Professional Documents
Culture Documents
INFORMATION
TECHNOLOGIES
Course 17581 – Bachelor´s in Management and Technology
2022/2023
Tabla de contenido
1. INTRO TO BUSINESS INFORMATION SYSTEMS .........................................................................................4
1.1 COMPONENTS OF AN INFORMATION SYSTEM ......................................................................................................................4
1.2 TYPES OF DATA .......................................................................................................................................................................4
1.2.1 ANALOGUE DATA vs DIGITAL DATA.....................................................................................................................................4
1.3 DATABASE ...............................................................................................................................................................................4
1.4 DATA VS INFORMATION .........................................................................................................................................................5
1.5 CHARACTER STRING................................................................................................................................................................5
1.6 NUMERIC DATA TYPES............................................................................................................................................................5
1.7 BOOLEAN DATA ......................................................................................................................................................................5
1.8 BINARY NUMBERS ..................................................................................................................................................................5
1.9 BYTE ........................................................................................................................................................................................6
Computers finitely store digital data, meaning there is a limit to the amount of it, while analog is infinite. Analog also
may include noise references as it records the soundwaves, while digital data can reduce noise as it is transmitted.
Due to the recent advancements in digital technology, digital data has increased in its use while analogue has
decreased. Digital data provides more clarity in the transmitted content and offers more security than analogue data.
1.3 DATABASE
A database is an organized collection of data; a compilation that may be sorted according to the type of formats, such
as images and text. It may also include a combination of different data formats.
The purpose of a database is to organize the data. It may be listed in alphabetical order or based on the types of files
collected. Storing data into a database makes the data searchable and easily retrievable.
A flat file is a smaller database that only includes one table of data. Flat file databases are used for smaller amounts
of data. They can also be used to separate categories with different types of data.
Data can come from a variety of sources besides databases: APIs; social media; CRMs.
Application Programming Interface: type of software that typically uses the internet to process data for
computer applications. It is typically used for programs that require data, such as updates. It makes the process
of sending and receiving data more simplified.
Social media: platforms store data from users and accounts. Data may be extracted or downloaded depending
on the site's settings. Social media data can be useful for companies. For example, businesses that track their
social media stats could benefit from using this data.
Customer Relationship Management: a system used to store data about customers. These are commonly
used by retailers and other organizations that conduct business with customers.
An integer is a numeric value without a decimal. Integers are whole numbers and can be positive or negative.
An integer cannot be a decimal or a fraction
In a database, a distinction is made between short and long integers, referring to how much data storage is
used for the number.
o A short integer is typically stored using 16 bits, which means that you can store up to 2^16, or 65,536
unique values.
o For any number larger than that, you would need to use a long integer, which uses 32 bits or more.
Any system of measurement that records a pass/fail state or a yes/no state is essentially a binary system in
its most basic form.
1.9 BYTE
A bit is the smallest unit of data that can be represented on a computer. Binary uses two numbers, either a 1 or a 0.
These are stored in the computer's memory. Bits are very tiny and the computer changes information into bits and saves
the bits. Then it can translate the bits back into information.
A bit can either be 0 (zero) representing no charge (off) or 1 (one) representing a full charge (on). This of these like a
light switch that is either off or on. There are no other characters or symbols understood by the digital computer.
Because a bit is so small, the computer groups these bits into sets of eight, called bytes.
A byte is a set of eight bits. The total possible combinations of these eight bits equals 256 distinct values. This covers
the alphabet, special characters, and more.
When people refer to the quantity of information in a computer's memory, they typically use bytes. Each byte acts as
one unit, but each of these units is made of the eight bits.
2. COMPUTER BASED INFORMATION SYSTEMS
2.1 MAIN CONCEPTS
Data is one piece of a record. Individually, some of your data might be your first name, last name, address. When we
put together this information, we see a record.
If a company stored its employee´s data and compiled them as a record, and those records processed into an
employee list, we would then have a database or a collection of related records. Companies store these
records in a digital format, and through input devices they are turned into usable data.
Hardware are the parts of the computer that are tangible and can be physically touched. Peripheral devices surround
the system unit and connect to it by wired or wireless technology to the system unit. Peripherals communicate with the
interior components of the system unit via installed software.
Internal hardware names the internal components of a computer; CPU, RAM, Graphics Card, ROM…
External hardware connects to the computer and control either input or output functions.
System software is a computer program that runs the hardware and interacts with the application software to create
a complete user experience. It is made up of programs written in low-level languages that are used to communicate
with hardware. Ex: Linkers, Bootstrap, BIOS.
Operating system is a piece of software that manages software and hardware of a computer. Its job is to serve as a
link.
Application software is a program specially tailored for end-users. Ex: Microsoft Office.
File sharing
Internet connection
Peripheral devices sharing
Cost efficiently
Increased storage capacity.
CLASSIFICATION OF COMPUTER NETWORKS
Network size
o LAN – Local Area Network
o MAN – Metropolitan Area Network
o WAN – Wide Area Network
Transmission media
o Describes the material substances that carry energy waves, which include the data being transferred.
Management method
o Include peer-to-peer, mainframes, and client/server.
o In a peer-to-peer network, the tasks are allocated among all the members of the network and there is
no real hierarchy
o In a client/server network, several network clients or workstations request resources or services from
the network. One or more servers manage and provide these resources or services.
o In mainframe networks, a very powerful computer does the processing, and very basic terminals are
used to access it.
