Complete Lecture Notes For MAT 615 Accou
Complete Lecture Notes For MAT 615 Accou
A. COURSE DESCRIPTION
Computer is an information processor capable of performing some computations, including
numerous arithmetical and logic operations without human intervention. Therefore, there is need
to prepare Accounting students for practical application of computer in various aspects of
accounting. This course is, therefore, designed to introduce students to the history of computer,
system theory, system design and analysis, data network, file structure and file organization,
principles of data design, essential elements of accounting information, data manipulation and
administration, methods of data collection, data coding and output, principles of programme
stored instructions and languages, models and structured programmes, memory and backing
store, input and output devices and data communication.
B.COURSE OBJECTIVES
The main objective of this course is to introduce students to accounting information system. It is
expected that on completion of this course, the students should be able to:
i) understand the definition of computer, its historical development and generations;
ii) know the different types of computers and their uses and application in business;
iii) understand computer input and output devices;
iv) appreciate the relevance of system theory in Accounting information;
v) understand system analysis and design;
vi) learn the basic elements of data communication system and identify different types of
network;
vii) describe communication protocols and data transmission modes;
viii) explain the use of computer network and describe different components of computer
network;
ix) explain the types of data network, and communication;
x) understand the principles of file structure and file organization;
xi) appreciate the principles of data design;
xii) learn the essential elements of accounting information;
xiii) understand data manipulation and administration;
Page 1 of 64
xiv) explain methods of data collection;
xv) explain the types of data coding and output;
xvi) appreciate the principles of programme stored instructions and languages;
xvii) explain models and structured programmes;
xviii) understand memory and backing store; and
xix) explain computer input and output devices.
C. COURSE CONTENTS
1. History and Development of Computer Technology (1st Week)
1.1 Introduction
1.2 Evolution of Computer
2. Generations of Computers (2nd Week)
2.1 First Generation Computers (1940-1955)-Vacuum Tubes
2.2 Second Generation Computers (1956-1963)-Transistors
2.3 Third Generation Computers (1964-1971)-Integrated Circuits
2.4 Fourth Generation Computers (1972-2010)-Microprocessors
2.5 Fifth Generation Computers (2011-Beyond)-Artificial Intelligence
3. Why and How of Computers (3rd Week)
3.1 Basic Computer Operations
3.2 Functional Units of the Computer
3.2.1 Arithmetic Logical Unit (ALU)
3.2.2 Control Unit (CU)
3.2.3 Central Processing Unit (CPU)
4. Classification of Computers (4th Week)
4.1 Purpose Based Classification (General and Specific Purpose Computers)
4.2 Functionality Based Classification (Analog, Digital and Hybrid Computers)
4.3 Size Based Classification (Super, Mainframe, Mini and Micro Computers)
4.4 Model Based Classification (XT, AT and PS/2 Computers)
4.5 Brand Based Classification (IBM, IBM Compatible and Apple Macintosh Computers)
5. Computer Input and Output Devices (5th Week)
5.1 Computer Input Devices
5.2 Computer Output Devices
5.3 Computer Input-Output Devices
6. Computer Data (6th Week)
6.1 Nature Data
6.2 Speed of Data
6.3 Data Capture
6.4 Methods of Data
7. System Theory (7th Week)
7.1 Introduction
7.2 System Environment
7.3 Sub-systems
7.4 Coupling and Decoupling of Systems i. e. (Integration and Disintegration)
7.5 Components of a System
7.6 Types of Systems
7.7 Classification of Open Systems
7.8 Control Systems
Page 2 of 64
7.8.1 Elements of Control
7.8.2 Types of Control Systems
7.8.3 Feedback Control System
7.8.4 Feedforward control system
8. System Design and Analysis (8th Week)
8.1 System Analysis
8.2 System Design
9. Data Transmission and Validation (8th Week)
9.1 Data Transmission
9.2 Data Validation
10. Data Communication and Networking (9th Week)
10.1 Introduction
10.2 Data Communication
10.3 Communication Media
10.4 Types of Communication Services
10.5 Types of Communication Services
10.6 Computer Network
10.7 Benefits of Network
10.8 Types of Network
10.9 Important Terms Used In Networking
10.10 Teleconferencing
11. Memory and Backing Store (10th Week)
11.1 Main memory
11.2 ROM and RAM
11. 3 Memory Sizes
11.4 Backing Storage Devices
11.5 Relationship between the Backing Store and the Main Memory
12. File Organization and Structure (11th Week)
12.1 Types of File Organization
12.2 Type of File
13. Principles of Data Design (12th Week)
13.1 Database Design
13.2 Determining Data to be Stored
13.3 Determining Data Relationship
13.4 Logically Structuring Data
13.5 Design Process foe Microsoft Access
13.6 Normalization
13.7 Schema refinement
13.8 Physical design
14. Essential Elements of Accounting Information (13th Week)
14.1 The Concept of Accounting
14.2: Information System
14.3 An accounting information system (AIS)
14.4 Qualities of Good Accounting Information
15. Data Coding (14th Week)
15.1 AIS and Data Coding
15.2 A System without Codes
Page 3 of 64
15.3 A System with Codes
15.4 Computer Coding and Types of Codes
16. Revision /General Overview (15th Week)
13. Revision /General Overview (15th Week)
Page 4 of 64
E. COURSE REQUIREMENTS
Every student is required to attend the class regularly and participate actively in group
discussions and study group activities. Attendance at lecture is compulsory and at least 75%
attendance record is mandatory for a student to qualify to sit for the end of semester
examination. Students are also expected to sign up for an email account for effective e–
discussions.
G. BREAK-DOWN OF GRADING
The continuous assessment marks are to be absorbed through snap test (s) to be given without
notice, scheduled test (s) and/or paper presentation.
Page 5 of 64
1. HISTORY AND DEVELOPMENT OF COMPUTER TECHNOLOGY
1.1 Introduction
The term computer is derived from the Latin term ‘computare’, this means to calculate or
programmable machine. A computer is a set of electronic device that can systematically and
sequentially follow a set of instructions called a program to perform high-speed arithmetic and
logical operations on data. Nothing epitomizes modern life better than the computer. In other
words, a computer is an advanced electronic device that takes raw data as input from the user
and processes these data under the control of set of instructions (called program) and gives the
result (output) and saves output for the future use. It can process both numerical and non-
numerical (arithmetic and logical) calculations.
Today computers do much more than simply computing: supermarket scanners calculate grocery
bill while keeping store inventory; and Automated Teller Machines (ATM) let us conduct
banking transactions from virtually anywhere in the world. But where did all this technology
come from and where is it heading to? To fully understand and appreciate the impact computers
have on accounting and promises they hold for the future, it is important to understand its
historical evolution.
In 1642, Blaise Pascal (1623-1662), the 18-year-old son of a French tax collector, invented
what he called a numerical wheel calculator (popularly known as the Pascaline) to help his
father with his duties. This brass rectangular box, called the Pascaline, used eight movable dials
to add sums up to eight figures long only. Pascal's device used a base of ten to accomplish this.
The drawback to the Pascaline, however, was its limitation to addition and its inability to
perform other arithmetic operations of multiplication, division and subtraction.
Figure II: Pascaline
Page 6 of 64
In 1694, a German mathematician and philosopher, Gottfried Wilhem von Leibniz (1646-1716),
improved the Pascaline by creating a machine that could also multiply. Like its predecessor,
Leibniz's mechanical multiplier worked by a system of gears and dials. Partly by studying
Pascal's original notes and drawings, Leibniz was able to refine his machine. It was not until
1820, however, that mechanical calculators gained widespread use. Charles Xavier Thomas de
Colmar, a Frenchman, invented a machine that could perform the four basic arithmetic
functions. Colmar's mechanical calculator, the arithometer, presented a more practical
approach to computing because it could add, subtract, multiply and divide. With its enhanced
versatility, the arithometer was widely used up until the First World War. Although later
inventors refined Colmar's calculator, together with fellow inventors Pascal and Leibniz, he
helped define the age of mechanical computation.
Figure III. Leibniz Machine
The real beginnings of computers as we know them today, however, lay with an English
mathematics professor, Charles Babbage (1791-1871) who is called the "Grand Father" of the
computer. Frustrated at the many errors he found while examining calculations for the Royal
Astronomical Society, Babbage begun the automation of computers by 1812. Babbage noticed a
natural harmony between machines and mathematics: machines were best at performing tasks
repeatedly without mistake; while mathematics, particularly the production of mathematics
tables, often required the simple repetition of steps. The problem centered on applying the
ability of machines to the needs of mathematics. Babbage's first attempt at solving this problem
was in 1822 when he proposed a machine to perform differential equations, called a Difference
Engine. After working on the Difference Engine for 10 years, Babbage was suddenly inspired to
begin work on the first general-purpose computer, which he called the Analytical Engine.
Babbage's assistant, Augusta Ada King, Countess of Lovelace (1815-1842) was instrumental in
the machine's design. One of the few people who understood the Engine's design as well as
Babbage, she helped revise plans, secure funding from the British government, and
communicate the specifics of the Analytical Engine to the public. Also, Lady Lovelace's fine
understanding of the machine allowed her to create the instruction routines to be fed into the
computer, making her the first female computer programmer. In the 1980's, the U.S. Defense
Department named a programming language ADA in her honor.
Figure IV. Babbage Machine (the Analytical Engine)
Page 7 of 64
Babbage's engine outlined the basic elements of a modern general purpose computer and was a
breakthrough concept. Consisting of over 50,000 components, the basic design of the Analytical
Engine included input devices in the form of perforated cards containing operating instructions
and a "store" for memory of 1,000 numbers of up to 50 decimal digits long. It also contained a
"mill" with a control unit that allowed processing instructions in any sequence, and output
devices to produce printed results.
In 1889, an American inventor, Herman Hollerith (1860-1929) found a faster way to compute
the U.S. census. The previous census in 1880 had taken nearly seven years to count and with an
expanding population, the bureau feared it would take 10 years to count the latest census.
Unlike Babbage's idea of using perforated cards to instruct the machine, Hollerith's method used
cards to store data information which he fed into a machine that compiled the results
mechanically. Instead of ten years, census takers compiled their results in just six weeks with
Hollerith's machine. In addition to their speed, the punch cards served as a storage method for
data and they helped reduce computational errors. Hollerith brought his punch card reader into
the business world, founding Tabulating Machine Company in 1896, later to become
International Business Machines (IBM) in 1924 after a series of mergers.
Figure V. Hollerith Machine
In the ensuing years, several engineers made other significant advances. Vannevar Bush (1890-
1974) developed a calculator for solving differential equations in 1931. The machine could
solve complex differential equations that had long left scientists and mathematicians baffled.
