SlideShare ist ein Scribd-Unternehmen logo
1 von 35
BWIRE SEDRICK
ICT Concepts & Data
Processing
Wednesday, August 31, 2016 1Agile Computing Uganda
ICT Concepts & Data Processing
Topic Learning Outcome
 ICT and IS defined
 Data and Information defined
 Reasons for studying ICT and IS
 Data Processing defined & its cycle
 Data Processing Modes /Strategies /Methods
 Advantages & Disadvantages of each modes
 Choice of the best mode / method / strategy
Wednesday, August 31, 2016 2Agile Computing Uganda
Information defined
 Information can be defined as data that have
been converted into meaningful and useful
context for specific end users. It is processed
data which has been placed in a context that
gives it value for specific end users.
 Examples of information include a payroll
processed from number of hours worked by
an employee, accounts balances in
alphabetical order etc.
Wednesday, August 31, 2016 3Agile Computing Uganda
ICT defined:
 ICT is being defined by many scholars and
technology specialists as consisting of
hardware, software, telecommunications,
database management, and other
information processing technologies used
in computer-based information systems.
 It involves the dynamic interaction of
computer-based information systems while
telecommunications forms the backbone of
ICT.Wednesday, August 31, 2016 4Agile Computing Uganda
IS defined
 Information system is defined as any organized
combination of people, hardware, software,
communications network, and data resources
to perform the activities of input, processing,
output, and control activities that collect,
transform data resources into information
products in an organization or disseminates
information in an organization.
 Examples include:
Wednesday, August 31, 2016 5Agile Computing Uganda
Data defined
 Data are raw facts, unprocessed facts or
observations, typically about physical phenomena
or business transactions.
 Data can be stored, transmitted, and presented in
an infinite variety of forms and formats, including
numbers, words, pictures, sounds, electronic
pulses etc.
 Examples of data might include; registration
numbers of students at MUBS, account balances of
a company’s debtors etc.
Wednesday, August 31, 2016 6Agile Computing Uganda
Why Data is Critical
 TPS for gathering about internal operations
and corporate data bases to support planning
and control activities.
 Data and information about each transaction
has to be recorded so that the business can
be properly managed.
 At the planning stage, data and information is
important as a key ingredient in decision
making.
Wednesday, August 31, 2016 7Agile Computing Uganda
Cont’ Why Data is Critical
 Organizations engage in EDI. These data
become input to the TPS and may be used
to update corporate databases.
 Data is used as the main way of
measuring performance in order for a
business to succeed.
 In order to monitor progress against the
plan and control resources, we need data.
Wednesday, August 31, 2016 8Agile Computing Uganda
Information system (IS) defined
 Information system is defined as any
organized combination of people, hardware,
software, communications network, and data
resources to perform the activities of input,
processing, output, and control activities that
collect, transform data resources into
information products in an organization or
disseminates information in an organization.
 Examples of IS include:
Wednesday, August 31, 2016 9Agile Computing Uganda
Reasons for studying ICT in the
University
 To ensure ICT supports the organization’s
corporate strategy.
 To identify strategic competitive advantage
opportunities.
 Ensure linkage between business and ICT.
 Provide leadership for ICT projects.
Wednesday, August 31, 2016 10Agile Computing Uganda
Strategic Uses of ICT / IS
 Improving Business Processes and Cost Reduction.
 Promote Business Innovation.
 Locking in Customers and Suppliers.
 Creating Switching Costs.
 Raising Barrier to Entry.
 Leveraging a Strategic IT Platform.
 Developing a Strategic Information Base.
 Training. Aids in training and retaining workers using
multimedia which
Wednesday, August 31, 2016 11Agile Computing Uganda
Strategic Uses of IT
Wednesday, August 31, 2016 12
Improving
Business
Process
Promote
Business
Innovation
Locking in
Customers
and Suppliers
Use IT to
reduce costs
of doing
business
a)Use IT to
improve quality
b)Use IT to link
business to
customers and
suppliers
Use IT to
create new
products or
