Notes 2
Notes 2
APPLICATIONS
WPM 1104
MUTERO T
[email protected]
INTRODUCTION.....................................................3
USES OF INFORMATION TECHNOLOGY................................................................4
DATA PROCESSING.............................................16
TYPES OF PROCESSING...................................................................................................17
TYPES OF COMPUTER SYSTEMS......................................................................................19
DATABASES....................................................................................................................19
Advantages of Databases...........................................................................................21
3. COUNTIF............................................................35
Drawing Charts and graphs from given data............................................................35
1
INFORMATION SYSTEMS..................................37
INFORMATION SYSTEMS IN BUSINESS............................................................................37
Marketing Information Systems.................................................................................37
Manufacturing Information systems..........................................................................38
Accounting Information Systems...............................................................................38
Financial Information Systems..................................................................................38
2
Introduction
Closely related to information technology is an Information system, which refers to the set totality of
requirements for handling information within an organization. It can also be considered as an organized
combination of people, hardware, software, communication networks and data resource that collects, transforms
and disseminates information in an osorganization. An
information system can be manual (i.e. paper work) or informal (word of mouth), however the aspect of the
module is specifically computer based information systems that use information technology.
However inexhaustive, the applications are tailor-made to increase effectiveness at work, increase customer
satisfaction, make work easier, and increase productivity, to communicate and in general think of every sector
of the country’s economy and imagine the magnitude of contribution provided by Information Technology.
4
1. One can apply for a job, college placement or make quotations and orders via email and the mail will
reach the recipient instantly
2. Student can research on a wide range of topics by accessing information in websites across the world.
3. IT is also used to market organizations and their services
4. Managers use computer systems that are able to integrate various functions of an organization and then
assist managers in decision-making and trend forecasting.
In the end, Information Technology increases an organization’s competitive advantage, increases revenue,
reduces costs, improves quality and creates new opportunities.
Assignment
Why has your institution invested a lot in information technology? [answer should be in clear point form]
5
Computer Hardware and software
A computer is basically responsible for carrying out the tasks of accepting input, storing, and processing,
controlling and producing output. In deed a computer exists as a system not a unit with input, processing,
storage and output being the subsystems. These subsystems are not complete in their own right, in the sense that
they are thinly connected through software.
Input.
Is a means of entering data into the computer through input devices such as keyboards, joystick, touch screen,
mouse, bar code readers etc. Computers can not accept data in forms customary to human communication hence
input device convert/ or present data to the computer in a machine readable electronic or digital form (using a
series of 1s and 0s to represent numbers, letters and even voice and pictures). Hence the input unit is an
interface between the user and the computer. Input devices are often called peripheral devices
Other common forms of input are:
a) Optical character recognition translates code or marks on source documents into digital forms that are
understandable by the computer. OCR is used mostly in some supermarkets which have a hand held
reader that scans a commodity’s barcode and can then be able to deduce that type of commodity and its
price.
b) Light pen, uses photoelectric circuitry to enter data through the video screen
c) Pointing devices are among others – mouse and touch screens. The mouse uses point and click options
to select and run commands on Graphical User Interface screens. Moving a mouse corresponds to the
movement of the mouse pointer on the screen and clicking an icon runs the program that is represented
by that icon. Using a touch screen a user point on a sensitized monitor to select commands or options
other than pressing buttons on a keyboard.
d) Other input devices include scanners for reading pictures and sensors for reading analogue data like
temperature
6
Processing and Control
A computer’s control unit is responsible for fetching instructions from main storage, interprets them ant then
issues necessary signals to components making up the computer system ordering them to perform required
operations (fetch and execute cyc4les)
The Arithmetic Logic Unit of a computer is responsible for making calculations required in computer
processing. It makes comparison on data (logical calculations like >, <, >= etc) at very high speeds as part of
processing. The Arithmetic and Logic Unit Combined with the Control Unit forms the processor.
Output
Data is processed to produce output. Computer output can be sent to a printer, seen on the screen or stored in
storage device. In most information systems output comes in the form of printed or onscreen reports or audio
etc. Examples of output devices are printer, speakers and the monitor.
