MSCI 2130: Introduction to MIS Lecture Notes PDF
Document Details
![YouthfulJadeite3332](https://quizgecko.com/images/avatars/avatar-15.webp)
Uploaded by YouthfulJadeite3332
University of Windsor
Tags
Related
- Week 2 Lab: Overview of Management Information Systems PDF
- ITEC 1010: Information and Organizations (F2024) Hardware and Software PDF
- MIS Degree Revision PDF
- MIS 2103 Computer Hardware and System Software Lecture 3 PDF
- Business Information Systems 6th Edition Chapter 3 - Hardware and Software PDF
- Securing Information Systems PDF
Summary
These lecture notes provide an introduction to computer hardware and software, covering topics including computer components, input/output, and different types of software (open-source and proprietary).
Full Transcript
MSCI 2130: Introduction to MIS Lecture 2 Midterm Exam (February 11th) 6 Introduction to IS Hardware, Software, & Telecommunications...
MSCI 2130: Introduction to MIS Lecture 2 Midterm Exam (February 11th) 6 Introduction to IS Hardware, Software, & Telecommunications 3 5 Introduction to Management Information Systems Technology Guide 1&2 And Chapter 6 Hardware, Software, and Telecommunication Networks ©2022 John Wiley & Sons, Inc. All rights reserved. Computer Hardware 6 Hardware Components: In many industries, exploiting computer hardware is a key to achieving competitive advantage. A computer hardware consists of: 1. Central Processing Unit (CPU) 2. Primary Storage 3. Secondary Storage 4. Input Technologies 5. Output Technologies 6. Communication Technologies Main Components of a Computer Hardware CPU Central Processing Unit (CPU) - The main brain of the computer. - The CPU is a microprocessor (e.g., Intel’s Core i3, i5, and i7) made up of millions of microscopic transistors embedded in a chip. - For this reason, microprocessors (or CPUs) are commonly referred to as chips. - Performs the actual computations or “number crunching” inside any computer. - Controls the tasks performed by the other components (i.e., the computer’s brain). Intel CPU FIGURE TG 1.4 How the CPU works How the CPU Works? Inputs consist of data and brief instructions about what to do with the data. Input data might be entered by the user through the keyboard, for example, or read from a data file saved in another part of the computer. The control unit directs the flow of data and instructions and decodes them within the chip. The ALU receives the decoded data and instructions and encodes them to make the desired computation. How the CPU Works? (cont’d) Encode means to change something into a programming code How the CPU Works? (cont’d) The CPU can process only binary data (0s and 1s). Thus, data and instructions are translated into a binary form (encoded)—that is, only 0s and 1s. The 0s and 1s in binary represent Off or On, respectively. In a chip, a "0" represents no flow of electricity, and a "1" represents electricity is allowed to flow. A “0” or a “1” is called a bit. All types of data, such as letters, decimal numbers, photographs, music, and so on, can be converted to a binary representation, which can then be processed by the CPU. Memory Capacity Hierarchy Primary Storage (Main Memory) Temporarily stores small amounts of data that the CPU will use immediately Four main types of primary storage: Registers: - Part of the CPU. - They have the least capacity, storing extremely limited amounts of instructions and data only immediately before and after processing. Cache memory: - A type of high-speed memory that enables the computer to temporarily store blocks of data that are used more often and that a processor can access more rapidly than main memory (RAM). - Cache memory is physically located closer to the CPU than RAM. Random Access Memory (RAM): - A memory that holds a software program and small amounts of data for processing. - A volatile memory which means that the data is lost if the electricity is off from the computer Read-Only Memory (ROM): - A type of chip—where certain critical instructions are safeguarded. - ROM is nonvolatile, so it retains these instructions when the electricity is turned off. Secondary Storage Magnetic tape Magnetic discs Solid State Drive (SSD) Optical Disks (e.g., CD, DVD) Flash memory devices o Thumb drives SSD Magnetic tape Magnetic Disc Overall Trends Over time, the different hardware components are getting: Smaller Faster Cheaper More powerful IBM 5MB in 1956 These trends are so