Similarly, John V. Atanasoff, a professor at Iowa State College (now called Iowa State
University) and his graduate student, Clifford Berry, envisioned an all-electronic computer that
applied Boolean algebra to computer circuitry. By extending this concept to electronic circuits in
the form of on or off, Atanasoff and Berry had developed the first all-electronic computer by
1940. Their project, however, lost its funding and their work was overshadowed by similar
developments by other scientists.
2. GENERATIONS OF COMPUTERS
The history of the computer goes back several decades however and there are five definable
generations of computers. Each generation is defined by a significant technological development
that changes fundamentally how computers operate-leading to more compact, less expensive,
but more powerful, efficient and robust machines. The following are the five generations of
computers.
Page 8 of 64
strides in developing powerful computers. In 1943, the British completed a secret code-breaking
computer called Colossus to decode German messages. The Colossus's impact on the
development of the computer industry was rather limited for two important reasons. First,
Colossus was not a general-purpose computer; it was only designed to decode secret messages.
Second, the existence of the machine was kept secret until decades after the war. American
efforts produced a broader achievement. Howard H. Aiken (1900-1973), a Harvard engineer
working with IBM, succeeded in producing an all-electronic calculator by 1944. The purpose of
the computer was to create ballistic charts for the U.S. Navy.
It was about half as long as a football field and contained about 500 miles of wiring. The
machine was slow (taking 3-5 seconds per calculation) and inflexible (in that sequences of
calculations could not change); but it could perform basic arithmetic as well as more complex
equations.
Another computer development spurred by the war was the Electronic Numerical Integrator and
Computer (ENIAC), produced by a partnership between the U.S. government and the University
of Pennsylvania. Consisting of 18,000 vacuum tubes, 70,000 resistors and 5 million soldered
joints, the computer was such a massive piece of machinery that it consumed 160 kilowatts of
electrical power, enough energy to dim the lights in an entire section of Philadelphia.
Developed by John Presper Eckert (1919-1995) and John W. Mauchly (1907-1980), ENIAC,
unlike the Colossus it was a general-purpose computer that computed at high speed.
In the mid-1940's John von Neumann (1903-1957) joined the University of Pennsylvania team
and designed the Electronic Discrete Variable Automatic Computer (EDVAC) in 1945 with a
memory to hold both a stored program as well as data. The key element to the von Neumann
architecture was the central processing unit, which allowed all computer functions to be
coordinated through a single source. In 1951, the UNIVAC I (Universal Automatic Computer),
Page 9 of 64
built by Remington Rand, became one of the first commercially available computers to take
advantage of these advances.
These early computers used vacuum tubes as circuitry and magnetic drums for memory as a
result taking up entire rooms and costing a fortune to run. These were inefficient materials
which generated a lot of heat, sucked huge electricity and subsequently generated a lot of heat
which caused ongoing breakdowns. These first generation computers relied on ‘machine
language’ (which is the most basic programming language that can be understood by
computers). These computers were limited to solving one problem at a time. Input was based on
punched cards and paper tape. Output came out on print-outs. The two notable machines of this
era were the UNIVAC and ENIAC machines – the UNIVAC is the first every commercial
computer which was purchased in 1951 by a business – the US Census Bureau.
Throughout the early 1960's, there were a number of commercially successful second
generation computers used in business, universities, and government from companies such as
Burroughs, Control Data, Honeywell, IBM, Sperry-Rand, and others. These second generation
computers contained all the components associated with the modern day computer: printers,
tape storage, disk storage, memory, operating systems, and stored programs. One important
example was the IBM 1401, which was universally accepted throughout industry, and is
considered by many to be the Model T of the computer industry. By 1965, most large business
routinely processed financial information using second generation computers. More
sophisticated high-level languages such as COBOL (Common Business-Oriented Language)
Page 10 of 64
and FORTRAN (Formula Translator) came into common use during this time, and have
expanded to the current day. These languages replaced binary machine code with words,
sentences, and mathematical formulas, making it much easier to program a computer. New types
of careers (programmer, analyst, and computer systems expert) and the entire software industry
began with second generation computers. The second generation computers were smaller,
faster, cheaper and less heavy on electricity use. They still relied on punched card for
input/printouts. Transistor-driven machines were the first computers to store instructions into
their memories – moving from magnetic drum to magnetic core ‘technology’.
Such condensed power allowed everyday people to harness a computer's power. They were no
longer developed exclusively for large business or government contracts. By the mid-1970's,
computer manufacturers sought to bring computers to general consumers. These minicomputers
came complete with user-friendly software packages that offered even non-technical users an
array of applications, most popularly word processing and spreadsheet programs. Pioneers in
this field were Commodore, Radio Shack and Apple Computers. In the early 1980's, arcade
video games such as Pac Man and home video game systems such as the Atari 2600 ignited
consumer interest for more sophisticated, programmable home computers.
In 1981, IBM introduced its Personal Computer (PC) for use in the home, office and schools.
The 1980's saw an expansion in computer use in all three arenas as clones of the IBM PC made
the personal computer even more affordable. The number of personal computers in use more
than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were
being used. Computers continued their trend toward a smaller size, working their way down
Page 11 of 64
from desktop to laptop computers (which could fit inside a briefcase) to palmtop (able to fit
inside a breast pocket). In direct competition with IBM's PC was Apple's Macintosh line,
introduced in 1984. Notable for its user-friendly design, the Macintosh offered an operating
system that allowed users to move screen icons instead of typing instructions. Users controlled
the screen cursor using a mouse, a device that mimicked the movement of one's hand on the
computer screen.
As computers became more widespread in the workplace, new ways to harness their potential
developed. As smaller computers became more powerful, they could be linked together, or
networked, to share memory space, software, information and communicate with each other. As
opposed to a mainframe computer, networked computers allowed individual computers to form
electronic co-ops. Using either direct wiring, called a Local Area Network (LAN), or telephone
lines, these networks could reach enormous proportions. A global web of computer circuitry, the
Internet, for example, links computers worldwide into a single network of information. The two
most popular use of computer for networks today are the Internet and electronic mail, or E-mail,
which allow users to send messages through networked terminals across the office or across the
world.
What filled a room in the 1940s now fit in the palm of the hand. The Intel chip housed
thousands of integrated circuits. The year 1981 saw the first ever computer (IBM) specifically
designed for home use and 1984 saw the MacIntosh introduced by Apple. Microprocessors even
moved beyond the realm of computers and into an increasing number of everyday products. The
increased power of these small computers meant they could be linked, creating networks, which
ultimately led to the development, birth and rapid evolution of the Internet. Other major
advances during this period have been the Graphical user interface (GUI), the mouse and more
recently the astounding advances in lap-top capability and hand-held devices.
Computer devices with artificial intelligence are still in development, but some of these
technologies are beginning to emerge and be used such as voice recognition. Leaning to the
future, computers will be radically transformed again by quantum computation, molecular and
nano technology. The essence of fifth generation will be using these technologies to ultimately
create machines which can process and respond to natural language, and have capability to learn
and organise themselves.
Page 12 of 64
3. WHY AND HOW OF COMPUTERS
3.1 Basic Computer Operations
i. Input: This is the process of entering data and programs in to the computer system. The
computer is an electronic machine like any other machine which takes as inputs raw data and
performs some processing giving out processed data. Therefore, the input unit takes data to the
computer in an organized manner for processing.
ii. Storage: The process of saving data and instructions permanently is known as storage. Data
has to be fed into the system before the actual processing starts. It is because the processing
speed of Central Processing Unit (CPU) is so fast that the data has to be provided to CPU with
the same speed. Therefore, the data is first stored in the storage unit for faster access and
processing. The storage unit or the primary storage of the computer system provides space for
storing data and instructions before and after processing and the results of processing.
iii. Processing: The task of performing operations like arithmetic and logical operations is
called processing. The Central Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the instructions given and the type of
data provided. It is then sent back to the storage unit.
iv. Output: This is the process of producing results from the data for getting useful information.
Similarly the output produced by the computer after processing must also be kept somewhere
inside the computer before being given out in human readable form. Again the output is also
stored inside the computer for further processing.
v. Control: Controlling of all operations like input, processing and output are performed by the
control unit. It takes care of step by step processing of all operations inside the computer.
4. CLASSIFICATION OF COMPUTERS
Generally, computers can be classifieds on the basis of purpose, work, size, model and brand.
4.1 Purpose Based Classification
According to purpose, computers are classified into two (2) namely general purpose or specific
purpose computers.
(i) General Purpose Computers: General purpose computers are designed to perform a range
of tasks, provided that the correct instructions are loaded in the computer They have the
ability to store numerous programs, but lack in speed and efficiency.
(ii) Specific Purpose Computers: These are built to solve only one particular task. VCR and
Optical recorders/players, Auto-pilot, Automatic Washing Machines, Mobile Phones, GPS,
etc. will have an embedded computer to control them. The program for these computers is
normally ‘hard coded’ that is built in the machine’s ROM (Read Only Memory).
Embedded systems controlling common appliances are one form of dedicated computers –
they have a CPU, Input Output devices, software stored in ROM and some RAM (Random
Access Memory) as workspace.
Analog computers are widely used for certain specialized engineering and scientific
applications, for calculation and measurement of analog quantities. They are frequently
used to control process such as those found in oil refinery where flow and temperature
measurements are important. They are used for example in paper making and in chemical
industry. Analog computers do not require any storage capability because they measure and
compare quantities in a single operation. Output from an analog computer is generally in
the form of readings on a series of dial (Speedometer of a car) or a graph on strip chart.
(iii) Digital Computers: A Digital Computer, as its name implies, works with digits to
represent numerals, letters or other special symbols. Digital Computers operate on inputs
which are ON-OFF type and its output is also in the form of ON-OFF signal. Normally, an
ON is represented by a 1 and an OFF is represented by a 0. So we can say that digital
computers process information which is based on the presence or the absence of an
electrical charge or we prefer to say a binary 1 or 0.
A digital computer can be used to process numeric as well as non-numeric data. It can
perform arithmetic operations like addition, subtraction, multiplication and division and also
logical operations. Most of the computers available today are digital computers. The most
common examples of digital computers are accounting machines and calculators. The
results of digital computers are more accurate than the results of analog computers. Analog
computers are faster than digital. Analog computers lack memory whereas digital computers
store information. One can therefore say that digital computers count and analog computers
measures.
(iv) Hybrid Computers (Analog + Digital): A combination of computers that are capable
of inputting and outputting in both digital and analog computers. It combines the best
features of both types of computers, i-e. it has the speed of analog computer and the
memory and accuracy of digital computer. Hybrid computers are used mainly in
specialized applications where both kinds of data need to be processed. Therefore, they
help the user, to process both continuous and discrete data. For example a petrol pump
contains a processor that converts fuel flow measurements into quantity and price
values. In hospital Intensive Care Unit (ICU), an analog device is used which measures
patient's blood pressure and temperature etc, which are then converted and displayed in
the form of digits. Hybrid computers for example are used for scientific calculations, in
defense and radar systems.
