SlideShare a Scribd company logo
1 of 29
Download to read offline
4장

Hardware and Software
Dee’s Challenge

• Dee needs information system to support
  her blog
   – She must calculate costs to get approval
     • Needs to consider five components of
       information systems
        1. People: sales force and herself
        2. Procedures: for posting, accessing blog, leaving
           comments
        3. Hardware: server
        4. Software: blog software, setup
        5. Data: security


                                                              4-2
What Does a Manager Need to Know
   About Computer Hardware?

• Basic hardware categories: (IPOS)
   – Input
       • Keyboard, mouse, document scanners, bar-code
         scanners, microphones, magnetic ink readers
   – Processing
       • CPU – “the brain”
       • Main memory and cache memory
       • Special function cards
   – Output
       • Video displays, printers, audio speakers, overhead
         projectors, plotters
   – Storage
       • Magnetic disks, optical disks, magnetic tapes

                                                              4-3
What a Manager Needs to Know
   About Hardware (cont’d)




  Figure 4-1




                               4-4
What a Manager Needs to Know
   About Hardware (cont’d)




                               4-5
Computer Data
• Binary digits (bits)
   – Used to represent data
       • Bit is either zero or one
• Sizing Computer Data
   – Bytes
   – 8-bit chunk equals 1 byte
   – Size of main memory, storage devices etc.




                                                 4-6
Computer Components




                      4-7
How Does a Computer Work?

• CPU (central processing unit)
   – Transfers program or data from disk to main memory
   – Moves instruction from main memory via data channel or
     bus
   – Has small amount of fast memory called cache
      • Keeps frequently used instructions
      • Large cache makes computer fast, but is expensive
• Main memory
   – Contains program instructions
   – Contains operating system instructions




                                                              4-8
How Does a Computer Work?
            (cont’d)
• Operating system (OS)
  – Program that controls computer’s
    resources and blocks of data
  – Provides services to application programs
    and users




                                                4-9
Memory Swapping

• Why? Main memory is too small to hold all
  programs and data
• CPU loads programs from memory in
  chunks
  – Places new program into unused memory
  – If none available, the operating system will
    remove chunk being used and replace with
    requested data
  – It does slow down your computer


                                                   4-10
Why Should a Manager Care How a
       Computer Works?
• Main memory size
  – Too little means constant memory swapping
      • Slows processing
      • Need more memory if processing many programs or
        large files
• CPU speed
   – Expressed in hertz (Hz)
   – Needs more CPU if handling large spreadsheets
     or database files
   – Dual core processors for PCs
   – Quad core processors for servers


                                                          4-11
Why Should a Manager Care How a
    Computer Works? (cont’d)
• Cache and main memory are “volatile”
   – Contents lost when power is cut off

• Magnetic and optical disks are “nonvolatile”
   – Saved contents survive after power is turned off




                                                        4-12
What’s the Difference Between a
       Client and a Server?
• Client computers are used for word processing,
  spreadsheets, database access
   – Connect to servers for Web, email, database
• Servers provide service to clients
   – They are faster, larger, more powerful
   – Usually have very simple video display, if any
• Server farm
   – Large collection of coordinated servers
   – Google has several hundred thousand servers in 36 data
     centers around world



                                                              4-13
Client and Server Computers




        Figure 4-8




                              4-14
What’s the Difference Between a
    Client and Server? (cont’d)
• Grid computing
   –   Network of computers operating as if it is one computer
   –   Companies lease time on grid from IBM and others
   –   Used for intensive arithmetic computing
   –   See www-03.ibm.com/grid


• Cloud computing
   – Computing networks provided as a service on Internet
   – Example: Facebook and others




                                                                 4-15
What Does a Manager Need to Know
        about Software?
• Two fundamental types:
   1. Operating system
       •   Large, complex program that controls computer’s resources
   2. Application programs
       •   Perform specific user tasks
• Software constraints
   –   Operating systems
       •   Run only on particular types of hardware
       •   Must conform to instruction set of CPU
       •   Windows works only on Intel instruction set CPUs
   –   Application programs
       •   Written to use particular operating system



