SlideShare uma empresa Scribd logo
1 de 44
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
1
Management
Information Systems,
10/e
Raymond McLeod and George
Schell
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
2
Chapter 5
Computing and Communications
Resources
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
3
Learning Objectives
► Know the various computer components.
► Know about personal computing devices.
► Understand the implications of the rapid advances
in information and communication technologies.
► Be familiar with input and output resources.
► Recognize how different storage media differ and
the advantages of each.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
4
Learning Objectives (Cont’d)
► Know the advantages of prewritten software.
► Understand the different computer networking
strategies.
► Understand how communications over the public
telephone system and networks differ.
► Know about network protocols.
► Distinguish between intranets, extranets, and the
Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
5
Hardware & Processors
►Mainframes are large computers used for
centralized information systems.
►Microcomputers or PCs are computers
used by one person.
►Processor (CPU) is where data processing
is performed.
►Processor speed is measured by the # of
cycles that occur per second.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
6
Processors
►MHz stands for millions of cycles per
second.
►Word is the measure of how many bits can
be moved with one cycle of the processor.
►Word size is how many characters, “A”,
can be moved in a single cycle of the
processor.
►Power is affected by both word size &
processor speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
7
Table 5.1 Major Computer
Components
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
8
Memory & Storage
►Memory (primary storage or RAM) is
the storage area on the computer’s circuit
board.
 Volatile
 Extremely fast
►Fixed storage is permanently installed in
the computer.
►Removable storage media – tape, disk,
CD, DVD, USB flash drive, etc.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
9
Figure 5.2 Motherboard
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
10
Input Devices
►Human-captured data refers to input
captured by a person typing on a keyboard,
clicking a mouse, speaking into a
microphone, or a similar interaction.
►Machine-captured data is data captured
by an electronic or mechanical device.
►Point-of-sale terminals are scanners
used in retail stores.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
11
Output Devices
►Monitor
 Screen resolution, size 17-19’’ diagonals.
 Graphic user interface (GUI).
►Printers
 Lasers are like copier machines.
 Ink-jets spray ink.
►Multimedia is the use of more than 1
medium at a time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
12
Personal Computing Devices
►Cell phones with interactive messaging &
video
►Smart cell phones are phones that perform
tasks associated with PCs i.e. BlackBerry
7270, Treo 650.
►Global Systems for Mobile
Communications (GSM) digital cellular
phone protocol.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
13
Home Networks
►Home computer networks assess the
Internet via cable modems or DSL
modems.
►Setup usually requires the modem, network
card(s), wireless router.
►Wireless security uses Wired equivalent
privacy (WEP) which encrypts the data
transferred between the computer &
wireless router.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
14
Home Computing Security
►Updates for OS an application software.
 For security & efficiency.
 Microsoft Update.
►Hackers are people who try to break into
computer systems in order to
 Gather information;
 Deny the owner access to his resources;
 Delete files;
 Disrupt the use by the owner.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
15
Home Computing Security (Cont’d)
►Viruses are small computer programs that
replicate by inserting themselves into
computer resources such as programs or
files.
►Worms are self-contained files or programs
 Does not have to attach to program or file.
 Can delete, change files, send e-mails, and
cause problems.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
16
Home Computing Security (Cont’d)
►Denial-of-service attack is when the user
is denied access to the services of the
computer because it is overwhelmed with e-
mail.
►Antivirus software – Norton, MacAfee,
etc. Keep virus definitions updated
►Spyware – Microsoft Defender, Lavasoft
Ad-Aware, etc. Free from Microsoft.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
17
Software
►System software (OS) performs certain
tasks that all computers require.
 Hardware interfaces, device drivers.
 Manage computer’s processes.
 OS – Windows XP, Unix, Mac OS X, Linux.
►Application software processes the user’s
data.
►Prewritten application software is
produced by suppliers and sold to users.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
18
Application Software
►Custom application software is when
programmers for the business write the
software.
►User-written software in End-User
Computing is created by the user, such as
Excel Macros, Access Wizards.
►User-friendly software is computer
software that is simple & intuitive to use.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
19
Communications
►Protocol is the specification for formatting
data to be transferred between
communications equipment.
►Public connections
 Telephone modems
