نظم معلومات كامل

Download as pdf or txt
Download as pdf or txt
You are on page 1of 148

Information

systems

Chapter 1

Information systems Definition


10 September, 2023
1

Information systems Definition
I.S is a set of interrelated components work together to collect,
retrieve, process, store and disseminate information for the purpose
of facilitating planning , control , analysis ,coordination and decision
making in business and other organizations

10 September,
2
2023
Information systems Definition

10
Septemb 3
er, 2023
Overview of information systems
There are many types of information systems in the real world. All of
them use hardware, software, network, and people resources to
transform data resource into information products. Some are
1) Manual information systems, where people use simple tools such as
pencils and paper, or even machines such as calculators and
typewriters.
2) Computer-based information systems that rely on a variety of
computer systems to accomplish their information processing activities.

10
Septemb 4
er, 2023
Types of information systems
Conceptually, information systems in the real world can be classified
several different ways. For example, several types of
information systems can be classified as either operations or
management information systems. Figure bellow illustrates this
conceptual classification of information systems.

Operation and management classification of Information 10


Septemb 5
systems er, 2023
Types of information systems
 1) Operations support systems
Information systems have always been needed to
process data generated by and used in business
operations. Such operations support systems produce
a variety of information product for internal and
external use. However they do not emphasize
producing the specific information product that can
best used by manager. Further processing by
management information systems is usually required.
The role of a business firm’s operations support
systems is to efficiently process business
transactions, control industrial process, support
office communications and productivity, and update
10
corporate databases. Septemb
er, 2023
6
a) Transactions processing systems are an important example of
operations support systems that record and process data resulting from
business transactions. They process transactions in two ways:-
1) Batch processing, transactions data is accumulated over a
period of time and processed periodically.
2) Real-time (or online) processing, data is processed
immediately after a transaction occurs.
b) Process control systems monitor and control physical process. For
example, a petroleum refinery uses electronic sensors linked to
computers to continually monitor chemical processes and make instant
(real-time) adjustments that control the refinery process.
c) Office automation systems enhance office communications and
productivity. For example, a corporation may use word processing for
office correspondence, and electronic mail to send and receive
10
Septemb 7
er, 2023
electronic messages.
Types of information systems
 2) Management support systems
When information systems focus on providing
information and support for effective decision making
by managers, they called management support
systems .Providing information and support for
decision making by all levels of management (from
top executives to middle manager to supervisors) is a
complex task. Conceptually, several major types of
information systems support a variety of managerial
end user responsibilities:-

10
Septemb 8
er, 2023
a) Management information systems provide information in the form

of reports and displays to manager. For example, sales managers may

use their computer workstations to get instantaneous displays about

the sales results of their products and to access weekly sales analysis

reports that evaluate sales made by each salesperson.

b) Decision support systems give direct computer support to mangers

during the decision-making process.

c) Executive information systems provide critical information in easy to

use displays to top and middle management. For example, top

executives may use touch screen terminals to instantly view text and

graphics displays that highlight key areas of organizational and

competitive performance. 10
Septemb 9
er, 2023
Difference between Management information systems(MIS)
and Decision support systems(DSS)

10
Septemb 10
er, 2023
Thank you

10
September, 11
2023
Information
systems

Chapter 2

Information System Resources


10 September, 2023
1

Information System Resources
Our basic IS model shows that an information system consists of five
major resources:-
1) People Resources:-people are required for the operation of all
information systems. These people resources include
a) End users (also called users or clients) are people who use an
information system or the information it produces. They can
be sales persons, engineers or managers.
b) IS specialists are people who develop and operate information
systems. They include systems analysts, or programmers

10 September,
2
2023

Information System Resources
2) Hardware Resources :-the concept of hardware resources
includes all physical devices and materials used in information
processing Examples of hardware resources in computer based
information system are
a) Computer systems, which consists of central processing units
(CPUs) and a variety of interconnected peripheral devices.
Examples are large mainframe computer systems and
microcomputer systems.
b) Computer peripherals, which are devices such as a keyboard or
electronic mouse for input of data and commands, a video
screen or printer for output of information, and magnetic or
optical disks for storage of data resource.
10 September,
3
2023

Information System Resources
3) Software Resources
The concept of software resources includes all sets of
information processing instructions. The following are examples
of software resources:
a) System software, such as an operating system program , which
controls and supports the operations of a computer system
b) Application software, which are programs that direct processing
for a particular use of computers by end users. Example is a
word processing program.
c) Procedures, which are operating instructions for the people
who will use an information system. Example is using a
software package.
10 September,
4
2023

Information System Resources
4) Data resources
The concept of data resources has been broadened by managers
and information systems professionals. They realize that data
constitutes a valuable organizational resource. Thus, you should view
data resources that must be managed effectively to benefit all end
users in an organization.
The data resources of information systems are typically
organized into:
a) Databases that hold processed and organized data.
b) Knowledge bases that hold knowledge in a variety of forms such
as facts and rules of inference about various subjects.

10 September,
5
2023

Information System Resources
 5) Network Resources
Telecommunication network have become essential to the successful
operations of modern organizations and their computer based
information systems. Telecommunication network consists of
computers, end user terminals, communications processors and other
devices interconnected by communications media and controlled by
communications software.Net work resources include:-
 a) Communication media: examples include twisted-pair wire,
coaxial cable, fiber optic cable, microwave systems, and
communications satellite systems.
 b) Network support: this generic category includes all of the
people, hardware, software, and data resources that directly
support the operation and use of a communication network.

10 September,
6
2023
Thank you

10
September, 7
2023
Information
systems

Chapter 3

Information System Hardware


10 September, 2023
1

Information System Hardware
Computer categories
Computer systems are typically classified as
1) Microcomputers
2) Midrange computers
3) Mainframe computers
Figure bellow illustrates computer classification

10 September,
2
2023

Computer categories
 1) Microcomputer systems:-
Microcomputers are the smallest but most important category of
computer systems for end users. Typically we refer to a
microcomputer as a personal computer or PC. However,
microcomputer have become much more than small computers used
by individual persons. Their computing power now exceeds that of
mainframe at a fraction of their cost. For this reason, they have
become powerful professional workstations for use by end users in
business and other organizations.
Most microcomputers are single user computers designed to support
the work activities of a variety of end users

10 September,
3
2023

Computer categories
 2) Midrange computers
Also called minicomputers are larger and more powerful than most microcomputers
but are smaller and less powerful than most large mainframes computer systems. In
addition, midrange systems cost less to buy and maintain than mainframe computers.
They can function in ordinary operating environment and do not need special air
conditioning.
Midrange computers are being used for many business and scientific applications such
as
 a) They become popular as minicomputers for scientific
research, instrumentation system, engineering analysis
and industrial process monitoring and control.
 b) They become popular as powerful network servers to help
manage large interconnected local area networks that tie
together many end user microcomputer workstations and
other computer devices in departments, offices and other
10 September,
4
2023

work sites.

