All Ict
All Ict
STANDARD LECTURE
NOTES
INFORMATION COMMUNICATION
TECHNOLOGY
FOR
ALL COURSES
1 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
1. What is a computer?
A computer is an information-processing machine. It may also be
defined as a device that works under the control of stored programs
automatically accepting, storing and processing data to produce
information that is the result of that processing.
Data – e.g. invoices, sales ledger and purchase ledger, payroll, stock
controls etc.
Text – widely available in many offices with microcomputers
Graphics – e.g. business graphs, symbols
Images – e.g. pictures
Voice – e.g. telephone
Processing includes creating, manipulating, storing, accessing and
transmitting.
2 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
3 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
4. History of Computers
4 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
The first electronic computers were produced in the 1940s. Since then,
a series of breakthroughs in electronics have occurred leading to great
improvements in the capacity, processing speed and quality of
computer resources.
Landmark Inventions
~500 B.C. - counting table with beads
5 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
6 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
6. Classification of computers
Computers can be classified in different ways as shown below:
Classification by processing
This is by how the computer represents and processes the data.
7 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Classification by purpose
This is a classification by the use to which the computer is put.
Classification by generation
This is a time-based classification coinciding with technological
advances.
The computers are categorized as First generation through to Fifth
generation.
8 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
9 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Unix and DOS-based operating systems use ASCII for text files.
Windows NT and 2000 uses a newer code, Unicode. IBM's S/390
systems use a proprietary 8-bit code called EBCDIC. Conversion
programs allow different operating systems to change a file from one
code to another. ASCII was developed by the American National
Standards Institute (ANSI).
(ii) EBCDIC
EBCDIC is a binary code for alphabetic and numeric characters that IBM
developed for its larger operating systems. It is the code for text files
that is used in IBM's OS/390 operating system for its S/390 servers and
that thousands of corporations use for their legacy applications and
databases. In an EBCDIC file, each alphabetic or numeric character is
represented with an 8-bit binary number (a string of eight 0's or 1's).
256 possible characters (letters of the alphabet, numerals, and special
characters) are defined.
(iii) Unicode
Unicode is an entirely new idea in setting up binary codes for text or
script characters. Officially called the Unicode Worldwide Character
Standard, it is a system for "the interchange, processing, and display of
10 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
the written texts of the diverse languages of the modern world." It also
supports many classical and historical texts in a number of languages.
Number Systems
(i) Decimal system (base 10)
This is the normal human numbering system where all numbers are
represented using base 10.The decimal system consists of 10 digits
namely 0 to 9. This system is not used by the computer for internal
data representation. The position of a digit represents its relation to the
power of ten.
E.g. 45780 = {(0×100) + (8×101) + (7×102) + (5×103) +
(4×104)}
11 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
2 1 6 3
1 2 A 0
12 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
13 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
8.1 Hardware
Refers to the physical, tangible computer equipment and devices,
which provide support for major functions such as input, processing
(internal storage, computation and control), output, secondary storage
(for data and programs), and communication.
Hardware categories
A computer system is a set of integrated devices that input, output,
process, and store data and information. Computer systems are
currently built around at least one digital processing device. There are
five main hardware components in a computer system: the central
processing unit (CPU); primary storage (main memory); secondary
storage; and input and output devices.
Basic elements of hardware
The basic elements that make up a computer system are as follows:
a) Input
Most computers cannot accept data in forms customary to human
communication such as speech or hand-written documents. It is
necessary, therefore, to present data to the computer in a way that
provides easy conversion into its own electronic pulse-based forms. This
is commonly achieved by typing data using the keyboard or using an
electronic mouse or any other input device.
Dumb Terminal
- Used to input and receive data only.
- It cannot process data independently.
- A terminal used by an airline reservation clerk to access
a mainframe computer for flight information is an
example of a dumb terminal
Intelligent Terminal
- Includes a processing unit, memory, and secondary
storage.
- It uses communications software and a telephone
hookup or other communications link.
14 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
15 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
16 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Note:
Point-of-sale (POS) terminals (electronic cash registers) use both
keyboard and direct entry.
Keyboard Entry can be used to type in information.
Direct Entry can be used to read special characters on price
tags.
b) Storage
Data and instructions enter main storage, and are held until needed to
be worked on. The instructions dictate action to be taken on the data.
Results of the action will be held until they are required for output.
c) Control
Each computer has a control unit that fetches instructions from main
storage, interprets them, and issues the necessary signals to the
components making up the system. It directs all hardware operations
necessary in obeying instructions.
d) Processing
Instructions are obeyed and the necessary arithmetic and logic
operations are carried out on the data. The part that does this is called
the Arithmetic and Logic Unit (ALU).
Processing devices
(i) The CPU (Central Processing Unit)
The CPU (Central Processing Unit) controls the processing of
instructions. The CPU produces electronic pulses at a predetermined
and constant rate. This is called the clock speed. Clock speed is
generally measured in megahertz, that is, millions of cycles per second.
17 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
It consists of:
e) Output
Results are taken from main storage and fed to an output device. This
may be a printer, in which case the information is automatically
converted to a printed form called hard copy or to a monitor screen for
a soft copy of data or information.
Output devices
Output is human-readable information. Input (data) is processed inside
the computer’s CPU into meaningful output (information). Output
devices translate the machine-readable information into human-
readable information.
Punched cards: characters are coded onto an 80-column card in
columns by combining punches in different locations; a special
card reader reads the cards and translates them into transactions
for the computer. These are now used only for older applications.
Paper tape punch
Printers
– Outputs printout on paper often referred to as hard-copy output.
Categorized according to:
18 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Forms images via pins striking a ribbon against a paper. The print head
typically have 9 or 24 pins. The images are relatively of poor quality
since dots are visible upon close inspection. Though inexpensive
compared to other types, they are noisy and low-end models are slow
(speed varies with price).
o Thermal Printers
Forms images using heat elements and heat – sensitive paper. It is very
quiet and not widely used by home PC users. Some very expensive
colour models are available. “Ink” in these computers is wax crayons.
Plotters
Plotters are typically used for design output. They are special-purpose
output devices used to produce charts, maps, architectural drawings
and three-dimensional representations. They can produce high-quality
multi-colour documents or larger size documents. Plotters produce
documents such as blueprints or schematics.
19 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Monitors
– Output device for soft-copy output (temporal screen display of output
which lasts as long as the monitor’s power is on). They are the most
frequently used output devices. Some are used on the desktop; others
are portable. Two important characteristics of the monitor are size and
clarity.
Voice-output devices
Voice-output devices make sounds that resemble human speech.
Voice-output devices use prerecorded vocalized sounds to
produce output.
The computer “speaks” synthesized words.
Voice output is not as difficult to create as voice input.
Most widely used voice-output devices are stereo speakers and
headphones.
Devices are connected to a sound card in the system unit.
Sound card is used to capture sound as well as play it back.
20 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
5 ¼ floppy disks
3 ½ floppy disks – The most common size with a
capacity of 1.44 MB. They are not very fast and
durable.
21 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Communication devices
Modem - Modems allow computers (digital devices) to
communicate via the phone system (based on analog
technology). It turns the computers digital data into analog,
sends it over the phone line, and then another modem at the
other end of the line turns the analog signal back into digital
data.
Fax/modem - basic digital/analog modem enhanced with fax
transmission hardware that enables faxing of information from
computer to another fax/modem or a fax machine (NOTE: a
separate scanner must be connected to the computer in order to
use the fax/modem to transfer external documents)
Computer Memory
Memory capability is one of the features that distinguish a computer
from other electronic devices. Like the CPU, memory is made of silicon
22 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Types of Memory
Volatile Memory types Non Volatile
RAM ROM
2. ROM (Read Only Memory) – Its contents can only be read and
cannot be changed. ROM chips is non-volatile, so the contents
aren’t lost if the power is disrupted. ROM provides permanent
storage for unchanging data & instructions, such as data from the
computer maker. It is used to hold instructions for starting the
computer called the bootstrap program.
23 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
24 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
8.2 Software
Software is detailed step-by-step sequence of instructions known as
program which guide computer hardware. A computer program is a
sequence of instructions that tell the computer hardware what to do.
Programs are written in programming languages, which consists of a
set of symbols combined according to a given syntax.
A program must be in main memory (RAM) to be executed. These
invisible, intangible components of a computer that direct and control
the operations of the hardware when processing data are referred to as
software.
System software
Systems software consists of programs that coordinates the activities
of hardware and other programs. System software is designed for a
specific CPU and hardware class. The combination of a particular
hardware configuration and operating system is called a computer
platform. These programs manage the "behind the scenes" operation
of the computer.
Examples
Operating systems
Utility Programs - Utility programs often come installed on
computer systems or packaged with operating systems. Utilities
can also be purchased individually. Utility programs perform
useful tasks, such as virus detection, tracking computer jobs, and
compressing data.
Language processors – Compilers and interpreters
Operating systems
The functions of an operating system includes:
Perform common hardware functions
- Accept input and store data on disks and send data to output
devices
Provide a user interface
Provide hardware independence
Manage system memory
Manage processing
Control access to system resources
- Protection against unauthorized access
- Logins and passwords
Manage files
- Physical storage location
- File permissions
25 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
- File access
Sources of software
Application
Software
Proprietary Off-the-shelf
In – house Contract
customized customization
26 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
General-purpose software
Examples include
Word processing – Create, edit and print text documents. E.g. MS
Word, Word Perfect.
Spreadsheets – Provide a wide range of built-in functions for
statistical, logical, financial, database, graphics, data and time
calculations. E.g. Lotus 1-2-3, Excel, Quattro Pro.
Database management systems (DBMS) – Store, manipulate and
retrieve data. E.g. Access, FoxPro, dBase.
Online Information Services – Obtain a broad range of information
from commercial services. E.g. America Online, CompuServe
Communications- Ms Outlook for email
Browsers e.g Internet Explorer, Eudora
Graphics – Develop graphs, illustrations and drawings. E.g.
PaintShop, FreeHand, Corel
27 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Programming Languages
Programming languages are collections of commands, statements and
words that are combined using a particular syntax, or rules, to write
both systems and application software. This results in meaningful
instructions to the CPU.
Generations of programming languages
Machine Language (1st Generation Languages)
A machine language consists of binary digit, that is, zeroes and ones.
Instructions and addresses are written in binary (0,1) code. Binary is
the only “language” a CPU can understand. The CPU directly interprets
and executes this language, therefore making it fast in execution of its
instructions. Machine language programs directly instructed the
computer hardware, so they were not portable. That is, a program
written for computer model A could not be run on computer model B
without being rewritten. All software in other languages must
ultimately be translated down to machine language form. The
translation process makes the other languages slower.
Advantage
The only advantage is that program of machine language run
very fast because no translation program is required for the CPU.
Disadvantages
It is very difficult to program in machine language. The
programmer has to know details of hardware to write program.
The programmer has to remember a lot of codes to write a
program, which results in program errors.
28 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Advantages:
The symbolic programming of Assembly Language is easier to
understand and saves a lot of time and effort of the programmer.
It is easier to correct errors and modify program instructions.
Assembly Language has the same efficiency of execution as the
machine level language. Because this is one-to-one translator
between assembly language program and its corresponding
machine language program.
Disadvantages:
One of the major disadvantages is that assembly language is
machine dependent. A program written for one computer might
not run in other computers with different hardware configuration.
High-level languages (3rd generation languages)
Third generation languages are easier to learn and use than were
earlier generations. Thus programmers are more productive when
using third generation languages. For most applications, this increased
29 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
30 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Language translators
Although machine language is the only language the CPU understands,
it is rarely used anymore since it is so difficult to use. Every program
that is not written in machine language must be translated into
machine language before it can be executed. This is done by a
category of system software called language translation software.
These are programs that convert the code originally written by the
programmer, called source code, into its equivalent machine language
program, called object code.
There are two main types of language translators: interpreters and
compilers.
Interpreters
While a program is running, interpreters read, translate, and execute
one statement of the program at a time. The interpreter displays any
errors immediately on the monitor. Interpreters are very useful for
people learning how to program or debugging a program. However, the
line-by-line translation adds significant overhead to the program
execution time leading to slow execution.
Compilers
A compiler uses a language translation program that converts the
entire source program into object code, known as an object module, at
one time. The object module is stored and it is the object module that
executes when the program runs. The program does not have to be
compiled again until changes are made in the source code.