 Integrated Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
20
Table 5.4 Connecting to the Internet
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
21
Communications (Cont’d)
►Packet is a piece of the total data to be
communicated, includes sender & receiver
addresses.
►Cable modems connect to the Internet via
coaxial cable.
►Asynchronous transfer mode (ATM)
 Improve data transmission rates.
 Increased speed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
22
Private Line
►Circuit is a connection that is always
connected.
►Private line is a circuit that is always open
to your communication traffic.
 T-1 line over 1.5 Mbps; T-3 at 43 Mbps.
 Multiplexed is when the line is broken into
separate lanes of communication.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
23
Virtual Private Networks
► Virtual Private Networks (VPNs) allow you to
use the security & speed of a private line but still
use the low-cost Internet.
► Tunneling software establishes the set of
intermediary locations of the telephone equipment
that will host a given data communications
transfer.
► Privacy is attained because the tunnel is not
established unless the sending & receiving
computers authenticate one another.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
24
Communications - Networks
► Open Systems Interconnection (OSI)
standard architecture for network connections
established by the ISO.
► Terminal is a device that has no storage or
processor; it allows for entering & displaying data
for the computer.
► Systems Network Architecture (SNA) is a
protocol for large computers; it polls other
computers connected by the network for transfers.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
25
Table 5.5 OSI Reference Model
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
26
Networks (Cont’d)
►Token ring is a peer-to-peer protocol
that allows each computer to act as its own
controller.
►Ethernet is an open protocol for peer-to-
peer communications.
 IEEE endorses
►Data transmission crash is when two
peer computers try to send data at the
same time.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
27
Figure 5.11 Token Ring Protocol
Example
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
28
Networks (Cont’d)
►Data packet is a piece of the total data to
be communicated, combined with the
address of the destination computer, the
sending computer, and other control
information.
►Transmission Control
Protocol/Internet Protocol (TCP/IP)
 TCP conducts communication over the network.
 IP handles the packets so they can be routed.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
29
Networks (Cont’d)
►IP address is a four-part set of numbers
(each from 0 to 255), separated by periods.
►Network interface card (NIC) is used to
attach a device to the communications
medium.
►Local Area Networks (LANs) is a group
of computers and other devices that are
connected together by a communications
medium.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
30
Table 5.6 Communications Network
Hardware
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
31
Networks (Cont’d)
►Medium used by LANs can be copper wire,
wireless, fiber-optics, or other media.
►LANs join computers that are physically
located together.
 Same room or building.
 Total distance is less than ½ mile.
 60 ft. between devices.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
32
Networks (Cont’d)
►Metropolitan area network (MAN) is a
network that has a physical distance limit of
roughly 30 miles.
►Wide are networks (WANs) are used to
connect computers and other devices when
the distance exceeds the constraints of
LANs & MANs.
 Uses common carrier, public telephone system.
 WANs have been replaced by the Internet.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
33
Internet, Intranet & Extranet
►Internet is just a collection of networks
that can be joined together; Public.
►Intranet uses the same network protocols
as the Internet but limits accessibility to
computer resources to a select group of
persons in the organization.
►Extranet is when the intranet is expanded
to include users beyond the firm; Trusted
customers & business partners.
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
34
Convergence of Computing &
Communications
►Computing devices & communications
devices are now incorporating features of
the other into themselves.
►Voice over Internet Protocol (VoIP) is
the routing of voice communications over
the Internet as if they were digital
communications.
 WWW.SKYPE.COM – free software
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
35
Mainframe Computer
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
36
Personal Computer (PC)
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
37
PC System
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
38
Static RAM / SRAM Dinamic RAM / DRAM
EDORAM
(Extended Data
Out RAM )
72 pin
SDRAM
168 pin
PROM
EPROM
EEPROM
Memory
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
39
Hard disk
Removable Storage
Floppy disk
Floppy drive
CD
Flash disk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
40
Cylinder, sector, track pada harddisk
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
41
Hard disk layout
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
42
Input Device
Keyboard
Mouse
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
43
Monitor
© 2007 by Prentice Hall Management Information Systems, 10/e
Raymond McLeod and George Schell
44
Printer & Plotter
Printer Dot Matrik
Printer Ink Jet
Plotter