Network typology
o Point to Point
o Bus
o Ring
o Star
o Tree, Mesh, Hybrid
BANDWIDTH. Also known as DATA TRANSFER RATE is typically expressed in Mbps or Gbps. COST. The cost of
installing the network hardware, such as cables and switches; and the cost of running and maintenance. RELIABILITY.
It refers to how often the network underperforms. More reliable networks usually have backup systems.
3. INFORMATION SYSTEMS: APPLICATIONS AND IMPACT
3.1 WHAT IS E-COMMERCE?
The purchasing and selling of items and services and the transaction of information funds over the internet, also known
as computer network.
E-commerce has enabled different functions: advertising, servicing, digital payments and delivering. Many local and
international businesses have shifted to practicing transactions through e-commerce.
E-commerce website: term used to describe a website that facilitates the purchase and sale of tangible goods,
services, and digital commodities. Customers may place purchases, pay, track shipping, and receive customer care.
Types of commerce classified by the nature of transaction
o Business to Business (B2B)
o Business to Consumer (B2C)
o Business to Government (B2G)
o Consumer to Consumer (C2C)
o Consumer to Business (C2B)
Market efficiency is improved:
o Eliminates the intermediary (suppliers and distributors). It enables consumers to purchase products
directly from the manufacturer.
o Provides an easy way to acquire pricing information. Consumers easily search and compare prices.
o Provides sellers with price elasticity information. This means that sellers can gauge the demand for a
product based on the fluctuations in price.
Webpages that represent a specific store. Specially for low-value commodities and typically have a quick
purchasing process.
o Walmart is a good example, where final users are the individuals who purchase the products
manufactured.
Raw material suppliers sell to manufacturers => Manufacturers sell to distributors => Distributors sell to retailers
=> Retailers sell to clients.
o A good example are technological companies, (e.g., HP) that sell devices to retailers (e.g., Media Markt)
3.1.3 CONSUMER TO CONSUMER (C2C)
Refers to one individual selling a product to another individual. This often occurs through online auctions or
clearinghouses, Auctions match buyers and sellers that engage in bidding processes over the web.
Clearinghouses: arrange for the purchase and delivery of goods from a third party. They act as an intermediary
to facilitate the purchase of an item.
3.1.4 E-GOVERNMENT
E-government: citizens of a country access public services via electronic means. E-government offers new avenues
for direct government access and immediate government service delivery for citizens.
3.1.5 ADVANTAGES OF E-COMMERCE
Streamlined purchasing
No restrictions
It can respond more quickly to the needs of the buyer or the market.
It allows tracking the location and receiving notifications customized to one´s likes.
3.2 E – COMMERCE & M – COMMERCE: BUYING AND SELLING ON WEB AND MOBILE DEVICES
3.2.1 WHAT IS BUSINESS INTELLIGENCE?
BI is a computerized intelligence system that helps organizations collect, manage, and interpret data needed to make
decisions. It employs a combination of tools, such as:
- Database management
- Decision Support systems
- Data mining
- Statistical analysis
How is BI different from a general decision support system?
1. First, BI is not focused on supporting a specific type of decision, but on all the operations of a company.
2. Second, BI often takes place on a continuous basis in close to real-time.
3. Third, BI has an element of intelligence, which means it tries to integrate information internal to the organization
and information related to the market conditions and specific competitors.
This type of analytics uses historic data to predict the probability, for example, of getting into an accident.
Flexibility
o Too much flexibility has its problems. With the iterative model, where users are involved in every phase
of the project, constant modifications are inevitable, and confusion and a lack of proper project cohesion
could be the result.
3.4 INFO SYSTEMS: ROLES, GLOBAL ISSUES & EMERGING TRENDS
All types of companies or businesses depend on IT. All of them deal with four main info. Systems:
1. Communications 2. Information processing 3. Decision making 4. Inventory.
3.4.1 COMMUNICATIONS
Many businesses use email as their official communication method. These are either web-based or via intranet (private
TCP/IP network). Establishing such a system depends on internet access, network infrastructure, mail servers’
availability and authorized domain access.
The role of IT team in Communications. The network administrator ensures a reliable and secure network
configuration and connectivity; while the system administrator manages the web server, determines the username
configurations, and manages user privileges and access.
3.4.4 INVENTORY
Inventory software varies with the type of business. Items in the inventory always have a valuation. It involves a
comprehensive and well-catalogued list of all the business' assets.
The role of IT team in Inventory
The IT Team monitor the inventory data, and they need to important aspects such as servers, computers, backup power
supplies, scanners, printers, or digital imaging machines.
The department in change of the inventory must moni2tor the acquisition, movement, repair, handling and disposal of
data.
The IT Team must create and organized inventory system.
4. VIRTUALIZATION AND DATA SERVICES
4.1 VIRTUALIZATION: DEFINITION & BENEFITS
Virtualization is the process of introducing a layer of software in a computer system, immediately above the hardware
it runs on, with the purpose of creating a platform that everything else can use.
Benefits of virtualization
o Cost saving => reduces capital and operating expenses by eliminating duplication
o Reduces downtime => when something fails, it can be quickly reloaded and restarted.
o Agile configuration => a software-based organization can be easily configured, usually at a mouse click
o Provides compartmentalization => user applications run in their own virtual machines, so they are
isolated. Also, because they are software based, they can be re-started easily.
o Centralized management => all management functions are handled from a single client, that can be
brought up on any station by administrative personnel.
