RSS

Review & Summarize Part 1 !!


Chapter 1 is explaining about the information technology, and the user and also the internet. As on the textbook, there are 5 important parts of an information system: people, procedure, software, hardware and also the data. The five component of it explain how the each of the part play its role in creating an interface to the user and ease the use of the information system.  As I finished learning this chapter, I can clearly differentiate various types of software, hardware and data. Learned the method of using them which can benefit the users.

Chapter 2- The Internet, the Web and Electric Commerce

After I study and learned the chapter 2, The Internet, The Web, and Electronic Commerce.

I have well understanding in the history, function of internet, web and also electronic commerce. This chapter give me the more deep in knowledge concern the various type of internet, web, internet commerce. During our daily, internet had become a need and must to reach our demand. For example, we use email to communicate with friend abroad, web surfing to gain something important, and also using electronic commerce to buy and sold things over the Internet.  Besides that, I also learned about the search engine, type of search engine, and currently which companies provide each of them. After knowing it, I can perform better when I choose the right search engine to fulfill my need. To make the web browsing safer and easier, there are many utilizes can do the functions. For example, an internet security suite can protect our details from being hacked by someone through the internet.  At last, this chapter is very important as a foundation to understand the basic concepts of the internet, web and also e-commerce.

Chapter 3- Basic Application Software

Chapter 3 is about the explanations of the basic application software. As general, there are word processors, spreadsheets and also database management systems, presentation graphics and also software suite.  Example of the word processors software, there is Microsoft word. It allows us to create text-based document. The spreadsheet software such as Microsoft Excel which was able to manipulate numeric data. The database management systems such Microsoft Access, it can establishes a structure for data storage and management. All the above software replaces the traditional method we used to and do it by electronic way. It can benefit us by more efficiency in doing works, more emphasize on quality and quantity. So that, we can improve and enhance our personal skills to be successful in the future by made use of the new technology.

Chapter 4- Specialized Application Software

Chapter 4 is about the specialized application software. The rapid growths of the specialized application software make us possible to perform advance tasks at home. For example, we can create our own website at anywhere with the availability of computer. We also can create movie using audio and video editing software. Because of that, we can DIY (do it own) and learn the skills. Exists of robot indeed ease our human life. For instance, the robots used in the factory maximize the quantity of production and the mobile robot can move and perform tasks. Conclusion, the specialized application software indeed change our style of style into a multimedia and technology based society.

Chapter 5- System Software

System software works with end users, application programs, and computer hardware to handle many details relating to computer operations. Have 4 kinds of system program that is operating systems, utilities, device drivers, and language translators. Operating systems is coordinate resources, provide an interface between users and the computer, and run programs. Got 3 categories of operating systems that are embedded, network (NOS), and stand-alone (desktop). Windows, Mac OS, and UNIX and LINUX were the examples of operating systems. The utilities perform specific tasks related to managing computer resources. The most essential are troubleshooting (diagnostic), antivirus, uninstall, backup, and file compression. The device drivers allow particular input or output devices to communicate with the rest of the computer system. The language translators convert programming instructions written by programmers into a language that computers can understand and process.

Chapter 6- The System Unit

System unit contains electronic components. Have 4 basic types of system unit is desktop, notebook, tablet PC, and handheld. The system board also can called motherboard is connect all system components and allows input and output devices to communicate with the system unit. It covered with sockets, slots and bus lines. Microprocessor is a single chip that contains the CPU or microprocessor. Microprocessor has 2 basic components that are control unit and Arithmetic-logic unit (ALU). Memory can hold data, instructions, and information. It has 3 types of memory chips that are RAM, ROM, and flash memory. Computers allow users to expand their system by providing expansion slots on their system boards to accept expansion cards. Expansion cards include graphics cards, sound cards, modem cards, network interface cards (NIC; network adapter cards), TV tuner cards, and Express Cards. The bus lines, also called buses, it provide data pathways that connect various system components.  Ports are connecting sockets on the outside of the system unit. It separate to standard ports and specialized ports. Have 4 standard ports that is serial, parallel, USB, and firewire. Specialized ports also have 4 that are S/PDIF, HDMI, MIDI and IrDA.

Chapter 7- Input and Output

Input is any data or instructions used by a computer. It translates words, images, and actions into a form a computer can process. Examples of input devices are keyboards, mouse, touch screens, joysticks, light pens, stylus, and scanners. Output is data or information processed by a computer. It translates processed text, graphics, audio, and video into a form human can understand. Examples of output devices are monitors, printers, and speakers. The combination devices combine input and output capabilities. Example of the combination devices is fax machines, multifunctional devices, and internet telephones.

