EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
Data Information Process System
• Collection of raw facts
and figures.
• Consists of numbers,
words, or images,
particularly as
measurements or
observations of a set of
variables.
• Data that have been
processed so that
they are
meaningful.
• Organized data that
has been arranged
for better
comprehension,
understanding
and/or retrieval.
BP is a sequence of co-
ordinated activities to
transforms input into
output which creates
some value to the
customer as well as the
organization.
A group of mutually
related, cooperating
elements working
towards reaching a
common goal by taking
inputs and producing
outputs in organized
transformation processes.
Information System: It refers to a system that collects, stores, analyses, processes and distributes information
in the enterprise for decision-making, co-ordination and control. It can be manual as well as computer-based
information system (CIS).
Information Technology: It refers to the applications of Computer systems – Hardware and Software,
Telecommunications and Networks, DBMS and Other Information Processing Technologies to collect, store,
transmit and manipulate data for processing of information in the enterprise.
Data Vs. Information
Data Information
• Data is raw facts and figures. • Information is facts or figures ready for communication or use.
• Data is unorganized. • Information is meaningful and recorded by human intellect.
Components of IS Key: (PHD IN Sw.) Why IS? Key: (OBC2)
1. People Resources (Specialists and End Users)
2. Hardware (Machine and Media)
3. Data (DBMS)
4. Information Products
5. Network (Devices, Media, Software and Protocols)
6. Software (Programs and Procedures)
1. Operational excellence
2. Better decision-making
3. Competitive advantage
4. Customer-supplier intimacy
Chapter 3: Information System Components
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
LAYERS IN INFORMATION SYSTEMS
HARDWARE
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
PROCESSING DEVICES
CPU CU ALU Registers
• CPU is the processor
that computes and
processes data and
delivers the results
based on the
instructions that are fed
to the PC.
• Every CPU has two
basic parts, the Control
Unit and the
Arithmetic Logic Unit.
• Computer’s
resources are
managed by CU.
• It is the logical
hub of the
computer.
• CPU’s
instructions for
carrying out
commands are
built into CU.
• Carries out
mathematical
operations.
• Arithmetic: Addition,
subtraction,
multiplication, division,
etc.
• Logical: Comparisons,
such as, whether one
number is equal to,
greater than, or less
than another number.
Internal memory within
CPU, which are very fast
and very small.
Types of Registers:
a) Accumulators (AR) b) Data Registers (DR) c) Instruction Registers
(IR) d) Memory Registers
(MR) e) Index Registers
Memory Unit
Primary Memory
RAM ROM CMOS
Secondary Memory
Internal Memory
External Memory
Virtual Memory
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
Cache Memory (Pronounced as ‘Cash’)
• There is a huge speed difference between Registers and Primary Memory.
• To bridge these speed differences, we have cache memory.
• Cache is a smaller, faster memory, which stores copies of the data from the most frequently used main
memory locations so that Processor/Registers can access it more rapidly than main memory.
PRIMARY MEMORY
1. Read Only Memory (ROM):
• It is only readable memory.
• The data written on it cannot be modified.
• The instructions required during booting of a system are retrieved from ROM.
2. Random Access Memory (RAM):
• RAM is temporary and is erased when computer is switched off.
• RAM is read/write type of memory, and thus, can be written by user.
3. Complementary Metal Oxide Semiconductor Memory (CMOS):
• CMOS is used to store the system configuration, date, time and another important data.
• When computer is switched on, BIOS (Basic Input/Output System) matches the information of
CMOS with the peripheral devices and displays error in case of mismatching.
SECONDARY MEMORY Because the storage capacity of primary memory is limited so additional memory called auxiliary memory is
used in computer systems.
Bubble Memory Flash Memory
• Made of thin crystal film - synthetic garnet.
• This crystal film contains large number of
magnetic domains (bubbles).
• The presence or absence of bubbles indicates
whether bit is on or off.
• Non-volatile Memory
• Credit or Debit card use bubble memory.
• Latest technology in semi-conductor memories.
• Made of a small board. (PCB – Printed Circuit
Board).
• A very high speed memory.
• Portable memory for carrying data and
programmes.
Virtual Memory
• VM is not a separate device; but an imaginary memory area
• Supported by operating systems in conjunction with the hardware.
• If a computer, that lacks RAM, needs to run a program or operation, Windows uses virtual memory to
compensate.
• Virtual memory combines computer’s RAM with temporary space on the hard disk.
