0% found this document useful (0 votes)
14 views8 pages

Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views8 pages

Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Concept of Flow Chart

A flowchart is a diagrammatic representation of a process, workflow, or system that uses


symbols, shapes, and arrows to illustrate the sequence of steps or decisions required to complete
a task or solve a problem. Flowcharts are widely used in various fields, including software
development, business process modeling, engineering, and education, to improve understanding,
communication, and problem-solving.

Key Components of a Flowchart

1. Symbols: Standard shapes represent different types of actions or steps:


o Oval (Terminator): Represents the start or end of a process.
o Rectangle (Process): Represents a task or operation.
o Diamond (Decision): Represents a decision point with multiple possible
outcomes.
o Arrow (Flowline): Indicates the flow of the process from one step to another.
2. Flowlines: Arrows connect the symbols to indicate the process flow or sequence of steps.
3. Annotations: Text within the symbols describes the specific actions, decisions, or
processes.

Steps to Create a Flowchart

1. Define the Purpose: Identify what process or system the flowchart will represent.
2. Identify the Steps: List all the actions, decisions, and outcomes in the process.
3. Organize the Sequence: Arrange the steps in a logical order.
4. Draw the Flowchart: Use the appropriate symbols and connect them with arrows to
represent the flow.
5. Review and Refine: Check for accuracy, completeness, and clarity.

Example: Flowchart for Making Tea

1. Start: Oval labeled "Start."


2. Process: Rectangle labeled "Boil water."
3. Decision: Diamond labeled "Tea or Coffee?"
o If "Tea," proceed to "Add tea leaves."
o If "Coffee," proceed to "Add coffee powder."
4. Process: Rectangle labeled "Pour into a cup."
5. Process: Rectangle labeled "Add sugar (optional)."
6. End: Oval labeled "Serve."
Four Stages of History
1. First Generation (1940s-1950s): Vacuum Tube Technology

 Key Features:
o Used vacuum tubes for circuitry and magnetic drums for memory.
o Machines were large, expensive, and consumed a lot of power.
 Example: ENIAC (Electronic Numerical Integrator and Computer).
 Significance: Marked the beginning of electronic computing.

2. Second Generation (1950s-1960s): Transistor Technology

 Key Features:
o Replaced vacuum tubes with transistors, making computers smaller, faster, and
more reliable.
o Used magnetic core memory and introduced assembly and high-level
programming languages (e.g., COBOL, FORTRAN).
 Example: IBM 1401.
 Significance: Improved efficiency and paved the way for business and scientific
applications.

3. Third Generation (1960s-1970s): Integrated Circuits (ICs)

 Key Features:
o Used integrated circuits, combining multiple transistors on a single chip.
o Introduction of operating systems and user interfaces.
 Example: IBM System/360.
 Significance: Made computers more affordable and accessible, leading to broader
adoption.

4. Fourth Generation (1970s-Present): Microprocessors

 Key Features:
o Use of microprocessors (chips containing the entire CPU).
o Development of personal computers, graphical user interfaces, and widespread
networking (e.g., the Internet).
o Modern advancements include AI, cloud computing, and mobile devices.
 Example: Apple Macintosh, IBM PC.
 Significance: Revolutionized computing, making it ubiquitous in everyday life.
Introduction to CBIS (Computer-Based
Information System)
A Computer-Based Information System (CBIS) is an organized system that leverages
computer technology to collect, process, store, and distribute information to support decision-
making, coordination, control, analysis, and visualization in an organization. It integrates
hardware, software, databases, networks, and human resources to efficiently manage and utilize
data.

Key Components of CBIS

1. Hardware: Physical devices like computers, servers, storage devices, and networking
equipment.
2. Software: Applications and programs that process data and provide functionality (e.g.,
database management systems, enterprise software).
3. Database: Organized collection of data that can be easily accessed, managed, and
updated.
4. Network: Communication systems enabling data exchange between systems and users.
5. People: Users and IT professionals who operate and manage the system.
6. Processes: Procedures and policies that guide how data is collected, processed, and
utilized.

Characteristics of CBIS

 Automation: Performs tasks with minimal human intervention.


 Accuracy: Processes data with high precision.
 Speed: Handles large amounts of data quickly.
 Scalability: Can grow to accommodate increasing data and user demands.
 Integration: Links various organizational functions (e.g., sales, HR, finance) into a
cohesive system.

Types of CBIS

1. Transaction Processing Systems (TPS): Handles routine, day-to-day operations like


payroll and inventory management.
2. Management Information Systems (MIS): Provides summarized reports for middle
management to aid decision-making.
3. Decision Support Systems (DSS): Helps in analyzing complex data to support non-
routine decisions.
4. Enterprise Systems: Integrates all business processes into a unified system (e.g., ERP).
5. Knowledge Management Systems (KMS): Facilitates the sharing and management of
organizational knowledge.

Importance of CBIS
 Enhances organizational efficiency and productivity.
 Improves data accuracy and decision-making.
 Enables better communication and collaboration.
 Supports innovation by enabling data-driven strategies.
 Reduces operational costs through automation.

