BUIS
BUIS
BUIS
This manual enjoys copyright under the Berne Convention. In terms of the Copyright Act, no
98 of 1978, no part of this manual may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording or by any other
information storage and retrieval system without permission in writing from the proprietor.
Student Portal
The full-service Student Portal provides you with access to your academic administrative
information, including:
• an online calendar,
• timetable,
• academic results,
• module content,
• financial account, and so much more!
When you log into the Student Portal, the ‘Module Information’ page displays the ‘Module
Purpose’ and ‘Textbook Information’ including the online ‘Module Guides or ‘Module Manuals’
and assignments for each module for which you are registered.
Supplementary Materials
For certain modules, electronic supplementary material is available to you via the
‘Supplementary Module Material’ link.
The ‘Module Discussion Forum’ may be used by your lecturer to discuss any topics with you
related to any supplementary materials and activities such as ICE, etc.
To view, print and annotate these related PDF documents, download Adobe Reader at
following link below:
www.adobe.com/products/reader.html
The following Library Online Databases are available to you. Please contact your librarian if
you are unable to access any of these. Use the same username and password as for student
portal
EBSCOhost
This database contains full text online articles.
https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.
com/
Library Website
This library website gives access to various online resources and
study support guides
http://www.iie.ac.za/IIE%20Library/Pages/default.aspx
LibraryConnect
The Online Public Access Catalogue. Here you will be able to search
for books that are available in all the IIE campus libraries.
https://libraryconnect.iie.ac.za/client/en_GB/iie/
SABINET
This database will provide you with books available in other libraries
across South Africa.
http://reference.sabinet.co.za.ezproxy.iielearn.ac.za/
DOAJ
DOAJ is an online directory that indexes and provides access to high
quality, open access, peer-reviewed journals.
https://doaj-org.ezproxy.iielearn.ac.za/
DOAB
Directory of open access books.
http://www.doabooks.org/
Emerald Insight
Online journals, books and case studies.
https://www.iie.ac.za/IIE%20Library/E-Shelf/Pages/Electronic-
Databases.aspx
Table of Contents
Introduction ............................................................................................................................. 6
Learning Unit 1: An Overview of Information Systems ........................................................... 7
1 Introduction ...................................................................................................................... 8
2 Computers and Information Systems in Daily Life ........................................................... 8
3 Computer Literacy vs. Information Literacy ................................................................... 12
4 Types of Information Systems ....................................................................................... 13
5 Information Systems In Organisations ........................................................................... 14
6 Using Information Technologies for a Competitive Advantage ...................................... 16
7 Recommended Additional Reading ............................................................................... 20
8 Recommended Digital Engagement and Activities ........................................................ 20
9 Activities......................................................................................................................... 21
10 Revision Exercises ..................................................................................................... 21
11 Solutions to Revision Exercises ................................................................................. 22
Learning Unit 2: The Machines Behind Computing .............................................................. 24
1 Introduction .................................................................................................................... 24
2 Computers Systems ...................................................................................................... 25
3 The History of Computer Hardware and Software ......................................................... 30
4 Computer Operations .................................................................................................... 33
5 Input, Output and Memory Devices ............................................................................... 34
6 Classes Of Computers ................................................................................................... 43
7 Types of Software .......................................................................................................... 46
8 Recommended Additional Reading ............................................................................... 49
9 Recommended Digital Engagement and Activities ........................................................ 50
10 Activities ..................................................................................................................... 51
11 Revision Exercises ..................................................................................................... 51
12 Solutions to Revision Exercises ................................................................................. 52
Learning Unit 3: Database Systems, Data Warehouses, and Data Marts ............................ 54
1 Introduction .................................................................................................................... 54
2 Databases and Database Management Systems ......................................................... 55
3 The Components Of A DBMS ........................................................................................ 58
4 Logical Database Design ............................................................................................... 59
5 Trends In Database Design and Use ............................................................................. 63
6 Data Warehouses .......................................................................................................... 66
7 Data Marts ..................................................................................................................... 69
8 Business Analytics ......................................................................................................... 69
9 The Big Data Era ........................................................................................................... 70
10 Recommended Additional Reading ............................................................................ 72
11 Recommended Digital Engagement and Activities .................................................... 72
12 Activities ..................................................................................................................... 73
13 Revision Exercises ..................................................................................................... 73
14 Solutions to Revision Exercises ................................................................................. 74
Learning Unit 4: Data Communication .................................................................................. 76
1 Introduction .................................................................................................................... 77
2 The Application Of Data Communication Systems ........................................................ 77
3 The Components Of A Data Communication System ................................................... 78
Introduction
The purpose of this module is to provide you, as a student, with a sound knowledge of
concepts related to the components and types of information systems. After having completed
this module, you should also have a sound understanding as to how information systems can
play a strategic role in a business’ ability to obtain a competitive advantage within the industry
it operates.
