Module 6 - Learner Guide
Module 6 - Learner Guide
Module 6
Computer technology in business
US: 14913, 14944, 14926
ID Number
Tel/Cell
Email Address
Organisation:
Facilitator Name:
Copyright
All rights reserved. The copyright of this document, its previous editions and any annexures thereto,
is protected and expressly reserved. No part of this document may be reproduced, stored in a
retrievable system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise without the prior permission.
2
Learner Guide Introduction
The purpose of this Learner Guide is to provide learners with the necessary
knowledge and it provides a comprehensive overview of the module: Computer
technology in business, and forms part of a series of modularised Learner Guides
that have been developed for the qualification: Further Education and Training
About Certificate: Information Technology: Systems Development - Qual ID: 78965 NQF
LEVEL 4, Worth 175 Credits.
This Learner Guide has been designed to improve the skills and knowledge of
learners, and thus enabling them to effectively and efficiently complete specific
tasks.
The only way to establish whether a learner is competent and has accomplished
the Learning Outcomes is through an assessment process.
Assessment involves collecting and interpreting evidence about the learner’s
ability to perform a task.
Assessment This guide may include assessments in the form of activities, assignments, tasks or
projects, as well as workplace practical tasks. Learners are required to perform
tasks on the job to collect enough and appropriate evidence for their portfolio of
evidence, proof signed by their supervisor that the tasks were performed
successfully.
To qualify and receive credits towards the learning program, a registered assessor
Qualify will conduct an evaluation and assessment of the learner’s portfolio of evidence
and competency
3
US: 14913, NQF Level 3 Worth 5 Credits
Learning Unit 1
Explain the principles of computer networks
Purpose People credited with this unit standard are able to:
Describe data communication.
Demonstrate knowledge of main features of LAN`s
Demonstrate knowledge of main features of WAN`s.
The performance of all elements is to a standard that allows for further
learning in this area.
Open.
The credit value of this unit is based on a person having prior knowledge and
skills to:
Demonstrate an understanding of fundamental mathematics (at
Learning least NQF level 3).
Assumed to be Demonstrate PC competency skills (End-User Computing unit
Standards, at least up to NQF level 3.)
in Place
Demonstrate competence to resolve technical computer problems
(SGB-ID=DC301/ 302).
Demonstrate an understanding of local and wide area networks, and
their installation.
4
Session 1
Describe data communication
SO 1
Learning
Outcomes The description explains the roles of key elements in data communication.
Criteria)
A data communication system may collect data from remote locations through data transmission
circuits, and then outputs processed results to remote locations. Figure provides a broader view of
data communication networks. The different data communication techniques which are presently in
widespread use evolved gradually either to improve the data communication techniques already
existing or to replace the same with better options and features. Then, there are data
communication jargons to contend with such as baud rate, modems, routers, LAN, WAN, TCP/IP,
ISDN, during the selection of communication systems. Hence, it becomes necessary to review and
understand these terms and gradual development of data communication methods.
5
Components of data communication system
A Communication system has following components:
1. Message: It is the information or data to be communicated. It can consist of text, numbers,
pictures, sound or video or any combination of these.
2. Sender: It is the device/computer that generates and sends that message.
3. Receiver: It is the device or computer that receives the message. The location of receiver
computer is generally different from the sender computer. The distance between sender and
receiver depends upon the types of network used in between.
4. Medium: It is the channel or physical path through which the message is carried from sender to
the receiver. The medium can be wired like twisted pair wire, coaxial cable, fiber-optic cable or
wireless like laser, radio waves, and microwaves.
5. Protocol: It is a set of rules that govern the communication between the devices. Both sender and
receiver follow same protocols to communicate with each other.
6
1. Data sequencing. It refers to breaking a long message into smaller packets of fixed size. Data
sequencing rules define the method of numbering packets to detect loss or duplication of packets,
and to correctly identify packets, which belong to same message.
2. Data routing. Data routing defines the most efficient path between the source and destination.
3. Data formatting. Data formatting rules define which group of bits or characters within packet
constitute data, control, addressing, or other information.
