Introduction To: Computer Science
Introduction To: Computer Science
Lecture
[Early Release]
Notes
Introduction to
Introduction to
91
Information Systems
Computer Science
06
10
40
51
50
30
Prof.Prof.
Manal Abdel-Kader
Manal Abdel-Fattah
A. Abdel-Fattah Youssif
Faculty of Computers and Artificial Intelligence - Helwan University
Faculty of Computers and Artificial Intelligence
2023
Helwan University
Introduction to
91
Information Systems
06
1St Edition [Early Release]
By: Prof. Manal Abdel-Kader Abdel-Fattah
10
40
Information Systems Department,
51
Faculty of Computer and Artificial Intelligence
50
Helwan University
30
September 2023
- I -
Table of Contents
Page No.
1 Introduction to Information Systems 1
1.1 Introduction 2
1.2 Why Should We Study Information Systems? 3
91
1.2.1 Exploring Career Opportunities in 5
Information Technology
1.3 Essential Concepts 6
06
1.3.1 Data, Information, and Knowledge 7
1.3.2 The Value of Information 8
1.3.3 Characteristics of Quality Information 9
10
1.3.4 The importance of Information systems in 10
business.
1.4 The Components of Information Systems 13
40
1.4.1 Information System Resources 18
1.4.2 Information System Activities 23
2 Computer Hardware 26
51
2.1 Introduction 27
2.2 Hardware Components 28
2.3 Processing and Memory Devices: Power, 30
50
2.3.3 Multiprocessing 32
2.4 Moore’s Law 34
2.5 Secondary Storage, Input and Output Devices 37
2.5.1 Secondary Storage Devices 38
2.5.2 Input Devices 43
2.5.3 Output Devices 48
3 Computer Software 51
3.1 Application Software: End-User Applications 52
3.2 System Software: Computer System 70
Management
3.3.1 Operating Systems 71
3.3.2 Programming Languages 76
3.3.3 Web Languages and Services 81
3.3.4 Programming Software 85
4 Data Management 87
4.1 Introduction 88
Table of Contents
- II -
91
4.5.2 Characteristics of Big Data 105
4.5.3 Big Data sources 107
4.6 Database Management Systems 109
06
4.6.1 Creating and Modifying the Database 112
4.6.2 Storing and Retrieving Data 115
4.6.3 Manipulating Data and Generating Reports 116
10
4.6.4 Popular Database Management Systems 120
4.7 Database Applications 121
4.7.1 Linking the Company Database to the 122
40
Internet
4.7.2 Data Warehouses, Data Marts, and Data 123
Mining
51
Table of Contents
- 1-
Chapter 1
91
Introduction to
06
Information Systems
10
40
51
50
30
1.1 Introduction
The question regarding the necessity of studying information systems and
information technology has evolved into a moot point. The use of information
91
systems has become as vital to daily business operations as accounting, finance,
operations management, marketing, and human resource management. In fact,
06
information systems and technologies are now essential components for the
success of businesses and organizations, some even argue that they are
fundamental prerequisites.
10
40
Consequently, they form an essential area of study within the realm of business
administration and management, which is why most business majors
51
91
conceivable entity can be considered a system, and a single system can either
comprise other systems or exist within a larger system. We will delve further
06
into this notion in the upcoming section. For the time being, this definition
serves as a sturdy foundation for comprehending the central theme of this
10
textbook: information systems.
40
1.2 Why Should We Study Information Systems?
You belong to the most interconnected generation in history. Growing up in the
51
digital age, you are constantly connected and have an unparalleled familiarity
with information technologies. The MIT Technology Review even coined the
50
just two decades ago would find your routines almost unrecognizable.
91
DVDs, curating your personal electronic newspaper using RSS feeds, texting
and tweeting to stay connected with friends and family throughout the day, and
06
engaging in numerous other activities.
10
Now, why should you invest time in learning about information systems and
information technologies? After all, you can efficiently use computers and
40
electronic devices for various tasks, have been exploring the web for years, and
feel confident in your ability to handle any IT application your organization's
51
1. Informed users typically derive more value from the technologies they
employ. Understanding what lies behind the applications you use
enhances your experience.
2. You can contribute to improving the quality of your organization's IT
applications with your insights.
3. Even as a recent graduate, you can have a say in recommending and
possibly selecting the IT applications your organization adopts.
4. Staying informed makes you aware of new information technologies and
rapid advancements in existing ones. This knowledge allows you to
anticipate the impacts of these technologies on your organization and
provide recommendations on their adoption and utilization.
91
Furthermore, the management of the IS function within an organization is no
longer solely the responsibility of the IS department. Users now play pivotal
06
roles at every stage of this process. The overarching objective of this text is to
furnish you with the essential knowledge required to immediately contribute to
10
managing the IS function within your organization. In short, the aim is to
transform you into an exceptionally informed user!
40
1.2.1 Exploring Career Opportunities in Information Technology
The field of information technology (IT) presents a wide array of career
51
prospects due to its integral role in the modern business landscape. There is a
substantial demand for conventional IT professionals, including programmers,
50
units, such as marketing and finance. This means that, regardless of your
academic background, you possess the potential to become the CIO of your
organization someday. This serves as yet another incentive to become a well-
informed user of information systems!". Table 1.1 provides a list of IT jobs,
along with a description of each one.
91
Table 1.1: Information Technology Jobs
06
10
40
51
50
30
knowledge differs from both data and information. Let's delve into these
concepts:
91
number, the total weekly hours worked, an inventory part's serial number, or the
number of units manufactured on a production line. Table 1.2 illustrates various
06
types of data that can encompass these facts. On the other hand, information
represents an assemblage of data that has been systematically organized and
10
processed, thereby imbuing it with added value beyond the individual data
points. For instance, a sales manager might require a summary of individual
40
sales data to determine the total monthly sales. Offering information to
customers can also boost a company's revenues and profits. For example, the
51
To further elucidate the distinction between data and information, envision data
as the separate items on a grocery list—items like crackers, bread, soup, cereal,
coffee, dishwashing soap, and so forth. However, this grocery list becomes
significantly more valuable when its items are systematically arranged by the
aisle in which they are found in the store, such as bread and cereal in aisle 1,
crackers and soup in aisle 2, and so on. Similarly, data and information share
91
items on the grocery list to ensure that the shopper selects the correct item—
whole wheat bread and Kathi cereal in aisle 1, saltine crackers and chicken
06
noodle soup in aisle 2, and so forth. This process enhances the utility of the
grocery list.
10
The conversion of data into information constitutes a process, a sequence of
logically connected tasks designed to achieve a predefined outcome. To produce
40
meaningful information by establishing relationships among data, one needs
knowledge. Knowledge refers to deep awareness and comprehension of a
51
particular set of information and the ways in which that information can be
utilized to support a specific task or make informed decisions. In essence,
50
information can be seen as data rendered more valuable through the application
of knowledge. For example, many brands and varieties of most items on a
30
typical grocery list exist. To shop effectively, the grocery shopper must possess
an understanding of the preferences and requirements of those being shopped
for, enabling them to select one can of Campbell's (not the store brand!) low-
sodium chicken noodle soup for the diabetic family member, along with two
cans of Campbell's regular chicken noodle soup for everyone else. In certain
instances, individuals mentally or manually organize and process data, while in
others, they rely on computer systems.
91
This can lead to companies squandering over $100 for each inaccurate customer
contact record due to marketing materials being sent to incorrect addresses and
06
the inability to effectively track leads. To illustrate, an organization with
100,000 customers and a 22 percent error rate can anticipate a loss of $2.2
10
million.
40
1.3.3 Characteristics of Quality Information
The quality of a decision is fundamentally dependent on the quality of the
information utilized to arrive at that decision. Any organization that emphasizes
51
decisions. Table 1.3 enumerates the factors that determine information quality.
The significance of each of these attributes varies according to the context and
30
the type of decision being made. For example, in the case of market intelligence
data, a degree of inaccuracy and incompleteness may be acceptable, but
timeliness is paramount. Market intelligence data might provide a heads-up that
a competitor is planning a significant price reduction. While the exact details
and timing of the price reduction may be less critical, being forewarned early
enough to strategize a response is crucial. Conversely, precision and
completeness are indispensable for data employed in financial accounting and
asset management, such as cash, inventory, and equipment.
91
06
10
40
51
91
06
Figure 1.1: Doctors use information systems to enhance patient care
10
In libraries, card catalogs are structured to organize data about books,
making it easy for readers to find a specific book by searching for its title,
40
author, subject, or other criteria.
Your backpack, daily planner, notebooks, and file folders work together
51
91
¥ Before computer-based accounting systems, businesses used paper-based
accounting ledgers as an information system. This system was used for
06
centuries to record daily transactions and keep track of balances in
different business and customer accounts.
10
Figure 1.3 provides a valuable conceptual framework that structures the
40
information presented in this text and delineates the areas of knowledge required
for a comprehensive understanding of information systems. It underscores the
51
Figure 1.3: A framework that outlines the major areas of information systems knowledge
needed by business professionals
91
data management, and internet-based technologies. It involves key
concepts, advancements, and management considerations.
06
¥ Business applications focus on the primary use of information systems
in business operations, management, and competitive positioning.
10
¥ Development processes involve planning, creating, and implementing
information systems to capitalize on business opportunities.
40
¥ This domain deals with the challenges of managing information
technology effectively and ethically at various levels within an
51
91
services, and management information reach their intended recipients.
06
Let’s take a look at a manufacturing system as an example. It takes raw materials
and turns them into finished goods. An information system, on the other hand,
10
works differently. It takes in data as input and transforms it into useful
information as output. Meanwhile, a business organization represents a system
40
wherein human and economic resources undergo transformation through
various business processes, resulting in the production of goods and services.
51
The system concept gains enhanced utility when it incorporates two additional
50
91
In Figure 1.4, a business organization is employed as an illustrative example to
depict the fundamental elements of a system, alongside various other
06
characteristics of systems. It's crucial to recognize that systems do not operate
in isolation but instead function within an environment that encompasses other
10
systems. When a system serves as a constituent part of a larger system, it
assumes the role of a subsystem, with the larger system representing its
40
environment.
51
50
30
Multiple systems can coexist within the same environment, and some of these
systems may be interconnected via shared boundaries, often referred to as
interfaces. Figure 1.4 also introduces the notion of an open system, one that
engages in interactions with other systems in its environment. In the diagram,
this system engages in the exchange of inputs and outputs with its surroundings,
establishing connections through input and output interfaces. Consequently, we
can describe it as linked to its environment through these interfaces.
91
Many organizations have multiple subsystems, including departments,
06
divisions, process teams, and other workgroups. These organizations act as open
systems as they interact and interface with other systems in their environment.
10
They also show adaptability by being able to modify themselves to meet the
changing demands of their surroundings.
40
When we employ our comprehension of general system principles in the context
51
Numerous information systems are created to adjust and develop based on their
environment. They achieve this adaptability by utilizing intelligent software
agents, expert systems, and highly specialized decision support systems.
Essentially, information systems follow the principles of systems theory, much
like any other system. Nevertheless, their importance within modern
91
organizations surpasses that of any other system ever created.
06
We have already defined that an information system is a structure that takes in
data resources as input and generates information products as output. The
10
question now is how this process is carried out and what components and
activities are involved. Figure 1.5 illustrates a model of an information system
40
that provides a basic conceptual framework., outlining the primary components
and activities within information systems
51
50
30
91
the transformation of data resources into information products.
06
This information system model accentuates the interconnections among the
components and activities of information systems. Furthermore, it furnishes a
10
framework that underscores four key concepts that are universally applicable
across all types of information systems:
40
1. People, hardware, software, data, and networks constitute the five
foundational resources of information systems.