It is important that you engage a significant amount of time and effort in identifying
opportunities for the application of the content covered in the module so that you will be able
to apply the concepts within a variety of business information system contexts.
1 Introduction
In this learning unit, the concept of information systems will be
discussed. A distinction will also be made between different
types of information systems and how information systems can
help an organisation to gain a competitive advantage.
• Input;
• Processing;
• Output;
• Feedback and control.
• Data;
• Databases;
• Processes;
• Information.
2.1.1 Data
2.1.2 Databases
2.1.3 Processes
2.1.4 Information
If you obtained 30% for a test, you will probably reflect as to why
you performed so poorly in the test. If the outcome of your
reflection points to the fact that your poor performance on the
test relates to poor class attendance or perhaps poor time
management, you will adjust your actions to improve your class
attendance and time management. If in the second test you
obtain 70%, you will know that your efforts at improving your
attendance or time management was successful and you will
continue to attend classes and manage your time effectively to
achieve success in future assessments.
5 Information Systems In
Organisations
Information systems can be designed in such a way that they
support the various functional areas of an organisation.
According to The Law Dictionary (n.d.), a functional area within
an organisation can be seen as a group of people who perform
the same work. Examples of the functional areas within an
organisation can therefore include manufacturing, IT, human
resources, logistics etc.
• Ordering decisions;
• Product cost calculations;
• Space utilisation;
• Decisions related to tenders; and
• Decisions in relation to price changes and discounts.
• Budget allocations;
• Capital investment risk management;
• The monitoring of cost trends;
• The managing of cash flows; and
• Determining portfolio structures.
6.3 Focus
A focus strategy is one in which an organization focuses on a
specific segment of a market in order to achieve a cost or
differentiation strategy (Bidgoli, 2017).
• Buyer Power:
• Supplier Power:
9 Activities
9.1 Activity 1
You have been requested to compile a report to non-IT
managers to explain how an information system would benefit a
clothing manufacture business. Draft a basic report outlining
what an IS consist of, and how an IS would be beneficial to the
organisation.
10 Revision Exercises
1. Explain the difference between data and information.
1 Introduction
This learning unit will provide you with a basic understanding of
different types of computer systems and the various
components which enables them to be useful to us in our
everyday lives.
2 Computers Systems
A computer can be considered any machine that accepts data Can a mobile phone be
as input, processes the data that was accepted using pre-written considered a computer?
instructions and provides information as output (Bidgoli, 2017).
• Input devices;
• Main memory (primary memory);
• Secondary storage;
• Central Processing Unit (CPU) and
• Output devices.
The more data that can be carried by a bus at once will impact
the speed of the processing as data travels faster (Wilson &
Johnson, 2005).
2.1.2.1 Speed
AMD set the Guinness World Record for the “Highest Frequency
of a Computer Processor” in 2011 with a record-breaking clock
speed of 8.429GHz (Nguyen, 2011). In other words, this
phenomenal show of force means that the processor at that
given point in time was capable of processing instructions at a
rate of 8.429 billion cycles per second. The AMD Bulldozer-
based FX chip remains unbeaten and is still considered to be
the fastest processor in the world.
2.1.2.2 Accuracy
1 bit A single 1 or 0
8 bits 1 byte or character
210 bytes 1000 bytes/1 kilobyte (KB)
220 bytes 1 000 000 bytes/1 megabyte (MB)
230 bytes 1 000 000 000 bytes/1 gigabyte (GB)
240 bytes 1 000 000 000 000 bytes/1 terabyte (TB)
250 bytes 1 000 000 000 000 000 bytes/1 petabyte (PB)
260 bytes 1 000 000 000 000 000 000 bytes/1 exabyte
(EB)
They are less procedural and even more English-like than the
third-generation languages. Examples: Visual Basic, VB.Net,
Delphi, C++, Java. These languages emphasise what output
results are desired than how programming statements are to be
written. One of the big advantages of object-oriented programs
is that the code is re-usable in a variety of applications, which
speeds up program development.
