Ipt Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 44

Ipt notes

I NFORMATION SYSTEMS IN CONTEXT What is an system? A system is a collection of resources and processes that operate together to achieve some common purpose and hence fulfil some need. The information system is for individuals & organisations. An information system contains all the hardware, software, personnel, data & processes that work together to meet the needs of the user. The nature of an information system y y y Environment The circumstances and conditions that surround an information system. E.g. Climate, electrical power furniture, people s lifestyles. Boundary- The boundary defines what part of the information system is and what is part of the environment. Purpose For what need (what it needs to achieve) & for whom is the information system designed? Determining the purpose of an information system involves the following steps: 1. Identify the people whose needs the information system should meet. 2. Formulate a list of needs that the information system should realise. 3. Translate these needs into objectives that form the purpose of the information system. E.g. Banks, personal computing (DTP), individuals, organizations. Participants- A special class of user who carries out (or initiates) the information processes within an information system. Participants are involved in the actual operation of the system. Development personnel include system analysts, engineers, programmers and testers. Information systems What needs to be done to collect and transform data? o Can be computerised using hardware or software. o Can be non-computerised: libraries, newspapers. Information processes Computer based & non-computer based activities. These activities coordinate and direct the system's resources to achieve the system's purpose. E.g. accessing the internet, word processing, reading the newspaper, listening to radio. Data The raw material used by information processes which is turned into information. I.e. Input. Data is something that is needed as a source for all information systems. Information After the data has been processed. This is displayed by the information system. I.e. Output Information Technology The hardware & software used to carry out information processes. Technology is the result of scientific knowledge being applied. E.g. Monitors, CPU, printers, applications, modems. o Hardware The physical components that make up a computer. E.g. Monitor. o Software The set of instructions for the computer in computer language that directs the hardware & defines what it is to do. E.g. Applications.

y y y

The difference between users & participants: A user is a person who uses or views the information output from an information system. A participant is a special class of user who carries out the information processes within an information system. The difference between hardware & software: Hardware compromises the physical devices that you can see & touch, whereas software is the set of instructions for the computer in computer language that directs the hardware & defines what it is to do. SOCIAL & E THICAL ISSUES The people that are affected by social & ethical issues include: y y y Participants within the information system Users of the information system Those in the environment

Privacy of the individual

Privacy of the individual is the right of individuals or organisations to have information protected. Privacy includes the right of people not to give others their personal data. A cookie is a small file sent to your computer when you enter some websites. It allows the operators of the website to monitor what you do on that site, perhaps so they can build a profile of their users. However, others may use cookies to gather data on you and to access your machine without your knowledge. Advantages are police can track known offenders quickly. The selling databases of names & addresses for advertising & other unauthorised purposes are negative. Public condemnation of those who do not provide such data goes against a moral principle in our society that people are innocent until proven guilty. Data security Data security are measures taken to prevent inappropriate or unauthorized access to & or manipulation of data. Hacking is the deliberate attempt to access data from sources that are secured against unauthorised use. Cracking is the term used to describe the hacking of data with criminal intent, that is, theft of data or abuse of data. Computer systems should have security systems. E.g. Passwords, PIN, error detection. Hackers may illegally access computer systems.

method Stand alone systems

Mirrored systems

Data backup

Data disposal Data encryption

Employee screening

Methods of achieving data security Description advantages Once computer with lock and data cannot be altered over a key access or safe combinations network or phoneline, only those with the acess rights can use the data Networks with 2 main Security software can be used computers holding identical to detect unauthorized changes data and the unaltered system can be switched to replace the other until the problem is solved Regular systematic backups of Data loss can be recovered all data or all modified data. quickly Backups should be kept isolated from the main data source and protected Shredding or burning of all data Permanently removes record which is not needed or data Coding of data so that those Reduces the need for who have the correct key can password decode the data Careful checks of all employees This type of crime is not easily to avoid potential problems predicted by a check of employee backgrounds

disadvantages Very restrictive and unsuitable for large organizations or those where large data sources need constant maintenance and sharing Expensive, requires good software to detect unauthorized changes, it does not detect illegal access along legal pathways

Passwords

Multiple access steps

verification

firewalls

A series of characters known only to the participant and the administrator which allows a set level of access to a system e.g. read or read and write access Use of additional devices as well as passwords or PIN (personal identification numbers) e.g. fingerprints or eye signature plus PIN Systems which require the participant to log in using a password. The system then verifies the participant's rights by another method e.g. check the phone number of the dial-in matches the participant's phone. Software and hardware used to block entering the traffic from entering the system

People may be allocated levels of access on a 'need to know' basis, Prevents casual access to systems Increases security e.g. card and PIN for ATM access

Does not protect against alteration of data in the main source, it is tedious to check if the data has been altered or deleted unless the amount is large enough to be obvious Difficult to organize, time consuming, subjected to human error The code can be cracked, code must be changed regularly, all participants must be notified of changes Invasion of privacy may be resented by some individuals, it results of checks require security a well, very subjective and may lose good employees who impose no risk Must be changed often to ensure security, Log-off procedures must be taught so that systems are not left open when unattended, Levels of access need to be determined Can be complicated and expensive

Increases security by doubling protection

Only useful for systems which require small numbers of people to have access, The checking process slows access to the system

Very secure as a remote computer can be used to divert and check all traffic to an information system before

Slows access to the system

allowing access to the system itself

Accuracy Data stored in information systems needs to be accurate, consistent and up to date. This is known as data integrity. Databases make it easy to cross-check information. Inaccurate credit details can affect a person s load application or credit rating. Data entry can be complicated. If multiple data entries are required for the same data, it is possible to update most and not update one. Typing errors occur. Incorrect data is provided. The transfer of data corrupts one or two characters and their inaccuracy is not noticeable. Ways of increasing the accuracy of data entered into an information system are: y a mouse, as clicking on an icon is a simpler way to enter commands or data y function keys that are set to carry out special tasks to minimise the amount of data entry required y numeric keypads, which reduce inaccuracy as the number keys are stored in a separate area and don't require the use of the shift key to provide alternative symbols y touch screens, which are useful for small amounts of data y barcode readers, which scan lines of data into a system and interpret the code held those lines by matching the code to items held in the system y optical character readers, which can be used to read individual characters from documents y document readers, which are useful for very organised documents provided the guidelines for completing the document are followed by the participant y macros or automated sequences of keystrokes that carry out a prerecorded set of tasks can be used for repetitive data input that is always of the same kind Changing nature of work The changing nature of work is how computer technology has changed the way people work. Working from home, using the computer to design instead of drawing. Deskilling. E.g. Printers can be replaced with software. Telecommunication using networks and the internet has made it possible for some people to work in isolated locations or to work from home rather than in a conventional business environment. Health & Safety Health and safety is how using computers can create health issues. Computer use involves repetitious work. Holding the body in one particular position, direct pressure on nerves and tendons, muscular stress, vibration and other factors are all involved. This leads to medical conditions called cumulative trauma disorders (CTD) such as carpal tunnel syndrome, repetitive strain injury and tendon inflammation.

factor Correct sitting position Correct monitor position Correct keyboard height Minimal data entry by keyboard Regular rest break/exercise/blinking User-friendly software: menus, icons, macros, commands and requests at eye level

Why it is important Reduces back strain Reduces neck and eye strain Reduces repetitive strain injury Reduces repetitive strain injury Reduces tiredness and chance of cumulative trauma disorders Makes tasks easier to perform

Copyright Copyright is the legal protection given to the original expression of ideas, including information systems. Copyright protects the way in which an idea is expressed but not the idea itself. It protects systems and certain data from being copied by others and is designed to prevent the unauthorised use by others of the original system from which data or information has been derived. Technology makes it easier to trace & prove breaches of copyright. Negatives are plagiarising.

The responsibility of system developers System designers have a responsibility to create information systems that are socially and ethically acceptable. There are also debates related to the freedom of information in which some groups argue strongly that information should not be restricted in any way. All their new designs and their ideas for future designs are in their system. It is much harder to legally prove (and often not worth the cost) that one section of a system has been stolen, one photograph, one sound recording or one scanned table of statistics.

D ATA D IGITISATION Advantages y Editing y Storage y Presentation y Search, sort & retrieval y Calculations y Transmission y The need for quality data including: o Accuracy o Timeliness o Accessibility y Current data digitising trends: o Newspapers on the internet o Telephone system o Video on DVD o Fax (facsimile) o Media retrieval management D ATA REPRESENTATION Data can be input into the information system in the form of text, numbers, images, audio or video. The output (information) form one information system can be the input (data) for another information system. Type of Data Text Description y y y y y y y y y y y Includes letters, upper case & lower case Numbers included with letters Symbols Not with letters Formulae Numbers used in calculations Bit mapped or vector Audio data resulting in sound output can be stored in Wave format Analogue form Sampled format Digitised form Includes a combination of audio & image data May also include text as subtitles Disadvantages y Cost of hardware & software y Compatibility with existing technology y Participants training y Social & ethical issues

Numbers Images Audio

Video

I NFORMATION PROCESSES SUMMARY y y y y y y y Collecting Deciding what, where & how the data will be gathered. Organising Arranging, representing & formatting data so that it can be used by the information system & other information processes. Analysing Interpreting & transforming data into information. Storing & Retrieving Data & information is saved & accessed later. Processing The manipulation of data into information. Carried out within the CPU. Transmitting & Receiving The transfer of information from one computer to another or within information systems. Displaying The information presented to the participant or user on the screen as a soft copy, printed as a hard copy or heard through speakers. Controls how the information will be presented.

C OLLECTING Hardware y y y y Scanners or digital cameras to collect images Microphones to collect audio Video cameras to collect video Keyboards & OCR to collect text & number Software y y y Collection device drivers Data entry into application software The internet as a collection source Non-computer Tools y y y y Data counters e.g. counting cars passing Surveys & interviews Literature Manual recording of events

Collecting is the information input process that involves deciding what data to collect and how to collect it, then locating and collecting it. Collecting the data is more than the accumulation of raw data. It requires an understanding of the different tools that can be used. The purpose of an information system The intended use, whether single or multipurpose, will usually fit into one or more of the following categories: o Financial information systems are used in banking and accounting organizations. E.g. Account records, automatic teller systems and electronic funds systems o Scientific information systems can be used for a range of data: from chemical tables to animal and plant characteristics o Commercial information systems are for business and industrial use. They include store customer mailing lists, product components, service directories o Personal information systems will be used to hold personal data: budgets, address lists of friends, journals and diaries Computer tools Hardware is the physical parts of the system. All hardware can be said to perform one of five functions that relate to aspects of information systems. Input hardware is the main type of hardware used in the collecting process. Software is the programs or instructions that run a computer system, working with the hardware to input the required data. Software is written as programs, which are complete sets of instructions written in a programming language that tell a computer how to carry out a task. Input Processing Control Storage output puts data into the system in a form ready for processing manipulates the data to achieve the purpose of the system coordinates the activities of all the components of the system keeps data for later use by the computer takes the processed data and makes it available to people or other systems