51
91
it produces are known as end users. They can be customers, sales
representatives, engineers, clerks, accountants, or managers and can exist
06
at all levels of an organization. In reality, the majority of us are
information system end users. In the business context, most end users are
10
knowledge workers, individuals who primarily engage in
communication, collaboration within teams, and the creation, utilization,
40
and distribution of information.
¥ Individuals who work in the field of Information Systems (IS specialists)
51
are divided into three main categories. Firstly, Systems Analysts design
information systems by considering the requirements of end users.
50
are responsible for managing and monitoring large computer systems and
networks.
91
instructions. This generic software concept encompasses not only sets of
operational instructions known as programs that direct and govern computer
06
hardware but also sets of information processing instructions referred to as
procedures, which are essential for individuals.
10
It's critical to recognize that even information systems not utilizing computers
40
possess a software resource component. This assertion holds true even for
historical information systems or manual and machine-supported systems still
51
The role of data has evolved beyond being just raw material for information
systems. Managers and information systems professionals now recognize that
data are valuable assets for organizations. Therefore, data should be managed
efficiently like any other organizational resource to benefit all stakeholders. This
perspective has brought about changes in contemporary organizations.
91
Previously, data were recorded during routine transactions, but now, they are
stored, processed, and analyzed using advanced software applications that
06
reveal intricate relationships between sales, customers, competitors, and
markets. In today's interconnected world, customer data is guarded with the
10
same level of diligence as cash in a bank vault. Data is vital to modern
organizations, and their efficient and effective management is an integral part
40
of organizational strategy.
51
The data includes video images, as well as audio data which covers human
voices and other sounds. Databases hold organized data while knowledge bases
50
Let's distinguish between 'Data' and 'Information.' The term 'data' is the plural
form of 'datum,' although 'data' is commonly used to represent both singular and
plural forms. Data consists of raw facts or observations, typically pertaining to
physical phenomena or business transactions. For instance, a spacecraft launch
or the sale of an automobile generates substantial data describing these events.
91
to describe the characteristics of the desired car, its financing details, or even
the intricate specifics of a basic airline reservation.
06
People often use the terms 'data' and 'information' interchangeably. However,
10
it's more accurate to perceive data as raw material resources that undergo
processing to become finished information products. Information, then, is data
40
that has been transformed into a meaningful and useful context for specific end-
users. Consequently, data typically undergoes a value-added process, which
51
Sales forms contain data on sales transactions, including names, quantities, and
dollar amounts. However, this information does not become useful until it is
organized and analyzed in a meaningful way. With proper organization, sales
managers can access valuable sales information that specifies sales amounts by
product type, sales territory, or salesperson. Telecommunication technologies
91
and networks, such as the Internet, intranets, and extranets, are essential for
successful e-business and e-commerce operations. These networks are made up
06
of interconnected computers, communication processors, and other devices,
facilitated by communication media and controlled through communication
10
software.
40
The concept of network resources underscores that communication technologies
and networks are essential resource components of all information systems.
51
The process of input activity involves capturing and preparing data related to
business transactions and other events for further processing. The task includes
91
data entry, recording, and editing. End-users usually input data directly into a
computer system or record transaction data on physical mediums like paper
06
forms. The data entry process involves several editing procedures to ensure data
accuracy. Once entered, the data may be transferred to a machine-readable
10
medium, like a magnetic disk, until it is required for processing.
40
When recording sales transactions, information can be collected on paper order
forms which serve as the original transaction record. Alternatively, sales
51
efficient user interface, including tools for input and output within a computer
system. Techniques like optical scanning and the presentation of menus,
30
to give sales managers insights into different product categories, and (6) update
sales records.
91
products are delivered through different means, such as video displays, audio
responses, paper-based formats, and multimedia. The information contained in
06
these products is essential for individuals and organizations to carry out their
daily activities. For example, a sales manager may use a video display to monitor
10
a salesperson's performance, listen to a computer-generated voice message via
telephone, and receive a printed report of monthly sales results.
40
Storage is a crucial aspect of information systems, as data must be
systematically retained for future use. Just as written text is organized into
51
More information about these elements and databases can be found in Chapter
4.
30
Chapter 2
91
Computer Hardware
06
10
40
51
50
30
2.1 Introduction
To construct a system that is both effective and efficient, it is crucial to carefully
select and arrange its components, all while considering the trade-offs between
91
overall system performance, cost, control, and complexity. For instance, when
constructing an automobile, manufacturers strive to align the vehicle's intended
06
use with the choice of its components. In the case of racing cars, specialized
engines, transmissions, and tires are necessary. The selection of a transmission
10
for a racing car necessitates a delicate balance between delivering engine power
to the wheels efficiently and effectively, considering the cost, ensuring control
40
and reliability, and evaluating its level of complexity.
51
need to perform. Given that business needs and their relative importance vary
across different companies, the information system (IS) solutions they opt for
30
can differ significantly. Those responsible for selecting the computer hardware
for their organization must possess a clear understanding of both current and
future business requirements to make well-informed acquisition decisions.
91
site, ensuring seamless operation in the event of Stratus failure.
2. The North Carolina State Employees’ Credit Union, one of the country's
06
largest credit unions with 1.5 million members and 223 branch offices,
continually seeks ways to reduce ongoing costs and enhance customer
10
services. In pursuit of this goal, the credit union made a substantial
investment in computer hardware, replacing over 3,000 personal
40
computers with newer, cost-effective, and more flexible systems.
3. The Seaport Hotel, a 426-room, four-diamond-rated establishment
51
unlimited Internet and email access, and make complimentary local and
long-distance calls over the Internet.
logical comparisons, and the control unit that accesses program instructions,
interprets them, and regulates the flow of data to and from the ALU, primary
storage, secondary storage, and output devices. The primary memory that stores
both program instructions and data is closely linked to the CPU as depicted in
Figures 2.1 & 2.2.
91
06
10
40
51
50
91
2.3 Processing and Memory Devices: Power, Speed, and Capacity
The processing components, consisting of the CPU and memory, are co-located
06
within a single enclosure known as the system unit. All peripheral devices, such
as the monitor and keyboard, are interconnected directly or indirectly with the
10
system unit. As previously discussed, the primary consideration when selecting
processing and memory devices should be the attainment of IS objectives and
40
organizational goals. In this section, we will delve into the attributes of these
crucial components.
51
various metrics to assess processing speed. These metrics encompass the time
required to complete a machine cycle, clock speed, and others.
30
Clock Speed: CPUs generate electronic pulses at a set frequency, called clock
speed, which affects how long it takes to complete a machine cycle. The control
unit follows these pulses and executes instructions accordingly. Each instruction
takes at least as long as the time between pulses. Higher clock speeds mean
shorter intervals between pulses, allowing for faster instruction execution. Most
personal computers have clock speeds in the gigahertz range, which means
billions of cycles per second.
91
offering the CPU a workspace for program instructions and data. The defining
attribute of memory is its rapid provision of data and instructions to the CPU.
06
Storage Capacity: Memory devices, much like CPUs, contain thousands of
circuits on a silicon chip. These circuits can either conduct electrical current (on)
10
or not (off). To store data in memory, a combination of these on/off circuit states
is used, typically utilizing 8 bits to represent a character, such as 'A'. Eight bits
40
together form a byte (B), with storage capacity usually measured in bytes. This
means that 1 byte equates to one character of data. For perspective, the Library
51
of Congress, which houses over 126 million items and 530 miles of bookshelves,
would require about 20 petabytes of digital storage. Table 2.1 lists units for
50
computer's main circuit board or on peripheral cards plugged into the main
board. RAM chips consist of millions of switches sensitive to changes in electric
current. In contrast, read-only memory (ROM) is typically nonvolatile, with its
circuit states fixed, ensuring data retention even when power is removed. ROM
serves as permanent storage for unchanging data and instructions, such as those
91
guiding the computer's startup.
06
2.3.3 Multiprocessing
Multiple forms of multiprocessing involve the simultaneous execution of two or
10
more instructions.
Both Intel and AMD have progressed beyond dual processors by introducing
quad-core chips. For example, the Intel Core i7 combines four processors on a
single chip, allowing them to share a common L3 cache. AMD offers its quad-
core Phenom II X4 Black Edition CPU, operating at 3.4 GHz. While AMD's
clock speed surpasses that of the Intel Core i7, direct clock speed comparison
between CPUs with different architectures holds limited significance. Effective
CPU performance necessitates seamless coordination with main memory and
other system components. The Intel Core i7 excels over the AMD Phenom
processor, as demonstrated by various computing benchmarks. IBM's Power7
chip features eight processing cores, each capable of handling four tasks or
91
Common applications of parallel computing include modeling, simulation, and
data analysis. In medicine, it expedites ultrasound scans and enhances diagnostic
06
accuracy. Engineers employ parallel computing to simulate product behavior,
expediting design iterations. For clothing designers, it facilitates virtual
10
modeling, reducing seasonal collection development time from six months to
just over a month.
40
Grid Computing: Grid computing harnesses a collection of computers owned
by individuals or organizations to collaboratively address a common problem.
51
parallel processing tasks. A central server, acting as the grid leader and traffic
overseer, plays a pivotal role. This server divides the computing task into
30
subtasks and assigns them to computers on the grid with surplus processing
power. It monitors progress and reallocates tasks if necessary. Once all subtasks
are completed, the central server consolidates results and advances to the next
task until the entire job is finished.
IBM initiated the World Community Grid project in 2004, leveraging the
combined computing power of personal and business computers in a large-scale
public computing grid. Researchers at the University of Texas Medical Branch
utilized over a million devices on the grid to test drug candidates for new and
drug-resistant flu strains, like H1N1. The project accelerated drug discovery,
moving from computer simulations to laboratory testing swiftly and with greater
precision.
91
commercial market. It was dubbed 'Moore's law' by the media, and the name has
endured. In its original form, Moore observed an exponential growth pattern,
06
with the number of transistors per integrated circuit doubling every 18 to 24
months, a trend he predicted would persist. Through continuous technological
10
advancements, Moore's law, characterized by the doubling of transistors at
regular intervals, remains valid to this day. Figure 2.3 graphically illustrates how
40
Moore's law impacts the evolution of computing power.
51
50
30
Figure 2.3: Moore’s law suggests that computer power will double every 18 to 24 months.
Example: Say that your friend takes a job with a starting salary of $40000 and
a guaranteed raise of 20 percent every year. You take a job with a starting salary
of $5000 but your salary doubles every year and a half (based on Moore's law),
as shown in Table 2.2.
91
06
10
40
51
50
30
Despite our frequent use of exponential growth to predict the future, especially
in the realm of technology, humans often struggle to grasp the true implications
of such growth. To gain a deeper understanding, let's take a moment to
contemplate what Moore's law would imply if applied beyond the realm of
transistors on a computer chip:
to commercial aviation, the same flight today would cost roughly a penny
and take less than a second.
Over the years, Moore's law has been interpreted more broadly than its original
formulation, yet its application and relative accuracy have proven valuable in
91
understanding our past and predicting our future. One common corollary of
Moore's law is the expectation that the price of a given level of computing power
06
will halve approximately every 18 to 24 months. While Moore did not explicitly
predict this effect, it has consistently held true. This trend also extends to the
10
cost of storage, which we will delve into in the following section.
decades. Software tends to become larger and more complex over time,
humorously echoing Wirth's law, which states that 'Software gets slower faster
than hardware gets faster.'
