Professional Documents
Culture Documents
Purpose, Objectives
THEINTACTFRONT19 FEB 2019 2 COMMENTS
An Information System is a system that gathers data and disseminates information with the
sole purpose of providing information to its users.
The main object of an information system is to provide information to its users. Information
systems vary according to the type of users who use the system.
Information Definition
According to Wikipedia −
Information Vs Data
Data can be described as unprocessed facts and figures. Plain collected data as raw facts
cannot help in decision-making. However, data is the raw material that is organized,
structured, and interpreted to create useful information systems.
Data is defined as ‘groups of non-random symbols in the form of text, images, voice
representing quantities, action and objects’.
Information is interpreted data; created from organized, structured, and processed data in a
particular context.
In a nutshell −
The following list summarizes the five main uses of information by businesses and other
organizations −
Planning− At the planning stage, information is the most important ingredient in
decision making. Information at planning stage includes that of business resources, assets,
liabilities, plants and machineries, properties, suppliers, customers, competitors, market and
market dynamics, fiscal policy changes of the Government, emerging technologies, etc.
Recording− Business processing these days involves recording information about
each transaction or event. This information collected, stored and updated regularly at the
operational level.
Controlling− A business need to set up an information filter, so that only filtered data
is presented to the middle and top management. This ensures efficiency at the operational
level and effectiveness at the tactical and strategic level.
Measuring− A business measures its performance metrics by collecting and
analyzing sales data, cost of manufacturing, and profit earned.
Decision-making− MIS is primarily concerned with managerial decision-making,
theory of organizational behavior, and underlying human behavior in organizational context.
Decision-making information includes the socio-economic impact of competition,
globalization, democratization, and the effects of all these factors on an organizational
structure.
In short, this multi-dimensional information evolves from the following logical foundations −
Data and information created from an accounting information system and the reports
generated thereon are used to provide accurate, timely and relevant information needed for
effective decision making by managers.
Management information system refers to such system which provides accurate information
to the entire level of management for decision making process. For right job at the right time,
by the right person.
Management information system (MIS) has become Very Necessary due to Emergence of
high complexity in Business Organization. It is all to know that without information no
Organization can take even one step properly regarding the decision making process. Because
it is matter of fact that in an organization decision plays an essential role for the achievement
of its objectives and we know that every decision is based upon information. If gathered
information are irrelevant than decision will also incorrect and Organization may face big
loss & lots of Difficulties in Surviving as well.
(a) System and Computer Experts who in addition to their expertise in their subject area,
they should also be capable of understanding management concepts to facilitate the
understanding of problems asked by concern. They should also be clear about the process of
decision making and information requirements for planning.
(a) Subordinate managers are usually lethargic about activities which do not receive the
support of their superiors.
(b) The resources involved in computer based information system are larger and are growing
larger and larger in view of importance gained by management information system.
(v) Control and maintenance of MIS: Control of the MIS means the operation of the
system as it was designed to operate. Some times, users develop their own procedures or
short cut methods to use the system which reduces its effectiveness.
Business Procedures: these are agreed upon best practices that guide the users and all other
components on how to work efficiently. Business procedures are developed by the people i.e.
users, consultants, etc.
Data: the recorded day to day business transactions. For a bank, data is collected from
activities such as deposits, withdrawals, etc.
Software: these are programs that run on the hardware. The software is broken down into
two major categories namely system software and applications software. System software
refers to the operating system i.e. Windows, Mac OS, and Ubuntu, etc. Applications software
refers to specialized software for accomplishing business tasks such as a Payroll program,
banking system, point of sale system, etc.
The MIS plays exactly the same role in the organization. The system ensures that an
appropriate data is collected from the various sources, processed and send further to all the
needy destinations. The system is expected to fulfill the information needs of an individual, a
group of individuals, the management functionaries: the managers and top management.
1. The MIS satisfies the diverse needs through variety of systems such as query system,
analysis system, modeling system and decision support system.
2. The MIS helps in strategic planning, management control, operational control and
transaction processing. The MIS helps in the clerical personal in the transaction processing
and answers the queries on the data pertaining to the transaction, the status of a particular
record and reference on a variety of documents.
iii. The MIS helps the junior management personnel by providing the operational data for
planning, scheduling and control , and helps them further in decision-making at the operation
level to correct an out of control situation.
1. The MIS helps the middle management in short term planning, target setting and
controlling the business functions. It is supported by the use of the management tools of
planning and control.
2. The MIS helps the top level management in goal setting, strategic planning and
evolving the business plans and their implementation.
3. The MIS plays the role of information generation, communication, problem
identification and helps in the process of decision-making. The MIS, therefore, plays a vital
role in the management, administration and operation of an organization.
MIS plays a very important role in the organization; it creates an impact on the organization’s
functions, performance and productivity.
The impact of MIS on the functions is in its management with a good MIS supports the
management of marketing, finance, production and personnel becomes more efficient. The
tracking and monitoring of the functional targets becomes easy. The functional managers are
informed about the progress, achievements and shortfalls in the activity and the targets. The
manager is kept alert by providing certain information indicating and probable trends in the
various aspects of business. This helps in forecasting and long-term perspective planning.
The manager’s attention is bought to a situation which is expected in nature, inducing him to
take an action or a decision in the matter. Disciplined information reporting system creates
structure database and a knowledge base for all the people in the organization. The
information is available in such a form that it can be used straight away by blending and
analysis, saving the manager’s valuable time.
The MIS creates another impact in the organization which relates to the understanding of
the business itself. The MIS begins with the definition of data, entity and its attributes. It uses
a dictionary of data, entity and attributes, respectively, designed for information generation in
the organization. Since all the information systems use the dictionary, there is common
understanding of terms and terminology in the organization bringing clarity in the
communication and a similar understanding of an event in the organization.
The MIS calls for a systematization of the business operations for an effective system
design. This leads to streaming of the operations which complicates the system design. It
improves the administration of the business by bringing a discipline in its operations as
everybody is required to follow and use systems and procedures. This process brings a high
degree of professionalism in the business operations.
The goals and objectives of the MIS are the products of business goals and objectives. It
helps indirectly to pull the entire organization in one direction towards the corporate goals
and objectives by providing the relevant information to the organization.
A well designed system with a focus on the manager makes an impact on the managerial
efficiency. The fund of information motivates an enlightened manager to use a variety of
tools of the management. It helps him to resort to such exercises as experimentation and
modeling. The use of computers enables him to use the tools and techniques which are
impossible to use manually. The ready-made packages make this task simple. The impact is
on the managerial ability to perform. It improves decision-making ability considerably high.
