Professional Documents
Culture Documents
Assignment 1
Submitted To
Most Respectable,
Prof.Gulam Haider
Submitte
d By
En
gr.Waseem Saeed
Roll AD-
512530
Semester 3’ rd
1
ALLAMA IQBAL OPEN UNIVERSITY
ISLAMABAD, PAKISTAN.
Spring 2010
2
MIS is popularly known as the Management
Information System. MIS is considered as one such
method of generating information which is used by
management of organization for decision Making, control of
activities, operations etc.
3
Three major roles of the business applications of information
systems include:
Support Business Processes – involves dealing with
information systems that support the business
processes and operations in a business.
Support Decision Making – help decision makers to
make better decisions and attempt to gain a
competitive advantage.
Support Competitive Advantage – help decision
makers to gain a strategic advantage over competitors
requires innovative use of information technology.
Support Business Processes: As a consumer, you
4
Example: Customer purchase record, keep track of
inventory, pay employees, evaluate sales trends etc.
Support Decision Making: Information systems also
5
Q.1 (b) Define the following and give an
example for each:
i. Batch processing
ii. Online (real-time) Processing
iii. System
iv. Procedures
6
A batch processing system is one where
programs and data are collected together in a batch before
processing starts. Each piece of work for a batch processing
system is called a job.
A job usually consists of a program and the data
to be run. Jobs are stored in job queues until the computer
is ready to process them. There is no interaction between
the user and the computer while the program is being run.
Computers which do batch processing often operate at night.
Example: Payroll - when a company calculates the wages
for its workforce and prints pay slips.
OR
Executing a series of non-interactive jobs all at
one time. The term originated in the days when users
entered programs on punch cards. They would give a batch
of these programmed cards to the system operator, who
would feed them into the computer.
7
Once a batch job begins, it continues until it is done
or until an error occurs. Note that batch processing implies
that there is no interaction with the user while the program
is being executed.
8
Real-time operating systems are designed to
respond to an event within a predetermined time. These
types of operating systems are found within environments
where computers are responsible for controlling systems.
9
are constrained and thus predictable. In fact, the
misconception that real-time systems must be "fast" is
because in most instances, the deadlines are on the order of
microseconds. But the timeliness constraints or deadlines
are generally a reflection of the underlying physical process
being controlled.
For example, in image processing involving screen
update for viewing continuous motion, the deadlines are on
the order of 30 microseconds. In practical situations, the
main difference between real-time and non-real-time
systems is an emphasis on response time prediction and its
reduction.
Upon reflection, one realizes that every system can be made
to conform to the real-time definition simply are setting
deadlines (arbitrary or otherwise).
For example, a one-time image filtration
algorithm for medical imaging, which might not be regarded
as real-time, really is real-time if the procedure is related to
an illness in which diagnosis and treatment have some
realistic deadline. Because all systems can be made to look
as if they were real-time, we refine the definition somewhat
in terms of the system's tolerance to missed deadlines. For
example, hard real-time systems are those where failure
to meet even one deadline results in total system failure.
In firm real-time systems some fixed small
number of deadlines can be missed without total system
10
failure. Finally, in soft real-time systems missing
deadlines leads to performance degradation but not failure.
Unless otherwise noted, when we say "real-time" throughout
this tutorial, we mean hard real-time.
Another common misconception is that the study of real-
time processing is really a non-issue because hardware is
always getting faster. By throwing faster hardware at the
problem deadlines can always be met. However, as we just
stated, unless one can predict performance and hence bound
response times, one can never be satisfied that deadlines
are always being achieved.
Moreover, faster hardware is not always available or suitable
for certain applications.
Some feel that real-time performance is easy to
achieve. As we hope to show in this tutorial, that is not
always so, largely because most hardware and programming
languages are not suitable for real-time demands.
11
Set of detailed methods,
procedures, and routines established or formulated to carry
out a specific activity, perform a duty, or solve a problem.
Or
12
2. Maintain an internal steady-state (called homeostasis)
despite a changing external environment,
3. Display properties that are peculiar to the whole (called
emergent properties) but are not possessed by any of
the individual elements, and
4. Have boundaries that are usually defined by the
system observer. Systems underlie every phenomenon,
and are everywhere one looks for them. They are
limited only by the observer’s capacity to comprehend
the complexity of the observed entity, item or
phenomenon.
13
At the most basic level, the systems are divided into two
categories:
14
the system development life cycle means software
development life cycle. Following are the different phases of
software development cycle:
• System study
• Feasibility study
• System analysis
• System design
• Coding
• Testing
• Implementation
• Maintenance
15
Introduction to Procedures
17
records on it; still others use it for primitive
payroll systems.