Software trends and issues
31 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Information
Information is data that has been processed into a form that is
meaningful to the recipient and is of real or perceived value in current
or prospective actions or decisions. It is important to note that data for
one level of an information system may be information for another. For
example, data input to the management level is information output of a
lower level of the system such as operations level. Information
resources are reusable. When retrieved and used it does not lose value:
it may indeed gain value through the credibility added by use.
32 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Data Processing
Data processing may be defined as those activities, which are
concerned with the systematic recording, arranging, filing, processing
and dissemination of facts relating to the physical events occurring in
the business. Data processing can also be described as the activity of
manipulating the raw facts to generate a set or an assembly of
meaningful data, what is described as information. Data processing
activities include data collection, classification, sorting, adding,
merging, summarizing, storing, retrieval and dissemination.
Processing
33 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Input Output
In dealing with digital computers this data consists of: numerical data,
character data and special (control) characters.
Information processing
This is the process of turning data into information by making it useful
to some person or process.
Computer files
A file is a collection of related data or information that is normally
maintained on a secondary storage device. The purpose of a file is to
keep data in a convenient location where they can be located and
retrieved as needed. The term computer file suggests organized
retention on the computer that facilitates rapid, convenient storage and
retrieval.
34 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Master files
Master files contain information to be retained over a relatively long
time period. Information in master files is updated continuously to
represent the current status of the business.
Accessing Files
Files can be accessed
Sequentially - start at first record and read one record after
another until end of file or desired record is found
o known as “sequential access”
o only possible access for serial storage devices
Directly - read desired record directly
o known as “random access” or “direct access”
File Organization
Files need to be properly arranged and organised to facilitate easy
access and retrieval of the information. Types of file organisation
(physical method of storage) include:
Serial
Sequential
Indexed-Sequential
Random
35 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
All file organisation types apply to direct access storage media (disk,
drum etc.)
A file on a serial storage media (e.g. tape) can only be organised
serially
Serial Organization
Each record is placed in turn in the next available storage space
A serial file must be accessed sequentially implying
o good use of space
o high access time
Usually used for temporary files, e.g. transaction files, work files,
spool files
Note: The method of accessing the data on the file is different to
its organisation
o E.g. sequential access of a randomly organised file
o E.g. direct access of a sequential file
Sequential organization
Records are organised in ascending sequence according to a certain
key
Sequential files are accessed sequentially, one record after the next
Suitable
o for master files in a batch processing environment
o where a large percentage of records (high hit-rate) are to
be accessed
Not suitable for online access requiring a fast response as file needs
to be accessed sequentially
Indexed Sequential
Most commonly used methods of file organisation
File is organised sequentially and contains an index
Used on direct access devices
Used in applications that require sequential processing of large
numbers of records but occasional direct access of individual
records
Increases processing overheads with maintenance of the indices
Random organization
Records are stored in a specific location determined by a
randomising algorithm
o function (key) = record location (address)Records can be
accessed directly without regard to physical location
Used to provide fast access to any individual record
e.g. airline reservations, online banking
36 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Data redundancy
o duplicate data in multiple data files
Redundancy leads to inconsistencies
o in data representation e.g. refer to the same person as
client or customer
o values of data items across multiple filesData isolation —
multiple files and formats
Program-data dependence
o tight relationship between data files and specific programs
used to maintain files
Lack of flexibility
o Need to write a new program to carry out each new
taskLack of data sharing and availability
Integrity problems
o Integrity constraints (e.g. account balance > 0) become
part of program code
o Hard to add new constraints or change existing ones
Concurrent access by multiple users difficult
o Concurrent accessed needed for performance
o Uncontrolled concurrent accesses can lead to
inconsistencies
o E.g. two people reading a balance and updating it at the
same time
Security problems
Data files and databases
A data file is a structured collection of data (information). The data is
related in some manner. It is organized so that relationships within the
data are revealed (or revealable). A data file stores several (many)
pieces of information about many data objects. The simplest and most
efficient metaphor of how data is organized in a data file is as a table of
rows and columns, like a spreadsheet but without the linkages between
individual cells. A data file is made up of a number of records; each row
in a table is a separate record. Each record is made up of all the data
about a particular entity in the file.
37 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
38 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
DBMSs are system software that aid in organizing, controlling and using
the data needed by application programs. A DBMS provides the facility
to create and maintain a well-organized database. It also provides
functions such as normalization to reduce data redundancy, decrease
access time and establish basic security measures over sensitive data.
Most DBMS have internal security features that interface with the
operating system access control mechanism/package, unless it was
implemented in a raw device. A combination of the DBMS security
features and security package functions is often used to cover all
required security functions. This dual security approach however
introduces complexity and opportunity for security lapses.
DBMS architecture
Data elements required to define a database are called metadata.
There are three types of metadata: conceptual schema metadata,
external schema metadata and internal schema metadata. If any one
of these elements is missing from the data definition maintained within
the DBMS, the DBMS may not be adequate to meet users’ needs. A
data definition language (DDL) is a component used for creating the
39 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Enhancing documentation
Providing common validation criteria
Facilitating programming by reducing the needs for data
definition
Standardizing programming methods
Database structure
The common database models are:
Hierarchical database model
Network database model
Relational database model
Object–oriented model
A hierarchical structure has only one root. Each parent can have
numerous children, but a child can have only one parent. Subordinate
segments are retrieved through the parent segment. Reverse pointers
are not allowed. Pointers can be set only for nodes on a lower level;
they cannot be set to a node on a predetermined access path.
Computer
Department
Manager Manager
(Development) (Operation)
The network structure is more flexible, yet more complex, than the
hierarchical structure. Data records are related through logical entities
called sets. Within a network, any data element can be connected to
any item. Because networks allow reverse pointers, an item can be an
owner and a member of the same set of data. Members are grouped
together to form records, and records are linked together to form a set.
A set can have only one owner record but several member records.
Comp
.
John Dept. Jane
Mary
Comp
. 101 Comp
. 201
Comp
Comp . 401
. 301
41 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Database administrator
Coordinates the activities of the database system. Duties include:
Schema definition
Storage structure and access method definition
Schema and physical organisation modification
Granting user authority to access the database
Specifying integrity constraints
Acting as liaison with users
Monitoring performance and responding to changes in requirements
Security definitions
42 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
43 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
10. Terminology
Multiprogramming
Multiprogramming is a rudimentary form of parallel processing in which
several programs are run at the same time on a uniprocessor. Since
there is only one processor, there can be no true simultaneous
execution of different programs. Instead, the operating system
executes part of one program, then part of another, and so on. To the
user it appears that all programs are executing at the same time.
44 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Multiprocessing
Multiprocessing is the coordinated (simultaneous execution) processing
of programs by more than one computer processor. Multiprocessing is a
general term that can mean the dynamic assignment of a program to
one of two or more computers working in tandem or can involve
multiple computers working on the same program at the same time (in
parallel).
Multitasking
In a computer operating system, multitasking is allowing a user to
perform more than one computer task (such as the operation of an
application program) at a time. The operating system is able to keep
track of where you are in these tasks and go from one to the other
without losing information. Microsoft Windows 2000, IBM's OS/390, and
Linux are examples of operating systems that can do multitasking
(almost all of today's operating systems can). When you open your Web
browser and then open word at the same time, you are causing the
operating system to do multitasking.
Multithreading
It is easy to confuse multithreading with multitasking or
multiprogramming, which are somewhat different ideas.
45 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
LESSON FOUR
INFORMATION SYSTEMS
CONTENTS
1. Introduction
2. Management structure and use of information
3. Components of an information system
4. Functions of an information system
4.1. Transaction processing
4.2. Management reporting
4.3. Decision support
5. Types of information systems: characteristics and differences
5.1. Transaction Processing Systems (TPS)
5.2. Management Information System (MIS)
5.3. Decision Support System (DSS)
5.4. Executive Information System (EIS)/Executive Support
System (ESS)
5.5. Expert System
5.6. Other information systems
5.6.1. Office Automation Systems (OAS)
5.6.2. Artificial intelligence Systems
5.6.3. Knowledge Based Systems
5.6.4. Geographic Information Systems
5.6.5. Virtual Reality Systems
5.6.6. E-commerce/E-Business systems
5.6.7. Enterprise Resource Planning (ERP) Systems
5.6.8. Electronic Funds Transfer (EFT)
5.6.9. Automated Teller Machines (ATM)
5.7. Relationship of systems to one another
6. The organization of an Information Technology department
7. Evaluating effectiveness and efficiency of Information technology
departments
1. Introduction
An information system is a set of interrelated components that collect,
manipulate, process and transform data into information and provide
feedback to meet a specified objective. A computer based information
system is an information system that uses computer technology to
perform input, processing and output activities. Due to the massive
computerization of manual information systems, computer based
46 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Operational Operational
Level Managers
47 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Transaction processing
Management reporting
48 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Decision support
1. Management reporting
This is the function involved in producing outputs for users. These
outputs are mainly as reports to management for planning, control and
monitoring purposes. Major outputs of an information system include:
i. Transaction documents or screens
ii. Preplanned reports
iii. Preplanned inquiry responses
iv. Ad hoc reports and ad hoc inquiry responses
v. User-machine dialog results
49 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
2. Decision support
Types of decisions
a) Structured/programmable decisions
These decisions tend to be repetitive and well defined e.g. inventory
replenishment decisions. A standardized pre-planned or pre-specified
approach is used to make the decision and a specific methodology is
applied routinely. Also the type of information needed to make the
decision is known precisely. They are programmable in the sense that
unambiguous rules or procedures can be specified in advance. These
may be a set of steps, flowchart, decision table or formula on how to
make the decision. The decision procedure specifies information to be
obtained before the decision rules are applied. They can be handled by
low-level personnel and may be completely automated.
It is easy to provide information systems support for these types of
decisions. Many structured decisions can be made by the system itself
e.g. rejecting a customer order if the customer’s credit with the
company is less than the total payment for the order. Yet managers
must be able to override these systems’ decisions because managers
have information that the system doesn’t have e.g. the customer order
is not rejected because alternative payment arrangements have been
made with the customer.
In other cases the system may make only part of the decision required
for a particular activity e.g. it may determine the quantities of each
inventory item to be reordered, but the manager may select the most
appropriate vendor for the item on the basis of delivery lead time,
quality and price.
b) Semi-structured/semi-programmable decisions
The information requirements and the methodology to be applied
are often known, but some aspects of the decision still rely on the
manager: e.g. selecting the location to build a new warehouse. Here
the information requirements for the decision such as land cost,
50 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
shipping costs are known, but aspects such as local labour attitudes
or natural hazards still have to be judged and evaluated by the
manager.
c) Unstructured/non-programmable decisions
These decisions tend to be unique e.g. policy formulation for the
allocation of resources. The information needed for decision-making
is unpredictable and no fixed methodology exists. Multiple
alternatives are involved and the decision variables as well as their
relationships are too many and/or too complex to fully specify.
Therefore, the manager’s experience and intuition play a large part
in making the decision.
In addition there are no pre-established decision procedures either
because:
The decision is too infrequent to justify organizational
preparation cost of procedure or
The decision process is not understood well enough, or
The decision process is too dynamic to allow a stable pre-
established decision procedure.
Information systems requirements for support of such decisions are:
Access to data and various analysis and decision
procedures.
Data retrieval must allow for ad hoc retrieval requests
Interactive decision support systems with generalized
inquiry and analysis capabilities.
Example: Selecting a CEO of a company.
51 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
TPS are vital for the organization, as they gather all the input necessary
for other types of systems. Think of how one could generate a monthly
sales report for middle management or critical marketing information
to senior managers without TPS. TPS provide the basic input to the
company’s database. A failure in TPS often means disaster for the
organization. Imagine what happens when an airline reservation
system fails: all operations stops and no transaction can be carried out
until the system is up and running again. Long queues form in front of
ATMs and tellers when a bank’s TPS crashes.
Characteristics of TPS:
TPS are large and complex in terms of the number of system
interfaces with the various users and databases and usually
developed by MIS experts.
TPS’s control collection of specific data in specific formats and in
accordance with rules, policies, and goals of organisation-
standard format
They accumulate information from internal operations o the
business.
They are general in nature—applied across organisations.
They are continuously evolving.