services
Enhance
Efficiency
Create New
Business
Opportunities
Maintain Valuable
Customers and
Relationships
Strategy
IT Role
Outcome
Agile Computing Uganda
Strategic Uses of IT Cont’
Wednesday, August 31, 2016 13
Raise
Barriers
to Entry
Build a
Strategic IT
Platform
Build a
Strategic
Information Base
Increase
amount of
investment or
complexity of
IT needed to
compete
Use IT to provide
information to
support firm’s
competitive
strategy
Leverage
investment in
IS resources
from
operational
uses to
strategic uses
Increase
Market Share
Create New
Business
Opportunities
Enhance
Organizational
Collaboration
Strategy
IT Role
Outcome
Agile Computing Uganda
Top 10 ICT Trends
 Below are the top ten (10) ICT business
trends during the past three years in
their order of dominance.
 Cloud computing, rich content,
collaboration, mobile computing, data
Security, location-based services, data
breach notification, risk reporting,
standards convergence and health IT.
Wednesday, August 31, 2016 14Agile Computing Uganda
Data Processing defined
 Data processing is the process of producing
meaningful information by collecting all items
of data together and performing operation on
them to extract the required information about
them.
 The major types of data processing modes
today are batch processing, distributed,
centralized and real-time or online processing
modes.
Wednesday, August 31, 2016 15Agile Computing Uganda
Data Processing Cycle / Process
Wednesday, August 31, 2016 16
 Origination of data which looks at the sources
of data e.g. customer orders; goods received
notes, price lists, etc.
 Preparation of data; that is, getting the data
ready for input e.g. thru sorting, editing, etc.
 Input of data which is the act of passing the
data to the processor in the processing stage.
This could be by the clerk on the computer
through the use of the keyboard.
Agile Computing Uganda
Data Processing Cycle / Process
Cont’
 Processing which includes all the necessary
operations to arrive at the end-product
(information) and to keep data up to-date.
 Lastly, output which involves the production
of the end product e.g. annual reports,
financial statements, payroll, etc.
Wednesday, August 31, 2016 17Agile Computing Uganda
Data Processing Modes /
Methods or Strategies
 Batch Processing. In batch processing,
transactions data is accumulated over a period
of time and processed periodically. Provide e.g.
 On-line Processing. This is a processing
mode whereby all the computer peripherals and
other equipments are under control of the
central processor. It describes a situation in
which computer devices are in direct
communication with the CPU. Give an
example.
Wednesday, August 31, 2016 18Agile Computing Uganda
Modes / Strategies Cont’
 Time Sharing Processing. This is a processing
mode in which case the central processor serves
two or more users with different processing tasks
or requirements. Mention where it is more
applicable in day-to-day life.
 Real-Time Processing. Real-time processing
involves immediate processing of data after a
transaction occurs. Transaction data are processed
immediately, without the delay of accumulating
them into a batch allowing the user to update the
master files immediately. Give an example.
Wednesday, August 31, 2016 19Agile Computing Uganda
Modes / Strategies Cont’
 Distributed Processing. This is a data
processing mode where the system includes
multiple computers linked by a communication
network, allowing the processing to be “distributed”
around the system. Give its characteristics.
 Centralized Processing. This involves all data
or information being processed in a central place,
such as a computer centre at Head Office. Many
users are able to access the central computer at
the same time and process data simultaneously.
Wednesday, August 31, 2016 20Agile Computing Uganda
Advantages of Batch Processing
 Relatively easy to develop.
 Timing of the reports is not necessary.
 Less processing power is required as it
deals with similar updates.
 Checks in place as part of the system is
being run.
 It’s cheaper since less hardware may
be required.
Wednesday, August 31, 2016 21Agile Computing Uganda
Disadvant. of Batch Processing
 They operate inefficiently and unreliably.
 They are inflexible and difficult to modify to
meet changing business needs.
 They cannot provide rapid access to key
information.
 Management information is often incomplete
due to out of date data.