4 Computer Operations
Computers can perform three basic operations (Bidgoli, 2017):
Note that peripherals is the term used to name all input, output,
and secondary devices that are part of the computer system.
The ports and connectors are used for establishing links
between the computer and peripherals.
The main memory stores program instructions and data that are
waiting to be processed in the CPU of the computer.
The various parts of the computer inside the tower (case or box)
are mostly placed on a board called the motherboard.
The unit of data storage is binary digits or “bits”. A bit can have
two values: either 0 or 1, originating from the state of an
electronic element, which can either be switched off or on.
Magnetic disks are coated with iron oxide; they can be thin
metallic platters (hard disks) or Mylar film (diskettes). As with
magnetic tape, magnetic disks represent bits using small
magnetised areas. When reading from or writing to a disk, the
disk’s read/write head can go directly to the desired piece of
data. Thus, the disk is a direct-access storage medium.
Because direct access allows fast data retrieval, this type of
storage is ideal for companies that need to respond quickly to
customer requests, such as airlines and credit card firms.
Among storage devices, one can distinguish between Which secondary storage
removable devices and non-removable devices. In the former devices are you making
case, a storage device containing data can be removed from use of as a student?
one computer and then be loaded into another computer.
6 Classes Of Computers
Computers, in general can be classified in terms of cost, amount
of memory, speed and sophistication (Bidgoli, 2017). Based on
this criterion, computers can be classified as belonging to one
of the following classes (Bidgoli, 2017):
• Supercomputers;
• Mainframes;
• Minicomputers;
• Personal computers;
• Notebooks; and
• Subnotebooks.
6.1 Supercomputers
Supercomputers are the most powerful computers with the
fastest processing speed and highest performance. They are
special-purpose machines designed for applications that require
extensive and rapid computational capabilities. Examples of
applications are for global weather forecasting, military defence
systems, etc. They are powerful machines and consist of
multiple processors.
6.2 Mainframes
These are large computers frequently used in large
organisations. They are able to process millions of instructions
per second and are designed to handle information processing
for corporate institutions and government departments with
many employees and customers. They can also be used as
business computing platforms, for data mining and warehousing
and electronic commerce applications (O’ Brien, 2002 and 2005,
cited in The IIE, 2019). These machines are very expensive and
can cost millions. Mainframes are mainly used for centralised
data processing.
6.3 Minicomputers
A minicomputer is a class of computers which is less powerful
than a mainframe, but more powerful than a personal computer
(microcomputer) (Technopedia, n.d). The term ‘minicomputer’
and its use has diminished and was merged with the term server
as minicomputers are mainly used as servers (Technopedia,
n.d).
6.5 Notebooks
A notebook, otherwise known as a laptop, is a variation of a
personal computer. It is powered by both a battery and ordinary
electric power supply which means that if the battery is charged, What uses can you identify
one does not need to have the computer plugged into an electric for a notebook?
power supply (Rouse, n.d).
What distinguishes them from ordinary personal computer is If asked for advice by
their portability. These notebooks can conveniently be used on another student, would you
airplanes, libraries, temporary offices and at meetings (Rouse, advise them to purchase a
n.d.). Notebook computers are much smaller than ordinary desktop or a laptop? Why?
desktop personal computers but have the same capabilities as
desktop personal computers (Rouse, n.d).
7 Types of Software
Bidgoli (2017) distinguishes between two main types of
software, namely Operating System Software and Application
Software.
You have been tasked with the job of finding suitable hardware,
software and Internet options to revamp the technology
infrastructure of the company.
10 Activities
10.1 Activity 1
A young entrepreneur decided to start his own software
development company. The entrepreneur wants only the best
and latest technologies to be installed at the new company.
11 Revision Exercises
1. By referring to the components of a computer system,
explain why your cell phone can be considered a
computer system.
6. Identify one input, one output and one storage device that
you as a student make use of when interacting with a
computer during your studies.
1 Introduction
For surviving in a competitive business world, it is imperative for
organisations to optimise the usage of an asset such as
information in an effective way. A DBMS can contribute to the
satisfaction of this requirement. In such a system, the database
contains the data/information, while a collection of software
tools supporting the management of the data and information
forms part of the DBMS.
Customer Table
Order Table
From these two tables we can see that Cust01, who is John
Doe, placed two orders with the company.