Since, the MIS work on the basic system such as transaction processing and database, the
drudgery of the clerical work is transferred to the computerized system, relieving the human
mind for better work. It will be observed that lot of manpower is engaged in this activity in
the organization. Seventy (70) percent of the time is spent in recording, searching, processing
and communicating. This MIS has a direct impact on this overhead. It creates information –
based working culture in the organization.
IMPORTANCE OF MIS
It goes without saying that all managerial functions are performed through decision-making;
for taking rational decision, timely and reliable information is essential and is procured
through a logical and well structured method of information collecting, processing and
disseminating to decision makers. Such a method in the field of management is widely
known as MIS. In today’s world of ever increasing complexities of business as well as
business organization, in order to service and grow , must have a properly planned, analyzed,
designed and maintained MIS so that it provides timely, reliable and useful information to
enable the management to take speedy and rational decisions.
MIS has assumed all the more important role in today’s environment because a manager has
to take decisions under two main challenges:
First, because of the liberalization and globalization, in which organizations are required to
compete not locally but globally, a manager has to take quick decisions, otherwise his
business will be taken away by his competitors. This has further enhanced the necessity for
such a system.
Second, in this information age wherein information is doubling up every two or three years,
a manager has to process a large voluminous data; failing which he may end up taking a
strong decision that may prove to be very costly to the company.
In such a situation managers must be equipped with some tools or a system, which can assist
them in their challenging role of decision-making. It is because of the above cited reasons,
that today MIS is considered to be of permanent importance, sometimes regarded as the name
centre of an organization. Such system assist decision makers in organizations by providing
information at various stages of decision making and thus greatly help the organizations to
achieve their predetermined goals and objectives. On the other hand, the MIS which is not
adequately planned for analyzed, designed, implemented or is poorly maintained may provide
developed inaccurate, irrelevant or obsolete information which may prove fatal for the
organization. In other words, organizations today just cannot survive and grow without
properly planned, designed, implemented and maintained MIS. It has been well understood
that MIS enables even small organizations to more than offset the economies of scale enjoyed
by their bigger competitors and thus helps in providing a competitive edge over other
organizations.
ISM/U1 Topic 6 Information in
Decision Making: Meaning
and Importance
THEINTACTFRONT19 FEB 2019 2 COMMENTS
Decision support systems (DSS) are interactive software-based systems intended to help
managers in decision-making by accessing large volumes of information generated from
various related information systems involved in organizational business processes, such as
office automation system, transaction processing system, etc.
DSS uses the summary information, exceptions, patterns, and trends using the analytical
models. A decision support system helps in decision-making but does not necessarily give a
decision itself. The decision makers compile useful information from raw data, documents,
personal knowledge, and/or business models to identify and solve problems and make
decisions.
Decision support systems generally involve non-programmed decisions. Therefore, there will
be no exact report, content, or format for these systems. Reports are generated on the fly.
Attributes of a DSS
Characteristics of a DSS
Benefits of DSS
Components of a DSS
Support Tools − Support tools like online help; pulls down menus, user interfaces, graphical
analysis, error correction mechanism, facilitates the user interactions with the system.
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as follows
Text Oriented DSS− It contains textually represented information that could have a
bearing on decision. It allows documents to be electronically created, revised and viewed as
needed.
Database Oriented DSS− Database plays a major role here; it contains organized and
highly structured data.
Spreadsheet Oriented DSS− It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to execute self-
contained instructions. The most popular tool is Excel and Lotus 1-2-3.
Solver Oriented DSS− It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
Rules Oriented DSS− It follows certain procedures adopted as rules.
Rules Oriented DSS− Procedures are adopted in rules oriented DSS. Export system
is the example.
Compound DSS− It is built by using two or more of the five structures explained
above.
Types of DSS
Classification by Characteristic
Based on Anthony’s classification of Management, information used in business for decision-
making is generally categorized into three types −
Classification by Application
In terms of applications, information can be categorized as −
Information is a vital resource for the success of any organization. Future of an organization
lies in using and disseminating information wisely. Good quality information placed in right
context in right time tells us about opportunities and problems well in advance.
Good quality information − Quality is a value that would vary according to the users and
uses of the information.
According to Wang and Strong, following are the dimensions or elements of Information
Quality −
Various authors propose various lists of metrics for assessing the quality of information. Let
us generate a list of the most essential characteristic features for information quality
Similarly, a human resource manager trying to recruit someone for the organization would do
a lot of information analysis regarding the job profile, suitability of the candidate for the job,
the job market dynamics, etc. The competitive environment that exists in today’s time makes
this task of management even more challenging. Decisions have to be taken very fast and
after analyzing a lot of data.
It is precisely due to these reasons that more and more information technology (IT)
intervention is being used in modern management functions. However, Information
management using technology has itself transformed dramatically over the years. From being
just a support function it has become a key resource for gaining competitive advantage.
More and more corporations are investing in acquiring the latest management information
system tools like enterprise (wide) resource planning (ERP), customer relationship
management (CRM), knowledge management (KM), decision support system (055), business
intelligence (81) suites data warehouse (OW) facility as they are convinced of the benefits of
such huge investments.
Levels of
Problems handled/ Decisions made Type of information required
Management
A manager at the top level who is deciding on the location of a new factory of the
organization has strategic consideration like the labor costs of the location, proximity of the
location to the market and long-term growth prospects in mind. He/she is not bothered about
the shop floor level operational details like the reason for absence of a worker. He/she will
have a strategic view and would need only such information that helps him to take correct
decisions. Information is only a resource to him if it can help him to improve the quality of
his strategic decision-making. Similarly for other tiers, information is only a resource if one
can derive value from it.
Information Management
The business of information which is today a multibillion dollar industry first started when a
firm called Bloomberg started compiling important information about US companies and
their balance sheets and selling them to stock brokers. This was the first open trade in
information as a resource in modern times. From then on, information (external) has been
regarded as a resource that is traded10 sometimes freely and openly as in published literature
and sometimes clandestinely in the form of corporate intelligence reports. Also, internal
information is seen as equally valuable and every effort is made to derive more value from it
and to ensure that this internal information does not find its way outside the organization.
The idea of information management is based on the fundamental premise that information is
a resource that is valuable for an organization. The entire subject of information management
is about how to derive more and more value from this precious resource. However, unlike
most other resources that have to be procured from the outside environment, most
information resource is available within the organization if an effort has been made for its
safekeeping. Detailed logs of transactions of an organization with its external and internal
customers over a period mostly form the basic ingredient of a good quality information
resource. This basic information repository is then drilled and analyzed for actionable
information, this is one aspect of information management in which strategies are used to
derive greater value from the internal repository of data and information. The other aspect of
information management is to ensure that this internal information is not ‘leaked’ to the
outside world of competitors.