Page 15 of 64
i) Super Computers: Supercomputers are the fastest and most powerful type of computers
with large storage capacity that are very expensive and are employed for specialized
applications that require immense amounts of mathematical calculations. For example,
weather forecasting requires a supercomputer. Other uses of supercomputers include space
exploration, earthquake studies, weather forecasting (hurricanes, tsunami, rainfall,
windstorm forecast etc), nuclear weapons testing (testing the range, accuracy and impact of
nuclear weapons), animated graphics, and natural resources exploration (natural gas,
exploration, and other minerals). The chief difference between a supercomputer and a
mainframe is that a supercomputer channels all its power into executing a few programs as
fast as possible, whereas a mainframe uses its power to execute many programs
concurrently.
The most powerful computers in terms of performance and data processing that performed
specialized/specific task used by large organizations. NASA (National Air Space Agency)
uses supercomputers for launching space shuttles, controlling them and for space
exploration purpose. They are very expensive and very large in size which can span an
entire building.
ii) Mainframe Computers: A very large, high speed, large storage capacity and expensive
computer capable of supporting hundreds, or even thousands, of users simultaneously.
Many large firms & government organizations use Mainframes to run their business
operations and to process & store large amount of data. It occupies space of about 100 sq.
feet. Banks educational institutions & insurance companies use mainframe computers to
store data about their customers, students & insurance policy holders. They are also used for
population census, result publication etc. In some ways, mainframes are more powerful than
supercomputers because they support more simultaneous programs. But supercomputers can
execute a single program faster than a mainframe.
iii) Mini Computers: Minicomputers are used by small businesses & firms. Minicomputers are
also called as “Midrange Computers”. They are small machines that do not have
processing and data storage capabilities as super-computers & Mainframes. These
computers are not designed for a single user and are capable of supporting from 4 to about
200 users simultaneously. Individual departments of a large company or organizations use
Mini-computers for specific purposes. For example, a production department can use Mini-
computers for monitoring certain production process.
iv) Micro Computers: The micro-computers are widely used & the fastest growing computers.
These computers are the cheapest among the other three types of computers. The Micro-
Page 16 of 64
computers are specially designed for general usage like entertainment, education and work
purposes and are small in size and are portable. It features are increasing rapidly. They are
used for multi-purposes and include desktop computer (a personal or micro-mini computer
sufficient to fit on a desk), Laptop Computer (a portable computer complete with an
integrated screen and keyboard. It is generally smaller in size than a desktop computer and
larger than a notebook computer, Palmtop Computer/Digital Diary /Notebook /PDAs (a
hand-sized computer) which has no keyboard but the screen serves both as an input and
output device and workstations (a terminal or desktop computer in a network). Desktop
computers, laptops, personal digital assistant (PDA), tablets & smartphones are all types of
microcomputers. Well known manufacturers of Micro-computer are Dell, Apple, Samsung,
Sony & Toshiba. Desktop computers, Gaming consoles, Sound & Navigation system of a
car, Netbooks, Notebooks, PDA’s, Tablet PC’s, Smartphones, Calculators are all type of
Microcomputers.
ii) IBM Compatible: They have similar features of IBM computers and are called duplicate of
IBM PC. The term compatible means 'Able to exist together and successfully'. IBM
compatible computer system is assembled form of different components developed by
different companies. It is based on IBM principle that can use standard hardware and
software designed for the IBM PC and its own additional features. Examples are IBM PC
compatible computers that are generally similar to the original IBM PC, XT, and AT.
Page 17 of 64
iii) Apple Macintosh: These are computers developed by Apple Industry which used a
standard microprocessor chips.
The chip used by apple computers enabled them to put together a complete computer, a
keyboard for input, and processors in memory and screen all in small box. Apple II is known
as personal computer. IBM PC and its compatible version have largest scope in PC market.
Most of the users of the world have IBM PC than these computers but Apple has its own
users, mostly people interested in graphic works, documentation and publishing sectors.
Study Questions
1. Mention and briefly explain the various types of computers you were taught in the class.
2. How is digital computer different from hybrid computer?
3. List and explain the factors used in classifying computer by size.
4. Write short notes on the following:
(i) Mainframe
(ii) Minicomputer
(iii) Microcomputer
5. Differentiate between the categories of computer.
6. Identify the kind of computer with high and low capacity.
Any information or data that is entered or sent to the computer to be processed is considered
input and anything that is sent from the computer to an internal or external device is output. An
input device, such as a computer keyboard or mouse, can send information (input) to the
computer, but it cannot receive information (output) from the computer. An output device, such
as a computer monitor or printer, can receive information (output) from the computer, but it
cannot send information (input) to the computer. An input/output device, such as a CD-RW
drive or USB flash drive, can send information (input) to a computer and receive information
(output) from a computer.
Page 18 of 64
Before a computer can process any data, a method is needed to input the data into the machine.
The device to be used will depend on what form this data takes (be it text, sound, artwork, etc.).
Similarly, after the computer has processed the data, often there may be the need to produce
output of the results. This output could be displayed on the computer screen, hardcopy on
printed pages, or even the audio playback of music that was composed on the computer. The
variety of peripheral devices used for computer input and output include the following:
b) Graphics Tablets: A graphics tablet consists of an electronic writing area and a special
“pen” that works with it. A graphics tablet allows artists to create graphical images with
motions and actions similar to using more traditional drawing tools. The pen of the
graphics tablet is pressure sensitive, so pressing harder or softer can result in brush strokes
of different width (in
c) Trackballs: Some sub-notebook computers (such as the IBM ThinkPad), which lack room
for even a touch pad, incorporate a trackpoint, a small rubber projection embedded between
the keys of the keyboard. The trackball has the same basic functions of the mouse. The
only difference is that the trackball is stationary and one doesn’t need to move it on a
mouse pad.
d) Joystick: This device is well known with young people as it is mainly used for playing
computer games. As the name implies, it is like a stick connected to a platform, which can
be moved in all directions. These movements in turn will move something on screen
depending on the game. Usually joysticks have buttons also called triggers.
e) Mouse (pointing device): The mouse helps the user to point and access items on the
computer. Its main function is to control the cursor or pointer on the computer’s screen.
The mouse can have 2 or 3 buttons, used according to the software application being used.
Today, most mice also have a scroll wheel which is used mainly to scroll through
Page 20 of 64
documents. The traditional PC mouse has two buttons, while the traditional Macintosh
mouse has one button.
Two-button mouse with scroll wheel Wireless Macintosh mouse
f) Touchpads: Most laptop computers today have a touch pad pointing device. This is a small
sensitive pad used on portable computers (laptops). The touch pad is used as a pointing
device. The pointer is moved on screen by touching the touch pad with the finger. Tapping
on the touch pad will give the same results as when using the mouse buttons. The touchpad
is particularly useful for persons with disability whom can have limitations in moving their
hand.
g) Touch screen: Some computers, especially small hand-held PDAs (Personal Data
Assistants), have touch sensitive display screens. The user can make choices and press
button images on the screen. One often uses a stylus, which he holds like a pen, to “write”
on the surface of a small touch screen.
h) Barcode reader: When we buy products from shops we usually see small labels containing
white and black stripes called barcodes. These labels contain information on the product. In
order to read this information, one must pass the barcode in front of a special reader. This
reader can be in a form of a pen or installed on the shop’s counter. The barcode reading
consists of a light emitting diode that will emit light on the code. The reflected light from
the barcode is translated to the computer by a light sensitive diode.
i) Scanner: The scanner is a device that transfers printed text and images to a computer.
Today, most home users have a scanner connected to their computers. These are generally
called flatbed (others less common such as barcode readers are called handhelds). The
scanner alone is not enough to capture the data and transform it to a format that can be
understood by the computer.
Page 21 of 64
j) Pen Input: Pens are used on hand held computers such as PDAs (Personal Data Assistants).
These hand held computers have a special sensitive screen. When the user touches the
screen it will interact with the computer.
k) Graphics Table: Professionals, such as draftsmen and engineers, usually use this input
device. It is used to speed up their drawing work. The device consists of a hand held
operated device (similar to a pen) used to trace diagrams placed on a digitized table. The
drawing will then be transferred to the computer.
l) Magnetic Ink Character Reader (MICR): This system uses special ink to write numbers
with coded magnetic ink. This special ink contains the written numbers magnetically. This
system is widely used on cheques issued by banks. The MICR is much faster than OCR
(Optical Character Recognition) or other methods when reading codes and thus identifying
cheques.
m) Optical Mark Reader: This device reads marks in predetermined places on specially
prepared cards. These are usually used in multiple-choice questions. The student will have
to fill a space with a pencil, usually HB. The filled examination paper is then inserted into
the OMR so as to enable it to read the answers marked.
Page 22 of 64
n) Digital camera: A digital camera or digicam is a camera that encodes digital images and
videos digitally and stores them for later reproduction. Digital cameras are incorporated
into many devices ranging from PDAs and phones to vehicles.
o) Video Capture Hardware: Video capture is the process of converting an analog video
signal—such as that produced by a video camera or DVD player—to digital video. The
resulting digital data are computer files referred to as a digital video stream, or more often,
simply video stream.
p) Microphone: Sometimes abbreviated as mic, a microphone is a hardware peripheral
originally invented by Emile Berliner in 1877 that allows computer users to input audio
into their computers.
q) Webcam: A webcam is a hardware camera connected to a computer that allows anyone
connected to the Internet to view either still pictures or motion video of a user or other
object.
Page 23 of 64
a) Printers (all types): A printer is an external output device that takes data from a
computer and generates output in the form of graphics / text on a paper. Printers can be
divided into two categories Impact and Non-Impact: Impact – refers to all those printers
whose printing heads touch the paper. An example is the Dot matrix printer. Non-Impact
– are all those printers whose printing heads do not touch the paper. An example is a
Laser or an Ink-Jet printer.
b) Monitor: The monitor is the most common type of output device and is also called
Visual Display Unit (VDU).
c) Plotters: The plotter uses pens to write on paper and is usually used for engineering
drawings. There are two types of plotters: Flatbed Plotter – This uses a flat paper which
is fixed, and pens (or styluses) that move on it draw the required design. Drum Plotter –
Here the paper moves along a drum vertically while pens move side to side horizontally.
d) Projector: A projector or image projector is an optical device that projects an image (or
moving images) onto a surface, commonly a projection screen. Most projectors create an
image by shining a light through a small transparent lens, but some newer types of
projectors can project the image directly, by using lasers.
