best
    decision, the next step is to convert the selected decision into an
    effective action. Without such action, the decision will remain
    merely a declaration of good intentions. Here, the manager has to
    convert 'his decision into 'their decision' through his leadership.
    For this, the subordinates should be taken in confidence and they
    should be convinced about the correctness of the decision.
    Thereafter, the manager has to take follow-up steps for the
    execution of decision taken.
•   Ensuring Feedback: Feedback is the last step in the decision-
    making process. Here, the manager has to make built-in
    arrangements to ensure feedback for continuously testing actual
    developments against the expectations. It is like checking the
    effectiveness of follow-up measures. Feedback is possible in the
    form of organised information, reports and personal observations.
    Feed back is necessary to decide whether the decision already



                                  19
taken should be continued or be modified in the light of changed
          conditions.

    3. PHYSICAL COMPONENTS OF INFORMATION SYSTEM

An information system is a system that accepts data resources as input
and processes them into information products as output. This information
system model highlights the relationships among the components and
activities of information systems.
  Information System Resources:
  (i) People Resources:
  People are required for the operation of all information systems. These
  people resources include:
•    End users (also called users or clients) are people who use an
     information system or the information it produces. They can be
     accountants, salespersons, engineers, clerks, customers, or managers.
     Most of us are information system end users.


•    IS Specialists are people who develop and operate information systems.
     They include systems analysts, programmers, computer operators, and
     other managerial technical, and clerical IS personnel. Briefly, systems
     analysts   design   information   systems   based   on   the   information
     requirements of end uses, programmers prepare computer programs
     based on the specifications of systems analysts, and computer
     operators operate large computer systems.



    (ii) Hardware Resources:
    The concept of Hardware resources includes all physical devices and
    materials used in information processing. Specially, it includes not
    only machines, such as computers and other equipment, but also all
    data media, that is, all tangible objects on which data is recorded, from
    sheets of paper to magnetic disks.

     (iii) Software Resources:
    The concept of Software Resources includes all sets of information
    processing instructions. This generic concept of software includes not
    only the sets of operating instructions called programs, which direct and
    control computer hardware, but also the sets of information processing


                                        20
instructions needed by people, called procedures.It is important to
    understand that even information systems that don’t use computers
    have a software resource component. This is true even for the
    information systems of ancient times, or the manual and machine-
    supported information systems still used in the world today. They all
    require software resources in the form of information processing
    instructions and procedures in order to properly capture, process, and
    disseminate information to their users.
    iv) Data Resources:
    Data is more than the raw material of information systems. The concept
    of data resources has been broadened by managers and information
    systems professionals. They realize that data constitutes a valuable
    organization resource. Thus, you should view data as data resources that
    must be managed effectively to benefit all end users in an organization.
    Data can take many forms, including traditional alphanumeric data,
    composed of numbers and alphabetical and other characters that
    describe business transactions and other events and entities. Text data,
    consisting of sentences and paragraphs used in written communications;
    image data, such as graphic shapes and figures; and audio data, the
    human voice and other sounds, are also important forms of data.
    The data resources of information systems are typically organized into:
•    Database that hold processed and organized data.
•    Knowledge bases that hold knowledge in variety of forms such as facts,
     rules, and case examples about successful business practices.
    For example, data about sales transactions may be accumulated and
    stored in a sales database for subsequent processing that yields daily,
    weekly, and monthly sales analysis reports for management. Knowledge
    bases are used by knowledge management systems and expert systems
    to share knowledge and give expert advice on specific subjects.


    4. CLASSIFICATION OF INFORMATION SYSTEM
      •   Transaction Processing System (TPS): Applications of information
          systems that process business transaction data. Its use at
          operational level and focuses on the data. An example is a
          computer application for typing.

      •    Management Information System (MIS):Applications of information
          system that aims to provide information used in the field of
          management (management-oriented reporting.) Examples are



                                      21
computer applications for hospital services, pharmacy purchasing,
       scheduling of production machinery and others.

   •   Decision Support System (DSS):Applications of information
       systems that provide decision-oriented information and especially
       in situations where decision-making. At the executive level often
       called Executive Information System. For example a computer
       application to determine the purchase of drug stocks at the
       hospital, the determination of sugar distribution system and
       others.

   •   Expert System (ES):Information system designed to produce a
       decision by reproducing knowledge and expertise of the decision
       maker and problem solver and then simulate it. For example
       advanced applications of artificial neural networks, face
       recognition and so forth.

   •   Office    automation system: Systems that support business
       activities on a large scale. Examples ERP applications for the
       company.

