• Tidak ada hasil yang ditemukan

McLeod_CH05.ppt 1472KB Apr 03 2011 09:22:54 PM

N/A
N/A
Protected

Academic year: 2017

Membagikan "McLeod_CH05.ppt 1472KB Apr 03 2011 09:22:54 PM"

Copied!
44
0
0

Teks penuh

(1)

Management

Management

Information Systems,

Information Systems,

10/e

10/e

Raymond McLeod and George

Raymond McLeod and George

Schell

(2)

Chapter 5

Chapter 5

Computing and

Computing and

Communications Resources

(3)

Learning Objectives

Learning Objectives

Know the various computer components.

Know the various computer components.

Know about personal computing devices.

Know about personal computing devices.

Understand the implications of the rapid

Understand the implications of the rapid

advances in information and communication

advances in information and communication

technologies.

technologies.

Be familiar with input and output resources.

Be familiar with input and output resources.

Recognize how different storage media differ

Recognize how different storage media differ

and the advantages of each.

(4)

Learning Objectives (Cont’d)

Learning Objectives (Cont’d)

Know the advantages of prewritten software.

Know the advantages of prewritten software.

Understand the different computer

Understand the different computer

networking strategies.

networking strategies.

Understand how communications over the

Understand how communications over the

public telephone system and networks differ.

public telephone system and networks differ.

Know about network protocols.

Know about network protocols.

Distinguish between intranets, extranets,

Distinguish between intranets, extranets,

and the Internet.

(5)

Hardware & Processors

Hardware & Processors

Mainframes

Mainframes

are large computers used

are large computers used

for centralized information systems.

for centralized information systems.

Microcomputers

Microcomputers

or

or

PCs

PCs

are computers

are computers

used by one person.

used by one person.

Processor (CPU)

Processor (CPU)

is where data

is where data

processing is performed.

processing is performed.

Processor speed

Processor speed

is measured by the #

is measured by the #

(6)

Processors

Processors

MHz

MHz

stands for

stands for

millions of cycles per

millions of cycles per

second

second

.

.

Word

Word

is the measure of how many bits

is the measure of how many bits

can be moved with one cycle of the

can be moved with one cycle of the

processor.

processor.

Word size

Word size

is how many characters, “A”,

is how many characters, “A”,

can be moved in a single cycle of the

can be moved in a single cycle of the

processor.

processor.

(7)

Table 5.1 Major Computer

Table 5.1 Major Computer

Components

(8)

Memory & Storage

Memory & Storage

Memory

Memory

(

(

primary storage or RAM

primary storage or RAM

)

)

is the storage area on the computer’s

is the storage area on the computer’s

circuit board.

circuit board.

Volatile

Volatile

Extremely fast

Extremely fast

Fixed storage

Fixed storage

is permanently

is permanently

installed in the computer.

installed in the computer.

Removable storage

Removable storage

media – tape,

media – tape,

disk, CD, DVD, USB flash drive, etc.

(9)
[image:9.720.7.719.95.515.2]
(10)

Input Devices

Input Devices

Human-captured data

Human-captured data

refers to input

refers to input

captured by a person typing on a

captured by a person typing on a

keyboard, clicking a mouse, speaking into

keyboard, clicking a mouse, speaking into

a microphone, or a similar interaction.

a microphone, or a similar interaction.

Machine-captured data

Machine-captured data

is data

is data

captured by an electronic or mechanical

captured by an electronic or mechanical

device.

device.

Point-of-sale terminals

Point-of-sale terminals

are scanners

are scanners

(11)

Output Devices

Output Devices

Monitor

Monitor

Screen resolution, size 17-19’’ diagonals.

Screen resolution, size 17-19’’ diagonals.

Graphic user interface (GUI).

Graphic user interface (GUI).

Printers

Printers

Lasers are like copier machines.

Lasers are like copier machines.

Ink-jets spray ink.

Ink-jets spray ink.

Multimedia is the use of more than 1

Multimedia is the use of more than 1

medium at a time.