Computer categories
 3) Mainframe computer systems
They are large, powerful computers that are physically larger than
micros and minis and usually have one or more central processors
with faster instruction processing speeds. For example, they
typically process hundreds of million instruction per second
(MIPS).They have large primary storage capacities. Many mainframes
models have the ability to service hundreds of users at once, For
example, a single large mainframe can process hundreds of different
programs and handle hundreds of different peripheral devices (disk,
printers) of hundreds of different users at the same time.

10 September,
5
2023

Central processing unit (CPU)
 Central processing unit (CPU)
The CPU is the most important hardware component of a computer
system. It is also known as the central processor or instruction
processor, and the main microprocessor in a microcomputer.
Conceptually, the CPU can be subdividing in to two major subunits: the
arithmetic logic unit and the control unit. The CPU also includes
specialized circuitry and devices such as registers for high speed.
 1) The control unit (CU) obtains instruction from those stored in
the primary storage unit and interprets them .Then it transmits
directions to the other components of the computer system,
ordering them to perform required operation.
 2) The Arithmetic logic unit (ALU) performs required arithmetic and
comparison operations. A computer can make logical changes from
one set of program instruction to another based on the results of
comparisons made in the ALU during processing

10 September,
6
2023

Multiple processors
Multiple processors
Many current computers use multiple processors for their
processing functions. Instead of having one CPU with single control unit
and arithmetic logic unit, the CPUs of these computers contain several
types of processing unit as illustrated:-
1) A support processor design relies on specialized microprocessors
to help the main CPU perform a variety of functions. These
microprocessors may be used for input/output, memory
management and arithmetic computations, thus freeing the main
processor to do the primary job of executing program
instructions.
2) A coupled processor design uses multiple CPUs or main
microprocessors to do multiprocessing, that is, executing more
than one instruction at the same time. Some configurations
provide a fault tolerant capability in which multiple CPUs provide
10 September,
7
2023
a built in back up to each other should one of them fail.

Multiple processors
3) A parallel processor design uses a group of instruction processors
to execute several program instructions at the same time
.Sometimes, hardware or thousands of processors are organized in
clusters or network in Massively Parallel Processor (MPP) computers.
Other parallel processor designs are based on simple models of the
human brain called neural networks. All of these systems can
execute many instructions at a time in parallel.

10 September,
8
2023

Data bus
 Data bus
Is a system of wires, or strings of conductive material, etched on the
surface of a computer board. It is a communications channel that
allows the transmission of a whole byte or more in one pass

10 September,
9
2023

Multiprocessing
 Multiprocessing
The mode in which a computer uses more than one processing unit
simultaneously to process data

10 September,
10
2023

Memory characteristic and functions

Memory characteristic and functions


No step in the machine cycle can be taken without a place for the
CPU to store the instructions and data needed for a particular process.
Primary memory is that place. Because primary memory must exist in a
computer for the CPU to do its job, many consider it to be another part
of the CPU.
External storage consists of media that allow permanent storage of
programs and data. Such media include magnetic disks, magnetic tapes,
and optical disks.
Primary memory is used in the actual processing of data inside the
computer all data and instructions must be copied to RAM for the CPU
to execute them two types of storage space compose a computer’s
primary memory:-
10 September,
11
2023
Memory characteristic and functions

 1) Random Access Memory (RAM) is where instructions and data


are stored before the CPU fetches them for processing. The CPU
does not deal directly with external storage devices, only with
RAM. So, for a program to run, all instructions and data first must
be entered into RAM, either from a keyboard or other input
device, or from an external storage device , such as a magnetic
disk or CD.
Every RAM location has a unique address called a memory address;
that is how the CPU fiends instructions and data. As soon as an
instruction is copied into RAM, it is placed in a location with its
memory address where it stays until other instructions or data
replace it. Replacement occurs if the program sends another
instruction to that address, or if the computer finishes executing an
entire program and loads another.

10 September,
12
2023

Memory characteristic and functions

 2) Cache Memory virtually all new microcomputer models offer


cache
memory as a part of RAM. Cache memory is made up of fast memory
semiconductor chips. The CPU can access cache memory faster than
the rest of RAM. Cache memory stores the most frequently used
instructions of the programs the computer runs, allowing faster
retrieval and execution.

10 September,
13
2023

Memory characteristic and functions
 3) Read Only Memory A small part of primary memory consists of
chips
called read-only memory or (ROM).These chips hold instructions that
let you communicate with the computer until operating system
program, such as windows take control .ROM also holds ASCII codes
for
a character set: the 26 capital and lowercase letters, the digits 0
through 9, punctuation marks and other symbols such as $ and.

10 September,
14
2023
Thank you

10
September, 15
2023
Information
systems

Chapter 4

Information System Software


10 September, 2023
1

Information System Software
Information System Software
System software consists of programs that manage and support a
computer system and its information processing activities. These
programs serve as a vital software interface between computer system
hardware and the application programs of end users. See figure bellow.
We can group such programs into three major functional categories:-
1) System management programs:-programs that manage the
hardware, software, and data resources of the computer system
during its execution of the various information process jobs of
users. The most important system management programs are
operating systems and operating environments.
2) System support programs:-programs that support the
operation and management of a computer system by providing
a variety of support services. Major support programs are
system utilities, performance monitors, and security monitors.
10 September,
2
2023

Information System Software
3) System development programs:-programs that help users
develop information system programs and procedures and
prepare user programs for computer processing .major
development programs are language translators and
programming tools.

The system and


application software
interface between
end users and
computer hardware

10 September,
3
2023

Information System Software
 Operating system functions
An operating system performs five basic functions in the operation of a computer
system as
 1) User interface
The user interface is the part of the operating system that allows you to communicate
with it so you can load programs, access files, and accomplish other tasks. The trend
is toward in easy to use graphical user interface (GUI) that uses icons, bars, buttons,
boxes, and other images .GUI rely on pointing devices like
the electronic mouse to make selections that help you get things done.
 2) Resource management
An operating system uses a variety of resources management programs to manage the
hardware resources of a computer system, including its CPU, memory, secondary
storage devices, and input/output peripherals. For example, memory management
programs keep track of where data and programs are stored. They may also subdivide
memory in to a number of sections and swap parts of programs and data between
memory and magnetic disks or other secondary storag

10 September,
4
2023

Information System Software
 3) File management
An operating system contains file management programs that control the creation, deletion, and
access of files of data and programs. File management also involves keeping track of the physical
location of files on magnetic disks and other secondary storage devices.
 4) Task management
The task management programs of an operating system manage the accomplishment of the
computing tasks of end users. They give each task a slice of a CPU’s time and interrupt the CPU
operation to substitute other tasks.
 5) System support programs
System support programs are a category of software that performs routine support functions for
the users of a computer system. Utility programs, or utilities, are an important example .The
programs perform miscellaneous housekeeping and file conversion functions .For example, sort
programs are important utility programs that perform the sorting operations on data required in
many information processing applications. Utility programs also clear primary storage , load
programs, record the contents of primary storage, and convert files of data from one storage
medium to another.
Other system support programs include performance monitor and security monitors.
 Performance monitors are programs that monitor the performance and usage of computer
systems to help its efficient use.
10 September,
5
 Security monitors are packages that monitor and control the2023
use of computer systems and
provide warning messages and record evidence of unauthorized use of computer resources.

