SlideShare a Scribd company logo
1 of 29
Download to read offline
4장

Hardware and Software
Dee’s Challenge

• Dee needs information system to support
  her blog
   – She must calculate costs to get approval
     • Needs to consider five components of
       information systems
        1. People: sales force and herself
        2. Procedures: for posting, accessing blog, leaving
           comments
        3. Hardware: server
        4. Software: blog software, setup
        5. Data: security


                                                              4-2
What Does a Manager Need to Know
   About Computer Hardware?

• Basic hardware categories: (IPOS)
   – Input
       • Keyboard, mouse, document scanners, bar-code
         scanners, microphones, magnetic ink readers
   – Processing
       • CPU – “the brain”
       • Main memory and cache memory
       • Special function cards
   – Output
       • Video displays, printers, audio speakers, overhead
         projectors, plotters
   – Storage
       • Magnetic disks, optical disks, magnetic tapes

                                                              4-3
What a Manager Needs to Know
   About Hardware (cont’d)




  Figure 4-1




                               4-4
What a Manager Needs to Know
   About Hardware (cont’d)




                               4-5
Computer Data
• Binary digits (bits)
   – Used to represent data
       • Bit is either zero or one
• Sizing Computer Data
   – Bytes
   – 8-bit chunk equals 1 byte
   – Size of main memory, storage devices etc.




                                                 4-6
Computer Components




                      4-7
How Does a Computer Work?

• CPU (central processing unit)
   – Transfers program or data from disk to main memory
   – Moves instruction from main memory via data channel or
     bus
   – Has small amount of fast memory called cache
      • Keeps frequently used instructions
      • Large cache makes computer fast, but is expensive
• Main memory
   – Contains program instructions
   – Contains operating system instructions




                                                              4-8
How Does a Computer Work?
            (cont’d)
• Operating system (OS)
  – Program that controls computer’s
    resources and blocks of data
  – Provides services to application programs
    and users




                                                4-9
Memory Swapping

• Why? Main memory is too small to hold all
  programs and data
• CPU loads programs from memory in
  chunks
  – Places new program into unused memory
  – If none available, the operating system will
    remove chunk being used and replace with
    requested data
  – It does slow down your computer


                                                   4-10
Why Should a Manager Care How a
       Computer Works?
• Main memory size
  – Too little means constant memory swapping
      • Slows processing
      • Need more memory if processing many programs or
        large files
• CPU speed
   – Expressed in hertz (Hz)
   – Needs more CPU if handling large spreadsheets
     or database files
   – Dual core processors for PCs
   – Quad core processors for servers


                                                          4-11
Why Should a Manager Care How a
    Computer Works? (cont’d)
• Cache and main memory are “volatile”
   – Contents lost when power is cut off

• Magnetic and optical disks are “nonvolatile”
   – Saved contents survive after power is turned off




                                                        4-12
What’s the Difference Between a
       Client and a Server?
• Client computers are used for word processing,
  spreadsheets, database access
   – Connect to servers for Web, email, database
• Servers provide service to clients
   – They are faster, larger, more powerful
   – Usually have very simple video display, if any
• Server farm
   – Large collection of coordinated servers
   – Google has several hundred thousand servers in 36 data
     centers around world



                                                              4-13
Client and Server Computers




        Figure 4-8




                              4-14
What’s the Difference Between a
    Client and Server? (cont’d)
• Grid computing
   –   Network of computers operating as if it is one computer
   –   Companies lease time on grid from IBM and others
   –   Used for intensive arithmetic computing
   –   See www-03.ibm.com/grid


• Cloud computing
   – Computing networks provided as a service on Internet
   – Example: Facebook and others




                                                                 4-15
What Does a Manager Need to Know
        about Software?
• Two fundamental types:
   1. Operating system
       •   Large, complex program that controls computer’s resources
   2. Application programs
       •   Perform specific user tasks
• Software constraints
   –   Operating systems
       •   Run only on particular types of hardware
       •   Must conform to instruction set of CPU
       •   Windows works only on Intel instruction set CPUs
   –   Application programs
       •   Written to use particular operating system



                                                                       4-16
What a Manager Needs to Know
        about Software




 Figure 4-9




                           4-17
What Are the Four Major Operating
             Systems?
1. Windows
   – Used by 85% of the world’s desktops
   – 95% of business users
   – Different versions for client computers and servers, Web
     sites, email, and so on
2. Mac OS (click)
   –   Apple Computer, Inc. developed for Macintosh computers
   –   Easy-to-use interfaces
   –   Used primarily by graphic artists and art community
   –   Runs on PowerPC processor or a MAC with Intel
       processor



