0% found this document useful (0 votes)
63 views

Introduction To CBIS Computer Based Information System

presentation on CBIS

Uploaded by

Adil Shan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Introduction To CBIS Computer Based Information System

presentation on CBIS

Uploaded by

Adil Shan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Introduction to CBIS

(Computer Based
Information System)
A Computer-Based Information System (CBIS) is a collection of hardware,
software, data, procedures, and people designed to collect, process, store, and
distribute information. It enables businesses to make informed decisions,
automate tasks, and improve efficiency.
Definition and Overview of
CBIS
Information Collection Data Processing
CBIS gather raw data from Raw data is transformed into
various sources, like sensors, meaningful information through
forms, or databases. calculations, analysis, and
organization.

Information Storage Information Distribution


Processed information is stored Relevant information is
securely for future access and disseminated to authorized users
retrieval. via reports, dashboards, or other
channels.
Components of a CBIS
1 Hardware 2 Software
Physical components like Programs and applications
computers, servers, networks, that enable the CBIS to
and peripherals. function, such as operating
systems and databases.

3 Data 4 Procedures
Raw facts and figures Step-by-step instructions for
collected and processed by operating the CBIS and using
the CBIS. its components.
Hardware, Software, Data, and Procedures
Hardware Software Data

Computers, servers, storage devices, Operating systems, databases, Raw facts and figures, organized in
network equipment, and peripherals. applications, and programming tables, spreadsheets, or databases.
languages.
Roles and Responsibilities in a CBIS
System Analysts
Analyze business needs, design system solutions, and document requirements.

Programmers
Develop and maintain software applications, coding, and testing.

Database Administrators
Manage and maintain databases, ensuring data integrity and security.

Network Administrators
Manage and maintain network infrastructure, ensuring connectivity and security.
CBIS Development Lifecycle
Planning 1
Define project scope, objectives, and resources.

2 Analysis
Study existing systems, identify needs, and gather requirements.

Design 3
Develop system specifications, choose technology, and create blueprints.

4 Implementation
Build and install the system, configure hardware and software.

Testing 5
Thoroughly test the system for functionality, performance, and security.

6 Deployment
Release the system to users, provide training, and monitor performance.

Maintenance 7
Provide ongoing support, updates, and enhancements to the system.
CBIS Implementation
Strategies

Waterfall Model Spiral Model


Linear, sequential approach with Iterative approach, with prototyping
distinct phases. and risk analysis.

Agile Model Cloud Computing


Iterative and incremental, with Utilizing cloud services for hardware,
flexible requirements. software, and data storage.
Benefits and Challenges of CBIS
Benefits Challenges

Improved efficiency and productivity High initial investment costs

Enhanced decision-making with accurate information Security risks and data breaches

Automated tasks, reducing manual labor Complexity and technical expertise required
Future Trends and
Advancements in CBIS
1 Artificial Intelligence 2 Big Data Analytics
AI-powered systems can Analyzing massive datasets to
automate complex tasks and identify trends and patterns.
provide insights.

3 Cloud-based Solutions 4 Internet of Things (IoT)


Scalable and flexible Connecting devices and
infrastructure for CBIS collecting data from physical
deployment. environments.

You might also like