1. Diagnose the situation critically and list the
types of information each store manager
requires.
2. Discuss which information can be part of
computerized information systems?
18
An office information system supports a range
of business office activities such as creating and distributing
graphics and/or documents, sending messages, scheduling,
and accounting. All levels of users from executive
management to no management employees utilize and
benefit from the features of an OIS.
19
A transaction is a business activity such as a deposit,
payment, order or reservation.
20
management. Management information systems thus
evolved out of transaction processing systems.
21
housing construction or raw material pricing. Users of a DSS,
often managers, can manipulate the data used in the DSS to
help with decisions.
5. Expert Systems
22
An expert system is an information system that
captures and stores the knowledge of human experts and
then imitates human reasoning and decision-making
processes for those who have less expertise. Expert systems
are composed of two main components: a knowledge base
and inference rules. A knowledge base is the combined
subject knowledge and experiences of the human experts.
The inference rules are a set of logical judgments applied
to the knowledge base each time a user describes a situation
to the expert system.
23
It involves three activities:
24
The processed data maybe either communicated to end user
or maybe stored for future reference.
25
SUPPLY-CHAIN MANAGEMENT
26
Q.2 (b)what is prototyping approach of system
development? Explain the process of
prototyping in detail and discuss the
advantages of using prototyping approach.
27
28
Prototyping is the process of building a model of a
system. In terms of an information system, prototypes
are employed to help system designers build an
information system that intuitive and easy to
manipulate for end users. Prototyping is an iterative
process that is part of the analysis phase of the
systems development life cycle.
During the requirements determination portion of
the systems analysis phase, system analysts gather
information about the organization's current procedures
and business processes related the proposed
information system. In addition, they study the current
information system, if there is one, and conduct user
interviews and collect documentation. This helps the
analysts develop an initial set of system requirements.
Prototyping can augment this process because it
converts these basic, yet sometimes intangible,
specifications into a tangible but limited working model
of the desired information system. The user feedback
gained from developing a physical system that the
users can touch and see facilitates an evaluative
response that the analyst can employ to modify existing
requirements as well as developing new ones.
29
Prototyping comes in many forms - from low tech
sketches or paper screens(Picture) from which users
and developers can paste controls and objects, to high
tech operational systems using CASE (computer-aided
software engineering) or fourth generation languages
and everywhere in between. Many organizations use
multiple prototyping tools. For example, some will use
paper in the initial analysis to facilitate concrete user
feedback and then later develop an operational
prototype using fourth generation languages, such as
Visual Basic, during the design stage.
Dimensions of prototypes
Horizontal Prototype:
30
Develop preliminary estimates of development
time, cost and effort.
Vertical Prototype:
31
Prototyping is the rapid development and testing
of working models, or prototypes, of new applications in an
interactive, iterative process involving both IS specialists and
business professionals.
• Prototyping makes the development process faster and
easier for IS specialists and business professionals.
• Prototyping makes the development process faster and
easier, especially for projects where end user
requirements are hard to define. Thus, prototyping is
sometimes called rapid application design (RAD).
• Prototyping has also opened up the application
development process to end-users because it simplifies
and accelerates systems design. These developments
are changing the roles of end users and information
systems specialists in systems development.
32
The Prototyping Process
Prototyping can be used for both large and small
applications.
33
• Typically, large e-business systems still require using
the traditional systems development approach, but
parts of such systems can frequently be prototyped.
• A prototype of a business application needed by an end
user is developed quickly using a variety of application
Development software tools. The prototype system is
then repeatedly refined until it is acceptable.
• Prototyping is an iterative, interactive process that
combines steps of the traditional systems development
cycle, and allows the rapid development and testing of
a working model.
34
Some Disadvantages of Prototyping
35
Q. 3 (a) Select any functional area (e.g. finance,
human resources, marketing, etc.) within any
large organization (such as the government or
a bank) and then describe the business
functions and the major processes and
procedures within that functional area. Also
discuss what MIS exist to support these areas.
36
Telecommunication
sector around the world is going through a process of rapid
change due to convergence of Information Technology (IT),
mobile telephony, Internet, e-commerce and value added
services. Needless to say that Telecommunications and
Information Technologies are playing a pivotal role not only
in the economic development of the countries but also in
transforming the entire culture and complexion of societies.
37
There are different interests, specialties, and
levels in an organization, there are different kind of systems.