Mais conteúdo relacionado

Mais procurados

Sistem+teknologi+komputer
Sistem+teknologi+komputerSistem+teknologi+komputer
Sistem+teknologi+komputer
Dede Irawan
 
File system linux
File system linuxFile system linux
File system linux
moliiceman
 
Data Aplikasi Tiket Kereta api
Data Aplikasi Tiket Kereta apiData Aplikasi Tiket Kereta api
Data Aplikasi Tiket Kereta api
blankspace15
 
Architecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independenceArchitecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independence
Anuj Modi
 
Artikel Ilmiah Sistem Basis Data
Artikel Ilmiah Sistem Basis Data Artikel Ilmiah Sistem Basis Data
Artikel Ilmiah Sistem Basis Data
Muhammad Fajar
 

Mais procurados (20)

Sistem+teknologi+komputer
Sistem+teknologi+komputerSistem+teknologi+komputer
Sistem+teknologi+komputer
 
Data warehouse and olap technology
Data warehouse and olap technologyData warehouse and olap technology
Data warehouse and olap technology
 
DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
File system linux
File system linuxFile system linux
File system linux
 
Introduction to oracle database (basic concepts)
Introduction to oracle database (basic concepts)Introduction to oracle database (basic concepts)
Introduction to oracle database (basic concepts)
 
03_Information Package.pptx
03_Information Package.pptx03_Information Package.pptx
03_Information Package.pptx
 
Data Aplikasi Tiket Kereta api
Data Aplikasi Tiket Kereta apiData Aplikasi Tiket Kereta api
Data Aplikasi Tiket Kereta api
 
Normalisation and anomalies
Normalisation and anomaliesNormalisation and anomalies
Normalisation and anomalies
 
Multimedia db system
Multimedia db systemMultimedia db system
Multimedia db system
 
Makalah bd
Makalah bdMakalah bd
Makalah bd
 
Dbms and rdbms
Dbms and rdbmsDbms and rdbms
Dbms and rdbms
 
Dbms and rdbms ppt
Dbms and rdbms pptDbms and rdbms ppt
Dbms and rdbms ppt
 
Materi : Struktur Data (2 Array)
Materi : Struktur Data (2 Array)Materi : Struktur Data (2 Array)
Materi : Struktur Data (2 Array)
 
Basic oracle-database-administration
Basic oracle-database-administrationBasic oracle-database-administration
Basic oracle-database-administration
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 
IS740 Chapter 02
IS740 Chapter 02IS740 Chapter 02
IS740 Chapter 02
 
Architecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independenceArchitecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independence
 
Artikel Ilmiah Sistem Basis Data
Artikel Ilmiah Sistem Basis Data Artikel Ilmiah Sistem Basis Data
Artikel Ilmiah Sistem Basis Data
 
Structure of Database MAnagement System
Structure of Database MAnagement SystemStructure of Database MAnagement System
Structure of Database MAnagement System
 
Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)
 

Semelhante a SIM - Mc leod ch05

SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
Welly Tjoe
 
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
Welly Tjoe
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
cockekeshia
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 

Semelhante a SIM - Mc leod ch05 (20)

MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
SIM - Mc leod ch04
SIM - Mc leod ch04SIM - Mc leod ch04
SIM - Mc leod ch04
 
SIM - Mc leod ch01
SIM - Mc leod ch01SIM - Mc leod ch01
SIM - Mc leod ch01
 
Session 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.pptSession 3 - Emerging technologies.ppt
Session 3 - Emerging technologies.ppt
 
Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_Stid1103 ch1 introduction_to_it_
Stid1103 ch1 introduction_to_it_
 
Netwoking
NetwokingNetwoking
Netwoking
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Class 3 Architectures of IS
Class 3 Architectures of ISClass 3 Architectures of IS
Class 3 Architectures of IS
 
Mini final docmtn final
Mini final docmtn finalMini final docmtn final
Mini final docmtn final
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
5[1]
5[1]5[1]
5[1]
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Modules1
Modules1Modules1
Modules1
 
1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt1_IoT_Fundamentals.ppt
1_IoT_Fundamentals.ppt
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 

Mais de Welly Tjoe

SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
Welly Tjoe
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
Welly Tjoe
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
Welly Tjoe
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
Welly Tjoe
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
Welly Tjoe
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
Welly Tjoe
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
Welly Tjoe
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
Welly Tjoe
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
Welly Tjoe
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
Welly Tjoe
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edar
Welly Tjoe
 

Mais de Welly Tjoe (12)

Etika bisnis
Etika bisnisEtika bisnis
Etika bisnis
 
SIM - Mc leod ch11
SIM - Mc leod ch11SIM - Mc leod ch11
SIM - Mc leod ch11
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
 
SIM - Mc leod ch08
SIM - Mc leod ch08SIM - Mc leod ch08
SIM - Mc leod ch08
 
SIM - Mc leod ch07
SIM - Mc leod ch07SIM - Mc leod ch07
SIM - Mc leod ch07
 
SIM - Mc leod ch06
SIM - Mc leod ch06SIM - Mc leod ch06
SIM - Mc leod ch06
 
SIM - Mc leod ch03
SIM - Mc leod ch03SIM - Mc leod ch03
SIM - Mc leod ch03
 
SIM - Mc leod ch02
SIM - Mc leod ch02SIM - Mc leod ch02
SIM - Mc leod ch02
 
Hdo rolling collar
Hdo rolling collarHdo rolling collar
Hdo rolling collar
 
Bab v laba per saham rtf
Bab v laba per saham rtfBab v laba per saham rtf
Bab v laba per saham rtf
 
