MI4007 Revision Document PDF - Business Information Management
Document Details
Uploaded by Business Student123_
University of Limerick
Tags
Summary
This document is a revision document for Business Information Management at the University of Limerick. It covers key concepts such as Metcalfe's Law, Moore's Law and digitization.
Full Transcript
lOMoARcPSD|46897691 MI4007 Revsion document Business Information Management (University of Limerick) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by Soapymamager957 - (soapymanager957@...
lOMoARcPSD|46897691 MI4007 Revsion document Business Information Management (University of Limerick) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by Soapymamager957 - ([email protected]) lOMoARcPSD|46897691 Metcalfe’s Law and network economics Why is the web so big? Value or power of a network grows exponentially as a function of the number of network members. As network members increase, more people want to use it (demand for network access increases). An estimated 4.54 billion people worldwide have Internet access (July 2020). As communication costs fall toward a very small number and approach 0, utilization of communication and computing facilities explodes Effects of Metcalfe’s Law Smaller Cheaper Processors – (Hardware; computers, smart phones, Communications) – Growth of software Bigger and more valuable networks – More Users, Cheaper connectivity More Applications and growth of the IT industry Moores Law Moore’s Law predicts that the number of transistors fitting on a computer chip will double every one and a half to two years. This prediction about density also captures advances in processing speed, storage capabilities, cost, and other component features. Processing power and speed and storage capabilities have increased exponentially as the cost of computing devices has decreased. Digitisation the mass adoption of connected digital services by consumers, enterprises, and governments - has emerged in recent years as a key economic driver that accelerates growth and facilitates job creation. Data are raw facts and figures that on their own have no meaning Database is a structured collection of related data A database system is a computer program for managing electronic databases. DBMS: Database Management System Collection of software for managing the database + software for organizing the data and verifying it as well as software for retrieving the data through queries as well as creating reports based on the data. A DBMS can: Create / Delete tables, Modify tables, Retrieve data and Create reports A relational database is a collection of tables from which data can be accessed in many different ways without having to reorganise the database tables. Downloaded by Soapymamager957 - ([email protected]) lOMoARcPSD|46897691 Boolean values, for example: 'True' or 'False' The Four Basic Operations in a Database Design: – Create the database by defining the tables and specifying the fields Data Entry: – Adding the actual data by hand (easy to make errors), automatically, or importing it from other files Queries: – Ask questions about the data Reports: – Producing a document with information Systems A system takes inputs, transforms those inputs and produces outputs. A system exists in but is separate from an environment. A system has sub-systems. A system uses feedback from its environment for control. Information Systems A set of interrelated elements or components that collect (input), manipulate (process), and disseminate (output) data and information and provide a feedback mechanism to meet an objective. Components of Information Systems Hardware Software Data Telecommunications/Networks People Procedures A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. E.g. sales order entry, payroll, shipping. A Management Information System (MIS) is an information system that uses the data collected by the transaction processing system and uses this data to create reports in a way that managers can use it to make routine business decisions in response to problems. A Decision Support System (DSS) is an interactive computer-based system or subsystem intended to help decision makers use communications technologies, data, documents, knowledge and/or models to identify and solve problems, complete decision process tasks, and make decisions. Executive Support Systems (ESS) serve the strategic level of the organisation. Address nonroutine decisions requiring judgment, evaluation, and insight because there is no agreed-on proced Information Management (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Downloaded by Soapymamager957 - ([email protected]) lOMoARcPSD|46897691 The purpose of Information Management within organisations is to capture, store and deliver the right information to the right people at the right time. Computer hardware is the physical parts or components of a computer Software is instructions that can be stored and run by hardware. Hardware is directed by the software to execute any command or instruction Input devices are keyboards, mice, microphones The motherboard is a board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives. The Central Processing Unit (CPU) is the control centre of a computer Speed is measured in Hertz (number of operations per seconds) Bus – A communication system that transfers data between components inside a computer or between computers Output devices include monitors, printers, speakers Random Access Memory (RAM) – Read Only Memory (ROM) An expansion card in computing is a printed circuit board (PCB) that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. An embedded system can be thought of as a computer hardware system having software embedded in it. Algorithm: A set of step by step procedures for accomplishing a task CPU’s use machine code or assembly language. We need to convert the source code into machine code and this is accomplished by compilers and interpreters Compilation is the process of translating a high level language to a low level language to create an executable program. Interpretation is the process of translating a high-level language to a low level language on the fly. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used. Open-source software (OSS) is software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. A network is simply two or more computers that are linked together. Local Area Networks (LANS) Wide Area Networks (WANS). Intranet – An intranet is a private LAN designed for use by everyone within an organization Downloaded by Soapymamager957 - ([email protected]) lOMoARcPSD|46897691 Extranet – a network that connects people within your company with people who are outside your company Data transfer rates are measured in bps (bits per second) Twisted-pair cable – consists of two independently insulated wires twisted around each other (least expensive type of cable - the kind that is used in many telephone systems) Coaxial cable – consists of an insulated center wire grounded by a shield of braided wire (the primary type of cabling used by the cable television industry; it is more expensive than twisted pair) Fiber-optic cable – contains hundreds of clear fiberglass or plastic fibers (threads) (made from thin, flexible glass tubing; bandwidth is greater, so it can carry more data; it is lighter than metal wires and is less susceptible to interference; it is fragile and expensive) ISDN line – a special digital telephone line that transmits and receives information at very high speeds Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks. A protocol is simply an agreed-on set of rules and procedures for transmitting data between two or more devices. TCP/IP (Transmission Control Protocol/Internet Protocol) Four layers: Network Internet Transport Application Network architecture – refers to the way a network is designed and built. The two major types are: – Peer-to-peer architecture –This is used to connect a small number of computers. – Client/server architecture – sends information from a client computer to a server, which then relays the information back to the client computer, or to other computers on the network. Repeaters (also called amplifiers) – electronic devices that receive signals and amplify and send them along the network. Routers - electronic devices used to ensure messages are sent to their intended destinations. Gateway – consists of hardware and/or software that allows communications between dissimilar networks. Bridge – consists of hardware and/or software that allows communication between two similar networks. A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. hypertext markup language (HTML) Uniform Resource Locator (URL) HTTPS stands for Hypertext Transfer Protocol Secure. It is the protocol where encrypted HTTP data is transferred over a secure connection. Downloaded by Soapymamager957 - ([email protected]) lOMoARcPSD|46897691 Cloud Computing is a general term used to describe a ‘new’ class of network-based computing that takes place over the Internet. Advantages of Cloud Computing Instant software updates Improved document format compatibility Unlimited storage capacity Increased data reliability Universal document access Latest version availability Easier group collaboration Disadvantages of Cloud Computing Requires a constant Internet connection Features might be limited Can be slow Stored data might not be secure Data can be lost Pharming = Fake Web Pages A botnet is a large number of compromised computers that are used to create and send spam or viruses Rootkit: A collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network A firewall acts as a wall between your computer/private network and the internet Downloaded by Soapymamager957 - ([email protected])