Page 24 of 64
e) LCD Projection Panels: An LCD projector is a type of video projector for displaying
video, images or computer data on a screen or other flat surface. It is a modern equivalent
of the slide projector or overhead projector.
f) Computer Output Microfilm (COM): This is a computerized system that converts online
or stored data directly into microfilm, as images for archiving.
g) Speaker(s): These devices are used to produce sound from the computer system. The
soundcard is a card installed in the tower case of the computer. Its role is to convert the
signal coming out of the computer to a format that can be reproduced by the external
speakers.
b) Network cards: A Network interface card, NIC, or Network card is an electronic device
that connects a computer to a computer network, usually a LAN. It is considered a piece
of computer hardware.
c) Touch Screen: A touch screen is a computer display screen that is also an input device.
The screens are sensitive to pressure; a user interacts with the computer
by touching pictures or words on the screen.
d) Headsets: Headsets consists of speakers and microphone. speaker act as output device
and microphone act as input device.
e) Facsimile (FAX): This is a device that has scanner to scan the document and also have
printer to Print the document)
f) Audio Cards/Sound Card: A sound card is an expansion card or IC for
producing sound on a computer that can be heard through speakers or headphones.
Page 25 of 64
Study Questions
1. Clearly differentiate between computer input and output devices?
2. What are the uses of input and output devices you were taught in the Class?
3. Mention and briefly explain five (5) input and output devices you know?
4. Write short notes on the following:
(i) Mouse
(ii) Monitor
(iii) Printer
(vi) Joy Stick
(vii)Graphics Tablet
(viii) Trackballs
(ix) Touch screen
(x) Projector
(xi) Headsets
(xii)Fax
6. COMPUTER DATA
6.1 The Nature of Data: Data means information or ‘known facts or things used as basis for
inference or reckoning’. Strictly speaking, data is the plural of datum, so is always treated as
plural. Data are not only elusive (intangible), but also ephemeral (transient). If the data collected
is meaningless, then the information will have no use either [Garbage In = Garbage Out
(GIGO)]. Organisations therefore, need to ensure that appropriate data is available at the time of
processing. When data is entered into information system it is organised into different data
types including images, audio, video, text and numbers. Information will be valuable if it is
relevant, accurate, timely, organised and cost-effective.
6.2 Speed of Data: The speed with which data can be transmitted from one device to another is
often measured in megabits (million bits) or megabytes (million bytes) per second. These are
usually abbreviated as Mbps and MBps, respectively. Another term for data transfer rate is
throughput.
6.3 Data Capture: Data capture is the conversion of data to electronic media. This is a process
for achieving the extraction of relevant data while the related transaction or operation is
occurring. An example is a supermarket checkout equipped with point-of-sale terminals. The
transaction is primarily concerned with the sale to the customer but while the purchased items
are being entered onto the bill it is usual for the machine to record, and thus capture data that
will allow calculation of stock movement and other information. If the equipment for data
capture is online to a computer system, it is part of a data collection process and may be referred
to as either data capture or data collection equipment. The term data capture is often used where
a computer system monitors (or controls) laboratory instruments, process parameters. In this
context it is also known as data logging
Keyboard A very familiar input device. Typically used to input data into personal
computer applications such as databases and spreadsheets
Advantages
(i) Data is easily read by humans as well as the computer
(ii) Little training is required – you just feed the cheques into the machine
(iii) It’s difficult for forgers to change details
Disadvantages
(i) Specialist high-quality printing equipment is required – this obviously
costs more!
Optical Optical Mark Reading (OMR) uses paper based forms which users simply mark
mark (using a dash) to answer a question. OMR needs no special equipment to mark
reading a form other than a pen/pencil. Data can be processed very quickly and with
(OMR) very low error rates. An OMR scanner then processes the forms directly into the
required database. An example you are probably familiar with is answer sheets
for those dreaded multiple choice exam papers!
Page 27 of 64
Optical OCR is the recognition of printed or written characters by software that
character processes information obtained by a scanner. Each page of text is converted to a
recognition digital using a scanner and OCR is then applied to this image to produce a text
(OCR) and file. This involves complex image processing algorithms and rarely achieves
scanners 100% accuracy so manual proof reading is recommended.
Advantages
(i) No special data-preparation equipment required – it just uses text on
ordinary paper
(ii) Data is easily read by humans as well as the computer
Disadvantages
(i) Recognition is not 100% accurate
(ii) Converted documents will need to be checked
(iii) Dirty or damaged documents are difficult to read
Intelligent Intelligent Character Recognition (ICR) again uses paper based forms which
Character respondees can enter handprinted text such as names, dates etc. as well as dash
Recognition marks with no special equipment needed other than a pen/pencil. An ICR
(ICR) scanner then processes the forms, which are then verified and stored the
required database.
Bar coding A very important kind of data collection method - in widespread use.
and EPOS
Bar codes are made up of rectangular bars and spaces in varying widths. Read
optically, these enable computer software to identify products and items
automatically. Numbers or letters are represented by the width and position of
each code's bars and spaces, forming a unique 'tag'. Bar codes are printed on
individual labels, packaging or documents. When the coded item is handled, the
bar code is scanned and the information gained is fed into a computer. Codes
are also often used to track and count items.
Businesses of all types and sizes use bar code systems. Best known are retailers
using Electronic Point of Sale (EPOS) technology, familiar in supermarkets and
many retail operations. Not only saving time at checkout, EPOS cuts
Page 28 of 64
management costs by providing an automatic record of what is selling and stock
requirements. Customers receive an accurate record of prices and items
purchased. Producers use bar coding for quick and accurate stock control,
linking easily to customers. Distributors use bar codes as a crucial part of
handling goods. Larger businesses and those with high security requirements
can use bar codes for personnel identification and access records for sensitive
areas.
EFTPOS EFTPOS stands for Electronic Funds Transfer at Point Of Sale. You will find
EFTPOS terminals at the till in certain shops. An EFTPOS terminal
electronically prints out details of a plastic card transaction. The computer in
the terminal gets authorisation for the payment amount (to make sure it's within
the credit limit) and checks the card against a list of lost and stolen cards.
Magnetic A card (plastic or paper) with a magnetic strip of recording material on which
stripe cards the magnetic tracks of an identification card are recorded. Magnetic stripe cards
are in widespread use as a way of controlling access (e.g. swipe cards for doors,
ticket barriers) and confirming identity (e.g. use in bank and cash cards).
Smart cards A smart card (sometime also called a "chip card") is a plastic card with an
embedded microchip. it is widely expected that smart crads will eventually
replace magnetic stripe cards in many applications. The smart chip provides
significantly more memory than the magnetic stripe. The chip is also capable of
processing information. The added memory and processing capabilities are
what enable a smart card to offer more services and increased security. Some
smart cards can also run multiple applications on one card, this reducing the
number of cards required by any one person. One of the key functions of the
smart card is its ability to act as a stored value card, such as Mondex and Visa
cash. This enables the card to be used as electronic cash. Smart cards can also
allow secure information storage, making them ideal as ID cards and security
keys.
Page 29 of 64
Voice A data collection technology that converts speech into text or interprets it as a
recognition sequence of computer commands. Voice recognition is most common in data
entry and word processing environments, and fields where a user needs to
interact with a computer without using their hands.
Advantages
(i) No special data-preparation equipment required – you just say the data
(ii) Data is easily understood by humans as well as the computer
(iii) Little training is required
Disadvantages
(i) Recognition is not 100% accurate
(ii) Dictation systems need to be trained
(iii) Not everything – e.g. mathematical formulae – are easy to
describe in words
Web Data Web data capture use electronic forms on either on an Intranet or Internet. They
Capture are becoming increasingly popular and have the advantage of being accessible
by any user having access to a computer. Users complete the questions online
and the returned data is then imported in electronic format to the required
database.
7. SYSTEM THEORY
7.1 Introduction
Systems theory provides a general analytical framework (perspective) for viewing an
organization. It provides a spectrum of scientific principles, concepts and philosophy which
may be applied to the study of systems of all types. It embraces all types of business systems
including control systems relating to quality control, production control, budgetary control, cost
control, financial and cash control.
It shows the need for synergy, interdependence and interconnections both within the
organization and between the organization and the environment. It sees organization as
ORGANISM “a set of elements standing in inter-relations”.
A system must have an objective or goal. It is probably true to say that all systems have more
than one objective. A business organization, for example, might have the following objectives:
(i) Generate a reasonable financial return for shareholders;
(ii) Maintain a high market share;
(iii) Increase productivity annually;
(iv) Offer an up-to-date product range of high quality and proven reliability;
(v) Develop a reputation as responsible employers;
(vi) Acknowledge social responsibilities;
(vii)Grow and survive autonomously.
In most cases, the differing objectives of a system will be conflicting, so that some form of
compromise or trade-off between them must be reached. A system will not operate as efficiently
as it should if these compromises are not reached in a satisfactory manner. For example, the
wish to reduce production cost might conflict with any of the following:
High measure against health and safety conditions at work;
The high costs used for the treatment of waste and effluent from production;
The quality of goods produced;
Depending on new technology or research and development (R & D).
A system is normally delimited by a boundary, which separates the system from its
environment. Anything within the boundary is part of the system; while anything outside the
boundary is part of the environment. Elements included in the system and the elements included
in the environment depend on the particular problem being studied. For example, consider the
problem of determining the turnaround time in Batch processing. The system elements will
include people (in the form of the speed of data entry operators and the schedule established by
the computer operator). On the other hand, if the problem is to study how to make a particular
computer program execute more efficiently on a given computer, the system elements will
include purely technical details as the program, system software routines, the data used and the
hardware, while people will be in the system’s environment. Just as every system has an
objective which ought to be identified and specific, so too will every system have constraints or
limiting factors, which restrict its capacity to achieve its objectives. In a business system,
constraints restricting the objective of profit maximization might include any of the following:
(i) Scarcity of key resources such as cash or skilled labour;
(ii) Technological constraints limiting what goods and services can be produced;
(iii) Economic constraints;
Page 31 of 64
(iv) Political and legal constraints;
(v) Product completion time;
(vi) Responsibilities towards society and for preserving the environment from pollution.