Methods of Input and Processing


Methods of Input and Processing in Information Systems

Input and processing are fundamental stages of any information system. They involve capturing
data and transforming it into meaningful information. Below are the methods commonly used in
each stage:

Methods of Input

Input refers to how data is entered into a computer or information system. Methods of input
include:

1. Manual Input:
o Keyboard: For entering text, numbers, and commands.
o Mouse/Touchpad: For selecting and interacting with graphical interfaces.
o Touchscreen: For direct interaction with devices like smartphones and tablets.
o Voice Input: Using microphones and voice recognition systems (e.g., Siri,
Alexa).
o Digital Pen/Stylus: Used with tablets for handwritten input.
2. Automated Input:
o Scanners: For digitizing documents and images.
o Sensors: For collecting real-time environmental or system data (e.g., temperature,
motion).
o Barcode/RFID Readers: For inventory and tracking systems.
o Biometric Devices: For capturing unique physical traits like fingerprints or facial
recognition.
o Optical Character Recognition (OCR): For converting printed or handwritten
text into digital format.
3. File-Based Input:
o Importing Files: Inputting data from pre-existing digital files (e.g., CSV, TXT, or
databases).
o Network Input: Data received from remote systems via the internet or intranet.
Methods of Processing

Processing involves transforming raw input data into useful information through various
computational techniques:

1. Batch Processing:
o Processes data in large groups or batches at scheduled times.
o Common in payroll systems or large-scale data operations.
o Example: Processing monthly bank statements.
2. Real-Time Processing:
o Processes data immediately as it is entered or received.
o Used in time-sensitive systems like stock trading or traffic control.
o Example: ATM transactions or online payments.
3. Online Processing:
o Continuous interaction between the user and the system.
o Example: Filling forms on a website where feedback is immediate.
4. Distributed Processing:
o Data is processed across multiple computers in a network.
o Enhances speed and reliability.
o Example: Cloud computing platforms.
5. Parallel Processing:
o Multiple processors work on different parts of a task simultaneously.
o Common in supercomputers and AI applications.
6. Multi-Processing:
o Utilizes multiple CPUs to execute tasks concurrently.
o Example: Modern operating systems managing multiple applications.
7. Data Mining and Analysis:
o Specialized methods to discover patterns or insights from large datasets.
o Example: Customer trend analysis in marketing.

Summary

 Input methods focus on capturing data efficiently, whether manually, through devices,
or via automated systems.
 Processing methods ensure the data is transformed accurately, promptly, and efficiently
to meet system goals.
Computer Virus
What is a Computer Virus?

A computer virus is a type of malicious software (malware) designed to disrupt, damage, or


gain unauthorized access to a computer system. It can replicate itself and spread to other
programs, files, or devices, often without the user's knowledge or consent.

Characteristics of a Computer Virus

1. Self-Replication: A virus can replicate itself to infect multiple files or systems.


2. Trigger Mechanism: Viruses often have a specific condition or action (e.g., opening a
file) that activates their payload.
3. Payload: This is the harmful action performed by the virus, such as corrupting files,
stealing data, or degrading system performance.
4. Propagation: A virus spreads by attaching itself to executable files, documents, or
removable storage devices.

Types of Computer Viruses

1. File Infector Virus:


o Attaches itself to executable files (.exe or .com).
o Activates when the infected file is executed.
o Example: Cascade Virus.
2. Boot Sector Virus:
o Infects the boot sector or master boot record (MBR) of a storage device.
o Activates when the system is booted from the infected device.
o Example: Michelangelo Virus.
3. Macro Virus:
o Targets files containing macros, such as Microsoft Word or Excel documents.
o Activates when the file is opened.
o Example: Melissa Virus.
4. Polymorphic Virus:
o Changes its code slightly each time it replicates, making it harder to detect.
o Example: Storm Worm.
5. Resident Virus:
o Embeds itself in the computer's memory and infects other files or programs
running on the system.
o Example: Randex.
6. Multipartite Virus:
o A hybrid virus that can infect both files and the boot sector.
o Example: Tequila Virus.

Symptoms of a Computer Virus Infection

 Slow system performance or frequent crashes.


 Unusual error messages or pop-ups.
 Files disappearing or getting corrupted.
 Unauthorized programs running or files being modified.
 Increased network activity without user action.

How Viruses Spread

1. Email Attachments: Malicious attachments or links in emails.


2. Removable Media: Infected USB drives or CDs.
3. Downloading Files: Malicious software downloaded from untrustworthy websites.
4. Network Sharing: Spreading through shared drives or local networks.
5. Social Engineering: Trick users into installing infected software.

Prevention and Protection

1. Use Antivirus Software:


o Install and update reliable antivirus programs.
o Perform regular scans to detect and remove viruses.
2. Update Software:
o Keep operating systems, applications, and security patches up to date.
3. Avoid Suspicious Links and Downloads:
o Do not open unverified email attachments or download files from unknown
sources.
4. Enable Firewalls:
o Use a firewall to block unauthorized access.
5. Backup Data:
o Maintain regular backups to recover data in case of an attack.
6. Disable Macros:
o Disable macros in documents unless necessary.

Conclusion
Computer viruses pose significant risks to systems and data, ranging from minor disruptions to
severe losses. Awareness, preventive measures, and robust security practices are essential to
minimize the likelihood and impact of infections.

You might also like