 Often master access may not always be
available.
Wednesday, August 31, 2016 22Agile Computing Uganda
Advantages & disadvantages of
Online Processing
 The files are maintained up-to-date.
 Information is readily available for current
decisions.
 File inquiries possible through the terminals
(work-stations).
 However, these systems are complex to
develop and are costly in terms of hardware,
software, storage media, operating system
communication facilities, etc.
Wednesday, August 31, 2016 23Agile Computing Uganda
Factors Determinig Data Processing Strategies
and Methods
 The ability to have updates.
 Usage of the Computer.
 Organ’al needs & Quality of Output.
Wednesday, August 31, 2016 24Agile Computing Uganda
Factors Determinig Data Processing Strategies
and Methods Cont’
 Cost / financial ability.
 The Scale of Operation.
 Accuracy Concerns and Reliability.
 Business Size and Nature.
 Urgency in Feedback.
 Link between applications.
Wednesday, August 31, 2016 25Agile Computing Uganda
Questions:
 Distinguish between real-time and
online modes of data processing. Under
what circumstances would you prefer
one data processing mode to another?
 What is meant by information and ICT?
Briefly explain the significance of ICT to
an individual; organization, and
business organization as a whole.
Wednesday, August 31, 2016 26Agile Computing Uganda
Information Products &
Information Quality
 Information product: Information product
is the degree to which information has the
appropriate information that is useful for
users e.g. messages, reports, forms, &
graphic images.
 Information quality: Information quality is
the degree to which information has content,
form, and time characteristics that gives it
value to specific end users.
Wednesday, August 31, 2016 27Agile Computing Uganda
Characteristics/Attributes of Information
 Time Dimension: Timeliness;
currency; frequency and time period.
 Content Dimension: accuracy;
relevance; completeness; auditability;
conciseness and performance.
 Form Dimension: clarity; detail;
order; presentation and media.
Wednesday, August 31, 2016 28Agile Computing Uganda
Elements/Aspects of Information Quality or
Characteristics / Qualities of a good information
 Accurate for purpose; managers rely on
information to effectively manage their 'value-
adding' activities and free of errors.
 Currency, that is, information should be up-to-
date when it is provided.
 Communicated in an appropriate channel; for
a manager to use information effectively it
must be transmitted in the communication
process.
Wednesday, August 31, 2016 29Agile Computing Uganda
Qualities Cont’
 Understandable; managers can only use
information to good effect if they understand
its purpose.
 Relevance for purpose; information should
always be relevant to the issue being
considered.
 Auditability; that is, auditability of data refers
to the ability to verify the accuracy and
completeness of the data.
Wednesday, August 31, 2016 30Agile Computing Uganda
Qualities Cont’
 Timely; for effective decisions to be taken,
information needs to be reported to
management on a timely basis.
 Ease to understand or clarity, that is,
information should be provided in a form that
is easy to understand.
 Completeness; it is desirable that all
information required for decision making is
made available.
Wednesday, August 31, 2016 31Agile Computing Uganda
Qualities Cont’
 Communicated to the right person; managers
have a clear & defined level of responsibility &
must achieve their predetermined objectives.
 Cost-effective; the costs of providing the
information must not outweigh the 'value-
added' benefits derived from its use.
 Others include: frequency, reputable source,
volume, conciseness, performance, detail,
order, presentation, scope and media etc.
Wednesday, August 31, 2016 32Agile Computing Uganda
Computer Acquisition
 This refers to the way or method ICT products
and services can be acquired for use by
individuals or organizations.
 There are several ways for example through:
 Outright purchase
 Leasing
 Renting computer facilities
 Using an ASP
Wednesday, August 31, 2016 33Agile Computing Uganda
Computer Acquisition
 Students are advised to read and
prepare own notes in Computer
Acquisition as a topic.
Wednesday, August 31, 2016 34Agile Computing Uganda
References
Visit my facebook page Agile Computing
Uganda OR My Website
www.agilecu.com
BWIRE SEDRICK
THANK YOU
Wednesday, August 31, 2016 35Agile Computing Uganda

