Вы находитесь на странице: 1из 34

Management

Information Systems,
10/e
Raymond McLeod and George
Schell

2007 by Prentice Hall Management Information Systems, 10/e 1


Raymond McLeod and George Schell
Chapter
Chapte 5
Computing and Communications
Resources

2007 by Prentice Hall Management Information Systems, 10/e 2


Raymond McLeod and George Schell
Learning Objectives
Know the various computer components.
Know about personal computing devices.
Understand the implications of the rapid advances
in information and communication technologies.
Be familiar with input and output resources.
Recognize how different storage media differ and
the advantages of each.

2007 by Prentice Hall Management Information Systems, 10/e 3


Raymond McLeod and George Schell
Learning Objectives (Cont
(Contd)
d)
Know the advantages of prewritten software.
Understand the different computer networking
strategies.
Understand how communications over the public
telephone
p system
y and networks differ.
Know about network protocols.
Distinguish between intranets, extranets, and the
Internet.

2007 by Prentice Hall Management Information Systems, 10/e 4


Raymond McLeod and George Schell
Hardware & Processors
Mainframes adlh komputer besar untk
sistem informasi terpusat.
Microcomputers or PCs are computers
used by one person.
Processor (CPU) bertugas melakukan
pemrosesan data
Kecepatan prosesor diukur dg brp jumlah
penghitungan yang terjadi dalam satu per
detik
2007 by Prentice Hall Management Information Systems, 10/e 5
Raymond McLeod and George Schell
Processors
MHz stands for millions of cycles per
second.
Word is the measure of how many bits can
be moved with one cycle of the processor.
Word size is how many characters, A, A ,
can be moved in a single cycle of the
p
processor.
Power is affected by both word size &
processor speed.
p p
2007 by Prentice Hall Management Information Systems, 10/e 6
Raymond McLeod and George Schell
Table 5.1 Major Computer
C
Componentst

2007 by Prentice Hall Management Information Systems, 10/e 7


Raymond McLeod and George Schell
Memory & Storage
Memory (primary storage or RAM)
RAM) is
the storage area on the computers circuit
board.
Volatile
Extremely fast
Fixed storage is permanently installed in
the computer.
Removable storage media tape, disk,
CD, DVD, USB flash drive, etc.
2007 by Prentice Hall Management Information Systems, 10/e 8
Raymond McLeod and George Schell
Figure 5.2 Motherboard

2007 by Prentice Hall Management Information Systems, 10/e 9


Raymond McLeod and George Schell
Input Devices
Human
Human--captured data refers to input
captured by a person typing on a keyboard,
clicking a mouse,
mouse speaking into a
microphone, or a similar interaction.
Machine
Machine--captured data is data captured
by an electronic or mechanical device.
Point-
P i t-of
Point of-
f-sale
l terminals
t i l are scanners
used in retail stores.
2007 by Prentice Hall Management Information Systems, 10/e 10
Raymond McLeod and George Schell
Output Devices
Monitor
Screen resolution, size 17-
17-19 diagonals.
Graphic user interface (GUI)
(GUI).
Printers
Lasers are like
l k copier machines.
h
Ink
Ink--jets spray ink.
Multimedia is the use of more than 1
medium at a time.
2007 by Prentice Hall Management Information Systems, 10/e 11
Raymond McLeod and George Schell
Personal Computing Devices
Cellphones with interactive messaging &
video
Smart cell phones are phones that perform
tasks associated with PCs i.e. BlackBerry
7270 Treo 650.
7270, 650
Global Systems for Mobile
C
Communications
i ti (GSM) digital
di it l cellular
ll l
phone protocol.
2007 by Prentice Hall Management Information Systems, 10/e 12
Raymond McLeod and George Schell
Home Networks
Home computer networks assess the
Internet via cable modems or DSL
modems..
modems
Setup usually requires the modem, network
( ), wireless router.
card(s),
Wireless security uses Wired equivalent
privacy
p y (WEP
WEP)) which encrypts
yp the data
transferred between the computer &
wireless router.
2007 by Prentice Hall Management Information Systems, 10/e 13
Raymond McLeod and George Schell
Home Computing Security
Updates for OS an application software.
For security & efficiency.
Microsoft Update.
Hackers are people who try to break into
computer
co pute syste
systemss in o
order
de to
Gather information;
Denyy the owner access to his resources;;
Delete files;
Disrupt the use by the owner.
2007 by Prentice Hall Management Information Systems, 10/e 14
Raymond McLeod and George Schell
Home Computing Security (Cont
(Contd)
d)