• Virtual machines share mainframe resources instead of using it one-by-one in their turn, efficiency is higher.
• Every VM is an exact copy of the original hardware, so you can run any OS on every single machine.
• Every user has its own OS, so it doesn't affect other users - the entire system becomes more reliable.
After some time, CP/CMS was improved, renamed, and launched for sale. It became the basis for VM/370 OS, which
was used with one of the most popular IBM's mainframes, System/370.
Mainframe: big, powerful computer. Terminals: devices with a screen, keyboard, and mouse.
Users worked with terminals to enter data and set tasks, and the mainframe processed these data. One mainframe
could be connected to tens or even hundreds of terminals.
Computers were expensive and bulky; companies preferred to use a mainframe with terminals because they could
not afford to buy a computer for every employee.
Over time, computers became cheaper and smaller. In the 1980s, personal computers changed terminals.
SoftPC was released in 1988. This software allowed to run Windows and MS-DOS applications on other
operating systems.
Evolution of Internet led to a rise in virtualization technologies. At first, big companies hosted their websites on servers.
After some time, smaller companies and individuals also felt a need to have a website. They didn't have money to buy
own servers, so other companies decided to rent the equipment to them. It was the beginning of the hosting industry.
In the first years, hosts provided you with disk space on a server. Websites of different users were kept in folders
of one computer => unreliable and insecure, while renting an entire server was expensive.
Virtual servers were a good alternative: inexpensive and almost as reliable as dedicated servers.
VMmanager was revolutionary. ISPsystem developed in 2003. It makes virtualization available for everyone.
• The hypervisor takes all the software and programs, including the operating system and runs it in a simulation.
Virtualized servers are called virtual machines, and virtual servers can have multiple virtual machines running.
5. BUSINESS INFO SYSTEMS (ENTERPRISE SYSTEMS FOR BUSINESS – PART 1)
Definition of Transaction: any type of exchange between two people which provokes a change in something. Keeping
track of transactions requires a transaction processing system.
Works in designated periods of time. Must be running always to carry out transactions in real time.
Measurement-oriented. Action-oriented.
Gather data for defined periods of time and process it. Support random data inputs continuously.
• Details regarding transaction are processed, categorized and recorded, and the financial database is updated to
reflect the order.
Able to handle multiple transactions at once and provide businesses with added value. They help save time
and resources which would have been wasted otherwise.
The online nature allows to accept transactions and customer from all over the world, and eliminate errors
by taking out the human influence and allowing for data manipulation.
Atomic. Transactions are indivisible; once started, they are performed to completion.
A key characteristic of enterprise software is that it addresses an issue of critical importance for the entire org.
not just an issue within a single unit or department.
This means that many different people in different units of the organization need to use the software simultan.
Enterprise Resource Planning. Set of integrated programs to manage critical operations of an organization. ERP has
emerged as an important tool in controlling costs and product flows through a complex enterprise.
Customer Relationship Management. Handles all information of an organization about its customers, such as contact
information, purchasing history and individual preferences. It can also keep track of all customer inquires.
6. BUSINESS INFO SYSTEMS (ENTERPRISE SYSTEMS FOR BUSINESS – PART 2)
ERP & CRM
Accessibility and reliability of data: Access important data rapidly, crucial in decision-making processes.
Strengthens the agility of business. Availability of data and efficiency enables to identify and react to new
opportunities.
Proper planning and forecasting accuracy. Accurate and reliable data vital for forecasting.
Improvement of work processes. Implement best practices, which are most efficient
Upgrade of technology infrastructure. Bring all information technology in an organization up to speed in an
organized way.
DISADVANTAGES
High cost
Disruption of upgrades
Long implementation time
Difficulty in managing change
Software customization
User frustration
Customer touch points: types of interactions that companies have with customers. Traditional customer touch
points include telephone, direct mailings, or physical interactions. CRM systems can manage additional touch
points through technology such as websites, and smartphones.
Data consolidation: critical component to a company's CRM efforts. Customer data must be managed properly
for long-term customer relationships. Repeating customers are the main generators of revenue.
Data Warehouse: term that describes storing large capacity data, which has new information added constantly, that is
easily retrievable and used only decision-making purposes.
Growing the organization: refers to increasing the overall customer base, profitability and revenues. CRM
can aid in reaching more customers through tailored product and service offerings.
7. BUSINESS INFO SYSTEMS (ENTERPRISE SYSTEMS FOR BUSINESS) – PART 3
JIT INVENTORY. The Just In Time Inventory describe a resource management strategy that directly matches the
receipt and storage of raw materials with production schedules.
A company that uses JIT system only orders or purchases as many raw materials as needed to manufacture
a set of goods rather than ordering a bulk quantity of resources to last a long time.
Just enough inventory is available to meet the demand, but not enough where the company stores an excess.
Just in Time inventorying requires that producers forecast production schedules accurately, so cost can remain
low and waste can be reduced.
o The ultimate goal is to improve production by reducing non-essential costs overall.
32WQEEE
ADVANTAGES Explanation
Reduce inventory waste Elimination of overproduction, which occurs when supply of an item overreaches the
demand and leads to an accumulation of unsalable inventories.
Decrease warehouse cost The warehouse holding costs are minimized. There is no need to keep items for a long
period of time.
Control for manufacturer Manufacturer has entire control over process, which performs on a demand-pull basis.
This makes JIT model flexible to ever changing market conditions.
