MIS Notes 1 1
MIS Notes 1 1
MIS Notes 1 1
UNIT – I The meaning and use MIS, System View of Business, Process of
MIS, Development of MIS within the organization, Management
Process, Information Needs, System Approach in Planning
Organizing and Controlling MIS.
1
INTRODUCTION TO MIS
Definition of MIS
A system that collects, process, stores the data and distributes information to help in decision
making for managerial function. It is also defined as the integrated user machine system for
providing information to supports the decision-making operations & achieving organizational goal.
According to Jerome “A system that aids management in making, carrying out and controlling
decisions”.
According to Kelley, “A combination of human and computer-based resources which results in
collection, storage, retrieval, communication and use of efficient management of operations and for
business planning”.
Right Information→To the right person →At the right place→At the right time→ In the right
form→At the right cost
MIS
Management: - Management covers the planning, control and administration of the operations of
aconcern.
Information: - Information, in MIS, means the processed data that helps the management in
planning, controlling and operations.
System: - data is processed into information with the help of a system.
Need of MIS
MIS helps the management at various levels and it is mean of communication where data are
collected, processed, stored and retrieved for making decisions regarding planning, operation and
control of an organization.
Characteristics of MIS
Management Oriented
Management Directed
Integrated System
Avoid Redundancy
Common Data Flow
Heavy Planning Element
Subsystem Concept
Common Database
Flexibility
Computerization
2
Components of MIS
Management information system refers to the data, hardware and the computer programs that are
used to develop information for managerial use.
People – it is the only living component of MIS which operates, controls the other
components of MIS.
Procedure – procedure explain people how to operate the computer hardware.
Data – Data provide interface between the user and computer.
Hardware – It is the machine part of the system which executes the instruction in programs.
Programs – The program is the set of instruction written in logical order for performing
specific task related to information production.
Functions of MIS
It is used to collect the data and present the information to the managers. MIS is the combination of
computer and procedures for providing information that manager’s use in making decision.
Collect Data – Data can be obtained from sources within organization and outside world.
Store & Process Data – After creation of the data, a database must be stored and process in
the form useful to manager’s data is generally stored to CD ROM or hard disk.
Present Information to Managers – After collection, storing and processing of data, the next
step is to present information to the managers.
Role of MIS
1 MIS ensure that appropriate and relevant data is collected from various sources, processed and is
sent further to the needy destination.
2 It fulfills the need of individual, workgroup and management.
3. MIS satisfies the diverse need of various systems like query, Analysis, Modeling, DSS.
4 MIS helps in strategic planning, management control, operational control and transaction
processing level.
5 MIS play important role in information generation, communication, problem identification and
decision-making administration.
6 With good MIS support marketing, finance, production, and personal functions increases
efficiently.
7 MIS helps in streamlining of the operations.
8 MIS creates structured database and therefore saves the time.
9 MIS bring clarity in communication and understanding this help in bringing high degree of
professionalism.
10 MIS helps in systemization of business operation through tools and techniques of the computer,
which makes task simpler, accurate and faster.
Process of MIS
The process of MIS starts by knowing MIS objectives. The objectives of MIS should be compatible
with the company’s objectives.
Management comprises process or activities they are as follows: -
1. Recognition of a problem and an opportunity
2. Define problem or opportunity
3. Develop alternative course of action
4. Decision
5. Implementation of plan
6. Control performance against plan
3
For its smooth functioning and achieving of its predetermined goals through optimal utilization of
its resources like men, money, material and machines.
Management Process
Management comprises process or activities via planning, organizing, controlling, directing and
initiating operation of an organization. For its smooth functioning and achieving of its
predetermined goals through optimal utilization of its resources like men, money, material and
machines.
System – System is set of components which interact with each other to accomplish a specific goal.
1 Human body and its subsystem could be nervous system, digestive system and cardiac system
etc
2 Computer system and it has various subsystem like ALU, CU, Memory, Input unit and Output
unit etc.
4
Characteristics of system
Every system has a purpose.
Every system is made up of components like input process output, feedback and control etc.
System is made up of subsystem, whose goals are referred to as sub goals.
Goal of a system is more important than subsystem goal.
Systems whether open or closed have an element of control associated with them.
Types of System
There are several ways of classifying systems that emphasizes the differences. Classification of
systemis as follows-
Open & Closed Systems –An open system interfaces and interacts with other system. An open
system needs to receive feedback to change and continue to exist in its environment. Example – A
marketing system is an open system.
A closed system does not exchange the information with its environment. It does not have any
connection to the other system. Example – Research & development of organization, ICU dept. of
hospital, etc.
Physical & Abstract System – Physical system are tangible entities that may be static or dynamic in
operations. For example, the physical parts of the computer center are the computers, desk, chair,
etc. that facilitate operation of the computer.
Abstract systems are conceptual and non-physical entities. They may be formulas of relationship
among set of variables or models, software / program.
Deterministic & Probabilistic System – A deterministic system works with certainty in predictable
manner. The interaction among its subsystem is known in advance. One state of the system determines
the next state of the system.