Video display is the most common type of computer output. Broadly these are displayed on either monochrome
(black and white) or color monitors. These differ in their resolution, which is a measure of their clarity (in terms
of smoothness of the pictures), an expression of the number of pixels per inch.
Printers produce what is commonly referred to as a hardcopy (print out).Printers can be:
a) Character printers, which imitate the operations of a typewriter by printing one character at a time by
hitting a ribbon on top of a paper, thus they are often referred to as impact printers. These printers are
slower.
b) Line printers print one line at a time and are faster than page printers. These can print pictures and
examples are inkjet printers.
c) Page printers are heavy duty fast printers which are exploited for commercial purposes and the include
laser printers. They produce high quality printouts.
7
Storage
A computer has the capability to store data that it is currently using, that will be referred to at a latter time (semi
permanent) or that starts a computer. Storage is divided into 2 namely:
Secondary / Backing Storage – stores information on devices like CDs, diskettes, Hard disk and tapes.
When one saves his essay, letter or project, he would have stored it in any one such device such that he
can refer to it any time he prefers.
HARD DISKS
One or more hard disks are found in the hard drive which
is usually housed inside a computer. Each drive is built into a
sealed unit to prevent contamination by dust and moisture. A
hard disk pack consist of several platters with data encoded
on both sides of the platters (except for the top platter’s top
part and the bottom platter’s lower part.) accessed by the
read/write heads.
FLOPPY DISKS
Are flat, rotating, 3.5” polyester film disks covered with a magnetic coating on which data is recorded. Most
common floppy disks have a capacity of 1.44Megabytes. As with hard disks, data is stored on tracks and sector
and they use direct access to locate and read a certain block of data.
Main storage stores the bootstrap loader (i.e. those programs that start running when a computer is
switched on) and active documents or programs (i.e. a running program or open document). It also
stores the operating system programs that manage the operation of a computer and the data that is being
used by the programs. The following are types of main storage
Random Access Memory (RAM), which holds instructions and data between processing, stages and
supplies them to the ALU and CU during processing. RAM looses its contents if power is switched of i.e. it
is volatile. RAM stores data and instructions requiring processing, being processed and awaiting output
hence the name working area of the computer.
Read Only Memory (ROM) stores programs that start running when a computer is switched on and holds
character patterns. ROM stores permanently and its contents are set permanently during manufacture. We
have the ROM inside the circuit board below. ROM forms part of hardware, hence the name firmware.
8
Cache memory
Cache memory is a high speed memory mainly used to complement the RAM. Cache memory is faster than
RAM and it stores frequently used pages. The cache memory is between the RAM and the CPU and the CPU
searches for data or programs in the cache first, if its not found, the CPU then searches in the RAM. The
CPU uses certain algorithms to determine which data should be stored in the cache, which will help the CPU
to predict the next instruction to be executed and hence making processing faster.
9
Logical Structure of a computer
Secondary
Storage
As depicted by the diagram above, the Central Processing Unit is made up of the Control Unit, the Arithmetic
Logic unit and the main memory. It is the unit that controls the interpretation, storage and execution of program
instructions. It contains most of the circuitry of the machine.
Main memory
Main memory is a high-speed storage unit that determines (to some extent) the speed of a computer. It includes
registers (which store one unit of data) for high-speed temporary data storage.
SOFTWARE
Software refers to various programs and their associated documentation that bring life into computer hardware
by directing its use. Software can be subdivided into system software and application software
System Software
System Software is usually supplied by the manufacturer of a given computer component. When one buys a
printer it comes with CD software that enables it to work with other system components of a computer. System
software contributes to control and performance of a computer system. System software acts behind the scenes
to manage resources and operations of a computer system. System software interfaces between computer
hardware and the application software.
An operating system
Part of the operating system is stored on a ROM chip. When the computer is
switched on, the first thing that happens is that part of the operating system
is loaded into memory. This process is called booting up. A computer cannot work
without an operating
system.
11
The greatest part of system software is the operating system (e.g. Windows) which is responsible for user
interface (i.e. the ease of communication with the computer user), resource management (i.e. ensuring proper
sharing of memory, proper use of the printer etc), file management (that controls, the creation, opening and
deleting of files) and task management in such a way that such programs allow sharing of processor time and to
allow for the running of many computing tasks at the same time.