4. Flow control. A communication protocol also prevents a fast sender from overwhelming a slow
receiver. It ensures resource sharing and protection against traffic congestion by regulating the flow
of data on communication lines.
5. Error control. These rules are designed to detect errors in messages and to ensure transmission of
correct messages. The most common method is to retransmit erroneous message block. In such a
case, a block having error is discarded by the receiver and is retransmitted by the sender.
6. Precedence and order of transmission. These rules ensure that all the nodes get a chance to use
the communication lines and other resources of the network based on the priorities assigned to
them.
7. Connection establishment and termination. These rules define how connections are established,
maintained and terminated when two nodes of a network want to communicate with each other.
8. Data security. Providing data security and privacy is also built into most communication software
packages. It prevents access of data by unauthorized users.
9. Log information. Several communication software are designed to develop log information, which
consists of all jobs and data communications tasks that have taken place. Such information may be
used for charging the users of the network based on their usage of the network resources.
7
The description differentiates between LAN's and WAN's.
Types of Networks
There are many different types of networks. However, from an end user's point
Of view there are two basic types:
Local-Area Networks (LANs)
The computers are geographically close together (that is, in the same building).
Wide-Area Networks (WANs)
The computers are farther apart and are connected by telephone lines or radio waves
8
Session 2
Demonstrate knowledge of main features of LANs.
SO 2
Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN
has its own CPU with which it executes programs, but it is also able to access data and devices
anywhere on the LAN. This means that many users can share expensive devices, such as laser
printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-
mail or engaging in chart sessions.
9
There are many different types of LANs-token-ring networks, Ethernents, and ARCnets being the
most common for PCs. LANs are capable of transmitting data at very fast rates, much faster than
data can be transmitted over a telephone line; but the distance are limited, and there is also a limit
on the number of computers that can be attached to a single LAN.
4BUS NETWORK
A bus network is made up of a cable called a bus that is shared by all the workstations or
network nodes. All the nodes receive transmitted data, but the node to which they are
addressed only accepts the data. Bus networks are easily and cheaply installed. An
example of a bus network is Ethernet, the most popular network.
RING NETWORK
A ring topology is where workstations are connected in a ring pattern. Signals in the ring
are sent in one direction from the source node, around the ring from node to node, until
they reach the destination. A ring network can be designed so that a malfunctioning
terminal will not cause problems for the other terminals. IBM's Token Ring is an example
of a ring network.
10
STAR NETWORK
11
Advantages of LANs:
Disadvantages of LANs:
Printing can be slow. Where a lot of workstations are served by only one or two printers, long
print queues may develop.
A virus can spread more easily. If a virus gets into one computer, it is likely to spread quickly
across the network because it will get into the central backing store.
As data is shared there is a greater need for security. Users of the network have to have
authentication techniques such as user ids and passwords. Unique user ID's control access to
12
the files and settings on the network while passwords prevent unauthorised users from logging
onto the network. Data may also have to be encrypted so that it is meaningless if intercepted.
If the server fails, all the workstations are affected. Work stored on shared hard disk drives will
not be accessible and it will not be possible to use network printers either.
The cost of installing the equipment is greater. Cabling can be expensive to buy and to install.
Damage to cables can isolate computers. Some sections of the network can become isolated
and will not be able to communicate with the rest of the network.
Because networks can be complicated to maintain, a network manager may be need to be
employed to run the system.
LAN media
LAN media define how you access the network physically. Three common LAN media are
* Copper UTP cables (commonly referred to as Ethernet patch cables), it's the cheapest way of
connecting a device to the LAN. Very commonly used for normal connections up to 1 GBit/s.
* Optical Fiber, rather expensive but allows for very high bandwiths. Thus, it's usually used as
backbone cabling rather than normal connections between devices.
* Wiress LAN, which uses radio waves transmitted through the air. Slower than wired LAN but allows
for greater mobility of the hosts. Security may be a bit shaky, thus it's usually not used in security
sensitive environments.
13
Session 3
Demonstrate knowledge of main features of WANs.
SO 3
Learning The demonstration explains the uses of WAN's with respect to current
Outcomes practice.
14
Questions:
What is a network?