Information Access
Managers need rapid access to information to make decisions about strategic, financial,
marketing and operational issues. Companies collect vast amounts of information, including
customer records, sales data, market research, financial records, manufacturing and inventory
data, and human resource records. However, much of that information is held in separate
departmental databases, making it difficult for decision makers to access data quickly. A
management information system simplifies and speeds up information retrieval by storing
data in a central location that is accessible via a network. The result is decisions that are
quicker and more accurate.
Data Collection
Management information systems bring together data from inside and outside the
organization. By setting up a network that links a central database to retail outlets,
distributors and members of a supply chain, companies can collect sales and production data
daily, or more frequently, and make decisions based on the latest information.
Collaboration
In situations where decision-making involves groups, as well as individuals, management
information systems make it easy for teams to make collaborative decisions. In a project
team, for example, management information systems enable all members to access the same
essential data, even if they are working in different locations.
Interpretation
Management information systems help decision-makers understand the implications of their
decisions. The systems collate raw data into reports in a format that enables decision-makers
to quickly identify patterns and trends that would not have been obvious in the raw data.
Decision-makers can also use management information systems to understand the potential
effect of change. A sales manager, for example, can make predictions about the effect of a
price change on sales by running simulations within the system and asking a number of
“what if the price was” questions.
Presentation
The reporting tools within management information systems enable decision-makers to tailor
reports to the information needs of other parties. If a decision requires approval by a senior
executive, the decision-maker can create a brief executive summary for review. If managers
want to share the detailed findings of a report with colleagues, they can create full reports and
provide different levels of supplementary data.
File Management System, better known as File System is the most ancient and still the most
popular way to keep your data files organized on your drives.
On the other hand, when it comes to security and appropriate management of data based on
constraints and other stuff that we are going to talk about, the first choice of many experts,
is Database Management System (DBMS).
So what are they? What are the parameters to decide the best one for your need? Let’s come
to these aspects now.
File Systems is the traditional way to keep your data organized in a way which is easy for
physical access, whether it’s on your shelf or on the drives.
Earlier people used to keep records and maintain data in registers and any alteration/retrieval
to this data was difficult. When computers came, same agenda was followed for storing the
data on drives.
File System actually stores data in the form of isolated files which have their own set of
property table and physical location on the drive and user manually goes to these locations to
access the files.
It is an easy way to store data in general files like images, text, videos, audios etc., but
security is less because only options available to these files are the options given by the
operating system such as locks, hidden files and sharing. These files are hard to maintain
when it comes to frequent changes to these files.
Data redundancy is more and can’t be controlled easily. Data integration is hard to achieve
and also data consistency is not met.
Database Management System, abbreviated as DBMS, is an effective way to store the data
when constraints are high and data maintenance and security are the primary concern of the
user.
DBMS stores data in the form of interrelated tables and files. These are generally consist of
database management system providers that are used to store and manipulate databases,
hardware where the data is physically stored and an user friendly software developed to met
specific purpose in certain situations, using which user can easily access database without
worrying about the underlying schema of the database.
Database Management System is great way to manage data as, the data redundancy is
minimized due to interrelation of data entities and also provide a procedure for data
integration due to centralisation of data in the database. Security of data is also maximized
using password protection, encryption/decryption, granting authorized access and others.
At very high level, a database is considered as shown in below diagram. Let us see them in
detail below.
Applications:- It can be considered as a user friendly web page where the user enters
the requests. Here he simply enters the details that he needs and presses buttons to get the
data.
End User:- They are the real users of the database. They can be developers,
designers, administrator or the actual users of the database.
DDL:- Data Definition Language (DDL) is a query fired to create database, schema,
tables, mappings etc in the database. These are the commands used to create the objects like
tables, indexes in the database for the first time. In other words, they create structure of the
database.
DDL Compiler:- This part of database is responsible for processing the DDL
commands. That means these compiler actually breaks down the command into machine
understandable codes. It is also responsible for storing the metadata information like table
name, space used by it, number of columns in it, mapping information etc.
DML Compiler:- When the user inserts, deletes, updates or retrieves the record from
the database, he will be sending request which he understands by pressing some buttons. But
for the database to work/understand the request, it should be broken down to object code.
This is done by this compiler. One can imagine this as when a person is asked some question,
how this is broken down into waves to reach the brain!
Query Optimizer:- When user fires some request, he is least bothered how it will be
fired on the database. He is not all aware of database or its way of performance. But whatever
be the request, it should be efficient enough to fetch, insert, update or delete the data from the
database. The query optimizer decides the best way to execute the user request which is
received from the DML compiler. It is similar to selecting the best nerve to carry the waves to
brain!
Stored Data Manager:- This is also known as Database Control System. It is one the
main central system of the database. It is responsible for various tasks
o It converts the requests received from query optimizer to machine
understandable form. It makes actual request inside the database. It is like fetching the exact
part of the brain to answer.
o It helps to maintain consistency and integrity by applying the constraints.
That means, it does not allow inserting / updating / deleting any data if it has child entry.
Similarly it does not allow entering any duplicate value into database tables.
o It controls concurrent access. If there is multiple users accessing the database
at the same time, it makes sure, all of them see correct data. It guarantees that there is no data
loss or data mismatch happens between the transactions of multiple users.
o It helps to backup the database and recover data whenever required. Since it is
a huge database and when there is any unexpected exploit of transaction, and reverting the
changes are not easy. It maintains the backup of all data, so that it can be recovered.
Data Files:- It has the real data stored in it. It can be stored as magnetic tapes,
magnetic disks or optical disks.
Compiled DML:- Some of the processed DML statements (insert, update, delete) are
stored in it so that if there is similar requests, it will be re-used.
Data Dictionary:- It contains all the information about the database. As the name
suggests, it is the dictionary of all the data items. It contains description of all the tables,
view, materialized views, constraints, indexes, triggers etc.
Database implementors, who build DBMS software; end users, who wish to store
and use data in a DBMS
Database application programmers develop packages that facilitate data access for
end users, who are usually not computer professionals, suing the host or data languages and
software tools that DBMS vendors provide
Database administrator is responsible for:
o Design of the conceptual and physical schemas: interacting with the users of
the system to understand what data is to be stored in the DBM and how it is likely to be used
o Security and authorization: ensuring that unauthorized data access is not
permitted
o Data availability and recovery from failures: ensuring if the system fails, users
can continue to access as much of the uncorrupted data as possible
o Database tuning: modifying the database to ensure adequate performance as
user requirements change.