5. OVERVIEW OF SECURITY ISSUES IN INFORMATION
TECHNOLOGY
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction. The terms
information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated
often     and      share      the    common         goals    of     protecting
the confidentiality, integrity and availability of   information;    however,
there are some subtle differences between them.These differences lie
primarily in the approach to the subject, the methodologies used, and
the areas of concentration. Information security is concerned with the
confidentiality, integrity and availability of data regardless of the form the
data may take: electronic, print, or other forms.Computer security can
focus on ensuring the availability and correct operation of acomputer
system without concern for the information stored or processed by the
computer.Governments, military, corporations, financial
institutions, hospitals, and privatebusinesses amass a great deal of
confidential information about their employees, customers, products,
research, and financial status. Most of this information is now collected,


                                     22
processed and stored on electronic computers and transmitted
acrossnetworks to other computers.Should confidential information
about a business' customers or finances or new product line fall into the
hands of a competitor, such a breach of security could lead to lost
business, law suits or even bankruptcy of the business. Protecting
confidential information is a business requirement, and in many cases
also an ethical and legal requirement.For the individual, information
security has a significant effect on privacy, which is viewed very
differently in different cultures.The field of information security has
grown and evolved significantly in recent years. There are many ways of
gaining entry into the field as a career. It offers many areas for
specialization including: securing network(s) and allied infrastructure,
securing applications and databases,security      testing,    information
systems auditing, business          continuity        planning and digital
forensics science, etc.
6. EMERGING TRENDS OF INFORMATION TECHNOLOGY
Ten trends are identified consisting of aspects of: the difficulty of hiring
qualified labor in-country; establishment of strategy resides entirely
within the IT management; security remains a serious concern; offshore
subcontractors sometimes place their employees within Icelandic
companies; mid- and upper-level employees who can strategically
develop networks and systems are in strong demand; use of information
system (IS)/IT standards for information security is mostly voluntary;
generally, the establishment of IS/IT strategy does not remain with board
of directors; virtually all Icelandic corporations engage in, or have
engaged in, outsourcing over the past five years (11 sub-trends are
identified); and the business school curricula is inadequate to the needs
of Icelandic corporations with respect to IT demands.




                                    23

Mais conteúdo relacionado

Mais procurados

La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
Kak Yong
 
Chapter 1: Intro to Funds of Programming
Chapter 1: Intro to Funds of ProgrammingChapter 1: Intro to Funds of Programming
Chapter 1: Intro to Funds of Programming
ricsanmae
 
System programming note
System programming noteSystem programming note
System programming note
SANTOSH RATH
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
NSU-Biliran Campus
 
Compilers and interpreters
Compilers and interpretersCompilers and interpreters
Compilers and interpreters
RAJU KATHI
 

Mais procurados (20)

computer Unit 6
computer Unit 6computer Unit 6
computer Unit 6
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
Chapter 1: Intro to Funds of Programming
Chapter 1: Intro to Funds of ProgrammingChapter 1: Intro to Funds of Programming
Chapter 1: Intro to Funds of Programming
 
Programming languages,compiler,interpreter,softwares
Programming languages,compiler,interpreter,softwaresProgramming languages,compiler,interpreter,softwares
Programming languages,compiler,interpreter,softwares
 
Interaction With Computers FIT
Interaction With Computers FITInteraction With Computers FIT
Interaction With Computers FIT
 
System programming note
System programming noteSystem programming note
System programming note
 
Software tools
Software toolsSoftware tools
Software tools
 
Programming Fundamentals and Programming Languages Concepts
Programming Fundamentals and Programming Languages ConceptsProgramming Fundamentals and Programming Languages Concepts
Programming Fundamentals and Programming Languages Concepts
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
 
Compilers and interpreters
Compilers and interpretersCompilers and interpreters
Compilers and interpreters
 
Introductiontocomputerprogramming 140713205433-phpapp02
Introductiontocomputerprogramming 140713205433-phpapp02Introductiontocomputerprogramming 140713205433-phpapp02
Introductiontocomputerprogramming 140713205433-phpapp02
 
Unit i (part2) b.sc
Unit i (part2)   b.scUnit i (part2)   b.sc
Unit i (part2) b.sc
 
system software and application software, compiler, interpreter & assembler
system software  and application software, compiler, interpreter & assemblersystem software  and application software, compiler, interpreter & assembler
system software and application software, compiler, interpreter & assembler
 
Fundamentals of programming final
Fundamentals of programming finalFundamentals of programming final
Fundamentals of programming final
 
Embedded firmware
Embedded firmwareEmbedded firmware
Embedded firmware
 
Programming Fundamental Slide No.1
Programming Fundamental Slide No.1Programming Fundamental Slide No.1
Programming Fundamental Slide No.1
 
Information systems software
Information systems softwareInformation systems software
Information systems software
 
System software
System softwareSystem software
System software
 
Software and os ch5
Software and os ch5Software and os ch5
Software and os ch5
 

Semelhante a Richa garg itm

ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
SURBHI SAROHA
 
SPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdfSPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdf
reshma96176
 

Semelhante a Richa garg itm (20)

Computer software and operating system
Computer software and operating systemComputer software and operating system
Computer software and operating system
 
Inroduction System Software -features Types
Inroduction System Software -features TypesInroduction System Software -features Types
Inroduction System Software -features Types
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System Softwares
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
SPCC:System programming and compiler construction
SPCC:System programming and compiler constructionSPCC:System programming and compiler construction
SPCC:System programming and compiler construction
 
