Professional Documents
Culture Documents
MEANINGS
3PO+PDC
The word “system” can be explained in a simple way as, “a set of detailed methods,
procedures and routines created to carry out a specific activity, perform a duty, or
solve a problem”. It is an organized, purposeful structure that consists of interrelated
and interdependent elements (components, entities, factors, members, parts etc.
BI TOOLS
1. data and create reports,
2. dashboards and
3. data visualizations to make the analytical results available to corporate decision
makers as well as operational workers.
4. Scorecards
5. Data mining & Statistical analysis
6. Simple report & Querying
12) Hardware is the part of Information Systems that can be touched which is the physical
components of technology. Computers, keyboards, hard drives, iPads and flash drives
are all examples of Information.
13) Input Devices are devices through which we interact with the systems and include
devices like Keyboard, Mouse and other pointing devices, Scanners & Bar Code,
MICR readers, Webcams, Microphone and Stylus/ Touch Screen.
20) Virtual memory – OS + HW Support – Imaginary – When RAM runs low – Paging
file
Virtual Memory is in fact not a separate device but an imaginary memory
area supported by some operating systems (for example, Windows) in conjunction
with the hardware.
If a computer lacks the Random-Access Memory (RAM) needed to run a program or
operation, Windows uses virtual memory to compensate. Virtual memory combines
computer’s RAM with temporary space on the hard disk.
When RAM runs low, virtual memory moves data from RAM to a space called a
25) Application software includes all that computer software that cause a computer to
perform useful tasks beyond the running of the computer itself. It is a collection of
programs which address a real-life problem of its end users which may be business or
scientific or any other problem.
26) Database
A database is designed to take data, put the data into context, and provide tools for
aggregation and analysis.
show particular deposit and withdrawal patterns are not good credit risks.
28) Routing
It refers to the process of deciding on how to communicate the data from source to
destination in a network.
29) Bandwidth
It refers to the amount of data which can be sent across a network in given time.
30) Resilience
It refers to the ability of a network to recover from any kind of error like connection
failure, loss of data etc.
31) Contention
It refers to the situation that arises when there is a conflict for some common resource
in a network. For example, network contention could arise when two or more
computer systems try to communicate at the same time.
32) Packet
The fundamental unit of data transmitted over the Internet. When a device intends
to send a message to another device (for example, your PC sends a request to YouTube
to open a video), it breaks the message down into smaller pieces, called packets. Each
packet has the sender’s address, the destination address, a sequence number, and a
45) Firewall
It is a system that enforces access control between two networks. All traffic between the
external network and the organization’s intranet must pass through the firewall that
allows only authorized traffic between the organization and the outside to pass
through it. It must be immune to penetrate from both outside and inside the
organization.
46) Encryption
It is the conversion of data into a secret code for storage in databases & transmission
over networks. The sender uses an encryption algorithm with a key to convert the
original message called the Clear text into Cipher text.
47) E-Commerce
E-Commerce is the process of doing business electronically. It refers to the use of
technology to enhance the processing of commercial transactions between a
company, its customers and its business partners. It involves the automation of a
variety of Business-To-Business (B2B) and Business-To-Consumer (B2C) transactions
through reliable and secure connections.
48) Architecture
Architecture is a term to define the
style of design and
method of construction,
used generally for buildings and other physical structures.
In e-commerce, it denotes the way network architectures are build.
Application Tier: Also, called the Middle Tier, Logic Tier, or Business Logic; this tier is
pulled from the presentation tier. It controls application functionality by performing
detailed processing. In computer software, business logic or domain logic is the part
of the program that encodes the real-world business rules that determine how data
can be created, displayed, stored, and changed.
Database Tier: This tier houses the database servers where information is stored and
retrieved. Data in this tier is kept independent of application servers or business logic.
The data tier includes the data persistence mechanisms (database server and file
Client(s)Presentation Tier
DesktopLaptopWorkstation
Application Tier
Server
DatabaseTier
Database Database
51) M-commerce
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless handheld devices such as cellular telephone and Personal Digital
Assistants (PDAs). M-commerce enables users to access the Internet without
needing to find a place to plug in.
52) Virtualization
Virtualization means to create a virtual version of a device or resource, such as a
server, storage device, network or even an operating system where the framework
divides the resource into one or more execution environments. Virtualization refers to
technologies designed to provide a layer of abstraction between computer hardware
systems and the software running on them. By providing a logical view of computing
resources, rather than a physical view; virtualization allows its users to manipulate
their systems’ operating systems into thinking that a group of servers is a single pool
of computing resources and conversely, allows its users to run multiple operating
systems simultaneously on a single machine.
57) Software as a Service (SaaS): SaaS provides ability to the end users to access an
application over the Internet that is hosted and managed by the service provider.
Thus, the end users are exempted from managing or controlling an application the
development platform, and the underlying infrastructure. SaaS changes the way the
software is delivered to the customers. SaaS provides users to access large variety of
applications over internets that are hosted on service provider’s infrastructure. For
example, one can make his/her own word document in Google docs online, s/he can
edit a photo online on pixlr.com so s/he need not install the photo editing software
on his/her system - thus Google is provisioning software as a service.