Example – A computer system which works on the principal GIGO.
A probabilistic system operates with uncertainty as certain degree of error is always attached with
prediction of what the system will do.
Example – A student admission system in a college is probable in nature.
Systems approach is an organized way of dealing with a problem.
Information system
Information system are a set of people, procedure and resources that collects, transforms and
disseminates information in an organization
There are six building block of information system, is the input, output, technology, models,
database and control.
Types of Information System- there are two types of information system.
1 Operation Information system – it processes the data generated by and used in business
operation.It is of two types: -
Transaction processing system
Office Automation system
2 Management information System – MIS provide information to support management decision
making.
Decision Support System
Executive Information System
5
Business organization as a system
An organization is an open, adaptive system in a business environment. A business consists of
following system component –
1 Input 2 Processing 3 Outputs
4 Feedback 5 Control 6 Environment
Information Needs
There are different levels of the organization and the information requirement is different for the
different layers.
At the organizational level, information requirements define an overall structure for the
information system and specific applications and database.
Application-level requirements include social or behavioral- covering work organization
objectives, individual roles and responsibility assumptions, and organizational policies and
technical, which are based on the information needed for the job to be performed.
At the user level, database requirement can be classified as perceived by the user or as
required for physical design of the database.
6
2 Measuring performance against this standard – once standard has been established it is
necessary to measure performance against standards.
3 Deviation Control – we know that for measuring the deviation, first comparison of
standard with actual performance is made.
7
Unit II
General Business Planning
Starting point for MIS planning is general business planning. No MIS department can decide what they
should do or how they should do it without the groundwork provided by objectives and plans for the
company they are supporting.
Statement of Objectives
Mission and Marketing
Innovation
Human
organization
Financial resources
Physical resources
Productivity
Social
responsibility
The following items should certainly be included to understand what planning constitute-
1. Summary statement of the problem being solved by this project is required.
2. A breakdown of the work to be done (as detailed as practical) is required. Also estimates of how
long each piece will take are needed. Documentation, testing, and maintenance efforts should be
included.
3. A list of dependencies on outside groups with target dates for “delivery” of services or equipment
is required.
4. A list of outside group that depend on this project with target dates for delivery is required.
5. A list of interdependencies of various pieces within this project with dates of need/delivery is
required.
6. The skills needed to complete the project should be listed. Eventually, the people who work on
the project must match this list exactly.
8
7. Other resources needed to complete the project must be identified (e.g., space, computer
hardware, and telephones). Dates these items are needed must be specified.
8. A budget covering salary, rent, capital expenditure, and so on must be part of the plan.
9. A statement of the reporting and tracking system to be used must be included.
10. A schedule of activities reflecting all the above work and interdependencies is required.
11. A backup plan if any piece of the plan fails must be supplied.
Planning Techniques
Most of the techniques and tools have been borrowed from engineering project management theory and
practice, where they originated.
Sequence Planning
The relationships among tasks must be set forth by a chronological ordering, starting with the terminal
task of the project and working backward. As each task is set down, it is necessary to determine what
immediately preceding tasks must first be completed. When a network of events has been established,
estimates of the time required to complete each event, based upon the work package information, may
be entered. There are a number of time paths through a network that run from the starting event to the
terminal event. The longest is called the critical path.
Budgeting
The establishment of cost and resource targets for a planned series of periods in advance is project
budgeting. Although cost constraints may be applied in a top-down fashion during planning, such
constraints must be reconciled with a bottom-up approach through the work breakdown structure.
Reporting Techniques
The reporting system for a project is its own MIS. Some methods of project reporting are
1. Integrated P/C/T charts as shown in Figure 6-4
2. Financial schedules and variance reports.
3. Time-scaled network plans and computerized based on them.
4. Problem analysis and trend charts
5. Project control room and computerized room and computerized graphic systems.
9
Implementation of MIS
There are four basic methods for implementing the MIS once the design has been completed. This are–
1. Cut off the old system and install the new. This produces a time gap during which no system. Small
is n operation. It is practical only for small companies or small systems where installation
required one or two dates. An exception to this would be the installation of a larger system during
a plant’s vacation shut down or some other period of inactivity.
2. Cut over by segments. This method is also referred to as “phasing in” the new system. Small parts
or subsystems are substituted for the old. If this method is possible, some careful questions
should be asked about the design of the new system. Is it really just an automation of isolated
groups of clerical activities? Generally, new systems are not substitutable piece by piece for
previous non systems. However, in the case of upgrading old system, this may be a very desirable
method.
3. Operate in parallel and cut over. The new system is installed and operated in parallel with the
current system until it has been checked out; then the current system is cut out. This method is
expensive because of personnel and related costs. However, it is required in certain essential
systems, such as payroll or customer billing. Its big advantage is that the system is fairly well
debugged when it becomes the essential information system of the company.
10
assume this responsibility by virtue of a permanent assignment. In smaller companies, someone from the
finance.