Weitere ähnliche Inhalte

Was ist angesagt?

Lesson 1: Foundations of Information Systems
Lesson 1: Foundations of Information SystemsLesson 1: Foundations of Information Systems
Lesson 1: Foundations of Information SystemsAngelina Njegus
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-templatejbmills1634
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
 
Data Analytics Business Intelligence
Data Analytics Business IntelligenceData Analytics Business Intelligence
Data Analytics Business IntelligenceRavikanth-BA
 
Cybersecurity digital marketing plan
Cybersecurity digital marketing planCybersecurity digital marketing plan
Cybersecurity digital marketing planRohit Philips
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Bn3wad
 
Digital Economy
Digital EconomyDigital Economy
Digital EconomyPIREH
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationKereen Tatham
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 

Was ist angesagt? (17)

Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Lesson 1: Foundations of Information Systems
Lesson 1: Foundations of Information SystemsLesson 1: Foundations of Information Systems
Lesson 1: Foundations of Information Systems
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-template
 
Pestle (Environmental analysis) - overview
Pestle  (Environmental analysis)  - overviewPestle  (Environmental analysis)  - overview
Pestle (Environmental analysis) - overview
 
Chapter 6 MIS
Chapter 6 MISChapter 6 MIS
Chapter 6 MIS
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
Data Analytics Business Intelligence
Data Analytics Business IntelligenceData Analytics Business Intelligence
Data Analytics Business Intelligence
 
Cybersecurity digital marketing plan
Cybersecurity digital marketing planCybersecurity digital marketing plan
Cybersecurity digital marketing plan
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)Ch02 A decision support system (DSS)
Ch02 A decision support system (DSS)
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems Presentation
 
Information System Management - Architecture and Infrastructure
Information System Management - Architecture and InfrastructureInformation System Management - Architecture and Infrastructure
Information System Management - Architecture and Infrastructure
 
Chapter 7 MIS
Chapter 7 MISChapter 7 MIS
Chapter 7 MIS
 
Information security
Information securityInformation security
Information security
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 

Andere mochten auch

Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development processRiant Soft
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inclistergc
 
Gaap concepts and importance of accounting
Gaap concepts and importance of accountingGaap concepts and importance of accounting
Gaap concepts and importance of accountingIshita Shah
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesRishabh Dangwal
 
ICT Roles in Media Print Industry
ICT Roles in Media Print IndustryICT Roles in Media Print Industry
ICT Roles in Media Print IndustryRichardus Indrajit
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LANAhmar Hashmi
 
Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4cikgushaharizan
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & controlbwire sedrick
 
Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsImran Waris
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methodsnizam143
 

Andere mochten auch (20)

Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
 
Bolum1cozumler
Bolum1cozumlerBolum1cozumler
Bolum1cozumler
 
business data processing
business data processingbusiness data processing
business data processing
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
 
Gaap concepts and importance of accounting
Gaap concepts and importance of accountingGaap concepts and importance of accounting
Gaap concepts and importance of accounting
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Chapter3
Chapter3Chapter3
Chapter3
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
ICT Roles in Media Print Industry
ICT Roles in Media Print IndustryICT Roles in Media Print Industry
ICT Roles in Media Print Industry
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systems
 
Lan wan
Lan wanLan wan
Lan wan
 
E learning slide
E learning slideE learning slide
E learning slide
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 

Ähnlich wie Principles of ict concepts and data processing

Data lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageData lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageDr. C.V. Suresh Babu
 
The art of implementing data lineage
The art of implementing data lineageThe art of implementing data lineage
The art of implementing data lineageLeigh Hill
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Science Council of America
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceSukirti Garg
 
