0% found this document useful (0 votes)
7 views22 pages

FOC_Notes

Notes

Uploaded by

anshulchamola53
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views22 pages

FOC_Notes

Notes

Uploaded by

anshulchamola53
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Information Systems

• Information system: It is set of components for collecting, storing, and processing data and for providing
information, knowledge, and digital products.
• These systems are used to support business operations, decision-making, communication, and collaboration, as well as to
provide digital products and services to customers.
• Information and knowledge became vital economic resources.
• Information systems can range from simple manual systems, such as a paper-based filing system, to complex
computer-based systems that use advanced technologies like cloud computing and artificial intelligence.
• Business firms and other organizations rely on information systems to carry out and manage their operations, interact
with their customers and suppliers, and compete in the marketplace.
• Many major companies are built entirely around information systems.
• These include eBay, a largely auction marketplace;
• Amazon, an expanding electronic mall and provider of cloud computing services;
• Alibaba, a business-to-business e-marketplace;
• Google, a search engine company that derives most of its revenue from keyword advertising on Internet searches.
• Individuals rely on information systems, generally Internet-based, for conducting much of their personal lives: for
socializing, study, shopping, banking, and entertainment.
• As information systems enabled more diverse human activities, they exerted a profound influence over society.
Components of information systems
Hardware represents the physical components of an
information system.

Process is a series of steps undertaken to Keyboards, mice, pens, disk drives, iPads, printers, and
achieve a desired outcome or goal flash drives are all visible examples.

It is used for analyzing and


processing of the data

Users, Technical
Network
Developers and Business
Professionals
facilitate the flow of information in the organization.
Databases

To store data
Components of information systems
The main components of information systems are:
1. Hardware: Hardware represents the physical components of an information system. Some can be seen or touched easily,
while others reside inside a device that can only be seen by opening up the device's case. Keyboards, mice, pens, disk
drives, iPads, printers, and flash drives are all visible examples. Computer chips, motherboards, and internal memory
chips are the hardware that resides inside a computer case and not usually visible from the outside.
2. Software: Software is a set of instructions that tell the hardware what to do. Programmers create software programs by
following a specific process to enter a list of instructions that tell the hardware what to do. Software falls into two broad
classes: system software and application software. It manages the hardware, data and program files, and other system
resources and provides means for the user to control the computer, generally via a graphical user interface (GUI).
Application software is programs designed to handle specific tasks for users.
3. Database: Data is a collection of non-disputable raw facts. A database is a place where data is collected and from which it
can be retrieved by querying it using one or more specific criteria. A database is a collection of interrelated data organized
so that individual records or groups of records can be retrieved to satisfy various criteria.
• Example: Employee records and product catalogs. Databases support the operations and management functions of an
enterprise.
• Data warehouses contain the archival data, collected over time, that can be mined for information in order to develop
and market new products, serve the existing customers better, or reach out to potential new customers.
4. Human Resources: Qualified people are a vital component of any information system. People built computers for people
to use.
• Users: these are the people who actually use an IS to perform a job function or task. Examples include: a student uses a
spreadsheet or a word processing software program.
Components of information systems
• Technical Developers: these are the people who actually create the technologies used to build an information
system. Examples include a computer chip engineer, a software programmer, and an application programmer.
• Business Professionals: these are the CEOs, owners, managers, entrepreneurs, employees who use IS to start or
expand their business to perform their job functions such as accounting, marketing, sales, human resources, support
customers, among others. Examples include famous CEOs such as Jeff Bezos of Amazon, Steve Jobs of Apple, Bill
Gates of Microsoft, and Marc Benioff of Salesforce.
4. Procedures: series of steps undertaken to achieve a desired outcome or goal. Businesses have to continually innovate
to either create more revenues through new products and services that fulfill customers’ needs or to find cost-saving
opportunities in the ways they run their companies. Simply automating activities using technology is not enough.
Information systems are becoming more and more integrated with organizational processes to deliver value in revenue-
generating and cost-saving activities that can give companies competitive advantages over their competitors.
5. Network
Networks resources refer to the telecommunication networks like the intranet, extranet and the internet.
These resources facilitate the flow of information in the organization.
Types of information system
• Transaction Processing System (TPS): Transaction processing is essential to helping businesses perform
daily operations. Transactions are any activity or event affecting the company and include deposits,
withdrawals, shipping, billing customers, order entry, and order placement. TPS supports these business
transactions.
• Management Information System (MIS): Middle managers handle much of the administrative chores for
day-to-day routines and performance monitoring, ensuring that all the work is aligned with the organization's
needs. That's why MIS is such a valuable tool. Management Information Systems are designed to help
middle managers and supervisors make decisions, plan, and control the workflow. The MIS pulls
transactional data from various Transactional Processing Systems, compiles the information, and presents it
in reports and displays. Additionally, these reports can be produced monthly, quarterly, or annually, although
MIS can have more immediate reports (e.g., hourly, daily).
• Decision Support System (DSS): The DSS is a management-level, interactive, computer-based information
system that helps managers make decisions. The Decision Support System gives middle managers the
information necessary to make informed, intelligent decisions. Decision Support Systems use different
decision models to analyze or summarize large amounts of data into an easy-to-use form that makes it easier
for managers to compare and analyze information. Often, these summaries take the form of charts and tables.
• Executive Support System (ESS): The ESS is like the MIS but for executive-
level decision-making. Because the decisions involve company-wide matters, the
stakes are higher, and they demand more insight and judgment. The ESS provides
greater telecommunication, better computing capabilities, and more efficient
display options than the DSS. Executives use ESS to make effective decisions
based on summarized internal data taken from DSS, MIS, and external sources. In
addition, executive support systems help monitor performances, track competitors,
spot opportunities and forecast future trends.
• Knowledge Management Systems(KMS): KMS are software tools that collect,
organize, and share knowledge within organizations. They store information in
repositories, support easy search and retrieval, and foster collaboration. KMS
captures tacit knowledge, maintains version control, and uses metadata for
effective organization.
Characteristics of an Efficient Information System
An efficient information system (IS) is essential for modern organizations to function effectively, optimize
resources, and stay competitive.