52 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Characteristics of MRS
MIS professionals usually design MRS rather than end users- using
life cycle oriented development methodologies.
They are large and complex in terms of the number of system
interfaces with the various users and databases.
MRS are built for situations in which information requirements are
reasonably well known and are expected to remain relatively
stable. This limits the informational flexibility of MRS but ensures
that a stable informational environment exists.
They do not directly support the decision making process in a
search for alternative solutions to problems. Information gained
through MRS is used in the decision making process.
53 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
They are oriented towards reporting on the past and the present,
rather than projecting the future. Can be manipulated to do
predictive reporting.
MRS have limited analytical capabilities. They are not built
around elaborate models, but rather rely on summarisation and
extraction from the databases according to the given criteria.
DSS have less structure and predictable use. They are user-friendly and
highly interactive. Although they use data from the TPS and MIS, they
also allow the inclusion of new data, often from external sources such
as current share prices or prices of competitors.
54 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Top executives need ESS because they are busy and want information
quickly and in an easy to read form. They want to have direct access to
information and want their computer set-up to directly communicate with
others. They want structured forms for viewing and want summaries rather
than details.
55 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Office automation systems support general office work for handling and
managing documents and facilitating communication. Text and image
processing systems evolved as from word processors to desktop publishing,
enabling the creation of professional documents with graphics and special
layout features. Spreadsheets, presentation packages like PowerPoint,
personal database systems and note-taking systems (appointment book,
notepad, card file) are part of OAS.
In addition OAS include communication systems for transmitting messages
and documents (e-mail) and teleconferencing capabilities.
56 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
57 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
The number of people working in the ICT department and what they do will
depend on:
The size of the computing facility. Larger computers are operated on a
shift work basis.
The nature of the work. Batch processing systems tend to require more
staff.
Whether a network is involved. This requires additional staff.
How much software and maintenance is done in house instead of
seeking external resources.
58 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
ICT
DIRECTOR/
MANAGER
59 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Management of
Information
Services
Systems
Operations Technical Services
Development
Computer
Systems Analysis User Services
Operations Data
and Design Information Centre
Centre
Applications
Data Entry Data Administration
Programming
Other Support
Development
Production Control Network Management
Support Technology
and Support Management
Development Centre
Capacity Management
60 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
The sections that make up the ICT department and their functions are
discussed below:
1) Development section
System Analysis Functions include:
System investigations.
System design.
System testing.
System implementation.
System maintenance.
2) Operations section
Duties include:
Planning procedures, schedules and staff timetables.
Contingency planning.
Supervision and coordination of data collection, preparation, control and
computer room operations.
Liaison with the IT manager and system development manager.
a) Data preparation
Data preparation staff are responsible for converting data from source
documents to computer sensible form.
Duties are:
Correctly entering data from source documents and forms.
Keeping a record of data handled.
Reporting problems with data or equipment.
b) Data control
Data control staff are generally clerks. Duties include:
Receiving incoming work on time.
Checking and logging incoming work before passing it to the data
preparation staff.
Dealing with errors and queries on processing.
Checking and distributing output.
61 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Computer operators
Controls and operates hardware in the computer room.
Duties include:
Starting up equipment.
Running programs.
Loading peripherals with appropriate media.
Cleaning and simple maintenance.
Files librarian
Keeps all files organized and up to date. Typical duties are:
Keeping records of files and their use.
Issuing files for authorized use.
Storing files securely.
Database management
The database administrator. He is responsible for the planning, organization
and control of the database. His functions include
Coordinating database design.
Controlling access to the database for security and privacy.
Establishing back-up and recovery procedures.
Controlling changes to the database.
Selecting and maintaining database software.
Meeting with users to resolve problems and determine changing
requirements.
Network management
The network administrator/controller/manager. Functions include:
Assignment of user rights.
Creating and deleting of users.
Training of users.
Conflict resolution.
Advising managers on planning and acquisition of communication
equipment.
62 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
63 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
REINFORCING QUESTIONS
QUESTION ONE
(a) What is an information system? What are the various components of an
information system?
(6 Marks)
(b) Differentiate between structured and unstructured decisions. Give
examples of such decisions.
(4 Marks)
(c) Describe the relevance of the following to a Decision Support System
(DSS):
(i) Specialized packages (2
Marks)
(ii) Query Languages (2 Marks)
(iii) Database Management System (2 Marks)
(d) Explain what Office Automation System and Knowledge Work System
mean.
(4 Marks)
(Total: 20
marks)
QUESTION TWO
(a) Propose the type of information system you would recommend for the
following applications:
(i) Maintenance of general ledger (1
Mark)
(ii) Formulation of competitive market strategies (1
Mark)
(iii) Financial sensitivity or risk analysis (1 Mark)
(iv) Ticket reservations (1 Mark)
(Question 5c Dec 2002)
(b) Identify the major factors that influence the structure of an information
system.
(4 Marks)
(Question 5d Dec 2002)
(c) Examine the contribution of information systems in the decision-making or
problem solving process. (4
Marks) (Question
7c May 2002)
(d) Suggest possible uses for an expert system within the Customer Database
Department. (6 Marks)
(Question 8b May
2002)
(e) Why do executives need executive information systems? (2
Marks)
(Total: 20
marks)
QUESTION THREE
64 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
Required:
Suggest one application of each of the systems types listed above for each of
the following areas of business.
Sales and Marketing (5
Marks)
Finance (5
Marks)
(Question 1a December 2000)
(b) The general manager of a large organization has asked you to draw up a
document identifying eight important characteristics against which managers
can evaluate the success of an information system together with a brief
explanation of each. What would your document contain?
(8 Marks)
(Question 7b December 2000)
(c) What is artificial intelligence?
(2 Marks)
(Total: 20
marks)
QUESTION FOUR
(a) Discuss the various components of a Decision Support System.
(12 Marks)
(b) When is it appropriate to use a DSS?
(8 Marks)
(Total: 20
marks)
QUESTION FIVE
(a) Give a brief definition of an Expert System (ES)
(3 Marks)
(b) Describe five properties of an expert system.
(10 Marks)
65 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
66 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
QUESTION ONE
(a) Define fourth-generation languages and list the categories of fourth-
generation tools.
(10 Marks)
(b) What is the difference between fourth-generation languages and
conventional programming languages?
(4 Marks)
QUESTION TWO
(a) Discuss the various components of an information system. (5
marks)
(b) Describe the three main levels of decision making within an organization,
defining their characteristics and users. Outline the information
characteristics for each level. (15 marks)
(Total: 20
marks)
QUESTION THREE
(a) Information systems should be designed and developed to enhance the
efficiency and effectiveness of organizational processes. They should
therefore be effective and efficient in their use. What factors affect the
efficiency and effectiveness of information systems?
(10 Marks)
(b) What is an expert system? Discuss its components and the advantages of
using an expert system.
(10 Marks)
(Total: 20
marks)
QUESTION FOUR
(a) Briefly define what is a Management Information System. Discuss the
various reports output by an MIS.
(10 Marks)
(b) Define office automation. What are the objectives of office automation?
(10
marks)
67 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
(Total: 20
marks)
QUESTION FIVE
(a) List the characteristics of a good software design. (4
Marks)
(b) Differentiate between white box testing and black box testing.
(4 Marks)
(c) Describe Joint Application Development and show its usefulness in
software development.
(6 Marks)
QUESTION SIX
(a) Define CASE and show how it improves productivity in the software
development environment.
(6 Marks)
QUESTION SEVEN
(a) Differentiate between formal and informal information systems. (4
Marks)
(b) Once the system has been constructed and tested the system needs to be
delivered to the users and made operational. Briefly describe four activities
done during the implementation of a system.
(8 Marks)
(c) The user interface is becoming more important as systems become more
and more interactive. Discuss four principles of good user interface design.
(8 Marks)
(Total: 20
marks)
68 All rights reserved ©African Institute of Research and Development Studies 2013
Information Communication Technology
QUESTION EIGHT
(a) Identify five reasons that contribute to late completion and delivery of
software.
(5 Marks)
(b) Name five factors that are to be considered when acquiring hardware.
(5 Marks)
(c) List five factors that should be considered when selecting a hardware
supplier.
(5 Marks)
(d) List five tools and techniques used in the documentation design of a
system.
(5 Marks)
(Total: 20 marks)
69 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 70
CONTENTS
1. Introduction
2. Organizations major responses to business pressures
3. General technological trends
4. Applications of information systems in business
5. Application of information systems in accounting
5.1.Operational level accounting IS
5.2.Tactical accounting and financial IS
5.3.Strategic accounting and financial IS
5.4.Accounting and financial management software
5.5.Computerized accounting systems
5.6.Computerized auditing software
6. Application of information systems in sales and marketing
6.1.Operational marketing information systems
6.2.Tactical marketing information systems
6.3.Strategic marketing information systems
7. Application of information systems in manufacturing and production
7.1.Tactical manufacturing and production IS
7.2.Strategic planning manufacturing information systems
7.3.Specific software
8. Application of information system in banking
8.1.Operational information systems
8.2.Tactical and managerial control systems
8.3.Strategic planning systems
8.4.Online banking
9. Application of information systems in human resource
9.1.Operational human resource IS
9.2.Tactical human resource IS
9.3.Strategic human resource IS
10.Important definitions
Lesson Five 71
1. Introduction
Information system (IS) refers to a collection of components that collects,
processes, stores, and analyses and disseminates information for a specific
purpose. It contains the four elements of input, processing, output and
control. Information technology (IT) refers to the technological aspect of
information systems. IT is often used interchangeably with the term IS but it is
an inclusive term which describes a collection of several IS within an
organization. IT basically represents the modern merger of computer
technology with telecommunications technology.
71 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 72
These are systems that maintain records concerning the flow of funds in the
firm and produce financial statements, such as balance sheets and income
statements. They are among the earliest systems to be computerized.
72 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 73
The general ledger subsystem ties all other financial accounting system
subsystems together, provides managers with
Periodic accounting reports and statements, such as income statement
and balance sheet
Support for budgeting
Creation of general ledger accounts and definition of the organization’s
fiscal period
Production of a list of accounts maintained by the financial accounting
system.
73 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 74
The accounts payable subsystem provides data directly to the general ledger
subsystem and receives data from the purchase order subsystem.
74 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 75
Budgeting Systems
The budgeting system permits managers to
Track actual revenues
Track actual expenses
Compare these amounts to expected revenues and expenses
75 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 76
The information supplied by a cash flow report helps the manager make
decisions about investing, purchasing, and borrowing money. By simulating
many different possible business conditions, the manager is able to make
more informed decisions about the use of or need for cash for the short term.
In short, the manager can study various reallocations of the resources of a
department, division, or other unit.
76 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 77
Spreadsheet Software
Spreadsheet software packages provide a versatile tool for financial
managers. Spreadsheet software allows the manager to design partially
completed tables or forms called template, which contain the headings and
names of the items in the spreadsheet. The templates also contain the
formulas used to calculate column or row totals, column or row averages, and
other statistical quantities on the values entered into the template.
77 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 78
aid you in tactical-level decisions and long-range planning requires that you
carefully analyse what your applications require.
78 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 79
Telemarketing Systems
Use of the telephone to sell products and services, or telemarketing systems,
has become a common and important means by which organizations improve
the productivity of their sales forces. The telephone allows salespeople to
initiate contacts, offer products and services, or follow up on sales without
travel cost or travel time. It also lets salespeople reach many more customers
in a given time period than they could have through other means.
79 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 80
If the organization maintains its own distribution system, information about its
effectiveness must be collected and reported to management. Information
should also be maintained about the acquisition, repair, use, and allocation of
equipment.
80 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 81
81 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 82
Regardless of type, sales forecasts are usually based on more than historical
data; they are not merely projections of past trends. Sales forecasts are also
based on assumptions about the activities of the competition, governmental
action, shifting customer demand, demographic trends, and a variety of other
pertinent factors, including even the weather.
A package of form letters that salespeople can use or adapt for use
The ability to keep customer lists
The ability to merge letters with customer lists for large mailings
File support features may include the ability to record and store information
about potential and current customers.
Salesperson support software often includes a calendar module to help
salespeople manage their meetings and customer appointments and a tickler
file module to ensure that they follow through on their promises to customers
at the appointed time.