Computer-related Acquisitions
The management of automation of logic, communication, and display is important as a basis for systems
design and as a factor in system implementation. One complicating factor in system installation is that a
new computer is often required along with the new MIS.
Acquisition consists of bringing on site
1. Hardware
2. Software
3. Personnel
4. Materials
Cutover
Cutover is the point at which the new component replaces the old component or the new system replaces
the old system. This usually involves a good deal of last-minute physical transfer of files, rearrangement
of office furniture, and movement of work stations and people. Old forms, old files and old equipment are
suddenly out of date.
11
“Documentation” of the MIS means preparation of written description of the scope, purpose, information
flow components and operating procedures of the system. Documentation is not a frill; it is a necessity –
for troubleshooting, for replacement of subsystems, for interfacing with other systems, for training new
operating personnel, and also for evaluating and upgrading systems.
12
Unit III
BCA III
SEM
Management Information System
Process
DATA INFORMATION
Data Processing – it is basically concern with converting raw data in to well order information.
Need for data processing – it reduces the paper work for increasing volume of data.
Data processing Activities: -
1. Collection – Data originates in the form of events transactions or some observations. This
data is then recorded in some usable form.
2. Conversion – once the data is collected, it is converted from its source document to a form
that is more suitable for processing.
3. Manipulation – Once data is collected and converted it is ready for manipulation functions
which convert data into information. Manipulation consists of following activities –
a. Sorting
b. Calculating
c. Summarizing
d. Comparing
4. Managing the output result – Once data has been captured and manipulated following
activities may be carried out
a. Storing
b. Retrieving
5. Communication – It is a process of sharing information.
13
d. Data Procedure & Instruction
e. Output
Real-time systems
In real time processing the computer keeps pace with some external process. Small quantities of
data are processed in one operation. The delay in processing the data, which vary from a fraction of
a second to a couple of minutes, is acceptable to the user of the system. Three types of real time
system may be identified, through the distinction between them is not very apparent.
Manual data processing system – Data processor is Human being, input received through hearing
& seeing sense and output record in files.
There are many kinds of data processing systems. A manual data processing system is one that
utilizes tools like pens, and filing cabinets.
A system which does not use any computer devices, all data would be kept in other ways, mainly
paper. As a few examples: Before accounts, payroll and spreadsheet applications, people would
14
have worked out this kind of information on paper. People would have handwritten letters or used
typewriters.
Instead of word processors, Graphs and diagrams would have been drawn by hand instead of using
computer software to do them.
Electronic data processing system – It is computerized system which process data automatically. A
mechanical data processing system uses devices such as typewriters, calculating machines and
book-keeping machines. Finally, electronic data processing uses computers to automatically process
data.
Pictorial: -
It provides a visual overview of the entire operation
15
b. Input document: -
After the completion of the system description, it is very necessary to specify how
the information should be put into a form that is acceptable to the computer.
c. Output Document: -
It is the output document with which management is almost exclusively
concerned and because of its critical nature, care should be taken in its design.
Output format represents the purpose or objective of the entire operation
d. File Design
The logic required to control the flow of data through the system is a part of
systems design, and the flow is in turn depended upon the design of data files.
These two steps are also associated.
e. Program Logic
The program flowchart is the programmer’s logic of the detailed, step by step
representation of how the computer program will accomplish the job. It is the
„blueprint‟ of a program.
f. System verification
After the program has been written and run through the compilation process, it is
placed in memory in „machine readable‟ form and is ready to process the terminal
input, update the master file on the disk and print the required report. The
computer will execute the instructions of the program in sequence until a program
comes to a halt.
g. Documentation
System failure is due to lack of adequate documentation generally, three types of
documentation are needed: -
▪ For those providing input, a clear description of what input is expected and
what input is not acceptable.
▪ For these running and maintaining the system, all the technical
documentation generated during the development process.
▪ For those the output, a clear description of what the output means and about
its limitations.
Conversion Method – There are four ways to convert from manual to computerized system –
a. Parallel Conversion - running both old & new computerized systems
b. Phased Conversion - install new system only into a department or branch office.
c. Pilot Conversion – implement only in one department then implemented in whole
organization.
d. Direct Conversion - stop working on old system & completely adopt new system.
16
Software
Computer software is also known as computer programs. Software is the non-tangible component
of computers. Computer software communicates with hardware and get the work done.
Computer software includes all computer programs regardless of their architecture; for
example, executable files, libraries and scripts are computer software.
Types of Software
The computer software can broadly divide into two types. They are as follows: -
System software
Application software
17
System software is a program that manages and supports the computer resources and operations of
a computer system while it executes various tasks such as processing data and information,
controlling hardware components, and allowing users to use application software.
Systems software works as a bridge between computer system hardware and the application software.
Systems software is of three types. They are as follows: -
System management programs: -
These are programs that manage the application software, computer hardware, and data
resources of the computer system.