No single system can provide all information and
organization needs. The organization is dividing into
strategic, management, knowledge and operational level and
then divides into functional areas such as sales and
marketing, manufacturing finance, accounting and human
resource.
38
Transaction processing system:
39
In knowledge work system they have good
system they know at which line land wire telephone goes
high and at which time low that’s the reason that PTCL has
offered free local call after 12:00 am to 6:00 p.m.
40
ESS will gives the plan of 5-10 years and ESS in the PTCL
employ the most advanced graphics software and can
deliver graphs and it’s easy to take decisions.
41
NPGIT&me, other training institutes of PTCL i.e. Telecom
Staff College, Regional Telecom Training Schools and
Divisional telecom Training Centers are also being revamped
to cope up with the changing trends in technical and
managerial training. Our engineers and professionals are
also being continuously sent abroad for various training
courses to keep them abreast with the latest technology and
management skills.
Conclusion:
43
1. Thus the basic needs of HRIS is-
44
and monitoring Human Resource function.
3. Providing data / returns to government and other
public
4. Facilitating decision making in areas like promotion,
transfer, nomination, settling employee’s provident
funds, retirement, gratuity, LTC, and earned leave
compensation.
5. Cutting costs.
6. Improving accuracy.
45
emergency evacuation procedures, and safety guidelines.
· Benefits administration including enrolment, status
changes, and personal information updating.
· Complete integration with payroll and other company
financial software and accounting systems.
· Applicant and resume management.
The HRIS that most effectively serves companies tracks:
1. Attendance and PTO use,
2. Pay raises and history,
3. Pay grades and positions held,
4. Performance development plans,
5. Training received,
6. Disciplinary action received,
7. Personal employee information, and occasionally,
8. Management and key employee succession plans,
9. High potential employee identification, and
10. Applicant tracking, interviewing, and selection.
46
3. Company-related documents such as employee
47
With an appropriate HRIS, Human Resources
staff enables employees to do their own benefits updates
and address changes, thus freeing HR staff for more
strategic functions. Additionally, data necessary for
employee management, knowledge development, career
growth and development, and equal treatment is facilitated.
Finally, managers can access the information they need to
legally, ethically, and effectively support the success of their
reporting employees.
Planning process
48
necessary skills, to meet its goals, also known as
employment planning. HRP is a proactive process, which
both anticipates and influences an organization’s future by
systematically forecasting the demand for and supply of
employees under changing conditions, and developing plans
and activities to satisfy these needs. Key steps include
forecasting demand for labor considering organizational
strategic and tactical plans, economic conditions, market
and competitive trends, social concerns, demographic
trends, and technological changes.
Recruitment process
Recruitment is the process of searching for and
attracting an adequate number of qualified job candidate,
from whom the organization may select the most
appropriate to field its staff needs. The process begins when
the need to fill a position is identified and it ends with the
receipt of résumés and completed application forms. The
result is a pool of qualified job seekers from which the
individual best matching the job requirements can be
selected. The steps in recruitment process include
identification of job openings, determination of job
requirements, choosing appropriate recruiting sources and
methods, and finally, generating a pool of qualified recruits.
Job openings are identified through human resource planning
or manager request. Next is to determine the job
requirements.
49
This involves reviewing the job description and the job
specification and updating them, if necessary. Appropriate
recruiting sources and methods are chosen because there is
no one, best recruiting technique. Consequently, the most
appropriate for any given position depend on a number of
factors, which include organizational policies and plans, and
job requirements.
Selection process
Selection is the process of choosing individuals
with the relevant qualifications to fill existing or projected
openings. Data and information about applicants regarding
current employees, whether for a transfer or promotion, or
outside candidates for the first time position with the firm
are collected and evaluated. The steps in the selection
process, in ascending order include preliminary reception of
applicants, initial applicant screening, selection testing,
selection interview, background investigation and reference
checking, supervisory interview, realistic job previews,
making the hiring decision, candidate notification, and
evaluating the selection process. However, each step in the
selection process, from preliminary applicant reception and
initial screening to the hiring decision, is performed under
legal, organizational, and environmental constraints that
protect the interests of both applicant and organization.