(12)

Personal Computing Devices

Personal Computing Devices

Cell phones with interactive messaging

Cell phones with interactive messaging

& video

& video

Smart cell phones are phones that

Smart cell phones are phones that

perform tasks associated with PCs i.e.

perform tasks associated with PCs i.e.

BlackBerry 7270, Treo 650.

BlackBerry 7270, Treo 650.

Global Systems for Mobile

Global Systems for Mobile

Communications (GSM)

Communications (GSM)

digital

digital

cellular phone protocol.

(13)

Home Networks

Home Networks

Home computer networks assess the

Home computer networks assess the

Internet via

Internet via

cable modems

cable modems

or

or

DSL

DSL

modems

modems

.

.

Setup usually requires the modem,

Setup usually requires the modem,

network card(s), wireless router.

network card(s), wireless router.

Wireless security uses

Wireless security uses

Wired

Wired

equivalent privacy

equivalent privacy

(

(

WEP

WEP

) which

) which

encrypts the data transferred between

encrypts the data transferred between

the computer & wireless router.

(14)

Home Computing Security

Home Computing Security

Updates

Updates

for OS an application software.

for OS an application software.

For security & efficiency.

For security & efficiency.

Microsoft Update

Microsoft Update

.

.

Hackers

Hackers

are people who try to break

are people who try to break

into computer systems in order to

into computer systems in order to

Gather information;

Gather information;

Deny the owner access to his resources;

Deny the owner access to his resources;

Delete files;

Delete files;

(15)

Home Computing Security

Home Computing Security

(Cont’d)

(Cont’d)

Viruses

Viruses

are small computer programs

are small computer programs

that replicate by inserting themselves

that replicate by inserting themselves

into computer resources such as

into computer resources such as

programs or files.

programs or files.

Worms

Worms

are self-contained files or

are self-contained files or

programs

programs

Does not have to attach to program or file.

Does not have to attach to program or file.

Can delete, change files, send e-mails, and

Can delete, change files, send e-mails, and

(16)

Home Computing Security

Home Computing Security

(Cont’d)

(Cont’d)

Denial-of-service attack

Denial-of-service attack

is when the

is when the

user is denied access to the services of

user is denied access to the services of

the computer because it is overwhelmed

the computer because it is overwhelmed

with e-mail.

with e-mail.

Antivirus software

Antivirus software

– Norton, MacAfee,

– Norton, MacAfee,

etc. Keep virus definitions updated

etc. Keep virus definitions updated

Spyware

Spyware

– Microsoft Defender, Lavasoft

– Microsoft Defender, Lavasoft

(17)

Software

Software

System software

System software

(

(

OS

OS

) performs

) performs

certain tasks that all computers require.

certain tasks that all computers require.

Hardware interfaces, device drivers.

Hardware interfaces, device drivers.

Manage computer’s processes.

Manage computer’s processes.

OS – Windows XP, Unix, Mac OS X, Linux.

OS – Windows XP, Unix, Mac OS X, Linux.

Application software

Application software

processes the

processes the

user’s data.

user’s data.

Prewritten application software

Prewritten application software

is

is

(18)

Application Software

Application Software

Custom application software

Custom application software

is when

is when

programmers for the business write the

programmers for the business write the

software.

software.

User-written software

User-written software

in

in

End-User

End-User

Computing

Computing

is created by the user, such

is created by the user, such

as Excel Macros, Access Wizards.

as Excel Macros, Access Wizards.

User-friendly software

User-friendly software

is computer

is computer

(19)

Communications

Communications

Protocol

Protocol

is the specification for

is the specification for

formatting data to be transferred

formatting data to be transferred

between communications equipment.

between communications equipment.

Public connections

Public connections

Telephone modems

Telephone modems

(20)
[image:20.720.70.570.89.509.2]

Table 5.4 Connecting to the

Table 5.4 Connecting to the

Internet

(21)

Communications (Cont’d)

Communications (Cont’d)

Packet

Packet

is a piece of the total data to be

is a piece of the total data to be

communicated, includes sender &

communicated, includes sender &

receiver addresses.

receiver addresses.