Unit2_1.pdf
Unit2_1.pdfUnit2_1.pdf
Unit2_1.pdf
 
SOFTWARE PARADIGM
SOFTWARE PARADIGMSOFTWARE PARADIGM
SOFTWARE PARADIGM
 
Exam 1 in ITEP 132
Exam 1 in ITEP 132Exam 1 in ITEP 132
Exam 1 in ITEP 132
 
Software concepts
Software conceptsSoftware concepts
Software concepts
 
c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)c and data structures first unit notes (jntuh syllabus)
c and data structures first unit notes (jntuh syllabus)
 
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
ESSENTIAL COMPONENTS OF COMPUTERS(UNIT 2)
 
SPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdfSPOS_UNIT I System Programming and Operating System.pdf
SPOS_UNIT I System Programming and Operating System.pdf
 
PPS UNIT 1- R18.docx
PPS UNIT 1- R18.docxPPS UNIT 1- R18.docx
PPS UNIT 1- R18.docx
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
 
introductiontocomputerprogramming.pptx
introductiontocomputerprogramming.pptxintroductiontocomputerprogramming.pptx
introductiontocomputerprogramming.pptx
 
Presentation on computer software-system software.
Presentation on computer software-system software.Presentation on computer software-system software.
Presentation on computer software-system software.
 
unit 3.ppt
unit 3.pptunit 3.ppt
unit 3.ppt
 
introductiontocomputerprogramming-140713205433-phpapp02.pptx
introductiontocomputerprogramming-140713205433-phpapp02.pptxintroductiontocomputerprogramming-140713205433-phpapp02.pptx
introductiontocomputerprogramming-140713205433-phpapp02.pptx
 
Presentation it
Presentation itPresentation it
Presentation it
 
Computer Programs & System Softwares
Computer Programs & System SoftwaresComputer Programs & System Softwares
Computer Programs & System Softwares
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Richa garg itm

