IPM Test
IPM Test
A Transaction Processing System (TPS) is a type of information system that collects, stores,
modifies and retrieves the data transactions of an enterprise. Transaction processing systems also
attempt to provide predictable response times to requests, although this is not as critical as for
real-time systems.
A transaction refers to any event or activity that affects the organization Depending on the
organization’s business, transactions may differ from one organization to another
Every firm needs to process transactions in order to perform its daily business operations. A
transaction refers to any event or activity that affects the organization. Depending on the
organization’s business, transactions may differ from one organization to another. In a
manufacturing unit, for example, transactions include order entry, receipt of goods, shipping,
etc., while in a bank, transactions include deposits and withdrawals, cashing of cheques, etc.
However, some transactions, including placing orders, billing customers, hiring employees,
employee record keeping, etc., are common to all organizations. To support the processing of
business transactions, transaction processing systems (TPS) are used in organizations.
Financials
Inventory
Personnel
Project timelines
Manufacturing
Real estate
Marketing
Raw materials
A decision support system produces detailed information reports by gathering and analyzing
data. Hence, a DSS is different from a normal operations application, whose goal is to collect
data and not analyze it.
In a JIT inventory system, the organization requires real-time data of their inventory levels to
place orders “just in time” to prevent delays in production and cause a negative domino effect.
Therefore, a DSS is more tailored to the individual or organization that is making the decision
rather than a traditional system.
The model management system S=stores models that managers can use in their decision-making.
The models are used in decision-making regarding the financial health of the organization and
forecasting demand for a good or service.
2. User Interface
The user interface includes tools that help the end-user of a DSS to navigate through the system.
3. Knowledge Base
The knowledge base includes information from internal sources (information collected in a
transaction process system) and external sources (newspapers and online databases).
Communication-driven: Allows companies to support tasks that require more than one
person to work on the task. It includes integrated tools such as Microsoft SharePoint
Workspace and Google Docs.
Model-driven: Allows access to and the management of financial, organizational, and
statistical models. Data is collected, and parameters are determined using the information
provided by users. The information is created into a decision-making model to analyze
situations. An example of a model-driven DSS is Dicodess – an open-source model-
driven DSS.
Knowledge-driven: Provides factual and specialized solutions to situations by using
stored facts, procedures, rules, or interactive decision-making structures like flowcharts.
Document-driven: Manages unstructured information in different electronic formats.
Data-driven: Helps companies to store and analyze internal and external data.
The cost to develop and implement a DSS is a huge capital investment, which makes it
less accessible to smaller organizations.
A company can develop a dependence on a DSS, as it is integrated into daily decision-
making processes to improve efficiency and speed. However, managers tend to rely on
the system too much, which takes away the subjectivity aspect of decision-making.
A DSS may lead to information overload because an information system tends to
consider all aspects of a problem. It creates a dilemma for end-users, as they are left with
multiple choices.
Implementation of a DSS can cause fear and backlash from lower-level employees. It is
because many of them are not comfortable with new technology and are afraid of losing
their jobs to technology.
Executive Support System (ESS) is a software used by companies which has information
related to business, which enables the top management to take better decisions in favor of the
company.
ESS mainly deals with data related to key departments like billing, accounting, scheduling,
staffing etc. In addition to providing quick access to the data, ESS helps to analyze the data
systematically and helps the companies to even forecast and prepare for the future.
Question No 2
Types of Database
There are several types of databases, some of which are listed here.
1. Distributed Database
2. Centralized Database
3. Personal Database
4. Relational Database
5. Operational Database
6. Hierarchical Database
7. Cloud Database
8. Object Oriented Database
9. NoSQL Database
1. Distributed Database
Hardware independent
Location independent
Operating system independent
Network independent
Transaction transparency
Distributed query processing
Distributed transaction management
Examples of distributed database:
Apache Cassandra
Apache HBase
Apache Ignite
Couchbase Server
Amazon SimpleDB
FoundationDB
Clusterpoint
Replicated Data
It is a type of distributed database, which is used to create examples of data in various parts
of the database. It can be divided into these two categories.
A centralized database framework is a framework that keeps the information in one single
database at one place.
Information is gathered and stored on PCs, which is in small quantity and can easily
manageable.
This information is commonly utilized by the same department of an association and can
easily be accessed by a small number of people.
Generally, a personal database system can support one application at a time, involve a
single computer, a database having few tables.
A relational database is described by a set of tables from where data can be accessed.
Relational database can store a large amount of information in a set of tables, which are
linked to each other.
Each table is composed of information in rows & columns in which each column represents
a particular type of information like name, address, each row contains unique information
and each field in a table has its own data type.
An operational database is used to store and manage a huge amount of data in real-time.
Data regarding operations (marketing, services provided to customers & relations with
them) of any project can be stored inside an operational database.
In hierarchical database model, data is organized in a tree structure that links a number of
different elements to one parent record.
Each record type has only one parent. Top element of tree is called parent while its branches
are called children. It is useful for certain types of data storage and most popular in the time
of mainframe computers.
An entity type is corresponding to a table and entity types are related to each other with
one-to-many association.
Cloud database is a kind of database administration that is deployed and delivered through
a cloud platform like Platform-as-a-Service (PaaS) that permits the organizations and their
applications to store and mange information from the cloud.
In present era, it got popularity due to several benefits like acquiring more storage capacity,
high bandwidth, scalability and availability as per the payment ability of the user.
Some examples of object-oriented database engines are Smalltalk, db4o and Cache.
Information is described in the form of objects in object-oriented database. Alike objects are
categorized to classes and sub-classes and relationship between two objects is maintained
by utilizing the notion of opposite reference.