82 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 83
Telemarketing Software
Telemarketing Software provides computer support for identifying customers
and calling them from disk-based telephone directories or from customer files
maintained on a database. The packages may allow you to
Make notes about the telephone calls you make
Generate follow-up letters to the customer
View a customer file while a call to that customer is in progress
These are systems that supply data to operate, monitor and control the
production process.
83 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 84
84 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 85
Just-in-Time Systems
The just-in-Time (JIT) system is not a tactical information system, but a
tactical approach to production. The just-in-time approach was created by the
Toyota Motor Company of Japan and has generated many advantages to
organizations, especially those that do repetitive manufacturing. The purpose
of the approach is to eliminate waste in the use of equipment, parts, space,
workers’ time, and materials, including the resources devoted to inventories.
The basic philosophy of JIT is that operations should occur just when they are
required to maintain the production schedule. To assure a smooth flow of
operations in that environment, sources of problems must be eradicated.
85 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 86
Plant design
Designing and laying out a manufacturing plant requires large amounts of
diverse information about the proposed plant including:
86 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 87
o ATM systems
o Cash vault automation
87 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 88
88 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 89
The challenge for the banking industry has been to design this new service
channel in such a way that its customers will readily learn to use and trust it.
Most of the large banks now offer fully secure, fully functional online banking
for free or for a small fee. Some smaller banks offer limited access or
functionality; for instance, you may be able to view your account balance and
history but not initiate transactions online. As more banks succeed online and
more customers use their sites, fully functional online banking likely will
become as commonplace as automated teller machines.
Virtual banks
Virtual banks are banks without bricks; from the customer's perspective, they
exist entirely on the Internet, where they offer pretty much the same range of
services and adhere to the same federal regulations as your corner bank.
Virtual banks pass the money they save on overhead like buildings and tellers
along to the customer in the form of higher yields, lower fees and more
generous account thresholds. The major disadvantage of virtual banks
revolves around ATMs. Because they have no ATM machines, virtual banks
typically charge the same surcharge that the brick-and-mortar bank would if a
customer used another bank's automated teller. Likewise, many virtual banks
won't accept deposits via ATM; a customer has to either deposit the check by
mail or transfer money from another account.
89 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 90
The trust thing: For many people, the biggest hurdle to online banking is
learning to trust it. Did my transaction go through? Did I push the transfer
button once or twice? Best bet: always print the transaction receipt and
keep it with your bank records until it shows up on your personal site
and/or your bank statement.
90 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 91
91 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 92
92 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 93
Training Software
Many training software packages are available for all types and sizes of
computers to provide on-line training for employees. They include:
93 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 94
REINFORCING QUESTIONS
QUESTION ONE
(a) Briefly describe Computer Integrated Manufacturing (CIM). (3
Marks)
(b) What are the goals and benefits of CIM? (8
Marks)
(c) Discuss three techniques used to support CIM. (9
Marks)
(Total: 20 marks)
QUESTION TWO
(a) Define Enterprise Resource Planning (ERP) systems and what are its
various components and functions in an organization.
(4 Marks)
(b) Which organizational level do the following systems support?
(i) Machine control
(ii) Pricing analysis
(iii) Sales trend
(iv) Production Planning
(v) Accounts receivable
(vi) Compensation analysis
(6 Marks)
(c) Describe how information systems facilitate supply chain management.
(6
Marks)
(d) Name the major components of supply chain management systems.
(4 Marks)
(Total: 20
marks)
QUESTION THREE
Discuss five types of information systems to support the operational level of
human resource management. (Total: 20
marks)
QUESTION FOUR
Discuss five types of information systems to support the tactical level of
manufacturing and production management.
(Total: 20 marks)
QUESTION FIVE
(a) Define telemarketing software and discuss its impact in the sales and
marketing functions of an organization.
(6 Marks)
(b) What is customer relationship management and what are its goals in an
organization.
(4 Marks)
(c) Discuss the various advantages and disadvantages of online banking.
(10 Marks)
(Total: 20
marks)
94 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Five 95
95 All rights reserved ©African Institute of Research and Development Studies 2013
96
CONTENTS
1. Definition of computer security – threats, hazards and controls
1.1.Security goals
1.2.Hazards (exposures) to information security
1.3.Threats to information security
1.4.Vulnerability
1.5.Security controls
1.6.Administering security
2. Security in the application level: Application controls
2.1.Input/origination controls
2.2.Processing validation and editing
2.3.Output controls
2.4.Data integrity testing
3. Security in operating system: Access control function
3.1.Identification
3.2.Authentication
3.3.Authorization
4. Logical security
4.1.Logical access issues and exposures
4.2.Access control software
4.3.Logical security features, tools and procedures
5. Physical security
5.1.Physical access exposures
5.2.Physical access controls
6. Personnel issues
7. Network security
7.1.LAN security
7.2.Dial up access controls
7.3.Client/server security
7.4.Internet threats
7.5.Encryption
7.6.Firewall security
7.7.Intrusion detection systems (IDS)
8. Environmental exposures and controls
9. Computer ethics
10.Terminology
Computer Security Issues 97
97 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 98
These are circumstances that have potential to cause loss or harm i.e.
circumstances that have a potential to bring about exposures.
Human error
Disgruntled employees
Dishonest employees
Greedy employees who sell information for financial gain
Outsider access – hackers, crackers, criminals, terrorists, consultants,
ex-consultants, ex-employees, competitors, government agencies,
spies (industrial, military etc), disgruntled customers
Acts of God/natural disasters – earthquakes, floods, hurricanes
Foreign intelligence
Accidents, fires, explosion
Equipment failure
Utility outage
Water leaks, toxic spills
Viruses – these are programmed threats
1.4 Vulnerability
A vulnerability is a weakness within the system that can potentially lead to
loss or harm. The threat of natural disasters has instances that can make the
system vulnerable. If a system has programs that have threats (erroneous
programs) then the system is vulnerable.
98 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 99
Risk analysis
Security planning – a security plan identifies and organizes the security
activities of an organization.
Security policy
Risk analysis
Security policy
Security failures can be costly to business. Losses may be suffered as a result
of the failure itself or costs can be incurred when recovering from the
incident, followed by more costs to secure systems and prevent further
failure. A well-defined set of security policies and procedures can prevent
losses and save money.
99 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 100
100 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 101
Input authorization
Input authorization verifies that all transactions have been authorized and
approved by management. Authorization of input helps ensure that only
authorized data is entered into the computer system for processing by
applications. Authorization can be performed online at the time when the data
is entered into the system. A computer-generated report listing the items
requiring manual authorization also may be generated. It is important that
controls exist throughout processing to ensure that authorized data remains
unchanged. This can be accomplished through various accuracy and
completeness checks incorporated into an application’s design.
Batch header forms are a data preparation control. All input forms should be
clearly identified with the application name and transaction codes. Where
possible, pre-printed and pre-numbered forms with transaction identification
codes and other constant data items are recommended. This would help
ensure that all pertinent data has been recorded on the input forms and can
reduce data recording/entry errors.
101 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 102
Data conversion error corrections are needed during the data conversion
process. Errors can occur due to duplication of transactions and inaccurate
data entry. These errors can, in turn, greatly impact the completeness and
accuracy of the data. Corrections to data should be processed through the
normal data conversion process and should be verified, authorized and re-
entered to the system as a part of normal processing.
102 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 103
Edit controls are preventative controls that are used in a program before data
is processed. If the edit control is not in place or does not work correctly; the
preventative control measures do not work effectively. This may cause
processing of inaccurate data.
103 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 104
104 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 105
File controls should ensure that only authorized processing occurs to stored
data. Types of controls over data files are:
Before and after image reporting – computer data on a file prior to and
after a transaction is processed can be recorded and reported. The
before and after image makes it possible to trace the impact
transactions have on computer records.
Maintenance error reporting and handling – control procedures should
be in place to ensure that all error reports are properly reconciled and
corrections are submitted on a timely basis. To ensure segregation of
duties, error corrections should be properly reviewed and authorized by
personnel who did not initiate the transaction.
105 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 106
106 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 107
Output controls provide assurance that the data delivered to users will be
presented, formatted and delivered in a consistent and secure manner.
Output controls include the following:
107 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 108
(i) Domain integrity – this testing is really aimed at verifying that the
data conform to definitions; that is, that the data items are all in the
correct domains. The major objective of this exercise is to verify
that edit and validation routines are working satisfactorily. These
tests are field level based and ensure that the data item has a
legitimate value in the correct range or set.
(ii) Relational integrity – these tests are performed at the record based
level and usually involve calculating and verifying various calculated
fields such as control totals. Examples of their use would be in
checking aspects such as payroll calculations or interest payments.
Computerized data frequently have control totals built into various
fields and by the nature of these fields, they are computed and
would be subject to the same type of tests. These tests will also
detect direct modification of sensitive data i.e. if someone has
bypassed application programs, as these types of data are often
protected with control totals.
This is a function implemented at the operating system level and usually also
availed at the application level by the operating system. It controls access to
the system and system resources so that only authorized accesses are
allowed, e.g.
108 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 109
The access control reference monitor model has a reference monitor, which
intercepts all access attempts. It is always invoked when the target object is
referenced and decides whether to deny or grant requests as per the rules
incorporated within the monitor.
3.1 Identification
Involves establishing identity of the subject (who are you?). Identification can
use:
- ID, full name
- Workstation ID, IP address
- Magnetic card (requires a reader)
- Smart card (inbuilt intelligence and computation capability)
They are quite effective when thresholds are sensible (substantial difference
between two different people) and physical conditions of person are normal
(equal to the time when reference was first made). They require expensive
equipment and are rare. Also buyers are deterred by impersonation or belief
that devices will be difficult to use. In addition users dislike being measured.
3.2 Authentication
Involves verification of identity of subject (Are you who you say you are?
Prove it!). Personal authentication may involve:
- Something you know: password, PIN, code phrase
- Something you have: keys, tokens, cards, smart cards
- Something you are: fingerprints, retina patterns, voice patterns
- The way you work: handwriting (signature), keystroke patterns
- Something you know: question about your background, favourite
colour, pet name etc.
3.3 Authorization
Involves determining the access rights to various system objects/resources.
The security requirement to be addressed is the protection against
109 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 110
4. Logical security
Logical access into the computer can be gained through several avenues.
Each avenue is subject to appropriate levels of access security. Methods of
access include the following:
110 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 111
Technical exposures
111 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 112
112 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 113
damage data, hard disk or files. Viruses usually attack four parts of the
computer:
Computer viruses are a threat to computers of any type. Their effects can
range from the annoying but harmless prank to damaged files and crashed
networks. In today’s environment, networks are the ideal way to propagate
viruses through a system. The greatest risk is from electronic mail (e-mail)
attachments from friends and/or anonymous people through the Internet.
There are two major ways to prevent and detect viruses that infect computers
and network systems.
Some of the policy and procedure controls that should be in place are:
Build any system from original, clean master copies. Boot only from
original diskettes whose write protection has always been in place.
Allow no disk to be used until it has been scanned on a stand-alone
machine that is used for no other purpose and is not connected to the
network.
Update virus software scanning definitions frequently
Write-protect all diskettes with .EXE or .COM extensions
Have vendors run demonstrations on their machines, not yours
Enforce a rule of not using shareware without first scanning the
shareware thoroughly for a virus
Commercial software is occasionally supplied with a Trojan horse
(viruses or worms). Scan before any new software is installed.
Insist that field technicians scan their disks on a test machine before
they use any of their disks on the system
Ensure that the network administrator uses workstation and server
anti-virus software
Ensure that all servers are equipped with an activated current release
of the virus detection software
Create a special master boot record that makes the hard disk
inaccessible when booting from a diskette or CD-ROM. This ensures
that the hard disk cannot be contaminated by the diskette or optical
media
Consider encrypting files and then decrypt them before execution
Ensure that bridge, route and gateway updates are authentic. This is a
very easy way to place and hide a Trojan horse.
Backups are a vital element of anti-virus strategy. Be sure to have a
sound and effective backup plan in place. This plan should account for
scanning selected backup files for virus infection once a virus has been
detected.
113 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 114
Technical means
Technical methods of preventing viruses can be implemented through
hardware and software means.
The following are hardware tactics that can reduce the risk of infection:
Use workstations without floppy disks
Use boot virus protection (i.e. built-in firmware based virus protection)
Use remote booting
Use a hardware based password
Use write protected tabs on floppy disks
Software is by far the most common anti-virus tool. Anti-virus software should
primarily be used as a preventative control. Unless updated periodically, anti-
virus software will not be an effective tool against viruses.