                                                                       4-16
What a Manager Needs to Know
        about Software




 Figure 4-9




                           4-17
What Are the Four Major Operating
             Systems?
1. Windows
   – Used by 85% of the world’s desktops
   – 95% of business users
   – Different versions for client computers and servers, Web
     sites, email, and so on
2. Mac OS (click)
   –   Apple Computer, Inc. developed for Macintosh computers
   –   Easy-to-use interfaces
   –   Used primarily by graphic artists and art community
   –   Runs on PowerPC processor or a MAC with Intel
       processor



                                                                4-18
What Are the Four Major Operating
        Systems? (cont’d)
1. Unix
   – Workhorse for scientific and engineering communities
   – More difficult to use than Windows or MAC
   – Not for business users
2. Linux
   – Developed by open-source community
   – No fee to use it
   – IBM has developed business systems solutions that use
     Linux




                                                             4-19
What Types Of Applications Exist and How
    Do Organizations Obtain Them?
• Application Software
  – Programs that perform a business function
  – Some are general purpose – Excel, Word
  – Some are specific purpose – QuickBooks

• Application Software Acquisition
  – Buy off-the-shelf
     • May not be a good fit
     • May need alterations
  – Custom-developed software
     • Tailor-made for organization




                                                4-20
What Is the Difference Between a Thin
          and Thick Client?
• Thin client
   – Requires nothing more than browser
   – Does not require installation and administration
     of client software
• Thick client
   – Has more code to run on it
   – More features and functions
   – More expense and administration



                                                        4-21
Thin and Thick Clients




     Figure 4-11




                         4-22
What Buying Decisions Do You Make?

• Manager’s role depends on organization’s policies
   – Large organizations have IS department that sets
     standards for hardware and software
   – Medium to small organizations less formal
      • Managers take more active role
      • Usually standardize to single client operating systems
• Managers and employees may have role in
  specifying horizontal application software
• Usually no role in specifications of server hardware
• Work with technical personnel to test and accept
  software

                                                                 4-23
Business Manager’s Role in Hardware and
         Software Specifications




       Figure 4-12




                                     4-24
What Are Viruses, Trojan Horses, and
              Worms
• Viruses
   – Computer programs that replicates themselves
   – Take unwanted and harmful actions
   – Consume computer resources
       • Payload causes unwanted activity
• Trojan horses
   – Viruses that masquerade as useful programs or files, such
     as games, MP3s, and so on
• Macro viruses
   – Attach to Word, Excel, and so on to infect documents
   – Place themselves in startup files
   – Infect every file the application creates or processes


                                                                 4-25
What Are Viruses, Trojan Horses, and
          Worms (cont’d)
• Worms
  – Viruses that propagate using Internet or network
  – Specifically programmed to spread
  – Actively use networks to spread
• Prevention
  – Patches
     • Vendor-provided security fixes for programs
     • Automatic updates or regular checks for patches




                                                         4-26
Guide: Keeping up to Speed
• Technology continues to change
• If you don’t keep up, you might not gain a
  competitive advantage
  – Managers need to understand what technology
    is needed
     • Don’t depend solely on experts
  – Develop a competitive advantage in non-
    technology areas to compensate
• Other extreme are the “technophiles”



                                                  4-27
Guide: Keeping Up to Speed (cont’d)

• What can a manager do?
  1. Don’t ignore technology
  2. Take seminars
  3. Read articles, ads
    •   C/NET, CIO.com
    •   Wall Street Journal technology articles
  4. Attend professional events
  5. Get involved as a user representative in
     technology committees


                                                  4-28
How Does the Knowledge in This
    Chapter Help Dee and You?
• Reduces the work and costs of her consultant
• Dee more confident in dealing with IT department
  and consultant
• Better able to understand consultant’s questions and
  IT department’s concerns
• Can determine:
   –   No new client hardware needed
   –   Use thin client on sales rep computers
   –   Prefer thin client on her computer
   –   Blog server software must be installed on server
   –   IT department will decide whether to run Linux or Windows
        • Then blog software will be chosen
   – Set up to be performed by either IT department or consultant
   – Needs program to author HTML