Local sourcing Since JIT needs you to start manufacturing only when an order is placed, you must
source raw materials locally as possible.
Smaller investments JIT carries out activities right the first time when it´s done. Decreases inspection and
rework costs. Less investment for organization, fixing errors and more profit.
RISKS Explanation
Running out of stock With JIT manufacturing, you do not have much stock. If projections are inaccurate, the
risk of not having enough stock available to respond to demand.
Lack of control - time frame Having to depend on punctuality of suppliers puts at risk delaying customer´s
products. Customers will shift to competitor´s products if their expectations are not
Dependency on suppliers satisfied.
Lack of planning Companies should understand sales trends. Most have seasonal sales periods. This
means some products will need different stock levels at certain times.
A minor disruption in supplies to the businesses from just one supplier could force production to cease at very short
notice. Some businesses find JIT management to be gamble because it can become very costly or detrimental to
revenue when supply cannot meet demand.
Account payable: this sub-ledger shows all the money that you are sending outside the organization. It allows
to monitor invoices and pay instantly for new purchases.
Asset management. Necessary feature when a business is big and has a lot of tangible assets and
commodities. Each asset´s life cycle is easy to follow when you have an ERP accounting module.
Payroll. It helps an accountant do computation for employee´s salaries, taxes, leave payments, travel costs
and other staff expenditures.
Audit. Irreplaceable and crucial accounting procedure. Thus, it would be best to have an ERP accounting
module with an analytics and audit feature.
Profit tracker Crucial as it reveals overall business performance in terms of profits. It will indicate
precisely where most profits are arising.
Risk management This tool is necessary as business operations are susceptible to all manner of risks
Reporting and analytics This tool provides real time data graphic to help make better decisions
Currencies management This tool is helpful if the organization deals with worldwide operations. It will do currency
conversions to help speed up transactions in different currencies.
Tax management This tool should support tax reporting and tax auditing functions.
Internet function This is to ensure electronic transfer of documents and help control fund transfers.
Encryption Security of sensitive business data is vital, and a good ERP accounting tool should
provide it.
Automation Ability to get rid of manual data entry and replace it with automatic data entry that
reduces labor and errors.
Updates Constant automatic updates feature a must-have. It is a handy tool to inform the user
when their tax reporting or other financial practices are due.
Scalable It should be an enterprise ERP with an accounting option that should be easily upgrades
to include a newer version, new users, new data…
Mobile compatible In this era, accountants and finance professionals need a software program they can
monitor from anywhere anytime they want
Bespoke An ERP system should be easy to customize to meet organization´s needs. If more
capabilities the tool should support it.
Integration It should be a single platform capable of sourcing transactional data from different
business processes and storing it in a central location.
Planning: to get the best results from SCM, the process begins with matching supply with customer demand.
Firms must predict what their future needs will be. This relates on equipment, materials needed, limitations or
staffing needs.
Sourcing: entails working with vendors to supply the raw materials needed throughout the process. A company
may be able to plan and work with a supplier to source goods in advance. SCM sourcing may include ensuring:
o Raw materials meet specifications
o Prices paid for goods are in line with market expectations
o Vendor has flexibility to deliver emergency materials
o Vendor has a proven record of delivering goods in time and in good quality.
Manufacturing: company transforms raw materials using machinery, labor or other external forces. The final
product is the ultimate goal of the manufacture process, though it is not the final stage of SCM. It may be divided
into sub-tasks. A firm must be attentive on controllable factors that may cause deviations.
Delivering: Once products are made and sales finalized, the company must get the product into the hands of
its customers. The distribution process is often seen as a brand image contributor. Companies with strong SCM
processes, have robust logistic capacities, and delivery channels to ensure timely, safe and inexpensive deliver.
Returning: SCM concludes with support for the product and customer returns. Its worse a devolution due to a
company´s error, than the returning itself. The return is often called reverse logistics, and the company must
ensure it has capabilities to receive returned products and assign refunds for them.
E -commerce: process of conducting business online. E -commerce eliminates the need for a physical store.
Instead, consumers select the products from a website/app and complete the payment online. It is cost -
effective and provides convenience for consumers as they can purchase products anytime, anywhere.
Considering those definitions, both concepts together create B2C ecommerce, which is the process of a business selling
products online. Using a B2C online model is cost – effective; allows businesses to reach as consumers as possible.
E-commerce businesses must still promote their brand and products but typically through online methods.
Since e-commerce is online, it makes sense that marketing campaigns do so.
o Typically, businesses use email and social media campaigns. Consumers can easily access the site
from online advertisements through links directly to the business, shop or specific products.
8.1.1 E-COMMERCE
MODEL EXPLANATION
Direct sellers Businesses that sell products directly to consumers. In ecommerce, direct sellers typically sell their
products through websites.
Online intermediaries Businesses that distribute products from another company directly to the consumer. Etsy and eBay
operate as online intermediaries.
Advertising based It doesn't offer products specifically but instead directs consumers to products from other companies.
Some examples include blogs and news media companies that aim to inform consumers about
products but then receive compensation if the products are purchased through their links.
Community based It makes use of forums or others to allow users engage in discussions. Communities can be built based
on the users' interests, which helps other companies market their products to specific groups or
markets.
Fee based A fee-based company generally provides services or content for a subscription fee. Magazines that
require a fee to access content are examples of feebased models.
BENEFIT EXPLANATION
Convenience Customers can shop at their convenience and are not bound by your business hours. They can shop
online whenever and wherever.