50
Employee orientation is the procedure of
providing new employees with basic background information
about the firm and the job. Is more or less, considered as
one component of the employer’s new-employee
socialization process. Socialization process is an ongoing
process of initialing in all employees the prevailing attitudes,
standards, values, and patterns of behavior that are
expected by the organization. Training however is the
process of teaching new or present employees the basic
skills/competencies needed to perform their jobs. Whereas
training focuses on skills and competencies needed to
perform employees’ current jobs, employee and
management development is the training of long-term
nature. The aim is to prepare current employees for future
jobs with the organization or solving an organizational
problem concerning, for example, poor interdepartmental
communication. Training and development processes include
needs analysis, instructional design, validation,
implementation, and evaluation and follow-up.
Career planning and development process
It is the deliberate process through which
persons become aware of personal career related attributes
and the lifelong series of activities that contribute to their
career fulfillment. Individuals, managers, and the
organization have role to play in career development.
Individuals accept responsibility of own career, assess
51
interests, skills, and values, seek out career information and
resources, establish goals and career plans, and utilize
development opportunities.
Performance appraisal process
Performance appraisal may be defined as any
procedure that involves setting work standards, assessing
employee’s actual performance relative to these standards,
and providing feedback to the employee with the aim of
motivating the worker to eliminate performance deficiencies
or to continue to perform above par.
Processes in performance appraisal contain three steps:
defining performance expectations, appraising performance,
and providing feedback. First, defining performance
expectation means making sure that job duties and
standards are clear to all.
Second, appraising performance means comparing
employees’ actual performance to the standards that has
been set, which normally involves some type of rating form.
Third, performance appraisal usually requires one or more
feedback sessions to discuss employees’ performance and
progress and making plans for any required development.
Some of the appraisal methods include graphic rating scale,
alternation ranking, paired comparison, forced distribution,
and critical incident methods.
52
Employee Compensation and benefits process
Employee compensation involves all forms of
pay or rewards accrued to employees and arising from their
employment. This however consists of two main
components: direct financial payments, and indirect
payments. While direct financial payments are in the form of
wages, salaries, incentives, commissions, and bonuses,
indirect payments are in the form of financial benefits like
employer-paid insurance and vacations. Moreover, legal
considerations in compensation, union influences,
compensation policies, and equity and its impact on pay
rates are the four basic considerations influencing the
formulation of any pay plan.
Occupational health and safety process
Occupational health and safety process aims at
protecting the health and safety of workers by minimizing
work-related accidents and illnesses. Laws and legislations to
ensure and observe general health and safety rules bound
employers. More so, rules for specific industries, for
example, mining and rules related to specific hazards, for
instance, asbestos have to be adhered to. The following
steps are important in this process.
Checking for or removing unsafe conditions by using
checklist to audit a company’s adherence to safety rules that
53
are guarded against hazards, which cannot be removed.
Next, through selection, screening out of employees who
might be accident prone for job in question without
compromising the human right legislation.
More so, establishing a safety policy, this emphasizes on the
importance of practically reducing accidents and injuries.
Setting specific loss control goals by analyzing the number of
accidents and safety incidents and then set specific safety
goals to be achieved. Enforcing safety rules through
discipline and conducting health and safety inspections
regularly by investigating all accidents and near misses, and
by having a system in place for letting employees notify
management about hazardous conditions.
54
· At the user level, database requirements can be classified
as perceived by the user or as required for physical design of
the database.
55
Technology is the usage and knowledge of
tools, techniques, crafts, systems or methods of
organization. The word technology comes from the Greek
technología, an 'art', 'skill' or 'craft' and -logía the study of
something, or the branch of knowledge of a discipline. The
term can either be applied generally or to specific areas:
examples include construction technology, medical
technology, or state-of-the-art technology or high
technology. Technologies can also be exemplified in a
material product, for example an object can be termed state
of the art.
56
allowed humans to interact freely on a global scale.
However, not all technology has been used for peaceful
purposes; the development of weapons of ever-increasing
destructive power has progressed throughout history, from
clubs to nuclear weapons.
59
TODAY, information technology (IT) is a
critical organizational resource that must support a firm’s
competitive strategy. The alignment of IT management
strategies with a firm’s competitive strategy has been cited
as a critical management issue for both information systems
(IS) executives and general manager’s .In spite of this, the
extent to which IT management strategies are aligned with a
firm’s business strategies varies widely among firms. This is
often due to the lack of a clear plan.
Previous research has suggested that there are significant
variations among firms in the degree to which IT has been
aligned with their business strategies. These differences are
reflected in three evolutionary roles that IT plays in firms:
1. The traditional role, i.e., IT supports operations but is
not strategy related
2. The evolving role, i.e., IT supports strategy, and
3. The integrated role, i.e., IT is integral to strategy; the
firms’ competitive strategies are also linked to this
evolution.
