• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

Various computing questions

Extracts from this document...

Introduction

Q=1 EXPLAIN IN DETAIL a. TRANSACTION PROCESSING SYSTEMS. It is the processing in which a system respond to a user's command to carry out some operation to and fro. The request or command is called TRANSACTION, and the system carrying it out is called TRANSACTION PROCESSING SYSTEM e.g cash machines. Transaction processing systems are the systems working at a low level of any organizational structure being operated by data entry operators etc to collect and store data which is needed to be transported then to decisional level of organisations. But it is important to make sure nothing goes wrong at this level of handling data before it is transported to upper level to be manipulated and then making decisions based on information provided. "There is some support for the propositions that (1) Transaction processing systems should be able to be managed within each work group in an organisation, managed that is with respect to work stations in use and functionality available on those workstations. (2) exhibit very little model behaviour. (3) support a high degree of operator independence or asynchornity." REFERNCE: http://www.csse.monash.edu.au/~cavram/papers/tp/tr94-02h.html There are 9 types of transaction processing models 1: Batch systems: 2: Monitor systems : 3: Time sharing systems 4: Advanced virtual terminal front end systems 5: Client server systems 6: Electronic mail and forms 7: Database based groupware 8: (IVR) systems 9: (EDI) systems "Transaction processing systems are information systems which collect data and distribute operational data both within and between organisations. The wide spread use of networks and personal computers (used as terminals) has provided feasible new options for the design of transaction processing systems" b. DECISION SUPPORT SYSTEMS: "Decision Support Systems (DSS) are a class of computerized information systems that support decision-making activities. DSS are interactive computer-based systems and subsystems intended to help decision makers use communications technologies, data, documents, knowledge and/or models to successfully complete decision process tasks" Reference: http://dssresources.com/ Decision support systems are the computer information application which collects and analyze data and then present it to the decision making people of organisation i.e managers . ...read more.

Middle

Serial communication Q=2 WHAT IS A NETWORK ?EXPLAIN IN DETAIL TYPES OF NETWORKS AND NETWORK TOPOLOGIES. NETWORKING: Linking of two or more computers or systems for the purpose of sharing data is called networking.The two major kind of networks are LAN i.e local area network and WAN i.e wide area network. . LAN LAN deals with the systems working in a close proximity and hence doesn't require complex networking. Local area networks provide high speed and effieciency and has fault tolerance. Usually LAN is set up in small area for example a building where fewer systems are networked together for people working in the building to easily transmit information and communicate with each other and share data. . WAN WAN on the other hand deals with much larger networks and can accommodate larger working area for example cities ,countries etc. Wide area network depend upon some larger transmitters eg phone lines to connect smaller networks like LAN's into WAN like internet. DIFFERENT TYPES OF NETWORKS: 1.TOKEN RING NETWORK: A network with a ring topology that passes tokens from one attaching device to another; for example, the IBM Token-ring network. Token-ring adapter type 1: A token-ring interface coupler (TIC) that operates at 4-Mbps (megabits per second) token-ring speed. Token-ring adapter type 2: A token-ring interface coupler (TIC) supported only on an IBM 3745 Communication Controller. The adapter can be configured to support 4-Mbps (megabits per second) or 16-Mbps token-ring speed and to support subarea and peripheral nodes on the same adapter. When configured for 16-Mbps, the token-ring adapter type 2 provides the capability for early token release. Token-ring interface coupler (TIC): An adapter that can connect a 3720, 3725, or 3745 Communication Controller to an IBM Token-Ring Network. Token-ring network: (1) A ring network that allows unidirectional data transmission between data stations, by a token passing procedure, such that the transmitted data return to the transmitting station. ...read more.

Conclusion

2. Competition: The advantage is for those who get away by setting up attractive web site with easy to access features and which doesn't breakdown i.e is well maintained with competitive prices. And it is a disadvantage for organizations who were doing good when they were operating in area where it was there monopoly and their goods were bought at whatever price they would put on. 3. Bargaining power of buyers: It is bane for buyers or I should say poor buyers who were forced to buy their needs to whatever price and choice was available. But now in this era information systems have solved this problem by setting up enterprises and online shopping which now in order to stay in business with extreme competition around , they sell wider range of products with innovations, bargain prices and different options and facilities like free delivery etc. which has increased the bargaining power of consumers or buyers. So if we see all above factors which are still only few of many around of information systems, we need to see how they could be boon. Well in my opinion there could be reasons which could lead to any uncertainity which could be at root level i.e knowledge level. Because if not necessary measurements were done at time of designing information system for any particular organization then they can end up in disaster. Like if the information system set up was not customer focused in terms of understanding their needs and demands, if it was not regularly monitored and upgraded as time went by and newer changes were made in organization, if political influence was considered instead of real and fair way to where and when to implement it, if cost to run and maintain was underestimated etc etc. So, if the information systems are designed properly and then used properly there is no point of thinking them as boon. They are pure bless of being bane. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Rental Price * Class * Colour * Availability * Anything else I feel is necessary as I design the system These details will recorded by the vehicle controller onto a form, either copied from a vehicle specification document issued by the manufacturer or from a telephone call with the business's contact within the manufacturer.

  2. Threats to Data

    This will give their customers more choice in deciding what is or what isn't excessive use. 4. Accurate and, where necessary, kept up to date. All users must be able to access the information held about them quickly and be able to change any detail successfully.

  1. System Analysis and Design Assignment

    particular Author eg CS French Who needs this A borrower Fields Needed BookTitle, BookAuthor, Year, Cost, Publisher, ISBN, DeweyID, AccessionID Output Format List on screen and printed Sorted By Year This report is useful to library members who may wish to search for books available by a particular author.

  2. ict as level coursework

    This icon should be pressed when inserting a label. For example I have used this in my user form when labelling products and heading of the uses form. In order to create a text box this should be selected. This icon indicates a combo box this is associated with a drop down list.

  1. The Impact of Mobile Phones on social Interaction

    Statistics of Mobile Commerce (URL: http://www.epsltd.com/IndustryInfo/Statistics/mobilestats.htm) [26 February 2002] 4. Mobile market doubles in one year (URL: http://www.continentalresearch.com/reports/reports/prelease.htm) [2 March 2002] 5. Mobile Phones - A Brit's best friend (URL: http://www.ffgb.presscentre.co.uk/news/release.asp?ReleaseID=46) [12 March 2002] 6. Speaking Mobile - The city in your pocket (URL: http://www.hut.fi/Yksikot/YTK/julkaisu/mobile.html) [14 March 2002] 7.

  2. Crisis Management.

    It is common sense that all factual data (telephone numbers and such) need to be correct and thus need to be updated regularly, but in reality this proves to be a real problem. The crisis plan is something different than a disaster plan that are drawn up by regional and

  1. Discuss the Causes and Effects of the Digital Divide

    certainly not have any interest In using computers so they will lack basic IT skills and will not even get a average payable job so they will have to work manually with hard labour. With people that live in rural area?s and live off agriculture is very impossible for them

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    However work that is used for educational purposes may not come under copyright although permission from the author may still be needed. Businesses should also encrypt their work in order to make sure that work isn?t stolen. This act can also work the other way for the business as well

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work