The user interface is the way the user interacts with the computer.
Quick to operate and very flexible, but the user needs to learn Detail of a GUI interface
all the commands and type them in correctly.
Example : Windows
12
Low-level IT skills needed by the user. Easy to use intuitive
interface.
Sound Speech driven interfaces are also now available. The user talks
a command into a microphone.
Application software
Are programs that carry out specific tasks for the computer user for example Microsoft Access is for databases,
Microsoft Word is for Typing or Word-processing while Microsoft Excel is for Spreadsheets
Examples of Application
i) Word-processing packages that are responsible for creating, editing and printing of documents. The
extend their capabilities to include checking spelling and grammar, drawing tables, mail merge, print
many copies of one document, typing in various font styles, colors, underlining, inserting pictures,
plus looking for words with a similar meaning to the one typed (thesaurus)
ii) Spreadsheet packages which are specifically for analysis, planning and modeling. They are designed
for working with numbers in terms of arithmetic (addition, multiplication, subtraction, division),
sorting from the highest to the lowest or vice-versa, drawing tables, using mathematical functions
such as sine, cosine, average, randomize, to perform complex calculations such as regression.
Managers use spreadsheets in carrying what-if computations to determine the impact a certain move
or decision might have on the profitability or future of the business.
iii) Database Management Packages (e.g. Microsoft Access) are designed for handling and manipulation
of large volumes of data. Consider the example of a university that keeps each and every detail about
every student and should the data be required (i.e. in terms of fees due, results or residential status,
level, department etc) it is instantly retrieved.
iv) Finally, it should be noted that the number and variety of application packages is inexhaustible.
Some examples are accounting packages (for ledgers, trail balances), marketing packages (for sales
analysis), operations management (for inventory control), and a whole host of mathematical,
statistical and engineering packages. One such example is Eviews used by economists in regression.
13
A
14
Factors to consider before buying a software
There are many considerations to be made before one settles for a certain type of software. Generally, the
software has to be appropriate to the task; it should justify the cost as well as being affordable.
Other factors are that the software must be compatible with your hardware. Some software cannot run on IBM
machines, while running modern windows based programs without a mouse is underutilizing it. If you are
buying application software, it must work well with the system software, for example you can’t install
Microsoft Word 2000 on a machine with Windows 3.1. The software must have continued support from the
supplier for it to suit changing user requirements for example if a software was to be used to calculate tax on
goods sold, it should be changeable from sales tax to value added tax. Also software like Microsoft products has
many versions indicating responsive approach to user requirements and modernization. A simple example is
that of employees’ salaries in Zimbabwe, up to date software would allow for salaries pay slips to accommodate
even millions as a salary figure. If it was made without such a vision then maybe salaries would only be up to
say $10 000.
On the other hand, software must be easy to learn and use, it must offer help. Specifically, its advantageous to
buy software with Graphical User Interface (GUI), which is a program screen interface based on icons, menus,
windows for ease of use. It must be robust, accurate and free from errors. Software also differs in the storage
space they need. So when buying software, one has to consider the storage capacity of his machine, the size of
the RAM and the speed of the processor, so that the machine’s speed is not compromised.
Assignment
What do you understand by the terms caching and bus.
Explain the following storage devices: diskette, hard disk, Compact disk and magnetic tape.
Data Processing
All the hardware, software and telecommunications in which organizations invest a lot of money are there for
the sake of data processing to produce information.
For any system to be an efficient data processing tool it must address the following critical concerns:
Proper data entry. It should validate and verify the data for correctness and relevance. It should offer
audible error signals thus why users prefer user friendly systems in most cases those that offer Graphical
User Interface.
Data security – data should be secured so that no unauthorized person or hackers can temper with it.
This entails the use of passwords, anti- virus software, etc.
Speed – the system must be able to cope with the timely demand for results other than offering out dated
information
The system must at the same time be reliable
File organization
A system user must have a way of organizing his data so that it’s instantly available to the user as per request.
In creating a file, the user must use a name that aids remembering what the document is all about other than
using ambiguous names.
Operating systems are able to divide the storage drives into sections they can store related files (folders). Below
is a window that shows the drive C divided into folders.