System support programs: -
These are the programs that help the operations and management of a computer system. They
provide a variety of support services to let the computer hardware and other system programs
run efficiently. The major system support programs are system utility programs, system
performance monitor programs, and system security monitor programs
System development programs
These are programs that help users develop information system programs and prepare user
programs for computer processing. These programs may analyze and design systems and program
itself. The main system development programs are programming language translators,
programming environment programs, computer-aided software engineering packages.
Application software
Application software consists of programs that direct computers to perform specific information
processing activities for end users. Application software is further divided into two types they are
as follows: -
General purpose software
Application specific software
Flowchart: -
A flowchart is a type of diagram that represents an algorithm or process, showing the steps as boxes
of various kinds, and their order by connecting them with arrows. This diagrammatic
representation illustrates a solution to a given problem. Process operations are represented in these
boxes, and arrows; rather, they are implied by the sequencing of operations. Flowcharts are used in
analyzing, designing, documenting or managing a process or program in various fields.
◼ A schematic representation of a sequence of operations, as in a manufacturing process or
computer program.
◼ A graphical representation of the sequence of operations in an information system or
program. Information system flowcharts show how data flows from source documents
18
through the computer to final distribution to users. Program flowcharts show thesequence
of instructions in a single program or subroutine.
19
Symbols:-
Different symbols are used to draw each type of flowchart.
Name Symbol Use in Flowchart
2. Additional Symbols
Related to more advanced programming
Types of flowcharts: -
Stern Eckert (2003) suggested that flowcharts can be modeled from the perspective of different user
groups (such as managers, system analysts and clerks) and that there are four general types:
Document flowcharts, showing controls over a document-flow through a system
Data flowcharts, showing controls over a data-flow in a system
System flowcharts showing controls at a physical or resource level
Program flowchart, showing the controls in a program within a system
20
START
INPUT
PROCESS
OUTPUT
DECISION
END
Write an algorithm and draw a flowchart to convert the length in feet to centimeter
21
1. Complex logic: - Sometimes, the program logic is quite complicated. In that case, flowchart
becomes complex and clumsy.
2. Alterations and Modifications: - If alterations are required the flowchart may require re-
drawing completely.
3. Reproduction: - As the flowchart symbols cannot be typed, reproduction of flowchart
becomes a problem.
4. The essentials of what is done can easily be lost in the technical details of how it is done.
Limitation of flowchart: -
1. Flowchart are very time consuming and laborious to draw.
2. There are no standards determining the amount of detail that should be included in
flowchart.
3. Owing to the symbol-string nature of flowcharting, any change or modification in the
program logic will usually require a completely new flowchart.
Data communication - Exchange of data between two devices through any physical medium.
Characteristics –
a. Delivery
b. Accuracy
c. Timeliness
Network & its types – multiple computers are connected in a manner to enable meaningful
transmission. It is of 3 types -
a. LAN – Computers are connected in building or in a small organization is local area
network.
b. WAN - Computers are connected in large geographical area like internet is wide area
network.
c. MAN – The network that shares some characteristics of both LAN & WAN network.
Topology: -
The topology of a network is the geographical representation of the relationship of all the links and
linking devices to each other.
22
Telecommunication is of two types –
a. Wired - Communication is done with the help of physical wired.
b. Wireless - Communication is done without any physical medium. Ex. Internet.
Transmission mode:
The term transmission mode is used to define the direction of signal flow between two linked
devices.
There are three types of transmission modes:
Simplex
Half duplex
Full duplex
Modem: -
Anyone who has surfed the internet, logged on to an office computer from home, or field a news
story from a word processor over the phone line has used a modem
The external or internal signal generated by the computer into an analog signal to be carried by a
public access phone line.
It is also the device that converts the analog signals received over a phone line into digital signal
usable by your computer.
The modem is a composite word that refers to the two functional entities that make up the device: -
A signal modulator
A signal demodulator
Modem standards: -
Bell modem: -
The first commercial modem was produced by the bell telephone company in the early
1970s
ITU modem: -
• v.21 • v.33
• v.22 bis • v.34
• v.32 • v.42
• v.32 bis • v.42 bis
• v.32 terbo
23
Unit: IV -Decision Support System
Types of Decision:
3. Semi-structured- Semi structured decisions are such type of decision procedures that
can be pre-specified, but not enough to lead to a definite recommended decision.
Decision Making
Decision making is a cognitive process that results in the selection of a course of action among
several alternative scenarios.
Decision making is a daily activity for any human being. There is no exception about that. When it
comes to business organizations, decision making is a habit and a process as well.
Effective and successful decisions make profit to the company and unsuccessful ones make losses.
Therefore, corporate decision-making process is the most critical process in any organization.
In the decision-making process, we choose one course of action from a few possible alternatives. In
the process of decision making, we may use many tools, techniques and perceptions.
In addition, we may make our own private decisions or may prefer a collective decision.
Usually, decision making is hard. Majority of corporate decisions involve some level of
dissatisfaction or conflict with another party.