The very first data model could be flat data-models, where all the data used are to be
kept in the same plane. Earlier data models were not so scientific, hence they were
prone to introduce lots of duplication and update anomalies.
Entity-Relationship Model
Entity-Relationship (ER) Model is based on the notion of real-world entities and
relationships among them. While formulating real-world scenario into the database
model, the ER Model creates entity set, relationship set, general attributes and
constraints.
Entities and their
Relationships among entities.
Mapping cardinalities:
o one to one
o one to many
o many to one
o many to many
Relational Model
The most popular data model in DBMS is the Relational Model. It is more scientific a
model than others. This model is based on first-order predicate logic and defines a table
as an n-ary relation.
(1) In relational database design, the process of organizing data to minimize redundancy.
Normalization usually involves dividing a database into two or more tables and defining
relationships between the tables. The objective is to isolate data so that additions, deletions,
and modifications of a field can be made in just one table and then propagated through the
rest of the database via the defined relationships.
There are three main normal forms, each with increasing levels of normalization:
First Normal Form (1NF): Each field in a table contains different information. For example, in
an employee list, each table would contain only one birthdate field.
Second Normal Form (2NF): Each field in a table that is not a determiner of the contents of
another field must itself be a function of the other fields in the table.
Third Normal Form (3NF): No duplicate information is permitted. So, for example, if two
tables both require a birthdate field, the birthdate information would be separated into a separate
table, and the two other tables would then access the birthdate information via an index field in the
birthdate table. Any change to a birthdate would automatically be reflect in all tables that link to the
birthdate table.
There are additional normalization levels, such as Boyce Codd Normal Form (BCNF), fourth
normal form (4NF) and fifth normal form (5NF). While normalization makes databases more
efficient to maintain, they can also make them more complex because data is separated into
so many different tables.
(2) In data processing, a process applied to all data in a set that produces a specific statistical
property. For example, each expenditure for a month can be divided by the total of all
expenditures to produce a percentage.
(3) In programming, changing the format of a floating-point number so the left-most digit in
the mantissa is not a zero.
The main objectives of database designing are to produce logical and physical designs
models of the proposed database system.
The logical model concentrates on the data requirements and the data to be stored
independent of physical considerations. It does not concern itself with how the data will be
stored or where it will be stored physically.
The physical data design model involves translating the logical design of the database onto
physical media using hardware resources and software systems such as database management
systems (DBMS).
Entity
An entity can be a real-world object, either animate or inanimate, that can be easily
identifiable. For example, in a school database, students, teachers, classes, and courses
offered can be considered as entities. All these entities have some attributes or properties that
give them their identity.
An entity set is a collection of similar types of entities. An entity set may contain entities with
attribute sharing similar values. For example, a Students set may contain all the students of a
school; likewise a Teachers set may contain all the teachers of a school from all faculties.
Entity sets need not be disjoint.
Attributes
Entities are represented by means of their properties, called attributes. All attributes have
values. For example, a student entity may have name, class, and age as attributes.
There exists a domain or range of values that can be assigned to attributes. For example, a
student’s name cannot be a numeric value. It has to be alphabetic. A student’s age cannot be
negative, etc.
Types of Attributes
Simple attribute: Simple attributes are atomic values, which cannot be divided further. For
example, a student’s phone number is an atomic value of 10 digits.
Composite attribute: Composite attributes are made of more than one simple attribute. For
example, a student’s complete name may have first_name and last_name.
Derived attribute: Derived attributes are the attributes that do not exist in the physical
database, but their values are derived from other attributes present in the database. For example,
average_salary in a department should not be saved directly in the database, instead it can be
derived. For another example, age can be derived from data_of_birth.
Single-value attribute: Single-value attributes contain single value. For example −
Social_Security_Number.
Multi-value attribute: Multi-value attributes may contain more than one values. For
example, a person can have more than one phone number, email_address, etc.
Key is an attribute or collection of attributes that uniquely identifies an entity among entity
set.
For example, the roll_number of a student makes him/her identifiable among students.
Super Key: A set of attributes (one or more) that collectively identifies an entity in an entity
set.
Candidate Key: A minimal super key is called a candidate key. An entity set may have more
than one candidate key.
Primary Key: A primary key is one of the candidate keys chosen by the database designer to
uniquely identify the entity set.
Relationship
The association among entities is called a relationship. For example, an employee works_at a
department, a student enrolls in a course. Here, Works_at and Enrolls are called
relationships.
Relationship Set
A set of relationships of similar type is called a relationship set. Like entities, a relationship
too can have attributes. These attributes are called descriptive attributes.
Degree of Relationship
The number of participating entities in a relationship defines the degree of the relationship.
Binary = degree 2
Ternary = degree 3
n-ary = degree
Mapping Cardinalities
Cardinality defines the number of entities in one entity set, which can be associated with the
number of entities of other set via relationship set.
One-to-one: One entity from entity set A can be associated with at most one entity of entity
set B and vice versa.
One-to-many: One entity from entity set A can be associated with more than one entities of
entity set B however an entity from entity set B, can be associated with at most one entity.
Many-to-one: More than one entities from entity set A can be associated with at most one
entity of entity set B, however an entity from entity set B can be associated with more than one
entity from entity set A.
Many-to-many: One entity from A can be associated with more than one entity from B and
vice versa.
ISM/U2 Topic 7
Integrity Constraints
THEINTACTFRONT19 FEB 2019 3 COMMENTS
Integrity Constraints
Integrity constraints are a set of rules. It is used to maintain the quality of information.
Integrity constraints ensure that the data insertion, updating, and other processes have to
be performed in such a way that data integrity is not affected.
Thus, integrity constraint is used to guard against accidental damage to the database.
Domain constraints can be defined as the definition of a valid set of values for an attribute.
The data type of domain includes string, character, integer, time, date, currency, etc. The
value of the attribute must be available in the corresponding domain.
Example:
The entity integrity constraint states that primary key value can’t be null.
This is because the primary key value is used to identify individual rows in relation and if the
primary key has a null value, then we can’t identify those rows.
A table can contain a null value other than the primary key field.
Example:
3. Referential Integrity Constraints
Example:
4. Key constraints
Keys are the entity set that is used to identify an entity within its entity set uniquely.
An entity set can have multiple keys, but out of which one key will be the primary key. A
primary key can contain a unique and null value in the relational table.
