• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

Various computing questions

Extracts from this document...

Introduction

Q=1 EXPLAIN IN DETAIL a. TRANSACTION PROCESSING SYSTEMS. It is the processing in which a system respond to a user's command to carry out some operation to and fro. The request or command is called TRANSACTION, and the system carrying it out is called TRANSACTION PROCESSING SYSTEM e.g cash machines. Transaction processing systems are the systems working at a low level of any organizational structure being operated by data entry operators etc to collect and store data which is needed to be transported then to decisional level of organisations. But it is important to make sure nothing goes wrong at this level of handling data before it is transported to upper level to be manipulated and then making decisions based on information provided. "There is some support for the propositions that (1) Transaction processing systems should be able to be managed within each work group in an organisation, managed that is with respect to work stations in use and functionality available on those workstations. (2) exhibit very little model behaviour. (3) support a high degree of operator independence or asynchornity." REFERNCE: http://www.csse.monash.edu.au/~cavram/papers/tp/tr94-02h.html There are 9 types of transaction processing models 1: Batch systems: 2: Monitor systems : 3: Time sharing systems 4: Advanced virtual terminal front end systems 5: Client server systems 6: Electronic mail and forms 7: Database based groupware 8: (IVR) systems 9: (EDI) systems "Transaction processing systems are information systems which collect data and distribute operational data both within and between organisations. The wide spread use of networks and personal computers (used as terminals) has provided feasible new options for the design of transaction processing systems" b. DECISION SUPPORT SYSTEMS: "Decision Support Systems (DSS) are a class of computerized information systems that support decision-making activities. DSS are interactive computer-based systems and subsystems intended to help decision makers use communications technologies, data, documents, knowledge and/or models to successfully complete decision process tasks" Reference: http://dssresources.com/ Decision support systems are the computer information application which collects and analyze data and then present it to the decision making people of organisation i.e managers . ...read more.

Middle

Serial communication Q=2 WHAT IS A NETWORK ?EXPLAIN IN DETAIL TYPES OF NETWORKS AND NETWORK TOPOLOGIES. NETWORKING: Linking of two or more computers or systems for the purpose of sharing data is called networking.The two major kind of networks are LAN i.e local area network and WAN i.e wide area network. . LAN LAN deals with the systems working in a close proximity and hence doesn't require complex networking. Local area networks provide high speed and effieciency and has fault tolerance. Usually LAN is set up in small area for example a building where fewer systems are networked together for people working in the building to easily transmit information and communicate with each other and share data. . WAN WAN on the other hand deals with much larger networks and can accommodate larger working area for example cities ,countries etc. Wide area network depend upon some larger transmitters eg phone lines to connect smaller networks like LAN's into WAN like internet. DIFFERENT TYPES OF NETWORKS: 1.TOKEN RING NETWORK: A network with a ring topology that passes tokens from one attaching device to another; for example, the IBM Token-ring network. Token-ring adapter type 1: A token-ring interface coupler (TIC) that operates at 4-Mbps (megabits per second) token-ring speed. Token-ring adapter type 2: A token-ring interface coupler (TIC) supported only on an IBM 3745 Communication Controller. The adapter can be configured to support 4-Mbps (megabits per second) or 16-Mbps token-ring speed and to support subarea and peripheral nodes on the same adapter. When configured for 16-Mbps, the token-ring adapter type 2 provides the capability for early token release. Token-ring interface coupler (TIC): An adapter that can connect a 3720, 3725, or 3745 Communication Controller to an IBM Token-Ring Network. Token-ring network: (1) A ring network that allows unidirectional data transmission between data stations, by a token passing procedure, such that the transmitted data return to the transmitting station. ...read more.

Conclusion

2. Competition: The advantage is for those who get away by setting up attractive web site with easy to access features and which doesn't breakdown i.e is well maintained with competitive prices. And it is a disadvantage for organizations who were doing good when they were operating in area where it was there monopoly and their goods were bought at whatever price they would put on. 3. Bargaining power of buyers: It is bane for buyers or I should say poor buyers who were forced to buy their needs to whatever price and choice was available. But now in this era information systems have solved this problem by setting up enterprises and online shopping which now in order to stay in business with extreme competition around , they sell wider range of products with innovations, bargain prices and different options and facilities like free delivery etc. which has increased the bargaining power of consumers or buyers. So if we see all above factors which are still only few of many around of information systems, we need to see how they could be boon. Well in my opinion there could be reasons which could lead to any uncertainity which could be at root level i.e knowledge level. Because if not necessary measurements were done at time of designing information system for any particular organization then they can end up in disaster. Like if the information system set up was not customer focused in terms of understanding their needs and demands, if it was not regularly monitored and upgraded as time went by and newer changes were made in organization, if political influence was considered instead of real and fair way to where and when to implement it, if cost to run and maintain was underestimated etc etc. So, if the information systems are designed properly and then used properly there is no point of thinking them as boon. They are pure bless of being bane. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Manufacturer Details The following details will be held in the manufacturers table: * Manufacturer Code * Manufacturer Name * Name of Contact * Contact Telephone Number * Contact Mobile Number * Contact E-mail Address * Manufacturer Description * Anything else I feel is necessary as I design the system These details are recorded by the vehicle controller onto a form.

  2. Feasibility Report

    The Perfect Pie Company will be able to make use of WAN. To include a WAN, the Activity Unlimited Company must have a high speed internet connection in order to the network. WAN will allow the Perfect Pie Company staff members to log on or access their workstations from home

  1. The Impact of Mobile Phones on social Interaction

    or irregular incomes who would not normally qualify for a contract, access to a phone. Similarly, this pre-pay boom also played a major role in increasing mobile phone sales amongst young people who are too young for a contract but in order to interact, socialise and network with peers feel

  2. System Analysis and Design Assignment

    all their current manual tasks, and by using a package that will be totally customised to their requirements. The package will be customised so much that the staff will be unaware they are using Microsoft Access. Aims of the New System Expected Outputs Output 1 Title Details of books by

  1. The data Processing Cycle and processing methods

    The delay can be between 1 second to 3 seconds this depends on how big the transaction and computer speed is. Any delay above 3 seconds would be unacceptable and the system would need to be updated. The other two information processing systems in real-time processing are Transaction and Retrieval processing.

  2. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    the second was a 'line-mode' browser that lacked sufficient power and wasn't very user-friendly. Consequently, later on independent programmers (requested by CERN) developed more efficient browsers for everyone to use. Ultimately, the World Wide Web should not be mistaken as a synonym for the Internet as the Web is simply a service the Internet offers.

  1. Discuss the Causes and Effects of the Digital Divide

    as technology is increasing but in less economic developed countries all these things that most people in the UK have would be a luxury to people in countries such as Africa.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Even access the data without permission is an offence which is still an offence. This offence is known as a summary offence and penalties are limited to 6 months imprisonment and/or a maximum fine of £5000. An example could be a student decided to hack into SIMs to show off

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work