Geographically When you offer online sales, you can ship your products anywhere. This removes geographical barriers
unlimited and allows you to target a much larger audience.
Quickness of online It can take a while to make changes in products and prices and then communicate those changes to
transactions customers. Online, a sale can happen in minutes. A simple email or message on social media serves.
Rapid expansion A physical store has a limit to the number of customers it can serve. Online, it disappears. An online
store can serve many people at the same time, and they can purchase items without physical interact.
8.2 BUSINESS TO BUSINESS (B2B) E-COMMERCE. DEFINITION & EXAMPLES.
Business-to-business commerce is commerce between two different businesses rather than a business and a
consumer. B2B e-commerce is simply business-to-business commercial transactions that are conducted online.
TYPE EXPLANATION
e-Distributor Online businesses that provide goods and services directly for a company. Some e-distributors are
retailers, while others provide wholesale goods.
e-Procurement Model where a business creates a digital marketplace where buyers and suppliers engage in
transactions. Aside from creating the online marketplace, the e-procurement business may also provide
software to help suppliers and customers.
Exchange Provides a marketplace focused on serving one vertical market, such as the steel, chemical or copper
market. It's different from e-procurement because it's more narrowed.
CATEGORY EXPLANATION
Company website The target audience of a company website is the business clients and employees of other
businesses. Sometimes, a company website provides an entrance to an exclusive extranet,
available only to customers or registered users.
Product supply & Exchanges allow a company to shop supplies from multiple vendors, request proposals or bid on
procurement exchanges products. Some serve a range of industries while others serve a niche market.
Specialized or vertical Provide dedicated information, product listings, discussion groups…for specific businesses. Vertical
industry portals portal sites may also support buying and selling.
Brokering sites Intermediary between service providers and potential customers that need their specific services,
such as equipment leasing.
Information sites Provide information about a particular industry to companies and their employees. Information sites
include specialized search sites and those of trade and industry standards organizations.
• Higher switching costs. B2B customer loyalty is likely if they are satisfied with the product and service. In
contrast, B2C customers can be finicky and not loyal, resulting in large churn rates.
• Large market potential. B2B companies can target enterprises across many industries and geographies,
resulting in a big playing field. Or they can specialize in one industry, such as technology, and become leaders
in that field.
• B2B organizations advertise their products and services and conduct business online, making it easy for clients
to place bulk orders via an efficient digital transaction model.
• Faster delivery. Because B2B e-commerce tools make the sales process efficient for sellers, they accelerate
the process for buyers. Integrated systems enable the transacting companies to sync data across channels,
automate fulfilment and inventory updates, and manage complicated orders.
• Built-in order management Cloud-based e-commerce platforms easily integrate with back-end systems
or order management systems. This enables B2B sellers to synchronize order inventory and customer data
across every channel.
8.3 CONSUMER TO CONSUMER (C2C) E-COMMERCE. DEFINITION & EXAMPLES.
Business model in which consumers sell products or services to other consumers, The marketplace provides for buyers
and sellers to connect and transact. Consumers find good deals and make money from unwanted items.
The marketplace itself does not take ownership of the products being sold and makes money by charging a transaction
fee from the sellers.
• Increased Customer Base: the online aspect of the C2C eCommerce marketplace means that, thus increasing
the number of chances for conversion. your products and services are accessible to a worldwide audience.
• Credibility: sellers who choose to sell on a C2C platform do not have the credibility of a well-known seller or
the ability to sustain the platform. Utilizing space on an existing C2C eCommerce platform will provide credibility
for the seller under the “umbrella” of the C2C platform.
• Payment Issues: depending on the platform provider, there may or may not be a guarantee of payment for the
transactions made.
• Platform Fees: some providers might charge sellers (and occasionally buyers) for the use of the platform, on
a standard, reoccurring fee, or a profit percentage basis.
• Abundance of Choice: having many sellers offering specific products or services gathered in the same virtual
space means more options for buyers to choose from. Buyers can find exactly what they are looking for, which
boosts satisfaction and the feeling that they are getting their money’s worth.
• Faster Service: faster transactions, streamlining the service and saving time.
• Security: security measures and background checks may be implemented to protect buyers from potential
scammers acting as sellers.
• Dynamic web application. Delivers live data based on the requests and is considered one of the best types.
o Improved technical sophistication when compared to static web applications. Such web applications
use databases to store all private and public data displayed on the Website.
o They usually have an admin panel to control the backend and front -end portions, and allow the
administrator to modify the content and include different interactive components to the web app.
o The dynamic web app is built using various programming languages such as PHP, and ASP.NET.
• e-Commerce web application. When your web application offer products or services directly to customers,
you can call it an e-commerce which is no different from an online shopping store.
o Basic features include addition of new products, removal of outdated, managing payments, facilitating
a user - friendly interface. An effective management panel is very necessary to look at all these tasks.
o Professional website developers can customize such applications to make them user-friendly. Some of
the most common examples of e -commerce web apps include Flipkart,
• Single-page web application (SPA). Type of dynamic web application that does not require browser reloads
and functions as a single unit of a website application.
o These web applications are fast and dynamic as they implement all business and technological
strategies in the client-side browser.
o The development and implementation process of SPA is simple and faster. Since communication takes
place in asynchronous navigation, the process of dealing with the user’s request and response is faster.