Software is of two main types: systems software and applications software. Systems software includes the operating system and utility programs which assist the operating system to carry out its work. An operating system is a program which has overall control of the running of a computer system, making sure that each action happens in the correct order, at the right time and in the right place. Applications are programs written to solve a user's problem, for example, word processors, computer games, spreadsheets and databases. Hardware used for data collection The collection of data requires the use of input hardware. Each type of input hardware is a device that digitises data: that is, it takes data from the environment, usually in analog form, and converts it into digital form. device Collection process advantages Disadvantages scanner Digitises graphics and text using o Easy to use, particularly o Specialised software laser light to 'read' data with materials up to A4 size needed Digital camera Digitises still or moving images o Easy to use o Expensive compared to o Enables editing of using a scanner photographs Microphone Sound in the form of speech o Very user-friendly input o Limited in vocabulary and music can be digitized o No hands needed and little o Dialect problems training o Can require the use of extra hardware Keyboard Digitises character input. o Commonly available o Relatively slow Layouts available include o Many are trained to use o Can cause RSI qwerty, Dvorak, Maltron OCR (optical character recognition) Digitises characters from hard o Software can be taught to o Needs good software to copy 'read' a wide vocabulary work reliably o More ergonomic input o mistakes may need to be device than keyboard corrected o helps reduce likelihood of o Machine-readable RSI source documents need to be clear

Scanners Scanners are optical devices which work with light and special software to recognise characters (letters, numbers, symbols or punctuation) or read graphics (pictures, diagrams or photographs). Scanners 'read' images by determining the level of laser light absorbed by each dot on the paper as the scan passes over the surface of the paper. This data is then interpreted by the software as digital characters representing various colours. Digital cameras A digital camera can be used to collect still images (photographs) or moving images (video). The digital camera used for still photographs uses a light-sensitive silicon chip to collect an image. Once it has been collected, the image is stored in digital form on a chip or a small disk. The image can then be downloaded to a computer, manipulated in many ways using special software, and then stored, transmitted and/or printed. microphones One way to collect sound is to record speech or music using a microphone. The microphone can be used as the input device to convert analog speech and music into digital code. Converting speech to digital data is done by comparing electrical patterns produced in speech with prerecorded patterns stored in special voice recognition software. The prerecorded patterns are used to replace the matching analog patterns. Sound cards A sound card creates a sound file from the data input through the microphone. Sound cards often have both MIDI and audio capacity. A typical sound card has: a digital signal processor (DSP) that helps to process the sound a digital-to-analog converter (DAC) for audio leaving the computer an analog-to-digital converter (ADC) for audio coming into the computer read-only memory (ROM) or flash memory for storing data musical instrument digital interface (MIDI) for connecting to external music equipment jacks for connecting speakers and microphones The sound card handles a MIDI file by following these processes: The MIDI file instructs the DSP which instruments to play and how to play them. The sound card usually uses a process called wave table synthesis to reproduce the sound of musical instruments. The DSP looks up the sound in the ROM chip. OCR An optical character reader (OCR) can be used to collect text and numbers. An OCR is a type of scanner but instead of functioning like a facsimile (fax) and recreating the image on paper, it digitises the single items of data it 'reads' from documents and thus allows the data to be input into the information system as individual characters. Software used for data collection Systems software consists of the operating system and utilities. The operating system is a group of programs that manage the hardware. Such management can include control of the central processing unit, allocation of space on the hard disk for files, and control of memory. A user interface is the link which connects the user and the machine. The graphical user interface or GUI is a simple interface to use, as icons, menus and windows can be acted on using a mouse or keystrokes in order to initiate actions. The network interface allows the participant easier interaction with the internet. Software that allows for data entry Applications software is the programs used to carry out the tasks required by participants of the system. Some of the standard applications software used for collecting data includes word processors, databases, spreadsheets, web browsers, search engines and graphics programs. In general, the following would apply to the three application programs most often used in the data collection process. Word processors: collection of text data (letters and numbers) which requires organisation within the capability of the program to be used. Spreadsheets: collection of numerical data requiring calculations. Spreadsheets allow data to be presented in graphical form such as charts. Databases: collection of text data (letters and numbers) which requires a high degree of organisation and sophisticated tools for analysis. Data entry into application software Data entry into application software takes a range of forms including text, images, numbers, video and audio. COMMON DEVICES FOR Data entry Type of data Data entry devices Applications software Text and numbers Scanning devices: mark and character recognition, facsimile. Word processors, databases, desktop Voice recognition systems publishing programs, presentation software Images and video Digitizing tablets, scanners, digital cameras, video cameras Drawing, paint, modeling and simulation programs

audio

Microphones, MIDI devices

Sound sampling programs

The internet as it collection source The internet is a vast global network of computers. Computers on the network hold data in the form of websites or collections of web pages. Any computer connected to the global network is able to access most of the data available. Hardware: The computer must have some link to the network. This can take the form of a permanent or temporary connection, using a modem and a telephone line, a cable modem or leased line, a satellite or line of sight device or some other direct link. Software: A web browser is a program that allows the participant to locate, read and display web pages on the internet.

Some of the multitude of data sources available on the internet includes: general websites on the topics you are searching for. Websites are stored on computers called servers. Each computer on the internet has a unique address called an IP (internet protocol) address. newspapers with regular news updates including classified advertisements. magazines or ezines (electronic magazines) with articles on the topics software that can be available for downloading to your computer email or electronic mail which allows data collection newsgroups or discussion groups, many of which focus on a particular area chat sessions, which can also be for those with particular interests Techniques used to collect data from the internet Moving data from a site on the internet to your computer is called downloading. Surfing is basically wandering from site to site on the net using hyperlinks and other clues. If you don't have an address to visit, then a search engine is one way to find useful data. Search engines Usually, the user types a keyword or keywords into the box and the search engine returns a list of suggestions related to where the information can be found. Types of search engines include: y directories, which hold lists of sites in categories e.g. sport. Best for general topic searches y databases, which are used to hold details related to large numbers of pages. They are best used for answers to specific questions y indexes, which are sites that gather together a number of search engines y trawlers, which are robots or spiders used to trawl the web and collect useful sites Most search engines match the keywords in the search with the page records they hold. They then do a relevancy calculation by checking to see if keywords are in the title. Then they produce a list with the most relevant (from their calculations) site at the top. Refining searches Use any of the refinement methods available on a particular search engine to narrow down your search e.g. categories, domains or groups. y Use filters to avoid links to offensive material such as pornography or violence, y Use specific terms in a search. y Use + symbols to include all the words you want in the topic you are searching for y Search for phrases by using quote marks to get the phrase y Use operators to make your search more effective. Searching for Gold AND Australia gives sites containing both gold and Australia y Use wildcards if you are unsure of the spelling or want words with different possible endings Data collection techniques on the internet y Use at least four search engines to search for a specific topic. y Use more than one word in your search. The more specific you are the better y Look carefully at the list of available suggestions. y Read the small print to decide if the site is really what you are looking for y Check the domain to see if that gives some clue to the reliability of the site y Record the results of your search as you go. Use a table in a word processor non-computer procedures in collecting Noncomputer tools are very useful in many situations including: gathering data from a representative cross-section of people. gathering data in areas where electronic technology is not available or would be awkward to use, for example, isolated areas or where you need to have use of all your limbs and voice

Some of the non-computer tools available are: literature searches, which make available all hard copy materials, not just those in electronic form. Surveys and interviews are paper copies of the means you intend to use to collect data. Surveys are normally structured, but interviews can be unstructured NONCOMPUTER METHODS Of" DATA COLLECTION tool description advantages survey open-ended questions for the participant to y Can be distributed by mail or in magazines or newspapers answer or questionnaires where answers y Less time consuming as they enable the data collector to cover are restricted by some means (ranking from a larger number of people 1 to 4 or true/false). y More objective as the data collector does not become personally involved in recording the data collected Interview Lists of questions to be asked of y More flexible in that the questions can be adapted to suit the participants circumstances y More personal than surveys as the interviewer makes direct contact with the participant

form design for data collection Forms can be developed in electronic or hard copy. Electronic forms allow the data collector more control over the user responses in that software can be written to ensure such responses follow the guidelines. Both types of forms often use design tools such as radio buttons and check boxes to simplify their completion for participants. The following form shows the use of these two conventions in different sections. check boxes - more than one can be chosen from each group. radio buttons - only one can be chosen from each group.

Social & Ethical Issues y Bias in the choice of what & where to collect data o the participant can react in a number of ways that you did not intend: refuse to answer the question (no data collected), choose one of the options closest to their actions o questions need to be simple and allow for a range of responses o the need to give anonymity to the participant y Accuracy of the collected data o The collection of data must be done accurately. This helps with data integrity later on in the processing of information systems. o peer checking can be used. Peer checking is where another qualified participant checks the data. y Copyright & acknowledgement of data collected o Under section 31 of the Australian Copyright Act 1968 it is against the law to reproduce adapt another person's work without the permission of the author. o acknowledge the source of all data y Rights to privacy o The National Privacy Act of 2001 aims to protect the personal information collected and recorded by governments and other organisations. This covers individual rights such as:  secure storage and accuracy of data  use of data by third parties  rights of individuals to access their own personal data o to protect individuals from practices such as the on selling of data collected for one purpose to another organisation where it can be used for an entirely different purpose y Ergonomic issues o the health risks faced by those using data entry techniques such as keyboards for long periods of time. o RSI- repetitive strain injury o Eye strain

ORGANISING Hardware y Data is organised by digitising: o Image o Audio o Video o Numeric o Text Methods of organising that affect processing are: o Text represented as images o Numbers represented as text Software y y y y y y Paint & draw for images Mixing software for audio Animation software for video Word processors & DTP for text Spreadsheets for numbers Converts data from one format to another Non-computer Tools y y y y Phone books Card catalogues Pen & paper forms Filing cabinet

Organising is the process that modifies data using different arrangements, representations and formats. The data is then available for use and further processing. Modifying data involves changing data in some way. Modification can be very important, and consideration needs to be given to such factors as: the amount of memory required to store data the way in which the data will be displayed the cost of using different organisational methods the resources available for the organisation of data Methods of organizing data The method chosen to organise data can affect the processing of the data. For example, the collection method used can influence the organisation of the data. If data needed to be organised as text or numbers, it would have to be entered via a keyboard or by optical character recognition. In a database, the properties of fields can be set to text, integers, real number, date, time or some specialised form such as auto-counting. If you take the example of a set of numbers entered into a field that has been set as a text field and then the same numbers entered as an integer field, sorting the numbers in ascending order results in the different results. text 1 10 23 3 34 4 5 54 Integer 1 3 4 5 10 21 34 54

Hardware for data organization Hardware digitises data for use in a computer-based information system. The digitised data will be in the form of binary code, regardless of the type of data. Type of data explanation Conversion to digital data example Text All characters are assigned a decimal value The decimal value is converted A, decimal 65, is represented by to binary code using the ASCII the byte 01000001 method for personal computers or EBCDIC for mainframe computers. Numbers These are handled in the same way as text. 0, decimal 48, is represented by the byte 00110000 Control These are handled in the same way as text. Backspace, decimal 8, is characters represented by the byte 00001000 image Bitmap images are read as individual pixels. Each pixel will be represented 00000100000 Pixels are picture elements (tiny dots) picture by one or more bits depending 00001110000 elements (tiny dots) manipulated. on the number of tones or 00011111000 colours in the image. A black 00111111100 and white image will use a 0 bit 01111111110 for white and 1 for black. 00111111100 00011111000 00001110000 00000100000 Vector images are created from primitive Vector images are read as a set objects (standard shapes such as rectangles and of coordinates indicating the polygons). Each object can be manipulated location of points on the screen. They require much less memory than bit maps. audio Sound images are in analog continuously variable wave) form (a Audio can be digitised using an audio board (sound card) or Sound sampling can be used to take samples of the sound wave

video

As with sound, film and video is in analog form and the input process needs to digitize this

using MIDI (musical instrument digital interface), which is a set of instructions for handling different musical sounds Digitising cards consist of video capture cards which can either digitise a single frame at a time (frame grabbers) or up to 30 or so frames per second (full motion).