Chapter 8- Secondary Storage

RAM is the primary storage and is volatile while secondary storage provides nonvolatile storage. Secondary storage retains data and information after the computer system is turned off. Important characteristics of secondary storage include media, capacity, storage devices, and access speed. Hard disks, solid-state storage, and optical discs are the type of secondary storage. Hard disks got 2 types that are internal hard disks and external hard drives. Flash memory and USB drives are the types of solid-state storage. Compact disc (CD), digital versatile disc (DVD), and high-definition discs are the types of optical discs. The other types of secondary storage are internet hard drives, floppy disks, and magnetic tape.

References from
Computing Essentials Complete 2010 by Timothy J.O'Leary and Linda I.O'Leary from McGRAW Hill.

Review & Summarize Part 2 !!



Chapter 9- Communications and Networks

We experiences communication every day in everywhere with people around us. Our communication system changes with the rapid change of technology. There are many communication systems such as email, instant messaging, internet telephone and electronic commerce.

Communication systems consists 4 basic elements which are sending and receiving devices such as computer, communication channel such as coaxial cable and infrared, connection devices such as modems and data transmission specifications such as bandwidth and protocols. 

In early stage, we can only communicate when we meet face to face but now we can just communicate with computer by network system. Local area network (LANs), Wireless LANs (WLANs), Personal area network (PANs) and Wide area networks (WANs) are the network types. 

Besides that we refer to network architecture to learn how computer network is configured (Topologies) and what strategies are employed. There are six types of topologies which are bus, ring, star, tree, hybrid and mesh. Bus and ring are older and less efficient (because pass message from device to device in sequences) types topologies. For todays, star and hybrid are more commonly in uses because it less likely to break down, more efficient and better security. And mesh network is the newest and most efficient topologies. 

To share information and resources, we need strategies which terminal server, client/server network and peer to peer 3 common strategies that been used by today. 

Besides that for the organization which have bigger capacity, there using the intranets and extranets to communicate among inside such as employees and outside such as supplier. They prefer use firewall to protect their network system against external threat.

Chapter 10- Privacy and Security

Privacy and security for computer and network become important since the increasing demand in used of network. For today world there are a lot of data flow in the network systems and this do present some opportunities for business by create some business such as information resellers which collect data and sell the personal data. 

For this it also present some ethical dilemma problems such as identify theft (illegal assumption of other identity) and mistaken identity (electronic profile been switched with other). 

The snoopware which allows organization monitor employees email and the illusion of anonymity lower the level of privacy. Besides the spyware which secretly record and report individual activities such as Ad network also lower the privacy level. 

Somehow we can use antispyware to remove spyware by detects the Web bugs and monitoring software and there are some laws governing privacy matters.

Both hackers and crackers are include in computer criminals but hackers who create or improve and share programs with fellow hackers typically are not criminals but crackers who share programs designed to gain unauthorized access to computer systems typically are criminals. 

To protect the security from malware or virus, we can use antivirus to gains alert when certain viruses entre the computer systems. 

In addition the Denial of services attack (DoS) which is an attempt to shut down the computer and scams which are fraudulent acts designed to trick individuals into spending money without return are also lower the level of security. 

There are also some laws to protect against security such as Digital Millennium Copyright Act protecting the software privacy and Computer Fraud and Abuse Act help protect against data manipulation.  

In addition, we can increase our security level by encrypting, restricting access by biometric scanning devices, password and firewalls. 

Ergonomics is the study of human factors related to things people use. 

To all users computer, we need to know the correct way to sit, rest and other when using the computer to avoid injuries. This will enhance our well-being.

Besides that, we should also become a responsible user such as supporting the green pc concept and conserving energy by turn off the computer at night.

Chapter 11- Information systems

Nowadays effective manage the information flow in an organization is important to any organization. Different functions in an organization using the information to achieve different objective and goal. 

Overall there are 3 management levels which are top level, middle level and supervisor. Top level management focus on long range and overall planning, middle level management focuses on deal with strategies to successful the planning from the top level and the supervisor monitoring the activities of worker day by day. 

Different management level has different information flow. For top level management, the information flow is primarily upward from within the organization and into the organization from the outside. For middle level management, the information flow is horizontal and vertical within department and for supervisors, the information flow is vertical. 

Because the different in level of management, there is also different in information systems used in each level. For transaction processing system (TPS) which record the day to day transaction, it suitable for level supervisors. 

While for middle level management which requires does a lot of control and decision making to support the planning from the top management, they often use management information systems (MIS) which produce predetermined periodic, exception and demand reports and decision support systems (DSS) which enable managers to get answer for unanticipated questions. 

Lastly for the top level management, they prefer use executive support systems (ESS) which summarize and analyzed data in an easy way. This enable the top level management does their planning accurately without waste time. 

Besides the four information systems, there still a lot of other information systems that use to support the information worker. 

There are two types which the first is office automation systems (OAS) which used to support data workers who are involved with distribution and communication of information such as project managers and videoconferencing systems. 