Example:
ISM/U2 Topic 9 DDL and
DML Commands
THEINTACTFRONT19 FEB 2019 2 COMMENTS
DML statements are SQL statements that manipulate data. DML stands for Data
Manipulation Language. The SQL statements that are in the DML class are INSERT,
UPDATE and DELETE. Some people also lump the SELECT statement in the DML
classification.
Data Definition Languages (DDL) are used to define the database structure. Any CREATE,
DROP and ALTER commands are examples of DDL SQL statements.
1)COUNT
2)SUM
3)AVG
4)MIN
5) MAX
ISM/U3 Topic 1 Quantitative and
Qualitative Aspects
THEINTACTFRONT19 FEB 2019 2 COMMENTS
Cost benefit analysis involves the weighing of the costs associated with a decision against the
benefits arising from that decision. The analysis is used to decide whether to proceed with a
course of action or not. Cost benefit analysis can include both quantitative and qualitative
factors. For example, the analysis of a decision to construct a facility in a particular city could
include quantitative factors, such as the amount of tax breaks that can be obtained, as well as
qualitative factors, such as the rating of the schools in that city to which workers would send
their children.
For decisions involving large amounts of invested funds, the emphasis of a cost benefit
analysis tends to be on the cash flows associated with the investment. This may include the
initial and subsequent investment of funds, as well as the tax effects of depreciation,
maintenance costs, and projected price points. In this situation, qualitative factors tend to be
addressed after a “hard” quantitative analysis has already been completed.
Whether to expend funds on a new fixed asset. The analysis is the cost to buy the asset,
versus the benefit of any cash flows to be derived by using the asset.
Whether to hire staff to design a new product. The analysis is the cost of the new staff,
versus the cash flows to be derived from sale of the new product.
Whether to hire quality assurance staff to reduce product failures. The analysis is the cost of
the new employees, versus the costs to be avoided by maintaining higher product quality levels.
Cost benefit analysis works best when most of the costs and benefits can be reduced to
financial terms, so that they can be more easily compared. The analysis does not provide
consistent results when the decision maker must compare qualitative concepts, without being
able to convert them to financial outcomes. The concept can also yield inconsistent results
when cash inflows and outflows are expected to occur over long periods of time, since it can
be quite difficult to accurately predict the amount and/or timing of the more distant cash
flows.
Quantitative factors are numerical outcomes from a decision that can be measured. These
factors are commonly included in various financial analyses, which are then used to evaluate
a situation. Managers are typically taught to rely on quantitative factors as a large part of their
decision making processes. Examples of quantitative factors are:
Direct labor hours. A change in the number of labor hours required to complete a task if
automation is used.
Direct materials cost. A change in the per-unit cost of materials if a purchase is placed in a
larger order volume.
Interest cost. The amount of additional expense that will be incurred if a loan is used to buy
a fixed asset, rather than selling stock.
Product returns. The cost of the product returns that will occur if the decision is made to use
lower-quality materials in the construction of a product.
While quantitative factors certainly should form a large part of any decision, there are other
issues to consider. For example, the outcome of a decision to shut down a factory will impact
the local community, which has supported the business for many years. Or, the numbers may
state that a single product within a product line should be cancelled, but the company needs
to present a complete product line to its customers, and so elects to retain the product.
The decision to use quantitative factors is considered more important when a large amount of
funding will be deployed, since there is a greater risk of losing or at least under-utilizing the
money. Quantitative factors are less important when there is less money that will be impacted
by the decision.
The impact on employee morale of adding a break room to the production area.
The impact on customer opinions of a business if an investment is made in answering their
phone calls in less time by adding customer support staff.
The impact on investors of conducting a road show to meet as many of them as possible.
The impact on the local community of allowing employees to spend a few hours of paid time
assisting with community projects.
It may be possible to use somewhat cheaper components in products. However, if this is
done too much, it may create an overall impression of reduced quality, which may lead customers to
buy fewer products.
A manager should consider qualitative factors as part of his or her analysis of a decision.
Depending on the manager and the level of investment involved, qualitative factors can be
the deciding point in whether to engage in a certain activity. For example, if a large
investment of funds is involved, the key decision factors are more likely to be quantitative,
since the investing business has a great deal at stake in the decision. However, if the
investment of funds is minor, the impact of qualitative factors could play a more important
role in the decision.
Unfortunately, history is often not a good guide of future strategic issues. Because
information systems help in articulating strategic issues, if the information system focuses on
the wrong issue it could radically mislead the organization. How can we anticipate
information needs of organizational leaders? The answer to this question is the focus of this
section.
Though most readers think of systems as information inside computers, this need not be the
case. In thinking about Strategic information systems, we must also consider non-
computerized sources of information, e.g. reports and commissioned studies, experts’ advice,
and informal communication networks. One should also think through the timing of
information. In particular, should the analyst collect and analyze the information hoping that
it will be used or should the analyst wait for organizational leaders to articulate the need and
then collect the information. . In addressing the question of timing, the following two
tradeoffs should be considered:
Relevance versus timely availability. Data collected and analyzed after the need arises are
more likely to be relevant to the decision-maker’s task, but because of delays in collecting
information data may not be available when needed. Periodic or continuous data gathering.
Collecting data as the need arises allows analysts and decision-makers to define precisely what must
be collected. Regular data collection often leads to data categories that are too narrow or too broad.
Periodic Collection – collecting data only when the need arises – allows us to assemble the
most appropriate data but may not give us a basis for comparing trends.
By its very nature, building a strategic information system requires us to think through not
only what is needed but when is it needed and how can information be organized. The
analyst must specify the information needs, the data collection strategies and the analysis
needed. At the same time, the temptation to collect data on every conceivable contingency
must be tempered by recognition that collection is expensive. In practically every case, the
minimum should be done.
What do you need? What do you want?
It’s not an easy challenge to design a Strategic Information System to meet the information
needs and expectations of organizational leaders. Various obstacles prevent simple
determination of information requirements. Dubois et al. (1982) have suggested three
categories of difficulty in the determination of information requirements:
The problems that users have in specifying their own needs can be traced to general cognitive
limitations of all human beings. For example, people, even experts, are not aware how they
make decisions and what information they use in those decisions. People think, but often do
not know how they think. The process of thinking for the most part is an unconscious
process.
Thus, when you ask someone how did they make their decision, they may list a number of
pieces of information that they claim they paid attention to but in reality they may have made
their mind up based on a much smaller set of information. As a consequence of this cognitive
limitation, clients often will not differentiate true information needs from wishes (Tagart and
Tharp 1977). When asked what do you need, they present a long wish list; including items
which they do not use even if the information was available.