to reduce the file size by reducing the sampling rate

Huge storage space required depending on quality e.g. 15 MB for 1 second for a high frame rate

SOFTWARE FOR DATA ORGANISATION Applications software is becoming much more complex and allows for a wide range of organisational methods to be used, depending on the type of data. There is considerable overlap between the methods used to organise data in software applications. For example, all applications allow editing, but it can be carried out differently according to the type of data that needs to be edited. Formatting, or changing the appearance of data, is also available in most applications. Graphics applications Graphics programs are divided into two major groups: paint programs and draw programs. Application Major type of data being orgnaisation explanation handled Paint software Bitmap images move Select an image or part of an image using lasso/select tools and use rulers/grids to position exactly. Moving part of the image affects the remainder of the image. Resize Make an image smaller and larger. Bitmap graphics are hard to increase in size as they become larger due to jagged edges. Crop Select only part of the graphic to be visible. Distort Stretching, tilting, flipping and rotating a picture can change the perspective of the image but jagged edges can be more visible. Anti- aliasing This process can be used to reduce the jagged edges of bitmap images by blending edge pixels into the background colour. Draw software Vector images Move Drag or select multiple objects moves individual objects without altering the remainder of the objects. Arrange Objects can be moved to the front or back of other (using layers) Resize Smaller and larger versions of images are easier to create as the coordinates adjust and the quality is not altered. Bezier curves can be altered by dragging the handles to change the shape of the curve. Crop Only part of the graphic. Distort Stretching, tilting, flipping and rotating a picture is possible without changing the quality of the image Rotate This distortion moves the object in a different direction by degrees. flip This distortion provides a mirror image of the original object group This process allows individual objects in the image to be join or disjoined so that they can be treated separately. VIDEO OR ANIMATED GRAPHICS explanation Graphical data organised as a series of frames. Images on the frames gradually change position. Showing the frames rapidly in order gives the illusion of movement Graphical data organised as a background and objects which are moved along a predefined path to give the illusion of movement The first and last frames of the animation are created. Tweening is the organisation of the between frames by a computer program so that the series of frames gives the illusion of movement when

Organisation Cell-based animation Path-based animation Tweening

Morphing warping

played. The organisation of graphical data so that across a series of frames one image changes to another by blending into a second image. The distortion of the graphical so that the components of the image are reorganised in some way.

OTHER APPLICATIONS FOR DATA ORGANISATION Forms of data other than graphical data, can be organised by software to meet the needs of users. TEXT MANIPULATION APPLICATIONS application Major type of data being handles organization explanation Word processor text Editing Organising data through processes such as cut and paste or copy and paste Tables Organising data into columns and rows or individual cells of a grid hypertext Organising data links to other data sources using text as the link Desk-top publishing text Text boxes Organising text as an object which can be treated as a single unit links Organising objects such as text boxes to link to other text boxes to enable text flow from one object to another images Picture boxes Organising graphics as an object which can be treated as a single unit Page layout Organising objects on a page such as text and picture boxes

Major type of data being handles Labels values

Spreadsheet application organization Rows and columns Cell addresses

formulas

functions Functions

explanation Using text to identify data within a file Changing the appearance of data, for example, changing an integer (1) into a decimal number (1.00) or currency ($1) Using cell references rather than values in a formula to simplify editing of file content Use in-built formulas to reduce the need for reorganizing cell structure

Major type of data being handles Text, numbers, graphics

DATABASE APPLICATIONS organization Files records fields sorting

explanation Organising data into identifiable storage units Organising data into related fields Organising data into related characters Ordering data

non-computer tools for organization Card catalogues are useful for small sets of records. Telephone books are available in hard copy as well as electronic form, allowing access for a much wider group of people. Pen and paper methods for organising data include forms, lists, tables and memos. Storyboards and designs are often sketched on paper before an electronic version is produced. These can be simple frames showing the basic outlines of a design and any links between the frames. Social and ethical issues in data organization There has been a huge increase in the complexity of applications software, and as a result the number of ways in which data can be organized. Constantly increasing organisational flexibility puts a lot of pressure on users to keep software and training up to date. It also results in benefits that come with current software, such as software wizards and templates which help in creating professionally organised documents. However, we are still faced with some of the disadvantages that come with poor organisation. Data is easily copied and pasted. Data can be collected in huge amounts from the multiplicity of available sources, and it is much harder to determine how the data should be organised effectively. Poor organisation can also lead to wastage. A database that is not kept up to date or structured correctly can have a lot of redundant, or unnecessary, data. Poor organisation can also lead to problems in the future. This became obvious in the year 2000 with the Y2K problem.

Early programmers, faced with expensive memory, cut the size of the year to two digits, which also reduced processing time. When the year 2000 arrived this was a major problem.

The spreadsheet as an organisational tool A spreadsheet organises data into rows and columns. The organisation of a spreadsheet can vary but the usual layout includes the following sections: o identification area - the section that includes the details related to the organisation, the title of the spreadsheet, its author and date of creation or modification o instruction area - the section that contains information related to directions or assumptions on which the spreadsheet is based. o input area - the section that normally holds labels and values on which the calculations will be based o calculation area - the section that holds formulas or functions related to the purpose of the spreadsheet o output area - the report area which holds the specific information the spreadsheet has been designed to produce The database is a major organisational tool. Data can be manipulated, entered into a table or displayed as a form. ORGANISATION METHODS USED IN A DATABASE Method Processes Editing Cut, copy, paste, delete, insert Changing the layout Forms: moving fields, headings, instructions or graphics Tables: column width, rearranging columns or hiding columns Formatting Using different fonts, styles and colour sorting Sort data in the database into order: that is, ascending and descending order Editing, or altering and changing data, is one example of database organisation that is essential if a database is to maintain data integrity: that is, reliability and accuracy in the data it contains. Some of the ways in which editing occurs include: o proofreading and correction of data errors through deleting o adding and deleting data records using copy, paste and import methods o changing the screen layout by moving or relocating one or more fields o inserting and deleting fields o formatting fields so that the data is easier to understand. Organising database views The usual ways are to view the database as a form or a list. A form is usually an individual record (such as an individual record providing all details of one student). A list is many records (such as the records of as many students and as many fields as can be seen on the screen at once). A database form shows the set-out of a typical database and the parts of the window used to move around the database. Only one record is shown. Organising data in a database There are some rules for organising data. Use multiple fields to hold separate data items rather than one field. Fields should contain minimal data where possible. Where possible, use codes as data entry, for example Y for yes or F for female. Sorting Data in a database can be quickly organised when necessary. Sorting data is the process of arranging items of data in a particular order, making it easier to find particular records. There are two methods of sorting data: ascending order (A-Z) descending order (Z-A) Organising the data into separate fields would give much improved and more useful information, particularly if fields were formatted correctly: that is, number or text fields in this case.

A NALYSING Hardware y Large amounts of primary & secondary storage = fast processing Fast processors = Many fast calculations Software y y y y y y Searching/Selecting Sorting Modelling/Simulations What-if scenarios Charts & graphs to identify trends File comparison Non-computer Tools y y Manually searching files Non-computer models & simulations

analysing is the process that transforms data into information. It involves the interpretation of the way the data is input & preparing it for processing. Data is the raw material of analysis. The purpose of such analysis is often to summarise the data, make predictions, identify trends or to simulate some real life situation.

Each of the other information processes exists primarily to support the analysing process, y Collecting gathers data for subsequent analysis. y Storing and retrieving allows data to be maintained for later analysis, y Transmitting and receiving provides a method for different systems to share and analyse each other's data. y Processing alters data in preparation for analysis, y Organising prepares the data for each information process; y Finally the information is actually displayed. HARDWARE REQUIREMENTS FOR ANALYSING Hardware requirements for analysing data are determined by the quantity of data and the type of analysis being performed on this data. The CPU analyses data retrieved from RAM, which in turn is retrieved from secondary storage. Secondary storage must provide data to RAM at sufficient speed and in sufficient quantity to meet the demands of the CPU. HARD DISKS the best measure of secondary storage performance would be one that records the time taken for the actual data required by a particular analysing process to be read and successfully placed into RAM. Other analysis processes require a single large file to be retrieved. Measures to determine speed of data transfer include spindle speed and areal density. Spindle speed is the speed at which the disk rotates and is commonly expressed in revolutions per minute (rpm). Areal density is a measure of the maximum number of bits that can be stored on each square inch of the disk surface. Most hard disks include a fast memory area called cache; during read operations data passes into cache, this includes the required data together with data the system predicts may soon be needed. Cache is fast chip-based storage; in a hard disk it is included on the hard disk's circuit board. Therefore, the amount of cache contained within a hard drive can have a significant effect on data access speeds. RAM (RANDOM ACCESS Memory) The total amount of RAM installed is the most critical measure. RAM holds both the software and the data used by the CPU during processing. If there is insufficient space available in RAM then required instructions or data must be repeatedly written to and retrieved from secondary storage. The most effective means for improving performance is to add extra RAM. CPU (CENTRAL PROCESSING UNIT) The number of bits that can be processed simultaneously, the speed at which instructions are executed and the nature of the instructions are just some of the factors determining the performance of the CPU; there are many others. a CPU with a clock speed of 2GHz processes at twice the speed of one with a clock speed of I GHz. SOFTWARE FEATURES FOR ANALYSING Virtually all software performs analysing tasks; if this were not the case then the software application would not produce any useful information. The following software features are used for analysis: Searching/selecting data What-if scenarios Sorting