Information System Software
Applications software
Application software consists of programs that direct computers to
perform specific information processing activities for end users.
These
programs are called application packages because they direct the
processing required for a particular use, or application, that end
users
want accomplished. Application software can be classified as:-

10 September,
6
2023

Information System Software
1) General purpose programs
General purpose application programs are programs that perform
common information processing jobs for end users and GPP can
divide into
a) Word processing packages are programs that computerizethe creation,
editing, and printing of documents (such as letters, and reports) by
electronically processing text data (words, phrases, sentences, and
paragraphs).
b) Database management packages such as access by Microsoft
allow end users to setup databases of files and records on their personal
computer systems and quickly store dataand retrieve information .Most DBMS
packages can
perform four primary tasks
c) Graphics packages. Convert numeric data into graphics displays such as line
charts and bar graph. Many other types of presentation graphics displays are
possible .Draw and paint graphics packages support freehand drawing

10 September,
7
2023

Information System Software
2) Application specific programs
Thousands of application software package are available to support
specific applications of end users. Major categories of such application
specific programs are:-
a) Business application programs. Programs that accomplish the
information processing tasks of important business functions or industry
requirements.
b) Scientific application programs. Programs that perform information
processing tasks for the natural, physical,
and behavioral sciences, and for mathematics, engineering, and all
other areas involved in scientific research, scientific analysis,
engineering design, and
monitoring of experiments.c) Other application programs. There are so
many other application areas of computers that we lump them all
into this category. Thus, we can talk of computer applications in
education, music, art ,law, medicine, and
so on.
10 September,
8
2023

Information System Software
 Programming languages
A programming language allows a programmer or end user to develop
the sets of instruction that constitute a computer program. Many
different programming languages have been developed, each with its
own unique vocabulary, grammar, and users. Programming languages can
be grouped into the five categories as:-
 1) Machine languages (or first generation languages) are the most
basic level of programming languages. In the early stages of
computer development, all program instructions had to be written
using binary codes unique to each computer. This type of
programming involves the difficult task of writing instruction in the
form of strings of binary digits (ones and zeros) or other number
systems. Programmers must have a detailed knowledge of the
internal operations of the specific type of CPU they are using .They
must write long series of detailed instructions to accomplish even
simple processing tasks

10 September,
9
2023

Information System Software
 Programming languages
A programming language allows a programmer or end user to develop the sets of
instruction that constitute a computer program. Many different programming
languages have been developed, each with its own unique vocabulary, grammar, and
users. Programming languages can be grouped into the five categories as:
1) Machine languages (or first generation languages) are the most basic level of
programming languages. In the early stages of computer development, all program
instructions had to be written using binary codes unique to each computer. This type
of programming involves the difficult task of writing instruction in the form of strings
of binary digits (ones and zeros) or other number systems. Programmers must have a
detailed knowledge of the internal operations of the specific type of CPU they are
using .They must write long series of detailed instructions to accomplish even simple
processing tasks
2) Assembler languages (or second generation languages) are the next level of
programming languages. They were developed to reduce the difficulties in writing
machine language programs. The use of assembler language requires language
translator program called assembler that allows a computer to convert the
instructions of such languages into machine instructions. Assembler languages are
10 September,
frequently called symbolic languages because symbols are
2023used to represent operation
10

codes and storage locations



Information System Software
 3) High level language (or third generation languages) uses
instructions, which are called statements, that closely resemble
language or standard notation of mathematics. Individual high level
language statement are actually macroinstructions, that is ,each
individual statement generates several machine instructions when
translated into machine language by high level language translator.
 4) Forth generation languages most forth generation languages are
non procedural languages that encourage users and programmers to
specify the result they want, while the computer determines the
sequence if instructions that will accomplish those result. Users and
programmers no longer have to spend a lot of time developing the
sequence of instructions the computer must follow to achieve a result.
Thus, 4GLs have helped simplify the programming process. Natural languages
10 September,
11
are 4GLs that are very close to English or other human languages
2023

Information System Software

10 September,
12
2023

Information System Software

10 September,
13
2023

Information System Software
 Programming languages translator (PLT)
PLT are programs that translate other programs into machine language
instruction codes that computers can execute and can be divided into the
following:-
 1) An assembler translates the symbolic instructions codes of program
written in an assembler language into machine language instructions.
 2) A compiler program that translate a high level programming language
into machine language program.
 3) An interpreter program that translates and executes each source
language statement before translating and executing the next one.

10 September,
14
2023
Thank you

10
September, 15
2023
Information
systems

Chapter 5

Data management module


10 September, 2023
1

Data management module
 Data management module
Data management module is a database that allows a decision maker
to conduct the intelligence phase of decision making .For example,
an investment consultant always need access to current stock prices
and those from at least the preceding few year. A data management
module accesses the data and provides a mean for decision system to
select data according to certain criteria: type of stock, range of
years, and so on.

10 September,
2
2023

Data management module
 Traditional approach for data management
A data file is a collection of logically related records. Therefore, in a
file management environment, each application has a specific data
file related to it, containing all data records needed by the
application. Over time, organizations developed numerous
applications, each with associated, application specific data file. For
example, a university has many computer based applications
involving students. These applications include course registration,
fee payment, and grades among others. In a file management
environment, each of these applications would have its own student
data file. This approach to data management, where the
organization has multiple applications with related data files, is
considered the traditional approach

10 September,
3
2023

Data management module
Problems with traditional file approach
The traditional file approach led to many problems:-
1) Corporate applications typically share some common core functions,
such as input, report generation, querying, and data browsing. However,
these common functions typically were designed, coded, documented,
and tested, at great expense, for each application.
2) Data redundancy: As applications and their data files were created by
different programmers over a period of time, the same piece of
information could be duplicated in several places. In the university
example, each data file will contain records about students, many of
whom will be represented in other data files. here fore, student file in
the aggregate will contain some amount of duplicate data.
3) Data inconsistency: Data inconsistency means that the various copies
of the data no longer agree. For example, if a student changes his or her
address, the new address must be changed across all applications in the
university that require the address.

10 September,
4
2023

Data management module
4) Data isolation: With applications uniquely designed and implemented, data
files are likely to be organized differently, stored in different formats and often
physically inaccessible to other applications. In the university example, an
administrator who wanted to know which students taking advanced courses were
also starting players on the football team would most likely not be able to get
the answer from the computer based file system.
5) Security: security is difficult to enforce in the file environment, because new
applications may be added to the system.
6) Data integrity: Data values must often meet integrity constraints that are;
they must be accurate and fit for their intended use. For example, the students
Social Security data field should contain no alphabetic characters, and the
students’ grade point average field should not be negative. It is difficult to place
data integrity constraints across multiple data files.
7) Data independence: In the file environment, the applications and their data
files are dependent on each other. Storing data in files that were tightly linked to
their applications eventually led to organizations having hundreds of applications
and data files, withno one knowing what the applications did or what data they
required

10 September,
5
2023

Data management module
 Database approach for data management
A database, which is a logical group of related files, can eliminate
many of the problems associated with a traditional file environment.
With the database approach, all the data are typically contained in
the same storage location, rather than residing in many different
files across the organization. Unlike the traditional approach, in
which different programs access the different data files, the
database is arranged so that one set of software programs the
database management system provides access to all the data.
Therefore, data redundancy, data isolation, and data inconsistency
are minimized, and data can be shared among all users of the data.
In addition, security and data integrity are increased, and
applications and data are independent of one another.