NoSQL database is used to efficiently manage and analyze a large set of distributed data
that might be stored at several virtual servers. Types of NoSQL database are:
Document Stores
Key-value data Stores
Wide Column Stores
Graph Stores
Many NoSQL data stores are available now, some of which are, MongoDB, CouchDB,
GemFire, Casandra, Hbase, Mnesia, Memcached, and Neo4j
Question No3
There are several tools’ businesses can use that are specific to the second phase. They
include:
3. Systems Design
The third phase describes, in detail, the necessary specifications, features and operations
that will satisfy the functional requirements of the proposed system which will be in place.
This is the step for end users to discuss and determine their specific business information
needs for the proposed system. It’s during this phase that they will consider the essential
components (hardware and/or software) structure (networking capabilities), processing and
procedures for the system to accomplish its objectives.
4. Development
The fourth phase is when the real work begins—in particular, when a programmer, network
engineer and/or database developer are brought on to do the major work on the project.
This work includes using a flow chart to ensure that the process of the system is properly
organized. The development phase marks the end of the initial section of the process.
Additionally, this phase signifies the start of production. The development stage is also
characterized by instillation and change. Focusing on training can be a huge benefit during
this phase.
6. Implementation
The sixth phase is when the majority of the code for the program is written. Additionally, this
phase involves the actual installation of the newly-developed system. This step puts the
project into production by moving the data and components from the old system and placing
them in the new system via a direct cutover. While this can be a risky (and complicated)
move, the cutover typically happens during off-peak hours, thus minimizing the risk. Both
system analysts and end-users should now see the realization of the project that has
implemented changes.
The Waterfall Method: - The waterfall information system development method is one of the
easiest and straight forward information systems development method that talks about series of
activities in the others of requirement, design, implementation, verification, and maintenance
which are done in stages were each stage of the activity stated have to be hundred percent
accomplished before the following section can be done (Davidson, 2002). Though, it also has
some drawbacks which include high level of risk, been disciplined in completing each stage of
the activities in the model.
The Spiral Method: - The spiral method combines the important features of both the waterfall
method and the prototyping method and most concerned about risk analysis. Although, the spiral
method has four stages compared to the waterfall and system development life cycle method
which is in the stated order, determine objective, identify and resolve risk, development and
testing then finally plan the next execution. All these levels that are mentioned are constantly
repeated over and over again section by section until all the difficulties of the waterfall method
are rectify.
Thus it could be concluded that the spiral information system development method is mostly
used for larger and complicated system development where the entire requirements are very
difficult to understand compared to the waterfall and system development life cycle method
System Development Life Cycle (SDLC) Method:- This is also another type of information
system development method similar to the waterfall and the spiral method with series of
activities followed in a circular other in stages through which every developer, database designer
and project manager pass through as to develop an information system. The system development
life cycle method is the overall cognitive process that takes place in the development of
information systems in a gradual manner until there is an achievement of the best quality in the
development of a system.
In addition, “system development life cycle is the general process of developing, implementing,
and constructing information systems through a multistep process from Requirement, Design,
Build, Test and maintenance”. On this basis, it can be inferred that the SDLC is a procedure that
every information system development must pass through even if each of them emphasizes on
different part of the five stages of the SDLC method.
It is clear therefore that the information systems development methods concentrate on the
general process of development.
Question NO 5
Because companies are more dependent on computers than ever before, they need to protect data
and equipment from natural disasters and computer crime. Types of computer crime include
unauthorized use and access, software piracy, malicious damage, and computer viruses. To
protect IT assets, companies should prepare written security policies. They can use technology
such as virus protection, firewalls, and employee training in proper security procedures. They
must also take steps to protect customers’ personal privacy rights.
Establish strong passwords: - This first measure is really easy to put in place. You must put
together a combination of capitals, lower-case letters, numbers, and symbols to create a
strong password. The more characters you put, the better. With that, you must avoid using
your birthday or any personal information and change the password accordingly.
Set up a firewall: - In order to protect your network, firewalls are an important initiative to
consider. They are a must-have for any company, as they control the internet traffic coming
and leaving your business.
Think of antivirus protection: - Antivirus and anti-malware are indispensable to protecting
your Data. They are designed to prevent, search for, detect and remove viruses but also
adware, worms, trojans, and so on.
Updating is important: - Your computer must be properly patched and updated. Recent
updates allow your Data to be more secured.
Secure every laptop: - Laptops are portable so there is a higher risk that they can be stolen.
As a consequence, it is important to take more security measures in order to protect all
laptops. A simple solution is to encrypt them. In doing so, without the right password, your
computer’s Data is unreadable.
Secure mobile phones: - Mobile phones are even more easily stolen than laptops but they
are as valuable for companies. Equally to laptops, phones can be encrypted- you can put a
strong password and enable an automatic lock-out. You can also set up a wiping process if
the phone is lost or stolen.
Schedule backups: - You can schedule backups to external hard drives or in the cloud in
order to keep your data stored safely. The right frequency is weekly but you can do
incremental backups every few days. You can also use Wimi, which centralizes your
documents. With it, you can then share your documents with your team, your clients, and
your partners
Monitor steadily: - Data, Software, technologies, everything is moving so fast. Keep track
of them; keep in touch with news to see what is new on the market.
Be smart with emails and surfing the web: - Downloading apps or files, opening emails
and clicking on links can infect your computer and your network. Be careful with the sources
you find online or you receive. Take every “warning box” seriously.
Educate your employees about Data Security: - Prevention is the best way to keep your
Data safe. Warned employees will always be more attentive.