The physical view deals with how data is physically (i.e. actually)
arranged, stored and accessed on some type of secondary
devices such as magnetic disc, CD-ROM (The IIE, 2019). This
view is being used by programmers and developers of DBMS
systems, in order to make changes to existing databases and to
create new databases (The IIE, 2019).
The logical data view focuses on how the users need the data
to be arranged (The IIE, 2019).
Various data models are currently in use, they are as follow (The
IIE, 2019):
• Relational;
• Multidimensional;
• Object-oriented;
• Relational object-oriented.
When working with relational databases, it is essential that one Why would a field such as
specifies a primary key for the table. A primary key is a field, of name or surname not be
which the value can be used to uniquely identify a record considered good
(Bidgoli, 2017). When one considers the employee table candidates for primary
provided above, one can identify the primary key for the table keys?
as ‘Customer Number’ because all the customer numbers are
unique to each customer.
Customer Table
Order Table
Result – Example 1:
Result – Example 2:
Customer Name Customer Surname
Jane Doe
Result – Example 3:
4.1.2 Normalisation
Although a variety of reasons exist for making use of a What potential security
distributed database, one very big concern exists for these risks exists with the use of
databases, namely security and the maintenance of such a distributed database?
(Bidgoli, 2017).
5.2.1 Fragmentation
Fragment 1:
Fragment 2:
Fragment 1:
StNumber StDiscipline
12345 IT
67890 Art
45678 IT
Fragment 2:
5.2.2 Replication
5.2.3 Allocation
The grouping of the data and the procedures that act on the data
is known as encapsulation (Bidgoli, 2017).
6 Data Warehouses
A data warehouse can be considered a collection of data, from
different sources, which has been collected for the purpose of
supporting decision-making and generating business
intelligence (Bidgoli, 2017).
• The data will be subject oriented i.e. the data will share a
common area of focus necessary for decision making and
generating business intelligence in a specific area of the
business (Bidgoli, 2019);
• The data will not have a single origin, but will in fact have
been collected from many sources (Bidgoli, 2019);
6.2.1 Input
6.2.2 ETL
6.2.3 Storage
6.2.4 Output
7 Data Marts
A data mart is a subset of a data warehouse and as such
represents a smaller version of the data warehouse (Bidgoli,
2017). Data marts typically supports a specific functional area
of a business and have the following advantages over data
warehouses (Bidgoli, 2017):
8 Business Analytics
In earlier sections, business intelligence was discussed.
Business intelligence is about understanding the current
situation an organization might find themselves in, given the
available data (Bidgoli, 2017). Business Analytics on the other
hand looks to the future and what might possibly happen in the
future (Bidgoli, 2017). Business Analytics (BA) makes use of
statistical methods to gain insight into data that will aid decision
makers in taking action (Bidgoli, 2017).
12 Activities
12.1 Activity 1
You have been requested to compile a report to non-IT
managers to explain how an information system would benefit a
clothing manufacture business. Draft a basic report outlining
what an IS comprises, and how an IS would be beneficial to the
organisation.
13 Revision Exercises
1. Explain the different ways of viewing data in a DBMS.
Physical view:
Logical view:
This data view focuses on how the users need the data to
be arranged.
2.1
STUDENT table
Student no. Name Marks
120 John 60
121 Francois 75
122 Brown 90
2.2
ASSIGNMENT table
Assignment type Student no.
A 120
B 121
C 122
2.3
2.5
Student no. Marks
120 60
121 75
122 90
1 Introduction
This learning unit will discuss the importance of data
communication systems in delivering much needed information
to decision makers. These decision makers are not only those
individuals in organizations who are responsible for guiding the
actions of an organisation, but also us as individuals, who rely
on data to make decisions in our everyday lives.
4 Processing Configurations
The user’s needs will determine how data communication
systems will be configured (Bidgoli, 2017). The various
configurations will be discussed below.
5 Types Of Networks
There are three major types of networks, namely local area
networks (LANs), wide area networks (WANs) and metropolitan
area networks (MANs) (Bidgoli, 2017).
6 Network Topologies
A network topology describes the physical layout of a network
(Bidgoli, 2017). This section will describe the most prevalent
topologies in use.
The star topology does have some short comings which Bidgoli
(2017) points out to be the following:
7.2 Routing
Routing refers to the decision taken about the path that a data
packet will take over a network in order to reach its destination
(Bidgoli, 2017). In most cases, this decision is based on the
information contained in a routing table, which specifies the best
possible route for a packet (Bidgoli, 2017).