Cable modems

Cable modems

connect to the Internet

connect to the Internet

via coaxial cable.

via coaxial cable.

Asynchronous transfer mode (ATM)

Asynchronous transfer mode (ATM)

(22)

Private Line

Private Line

Circuit

Circuit

is a connection that is always

is a connection that is always

connected.

connected.

Private line

Private line

is a circuit that is always

is a circuit that is always

open to your communication traffic.

open to your communication traffic.

T-1

T-1

line over 1.5 Mbps;

line over 1.5 Mbps;

T-3

T-3

at 43 Mbps.

at 43 Mbps.

Multiplexed

Multiplexed

is when the line is broken

is when the line is broken

into separate lanes of communication.

(23)

Virtual Private Networks

Virtual Private Networks

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs)

allow

allow

you to use the security & speed of a private

you to use the security & speed of a private

line but still use the low-cost Internet.

line but still use the low-cost Internet.

Tunneling software

Tunneling software

establishes the set of

establishes the set of

intermediary locations of the telephone

intermediary locations of the telephone

equipment that will host a given data

equipment that will host a given data

communications transfer.

communications transfer.

Privacy is attained because the tunnel is not

Privacy is attained because the tunnel is not

established unless the sending & receiving

established unless the sending & receiving

computers authenticate one another.

(24)

Communications - Networks

Communications - Networks

Open Systems Interconnection (OSI)

Open Systems Interconnection (OSI)

standard architecture for network

standard architecture for network

connections established by the

connections established by the

ISO

ISO

.

.

Terminal

Terminal

is a device that has no storage or

is a device that has no storage or

processor; it allows for entering & displaying

processor; it allows for entering & displaying

data for the computer.

data for the computer.

Systems Network Architecture (SNA)

Systems Network Architecture (SNA)

is a

is a

protocol for large computers; it polls other

(25)

Table 5.5 OSI Reference

Table 5.5 OSI Reference

(26)

Networks (Cont’d)

Networks (Cont’d)

Token ring

Token ring

is a

is a

peer-to-peer

peer-to-peer

protocol

protocol

that allows each computer to

that allows each computer to

act as its own controller.

act as its own controller.

Ethernet

Ethernet

is an open protocol for peer-

is an open protocol for

peer-to-peer communications.

to-peer communications.

IEEE

IEEE

endorses

endorses

Data transmission crash

Data transmission crash

is when

is when

two peer computers try to send data

two peer computers try to send data

at the same time.

(27)
[image:27.720.46.719.42.524.2]

Figure 5.11 Token Ring Protocol

Figure 5.11 Token Ring Protocol

Example

(28)

Networks (Cont’d)

Networks (Cont’d)

Data packet

Data packet

is a piece of the total data

is a piece of the total data

to be communicated, combined with the

to be communicated, combined with the

address of the destination computer, the

address of the destination computer, the

sending computer, and other control

sending computer, and other control

information.

information.

Transmission Control

Transmission Control

Protocol/Internet Protocol

Protocol/Internet Protocol

(

(

TCP/IP

TCP/IP

)

)

TCP

TCP

conducts communication over the

conducts communication over the

network.

network.

(29)

Networks (Cont’d)

Networks (Cont’d)

IP address

IP address

is a four-part set of numbers

is a four-part set of numbers

(each from 0 to 255), separated by

(each from 0 to 255), separated by

periods.

periods.

Network interface card (NIC)

Network interface card (NIC)

is used

is used

to attach a device to the communications

to attach a device to the communications

medium.

medium.

Local Area Networks (LANs)

Local Area Networks (LANs)

is a

is a

group of computers and other devices

group of computers and other devices

(30)

Table 5.6 Communications

Table 5.6 Communications

Network Hardware

(31)

Networks (Cont’d)

Networks (Cont’d)

Medium used by LANs can be copper

Medium used by LANs can be copper

wire, wireless, fiber-optics, or other

wire, wireless, fiber-optics, or other

media.

media.

