Management Information Systems

advertisement
Management Information Systems
The Islamia University of Bahawalpur
Delivered by:
Tasawar Javed
Lecture 15
Computing and Communication
Resources

Today’s talk




Hardware
Personal Computing devices
Home networks
Software





System Software
Application software
The role of user-friendly Software
Communications
Network types
Education Criteria, knowledge, & and
skills needed

Hardware
It Includes

Processor (CPU)



Memory (RAM)


Processor speed; controls, calculations, directs and controls movement of
data from one location to other within computer
Processor speed mean number of cycles that occur per second; speed
was expressed as megahertz MHz, stand for million of cycles per second;
then term gigahertz GHz, stands for billion cycles per second
Memory located on the computer’s main circuit board called the mother
board
Storage (Disk space)

Memory located on a device that is not on circuit board. Hard disk and
CDs
Computing and Communication
Resources

Input devices


Output devices


A device that captures data by a manual or electronic method and
transmits the data to storage or memory; such as Keyboard, mouse,
scanners
A device that presents and/or transmits data from the computer to the
user, such as monitors, printers, CDs, speakers
Input/output devices

A device that can perform both input and output functions. Examples
would be a touch screen monitor and storage disks such as floppies,
disks, rewriteable CDs
Computing and Communication
Resources

Personal computing devices

Cell phones with interactive messaging and video


Popular cell phone manufacturing (Samsung, Nokia,
Ericsson) have built phones that display text messages
and small images on the display screen
Smart cell phones

A cell phone is considered to be a smart phone when it
performs tasks typically associated with
microcomputers. It offers web access and a keyboard
Computing and Communication
Resources

Home networks



Becoming popular as cable TV companies and
phone companies market modems for
“broadband” internet connections.
Cable modem, DSL modem, Wireless routers
Home computer security

Hackers

Are people try to break into computer system in order to
gather information deny the owner access to his/her
computer
Computing and Communication
Resources

Viruses


Small computer programmes that replicate by inserting
themselves into computer resources such as programs
of files. Harm the computer may corrupt files and
operating systems
Denial of service attack

The user is denied access to the services of the
computer because it is overwhelmed with email. A wider
reaching attack focuses on many computers on the
same network in order to deny service to the network
itself.
Computing and Communication
Resources

Software

System software



Operating system software, perform certain fundamental
tasks that all users of a particular computer requires.
The operating system manages the computer’s
processes, functioning as an interface connecting the
user, the application software and the hardware.
Application software

Prewritten application software



Produced by suppliers and sold to users
Less expensive, easy to use, no need to wait
Custom application Software

Own programmers, or consulting groups of programmers
Computing and Communication
Resources

The Role of user friendly software





Guided dialogue to direct the user concerning
what data are needed, the data format required,
and similar issues
Menus, step down lists of commands, and icons
Templates and fill out forms
Context sensitive help: helpful information
Graphical interface using standardized symbols
Computing and Communication
Resources

Communications





Public connections
Telephone modem
Cable modem
Integrated services digital network
Digital subscriber line
Computing and Communication
Resources



Private lines
Leased lines or dedicated line
Virtual private networks


Microsoft and Cisco System, a major vendor of
communication hardware and associated software
both support tunneling software
Tunneling software simply establishes the set of
intermediary locations of the telephone equipment
that will host a given data communications
transfer
Computing and Communication
Resources

Network types

Local area networks


Metropolitan area network


Group of computers and other devices such as printers
that are connected together by a common medium
That has a physical distance limit of roughly 30 miles.
MAN may be the network that connects all of the suites
in a building on a university campus, is a common
application of MAN
wide area network

WAN, are used to connect computers and other devices
when the distance exceeds the constraints of LAN and
MANs; replaced by internet
Computing and Communication
Resources

Internet




Greater impact on computer based communication than
any other development
Intranet
Organizations can restrict access to their networks to
only members of their organization by using an internet.
An internet uses the same network protocols as the
internet, but limits accessibility to computer resources to
a select group of persons in the organizations
Extranet

Some authorized users of a network may be outside the
boundaries of the firm. For example a firm’s suppler may
need access to computer based inventory records. This will
be accomplish by internet.

Thank you!!!
 Q&A
Download