                                                                4-18
What Are the Four Major Operating
        Systems? (cont’d)
1. Unix
   – Workhorse for scientific and engineering communities
   – More difficult to use than Windows or MAC
   – Not for business users
2. Linux
   – Developed by open-source community
   – No fee to use it
   – IBM has developed business systems solutions that use
     Linux




                                                             4-19
What Types Of Applications Exist and How
    Do Organizations Obtain Them?
• Application Software
  – Programs that perform a business function
  – Some are general purpose – Excel, Word
  – Some are specific purpose – QuickBooks

• Application Software Acquisition
  – Buy off-the-shelf
     • May not be a good fit
     • May need alterations
  – Custom-developed software
     • Tailor-made for organization




                                                4-20
What Is the Difference Between a Thin
          and Thick Client?
• Thin client
   – Requires nothing more than browser
   – Does not require installation and administration
     of client software
• Thick client
   – Has more code to run on it
   – More features and functions
   – More expense and administration



                                                        4-21
Thin and Thick Clients




     Figure 4-11




                         4-22
What Buying Decisions Do You Make?

• Manager’s role depends on organization’s policies
   – Large organizations have IS department that sets
     standards for hardware and software
   – Medium to small organizations less formal
      • Managers take more active role
      • Usually standardize to single client operating systems
• Managers and employees may have role in
  specifying horizontal application software
• Usually no role in specifications of server hardware
• Work with technical personnel to test and accept
  software

                                                                 4-23
Business Manager’s Role in Hardware and
         Software Specifications




       Figure 4-12




                                     4-24
What Are Viruses, Trojan Horses, and
              Worms
• Viruses
   – Computer programs that replicates themselves
   – Take unwanted and harmful actions
   – Consume computer resources
       • Payload causes unwanted activity
• Trojan horses
   – Viruses that masquerade as useful programs or files, such
     as games, MP3s, and so on
• Macro viruses
   – Attach to Word, Excel, and so on to infect documents
   – Place themselves in startup files
   – Infect every file the application creates or processes


                                                                 4-25
What Are Viruses, Trojan Horses, and
          Worms (cont’d)
• Worms
  – Viruses that propagate using Internet or network
  – Specifically programmed to spread
  – Actively use networks to spread
• Prevention
  – Patches
     • Vendor-provided security fixes for programs
     • Automatic updates or regular checks for patches




                                                         4-26
Guide: Keeping up to Speed
• Technology continues to change
• If you don’t keep up, you might not gain a
  competitive advantage
  – Managers need to understand what technology
    is needed
     • Don’t depend solely on experts
  – Develop a competitive advantage in non-
    technology areas to compensate
• Other extreme are the “technophiles”



                                                  4-27
Guide: Keeping Up to Speed (cont’d)

• What can a manager do?
  1. Don’t ignore technology
  2. Take seminars
  3. Read articles, ads
    •   C/NET, CIO.com
    •   Wall Street Journal technology articles
  4. Attend professional events
  5. Get involved as a user representative in
     technology committees


                                                  4-28
How Does the Knowledge in This
    Chapter Help Dee and You?
• Reduces the work and costs of her consultant
• Dee more confident in dealing with IT department
  and consultant
• Better able to understand consultant’s questions and
  IT department’s concerns
• Can determine:
   –   No new client hardware needed
   –   Use thin client on sales rep computers
   –   Prefer thin client on her computer
   –   Blog server software must be installed on server
   –   IT department will decide whether to run Linux or Windows
        • Then blog software will be chosen
   – Set up to be performed by either IT department or consultant
   – Needs program to author HTML

                                                                    4-29

More Related Content

What's hot (20)

ITE 101 - Week 5
ITE 101 - Week 5ITE 101 - Week 5
ITE 101 - Week 5
 
Management information system software
Management information system softwareManagement information system software
Management information system software
 
Chap15
Chap15Chap15
Chap15
 
CH004
CH004CH004
CH004
 
Chap004
Chap004Chap004
Chap004
 
Chap005
Chap005Chap005
Chap005
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
ITE 101 - Week 1
ITE 101 - Week 1ITE 101 - Week 1
ITE 101 - Week 1
 
Week 8
Week 8Week 8
Week 8
 
IS740 Chapter 04
IS740 Chapter 04IS740 Chapter 04
IS740 Chapter 04
 
ITE 101 - Week 4
ITE 101 - Week 4ITE 101 - Week 4
ITE 101 - Week 4
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Information system architecture
Information system architectureInformation system architecture
Information system architecture
 
DBA Tips and Tricks - Presentation
DBA Tips and Tricks - PresentationDBA Tips and Tricks - Presentation
DBA Tips and Tricks - Presentation
 
ITE 101 - Week 7
ITE 101 - Week 7ITE 101 - Week 7
ITE 101 - Week 7
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
IS740 Chapter 03
IS740 Chapter 03IS740 Chapter 03
IS740 Chapter 03
 