7.3 Sub-systems
Every system can be broken down into subsystems (elements) and in turn, each subsystem can
be further broken into sub-subsystems. Separate subsystems interact with each other and
respond to each other by means of communication or observation. Subsystems may be
differentiated from each other by
(i) Function (e.g. in a manufacturing system, we might have, production, finance, marketing,
sales, personnel etc);
(ii) Space (e.g. Northern area and southern area sales managers;
(iii) Time (e.g. morning shift, afternoon shift, and evening shift managers);
(iv) People;
(v) Formality;
(vi) Automation
Decoupling, both in a physical and information sense, allows subsystems more independence in
planning and control. When systems are decoupled, it is easier to administer them in some cases
as they become less complex and more flexible. This enables them to react to random influences
as they occur without too much disruption. Decoupling generally leads to system stability which
is essential for continued operation and survival in a dynamic environment. Decoupling creates a
situation whereby subsystems exist separately on a functional basis but are coordinated by the
chief executive for the achievement of the overall objectives. Each functional sub-system has
more independence even though they are still interrelated in reality, but loosely connected for
administrative convenience.
Page 32 of 64
information system (CBIS), the terms input, processing and output are logical descriptions of the
general transformation process. However, during implementation, keyboard can be used as an
input device while the monitor or printer can be used as output devices. The three logical
components of a system are INPUT, PROCESS and OUTPUT.
Input provide the system with what it needs to be able to operate. Input may include matter,
energy, human, data or information. Processes transform the input into output, such as task
performed by human, plant, machines etc. While Output are the results of processing e.g.
finished products, and work-in-progress,
Page 33 of 64
“Kybernetes”, the derivation of the Latin work, “gubernator” meaning governor or
controller. An adaptive or cybernetic system is one, which adapts and reacts to a stimulus.
The way in which it adapts is uncertain as the same input (stimulus) to the system will not
always produce the same output (response). An adaptive system responses to changing
situation by adjusting its behaviour on a self-organizing basis. The system alters its inputs
as a result of measuring its outputs. It attempts to optimize its performance by monitoring
its own behaviour. Animals, human beings and business organizations are examples. A
physical example is the thermostat controlled heating system in water boilers which cuts
off current when temperature is high in order to maintain a steady water temperature. Also
computerized stock ordering system is adaptive in nature.
Control systems are often separately structured from the systems which they control. For
example
(i) The production control system controls the production quantity;
(ii) The quality control system controls the production quality;
(iii) The cost control system controls the cost of production.
These control systems are basically administrative systems for monitoring the results and
modifying the state of the physical systems to which they relate. Control is for the purpose of
detecting variations in the behaviour of a system so that control signals can be communicated to
the appropriate manager.
Page 34 of 64
7.8.2 Types of Control Systems
The basic types of control systems are Open– and Closed-loop control systems:
(i) Open-loop control system: In an open -loop control system, the control is exercised
regardless of the output produced by the system. Here control is exercised by external
intervention. Physical examples are automatic light switches and traffic light.
(ii) Closed-loop Control System: In closed-loop control system, the control is exercised by
part of the output, which is fed back into the system as input. Many closed-loop systems
are self-regulating as they contain a built-in control mechanism. Business systems
containing integrated control systems performing continuous monitoring activities are also
closed-loop systems because they contain the essential elements of feedback.
( i) Negative Feedback: Feedback is part of the output which is returned to the input as a
means of system control. When the actual output from a system is lower than the desired
output, the differences between the actual and the desired outputs are detected as positive
deviations (errors) and action is effected in the opposite direction to counteract them.
Consider a production line with 10,000 units as required output in the month. If the actual
monthly output is 9,000 units, then monthly errors of 1,000 units are detected as positive
deviations. Corrective action would then be taken to increase the output to 10,000 units per
month. This is an adjustment in the opposite direction to the error. Most business control
systems are negative feedback control systems.
( ii) Positive Feedback: In a positive feedback control system, actions are taken to enlarge
(amplify) the detected deviations. This is in contrast to what happens in the negative
Page 35 of 64
feedback control systems. For example, amplification applies to serve-mechanisms
whereby a small manual force is detected and amplified to achieve a defined purpose.
Based on the user requirements and the detailed analysis of the existing system, the new system
is designed. This is the phase of system designing. It is the most crucial phase in the
developments of a system. The logical system design arrived at as a result of systems analysis is
converted into physical system design. Normally, the design proceeds in two stages namely
preliminary or general design (at this stage, the features of the new system are specified, costs of
implementing and these features and the benefits to be derived are estimated) and structured or
detailed design (at this stage, the design of the system becomes more structured).
Study Questions
1. What is system analysis? What are its processes?
2. Who are the common stakeholders for IT projects Architecture office?
3. What are the several activities that must occur within the system analysis?
4. What is system design? What are its processes?
5. What are the common activities that take place during system design?
6. What are the two stages of system design? How do they differ from one another?
Page 37 of 64
encoded, by computers into the voice, video, graphics, and/or the print we see on our computer
screens. The signals used by computers to transmit data are either digital or analog.
Analog signals are continuous signals that vary in strength. Sound is an example of an analog
signal. Telephones have transmitters that encode sound waves into electromagnetic waves,
which then travel over wires toward their destination. The receiving telephone decodes the
electromagnetic waves back into sound waves. Our brains then decode the sound waves into the
words we hear. Computer modems use the same principle. Analog signals can be represented
digitally. For instance, a high electromagnetic voltage could be interpreted as 1 and low voltage
as 0.
Analog signal
Digital signals are discrete rather than continuous. Either there is a signal or there isn't a signal.
Telegraphs transmit data with discrete signals.
Discrete signals can also be represented digitally. The presence of a signal could be coded as a 1
and the absence of a signal coded as a 0. The digits 0 and 1 are used because computer circuitry
is based on binary digital data. The computer’s brain, the central processing unit (CPU),
transforms these codes of 0s and 1s into the voice, video and data we see. Digital data is based
on two states, on or off. The binary numbering system uses only two digits, 0 and 1, so it makes
sense to use the binary numbering system. One digit, 0 represents off, the other digit represents
on. A single 0 or 1 is called a bit. In order to appreciate how computers communicate over
networks, it is necessary to be aware of how they encode information.
In a connectionless transmission, the source device transmits data but the connection is not
maintained. The source device does not wait for notification that the destination device actually
received the information accurately. This method is faster than connection-oriented, however
less reliable since there is no notification of whether the data is received or not. It is more
common to find connectionless transmissions on LANs. To understand a connectionless
transmission, think of a radio broadcast: A radio disc jockey tells his/her friends to be sure to
listen to her/his program at 9:00 p.m. At that time the disk jockey broadcasts a message to them.
Did they receive the message? Although it is quite likely, the disk jockey cannot be sure that
they turned the radio on, listened, or understood the message.
When transferring data, both the transmitting and receiving nodes need to agree when the signal
begins and ends so the signals can be correctly measured and interpreted. This timing process is
called bit synchronization, framing, or clocking.
Imaginehowdifficultitwouldbetoreadifyoudidnotknowwhenawordstartedan
dwhenawordendediftherewerenopunctuationandnospacesyoucandoitbecaus
ethereareseveraldifferentcharactersanditisnotincodewhatifthiswerecodedas
zerosandonesthenyouwouldhaverealproblems.
As it can be seen, synchronization of data is very important. Clocking is somewhat like timing
in music. There are a specific number of beats expected per bar. When computer devices are
synchronized, a specific number of signals or “beats” are expected within a set amount of time.
Timing is important because it helps you be prepared. In many schools, every 50 minutes, a new
class period starts. Students watch the clock and expect a signal. Usually, they are already
prepared to leave the classroom. That is because they expected the signal. Synchronous
transmission requires the communicating devices to maintain synchronous clocks during the
entire connection. The sending device transmits on a specific schedule and the receiving device
accepts the data on that same fixed schedule. The receiving device knows the timing of the
sending device because the timing information is embedded within the preamble of the frame.
Page 39 of 64
Synchronous transmissions are common in internal computer communications and usually are
sent as entire frames. Synchronous transmission is common when large blocks of data are
transferred, since it is efficient and has a low overhead (number of bytes of data/control + data
bytes).
Asynchronous data transmission does not involve synchronizing the clocks of the sending and
receiving devices. Instead, start and stop bits are used for synchronization of data signals. The
start and stop bits tell the receiving device how to interpret the data. Asynchronous sends one
character at a time. Data transmission may be half-duplex; meaning data is transferred in only
one direction at a time. An example of half-duplex is a CB radio where only one person can talk
at a time. Or, transmission may be full duplex, transmitted in two directions simultaneously. A
telephone conversation illustrates full-duplex communication.
10.2 Data Communication: Data communication is the active process of transporting data from
one point to another. Networks are communication system designed to convey information from
a point of origin to a point of destination. Note that they are communication system, not
computer system. The operative word is communication, the transfer of information from one
device to another. Networks come in two flavors – local as in local area network, which cover a
small area and have a finite, relatively small, number of users and global or long-haul, which
cover long distance and have an unlimited number of users. Telephone networks are long
network. It refers to the transmission of the digital signals over a communication channel
between the transmitter and receiver computers. Communication is possible only with wired and
wireless connectivity of the computers with each other.
Page 40 of 64
(ii) Receiver: The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
(iii) Medium: The transmission medium is the physical path by which a message travels from
sender to receiver. It can consist of twisted pair wire, coaxial cable, fiber-optic cable, laser
or radio waves (terrestrial or satellite microwave).
(iv) Message: The message is the transmission (data) to be communicated. It can consist of
text, number, pictures, sound, or video or any combination of these.
(v) Protocol: A protocol is a set of rules that governs data communication. It represents an
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating, just as a person speaking German cannot be understood
by a person who speaks only Japanese.
The transmitter sends message and the receiver receives the message. The medium is the
channel over which the message is sent and the protocol is the set of rules that guides how the
data is transmitted from encoding to decoding. The message of course is central to all the
components. The message is the data that is being communicated.
Page 41 of 64
utilized for both voice and data transmission. The use of two wires twisted together helps to
reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2
million bits per second to 10 billion bits per second. Twisted pair cabling comes in two
forms which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are
manufactured in different increments for various scenario.
(iii) Coaxial cable: Coaxial cable is widely used for cable television systems, office buildings,
and other work-sites for local area networks. The cables consist of copper or aluminum wire
wrapped with insulating layer typically of a flexible material with a high dielectric constant,
all of which are surrounded by a conductive layer. The layers of insulation help minimize
interference and distortion. Transmission speed range from 200 million to more than 500
million bits per second.
(iv) Optical fiber: Optical fiber cable consists of one or more filaments of glass fiber wrapped
in protective layers that carries data by means of pulses of light. It transmits light which can
travel over extended distances. Fiber-optic cables are not affected by electromagnetic
radiation. Transmission speed may reach trillions of bits per second. The transmission speed
of fiber optics is hundreds of times faster than for coaxial cables and thousands of times
faster than a twisted-pair wire. This capacity may be further increased by the use of colored
light, i.e., light of multiple wavelengths. Instead of carrying one message in a stream of
monochromatic light impulses, this technology can carry multiple signals in a single fiber.