10 September,
6
2023

Data management module
 Database definition
A database is a collection of several related files, the program used
to build database, populate them with data, and manipulate the
data.
 Database approach versus traditional file approach
If you wanted to access data from files that were stored in a
traditional file approach, the records would have to be organized in
a very specific way, and you would have to know exactly how many
characters were designed for each type of data.
If you are using a database, you want to be able to move rapidly
from one record to another, sort by different criteria, create
different types of reports, and analyze the data in different ways.

10 September,
7
2023

Data management module
 Database advantages
Database systems provide many advantages to the organization:
1) Improved strategic use of corporate data
2) Reduced complexity of the organization’s information systems
environment
3) Reduced data redundancy and inconsistency
4) Enhanced data integrity
5) Application data independence
6) Improved security
7) Reduced application development and maintenance costs
8) Improved flexibility of information systems
9) Increased access and availability of data and information

10 September,
8
2023

Data management module
 Logical and Physical organization of data
The physical organization deals with the actual, physical
arrangement and location of data in direct access storage devices
(DASD).Database specialists use the physical organization to make
efficient use of storage and processing resources. Users, however,
may wish to see differently from how they are stored, and they do
not know all the technical details of physical storage.
The logical organization a database represents data in a format that
is meaningful to a user and to the software programs that process
that data. That is, the logical organization tells the user what is in
the database.

10 September,
9
2023
Data management module ★
 Keys and attributes
To retrieve records from a database, or to sort them, you must use a
key. A key is a field whose values identify records either for display
or for processing. You may use any field as a key. For example, you
could ask the database for record of pupil Ali from the student table
by using the L.Nme field as a key. That is, you enter a query, a
condition that instructs the database to retrieve a record with the
value of L.Name as “Ali”. A key is unique if the value (content) in
that field appears only in one record. Sometimes a key is composed
of several fields so that their combination provides a unique key.

10 September,
10
2023

Data management module
 Data structure of database
A database model is the general logical structure in which records
are stored within a database and the method used to establish
relationships among the records. There are several database
structures:-

10 September,
11
2023

Data management module
 1) Hierarchical data structure
To understand the various models, consider a database for storing
university data: there are records about colleges, departments,
proffers, and students. Logically, these four types of university
records are hierarchical, meaning that each category is a
subcategory of the next level. The highest level is college; each
college has several departments; each department consists of
several professors; and each professor has several students. The
hierarchical structure follows the pattern of upside-down tree and is
sometimes referred to as the tree model. Therefore, if the university
chose to follow a hierarchical model, the records would be stored as
indicated in figure bellow.

10 September,
12
2023

Data management module

The advantage of hierarchical database is their suitability for


maintaining data on hierarchical environments. But hierarchical
databases also have several disadvantages. To retrieve a certain record,
uses must start the search at the root, which is the set of records at the
very top level, and then navigate the hierarchy until they find the
desired record. If for some reason, a link is broken, the entire branch
that was connected through that pointer to the other records is lost.
And because child records can have only one parent, hierarchical
database require considerable data redundancy

10 September,
13
2023

Data management module
 2) Network data structure
The reverse of the last disadvantage of the hierarchical structure is
the greatest advantage of the network structure: the ability to store
a record only once in the entire database while creating links that
establish relationships with several records of another type of entity.
Remember that in the hierarchical structure there was data
redundancy because separate repetitive records for student had to
be maintained in two different student files. The network structure
on the other hand, would allow the same record to be linked to more
than one parent as illustrated in figure bellow

10 September,
14
2023

Data management module

Network database create significantly less data redundancy than hierarchical


databases, but they are complicated to build and difficult to maintain. While the user
does not have to start a search at the root, it is difficult to navigate in the database.
The complex network of relationships creates a “spaghetti” that is hard to follow. For
this reasons, the network structure is least popular mode.

10 September,
15
2023

Data management module
 3) Relational structure
A relational model database has all the advantages of a network database
without the complications. The relational model consists of
table. Its roots are in relational algebra, although you do not have to know
relational algebra to build and use relational databases. In relational database, a
record is called a tuple, a column of fields is called an attribute, and a table is
called a relation. Relational databases are easier to conceptualize and maintain
than hierarchical and network models. To build a relational database, you only
need to have a clear idea of the different entities and how they relate. In our
example, the entities are college, department, professor, and student. A single
table is built for each object. Remember that entity in our context refers to a
record structure of all the occurrence of a subject. Thus, when database
designers think of “professor,” they know the professor table may include records
of many professors.
Retrieving a desired record is easy. To find a record of a certain professor, you
need to access the professor table and make an inquiry. Maintenance is easy
because the user does not have to recall any relationships. Each table stands
alone. To add a student record, the user accesses the student table. Similar
actions take place to change or delete a record figure bellow illustrated.

10 September,
16
2023
Thank you

10
September, 17
2023
Information
systems

Chapter 6

A manger’s view of telecommunications


networks 10 September, 2023
1
A manger’s view of telecommunications networks

 A manger’s view of telecommunications networks


Why telecommunications is important?
End users need to communicate electronically to succeed in today’s
global information society.
Telecommunications is the sending of information in any form (e.g.,
voice, data, text, and images) from one place to another using
electronic or light emitting media.

10 September,
2
2023
A manger’s view of telecommunications networks

 Application of telecommunications
Telecommunications networks provide valuable capabilities to an
organization and its end users. For example, some networks enable work
groups to communicate electronically and share hardware, software,
and data resources. Other networks let a company process sales
transaction immediately from many remote locations, exchange business
documents electronically with its customers and suppliers, or remotely
monitor and control production processes. Telecommunications networks
can also interconnect the computer
system of business so their computing power can be shared by end users
throughout an enterprise. And, of course, telecommunications networks
enhance collaboration and communications among individuals both
inside and outside an organization. Figure bellow shows the application
of telecommunications.