24
Process and Modeling in Decision Making
There are two basic models in decision making:
Rational models
Normative model
25
and interprets relevant information from the business and environment and turns into information
that acted upon. In the end, we can say that- DSS aims at supporting the decision maker by
providing the information with the aid of quantitative techniques.
Attributes of a DSS
Adaptability and flexibility
High level of Interactivity
Ease of use
Efficiency and effectiveness
Complete control by decision-makers.
Ease of development
Extendibility
Support for modeling and analysis
Support for data access
Standalone, integrated and Web-based
Characteristics of a DSS
Support for decision makers in semi structured and unstructured problems.
Support for managers at various managerial levels, ranging from top executive to line
managers.
Support for individuals and groups. Less structured problems often require theinvolvement
of several individuals from different departments and organization level.
Support for interdependent or sequential decisions.
Support for intelligence, design, choice, and implementation.
Support for variety of decision processes and styles
DSSs are adaptive over time.
Application of D.S.S.
The applications of DSS are as follows-
1. An airline DSS –developed by American Airlines but is used by other airlines, aircraft
manufacturers and airlines financial analysis consultants and associations.
2. A Marketing DSS – BRAND AID is used for marketing planning, especially in the packaged
goods industries. It helps brand managers to make pricing, sales effort, promotion, advertising and
budgeting decision for products, product line and brand of products.
3. Government DSS- GADS (Geodata-Analysis and Display System) was develo9ped by IBM. It
constructs and displays maps and other graphics display that support decisions affecting the
geographic distribution of people and other resources.
4. Banking DSS-MAPP (Managerial analysis for profit planning) is a DSS developed by citi-bank.
It was designed to support decisions involved in the financial planning, budgeting costing and
pricing of bank products, It helps bank executives define banking products and services, It also
helps to determine, how resources should be shifted among bank products and services and it
prepares budgets for the bank department producing each banking product.
26
Architecture of DSS
Benefits of DSS
Improves efficiency and speed of decision-making activities
Increases the control, competitiveness and capability of futuristic decision making of the
organization
Facilitates interpersonal communication
Encourages learning or training
Since it is mostly used in non-programmed decisions, it reveals new approaches and sets
up new evidences for an unusual decision
Helps automate managerial processes
Components of a DSS
Following are the components of the Decision Support System:
Database Management System (DBMS) : To solve a problem the necessary data may come from
internal or external database. In an organization, internal data are generated by a system such as
TPS and MIS. External data come from a variety of sources such as newspapers, online data
services, databases (financial, marketing, human resources).
Model Management system: It stores and accesses models that managers use to make decisions.
Such models are used for designing manufacturing facility, analyzing the financial health of an
organization. Forecasting demand of a product or service etc.
Support Tools: Support tools like online help; pull down menus, user interfaces, graphical analysis,
error correction mechanism, facilitates the user interactions with the system.
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classify DSS in following:
27
Text Oriented DSS
Database Oriented DSS
Spreadsheet Oriented DSS
Solver Oriented DSS
Rules Oriented DSS
Rules Oriented DSS
Compound DSS
Decision support system’s tools are programs or codes which are the foundation used to create
the generations and in turn specific DSS.
(a) Material requirement planning (MRP) – MRP is a method for ordering and maintaining
materials in stock. It is a systematic approach to identify cost-beneficial ways of storing
materials.
(b) Linear programming – Linear programming assists in solving problems which involves
allocation off limited resources and evaluation of alternatives to achieve objectives.
(c) Queuing theory – Queuing theory is used in planning the activities of the organization to
determine economically beneficial queues e.g., production of goods.
(d) Descriptive statistics- Descriptive statistics are used to estimate parameter and the
dispersion of values associated with that parameter. These estimates are made for the
various critical environmental factors to plan the day-to-day operations of the
organizations.
(e) Correlation analysis- Correlation analysis is made to calculate relationship between
values for particular parameters, such parameters value describing current conditions.
(f) Variance analysis- Variance analysis is used to describe variance between two or more
variables.
(g) Network analysis- Network analysis is a pictorial tool for identifying and sequencing
tasks. Those analysis help manager in controlling tasks necessary for successful operation
of organization.
(h) Transportation p r o b l e m s - T r a n s p o r t a t i o n problems are used for planning and
distribution of various facilities and resources.
(i) Maximum flow or distance – Program flow or distance is a tool for identifying the most
economically beneficial flow through, or distances between, particular objects, this
facilitates in determining the most preferred flow of goods or services through an object
for which the organization must conduct business.
(j) Dynamic programming – Dynamic programming is a tool to enable that appropriate
course of action and top-level management are being followed by managers at operational
level.
(k) Regression analysis- The regression analysis can be used to estimate particular values on
the basis of known values for variables. It may be used to estimate the value of known
variables which may influence plans for implementing the decision of top-level managers.
(l) Markov processes – Markov processes are tools used to determine global associated with
the occurrences of the related to changing probabilities of particular object. These global
probabilities can then be used to determine more appropriate courses of action for the
organization.
28
Unit V
System Design
System – System is set of components which interact with each other to accomplish a specific goal.