•Reliability: They should provide accurate and consistent information that can be trusted by users. It should operate
without frequent breakdowns or errors.
•Relevance: They should deliver information that is useful and pertinent to the needs of the organization and its users.
•Timeliness: They should provide information in a timely manner, allowing users to make informed decisions quickly.
•Accuracy : The system must provide accurate data to support decision-making.
•Accessibility: They should be easily accessible to authorized users, both within and outside the organization.
•User-friendliness: The system should be easy to use and accessible to both technical and non-technical users.
•Cost-effectiveness: They should provide value for money in terms of the resources invested in their implementation and
maintenance.
•Scalability: They should be able to handle increased data and user volumes as the organization grows.
•Security: They should have measures in place to safeguard the confidentiality, integrity, and availability of the
information. Strong security features to protect sensitive data.
•Integration: The system should integrate seamlessly with other internal and external systems. They should be able to
gather, process, and disseminate information from different sources and systems within the organization.
Traditional File System
• File system is collection of data. In this system, user has to write procedures for
managing database. It provides details of data representation and storage of
data. In this –
• Data is stored in files.
• Each file has specific format.
• Programs that use these files depend on knowledge about that format.
• In earlier days, database applications were built on top of file systems.
Data Relevance
• Data relevance is the degree to which data provides insight into the real-world problem or purpose being addressed and contributes to the
overall understanding of the business.
• Data relevance is critical because it is what sets the context of the issue at hand.
Irrelevant Data:
• irrelevant data can cause negative impacts on business analytics.
• It can be Redundant data, outdated data, incomplete data and noisy data.
1. Redundant data: Data that repeats the same information multiple times. It doesn’t add new information.
• Example: if you're tracking daily revenue, you don't want to include multiple rows with the same information (i.e. two inputs
for one day), as it would skew the results.
2. Outdated data: Data that's no longer accurate or old data is irrelevant because it can lead to poor decision-making.
• if you're using data from 2018 to make decisions about the current market, it's likely to be outdated and create incorrect
insights.
3. Incomplete Data: Data that's missing vital information is irrelevant because it hinders decision-making.
• if you're trying to evaluate customer behavior but only have data on website traffic, your insights will be incomplete and less
useful.
4. Noise in Data: Noise refers to irrelevant or random variations in data that can obscure meaningful patterns or trends, making it
harder to extract valuable information.
To Ensure Data Relevance
• to identify what user's needs are and collect data that provides context to the issue at hand.
• For example, you can use data from a total_activated_users table to inform user acquisition strategy.
Database System
• A database is an organized collection of structured information, or data, typically stored
electronically in a computer system.
• A database is usually controlled by a database management system (DBMS). Together, the data and
the DBMS, along with the applications that are associated with them, are referred to as a database
system, often shortened to just database.
• Data within the most common types of databases in operation today is typically modeled in rows
and columns in a series of tables to make processing and data querying efficient.
• The data can then be easily accessed, managed, modified, updated, controlled, and organized. Most
databases use structured query language (SQL) for writing and querying data.
Database types
1. Centralized Database: It is the type of database that stores data at a centralized database system. It comforts the
users to access the stored data from different locations through several applications. These applications contain the
authentication process to let users access data securely. An example of a Centralized database can be Central
Library that carries a central database of each library in a college/university.
2. Distributed Database: Unlike a centralized database system, in distributed systems, data is distributed among
different database systems of an organization. These database systems are connected via communication links. Such
links help the end-users to access the data easily.