• Portal web application. Offers a single access point to important data to a particular type of user.
o Web application that can access different sections from the home page. Portals are the best option for
organizations and businesses that prefer to build customized interfaces.
o Only registered users are allowed to access.
For example, clickstream can be used to perform market research to track web ads and social media
promotions. This is very helpful for e-commerce sites that share social media posts on their products.
Clickstream analysis can also be relevant for software testing to ensure consumers can correctly use the
software.
Clickstream data refers to the client data consisting of user´s actions on the site: number of backward/forward clicks,
time spent on pages, number of searches conducted…This allows marketers see which contents are popular.
Costs CapEx and WorEx, acquisition or maintenance costs for servers, licenses and other hardware/software.
Scope & performance Degree of fulfillment of specific requirements, knowledge about service and performance quality.
IT security & Factors like government, industry, or firm specific needs in the areas of security, compliance and
compliance privacy are covered.
Reliability Factors like service availability, consistency of delivery and fulfillment of the Service Level Agreements.
Service & cloud Factors like offered support and functions for controlling, monitoring, and individualizing the web
management interface.
• TCP/IP Performance focusing on End-to-End network response times and the Effects of operational
performance control.
• Network Routes and Equipment focusing on the End-to-End route response times, Identify route patterns and
defects and Identify and minimize loss of data in the network.
• Other important dimensions include adequate site capacity, Scalability and Fault-tolerance.
9.3.5 BUSINESS & FUNCTIONAL PLANNING
10. DECISION MAKING & SPECIALIZED INFORMATION SYSTEMS (PART – 1)
10.1 DECISION MAKING IN ORGANIZATIONS
After identifying a problem, the process of solving a problem starts with decision making. A model developed by Herbert
Simon divides the decision-making phase of the problem-solving process into three stages: intelligence, design, and
choice. This model was later expanded by George Huber:
• Intelligence
• Design
Decision • Choice
Making
• (decision making) +
• Implementation
Problem • Monitoring
solving
• Intelligence stage
o During this stage, the potential problems are identified and define, and there must also be investigation
of resource and environmental constrains.
• Design stage
o Development of alternative solutions to the problem, and evaluation of their feasibility.
• Choice stage
o This state requires selecting a course of action.
• Problem solving
o Problem solving goes beyond decision making. It includes implementation stage.
• Monitoring stage
o Decision makers evaluate the implementation to determine whether the anticipated results were
achieved, and to modify the process in case of new information.
INPUTS OUTPUTS
Company´s supply chain Key indicator report: summary of previous day´s critical activities.
Customers, suppliers,
competitors and
TPS & ERP systems stockholders Demand report: report developed to give certain information at
someones´ request.
Data warehouses and data Exception report: report automatically produced when a situation
marts is unsual.
Internet
Business intelligence Drill-down report: report providing detailed data about a situation.
Manufacturing MIS
o A typical manufacturing MIS is used to monitor the flow of materials and products throughout the
organization.
▪ Design and engineering
• Computer-Assisted Manufacturing
• Computer-Integrated Manufacturing
• Flexible Manufacturing Systems
Marketing MIS
o Information system that supports managerial activities in product development, distribution, pricing
decisions, promotional effectiveness and sales forecasting.
▪ Marketing research
• Product success is a direct function of the types of advertising and sales promotion
done.
▪ Product pricing
• Important to identify products, sales personnel, and customers that contribute to profits
and those that do not.
Human Resources MIS
o An information system that is concerned with activities related to employees and potential employees
of an organization, also called a personnel MIS.
▪ Human resource planning
• Overall purpose is to put the right number and types of employees in the right jobs
when they are needed, including internal employees and outside workers.
▪ Personnel selection and recruitment
• Companies seeking new employees often use computers to schedule recruiting efforts
and trips and to test potential employees’ skills.
▪ Training and skills inventory
• Some jobs require specific training for new employees. Other jobs may require general
training about the organizational culture, orientation or standards of organization.
▪ Scheduling and job placement
• Employee schedules are developed for each employee, showing job assignments over
the next week or month.
▪ Wage and salary administrationi
• Involves determining wages, salaries and benefits, including medical payments, plans
and retirement accounts.
▪ Outplacement services
11.2 USING ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS TO SOLVE COMPLEX PROBLEMS
Artificial intelligence includes the people, hardware, software, data, and knowledge used to develop computer systems
that demonstrate characteristics of intelligent behavior.
11.2.1 TYPES OF AI
Artificial intelligence involves systems that can simulate human decision-making for specific types of problems.
Robotics, which uses AI, is employed in a variety of applications ranging from automotive assembly lines to the robotic
arm on the International Space Station and can be used to complete tasks that are either too precise or too dangerous
for humans.
Natural language processing is an important part of AI, as it enables machines to interact with humans in a more natural
way. It allows computers to understand and respond to spoken commands, allowing for more efficient and accurate
communication between humans and machines. This technology is being used in various applications, such as
automated telephone services, mobile phones, and car navigation systems.
AI systems use learning systems, combining hardware and software, to change how they function or react based on
feedback. Computer games have this built-in, allowing the computer to learn from mistakes and become hard to beat.
Chess is an example, where computers have learned from many known chess matches.
By using neural networks, AI systems can quickly process large amounts of data and identify patterns that may have
otherwise been missed by traditional programming techniques. Neural networks allow AI systems to learn from their
mistakes and adjust their algorithms accordingly, allowing them to continue to improve their performance over time.