Chap01
Chap01Chap01
Chap01
 
IS740 Chapter 06
IS740 Chapter 06IS740 Chapter 06
IS740 Chapter 06
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 

Viewers also liked

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)
Sanghyeok Park
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
Sanghyeok Park
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
Sanghyeok Park
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
Sanghyeok Park
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
Sanghyeok Park
 

Viewers also liked (10)

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
 
Chap03 re
Chap03 reChap03 re
Chap03 re
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
 
Case mis ch03
Case mis ch03Case mis ch03
Case mis ch03
 
Chap02 re
Chap02 reChap02 re
Chap02 re
 
Bpmn
BpmnBpmn
Bpmn
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
 
Ch7 bpmn
Ch7 bpmnCh7 bpmn
Ch7 bpmn
 

Similar to Case mis ch04

Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
ayahye
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
Wiliam Ferraciolli
 

Similar to Case mis ch04 (20)

Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Ch 2
Ch 2Ch 2
Ch 2
 
Chapter 4 computer software
Chapter 4  computer softwareChapter 4  computer software
Chapter 4 computer software
 
Chapter_04.ppt
Chapter_04.pptChapter_04.ppt
Chapter_04.ppt
 
Operating System Unit 1
Operating System Unit 1Operating System Unit 1
Operating System Unit 1
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt
 
App softwares
App softwaresApp softwares
App softwares
 
Application Software
Application SoftwareApplication Software
Application Software
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Chap2
Chap2Chap2
Chap2
 
ERP by saeed
ERP by saeedERP by saeed
ERP by saeed
 
Erp by Mohammad Saeed Khan
Erp by Mohammad Saeed KhanErp by Mohammad Saeed Khan
Erp by Mohammad Saeed Khan
 
Chap3
Chap3Chap3
Chap3
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
ppt application softwears (getting work)
ppt application softwears (getting work)ppt application softwears (getting work)
ppt application softwears (getting work)
 
application softwares.ppt
application softwares.pptapplication softwares.ppt
application softwares.ppt
 
software
softwaresoftware
software
 

More from Sanghyeok Park

More from Sanghyeok Park (20)

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_print
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁
 
2015 creaction
2015 creaction2015 creaction
2015 creaction
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Case mis ch04

