0% found this document useful (0 votes)
15 views6 pages

Computer-Based Information Systems

Data refers to raw facts that can be organized into information. An information system processes data into useful information. Basic components of computer-based information systems include hardware, software, databases, networks, procedures, and people.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Computer-Based Information Systems

Data refers to raw facts that can be organized into information. An information system processes data into useful information. Basic components of computer-based information systems include hardware, software, databases, networks, procedures, and people.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Data

from the Latin word datum, refers to raw, • Transaction Processing System (TPS)
unorganized, and unprocessed facts. Data can be
TPS is known as a real-time processing system, It
in the form of a number, alphabets, date,
is an IS for all types of business transactions.
measurement and even statement.
• Management Information System (MIS)

MIS is a CBIS that consists of hardware and


Information
software applications that support all the
is popularly described as refined, structured, and organization’s business transactions. This IS
organized data. A process is required to transform collects raw data from different computer
data into information systems, analyzes and processes them and reports
them to assist and serve in decision-making

Information Processing – data processing


functions that are commonly related to internal • Decision-Support system (DSS)
operations
DSS is a computer-based application that helps
Data Maintenance – system’s functional activities companies identify and give solutions by making
such as adding, saving, deleting, updating, decisions on how to solve problems including
retrieving and editing data from the master data. issues on raw data, documents, employee and
company profiling and management, and business
1. Information Process – portion of
models.
an IS closely related to a specific
business process. • Executive Information System (EIS)

2. Operations Process – man-made An EIS is a specialized DSS that assists senior


IS that consists of people, policies, executives of organization in making decisions. It
procedures, and equipment provides easy access to valuable information
whose main objective is to necessary to achieve organizational goals.
accomplish a certain goal of a
• Information security – protecting information
particular business
and Iss from malicious software and
3. Management Process – man- unauthorized access, use, disclosure,
made IS that consists of people, modification, disruption and destruction
policies and equipment whose
• Information security management – Process
main objective is to plan, manage
of identifying the security controls to keep
and control the overall operations
and defend information assets
of a business organization
E-Business refers to any online-run business. It is
Basic components of Computer-Based
also considered as a technique used by business
Information Systems:
organizations to improve business strategy and be
1. Hardware
more productive and profitable through the use of
2. Software
IT
1. System Software – Operating
System • Intranet – refers to the internal network
2. Application Software – end-user of a business organization
programs (MS Office, browsers, • Extranet – refers to the network of a
etc) business organization that has limited
3. Database – collection of related files and scope, giving access only to trusted
records entities
4. Networks – connection of 2 or more • Internet – largest network consisting of
computers interconnected government, private,
5. Procedures – Rules, policies and methods public, academic and business entities
that administer the operation of a linked by various technologies ranging
computer system from electronic and wireless to fiber
optic.
6. People
1. Personal Area Network (PAN) – refers to a • Business-to-Business (B2B) – businesses
computer network that is used to allow provide products or services to another
communication between devices close to business
each other.
• Business-to-Consumer (B2C) – businesses
Examples: printers, scanners, game sell products or services directly to
console consumers.

2. Local Area Network (LAN) – one of the • Consumer-to-Consumer (C2C)


most commonly used computer networks
• Business-to-Government (B2G) – business
that cover a small area such as a house,
that sells products, services or
room or building.
information to government agencies
3. Campus Area Network (CAN) – computer
• Government-to-Business (G2B) –
network is specifically used for academic
government agencies that provide
institutions where LANs are
services or information to a business
interconnected in a limited geographical
oganization
area.
• Government-to-Citizen (G2C) –
4. Metropolitan Area Network (MAN) –
government to approach and
computer network is within the area of a
communicate with citizens in general.
town or a city where it connects two or
more LANs or CANs