The best way to protect the computer against viruses is to use anti-viral
software. There are several kinds. Two types of scanners are available:
One checks to see if your computer has any files that have been infected
with known viruses
The other checks for atypical instructions (such as instructions to modify
operating system files) and prevents completion of the instruction until the
user has verified that it is legitimate.
Once a virus has been detected, an eradication program can be used to wipe
the virus from the hard disk. Sometimes eradication programs can kill the
virus without having to delete the infected program or data file, while other
times those infected files must be deleted. Still other programs, sometimes
called inoculators, will not allow a program to be run if it contains a virus.
114 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 115
Sabotage – some perpetrators are not looking for financial gain. They
merely want to cause damage due to dislike of the organization or for self-
gratification.
115 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 116
Logical access violators are often the same people who exploit physical
exposures, although the skills needed to exploit logical exposures are more
technical and complex.
116 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 117
117 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 118
118 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 119
you have (a device subject to theft) and something you know (a personal
identification number). Such devices gain their one time password status
because of a unique session characteristic (e.g. ID or time) appended to the
password.
4) Biometric security access control
This control restricts computer access based on a physical feature of the user,
such as a fingerprint or eye retina pattern. A reader is utilized to interpret the
individual’s biometric features before permitting computer access. This is a
very effective access control because it is difficult to circumvent, and
traditionally has been used very little as an access control technique.
However due to advances in hardware efficiencies and storage, this approach
is becoming a more viable option as an access control mechanism. Biometric
access controls are also the best means of authenticating a user’s identity
based on something you are.
5) Terminal usage restraints
Terminal security – this security feature restricts the number of
terminals that can access certain transactions based on the
physical/logical address of the terminal.
Terminal locks – this security feature prevents turning on a
computer terminal until a key lock is unlocked by a turnkey or
card key.
6) Dial-back procedures
When a dial-up line is used, access should be restricted by a dial-back
mechanism. Dial-back interrupts the telecommunications dial-up connection
to the computer by dialling back the caller to validate user authority.
7) Restrict and monitor access to computer features that bypass
security
Generally, only system software programmers should have access to these
features:
Bypass Label Processing (BLP) – BLP bypasses computer reading of the
file label. Since most access control rules are based on file names
(labels), this can bypass access security.
System exits – this system software feature permits the user to
perform complex system maintenance, which may be tailored to a
specific environment or company. They often exist outside of the
computer security system and thus are not restricted or reported in
their use.
Special system logon-Ids – these logon-Ids are often provided with the
computer by the vendor. The names can be easily determined because
they are the same for all similar computer systems. Passwords should
be changed immediately upon installation to secure them.
119 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 120
120 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 121
to program and data files with a password system. Preventative controls such
as encryption become more important for protecting sensitive data in the
event that a PC or laptop is lost, stolen or sold.
5. Physical security
Possible perpetrators
121 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 122
Bolting door locks – these locks require the traditional metal key to
gain entry. The key should be stamped ‘Do not duplicate’.
122 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 123
123 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 124
Segregation of responsibilities
A traditional security control is to ensure that there are no instances where
one individual is solely responsible for setting, implementing and policing
controls and, at the same time, responsible for the use of the systems. The
use of a number of people, all responsible for some part of information
system controls or operations, allows each to act as a check upon another.
124 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 125
Systems development
Management of input media
Operating the system
Management of documentation and file archives
Distribution of output
125 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 126
7. Network security
Communication networks (wide area or local area networks) generally include
devices connected to the network, and programs and files supporting the
network operations. Control is accomplished through a network control
terminal and specialized communications software.
126 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 127
provide for the security of these programs and data. Risks associated with use
of LANs include:
127 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 128
128 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 129
staff who are reluctant to introduce such tools for fear of introducing
limitations on their capability.
The loss of network availability may have a serious impact on the
business or service
Obsolescence of the network components, including hardware,
software and communications.
Unauthorized and indiscriminate use of synchronous and
asynchronous modems to connect the network to other networks.
Connection of the network to public switched telephone networks.
Inaccurate, unauthorized and unapproved changes to systems or
data.
Unauthorized access to confidential data, the unauthorized
modification of data, business interruption and incomplete and
inaccurate data.
Application code and data may not be located on a single machine
enclosed in a secure computer room as with mainframe computing.
a) Disclosure
It is relatively simple for someone to eavesdrop on a ‘conversation’ taking
place over the Internet. Messages and data traversing the Internet can be
seen by other machines including e-mail files, passwords and in some cases
key-strokes as they are being entered in real time.
b) Masquerade
A common attack is a user pretending to be someone else to gain additional
privileges or access to otherwise forbidden data or systems. This can involve
a machine being reprogrammed to masquerade as another machine (such as
changing its Internet Protocol – IP address). This is referred to as spoofing.
c) Unauthorized access
129 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 130
d) Loss of integrity
e) Denial of service
Denial of service attacks occur when a computer connected to the Internet is
inundated (flooded) with data and/or requests that must be serviced. The
machine becomes so tied up with dealing with these messages that it
becomes useless for any other purpose.
Loss of income
Increased cost of recovery (correcting information and re-
establishing services)
Increased cost of retrospectively securing systems
Loss of information (critical data, proprietary information, contracts)
Loss of trade secrets
Damage to reputation
Legal and regulatory non-compliance
Failure to meet contractual commitments
7.5 Encryption
Encryption is the process of converting a plaintext message into a secure
coded form of text called cipher text that cannot be understood without
converting back via decryption (the reverse process) to plaintext again. This
is done via a mathematical function and a special encryption/decryption
password called the key.
130 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 131
The limitations of encryption are that it can’t prevent loss of data and
encryption programs can be compromised. Therefore encryption should be
regarded as an essential but incomplete form of access control that should be
incorporated into an organization’s overall computer security program.
131 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 132
Firewalls are hardware and software combinations that are built using routers,
servers and a variety of software. They should sit in the most vulnerable point
between a corporate network and the Internet and they can be as simple or
complex as system administrators want to build them.
Thereare many different types of firewalls, but many enable organizations to:
Block access to particular sites on the Internet
Prevent certain users from accessing certain servers or services
Monitor communications between an internal and external networks
Eavesdrop and record all communications between an internal network
and the outside world to investigate network penetrations or detect
internal subversions.
Encrypt packets that are sent between different physical locations
within an organization by creating a virtual private network over the
Internet.
Network-based IDSs identify attacks within the network that they are
monitoring and issue a warning to the operator. If a network-based IDS is
placed between the Internet and the firewall it will detect all the attack
attempts, whether they do or do not enter the firewall. If the IDS is placed
between a firewall and the corporate network it will detect those attacks that
could not enter the firewall i.e. it will detect intruders. The IDS is not a
substitute for a firewall, but complements the function of a firewall.
Host-based IDSs are configured for a specific environment and will monitor
various internal resources of the operating system to warn of a possible
132 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 133
attack. They can detect the modification of executable programs, the deletion
of files and issue a warning when an attempt is made to use a privileged
command.
Fire
Natural disasters – earthquake, volcano, hurricane, tornado
Power failure
Power spike
Air conditioning failure
Electrical shock
Equipment failure
Water damage/flooding – even with facilities located on upper floors of
high-rise buildings, water damage is a risk, typically occurring from
broken water pipes
Bomb threat/attack
133 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 134
134 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 135
9. Computer ethics
Although ethical decision-making is a thoughtful process, based on one’s own
personal fundamental principles we need codes of ethics and professional
conduct for the following reasons:
135 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 136
136 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 137
137 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 138
10. Terminology
Digital signature
How it works
Assume you were going to send the draft of a contract to your lawyer in
another town. You want to give your lawyer the assurance that it was
unchanged from what you sent and that it is really from you.
138 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 139
a) You copy-and-paste the contract (it's a short one!) into an e-mail note.
b) Using special software, you obtain a message hash (mathematical
summary) of the contract.
c) You then use a private key that you have previously obtained from a
public-private key authority to encrypt the hash.
d) The encrypted hash becomes your digital signature of the message.
(Note that it will be different each time you send a message.)
Digital Certificate
A digital certificate is an electronic "credit card" that establishes your
credentials when doing business or other transactions on the Web. It is issued
by organizations known as certification authority (CA). It contains your name,
a serial number, expiration dates, a copy of the certificate holder's public key
(used for encrypting messages and digital signatures), and the digital
signature of the certificate-issuing authority so that a recipient can verify that
the certificate is real. Some digital certificates conform to a standard, X.509.
Digital certificates can be kept in registries so that authenticating users can
look up other users' public keys
.
139 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 140
REVISION QUESTIONS
QUESTION ONE
(a) Information security management is about viewing and managing risks in
terms of the causes, effects and therefore costs of loss of security.
Required:
Identify and briefly describe the stages involved in systematic management
of information systems.
(8 Marks)
(Question 1b December
2002)
(b) Identify six threats to Internet security and briefly describe solutions to
these threats.
(12 Marks)
(Total: 20
marks)
QUESTION TWO
(a) What is intrusion detection? List the main intrusion detection functions.(8
Marks)
(b) Define a security system and briefly explain the main security goals.
(8 Marks)
(c) List four examples of sources of threats to system security. (4
Marks)
(Total: 20
marks)
QUESTION THREE
(a) Briefly discuss three security goals. (6 Marks)
(b) List examples of threats to information security. (6
Marks)
(c) Identify key components of a security policy. (8
Marks)
(Total: 20
marks)
QUESTION FOUR
(a) Define the following data validation edits:
(i) Sequence checks (3
Marks)
(ii) Limit checks (3 Marks)
(iii) Range checks (3
Marks)
(iv) Validity checks (3 Marks)
(b) Define the following terms:
(i) Data diddling (2 Marks)
(ii) Rounding down (2 Marks)
(iii) Salami technique (2
Marks)
(iv) Piggybacking (2 Marks)
(Total: 20
marks)
QUESTION FIVE
(a) Identify the various policies and procedures that can be adopted to control
spread of viruses. (6
Marks)
140 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 141
141 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 142
QUESTION ONE
The rapidly increasing connectivity and use of the Internet has introduced
security threats and exposures to many organizations, and therefore the need
to have security measures to safeguard against such exposures. One of the
major Internet threat to an organization is the presence of hackers.
Required:
(a) Define the terms exposures, threats and vulnerability giving an
example of each.
(6 Marks)
(b) What is meant by the term hacking? Identify four exposures that can
be caused by hackers.
(8 Marks)
(c) Describe three major factors that vulnerability of a system to hacking
will depend on.
(6 marks)
(Total: 20
marks)
QUESTION TWO
(a) Distinguish an active attack from a passive attack to security.
(4 Marks)
(b) Briefly describe the following systems:
(i) CAD/CAM (4 Marks)
(ii) Image Management Software (4
Marks)
(iii) Automated Materials Handling Software (4 Marks)
(iv) CIM (4 Marks)
(Total: 20
marks)
QUESTION THREE
(a) A trap door is a secret and undocumented entry point within a program
which typically bypasses normal methods of authentication, and usually
included for debugging purposes but may be forgotten or left deliberately.
Trap doors can also be inserted by intruders who have gained access.
Suggest four counter measures of controlling trap doors.
(8 Marks)
(b) Identify six types of operational information systems in a bank.
(6 Marks)
(c) Briefly describe three advantages of implementing an online banking
system.
(6 Marks)
` (Total: 20 marks)
142 All rights reserved ©African Institute of Research and Development Studies 2013
Computer Security Issues 143
QUESTION FOUR
(a) Discuss four processing control procedures. (8
Marks)
(b) Define authentication. Using examples, identify five forms of personal
authentication.
(12 Marks)
(Total: 20 marks)
QUESTION FIVE
(a) Define the following terms:
(i) Virus (3 Marks)
(ii) Worm (3 Marks)
(iii) Logic bomb (3 Marks)
(iv) Denial of service (3
Marks)
QUESTION SIX
(a) Name five business threats experienced as a result of computer crime
exposures.
(10 Marks)
(b) Identify four aspects of risk management as relates to protection of data
and resources in an enterprise. (8
Marks)
(c) Suggest two operational level systems that can be implemented by an
airline.