Wireless Technologies
(v) Terrestrial microwave: Terrestrial microwaves use Earthbased transmitter and receiver.
The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz
range, which limits all communications to line-of-sight. Path between relay stations spaced
approx, 48 km (30 mi) apart. Microwave antennas are usually placed on top of buildings,
towers, hills, and mountain peaks.
(vi) Communications satellites: The satellites use microwave radio signals as their
telecommunications medium which are not deflected by the Earth’s atmosphere. The
satellites are stationed in space, typically 35,400 km (22,000 mi) (for geosynchronous
satellites) above the equator. These Earth-orbiting systems are capable of receiving and
relaying voice, data, and TV signals.
Communication companies such as American Telephone and Telegraph (AT&T) and Western
Union are called common carriers, and they provide three general classes of service for both
voice and data communication:
(i) Narrowband handles low data volumes: Data transmission rates are from 45 to 300 baud.
The low-speed devices might use narrow band communications.
Page 42 of 64
(ii) Voiceband handles moderate data transmission volumes between 300 and 9600 baud:
They are used for applications ranging from operating a CRT to running a line printer. Their
major application is for telephone voice communication hence, the term voiceband.
(iii) Broadband handles very large volumes of data: These systems provide data transmission
rates of 1 million band or more. High-speed data analysis and satellite communications are
examples of broadband communication systems.
10.5 Modem
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode
digital information, and also demodulates such a carrier signal to decode the transmitted
information. The goal is to produce a signal that can be transmitted easily and decoded to
reproduce the original digital data. Modems can be used over any means of transmitting analog
signals, from light emitting diodes to radio.
A modem modulates outgoing digital signals from a computer or other digital device to analog
signals for a conventional copper twisted pair telephone line and demodulates the incoming
analog signal and converts it to a digital signal for the digital device.
In recent years, the 2400 bits per second modem that could carry e-mail has become obsolete.
14.4 Kbps and 28.8 Kbps modems were temporary landing places on the way to the much higher
bandwidth devices and carriers of tomorrow. From early 1998, most new personal computers
came with 56 Kbps modems. By comparison, using a digital Integrated Services Digital
Network adapter instead of a conventional modem, the same telephone wire can now carry up to
128 Kbps. With Digital Subscriber Line (DSL) systems, now being deployed in a number of
communities, bandwidth on twisted-pair can be in the megabit range.
A. Landline Modems: Landline modems are modems which connect to the public switched
telephone network (PSTN). To connect to PSTN, these modems have a jack known as RJ-
11, or regular phone jack. A telephone cable with a RJ-11 plug connects the modem to the
nearest phone jack, which also conforms to the RH-11standard. Landline modems can be
further classified into the followings types:
1. Internal modems: This device is a circuit board that plugs into one of the expansion slots
of the computer. Internal modems usually are cheaper than external modems, but when
problems occur, fixing and troubleshooting the modem can sometimes prove to be quite
difficult. The telephone line plugs into the modem port in the back of the computer. Most
internal modems come installed in the computer you buy. Internal modems are more
directly integrated into the computer system and, therefore, do not need any special
attention. Internal modems are activated when you run a communications program and are
turned off when you exit the program. This convenience is especially useful for novice
users. Internal modems usually cost less than external modems, but the price difference is
usually small. The major disadvantage with internal modems is their location: inside the
Page 43 of 64
computer. When you want to replace an internal modem you have to go inside the computer
case to make the switch.
2. External modems: This device is attached to the back of the computer by way of a cable
that plugs into the modem port. It is usually less expensive and very portable. It can be used
with other computers very easily by unplugging it and plugging it into another computer.
This is the simplest type of modem to install because you don’t have to open the computer.
External modems have their own power supply and connect with a cable to a computer’s
serial port. The telephone line plugs into a socket on the rear panel of the modem. Because
external modems have their own power supply, you can turn off the modem to break an
online connection quickly without powering down the computer. Another advantage over an
internal modem is that an external modem’s separate power supply does not drain any
power from the computer. You also can monitor your modem’s connection activity by
watching the status lights.
3. Voice/data/fax modems: This device can be hooked up to your telephone and used to send
information to your computer. Your computer can also send information to a fax machine.
Most computer modems are modems with faxing capabilities.
4. PC Card modem: These modems, designed for portable computers, are the size of a credit
card and fit into the PC Card slot on notebook and handheld computers. These modems are
removed when the modem is not needed. Except for their size, PC Card modems are like a
combination of external and internal modems. These devices are plugged directly into an
external slot in the portable computer, so no cable is required other than the telephone line
connection. The cards are powered by the computer, which is fine unless the computer is
battery-operated. Running a PC Card modem while the portable computer is operating on
battery power drastically decreases the life of your batteries.
B. Wireless Modems: Wireless modems are radio transmitters/receivers installed into mobile
computing devices (i.e. devices that are used while you are moving such as mobile phones,
laptops etc.) Using wireless modems, one can connect to a network while being mobile.
Unlike landline modems, wireless modems do not plug into an RJ-11 jack.
C. LAN Modems: LAN modems allow shared remote access to LAN (Local Area Network)
resources. LAN modem comes fully preconfigured for single particular network architecture
such as Ethernet or Token Ring and/or particular network software such as IPX, NetBIOS,
NetBEUI etc.
Page 45 of 64
(ii) Printer/peripheral sharing: Once a home network is in place, it’s then easy to set up all
of the computers to share a single printer. No longer will you need to bounce from one
system or another just to print out an email message. Other computer peripherals can be
shared similarly such as network scanners, Web cams, and CD burners.
(iii) Internet connection sharing: Using a home network, multiple family members can access
the Internet simultaneously without having to pay an ISP for multiple accounts. You will
notice the Internet connection slows down when several people share it, but broadband
Internet can handle the extra load with little trouble.
(iv) Multi-player games: Many popular home computer games support LAN mode where
friends and family can play together, if they have their computers networked.
(v) Internet telephone service: Voice over IP (VoIP) services allows you to make and receive
phone calls through your home network across the Internet.
(vi) Home entertainment: Newer home entertainment products such as digital video recorders
(DVRs) and video game consoles now support either wired or wireless home networking.
Having these products integrated into your network enables online Internet gaming, video
sharing and other advanced features.
10.8.1 Local Area Network (LAN): A local area network (LAN) supplies networking
capability to a group of computers in close proximity to each other such as in an office
building, a school, or a home. A LAN is useful for sharing resources like files, printers,
games or other applications. A LAN in turn often connects to other LANs, and to the
Internet or other WAN.
Most local area networks are built with relatively inexpensive hardware such as Ethernet
cables, network adapters, and hubs. Wireless LAN and other more advanced LAN
hardware options also exist. LAN is a computer network that spans a relatively small
area. Most LANs are confined to a single building or group of buildings. However, one
LAN can be connected to other LANs over any distance via telephone lines and radio
waves. Most LANs (as shown in Fig. 2.2) connect workstations and personal computers.
Each node (individual computer) in a LAN has its own CPU with which it executes
programs, but it is also able to access data and devices anywhere on the LAN.
This means that many users can share expensive devices, such as laser printers, as well as
data. Users can also use the LAN to communicate with each other, by sending e-mail or
engaging in chat sessions. There are many different types of LANs-tokenring networks,
Ethernets, and ARCnets being the most common for PCs.
Page 46 of 64
Fig. XIII: LAN
10.8.2 Wide Area Networks (WANs): The term Wide Area Network (WAN) usually refers to a
network which covers a large geographical area, and use communications circuits to connect the
intermediate nodes. A major factor impacting WAN design and performance is a requirement
that they lease communications circuits from telephone companies or other communications
carriers. Transmission rates are typically 2 Mbps, 34 Mbps, 45 Mbps, 155 Mbps, 625 Mbps (or
sometimes considerably more).
10.8.3 Metropolitan Area Network (MAN): A Metropolitan Area Network (MAN) is one of a
number of types of networks (see also LAN and WAN). A MAN is a relatively new class of
network, it serves a role similar to an ISP, but for corporate users with large LANs.
Page 47 of 64
(iii) Switch: A switch does essentially what a hub does but more efficiently. By paying
attention to the traffic that comes across it, it can “learn” where particular addresses are.
For example, if it sees traffic from machine A coming in on port 2, it now knows that
machine A is connected to that port and that traffic to machine A needs to only be sent to
that port and not any of the others. The net result of using a switch over a hub is that most
of the network traffic only goes where it needs to rather than to every port. On busy
networks this can make the network significantly faster.
(iv) Router: A router is the smartest and most complicated of the bunch. Routers come in all
shapes and sizes from the small four-port broadband routers that are very popular right now
to the large industrial strength devices that drive the internet itself. A simple way to think
of a router is as a computer that can be programmed to understand, possibly manipulate,
and route the data its being asked to handle. For example, broadband routers include the
ability to “hide” computers behind a type of firewall which involves slightly modifying the
packets of network traffic as they traverse the device. All routers include some kind of user
interface for configuring how the router will treat traffic. The really large routers include
the equivalent of a full-blown programming language to describe how they should operate
as well as the ability to communicate with other routers to describe or determine the best
way to get network traffic from point A to point B.
(v) Network Repeater: A repeater connects two segments of your network cable. It retimes
and regenerates the signals to proper amplitudes and sends them to the other segments.
When talking about, ethernet topology, you are probably talking about using a hub as a
repeater. Repeaters require a small amount of time to regenerate the signal. This can cause
a propagation delay which can affect network communication when there are several
repeaters in a row. Many network architectures limit the number of repeaters that can be
used in a row. Repeaters work only at the physical layer of the OSI network model.
(vi) Bridge: A bridge reads the outermost section of data on the data packet, to tell where the
message is going. It reduces the traffic on other network segments, since it does not send
all packets. Bridges can be programmed to reject packets from particular networks.
Bridging occurs at the data link layer of the OSI model, which means the bridge cannot
read IP addresses, but only the outermost hardware address of the packet. In our case the
bridge can read the ethernet data which gives the hardware address of the destination
address, not the IP address. Bridges forward all broadcast messages. Only a special bridge
called a translation bridge will allow two networks of different architectures to be
connected. Bridges do not normally allow connection of networks with different
architectures. The hardware address is also called the MAC (media access control) address.
To determine the network segment a MAC address belongs to, bridges use one of the
following:
(a) Transparent Bridging: They build a table of addresses (bridging table) as they receive
packets. If the address is not in the bridging table, the packet is forwarded to all
segments other than the one it came from. This type of bridge is used on ethernet
networks.
(b) Source route bridging: The source computer provides path information inside the
packet. This is used on Token Ring networks.
(vii) Router: There is a device called a router which will function similar to a bridge for
network transport protocols that are not routable, and will function as a router for routable
protocols. It functions at the network and data link layers of the OSI network model.