Charts and graphs MODELLING / SIMULATIONS FILE COMPARISON

SEARCHING/SELECTING DATA Most software applications search and select data based on some criteria. In many software applications, the user can directly initiate a search to find all occurrences of a particular data item. 'searching' describes the process of actually retrieving the data; searching logically examines data items and compares them to some criteria. 'selecting' describes the process of specifying the source of the data to be searched. It may mean selecting a particular file or files. SORTING Analysing information processes commonly involves sorting data, either sorting into alphabetical or numerical order or even sorting into different categories. All digital data of all media types is represented as binary numbers therefore, sorting digital data is ultimately performed numerically. Numerical sorts consider the total value of the data item; hence an ascending numerical sort, as one would expect, arranges the data from smallest negative value to highest positive value. For example, -500, -5.6, -0.001, 2, 12 and 100 are in ascending numerical order. Alphabetical sorts compare corresponding characters from left to right; if two characters are found to be the same then the next corresponding characters are considered. For example, an ascending alphabetical sort places "Calf' before "Cat". Most applications sort according to the following order: punctuation and other marks first, followed by the digits 0-9, and finally the characters A-Z; hence -5.6 comes before -500. MODELLING/SIMULATIONS A model is used to represent some real world system or thing; therefore modeling is the process or act of creating a model. In essence, a simulation gives life to a model by altering and processing its inputs. For example, a flight simulator responds to various different inputs that change over time. Computer modeling and simulation are analysing tasks; they utilise computer resources to represent something mathematically and to produce meaningful information. Weather forecasting simulators collect and analyse vast quantities of atmospheric data from satellite and ground stations, the numeric results are subsequently used to construct images and video sequences such as those displayed each evening on the news. WHAT-IF SCENARIOS What-if scenarios allow you to consider more than one set of options. IN What-if scenarios created using computers different sets of inputs are analysed to determine a corresponding set of resulting outputs. The "What-if' analysis process aims to produce the most likely outputs for each set of inputs. When performing 'What-if analysis it is the inputs or data that is changed; the processing stays the same. CHARTS AND GRAPHS Charts and graphs are used to visually illustrate the relationships between two or more sets of data. For example, the rainfall each month for a particular town contains two sets of data, the months and the rainfall figures. y y Column and bar graphs- Column graphs display data values vertically whereas bar graphs display data values horizontally. Line graphs- Line graphs are commonly used to display a series of numeric data items that change over time. They are used to communicate trends apparent in the data. Lines connecting consecutive data points highlight the changes occurring; when all such lines are plotted overall trends emerge. When using line graphs the Source data must be sorted by the data to be graphed along the horizontal or x-axis. Pie charts- Pie charts show the contribution or percentage that each data item makes to the total of all the data items. XYgraphs- XY graphs are used to plot pairs of points. The source data being composed of a series of ordered pairs. In most cases the Source data for XY graphs is a series of samples taken at various intervals.

y y

FILE COMPARISON There are various utilities available that compare either the properties or actual contents of files. Many of these utilities are designed to synchronise files stored on different computers and storage devices. Windows Briefcase compares the modified dates and highlights any differences found. Many database management systems include file comparison functionality. In Microsoft Access and SQL server such functionality is called replication. Replication is a system that allows the contents of records to be synchronised across multiple copies of the data.

NON-COMPUTER TOOLS FOR ANALYSING SEARCHING MANUAL FILING SYSTEMS To search for particular data within a manual filing system is time consuming even when the files are sorted based on the field being searched. Furthermore, files can only be viewed by a single person at anyone time and after use they must be returned to their correct position. Some common reasons for maintaining manual filing systems include: y Cost - hardware, software, data entry and training costs must be met upfront y Volume of data - most new businesses start up small, with correspondingly small amounts of data y Training - to use a computer-based filing system requires knowledge y Nature of the data - most computerised information systems require data to be organised in a predetermined and highly structured manner, if additional fields are' needed then the structure of the entire system must be altered NON-COMPUTER MODELS AND SIMULATIONS However prior to production commencing a non-computer model or prototype is commonly built and tested; a prototype being a full size model of the final product. Why are such non-computer models and simulations built? y To demonstrate feasibility - a working model or prototype clearly demonstrates that the product in fact operates and fulfils its objectives. y To resolve design unknowns - not all variables can be included in a computer model y To resolve human factors issues - a non-computer model is needed to test the product is human friendly y To market an idea - an actual example or model of a proposed product is invaluable when trying to assess or create a market for a new product

SOCIAL & ETHICAL I SSUES Unauthorised analysis of data o National Privacy Principle 2 (NPP2) of the Privacy Act 1988, organisations that hold data on individuals are required to disclose how such data will be used o For example, if personal data is collected by a business to enable it to complete a sales transaction then the business is not authorized to use such data for unrelated purposes Data incorrectly analysed o inaccuracies routinely occur when attempting to identifY future trends based on past data o There may be undetected errors within the analysis process. o it is often impossible to include all variables within computer models o The scale of the axes and the type of graph influences the relative importance of differences and trends communicated. Erosion of privacy from linking databases for analysis o Data mining- Linking together multiple databases can be used to formulate new information that was not present in any of the individual source databases. o By linking tables, trends about people may be discovered, e.g. what customers more likely to purchase

STORING & RETRIEVING Hardware y y y y y y Magnetic Disk Optical Disk Network Storage Flash Memory Magnetic Tape Characteristics o Random or sequential access o Volatile or nonvolatile o Permanent or nonpermanent Software y y y y y y Device drivers File management Database management systems File formats Encryption/password protection Internet Browser: o Machine independent browsers o Search engines Non-computer Tools y y y Paper based storage Microfiche Libraries

THE ROLE OF STORING AND RETRIEVING


The two step process that saves data/information and reloads it to allow for: y y y y Other processing to take place A temporary halt in the system Backup and recovery The transfer of data/information

Storing is the process of copying or saving data into a storage device. Retrieving is the process of reloading previously stored data. The storing of data involves placing it in secondary memory & is often referred to as writing data. The retrieving of data occurs when it is read from storage & moved from secondary storage into the RAM.

TO ALLOW OTHER PROCESSING TO TAKE PLACE Secondary storage has a much greater capacity than primary storage. Consequently data, and even program instructions, must be retrieved from secondary storage as required by the process occurring at that particular time. In essence secondary storage is being used as an extension of primary storage; when such a system is formally implemented within an operating system the portion of secondary storage used as RAM is called virtual RAM. The primary purpose of a file server is to store and retrieve data for a number of computers within a network. For this to occur all data must pass through the file server's primary storage (RAM) on its way to the network and then again on it's wayback to the file server's secondary storage. TO ALLOW FOR A TEMPORARY HALT IN THE SYSTEM It is uncommon for all information processes present in an information system to be completed in a single session. As a consequence provision must be made to halt the operation of the system for a period of time; obviously this requires all data to be permanently stored. BACKUP AND RECOVERY Making a backup of data is the process of storing or copying the data to another permanent storage device, commonly recordable CD, magnetic tape or a second hard disk. Recovery of data is the opposite process where the data is retrieved or restored from the backup copy and placed back into the system. The aim of creating backups is to prevent data loss in the unfortunate event that the original data is damaged or lost. Some other reasons for data loss includes software faults, theft, fire, viruses, intentional malicious damage and even intentional changes that are later found to be incorrect. There are two main types of backup that are commonly used; full backups and partial backups. A full backup includes all files whereas a partial backup includes only those files that have been created or altered since the last backup was made. TO ASSIST THE TRANSFER OF DATA/INFORMATION The data or information on the remote computer must be stored before it can be retrieved and transferred to other computers. Furthermore, the data, once received by the local computer, must be stored locally prior to further processing and display. Hence the storing and retrieving information process is integral to the transmitting and receiving process. For example, web browsers store a copy of every file retrieved from a website locally within a temporary Internet files folder on the hard disk; the browser retrieves these files from this folder prior to display.

HARDWARE IN STORING AND RETRIEVING RANDOM OR SEQUENTIAL ACCESS Random access refers to the ability to go to any data item in any order. Once the location of the required data is known then that data can be read or written directly without accessing or affecting any other data. Sequential access means the data must be stored or retrieved in a linear sequence. For example, the sixth data item is needed so the preceding five data items must first be accessed. VOLATILE OR NON-VOLATILE Volatile computer storage requires a continuous electrical current to maintain data; if no electrical current is present then the data will be lost. On almost all computers RAM is volatile, if you do not save your data to secondary storage it is lost from RAM should a power failure occur. To reduce the effects of the volatility of RAM computers performing critical tasks are connected to uninterruptible power supplies (UPSs). The purpose of a UPS is to provide sufficient power to allow the contents of RAM to be written to secondary storage and then for the computer to be shutdown gracefully. non-volatile storage does not require power to maintain stored data. Virtually all types of storage, apart from RAM, can be classified as non-volatile. Examples include ROM, magnetic disks and tapes, all types of optical storage and even flash memory. PERMANENT OR NON-PERMANENT When comparing different secondary storage devices permanence can be used to imply the inability to alter or erase data. Consider data stored on a hard disk, it can easily be altered or even erased, hence hard disks can be described as non-permanent. On the other hand the data on a non-recordable DVD or CD-ROM can be described as permanent; it cannot be altered or erased. OPERATION OF SECONDARY STORAGE HARDWARE Digital data is composed of a sequence of binary digits, zeros and ones. These zeros and ones are equally spaced along the surface of the magnetic medium. Low magnetic forces occur between two poles and represent zeros. High magnetic forces are present at the poles and represent ones. Storing or writing magnetic data SOCIAL & ETHICAL I SSUES y Security y Unauthorised retrieval y Advances in storage & retrieval with data matching

P ROCESSING Hardware y y y y Fast processors A lot of RAM Large storage capacity Increased processing speeds: o Increased clock speeds o Increase bus capacity Trends in CPU development Software y For processing text, numbers, image, video & audio data Non-computer Tools y y y y Documenting procedures Data flow diagrams System flow charts User manual

Processing is the process that manipulates data to produce a new value or result. It manipulates data into information. The CPU or the central processing unit is the hardware that does this. Types of processing include: y Centralised- controlled by a central computer on a network. All data and/or all programs are held on the central machine. The machines attached to it do not process. Distributed- does not have a central computer to control processing. Each terminal does its own processing. The data on each machine will be different depending on the task. However, the workstations will be networked to share resourcesParallel- the simultaneous processing of two or more programs instructions or files by multiple computers. Several central processing units work together on the same tasks and share memory Hardware used be processing The CPU (central processing unit) The CPU Is the brain of the computer. Its electrical circuits control the movement of data, carry out the instructions sent from peripheral devices and change the data according to the instructions and send instructions to peripheral devices. It is contained in the integrated circuit, a silicon chip. A transistor is the electronic miniature switch made out of semiconducting materials. The integrated circuit is multi-layered and its pins connect it to the motherboard where it is usually located under or close to a fan.

Components of the CPU (central processing unit) There are three main parts in the CPU, each with a particular function: the registers, the arithmetic logic unit and the control unit. Control unit- the coordinator of all instructions and data. It receives the instructions and data, controls the flow and direction around other components of the CPU, and selects and retrieves data from storage locations in the order specified Arithmetic logic unit- a collection of electronic circuits that are used to perform arithmetic functions, such as add, subtract and logical functions, such as AND OR, NOT. It is also the unit that is used to compare numbers so the program can make decisions. It works closely with registers. Registers- an electronic circuit capable of storing binary digits in temporary memory. These are the places where items of data are temporarily stored in the CPU for later use. Some typical registers in the CPU would be: o the storage register, used for storing the next instruction o the accumulator, used for storing temporary results from the latest calculation o the address register, used for storing memory address locations o the instruction register, used for storing instructions to be processed. The fetch-execute cycle Software and hardware work together to process the input of the computer system. This process is carried out by the fetch-execute cycle of the CPU. An instruction is fetched from memory, decoded (the computer finds out what the instruction wants it to do), and then it is executed (the computer does it). Fetch: The next instruction is retrieved from memory and decoded in the control section

Decode: The instruction at the address Is sent on the data bus to the encoder where it is decoded into an opcode and an operand. Operands are data that needs to be processed. Operands are instructions for the processing of data. The opcode is sent to the ALU. Execute: The processing section carries out the decoded instruction sending data to or from memory as needed. The ALU processes the data from the data bus according to the operation specified by the opcode. Store: The result of the ALU's calculation is stored in the accumulator.