  • 1. UNIT: II I. COMPUTER SOFTWARE The term software refers to set of computer programs, procedures and associated programs, documents describing the programs and how they are used. A software package is a group of programs that solve a specific problem or performs a specific type of job eg: a word processing package may contain programs for text editing, formatting, drawings, graphics,etc. hence,a multipurpose computer syatem has a several software package one each foe each type of job it can perform. APPLICATION & SYSTEM SOFTWARE Software refers to a collection of programmes & associated documents. There are two types of software:- o System Software: It is a set of 1 or more programs, which controls the operation &/or extends the processing capability of a computer system. It makes the operation of a computer system more effective & efficient. It helps hardware components work together & provide support for the development & execution of application software (programs).Good system software enables development & execution of application packages on a computer system with less time & efforts. A computer without some kind of system would be very ineffective & most likely impossible to operate. Programs included in a system software package are called system programs & programmers who prepare system software are referred as system programmer. o Application Software: It is a set of 1 or more programs, which solves a specific problem, or does a specific task. Programs included in an application software package are called application programs & programmers who prepare system software are referred as application programmer. 1. PROGRAMMING LANGUAGES AND THEIR SOFTWARE A programming language is an artificial language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs that control the behavior of a machine and/or to express algorithms precisely. o Object-Oriented Programming Languages: 1
  • 2. Known as the newest and most powerful paradigms, object-oriented programming requires the designer to specify the data structures as well as the types of operations to be applied on those data structures. The pairing of data, and the operations that can be done on it is called an object. A program made using this language is therefore made up of a set of cooperating objects instead of an instructions list. The most famous object-oriented programming these days are C#, C , Visual Basic, Java, and Python. o Structured Programming Languages: An exceptional type of procedural programming, structured programming provides programmers with additional tools to handle the problems created by larger programs. When using this language, programmers are required to cut program structure into small pieces of code that can easily be understood. Instead of using global variables, it employs variables that are local to every subroutine. Among the popular features of structured programming is that it doesn't accept GOTO statement which is usually associated with the top-down approach. Such approach starts with an opening overview of the system with minimal details about the various parts. To add these details, design iterations are then included to complete the design. Commonly used structured languages include C, Pascal, and ADA. o Procedural Programming Languages: Procedural Programming involves a list of operations the program needs to complete to be able to attain the preferred state. It is a simple programming paradigm where every program comes with a starting phase, a list of tasks and operations, and an ending stage. Also called imperative programming, this approach comes with small sections of code that perform certain functions. These sections are made up of procedures, subroutines, or methods. A procedure is made up of a list of computations that should be done. Procedural programming lets a part of the code to be used again without the need to make several copies. It achieves this by dividing programmatic tasks into small sections. Because of this, programmers are also capable of maintaining and understanding program structure. Among the known procedural languages are BASIC and FORTRAN. 2. ASSEMBLERS, COMPILERS & INTERPRETERS 2
  • 3. o Assemblers: For an assembly language, a computer program to translate between lower-level representations of computer programs. An assembler converts basic computer instructions into a pattern of bits which can be easily understood by the computer and the processor can use it to perform its basic operations. o Compilers: A compiler is a computer program (or set of programs) that transforms source written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code). The most common reason for wanting to transform source code is to create an executable program. The name "compiler" is primarily used for programs that translate source code from a high-level programming language to a lower level language (e.g., assembly language or machine code). If the compiled program can run on a computer whose CPU or operating system is different from the one on which the compiler runs, the compiler is known as a cross-compiler. A program that translates from a low level language to a higher level one is adecompiler. A program that translates between high-level languages is usually called a language translator, source to source translator, orlanguage converter. A language rewriter is usually a program that translates the form of expressions without a change of language. o Interpreters: An interpreter normally means a computer program that executes, i.e. performs, instructions written in a programming language. An interpreter may be a program that either  Executes the source code directly  translates source code into some efficient intermediate representation (code) and immediately executes this  explicitly executes stored precompiled code made by a compiler which is part of the interpreter system OPERATING SYSTEMS Meaning Operating system is a integrated set of programs that control the resources (cpu,i/o devices etc. ) of a computer system and provides its users with an interface or virtual machine that is easier to use than the bare machine. it has two main objectives :- 1) make a computer system easier to use 3
  • 4. 2) manage the resources of computer system. 7. TYPES OF OPERATING SYSTEMS • Batch Processing Operating System:In a batch processing operating system interaction between the user and processor is limited or there is no interaction at all during the execution of work. Data and programs that need to be processed are bundled and collected as a ‘batch’ and executed together. • Multi-Tasking Operating System:In this type of OS several applications maybe simultaneously loaded and used in the memory. While the processor handles only one application at a particular time it is capable of switching between the applications effectively to apparently simultaneously execute each application. This type of operating system is seen everywhere today and is the most common type of OS, the Windows operating system would be an example. • Real-time Operating System:A real-time operating system processes inputs simultaneously, fast enough to affect the next input or process. Real-time systems are usually used to control complex systems that require a lot of processing like machinery and industrial systems. • Single User Operating System:A single user OS as the name suggests is designed for one user to effectively use a computer at a time. • Multi-User Operating System:This type of OS allows multiple users to simultaneously use the system, while here as well, the processor splits its resources and handles one user at a time, the speed and efficiency at which it does this makes it apparent that users are simultaneously using the system, some network systems utilize this kind of operating system. • Distributed Operating System:In a distributed system, software and data maybe distributed around the system, programs and files maybe stored on different storage devices which are located in different geographical locations and maybe accessed from different computer terminals. 4