• When RAM runs low, virtual memory moves data from RAM to a space called a paging file.
• Moving data to and from the paging file frees up RAM to complete its work.
• Virtual memory is an allocation of hard disk space to help RAM.
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
SOFTWARE System Software Application Software
A computer software designed to operate the
computer hardware and to provide and maintain a
platform for running any application software.
Application software has been created to perform a
specific task for a user.
Functions of OS Key: (PUsH MTNL File) Types of Application Software Key: (Content and
Media for AIEEE)
1. Performing hardware functions
2. User Interfaces
3. Hardware Independence
4. Memory Management
5. Task Management
6. Networking Capability
7. Logical access security
8. File management
1. Content Access Software
2. Media Development Software
3. Application Suite
4. Information Worker Software
5. Enterprise Software
6. Enterprise Infrastructure
7. Educational Software
Advantages and Disadvantages of Application Software Key: (User needs virus updated
to avoid cost and Malware)
Advantages Disadvantages
1. Addressing User needs
1. Less threat from virus
2. Regular updates
1. Development is costly
2. Infection from Malware
Application Areas of Computer Based Applications
1. Finance and Accounting
2. Marketing and Sales
3. Production and Manufacturing
4. Human Resource Management
5. Inventory or Stores Management
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
DATABASE MANAGEMENT SYSTEM (DBMS)
Database Database System DBMS Objectives of DBMS
• A collection of
interrelated data
stored together to
serve multiple
applications.
• Data is stored in such
a way that it is
independent of the
programs which use
the data.
Computer Based Record-
Keeping System.
• A set of computer
programs that
controls the creation,
maintenance, and
utilization of the
databases of an
organization.
• A System software
that provides facility
to create and maintain
a well-organized
database.
• Example: SQL,
Oracle, DB2, etc.
1. To know its
information needs.
2. To acquiring that
information.
3. To organize the
acquired information
in a meaningful way.
4. To assure
information quality.
5. To provide software
tools so that users in
the enterprise can
access the information
they require.
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
Hierarchical DBM Network DBM Relational DBM Object Oriented DBM
• Records are logically
organized into a
hierarchy of
relationships.
• In an inverted tree
pattern.
• Records in the
hierarchy are called
nodes.
• Each node is related to
the others in a parent-
child relationship.
• Implements one-to-
one and one-to-many
relationships.
• The top parent record
in the hierarchy is
called the root record.
• It views all records in
sets.
• Each set is composed
of an owner record
and one or more
member records.
• A logical data
structure that allows
many-to-many
relationships among
data records.
• It allows entry into a
database at multiple
points, because any
data element or
record can be related
to many other data
elements.
A relational database is
structured into a series of
two-dimensional tables.
• Object-oriented has its
origins in Object
oriented
programming
languages. (C++,
Ruby, Python, etc.)
• An object typically has
two components; state
(value) and behaviour
(operations).
• Object oriented
databases provide a
Unique Object
Identifier (OID) for
each object.
Advantages of DBMS Key: (SIR has CIA’s
Security Data for Us.
Disadvantages of DBMS
1. Permits Data Sharing
2. Maintains Integrity
3. Minimizing data Redundancy
4. Program and file Consistency
5. Achieving program/data Independence
6. Faster Application Development
7. Improved security
8. User-friendly
1. Cost
2. Security
Big Data Data Warehouse (DW) Data Mining Knowledge Discovery
Big data is high-volume
and high-velocity and/or
high-variety information
assets that demand cost-
effective, innovative
forms of information
DW is a small database
extracted from the larger
database.
Extract data from one or
more of the
organization’s databases
Data mining is a major
use of data warehouse
databases and the static
data they contain.
The data in a data
warehouse are analyzed
Knowledge Discovery in
Databases systems also
assist us establish, contact,
and communicate with
experts (knowledgeable
people) on various
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
processing that enable
enhanced insight,
decision-making, and
process automation.
and load it into the data
warehouse for storage
and analysis.
to reveal hidden patterns
and trends in historical
business activity.
subjects, surrounded by
our organization, or
perhaps even outside.
Criteria to Create DW DW Design Approaches Benefits of DW Key: (CTC Trend)
A. Uses non-operational data
B. Data is time-variant
C. Data is standardized
A. Bottom-Up Approach
B. Top-Down Approach
A. Consistency in Data
B. Truth Finding
C. Clear Understanding of Databases
D. Trend Analysis
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
NETWORKING AND COMMUNICATION SYSTEMS
Computer Network Types of Networks Network Principles
Key: (R2BC)
Benefits of Networks
A network is a set of
devices (also known as
nodes, terminals or
stations) interconnected
by a communication link.