Creating a Successful DataOps Framework for Your Business.pdf
Creating a Successful DataOps Framework for Your Business.pdfCreating a Successful DataOps Framework for Your Business.pdf
Creating a Successful DataOps Framework for Your Business.pdfEnov8
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
NI Automated Test Outlook 2016
NI Automated Test Outlook 2016NI Automated Test Outlook 2016
NI Automated Test Outlook 2016Hank Lydick
 
STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.Hank Lydick
 
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdf
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdfData Evolution in a FinTech - Bahaa Abdul Hadi.pdf
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdfBahaa Abdul Hussein
 
SplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Integrating Metrics and LogsSplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Integrating Metrics and LogsSplunk
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfKarishma Chaudhary
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET Journal
 
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSijistjournal
 
K1 embedding big data & analytics into the business to deliver sustainable value
K1 embedding big data & analytics into the business to deliver sustainable valueK1 embedding big data & analytics into the business to deliver sustainable value
K1 embedding big data & analytics into the business to deliver sustainable valueDr. Wilfred Lin (Ph.D.)
 
Data science governance and GDPR
Data science governance and GDPRData science governance and GDPR
Data science governance and GDPRAndy Petrella
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
MSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentationMSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentationAnwar Ali Mohamed
 

Ähnlich wie Principles of ict concepts and data processing (20)

Data lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storageData lakes a tool for minimizing expenditure on storage
Data lakes a tool for minimizing expenditure on storage
 
The art of implementing data lineage
The art of implementing data lineageThe art of implementing data lineage
The art of implementing data lineage
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Creating a Successful DataOps Framework for Your Business.pdf
Creating a Successful DataOps Framework for Your Business.pdfCreating a Successful DataOps Framework for Your Business.pdf
Creating a Successful DataOps Framework for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
NI Automated Test Outlook 2016
NI Automated Test Outlook 2016NI Automated Test Outlook 2016
NI Automated Test Outlook 2016
 
STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.
 
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdf
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdfData Evolution in a FinTech - Bahaa Abdul Hadi.pdf
Data Evolution in a FinTech - Bahaa Abdul Hadi.pdf
 
SplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Integrating Metrics and LogsSplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Integrating Metrics and Logs
 
Notes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdfNotes on Current trends in IT (1) (1).pdf
Notes on Current trends in IT (1) (1).pdf
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
 
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
 
K1 embedding big data & analytics into the business to deliver sustainable value
K1 embedding big data & analytics into the business to deliver sustainable valueK1 embedding big data & analytics into the business to deliver sustainable value
K1 embedding big data & analytics into the business to deliver sustainable value
 
Data science governance and GDPR
Data science governance and GDPRData science governance and GDPR
Data science governance and GDPR
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
MSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentationMSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentation
 

Mehr von bwire sedrick

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...bwire sedrick
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbookbwire sedrick
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTMLbwire sedrick
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementationbwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management processbwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overviewbwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisbwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis sparebwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsbwire sedrick
 
11 strategey implementation
11 strategey implementation11 strategey implementation
11 strategey implementationbwire sedrick
 
11 strategey implementation ppt
11 strategey implementation ppt11 strategey implementation ppt
11 strategey implementation pptbwire sedrick
 
10 portfolio analysis ppt
10 portfolio analysis ppt10 portfolio analysis ppt
10 portfolio analysis pptbwire sedrick
 
9 strategic choice ppt
9 strategic choice ppt9 strategic choice ppt
9 strategic choice pptbwire sedrick
 

Mehr von bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Osi model
Osi modelOsi model
Osi model
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 
11 strategey implementation
11 strategey implementation11 strategey implementation
11 strategey implementation
 
11 strategey implementation ppt
11 strategey implementation ppt11 strategey implementation ppt
11 strategey implementation ppt
 