  • 5. DBMS COMPONENTS OF DATABASE SYSTEM A database system is composed of four components; • Data • Hardware • Software • Users 1. Data - It is a very important component of the database system. Most of the organizations generate, store and process 1arge amount of data. The data acts a bridge between the machine parts i.e. hardware and software and the users which directly access it or access it through some application programs. 2. Hardware - The hardware consists of the secondary storage devices such as magnetic disks (hard disk, zip disk, floppy disks), optical disks (CD-ROM), magnetic tapes etc. on which data is stored together with the Input/Output devices (mouse, keyboard, printers), processors, main memory etc. which are used for storing and retrieving the data in a fast and efficient manner. Since database can range from those of a single user with a desktop computer to those on mainframe computers with thousand of users, therefore proper care should be taken for choosing appropriate hardware devices for a required database. 3. Software - The Software part consists of DBMS which acts as a bridge between the user and the database or in other words, software that interacts with the users, application programs, and database and files system of a particular storage media (hard disk, magnetic tapes etc.) to insert, update, delete and retrieve data. For performing these operations such as insertion, deletion and updation we can either use the Query Languages like SQL, QUEL, Gupta SQL or application softwares such as Visual 3asic, Developer etc. 4. Users - Users are those persons who need the information from the database to carry out their primary business responsibilities i.e. Personnel, Staff, Clerical, Managers, Executives etc. On the basis of the job and requirements made by them they are provided access to the database totally or partially. Database management system concepts 1) Data Definition Language (DDL) statements are used to define the database structure or schema. A popular data manipulation language is 5
  • 6. that of Structured Query Language (SQL), which is used to retrieve and manipulate data in arelational database.Some examples: o CREATE - to create objects in the database o ALTER - alters the structure of the database o DROP - delete objects from the database o TRUNCATE - remove all records from a table, including all spaces allocated for the records are removed o COMMENT - add comments to the data dictionary o RENAME - rename an object Syntax : The create table statement does exactly that: CREATE TABLE <table name> ( <attribute name 1> <data type 1>, ... <attribute name n> <data type n>); The data types that you will use most frequently are character strings, which might be called VARCHAR or CHAR for variable or fixed length strings; numeric types such as NUMBER or INTEGER, which will usually specify a precision; and DATE or related types. Data type syntax is variable from system to system; the only way to be sure is to consult the documentation for your own software. 2) Data Manipulation Language (DML) statements are used for managing data within schema objects. The Data Manipulation Language (DML) is a subset of SQL programming language used to retrieve, insert and modify database information. These commands will be used by all database users during the routine operation of the database Some examples: o SELECT - retrieve data from the a database o INSERT - insert data into a table o UPDATE - updates existing data within a table o DELETE - deletes all records from a table, the space for the records remain o MERGE - UPSERT operation (insert or update) o CALL - call a PL/SQL or Java subprogram o EXPLAIN PLAN - explain access path to data o LOCK TABLE - control concurrency Syntax : 6
  • 7. 1)The insert statement is used, obviously, to add new rows to a table. INSERT INTO <table name> VALUES (<value 1>, ... <value n>); The comma-delimited list of values must match the table structure exactly in the number of attributes and the data type of each attribute. Character type values are always enclosed in single quotes; number values are never in quotes; date values are often (but not always) in the format 'yyyy-mm-dd' (for example, '2006-11-30'). Yes, you will need a separate INSERT statement for every row. 2) The update statement is used to change values that are already in a table. UPDATE <table name> SET <attribute> = <expression> WHERE <condition>; The update expression can be a constant, any computed value, or even the result of a SELECT statement that returns a single row and a single column. If the WHERE clause is omitted, then the specified attribute is set to the same value in every row of the table (which is usually not what you want to do). You can also set multiple attribute values at the same time with a comma- delimited list of attribute=expression pairs. 3) The delete statement does just that, for rows in a table. DELETE FROM <table name> WHERE <condition>; If the WHERE clause is omitted, then every row of the table is deleted (which again is usually not what you want to do)—and again, you will not get a “do you really want to do this?” message. 3) Data Control Language (DCL) statements DCL is abbreviation of Data Control Language. It is used to create roles, permissions, and referential integrity as well it is used to control access to database by securing it.. Some examples: o GRANT - gives user's access privileges to database o REVOKE - withdraw access privileges given with the GRANT command 7
  • 8. 9. TRADITIONAL FILE CONCEPTS AND ENVIORNMENT The traditional file-oriented approach to information processing has for each application a separate master file and its own set of personal files. COBOL language supported these file-oriented applications. It was used for developing applications such as of payroll, inventory, and financial accounting. However, in general an organization needs flow of information across these applications also and this requires sharing of data, which is very difficult to implement in the traditional file approach. In addition, a major limitation of file-based approach is that the programs are dependent on the files and the files are dependent upon the programs.These file-based approaches, which came into being as the first commercial applications of computers, suffered from the following significant disadvantages: 1. Data Redundancy: In a file system if an information is needed by two distinct applications, then it may be stored in two or more files. For example, the particulars of an employee may be stored in payroll and leave record applications separately. Some of this information may be changing, such as the address, the pay drawn, etc. It is therefore quite possible that while the address in the master file for one application has been updated the address in the master file for second application may have not been. Sometimes, it may not be easy to find that in how many files the repeating items such as the address has occurred. The solution, therefore, is to avoid this data redundancy by storing the address at just one place physically, and making it accessible to all applications. 2. Program/Data Dependency: In the traditional file oriented approach if a data field (attribute) is to be added to a master file, all such programs that access the master file would have to be changed to allow for this new field that would have been added to the master record. This is referred to as data dependence. 3. Lack of Flexibility: Since the data and programs are strong coupled in a traditional system, most information retrieval requests would be limited to well anticipated and pre-determined. The system would normally be capable of producing scheduled records and queries that it has been programmed to create. In the fast moving and competent business environment of today, apart from such regularly scheduled records, there is a need for 8