1. Connection Oriented
networks
2. Connectionless
Networks
1. Routing
2. Resilience
3. Bandwidth
4. Contention
A. Distributed nature of
information
B. Resource Sharing
C. Computational
Power
D. User communication
E. Reliability
F. Shared Databases
G. Remote Access
H. Fault Tolerance
I. Internet and Security
THE BUSINESS VALUE OF TELECOMMUNICATIONS Key: (GST Cost)
Overcome Geographical
Barriers
Overcome Structural
Barriers
Overcome Time
Barriers
Overcome Cost
Barriers
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
NETWORK RELATED CONCEPTS Hub:
• Hub is a port-switching communications processor.
• This allows for the sharing of the network resources
such as servers, LAN workstations, printers, etc.
Switch:
• Also called switching hub, bridging hub, officially
MAC bridge.
• The switch connects to the rest of the network.
• Number of ports on a Switch: 8 or 16.
• Switches can be connected to each other to build
larger networks.
Repeater:
• Repeater is a communications processor that boosts
or amplifies the signal before passing it to the next
section of cable in a network.
• It is needed when the total length of a single span of
network cable is larger than the maximum allowed
for your cable type.
Bridge:
• A bridge as a kind of smart repeater.
• Bridge is a communication processor that connects
number of Local Area Networks (LAN).
• Used to partition one large network into two
smaller networks for performance reasons.
• It magnifies the data transmission signal while
passing data from one LAN to another.
NIC:
• A network interface card or controller, also known
as network adapter, LAN adapter or
physical network interface is a computer hardware
component that connects a computer to a
computer network.
• NICs implement a networking standard called
Ethernet (In-built with the motherboard).
Modem:
• Modulator-demodulator
• Computers use modems to talk to each other
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
Router:
• Router is a communications processor
• It interconnects networks based on different rules
or protocols.
• So that a telecommunications message can be
routed to its destination.
Packet:
• A packet is a message that is sent over the network from one node to another node.
• Includes the address of the node that sends the packet, the address of the node the packet is being sent to,
and the data.
Node:
• A node is a device that is connected to the network.
MAC Address:
• MAC Address is assigned by the manufacturer of a Network Interface Controller (NIC) and are stored in
its hardware, such as the card’s read-only memory or some other firmware mechanism.
• If assigned by the manufacturer, a MAC address usually encodes the manufacturer’s registered
identification number.
NETWORK TOPOLOGY
The arrangement in which the computers and other network components are connected to each other.
Bus Topology
• The nodes are strung together in a line.
• Commonly used for LANs.
• Every node on the network can see every packet that
is sent on the cable.
• Each node looks at each packet to determine whether
the packet is intended for it.
• If so, the node claims the packet.
• If not, the node ignores the packet.
Ring Topology
• Packets are sent around the circle from
computer to computer.
• Each computer looks at each packet to decide
whether the packet was intended for it.
• If not, the packet is passed on to the next
computer in the ring.
EIS Quick Bites: NOV 2018 by Prof. Om Trivedi CA Intermediate – Group II (New Course)
Prof. Om Trivedi, IIM Alumnus and Faculty Member of IGP, Delhi, NIRC & WIRC of ICAI. (9958300572, [email protected])
Star Topology
• Each network node is connected to a central device
called a hub or a switch.
• Commonly used with LANs.
• If a cable in a star network breaks, only the node
connected to that cable is isolated from the network.
Mesh Topology
• Multiple connections between each of the nodes
on the network.
• If one cable breaks, the network can use an
alternative route to deliver its packets.
• Not very practical in a LAN setting.
• Common for MAN or WAN.
Packet Switching:
• Data is communicated in the form of packets between
sender and receiver.
• Provides efficient utilization of communication channel.
• Users’ data packets can be transmitted simultaneously.
• Internet communication is based on packets switching techniques.
Voice Over Internet Protocol (VOIP):
A protocol called VoIP enables sounds to be converted to a digital format for transmission over the Internet
and then recreated at the other end.
Voice communication over the Internet is now available to everyone with a browser access (think Skype,
Google Hangouts, and WhatsApp calls).
IP Address:
Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or
anything else, is assigned a unique identifying number called an IP (Internet Protocol) address.
Let’s say the domain wikipedia.org has the IP address of 107.23.196.166.