1. Explain what a Wide Area Network is.
2. State one advantage and one disadvantage of a WAN.
3. When using a LAN, why is it necessary to have a password?
4. Describe the software that makes up a network.
5. Describe the devices that make up a typical network.
15
digital form. The main advantage of voice mail over electronic mail is that the sender does not have
to type. Voice mail also makes it easy to include people in the firm's environment in an
communication network.
(d) E-Commerce
Electronic commerce or e-commerce as it is popularly known refers to the paperless exchange of
business information using Electronic Data Interchange, Electronic mail, Electronic Bulletin Boards,
Electronic Fund Transfer and other network based technologies. Electronic Commerce (EC) not only
automates manual process and paper transactions, but it also helps organisations to move into a
fully electronic environment and change the way they usually operate. Few organisations have
recently started conducting EC over Internet, the network of networks. Internet has also helped EC
to boost up because it is a low cost alternative to the proprietary networks. EC standards are
however under development. Electronic Data Interchange (EDI) is still the dominant part of EC.
Information Technology has transformed the way people work. Electronic Commerce (EC) has
unearthed yet another revolution which is changing the way business houses buy and sell products
and services.
WAN Hardware
WAN Hardware. A WAN - Wide Area Network is a network with a much broader reach than LANs
and MANs. They span across metropolitan areas and may well span across nations and language
differences. The PSTN - Public Switched Telephone Network or POTS - Plain Old Telephone System is
a WAN. The entire Internet is a WAN. A home user's connection to the Internet is very likely done
through a WAN. While they interact with LANs, they are fundamentally different in form and
functions.
The hardware required to implement a WAN link can be as simple and readily available as a modem
and a telephone line. On the other hand it can be complicated and expensive, such as satellites and
transoceanic cabling. This webpage will survey some of the most frequently used hardware.
Modems. The word modem originally derived from modulation/demodulation. This needs to
occur in order to take digital signals from/to computers and transmit/receive them over analog
telephone lines. Currently, they take on an even larger variety of basic approaches to functioning.
They tend to come in two main varieties in terms of their relative position inside or outside the
transmitting/receiving device. Modems can be categorized as internal or external.
One of the main advantages of an internal modem is compactness. They are circuit boards that fit
into one of two places inside a computer.
16
ISA - Industry Standard Architecture slot
PCI - Peripheral Component Interconnect slot
Since they are inside you do not need to find extra space on the desktop, nor do you need an extra
serial cable.
Unfortunately, internal modems are traditionally more difficult to configure than external
ones. Several things need to be set in order to ensure there aren't conflicts with other internal
components.
IRQ - Interrupt Request
o this is an assigned location where the system expects the device, in this case a
modem, to interrupt it when the device sends a signal
o signals that go to a processor on the same line would interrupt each other
Input/Output Address
o this is the memory location where data from the device is stored in order to be
processed by the CPU
o again, if multiple devices try to use the same I/O address it will inevitably result in
conflicts
Virtual Com Port
o this is a logical port number by which the operating system identifies a serial port
o you must set each serial device to use a different com port
All modern operating systems provide a means by which you can view how resources are being
used.
Modifying these settings depends on the modem. The following list gives three typical ways these
settings can be changed.
Dip switches - these are small switches directly on the circuit board that can be moved
Jumpers - pairs of metal pins built into the circuit board that represent an electrical contact
point
o configured so that a small plug is placed on the pins to complete a circuit
Software - a software program is used to change the configuration
Many modems support PNP - Plug and Play technology which enables the operating system to
detect the device
install the necessary software drivers
detect what resources are available on the computer
assign particular resources to the device automatically
Little or no intervention is required from the user. Unfortunately, these sorts of devices require your
17
computer's operating system to have features that are compatible.
External modems have a couple advantages over internal ones.
most provide status lights
o power is on
o connected
o transferring data
usually easier to configure and install than internal ones
A couple disadvantages of external modems are
they require a power cord to plug into an electrical outlet, rather than running off the
computer's power like an internal modem
they require a serial cable to run from the modem to one of the serial ports on the back of
the computer
To use an external modem you need to have an available serial port. Most computers have two built
in serial ports, COM 1 and COM 2, with connectors on the back of the computer. It is important to
remember that many other devices such as scanners, digital cameras and serial printing devices also
use serial ports.