(2 Marks)
(Total: 20 marks)
QUESTION SEVEN
(a) What is access control software? Discuss its various functions.
(8 Marks)
(b) Identify five syntax/format rules required of a strong password. (5
Marks)
(c) What is a smart card? (3 Marks)
(d) Define a digital signature. (4
Marks)
(Total: 20 marks)
QUESTION EIGHT
(a) List ten controls over environmental exposures. (10
Marks)
(b) Define intrusion detection system. (4 Marks)
(c) What is a firewall and what functions does it perform in relation to
organizational network security.
(6 Marks)
(Total: 20 marks)
143 All rights reserved ©African Institute of Research and Development Studies 2013
Lesson Seven 144
CONTENTS
1. Principles of data communication
1.1.Communication channels
3. Computer networks
3.1.Terms used to describe computer networks
3.2.Types of computer networks
3.3.Configurations
3.4.Client/server environment
3.5.Network Protocols
3.6.Network Cable Types
3.7.Internetworking connections
3.8.Network standards
3.9.Application of computer networks within an organization
4. Information Superhighway
5. Terminology
145
Coaxial cable
Coaxial cable is a high-frequency transmission cable that replaces the
multiple wires of telephone lines with a single solid copper core. It has over 80
times the transmission capacity of twisted pair. It is often used to link parts of
a computer system in one building.
Fibre-optic cable
Fibre-optic cable transmits data as pulses of light through tubes of glass. It
has over 26,000 times the transmission capacity of twisted pair. A fibre-optic
tube can be half the diameter of human hair. Fibre-optic cables are immune
to electronic interference and more secure and reliable. Fibre-optic cable is
rapidly replacing twisted-pair telephone lines.
Microwave
Microwaves transmit data as high-frequency radio waves that travel in
straight lines through air. Microwaves cannot bend with the curvature of the
earth. They can only be transmitted over short distances. Microwaves are
145 All rights reserved ©African Institute of Research and Development Studies 2013
146
Satellite
Satellites are used to amplify and relay microwave signals from one
transmitter on the ground to another. They orbit about 22,000 miles above
the earth. They rotate at a precise point and speed and can be used to send
large volumes of data. Bad weather can sometimes interrupt the flow of data
from a satellite transmission. INTELSAT (INternational TELecommunication
SATellite consortium), owned by 114 governments forming a worldwide
communications system, offers many satellites that can be used as
microwave relay stations.
2.1 Modem
A modem is a hardware device that converts computer signals (digital
signals) to telephone signals (analog signals) and telephone signals (analog
signals) back to computer signals (digital signals).
The process of converting digital signals to analog is called modulation while
the process of converting analog signals to digital is called demodulation.
146 All rights reserved ©African Institute of Research and Development Studies 2013
147
Computer Computer
Modem Modem
The speed with which modems transmit data varies. Communications speed
is typically measured in bits per second (bps). The most popular speeds for
conventional modems are 36.6 kbps (36,600 bps) and 56kbps (56,000 bps).
The higher the speed, the faster you can send and receive data.
Types of modems
a) External modem
An external modem stands apart from the computer. It is connected by a
cable to the computer’s serial port. Another cable is used to connect the
modem to the telephone wall jack.
b) Internal modem
An internal modem is a plug-in circuit board inside the system unit. A
telephone cable connects this type of modem to the telephone wall jack.
c) Wireless modem
A wireless modem is similar to an external modem. It connects to the
computer’s serial port, but does not connect to telephone lines. It uses
new technology that receives data through the air.
147 All rights reserved ©African Institute of Research and Development Studies 2013
148
Protocols
Protocols are sets of communication rules for exchange of information.
Protocols define speeds and modes for connecting one computer with another
computer. Network protocols can become very complex and therefore must
adhere to certain standards. The first set of protocol standards was IBM
Systems Network Architecture (SNA), which only works for IBM’s own
equipment.
Data has to arrive intact in order to be used. Two techniques are used to
detect and correct errors.
a) Forward error control – additional redundant information is transmitted
with each character or frame so that the receiver cannot only detect
148 All rights reserved ©African Institute of Research and Development Studies 2013
149
when errors are present, but can also determine where the error has
occurred and thus corrects it.
b) Feedback (backward) error control – only enough additional information
is transmitted so that the receiver can identify that an error has
occurred. An associated retransmission control scheme is then used to
request that another copy of the information be sent.
Recovery
When errors are so bad and that you can’t ignore them, have a new plan to
get the data.
Security
What are you concerned about if you want to send an important message?
Did the receiver get it?
o Denial of service
Is it the right receiver?
o Receiver spoofing
Is it the right message?
o Message corruption
Did it come from the right sender?
o Sender spoofing
Network management
This involves configuration, provisioning, monitoring and problem-solving.
3. Computer networks
149 All rights reserved ©African Institute of Research and Development Studies 2013
150
150 All rights reserved ©African Institute of Research and Development Studies 2013
151
A MAN is a computer network that may be citywide. This type of network may
be used as a link between office buildings in a city. The use of cellular phone
systems expand the flexibility of a MAN network by linking car phones and
portable phones to the network.
Wide Area Networks (WAN)
A WAN is a computer network that may be countrywide or worldwide. It
normally connects networks over a large physical area, such as in different
buildings, towns or even countries. A modem connects a LAN to a WAN when
the WAN connection is an analogue line.
For a digital connection a gateway connects one type of LAN to another LAN,
or WAN, and a bridge connects a LAN to similar types of LAN. This type of
network typically uses microwave relays and satellites to reach users over
long distances. The widest of all WANs is the Internet, which spans the entire
globe.
WAN technologies
How you get from one computer to the other across the Internet.
3.3 Configurations
A computer network configuration is also called its topology. The topology is
the method of arranging and connecting the nodes of a network. There are
four principal network topologies:
a) Star
b) Bus
c) Ring
d) Hierarchical (hybrid)
e) Completely connected (mesh)
151 All rights reserved ©African Institute of Research and Development Studies 2013
152
Star network
In a star network there are a number of small computers or peripheral devices
linked to a central unit called a main hub. The central unit may be a host
computer or a file server. All communications pass through the central unit
and control is maintained by polling. This type of network can be used to
provide a time-sharing system and is common for linking microcomputers to a
mainframe.
Advantages:
It is easy to add new and remove nodes
A node failure does not bring down the entire network
It is easier to diagnose network problems through a central hub
Disadvantages:
If the central hub fails the whole network ceases to function
It costs more to cable a star configuration than other topologies (more
cable is required than for a bus or ring configuration).
Node
Bus network
In a bus network each device handles its communications control. There is no
host computer; however there may be a file server. All communications travel
along a common connecting cable called a bus. It is a common arrangement
for sharing data stored on different microcomputers. It is not as efficient as
star network for sharing common resources, but is less expensive. The
distinguishing feature is that all devices (nodes) are linked along one
communication line - with endpoints - called the bus or backbone.
Advantages:
Reliable in very small networks as well as easy to use and understand
Requires the least amount of cable to connect the computers together
and therefore is less expensive than other cabling arrangements.
Is easy to extend. Two cables can be easily joined with a connector,
making a longer cable for more computers to join the network
A repeater can also be used to extend a bus configuration
Disadvantages:
Heavy network traffic can also slow a bus considerably. Because any
computer can transmit at any time, bus networks do not coordinate
when information is sent. Computers interrupting each other can use a
lot of bandwidth
Each connection between two cables weakens the electrical signal
152 All rights reserved ©African Institute of Research and Development Studies 2013
153
Ring network
In a ring network each device is connected to two other devices, forming a
ring. There is no central file server or computer. Messages are passed around
the ring until they reach their destination. Often used to link mainframes,
especially over wide geographical areas. It is useful in a decentralized
organization called a distributed data processing system.
Advantages:
Ring networks offer high performance for a small number of
workstations or for larger networks where each station has a similar
work load
Ring networks can span longer distances than other types of networks
Ring networks are easily extendable
Disadvantages
Relatively expensive and difficult to install
Failure of one component on the network can affect the whole network
It is difficult to troubleshoot a ring network
Adding or removing computers can disrupt the network
Advantages:
Improves sharing of data and programs across the network
Offers reliable communication between nodes
Disadvantages:
Difficult and costly to install and maintain
Difficult to troubleshoot network problems
153 All rights reserved ©African Institute of Research and Development Studies 2013
154
Advantages:
Yields the greatest amount of redundancy (multiple connections
between same nodes) in the event that one of the nodes fail where
network traffic can be redirected to another node.
Network problems are easier to diagnose
Disadvantages
The cost of installation and maintenance is high (more cable is required
than any other configuration)
154 All rights reserved ©African Institute of Research and Development Studies 2013
155
Numerous protocols are involved in transferring a single file even when two
computers are directly connected. The large task of transferring a piece of
data is broken down into distinct sub tasks. There are multiple ways to
accomplish each task (individual protocols). The tasks are well described so
that they can be used interchangeably without affecting the overall system.
155 All rights reserved ©African Institute of Research and Development Studies 2013
156
Transport Layer
o Makes sure data is exchanged reliably between the two end
systems
o Needs to know how to identify the remote system and package the
data properly
Application Layer
o User application protocols
Transport Layer
o Transmission control protocol
o Data reliability and sequencing
Internet Layer
o Internet Protocol
o Addressing, routing data across Internet
Network Access Layer
o Data exchange between host and local network
o Packets, flow control
o Network dependent (circuit switching, Ethernet etc)
Physical Layer
o Physical interface, signal type, data rate
Data is passed from top layer of the transmitter to the bottom, then up from
the bottom layer to the top on the recipient. However, each layer on the
transmitter communicates directly with the recipient’s corresponding layer.
This creates a virtual data flow between layers. The data sent can be termed
as a data packet or data frame.
156 All rights reserved ©African Institute of Research and Development Studies 2013
157
Data Data
Virtual Data Flow
Application Application
Presentation Presentation
Session Session
Transport
Transport
Network
Network
Data Link
Data Link
Physical
Physical
1. Application Layer
This layer provides network services to application programs such as file
transfer and electronic mail. It offers user level interaction with network
programs and provides user application, process and management functions.
2. Presentation Layer
The presentation layer uses a set of translations that allow the data to be
interpreted properly. It may have to carry out translations between two
systems if they use different presentation standards such as different
character sets or different character codes. It can also add data encryption for
security purposes. It basically performs data interpretation, format and
control transformation. It separates what is communicated from data
representation.
3. Session Layer
The session layer provides an open communications path to the other system.
It involves setting up, maintaining and closing down a session (a
communication time span). The communications channel and the
internetworking should be transparent to the session layer. It manages
(administration and control) sessions between cooperating applications.
4. Transport Layer
If data packets require to go out of a network then the transport layer routes
them through the interconnected networks. Its task may involve splitting up
data for transmission and reassembling it after arrival. It performs the tasks
of end-to-end packetization, error control, flow control, and synchronization. It
offers network transparent data transfer and transmission control.
5. Network Layer
The network layer routes data frames through a network. It performs the
tasks of connection management, routing, switching and flow control over a
network.
157 All rights reserved ©African Institute of Research and Development Studies 2013
158
7. Physical Layer
The physical link layer defines the electrical characteristics of the
communications channel and the transmitted signals. This includes voltage
levels, connector types, cabling, data rate etc. It provides the physical
interface.
The main types of cables used in networks are twisted-pair, coaxial and fibre-
optic. Twisted-pair and coaxial cables transmit electric signals, whereas fibre-
optic cables transmit light pulses. Twisted-pair cables are not shielded and
thus interfere with nearby cables. Public telephone lines generally use
twisted-pair cables. In LANs they are generally used up to bit rates of 10 Mbps
and with maximum lengths of 100m.
Coaxial cable has a grounded metal sheath around the signal conductor. This
limits the amount of interference between cables and thus allows higher data
rates. Typically they are used at bit rates of 100 Mbps for maximum lengths
of 1 km.
The highest specification of the three cables is fibre-optic. This type of cable
allows extremely high bit rates over long distances. Fibre-optic cables do not
interfere with nearby cables and give greater security, more protection from
electrical damage by external equipment and greater resistance to harsh
environments; they are also safer in hazardous environments.
158 All rights reserved ©African Institute of Research and Development Studies 2013
159
Most modern networks have a backbone, which is a common link to all the
networks within an organization. This backbone allows users on different
network segments to communicate and also allows data into and out of the
local network.