  • 2. Dee’s Challenge • Dee needs information system to support her blog – She must calculate costs to get approval • Needs to consider five components of information systems 1. People: sales force and herself 2. Procedures: for posting, accessing blog, leaving comments 3. Hardware: server 4. Software: blog software, setup 5. Data: security 4-2
  • 3. What Does a Manager Need to Know About Computer Hardware? • Basic hardware categories: (IPOS) – Input • Keyboard, mouse, document scanners, bar-code scanners, microphones, magnetic ink readers – Processing • CPU – “the brain” • Main memory and cache memory • Special function cards – Output • Video displays, printers, audio speakers, overhead projectors, plotters – Storage • Magnetic disks, optical disks, magnetic tapes 4-3
  • 4. What a Manager Needs to Know About Hardware (cont’d) Figure 4-1 4-4
  • 5. What a Manager Needs to Know About Hardware (cont’d) 4-5
  • 6. Computer Data • Binary digits (bits) – Used to represent data • Bit is either zero or one • Sizing Computer Data – Bytes – 8-bit chunk equals 1 byte – Size of main memory, storage devices etc. 4-6
  • 8. How Does a Computer Work? • CPU (central processing unit) – Transfers program or data from disk to main memory – Moves instruction from main memory via data channel or bus – Has small amount of fast memory called cache • Keeps frequently used instructions • Large cache makes computer fast, but is expensive • Main memory – Contains program instructions – Contains operating system instructions 4-8
  • 9. How Does a Computer Work? (cont’d) • Operating system (OS) – Program that controls computer’s resources and blocks of data – Provides services to application programs and users 4-9
  • 10. Memory Swapping • Why? Main memory is too small to hold all programs and data • CPU loads programs from memory in chunks – Places new program into unused memory – If none available, the operating system will remove chunk being used and replace with requested data – It does slow down your computer 4-10
  • 11. Why Should a Manager Care How a Computer Works? • Main memory size – Too little means constant memory swapping • Slows processing • Need more memory if processing many programs or large files • CPU speed – Expressed in hertz (Hz) – Needs more CPU if handling large spreadsheets or database files – Dual core processors for PCs – Quad core processors for servers 4-11
  • 12. Why Should a Manager Care How a Computer Works? (cont’d) • Cache and main memory are “volatile” – Contents lost when power is cut off • Magnetic and optical disks are “nonvolatile” – Saved contents survive after power is turned off 4-12
  • 13. What’s the Difference Between a Client and a Server? • Client computers are used for word processing, spreadsheets, database access – Connect to servers for Web, email, database • Servers provide service to clients – They are faster, larger, more powerful – Usually have very simple video display, if any • Server farm – Large collection of coordinated servers – Google has several hundred thousand servers in 36 data centers around world 4-13
  • 14. Client and Server Computers Figure 4-8 4-14
  • 15. What’s the Difference Between a Client and Server? (cont’d) • Grid computing – Network of computers operating as if it is one computer – Companies lease time on grid from IBM and others – Used for intensive arithmetic computing – See www-03.ibm.com/grid • Cloud computing – Computing networks provided as a service on Internet – Example: Facebook and others 4-15
  • 16. What Does a Manager Need to Know about Software? • Two fundamental types: 1. Operating system • Large, complex program that controls computer’s resources 2. Application programs • Perform specific user tasks • Software constraints – Operating systems • Run only on particular types of hardware • Must conform to instruction set of CPU • Windows works only on Intel instruction set CPUs – Application programs • Written to use particular operating system 4-16
  • 17. What a Manager Needs to Know about Software Figure 4-9 4-17
  • 18. What Are the Four Major Operating Systems? 1. Windows – Used by 85% of the world’s desktops – 95% of business users – Different versions for client computers and servers, Web sites, email, and so on 2. Mac OS (click) – Apple Computer, Inc. developed for Macintosh computers – Easy-to-use interfaces – Used primarily by graphic artists and art community – Runs on PowerPC processor or a MAC with Intel processor 4-18
  • 19. What Are the Four Major Operating Systems? (cont’d) 1. Unix – Workhorse for scientific and engineering communities – More difficult to use than Windows or MAC – Not for business users 2. Linux – Developed by open-source community – No fee to use it – IBM has developed business systems solutions that use Linux 4-19
  • 20. What Types Of Applications Exist and How Do Organizations Obtain Them? • Application Software – Programs that perform a business function – Some are general purpose – Excel, Word – Some are specific purpose – QuickBooks • Application Software Acquisition – Buy off-the-shelf • May not be a good fit • May need alterations – Custom-developed software • Tailor-made for organization 4-20
  • 21. What Is the Difference Between a Thin and Thick Client? • Thin client – Requires nothing more than browser – Does not require installation and administration of client software • Thick client – Has more code to run on it – More features and functions – More expense and administration 4-21
  • 22. Thin and Thick Clients Figure 4-11 4-22
  • 23. What Buying Decisions Do You Make? • Manager’s role depends on organization’s policies – Large organizations have IS department that sets standards for hardware and software – Medium to small organizations less formal • Managers take more active role • Usually standardize to single client operating systems • Managers and employees may have role in specifying horizontal application software • Usually no role in specifications of server hardware • Work with technical personnel to test and accept software 4-23
  • 24. Business Manager’s Role in Hardware and Software Specifications Figure 4-12 4-24
  • 25. What Are Viruses, Trojan Horses, and Worms • Viruses – Computer programs that replicates themselves – Take unwanted and harmful actions – Consume computer resources • Payload causes unwanted activity • Trojan horses – Viruses that masquerade as useful programs or files, such as games, MP3s, and so on • Macro viruses – Attach to Word, Excel, and so on to infect documents – Place themselves in startup files – Infect every file the application creates or processes 4-25
  • 26. What Are Viruses, Trojan Horses, and Worms (cont’d) • Worms – Viruses that propagate using Internet or network – Specifically programmed to spread – Actively use networks to spread • Prevention – Patches • Vendor-provided security fixes for programs • Automatic updates or regular checks for patches 4-26
  • 27. Guide: Keeping up to Speed • Technology continues to change • If you don’t keep up, you might not gain a competitive advantage – Managers need to understand what technology is needed • Don’t depend solely on experts – Develop a competitive advantage in non- technology areas to compensate • Other extreme are the “technophiles” 4-27
  • 28. Guide: Keeping Up to Speed (cont’d) • What can a manager do? 1. Don’t ignore technology 2. Take seminars 3. Read articles, ads • C/NET, CIO.com • Wall Street Journal technology articles 4. Attend professional events 5. Get involved as a user representative in technology committees 4-28
  • 29. How Does the Knowledge in This Chapter Help Dee and You? • Reduces the work and costs of her consultant • Dee more confident in dealing with IT department and consultant • Better able to understand consultant’s questions and IT department’s concerns • Can determine: – No new client hardware needed – Use thin client on sales rep computers – Prefer thin client on her computer – Blog server software must be installed on server – IT department will decide whether to run Linux or Windows • Then blog software will be chosen – Set up to be performed by either IT department or consultant – Needs program to author HTML 4-29