The program counter, keeps a record of where the next instruction is to come from. Once the instruction has been received the counter is taken so that the cycle can begin again. Caching A memory cache is sometimes used to speed up the operation of the computer system. This is typically a relatively small amount of very fast memory that acts as an intermediary between the CPU and the primary memory, or between storage devices and primary memory. Processing speed is determined by a range of factors related to the CPU and memory. factor Bus capacity Description Buses are the pathways along which signals are transferred from one computer component to another. They can be separate wires or cables, or metallic strips embedded/etched into the circuit boards or microprocessors themselves. The system clock is an accurate, very fast electronic timer. It allows the synchronisation of chips and functions in the computer. Once paths are set up, data is transferred by a particular clock pulse. The faster the system clock, the more instructions per second that can be executed by the CPU. Word size refers to the number of bits that the CPU can handle in each cycle of the fetch-execute cycle. A computer word is not the same as a word in a language structure. How the factor affects speed The capacity of the bus determines the amount of data that can be transferred at anyone time. A 32-bit bus transfers twice as much data as a 16-bit bus.

System clock

Word size

Electronic pulses generated by the system clock synchronise the processing of data. The faster the clock, the more operations that can be carried out in anyone period of time. This is measured in megahertz or one million pulses per second. A computer operating at 1000 MHz is twice as fast as a computer operating at 500 MHz. A CPU that handles 64 bits can work twice as fast as a CPU that handles 32 bits: that is, it is able to process twice as much in each cycle.

The CPU accesses memory according to a distinct hierarchy. Most data goes into random access memory (RAM) first. The CPU then stores pieces of data it will need to access often in a cache, and maintains certain special instructions in the register. The CPU is the controlling device for the input and output of data. It has a twoway interaction. Temporary storage areas include RAM and caches. Permanent storage areas cover all drives and disks, networks, the internet and ROM. Its interaction with input and output is one-way. The input devices send data to the CPU and the CPU sends processed data to the output devices.

SOFTWARE USED IN PROCESSING

Software processes data according to the type of data and the range of processing allowed by the program. Text data is processed as characters, strings or arrays. A character is any individual letter, symbol, number, punctuation mark or command. B, b, !, $ are all characters. A string is a related group of characters. [email protected] is a string. An array is an organised set of text data of the same t}pe. The array can be one dimensional, such as a list of names. Numeric data is processed as integers, dates or numbers. Images are processed as bitmaps (individual pixels) so that each part of the image can be manipulated, or as vectors, where objects which make up the image can be manipulated but not to the same level of detail. Audio can be

processed using sampling techniques. The sound is digitized using samples of the analog sound wave. Video is processed using frames. A frame is one display in the video. The larger the number of frames per image and the more frames shown per second, the higher the quality of the video. Non computer tools and process Processing can be represented using pen-and-paper methods. Documenting procedures to follow when processing include using clear labels in the processing of data or detailed steps of procedures so that others can follow what has happened. Product documentation such a hard-copy manuals provided with software can help users with the processing methods used in an application and often provide troubleshooting hints so that problems can be easily solved. Diagrammatic representation of processing steps using data flow diagrams and system flow charts is a form of process documentation. SOCIAL & E THICAL ISSUES y Security and types of computers on networks o If the central processor crashes or is accessed by unauthorised people then there is a real threat of data loss or corruption. o Use mirrored systems, holds identical copies of the data on the central system. y Ownership of the processed data o Once the data has been processed it is often hard to track the origins of data o processed data can be sold to interested third parties, o does it belong to the individuals from whom it was obtained y Bias in the way participants in the system process data o Bias can exist in the way participants in the system process data. o Data may be skewed in one direction or towards someone. o For example in a council unusual or new building materials would be given a very low priority rating and fail to be approved.

TRANSMITTING & RECEIVING Hardware y y y y Buses Modems LANs WANs Software y y y y Communications packages Transmitting & Receiving text, number, image, audio & video Email Encoding & decoding Non-computer Tools y y y y y Mail Telephone Fax Radio TV

This is information process that transfers data & information within & between information systems. Transmitting involves the sending of the data/ information. Receiving involves the acceptance of data from other computers. Digital signals use on and off electrical pulses, and this kind of signal works well in representing two-state binary code, the Os and Is used by computers. In order to transmit and receive between computer systems, it is necessary to have a link between the systems called a network. Transmitting and receiving can be carried out in many different ways: computer networks, analog phone networks, mobile digital phone networks, pagers, facsimiles, the internet and a range of traditional methods from signals to letter and parcel mail. Communication concepts The process of transmitting data involves the movement of instructions, files and programs around a computer system, from one computer to another computer or from a computer to a peripheral device. Uploading is the transfer of files from your computer to a host computer. Downloading is the transfer of files from a host computer to your computer.

Serial and parallel transmission Data can be sent as serial or parallel transmission. Both types are used in sending and receiving data. Data needs to be converted to and fro as data can use both transmissions. This hardware is called an RS232 port. An RS232 port converts the stream of bits from a serial transfer media into sets of 8 or multiples of 8 bits that are then sent across the parallel media. type Description Advantages/disadvantages Examples of use Serial The bits in a message are sent in single Slower than parallel transmission but Modems file, one byte behind the other. used over longer distances. Signal fades Telephone lines over distance so the signal must be Satellite systems amplified (boosted) using hardware such as repeaters. Parallel 8 bits in a byte are sent along 8 separate Quicker but expensive, and errors occur Disk drives paths (or multiples of 8 bits along multiple because of data skew if the distance is printers paths) at the same time. beyond a few metres

Simplex , half duplex and full duplex transmission Data can be sent across the media in one of three ways as shown. type description Simplex transmission Data travels along the medium in one direction only.

Advantages/disadvantages Slower than other methods The same channels cannot be used to send data back to the transmission station Taking turns to send and receive slows down the transfer of data but reduces errors. Fastest of the three methods. Allows true interactive transmission and reception

Examples of use Keyboard Printer Teletext Disk drive CB radio Internet sessions CPU Newer modems

Half duplex transmission

Data travels along the medium in both directions, but not simultaneously.

chat

Full duplex transmission

Data travels along the medium in both directions simultaneously

SYNCHRONOUS AND ASYNCHRONOUS TRANSMISSION

These transmission methods are needed so that the receiving system knows how to interpret the stream of data it receives. It is necessary to know where one character (byte) starts and the next one begins.

Asynchronous transmission has become the standard in microcomputers. The information is sent without regard to keeping in time with the other computer system. Each byte is made up of the following: 7-bit ASCII code 1 parity bit to check for errors or as an additional bit for graphics 2 control bits made up of 1 stop bit to indicate the end of the byte 1 start bit to indicate the beginning of the byte Each byte becomes 10 bits. This increases the size of the data to be sent and slows down the transmission. Dial-up communication services typically use asynchronous 10-bit code with no parity and full duplex. The parity bit is an additional bit added to each character. Parity is a method of checking for errors by counting the number of digits in a byte or group of characters. Parity can be set to odd parity or to even parity. Parity is not an error-correction method; it only works for error detection. Even parity is achieved by adding 1 as the parity (last digit) bit to ensure an even number of Is or 0 if there is already an even number: 11110011 01001101 Odd parity is achieved by adding 1 as the parity (last digit) bit to ensure an odd number of Is or 0 if there is already an odd number: 11110111 01001001

Synchronous transmission is the standard on larger computer systems such as mainframes and supercomputers. Both terminals process the data at the same rate and the clocks of both are used to make sure that this happens. There is no need for a start and stop bit. It is faster because all the bits are sent together as a packet at the same rate without stop and start bits. The packet of data contains bits at the start of the packet that explain the rules used in sending the bytes. Synchronous transmission is expensive and is best for computer systems that need to send huge quantities of data quickly. Measurements of speed method bits per second (bps) Kilobits per second (kps) Baud rate

or

description The number of bits that can be transferred in one second The frequency or signal switches per second. This can vary as the electrical signals can change state

example A 56K modem is capable of transferring 56kps which is 56*1024 bytes or 56 bits . The baud rate could be considerably less than bps. A 56K modem can send at around 42 kbps but the baud rate might be only around 30 baud

C ALCULATING SPEED : AN EXAMPLE The phone line operates at 28 800 baud, and 57 600 bps is forced through this 28 800 baud. Hence, 57 600 bps means each signal switch of the line represents 2 bits. Typically, each character requires 10 bits for transmission in asynchronous mode. 57600 bps = 5760 characters per second. If a page of text contains 3000 characters per page, how long will it take to send 10 pages of text in asynchronous mode using a 56K modem? 3000 characters * 10 bits per byte = number of characters to be transmitted (3000*10)/5760= number of seconds to transmit characters (3000*10)/5760)/60= number of minutes to transmit characters Different types of data are transmitted at different rates. Graphics, sound and video data takes considerably longer than text. Some methods are more efficient for particular types of data transmission than others. Circuit switching is best used for sound transmission. The data is sent on a circuit that is devoted to that transmission until all data has been sent. Packet switching is best used for the transmission of other data, such as text and graphics. Data is divided into fixed-length blocks called packets. Each packet includes instructions related to the packet address. Asynchronous transfer mode or ATM is developing as a solution to data transmission that will handle all types of data. It uses high bandwidth fibre optic cables and a mix of packet and circuit switching to send data, voice and video.

NETWORKS

A network is two or more computers joined together for the purpose of transmitting and receiving data. Networks send and receive over a shared network medium. The computers on the networks can be of two types:

dumb terminals, where the computer does no processing. Processing is handled by a server on the network. smart or intelligent terminals, where the computer independently processes data LAN Local area networks (LANs) are networks that are confined to one geographic area, such as a single building or a school campus. A peer-to-peer LAN is a set of computers that does not have a dedicated computer for sharing and storing files. A server-based LAN has one or more servers. A server is a computer that handles the designated work on the network. WAN Wide area networks (WANs) are a network of geographically distant computers and can be made up of a number of LANs linked together. Data transfer across a WAN is slower because of the telecommunication links needed to cover the distances. Transmission is accomplished by connecting the different LANs using services including, satellite links and data packet carrier services. Repeaters tare used to amplify the signal and send it on. Analogue to digital conversion The process of sending data from one device to another is transmission. Changing the data from one form to another is conversion. When analog data signals are part of a communications system using digital data, they need to be converted. The analog signal is a continuous electrical signal in the form of a wave known as a carrier wave. The carrier wave can be altered in different ways to change it to a digital signal. Hardware for transmitting and receiving Communications between computers The modem (modulator/demodulator) is a common hardware device used to convert signals to allow data to be transmitted over a telephone line. The processes of converting the signal are called modulation (from digital to analog signals) and demodulation (from analog to digital signals). Types of modems include: internal modems, which are extension cards inserted into the motherboard external modems, which are connected via cable to the system box fax modems, which combine the functions of a facsimile and a modem When a computer sends a message using a modem, the following steps apply: 1. The computer sends a copy of the data (leaving the original data with the local computer) to the local modem which is attached to the telephone line. 2. The local modem converts the data into analog form (modulation). 3. The local modem sends the data to the remote modem over the telephone line. 4. The remote modem converts the data into digital form (demodulation). 5. The remote modem sends the data to the remote computer. Other forms of hardware links People are connecting to the internet using other types of links. These include leased lines called ISDN, local-area networks, a cable modem or a very high-speed connection using a regular telephone line called DSL (digital subscriber line) . ISDN ISDN (integrated services digital network) is a digital connection. ISDN provides widely available, low-cost digital communications for voice and data transmission but there is a cost involved which makes it more expensive than a modem. An ISDN line carries three digital channels: two 'B' channels that carry various kinds of data at over 64 000 bps and a 'D' channel at 16 000 bps that can carry control signals or serve as a third data channel. Cable modems This technology uses a hybrid fibre optic coaxial cable working on a LAN to service a neighbourhood. The LAN and cable modem also link TVs and computers to external cables. As it is a shared network, the more users who use the system at anyone time, the less the performance. ADSL ADSL (asynchronous data subscriber lines) allow high-speed internet access via existing telephone lines. Data subscriber lines have a number of advantages: the existing phone line can be used, although new wiring is often installed the speed is much faster than a normal modem - 1.5 MB per second is usual the phone line is still available for phone calls However, there are disadvantages:

the service is only available in limited areas of Australia at present the service works better if you are closer to the switch office: that is, you cannot be further than 6000 metres from the central switch for your area DSL connections send at a slower rate than they receive data. You are still dependent on the connection at the ISP for data transfer