  • 9. responding to un-anticipatory queries and some kind of investigative analysis that could not have been envisaged professionally. 11. ER MODELLING An entity-relationship model (ERM) is an abstract and conceptual representation of data. Entity-relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its requirements in atop-down fashion. Diagrams created by this process are called entity-relationship diagrams, ER diagrams, or ERDs. An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. Examples: a computer, an employee, a song, a mathematical theorem.A relationship captures how two or more entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: an owns relationship between a company and a computer, a supervises relationship between an employee and a department, a performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. : Two related entities Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute.Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entity's primary key.Entity-relationship diagrams don't show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is 9
  • 10. an entity set. The eaten relationship between a child and her lunch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. : An entity with an attribute : A relationship with an attribute : Primary key 12. INTEGRITY CONSTRAINTS Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. There are many types of integrity constraints that play a role in referential integrity. Codd initially defined two sets of constraints but, in his second version of the relational model, he came up with five integrity constraints: • Entity integrity The entity integrity constraint states that no primary key value can be null. This is because the primary key value is used to identify individual tuples in a relation . Having null value for the primary key implies that we cannot identify some tuples.This also specifies that there may not be any duplicate entries in primary key column key row. • Referential Integrity The referential integrity constraint is specified between two relations and is used to maintain the consistency among tuple's in the two relations. Informally, the referential integrity constraint states that a tuple in one relation that refers to another relation must refer to an existing tuple in that relation.It is a rule that maintains consistency among the rows of the two relations • Domain Integrity The domain integrity states that every element from a relation should respect the type and restrictions of its corresponding attribute. A type 10
  • 11. can have a variable length which needs to be respected. Restrictions could be the range of values that the element can have, the default value if none is provided, and if the element can be NULL. • User Defined Integrity e.g.: Age>=18 && Age<=60 Different keys in DBMS 1)Alternate key: An alternate key is any candidate key which is not selected to be the primary key . This is done to prevent incorrect data from entering a table (a duplicate entry is not valid in a unique column) and to make the database more complete and useful. These could be called alternate keys. 2) Candidate key - A candidate key is a field or combination of fields that can act as a primary key field for that table to uniquely identify each record in that table. Eg:The table: Emloyee (Name, Address, Ssn, Employee_Id, Phone_ext ) In the above example Ssn no. and employee identity are candidate keys. 3) Compound key :compound key (also called a composite key or concatenated key) is a key that consists of 2 or more attributes. 4) Primary key - a primary key is a value that can be used to identify a unique row in a table. Attributes are associated with it. Examples of primary keys are Social Security numbers (associated to a specific person) or ISBNs (associated to a specific book). In the relational model of data, a primary key is a candidate key chosen as the main method of uniquely identifying a tuple in a relation. For Eg: Emloyee (Name,Address,Ssn,Employee_Idprimary_key,Phone_ext) 5) Foreign key - a foreign key (FK) is a field or group of fields in a database record that points to a key field or group of fields forming a key of another database record in some (usually different) table. Usually a foreign key in one table refers to the primary key (PK) of another table. 6) Surrogate keys : A surrogate key can be used as the primary key. In other situations there may be more than one candidate key for a relation, and no candidate key is obviously preferred. A surrogate key may be used as the primary key to avoid giving one candidate key artificial primacy over the others. Since primary keys exist primarily as a convenience to the programmer, surrogate primary keys are often used—in many cases exclusively—in database application design. 7) Unique key : a unique key can uniquely identify each row in a table, and is closely related to the Superkey concept. A unique key comprises a 11
  • 12. single column or a set of columns. No two distinct rows in a table can have the same value (or combination of values) in those columns if NULL values are not used. Depending on its design, a table may have arbitrarily many unique keys but at most one primary key. 12
  • 13. UNIT III DATA COMMUNICATION & NETWORK 1. CONCEPT OF DATA COMMUNICATION These basic concepts of data communications are: 1.1. Send and Receive Data Send/write data: A program sends a value for a data point, and the Data Hub records, or writes, the value for that point. This type of communication is synchronous. The send and the write are essentially two parts of a single process, so we use the terms pretty much interchangeably. You can write a value to the Data Hub manually using the Data Browser. A typical write command from a program using DDE protocol is DDEPoke. Receive/read data: A program requests to receive the value of a data point. The Data Hub then responds by sending the current value of the point. We call this reading the value from the Cascade Data Hub. Again, we sometimes use the two terms interchangeably, and again, this type of communication is synchronous. A typical read command from a program using DDE protocol is DDERequest. 'Automatic' Receive: It is possible to set up live data channels, where a program receives updates on data points sent from the Cascade Data Hub. How it works is the program sends an initial request to the Data Hub to register for all changes to a data point. The Data Hub immediately sends the current value of the point, and then again whenever it changes. The Data Hub can receive data automatically in a similar way. This asynchronous type of communication is sometimes referred to as publish-subscribe. 13