LANs join computers that are

LANs join computers that are

physically located together.

physically located together.

Same room or building.

Same room or building.

(32)

Networks (Cont’d)

Networks (Cont’d)

Metropolitan area network (MAN)

Metropolitan area network (MAN)

is

is

a network that has a physical distance

a network that has a physical distance

limit of roughly 30 miles.

limit of roughly 30 miles.

Wide are networks (WANs)

Wide are networks (WANs)

are used

are used

to connect computers and other devices

to connect computers and other devices

when the distance exceeds the

when the distance exceeds the

constraints of LANs & MANs.

constraints of LANs & MANs.

Uses common carrier, public telephone

Uses common carrier, public telephone

(33)

Internet, Intranet & Extranet

Internet, Intranet & Extranet

Internet

Internet

is just a collection of networks

is just a collection of networks

that can be joined together; Public.

that can be joined together; Public.

Intranet

Intranet

uses the same network protocols

uses the same network protocols

as the Internet but limits accessibility to

as the Internet but limits accessibility to

computer resources to a select group of

computer resources to a select group of

persons in the organization.

persons in the organization.

Extranet

Extranet

is when the intranet is expanded

is when the intranet is expanded

to include users beyond the firm; Trusted

to include users beyond the firm; Trusted

(34)

Convergence of Computing &

Convergence of Computing &

Communications

Communications

Computing devices & communications

Computing devices & communications

devices are now incorporating features

devices are now incorporating features

of the other into themselves.

of the other into themselves.

Voice over Internet Protocol

Voice over Internet Protocol

(

(

VoIP

VoIP

)

)

is the routing of voice communications

is the routing of voice communications

over the Internet as if they were digital

over the Internet as if they were digital

communications.

communications.

(35)
(36)
(37)
(38)

Static RAM / SRAM Dinamic RAM / DRAM

EDORAM

(Extended Data

SDRAM 168 pin

PROM

EPROM

(39)

Hard disk

Removable Storage

Removable Storage

Floppy disk

CD

(40)
(41)
(42)

Input Device

Input Device

(43)
(44)

Printer & Plotter

Printer & Plotter

Gambar

Figure 5.2 MotherboardFigure 5.2 Motherboard
Table 5.4 Connecting to the InternetInternet
Figure 5.11 Token Ring Protocol Figure 5.11 Token Ring Protocol

Referensi

Dokumen terkait

Ada bebeberapa aliran filsafat yang berimpikasi pada pendidikan yaitu idealisme, realisme, eksistensialisme, pragmatisme, esensialisme, perennialism

Penegakan hukum Islam di Indonesia melalui lembaga pengadilan agama bertujuan untuk memberikan ketertiban hidup bagi manusia ketika dihadapkan pada permasalahan

Hasil uji reliabilitas, baik variabel variabel produk, harga, promosi dan tempat sebagai variabel bebas maupun keputusan konsumen membeli Bingka Khatulistiwa di

Ketika kita sudah mulai sangat tergantung pada berbagai produk pa- ngan pabrikan (yang tidak dapat kita produksi sendiri), ketika lidah telah cocok dengan berbagai selera dan ra-

mengajukan/mengeluarkan pendapat serta berani dan percaya diri ketika memberikan kesimpulan materi. Pemahaman materi sesudah pembelajaran memenuhi indikator keberhasilan,

Ijazah, KTP tenaga ahli/ terampil yang dipersyaratkan, Asli/ Foto Copy yang telah dilegalisir pihak yang berwenang;.. SKA/ SKT tenaga ahli/ terampil yang

Dengan ini POKJA II BLPBJ Kota Makassar mengundang calon penyedia Paket Pekerjaan Penyusunan data base PSU Kawasan Permukiman untuk menghadiri Klarifikasi dan Pembuktian

Kelompok Kerja Unit Layanan Pengadaan (Pokja ULP) Kegiatan Rehabilitasi / Pemeliharaan Jalan, Pekerjaan Pengadaan Aspal Tahun Anggaran 2017 pada Dinas Pekerjaan