7.3 Routers
A router is a device that connects network systems and controls
the data traffic which flows between them (Bidgoli, 2017). These
devices are capable of choosing the best possible path for a
packet to follow based on distance or cost (Bidgoli, 2017).
Routers can prevent bottlenecks and deal with packets of
different sizes (Bidgoli, 2017).
• Mobility;
• Flexibility;
• Ease of installation; and
• Low cost.
WLANs:
WWANs:
© The Independent Institute of Education (Pty) Ltd 2022 Page 100 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
• E-Commerce;
• Entertainment;
• Video conferencing;
• E-Learning.
© The Independent Institute of Education (Pty) Ltd 2022 Page 101 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 102 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
12 Revision Exercises
1. Identify three ways in which a data communication system
can benefit an organisation.
© The Independent Institute of Education (Pty) Ltd 2022 Page 103 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Computer
1 Computer
3
HUB
Computer
2
© The Independent Institute of Education (Pty) Ltd 2022 Page 104 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
1 Introduction
This learning unit will introduce you to a variety of internet and
web technologies and introduce you to different concepts that
support the use of internet and web technologies.
© The Independent Institute of Education (Pty) Ltd 2022 Page 105 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 106 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
http://www.musica.co.za
Indicates the web Indicates the
server domain country
© The Independent Institute of Education (Pty) Ltd 2022 Page 107 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 108 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
• Step 1: The search engine will perform “crawl” the web for
information by making use of special software termed web
crawlers, spiders or bots. This process takes place on a
continuous basis to ensure that search engines always
have access to the latest information on the web.
• Step 2: Indexing is the second step performed by a search
engine. All the information retrieved through the process
of web crawling is indexed according to the keywords
appearing in the information retrieved. Indexing makes it
possible for search engines to retrieve all relevant Web
pages when a search term is entered.
• Step 3: After the web crawlers have gathered the
information from the web and indexing has taken place,
the index will be searched for the particular keyword to
identify relevant web pages and present them to the user.
© The Independent Institute of Education (Pty) Ltd 2022 Page 109 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
4 Internet Services
Many services are made available through the Internet (Bidgoli,
2017). Many of these services are made possible by the TCP
suite of protocols (Bidgoli, 2017).
4.1 E-Mail
E-mail is one of the most widely used services provided by the
Internet (Bidgoli, 2017). As a student, for example will use this
service to communicate with their lecturers, other students and
the academic institution in general. Companies use this service What advantages do the
to facilitate communication amongst employees and between use of e-mail hold for
the company and its customers (Bidgoli, 2017). companies?
© The Independent Institute of Education (Pty) Ltd 2022 Page 110 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 111 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
5 Web Applications
Web applications can be used, in a cost effective way, to deliver
a wide range of services to customers in a way that is
convenient for the customer (Bidgoli, 2017). In this section,
various uses of web applications will be described.
5.2 Publishing
Several publishers are making use of web applications to
advertise forthcoming attractions, support online ordering and
aid users in searching for books on particular topics or books
written by particular authors (Bidgoli, 2019).
© The Independent Institute of Education (Pty) Ltd 2022 Page 112 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
• www.remax.co.za
• www.kwsouthafrica.co.za
• www.privateproperty.co.za
© The Independent Institute of Education (Pty) Ltd 2022 Page 113 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
5.5 Employment
Various web sites offer updated listings of employment
opportunities as well as advice for jobseekers (Bidgoli, 2017).
6 Intranets
Intranets are private networks within organizations that make
use of Internet protocols and technologies to assist them in
collecting, storing and distributing information that helps support
the operations of the business (Bidgoli, 2017).
© The Independent Institute of Education (Pty) Ltd 2022 Page 114 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Intranets:
Internet:
© The Independent Institute of Education (Pty) Ltd 2022 Page 115 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
7 Extranets
A growing number of companies offer limited access to their
private corporate network for selected customers and suppliers
(The IIE, 2019). Such networks are referred to as extranets; they
connect people who are external to the company (The IIE,
2019). An extranet is a network that links selected resources of
the intranet of a company with its customers, suppliers, or other
business partners (The IIE, 2019). Again, an extranet is built
around Web technologies (The IIE, 2019). Security and
performance concerns are different for an extranet than for a
website or network-based intranet (The IIE, 2019). User
authentication and privacy are critical on an extranet so that
information is protected. Obviously, the network must perform
well to provide quick response to customers and suppliers (Stair
and Reynolds, 2010: 300, cited in The IIE, 2019).