5. Wide Area Network (WAN) – computer • Auditability – data should be documented


system is used within regional or national in such a wat that it can be audited for the
areas real requirements.
6. International Network (Internet) – largest • Authenticity – there should be procedures
computer network that allows users to to authenticate user before giving
access without restrictions. him/her access
Electronic commerce (e-commerce) refers to • Availability – information must be
commercial transactions executed online using available anytime and anywhere
the Internet.
• Confidentiality – information should be
• Ubiquity – marketable transaction or kept and not be accessible by an
activity is accessible at anytime, anywhere unauthorized user
in the world.
• Encryption – information must be secured
• Global Reach – allows a company to get through encryption
customers anywhere in the world.
• Integrity – information must not be
• Universal Standards – a website that can modified during its transmission over a
be operated on a standard platform which network
follows identified methods and systems
• Non-reputation – there should be
• Richness – volume of the content of the assurance that someone cannot rebuff on
website and the way it is used by something.
consumers.
Mobile commerce, also known as M-commerce,
• Interactivity – relationship between a refers to the use of wireless handheld devices
consumer and an e-commerce website. such as mobile phones to conduct business-
related transactions online.
• Information Density – the amount of
products that can fit on a computer Mobile technologies are widely used to access the
screen. Internet and do online transactions using mobile
phones.
1. Taxes • Microsoft Outlook – webmail service. It
allows users to share information in the
2. Trademarks, Pattens and Copyrights
form of folders, forms and so on.
1. Trademarks – distinguishing
• Microsoft Publisher – computer program
words, phrase, symbol and/or
specifically designed to entry-level
design that identifies the
desktop publishing.
uniqueness of a product or
service • Microsoft Access – software used to
create a database whose main purpose is
2. Patent – property rights granted
to organize, store, maintain and manage
by the US Patent and Trademark
data and information for reporting and
Office
analysis
3. Copyright – protects the works of
• Computing is defined as the process of
authorship, such as writings,
utilizing computer technology to
music, and works of art that have
complete a certain task.
been tangibly expressed
Voice and Video Technology
3. Shipping Restrictions – shipping
companies have different restrictions on • Teleconferencing
products or goods.
• Computerized Teleconferencing
Example: air bags, animals, perishable
• Videoconferencing
materials, hazardous materials
Cloud refers to the internet. When something is
4. Inventory – there are certain rules and
operated in the cloud, it refers to the user’s own
prohibitions that align with lease, deed or
methods or ways of storing or accessing data
zoning codes when it comes to stock
using an internet connection
inventory
• Software as a Service (SaaS) - refers to
5. Business Restrictions
the ability to use applications running on
6. Licenses and Permits the cloud infrastructure made available by
a service provider.
7. Payment Card Industry (PCI) Compliance –
serves as protection for online business • Platform as a Service (PaaS) - refers to
from problems such as data theft. the ability to deploy applications to the
cloud infrastructure. This deployment
• Microsoft Word – word processing
could be customer-related and involve
program that is designed for both
acquired applications that are designed
Windows and Mac operating systems.
through programming language or
• Microsoft Excel – spreadsheet program software tools
that includes features such as
• Infrastructure as a Service (IaaS) - refers
calculations, macroprogramming and
to the ability to provide processing,
graphic tools. Most of the functions found
networks, storage, and other primary
in MS Word are also available in MS Excel
resources related to computing.
with additional functions
• Business Utility Saas –
• Microsoft Powerpoint – presentation
applications that are used by
program available in both Windows and
business organizations,
Mac. This program is widely used by
individuals and groups of
employees, staff and the top
individual to manage and collect
management in business organizations for
data, streamline collaborative
business presentations
processes and provide organized
• Microsoft OneNote – free-form analysis
information gathering program that
• Social Network SaaS –
allows a user to collaborate with other
applications that are used by
OneNote users.
business organizations,
individuals or groups of 1. Connectivity – users can stay connected
individuals for the purpose of to all types of sources anytime and
networking and sharing anywhere
information, videos, photos,
2. Personalization – users can also tailor
graphics and others
their mobile computing according to their
• Types of PaaS: specific needs.

• Social Application Platform – 3. Social Engagement – users can also


refers to a platform that provides interact with various types of users in
third parties with full access and social media or other platforms via the
gives the opportunity to access Internet.
and write functionalities that are
4. Marketing – users can have their own
available for all users
marketing strategy using social media
• Business Application Platform –

• Computing Platform
Green computing is popularly known as Green IT.
• Web Application Platform It is considered the environmentally responsible
method used by business organizations to reduce,
reuse, recycle, as well as dispose of technological
• Private cloud – refers to the cloud resources. Green IT can be practiced at home, for
infrastructure that is used and operated example, in the way we deal with unused
by only one organization. modems, personal gadgets and broken computers
without causing harm to the planet.
• Community cloud – refers to the cloud
infrastructure that is shared by many 1. Design – the core of green designing is the
business organizations and supports engineering of energy-efficient computers
certain communities that share the same and digital devices that are
sentiments. environmentally friendly.