Viruses are small computer programs that


replicate by inserting themselves into
computer resources such as programs or
files.
Worms are selfself--contained files or programs
Does not have to attach to program or file.
Can
C delete,
d l t change
h files,
fil send
d e-
e-mails,
il andd
cause problems.

2007 by Prentice Hall Management Information Systems, 10/e 15


Raymond McLeod and George Schell
Home Computing Security (Cont
(Contd)
d)

Denial
Denial--of
of--service attack is when the user
is denied access to the services of the
computer because it is overwhelmed with e e--
mail.
Antivirus software Norton,
Norton MacAfee,
MacAfee
etc. Keep virus definitions updated
Spyware
S Microsoft
Mi ft Defender,
D f d LLavasoft
ft
Ad--Aware, etc. Free from Microsoft.
Ad
2007 by Prentice Hall Management Information Systems, 10/e 16
Raymond McLeod and George Schell
Software
System software (OSOS)) performs certain
tasks that all computers require.
Hardware interfaces,, device drivers.
Manage computers processes.
OS Windows XP,, Unix,, Mac OS X,, Linux.
Application software processes the users
data.
Prewritten application software is
produced byy suppliers
p pp and sold to users.
2007 by Prentice Hall Management Information Systems, 10/e 17
Raymond McLeod and George Schell
Application Software
Custom application software is when
programmers for the business write the
software.
software
User--written software in End
User End--User
Computing is created by the useruser, such as
Excel Macros, Access Wizards.
User-
U
User -friendly
f i dl software
ft i computer
is t
software that is simple & intuitive to use.
2007 by Prentice Hall Management Information Systems, 10/e 18
Raymond McLeod and George Schell
Communications
Protocol is the specification for formatting
data to be transferred between
communications equipment.
equipment
Public connections
Telephone
T l h modems
d
Integrated Services Digital Network (ISDN)
Digitall Subscriber
S b b Line (DSL)
( S )

2007 by Prentice Hall Management Information Systems, 10/e 19


Raymond McLeod and George Schell
Table 5.4 Connecting to the Internet

2007 by Prentice Hall Management Information Systems, 10/e 20


Raymond McLeod and George Schell
Communications (Cont
(Contd)
d)
Packet is a piece of the total data to be
communicated, includes sender & receiver
addresses.
addresses
Cable modems connect to the Internet via
coaxial cable.
cable
Asynchronous transfer mode (ATM)
Improve data transmission rates.
Increased speed.
2007 by Prentice Hall Management Information Systems, 10/e 21
Raymond McLeod and George Schell
Private Line
Circuit is a connection that is always
connected.
Private line is a circuit that is always open
to your communication traffic.
T-1 line
li over 1.5
1 5 Mbps;
Mb T-3 att 43 Mb
Mbps.
Multiplexed is when the line is broken into
separate lanes of communication
communication.

2007 by Prentice Hall Management Information Systems, 10/e 22


Raymond McLeod and George Schell
Virtual Private Networks
Virtual
tua Private
ate Networks
et o s (VPNs)
( s) a
allow
o you to
use the security & speed of a private line but still
use the low
low--cost Internet.
Tunneling
T li software
f establishes
bli h theh set off
intermediary locations of the telephone equipment
that will host a given data communications
transfer.
Privacy is attained because the tunnel is not
established unless the sending & receiving
computers authenticate one another.