10 September,
3
2023
A manger’s view of telecommunications networks

10 September,
4
2023
A manger’s view of telecommunications networks
 Tools for telecommunication
Tools for telecommunication are:-
 1) Telephone related communication services
Telephone is the process that occurs when two people who wish to contact each other by
telephone repeatedly miss each other phone calls. Telephone can be divided in to four types
 a) Fax messages
Dedicated fax machine are specialized devices that do nothing except send and receive copies of
document over transmission lines to and from other fax machines.
 b) Fax modems
Which is installed as circuit board inside a computer’s system cabinet, is a modem with fax
capability? It enables you to send and receive signals directly between your computer and some
one else fax machine or fax modem.
 c) Voice mail
A variation of electronic mail where digitized voice messages rather than electronic text are
accepted, stored, and transmitted.
 d) Electronic mail
Electronic mail likes computers by wired or wireless connection and allows users, through their
10 September,
keyboard to post and read responses on their display screen. 2023
5
A manger’s view of telecommunications networks

 2) Video/Voice communication
Video/Voice communication can be divided in to
 a) Video conferencing also called teleconferencing is the use
television video and sound technology as well as computers to
enables people in different locations to see, hear, and talk with
one another.
 b) Picture phone: - this device is a telephone with a TV like
screen and built in a camera.

10 September,
6
2023
A manger’s view of telecommunications networks

 Basic telecommunication signals


Communication is any transfer of data within a computer, between a
computer and another device, or between two computers.
 Modems
(Modulator –Demodulator) a device that converts the digital signals from
input/output devices into appropriate frequencies at a transmission
terminal and convert them back into digital signals at a receiving
terminal.
 Data transmission
Data can be transmitted in two basic modes: a whole byte at a time,
which is feasible only over very short distances, or a single bit at a time,
currently the only practical mode for communicating over long
distances. Within the computer and between the computer and its
peripheral equipment (such as its printer and external hard disk).

10 September,
7
2023
A manger’s view of telecommunications networks

 Direction of data transmission


The transmission can take the form of:-
 1) Parallel transmission, each byte is transmitted in its entirely.
The electrical impulses representing the bits of a byte are
transmitted along a bundle of parallel lines, one bit through each
line. These lines are often called bus.
 2) Serial transmission, on the other hand, data is transmitted one
bit at a time through a single line.
Parallel and serial data transmission require different types of wiring
.In the back of a computer are several outlets or ports for ports for
connecting different cables. An outlet that can accepts a parallel
device cable is a parallel port. An outlet that can accepts a serial
device cable is a serial port.

10 September,
8
2023
10 September,
9
2023
A manger’s view of telecommunications networks

 Communication channels
The three modes of communication between devices:-
 1) Simplex
In simplex communication, device A can transmit to device B, but
device B cannot transmit to device A. An example of simplex
communication is commercial radio transmission. Your car radio can
receive signals from a radio station, but cannot transmit back to it.

10 September,
10
2023
A manger’s view of telecommunications networks

2) Half-duplex
In half duplex mode, device A can transmit to device B while
device B receives the signal. Device B can transmit to device A while
device A receives the signal. However, the two devices cannot
transmit to each other at the same time, and one device can
transmit to other only when the other device is in reception mode.
A BHalf duplex may take place when you use a computer terminal to
communicate with a mainframe computer.

10 September,
11
2023
A manger’s view of telecommunications networks

3) Full-duplex
In full duplex communication, either device can transmit to the
other device while simultaneously receiving signals from the other
device. This is device A can transmit to B and receive from B at the
same time, and vice versa. Telephony is an example of full-duplex:
both parties can talk and listen at once. Full duplex data
communication is often used between computers.

10 September,
12
2023
A manger’s view of telecommunications networks
 Bandwidth
A communication medium is the physical medium, such as telephone
lines or television cables, through which data can be communicated.
The capacity of the medium is the speed at which data are
communicated, which is also called the transmission rate (Note that
the numbers are approximate .They are actually power of 2.Thus 1
kbps is actually 1024 bps and 1 Gbps is actually 1,048,576 bps.) It is
often called “bandwidth”. Bandwidth is measured in bits per second
(bps); the greater the capacity, the faster transmission.

10 September,
13
2023
A manger’s view of telecommunications networks

 Telecommunication Network topologies


There are several basic types of network topologies, or structure, in
telecommunications networks as:-
 1) point to point lines
When point to point lines are used, each terminal is connected by
its own line to a computer system.

10 September,
14
2023
A manger’s view of telecommunications networks
 2) Multidrop lines
When multi drop lines are used, several terminals share each data
communications line to a computer.

Obviously point to point lines are more expensive than multidrop lines, all of the
communications capacity and equipment of a communications line is being used by
single terminal. Therefore, point to point lines are used only if there will be
continuous communications between a computer and terminal or other computer
system. A multidrop line decrease communications costs, because each line is shared
by many terminals. Communications processors such as multiplexers help many
terminals share the same line.

10 September,
15
2023
A manger’s view of telecommunications networks

 3) star network
A star network ties end user computers to a central computer.

10 September,
16
2023
A manger’s view of telecommunications networks

 4) ring network
A ring network ties local computer processors together in a ring
on more equal basis.

10 September,
17
2023
A manger’s view of telecommunications networks

 5) bus network
A bus network is a network in which local processors share the
same bus, or communications channel. In many cases, star network
take the form of hierarchical networks.

10 September,
18
2023
Thank you

10
September, 19
2023
Information
systems

Chapter 7

Internet
10 September, 2023
1
Internet

 Internet
 The internet is the largest network of networks today, and the closest model
we have to the information superhighway of tomorrow. The internet (the Net)
is rapidly growing global web of thousands of business, educational and
research networks connecting millions of computers and their users in more
than 100 countries to each other.
 The most popular internet applications are E-mail and browsing the sites on
the World Wide Web. Internet E-mail is fast, faster than many public
networks. Messages usually arrive in seconds or a few minutes, anywhere in
the world. And internet E-mail messages can also take the form of data, text,
and video files.
 The internet also support bulletin board systems formed by thousands of
special internet groups. Any one can post messages on thousands of topics for
interested users to read .Other popular applications include accessing files
and databases from libraries and thousands of organizations, logging on to
other computers in the network, and holding real time conversations with
other internet users.

10 September,
2
2023
Internet

 Important telecommunications services on the Internet


There are many services on the internet such as :-
1) E-mail:-exchange electronic mail with millions of internet users.
2) Usenet:-post messages on bulletin board systems formed by thousands of
special interest discussion groups.
3) Internet Relay Chat:-hold real time conversations with internet users around
the world on hundred discussion channels.
4) File Transfer Protocol (FTP):- download data files, programs, reports,
articles, magazines, books, pictures, sounds, and other types of files from
thousands of sources to your computer system.
5) Telenet:-logon to and use thousands of internet computer systems around the
world.
6) World Wide Web (WWW):-point and click your way to thousands of
hyperlinked internet sites and resources using graphical browser software.