If your computer doesn't have a serial port then you have a few options.
use an internal modem
install an expansion card in your computer
if you have a USB you can chain several serial devices off a single port
Serial ports make use of a UART - Universal Asynchronous Receiver/Transmitter chip to handle
serial communications. This chip comes in different types and the type used determines how fast
data can be transferred over the serial port.
Drivers are software programs that act as liaisons between hardware devices and the operating
system. Some modems require a modem driver that either comes with the modem or can be
downloaded from the manufacturer's website.
A computer may also be configured as a dial-up server or remote access server to allow other
computers to dial into it and connect over the phone lines. Computers running particular server
software can support many remote access connections simultaneously. In order to do this the
server needs to have a modem bank. The modem bank allows the server to make use of a group of
modems simultaneously.
ISDN and DSL Adapters. The device used to connect a computer to an ISDN - Integrated Services
Digital Network or DSL - Digital Subscriber Line is often referred to as a modem. It is more accurate
to call it a terminal adapter. It doesn't really modulate and/or demodulate signals because the lines
18
are digital.
ISDN adapters also come in both internal and external varieties. They are configured similarly to
modems, but typical 128 Kbps ISDN service consists of two data channels each running at 64
Kbps. The two data channels usually have separate phone numbers.
ISDN adapters are configured with information about the SPID - Service Profile Identifier for each
channel. Each of these SPIDs consists of a telephone number, a two digit sharing terminal identifier
and a two digit terminal identifier. Some more recent models support automated SPID selection and
don't require the admin to enter the information.
DSL adapters or endpoints are required at both ends of a DSL connection. Sometimes these
endpoints are external. Other times they are placed together with the NIC on the same card.
Customer Premises Equipment. CPE - Customer Premises Equipment is a general term that
encompasses several different devices. These are used for processing transmissions on WAN links
such as
T-1 lines
T-3 lines
X.25 connections
Frame Relay links
19
20
US: 14944, NQF Level 4 Worth 7 Credits
Learning Unit 2
Explain how data is stored on computers
The credit value of this unit is based on a person having prior knowledge and
21
Session 1
Demonstrate an understanding of computer data types.
SO 1
22
4. Percentage: Percentage values are recorded in a way that it is calculated out of 100 and can be
denoted in a whole number as well as in decimal values. It has a specific percentage symbol (%)
which is used to indicate percentage value.
COMPOSITE DATA TYPE
Composite data type is a combination of primitive data type; they combine to form composite data
type which is also known as data structure. There are different types of composite data, which
serves different purposes like, array, union, record, sets, objects and tagged union.
ALPHANUMERIC DATA TYPE:
Alphanumeric data simply means one of the types of computer data that contains alphabets as well
as numbers. It is very common type of data storage system, which allows different type of computer
data to store in one place. It contains alphabets, numbers, symbols, space and punctuation marks. It
records every bit of details you want to store in your computer. It is also referred as text data.
ABSTRACT DATA TYPE:
Abstract data type is one of the rare types of computer data; it doesn’t have any representation and
implementation. It is just a vague term or language used which don’t have any purpose. Array and
records contain such types of computer data, they are considered as concrete as they specify the
elements present it a memory.
The description of the use of coding systems in a business environment distinguishes categories of
coding systems and includes examples.
COMPUTER CODING SYSTEMS
23
To represent numeric, alphabetic, and special characters in a computer's internal storage and on
magnetic media, we must use some sort of coding system. In computers, the code is made up of
fixed size groups of binary positions. Each binary position in a group is assigned a specific value; for
example 8, 4, 2, or 1. In this way, every character can be represented by a combination of bits that is
different from any other combination. In this section you will learn how the selected coding systems
are used to represent data. The coding systems included are Extended Binary
Coded Decimal Interchange Code (EBCDIC), and American Standard Code for Information
Interchange (ASCII).