15
As you can see, the folder called My Music is itself made up of subfolder Unknown and Various
ArtistsB
Types of processing
Units of data for processing such as individual customer orders are called transactions. Transactions can either
be processed either singly or in batches.
Batch Processing.
Consider the Electricity billing procedure or payroll calculation procedures. First of al, the data is gathered and
stored on some source documents. The source documents are then transferred to the central computer for
processing after some time e.g. monthly or weekly. A batch processing system is one where programs and
data are collected together in a batch before processing starts.
Batch processing is most suitable where the data needs to be captured over a certain period and processing will
then have to be done once. Batch processing is suitable for repetitive processes that needs minimum to no user
intervention when processing resumes.
Each piece of work for a batch processing system is called a job. A job usually consists of a program and the
data to be run.
Jobs are stored in job queues until the computer is ready to process them.
16
Real-time systems
Once transaction data is recorded or input, it is processed instantly and the relevant updates of file are done.
Hence the system provides up-to-date and current data. Consider the example of an airline seat reservation
system networked across Zimbabwe. Should one person book seat number 34, the system automatically updates
so that no any other person will be able to book that seat also. This is the system that most banks have which
upon making a deposit or a withdrawal, that very moment your account is updated throughout all the
banks/ATMs that can access your account.
a) Stand alone systems. – accept and processes data independently and does not communicate with other
computers
b) Centralised or Multi-access system a number of users have terminals (workstations) which are
directly linked to a central computer. The terminals are there to send and receive only, they don not
process any data.
c) Distributed systems occurs where each network computer can process data received as well as
communicate with others on an equal basis, often referred to as PEER-TO-PEER NETWORKS. All
computers are of equal importance. Software and data are stored on each computer
Databases
What is a Database?
It is an organized collection of data with minimum duplication to service many applications at the same time by
storing and managing data so that they appear to be in one location.
When a transaction occurs, e.g. a withdrawal in a bank, some data would be stored. All the data that completely
describe a transaction is called a record. E.g.
Withdrawal record
17
Account# Date Amount Cash/cheque remaining balance
A record is made up of fields. A field is a single descriptive item of a record or a transaction. All the related
records are stored in a file. The various related files and the interfaces that query or manipulate their stored data
form the database.
Rather than storing data in separate files for each application, data is stored physically to appear to users as
being stored in only one location.
A single data-base services multiple applications, for example, instead of a corporation storing employee data in
separate information systems and separate files for personnel, payroll and benefits, the corporation could create
a single common human resource database like the one in the figure below:
Integrated Human
Resource
Personnel
Database Personnel Department
Application
EMPLOYE Programmes
ES
-Names
-Address
-Social security
Database Payroll Payroll
Management Application Department
PAYROLL System Programmes
-Hours worked
-pay rate
-Gross pay
-P.A.Y.E
Benefits Benefits
BENEFITS Application Department
-Life assurance
Programmes
-Subsidise meals
-Pension plan
-Health care plan
-Retirement
benefit
-Company car
A single human database serves multiple applications and also allows a corporation to easy draw together all the
information on various applications.
The database management system acts as the interface between the application programmers’ and the data.
18
Database management system is a special software used to create and maintain a database and enable individual
business applications to extract the data they need without having to create separate files or data definitions in
their computer programmes.
Advantages of Databases
Data redundancy is reduced considerably thereby solving problems of excessive memory requirements
and inconsistencies.
Response time is faster since the can directly interact with the Database Management System
Databases offer a wide variety f security and privacy feature for organizational confidential data.
Computer Networks and The Internet
Definition of terms
1. Computer Network: is a group of connected computers that work as a single unit sharing resources like
printers or a common program, a common internet connection. For example, if 20 computers ate to be
connected in such a way as to use one printer.
2. Internet: a global network of networked computers that offer services of websites, e-mail, search
engines and file transfer protocol etc, covering millions of business, educational, and research
organizations.
Distributed systems are also used to speed up the processing of data and share work load.
19
Wireless Data is transmitted using radio, infra-red or
(Microwave, microwaves.
Infra-red,
Radio) A wireless hub receives and transmits data to each
computer. Each computer needs a special wireless
network card.
No cabling involved.
20
Explain the nature of fibre optics and coaxial cable.