10 September,
3
2023
Internet

 Packet switching Technology


The internet relies on Packet switching Technology to deliver data
and information across networks.. Packet switching enables million
of users to send large and small chunks of data across the internet
concurrently. To minimize delays network technologies limit the
amount of data that a computer can transfer on each turn

10 September,
4
2023
Internet

Connecting Independent Networks


We can exam how packet-switching networks are interconnected to
form the Internet. The Internet uses special-purpose computers, called
routers, to interconnect independent net .For example, Figure 1
illustrates a router that connects Network 1 and Network2 router is like
a conventional computer in that it has a central processor, memory,
network interfaces routers do not use conventional software nor are
they used to run applications Their only job is to interconnect networks
and forward data packets from one network to another. For example,
in Figure 1, computers A and F connected to independent networks.
Ifcomputer A generates a data packet destined for computer F, the
packet is sent to the router that interconnects the two networks. The
router forwards the packet onto Network 2 where it is delivered to its
destination arc computer F.
10 September,
5
2023
Internet

10 September,
6
2023
Internet

 Electronic Commerce
Electronic Commerce (EC) is the online exchange of goods, services, and
money within firms, between firms, and between firms and their
customers. The allure of EC is that it has no geographical or time
limitations; with the help of technology firms can sell 7 days a week, 24
hours a day, 365 days a year to literally anyone, anywhere. In addition,
parking for customers is no problem and firms can deliver the goods
right to the customer’s door.
 The Many Faces of Electronic Commerce
EC now takes place in a number of different ways and on a number of
different technology platforms. For example, Electronic Data
Interchange (EDI), the on-line sale of goods and services between firms,
has been happening for over a decade on proprietary networks that
these firms have developed and paid for entirely themselves .

10 September,
7
2023
Internet
 A Model of Electronic Commerce
Company Web sites range from passive to active. At one extreme are the
relatively simple, passive Web sites that provide only product
information and the company address and phone number, much like a
traditional brochure would do. At the other extreme are the relatively
sophisticated, active Web sites that enable customers to see products,
services, and related real-time information; and actually conduct
purchase transactions on line. Figure bellow shows a model of electronic
commerce with five phases: Information gathering, ordering, payment,
fulfillment, and service and support. Firms now advertise their offerings
to prospective customers through Internet email and the Web.
Customers can order and pay for products and services online. If the
product or service can be digitized, it can be delivered online, as in the
case of information-based products, videos, and software.

10 September,
8
2023
Internet

 Figure 3 shows three possible modes of EC using the Internet. The


term used to describe transactions between individuals and firms
is Internetbased EC. Intranet, on the other hand, refers to use of
the Internet within the same business, and extranet refers to the
use of the Internet between firms.

10 September,
9
2023
Thank you

10
September, 10
2023
Information
systems

Chapter 8

Organizational of Information
Systems
10 September, 2023
1
Organizational of Information Systems

 Organizational of Information Systems


Every organization is composed of levels, as illustrated in Figure 1. As
you might expect, given the vastly different types of activities that
occur at different levels of an organization, each level can have vastly
different informational needs with unique characteristics.
 Operational Level
At the operational level of the firm, the routine day-to- day business
processes and interaction with customers occur. At this level,
information systems are designed automate repetitive activities, such as
sales transaction processing. Operational-level systems are primarily
designed to improve the efficiency of business processes and the
customer interface. Managers at the operational level, such as foremen
or supervisors, make day-to-day decisions that are highly structured and
recurring. Figure 1 summarizes the general characteristics of the
operational level.

10 September,
2
2023
Organizational of Information Systems

Executive
Level

Managerial Level

Operational Level

Figure 1: level of an organization

10 September,
3
2023
Organizational of Information Systems

10 September,
4
2023
Organizational of Information Systems

10 September,
5
2023
Organizational of Information Systems

Executive
Level

Managerial Level

Operational Level

Figure 2: Operational level of an organization

10 September,
6
2023
Organizational of Information Systems

 Managerial Level
At the managerial level of the organization, functional managers focus
on monitoring and controlling operational level activities and providing
information to higher levels of the organization. Managers at this level
often referred to as mid-level managers or functional managers (for
example, marketing manager) focus on effectively utilizing and
deploying organizational resources to reach the strategic objectives of
the organization. Mid-level managers typically focus on problems within
a specific business function, such as marketing. Managerial-level
decision making is generally referred to as semi-structured decision
making because solutions and problems are not clear-cut and. often
require judgment and expertise. For example, an information system
could provide a production manager with summary information about
sales forecasts for multiple product lines, inventory levels, and overall
production capacity;

10 September,
7
2023
Organizational of Information Systems

Executive
Level

Managerial Level

Operational Level

Figure 3: Managerial level of an organization

10 September,
8
2023
Organizational of Information Systems

 Executive Level
At the executive level of the organization, managers focus on longer-
term strategic issues facing the organization. Managers at this level
include the president and chief executive officer (CEO), vice presidents,
and possibly the board of directors. Executive-level decisions are often
very complex problems with broad and long-term ramifications for the
organization. Executive-level decision making is often referred to as
being messy or ill-structured because executives must consider the
ramifications of their decisions on the overall organization;
understanding how a given decision impacts the overall organization
makes executive decision making extremely complex. For example, top
managers may decide to develop a new product or discontinue an
existing one. Such a decision may have vast, long-term effects on the
organization. Information systems are used to obtain aggregate
summaries of trends and projections of the future to assist executive
level decision making Figure 4 summarizes the general characteristics of
the executive level.

10 September,
9
2023
Organizational of Information Systems

Executive
Level

Managerial Level

Operational Level

Figure 4: Executive level of an organization

10 September,
10
2023
Thank you

10
September, 11
2023
Information
systems

Chapter 9

Emerging information system


10 September, 2023
1
Emerging information system

 Emerging information system


Competitive advantage is usually achieved when a company
differentiates its product and service offering from those of its
competitors or operates at a lower cost structure than its
competitors. Successful organizations typically have a strong
competitive advantage, and smart organizations are continually
working to either gain or sustain competitive advantage.

10 September,
2
2023
Emerging information system

 The Nature of Emerging Systems


Many emerging technologies are focused on accomplishing two goals.
The first goal is to support the work of virtual teams people using
technology to collaborate together an effectively to solve problems
across time and distance. The second goal is to create and better
customer contact by integrating existing internal company systems
for accounting, ordering, and billing, with telephones and personal
computers via the internet and enabling customers to have more
direct contact with these internal systems.
One of the primary underlying technology drivers of emerging
information systems is technology convergence. Devices that have
long been separate kinds of technologies, such as telephones,
computers, and video recorders, are converging.

10 September,
3
2023
Emerging information system

 Implementing Emerging Systems


The development and use of technologies for virtual teamwork and
for improved customer contact have grown considerably in the past
several years. The technologies for virtual teamwork such as
videoconferencing for customer contact include the internet and
World Wide Web.
 Videoconferencing
Many organizations are conducting Videoconferencing, and the
demand for Videoconferencing equipment is growing quickly. For
example, sales for picture a leading Videoconferencing company
grew from $37 million in1990 to almost $500 million in 1997.

10 September,
4
2023
Emerging information system

 Desktop Videoconferencing
Desktop videoconferencing represents a second generation of video communication
that has been enabled by the growing power of personal computer processor A
desktop system usually has a fast personal computer, a small camera (often with fixed
focus though zooming and panning features are available), a speaker telephone or
separate microphone, videoconferencing software, and a special video
board installed inside the computer. Most desktop videoconferencing systems, like the
one in Figure 1, have three key features.
1) They easily available on a user’s so users no longer have to schedule or go to a
conference room to use the group videoconferencing facility.
2) Desktop videoconferencing units can support software application
sharing. Application sharing enables two people to collaborate using software on their
personal computers in separate locations.
3) Desktop videoconferencing units is shared white boarding software.
White boarding software enables users to draw with a mouse or typetext and display
it remotely to another unit.