Recent studies in the computer industry project that Moore's law will persist for
91
several chip generations, likely spanning another decade. Depending on the
doubling time used in calculations, this progress could result in a 100-fold
06
increase in transistor counts on a chip within the next 10 years. Such rapid
exponential advancement could lead to 100 GHz personal computers in every
10
household and 20 GHz devices in every pocket. It seems reasonable to expect
that, sooner or later, computers will surpass or meet any conceivable
40
computational need. Intel, in fact, suggests that it can sustain development in
line with Moore's law for the next 20 years, even without significant
51
91
Access methods for data and information retrieval can be categorized as
sequential or direct. Sequential access necessitates accessing data in the order it
06
is stored. For instance, sequentially stored inventory data may be organized by
part number (e.g., 100, 101, 102, etc.). To retrieve information about part
10
number 125, one must read through and discard data related to parts 001 through
124.
40
In contrast, direct access permits the retrieval of data without following a
sequential path. With direct access, you can swiftly access the required data,
51
such as part number 125, without sifting through data for parts 001 through 124.
Consequently, direct access is generally faster than sequential access. Devices
50
used for sequential access to secondary storage data are known as sequential
access storage devices (SASDs), while those used for direct access are referred
30
commonly employed for backing up disk drives and storing data off-site for
disaster recovery. Recent technological advancements have resulted in tape
storage devices with increased capacities and faster transfer speeds. Bulky tape
drives have given way to compact tape cartridge devices, occupying minimal
floor space and accommodating numerous tape cartridges.
91
Magnetic Disks: Magnetic disks, coated with iron oxide, can be either thin
06
metallic platters (hard disks) see Figure 2.4 or Mylar film (diskettes). Similar to
magnetic tape, magnetic disks use magnetized areas to represent bits. Magnetic
10
disks serve as direct access storage devices, enabling rapid data retrieval,
particularly for organizations requiring swift responses to customer requests.
40
51
50
30
Virtual Tape: Virtual tape technology caters to less frequently accessed data by
simulating storage on tape cartridges, although some data portions may reside
on faster hard disks. Virtual tape systems often incorporate sophisticated storage
management to move data to more cost-effective storage media as its usage
diminishes. This technology reduces data access times, minimizes total
91
ownership costs, and optimizes floor space usage. Boston Medical Center's IS
organization, responsible for maintaining over 400 TB of data, implemented a
06
virtual tape management system to accommodate a 50 percent annual data
growth rate while controlling storage costs and meeting regulatory
10
requirements.
40
SAN (Storage Area Network): Storage Area Networks (SANs) integrate
computer servers, distributed storage devices, and networks to accelerate data
51
Optical Discs: Optical discs, such as Compact Disc Read-Only Memory (CD-
ROMs), are known for their storage capacity of 740 MB of data. Once data is
written on a CD-ROM, it becomes read-only and cannot be altered. CD burners
(CD recorders) enable data recording on compact discs. CD-Recordable (CD-
R) and CD-Rewritable (CD-RW) drives are the common types capable of
writing CDs, either once (CD-R) or repeatedly (CD-RW). CD-RW technology
is particularly useful for data backup.
91
06
10
40
Figure 2.5: Storage Area Network
51
Digital Video Discs (DVDs): Digital video discs (DVDs) resemble CD-ROMs
but offer greater storage capacity, holding about 135 minutes of digital video or
50
around 740 MB of data, single-sided DVDs can store 4.7 GB, and double-sided
DVDs offer a capacity of 9.4 GB. DVDs come in record-once (DVD-R and
DVD+R) and rewritable formats (DVD-RW, DVD+RW, and DVD-RAM).
Compatibility between different types of rewritable DVDs may vary.
Solid State Secondary Storage Devices: Solid-state storage devices (SSDs) use
memory chips instead of magnetic or optical media, offering lower power
consumption and faster data access. SSDs are also more robust due to fewer
moving parts, making them ideal for portable computers. However, they tend to
have a higher cost per GB and lower capacity compared to traditional hard
91
drives. Ongoing advancements in SSD technology are expected to reduce costs
and increase capacity.
06
Examples include Universal Serial Bus (USB) flash drives, and external and
10
rewritable devices with storage capacities ranging from 1 GB to 64 GB as
depicted in Figure 2.6. Marketing Architects, a marketing firm, utilizes SSD
40
technology to provide faster data responses and cost-effective storage.
51
50
30
91
fundamental component of a computer's user interface, alongside other
hardware components and software that enable interaction with the computer
06
system.
10
Just like any other components within a computer system, organizations should
consider their business objectives when selecting input and output devices. For
40
instance, many restaurant chains have adopted handheld input devices or
computerized terminals that enhance the efficiency and accuracy of order entry
51
A wide array of devices can be employed for data input, ranging from
specialized devices designed to capture specific types of data to more versatile
30
Input Devices for Personal Computers are the most commonly used devices for
entering data, such as characters, text, and basic commands, are the keyboard
and computer mouse as shown in Figure 2.7. Some companies are developing
newer keyboards that prioritize comfort, adjustability, and speed, aiming to
prevent wrist and hand injuries resulting from prolonged keyboard use. For
instance, Microsoft and other manufacturers have introduced split keyboards
that allow users to enter both sketches on a touchpad and text using keys. The
computer mouse, on the other hand, is employed for pointing to and clicking on
symbols, icons, menus, and commands displayed on the screen, prompting
various actions within the computer system.
91
06
10
40
Figure 2.7: Examples of manual input devices
without the need for breaking it into discrete words. In advanced applications
used by government and military entities, these systems can even decipher
unfamiliar voices and comprehend an extensive vocabulary.
Digital cameras capture and store images or videos in digital format. When
pictures are taken, the images are stored electronically within the camera. These
images can be transferred to a computer either directly or via a flash memory
card. Once stored on the computer's hard drive, the images can be edited, shared
with other locations, pasted into other applications, or printed. For example, you
91
can download a digital camera-captured photo of your project team and then use
it on a website or incorporate it into a project status report. Digital cameras have
06
surpassed film cameras used by professional photographers in terms of photo
quality and features, including zoom, flash, exposure controls, special effects,
10
and video capture capabilities. With suitable software, sound and handwriting
can be added to the photos.
40
The head-mounted display (HMD) was the first device to provide the wearer
51
91
entry, in hotel information centers for accessing local dining and drinking
establishment details, and in amusement parks for providing directions to
06
visitors. They are also utilized in airport kiosks and department stores.
10
Optical Data Readers Specialized scanning devices known as optical data
readers can be used to scan documents. There are two primary categories of
40
optical data readers: optical mark recognition (OMR) and optical character
recognition (OCR). OMR readers are used for purposes such as scoring tests,
51
where test takers mark boxes on OMR paper using pencils. These systems are
widely used in standardized tests like the SAT and GMAT and are being
considered for capturing voters' choices on Election Day. In contrast, most OCR
50
readers employ reflected light to recognize and scan various characters. With
specialized software, OCR readers can convert handwritten or typed documents
30
into digital data. Once entered, this data can be shared, edited, and distributed
over computer networks to numerous individuals. For instance, the St. Peters
police department employs OMR technology to capture data about each traffic
stop, which is then scanned and summarized in various reports to meet the state
attorney general's requirements.
Magnetic Ink Character Recognition (MICR) Devices In the 1950s (see Figure
2.9), the banking industry faced an overwhelming amount of paper checks, loan
applications, bank statements, and more. To address this issue and expedite
document processing, magnetic ink character recognition (MICR) was
developed. MICR involves the use of special magnetic ink to print data on the
bottom of checks and other forms. This data, printed using a unique character
set, can be read by both humans and computers.
91
06
Figure 2.9: Magnetic Ink Character Recognition
10
Pen Input Devices With a pen input device as outlined in Figure 2.10, you can
40
activate commands, perform tasks, input handwritten notes, and create drawings
and figures by touching a touch screen. Pen input necessitates specialized
51
partners offer the capability to transform handwritten notes into typed text while
preserving the digital ink's original appearance. Users can employ a pen to write
30
Radio Frequency Identification (RFID) see Figure 2.11 systems transmit data
via mobile devices called tags, which are read by RFID readers and processed
by information system programs. One popular application of RFID is the
placement of microchips on retail items, along with in-store readers that monitor
inventory on shelves and trigger restocking alerts when needed. RFID tags
91
contain a form of erasable programmable read-only memory (EPROM) that
stores data about the tagged item. A radio-frequency signal can update this
06
memory to reflect changes in the item's status. The transmitted data may include
identification, location information, or details about the product, such as its
10
manufacturing date, retail price, color, or purchase date.
40
RFID Tag
51
50
For instance, the Newmount Leeville Gold Mine in Nevada employs RFID
technology to track miners, equipment, and vehicles. RFID tags are affixed to
miners' cap lamps and mounted on vehicles and equipment to provide real-time
location data, aiding in the monitoring of miners' activities and facilitating rapid
responses in the event of accidents.
91
generated output. Early monitors, often referred to as CRTs due to their cathode-
ray tube technology, employed electron beams to illuminate phosphorescent
06
compounds (phosphors) on the screen's inner surface, producing individual
pixels. Each pixel represents a point of color or light on the display screen,
10
existing in either an "on" or "off" state. The electron beam continuously sweeps
across the screen, re-illuminating fading phosphors.
40
In contrast, plasma displays use numerous smart cells (pixels) composed of
electrodes and electrically charged neon and xenon gases to emit light. These
51
displays render images based on the information in the video signal, with each
pixel capable of emitting red, green, and blue light at varying intensities, thereby
50
LCD displays are flat screens employing liquid crystals, sandwiched between
polarizers, to create characters and graphics on a backlit screen. They offer
benefits such as reduced eye strain, absence of certain types of radiation, space
efficiency, and lower energy consumption compared to CRTs.
91
Moving on to hard copy output, printers come in various models with different
speeds, features, and capabilities. The speed of a printer is measured in pages
06
per minute (ppm), while the quality or resolution depends on the number of dots
printed per inch (dpi). Inkjet and laser printers offer distinct advantages, with
10
laser printers generally offering higher speeds and volumes than inkjets.
Plotters, on the other hand, are ideal for creating large-scale designs, blueprints,
40
and schematics.
For digital audio playback, digital audio players store, organize, and play digital
51
music files, with the popular MP3 format offering efficient compression without
compromising sound quality. These portable devices enable users to download
50
music from various sources and have revolutionized the way we consume music.
30
Chapter 3
91
Computer Software
06
10
40
51
50
30
91
attributes, and purposes, and provides instances of their applications. Before we
embark on this journey, let's examine an example illustrating the evolving
06
landscape of software in the business realm.
10
To fully grasp the significance and utility of the wide array of available software,
it is crucial to first understand what software encompasses. Software is the
40
overarching term encompassing diverse programs employed to operate and
manipulate computers and their peripheral devices. A common analogy
51
91
06
10
40
51
91
definition, COTS software is distributed in numerous copies with minimal
changes apart from scheduled upgrades. Purchasers of COTS software typically
06
have limited control over specifications, schedules, evolution, and access to
source code or internal documentation. The vendor of a COTS product usually
10
retains intellectual property rights. In contrast, custom software is generally
owned and controlled by the organization that developed or commissioned it.
40
A recent innovation in software development is known as open-source software.
In this approach, developers collaborate on application development using
51
freely. We will delve into this novel approach in greater detail in the next section
of this chapter.
30
91
components will provide us with an overview of essential software tools that
can enhance your productivity.
06
Figure 3.2 offers a comparison of the core programs included in the top four
10
software suites. Note that each suite integrates software packages for tasks like
word processing, spreadsheet handling, presentation graphics, database
40
management, and personal information management. Depending on the chosen
version, Microsoft, Lotus, Corel, and Sun may include additional programs such
51
Figure 3.2: The basic program components of the top four software suites
Opting for a software suite often results in cost savings compared to purchasing
individual packages separately. Moreover, these suites share a common
graphical user interface (GUI) featuring icons, toolbars, status bars, menus, and
more, providing a consistent user experience and facilitating ease of use. They
also share useful tools like spell checkers and help wizards, enhancing
However, there are downsides to bundling numerous programs and features into
91
a single package. Critics argue that many features included in software suites
often go unused by the majority of end-users. Additionally, these suites can
06
consume significant disk space, sometimes exceeding 250 megabytes,
depending on the version and functions chosen. Due to their size, software suites
10
are occasionally disparagingly referred to as "bloatware" by their critics. Costs
also vary widely, ranging from as low as $100 for a competitive upgrade to over
40
$700 for certain full versions of these suites.