Communications within an computer The pathways along which the digital data travels are called buses. Buses can be etched lines, wires or connectors. Internal buses are part of the motherboard. They work directly with the CPU and memory. Expansion buses connect the CPU and memory to peripheral devices. Cables are used to connect the peripheral devices to the motherboard and power supply. Ports are connections located on the back of the system box to which cables are connected. Expansion cards are circuit boards that connect to the motherboard via an expansion slot. They control different peripheral devices. Fax machines or facsimile transmission is a transmission and receiving method that is available through the telephone network. Voice transmission is becoming more common. Voicemail receives incoming voice messages and stores them on the computer in digital form. When the receiver retrieves the mail, the messages are converted back from the digital version. Voice messages can be left when no one is available for direct contact. Software for transmitting and receiving Communications packages to interface with hardware Transmitting and receiving requires a set of rules called protocols that are common to each of the computers that are involved in this process. Protocols determine the following rules: the method of transmission the speed of transmission the method of error detection to be used the mode of transmission Protocols are set during handshaking, the initial contact between computers made at the start of the transmission process. TCP /IP (transmission control protocol/internet protocol) is a set of protocols developed to allow cooperating computers to share resources across a network. Some of the important TCP/IP services are: file transfer. The file transfer protocol (FIP) allows a user on any computer to get files from another 'computer (download), or to send files to another computer (upload). remote login. The network terminal protocol (TELNET) allows a user to log in on any other computer on the network.

Transmitting and receiving data Text and numeric data files are relatively small and transfer quickly. Image, audio and video data files are larger and can cause more difficulties. One way to reduce the problem caused by large file size is to use file compression. Multiple files can be compressed into one file called an archive, and either of the above methods used to send the file. Encoding and decoding Encrypting data so that it cannot be easily read protects data during transmission across a network.

Emulation software Emulation software is necessary on many systems for the process of transmission and reception to work across different hardware platforms. A platform is the processor and operating system used by a computer. Terminal emulation software allows a computer to act as if it were another type of computer. non-computer tools for transmitting and receiving Mail systems handle hard-copy material: letters, cards, parcels, express mail and courier services. They use the existing rail, road and air transport networks to move the material to its destination. Phone and fax systems can handle digital and analog transmissions sending and receiving voice and hard-copy materials. Radio signals carry sound. Television signals carry sound, images and video. Receiving processes are becoming more available for both these tools: radio has long been able to use two-way communication and digital television allows interactivity such as connection to the internet. SOCIAL & E THICAL ISSUES y Data accuracy o Any person who wishes to and has the technology can publish on the internet o Extremists groups, those who deliberately distort facts and very reputable organizations can all create websites and present their opinion as fact. o primary sources and secondary sources of information

o o o y

Who wrote the site? What are the writer's qualifications or background in the area of content? What type of site is the one you are using? Government or education site

Data security o Email can be scrutinised by others and has fewer laws to prevent this happening than ordinary mail. o Firewalls are needed and encryption is very important where security is paramount o Cookies present security problems for some users. Websites use cookies to gather data about those who use their site. Netiquette o Be polite. Do not send or become involved in any abusive messaging. o Use appropriate language. Treat people as you would expect to be treated o Use of offensive/suggestive sites in business 'time' is unacceptable o Racist and sexist material is still against the law o Flaming (verbal written attacks) should be reported to the system administrator Acknowledgement of data source o comply with the laws of copyright and acknowledge society's standards which protect the intellectual property rights of those who create new concepts o Any use of data should be clearly acknowledged as footnotes or in a list of sources Global network issues o Date fields use different formats in some parts of the world. o Time zones vary: winter in the southern hemisphere is summer in the northern hemisphere but there are differences in the time from one city to another o the American date format 11/12/01 as the Australian 11 December 2001, when it was the MM/DD/YY format (12 November 2001). Changing nature of work, o Telecommuting occurs when people work from home o The advantages include increased Increased productivity due to familiar environment (and perhaps quieter), and more leisure time from time saved due to lack of travelling. o Disadvantages include loss of contact with other workers and possible disruption to the home life. o However, electronic mail has now become a very popular method of keeping in touch with customers and suppliers in the business environment

Electronic mail, an example of the receiving transmitting process Electronic mail (email) allows participants to send messages to users on other computers. Originally, people tended to use only one or two specific computers, and would maintain 'mail files' on those machines. Mail is normally handled by a larger system. Individuals can access these larger systems through the use of an online electronic mail server or the server of their internet service provider (ISP). Email advantages Email has advantages beyond saving paper. It is almost immediate and, in most situations, is much cheaper than using the phone directly or ordinary mail. Messages can be sent to multiple recipients at the same cost as a single message: that is, a local phone call or across a network. Complex messages including video and sound can be transmitted and received in a more organised way than a fax. Email features An e-mail address will look like the following: login name@server name.domain. The login name is your user name. The separator is the symbol @. The server name is the name of your ISP or organisation server who hosts your mail box. Transmitting email The mail window contains different options. To ... The To: line is for the receiver's email address. Ce ... A computer carbon copy works like the old-fashioned carbon copy without the paper. Every email address on the Cc: line will receive a copy of the message. Bee ... Addresses in the blind carbon-copy line will be sent carbon copies of the message but the receivers will not be aware of the others who have been sent the message. Subject: The subject line is the topic or subject of the letter. Attachment: The attachment line shows the names of any files being sent Message body: The large box below the header is where the actual email message is typed. Receiving email To check for mail in a mail program, locate and click the link that allows you to access the In Box. Mail programs can usually be set to check for mail automatically or only when told. Received mail can be handled in a number of ways: Delete the message. Save the message to your own computer Reply to the message Forward the message. Send the message on to another recipient

D ISPLAYING The method which information is output from the system to meet a purpose. It involves making a decision about what form the output information is to take & then outputs it as a hard copy, soft copy or sound. Hardware y y y y Screens (LCD, CRT, Plasma) for text, number, images & video Printers & Plotters for text, numbers & images Speakers for audio Digital projectors & interactive whiteboards for text, numbers, images & video Software y y Interfaces for hardware display devices Display features in application packages including: o Reporting o Formatting o Spacing o Merging o Tables o Charts Non-computer Tools y y y y Storyboarding Pen & paper designs Newspapers Musical instruments

Hardware for display Output devices - peripheral hardware that produces hard and soft copies of data. Devices that produce soft copies include speakers and screens of various kinds. Hard copy devices Hard-copy devices are those that produce a paper copy for display. Printers can be used for displaying text, numeric data and images. They can be impact or non-impact printers. An impact printer forms characters by physically striking paper and ink ribbon with metal drums. Examples include dot matrix, daisy wheel, and the older band drum, wheel and chain printers. A non-impact printer forms characters by using heat, laser beams, photography or ink spray. The quality of a printer's output is determined by several factors: y Speed is measured in characters per second. Some printers can print only one character at a time, y Noise can be reduced if the printer head has no physical contact with the page y Quality or the clearness of the output is called resolution. Resolution is measured by the number of dots per inch (dpi) used to produce the display. Type Inkjet advantages y Quiet y High quality display y Relatively cheap y Capable of displaying text, numbers and graphics y y y y Quiet Exceptional quality display Relatively fast Capable of displaying text, numbers and graphics Disadvantages y Slow y Jets sometimes clogs y Ink cartridges expensive y Ink lasts shorts y Cannot produce carbon copies y More expensive to buy y Cannot produce carbon copies y Cartridges expensive but last long

Laser

Plotters for image display Plotters are specially designed to draw accurate drawings and graphs under the control of a computer program. Pen plotters range from small flatbed systems which hold A4 and A3 paper up to drum plotters which take large rolls of very wide paper and have multiple pens for plotting various layers in different colours. Electrostatic plotters use wires under which the paper is moved. The electrostatically charged wires touch the paper to create the drawing. They are faster than pen plotters but more expensive. soft copy devices Soft copy devices display data in electronic form. This can be data on a screen, either static or animated, or it can be sound in the form of music or speech. The range of soft copy devices includes screens and speakers. Screens They are basically divided into two groups: video display units (VDU s) and liquid crystal displays (LCDs). Each type of screen has a different quality of display called resolution. This is the number of individual dots of colour, known as pixels (picture elements), contained on a display. The pixel is the smallest display unit on the screen that can be controlled by a computer. v Resolution is typically expressed by identifying the number of pixels on the horizontal axis (rows) and the number on the vertical axis (columns) of the screen, such as 1280 x 1024. VDUs The cathode ray tube (CRT) is the hardware inside the VDU that handles the display on the screen. A colour computer handles three separate lines for the red, green and blue colour signals, and two lines for horizontal and vertical signals. There are three electron guns

(one each for red, green and blue). The guns then fire electron beams through the mesh. Each beam is directed at a pixel through holes in a mesh called the shadow mask. The strength of the beam determines the percentage of each colour that appears on the screen. Refreshing the screen is essential as the illuminated phosphor starts to fade once it has been lit. This allows screen displays to change very quickly. If the CRT monitor has a refresh rate of 72 Hz, then it cycles through all the pixels from top to bottom 72 times a second. Electronic display on a VDU will also depend upon the graphics card used. It interprets digital information and turn it into images. Video random access memory (VRAM) stores the digital data. Digital-to analogue converters (DAC) to convert it to analog data for the display. Liquid crystal displays LCD s are thinner and lighter. They require less energy. LCDs work with video cards that handle digital data. These result in a much clearer display because the conversion from digital to analog often reduces the quality of the output. There are three types of LCDs: common plane, passive matrix and active matrix. y y Common plane LCDs are the cheapest and are used on inexpensive items such as handheld games and small calculators. Passive matrix LCDs use a grid connected to integrated circuits that control the charge that lights a pixel at the intersection of the row and column on the screen: that is, at screen coordinates. The response time is relatively slow. They are slow to refresh the screen image. This is shown when the cursor, moved rapidly from one side to the other using the mouse, leaves a series of ghostly trails. Active matrix LCDs use thin film transistors (TITs) arranged in a matrix. The pixel can be charged more accurately and holds the charge longer than in a passive matrix LCD. The brightness level is also more easily controlled.