When you look at figure 1, you will notice that the four rightmost bits in EBCDIC are assigned values
of 8, 4, 2, and 1. The next four bits to the left are called the zone bits. The EBCDIC coding chart for
uppercase and lowercase alphabetic characters and for the numeric digits 0 through 9 is shown in
figure 2, with their hexadecimal equivalents. Hexadecimal is a number system used with some
computer systems. It has a base of 16 (0-9 and A-F). A represents 10; B represents 11; C represents
12; D represents 13; E represents 14; and F represents 15. In EBCDIC, the bit pattern 1100 is the zone
combination used for the alphabetic characters A through I, 1101 is used for the characters J through
R, and 1110 is the zone combination used for characters S through Z. The bit pattern 1111 is the
zone combination used when representing decimal digits. For example, the code 11000001 is
equivalent to the letter A; the code 11110001 is equivalent to the decimal digit 1. Other zone
combinations are used when forming special characters. Not all of the 256 combinations of 8-bit
code have been assigned characters. characters DP-3 are represented using EBCDIC.
Figure 2. - Eight-bit EBCDIC coding chart (including exadecimal equivalents).
24
. - DP-3 represented using 8-bit EBCDIC code.
DP - 31100 01001101 01110110 00001111 0011
Since one numeric character can be represented and stored using only four bits (8-4-2-1), using an 8-
bit code allows the representation of two numeric characters (decimal digits) as illustrated.
Representing two numeric characters in one byte (eight bits) is referred to
as packing or packed data. By packing data (numeric characters only) in this way, it allows us to
conserve the amount of storage space required, and at the same time, increases processing speed.
Figure 4. - Packed data.
DECIMAL VALUE 92 73
EBCDIC 10010010 01110011
BIT PLACE VALUES 84218421 8421
8421 BYTE1 BYTE2
25
cooperated to develop this code for transmitting and processing data. The purpose was
to standardize a binary code to give the computer user the capability of using several machines to
process data regardless of the manufacturer: IBM, HONEYWELL, UNIVAC, BURROUGHS, and so on.
However, since most computers are designed to handle (store and manipulate) 8-bit code, an 8-bit
version of ASCII was developed. ASCII is commonly used in the transmission of data through data
communications and is used almost exclusively to represent data internally in microcomputers. The
concepts and advantages of ASCII are identical to those of EBCDIC. The important difference
between the two coding systems lies in the 8-bit combinations assigned to represent the various
alphabetic, numeric, and special characters. When using ASCII 8-bit code, you will notice the
selection of bit patterns used in the positions differs from those used in EBCDIC. For example, let's
look at the characters DP3 in both EBCDIC and ASCII to see how they compare.
Character D P 3
EBCDIC 1100 0100 1101 0111 1111 0011
ASCII 0100 0100 0101 0000 0011 0011
In ASCII, rather than breaking letters into three groups, uppercase letters are assigned codes
beginning with hexadecimal value 41 and continuing sequentially through hexadecimal value 5A.
Similarly, lowercase letters are assigned hexadecimal values of 61 through 7A.
The decimal values 1 through 9 are assigned the zone code 0011 in ASCII rather that 1111 as in
EBCDIC. Figure 4-7 is the ASCII coding chart showing uppercase and lowercase alphabetic characters
and numeric digits 0 through 9.
Eight-bit ASCII coding chart (including hexadecimal equivalents).
26
At this point you should understand how coding systems are used to represent data in both EBCDIC
and ASCII. Regardless of what coding system is used, each character will have an additional bit called
a check bit or parity bit.
PARITY BIT
This additional check or parity bit in each storage location is used to detect errors in the circuitry.
Therefore, a computer that uses an 8-bit code, such as EBCDIC or ASCII, will have a ninth bit for
parity checking. The parity bit (also called a check bit, the C position in a code) provides an internal
means for checking the validity, the correctness, of code construction. That is, the total number of
bits in a character, including the parity bit, must always be odd or always be even, depending upon
whether the particular computer system or device you are using is odd or even parity. Therefore, the
coding is said to be in either odd or even parity code, and the test for bit count is called a parity
check.
Now, let's talk about bits and bytes, primary storage, and storage capacities; or, to put it another
way, the capacity of a storage location. Sit back, keep your memory cycling, and we will explain the
ways data may be stored and retrieved inside the computer.
27
Q.7 By using an 8-bit code, how many characters or bit combinations can be represented?