What is the difference between a modem and a multiplexer?
What are distributed systems?
Network Topologies
Refer to the layout or structure of a network in terms direction of flow of data and the the controls that manage
data transmission.
Ring Network
Ring
21
Communication in a ring network occurs by a method called token passing. A ring network would have one
token, which has the ability to transmit data. Each computer is given a chance to grab the token and receive or
send a message. When a token has a message, each computer checks to see if the token is addressed to it so that
it can grab it otherwise it passes it on along the ring.
Disadvantages
If the cable develops a problem, the whole network is disrupted and is difficult to troubleshoot. It’s difficult to
implement central network security since there is no controlling computer. Some messages may go unpicked
forever thereby unnecessarily overloading the network.
Star network
All computers are connected to the hub or central computer. The hub uses a method called polling when
computers are communicating. In polling, the central computer asks each network computer if it has a message
to send. Communication is in both directions but passes through the hub.
Star
Star Network
Disadvantage
It uses too many cables so its expensive to set up. Failure of the hub disrupts all communication
Bus network
All computers are connected to one cable called the bus. When a computer wants to send a message it
first checks to see if the bus is not busy then sends. If the bus is busy, it waits for a random time and then
rechecks. The method is called Carrier Sense Multiple Access With Collision Detection (CSMA/CD)
22
Bus
Each computer is linked to a bus (cable) and there are terminators at each end of the
bus. Less cabling but can be slow if there are a large number of users.
Advantages
The network use fewer cables than star and ring so it’s cheap.
Disadvantages
If the bus fails, the whole network is disrupted. Any problem on the bus is very difficult to find and fix.
The Internet
The Internet is often referred to as the information super highway. The internet is used for information
browsing, e-mail, newsgroups, file transfer and running programs on another computer.
Information browsing
If one will go onto the internet and type the herald’s website address www.herald.co.zw he will be able to read
the latest version of the paper on the internet. It would allow one to open any one edition of the herald.
www.herald.co.zw is referred to as the URL (Uniform Resource Location), which helps the Internet browser to
locate a user’s requested page. Information browsing also includes the use of search engines e.g.
www.google.com, on which a user type some keywords specifying a search criteria and click search for the
browser to search the whole internet for the occurrence of the keyword.
23
Search the Internet
Account holder
This means that Susan has an e-mail account with a company called Yahoo.
Newsgroups
When one has one an e-mail, he may specify his areas of interest e.g. recreational, sport, food, science and
technology such that should anyone have any news he will convey it to the news group.
When you call “a” to sign up for an Internet account, make sure you get the following information:
User name
Password
24
Access phone number
Your host name and domain name
Domain Name System (DNS) server address
One also needs to have a modern Internet browser like Opera, Microsoft Internet Explorer or Netscape loaded
on the computer. Above all, the computer must be at least a Pentium I machine with a speed from 166MHz
2. The telephone line and a modem are other requirements. The modem converts a computer’s electronic
digital data into analog signals that can be transported through a telephone line when information is being sent
into the Internet and vice versa when receiving. The telephone line is the transmission media, which links the
computer to the Internet service provider. Your operating system should compatible with the Internet browser
and modern GUI operating systems support Internet
For large organizations, its ideal that they network their computers, hence more requirements. One would need
a server-based network to effect networks security and to use one connection as a gateway to the Internet.
Discuss the need of gateways, routers and in networking an organization like Midlands State
University
Students use the Internet for carrying out academic research. They mostly employ search engines like
www.google.com on which they type some keywords on the information they require and the browser searches
for websites that contain the keywords.
E-commerce is an application of the Internet that is widely gaining momentum. Businesses can now use the
Internet to make orders, market their products, request for quotations, carryout business transactions (e.g. e-
banking) from the comfort of their offices or homes.
The Internet is also being used to conduct market researches as a company talks remotely with its customers and
prospective customers.
Word-processing
Is the use of computers to type, store, edit, revise and print text data. However, with the advances in technology,
word-processing now covers aspects of checking spelling and grammar on some text, drawing tables, and mail
merge; and Dictaphone typing. Word-processing is an important application in office automation.