Touch screens A touch interface allows users to navigate a computer system by touching icons or links on the screen. Some of the displays created with a touch screen interface include: y public information systems y customer service where self-service of petrol y technology for the disabled and others Speakers and speech synthesis for audio Speakers (or headphones) are the hardware used to display sound. They work with the sound card to perform this task. Current sound cards usually plug into a peripheral component interconnect (PCI) slot on the motherboard. Typically, a sound card can do four things with sound: display pre-recorded music from CDs, DVDs or sound files such as MP3s collect sound from external sources (microphone or tape player) synthesise sound process existing sound To display a prerecorded .wav file, the sound card follows these steps: 1. The digital data is read from the hard disk and passed on to the CPU. 2. The CPU passes the data to the digital signal processor (DSP) on the sound card. 3. The DSP un compresses the digital data using a DAC chip. This creates the analog signal that can be heard through speakers or a headphone. Software for display SOFTWARE PROGRAMS CARRY THE INSTRUCTIONS TO CREATE THE HARD COPY OR SOFT COPY DISPLAY.
USER INTERFACES

The electronic display on the screen is referred to as the user interface as it is there that users interact with the hardware and software of the system. There are two main types of user interfaces: the graphical user interface and the command interface. Graphical user interface The GUI is the most common user interface found on personal computers. It consists of four main components: that is, it is a WIMP made up of windows, icons, mouse and pull-down menus. It is an intuitive and easily navigated interface for inexperienced users. A GUI toolbar from an application allows easy choice of options using the mouse to click on menu items. Command interface A command interface (also known as a command user interface or CUI) presents a display that is much less intuitive for the user. It requires the user to type commands to create an action. These commands are not visible to the user but must be learned or found from a manual. Display features in application packages Applications software which carries out tasks for the user has many features that can be used to enhance the display, present a display in different forms or make a display more meaningful for the user.

Formatting Most applications programs that allow the user to create documents and files have the ability to format data. Formatting means using methods to improve the appearance of the document in hard and soft copy. method Distorting Cropping description Changing the proportion or shape of a graphic Hiding part of a graphic so that only the desired section is visible Example

Rendering

Shading an object to create three-dimensional view or give the object depth

rotating resizing

Moving an object around by a set number of degrees Enlarging or reducing the size of a graphic. It is not advisable to enlarge a bitmap graphic as the quality of the graphic will be reduced by jaggies (the staircasing effect of pixels around the edges of the graphic).

Reporting Reporting can be used to display data from a file in a way that is more useful for a specified purpose. For example, a database can have data in many fields and many records, but only a few of these fields might be required and only some statistics may be required from those records. Example 1: A school database contains all the data related to every student: personal data, subjects, marks, achievements and other information. A query can be used to filter out the other data and a report created that lists only the names of each sport. The report can then be used to generate a count of students in each sport. Merging Merging is the process of combining one or more sets of data with another set of data. This can save considerable time and be used to personalise material. Merging can be done in two ways. In static merging, data is merged into another document as a final or fixed set of data. The document remains the same from this point onwards unless actively changed by the user. In dynamic merging, data is merged into another document using a dynamic link. Any updating of the source document results in the merged document being automatically updated. The general manager's report, for example, could have a dynamic link to the spreadsheet. Each weekly report would be automatically updated from the new sales figures. Tables Tables are an organised way of displaying text and graphics in rows and columns. They can be displayed using styles, borders or shading. Charts Charts are a pictorial display of data. They are often easier to interpret than the numerical data from which they are created.

Software tools to assist with display Most applications software has a range of tools to allow the user to customise a display. The page view / magnification tool allows the user to change the size of the display. This is often referred to as a zoom function. There are a wide range of options available in a spreadsheet to change the appearance of a display. They include showing the gridlines between rows and columns, changing the appearance of

the screen and showing formulas in cells instead of values.

NON COMPUTER TOOLS FOR DISPLAY STORYBOARDING

Storyboarding involves presenting data as a series of screen drawings or frames. They are often used in the early stages of web design to present an outline of the intended website. Major storyboard components included navigational links between frames and clear labels to show objects on each frame. Storyboards aid good design by enabling designers to achieve consistency and structure. Each frame should contain sufficient detail to indicate the general layout of text, fields, graphics and buttons included. There are two main types of storyboard layouts: linear and non-linear. Linear storyboards are sequential frames whereby the 'story' is presented one frame after the other. Non-linear storyboards allow the user to have more choice when the final product is produced. They can be hierarchical or web-based, or they may use a combination of approaches. Traditional methods for displaying different types of data Traditional methods for displaying data depend on the media being used. Pen-andpaper displays include signs and symbols, magazines, newspapers, billboards and flyers. Included in this group could also be the use of chalkboards, whiteboards, paintings and drawings. SOCIAL & ETHICAL I SSUES y Communication skills of those presenting the display y Past, present & emerging trends. E.g. Flat & high resolution y Appropriate displays for a wide range of audiences o Beeps and other cues can help those with visual impairment to use standard hardware and software - Standards for display for the visually impaired o Young children y Appropriateness and censorship- There still remains the problem of inappropriate displays. some material will be offensive to different people. Desktop publishing as a display tool Desktop publishing (DTP) allows users to create a complete publication on computer and prepare it ready for screen display or printing. A good desktop-publishing package is flexible in the way it allows combinations and manipulation of all the important elements of the publishing process - planning, designing, writing, editing, graphic creation, page layout and printing.

Desktop publishing verses word processing Many modern word processors have many of the features of a specialised desktop publishing program. They allow users to create tables, to organise text into columns, to realign graphics and to drag and drop data around a page. Word processors provide graphics tools that allow text boxes to be created as objects, and they have some of the functions of facing left and right pages and master pages with the use of headers and footers. Word-processor pages can be viewed in different size modes and objects such as charts and media clips can be imported. However, word processors lack the flexibility of a specialised program, and elements are not so easily moved and positioned on a page. A desktop-publishing program treats data as objects: text boxes, graphics boxes and banner headings can be created, and data typed in or imported and then the objects can be moved around to layout the page. Page layout can be changed quickly, just by repositioning the elements. Multi page documents can be handled more easily and they allow pages to be easily deleted, moved to other locations or added. Like word processors and so many other applications, desktop-publishing programs offer a wide range of templates or predesigned documents that can be modified by the user to suit their specific purpose. Steps to publishing an document 1. Define the purpose- see if it is for advertising, reports or information 2. Identify the audience- determine if its for little kids or professionals or workers 3. Develop the content- enter data manually by keyboard or by scanner. 4. Decide on the look of the publication- determine elements such as paper size, margins, page orientation, headlines, etc 5. Design the pages- consider things like page layout, orientation, structure, master, page components and design elements

6. 7. 8.

a. Page layout is the arrangement of elements on a page. b. Page orientation refers to the way in which the page will be used. c. Master page elements are usually designed first d. Design elements are other elements of the design like banners and cut outs Design the elements- design the elements but KIS (keep it simple), KIC (keep it consistent) and KIB (keep it balanced) View the publication- view the publication depending on the purpose. Magnification of 100% is useful for editing. Magnification of 25% is useful for an overview of the page elements. Print the publication- print it out. The closer the dots in the final publication, the higher the quality of the printing.

D EVELOPING I NFORMATION SYSTEMS SYSTEM DEVELOPMENT LIFECYCLE (SDLC


OR SDC)

Understanding the problem

Testing, evaluating & maintaining

Planning

Implementing

Designing

Stage Understanding the Problem Planning Designing Implementing Testing, Evaluating & Maintaining

Deliverables Requirements report Feasibility study & details of selected solution System models & specifications new systems Final system & user documentation. Operational system New needs & ideas

U NDERSTAND THE P ROBLEM TO BE SOLVED Determine the purpose & requirements of a new system. y y Understanding the purpose (why is it being created) Identify problems with existing systems by: o Interview/surveying users of the information system & participants o Analysing the existing system by determining  How it works  What it does  Who uses it Prepare a user requirements report

PROJECT PLANS Aim is to document & communicate the following: y y y y y What each task is Who completes each task When each task is to be completed How much time is available How much money

Project plans incorporate project management tools including: y y y y y Gantt charts Scheduling of tasks Journals & diaries Funding management plan Communication management plan

J OUR NALS & D IARIES These are methods of recording the day to day progress & completing of tasks. They provide a record of each stakeholders work & a system for verifying that tasks are being completed according to schedule. G ANTT C HAR T A Gantt chart is a horizontal bar chart used to show the time frame for the scheduling of tasks in a project. It depicts the list of tasks, proposed timing of tasks & the proposed sequence of tasks.

DETERMINING NEEDS AND UNDERSTANDING THE EXISTING SYSTEM So what type of activities are commonly performed to determine needs and also to understand the existing system? For larger systems (or where a team of developers is involved) more structured activities are required. Some common activities include: y Interviewing users including management and participants- Interviews are performed either in person or over the phone. Interviews can be formal with prepared questions designed to obtain specific information. y Surveying users including participant- Surveys are paper or electronic questionnaires. Surveys are often distributed to a large number of people and the results are summarised using a spreadsheet y Performing task analysis activities- Task analysis involves observing and questioning participants whilst they work. It also provides the analyst with first hand knowledge about the precise data/information, participant roles, technology and information processes operating within the system

P LANNING Identify possible solutions & then make a decision on which option should be designed or implemented. FEASIBILITY STUDY A feasibility study is normally conducted to examine each possible solution in terms of 4 feasibility criteria: y T ECHNICAL F EASIBILITY - T HE AVAILABILI TY O F THE TEC HNOLOGY . H OW WI DELY USED IT IS . W HETHER WE
TECHNOLOG Y PO SSESS THE NECESSAR Y

E CONOMIC F EASIBILITY - D ETERM INED BY PERFORMING A C OST BENEFI T A NALYSI S . T HIS COMPARES ALL THE COSTS INVOLV ED IN THE & IMPLEMENTATI ON OF EACH SOLUTION OPTION , WITH ALL THE B ENEFITS TO DETERM INE THE TOTAL RETURN ON THE MONEY INVESTED IN THE NEW SYSTEM .
DEVELOPMENT

y y

S CHEDULE F EASIBILITY - W HETHER THE SOLUTION CAN BE COMPLETED WITHIN THE TIME FRAME . O PERATI ONAL F EASIBILITY - W HETHER EAC H SOLUTION OPTI ON WI LL FIT IN WITH THE WAY THE ORGANISATION OPERATES . C ONSIDER S MANAGEMENT , STAFF , NATUR E OF WORK & TRAI NI NG & SU PPOR T

UPDATE REQUIREMENTS REPORT TO REFLECT THE CHOSEN SOLUTION Once a particular solution has been selected additions to the Requirements Report can be made to include more specific detail. Areas particular to the chosen solution will likely include: y Detailing the participants who will use the new system, including their roles, current skills, and any new skills that will be required Information technology should be specified This includes existing hardware and software that will be used and also and new items. Examples or detailed specifications of the data required and the information the system will create. If data is sourced from another existing system then samples can be obtained for use during the design and testing stages An outline of the information processes that will form the solution, perhaps as a high level dataflow diagram

DETERMINE HOW THE PROJECT WILL BE MANAGED General areas that require consideration when planning how a project will be managed include scheduling, funding and communication. Scheduling of development tasks, including techniques for monitoring the completion of tasks. Gantt charts, journals and diaries are common tools for planning and monitoring the progress of development tasks. How funds will be allocated to tasks, including mechanisms to ensure funds are spent wisely. Commonly a funding management plan is created. This plan details how funds are allocated to tasks, mechanisms to ensure money is spent wisely, who is accountable for each task's budget and procedures for reallocating funds during development. Lines of communication are required between development personnel and with the client, users and other stakeholders. Typically a communication plan is produced. The plan will specify the communication mediums to be used (e.g. email, telephone, project journal, etc).