  • 14. A DDEAdvise command sets up this type of connection, which is called an advice loop. 1.1.2. Client - Server Exchanging data with the Cascade DataHub is done through a client- server mechanism, where the client requests a service, and the server provides the service. Depending on the programs it interacts with, the DataHub is capable of acting as a client, as a server, or as both simultaneously. The client-server relationship itself does not determine the direction of data flow. For example, a client may read data from the server, or it might write data to the server. The data can flow either way; the client might initiate a read or a write, and the server would respond. 1.1.3. Synchronous and Asynchronous Communication Every type of communication, natural or man made comes in two basic forms: synchronous or asynchronous. Synchronous communication means that for each message, the sender expects to get a reply from the receiver, like a telephone call. There is a back-and-forth exchange, so that each party knows that the other is receiving the message. If there is no response, you can be pretty sure that communication didn't occur. Asynchronous communication means that a message gets sent but the receiver is not expected to reply, like a radio broadcast or a newspaper. Each of these communication types has its own value and purpose in data communications, and the Cascade Data Hub is capable of both. The specific circumstances and application will determine which form of communication you end up using. COMMUNICATION MEDIA Computer networks can be classified according to the hardware and associated software technology that is used to interconnect the individual devices in the network, such as electrical cable (Home PNA, power line communication, Ghn), optical fiber, and radio waves(wireless LAN). A well-known family of communication media is collectively known as Ethernet. It is defined by IEEE 802 and utilizes various standards and media that enable communication between devices. Wireless LAN 14
  • 15. technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium. Wired technologies 1) Twisted pair wire is the most widely used medium for telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer networking cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are rated in categories which are manufactured in different increments for various scenario. 2) Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second. 3) ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network. 4) Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers that carries data by means of pulses of light. It transmits light which can travel over extended distances. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed may reach trillions of bits per second. The transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster than a twisted-pair wire. Wireless technologies 1) Terrestrial microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which 15
  • 16. limits all communications to line-of-sight. Path between relay stations spaced approx, 48 km (30 mi) apart. 2) Communications satellites – The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 35,400 km (22,000 mi) (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. 3) Cellular and PCS systems – Use several radio communications technologies. The systems are divided to different geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area. 4) Wireless LANs – Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. 5) Infrared communication can transmit signals between devices within small distances of typically no more than 10 meters. In most cases,line-of-sight propagation is used, which limits the physical positioning of communicating devices. 6) A global area network (GAN) is a network used for supporting mobile across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial wireless LANs CONCEPT OF COMPUTER NETWORKS A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information. Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope. 16
  • 17. INTRANET & EXTRANETS 13(B) EXTRANETS An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. An extranet can be viewed as an extension of a company's intranet that is extended to users outside the company, usually partners, vendors, and suppliers. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. An extranet is like a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network. UNIT –IV: FUNCTIONAL AND ENTERPRISE SYSTEMS 1. DATA, INFORMATION & KNOWLEDGE CONCEPTS The term data refers to qualitative or quantitative attributes of a variable or set of variables. Data (plural of "datum") are typically the results of measurements and can be the basis of graphs, images, or observations of a set of variables. Data are often viewed as the lowest level of abstraction from which information and then knowledge are derived. Raw data, i.e. unprocessed data, refers to a collection of numbers, characters, images or other outputs from devices that collect information to convert physical quantities into symbols. Information in its most restricted technical sense is a message (utterance or expression) or collection of messages that consists of an ordered sequence of symbols, or it is the meaning that can be interpreted from such a message or collection of messages. Information can be recorded or transmitted. It can be recorded as signs, or conveyed as signals by waves. Information is any kind of event that affects the state of a dynamic system. The concept has numerous other meanings in different contexts. 17
  • 18. Knowledge is a familiarity with someone or something, which can include information, facts, descriptions, and/or skills acquired through experience or education. It can refer to the theoretical or practical understanding of a subject. It can be implicit (as with practical skill or expertise) or explicit (as with the theoretical understanding of a subject); and it can be more or less formal or systematic.[1] In philosophy, the study of knowledge is called epistemology, and the philosopher Plato famously defined knowledge as "justified true belief." There is however no single agreed upon definition of knowledge, and there are numerous theories to explain it. Knowledge acquisition involves complex cognitive processes: perception, learning, communication, association and reasoning; while knowledge is also said to be related to the capacity of acknowledgment in human beings. 2. DECISION MAKING PROCESS The figure given below suggests the steps in the decision-making process:- • Identifying the Problem: Identification of the real problem before a business enterprise is the first step in the process of decision- making. It is rightly said that a problem well-defined is a problem half-solved. Information relevant to the problem should be gathered so that critical analysis of the problem is possible. This is how the problem can be diagnosed. Clear distinction should be made between the problem and the symptoms which may cloud the real issue. In brief, the manager should search the 'critical factor' at work. It is the point at which the choice applies. Similarly, while diagnosing the real problem the manager should consider causes and find out whether they are controllable or uncontrollable. 18
  • 19. Analyzing the Problem: After defining the problem, the next step in the decision-making process is to analyze the problem in depth. This is necessary to classify the problem in order to know who must take the decision and who must be informed about the decision taken. • Uniqueness of the decision.: Collecting Relevant Data: After defining the problem and analyzing its nature, the next step is to obtain the relevant information/ data about it. There is information flood in the business world due to new developments in the field of information technology. All available information should be utilized fully for analysis of the problem. This brings clarity to all aspects of the problem. • Developing Alternative Solutions: After the problem has been defined, diagnosed on the basis of relevant information, the manager has to determine available alternative courses of action that could be used to solve the problem at hand. Only realistic alternatives should be considered. It is equally important to take into account time and cost constraints and psychological barriers that will restrict that number of alternatives. If necessary, group participation techniques may be used while developing alternative solutions as depending on one solution is undesirable. • Selecting the Best Solution: After preparing alternative solutions, the next step in the decision-making process is to select an alternative that seems to be most rational for solving the problem. The alternative thus selected must be communicated to those who are likely to be affected by it. Acceptance of the decision by group members is always desirable and useful for its effective implementation. • Converting Decision into Action: After the selection of the best decision, the next step is to convert the selected decision into an effective action. Without such action, the decision will remain merely a declaration of good intentions. Here, the manager has to convert 'his decision into 'their decision' through his leadership. For this, the subordinates should be taken in confidence and they should be convinced about the correctness of the decision. Thereafter, the manager has to take follow-up steps for the execution of decision taken. • Ensuring Feedback: Feedback is the last step in the decision- making process. Here, the manager has to make built-in arrangements to ensure feedback for continuously testing actual developments against the expectations. It is like checking the effectiveness of follow-up measures. Feedback is possible in the form of organised information, reports and personal observations. Feed back is necessary to decide whether the decision already 19