Modern word-processors can:
o Have a line of text adjusted to fit the margin when typing reaches the end of the line (text wrap)
25
o Copy or move a block of text from one lace to another
o Check and correct spelling and grammar on typed text
o Draw tables
o Merge documents e.g. when one wants to write one letter to 100 companies which only differ in their
addresses.
o Insert a table of contents when one has typed a long document.
Microsoft Word comes with an office assistant, which gives help and tips on how to make best use of the
package.
26
T S P
O Q
N R
M
L
H J
I K
G
These notes were prepared using a Word-processor. Make sure you can produce such a document.
27
f)
Spreadsheets
Are computer packages are computer packages for carrying out calculations on data. They are mostly used by
managers for analysis (i.e. conducting what-if analysis in which a manager changes input signals , noting their
effect on output like profit, customer reaction using mathematical and statistical models), planning, and
modeling .
A spreadsheet is made up of a grid of numbered rows and letters columns, which intersect at a cell e.g. the first
cell in the cutting below is named A1. Moving to a cell is done by clicking the cell or moving with the arrow
keys.
When calculating in Excel,
1. a formula starts with an = sign
2. one can use the cell address where a value is stored or a number or both, in a formula or function e.g.
=B2+B3+B4+B5 or =sum(B2:B5) gives the total for Maths
3. To see the result you press ENTER or move or of the current cell
On the Excel cutting below, the active cell is F2 as you can see F2 written on the name box. You can change
the name of a cell or cell by highlighting them and then typing a name on the name box. [this approach was
used in the IF function below]
Pass/fail
Excel Diagram 1
28
A Microsoft Excel spreadsheet below is used to draw a chart tat diagrammatically represent students marks,
uses a countif function to get the number of subjects passed, a sum function to get the total marks and a average
function to get each student’s average marks. Note also, that the totals are sorted in descending order.
Common spreadsheet functions
1. COUNT
Count the number of cells that contain numbers and numbers within the list of arguments.
Syntax
COUNT(value1,value2, ...)
Value1, value2, ... are 1 to 30 arguments that can contain or refer to a variety of different types of data, but
only numbers are counted.
Examples
A B
1 Name maths
2 Peter 34
3 Sam absent
4 Anna 23
5 Angie 22
6 Susanna sick
7 No OF SUBJECTS =COUNT(B2:B6)
attempted
Excel Diagram 2
=COUNT(B2:B6, 2) equals 4
2. SUM
Adds all the numbers in a range of cells.
Syntax
SUM(number1,number2, ...)
Number1, number2, ... are 1 to 30 arguments for which you want the total value or sum
SUM(A2:C2) equals 50
29
SUM(B2:E2, 15) equals 150
IF
Returns one value if a condition you specify evaluates to TRUE and another value if it evaluates to FALSE.
Syntax
IF(logical_test,value_if_true,value_if_false)
Take for example, on Excel Diagram 1, if we add a column on pass or fail, basing on the average and on that the
test was out of 50, in cell I2 we will write
=if(H2>=50,”Pass”, “Fail”)
Suppose you want to assign letter grades to numbers referenced by the name AverageScore. See the following
table.
IF(AverageScore>89,"A",IF(AverageScore>79,"B",
IF(AverageScore>69,"C",IF(AverageScore>59,"D","F"))))
In the preceding example, the second IF statement is also the value_if_false argument to the first IF statement.
Similarly, the third IF statement is the value_if_false argument to the second IF statement. For example, if the
first logical_test (Average>89) is TRUE, "A" is returned. If the first logical_test is FALSE, the second IF
statement is evaluated, and so on.
3. COUNTIF
Counts the number of cells within a range that meet the given criteria.
Syntax
COUNTIF(range,criteria)
Range is the range of cells from which you want to count cells.
30
Criteria is the criteria in the form of a number, expression, or text that defines which cells will be counted. For
example, criteria can be expressed as 32, "32", ">32", "apples".
Examples
COUNTIF(A3:A6,"apples") equals 2
COUNTIF(B3:B6,">55") equals 2
c) The dialog box below appears where you select the type of chart you want and then follow Click next
for some four steps then you Click Finish
SORTING DATA
Refers to, arranging data in either ascending or descending order. Most of the time, should you data have a
heading the data in a row or column format, you will just click the heading and then click the sort ascending
31
icon or the sort descending icon and all the data will be arranged in the preferred
order.