D ESIGNING This is where the actual solution is designed & built. This includes identifying the Participants, Data/Information to be used, Information Technology (Hardware & Software) & how the information processes will operate. y y y Identify ways to ensure the participants concerns are addressed & the system design is human-centred Clarify with users the benefits of the new information system Design the information technology so that it is easy to maintain in the future

MODELLING INFORMATION PROCESSES AND DATA/INFORMATION The vital link between all the system's resources is the information processes. Describing the detail of such processes is critical to all aspects of the design - including hardware purchases. Detailed models of the solution should be produced. Context diagrams Context diagrams represent the entire new system as a single process. They do not attempt to identify the information processes within the system, rather they identify the data entering and the information leaving the system together with its source and its destination (sink). Context diagrams indicate where the new system interfaces with its environment. They define the data and information that passes through the boundary and in which direction it travels. Dataflow diagrams (DFDs) The DFDs specify the data entering each information process and the processed data or information leaving each information process. A series of progressively more detailed dataflow diagrams are created to refine the system into its component sub-processes. Data Dictionaries Data dictionaries are used to detail each of the data items used by the system. They are tables where each row describes a particular data item and each column describes an attribute or detail of the data item. Clearly the name or identifier given to the data item must be included, together with a variety of other details such as its data type, storage size, description and so on.

I MPLEMENTING This is where the system is installed & commences operation. To implement a new solution the following 4 methods of implementation are considered: y y y y Parallel conversion Direct conversion Phased conversion Pilot conversion

However, all these conversion methods require a similar set of tasks to be completed prior to the system commencing operation. These steps include: 1. Installing network cabling and outside communication lines. 2. Purchasing and installing new hardware and software. 3. Configuring the new hardware. 4. Installing, customising and configuring the software. 5. Converting data from the old system to the new. 6. Training the users and participants. Conversion Method Parallel Features The old system is left functioning while the new system is installed. Both systems operate simultaneously for a short time until the new system is confirmed to be working satisfactorily. Advantages y Staff can learn the new system while still operating the old one Less likely to lose data Problems with the new system can be solved before removal of old system Disadvantages y y y y Expensive Time consuming Takes up double the space Staff need to operate on 2 systems

y y

Direct

The old system is completely removed & the new system begins operation immediately.

y y y

Cheapest unless a major error occurs Least time consuming Staff need to deal with one system only

y y y

Staff have little time to learn the system More likely to lose data Problems with the new system can t be solved before the old system has been removed

Phased

The new system is installed & begins operation in one section of the company at a time until the entire system is installed.

y Pilot The new system is installed in one section of the company only & if it is suitable then the rest of the system will be installed y

Staff can learn the new system while still operating the old one Any problems with new system can be solved before removal of the old system Staff have time to re-enter data Decisions can be made to better meet staff needs over time Any problems with new system can be solved before the old system is removed

Staff may become confused working across 2 parts of the company Indecision may make staff uneasy

Indecision may make staff uneasy

When a new system is installed it is important that the staff are trained in using the new system. This could include: y y y y y Peer Training- One or more users undergo intensive training in regard to the operation and skills needed by the new system. The trained users are then used to train their peers. It is a one to one process. Online Training such as tutorials and help systems- Online tutorials and help systems allow users to learn new skills at their own pace and as they are needed. Such systems include sample files and databases Group Training- The trainer can be a member of the system development or an outsourced specialist trainer. User Manuals- Printed manuals contain similar information, however they provide the flexibility to be read away from the computer Training Specialists

TESTING , M AINTAINING & E VALUATING THE SYSTEM Once the new system has been successfully installed, it is important that the analyst & the company management evaluate the efficiency of the new system & if it meets the needs that were specified in the earlier stages of the SDC. Tasks involved in this stage include: y y y Acceptance testing Ongoing evaluation to monitor performance & to review the effect on Users & Participants Maintaining the system to ensures it continues to meet requirements

ACCEPTANCE TESTING TO ENSURE THE SYSTEM MEETS REQUIREMENTS These are formal tests conducted to verify whether or not a system meets its requirements. Acceptance testing enables the client to determine whether or not to accept the new system. Although using outside testers is preferable, it is not unusual for the client to perform their own acceptance tests prior to finally accepting and signing off the new system. ONGOING EVALUATION TO MONITOR PERFORMANCE Performance can be monitored from a technical viewpoint - is the system continuing to achieve its requirements? Or the system's performance can be monitored from a financial viewpoint - is the system resulting in improved profits? Technical performance monitoring Technical performance monitoring aims to evaluate the continuing achievement of the systems evolving requirements. Ongoing evaluation of technical performance aims to verify that requirements continue to be met and identify any changes that may require modifications to the system. Financial performance monitoring Financial performance monitoring is largely about evaluating the accuracy of the real economic situation against the economic predictions made in the feasibility study. The aim being to evaluate the extent to which the new system is achieving its economic goals. ONGOING EVALUATION TO REVIEW THE EFFECT ON USERS AND PARTICIPANTS All people need to feel a sense of accomplishment. There should be a well-defined purpose to every task they perform. Also, each task should have a distinct start and end point. For example, it is most demoralising to work within a system where a single task is continuous, extra work is always present and no end is ever in sight. Deskilling can occur when the information system performs processes that were once performed by participants. Loss of social contact is becoming a common issue. Efficient communication systems allow more and more people to work from home. Loss of social contact can also occur when an information system requires participants, particularly those involved in data entry, to spend long periods of time at a computer. MAINTAINING THE SYSTEM TO ENSURE IT CONTINUES TO MEET REQUIREMENTS Therefore maintaining an information system involves: 1. regular maintenance, and 2. repairs when faults occur. Typical tasks maintenance tasks include: y maintaining a hardware and software inventory y perform backups y protect against viruses using antivirus programs y make sure illegal software isn t used y monitor the use of devices

C OMPLEXITY OF SYSTEMS SYSTEMS FOR I NDIVIDUALS y Include small information systems for individuals & small businesses y Utilised by an individual SYSTEMS FOR O RGANISATIONS y Developed for a whole system approach y Designed for large scale use by multiple users at one tie SYSTEMS DEVELOPED BY I NDIVIDUALS y Usually meet a specialised market y Generally involve the creation of a solution to resolve a problem faced by an individual or small organisation y When a problem arises, this usually inspires the development of a solution SYSTEMS DEVELOPED BY T EAMS y In the workplace within a large organisation y Teams could be employed to collaboratively develop a system to meet a need or want but on a large scale

P EOPLE I NVOLVED IN SYSTEMS D EVELOPMENT PROJECT MANAGER y Has responsibility of planning, executing & closing of any project y Person accountable for accomplishing the stated project objectives y Creating clear & attainable project objectives y Building project requirements y Managing cost, time & scope SYSTEM ANALYST y Designs & manages the development of information systems TECHNICAL CO -ORDINATOR y Responsible in designing the system architecture y Controls the technical quality in the project TEAM LEADER y Leads the team y Ensures the team works effectively as a whole TESTER y y Checks correctness in a technical sense Tester will have to give some comments & documentation

D EVELOPER y Interpret system requirements & model it y Developing the deliverable codes y Building prototypes SOFTWARE DEVELOPERS y Concerned with facets of the software development process wider than design & coding y Contribute to the overview of the project on the application level rather than component level or individual programming tasks TECHNICAL S UPPORT y Range of services providing assistance with technology products y Attempt to help the user solve specific problems with a product TECHNICAL W RITER y Designs, creates, maintains & updates technical documentation y Editing & formatting other professionals documents

BUSINESS A NALYST y Analysing the business needs of their clients & stakeholders to help identify business problems & propose solutions y Performs a liaison function between the business side of an enterprise & the providers of services to the enterprise SYSTEM I NTEGRATOR y Specialises in bringing together component subsystems into a whole & ensuring those subsystems function together y Integrate multiple systems for inputting, processing, interpreting, storing & categorizing data

STRENGTHS & W EAKNESSES OF I NDIVIDUAL TEAM MEMBERS y y y y Communication Interpersonal Technical Organisational

SOCIAL & E THICAL ISSUES MACHINE C ENTRED SYSTEMS y Simplify what computers do at the expense of participants y Control behaviour of users & participants y Force people to follow procedures y If an error occurs they are usually blamed on the participant (operator error) H UMAN C ENTRED SYSTEMS y Make participants work as effective & satisfying as possible y Unobtrusive y Respond instinctively to the needs of users & participants y Deliver the information people want y Improve effectiveness of participants work & increase job satisfaction The impact of information systems on a person s work can be positive or negative. The introduction of information systems has improved the skills of people in a number of jobs. When people learn new skills or retrain, it is called multi-skilling. Information systems can have the opposite effect on some jobs resulting in a job requiring fewer skills. This is called deskilling.

OTHER The difference between primary & secondary storage: Primary storage consists of RAM & ROM on the motherboard. Primary storage is much faster than secondary storage & is used by the CPU during processing. Secondary storage is used to maintain data (& software) while the computer is off or whilst it is not being used by the CPU. The difference between random & sequential access: Sequential access requires that every record in the file must be accessed in turn from the first until the desired record is reached. This applies to both reading & writing the data elements. Random access allows individual data items to be located without the need to look at every record or data element before it. How a modem works: The modem modulates or changes digital data understood by the computer into analogue form for travelling along phone lines & then demodulates it back into digital form for the receiving computer to read. If you wanted to send information over the internet the method you would use is encryption. Ergonomics is the study of the way in which people interact with their work environment in terms of efficiency & comfort. Volatile data is temporary data & is lost if the computer is switched off before it is saved to secondary storage. E.g. RAM. Non-volatile data is not lost if the computer is switched off. E.g. Secondary storage & ROM. Requirements for processing large video files: Large amounts of RAM are needed to hold as many of the frames (in the video) as possible so that access to the relatively slow hard disk is minimised. Requires a fast processor to ensure response times are fast enough. Large hard disk or multiple hard disks are required to store the video data. Hypermedia is where specially formatted links in a document are provided to a variety of media elements, including text, images, sound or video clips Main processes to produce hard copy newspapers: y y y y y y Ability to import text data Ability to import images Ability to format data into columns & add images with borders Ability to include & format headlines appropriately Ability to change size, face & other details of the fonts used Ability to print multiple versions

If letters are represented as text, they are stored as their equivalent ASCII values. This allows different strings of text to be stored, formatted or spell checked. Why people prefer hard copy over soft copy: y y y y y Prefer to feel paper in the ands & turn pages Clip out articles or ads Not as comfortable to read from a laptop or PDA or as ergonomically relevant as reading it in your hands Not everyone has the technology needed Not everyone has the technical skills required

You might also like