Page 48 of 64
(viii) Gateway: A gateway can translate information between different network data formats or
network architectures. It can translate TCP/IP to AppleTalk so computers supporting
TCP/IP can communicate with Apple brand computers. Most gateways operate at the
application layer, but can operate at the network or session layer of the OSI model.
Gateways will start at the lower level and strip information until it gets to the required level
and repackage the information and work its way back toward the hardware layer of the OSI
model.
10.10 Teleconferencing: The term teleconferencing refers to electronic meetings that involve
people who are at physically different sites. Telecommunication technology system allows
meeting participants to interact with one another without travelling to the same location. Three
different types of teleconferencing exist: audio teleconferencing, video teleconferencing and
computer conferencing.
10.10.2 Video Conferencing: Video conferencing is the use of television equipment to link
geographically dispersed conference participants. The equipment provides both sound and
picture. Like audio conferencing, video conferencing also does not necessarily require a
computer. With video conferencing, participants can see and hear each other. Generally,
participants gather in relatively expensive, specially equipped rooms that can handle the
complexities of simultaneous video and audio transmission.
Page 49 of 64
E-mail is available to anyone who has access to the network and that includes practically
everyone in the office. Also, the E-mail system can be used for any purpose. Computer
conferencing, on the other hand, is the use of a networked computer that allows particular task.
Computer conferencing is more disciplined form of E-mail.
Unlike an audio conference, a, computer conference group can consist of large number of
participants. One of the largest computer conferences was formed within IBM to include anyone
who had an interest in the IBM PC. Its members exceeded 40,000, and there were over 4,000
separate topic areas. Computer conferencing differs from audio and video conferencing because
it can be used within a single geographic site. A person can use computer conferencing to
communicate with someone in the office next door.
11.1 Main memory: Main memory temporarily stores programs and data that are being
processed. It can be thought of as a series of storage locations. Programs and data are made up
of characters. They are stored in the memory character by character. Each character is stored in
one memory location in the form of bit pattern. When one type a character on the keyboard, the
electronic circuitry interprets the character and stores it in the main memory as a code. In the
past, data were stored in vacuum tubes and core memory. Today, semiconductor memory is used
in almost all computers. It is so small but is very powerful.
11.2 ROM and RAM: The main memory of a computer is composed of ROM and RAM.
Read Only Memory (ROM) is used to store a small part of the operating system called the
bootstrap loader. When a computer is switched on, the bootstrap loader examines the backing
store devices to find the operating system. Once found it is loaded into RAM. ROM has the
following features:
(i) Data in ROM is permanently etched onto a microchip.
(ii) ROM is read-only so it cannot be changed.
(iii) Data on ROM is not lost when the computer is switched off.
Random Access Memory (RAM) is the largest part of the main memory. This is where the
operating system is stored; it also holds all programs and data. One can purchase additional
RAM chips and install them in your desktop computer.
Page 50 of 64
RAM has the following features:
(i) The data in RAM is read/write so it can be changed
(ii) All data stored in RAM is lost when then computer is switched off
(iii) RAM is sometimes referred to as primary storage.
11. 3 Memory Sizes: The size of the main memory is measured in kilobytes (KB), which is
equal to 1024 bytes. For convenience, we sometimes round of the value of K to 1000. For
example, 640 KB is approximately 640 000 bytes (640 *1000). To measure of larger sizes, we
use megabytes (MB) and gigabytes (GB).
1024 KB = 1MB
1024 MB = 1 GB
The storage capacity of today's drive has increased a lot. In a few years ago, the storage capacity
of a typical desktop system is about 100MB. For now, the microcomputers commonly found in
the market are about 64MB to 500 MB, some may even up to 1.2GB, 12 times larger, and much
faster. Of course, the range of the price also varies.
11.4 Backing Storage Devices: Backing storage devices exist to save programs and data for
future processing. All programs and data are not possible to be saved in the main memory as the
main memory is very expensive. Also the program may be so large that it is impossible for the
main memory to hold all the data.
Backing storage devices can be treated as input/output devices. The function as input devices
when stored data are transferred to the computer for processing. They function as output devices
when processed results are written to them. There are several types of common backing storage
devices: floppy disk, hard disk, magnetic tape, and optical disk.
(i) Floppy Disk: It is made of flexible plastic material. It is coated on both sides with a
magnetized substance. There are many sizes floppy disk. The most commonly used ones are
now 5.25 inches and 3.3 inches. It is stored in a plastic envelope for protection, and
commonly, there is a 'lock' for the protection of the data.
(ii) Hard Disk: It is the most popular form of storage for modern computer system. It is
composed of a set of circular plates and made of metal and coated with magnetized
substances.
(iii) Magnetic Tape: There are mainly three types of magnetic types namely Reel-to-reel tape
(It is only suitable for application that involve sequential processing), Cartridge tape (it is
very fast and has a high storage capacity) and Cassette tape (It is a ready-to-load cassette
that is exactly the same size as an audio cassette tape. The volume of data that can be stored
is small).
(iv) Optical Disk: The technology used for optical disks is the same used for audio compact
disks (CDs). Information is stored using a beam of laser to burn holes in a thin coating of
metal. Photos, movies and text are also be able to process. Optical disks for computer data
storage are also known as CD-ROMs (compact disk read only memory). Data are written
permanently on the disk and can only be read like read on memory. Data on optical disks
are not easily erased or changed.
Page 51 of 64
Besides, new type of removable storage media like CDR, Zip disk and MO (magneto-optical
drive) are gaining popularity. CD-R can only write once, Zip disk and MO can write many times
as an ordinary hard disk.
11.5 Relationship between the Backing Store and the Main Memory
The diagram below shows the components used in a typical computer system. It is a simple
representation of how a computer works and is often referred to as the ‘four box diagram’ in
Figure XiV
When a computer is switched off all programs and data are held on backing store media such as
hard drives, floppy disks, zip disks and CDR/W. Once the computer is switched on, the
operating system is loaded from the backing store into main memory (RAM). The computer is
now ready to run programs.
When the user opens a word processor file both the application program and the file itself are
loaded into the main memory. The user may then edit the document by typing on the keyboard.
It is the processor that controls the timing of operations and runs the word processing program,
allowing the user to add new text. Once the editing is complete, the user saves the file to the
backing store and this overwrites the original file (unless a new file name is used). If there is a
power failure or the user does not save the document to the backing store then the file will be
lost forever.
Throughout this process the document is outputted to the monitor so that the user can see what is
happening. The user may wish to obtain a hardcopy of the document by using the mouse (input)
to instruct the processor (process) to make a printout (output). This example shows the
relationship between the backing store, the main memory and the processor.
Page 52 of 64
12. FILE ORGANIZATION AND STRUCTURE
"File organization" refers to the logical relationships among the various records that constitute
the file, particularly with respect to the means of identification and access to any specific record.
"File structure" refers to the format of the label and data blocks and of any logical record control
information.
12.2 Types of File: A file is a collection of rated data that is treated as a single unit on a
peripheral device for example text document in word processing. The following are the
various types of files.
(i) Transaction File: Transaction file is a record of business transactions. Transactional data
describe an internal or external event or transaction that takes place as an organization
conducts its business. A transaction, in this context, is a sequence of information exchange
and related work (such as database updating) that is treated as a unit for the purposes of
satisfying a request.
Page 53 of 64
Transactional data can be financial (invoices, payments, sales orders, invoices, purchase
orders, shipping documents, credit card payments, and insurance claims), work-related
(plans, activity records) or logistical (deliveries, storage records, travel records, etc.)
involving everything from a purchase order to shipping status to employee hours worked to
insurance costs and claims. These data are typically grouped into transactional records,
which include associated master and reference data. Reference data are sets of values or
classification schemas that are referred to by systems, applications, data stores, processes,
and reports, as well as by transactional and master records.
Examples include lists of valid values, code lists, status codes, state abbreviations,
demographic fields, flags, product types, gender, chart of accounts, and product hierarchy.
Standardized reference data are key to data integration and interoperability and facilitate the
sharing and reporting of information. Reference data may be used to differentiate one type of
record from another for categorization and analysis, or they may be a significant fact such as
country, which appears within a larger information set such as address. Organizations often
create internal reference data to characterize or standardize their own information. Reference
data sets are also defined by external groups, such as government or regulatory bodies, to be
used by multiple organizations.
(ii) Master File: Master File is a record that contain master data. Master data refers to the key
organizational entities that are used by several functional groups and are typically stored in
different data systems across an organization. Additionally, master data represents the
business entities around which the organization’s business transactions are executed and the
primary elements around which analytics are conducted. Master data is typically persistent,
non-transactional data utilized by multiple systems that defines the primary business entities.
Master data describe the people, places, and things that are involved in an organization’s
business. Examples include people (e.g., customers, employees, vendors, suppliers), places
(e.g., locations, sales territories, offices), and things (e.g., accounts, products, inventory,
assets, document sets, sites). Because these data tend to be used by multiple business
processes and IT systems, standardizing master data formats and synchronizing values are
critical for successful system integration. Master data tend to be grouped into master records,
which may include associated reference data. An example of associated reference data is a
state field within an address in a customer master record.
(iii) Analytical File: This is a file that contain analytical data. Analytical data are the
numerical values, metrics, and measurements that provide business intelligence and support
organizational decision making. Typically analytical data is stored in Online Analytical
Processing (OLAP) repositories optimized for decision support, such as enterprise data
warehouses and department data marts. Analytical data is characterized as being the facts
and numerical values in a dimensional model.
Page 54 of 64
Figure XV: Enterprise Data
Transactional data supports the daily operations of an organization (i.e. describes business
events). Analytical data supports decision-making, reporting, query, and analysis (i.e. describes
business performance). While master data represents the key business entities upon which
transactions are executed and the dimensions around which analysis is conducted (i.e. describes
key business entities).
Within the relational model the final step above can generally be broken down into two further
steps that of determining the grouping of information within the system, generally determining
what are the basic objects about which information is being stored, and then determining the
relationships between these groups of information, or objects. This step is not necessary with
an Object database.
Page 55 of 64
13.2 Determining Data to be Stored
In a majority of cases, a person who is doing the design of a database is a person with expertise
in the area of database design, rather than expertise in the domain from which the data to be
stored is drawn e.g. financial information, marketing information etc. Therefore, the data to be
stored in the database must be determined in cooperation with a person who does have expertise
in that domain, and who is aware of what data must be stored within the system.
This process is one which is generally considered part of requirements analysis, and requires
skill on the part of the database designer to elicit the needed information from those with the
domain knowledge. This is because those with the necessary domain knowledge frequently
cannot express clearly what their system requirements for the database are as they are
unaccustomed to thinking in terms of the discrete data elements which must be stored. Data to
be stored can be determined by requirement Specification.