4. The evolutionary role of IT and the extent to which IT
60
The information technology department of a large
company would be responsible for storing information,
protecting information, processing the information,
transmitting the information as necessary, and later
retrieving information as necessary.
61
pencil and paper example, each one of the mentioned parts
of this information system in itself is an information
technology.
62
The history of information systems coincides
with the history of computer science that began long before
the modern discipline of computer science emerged in the
twentieth century. Regarding the circulation of information
and ideas, numerous legacy information systems still exist
today that are continuously updated to promote
ethnographic approaches, to ensure data integrity, and to
improve the social effectiveness & efficiency of the whole
process. In general, information systems are focused upon
processing information within organizations, especially within
business enterprises, and sharing the benefits with modern
society.
63
System Outsourcing refers to the hardware and software
used by a company; whereas Information Technology
Outsourcing refers to the solution that needs to be
developed.
64
have the technical skill in house or only needs a certain
expertise for a short period of time. An example would be a
trucking business wanting to develop a custom routing
system that will take 6 months to develop. So they hire a
company that specializes in this type of work to develop the
proper solution rather than going through the trouble of
hiring their own employees to do the work.
66
A four level pyramid model of different types of
Information Systems based on the different levels of
hierarchy in an organization
67
Although the pyramid model remains useful, since
it was first formulated a number of new technologies have
been developed and new categories of information systems
have emerged, some of which no longer fit easily into the
original pyramid model.
• Data warehouses
• Enterprise resource planning
• Enterprise systems
• Expert systems
• Geographic information system
• Global information system
• Office Automation
68
knowledge and strong communications skills will have the
best prospects.
69
A computer based information system, following a definition
of Langefors, is:
70
• An information system (IS) is any combination of
information technology and people's activities using
that technology to support operations, management,
and decision-making. In a very broad sense, the term
information system is frequently used to refer to the
interaction between people, algorithmic processes, data
and technology. In this sense, the term is used to refer
not only to the information and communication
technology (ICT) an organization uses, but also to the
way in which people interact with this technology in
support of business processes.
• Some make a clear distinction between information
systems, ICT, and business processes. Information
systems are distinct from information technology in that
an information system is typically seen as having an ICT
component. Information systems are also different from
business processes. Information systems help to control
the performance of business processes.
• Alter argues for an information system as a special type
of work system. A work system is a system in which
humans and/or machines perform work using resources
(including ICT) to produce specific products and/or
services for customers. An information system is a work
system whose activities are devoted to processing
(capturing, transmitting, storing, retrieving,
manipulating and displaying) information.
71
• Part of the difficulty in defining the term information
system is due to vagueness in the definition of related
terms such as system and information. Beynon-Davies
argues for a clearer terminology based in systemic and
semiotics. He defines an information system as an
example of a system concerned with the manipulation
of signs. An information system is a type of socio-
technical system. An information system is a mediating
construct between actions and technology.
• As such, information systems inter-relate with data
systems on the one hand and activity systems on the
other. An information system is a form of
communication system in which data represent and are
processed as a form of social memory.
72
Q. 4 Write notes on the followings:
1. Input Technologies
2. Types of Telecommunications
Networks.
73
Input is concerned with:
Recording and entering data into a computer system
Issuing instructions to the computer
An input device is
” a device that, together with appropriate software,
transforms information from the user into data that a
computer application can process”
74
simply be a display device and not allow users to interact
with it, much like a TV.
Digital Camera
75
cameras a popular choice when compared to film cameras.
First, the feature often enjoyed the most is the LCD display
on the digital camera. This display allows users to view
photos or video after the picture or video has been taken,
which means if you take a picture and don't like the results,
you can delete it; or if you do like the picture, you can easily
show it to other people. Another nice feature with digital
cameras is the ability to take dozens, sometimes hundreds
of different pictures. To the left is a picture of the Casio QV-
R62, a 6.0 Mega Pixel digital camera used to help illustrate
what a digital camera may look like.
76
Joystick
77
Keyboard
78
Many different layouts are available around the world but
most keyboards are of the QWERTY type.
Layouts
79
Microphone
80
Sometimes abbreviated as mic, a microphone is a
hardware peripheral that allows computer users to input
audio into their computers.
Device for converting sound waves into electric
power that has wave characteristics essentially similar to
those of the sound. By proper design, a microphone may be
given directional characteristics so that it will pick up sound
primarily from a single direction, from two directions, or
more or less uniformly from all directions. In addition to their
use in telephone transmitters, microphones are most widely
applied in hearing aids, sound-recording systems (principally
magnetic and digital tape recorders), and public-address
systems.