3. Relational Database: This database is based on the relational data model, which stores data in the form of
rows(tuple) and columns(attributes), and together forms a table(relation). A relational database uses SQL for
storing, manipulating, as well as maintaining the data. Examples: MySQL, Microsoft SQL Server, Oracle, etc.
4. NoSQL Database: Non-SQL/Not Only SQL is a type of database that is used for storing a wide range of data sets.
It is not a relational database as it stores data not only in tabular form but in several different ways. It came into
existence when the demand for building modern applications increased.
Database types
Thus, NoSQL presented a wide variety of database technologies in response to the demands. NoSQL
database is further divided into the following four types:
• Key-value storage: It is the simplest type of database storage where it stores every single item as a
key (or attribute name) holding its value, together.
• Document-oriented Database: A type of database used to store data as JSON-like document. It helps
developers in storing data by using the same document-model format as used in the application code.
• Graph Databases: It is used for storing vast amounts of data in a graph-like structure. Most
commonly, social networking websites use the graph database.
• Wide-column stores: It is similar to the data represented in relational databases. Here, data is stored
in large columns together, instead of storing in rows.
5. Cloud Database: A type of database where data is stored in a virtual environment and executes over
the cloud computing platform. It provides users with various cloud computing services (SaaS, PaaS,
IaaS, etc.) for accessing the database.
Network
• A computer network is defined as a system that connects two or more computing devices for transmitting
and sharing information.
• Types of computer networks
• Local area network (LAN): A LAN connects computers over a relatively short distance, such as those within
an office building, school or hospital. LANs are typically privately owned and managed.
• Wide area network (WAN): WAN connects computers across large geographical areas, such as regions and
continents. WANs often have collective or distributed ownership models for network
management purposes. Cloud networks serve as one example, since they’re hosted and delivered
by public and private cloud infrastructures across the globe.
• Metropolitan area network (MAN): MANs are larger than LANs but smaller than WANs. Cities and
government entities typically own and manage MANs.
• Personal area network (PAN)
• A PAN serves one person. If a user has multiple devices from the same manufacturer (an iPhone and a
MacBook, for instance), it’s likely they've set up a PAN that shares and syncs content—text messages, emails,
photos and more—across devices.
What is computer networking?
• Networking, or computer networking, is the process of connecting two or more computing devices,
such as desktop computers, mobile devices, routers or applications, to enable the transmission and
exchange of information and resources.
• These networked devices use a system of rules, called communications protocols, to transmit
information over physical or wireless technologies.
• The first working network, called ARPANET, was created in the late 1960s and was funded by the
U.S. Department of Defense. Government researchers used to share information at a time when
computers were large and difficult to move.
• Today’s computer networks facilitate large-scale inter-device communication for every business,
entertainment and research purpose. The internet, online search, email, audio and video sharing,
online commerce, live-streaming and social media all exist because of advancements in computer
networking.
Key networking components and devices

• IP address: An IP address is the unique number assigned to every network device in an Internet Protocol (IP)
network; each IP address identifies the device’s host network and its location on the network. When one
device sends data to another, the data includes a “header” that includes the IP addresses of both the
sending and receiving devices.
• Nodes: A node is a network connection point that can receive, send, create or store data. It’s essentially any
network device—computers, printers, modems, bridges or switches—that can recognize, process and
transmit information to another network node. Each node requires some form of identification (such an IP
or MAC address) to receive access to the network.
• Routers: Routers are used to connect one network to another network. Routers analyze the data within
packets to determine the best transmission path to forward data packets until they reach their destination
node.
• Switches: A switch is a device that connects network devices and manages node-to-node communication
across a network, making sure that data packets reach their intended destination. Unlike routers, which send
information between networks, switches send information between nodes within a network.
• Ports: A port indicates a specific connection between network devices, with each port identified by a
number. If an IP address is analogous to a hotel address, then ports are the suites and room numbers.
Computers use port numbers to determine which application, service or process should receive which
messages.
IP Address
• Every device on the Internet (personal computer, a tablet, a smartphone, etc.) is assigned a unique identifying number called an IP (Internet Protocol)
address.
• Originally, the IPv4 (version 4) standard was used. It had a format of four numbers with values ranging from 0 and 255 separated by a period. For
example, the 107.23.196.166.
• An IP address in IPv4 is 32 bits, or 4 bytes. IPv4 addresses are written in dotted decimal notation, with four 8-bit fields separated by dots. The IPv4
standard has a limit of 232 or 4,294,967,296 possible addresses.
• As the use of the Internet has grown, the number of IP addresses needed has increased to the point where the use of IPv4 addresses will be exhausted.
This has led to the new IPv6 standard.
• The IPv6 standard is formatted as eight groups of four hexadecimal digits, such as 2001:0db8:85a3:0042:1000:8a2e:0370:7334.
• The IPv6 standard has a limit of 3.4×1038 possible addresses.