1 Human body and its subsystem could be nervous system, digestive system and cardiac system
etc
2 Computer system and it has various subsystem like ALU, CU, Memory, Input unit and Output
unit etc.
Characteristics of system
Every system has a purpose.
Every system is made up of components like input process output, feedback and control etc.
System is made up of subsystem, whose goals are referred to as sub goals.
Goal of a system is more important than subsystem goal.
Systems whether open or closed have an element of control associated with them.
Types of System
There are several ways of classifying systems that emphasizes the differences. Classification of
systemis as follows-
Open & Closed Systems –An open system interfaces and interacts with other system. An open
system needs to receive feedback to change and continue to exist in its environment. Example – A
marketing system is an open system.
A closed system does not exchange the information with its environment. It does not have any
connection to the other system. Example – Research & development of organization, ICU dept. of
hospital, etc.
Physical & Abstract System – Physical system are tangible entities that may be static or dynamic in
operations. For example, the physical parts of the computer center are the computers, desk, chair,
etc. that facilitate operation of the computer.
Abstract systems are conceptual and non-physical entities. They may be formulas of relationship
among set of variables or models, software / program.
Deterministic & Probabilistic System – A deterministic system works with certainty in predictable
manner. The interaction among its subsystem is known in advance. One state of the system determines
the next state of the system.
Example – A computer system which works on the principal GIGO.
A probabilistic system operates with uncertainty as certain degree of error is always attached with
prediction of what the system will do.
Example – A student admission system in a college is probable in nature.
Systems approach is an organized way of dealing with a problem.
System Design is a solution. It tells the approach to the creation of a new system. It provides the
methods to implement the system given in the feasibility study. Emphasis is placed on
29
transforming the performance requirements to design specifications. Design is done both logically
and physically.
Design concept
The fundamental concepts are as measured: -
Abstraction Control hierarchy
Refinement Structural partitioning
Modularity Data structure
Software architecture Information hiding
Design considerations: -
There are many aspects to consider in the design of a piece of software. They are as follows:
Compatibility Reliability
Extensibility Reusability
Fault Tolerance Robustness
Maintainability Security
Modularity Usability
Packaging
30
Input/output design: -
OUTPUT DESIGN
The term output necessarily implies to information printed or displayed by an information system.
Following are the activities that are carried out in the output design stage:
The most important source of information is the output, efficient, intelligible output design should
improve the system’s relationship with the user and help in decision making.
Objectives of output design: -
Carry information about past activities, current affairs or projection of the future
Mark important events
Take an action
Confirm an action
Types of output
Report
Document
Message
PRESENTATION OF OUTPUT
The presentation of an output represented either in tabular or graphical form or in both forms. A
tabular format is preferred in the following conditions:
When the details dominate the content of the output
When the contents of the output are classified in groups
When the output design are to be compared.
A tabular format is also preferred for the detailed reports.
Graphical representation is used to improve the effectiveness of the output because some users
prefer to view information in graphic form rather than in rows and columns of the tables. The tabular
and graphical formats may be combined together to enhance the presentation of theoutput.
31
Multiple copies of output Summaries and totals
Turnaround documents: Page title, number and date
Headings and date Notes and comments
Data and details Column headings and data type
A system designer may design multiple screens or special windowing capabilities such as pop-up
windows for designing screens. Such design will enhance readability for the visual displays.
INPUT DESIGN
The data base is the data that must be obtained and stored for later retrieval for managerial decision
making. The most common cause of error during the data processing is inaccurate input. The
inaccurate input is entered by data entry operators but it can be controlled by input design.
Similar to the output design, input design is equally important for a system designer. This is because
output from a system is regarded as the foremost determinant for defining the performance of a
system. The output of the system greatly affects the input design of the system.
Input layout
The layout of the input design must contain the following items.
Headings and date of data entry.
Data heading and value
Data type and width of the column
Initials of data entry operator
Form design
Form design is a specific component of user interface design and involves the creation of a system
used by people to interact with an object such as a microwave, cell phone, or computer. Form
design ergonomic factors, ease of use, and understandability are all combined to create the science
of user interface design.
Poor form designs can cause frustration, mistakes, fatigue, and actual physical damage such as eye
strain and carpal tunnel syndrome.
32
Form design recommendations:-
Form Colors Form Buttons
Form Fonts Form Navigation
Form Layout
Classification of forms:
A printed form is generally classified by what it does in the system. There are three primary
classifications
1. Action: This type of form requests the user to do something.
2. Memory: This form is a record of historical data that remains in a file, is used for reference, and
serves as control on key details.
3. Report: This form guides supervisors and other administrators in the activities. It provides data
on a project or a job.
Example: profit and loss statements, sales analysis report
Types of forms:-
Flat form:
A flat form is single copy form prepared manually or by a machine and printed on any grade ofpaper.
For additional copies of the original, carbon paper is inserted between copies. It is the easiest form to
design, print, and reproduces; it has a low-volume use; and it is the least expensive. Often a pad of the
flat forms is printed identical to the original copy of a unit set.