Mouse
• Cordless
• Foot mouse
• Glide point
• IntelliMouse
• J mouse
• Joystick
• Mechanical
• Optical
• Touchpad
• Trackball
• Track Point
82
• Wheel mouse
• Bluetooth
• Infrared
• PS/2 Port
• Serial Port
• USB
Scanner
83
scanner is commonly connected to a computer USB,
Parallel or SCSI port.
Web cam
84
A web cam, or web camera, is the loosely used
term for any camera that generates images that can be
accessed by and displayed on the World Wide Web through a
server. A web cam is essentially just a camera that is
connected to a computer, either directly or wirelessly, and
gathers a series of images for remote display elsewhere.
Web cam technology is widely used by all sorts of people for
all sorts of different reasons.
In 1991, the first web cam was up and running at
Cambridge University's Computer Science Department, but
since then, web cams have crept into homes, businesses,
public streets and buildings.
Dedicated buttons
85
be useful when there is a very limited range of possible
inputs to the system and where the environment is not
suitable for an ordinary keyboard. In-car satellite navigation
systems and game pads for computer games are good
examples.
Pointing Devices
Cursor controls
Two dimensional devices which can move a cursor and drag
objects on the screen.
86
Mice
Can move around on a flat surface. Mice are not convenient
in limited spaces.
Presentation mice
Handheld devices, usually wireless, do same job as an
ordinary mouse but do not need a surface.
Trackballs
Ball rotates in fixed socket. Some people find this easier to
use than a mouse.
Touchpad’s
Usually found on laptop computers, but can also be used as
separate devices. Work like trackballs but without moving
parts.
Cursor Keys
87
Cursor keys can be used to move a cursor, but it is difficult
to accomplish dragging. Using keys can provide precise
control of movement by moving in discrete steps, for
example when moving a selected object in a drawing
program.
Some handheld computers have a single cursor button which
can be pressed in any of four directions.
Touch screens
Touch displays allow the user to input information into the
computer simply by touching an appropriate part of the
screen. This kind of screen is bi-directional – it both receives
input and it outputs information.
Advantages:
• Easy to learn – ideal for an environment where use by a
particular user may only occur once or twice
• Require no extra workspace
• No moving parts (durable)
• Provide very direct interaction
88
Disadvantages:
• Lack of precision
• High error rates
• Arm fatigue
• Screen smudging
Touch screens are used mainly for:
• Kiosk devices in public places, for example for tourist
information
• Handheld computers
Pen Input
Touch screens designed to work with pen devices rather
than fingers have become very common in recent years. Pen
input allows more precise control, and, with handwriting
recognition software, also allows text to be input.
Handwriting recognition can work with ordinary handwriting
or with purpose designed alphabets such as Graffiti.
Pen input is used in handheld computers (PDAs) and
specialized devices, and more recently in tablet PCs, which
are similar to notebook computers, running a full version of
89
the Windows operating system, but with a pen-sensitive
screen and with operating system and applications modified
to take advantage of the pen input.
Pen input is also used in graphics tablets, which are
designed to provide precise control for computer artists and
graphic designers.
3D input devices
90
All the pointing devices described above allow input and
manipulation in two dimensions. Some applications require
input in three dimensions, and specialized input devices
have been developed for these.
3D trackers
3D trackers are often used to interact with Virtual Reality
environments.
Stationary Controllers (Small range of motion)
Best for precise 3D element manipulation
Motion Trackers (Large range of motion)
Best for 3D region pointing or head tracking
Virtual Reality Gloves (Data gloves)
Hand gestures
Head Mounted Displays - HMDs (Tracker Displays)
Best for 3D scene navigation/exploration
3D mice
These allow movement in more than two dimensions, and
are often used together with an ordinary mouse. For
91
example, this allows a designer to simultaneously pan, zoom
and rotate 3D models or scenes with the controller in one
hand while the other hand selects, inspects or edits with the
mouse.
Speech input
Speech or voice recognition is the ability of a machine or
program to recognize and carry out voice commands or take
dictation. In general, speech recognition involves the ability
to match a voice pattern against a provided or acquired
vocabulary. Usually, a limited vocabulary is provided with a
product and the user can record additional words. More
sophisticated software has the ability to accept natural
speech (meaning speech as we usually speak it rather than
carefully spoken speech).
