Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

The Basics of Information Systems
Your Interactive Guide to the Digital World Discovering Computers 2012.
Database Administration and Security Transparencies 1.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
WHAT IS RAID? Christopher J Dutra Seton Hall University.
An Overview of RAID Chris Erickson Graduate Student Department of Electrical and Computer Engineering Auburn University, Auburn, AL 36849
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Discovering Computers 2008 Chapter 14 Enterprise Computing.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals Fifth Edition Chapter 12 Enterprise Computing.
Chapter 12 Enterprise Computing. Chapter 12 Objectives Discuss the special information requirements of an enterprise-sized corporation Identify information.
1 Chapter 7 IT Infrastructures Business-Driven Technology
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7A Networking and Information Systems.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Computers Are Your Future Tenth Edition
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Living in a Digital World Discovering Computers 2010.
Chapter 14 Enterprise Computing
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Transaction Processing System
Information System and Management
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
IT infrastructure Introduction Tehran university Mahdi Faghihi 2012 In The Name of God.
IT Infrastructure Chap 1: Definition
Chapter 14 Enterprise Computing.
Using Technology to Manage Information Chapter 14.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Computerized Manufacturing Systems
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
- Ahmad Al-Ghoul Data design. 2 learning Objectives Explain data design concepts and data structures Explain data design concepts and data structures.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
1 Enterprise Requirement Planning For Manufacturing.
Information Technology INT1001 Lecture 10 Databases and Information Systems 1.
Install, configure and test ICT Networks
Learning Objectives Understand the concepts of Information systems.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Part 1 The Basics of Information Systems. Purpose of Information Systems Information systems ◦ Collects, stores and organizes information ◦ Retrieves.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
What Is Enterprise Computing?
Computers Are Your Future
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Components of information systems
Electronic Records Management Program
The Client/Server Database Environment
Information System and Management
IT INFRASTRUCTURES Business-Driven Technologies
The Basics of Information Systems
The Basics of Information Systems
Presentation transcript:

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Chapter 12A The Basics of Information Systems

12A-3 Purpose of Information Systems Information systems –Collects, stores and organizes information –Retrieves value from data –Harness many types of data –Computer’s reason for existence

Purpose of Information Systems Components of an information system –Physical means of storing information –Procedures for ensuring data integrity –Rules regarding data use and distribution –Means of distributing the data –Tools to organize the data

Types of Information Systems Office automation systems –Performs various office tasks –Allows users to efficiently handle data –Tedious tasks become simple –Built using off-the-shelf systems –Allow seamless integration of data

Types of Information Systems Transaction processing systems (TPS) –Transaction is a complete event Completed in a series of steps –Tracks and processes transactions –Each step is monitored Details sent to the appropriate person –Errors must be remedied immediately

Types of Information Systems Management information systems (MIS) –Tools for managers and decision makers –Organizes and evaluates information –Summarizes reports based on need Managers require different views of data

Management Information System

Types of Information Systems Decision support system –Organizes information for better decisions –Different data and criteria are evaluated –Often based on spreadsheet software –Provides tailored and structured reports

Types of Information Systems Expert systems –Perform tasks done by a person –Analyze data and suggest an action –Requires a large knowledge base –Inference engines Analyze the data Make the decisions

Expert System

Information Systems Technology Intranets –Private network using internet technology –Employees use to access data –Databases are stored on the Intranet –Access to outside users is blocked

Information Systems Technology Extranets –Outside access to an intranet –Goal is to simplify a process –Just-in-time inventory Manufacturer keeps little material in stock Arranges to have stock delivered daily

Information Systems Technology Virtual Private Networks –Secure connection over the Internet –Tunneling provides security Data transmitted in an encrypted packet –Employees use to work from home –Networks use to connect securely –Once established, the VPN is transparent

Virtual Private Network

Information Systems Technology Electronic data interchange (EDI) –Electronic transfer of data –Data transferred in a precise manner –Networks often share an information system –Over time can save organizations money

Information Systems Technology Data warehousing –Provides 24x7 access to data –Fault tolerant –Data security

Information Systems Technology Data scrubbing –Provides for data consistency and validity –Compares data to a set of rules Failures are repaired or removed –Should be performed at all levels Data entry Storage –As rules change data is rescrubbed

Information Systems Hardware Server farms –Collection of servers and mainframes Servers work together –Servers are either distributed or collected –Uses of server is critical

Information Systems Hardware Enterprise storage –Methods and technologies to store data –Efficiently store large amounts of data –Data is accessible at all times –RAID and NAS are two types

Information Systems Hardware RAID –Redundant Array of Inexpensive Disks –Links a number of hard drives –Provides data redundancy –Can speed access to data –RAID 0 Disk striping –RAID 1 Disk mirroring –RAID 3, 4, and 5 Disk striping with parity

RAID 1 Multiple Disk Mirror

Information Systems Hardware NAS –Network Attached Storage –Disk storage connected to network media –Disk system processes and delivers data –Storage Area Networks (SAN)

Information Systems Hardware Backup –Protects files and settings –Can restore data to an earlier point –Crucial to any information system –Transaction rollback Logs changes to a file Changes are undone when necessary –Tape backup Copies files to a tape Files need recopied when necessary

Information Systems Hardware Nonstop and redundant systems –Mission critical system –Must run 24x7 –Most information systems mission critical –Redundant systems are backup computers Backup takes over when necessary

Information Systems Hardware Scalable and interoperable systems –Scalability Defines a systems ability to grow Software and hardware grows –Interoperable systems Work with other systems Little configuration is needed

Information Systems Department Integral part of any organization Maintains equipment, software and data Enables other employees to function Requires highly trained employees Various names –Information Systems (IS) –Information Technology (IT) –Management Information Systems (MIS)

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 12A End of Chapter