Notes
Notes
1. Define the Purpose: Identify what process or system the flowchart will represent.
2. Identify the Steps: List all the actions, decisions, and outcomes in the process.
3. Organize the Sequence: Arrange the steps in a logical order.
4. Draw the Flowchart: Use the appropriate symbols and connect them with arrows to
represent the flow.
5. Review and Refine: Check for accuracy, completeness, and clarity.
Key Features:
o Used vacuum tubes for circuitry and magnetic drums for memory.
o Machines were large, expensive, and consumed a lot of power.
Example: ENIAC (Electronic Numerical Integrator and Computer).
Significance: Marked the beginning of electronic computing.
Key Features:
o Replaced vacuum tubes with transistors, making computers smaller, faster, and
more reliable.
o Used magnetic core memory and introduced assembly and high-level
programming languages (e.g., COBOL, FORTRAN).
Example: IBM 1401.
Significance: Improved efficiency and paved the way for business and scientific
applications.
Key Features:
o Used integrated circuits, combining multiple transistors on a single chip.
o Introduction of operating systems and user interfaces.
Example: IBM System/360.
Significance: Made computers more affordable and accessible, leading to broader
adoption.
Key Features:
o Use of microprocessors (chips containing the entire CPU).
o Development of personal computers, graphical user interfaces, and widespread
networking (e.g., the Internet).
o Modern advancements include AI, cloud computing, and mobile devices.
Example: Apple Macintosh, IBM PC.
Significance: Revolutionized computing, making it ubiquitous in everyday life.
Introduction to CBIS (Computer-Based
Information System)
A Computer-Based Information System (CBIS) is an organized system that leverages
computer technology to collect, process, store, and distribute information to support decision-
making, coordination, control, analysis, and visualization in an organization. It integrates
hardware, software, databases, networks, and human resources to efficiently manage and utilize
data.
1. Hardware: Physical devices like computers, servers, storage devices, and networking
equipment.
2. Software: Applications and programs that process data and provide functionality (e.g.,
database management systems, enterprise software).
3. Database: Organized collection of data that can be easily accessed, managed, and
updated.
4. Network: Communication systems enabling data exchange between systems and users.
5. People: Users and IT professionals who operate and manage the system.
6. Processes: Procedures and policies that guide how data is collected, processed, and
utilized.
Characteristics of CBIS
Types of CBIS
Importance of CBIS
Enhances organizational efficiency and productivity.
Improves data accuracy and decision-making.
Enables better communication and collaboration.
Supports innovation by enabling data-driven strategies.
Reduces operational costs through automation.
Input and processing are fundamental stages of any information system. They involve capturing
data and transforming it into meaningful information. Below are the methods commonly used in
each stage:
Methods of Input
Input refers to how data is entered into a computer or information system. Methods of input
include:
1. Manual Input:
o Keyboard: For entering text, numbers, and commands.
o Mouse/Touchpad: For selecting and interacting with graphical interfaces.
o Touchscreen: For direct interaction with devices like smartphones and tablets.
o Voice Input: Using microphones and voice recognition systems (e.g., Siri,
Alexa).
o Digital Pen/Stylus: Used with tablets for handwritten input.
2. Automated Input:
o Scanners: For digitizing documents and images.
o Sensors: For collecting real-time environmental or system data (e.g., temperature,
motion).
o Barcode/RFID Readers: For inventory and tracking systems.
o Biometric Devices: For capturing unique physical traits like fingerprints or facial
recognition.
o Optical Character Recognition (OCR): For converting printed or handwritten
text into digital format.
3. File-Based Input:
o Importing Files: Inputting data from pre-existing digital files (e.g., CSV, TXT, or
databases).
o Network Input: Data received from remote systems via the internet or intranet.
Methods of Processing
Processing involves transforming raw input data into useful information through various
computational techniques:
1. Batch Processing:
o Processes data in large groups or batches at scheduled times.
o Common in payroll systems or large-scale data operations.
o Example: Processing monthly bank statements.
2. Real-Time Processing:
o Processes data immediately as it is entered or received.
o Used in time-sensitive systems like stock trading or traffic control.
o Example: ATM transactions or online payments.
3. Online Processing:
o Continuous interaction between the user and the system.
o Example: Filling forms on a website where feedback is immediate.
4. Distributed Processing:
o Data is processed across multiple computers in a network.
o Enhances speed and reliability.
o Example: Cloud computing platforms.
5. Parallel Processing:
o Multiple processors work on different parts of a task simultaneously.
o Common in supercomputers and AI applications.
6. Multi-Processing:
o Utilizes multiple CPUs to execute tasks concurrently.
o Example: Modern operating systems managing multiple applications.
7. Data Mining and Analysis:
o Specialized methods to discover patterns or insights from large datasets.
o Example: Customer trend analysis in marketing.
Summary
Input methods focus on capturing data efficiently, whether manually, through devices,
or via automated systems.
Processing methods ensure the data is transformed accurately, promptly, and efficiently
to meet system goals.
Computer Virus
What is a Computer Virus?
Conclusion
Computer viruses pose significant risks to systems and data, ranging from minor disruptions to
severe losses. Awareness, preventive measures, and robust security practices are essential to
minimize the likelihood and impact of infections.