Computer
Computer
Information system, an integrated set of components for collecting, storing, and processing
data and for providing information, knowledge, and digital products.
The first four are called information technology components. The figure illustrates how these
four components interact to form a CBIS.
• The hardware consists of devices such as the processor, monitor, keyboard, and printer.
Together, these devices accept, process, and display data and information.
• Procedures are the instructions for combining the above components to process
information and generate the desired output.
• People are those individuals who use the hardware and software, interface with it, or
utilize its output.
• OAS is mainly used by clerical workers or front desk executives. They use Multimedia
software , Fax, Word Processing etc for basic operations.
• TPS is mainly used by first floor Managers. They prepare invoices, monthly bill, monthly
reports.
• MIS is used by middle level Managers like Branch Manager of any Bank. They use the output
of lower level systems and prepare monthly planning reports, target plans, yearly reports
etc.
• DSS is used by top management of the organization. This part is also called Expert System
since it may require the use of AI (Artificial Intelligence). They use the output from MIS as
Input and also input from the other sources and prepare strategic planning for the
competitive and fast business world. They prepare Investment plans, Budget plans for the
upcoming year.
This functional information system supports the functions of human resource management of
an organization. The human resource management function, in its narrow sense, it also known
as personnel management .The function involves:
• Manpower planning.
• Staffing
• Training and development
• Performance evaluation, and
• Separation activities
• Timeliness
• Accuracy
• Consistency
• Completeness
• Relevance
Processing
Information
Data is an unsystematic fact or detail about something, information is a systematic and filtered form of
data, which is useful. When the data is processed and transformed in such a way that it becomes useful to
the users, it is known as information. In general, data indicates the facts or statistics gathered by the
researcher for analysis in their original form. We quite commonly use the term ‘data’ in the different
context. Research process starts with the collection of data, which plays a significant role in the statistical
analysis.
• Database
• DBMS
A database management system (DBMS) is a computer software application that interacts with
the user, other applications, and the database itself to capture and analyze data. A general-
purpose DBMS is designed to allow the definition, creation, querying, update, and
administration of database.
• RDBMS
An RDBMS is a type of database management system (DBMS) that stores data in a row-based
table structure which connects related data elements. An RDBMS includes functions that
maintain the security, accuracy, integrity and consistency of the data. This is different than the
file storage used in a DBMS. An RDBMS is a type of database management system (DBMS) that
stores data in a row-based table structure which connects related data elements.
An RDBMS includes functions that maintain the security, accuracy, integrity and consistency of
the data. This is different than the file storage used in a DBMS. A relational database is a digital
database based on the relational model of data, as proposed by E. F. Codd in 1970. A software
system used to maintain relational databases is a relational database management system
(RDBMS). All modern database management systems like SQL, MS SQL Server, IBM DB2,
ORACLE and My-SQL are based on RDBMS. RDBMS defines the integrity constraint for the
purpose of ACID (Atomicity, Consistency, Isolation and Durability) property.
The DBMS helps create an environment in which end users have better access to more and
better-managed data. Such access makes it possible for end users to respond quickly to changes
in their environment.
The more users access the data, the greater the risks of data security breaches. Corporations
invest considerable amounts of time, effort, and money to ensure that corporate data are used
properly. A DBMS provides a framework for better enforcement of data privacy and security
policies.
Data inconsistency exists when different versions of the same data appear in different places.
For example, data inconsistency exists when a company’s sales department stores a sales
representative’s name as “Bill Brown” and the company’s personnel department stores that
same person’s name as “William G. Brown,” or when the company’s regional sales office shows
the price of a product as $45.95 and its national sales office shows the same product’s price as
$43.95. The probability of data inconsistency is greatly reduced in a properly designed
database.
The DBMS makes it possible to produce quick answers to ad hoc queries. From a database
perspective, a query is a specific request issued to the DBMS for data manipulation—for
example, to read or update the data. Simply put, a query is a question, and an ad hoc query is a
spur-of-the-moment question. The DBMS sends back an answer (called the query result set) to
the application. For example, end users, when dealing with large amounts of sales data, might
want quick answers to questions (ad hoc queries) such as:
– What was the dollar volume of sales by product during the past six months?