92
• give commands to the system that it will then execute
(e.g., "exit application" or” Take airplane 1000 feet
higher")
• usually speaker independent
Dictation
• dictate to a system, which will transcribe your speech
into written text
• usually speaker-dependent
Speaker Verification
• your voice can be used as a biometric (i.e., to identify
you uniquely)
Speech input is useful in applications where the use of hands
is difficult, either due to the environment or to a user’s
disability. It is not appropriate in environments where noise
is an issue.
Much progress has been made, but we are still a long way
from the image we see in science fiction of humans
conversing naturally with computers.
Astronaut Bowman as he appears in the” eye" of computer HAL 9000 in "2001: A SPACE ODYSSEY"
OPTICAL SCANNING
93
Optical scanning devices read text or graphics and
convert them into digital input for a computer. Optical
scanning enables the direct entry of data from source
documents into a computer system. Popular uses of optical
scanning include:
o Scanning pages of text and graphics into your
94
o Airline tickets
o Sort mail
o Score tests
o Process business and government forms
Devices such as handheld optical scanning wands
are used to read OCR coding on merchandise tags and other
media. Many business applications involve reading bar
code, a code that utilizes bars to represent characters. One
common example is the Universal Produce Code (UPC) bar
coding that you see on packages of food items and many
other products.
OTHER INPUT TECHNOLOGIES
Magnetic stripe technology is a familiar form of data entry
that helps computers read credit cards. The dark magnetic
stripe on the back of such cards is the same iron oxide
coating as on magnetic tape.
Smart cards that embed a microprocessor chip and several
kilobytes of memory into debit, credit, and other cards are
popular in Europe, and becoming available in the United
States.
Digital cameras and digital video cameras enable you to
shoot, store, and download still photos or full motion video
with audio into your PC.
Magnetic ink character recognition (MICR) is machine
recognition of characters printed with magnetic ink.
Primarily used for check processing by the banking industry.
95
A telecommunications network is a network of
telecommunications links and nodes arranged so that
messages may be passed from one part of the network to
another over multiple links and through various nodes.
Telecommunications network links (including their
endpoints or "nodes") may in turn be built out of hierarchical
transmission systems.
Examples of telecommunications networks are:
Computer network
The Public switched telephone network
The global Telex network
The aeronautical ACARS network
The Internet Network- The internet network is a global
‘network of networks’. The internet is connected via an
Internet Service Provider (ISP) and then becomes part
of a network. This network then connects to a larger
corporate network that interconnects with several other
similar networks through Network Access Points (Naps).
96
Telecommunication Network Components:
All telecommunication networks are made up of five
basic components that are present in each network
environment regardless of type or use. These basic
components include terminals, telecommunications
processors, telecommunications channels, computers, and
telecommunications control software.
• Terminals are the starting and stopping points in any
telecommunication network environment. Any input or
output device that is used to transmit or receive data can be
classified as a terminal component.
• Telecommunications processors are support data
transmission and reception between terminals and
computers by providing a variety of control and support
functions. (I.e. convert data from digital to analog and back)
• Telecommunications channels are the way by
which data is transmitted and received. Telecommunication
channels are created through a variety of media of which the
most popular include copper wires and coaxial cables.
Fiber-optic cables are increasingly used to bring faster and
more robust connections to businesses and homes.
97
• In a telecommunication environment computers
are connected through media to perform their
communication assignments.
• Telecommunications control software is present
on all networked computers and is responsible for controlling
network activities and functionality.
Early networks were built without computers, but
late in the 20th century their switching centers were
computerized or the networks replaced with computer
networks.
98
Any network that encompasses a large geographic
area is referred to as a WAN or Wide Area Network. Many
large businesses and government agencies use WANs to
keep their employees and citizens connected as well as
provide a quick and effective way to send and receive
information.
99
4. The equipment that interconnects the network, the
links, and the MAN itself are often owned by an
association or a network provider that provides or
leases the service to others.
100
Examples include IEEE 802.3 (Ethernet), IEEE 802.11 (Wi-Fi)
or ITU-T G.hn (using existing home wires, such as power
lines, phone lines and coaxial cables).
Personal Area Network (PAN)
A Personal Area Network (PAN) is a network that is
restricted to the area of a person's body. It is much smaller
than Local Area Network. It typically incorporates ad hoc
connections to other PANs or directly to Bluetooth devices.
101
Network computing is a network architecture that
has grown with the Internet and resulting connection speeds.
In a network computing architecture a computer uses its web
browser to connect to another network computer that
actually is running the application. A good example of this
architecture in use is Google Docs or Microsoft Office online.