© The Independent Institute of Education (Pty) Ltd 2022 Page 116 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Web 2.0 brought with it a trend to make the Web more Which Web 2.0
interactive with collaboration and social networking representing technologies are you
the key focus areas of this era (Bidgoli, 2017). Web 2.0 includes currently making use of?
the following technologies (Bidgoli, 2017):
© The Independent Institute of Education (Pty) Ltd 2022 Page 117 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 118 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 119 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
12 Revision Exercises
1. Briefly explain the difference between the Internet and the
World Wide Web.
© The Independent Institute of Education (Pty) Ltd 2022 Page 120 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
© The Independent Institute of Education (Pty) Ltd 2022 Page 121 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Bibliography
ASCII-Code. 2019. ASCII Code – The extended ASCII table. [Online]. Available at:
https://www.ascii-code.com [Accessed 20 November 2020].
Cited in: The IIE. 2019. Business Information Systems [BUIS6112 Module Manual].
The Independent Institute of Education: Unpublished.
Kemp, S. 2019. Digital Trends 2019: Every single stat you need to know about the
Internet. [Online]. Available at:
https://thenextweb.com/contributors/2019/01/30/digital-trends-2019-every-single-stat-
you-need-to-know-about-the-internet/ [Accessed 20 November 2020].
Knapp, M. 2016. 9 Key Things To Know Before You Buy A New Computer, [Online].
Available at: http://www.cheatsheet.com/technology/9-tips-for-picking-your-machine-
computer-shopping-cheat-sheet.html/?a=viewall [Accessed 20 November 2020].
Cited in: The IIE. 2019. Business Information Systems [BUIS6112 Module Manual].
The Independent Institute of Education: Unpublished.
© The Independent Institute of Education (Pty) Ltd 2022 Page 122 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
O’Brien, J.A. 2005. Introduction to information Systems. 3rd ed. Irwin/McGraw Hill.
Cited in: The IIE. 2019. Business Information Systems [BUIS6112 Module Manual].
The Independent Institute of Education: Unpublished.
Peshin, A. 2017. What is the range of Bluetooth and how can it be extended?
[Online]. Available at: https://www.scienceabc.com/innovation/what-is-the-range-of-
bluetooth-and-how-can-it-be-extended.html [Accessed 20 November 2020].
Purcell, J. 2015. What are the most popular programming languages and their uses?
[Online]. Available at: https://www.quora.com/What-are-the-most-popular-
programming-languages-and-their-uses [Accessed 20 November 2020].
Shelly, Gary et al. 2007. Discovering computers, Fundamentals. 3rd ed. Thomson
Course Technology, Boston Massachusetts. Cited in: The IIE. 2019. Business
Information Systems [BUIS6112 Module Manual]. The Independent Institute of
Education: Unpublished.
© The Independent Institute of Education (Pty) Ltd 2022 Page 123 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Stair, RM and Reynolds. 2006. Principles of Information Systems. 7th ed. Canada:
Course Technology. Cited in: The IIE. 2019. Business Information Systems
[BUIS6112 Module Manual]. The Independent Institute of Education: Unpublished.
Stair, RM. and Reynolds. 2010. Fundamentals of Information Systems. 5th ed. Boston
(MA): Course Technology. Cited in: The IIE. 2019. Business Information Systems
[BUIS6112 Module Manual]. The Independent Institute of Education: Unpublished.
Stair, RM and Reynolds. 2012. Principles of Information Systems. 10th ed. Boston
(MA): Course Technology. Cited in: The IIE. 2019. Business Information Systems
[BUIS6112 Module Manual]. The Independent Institute of Education: Unpublished.
Telekom. 2019. What is 5G? Some basic information on the network of the future.
[Online]. Available at: https://www.telekom.com/en/company/details/what-is-5g-basic-
information-on-the-network-of-the-future-542354 [Accessed 20 November 2020].
The IIE. 2019. Business Information Systems [BUIS6112 Module Manual]. The
Independent Institute of Education: Unpublished.
Wilson, T.V. and Johnson, R. 2005. Bus Speed. [Online]. Available at:
https://computer.howstuffworks.com/motherboard4.htm [Accessed 16 November
2020].