Another reason why organizational leaders may not be able to articulate their information
needs is because they may have forgotten occasions in which they needed more information.
When clients are interviewed about their needs, they have to remember how key information
was missing in the past decisions. This is very unpleasant. No one is in a habit of
remembering his or her failures or episodes in which their needs were not satisfied.
Unpleasant events are often forgotten, especially when you, yourself, are in charge.
Interviewing organizational leaders about failures of their organizations to supply critical
information is akin to asking you when did you make bad judgments. It is an unpleasant task
that you rather forget. For some people it is so unpleasant that they may unconsciously distort
the facts so not to remember the events. If managers and leaders forget their failures, if they
prefer not remember how they failed to gather necessary information, interviews will not be
very useful. If the manager has a good memory for these instances, the analyst will have a
good basis for specifying the information requirements.
Various other severe and systematic cognitive biases also impair the ability to define
information needs (IBM Corporation 1981). But it is not just cognitive limitations that
create havoc in assessing information needs. Clients’ lack of expertise and knowledge is a
also a common obstacle to formulating and stating true needs (Ellis 1982; Hogarth 1981).
Many decision makers do not realize how their own needs change over time and how these
needs are affected by external events. Many are not aware of new technological possibilities
and keep projecting future needs based on their existing expectations from current
information systems. In short, many do not know what they want.
Finally there is the problem of distinguishing between what clients’ want and what they need.
Sometimes organizational leaders get what they want but not necessarily what is good for the
organization. Information systems cannot be serving the needs of individuals and ignore the
needs of organizations. Sometimes individuals’ cognitive styles prevent them from
examining information presented in different formats.
Clearly, information systems should help individuals see beyond their own limitations.
Sometimes differences in time horizons, personal career objectives, and internal organization
politics prevent some organizational leaders from seeing the emerging changes around them.
Information systems cannot rubber stamp the status quo. They need to engage leaders in
thinking about the emerging future and assist them in making it a reality. Information systems
are intended not only to serve clients but also to enhance and improve their decision making.
By focusing solely on what clients want information systems may do them a disservice.
This is not to suggest that analysts can identify users’ needs better than clients themselves.
Analysts who do not involve clients risk the possibility of planning systems that are not used.
Information system analysts are often ignorant of the subject matter. Planning without
engaging the client may lead to wasted effort.
We suggest that information systems should play both roles: give clients the information they
are asking for but add to it information they may need but not have asked for. To do so,
analysts and clients must collaborate to determine information needs. How could this be
done?
Systems Design
It is a process of planning a new business system or replacing an existing system by defining
its components or modules to satisfy the specific requirements. Before planning, you need to
understand the old system thoroughly and determine how computers can best be used in order
to operate efficiently.
Systems
Processes
Technology
What is a System?
The word System is derived from Greek word Systema, which means an organized
relationship between any set of components to achieve some common cause or objective.
Constraints of a System
A system must have three basic constraints:
For example, traffic management system, payroll system, automatic library system, human
resources information system.
Properties of a System
A system has the following properties:
Organization
Organization implies structure and order. It is the arrangement of components that helps to
achieve predetermined objectives.
Interaction
It is defined by the manner in which the components operate with each other.
Interdependence
Interdependence means how the components of a system depend on one another. For proper
functioning, the components are coordinated and linked together according to a specified
plan. The output of one subsystem is the required by other subsystem as input.
Integration
Integration is concerned with how a system components are connected together. It means that
the parts of the system work together within the system even if each part performs a unique
function.
Central Objective
The objective of system must be central. It may be real or stated. It is not uncommon for an
organization to state an objective and operate to achieve another.
The users must know the main objective of a computer application early in the analysis for a
successful design and conversion.
Types of System
1. Conceptual Systems
2. Empirical Systems
Are very practical, specific and also very operational in the nature.
Can be based on the conceptual system.
Examination system, surgery act as very good examples of the empirical systems.
3. Open Systems
4. Closed Systems
5. Natural Systems
6. Artificial Systems
7. Probabilistic Systems
8. Deterministic Systems
An effective System Development Life Cycle (SDLC) should result in a high quality system
that meets customer expectations, reaches completion within time and cost evaluations, and
works effectively and efficiently in the current and planned Information Technology
infrastructure.
System Development Life Cycle (SDLC) is a conceptual model which includes policies and
procedures for developing or altering systems throughout their life cycles.
SDLC is used by analysts to develop an information system. SDLC includes the following
activities:
Requirements
Design
Implementation
Testing
Deployment
Operations
Maintenance
Phases of SDLC
Systems Development Life Cycle is a systematic approach which explicitly breaks down the
work into phases that are required to implement either new or modified Information System.
Feasibility Study or Planning
System Design
Includes the design of application, network, databases, user interfaces, and system
interfaces.
Transform the SRS document into logical structure, which contains detailed and complete
set of specifications that can be implemented in a programming language.
Create a contingency, training, maintenance, and operation plan.
Review the proposed design. Ensure that the final design must meet the requirements
stated in SRS document.
Finally, prepare a design document which will be used during next phases.
Implementation
Maintenance/Support
Include all the activities such as phone support or physical on-site support for users that is
required once the system is installing.
Implement the changes that software might undergo over a period of time, or implement
any new requirements after the software is deployed at the customer location.
It also includes handling the residual errors and resolve any issues that may exist in the
system even after the testing phase.
Maintenance and support may be needed for a longer time for large systems and for a short
time for smaller systems.
1. The new system requirements are defined in as much detail as possible. This usually involves
interviewing a number of users representing all the departments or aspects of the existing system.
2. A preliminary design is created for the new system.
3. A first prototype of the new system is constructed from the preliminary design. This is
usually a scaled-down system, and represents an approximation of the characteristics of the final
product.
4. The users thoroughly evaluate the first prototype, noting its strengths and weaknesses, what
needs to be added, and what should to be removed. The developer collects and analyzes the
remarks from the users.
5. The first prototype is modified, based on the comments supplied by the users, and a second
prototype of the new system is constructed.
6. The second prototype is evaluated in the same manner as was the first prototype.
7. The preceding steps are iterated as many times as necessary, until the users are satisfied
that the prototype represents the final product desired.
8. The final system is constructed, based on the final prototype.
9. The final system is thoroughly evaluated and tested. Routine maintenance is carried out on a
continuing basis to prevent large-scale failures and to minimize downtime.