Assignment
Using the office assistant, explain the use and format of the following Excel functions, giving examples of
where it can be applied
Counta, count, countif, average, sum, sumif, chitest, binomdist, fv, if, power, poisson, pmt, stdev, and var
Give a situation where you can use conditional formatting and autofill
INFORMATION SYSTEMS
Is an organized combination of people, hardware, software, data communication systems and networks that
transform data into information and disseminate information within an organization.
Information Technology complements proper and efficient operations of a business though accurate, fast,
efficient and reliable customer service. It offers a strong platform of management reporting, planning,
coordinating and controlling.
Management Support Systems are information systems tailor made for decision making needs of managers. For
example a manager can use a spreadsheet to do what-if analysis when evaluating the pros and cons introducing
a new product brand basing on a certain probability distribution.
32
Information Systems In Business
T should be noted that, in business, information systems cut across the boundaries of operations support systems
and management support systems; and integrate them. Thus information system, can be useful to operational
staff and management staff but still screening the information basing on user privileges
Information Technology resources (hardware, software, and data) form a vital strategic resource of any
establishment which must be jealously guarded to ensure its safety, reliability, accuracy and integrity. Ethics
refer to the expected code of conduct within an organization both on the use of computer resources and human
resources. Hence, ethics direct an employee‘s mind towards profit through sanctioned means, ensure that
managers do not engage in fraud and abuse of funds nor convert the company’s clients for personal motive. At
the same time, data in the organization must be used for its intended purpose which itself should be legitimate.
Many other risks have befallen computers, which include computer rooms catching fire or being flooded,
computer catching getting viruses, data being incorrectly entered, data storage devices failing, and many more.
To this end, managers should put in place some controls that prevent the afore-mentioned risks or eliminate
them at all.
Administrative controls
They cover company code of practice/conduct and can be implemented through written policies and procedures;
division of functions and supervision
Through division of functions can be whereby where the Information system designers are not part of the
endusers that operate a computer system.
Input Controls
They aim to ensure proper data entry by the intended personnel, through the use of passwords so that only the
holder can benefit from the computer resources, formatted input screens and audible error signals so that data is
entered correctly. Computers should have software that verifies correctness of the data typed (validation).
34
Storage controls
There should be a control mechanism so that no everyone can access stored data. Thus documents can be access
through passwords.
Stored data may need to be stored in a separate backup copy so that, in case of that storage device failing data
can be recovered from the backup copy. Stored data can also be encrypted so that, should the wrong person
accesses it, he won’t make sense out of it. Firewall are computers that protect networked computers from
intrusion, hence they also ensure safe storage of data.
Physical protection
Security guards, buglar bars on windows video surveillance cameras, alarms, and building computer centers
above flood levels are some of the many moves to ensure physical safety of computers.
It’s totally unethical for a designated officer to divulge confidential information and distort the integrity and
accuracy of data.
When using computers at a business establishment, all members must be informed of the purpose of the
computers so that they do not speculate on their roles. Employees should be informed of the effect Information
Technology might have on their social life including making work easier as well as unemployment.
Viruses
Are programs designed to cause harm or to disturb the normal operations of a computer. To guard against
viruses a computer should be loaded with updated antiviral software, avoid using external disks and not being
on the network including the Internet.
35
Societal Implications of Information Technology
The rise of Information technology puts pressure on society members to learn and cope with the complexity of
information-based employment. At the onset Information Technology many problems as it takes considerable
effort to be comfortable with the software, network and diagnosing related problems.
The managers are very much concerned with the reliability of the computers as the software may be of
international standard but failing to address the nitty-gritties of one’s business. Managers need more
information on Information Technology use for them to confidently conduct cost-benefit analysis for the
appropriate hardware, software and network technology.
If Information technology is used to monitor employees, that must be done with their concert so that they do not
feel harassed and insecure at the workplace. This may tend to distort any motivation that a manager would offer
to the employees
Other implications of computers are many employees tend to loose their jobs due to the insurgence of
information technology based production.
Other implications are positive in that, Information technology increases customer satisfaction through a
customer having confidence in the system and being served faster.
36