33
3. Continuous strip/fanfold forms:
These are multiple – unit forms joined together in a continuous strip with perforations between
each pair of forms. One–time carbon is inter-leaved between copies, which are stacked in a fanfold
arrangement. The fanfold is the least expensive construction for large volume use. Computer
printouts are invariably produced on them; they are virtually part of system design.
File organization:-
A file is organized to ensure that records are available for processing. There are four methods of
organizing files:
1) Sequential organization:
Sequential organization means storing and sorting in physical, contiguous blocks within files
on tape or disk. Records are also in sequence within each block. To access a record previous records
within the block are scanned. In a sequential organization, records can be added only at the end of
the file. It is not possible to insert a record in the middle of the file without rewriting the file.
In a sequential file update, transaction records are in the same sequence as in the master file. Records
from both the files are matched, one record at a time, resulting in an updated master file. In a personal
computer with two disk drives, the master file is loaded on a diskette into drive A , while the
transaction file is loaded on another diskette into drive B. Updating the master file transfers data from
drive B to A controlled by the software in memory.
Advantages:
1. Simple to design
2. Easy to program
3. Variable length and blocked records available
4. Best use of storage space
Disadvantages:
1. Records cannot be added at the middle of the file.
2) Indexed sequential organization:
Like sequential organization, keyed sequential organization stores data in physically
contiguous blocks. The difference is in the use of indexes to locate records. There are three areas in
disk storage: prime area, overflow area and index area.
The prime area contains file records stored by key or id numbers. All records are initially stored in
the prime area.
The overflow area contains records added to the file that cannot be placed in logical sequence in
the prime area
34
The index area is more like a data dictionary. It contains keys of records and their locations on the
disk. A pointer associated with each key is an address that tells the system where to find a record.
Advantages:
1. Indexed sequential organization reduces the magnitude of the sequential search and provides
quick access for sequential and direct processing.
2. Records can be inserted in the middle of the file.
Disadvantages:
1. It takes longer to search the index for data access or retrieval.
2. Unique keys are required
3. Periodic reorganization is required.
Advantages:
1. Used in applications requesting specific data on multiple keys.
35
4) Direct access organization:
In direct access file organization, records are placed randomly throughout the file. Records need not
be in sequence because they are updated directly and rewritten back in the same location. New
records are added at the end of the file or inserted in specific locations based on software
commands.
Records are accessed by addresses that specify their disk locations. An address is required for
locating a record, for linking records, or for establishing relationships. Addresses are of two types:
1. Absolute
2. Relative.
An absolute address represents the physical location of the record. It is usually stated in the format
of sector/track/record number. One problem with absolute address is that they become invalid
when the file that contains the records is relocated on the disk.
A relative address gives a record location relative to the beginning of the file. There must be fixed length
records for reference. Another way of locating a record is by the number of bytes it is fromthe
beginning of the file. When the file is moved, pointers need not be updated because the relative location
remains the same.
Advantages:
1. Records can be inserted or updated in the middle of the file.
2. Better control over record allocation.
Disadvantages:
36
1. Calculating address required for processing.
2. Impossible to process variable length records.
5) Chaining:
File organization requires that relationships be established among data items. It must show how
characters form fields, fields form files and files relate to each other. Establishing relationship is
done through chaining. It uses pointers.
Example: The file below contains auto parts that is a indexed sequential file sequenced by part no. A record
can be retrieved by part no. To retrieve the next record, the whole file has to be searched. This can be avoided by
the use of pointers.
File design:-
Some of the basic terms used to describe the file hierarchy are as follows
Byte: A byte is an arbitrary set of eight bits that represent a character. It is the smallest addressable
unit in today’s computers.
Data item (element): One or more bytes are combined into a data item to describe an attribute of an
object. Sometimes referred as a field.
Record: The data items related to an object are combined into a record. There are two types of
records
Logical record maintains o logical relationship among all items in the record.
Physical record is the way in which records are stored in a storage medium.
File: A collection of related records makes up a file. The size of a file is limited by the size of
memory or the storage medium. There are two characteristics denoting the way files are organized
Activity specifies the percentage of actual records processed in a single run.
Volatility addresses the properties of record changes.
Program design:-
37
Data base: The highest level in the hierarchy is the database. It is a set of interrelated files for real time
processing.
A program now requests data through the Data Base Management System (DBMS), which
determines data sharing.
To manipulate the operations on the DB, a set of programs are maintained called Data Base
management System (DBMS). The Main advantages of DB are
1. File consolidation 5. Program development
2. Program & file independence 6. Program maintenance
3. Access versatility 7. Special information
4. Data Security
In a data base environment, the DBMS is the software that provides the interface between the data
file on disk and the program that requests processing. DBMS stores and manages data. The
procedure is as follows:
1. The user requests a sales report through the application program. The application program uses a
data manipulation language (DML) to tell the DBMS what is required.
2. The DBMS refers to the data model, which describes the view in a language called the data
definition language (DDL). The DBMS uses DDL to determine how data must be structured to
produce the user’s view.