Analisis investasi aset riil 1213-fix-edar
Analisis investasi aset riil   1213-fix-edarAnalisis investasi aset riil   1213-fix-edar
Analisis investasi aset riil 1213-fix-edar
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

SIM - Mc leod ch05

  • 1. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and George Schell
  • 2. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 2 Chapter 5 Computing and Communications Resources
  • 3. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 3 Learning Objectives ► Know the various computer components. ► Know about personal computing devices. ► Understand the implications of the rapid advances in information and communication technologies. ► Be familiar with input and output resources. ► Recognize how different storage media differ and the advantages of each.
  • 4. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 4 Learning Objectives (Cont’d) ► Know the advantages of prewritten software. ► Understand the different computer networking strategies. ► Understand how communications over the public telephone system and networks differ. ► Know about network protocols. ► Distinguish between intranets, extranets, and the Internet.
  • 5. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 5 Hardware & Processors ►Mainframes are large computers used for centralized information systems. ►Microcomputers or PCs are computers used by one person. ►Processor (CPU) is where data processing is performed. ►Processor speed is measured by the # of cycles that occur per second.
  • 6. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 6 Processors ►MHz stands for millions of cycles per second. ►Word is the measure of how many bits can be moved with one cycle of the processor. ►Word size is how many characters, “A”, can be moved in a single cycle of the processor. ►Power is affected by both word size & processor speed.
  • 7. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 7 Table 5.1 Major Computer Components
  • 8. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 8 Memory & Storage ►Memory (primary storage or RAM) is the storage area on the computer’s circuit board.  Volatile  Extremely fast ►Fixed storage is permanently installed in the computer. ►Removable storage media – tape, disk, CD, DVD, USB flash drive, etc.
  • 9. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 9 Figure 5.2 Motherboard
  • 10. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 10 Input Devices ►Human-captured data refers to input captured by a person typing on a keyboard, clicking a mouse, speaking into a microphone, or a similar interaction. ►Machine-captured data is data captured by an electronic or mechanical device. ►Point-of-sale terminals are scanners used in retail stores.
  • 11. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 11 Output Devices ►Monitor  Screen resolution, size 17-19’’ diagonals.  Graphic user interface (GUI). ►Printers  Lasers are like copier machines.  Ink-jets spray ink. ►Multimedia is the use of more than 1 medium at a time.
  • 12. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 12 Personal Computing Devices ►Cell phones with interactive messaging & video ►Smart cell phones are phones that perform tasks associated with PCs i.e. BlackBerry 7270, Treo 650. ►Global Systems for Mobile Communications (GSM) digital cellular phone protocol.
  • 13. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 13 Home Networks ►Home computer networks assess the Internet via cable modems or DSL modems. ►Setup usually requires the modem, network card(s), wireless router. ►Wireless security uses Wired equivalent privacy (WEP) which encrypts the data transferred between the computer & wireless router.
  • 14. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 14 Home Computing Security ►Updates for OS an application software.  For security & efficiency.  Microsoft Update. ►Hackers are people who try to break into computer systems in order to  Gather information;  Deny the owner access to his resources;  Delete files;  Disrupt the use by the owner.
  • 15. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 15 Home Computing Security (Cont’d) ►Viruses are small computer programs that replicate by inserting themselves into computer resources such as programs or files. ►Worms are self-contained files or programs  Does not have to attach to program or file.  Can delete, change files, send e-mails, and cause problems.
  • 16. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 16 Home Computing Security (Cont’d) ►Denial-of-service attack is when the user is denied access to the services of the computer because it is overwhelmed with e- mail. ►Antivirus software – Norton, MacAfee, etc. Keep virus definitions updated ►Spyware – Microsoft Defender, Lavasoft Ad-Aware, etc. Free from Microsoft.
  • 17. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 17 Software ►System software (OS) performs certain tasks that all computers require.  Hardware interfaces, device drivers.  Manage computer’s processes.  OS – Windows XP, Unix, Mac OS X, Linux. ►Application software processes the user’s data. ►Prewritten application software is produced by suppliers and sold to users.
  • 18. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 18 Application Software ►Custom application software is when programmers for the business write the software. ►User-written software in End-User Computing is created by the user, such as Excel Macros, Access Wizards. ►User-friendly software is computer software that is simple & intuitive to use.
  • 19. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 19 Communications ►Protocol is the specification for formatting data to be transferred between communications equipment. ►Public connections  Telephone modems  Integrated Services Digital Network (ISDN)  Digital Subscriber Line (DSL)
