This website uses cookies to ensure you have the best experience. Learn more

Computer Systems Essay

385 words - 2 pages

P4 - Describe the features and functions of information systems

Features of information systems

Information systems have five main features, which are data, people, hardware, software and telecommunications.

Data – The data input to the system has to be as accurate as possible, subject to it's cost and timescales for capture. It should then be stored in the most logical way. This often differs from how the data is input. The data then needs to be summarised to create information in a way that best meets the needs of the system's user, this may not necessarily be the most logical way or the easiest ...view middle of the document...

In larger businesses it usually runs on a server either shared or dedicated with internet or intranet access for those who need it. It is unusual to require specialised hardware.

Software – The simplest MIS can be built using standard software. However, most MIS use specialised software, which has the most common features of an MIS already built in. The developer configures this by describing the database and its structure, where the data comes from, how to summarise the data ans what standard queries will be required. The cost of the software varies widely. The cheapest offers limited functions for one PC, whereas the most expensive one is highly functional, providing high performance and many features for hundreds or thousands of users and vast amounts of data

Telecommunications – An MIS may be delivered across the internet, though this may sometimes bring difficult security questions. Many MIS are delivered across an intarnet within a company's firewall for protection from competitors and others seeking valuable management information. Occasionally a dedicated telecommunications network is used to provide the utmost security.

Functions of information systems

Information systems have four functions, which are input, storage, processing and output.

Input - Input to an information system has two parts:

There is the detailed data which is stored and processed and forms the basis for the output form the systme

Other assignments on Computer Systems

Computer Viruses Essay

1026 words - 5 pages intention of destroying or stealing information. Both crackers and hackers are having advanced network skills. A cyberterrorist is someone who uses a computer network or the Internet to destroy computer systems for political reasons. It’s similar to a terrorist attack because it requires highly skilled individuals, millions of dollars to implement and years of planning. The term cyberextortionist is someone who uses email as an offensive force

Us Programmer Layoff From Off Shoring

2582 words - 11 pages streamlining technologies that allow users to do much of the work themselves (U.S. Department of Labor, 2008). Systems analysts begin the computer application design process. They work with clients to understand requirements and map out solutions. This requires problem solving skills, mathematics and programming knowledge— traditional practices which systems analysts have always undertaken. What has changed is the need for analysts with excellent


260 words - 2 pages Background and interest: My name isI have a B.S. degree in Computer Information Science from Everest University. I’m currently employed as a Technical Support Specialist with Bay Technical Associates Inc. I served in the United States Marine Corp for four years. My interest in technology is based on the growing demand for technical professions in a wide array of industries. According to Marquardt, K (n.d.) the demand for computer systems

Secutiry Threats

452 words - 2 pages Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly

Disadvatages Of Technology In Education

970 words - 4 pages technology has developed plays a major role in these changes. From e-mail to on-line classes, computers are definitely influential in our lives, and can enhance the learning process in schools in various ways. With the increasing popularity of computer technology, it is essential for administrators to support and encourage computer technology in our education systems. Computers are important in education because they force us to reconsider how people

Unit 11 Systems Analysis And Design

326 words - 2 pages intended to single out the inputs, outputs and processes. Along with this the internal and external panels along with computer - founded and manual features makes assured the system will be safe, consistent, and precise and sustainable. In the systems design stage we have to conclude the structural design of the application. This displays systems analyst how to modification the logical design into software package modules and code. The systems

Case Study Week 1

600 words - 3 pages other activity in which our systems can still be accessed if we aren’t careful. Specifically, two harmful activities, ping sweeps and port scans can have a major impact on computer systems and can definitely cause worry if they aren’t prevented. Ping sweeps could have a major impact on computer systems because they are the first step of an intruder making his entry (Conklin, White, 2010). A ping sweep sends a ping or an ICMP echo request to the

Management Information Systems

2655 words - 11 pages Accountability and control System quality Quality of life 9 Management Information Systems Chapter 4 Ethical and Social Issues in Information Systems Understanding Ethical and Social Issues Related to Systems • Four key technology trends that raise ethical issues • Computing power doubles every 18 months • Increased reliance on, and vulnerability to, computer systems • Data storage costs rapidly declining • Multiplying databases on


1075 words - 5 pages . |Principles of Computer Science |Carol Reymolds | |Latest edition | | | |Paul Tyman | | | |3. |Computer Fundamentals |Pradeep Sinha | |Fourth edition | |4

Triumph Of The Nerds Paper

640 words - 3 pages The Triumph of the nerds Paper The first true nerds were young men who obsessed over computer programming. They would stay up for days at a time to program, not talk to anyone, smell terrible, and fell in love with computers. They developed the first more or less working computers and some applications, better operating systems and such. Nerds created programs for fun, tried to take over the computer market, and continued to expand their

Management Of Information Systems

1747 words - 7 pages Vulnerability and Abuse • An unprotected computer connected to Internet may be disabled within seconds • Security: • Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems • Controls: • Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and

Similar Documents

Market Structures In Computer Operating Systems

795 words - 4 pages Market Structures in Computer Operating Systems When purchasing a new computer the discussion on which operating system to choose does not usually come up, as there had been a monopoly in this industry since 1985 (Bellis, 2013). Microsoft with its Windows platform is a giant in the computer operating systems industry. The Microsoft Windows market structure began in an oligopolistic market, became a monopoly, and developed back into

Computer Organization Essay

1348 words - 6 pages components, their characteristics, their performance, and their instruction. There are practical implications as well. In describing computer systems, a distinguishing feature is frequently made between Computer Organization and Computer Architecture. Computer Organization explains the function and design of the various units of digital computers (displaying information as numbers rather than with hands and a dial) that store and process information

Computer Program Essay

349 words - 2 pages binary language for the computer to understand and interpret. Computer programmers are those who learn these languages and can create lines of instructions for the computer. These lines put together form a code or program. All the websites, applications, games, security systems, operating systems and possibly everything we use on a computer have a code to them. Whenever we input something from the keyboard or mouse, it is sent to the code of the

Biometrics Devices Paper

314 words - 2 pages include fingerprint readers and face recognition systems. A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. Organizations use fingerprint readers to secure doors, computers, and software. For example, a fingerprint reader can be set up to authenticate users before they can access a computer (Rossi).External fingerprint readers usually plug into a USB port. To save on desk space, some laptops include built-in