3. The DBMS requests the input/output control system (IOCS) to retrieve the information from
physical storage as specified by the application program. The output is the sales report
38
6. Reducing physical storage requirements by separating the logical and physical aspects of the
database.
System Security:
Security of a Computer System
A state of being free from
1. unauthorized use of the system and its resources,
2. misuse of the system and its resources, and
3. disturbance of the system's operations
The field of study about techniques for achieving and maintaining such a secure state
Approaches to Security
Prevention of Threats → Policies
Exclusion of Unknown Entities → Identification and Authentication
Hiding Important Information → Cryptography
Detection of Potential Threats → Monitoring, Auditing, Detection, and Confinement
No single approach is sufficient for the security of the entire system.
→ Combine them in balance of their pros & cons
Aspects on Security
Component Level
o Hardware
o Software
o Human
System Level
o Integration
o Consistency
Organization Level
System security refers to the technical innovations and procedures applied to the hardware and
operating systems to protect against deliberations or accidental damage from a defined threat.
System integrity refers to the proper functioning of hardware and programs, appropriate physical
security and safety against external threats such as eaves dropping and wiretapping.
Privacy defines the rights of the users or organizations to determine what information they are
willing to share with or accept from others and how the organization can be protected against
unwelcome, unfair, or excessive dissemination of information about it.
An organization that depends heavily on the use of databases requires special controls to maintain
viable information. These controls are classified into three general categories:
1. Physical security or protection from fire, flood, and other physical damage.
2. Database integrity through data validation techniques.
3. Control measures through passwords, encryption, and monitoring users on a regular basis.
A procedure for protecting systems makes sure that the facility is physically secure, provides a
recovery/restart capability, and has access to backup files. The potential threats within a firm are :
1. Errors and omissions
2. Disgruntled and dishonest employees.
39
3. Fire.
4. Natural disasters.
5. External attack.
Control measures:-
1 Identification
2. Access controls
3. Audit controls
4. System integrity
1.Identification :
There are three schemes for identifying persons to the computer. They are :
1. Password : A password is the most commonly used means for authenticating the identity to the
people. Passwords should be hard to guess and easy to remember.
2. Something you are, such as fingerprints or voice prints. Voice prints is a reliable method for
verifying authorized users. The technique essentially analyzes a person’s voice against prerecorded
voice patterns of the same person. An exact match allows access to the system.
3. Something you have, such as the credit card, key, or a special terminal. Magnetic stripe credit card
readers on terminals identify the operator to the system. The card along with a password gives added
assurance of the authentication of the user.
2. Access Control :
Various steps have been taken to control the access to a computer facility. One way is to use an
encoded card system with a log-keeping capability. The card serves as a key to unlock doors,
including tape storage and other classified areas. The card is essentially a magnetic key and a
40
“Keyport” is a lock. Inserting the card into the lockport unlocks the door. A card that includes a
photograph of the bearer may double as an employee ID badge.
Encryption :
An effective and practical way to safeguard data transmitted over the telephone lines is by
encryption. Data are scrambled during transmission from one computer or terminal to the other. A
plaintext message is transmitted over an unprotected communications channel. To prevent
unauthorized acquisition of the message, it is enciphered with a reversible transformation to
produce a cryptogram or ciphertext. When it arrives at an authorized receiver, it is decrypted back
to the plaintext data form.
3. Audit Controls:
Audit controls protect a system from external security breaches and internal fraud or
embezzlement.
Neither the auditor nor the user can verify the system activities adequately, so the system must
check itself. The internal controls required mean that programmers and analysts build controls into
every system.
4. System Integrity :
The most costly software loss is the program error. It is possible to eliminate such error through
proper testing routines. Parallel runs should be implemented whenever possible. Physical security
provides safeguards against the destruction of the hardware, databases, and the documentation; fire
, flood, theft, sabotage, and eavesdropping; and the loss of power through proper backup.
Recovery/Restart Requirements:
Restoring a damaged database is done by roll forward or rollback procedure.
Roll forward method involves updating a valid copy of the database with the necessary changes to
produce a current version of the database.
Rollback method starts with the current invalid state and removes the records of the activity to
produce the prior valid state of the database.
Backup is essential for recovery/restart procedure. If the database is physically damaged then it
cannot be rolled back. Only roll forward can be done. For a sequential file a grandfather-father-son
approach is followed. In a database environment, master files are not copied as they are updated.
Instead, transactions are posted directly to the file which replaces the original data. So to recover
documents in such type of storage, backup is required.
2. Logical error occurs when the activity of the database is interrupted with no chance to complete
the current transactions. So, when the system runs again, it is not sure if the changes have been
updated or not. Data though available may be inaccurate. To restore the original contents, rollback
method is used.
41
3. Structural damage. An example is a pointer incorrectly stored in a record that points to a unrelated
or nonexistent data. If the problem cannot be corrected by software utility, then the database must be
recovered to the most recent up-to-date point before the damage occurred.
42