– What is the sales bonus figure for each of our salespeople during the past three months?
Better-managed data and improved data access make it possible to generate better-quality
information, on which better decisions are based. The quality of the information generated
depends on the quality of the underlying data. Data quality is a comprehensive approach to
promoting the accuracy, validity, and timeliness of the data. While the DBMS does not guarantee
data quality, it provides a framework to facilitate data quality initiatives.
The availability of data, combined with the tools that transform data into usable information,
empowers end users to make quick, informed decisions that can make the difference between
success and failure in the global economy.
1. Increased costs.
Database systems require sophisticated hardware and software and highly skilled personnel.
The cost of maintaining the hardware, software, and personnel required to operate and manage
a database system can be substantial. Training, licensing, and regulation compliance costs are
often overlooked when database systems are implemented.
2. Management complexity.
Database systems interface with many different technologies and have a significant impact on a
company’s resources and culture. The changes introduced by the adoption of a database system
must be properly managed to ensure that they help advance the company’s objectives. Given the
fact that database systems hold crucial company data that are accessed from multiple sources,
security issues must be assessed constantly.
3. Maintaining currency.
To maximize the efficiency of the database system, you must keep your system current.
Therefore, you must perform frequent updates and apply the latest patches and security
measures to all components. Because database technology advances rapidly, personnel training
costs tend to be significant. Vendor dependence. Given the heavy investment in technology and
personnel training, companies might be reluctant to change database vendors. As a
consequence, vendors are less likely to offer pricing point advantages to existing customers, and
those customers might be limited in their choice of database system components.
DBMS vendors frequently upgrade their products by adding new functionality. Such new
features often come bundled in new upgrade versions of the software. Some of these versions
require hardware upgrades. Not only do the upgrades themselves cost money, but it also costs
money to train database users and administrators to properly use and manage the new features
A data mart is a simple form of a data warehouse that is focused on a single subject (or
functional area), such as sales, finance or marketing.
Data Mining:
Data mining is sorting through data to identify patterns and establish relationships. Data Mining
requires big data for generating experience in some cases and application of AI to analyze and
present the data as required.
• Association - looking for patterns where one event is connected to another event
• Sequence or path analysis - looking for patterns where one event leads to another later event
• Clustering - finding and visually documenting groups of facts not previously known
• Forecasting - discovering patterns in data that can lead to reasonable predictions about the
future (This area of data mining is known as predictive analytics.)
Data mining techniques are used in a many research areas, including mathematics, cybernetics,
genetics and marketing.
Web mining, a type of data mining used in customer relationship management (CRM), takes
advantage of the huge amount of information gathered by a Web site to look for patterns in user
behavior.
Cloud computers are the servers in Internet to provide different kinds of services like storage,
software, infrastructure to the users connected in network on the Internet channel. Cloud
Computing provides us means of accessing the applications as utilities over the Internet. It
allows us to create, configure, and customize the applications online. The term Cloud refers to
an application on Network or Internet. In other words, we can say that Cloud is something,
which is present at remote location. Cloud can provide services over public and private
networks, i.e., WAN, LAN or VPN. Applications such as e-mail, web conferencing, customer
relationship management CRM execute on cloud.
Cloud Computing refers to manipulating, configuring, and accessing the hardware and
software resources remotely. It offers online data storage, infrastructure, and application. Cloud
computing offers platform independency, as the software is not required to be installed locally
on the PC. Hence, the Cloud Computing is making our business applications mobile and
collaborative. There are certain services and models working behind the scene making the
cloud computing feasible and accessible to end users. Following are the working models for
cloud computing:
• Deployment Models
• Service Models
Deployment Models
Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It is
more secured because of its private nature.
Community Cloud
The community cloud allows systems and services to be accessible by a group of organizations.
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three basic service
models which are -
Infrastructure-as–a-Service IaaS
Platform-as-a-Service PaaS
Software-as-a-Service SaaS