© The Independent Institute of Education (Pty) Ltd 2022 Page 124 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Intellectual Property
Plagiarism occurs in a variety of forms. Ultimately though, it refers to the use of the
words, ideas or images of another person without acknowledging the source using the
required conventions. The IIE publishes a Quick Reference Guide that provides more
detailed guidance, but a brief description of plagiarism and referencing is included
below for your reference. It is vital that you are familiar with this information and the
Intellectual Integrity Policy before attempting any assignments.
‘Plagiarism’ is the act of taking someone’s words or ideas and presenting them as your
own.
What is ‘Referencing’?
‘Referencing’ is the act of citing or giving credit to the authors of any work that you
have referred to or consulted. A ‘reference’ then refers to a citation (a credit) or the
actual information from a publication that is referred to.
Referencing is the acknowledgment of any work that is not your own, but is used by
you in an academic document. It is simply a way of giving credit to and acknowledging
the ideas and words of others.
When writing assignments, students are required to acknowledge the work, words or
ideas of others through the technique of referencing. Referencing occurs in the text at
the place where the work of others is being cited, and at the end of the document, in
the bibliography.
The bibliography is a list of all the work (published and unpublished) that a writer has
read in the course of preparing a piece of writing. This includes items that are not
directly cited in the work.
• Quote directly: when you use the exact words as they appear in the source;
• Copy directly: when you copy data, figures, tables, images, music, videos or
frameworks;
• Summarise: when you write a short account of what is in the source;
• Paraphrase: when you state the work, words and ideas of someone else in your
own words.
© The Independent Institute of Education (Pty) Ltd 2022 Page 125 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
It is standard practice in the academic world to recognise and respect the ownership
of ideas, known as intellectual property, through good referencing techniques.
However, there are other reasons why referencing is useful.
Sources
• Books,
• Chapters from books,
• Encyclopaedias,
• Articles,
• Journals,
• Magazines,
• Periodicals,
• Newspaper articles,
• Items from the Internet (images, videos, etc.),
• Pictures,
• Unpublished notes, articles, papers, books, manuscripts, dissertations, theses,
etc.,
• Diagrams,
• Videos,
• Films,
• Music,
• Works of fiction (novels, short stories or poetry).
What You Need to Document from the Hard Copy Source You
are Using
(Not every detail will be applicable in every case. However, the following lists provide
a guide to what information is needed.)
© The Independent Institute of Education (Pty) Ltd 2022 Page 126 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Referencing Systems
There are a number of referencing systems in use and each has its own consistent
rules. While these may differ from system-to-system, the referencing system followed
needs to be used consistently, throughout the text. Different referencing systems
cannot be mixed in the same piece of work!
© The Independent Institute of Education (Pty) Ltd 2022 Page 127 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Usually, all of the above examples would not be referenced. The equation 𝐸 = 𝑚𝑐 2
is Einstein’s famous equation for calculations of total energy and has become so
familiar that it is not referenced to Einstein.
Sometimes what we think is ‘common knowledge’, is not. For example, the above
statement about the sky being blue is only partly true. The light from the sun looks
white, but it is actually made up of all the colours of the rainbow. Sunlight reaches the
Earth's atmosphere and is scattered in all directions by all the gases and particles in
the air. The smallest particles are by coincidence the same length as the wavelength
of blue light. Blue is scattered more than the other colours because it travels as shorter,
smaller waves. It is not entirely accurate then to claim that the sky is blue. It is thus
generally safer to always check your facts and try to find a reputable source for your
claim.
If you fail to acknowledge the work or ideas of others or do so inadequately this will be
handled in terms of the Intellectual Integrity Policy (available in the library) and/ or the
Student Code of Conduct – depending on whether or not plagiarism and/ or cheating
(passing off the work of other people as your own by copying the work of other students
or copying off the Internet or from another source) is suspected.
Your campus offers individual and group training on referencing conventions – please
speak to your librarian or ADC/ Campus Co-Navigator in this regard.
© The Independent Institute of Education (Pty) Ltd 2022 Page 128 of 129
IIE Module Manual BUIS6122/d/p/w/ BUIS6112/d/p/w/ BUIS5111/d/p/w/ BUIS112
Please ask for assistance prior to submitting work if you are at all unsure.
© The Independent Institute of Education (Pty) Ltd 2022 Page 129 of 129