These limitations have led to the continued use of integrated packages like
51
features found in individual programs and software suites, they are cost-
effective, lightweight (often consuming less than 10 megabytes of disk space),
and frequently come pre-installed on many budget-friendly microcomputer
systems. Integrated packages offer sufficient functionality for numerous
computer users while providing some of the advantages associated with
software suites in a more compact package.
Web Browsers and More: For many computer users today, the most critical
software component is the once-basic but now robust web browser. Browsers
like Microsoft Explorer, Netscape Navigator, Firefox, Opera, or Mozilla serve
as software applications designed to facilitate navigation through hyperlinked
resources on the World Wide Web, the broader internet, corporate intranets, and
extranets. Browsers have evolved beyond mere web surfing; they are
increasingly becoming the universal platform from which users launch activities
such as information searches, email communication, multimedia file transfers,
discussion group participation, and various other internet-based applications.
91
Figure 3.3 depicts the utilization of the Microsoft Internet Explorer browser to
access search engines hosted on the Netscape.com website. Netscape employs
06
Google as its primary search engine, while also offering links to other popular
search tools such as Ask Jeeves, Look Smart, Lycos, and Overture. The use of
10
search engines to locate information has become an integral aspect of both
business and personal applications on the Internet, intranets, and extranets.
40
Industry experts anticipate that web browsers will serve as the blueprint for how
most individuals interact with networked computers in the foreseeable future.
51
Presently, web browsers enable users to initiate and host various applications,
including video streaming, phone calls, software downloads,
videoconferencing, email checking, and collaborative spreadsheet work. This
50
91
06
10
40
51
50
30
Figure 3.3: Using the Microsoft Internet Explorer browser to access Google and other
search engines on the Netscape.com Web site.
91
incoming messages, routing them to appropriate mailboxes and folders, and
providing calendaring and contact management functions.
06
Instant messaging (IM) is a hybrid technology combining elements of email and
10
computer conferencing. It has experienced rapid growth and become a standard
method of electronic messaging for millions of internet users worldwide.
40
Through instant messaging, business professionals, friends, and associates can
exchange electronic messages instantaneously, facilitating real-time
51
91
06
10
40
51
50
30
Figure 3.4: Using the e-mail features of the Yahoo! Instant messaging system.
Given the numerous variations in this concept and the potential for new ones to
emerge, the meaning of the term "Weblog" may evolve over time. As a
formatting and content approach for websites, Weblogs are popular because
they signal to viewers that something new is posted daily, offer a personal
perspective rather than a commercial one, and provide opportunities for
collaboration and engagement with the website and its participants.
91
Word processing software offers additional features, including spell checkers to
06
identify and correct spelling errors and thesaurus functions to suggest alternative
words. Grammar and punctuation errors can be identified and corrected, and
10
improvements in writing style can be suggested through grammar and style
checker functions. Top packages also support the creation and design of web
40
pages from scratch for Internet or intranet websites (see Figure 3.5).
51
50
30
91
either provided by the software package or obtained from other sources
06
Spreadsheet software packages like Lotus 1-2-3, Microsoft Excel, OpenOffice
Calc, and Corel QuattroPro are employed by virtually every business for the
10
purposes of analysis, planning, and modeling. These applications enable the
creation of electronic spreadsheets, essentially worksheets composed of rows
40
and columns that can be stored on a personal computer or network server, or
converted into HTML format for storage as a web page or web sheet on the
51
World Wide Web. Building a spreadsheet entails designing its layout and
formulating the relationships (formulas) that will be used within the worksheet.
50
Upon receiving your input, the computer executes the necessary calculations
according to the defined formulas and promptly displays the results, whether on
30
your workstation or website. Most of these software packages also facilitate the
creation of charts and graphical representations of spreadsheet data (See Figure
3.6).
For instance, you can develop a spreadsheet to record and analyze the historical
and current advertising performance of a business. Furthermore, you can
establish hyperlinks to a corresponding web sheet on your marketing team's
intranet web page. This equips you with a decision support tool that assists in
addressing hypothetical questions regarding advertising, such as, "What would
be the impact on market share if advertising expenses were to increase by 10
percent?" To answer this question, you would simply modify the advertising
expense formula within the advertising performance worksheet. The computer
would then recalculate the affected figures, generating fresh market share
statistics and visuals. This approach enhances your understanding of the
repercussions of advertising decisions on market share, allowing you to share
this insight by adding notes to the web sheet on your team's intranet web page.
91
06
10
40
51
50
30
91
06
10
40
51
50
Figure 3.7: Using the slide preview feature of a presentation graphics package, Microsoft
30
PowerPoint
91
appointments, meetings, and tasks. PIM software structures and presents data in
various formats, ranging from electronic calendars and appointment lists to
06
project timetables and summarized financial data about customers, clients, or
sales prospects. Most PIMs now feature web access and email functionality,
10
with some employing these features to support team collaboration by sharing
information like contact lists, task lists, and schedules among networked PIM
40
users (See Figure 3.8).
51
50
30
91
products leverage the Internet, corporate intranets, and extranets to enable global
collaboration among virtual teams dispersed worldwide. Team members can use
06
the Internet for global email, project discussions, and joint web page
development, or rely on corporate intranets to publish project updates and
10
collaborate on documents stored on web servers (See Figure 3.9).
40
51
50
30
Figure 3.9: Lotus Sametime enables workgroups and project teams to share spreadsheets
and other work documents in an interactive online collaboration process.
91
teams to swiftly create sophisticated web-based environments for information
sharing and document collaboration. Moreover, businesses can harness these
06
platforms for application development, streamlining the creation of web-based
business portals and transaction processing applications. Collaboratively
10
developed websites can seamlessly integrate a wide array of individual
applications, enhancing both individual and team productivity.
40
Numerous businesses are exploring alternatives to the procurement, installation,
51
Businesses are opting for ASPs for several reasons, with one of the primary
benefits being the lower initial investment cost and the rapid setup of web-based
91
managing companywide software patches and updates. As a result, the adoption
of ASPs by businesses and organizations is expected to increase in the coming
06
years.
10
Another recent development in computing and software delivery is known as
cloud computing. Cloud computing involves providing software and, in some
40
cases, virtualized hardware resources as services over the Internet. Users are not
required to have expertise in or control over the underlying technology
51
It's worth noting that cloud computing is often confused with grid computing,
where the combined CPU power of multiple computers acts as a single large
computer when needed. While many cloud computing deployments rely on grid
technology, cloud computing is considered a natural progression from the grid
model. Most cloud computing infrastructure is based on reliable services
delivered through data centers and servers with varying levels of virtualization
technology. These services are accessible from any location with network
connectivity, creating a unified access point for users' computing needs.
91
access to a wide range of applications. Users often have the flexibility to
terminate contracts at any time, with service level agreements in place to ensure
06
agreed-upon service levels are met. It is anticipated that cloud computing will
become a ubiquitous computing model in the future.
10
Regardless of whether software is acquired commercially or accessed through
40
an ASP, software licensing remains a crucial aspect. Software licensing
encompasses various considerations, including intellectual property rights such
51
as copyright, trademark, and trade secrets, as well as contract law like the
Uniform Commercial Code (UCC). Contrary to popular belief, purchasing a
software application does not equate to ownership; it grants the user a license to
50
use the software under specified terms and conditions. Licenses often prohibit
activities like reverse engineering, modification, disclosure, or transfer of the
30
software. The purchaser typically has the right to sell or dispose of the rights
granted by the license but not to duplicate or resell multiple copies of the
software.
91
bridging computer networks, hardware components, and end-user application
programs. System software can be categorized into two major divisions, as
06
illustrated in Figure 3.10
10
40
51
50
30
91
3.2.1 Operating Systems
Undoubtedly, the most vital component of system software for any computer is
06
its operating system. An operating system functions as an integrated suite of
programs responsible for managing the CPU's operations, controlling
10
input/output and storage resources, and providing an array of support services
while the computer executes user application programs.
40
The primary objective of an operating system is to enhance the productivity of
51
common operations like network access, data entry, file saving and retrieval, as
well as printing or displaying output. Users familiar with computers understand
that the operating system must be loaded and activated before other tasks can be
30
91
06
10
Figure 3.11: The basic functions of an operating system
40
¥ Resource Management: Operating systems employ resource
51
91
Microsoft Windows: Historically, MS-DOS (Microsoft Disk Operating
System) served as the dominant microcomputer operating system, characterized
06
as a single-user, single-tasking OS. Microsoft later integrated it with Windows,
providing a graphical user interface and limited multitasking. However, with the
10
introduction of Windows 95 in 1995, Microsoft began transitioning away from
this combination. Subsequent versions, such as Windows 98 and Windows Me
40
(Millennium Edition), brought enhanced features.
2000 in 2000.
30
91
In 2008, Windows Server 2008 emerged, sharing its architecture and
06
functionality with Windows Vista. It featured various technical, security,
management, and administrative enhancements.
10
Windows Server 2008, in its Release 2, incorporated several performance and
security improvements, consolidating its position as a robust server solution."
40
UNIX: Originally developed by AT&T, UNIX is now also available from other
51
vendors, including Sun Microsystems offering Solaris and IBM offering AIX.
UNIX serves as a multitasking, multiuser, and network-managing operating
50
91
to the source code. While the open-source idea contradicts the conventional,
highly commercial, and proprietary nature of traditional software development,
06
an ever-growing community of developers has embraced it, recognizing the
hidden costs of the proprietary model.
10
Since 1998, the OSS movement has revolutionized software development,
40
tracing its roots back over 30 years. Unlike in the past, where software was sold
exclusively as a finished product, open source ensures free access to source
51
code, allowing users to install it on new platforms without additional costs and
receive support from like-minded users if the original creator abandons it. Bug
fixes are not solely reliant on the software organization, and a central
50
91
multitasking, multimedia capabilities, and an integrated suite of applications,
Mac OS X represents a departure from previous Mac operating systems. It
06
incorporates a UNIX-like core called Darwin and proprietary components like
the Aqua interface, resulting in a distinctive GUI-based OS.
10
Mac OS X includes software development tools, notably Xcode, supporting
multiple programming languages. It accommodates both Intel and PowerPC-
40
based Macintosh machines.
51
original OS. This concept builds upon the earlier virtualization practices, such
as partitioning hard drives, offering benefits ranging from cost savings to energy
efficiency.
91
At the most elementary level of programming languages, we encounter
Machine Languages, also known as first-generation languages. During the
06
early stages of computer evolution, programmers were compelled to compose
program instructions using binary codes unique to each computer system. This
10
form of programming involved the challenging task of formulating instructions
as strings of binary digits (comprising ones and zeros) or other numerical
40
systems. Programmers were obliged to possess in-depth knowledge of the inner
workings of the specific CPU (Central Processing Unit) they were employing.
51
data element used in the program. Every switch and indicator utilized in the
program also required an associated instruction. These stringent demands
30
91
assume a form similar to that depicted in Figure 3.12.
06
10
40
51
91
semantics (meanings) of such statements are detached from the internal code of
any particular computer system. For example, the computation X + Y + Z would
06
be expressed in high-level languages like BASIC and COBOL as demonstrated
in Figure 3.12.