10 September,
5
2023
Emerging information system

10 September,
Figure 1 Desktop Videoconferencing
2023
6
Emerging information system
 Limits to Videoconferencing
Although videoconferencing is a promising new technology that is growing rapidly
development and use, it has limits.
1) One problem with desktop videoconferencing is the cost of providing digital
telephone lines to many offices. It is relatively easy to pick up a standard analog
telephone and place a call to most of the world.
2) Another limit to desktop videoconferencing using digital phone lines is the lack of a
universally agreed upon standard, which is essential for widespread adoption of
videoconferencing. Companies are understandably reluctant to invest in any unit that
may not be able to communicate with units made by another company.
3) One other limit to most videoconferencing units is that they are point-to-point;
that is there are only two locations involved what if you need to meet with colleagues
Can every one videoconference together at same time. Assuming that everyone has
access to videoconferencing systems and digital telephone lines, it is possible to have
a multipoint conference. One way is to use a bridge, a device linking multiple
videoconferencing units
together that is sometimes called a multipoint control unit (MCU).
10 September,
7
2023
Point-to-point and multi- point conferencing are depicted in Figure 2
Emerging information system

10 September,
8
Figure 2: videoconferencing types 2023
Thank you

10
September, 9
2023
Information
systems

Chapter 10

The Evolution of Information


Systems Development
10 September, 2023
1
The Evolution of Information Systems Development

 The Need for Structured Systems Development


The process of designing, building, and maintaining information systems is often
referred to as systems analysis and design. The individual who performs this task is
referred to as a systems analyst.

 The Evolution of Information Systems Development


In the early days of computing, systems development and programming was
considered an art that only a few technical “gurus” could master. Unfortunately, the
techniques used to construct systems varied greatly from individual to individual. This
variation made it difficult to integrate large organizational information systems. Many
systems were not easily maintainable after the original programmer left the
organization. As a result, organizations were often left with systems that were very
difficult and expensive to maintain. Many organizations therefore under-utilized these
technology investments and failed to realize all possible benefits from their systems.
To address this problem, information systems professionals concluded that system
development needed to become engineering.
Common methods, techniques, and tools had to be developed to create a disciplined
approachfor constructing information systems. This evolution from an “art” to a
10 September,
“discipline” led to use of the term software engineering to help define
2023
2 what systems
analysts and programmers do., if all systems analysts.
The Evolution of Information Systems Development

 Steps in the Systems Development Process


The products that a firm produces and sells follow a life cycle, so do
organizational information systems. The term systems development life
cycle (SDLC) is used to describe the life of an information system from
conception to retirement. The SDLC has five primary phases:
 1. System identification, selection, and planning
 2. System analysis
 3. System design
 4. System implementation
 5. System maintenance
Figure 1 is a graphical representation of the SDLC. The SDLC is
represented as boxes connected by arrows. Within the SDLC, arrowsflow
in both directions from the top box (System Identification,
Selection, and Planning) to the bottom box (System Implementation)
10 September,
3
2023
The Evolution of Information Systems Development

10 September,
4
2023
The Evolution of Information Systems Development

 Phase 1: System Identification, Selection, and Planning


The first phase of the systems development life cycle is system identification,
selection, and planning, as shown in Figure 2. Given that an organization can
work on only a limited number of projects at a
System identification, selection, and planning System analysis System design
System implementation given time due to limited resources, care must be taken
so that only those projects that are critical to enabling the organization’s
mission, goals, and objectives be undertaken. The goal of system identification
and selection is simply to identify and select a development project from all
possible projects that could be performed. Organizations differ in how they
identify and select projects. Some organizations have a formal information
systems planning process where a senior manager, a business group, or IS
manager, identify and assess all possible systems development projects that an
organization could undertake.

10 September,
5
2023
The Evolution of Information Systems Development

10 September,
6
2023
The Evolution of Information Systems Development

 Phase 2: System analysis


The second phase of the system development life cycle is called
system analysis, as in figure 3 .one purpose of the system analysis
phase for designers to gain through understanding of an
organization’s way of doing things in the area for which the new
information system will be constructed. The process of conducting
an analysis requires many tasks or sub phases.

10 September,
7
2023
The Evolution of Information Systems Development

10 September,
8
2023
The Evolution of Information Systems Development

 Phase 3: System design


The third phase of the systems development life cycle is system
design, as shown in figure 4.during this phase the proposed system is
designed, the details of the particular approach chosen are
developed. Many different activities must occur during system
design.

10 September,
9
2023
The Evolution of Information Systems Development

10 September,
10
2023
The Evolution of Information Systems Development

 Phase 4: system implementation


The fourth phase of the systems development life cycle is system
implementation, as in Figure 5 there are different activities :
1) One group of activities focuses on transforming the system design
into a working information system that can be used by the
organization. These activities include software programming and
testing.
2) A second group of activities focuses on preparing the organization
for using the new information systems. These activities include
system conversion, documentation, user training, and support.

10 September,
11
2023
The Evolution of Information Systems Development

10 September,
12
2023
The Evolution of Information Systems Development

 Phase 5: system maintenance


After an information system is installed, it is essentially to maintain.
In the maintenance phase, one person within the systems
development group is responsible for collecting maintenance
requests from system users. After they are collected, requests are
analyzed so that the developer can better understand how the
proposed change might alter the system and what business benefits
and necessities might result from such a change. If the change
request is approved, a system change is designed and then
implemented, as shown in Figure 6.

10 September,
13
2023
The Evolution of Information Systems Development

10 September,
14
2023
Thank you

10
September, 15
2023
Information
systems

Chapter 11

Information system
development approaches
10 September, 2023
1
Information system development approaches
Information system development approaches
System analyst’s works closely with users to determine what is needed from the
proposed system .Analysts have traditionally asked users what information they
need to have put into the system and what types of information they need back
from the system to do their job well. There are different methods for collecting
system requirements such as

1) Critical Success Factors (CSF)


The Critical Success Factor (CSF) methodology for collecting system requirements
define their information system needs .It is still quite popular today as a way to
obtain a useful set of system requirements from users. A Critical Success Factor,
or CSF,is something that must go well to ensure success for a manager,
department, division, or organization.

How the CSF Approach Works


To understand an organization CSFs, a systems analyst interviews people
throughout the organization and asks each person to define her own personal
CSFs. After the analyst collects these individual CSFS, he can merge, consolidate,
and refine them to identify a broad set of organization wide CSFs, as shown in2
10 September,
2023
Figure 1.
Information system development approaches

10 September,
3
2023
Information system development approaches

 Strengths and Weaknesses of the CSF Approach Strengths


1) The greatest strength of the CSF approach is that senior managers
intuitively understand the approach and support its usage.
2) A second strength is that the CSF approach provides a way to understand the
information needs of the organization in order to make effective decision.