• Public cloud – refers to the cloud 2. Manufacture – in green manufacturing,


infrastructure that is made available to a waste materials during the production
large industry group or to the general stage of computers and other systems are
public minimized to mitigate the harmful
environmental effects of manufacturing
• Hybrid cloud – refers to the cloud activities
infrastructure that is combined with two
or more clouds that are bound by 3. Use – eco-friendly and cost-efficient
standardized or proprietary technology utilization of computers or other
peripheral devices.
Mobile computing is a term used to describe
various devices that allow people to access, 4. Disposal – Green disposal simply equates
retrieve, delete and view data or information to the reuse, recycle or appropriate
wherever they are in the world. discarding of used computing devices or
unwanted electronic equipment.

Grid computing has emerged as the next useful


stage in distributed computing. It offers a high
degree of resource sharing and proper
collaboration on a scale that would exceed even
the power of World Wide Web and the currently
available distributed computing.

The main objective of grid computing, particularly


a computational grid, is to make all computing
resources available all day every day.
IoT is a network of physical devices that are 1. Analytics – program that builds
connected, embedded or equipped with sensors, quantitative processes for organizations
electronics and other transfer mechanisms that or businesses to arrive at the most
enable them to connect, communicate and favorable decisions
exchange data and resources whether through
2. Enterprise Reporting – program that
wired or wireless network.
builds infrastructure specifically for
strategic reporting to support the
strategic management of a business
AI is the ability of a certain machine to use
algorithms to interpret, learn and use data to 3. Measurement – program that creates
make decisions. It also refers to a machine’s performance metrics and performs
capability to analyze enormous amounts of benchmarking that aid business leaders in
information at a time. determining how to progress toward
certain goal
a. Robotics
4. Collaborative platform – program that
• Robots are among the common
initiates and obtains inputs from various
technologies being used to help
areas to work and collaborate with each
or replace human workers to
other.
increase efficiency, productivity
and quality 5. Knowledge management – program that
makes a business data-driven.
b. Speech Recognition

• Customers can use their voice to


make transactions. Modern IT is more than just high technology and
gadgetry. These are also sophisticated computers
• Businesses can use speech
that are fully equipped with modern software and
recognition to automate
capable of solving multiple business and technical
transcription as fast as possible
problems
with high accuracy
• Productivity – computer-aided design,
c. Cybersecurities protection against threats.
office application tools, programing
• Cybersecurity is the most software, database technology
important AI tool for online
• Monitoring – real-time inventory
transactions. It is used in bank
management
systems among others to ensure
secure transactions online. • Business performance management –
developed as a monitoring method that
Machine learning
most businesses use to achieve their
One of the main applications of AI is machine goals
learning. In computer science, it is the field that
• Education – IT is a vital role in providing
focuses on program development that allows
quality education to students. Nowadays,
computers to learn automatically without human
technology is a staple part of the
assistance and intervention.
classroom. Educational technology is
Machine learning employs algorithms to detect widely used to support teaching and
patterns on the input to create a program. learning. However, this can be costly

Business Intelligence refers to the processes,


technologies and tools required to convert data
into information, information into knowledge and
knowledge into plans that derive profitable
business actions. It encompasses data
warehousing, business analytics and knowledge
management.
• Emerging educational technologies

• Glogster EDU – a tool used by students


to present their research creatively.

• Mentimeter - a website specifically


designed to support teaching and
learning in schools, colleges, and
universities.

• Electronic Learning Organization - a


cloud-based technology that helps
language teachers produce activities for
their students in the form of digital
learning objects.

• Constant Therapy - a mobile app-based


educational technology for students
with special needs

• Internet of Things (IoT) – system of


interconnected computing devices,
mechanical and digital machines, objects,
animals or people.

• Web Applications – composed of web


pages. It is an application program that is
stored on a remote server and delivered
over the internet through a browser.

• Artificial Intelligence (AI) – simulation of


human intelligence processed by
machines.

You might also like