Both services allow users the ability to login to Google or
Microsoft servers respectively and work similarly to how it
would be performed on their own computing environment.
Peer-to-Peer Network
Peer to peer networks are now beginning to be
realized for the positive benefits they provide and not as only
used for the sharing of copyrighted material. Peer-to-peer
networks can be separated into two major types: Central
Server and Pure.
In a central server environment one host server
maintains all active connections and shared information.
When information is requested the central server informs the
user where they can receive the file and allows the
connection directly to the other PC to download. The best
example of this type was the original Napster file sharing
service.
102
A pure peer-to-peer network type has no central
server to maintain active users rely instead on the individual
computers to seek out all other computers offering the same
information being requested. A good example of this type
would be Bit Torrent software which allows small parts of
information to be pulled from many sources.
103
offices in London and New York. The second phase,
supporting a further 25 New York traders, is due to follow
by the end of the year. The software will be deployed
across the organization world wide over the next two
years. Thousands of support staff are expected to use it.
104
enough risk with the database, so we went for C++,
which also offered better performance.”
1. Why did Colin Savery reject a relational database
solution? Explain.
2. How did the selection of an object-oriented DBMS
address Bankers Trust’s information needs?
3. What are the advantages and risks of an object
database design?
4. How did Bankers Trust minimize the risks of using an
object DBMS for its new system?
105
Cost
One disadvantage of relational databases is the
expensive of setting up and maintaining the database
system. In order to set up a relational database, you
generally need to purchase special software. If you are not a
programmer, you can use any number of products to set up
a relational database. It does take time to enter in all the
information and set up the program. If your company is large
and you need a more robust database, you will need to hire
a programmer to create a relational database using
Structured Query Language (SQL) and a database
administrator to maintain the database once it is built.
Regardless of what data you use, you will have to either
import it from other data like text files or Excel
spreadsheets, or have the data entered at the keyboard. No
matter the size of your company, if you store legally
confidential or protected information in your database such
as health information, social security numbers or credit card
numbers, you will also have to secure your data against
unauthorized access in order to meet regulatory standards.
Abundance of Information
Advances in the complexity of information cause
another drawback to relational databases. Relational
databases are made for organizing data by common
characteristics. Complex images, numbers, designs and
multimedia products defy easy categorization leading the
106
way for a new type of database called object-relational
database management systems. These systems are
designed to handle the more complex applications and have
the ability to be scalable.
Structured Limits
Some relational databases have limits on field
lengths. When you design the database, you have to specify
the amount of data you can fit into a field. Some names or
search queries are shorter than the actual, and this can lead
to data loss.
Isolated Databases
Complex relational database systems can lead to
these databases becoming "islands of information" where
the information cannot be shared easily from one large
system to another. Often, with big firms or institutions, you
find relational databases grew in separate divisions
differently. For example, maybe the hospital billing
department used one database while the hospital personnel
department used a different database. Getting those
databases to "talk" to each other can be a large, and
expensive, undertaking, yet in a complex hospital system, all
the databases need to be involved for good patient and
employee care.
Object Database Advantages over RDBMS
107
• Objects don't require assembly and disassembly saving
coding time and execution time to assemble or
disassemble objects.
• Reduced paging
• Easier navigation
• Better concurrency control - A hierarchy of objects may
be locked.
• Data model is based on the real world.
• Works well for distributed architectures.
• Less code required when applications are object
oriented.
• Object Database Disadvantages compared to RDBMS
• Lower efficiency when data is simple and relationships
are simple.
• Relational tables are simpler.
• Late binding may slow access speed.
• More user tools exist for RDBMS.
• Standards for RDBMS are more stable.
• Support for RDBMS is more certain and change is less
likely to be required.
• ODBMS Standards
108
database management systems are occupied with strong
defense mechanisms. In addition to this, many academic
researchers have been proposing solutions and mechanisms
to improve security enforcement in database management
systems. Understanding and Identifying of these new
mechanisms and security features provided by database
systems are very important.
What Is An OODBMS?
111
These companies are able to record customer
transactions made within their business. Online transactions
have become tremendously popular with the e-business
world. Consumers and businesses are able to make
payments securely on company websites. None of these
current developments would have been possible without the
evolution of database management. Even with all the
progress and current trends of database management, there
will always be a need for new development as specifications
and needs grow.
1. Distribution
2. Logical correlation
Distribution: The fact that the data are not resident at the
same site, so that we can distinguish a distributed database
from a single, centralized database.
112
databases or files which are resident at different sites of a
computer network.
113