The second is knowledge work systems (KWS) which used to support knowledge workers who create information such as engineers use computer aided design/ computer aided manufacturing (CAD/CAM) systems.


Chapter 12- Database

A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information.

Data is a collection of distinct pieces of information, particularly information that has been formatted (i.e., organized) in some specific way for use in analysis or making decisions.

More information about database... Can visit http://www.filemaker.com/solutions/database-basics/database-management.html...which not only computer are using database system but also Apple product such as iPhone 4 and also Ipad 1 & ipad 2...

Chapter 13- System analysis and design

Specification of an information system is given by their

    Structure: How it is organized.
    Function: What it does.
    Behavior: How it responds to events and stimuli.
    Data: Its meaning and organization.

There are many methodologies for the development of information systems: Systems Development Life Cycle (SDLC), Data Structure-Oriented design, Object-Oriented design, Prototyping, among others. We shall, however, be concerned here primarily with SDLC

The methodology SDLC is closely linked to what has come to be known as structured systems analysis & design. It involves a series of steps to be undertaken in the development of information systems as follows:

Problem definition: On receiving a request from the user for systems development, an investigation is conducted to state the problem to be solved.
Deliverables: Problem statement.

Feasibility study: The objective here is to clearly define the scope and objectives of the systems project, and to identify alternative solutions to the problem defined earlier.
Deliverables: Feasibility report.

Systems analysis phase: The present system is investigated and its specifications documented. They should contain our understanding of HOW the present system works and WHAT it does.
Deliverables: Specifications of the present system.

Systems design phase: The specifications of the present system are studied to determine what changes will be needed to incorporate the user needs not met by the system presently. The output of this phase will consist of the specifications, which must describe both WHAT the proposed system will do and HOW it will work. of the proposed system.
Deliverables: Specifications of the proposed system.

Systems construction: Programming the system, and development of user documentation for the system as well as the programs.
Deliverables: Programs, their documentation, and user manuals.

System testing & evaluation: Testing, verification and validation of the system just built.
Deliverables: Test and evaluation results and the system ready to be delivered to the user/client.

Chapter 14- Programming Languages

A digital computer language is a group of words or numbers that people use to issue commands to computers. Like human languages, computer languages use their own vocabulary and syntax (grammar) to convey specific meanings (semantics).

A low-level language is closely related to what the computer can execute directly, and is usually created for a specific computer. Examples are machine languages (sometimes called first generation languages) and second generation assembly languages.

A machine language consists of sets of numbers, letters, or symbols that the machine recognizes as an operation to be carried out and the rules for doing so. Typically each instruction carries a symbol, called a label or tag that identifies it and a memory address (location) for the data that it will use.

A computer operates on the principle of binary (base 2) numbers, with zero and one representing the two electrical states. To make it easier for programmers to write in machine language

Because machine language can be difficult to remember, assembly language was created. It uses some abbreviations of human language as symbols, such as MPY for multiply. It also uses symbolic names for memory addresses and data.

A high-level language uses very carefully defined human words as instructions. This allows use of the language on computers with different architectures (designs). The instructions must be translated into machine language before execution.

High-level, procedure-oriented languages, such as FORTRAN, COBOL, and BASIC, are procedure-oriented, meaning that they implement procedures or algorithms.

Fourth-generation languages are non-procedural and use English-like words to specify results, rather than the steps leading to the results. They are usually written for a specific application, such as for the "friendly" user interfaces that allow non-experts to use complex databases without having to learn the database language SQL (Structured Query Language).


Chapter 15- Your future and information technology

With the changing in time, there is also rapid change in information technology. Therefore we must adapt the change of technology to enable we successful survives in this world. 

The rapid change of technology brings many benefit or advantages for us such as it brings new product, new enterprises, new customer and supplier relationships through it innovation. We can have many new product and then it create a new enterprises. 

This can show from the present of network. After the network been introduced, many new enterprises such as e-banking and information reseller also been introduced. This also led to a new customer and supplier relationships because now they don’t have to meet directly but just a few clicks to make their transaction successful. It makes our life convenient. 

Because we are difference, so we do have difference view regarding the technology. Four common reactions to new technology are cynicism, naiveté, frustration and proactivity. 

For those who are cynicism, they believe that learning and using computers take time away from his or her real job. 

For naiveté, they might underestimate or overestimated the technology information. 

For those frustrated users, there are impatient and irritated about taking time to learn new technology. 

While for the proactive person, they look technology in a positive and realistic way. 

No matter how we view about the technology, we should stay current, maintain the computer competency, develop professional contacts, develop specialties, be alert for organizational change and look for innovations opportunities if we want to be a winner!!

References from
Computing Essentials Complete 2010 by Timothy J.O'Leary and Linda I.O'Leary from McGRAW Hill.