                                                                    4-29

More Related Content

What's hot

Management information system software
Management information system softwareManagement information system software
Management information system softwareOnline
 
CH004
CH004CH004
CH004JUC
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructureMuhammad Ahad
 
IS740 Chapter 04
IS740 Chapter 04IS740 Chapter 04
IS740 Chapter 04iDocs
 
Database Administration
Database AdministrationDatabase Administration
Database AdministrationBilal Arshad
 
DBA Tips and Tricks - Presentation
DBA Tips and Tricks - PresentationDBA Tips and Tricks - Presentation
DBA Tips and Tricks - PresentationFrancisco Alvarez
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 
IS740 Chapter 03
IS740 Chapter 03IS740 Chapter 03
IS740 Chapter 03iDocs
 
IS740 Chapter 06
IS740 Chapter 06IS740 Chapter 06
IS740 Chapter 06iDocs
 

What's hot (20)

ITE 101 - Week 5
ITE 101 - Week 5ITE 101 - Week 5
ITE 101 - Week 5
 
Management information system software
Management information system softwareManagement information system software
Management information system software
 
Chap15
Chap15Chap15
Chap15
 
CH004
CH004CH004
CH004
 
Chap004
Chap004Chap004
Chap004
 
Chap005
Chap005Chap005
Chap005
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
ITE 101 - Week 1
ITE 101 - Week 1ITE 101 - Week 1
ITE 101 - Week 1
 
Week 8
Week 8Week 8
Week 8
 
IS740 Chapter 04
IS740 Chapter 04IS740 Chapter 04
IS740 Chapter 04
 
ITE 101 - Week 4
ITE 101 - Week 4ITE 101 - Week 4
ITE 101 - Week 4
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Information system architecture
Information system architectureInformation system architecture
Information system architecture
 
DBA Tips and Tricks - Presentation
DBA Tips and Tricks - PresentationDBA Tips and Tricks - Presentation
DBA Tips and Tricks - Presentation
 
ITE 101 - Week 7
ITE 101 - Week 7ITE 101 - Week 7
ITE 101 - Week 7
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
IS740 Chapter 03
IS740 Chapter 03IS740 Chapter 03
IS740 Chapter 03
 
Chap01
Chap01Chap01
Chap01
 
IS740 Chapter 06
IS740 Chapter 06IS740 Chapter 06
IS740 Chapter 06
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 

Viewers also liked

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)Sanghyeok Park
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)Sanghyeok Park
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)Sanghyeok Park
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)Sanghyeok Park
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)Sanghyeok Park
 

Viewers also liked (10)

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
 
Chap03 re
Chap03 reChap03 re
Chap03 re
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
 
Case mis ch03
Case mis ch03Case mis ch03
Case mis ch03
 
Chap02 re
Chap02 reChap02 re
Chap02 re
 
Bpmn
BpmnBpmn
Bpmn
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
 
Ch7 bpmn
Ch7 bpmnCh7 bpmn
Ch7 bpmn
 

Similar to Hardware and software components for Dee's blog

Similar to Hardware and software components for Dee's blog (20)

Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Ch 2
Ch 2Ch 2
Ch 2
 
Chapter 4 computer software
Chapter 4  computer softwareChapter 4  computer software
Chapter 4 computer software
 
Chapter_04.ppt
Chapter_04.pptChapter_04.ppt
Chapter_04.ppt
 
Operating System Unit 1
Operating System Unit 1Operating System Unit 1
Operating System Unit 1
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt01IntroductiontoInformationTechnology_special.ppt
01IntroductiontoInformationTechnology_special.ppt
 
App softwares
App softwaresApp softwares
App softwares
 
Application Software
Application SoftwareApplication Software
Application Software
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Chap2
Chap2Chap2
Chap2
 
ERP by saeed
ERP by saeedERP by saeed
ERP by saeed
 
Erp by Mohammad Saeed Khan
Erp by Mohammad Saeed KhanErp by Mohammad Saeed Khan
Erp by Mohammad Saeed Khan
 