10
High-level languages such as BASIC, COBOL, and FORTRAN are more
40
accessible for learning and programming in comparison to assembler languages
due to their less rigid rules, formats, and syntax. However, high-level language
51
Most 4GLs are nonprocedural languages that encourage both users and
programmers to specify desired results while letting the computer determine the
sequence of instructions required to achieve those results. Consequently, 4GLs
91
For instance, INTELLECT, a natural language, might employ a statement like
"What are the average exam scores in MIS 200?" to program a straightforward
06
task such as calculating average exam scores.
10
In the initial stages of 4GL development, it was suggested that these languages
were ill-suited for high-volume transaction processing environments. Although
40
4GLs were celebrated for their ease of use, they were perceived as less flexible
than their predecessors, primarily due to increased storage and processing speed
51
and Java are also classified as fifth-generation languages and have become
essential tools in software development. In brief, while most programming
30
languages segregate data elements from the procedures or actions that operate
on them, object-oriented languages unite data and the associated operations into
objects. An object encompasses both data and the actions that can be performed
on that data. For instance, an object might represent data pertaining to a bank
customer's savings account along with operations like interest calculations.
Alternatively, an object might embody graphic data, such as a video display
window, alongside the actions applicable to it.
91
Object-oriented languages offer ease of use and greater efficiency for
programming graphics-oriented user interfaces, a requirement for many
06
applications. Consequently, they have become the predominant programming
languages in contemporary software development. Furthermore, once objects
10
are created, they can be reused, a significant advantage of object-oriented
programming. For example, programmers can construct a user interface for a
40
new program by assembling standard objects like windows, bars, boxes, buttons,
and icons. Consequently, most object-oriented programming packages offer a
51
crucial tools in the construction of multimedia web pages, websites, and web-
based applications. Furthermore, both XML and Java have emerged as pivotal
components within the realm of software technologies, playing a significant role
in supporting various business initiatives related to web services.
It does so by embedding control codes within the ASCII text of the document,
which define titles, headings, graphics, multimedia elements, and hyperlinks
within the content. Notably, several top-tier software suites offer the capability
to automatically convert documents into HTML formats. These software suites
encompass web browsers, word processors, spreadsheet programs, database
91
managers, and presentation graphics packages. Additionally, specialized web
publishing programs such as Microsoft FrontPage, Lotus FastSite, and
06
Macromedia's DreamWeaver provide an array of features designed to facilitate
the creation and design of multimedia web pages, even for those without formal
10
HTML programming skills.
40
In contrast, XML, or eXtensible Markup Language, differs from HTML in that
it doesn't serve as a format description language for web pages. Instead, XML
51
agency's web page displaying airline names and flight times might employ
concealed XML tags such as "airline name" and "flight time" to categorize each
30
of the airline flight times on the page. Similarly, product inventory data on a
website can be labeled using tags like "brand," "price," and "size." This
classification of data by XML enhances the searchability, sorting, and analysis
of website information.
91
PowerXEditor, developed by Aptara. Let's now shift our focus to this distinctive
application of XML that aims to enhance efficiency within the publishing
06
industry.
10
language that has sparked a revolution in the development of web-based
applications for the World Wide Web, corporate intranets, and extranets. Unlike
40
some programming languages such as C and Objective C, Java stands out for its
simplicity, security, and platform independence. It has been specifically
51
One of Java's major attractions is its ease in creating applets and distributing
them from network servers to client PCs and networked computers. Applets can
take the form of small, specialized application programs or serve as modules
within larger Java application programs. Notably, Java programs maintain their
platform independence, making them compatible with Windows, UNIX, and
Macintosh systems without the need for modification.
91
The .NET platform holds the potential to unify the functionalities of diverse
computing devices and maintain automatic synchronization and updating of user
06
information across them. Furthermore, it offers a premium online subscription
service with customized access to a range of products and services from a central
10
hub for application and software management. For developers, .NET introduces
the capability to create reusable modules, thereby enhancing productivity and
40
reducing programming errors.
The full deployment of .NET is anticipated to unfold over several years, with
51
The most recent iteration of Java is Java Enterprise Edition 5 (Java EE 5), which
has become the primary alternative to Microsoft's .NET software development
platform for numerous organizations striving to harness the business potential
of web-based applications and web services.
91
functions accomplished through web services software technologies and
standards.
06
Web services are poised to become the fundamental software technology for
10
automating access to data and application functions between a business and its
trade partners. As businesses increasingly transition to conducting operations
40
online, web services will become indispensable in developing efficient e-
business and e-commerce applications. The adaptability and interoperability of
51
web services will prove vital in managing the rapidly changing dynamics
between a company and its business partners within the dynamic global business
landscape.
50
91
An interpreter represents a specialized type of compiler that translates and
executes each statement in a program one at a time, instead of producing a
06
complete machine language program as compilers and assemblers typically do.
Java, in particular, serves as an example of an interpreted language, with Java
10
applets having their program instructions interpreted and executed on-the-fly as
they run on a client PC.
40
Programming tools: The realm of software development and the process of
computer programming have benefited from the inclusion of graphical
51
Chapter 4
91
Data Management
06
10
40
51
50
30
4.1 Introduction
A database is a structured repository of data, an integral component within an
information system designed to support an organization in achieving its
91
objectives. It plays a pivotal role in enhancing organizational success by
furnishing timely, precise, and pertinent information based on stored data. As
06
an illustration, consider a database that supplies information about movies
featuring Tom Cruise, including his acting roles, productions, endorsements,
10
and other relevant aspects of his career. Through this database, an agent can
efficiently identify clients associated with a particular product or film, or
40
conversely, all the products and films linked to a single client. Moreover,
databases assist enterprises in producing information to cut costs, bolster profits,
51
track historical business activities, and explore new market avenues. In certain
instances, organizations collaborate on the creation and utilization of
50
(IEA), and the United Nations, employ a database to oversee global oil supply.
projects. Poor database design can cause system development efforts to collapse
like a house of cards due to inaccuracies.
91
application programs. These systems are typically purchased from specialized
vendors and offer centralized control over data resources, which is crucial for
06
maintaining data security and integrity. The combination of a database, DBMS,
and application programs make up a database environment, which is overseen
10
by a knowledgeable information system professional known as a database
administrator (DBA)., including security measures against unauthorized access.
40
Unfortunately, security breaches, like the one experienced by an Ivy League
college that exposed students' private information, have become all too common
51
91
data encompasses unprocessed information, including metrics like employee
IDs and sales data. To convert data into valuable information, it must initially
06
undergo meaningful organization.
10
Data is typically structured in a hierarchical manner, commencing with the
40
smallest unit of information utilized by computers, known as a "bit," and
progressing up the hierarchy to culminate in a "database." A "bit," denoting a
51
binary digit, signifies a circuit that can be in one of two states: on or off. These
bits can be organized into larger units known as "bytes," with a byte
50
can encompass uppercase letters (A, B, C... Z), lowercase letters (a, b, c... z),
numeric digits (0, 1, 2... 9), or special symbols (., !, [+], [-], /, …).
91
an "inventory file" comprises all records pertaining to an organization's
inventory. Some database software may refer to these files as "tables."
06
At the apex of this hierarchical arrangement lies the "database," which
encompasses an amalgamation of integrated and interconnected files. In
10
summary, the hierarchy of data encompasses bits, characters, fields, records,
files, and databases as shown in Figure 4.1. Characters unite to compose fields,
40
fields combine to create records, records aggregate to form files, and files
amalgamate to establish a database. In addition to housing all these tiers of data,
51
91
organizations structure and store their data in the form of entities. Attributes, on
the other hand, denote the specific characteristics of an entity. For instance, an
06
employee can have attributes such as employee number, last name, first name,
hire date, and department number (as shown in Figure 4.2). Inventory items
10
possess attributes such as inventory number, description, quantity on hand, and
warehouse location. Similarly, customers are associated with attributes like
40
customer number, name, address, phone number, credit rating, and contact
person. Attributes are typically chosen to represent the pertinent traits of entities,
51
The actual value of an attribute, referred to as a data item, can be located within
the fields of the record that describe the entity. Most organizations employ
attributes and data items in their data management processes. Governments also
rely on attributes and data items for tasks like criminal investigations. For
instance, the United States Federal Bureau of Investigation is constructing a
91
to enhance homeland security.
06
As previously discussed, a collection of fields pertaining to a specific object
constitutes a record. A key, on the other hand, refers to a field or a set of fields
10
within a record that serves to identify that record. A primary key is a field or set
of fields that uniquely distinguishes a record, ensuring that no other record
40
shares the same primary key. The primary key plays a crucial role in
distinguishing records and facilitating their retrieval, organization, and
51
When you need to find a specific record that meets certain criteria, you can use
secondary keys to speed up the process. For example, if you call a mail-order
30
company to order clothes but don't have your customer number, the order clerk
can use a secondary key like your last name instead. They'll enter "Adams" and,
if there are multiple customers with that last name, they can check other fields
like your address and first name to find the right record. Once your record is
located, they'll process your order and send your clothes your way.
The Database Approach In the past, applications relied on distinct files; for
instance, a payroll application would operate using a dedicated payroll file. This
approach to data management, where individual data files are created and
maintained for each application program, is referred to as the traditional
approach to data management.
91
enforcement agencies nationwide.
06
To implement the database approach to data management, specialized
software—a database management system (DBMS)—is necessary. As
10
previously mentioned, a DBMS comprises a set of programs that serve as an
intermediary between a database and its users, including application programs.
40
Typically, this software acts as a buffer between application programs and the
database itself. Figure 4.3 provides an illustration of the database approach.
51
50
30
91
embark on the process of creating the database. The construction of a database
involves two distinct phases: logical design and physical design.
06
The logical design represents an abstract model of how data should be structured
10
and organized to meet the information needs of the organization. This phase
entails identifying relationships among data elements and organizing them in a
40
coherent manner. Given that databases play a crucial role in providing input and
output for information systems across various business functions, it is
51
imperative that users from all functional areas contribute to the creation of the
logical design. This collaborative effort ensures that the database effectively
50
Following the logical design, the physical design phase refines the database for
30
Database designers use a data model as a tool to show the logical relationships
between data. This model visually represents entities and how they are
91
areas and departments.
06
Several models have been developed to aid managers and database designers in
analyzing these data and information needs. An example of such a model is the
10
entity-relationship diagram (ER diagram). ER diagrams employ standardized
graphical symbols to depict the structure and relationships of data. In most cases,
40
boxes within ER diagrams represent data items or entities found within data
tables, while diamonds signify relationships between data items and entities. In
51
ER diagrams play a crucial role in ensuring that the relationships among data
entities in a database are accurately structured. This alignment helps ensure that
30
any application programs developed align with business operations and user
requirements. Additionally, ER diagrams can serve as valuable reference
documents even after a database is in active use. They are instrumental in
guiding any necessary modifications to the database design.
91
06
10
40
Figure 4.4: An Entity-Relationship (ER) Diagram for a Customer Order Database
51
While various database models, including flat files, hierarchical structures, and
network models, exist, the relational model has emerged as the most popular
30
choice, and its utilization is poised to continue growing. The relational model
describes data using a standardized tabular format, where all data elements are
arranged in two-dimensional tables referred to as relations, mirroring the logical
equivalence of files. In relational databases, data is organized into rows and
columns within these tables, simplifying data retrieval and manipulation. It is
generally more comprehensible for managers compared to other database
models (see Figure 4.5).
Prominent databases built on the relational model encompass IBM DB2, Oracle,
Sybase, Microsoft SQL Server, Microsoft Access, and MySQL. Presently,
Oracle leads the market in general-purpose databases, commanding
approximately half of the multibillion-dollar database industry. Oracle's latest
91
06
10
40
51
50
30
In the relational model, each row in a table signifies a data entity, commonly
known as a record, while each column represents an attribute, which is
equivalent to a field. Each attribute has a predefined domain that limits the
permissible values it can accept. This domain concept ensures data accuracy; for
instance, an attribute like gender would only accept values "male" or "female,"
while a pay rate attribute would exclude negative numbers. Defining domains
in this manner enhances data precision.