Neural networks can be used in a wide variety of AI applications, such as image recognition, natural language
processing, and even autonomous driving.
A genetic algorithm is a computational approach to problem solving that mimics the process of natural selection by
creating a population of solutions to a problem and selecting the best solutions through a process of variation and
natural selection. The best solutions are then used to create the next generation of solutions, until an optimal solution
is found.
EXPERT SYSTEM: hardware and software that stores knowledge and makes inferences, like those of a human expert.
People and organizations should develop an expert system if it can do any of the following
• Provide expertise needed at several locations at the same time or in a hostile environment that is dangerous to
human health
• Solve a problem that is not easily solved using traditional programming techniques
• Provide expertise needed for training and development to share the wisdom and experience of human experts
with many people
11.3 USING ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS TO SOLVE COMPLEX PROBLEMS
Virtual reality: incorporates an interactive computer-generated experience taking place within an environment that
mimics a physical setting or real world. Virtual Reality is also denoted as VR.
VR requires various devices such as joysticks, gamepads, mice, and keyboards. While artificial intelligence reduces the
need for peripherals to create an environment, one needs computer displays, Television, Mounted displays, and goggles
Their main purpose is to manage and analyze data from a geographic location. Their main functions are:
• Manage the way data enters the system. GIS allows the user to capture and store data manually or
systemically.
• Data integration. GIS allows building information that gives a logical sense to the collected data. These
systems integrate various formats and geometries that guarantee the consistency and quality of the data.
• Data analysis. GIS analyzes data through layer manipulation and spatial modeling operations. They
transform data into relevant information.
• Information production. GIS allows users to consult and generate data that transmit relevant information
graphically, where the results are presented to interested users.
• Dissemination of results.
Digitization is the most common method of inputting information into GIS systems. This process converts
physical data and field data into a digital format through CAD.
Mapping GIS is used to gather, manage and analyze data. Analyzing spatial location, managing layers of information
and transform them into layers of information.
Urban planning Spatial database and as an analysis and modelling tool. It helps identify and establish zoning criteria that
allows for the expansion of urban development.
Transportation GIS is used to plan new road and route infrastructures, improving mobility across regions.
planning
Disaster risk Manage environmental problems and disaster relief. Predicting larger natural disasters to managing post-
management disaster actions.
Agricultural value Helps to create more efficient farming techniques, alongside analyzing soil data, understand the
chain seasonality and predict yields.
Public health Natural resources can be adequately maintained and managed. It is especially crucial for the allocation
and geographic distribution of those resources.
12. PERSONAL & SOCIAL IMPACT OF COMPUTERS (PART – 1)
12.1 IMPACT OF COMPUTERS ON WORK ENVIRONMENTS AND PRIVACY
How Does Technology Affect the Work Environment Today?
Positively
Electronic Involves monitoring people with technology, often without their knowledge. This can be done through video
surveillance or recording devices.
Personal Provided to companies when users sign-up for accounts. These companies then sell personal information
information to other companies that use the data to market to the user.
Identity theft Occurs when someone steals an individual's information to commit a crime. Identity thieves can use this
data to make purchases, apply for credit cards, get medical services, or apply for a job.
Cookies Small data files that websites use to track users visiting the site. Third-party cookies are typically the ones
that cause personal data to be compromised.
Spyware Small computer program that gets stored on a user's hard drive. It collects the user's habits and transmits
that information to a third party, all without the user's consent. The data is then transmitted to marketers,
criminals, or firms that pay others to collect data on users.
Employee Internet Employee Internet Management Software is used to ensure that employees are not using their work
Management Soft. computers for non-work activities.
Encryption The most important and effective privacy protection technology. Everything that is encrypted
becomes an unreadable jumble except to the one holding the key required to decrypt it. The
widely used encryption standard is OpenPGP with most popular implementations being PGPi
and GnuPG.
Instant message encryption Conversations can be encrypted using instant messaging clients that support encryption. The
conversation will be private, or undecipherable to anyone who might intercept the messages.
Virtual Private Network A real private network is the one between devices. A virtual private network emulates a
physical network scenario across computers and devices by encrypting connections.
When you connect to a VPN the connection is encrypted. This means that a web site that
tracks won’t see your own local IP address, but a random computer that is a part of the VPN
you are in.
Remailers Instead of sending an email to a recipient address directly, you send it to the address of a
remailer server, and then this server resends it to the destination address. This way, the
recipient won’t know it was you who sent it, but only the address of the remailer service.
Tor Electronic Frontier Foundation (EFF) set up a system called The Onion Router (Tor) for the
purpose of enabling online anonymity. It uses a network of volunteer servers to make the user
untraceable and uses a layered approach to encryption (hence the “Onion” in the name),
meaning that it encrypts and re-encrypts the data being transferred multiple times.
Anti-tracking browser features Some web browsers come with a “Do Not Track” option, but this does *not* guarantee that
you won’t be tracked. When this feature is enabled, your browser simply tells the web site
you’re visiting that you don’t want to be tracked, and the web developer may or may not have
designed the web site in such a way to cease any tracking activity once this flag is
encountered.
Fake accounts and single-use Fake accounts are designed to protect your anonymity.
emails
Single use email addresses are email addresses which are used only for one email or one
conversation, and discarded afterwards, making the sender unreachable and harder to trace.
Anonymous Proxies A proxy is a computer that stands between your own computer and the web. When you visit a
web site through a proxy your computer connects to a proxy server telling it to fetch and send
you the web site.