Chap3
Chap3Chap3
Chap3
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
ppt application softwears (getting work)
ppt application softwears (getting work)ppt application softwears (getting work)
ppt application softwears (getting work)
 
application softwares.ppt
application softwares.pptapplication softwares.ppt
application softwares.ppt
 
Chap3.ppt
Chap3.pptChap3.ppt
Chap3.ppt
 

More from Sanghyeok Park

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처Sanghyeok Park
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰Sanghyeok Park
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기Sanghyeok Park
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구Sanghyeok Park
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로Sanghyeok Park
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120Sanghyeok Park
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023Sanghyeok Park
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331Sanghyeok Park
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326Sanghyeok Park
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317Sanghyeok Park
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design ThinkingSanghyeok Park
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1Sanghyeok Park
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내Sanghyeok Park
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_printSanghyeok Park
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁Sanghyeok Park
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...Sanghyeok Park
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대Sanghyeok Park
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구Sanghyeok Park
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 Sanghyeok Park
 

More from Sanghyeok Park (20)

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_print
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁
 
2015 creaction
2015 creaction2015 creaction
2015 creaction
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Hardware and software components for Dee's blog

  • 2. Dee’s Challenge • Dee needs information system to support her blog – She must calculate costs to get approval • Needs to consider five components of information systems 1. People: sales force and herself 2. Procedures: for posting, accessing blog, leaving comments 3. Hardware: server 4. Software: blog software, setup 5. Data: security 4-2
  • 3. What Does a Manager Need to Know About Computer Hardware? • Basic hardware categories: (IPOS) – Input • Keyboard, mouse, document scanners, bar-code scanners, microphones, magnetic ink readers – Processing • CPU – “the brain” • Main memory and cache memory • Special function cards – Output • Video displays, printers, audio speakers, overhead projectors, plotters – Storage • Magnetic disks, optical disks, magnetic tapes 4-3
  • 4. What a Manager Needs to Know About Hardware (cont’d) Figure 4-1 4-4
  • 5. What a Manager Needs to Know About Hardware (cont’d) 4-5
  • 6. Computer Data • Binary digits (bits) – Used to represent data • Bit is either zero or one • Sizing Computer Data – Bytes – 8-bit chunk equals 1 byte – Size of main memory, storage devices etc. 4-6
  • 8. How Does a Computer Work? • CPU (central processing unit) – Transfers program or data from disk to main memory – Moves instruction from main memory via data channel or bus – Has small amount of fast memory called cache • Keeps frequently used instructions • Large cache makes computer fast, but is expensive • Main memory – Contains program instructions – Contains operating system instructions 4-8
  • 9. How Does a Computer Work? (cont’d) • Operating system (OS) – Program that controls computer’s resources and blocks of data – Provides services to application programs and users 4-9
  • 10. Memory Swapping • Why? Main memory is too small to hold all programs and data • CPU loads programs from memory in chunks – Places new program into unused memory – If none available, the operating system will remove chunk being used and replace with requested data – It does slow down your computer 4-10
  • 11. Why Should a Manager Care How a Computer Works? • Main memory size – Too little means constant memory swapping • Slows processing • Need more memory if processing many programs or large files • CPU speed – Expressed in hertz (Hz) – Needs more CPU if handling large spreadsheets or database files – Dual core processors for PCs – Quad core processors for servers 4-11
  • 12. Why Should a Manager Care How a Computer Works? (cont’d) • Cache and main memory are “volatile” – Contents lost when power is cut off • Magnetic and optical disks are “nonvolatile” – Saved contents survive after power is turned off 4-12
  • 13. What’s the Difference Between a Client and a Server? • Client computers are used for word processing, spreadsheets, database access – Connect to servers for Web, email, database • Servers provide service to clients – They are faster, larger, more powerful – Usually have very simple video display, if any • Server farm – Large collection of coordinated servers – Google has several hundred thousand servers in 36 data centers around world 4-13