Data Manipulation After inputting data into a relational database, users can
perform inquiries and analyze the data. Fundamental data manipulation
operations include selecting, projecting, and joining. "Selecting" involves
filtering rows based on specific criteria. For example, if a project table contains
information about various projects, the company president can employ selection
to isolate the row pertaining to Project 226, the sales manual project, and
determine its department number, which turns out to be 598.
91
"Projecting" entails reducing the number of columns in a table. For instance, a
department table might contain the department number, department name, and
06
Social Security number (SSN) of project managers. A sales manager may want
to create a new table with only the department number and the SSN of managers
10
responsible for the sales manual project. Using projection, they can eliminate
the department name column and generate a new table containing just the
40
department number and SSN.
"Joining" involves merging two or more tables. For instance, one can combine
51
the project table with the department table to create a new table that includes
project details (number and description), department details (number and name),
50
manager's SSN in the department table, and finally utilizes the SSN to access
the manager's hire date in the manager table. The common data attribute here is
the department number, linking the project table to the department table.
Similarly, the manager's SSN serves as the common element connecting the
department table and the manager table. The final outcome presents the
91
president with the manager's name and hire date as a response to the inquiry (see
Figure 4.7).
06
10
40
51
50
The relational database model reigns as the most widely adopted choice due to
its ease of control, flexibility, and intuitive organization of data into tables.
91
06
10
40
51
91
06
10
40
Figure 4.8: Building and Modifying a Relational Database
51
91
management. To confront the growth and diversity of digital data, organizations
must employ advanced data management techniques.
06
At its essence, Big Data revolves around making predictions. These predictions
10
do not arise from teaching computers to emulate human thinking; rather, they
result from the application of mathematical principles to massive datasets,
40
allowing us to infer probabilities. Consider the following examples:
¥ Assessing the likelihood that the typed letters "teh" should be corrected
to "the."
50
The effectiveness of Big Data systems derives from their access to vast datasets
upon which to base predictions. Furthermore, these systems are designed to
enhance their performance over time by identifying the most valuable signals
and patterns as additional data is fed into them.
Diverse in nature,
91
¥
06
¥
10
Requiring sophisticated information systems for effective capture,
processing, transformation, and analysis within a reasonable timeframe.
40
Big Data typically encompasses the following categories, though it's important
51
to note that this list is not exhaustive and may expand with the emergence of
new data sources:
50
Let's delve into a few specific examples that illustrate the vastness of Big Data:
91
¥ The Sloan Digital Sky Survey in New Mexico, which commenced in
2000, amassed more data within its initial weeks than the entire history
06
of astronomy. By 2013, its archive contained hundreds of terabytes of
data. In contrast, the Large Synoptic Survey Telescope in Chile, set to
10
launch in 2016, was projected to collect the same quantity of data every
five days.
40
¥ In 2013, Google processed over 24 petabytes of data daily.
¥ Every hour, Facebook users upload more than 10 million new photos and
51
¥ Google's YouTube service, with over 800 million monthly users, saw
users uploading more than an hour of video every second.
30
91
analyze them. Consider, for instance, Google's earlier foray into
harnessing satellite imagery, capturing street views, and openly sharing
06
geographical data. At that time, the true value of such data was not widely
recognized. Today, we acknowledge their profound usefulness (e.g., think
10
of the numerous applications of Google Maps).
40
Think about machine-generated data, which is generated at a scale far
surpassing that of traditional data. For example, a single jet engine's
51
of data from this single source is truly astounding. Smart electrical meters,
sensors in heavy industrial machinery, and telemetry from automobiles
30
91
page content, scans of government documents, and comments posted on
social networks
06
4.5.3 Big Data Sources
10
Big data sources can be broadly categorized into two main types: internal data
sources and external data sources. An example of big data sources is depicted in
40
Figure 4.9
51
50
30
91
¥ Examples of internal data sources include customer transaction
records, sales data, employee records, production data, financial
06
statements, and any other data that is collected and stored by the
company as part of its business activities.
10
¥ Companies have full control over internal data and can use it for
various purposes, such as business analytics, decision-making, and
40
improving internal processes.
51
91
Both internal and external data sources are valuable for organizations in the era
06
of big data, as they provide a wealth of information that can be analyzed to
uncover insights, trends, and opportunities. Effective data management and
10
integration strategies are often needed to harness the full potential of both types
of data sources for business intelligence and strategic decision-making.
40
4.6 Database Management Systems
Ensuring the creation and implementation of the appropriate database system is
51
vital to guarantee that the database adequately supports both business operations
and objectives. But how do we go about creating, implementing, utilizing, and
50
91
06
10
40
51
50
Flat File: A flat file is a basic type of database program that does not establish
inherent relationships between records. Typically, flat file databases are used for
storing and manipulating a single table or file and do not follow any of the
database models discussed earlier, such as the relational model. Many
spreadsheet and word-processing programs include flat file capabilities. These
software tools can organize tables and perform basic calculations and
comparisons. For instance, Microsoft OneNote allows users to input ideas,
thoughts, and notes into a flat file. In OneNote, each note can be positioned
anywhere on a page or within a designated container. Pages are organized into
sections and subsections represented as colored tabs.. After creating a note, it
can be retrieved, copied, and pasted into other applications like word processors
91
Similarly, EverNote is a free online database service capable of storing notes
06
and miscellaneous information. Given the vast storage capacity of today's high-
capacity hard drives, the popularity of databases capable of managing
10
unstructured data is expected to continue growing.
various sources. InfoPath provides built-in forms for entering data, including
expense information, timesheets, and more.
30
91
spread across 100 countries, all access a central database stored in a data center
in Munich, Germany.
06
Schema: Because the DBMS is responsible for managing access to a database,
10
one of the initial tasks in the installation and utilization of a large database
involves providing the DBMS with information about the logical and physical
40
structure of the data, as well as the relationships among the data for each user.
This information is referred to as a schema, akin to a schematic diagram. In the
51
case of extensive database systems like Oracle, schemas are typically used to
define tables and other database components associated with individual users.
50
91
06
10
40
Figure 4.11: Using a Data Definition Language
51
91
06
Figure 4.12: A Typical Data Dictionary Entry
¥
10
The name of the individual who made the data dictionary entry (D.
40
Bordwell)
¥ The date when the entry was created (August 4, 2010)
51
¥ The name of the person who approved the entry (J. Edwards)
¥ The approval date (October 13, 2010)
50
91
For instance, consider a scenario where an automobile dealership's pricing
software needs pricing information for a six-cylinder engine option instead of
06
the standard four cylinders to calculate the total car price. The application
program sends a data request to the DBMS, following a logical access route.
10
Subsequently, the DBMS collaborates with various system programs to access
a storage device, like a disk drive, where the data is stored. During this retrieval
40
process, the DBMS follows a path to the physical location (referred to as the
physical access path) where the pricing data for this option resides. In the
51
context of pricing, the DBMS might navigate to a disk drive to fetch the price
data for six-cylinder engines. This relationship is depicted in Figure 4.13.
50
30
This same sequence of actions applies when a user seeks information from the
database. Initially, the user makes a data request to the DBMS. For instance, a
user might issue a command such as "LIST ALL OPTIONS FOR WHICH
91
However, difficulties can arise when two or more individuals or programs
attempt to access the same record in the database simultaneously. For instance,
06
an inventory management program might try to reduce the inventory level for a
product by ten units due to recent customer shipments, while simultaneously, a
10
procurement program might endeavor to increase the inventory level for the
same product by 200 units because of a fresh inventory receipt. In the absence
40
of proper database control mechanisms, one of these inventory updates could be
incorrect, leading to an inaccurate product inventory level. To prevent such
51
friendly interface of Windows and other graphical user operating systems, users
can execute queries and perform various database tasks by simply opening
windows and clicking on the data or features they require (as depicted in Figure
4.14).
91
06
10
40
51
50
30
91
In the 1970s, D. D. Chamberlain and colleagues at the IBM Research Laboratory
06
in San Jose, California, devised a standardized data manipulation language
known as Structured Query Language (SQL, pronounced as "sequel"). The
10
EMPLOYEE query mentioned earlier is written in SQL. In 1986, the American
National Standards Institute (ANSI) adopted SQL as the standard query
40
language for relational databases. Since ANSI's endorsement of SQL, there has
been a growing interest in integrating SQL into relational databases on both
51
Furthermore, programmers and database users find SQL valuable because SQL
statements can be seamlessly integrated into many programming languages,
including the widely adopted C++ and COBOL languages. Given its
standardized and simplified procedures for retrieving, storing, and manipulating
data within a database system, SQL has gained popularity as a user-friendly
database query language.
specific records and fields for inclusion in reports. Additionally, users can
perform calculations tailored to the report by manipulating database fields.
Formatting controls and organizational options, such as report headings,
facilitate the customization of reports, creating versatile, user-friendly, and
powerful information management tools. A DBMS has the capacity to generate
91
a diverse array of documents, reports, and other outputs, contributing to an
organization's pursuit of its objectives. Among the most common types of
06
reports are those that aggregate and structure data to offer summarized insights
into various aspects of company operations. For instance, accounting reports
10
often provide summarized financial information, including current accounts and
overdue accounts. Many companies rely on regular status reports to make
40
routine operational decisions, gaining visibility into the progress of specific
orders towards completion and delivery.
51
50
30
Databases also have the potential to provide valuable support to executives and
decision-makers, enhancing their ability to make informed choices. For
instance, Intellifit's database can aid online shoppers in making well-informed
decisions about clothing purchases. This database encompasses the authentic
sizes of apparel items from different clothing companies operating online. The
91
process initiates with the scanning of a customer's body at one of the company's
locations, usually situated within shopping malls, resulting in the acquisition of
06
approximately 200,000 measurements that construct a 3-D representation of the
customer's body shape. Subsequently, the database compares the actual body
10
dimensions with the sizes provided by web-based clothing retailers, ensuring an
optimal fit for the customer
40
4.6.4 Popular Database Management Systems
51
There are many database management systems available for individual users,
such as Microsoft Access and FileMaker Pro. However, there are also programs
50
91
A growing number of companies are embracing the DaaS model, including
industry giants like Google, Microsoft, Intuit, Serran Tech, MyOwnDB, and
06
Trackvia. Organizations such as XM Radio, Google, JetBlue Airways, Bank of
America, and Southwest Airlines have adopted QuickBase from the service
10
provider Intuit to manage their databases externally. For instance, JetBlue
employs DaaS from Intuit for effective organization and management of IT
40
projects. Thanks to the accessibility of both the database and DBMS via any
internet connection, those involved in managing and executing systems
51
development projects can easily monitor their progress and that of their
colleagues from any location.
50
91
student transcripts, credit card statements, product catalogs, and a myriad of
other data, offers unparalleled convenience to individual users while
06
simultaneously enhancing effectiveness and efficiency for businesses and
organizations. Leading entities like Amazon.com, eHarmony.com, eBay, and
10
many others have amassed substantial profits by seamlessly amalgamating
databases, the Internet, and astute business models.
40
Tech giants like Google and Microsoft have spearheaded the development of
51
electronic health (e-health) records for all Americans by 2015, backed by a $17
billion investment in e-health projects and programs, will undoubtedly drive
extensive efforts by database companies to create accessible health and medical
database systems on the Internet.