2007 by Prentice Hall Management Information Systems, 10/e 23


Raymond McLeod and George Schell
Communications - Networks
Open Systems Interconnection (OSI)
standard architecture for network connections
established by the ISO.
Terminal is a device that has no storage or
processor; it allows for entering & displaying data
for the computer.
Systems Network Architecture (SNA) is a
protocoll for
f large
l computers; it polls
ll other
h
computers connected by the network for transfers.

2007 by Prentice Hall Management Information Systems, 10/e 24


Raymond McLeod and George Schell
Table 5.5 OSI Reference Model

2007 by Prentice Hall Management Information Systems, 10/e 25


Raymond McLeod and George Schell
Networks (Contd)
(Cont d)
Token ring is a peer
peer--to
to--peer protocol
that allows each computer to act as its own
controller.
Ethernet is an open protocol for peer-
peer-to
to--
peer communications.
p
IEEE endorses
Data transmission crash is when two
peer computers try to send data at the
same time.
2007 by Prentice Hall Management Information Systems, 10/e 26
Raymond McLeod and George Schell
Figure 5.11 Token Ring Protocol
E
Example
l

2007 by Prentice Hall Management Information Systems, 10/e 27


Raymond McLeod and George Schell
Networks (Contd)
(Cont d)
Data packet is a piece of the total data to
be communicated, combined with the
p
address of the destination computer, , the
sending computer, and other control
information.
Transmission Control
Protocol/Internet Protocol (TCP/IP
TCP/IP))
TCP conducts communication over the network.
IP handles the packets so they can be routed.

2007 by Prentice Hall Management Information Systems, 10/e 28


Raymond McLeod and George Schell
Networks (Contd)
(Cont d)
IP address is a four-
four-part set of numbers
(each from 0 to 255), separated by periods.
Network interface card (NIC) is used to
attach a device to the communications
medium.
Local Area Networks (LANs) is a group
p
of computers and other devices that are
connected together by a communications
medium.
2007 by Prentice Hall Management Information Systems, 10/e 29
Raymond McLeod and George Schell
Table 5.6 Communications Network
H d
Hardware

2007 by Prentice Hall Management Information Systems, 10/e 30


Raymond McLeod and George Schell
Networks (Contd)
(Cont d)
Medium used by LANs can be copper wirewire,
wireless, fiber-
fiber-optics, or other media.
LANs join computers that are physically
located together.
Same
S room or b
building.
ildi
Total distance is less than mile.
60 ft.
f b between devices.
d

2007 by Prentice Hall Management Information Systems, 10/e 31


Raymond McLeod and George Schell
Networks (Contd)
(Cont d)
Metropolitan area network (MAN) is a
network that has a physical distance limit of
g y 30 miles.
roughly
Wide are networks (WANs) are used to
connect computers
p and other devices when
the distance exceeds the constraints of
LANs & MANs.
Uses common carrier, public telephone system.
WANs have been replaced by the Internet.

2007 by Prentice Hall Management Information Systems, 10/e 32


Raymond McLeod and George Schell
Internet, Intranet & Extranet
Internet is just a collection of networks
that can be joined together; Public.
Intranet uses the same network protocols
as the Internet but limits accessibility to
computer
p resources to a select group
g p of
persons in the organization.
Extranet is when the intranet is expanded
p
to include users beyond the firm; Trusted
customers & business partners.
2007 by Prentice Hall Management Information Systems, 10/e 33
Raymond McLeod and George Schell
Convergence of Computing &
C
Communications
i ti
Computing devices & communications
devices are now incorporating features of
the other into themselves.
themselves
Voice over Internet Protocol (VoIP VoIP)) is
the routing of voice communications over
the Internet as if they were digital
communications.
communications
WWW.SKYPE.COM free software

2007 by Prentice Hall Management Information Systems, 10/e 34


Raymond McLeod and George Schell

Вам также может понравиться