  • 20. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 20 Table 5.4 Connecting to the Internet
  • 21. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 21 Communications (Cont’d) ►Packet is a piece of the total data to be communicated, includes sender & receiver addresses. ►Cable modems connect to the Internet via coaxial cable. ►Asynchronous transfer mode (ATM)  Improve data transmission rates.  Increased speed.
  • 22. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 22 Private Line ►Circuit is a connection that is always connected. ►Private line is a circuit that is always open to your communication traffic.  T-1 line over 1.5 Mbps; T-3 at 43 Mbps.  Multiplexed is when the line is broken into separate lanes of communication.
  • 23. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 23 Virtual Private Networks ► Virtual Private Networks (VPNs) allow you to use the security & speed of a private line but still use the low-cost Internet. ► Tunneling software establishes the set of intermediary locations of the telephone equipment that will host a given data communications transfer. ► Privacy is attained because the tunnel is not established unless the sending & receiving computers authenticate one another.
  • 24. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 24 Communications - Networks ► Open Systems Interconnection (OSI) standard architecture for network connections established by the ISO. ► Terminal is a device that has no storage or processor; it allows for entering & displaying data for the computer. ► Systems Network Architecture (SNA) is a protocol for large computers; it polls other computers connected by the network for transfers.
  • 25. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 25 Table 5.5 OSI Reference Model
  • 26. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 26 Networks (Cont’d) ►Token ring is a peer-to-peer protocol that allows each computer to act as its own controller. ►Ethernet is an open protocol for peer-to- peer communications.  IEEE endorses ►Data transmission crash is when two peer computers try to send data at the same time.
  • 27. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 27 Figure 5.11 Token Ring Protocol Example
  • 28. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 28 Networks (Cont’d) ►Data packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information. ►Transmission Control Protocol/Internet Protocol (TCP/IP)  TCP conducts communication over the network.  IP handles the packets so they can be routed.
  • 29. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 29 Networks (Cont’d) ►IP address is a four-part set of numbers (each from 0 to 255), separated by periods. ►Network interface card (NIC) is used to attach a device to the communications medium. ►Local Area Networks (LANs) is a group of computers and other devices that are connected together by a communications medium.
  • 30. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 30 Table 5.6 Communications Network Hardware
  • 31. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 31 Networks (Cont’d) ►Medium used by LANs can be copper wire, wireless, fiber-optics, or other media. ►LANs join computers that are physically located together.  Same room or building.  Total distance is less than ½ mile.  60 ft. between devices.
  • 32. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 32 Networks (Cont’d) ►Metropolitan area network (MAN) is a network that has a physical distance limit of roughly 30 miles. ►Wide are networks (WANs) are used to connect computers and other devices when the distance exceeds the constraints of LANs & MANs.  Uses common carrier, public telephone system.  WANs have been replaced by the Internet.
  • 33. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 33 Internet, Intranet & Extranet ►Internet is just a collection of networks that can be joined together; Public. ►Intranet uses the same network protocols as the Internet but limits accessibility to computer resources to a select group of persons in the organization. ►Extranet is when the intranet is expanded to include users beyond the firm; Trusted customers & business partners.
  • 34. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 34 Convergence of Computing & Communications ►Computing devices & communications devices are now incorporating features of the other into themselves. ►Voice over Internet Protocol (VoIP) is the routing of voice communications over the Internet as if they were digital communications.  WWW.SKYPE.COM – free software
  • 35. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 35 Mainframe Computer
  • 36. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 36 Personal Computer (PC)
  • 37. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 37 PC System
  • 38. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 38 Static RAM / SRAM Dinamic RAM / DRAM EDORAM (Extended Data Out RAM ) 72 pin SDRAM 168 pin PROM EPROM EEPROM Memory
  • 39. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 39 Hard disk Removable Storage Floppy disk Floppy drive CD Flash disk
  • 40. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 40 Cylinder, sector, track pada harddisk
  • 41. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 41 Hard disk layout
  • 42. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 42 Input Device Keyboard Mouse
  • 43. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 43 Monitor
  • 44. © 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 44 Printer & Plotter Printer Dot Matrik Printer Ink Jet Plotter