The Waterfall Model was the first Process Model to be introduced. It is also referred to as
a linear-sequential life cycle model. It is very simple to understand and use. In a waterfall
model, each phase must be completed before the next phase can begin and there is no
overlapping in the phases.
The Waterfall model is the earliest SDLC approach that was used for software development.
The waterfall Model illustrates the software development process in a linear sequential flow.
This means that any phase in the development process begins only if the previous phase is
complete. In this waterfall model, the phases do not overlap.
Waterfall approach was first SDLC Model to be used widely in Software Engineering to
ensure success of the project. In “The Waterfall” approach, the whole process of software
development is divided into separate phases. In this Waterfall model, typically, the outcome
of one phase acts as the input for the next phase sequentially.
The following illustration is a representation of the different phases of the Waterfall Model.
The sequential phases in Waterfall model are:
All these phases are cascaded to each other in which progress is seen as flowing steadily
downwards (like a waterfall) through the phases. The next phase is started only after the
defined set of goals are achieved for previous phase and it is signed off, so the name
“Waterfall Model“. In this model, phases do not overlap.
Application
Every software developed is different and requires a suitable SDLC approach to be followed
based on the internal and external factors. Some situations where the use of Waterfall model
is most appropriate are:
Advantages
The advantages of waterfall development are that it allows for departmentalization and
control. A schedule can be set with deadlines for each stage of development and a product
can proceed through the development process model phases one by one.
Disadvantages
The disadvantage of waterfall development is that it does not allow much reflection or
revision. Once an application is in the testing stage, it is very difficult to go back and change
something that was not well-documented or thought upon in the concept stage.
The spiral model combines the idea of iterative development with the systematic, controlled
aspects of the waterfall model. This Spiral model is a combination of iterative development
process model and sequential linear development model i.e. the waterfall model with a very
high emphasis on risk analysis. It allows incremental releases of the product or incremental
refinement through each iteration around the spiral.
Design
The spiral model has four phases. A software project repeatedly passes through these phases
in iterations called Spirals.
Identification
This phase starts with gathering the business requirements in the baseline spiral. In the
subsequent spirals as the product matures, identification of system requirements, subsystem
requirements and unit requirements are all done in this phase.
Design
The Design phase starts with the conceptual design in the baseline spiral and involves
architectural design, logical design of modules, physical product design and the final design
in the subsequent spirals.
Construct or Build
The Construct phase refers to production of the actual software product at every spiral. In the
baseline spiral, when the product is just thought of and the design is being developed a POC
(Proof of Concept) is developed in this phase to get customer feedback.
Then in the subsequent spirals with higher clarity on requirements and design details a
working model of the software called build is produced with a version number. These builds
are sent to the customer for feedback.
The following illustration is a representation of the Spiral Model, listing the activities in each
phase.
Based on the customer evaluation, the software development process enters the next iteration
and subsequently follows the linear approach to implement the feedback suggested by the
customer. The process of iterations along the spiral continues throughout the life of the
software.
Application
The Spiral Model is widely used in the software industry as it is in sync with the natural
development process of any product, i.e. learning with maturity which involves minimum
risk for the customer as well as the development firms.
This method is consistent with approaches that have multiple software builds and releases
which allows making an orderly transition to a maintenance activity. Another positive aspect
of this method is that the spiral model forces an early user involvement in the system
development effort.
On the other side, it takes a very strict management to complete such products and there is a
risk of running the spiral in an indefinite loop. So, the discipline of change and the extent of
taking change requests is very important to develop and deploy the product successfully.
Predictability
Reliability
Consistency
System runtime functions: An execution environment with high response time, reliability of
execution and security of data
System administration functions: Administrative support required for managing
transactions
Application development functions: Customization support to design and manage the user
interface.
Expert systems (ES) are one of the prominent research domains of AI. It is introduced by the
researchers at Stanford University, Computer Science Department.
The expert systems are the computer applications developed to solve complex problems in a
particular domain, at the level of extra-ordinary human intelligence and expertise.
High performance
Understandable
Reliable
Highly responsive
Capabilities of Expert Systems
Advising
Instructing and assisting human in decision making
Demonstrating
Deriving a solution
Diagnosing
Explaining
Interpreting input
Predicting results
Justifying the conclusion
Suggesting alternative options to a problem
Knowledge Base
Inference Engine
User Interface
Knowledge Base
Knowledge is required to exhibit intelligence. The success of any ES majorly depends upon
the collection of highly accurate and precise knowledge.
What is Knowledge?
The data is collection of facts. The information is organized as data and facts about the task
domain. Data, information, and past experience combined together are termed as
knowledge.
Factual Knowledge: It is the information widely accepted by the Knowledge Engineers and
scholars in the task domain.
Heuristic Knowledge: It is about practice, accurate judgement, one’s ability of evaluation,
and guessing.
Knowledge Representation
It is the method used to organize and formalize the knowledge in the knowledge base. It is in
the form of IF-THEN-ELSE rules.
Knowledge Acquisition
The success of any expert system majorly depends on the quality, completeness, and
accuracy of the information stored in the knowledge base.
The knowledge base is formed by readings from various experts, scholars, and
the Knowledge Engineers. The knowledge engineer is a person with the qualities of
empathy, quick learning, and case analyzing skills.
He acquires information from subject expert by recording, interviewing, and observing him at
work, etc. He then categorizes and organizes the information in a meaningful way, in the
form of IF-THEN-ELSE rules, to be used by interference machine. The knowledge engineer
also monitors the development of the ES.
Inference Engine
Use of efficient procedures and rules by the Inference Engine is essential in deducting a
correct, flawless solution.
In case of knowledge-based ES, the Inference Engine acquires and manipulates the
knowledge from the knowledge base to arrive at a particular solution.
Applies rules repeatedly to the facts, which are obtained from earlier rule application.
Adds new knowledge into the knowledge base if required.
Resolves rules conflict when multiple rules are applicable to a particular case.
Forward Chaining
Backward Chaining
User Interface
User interface provides interaction between user of the ES and the ES itself. It is generally
Natural Language Processing so as to be used by the user who is well-versed in the task
domain. The user of the ES need not be necessarily an expert in Artificial Intelligence.
It explains how the ES has arrived at a particular recommendation. The explanation may
appear in the following forms:
No technology can offer easy and complete solution. Large systems are costly, require
significant development time, and computer resources. ESs have their limitations which
include −
Application Description
There are several levels of ES technologies available. Expert systems technologies include
These information are often external, unstructured and even uncertain. Exact scope and
context of such information is often not known beforehand.
Market intelligence
Investment intelligence
Technology intelligence
Following are some examples of intelligent information, which is often the source of an ESS:
External databases
Technology reports like patent records etc.