This means that the web site owners cannot see your computer (your IP address) accessing
the web site, but instead see the address of a proxy server.
Privacy controls Facebook and other similar services like Google, include privacy controls that can be used to
limit who can see your posts on your profile.
Digital cash Currently the best-known example of this is Bitcoin (or BTC). Bitcoin transactions are
completely anonymous and fully encrypted. The only thing attached to your bitcoin
transactions is an alphanumerical code called a Bitcoin Address.
12.2 CYBERCRIME
Cybercrimes are any crimes that involve a computer and a network. In some cases, the computer may have been used
to commit the crime, and in other cases, the computer may have been the target of the crime.
The group of persons involved in cybercrimes are called hackers or cybercriminals.
Cybercriminals seize the confidential or personal information of the users and use it for some malicious activity to serve
their own interests and benefits.
It overwhelms the traffic on the site from a variety of sources and slows the network. Just as a traffic jam clogs
the way of vehicles on the road, DDoS attacks prevent the regular traffic to enter on the site.
Such types of cyberattacks achieve effectiveness by using several compromised computer systems as a source
of attack traffic. It can affect the working of any IoT devices like computers or mobile phones.
12.2.2 BOTNETS
Botnets are the compromised computer networks that are controlled by the remote hackers. By these botnets,
the hackers send spam and attack on other computers by sending attachments and mails. The botnets are the
kind of malware system that are used for malicious attacks.
A botnet always affects a set of devices and not just one. Botnets basically work based on bots which get their
order from the master and work on the appellation bot that are communicated and transferred from the old chat
service Internet Relay Chat (IRC).
12.2.3 PHISING
Phishing is the type of cyber-attack that involves hacking through malicious email attacks. The hackers send
the malicious attachments and URLs to different users via email ids. These links are directed to gain access to
the user's account.
Most of these emails are not even flagged as spams. The hackers trick the users by claiming that the later one
needs to change their password or billing information for continuation of some services. As soon as the users
click the URL, the mail access is lost.
12.2.4 CYBERSTALKING
Involves online harassment where basically the security of a person is subjected.
The user is subjected to several series of online messages and emails. Cyberstalking helps the stalkers to know
everything about the user about their daily routine and work.
After pretending, they gain important and necessary information from you
They also try to follow your social accounts. And once they can access the information related to your account,
they try to sell or secure your access for their own profits.
After pretending, they gain important and necessary information from you
They also try to follow your social accounts. And once they can access the information related to your account, they try
to sell or secure your access for their own profits.
12.2.7 THEFT
Unidentified theft occurs when a criminal successfully gains a user’s personal information to steal funds or to
participate in a kind of fraud. The cybercriminals can also use your account or telephonic details to plan a
criminal activity or to claim benefits.
Unidentified theft of IoT devices generally occurs by hacking passwords of the users and retrieving their
personal information from some open or easy to track social media accounts or by sending phishing emails.
An exploit kit is a ready-made tool that is available online. The hackers purchase it directly from some sources
like dark web hacking forums and then release it into the devices. It embeds bugs into the IoT devices and
assists the hackers in gaining the control of the devices.
12.2.9 ONLINE SCAMS
These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic
amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can
cause malware to interfere and compromise information.
12.3 CYBERTERRORISM
The FBI enforces federal laws, those created by Congress which apply to everyone nationwide. One area of law which
they enforce is cyber terrorism. These crimes can occur against individuals, organizations, and governments.
Foreign governments may use hackers to spy on U.S. intelligence communications to learn about where our
troops are located or otherwise gain a tactical advantage at war.
13. PERSONAL & SOCIAL IMPACT OF COMPUTERS (PART – 2)
13.1 MALWARE
Malware ("malicious software“) is any kind of program or code that seeks to cause harm to a computer system.
The definition of malware is comparable to a pathogen. A foreign invader, like a virus, invades the system and causes
damage. A virus is a type of malware, just as it is a type of pathogen.
13.3 INTELLECTUAL PROPERTY AND OPEN SOURCE SOFTWARE: ISSUES AND CONCERNS
Software piracy is the illegal copying of copyrighted software.
Piracy of music, movies, and books is also a growing problem. Millions of people copy songs, digital books, or movies
onto their computer illegally. They download the media they want for free from a peer-to-peer file sharing website like
BitTorrent. This process denies the original artists, authors, or entrepreneurs the legitimate compensation they deserve
for their work.
Intellectual property
Intellectual property refers to the intangible or non-physical right that is the result of original thought, such as musical,
literary, or artistic works.
Copyrights laws give authors exclusive rights to their work. The copyright lasts for authors´ lifetime plus 70
years.
Patents
Patents are government grants that entitle the inventor to exclusive rights and prevent others from making,
using, offering for sale, or selling the invention.
Patents protect physical objects, such as product inventions or machines as well as inventive processes for
producing a physical product.
Author's patent is good for a period of 20 years from the filing date of the patent application.
Trademarks
A trademark consists of a distinctive word, phrase, or symbol that identifies a product or service. Names, like
Pepsi, or symbols, like the Nike swoosh, are considered trademarks.
Author can register this symbol with the State Patent Office.
Trademarks can be lost if one squanders them through excessive or improper licensing or if they become
generic and thereby enter the public domain.
13.3.2 OPEN SOURCE SOFTWARE
Open source means the software is distributed for free with accessible source code that can be modified and improved
by anyone.