10 September,
4
2023
Information system development approaches

 Weaknesses
1) The method’s high-level focus can lead to an oversimplification of a
complex situation. For example, people have a limited capacity for dealing
with complexity and a limited capacity for keeping track of information.
2) Second weakness centers on the difficulty of finding analysts trained to
perform the CSF process that must both understand information systems
and be able to effectively communicate with senior executives.
3) A third weakness of the CSF approach is that this method is not user-centered;
that is, it relies on an expert systems analyst to glean requirements from users
and to organize them appropriately

10 September,
5
2023
Information system development approaches

2) Joint Application Requirements (JAR) Joint Application Design (JAD)


Joint Application Requirements (JAR) and Joint Application Design GAD) are
methods for collecting requirements and creating system designs. Most often,
people refer to both JAR and JAD as simply JAD .The defining aspect of JAD is that
“joint” really means group. The JAD method is a group-based approach for
collecting system requirements and for setting system design specifications.
When collecting system requirements and following the guidelines of the SDLC, a
system analyst interviews potential users of the new information systemindividually to
understand each user’s needs. During this process, the analyst may
interview a large number of users.
In contrast to the SDLC approach to determining systems requirements, a JAD is a
special type of a group meeting in which all users meet with the analyst at the
same time. During this meeting, all users jointly define and agree upon system
requirement designs. This process has resulted in dramatic
10 September,
reductions in the
6
2023
length of time needed to collect requirements or specify designs.
Information system development approaches

 How the JAD Approach Works


The JAD meeting can be held in a normal conference room or special purpose JAD
room. Figure 2 shows a sample JAD room. JAD meeting rooms are often designed
much like a classroom, with facilities for presenting information to the group. Most
JAD rooms have overhead projectors, whiteboards, flip charts, and computers to
assist in making presentations and to help in recording the ideas and deliberations of
the group.

10 September,
7
2023
Information system development approaches

Strengths and Weaknesses of JAD


The JAD approach to systems development provides several advantages.
Strengths
1) First, the group based process enables more people to be involved in the
development effort without adversely slowing the process.
2) It can also result in a system of much higher quality. Additionally, because user
involvement eases implementation (that is, users w involved in defining what the
system would do and how the system would operate)3) Training and support costs for
developing the system can be significantly lower.
Weaknesses

10 September,
8
2023
Information system development approaches

1) First, it is often very difficult to get all relevant users to the same place at the
same time to hold a JAD meeting. Large organizations may have users virtually all
over the world getting them all to a meeting (or a series of meetings) would be
extremely difficult and expensive
2) A second weakness of JAD relates to the inherent problems that groups may
face especially large groups. Have you ever worked in a group in which one
person dominated? Or, have you ever experienced a situation where some people
in the group were shy and didn’t want to talk? How about working in a group
where one or more of the members simply chose not to help and let the other
members of the group do the work?

10 September,
9
2023
Information system development approaches

10 September,
10
2023
Information system development approaches

3) Prototyping
Prototyping is a systems development methodology that uses a “trial and error”
approach for discovering how a system should operate. You probably use
prototyping all the time in many of your day-to-day activities, but you just don’t
know it! For example, when you buy new clothes you likely use prototyping that
is, trial and error by trying on several shirts before making a selection. Likewise,
when you buy a new car, computer or even when you choose a mate, you use a
trial-and-error process. When prototyping is used to design a new system, the
systems designer works with users in a trial-and-error process until the system
works the way the users want it to work.

10 September,
11
2023
Information system development approaches

How Prototyping Works


Figure 3 shows the prototyping process when applied to identifying determining
system requirements. To begin the process, the system designer interviews one
or several users of the system, either individually or as a group using a JAD. After
the designer gains a general understanding of what the users want, he develops a
prototype of the new system as quickly as possible to share with the users. The
users may like what they see or ask for changes. If changes are requested, the
designer modifies the prototype and again shares it with the users. This process of
sharing and refinement continues until the users approve the functionality of the
system

10 September,
12
2023
Information system development approaches

Strengths and Weaknesses of Prototyping


Strengths
1) The greatest strength of prototyping is that the process helps develop a close
working relationship between the system designers’ users. This relationship helps
build trust and acceptance for the new system.
2) Second strength of prototyping is that it is arguably the best systems
development method for identifying how a system should operate when the
system’s specifications are hard to define.

10 September,
13
2023
Information system development approaches

Weaknesses
Prototyping also has numerous weaknesses.
1) First prototyping is not appropriate for developing every type of information
system. For example, prototyping is very problematic in projects with a large
number of users that must be consulted during the design process; requiring the
systems analyst to consult with more than just a few users not only increases the
complexity of the process, but also significantly slows the process
2) Another weakness of prototyping is that the process itself often results in not
spending enough effort on important activities within the development process.
Consequently, the system development process can be rushed which can result in
inadequate analysis and design, poor testing, and little or no documentation
.Systems that lack maintainability due to inadequate documentation or someother
factor cost the organization significantly more resources to maintain than
do systems that are adequately documented. 10 September,
14
2023
10 September,
15
2023
Information system development approaches
4) Rapid Application Development (RAD)
Rapid Application Development (RAD) is a four-phase systems development
methodology that combines prototyping, computer-based development tools,
special management practices, and close user involvement
How Rapid Application Development Works
RAD has four phases: 1) requirements planning, 2) user design, 3) construction,
and 4) the move to the new system. Phase 1, requirements planning similar to the
first two phases of the SDLC, in which the system is planned and requirements are
analyzed .to gain intensive user involvement, the RAD methodology encourages
the use of JAD sessions to collect requirements. ‘Where RAD becomes radical is
during Phase 2, where users of the information system become intensively
involved the design process. RAD is a process in which requirements, designs, and
the system itself are developed via iterative refinement, as shown in Figure 4.
A sense, with the RAD approach the people building the system and the users of
that system keep cycling back and forth between Phase 2 (user design) and Phase
10 September,
16
3 (construction) until the system is done. As a result, RAD requires
2023close

cooperation between users and designers to be successful.


Information system development approaches
Strengths and Weaknesses of Rapid Application Development
Strengths
1) The greatest strength of RAD is the active involvement of users in the
development process. With active user involvement, it is much more likely that
the system being developed will actually meet their needs.
2) User involvement eases many of the training and installation activities
associated with the creation of a new system. Because the users were involved
from the beginning, the new system is viewed as “their” new system.
Weaknesses
1) A weakness of RAD is that some people believe it may not be a good approach
for developing systems that do not “need” to be developed rapidly ( Due to RAD’s
accelerated analysis approach, systems built using it are often limited in
functionality and flexibility for change.
2) In addition due to the emphasis on the speed of design and development,
systems developed using RAD may not be of the highest possible quality
10 September,
17
2023
Information system development approaches

10 September,
18
2023
Thank you

10
September, 19
2023

You might also like