Fax machines
Fax machines convert images to signals that can be sent over a telephone
line to a receiving machine. They are extremely popular in offices. They can
scan the image of a document and print the image on paper. Microcomputers
use fax/modem circuit boards to send and receive fax messages.
159 All rights reserved ©African Institute of Research and Development Studies 2013
160
Shared resources
Shared resources are communication networks that permit microcomputers to
share expensive hardware such as laser printers, chain printers, disk packs
and magnetic tape storage. Several microcomputers linked in a network make
shared resources possible. The connectivity capabilities of shared resources
provide the ability to share data located on a computer.
Online services
Online services are business services offered specifically for microcomputer
users. Well-known online service providers are America Online (AOL), AT&T
WorldNet, CompuServe, Africa Online, Kenyaweb, UUNET, Wananchi Online
and Microsoft Network. Typical online services offered by these providers are:
Home banking – banks offer this service so you can use your microcomputer
to pay bills, make loan payments, or transfer money between accounts.
Investing – investment firms offer this service so you can access current
prices of stocks and bonds. You can also buy and sell orders.
160 All rights reserved ©African Institute of Research and Development Studies 2013
161
Travel reservations – travel organizations offer this service so you can get
information on airline schedules and fare, order tickets, and charge to a credit
card.
Internet access – you can get access to the World Wide Web.
Internet
The Internet is a giant worldwide network. The Internet started in 1969 when
the United States government funded a major research project on computer
networking called ARPANET (Advanced Research Project Agency NETwork).
When on the Internet you move through cyberspace.
Communicating
o Communicating on the Internet includes e-mail, discussion groups
(newsgroups), and chat groups
o You can use e-mail to send or receive messages to people around
the world
o You can join discussion groups or chat groups on various topics
Shopping
- Shopping on the Internet is called e-commerce
- You can window shop at cyber malls called web storefronts
- You can purchase goods using checks, credit cards or electronic
cash called electronic payment
Researching
- You can do research on the Internet by visiting virtual libraries
and browse through stacks of books
- You can read selected items at the virtual libraries and even
check out books
Entertainment
- There are many entertainment sites on the Internet such as live
concerts, movie previews and book clubs
- You can also participate in interactive live games on the Internet
161 All rights reserved ©African Institute of Research and Development Studies 2013
162
Connections
There are three types of connections to the Internet through a provider:
o Direct or dedicated
o SLIP and PPP
o Terminal connection
Direct or dedicated
This is the most efficient access method to all functions on the Internet.
However it is expensive and rarely used by individuals. It is used by many
organizations such as colleges, universities, service providers and
corporations.
Terminal connection
This type of connection also uses a high-speed modem and standard
telephone line. Your computer becomes part of a terminal network with a
terminal connection. With this connection, your computer’s operations are
very limited because it only displays communication that occurs between
provider and other computers on the Internet. It is less expensive than SLIP or
PPP but not as fast or convenient.
Internet protocols
TCP/IP
The standard protocol for the Internet is TCP/IP. TCP/IP (Transmission Control
Protocol/Internet Protocol) are the rules for communicating over the Internet.
Protocols control how the messages are broken down, sent and reassembled.
162 All rights reserved ©African Institute of Research and Development Studies 2013
163
With TCP/IP, a message is broken down into small parts called packets before
it is sent over the Internet. Each packet is sent separately, possibly travelling
through different routes to a common destination. The packets are
reassembled into correct order at the receiving computer.
Internet services
Telnet
Telnet allows you to connect to another computer (host) on the Internet
With Telnet you can log on to the computer as if you were a terminal
connected to it
There are hundreds of computers on the Internet you can connect to
Some computers allow free access; some charge a fee for their use
163 All rights reserved ©African Institute of Research and Development Studies 2013
164
Typically the first web page on a website is referred to as the home page. The
home page presents information about the site and may contain references
and connections to other documents or sites called hyperlinks. Hyperlink
connections may contain text files, graphic images, audio and video clips.
Hyperlink connections can be accessed by clicking on the hyperlink.
Applets and Java
Web pages contain links to special programs called applets written in a
programming language called Java.
164 All rights reserved ©African Institute of Research and Development Studies 2013
165
Java applets are widely used to add interest and activity to a website.
Applets can provide animation, graphics, interactive games and more.
Applets can be downloaded and run by most browsers.
Search tools
Search tools developed for the Internet help users locate precise information.
To access a search tool, you must visit a web site that has a search tool
available. There are two basic types of search tools available:
- Indexes
- Search engines
Indexes
Indexes are also known as web directories
They are organized by major categories e.g. Health, entertainment,
education etc
Each category is further organized into sub categories
Users can continue to search of subcategories until a list of relevant
documents appear
The best known search index is Yahoo
Search engines
Search engines are also known as web crawlers or web spiders
They are organized like a database
Key words and phrases can be used to search through a database
Databases are maintained by special programs called agents, spiders
or bots
Widely used search engines are Google, HotBot and AltaVista.
Web utilities
Web utilities are programs that work with a browser to increase your speed,
productivity and capabilities. These utilities can be included in a browser.
Some utilities may be free on the Internet while others can be charged for a
nominal charge. There are two categories of web utilities:
Plug-ins
Helper applications
Plug-ins
A plug-in is a program that automatically loads and operates as part of
your browser.
165 All rights reserved ©African Institute of Research and Development Studies 2013
166
Many websites require plug-ins for users to fully experience web page
contents
Some widely used plug-ins are:
o Shockwave from macromedia – used for web-based games, live
concerts and dynamic animations
o QuickTime from Apple – used to display video and play audio
o Live-3D from Netscape – used to display three-dimensional
graphics and virtual reality
Helper applications
Helper applications are also known as add-ons and helper applications. They
are independent programs that can be executed or launched from your
browser. The four most common types of helper applications are:
Discussion groups
There are several types of discussion groups on the Internet:
Mailing lists
Newsgroups
Chat groups
Mailing lists
In this type of discussion groups, members communicate by sending
messages to a list address. To join, you send your e-mail request to the
mailing list subscription address. To cancel, send your email request to
unsubscribe to the subscription address.
Newsgroups
Newsgroups are the most popular type of discussion group. They use a
special type of computers called UseNet. Each UseNet computer maintains
the newsgroup listing. There are over 10,000 different newsgroups organized
166 All rights reserved ©African Institute of Research and Development Studies 2013
167
Chat groups
Chat groups are becoming a very popular type of discussion group. They
allow direct ‘live’ communication (real time communication). To participate in
a chat group, you need to join by selecting a channel or a topic. You
communicate live with others by typing words on your computer. Other
members of your channel immediately see the words on their computers and
they can respond. The most popular chat service is called Internet Relay Chat
(IRC), which requires special chat client software.
Instant messaging
Instant messaging is a tool to communicate and collaborate with others. It
allows one or more people to communicate with direct ‘live’ communication.
It is similar to chat groups, but it provides greater control and flexibility. To
use instant messaging, you specify a list of friends (buddies) and register with
an instant messaging server e.g. Yahoo Messenger. Whenever you connect to
the Internet, special software will notify your messaging server that you are
online. It will notify you if any of your friends are online and will also notify
your buddies that you are online.
E-mail addresses
The most important element of an e-mail message is the address of the
person who is to receive the letter. The Internet uses an addressing method
known as the Domain Name System (DNS). The system divides an address
into three parts:
167 All rights reserved ©African Institute of Research and Development Studies 2013
168
Almost all ISPs and online service providers offer e-mail service to their
customers.
The main standards that relate to the protocols of email transmission and
reception are:
Simple Mail Transfer Protocol (SMTP) – which is used with the
TCP/IP suite. It has traditionally been limited to the text-based
electronic messages.
Multipurpose Internet Mail Extension – which allows the
transmission and reception of mail that contains various types of data,
such as speech, images and motion video. It is a newer standard than
SMTP and uses much of its basic protocol.
168 All rights reserved ©African Institute of Research and Development Studies 2013
169
For these reasons, many organizations have shied away from connection to
the global network and have set-up intranets and extranets.
Intranets
Intranets are in-house, tailor-made networks for use within the organization
and provide limited access (if any) to outside services and also limit the
external traffic (if any) into the intranet. An intranet might have access to the
Internet but there will be no access from the Internet to the organization’s
intranet.
169 All rights reserved ©African Institute of Research and Development Studies 2013
170
Extranets
Extranets (external Intranets) allow two or more companies to share parts of
their Intranets related to joint projects. For example two companies may be
working on a common project, an Extranet would allow them to share files
related with the project.
Extranets allow other organizations, such as suppliers, limited access to
the organization’s network.
The purpose of the extranet is to increase efficiency within the business
and to reduce costs
Firewalls
A firewall (or security gateway) is a security system designed to protect
organizational networks. It protects a network against intrusion from
outside sources. They may be categorized as those that block traffic or
those that permit traffic.
It consists of hardware and software that control access to a company’s
intranet, extranet and other internal networks.
It includes a special computer called a proxy server, which acts as a
gatekeeper.
All communications between the company’s internal networks and
outside world must pass through this special computer.
The proxy server decides whether to allow a particular message or file
to pass through.
4. Information superhighway
5. Terminology
Multiplexors/concentrators
Are the devices that use several communication channels at the same time. A
multiplexor allows a physical circuit to carry more than one signal at one time
170 All rights reserved ©African Institute of Research and Development Studies 2013
171
when the circuit has more capacity (bandwidth) than individual signals
required. It transmits and receives messages and controls the communication
lines to allow multiple users access to the system. It can also link several low-
speed lines to one high-speed line to enhance transmission capabilities.
Cluster controllers
Are the communications terminal control units that control a number of
devices such as terminals, printers and auxiliary storage devices. In such a
configuration devices share a common control unit, which manages
input/output operations with a central computer. All messages are buffered by
the terminal control unit and then transmitted to the receivers.
Protocol converters
Are devices used to convert from one protocol to another such as between
asynchronous and synchronous transmission. Asynchronous terminals are
attached to host computers or host communication controllers using protocol
converters. Asynchronous communication techniques do not allow easy
identification of transmission errors; therefore, slow transmission speeds are
used to minimize the potential for errors. It is desirable to communicate with
the host computer using synchronous transmission if high transmission
speeds or rapid response is needed.
Multiplexing
Multiplexing is sending multiple signals or streams of information on a carrier
at the same time in the form of a single, complex signal and then recovering
the separate signals at the receiving end. Analog signals are commonly
multiplexed using frequency-division multiplexing (FDM), in which the carrier
bandwidth is divided into sub-channels of different frequency widths, each
carrying a signal at the same time in parallel. Digital signals are commonly
multiplexed using time-division multiplexing (TDM), in which the multiple
signals are carried over the same channel in alternating time slots. In some
optical fiber networks, multiple signals are carried together as separate
wavelengths of light in a multiplexed signal using dense wavelength division
multiplexing (DWDM).
Circuit-switched
Circuit-switched is a type of network in which a physical path is obtained for
and dedicated to a single connection between two end-points in the network
for the duration of the connection. Ordinary voice phone service is circuit-
171 All rights reserved ©African Institute of Research and Development Studies 2013
172
Packet-switched
Packet-switched describes the type of network in which relatively small units
of data called packets are routed through a network based on the destination
address contained within each packet. Breaking communication down into
packets allows the same data path to be shared among many users in the
network. This type of communication between sender and receiver is known
as connectionless (rather than dedicated). Most traffic over the Internet uses
packet switching and the Internet is basically a connectionless network.
Virtual circuit
A virtual circuit is a circuit or path between points in a network that appears
to be a discrete, physical path but is actually a managed pool of circuit
resources from which specific circuits are allocated as needed to meet traffic
requirements.
A permanent virtual circuit (PVC) is a virtual circuit that is permanently
available to the user just as though it were a dedicated or leased line
continuously reserved for that user. A switched virtual circuit (SVC) is a virtual
circuit in which a connection session is set up for a user only for the duration
of a connection. PVCs are an important feature of frame relay networks and
SVCs are proposed for later inclusion.
VSAT
VSAT (Very Small Aperture Terminal) is a satellite communications system
that serves home and business users. A VSAT end user needs a box that
interfaces between the user's computer and an outside antenna with a
transceiver. The transceiver receives or sends a signal to a satellite
transponder in the sky. The satellite sends and receives signals from an earth
station computer that acts as a hub for the system. Each end user is
interconnected with the hub station via the satellite in a star topology. For
one end user to communicate with another, each transmission has to first go
to the hub station which retransmits it via the satellite to the other end user's
VSAT. VSAT handles data, voice, and video signals.