10 portfolio analysis ppt
10 portfolio analysis ppt10 portfolio analysis ppt
10 portfolio analysis ppt
 
9 strategic choice ppt
9 strategic choice ppt9 strategic choice ppt
9 strategic choice ppt
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Principles of ict concepts and data processing

  • 1. BWIRE SEDRICK ICT Concepts & Data Processing Wednesday, August 31, 2016 1Agile Computing Uganda
  • 2. ICT Concepts & Data Processing Topic Learning Outcome  ICT and IS defined  Data and Information defined  Reasons for studying ICT and IS  Data Processing defined & its cycle  Data Processing Modes /Strategies /Methods  Advantages & Disadvantages of each modes  Choice of the best mode / method / strategy Wednesday, August 31, 2016 2Agile Computing Uganda
  • 3. Information defined  Information can be defined as data that have been converted into meaningful and useful context for specific end users. It is processed data which has been placed in a context that gives it value for specific end users.  Examples of information include a payroll processed from number of hours worked by an employee, accounts balances in alphabetical order etc. Wednesday, August 31, 2016 3Agile Computing Uganda
  • 4. ICT defined:  ICT is being defined by many scholars and technology specialists as consisting of hardware, software, telecommunications, database management, and other information processing technologies used in computer-based information systems.  It involves the dynamic interaction of computer-based information systems while telecommunications forms the backbone of ICT.Wednesday, August 31, 2016 4Agile Computing Uganda
  • 5. IS defined  Information system is defined as any organized combination of people, hardware, software, communications network, and data resources to perform the activities of input, processing, output, and control activities that collect, transform data resources into information products in an organization or disseminates information in an organization.  Examples include: Wednesday, August 31, 2016 5Agile Computing Uganda
  • 6. Data defined  Data are raw facts, unprocessed facts or observations, typically about physical phenomena or business transactions.  Data can be stored, transmitted, and presented in an infinite variety of forms and formats, including numbers, words, pictures, sounds, electronic pulses etc.  Examples of data might include; registration numbers of students at MUBS, account balances of a company’s debtors etc. Wednesday, August 31, 2016 6Agile Computing Uganda
  • 7. Why Data is Critical  TPS for gathering about internal operations and corporate data bases to support planning and control activities.  Data and information about each transaction has to be recorded so that the business can be properly managed.  At the planning stage, data and information is important as a key ingredient in decision making. Wednesday, August 31, 2016 7Agile Computing Uganda
  • 8. Cont’ Why Data is Critical  Organizations engage in EDI. These data become input to the TPS and may be used to update corporate databases.  Data is used as the main way of measuring performance in order for a business to succeed.  In order to monitor progress against the plan and control resources, we need data. Wednesday, August 31, 2016 8Agile Computing Uganda
  • 9. Information system (IS) defined  Information system is defined as any organized combination of people, hardware, software, communications network, and data resources to perform the activities of input, processing, output, and control activities that collect, transform data resources into information products in an organization or disseminates information in an organization.  Examples of IS include: Wednesday, August 31, 2016 9Agile Computing Uganda
  • 10. Reasons for studying ICT in the University  To ensure ICT supports the organization’s corporate strategy.  To identify strategic competitive advantage opportunities.  Ensure linkage between business and ICT.  Provide leadership for ICT projects. Wednesday, August 31, 2016 10Agile Computing Uganda
  • 11. Strategic Uses of ICT / IS  Improving Business Processes and Cost Reduction.  Promote Business Innovation.  Locking in Customers and Suppliers.  Creating Switching Costs.  Raising Barrier to Entry.  Leveraging a Strategic IT Platform.  Developing a Strategic Information Base.  Training. Aids in training and retaining workers using multimedia which Wednesday, August 31, 2016 11Agile Computing Uganda