While the prospect of accessing private medical information on the public web
raises concerns among privacy advocates, the benefits offered by this system,
such as the significant reduction in paper-based documentation and streamlined
data management procedures leading to a decline in clerical errors, garner
support from the majority within the field. Robust encryption and authentication
technologies will be deployed to maximize the security of these systems.
91
financial data through online transaction processing (OLTP) systems. This data
serves as the foundation for supporting decision-making processes via data
06
warehouses, data marts, and data mining.
10
4.7.2.1 Data Warehouses
data extracted from operational systems and external sources (as shown in
Figure 4.16), refining and integrating this data to create a new information
repository optimized for business analysis.
91
06
10
40
51
50
Data warehouses can also incorporate data from unique sources. For instance,
30
91
06
10
40
51
50
30
Data marts are particularly beneficial for smaller groups requiring access to
detailed data. Unlike warehouses with summary data for the entire organization,
91
data marts contain tens of gigabytes of data, making them suitable for
deployment on less powerful hardware with smaller secondary storage devices,
06
leading to cost savings. While any database software can establish a data mart,
some vendors offer specialized software designed and priced exclusively for this
10
purpose. Companies like Sybase, Software AG, Microsoft, and others provide
products and services that simplify and economize the deployment of scaled-
40
down data warehouses. The key advantage of data marts is their ability to place
targeted business information in the hands of a broader range of decision-
51
Data mining aims to extract patterns, trends, and rules from data warehouses to
assess proposed business strategies, enhancing competitiveness, profitability,
and business processes. It is extensively used in marketing to boost customer
retention, identify cross-selling opportunities, manage campaigns, analyze
markets, channels, and pricing, and segment customers, particularly for one-to-
one marketing. Data-mining tools aid users in finding answers to unanticipated
questions. E-commerce offers significant opportunities for effective data
mining, where user traffic through websites is analyzed to personalize the site
and develop targeted sales promotions. However, concerns about data privacy
91
arise, as seen in instances like Facebook sharing member data with commercial
partners for targeted marketing campaigns.
06
Predictive analysis, a form of data mining, combines historical data with
10
assumptions about future conditions to forecast outcomes, such as future
product sales or customer default probabilities. Retailers employ predictive
40
analysis to convert occasional customers into frequent buyers by predicting their
potential purchases with suitable incentives. Various companies, including
51
Traditional DBMS vendors, such as Oracle, Sybase, Tandem, and Red Brick
Systems, recognize the immense potential of data mining and are incorporating
data-mining capabilities into their products.
91
strategies, tactics, or operations. A case in point is IMS Health, which offers a
BI system tailored to assist pharmaceutical industry businesses in tailoring their
06
marketing efforts towards physicians, pharmacists, nurses, consumers,
government agencies, and nonprofit healthcare organizations. BI transforms raw
10
data into actionable insights that are disseminated across an organization,
shedding light on the root causes of issues and, when effectively implemented,
40
enhancing business operations. For instance, Puma North America, a renowned
athletic footwear manufacturer, leverages SPSS software to provide sales
51
91
4.7.4 Distributed Databases
06
Distributed processing entails deploying processing units across various
locations and establishing connections between them through
10
telecommunications equipment. A distributed database, which is a database
wherein data can be distributed across multiple smaller databases interconnected
40
via telecommunications devices, operates on a similar principle. Consider, for
instance, a scenario where a user at the Milwaukee branch of a clothing
51
91
significantly enhance organizational efficiency and effectiveness. For example,
the New York City Police Department employs thousands of officers who
06
search for information located on servers situated across the city.
10
Despite the advantages, distributed processing presents additional challenges in
terms of integrating different databases (information integration), upholding
40
data security, ensuring accuracy, timeliness, and adherence to standards.
Distributed databases facilitate direct access to a larger number of users at
51
to delays.
30
91
table showcasing sales performance across regions, product categories, and
timeframes would instantly grace the screen. This technology, known as online
06
analytical processing (OLAP), has evolved to efficiently store and deliver data
warehouse information. Leading OLAP software providers include Microsoft,
10
Cognos, SAP, Business Objects, MicroStrategy, Applix, Infor, and Oracle. Blue
Mountain, the largest mountain resort in Ontario, harnesses OLAP to enable its
40
analysts, managers, and executives to swiftly comprehend extensive and
intricate datasets. With 13 distinct business lines, encompassing restaurants, ski
51
ticketing, call centers, and lodging, decision-makers utilize the OLAP system to
explore data across various dimensions and delve into specifics.
50
The true worth of data ultimately resides in the decisions it empowers. Robust
information analysis tools like OLAP and data mining, when integrated into a
30
91
06
10
40
4.7.6 Object-Relational Database Management Systems
51
in Chapter 2. In this paradigm, both the data and the corresponding processing
instructions find their abode within the database. To illustrate, an object-oriented
30
database has the capability to store not just monthly expenses but also the
instructions essential for computing a monthly budget based on those expenses.
In contrast, a conventional DBMS typically confines itself to storing only the
monthly expenses. An exemplary illustration of the efficacy of this approach
can be found in Skype, the renowned Internet phone service, which has found
great satisfaction in employing an object-oriented database derived from
PostgreSQL. The inherent object-oriented nature of this database empowered
Skype to refine and expand its database as the company scaled and evolved.
Object-oriented databases prove particularly advantageous when dealing with
intricate data that necessitates rapid and efficient processing.
91
practical terms, a sales clerk could transmit a message to the object-oriented
database, instructing it to calculate the sales tax for a new order. Many object-
06
oriented databases feature their unique query language, known as the 'object
query language' (OQL), which bears similarities to SQL, as previously
10
discussed.
40
An object-oriented database relies on an object-oriented database management
system (OODBMS) to furnish a user interface and establish connections with
51
91
4.7.7 Visual, Audio, and Other Database Systems
06
Organizations are realizing the importance of managing large amounts of visual
and audio signals, in addition to raw data. A good example is credit card
10
companies, which use scanners to input images of charge slips into an image
database for efficient management. These images are then stored within the
40
database and subsequently organized by customer name, allowing for printing
and inclusion with monthly statements. Similarly, medical professionals employ
51
image databases to store and transmit x-rays to clinics distant from the primary
hospital. Image databases also find utility in the realms of financial services,
50
The amalgamation and analysis of data from diverse databases pose a growing
challenge. Global corporations, for example, sometimes require the analysis of
sales and accounting data stored in disparate database systems worldwide.
Companies such as IBM have responded by developing virtual database
systems, enabling the seamless collaboration of different databases as a unified
system. This merging of separate databases is sometimes referred to as a
federated database system. Lloyd's of London, a globally acclaimed insurer,
In addition to visual, audio, and virtual databases, there are other specialized
91
database systems tailored to meet specific business needs. Spatial data
technology, for instance, involves the use of a database to store and access data
06
based on their respective geographical locations, facilitating spatial queries and
analysis. Notably, MapInfo software by Pitney Bowes is utilized by businesses
10
like Home Depot, Sonic Restaurants, CVS Corporation, and Chico's to make
informed decisions about the optimal placement of new stores and restaurants
40
based on geospatial demographics. It also aids law enforcement agencies and
emergency response teams in disaster preparedness and community protection.
51
The software supplies insights into local competition, population trends, and
traffic patterns, predicting a business's performance in a given location.
Furthermore, builders and insurance companies rely on spatial data to inform
50
decisions related to natural hazards. Spatial data technology can even enhance
financial risk management by organizing information according to investment
30
type, currency, interest rates, and time. This technology proves invaluable in
geographic information systems (GIS), enabling the visualization of data on
maps
Chapter 5
91
Developing Business
06
Solutions
10
40
51
50
30
91
How would you approach this challenge? Would you simply dive in, hoping to
stumble upon a workable solution? How can you ensure that your solution aligns
06
with your company's needs? Is there a structured method for tackling this?
Indeed, there is – it's known as the systems approach.
10
When applied to crafting information systems solutions for business challenges,
40
this problem-solving approach is termed "information systems development" or
"application development." This section elucidates how the systems approach
51
91
The development of most computer-based information systems adheres to a
06
structured development process. As depicted in Figure 5.1, a comprehensive IS
development cycle encompasses numerous essential tasks that must be executed
10
and managed. Within this development framework, end users and information
specialists collaborate to design information system applications based on a
40
thorough analysis of an organization's business requirements. Other critical
activities include assessing the economic and technical viability of proposed
51
along with other disciplines such as personal mastery, mental models, shared
vision, and team learning, is crucial for personal fulfillment and business
triumph in an ever-evolving world. Systems thinking essentially involves
"seeing the forest and the trees" in any given scenario by:
¥ Recognizing interconnections among systems instead of linear cause-
91
and-effect sequences when events transpire.
¥ Discerning processes of change amid systems rather than isolated
06
"snapshots" of change during transitions.
10
One way to cultivate systems thinking is by identifying systems, subsystems,
and constituent components within any scenario under scrutiny. This approach
40
is also known as adopting a systems context or maintaining a systemic outlook.
For instance, when encountering a problem or opportunity within a business
51
functions are adequately performed. Refer to Figure 5.2 for visual clarity.
30
The overall process for designing and implementing information systems within
organizations is referred to as "systems analysis and design" (SA&D). This
91
process encompasses activities such as identifying business problems,
proposing information system solutions to address one or more identified issues,
06
and devising and executing the proposed solution to achieve the organization's
goals.
10
Today, several approaches to SA&D exist, with object-oriented analysis and
design and the life cycle approach being the most prevalent. Although each
40
approach has its merits and drawbacks and diverges in various aspects, they all
revolve around the analysis and design of a successful information system. The
51
choice between these approaches often hinges on the nature of the system under
examination and the clarity of user-defined needs and requirements.
50
understanding the core principles of the two primary approaches will facilitate
comprehension of nuances in others. Regardless of the approach's name or
specifics, the fundamental concerns remain constant. Thus, this text
concentrates on the life cycle approach as it serves as the foundation for all other
methods.
One method within the systems approach, and the one most prevalent in
organizational systems analysis and design, is a multi-step, iterative process
known as the systems development life cycle (SDLC). Figure 5.3 illustrates the
activities within each stage of this process: investigation, analysis, design,
implementation, and maintenance.
91
06
10
40
51
50
30
It's essential to realize that all SDLC activities are closely intertwined and reliant
on each other. Consequently, in practical terms, multiple developmental
activities may occur concurrently, and certain tasks within a given step may be
revisited. Hence, both users and systems analysts may revisit previous activities
to refine and enhance a system in development.
We delve into the activities and outcomes of each step in the systems
development cycle in this chapter. Questions like "Do we have business
91
opportunities? What are our business priorities? How can information
technologies provide information system solutions that address our business
06
priorities?" are central to the systems investigation stage – the initial phase in
the systems development process. This stage might entail assessing proposals
10
generated during a company's business/IT planning. Typically, the IT function
conducts feasibility studies to assess proposed information system solutions
40
aligned with a company's business priorities and opportunities outlined in its
strategic planning.
51
Given the potentially high costs associated with development, the systems
50
91
preliminary feasibility study before deciding on a solution. However, alternative
approaches can also be evaluated, provided that skipping the initial step is
06
carefully justified.
10
Therefore, the main objective of conducting a preliminary feasibility study is to
evaluate various system options and determine the most practical and desirable
40
business application for future development. The feasibility of a proposed
business system can be assessed by analyzing five major categories, as
51
91
during the proposal phase. In the initial phases of the operational feasibility
assessment, our primary concern is to ascertain whether the identified problem
06
warrants a solution or if the proposed solution effectively addresses the issue at
hand. Additionally, we must initially evaluate the feasibility of the project
10
schedule—can we identify and resolve the problem within a reasonable
timeframe? In the later stages of operational feasibility assessment, particularly
40
during the physical design phase of the SDLC, our focus shifts to strategic
compatibility and organizational impact. This involves assessing the extent to
51
system.