URL
• Uniform Resource Locator is a unique identifier used to locate a resource on the internet.
• A URL contains many information: Protocol, host name or IP Address, File name
• Example: http://www.example.com:1080/resource1.html
• Protocol: http
• Host name: www.example.com
• Port Number: 1080
• File Name : resource1.html
Network topology
• Network topology refers to the arrangement of different elements like nodes, links, or devices in a
computer network.
• Topology defines the structure of the network of how all the components are interconnected to
each other.
• There are six types of network topology which are Bus Topology, Ring Topology, Tree Topology,
Star Topology, Mesh Topology, and Hybrid Topology.

• The bus topology is designed in such a way that all the 1) Bus Topology
stations are connected through a single cable known as
a backbone cable.
• Each node is either connected to the backbone cable
by drop cable or directly connected to the backbone
cable.
• When a node wants to send a message over the
network, it puts a message over the network. All the
stations available in the network will receive the
message whether it has been addressed or not.
2) Ring Topology
• Ring topology is like a bus topology, but with connected ends.
• The node that receives the message from the previous computer will retransmit
to the next node.
• The data flows in one direction, i.e., it is unidirectional.
• The data in a ring topology flow in a clockwise direction.
• The most common access method of the ring topology is token passing.
• Token passing: It is a network access method in which token is passed from one
node to another node.
• Token: It is a frame that circulates around the network.

3) Star Topology

• Star topology is an arrangement of the network in


which every node is connected to the central hub,
switch or a central computer.
• The central computer is known as a server, and the
peripheral devices attached to the server are known
as clients.
4) Tree topology
• Tree topology combines the characteristics of bus topology and star
topology.
• A tree topology is a type of structure in which all the computers are
connected with each other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all
other nodes are the descendants of the root node.
• There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.

5) Mesh topology
• Mesh technology is an arrangement of the network in
which computers are interconnected with each other
through various redundant connections.
• There are multiple paths from one computer to another
computer.
• It does not contain the switch, hub or any central
computer.
• The Internet is an example of the mesh topology.
6) Hybrid Topology
• The combination of various different topologies
is known as Hybrid topology.
• A Hybrid topology is a connection between
different links and nodes to transfer the data.
• When two or more different topologies are
combined together is termed as Hybrid topology
Connection-Oriented and Connectionless Service
• Data communication is a telecommunication network to send and receive data between two or more computers over
the same or different network. There are two ways to establish a connection before sending data from one device to
another, that are Connection-Oriented and Connectionless Service. Connection-oriented service involves the creation
and termination of the connection for sending the data between two or more devices. In contrast, connectionless
service does not require establishing any connection and termination process for transferring the data over a network.
• A connection-oriented service is used to create an end to end connection between the sender and the receiver before
transmitting the data over the same or different networks. In connection-oriented service, packets are transmitted to
the receiver in the same order the sender has sent them. It uses a handshake method that creates a connection
between the user and sender for transmitting the data over the network. Hence it is also known as a reliable network
service. TCP (Transmission Control Protocol) is a connection-oriented protocol that allows communication between two
or more computer devices by establishing connections in the same or different networks.
• Connectionless service is used in the network system to transfer data from one end to another end without creating any
connection. So it does not require establishing a connection before sending the data from the sender to the receiver. It
is not a reliable network service because it does not guarantee the transfer of data packets to the receiver, and data
packets can be received in any order to the receiver. The UDP (User Datagram Protocol) is a connectionless protocol that
allows communication between two or more devices without establishing any connection. In this protocol, a sender
sends the data packets to the receiver that holds the destination address. A UDP does not ensure to deliver the data
packets to the correct destination, and it does not generate any acknowledgment about the sender's data.
MS-office

Study the following:


• MS-Word- basic shortcuts, breaks (page break, column break, section
break) , mail merge.
• MS Excel- basic operation, formulas, filter
• Power Point – graphics, animation, transition

You might also like