rapid and it is difficult to know when to purchase or upgrade a hardware FIGURE TG 1.4 Primary memory compared with secondary storage Input and Output Technologies Input Technologies Output Technologies Input Technologies Enter data and instructions and convert them into a form that the computer can understand. Two ways: ▪ Human data-entry devices ▪ Source-data automation input devices Human Data-Entry Devices Keyboard Mouse Joystick Touchscreen Stylus Voice recognition Source Data Automation Devices Examples.. Bar codes QR codes RFID NFC Barcodes Affords a high degree of accuracy for data entry Saves labor costs Allows the automatic capturing of data 26 QR Code Quick Response (QR) code A type of matrix barcode (two-dimensions barcode) Contains information about the item to which it is attached Easily identifiable by the position marker (3 nested squares) 27 QR Code (cont’d) 28 RFID Radio Frequency Identification (RFID) Allows the automatic collection of data using R FID tags that contain a chip and an antenna Passive RFID tags Inexpensive (less than 5¢ per tag) The size of a postage stamp No internal power source (i.e., powered by the electromagnetic energy transmitted from an RFID reader) Used in large retail stores, including Wal-Mart Active RFID tags Much more reliable than passive ones have a longer read range compared to passive tags, often reaching several hundred meters. They have their own power supply (i.e., they can actively broadcast signals to RFID readers.) Privacy is a concern 29 How RFID Works Also watch: https://www.youtube.com/watch?v=z6v67BgcVy4 30 NFC Near Field Communication (NFC) A subset of RFID that allows two devices — like your phone and a payments terminal — to talk to each other when they’re close together. Allows two-way communication Customers use a smartphone to touch or come close to the point-of-sale device 31 NFC (cont’d) Other uses: Provide payment on transportation systems Exchange information Receive custom coupons Exchange business cards Considered secure because of the short range of communication and the dynamic encryption that takes place. 32 Output Technologies Present data and information in a form people can understand. Examples: Monitors Printers Voice Computer Software 38 FIGURE TG 2.1 Systems software serves as an intermediary between hardware and functional applications Two Main Types of Software Systems Software: ❖ Mainly the computer operating system (OS) ❖ Examples: Windows, Linux, Android, iOS, Ubuntu...etc Applications Software ❖ These that run on the operating system ❖ Examples: MS Excel, Outlook, Browsers…etc Types of Application Software Two types of application software: Open Source Software Proprietary Software Open-Source Software (OSS) A free software product, where developers have access to the source code. Many users and coders can study, share, and modify the code Development of OSS also has been characterized as a philosophy rather than simply as the process of creating new software. Widely known open-source projects include: Apache for developing a web server The browser called Mozilla Firefox Linux, which is a Unix-like open source operating system. Android for developing mobile applications 42 Open-Source Software (OSS) Why OSS..? 1- Rapidity: with which new software can be developed and tested. It is faster to have a committed group of expert developers develop, test, and debug code than it is to have one isolated team working on software development. 2- Creativity: having many good minds working on innovative applications can be a boon to creativity. 3- Cost: the potential for keeping down development costs. 4- Self-image: organizations might participate in an open-source community to bolster their own self-image and to contribute something worthwhile to the larger software development community. Doing so may make them appear as “good guys” to the external public. 43 Proprietary Software Also called “closed-source software”. The source code of such a program can be inspected or altered only by its owners. To use the programs or to access some features, you have to pay for a license Examples of proprietary software: Some products of Microsoft, Adobe, or Apple. 44 AI Today! Did you know! Nvidia just unveiled a sweeping vision for AI agents alongside major hardware, software, and robotics reveals at CES 2025, with CEO Jensen Huang declaring AI agents a ‘multi-trillion-dollar’ opportunity. 45 46