13.3 Determining Data Relationship
Once a database designer is aware of the data which is to be stored within the database, they
must then determine where dependency is within the data. Sometimes when data is changed you
can be changing other data that is not visible. For example, in a list of names and addresses,
assuming a situation where multiple people can have the same address, but one person cannot
have more than one address, the address is dependent upon the name. When provided a name
and the list the address can be uniquely determined; however, the inverse does not hold - when
given an address and the list, a name cannot be uniquely determined because multiple people
can reside at an address. Because an address is determined by a name, an address is considered
dependent on a name.
13.4 Logically Structuring Data
Once the relationships and dependencies amongst the various pieces of information have been
determined, it is possible to arrange the data into a logical structure which can then be mapped
into the storage objects supported by the database management system. In the case of relational
databases the storage objects are tables which store data in rows and columns. In an Object
database the storage objects correspond directly to the objects used by the Object-oriented
programming language used to write the applications that will manage and access the data. The
relationships may be defined as attributes of the object classes involved or as methods that
operate on the object classes.
The way this mapping is generally performed is such that each set of related data which depends
upon a single object, whether real or abstract, is placed in a table. Relationships between these
dependent objects is then stored as links between the various objects.
Each table may represent an implementation of either a logical object or a relationship joining
one or more instances of one or more logical objects. Relationships between tables may then be
stored as links connecting child tables with parents. Since complex logical relationships are
themselves tables they will probably have links to more than one parent.
13.5 Design Process foe Microsoft Access
i) Determine the purpose of the database - This helps prepare for the remaining steps.
ii) Find and organize the information required - Gather all of the types of information to
record in the database, such as product name and order number.
Page 56 of 64
iii) Divide the information into tables - Divide information items into major entities or
subjects, such as Products or Orders. Each subject then becomes a table.
iv) Turn information items into columns - Decide what information needs to be stored in
each table. Each item becomes a field, and is displayed as a column in the table. For
example, an Employees table might include fields such as Last Name and Hire Date.
v) Specify primary keys - Choose each table’s primary key. The primary key is a column, or
a set of columns, that is used to uniquely identify each row. An example might be Product
ID or Order ID.
vi) Set up the table relationships - Look at each table and decide how the data in one table is
related to the data in other tables. Add fields to tables or create new tables to clarify the
relationships, as necessary.
vii) Refine the design - Analyze the design for errors. Create tables and add a few records of
sample data. Check if results come from the tables as expected. Make adjustments to the
design, as needed.
viii) Apply the normalization rules - Apply the data normalization rules to see if tables are
structured correctly. Make adjustments to the tables, as needed.
13.6 Normalization
In the field of relational database design, normalization is a systematic way of ensuring that a
database structure is suitable for general-purpose querying and free of certain undesirable
characteristics—insertion, update, and deletion anomalies that could lead to loss of data
integrity.
A standard piece of database design guidance is that the designer should create a fully
normalized design; selective denormalization can subsequently be performed, but only
for performance reasons. However, some modeling disciplines, such as the dimensional
modeling approach to data warehouse design, explicitly recommend non-normalized designs,
i.e. designs that in large part do not adhere to 3NF. Normalization consists of normal forms that
are 1NF,2NF,3NF,BOYCE-CODD NF (3.5NF),4NF and 5NF.
14.2: Information System: A System is an entity consisting of interacting parts that are
coordinated to achieve one or more common objectives. Systems must possess input, process
and output.
14.3 An accounting information system (AIS): This is a system of collecting, storing and
processing financial and accounting data that are used by decision makers. An accounting
information system is generally a computer-based method for tracking accounting activity in
conjunction with information technology resources. The resulting financial reports can be used
internally by management or externally by other interested parties
including investors, creditors and tax authorities. Accounting information systems are designed
to support all accounting functions and activities including auditing, financial accounting &
reporting, managerial/ management accounting and tax. The most widely adopted accounting
information systems are auditing and financial reporting modules. An Accounting Information
Page 58 of 64
System is a unified structure that employs physical resources and components to transform
economic data into accounting information for external and internal users.
Accounting information systems generally consist of six main parts: people, procedures and
instructions, data, software, information technology infrastructure and internal controls. Let's
look at each component in detail. Objectives of AIS include:
(i) Support day-to-day operations
(ii) Support Internal Decision-Making
(iii) Help fulfill Stewardship Role
(iv) Support planning and control of operations
Consider the most elementary item that a machine shop wholesaler firm might carry in its
inventory—a machine nut. Assume that the total inventory of nuts has only three distinguishing
attributes: size, material, and thread type. As a result, this entire class of inventory must be
distinguished on the basis of these three features. Therefore uncoded entry for any transaction
takes a great deal of recording space, is time-consuming to record, and is obviously prone to
many types of errors. The negative effects of this approach may be seen in many parts of the
organization:
Page 59 of 64
(i) Sales staff: Properly identifying the items sold requires the transcription of large amounts of
detail onto source documents. Apart from the time and effort involved, this tends to promote
clerical errors and incorrect shipments.
(ii) Warehouse personnel: Locating and picking goods for shipment are impeded and shipping
errors will likely result.
(iii) Accounting personnel: Postings to ledger accounts will require searching through the
subsidiary files using lengthy descriptions as the key. This will be painfully slow, and
postings to the wrong accounts will be common.
This is not to suggest that detailed information about the inventory and the supplier is of no
interest to the organization. These facts will be kept in reference files and used for such purposes
as the preparation of parts lists, catalogs, bills of material, and mailing information. The
inclusion of such details, however, would clutter the task of transaction processing and could
prove dysfunctional, as this simple example illustrates. Other uses of data coding in AIS are to:
1. Concisely represent large amounts of complex information that would otherwise be
unmanageable.
2. Provide a means of accountability over the completeness of the transactions processed.
3. Identify unique transactions and accounts within a file.
4. Support the audit function by providing an effective audit trail,
5. Uniquely identify transactions and accounts
6. Compress data
7. Aid in classification of accounts or transactions
8. Communicate special meaning
The advantage of sequential coding supports the reconciliation of a batch of transactions, such
as sales orders, at the end of processing. If the transaction processing system detects any gaps in
the sequence of transaction numbers, it alerts management to the possibility of a missing or
misplaced transaction. By tracing the transaction number back through the stages in the process,
management can eventually determine the cause and effect of the error. Without sequentially
numbered documents, problems of this sort are difficult to detect and resolve.
However, the disadvantage of sequential codes carry no information content beyond their order
in the sequence. For instance, a sequential code assigned to a raw material inventory item tells
us nothing about the attributes of the item (type, size, material, warehouse location, and so on).
Also, sequential coding schemes are difficult to change. Inserting a new item at some midpoint
requires renumbering the subsequent items in the class accordingly. In applications where record
types must be grouped together logically and where additions and deletions occur regularly, this
coding scheme is inappropriate.
A well-designed and comprehensive chart of accounts is the basis for the general ledger and is
thus critical to a firm’s financial and management reporting systems. The more extensive the
chart of accounts, the more precisely a firm can classify its transactions and the greater the range
of information it can pro- vide to internal and external users.
Note that each account type is represented by a unique range of codes or blocks. Thus, balance
sheet and income statement account classifications and sub-classifications can be depicted. In
this example, each of the accounts consists of a three-digit code. The first digit is the blocking
digit and represents the account classification; for example, current assets, liabilities, or
operating expense. The other digits in the code are sequentially assigned.
The Advantage of block coding is that it allows for the insertion of new codes within a block
without having to reorganize the entire coding structure. For example, if advertising expense is
account number 626, the first digit indicates that this account is an operating expense.
As new types of expense items are incurred and have to be specifically accounted for, they may
be added sequentially within the 600 account classification. This three-digit code accommodates
100 individual items (X00 through X99) within each block. Obviously, the more digits in the
code range, the more items that can be represented.
Page 61 of 64
The disadvantage of block coding is that as with the sequential codes, the information content
of the block code is not readily apparent. For instance, account number 626 means nothing until
matched against the chart of accounts, which identifies it as advertising expense.
Group codes have a number of advantages over sequential and block codes.
(i) They facilitate the representation of large amounts of diverse data.
(ii) They allow complex data structures to be represented in a hierarchical form that is logical
and more easily remembered by humans.
(iii) They permit detailed analysis and reporting both within an item class and across different
classes of items.
For example Store Number 04 could represent the Ado Bayero Mall Store in Kano; Dept.
Number 09 represents the electrical goods department; Item Number 476214 is a Television Set;
and Salesperson 99 is Fatima Adams. With this level of information, a corporate manager could
Page 62 of 64
measure profitability by store, compare the performance of similar departments across all stores,
track the movement of specific inventory items, and evaluate sales performance by employees
within and between stores.
Ironically, the primary disadvantage of group coding results from its success as a classification
tool. Because group codes can effectively present diverse information, they tend to be over-
used. Unrelated data may be linked simply because it can be done. This can lead to
unnecessarily complex group codes that cannot be easily interpreted. Finally, over-use can
increase storage costs, promote clerical errors, and increase processing time and effort.
The advantage of alphabetic codes is that the capacity to represent large numbers of items is
increased dramatically through the use of pure alphabetic codes or alphabetic characters
embedded within numeric codes (alphanumeric codes). The earlier example of a chart of
accounts using a three-digit code with a single blocking digit limits data representation to only
10 blocks of accounts—0 through 9. Using alphabetic characters for blocking, however,
increases the number of possible blocks to 26—A through Z. Furthermore, whereas the two-
digit sequential portion of that code has the capacity of only 100 items (102), a two-position
alphabetic code can represent 676 items (262). Thus, by using alphabetic codes in the same
three-digit coding space, we see a geometric increase in the potential for data representation
Page 63 of 64
This combination of mnemonic and numeric codes conveys a good deal of information about
these courses; with a little analysis, we can deduce that Acctg is accounting, Psyc is psychology,
Mgt is management, and Mktg is marketing. The sequential number portion of the code
indicates the level of each course. Another example of the use of mnemonic codes is assigning
state codes in mailing addresses,
Code Meaning
KN Kano
GM Gombe
BA Bauchi
PL Plateau
The advantage of mnemonic coding scheme is that it does not require the user to memorize
meaning; the code itself conveys a high degree of information about the item that is being
represented.
Although mnemonic codes are useful for representing classes of items, their disadvantage
is that they have limited ability to represent items within a class. For example, the entire class of
accounts receivable could be represented by the mnemonic code Accounts Receivable, but one
would quickly exhaust meaningful combinations of alphabetic characters if we attempted to
represent the individual accounts that make up this class. These accounts would be represented
better by sequential, block, or group coding techniques.
Page 64 of 64