Technical reports from consultants
Market reports
Confidential information about competitors
Speculative information like market conditions
Government policies
Financial reports and information
Disadvantage of ESS
All the systems we are discussing here come under knowledge management category. A
knowledge management system is not radically different from all these information systems,
but it just extends the already existing systems by assimilating more information.
As we have seen, data is raw facts, information is processed and/or interpreted data, and
knowledge is personalized information.
What is Knowledge?
Personalized information
State of knowing and understanding
An object to be stored and manipulated
A process of applying expertise
A condition of access to information
Potential to influence action
Intranet
Data warehouses and knowledge repositories
Decision support tools
Groupware for supporting collaboration
Networks of knowledge workers
Internal expertise
Definition of KMS
Purpose of KMS
Improved performance
Competitive advantage
Innovation
Sharing of knowledge
Integration
Continuous improvement by:
o Driving strategy
o Starting new lines of business
o Solving problems faster
o Developing professional skills
o Recruit and retain talent
Start with the business problem and the business value to be delivered first.
Identify what kind of strategy to pursue to deliver this value and address the KM problem.
Think about the system required from a people and process point of view.
Finally, think about what kind of technical infrastructure are required to support the people
and processes.
Implement system and processes with appropriate change management and iterative staged
release.
Artificial intelligence
Computational neuroscience and bioscience
Cloud computing
Decision support systems
Evolutionary computing
Human computer interface
Information retrieval
Intelligent agent and web applications
Intelligent business computing
Intelligent control and automation
Intelligent fault diagnosis
Intelligent sensor networks
Knowledge discovery and data mining
Next generation Internet
Machine learning theory and methods
Pattern recognition
Reasoning and expert systems
Soft computing
Speech, image, and video processing
The Internet of things
Virtual reality and human-computer Interaction
It has been quite some time since artificial intelligence is making headlines owing to a
plethora of applications which could be derived from it. The technology could be enabled to
allow computers to read, see, listen and even respond to human queries. However, recent
times have made A.I. be quite a buzzword. A.I. is powered by the technologies of machine
learning.
Blockchain:
In the simplest of terms, a blockchain refers to an append-only transaction ledger. This ledger
can be used to write new forms of information but the previously written information cannot
be edited, adjusted or changed. This is made possible with cryptography to link the newly
added block.
Bitcoin was created by a group of people referred to as Satoshi Nakamoto. Since then, it has
become something much bigger. Previously, it had been used only in the field of generating
digital currency or cryptocurrency. However, the technology could be used in various other
areas. There are numerous reasons for Blockchain’s popularity, such as:
1. Immutability
2. Being consensus-driven
3. Decentralization
4. Highly secure owing to cryptography implementation
5. Can be publicized unhesitatingly
Cognitive Technology:
Cognitive technology lies in the same basket as machine learning and deep learning.
However, it is powered by a much larger concept. Cognitive technology is powered by NLP
or Natural Language Processing and speech recognition. This is a form of technology which
mimics the functions of the human brain on numerous levels which include data processing,
data mining, pattern recognition etc.
The technology could be made even more mainstream in the years upcoming via
implementing it in the fields of automation, information technology etc. The various
mainstream uses of cognitive technology are:
This is what led towards humanized big data. Humanizing big data refers to collecting or
accumulating data in a manner in which non-data scientists too can infer clear answers from.
They can then use this data to make their daily decisions. However, humanizing big data isn’t
something which can be automated.
The human element is crucial in understanding the data. This is something which is being
researched. Big data is being developed so that a soulless technology can replace the human
element in the process.
ISM/U4 Topic 7 Impact of IT
on Organization
THEINTACTFRONT20 FEB 2019 2 COMMENTS
Information technology systems are used by organizations to perform various tasks. Some
use IT to provide for the basic processing of transactions, while others enable customers,
distributors and suppliers to interact with the organization through various communication
technology systems such as the internet.
Flow of Information: Information is a key resource for all organizations. What information
describes might be internal, external, objective or subjective. External information describes
the environment surrounding the organization. Objective information describes something
that is known. Subjective information describes something that is currently unknown. With
information technology the flow of all these three types of information is made simple buy
use of centralized data centers where all this data can be retrieved. Information in an
organization can flow in four direction and these include upward flow of information,
downward flow of information, outward flow of information and horizontal flow of
information.
Decision Support: A decision support system (DSS) is a highly flexible and interactive IT
system that is designed to support decision making when the problem is not structured. A
DSS works together with an artificial intelligence system to help the worker create
information through (OLAP) online analytical process to facilitate decision making tasks that
require significant effort and analysis.
Data Management: With the help of database software, an organization stores all its relevant
data on a database. This infrastructure can be designed when it is internal or external. An
internal centralized system can only be accessed with in the organization while an external
centralized system allows data to be accessed out side the organization using a
remote (IP) internet protocol Address or a domain name. In this case, employees or managers
can use a company website to access relevant company data by use of passwords. This data is
not exposed to the public and search engines.
The multimedia approach empowers the student to speak to data utilizing a few unique
media. It can stimulate the interest of the student and give them striking impressions.
Multimedia can consider diverse learning styles – some students learn by translating the
content, while others require more graphical portrayals.
Can build up an inspirational state of mind among the students towards the educating learning
process. Multimedia Approach considers self-pacing, the system of simulation can be
successfully connected through the interactive media approach.
Aides being developed of higher order thinking abilities. The interactive media approach
gives the student the adaptability of ‘anyplace’, ‘whenever’ learning.
Aides in creating groups and relational abilities. Viable remediation projects can be executed
through the media approach. The multimedia approach can connect dialect hindrances since
the sound isn’t the main methods for communication.
The word multimedia is made up of the two Latin words “multi” which means many and
“media” which is the substance through which something is transmitted. In this case multi is
the multiple data types such as voice, video, image, animation, text etc. and media is the
computer environment used to transmit the information made up of this multiple data types.
Multimedia data imposes new requirements to the computer networks due to the large
volumes involved. In addition to huge Volumes the way we look at multimedia information is
also different.
A multimedia information system aims at integrating the various tools needed for the
acquisition, management, processing and dissemination of multimedia information related to
environment
The variety of media types is an important feature of modern information systems. In order to
deal with the variety, integration is a critical concern. Therefore,
Multimedia Information System (MIS) is then one which allows end-users to share,
communicate and process a variety of forms of information in an integrated manner
The computer can help in the task of managing and processing the information;
Information users only have to deal with one integrated environment rather than a number
of separate information systems.