  • 12. Strategic Uses of IT Wednesday, August 31, 2016 12 Improving Business Process Promote Business Innovation Locking in Customers and Suppliers Use IT to reduce costs of doing business a)Use IT to improve quality b)Use IT to link business to customers and suppliers Use IT to create new products or services Enhance Efficiency Create New Business Opportunities Maintain Valuable Customers and Relationships Strategy IT Role Outcome Agile Computing Uganda
  • 13. Strategic Uses of IT Cont’ Wednesday, August 31, 2016 13 Raise Barriers to Entry Build a Strategic IT Platform Build a Strategic Information Base Increase amount of investment or complexity of IT needed to compete Use IT to provide information to support firm’s competitive strategy Leverage investment in IS resources from operational uses to strategic uses Increase Market Share Create New Business Opportunities Enhance Organizational Collaboration Strategy IT Role Outcome Agile Computing Uganda
  • 14. Top 10 ICT Trends  Below are the top ten (10) ICT business trends during the past three years in their order of dominance.  Cloud computing, rich content, collaboration, mobile computing, data Security, location-based services, data breach notification, risk reporting, standards convergence and health IT. Wednesday, August 31, 2016 14Agile Computing Uganda
  • 15. Data Processing defined  Data processing is the process of producing meaningful information by collecting all items of data together and performing operation on them to extract the required information about them.  The major types of data processing modes today are batch processing, distributed, centralized and real-time or online processing modes. Wednesday, August 31, 2016 15Agile Computing Uganda
  • 16. Data Processing Cycle / Process Wednesday, August 31, 2016 16  Origination of data which looks at the sources of data e.g. customer orders; goods received notes, price lists, etc.  Preparation of data; that is, getting the data ready for input e.g. thru sorting, editing, etc.  Input of data which is the act of passing the data to the processor in the processing stage. This could be by the clerk on the computer through the use of the keyboard. Agile Computing Uganda
  • 17. Data Processing Cycle / Process Cont’  Processing which includes all the necessary operations to arrive at the end-product (information) and to keep data up to-date.  Lastly, output which involves the production of the end product e.g. annual reports, financial statements, payroll, etc. Wednesday, August 31, 2016 17Agile Computing Uganda
  • 18. Data Processing Modes / Methods or Strategies  Batch Processing. In batch processing, transactions data is accumulated over a period of time and processed periodically. Provide e.g.  On-line Processing. This is a processing mode whereby all the computer peripherals and other equipments are under control of the central processor. It describes a situation in which computer devices are in direct communication with the CPU. Give an example. Wednesday, August 31, 2016 18Agile Computing Uganda
  • 19. Modes / Strategies Cont’  Time Sharing Processing. This is a processing mode in which case the central processor serves two or more users with different processing tasks or requirements. Mention where it is more applicable in day-to-day life.  Real-Time Processing. Real-time processing involves immediate processing of data after a transaction occurs. Transaction data are processed immediately, without the delay of accumulating them into a batch allowing the user to update the master files immediately. Give an example. Wednesday, August 31, 2016 19Agile Computing Uganda
  • 20. Modes / Strategies Cont’  Distributed Processing. This is a data processing mode where the system includes multiple computers linked by a communication network, allowing the processing to be “distributed” around the system. Give its characteristics.  Centralized Processing. This involves all data or information being processed in a central place, such as a computer centre at Head Office. Many users are able to access the central computer at the same time and process data simultaneously. Wednesday, August 31, 2016 20Agile Computing Uganda
  • 21. Advantages of Batch Processing  Relatively easy to develop.  Timing of the reports is not necessary.  Less processing power is required as it deals with similar updates.  Checks in place as part of the system is being run.  It’s cheaper since less hardware may be required. Wednesday, August 31, 2016 21Agile Computing Uganda
  • 22. Disadvant. of Batch Processing  They operate inefficiently and unreliably.  They are inflexible and difficult to modify to meet changing business needs.  They cannot provide rapid access to key information.  Management information is often incomplete due to out of date data.  Often master access may not always be available. Wednesday, August 31, 2016 22Agile Computing Uganda