  • 20. taken should be continued or be modified in the light of changed conditions. 3. PHYSICAL COMPONENTS OF INFORMATION SYSTEM An information system is a system that accepts data resources as input and processes them into information products as output. This information system model highlights the relationships among the components and activities of information systems. Information System Resources: (i) People Resources: People are required for the operation of all information systems. These people resources include: • End users (also called users or clients) are people who use an information system or the information it produces. They can be accountants, salespersons, engineers, clerks, customers, or managers. Most of us are information system end users. • IS Specialists are people who develop and operate information systems. They include systems analysts, programmers, computer operators, and other managerial technical, and clerical IS personnel. Briefly, systems analysts design information systems based on the information requirements of end uses, programmers prepare computer programs based on the specifications of systems analysts, and computer operators operate large computer systems. (ii) Hardware Resources: The concept of Hardware resources includes all physical devices and materials used in information processing. Specially, it includes not only machines, such as computers and other equipment, but also all data media, that is, all tangible objects on which data is recorded, from sheets of paper to magnetic disks. (iii) Software Resources: The concept of Software Resources includes all sets of information processing instructions. This generic concept of software includes not only the sets of operating instructions called programs, which direct and control computer hardware, but also the sets of information processing 20
  • 21. instructions needed by people, called procedures.It is important to understand that even information systems that don’t use computers have a software resource component. This is true even for the information systems of ancient times, or the manual and machine- supported information systems still used in the world today. They all require software resources in the form of information processing instructions and procedures in order to properly capture, process, and disseminate information to their users. iv) Data Resources: Data is more than the raw material of information systems. The concept of data resources has been broadened by managers and information systems professionals. They realize that data constitutes a valuable organization resource. Thus, you should view data as data resources that must be managed effectively to benefit all end users in an organization. Data can take many forms, including traditional alphanumeric data, composed of numbers and alphabetical and other characters that describe business transactions and other events and entities. Text data, consisting of sentences and paragraphs used in written communications; image data, such as graphic shapes and figures; and audio data, the human voice and other sounds, are also important forms of data. The data resources of information systems are typically organized into: • Database that hold processed and organized data. • Knowledge bases that hold knowledge in variety of forms such as facts, rules, and case examples about successful business practices. For example, data about sales transactions may be accumulated and stored in a sales database for subsequent processing that yields daily, weekly, and monthly sales analysis reports for management. Knowledge bases are used by knowledge management systems and expert systems to share knowledge and give expert advice on specific subjects. 4. CLASSIFICATION OF INFORMATION SYSTEM • Transaction Processing System (TPS): Applications of information systems that process business transaction data. Its use at operational level and focuses on the data. An example is a computer application for typing. • Management Information System (MIS):Applications of information system that aims to provide information used in the field of management (management-oriented reporting.) Examples are 21
  • 22. computer applications for hospital services, pharmacy purchasing, scheduling of production machinery and others. • Decision Support System (DSS):Applications of information systems that provide decision-oriented information and especially in situations where decision-making. At the executive level often called Executive Information System. For example a computer application to determine the purchase of drug stocks at the hospital, the determination of sugar distribution system and others. • Expert System (ES):Information system designed to produce a decision by reproducing knowledge and expertise of the decision maker and problem solver and then simulate it. For example advanced applications of artificial neural networks, face recognition and so forth. • Office automation system: Systems that support business activities on a large scale. Examples ERP applications for the company. 5. OVERVIEW OF SECURITY ISSUES IN INFORMATION TECHNOLOGY Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.Computer security can focus on ensuring the availability and correct operation of acomputer system without concern for the information stored or processed by the computer.Governments, military, corporations, financial institutions, hospitals, and privatebusinesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, 22
  • 23. processed and stored on electronic computers and transmitted acrossnetworks to other computers.Should confidential information about a business' customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases,security testing, information systems auditing, business continuity planning and digital forensics science, etc. 6. EMERGING TRENDS OF INFORMATION TECHNOLOGY Ten trends are identified consisting of aspects of: the difficulty of hiring qualified labor in-country; establishment of strategy resides entirely within the IT management; security remains a serious concern; offshore subcontractors sometimes place their employees within Icelandic companies; mid- and upper-level employees who can strategically develop networks and systems are in strong demand; use of information system (IS)/IT standards for information security is mostly voluntary; generally, the establishment of IS/IT strategy does not remain with board of directors; virtually all Icelandic corporations engage in, or have engaged in, outsourcing over the past five years (11 sub-trends are identified); and the business school curricula is inadequate to the needs of Icelandic corporations with respect to IT demands. 23