172 All rights reserved ©African Institute of Research and Development Studies 2013
173
also get higher speed reception than if using ordinary telephone service or
ISDN.
173 All rights reserved ©African Institute of Research and Development Studies 2013
174
REVISION QUESTIONS
QUESTION ONE
(a) There are three main types of network topologies namely; star, ring and
bus. As a network administrator, you have been asked to produce a briefing
document that discusses each topology in terms of cabling cost, fault
tolerance, data redundancy and performance as the number of nodes
increases. (12 Marks)
(Question 1a December
2002)
QUESTION THREE
(a) Identify the seven layers of the ISO/OSI reference model. (7
Marks)
(b) Identify the main components of a Local Area Network (LAN) (5
Marks)
(c) (i) What is middleware (4 Marks)
(ii) Explain the following Internet address: http.africaninstitute.com
(4 Marks)
(Total: 20 marks)
QUESTION FOUR
(a) Differentiate between:
(i) Serial transmission and parallel transmission (4
Marks)
(ii) Half-duplex and full–duplex communication (4
Marks)
(iii) Asynchronous and synchronous transmission (4
Marks)
(b) Briefly define a star network and discuss its advantages and
disadvantages.
(8 Marks)
(Total: 20
marks)
174 All rights reserved ©African Institute of Research and Development Studies 2013
175
QUESTION FIVE
(a) What is a network protocol? (3 Marks)
(b) Briefly describe the main components of a protocol. (6
Marks)
(c) Discuss the various benefits derived form the use of network protocols. (8
Marks)
(d) List three examples of network protocols. (3 Marks)
(Total: 20 marks)
175 All rights reserved ©African Institute of Research and Development Studies 2013
CURRENT TRENDS IN INFORMATION TECHNOLOGY
CONTENTS
1. Electronic commerce
1.1.Web store fronts
1.2.Web auctions
1.3.Electronic payment
3. Outsourcing practices
3.1.Time-share vendors
3.2.Service Bureaus
3.3.Facilities Management
4. Software houses
6. Data Warehousing
7. Data mining
9. Terminology
1. Electronic commerce
Web storefronts are also known as virtual stores. This is where shoppers can
go to inspect merchandise and make purchases on the Internet. Web
storefront creation package is a new type of program to help businesses
create virtual stores. Web storefront creation packages (also known as
commerce servers) do the following:
Allow visitors to register, browse, place products into virtual shopping
carts and purchase goods and services.
Calculate taxes and shipping costs and handle payment options
Update and replenish inventory
Ensure reliable and safe communications
Collects data on visitors
Generates reports to evaluate the site’s profitability
Person-to-person sites
Owner of site provides a forum for buyers and sellers to gather. The owner of
the site typically facilitates rather than being involved in transactions. Buyers
and sellers on this type of site must be cautious.
1.3 Electronic payment
The greatest challenge for e-commerce is how to pay for the purchases.
Payment methods must be fast, secure and reliable. Three basic payment
methods now in use are:
(i) Checks
After an item is purchased on the Internet, a check for payment is sent
in the mail
It requires the longest time to complete a purchase
It is the most traditional and safest method of payment
(ii) Credit card
Credit card number can be sent over the Internet at the time of
purchase
It is a faster and a more convenient method of paying for Internet
purchases
However, credit card fraud is a major concern for buyers and sellers
Criminals known as carders specialize in stealing, trading and using
stolen credit cards stolen from the Internet.
(iii) Electronic cash
Electronic cash is also known as e-cash, cyber cash or digital cash
It is the Internet’s equivalent of traditional cash
Buyers purchase e-cash from a third party such as a bank that
specializes in electronic currency
Sellers convert e-cash to traditional currency through a third party
It is more secure than using a credit card for purchases
3. Outsourcing practices
Outsourcing is a contractual agreement whereby an organization hands over
control of part or all of the functions of the information systems department
to an external party. The organization pays a fee and the contractor delivers a
level of service that is defined in a contractually binding service level
agreement. The contractor provides the resources and expertise required to
perform the agreed service. Outsourcing is becoming increasingly important
in many organizations.
The specific objective for IT outsourcing vary from organization to
organization. Typically, though, the goal is to achieve lasting, meaningful
improvement in information system through corporate restructuring to take
advantage of a vendor’s competencies.
Reasons for embarking on outsourcing include:
A desire to focus on a business’ core activities
Pressure on profit margins
Increasing competition that demands cost savings
Flexibility with respect to both organization and structure
Business risks associated with outsourcing are hidden costs, contract terms
not being met, service costs not being competitive over the period of the
entire contract, obsolescence of vendor IT systems and the balance of power
residing with the vendor. Some of the ways that these risks can be reduced
are:
By establishing measurable partnership enacted shared goals and
rewards
Utilization of multiple suppliers or withhold a piece of business as an
incentive
Formalization of a cross-functional contract management team
Contract performance metrics
Periodic competitive reviews and benchmarking/benchtrending
Implementation of short-term contracts
6. Data warehousing
A data warehouse is a subject-oriented, integrated, time-variant, non-volatile
collection of data in support of management’s decision-making process.
7. Data Mining
This is the process of discovering meaningful new correlations, patterns, and
trends by digging into (mining) large amounts of data stored in warehouses,
using artificial intelligence and statistical and mathematical techniques.
Industries that are already taking advantage of data mining include retail,
financial, medical, manufacturing, environmental, utilities, security,
transportation, chemical, insurance and aerospace industries. Most
organizations engage in data mining to:
Discover knowledge – the goal of knowledge discovery is to determine
explicit hidden relationships, patterns, or correlations from data stored
in an enterprise’s database. Specifically, data mining can be used to
perform:
The Internet does not create new crimes but causes problems of enforcement
and jurisdiction. The following discussion shows how countries like England
deals with computer crime through legislation and may offer a point of
reference for other countries.
Hacking
Gaining unauthorized access to computer programs and data. This was not
criminal in England prior to Computer Misuse Act of 1990.
It is not a comprehensive statute for computer crime and does not generally
replace the existing criminal law. It however creates three new offences.
Cyberstalking
Using a public telecommunication system to harass another person may be
an offence under the Telecommunications Act 1984. Pursuing a course of
harassing conduct is an offence under the Protection From Harassment Act
1997.
Reverse Engineering
Interfaces are often incomplete, obscure and inaccurate, so developers must
look at what the code really does. Reverse engineering is often a necessity for
reliable software design. Companies doing reverse engineering must not
create competing products. Courts have allowed reverse engineering under
certain restrictions.
Copying in transmission
“Store and forward networks”, a network node gets data in transmission,
stores it and forwards to the next node until it reaches its destination.
Everybody gets a copy, who archives them? Are the intermediate copies a
violation of copyright? If users email pictures or documents which contain
trademarks or copyrighted materials, do email copies on servers put the
server’s company in jeopardy?
9. Terminology
Data Mart
A data mart is a repository of data gathered from operational data and other
sources that is designed to serve a particular community of knowledge
workers. In scope, the data may derive from an enterprise-wide database or
data warehouse or be more specialized. The emphasis of a data mart is on
meeting the specific demands of a particular group of knowledge users in
terms of analysis, content, presentation, and ease-of-use. Users of a data
mart can expect to have data presented in terms that are familiar.
In practice, the terms data mart and data warehouse each tend to imply the
presence of the other in some form. However, most writers using the term
seem to agree that the design of a data mart tends to start from an analysis
of user needs and that a data warehouse tends to start from an analysis of
what data already exists and how it can be collected in such a way that the
data can later be used.
QUESTION TWO
(a) Information Technology and Information Systems raise new ethical
questions for both individuals and societies because they create opportunities
for intense social change and thus threaten existing distributions of power
money rights and obligations. Discuss five moral dimensions and the impact
of the information age on them. (10 Marks)
(b) Name and briefly define two major legal issues associated with
management of Information Systems.
(4 Marks)
(c) Discuss the impact of the following aspects to information technology.
(i) Fair use (3 Marks)
(ii) Gate keeping (3 Marks)
(Total: 20
marks)
QUESTION THREE
(a) Define the following terms:
(i) End user computing (3
Marks)
(ii) Electronic Data Interchange (3
Marks)
(iii) Data warehouse (3
Marks)
(iv) Data mining (3
Marks)
(v) Information centre (3
Marks)
(b) Name the disadvantages associated with outsourcing of information
technology services. (5
Marks)
(Total: 20 marks)
QUESTION FOUR
(a) Many small-scale enterprises do not have elaborate computerized
information systems and many rely on manual systems. Discuss the issues
that complicate access of information technology by small-scale enterprise
(8 Marks)
(b) What options are available to small-scale enterprises utilization of and
access to information technology with no in-house software development staff
to develop and implement information systems?
(6 Marks)
(c) List the measures of information system success. (6
Marks)
(Total: 20 marks)
QUESTION FIVE
(a) Not only can information systems help an organization to potentially gain
competitive advantage but can be used deliberately to do so. Briefly describe
the five-step process for using strategic planning of information systems.
(10 Marks)
(b) How can the illegal use of software be reduced? (10
Marks)
(Total: 20 marks)
QUESTION ONE
(a) Name the goals that are achieved through the implementation of a
computer network. (5
Marks)
(b) Define the following terms:
(i) Circuit switching networks (3 Marks)
(ii) Packet switching networks (3 Marks)
(iii) Message switching networks (3 Marks)
(iv) Non switching networks (3
Marks)
(c) List three advantages of adopting network protocols. (3
Marks)
(Total: 20 marks)
QUESTION TWO
(a) What does ISO/OSI reference model stand for and what is its significance
in computer networks? (4
Marks)
(b) List the various layers of the ISO/OSI reference model and identify one
functionality of each layer.
(14 Marks)
(c) List two advantages of managing computer communication through
layered protocols. (2
Marks)
(Total: 20 marks)
QUESTION THREE
(a) Briefly define e-commerce. (3 Marks)
(b) The common models of e-commerce are B2C (Business-to-Customer) and
B2B (Business to Business). Describe three emerging areas of e-commerce.
(9 Marks)
(c) Describe the unique features of e-commerce as opposed to traditional
commerce.
(8 Marks)
(Total: 20 marks)
QUESTION FOUR
(a) List four factors that have led to the surge and popularity of the Internet.
(8 Marks)
(b) Expand the following acronyms:
(i) TCP/IP
(ii) FTP
(iii) HTTP
(iv) HTML
(v) WWW (5 Marks)
(c) Describe the Client/Server Model. (7 Marks)
(Total: 20 marks)
QUESTION FIVE
(a) Define Information Resource Centre (IRC). (3 Marks)
(b) What is a software house? (3
Marks)
(c) (i) List the reasons as to why businesses engage in outsourcing.
(4 Marks)
(ii) Name the risks associated with outsourcing and suggest possible ways
of eliminating or reducing such risks. (10
Marks)
(Total: 20 marks)
QUESTION SIX
(a) Internet addresses are classified by domains. Most domain names are
general categories of the type of organization. What do the following Internet
address extensions mean:
(i) .edu
(ii) .com
(iii) .gov
(iv) .mil
(v) .net
(vi) .org
(6 Marks)
(b) What is software piracy? Suggest three ways of reducing software
piracy.
(8 Marks)
(c) Clearly define privacy and confidentiality. What different aspects of
privacy do different government legal instruments and legislation handle?
(6 Marks)
(Total: 20 marks)
QUESTION SEVEN
(a) Differentiate between a distributed system and a computer network.
(4 Marks)
(b) Define information superhighway. (4 Marks)
(c) Briefly describe four types of computer crime. (8
Marks)
(d) List four services offered by online service providers (4
Marks)
(Total: 20 marks)
QUESTION EIGHT
(a) Define the following terms:
(i) Multiplexors (2 Marks)
(ii) Front end processors (2 Marks)
(iii) Cluster controllers (2 Marks)
(iv) Protocol converters (2 Marks)
(v) Spools (2 Marks)
(vi) Buffers (2 Marks)
(b) E-mail communication has become a popular mode of communication.
What advantages do users of e-mail gain from using this mode of
communication? (8 Marks)
(Total: 20
marks)