  • 23. Advantages & disadvantages of Online Processing  The files are maintained up-to-date.  Information is readily available for current decisions.  File inquiries possible through the terminals (work-stations).  However, these systems are complex to develop and are costly in terms of hardware, software, storage media, operating system communication facilities, etc. Wednesday, August 31, 2016 23Agile Computing Uganda
  • 24. Factors Determinig Data Processing Strategies and Methods  The ability to have updates.  Usage of the Computer.  Organ’al needs & Quality of Output. Wednesday, August 31, 2016 24Agile Computing Uganda
  • 25. Factors Determinig Data Processing Strategies and Methods Cont’  Cost / financial ability.  The Scale of Operation.  Accuracy Concerns and Reliability.  Business Size and Nature.  Urgency in Feedback.  Link between applications. Wednesday, August 31, 2016 25Agile Computing Uganda
  • 26. Questions:  Distinguish between real-time and online modes of data processing. Under what circumstances would you prefer one data processing mode to another?  What is meant by information and ICT? Briefly explain the significance of ICT to an individual; organization, and business organization as a whole. Wednesday, August 31, 2016 26Agile Computing Uganda
  • 27. Information Products & Information Quality  Information product: Information product is the degree to which information has the appropriate information that is useful for users e.g. messages, reports, forms, & graphic images.  Information quality: Information quality is the degree to which information has content, form, and time characteristics that gives it value to specific end users. Wednesday, August 31, 2016 27Agile Computing Uganda
  • 28. Characteristics/Attributes of Information  Time Dimension: Timeliness; currency; frequency and time period.  Content Dimension: accuracy; relevance; completeness; auditability; conciseness and performance.  Form Dimension: clarity; detail; order; presentation and media. Wednesday, August 31, 2016 28Agile Computing Uganda
  • 29. Elements/Aspects of Information Quality or Characteristics / Qualities of a good information  Accurate for purpose; managers rely on information to effectively manage their 'value- adding' activities and free of errors.  Currency, that is, information should be up-to- date when it is provided.  Communicated in an appropriate channel; for a manager to use information effectively it must be transmitted in the communication process. Wednesday, August 31, 2016 29Agile Computing Uganda
  • 30. Qualities Cont’  Understandable; managers can only use information to good effect if they understand its purpose.  Relevance for purpose; information should always be relevant to the issue being considered.  Auditability; that is, auditability of data refers to the ability to verify the accuracy and completeness of the data. Wednesday, August 31, 2016 30Agile Computing Uganda
  • 31. Qualities Cont’  Timely; for effective decisions to be taken, information needs to be reported to management on a timely basis.  Ease to understand or clarity, that is, information should be provided in a form that is easy to understand.  Completeness; it is desirable that all information required for decision making is made available. Wednesday, August 31, 2016 31Agile Computing Uganda
  • 32. Qualities Cont’  Communicated to the right person; managers have a clear & defined level of responsibility & must achieve their predetermined objectives.  Cost-effective; the costs of providing the information must not outweigh the 'value- added' benefits derived from its use.  Others include: frequency, reputable source, volume, conciseness, performance, detail, order, presentation, scope and media etc. Wednesday, August 31, 2016 32Agile Computing Uganda
  • 33. Computer Acquisition  This refers to the way or method ICT products and services can be acquired for use by individuals or organizations.  There are several ways for example through:  Outright purchase  Leasing  Renting computer facilities  Using an ASP Wednesday, August 31, 2016 33Agile Computing Uganda
  • 34. Computer Acquisition  Students are advised to read and prepare own notes in Computer Acquisition as a topic. Wednesday, August 31, 2016 34Agile Computing Uganda
  • 35. References Visit my facebook page Agile Computing Uganda OR My Website www.agilecu.com BWIRE SEDRICK THANK YOU Wednesday, August 31, 2016 35Agile Computing Uganda