  • 14. Client and Server Computers Figure 4-8 4-14
  • 15. What’s the Difference Between a Client and Server? (cont’d) • Grid computing – Network of computers operating as if it is one computer – Companies lease time on grid from IBM and others – Used for intensive arithmetic computing – See www-03.ibm.com/grid • Cloud computing – Computing networks provided as a service on Internet – Example: Facebook and others 4-15
  • 16. What Does a Manager Need to Know about Software? • Two fundamental types: 1. Operating system • Large, complex program that controls computer’s resources 2. Application programs • Perform specific user tasks • Software constraints – Operating systems • Run only on particular types of hardware • Must conform to instruction set of CPU • Windows works only on Intel instruction set CPUs – Application programs • Written to use particular operating system 4-16
  • 17. What a Manager Needs to Know about Software Figure 4-9 4-17
  • 18. What Are the Four Major Operating Systems? 1. Windows – Used by 85% of the world’s desktops – 95% of business users – Different versions for client computers and servers, Web sites, email, and so on 2. Mac OS (click) – Apple Computer, Inc. developed for Macintosh computers – Easy-to-use interfaces – Used primarily by graphic artists and art community – Runs on PowerPC processor or a MAC with Intel processor 4-18
  • 19. What Are the Four Major Operating Systems? (cont’d) 1. Unix – Workhorse for scientific and engineering communities – More difficult to use than Windows or MAC – Not for business users 2. Linux – Developed by open-source community – No fee to use it – IBM has developed business systems solutions that use Linux 4-19
  • 20. What Types Of Applications Exist and How Do Organizations Obtain Them? • Application Software – Programs that perform a business function – Some are general purpose – Excel, Word – Some are specific purpose – QuickBooks • Application Software Acquisition – Buy off-the-shelf • May not be a good fit • May need alterations – Custom-developed software • Tailor-made for organization 4-20
  • 21. What Is the Difference Between a Thin and Thick Client? • Thin client – Requires nothing more than browser – Does not require installation and administration of client software • Thick client – Has more code to run on it – More features and functions – More expense and administration 4-21
  • 22. Thin and Thick Clients Figure 4-11 4-22
  • 23. What Buying Decisions Do You Make? • Manager’s role depends on organization’s policies – Large organizations have IS department that sets standards for hardware and software – Medium to small organizations less formal • Managers take more active role • Usually standardize to single client operating systems • Managers and employees may have role in specifying horizontal application software • Usually no role in specifications of server hardware • Work with technical personnel to test and accept software 4-23
  • 24. Business Manager’s Role in Hardware and Software Specifications Figure 4-12 4-24
  • 25. What Are Viruses, Trojan Horses, and Worms • Viruses – Computer programs that replicates themselves – Take unwanted and harmful actions – Consume computer resources • Payload causes unwanted activity • Trojan horses – Viruses that masquerade as useful programs or files, such as games, MP3s, and so on • Macro viruses – Attach to Word, Excel, and so on to infect documents – Place themselves in startup files – Infect every file the application creates or processes 4-25
  • 26. What Are Viruses, Trojan Horses, and Worms (cont’d) • Worms – Viruses that propagate using Internet or network – Specifically programmed to spread – Actively use networks to spread • Prevention – Patches • Vendor-provided security fixes for programs • Automatic updates or regular checks for patches 4-26
  • 27. Guide: Keeping up to Speed • Technology continues to change • If you don’t keep up, you might not gain a competitive advantage – Managers need to understand what technology is needed • Don’t depend solely on experts – Develop a competitive advantage in non- technology areas to compensate • Other extreme are the “technophiles” 4-27
  • 28. Guide: Keeping Up to Speed (cont’d) • What can a manager do? 1. Don’t ignore technology 2. Take seminars 3. Read articles, ads • C/NET, CIO.com • Wall Street Journal technology articles 4. Attend professional events 5. Get involved as a user representative in technology committees 4-28
  • 29. How Does the Knowledge in This Chapter Help Dee and You? • Reduces the work and costs of her consultant • Dee more confident in dealing with IT department and consultant • Better able to understand consultant’s questions and IT department’s concerns • Can determine: – No new client hardware needed – Use thin client on sales rep computers – Prefer thin client on her computer – Blog server software must be installed on server – IT department will decide whether to run Linux or Windows • Then blog software will be chosen – Set up to be performed by either IT department or consultant – Needs program to author HTML 4-29