The economic feasibility assessment aims to determine the degree to which the
30
proposed system will yield positive economic benefits for the organization. This
assessment involves identifying and quantifying all anticipated benefits from
the system and explicitly outlining all projected project costs. During the early
stages of the project, it's often impossible to accurately define and assess all
benefits and costs associated with the new system. Therefore, the economic
feasibility assessment remains an ongoing process, constantly weighing
definable short-term costs against definable long-term benefits. If a project
cannot be deemed economically feasible based on concrete costs, it should not
proceed, regardless of the outcomes of other assessment categories.
91
development and implementation. Intangible costs are challenging to quantify
and may encompass factors like the loss of customer goodwill or employee
06
morale due to errors and disruptions caused by implementing a new system.
10
Tangible benefits are positive outcomes, such as reduced payroll costs through
personnel reduction or lowered inventory carrying costs due to reduced
40
inventory levels. Intangible benefits are more challenging to estimate and
encompass advantages like improved customer service or faster, more accurate
51
information for management. Figure 5.5 provides a list of typical tangible and
intangible benefits with accompanying examples. Tangible and intangible costs
would be the opposite of each corresponding benefit.
50
30
91
system's needs. If the current technology is deemed adequate, the project's
technical feasibility is clear. However, if not, the analyst must determine if the
06
necessary technology exists, with a key concern being the stability of such
technology. Despite vendor claims, the analyst must accurately assess the extent
10
to which the required technology exists in a form suitable for the proposed
project. Refer to Figure 5.6 for further details.
40
51
50
30
Figure 5.6: Examples of how a feasibility study might measure the feasibility of a proposed
e-commerce system for a business
91
not offer support. In this category, we assess the level of resistance to the
proposed system, the perceived role of end users in the development process,
06
the degree of change the new system will introduce to end users' work
environments, and the current state of available human resources for project
10
execution and post-implementation system management and utilization.
40
The legal/political feasibility assessment for a proposed project involves a
thorough analysis of potential legal implications arising from the construction
51
and implementation of the new system. Legal issues may include copyright or
patent violations, breaches of antitrust laws, foreign trade restrictions, or
existing contractual obligations of the organization. On the political side, this
50
91
management structure, business activities, environmental systems, and existing
information systems. Detailed insight into specific business units or end-user
06
workgroups affected by the proposed system, such as a chain of department
stores implementing a new inventory control system, is essential. Consequently,
10
business end users are often integrated into systems development teams.
timing, volume, and quality is essential for effective end-user interaction with a
computer-based system. The systems design stage then specifies the necessary
30
resources, products, and activities to support the user interface in the system
being designed.
One of the primary activities in the analysis phase is constructing a logical model
of the current system. The logical model serves as a blueprint, representing what
the current system does without focusing on how it accomplishes tasks.
Constructing this logical model aids in comprehending the system's processes,
functions, and data, regardless of hardware or software concerns. Additionally,
non-computer components are included, analyzed, and understood within the
logical model.
91
storage, control). The primary goal is to identify what should be done, leaving
the 'how' to the design stage. Once this step is complete, a set of functional
06
requirements for the proposed new system is established. Functional
requirements are end-user information needs that aren't tied to specific
10
hardware, software, network, data, or people resources, which are determined in
the design stage.
40
5.2.3 Systems Design Phase
51
After completing the analysis phase of the life cycle, the systems design process
commences. This phase involves refining the logical model of the existing
50
system until it serves as the blueprint for the new system. This revised logical
model defines the functionality of the upcoming system. During the physical
30
design stage within this phase, users and analysts collaborate to determine how
the system will achieve its objectives. This is where matters related to hardware,
software, networking, data storage, security, and various other aspects are
deliberated and resolved. Consequently, systems design encompasses the design
activities that ultimately yield concrete system specifications, aligning with the
functional requirements established during the systems analysis phase.
91
06
Figure 5.7: Systems design
10
prototyping approach, involving the rapid creation and testing of working
models or prototypes of new applications. This interactive, iterative process
40
facilitates collaboration between IS specialists and business professionals,
making the development process more efficient, particularly for projects with
51
adoption of agile systems development (ASD). Refer to Figure 5.8 for further
details.
30
Prototyping can be applied to both small and large applications. Large business
systems typically adhere to a traditional development approach, but prototyping
may still be employed for specific components. For instance, a prototype of a
business application needed by an end user can be rapidly developed using
various application development tools. This prototype is then refined iteratively
until it meets acceptance criteria.
91
06
10
40
51
Let's delve deeper into user interface design, which holds significance as it is
the system component closest to business end users, and they are likely to be
involved in its design. The user interface design activity centers on facilitating
interactions between end users and computer-based applications. Designers
focus on crafting user-friendly and efficient forms of user input and output, such
91
as user-friendly Internet or intranet web pages.
06
As mentioned earlier, user interface design frequently adopts a prototyping
approach, wherein working prototypes of user interface methods are designed
10
and refined based on feedback from end users. This process results in detailed
design specifications for information products, encompassing elements such as
40
display screens, interactive user/computer dialogues (including the sequence or
flow of dialogue), audio responses, forms, documents, and reports.
51
91
well as guidance in analyzing, designing, and implementing your IT business
application. Meanwhile, IS professionals are available to consult as needed.
06
It's crucial to bear in mind that end-user development should center on the
10
fundamental activities inherent to any information system: input, processing,
output, storage, and control, as elucidated in Chapter 1. When evaluating a
40
prospective application, the primary focus should be on the desired output it will
generate. What information is necessary, and in what format should it be
presented? Subsequently, scrutinize the input data that the application will
51
require. What data is available, and from which sources? In what format does it
exist? Next, delve into the processing requirements, understanding the
50
In certain cases, you may find that the expected output cannot be produced using
the available inputs. In such scenarios, adjustments to the expected output or the
acquisition of additional input sources, including data from external files and
databases, may be necessary. The significance of the storage component varies
depending on the nature and scope of end-user applications. Some applications
heavily rely on stored data or necessitate the creation of data for future use,
making them better suited for database management development projects
rather than spreadsheet applications.
91
like cell protection in spreadsheets are employed to prevent unintentional
erasure of critical cells by users.
06
End-user development empowers you and other business professionals to devise
10
new or enhanced methods for executing your responsibilities without direct
involvement from IS specialists. The built-in application development
40
capabilities in various end-user software packages have simplified the process
of creating computer-based solutions. For example, Figure 5.9 illustrates a web
51
development tool that you could utilize to create, update, and manage an intranet
web page for your business unit. Alternatively, you might employ an electronic
spreadsheet package to craft a tool for analyzing weekly sales results for your
50
References
[1] Patricia Wallace [May 4, 2020]. Introduction to Information Systems 4th
Edition.
91
Information Systems 9th Edition.
[3] R. Kelly Rainer and Brad Prince [Dec 17, 2019]. Introduction to
06
Information Systems 8th Edition.
[4] Eric Frick [Nov 13, 2019]. Information Technology Essentials Volume 1:
10
Introduction to Information Systems.
[6] Ralph Stair and George Reynolds [Jan 1, 2017]. Principles of Information
51
[7] R. Kelly Rainer, Brad Prince, et al. [Nov 11, 2013]. Introduction to
50
References
-156 -
91
Ministry of State and Administrative Development. She is currently a
Professor at the Faculty of Computers and Artificial Intelligence, at
Helwan University. She has supervised many master’s and Ph.D.
theses. Her research interests include big-data analytics, data mining,
06
and evaluation methodologies. She is a reviewer of many information
systems journals. She has published more than 50 papers, for more information about her
publications see:
1.
2.
3.
Web of Science ResearcherID: ABD-8146-2021
Scopus AU-ID ( "Abdel-Fattah, Manal A." 55545556200 )
https://orcid.org/0000-0002-2888-0367
10
40
4. https://scholar.google.com/citations?user=Seje_KAAAAAJ
51
ﻣﻨﺎل ﻋﺒﺪاﻟﻘﺎدر ﻋﺒﺪاﻟﻔﺘﺎح ﺣﺼﻠﺖ ﻋﻠﻲ اﻟﺪﻛﺘﻮراه ﻣﻦ ﻛﻠﯿﺔ اﻟﺤﺎﺳﺒﺎت واﻟﻤﻌﻠﻮﻣﺎت – ﻗﺴﻢ ﻧﻈﻢ
و ﻋ ﻤ ﻠﺖ ﻛ ﺎ ﺳ ﺘ ﺸ ﺎ ر ي ﺗ ﻄ ﻮ ﯾﺮ ا ﻟ ﻌ ﻤ ﻞ ﻓ ﻲ ﻣ ﻌ ﮭ ﺪ ا ﻹ د ا ر ة ا ﻟ ﺘ ﺎ ﺑﻊ ﻟﻮ ز ا ر ة ا ﻟ ﺘ ﻨ ﻤ ﯿ ﺔ، ا ﻟ ﻤ ﻌ ﻠﻮ ﻣ ﺎ ت ﺟ ﺎ ﻣ ﻌ ﺔ ا ﻟ ﻘ ﺎ ھ ﺮ ة
50
و ﻟﮭ ﺎ ا ﻟﻌ ﺪ ﯾﺪ ﻣﻦ ا ﻟﺨ ﺒﺮ ا ت، ﻛ ﻤ ﺎ ﺷ ﻐ ﻠ ﺖ ﻣ ﻨ ﺼ ﺐ ﻣ ﺪ ﯾﺮ ﻣ ﺸ ﺮ و ﻋ ﺎ ت ﺑﻮ ز ار ة ا ﻟ ﺘ ﻨ ﻤ ﯿ ﺔ اﻹ د ار ﯾ ﺔ، ا ﻹ د ا ر ﯾ ﺔ
ﺗﺸﻐﻞ ﺣﺎﻟﯿﺎ وﻛﯿﻞ ﻛﻠﯿﺔ اﻟﺤﺎﺳﺒﺎت واﻟﺬﻛﺎء اﻻﺻﻄﻨﺎﻋﻲ ﻟﺸﺌﻮن اﻟﺘﻌﻠﯿﻢ واﻟﻄﻼب وأﺳﺘﺎذ،اﻟﻌﻤﻠﯿﺔ
30
وھﻲ، وﻗﺪ ﻗﺎﻣﺖ ﺑﺎﻹﺷﺮاف ﻋﻠﻲ اﻟﻌﺪﯾﺪ ﻣﻦ رﺳﺎﺋﻞ اﻟﻤﺎﺟﺴﺘﯿﺮ واﻟﺪﻛﺘﻮراه،ﺑﻘﺴﻢ ﻧﻈﻢ اﻟﻤﻌﻠﻮﻣﺎت
ﺣ ﯿﺚ ﻗﺎ ﻣ ﺖ، ﻓ ﻀ ﻼ ﻋ ﻦ أ ﻧﮭ ﺎ ﻟﮭ ﺎ ا ﻟﻌ ﺪ ﯾﺪ ﻣﻦ ا ﻟﻤﺆ ﻟﻔﺎ ت ا ﻟﻌ ﻠﻤ ﯿﺔ،ﻣﺮ ا ﺟ ﻊ ﻟﻠﻌ ﺪ ﯾﺪ ﻣﻦ ا ﻟﻤ ﺠ ﻼ ت ا ﻟﻌ ﻠﻤ ﯿﺔ
. ﺑﺤﺚ وﯾﻤﻜﻦ اﻻطﻼع ﻋﻠﻲ أﺑﺤﺎﺛﮭﺎ ﻣﻦ ﺧﻼل اﻟﺮواﺑﻂ ﺑﺄﻋﻠﻰ٥٠ ﺑﻨﺸﺮ ﻣﺎ ﯾﻔﻮق