Q.12 Are there any differences in the concepts and advantages of ASCII and EBCDIC?
character?
Data manipulation involves performing calculations on numbers and manipulating strings. Programs
manipulate and use variables in many ways, often depending on the type of the data. Each data type
has a number of operations - things that you can do to it. There are 3 major set of operators in most
programming languages - Numeric or Arithmetic operators, Comparison operators and Logical
operators. Let's know each set in detail.
Numeric or Arithmetic Operators
+ Addition
- Subtraction
* Multiplication
/ Division
\ Integer division
28
Mod Modulus arithmetic
& String concatenation
Arithmetic operators for manipulating data include the familiar addition, subtraction, multiplication
and division operators. There are some interesting variations such as the modulus (Mod) and integer
division (\) available in visual basic.
As the following list shows, the type of the data determines the operations that can be performed
on it:
Data Type Operations
Real, complex, integer, Addition, subtraction, multiplication, division, exponentiation, negation,
Boolean comparison, masking expressions
Logical Negation, conjunction, disjunction, and equivalence
Character Concatenation, comparison
User defined User defined
Cray pointer, Cray Addition, subtraction, and LOC( ) function
character pointer
The intrinsic types have the appropriate built-in (intrinsic) operations. You must define the
operations performed on user-defined data types.
29
Bit manipulation in the C programming language
C has direct support for bitwise operations that can be used for bit manipulation. In the following
examples, n is the index of the bit to be manipulated within the variable bit_fld, which is anunsigned
char being used as a bit field. Bit indexing begins at 0, not 1. Bit 0 is the least significant bit.
Set a bit
bit_fld |= (1 << n)
Clear a bit
bit_fld &= ~(1 << n)
Toggle a bit
bit_fld ^= (1 << n)
Test a bit
bit_fld & (1 << n)
When using an array of bytes to represent set of bits, i.e., a bit array or bitset, the index of the byte
in the array associated with a bit n can be calculated using division:
30
Session 2
Describe computer data structures.
SO 2
(Assessment examples.
The description distinguishes types of computer data structures and identifies examples.
In computer science, a data structure is a particular way of storing and organizing data in a computer
so that it can be used efficiently. Different kinds of data structures are suited to different kinds of
applications, and some are highly specialized to specific tasks. For example, B-trees are particularly
well-suited for implementation of databases, while compiler implementations usually use hash
tables to look up identifiers.
Data structures
Whereas control structures organize algorithms, data structures organize information. In particular,
data structures specify types of data, and thus which operations can be performed on them, while
eliminating the need for a programmer to keep track of memory addresses. Simple data structures
include integers, real numbers, Booleans (true/false), and characters or character strings. Compound
data structures are formed by combining one or more data types. The most important compound
data structures are the array, a homogeneous collection of data, and the record, a heterogeneous
collection. An array may represent a vector of numbers, a list of strings, or
31
Data structure, Way in which data are stored for efficient search and retrieval. The simplest data
structure is the one-dimensional (linear) array, in which stored elements are numbered with
consecutive integers and contents are accessed by these numbers. Data items stored no
consecutively in memory may be linked by pointers (memory addresses stored with items to indicate
where the “next” item or items in the structure are located). Many algorithms have been developed
for sorting data efficiently; these apply to structures residing in main memory and also to structures
that constitute information systems and databases. Bits, Bytes, Characters, Fields, Records, Files,
and Databases are examples
32
33
The description distinguishes types of computer databases and identifies examples.
Types of Database Management Systems
DBMSs come in many shapes and sizes. For a few hundred dollars, you can purchase a DBMS for
your desktop computer. For larger computer systems, much more expensive DBMSs are required.
Many mainframe-based DBMSs are leased by organizations. DBMSs of this scale are highly
sophisticated and would be extremely expensive to develop from scratch. Therefore, it is cheaper for
an organization to lease such a DBMS program than to develop it. Since there are a variety of DBMSs
available, you should know some of the basic features, as well as strengths and weaknesses, of the
major types.
After reading this lesson, you should be able to:
Compare and contrast the structure of different database management systems.
Define hierarchical databases.
Define network databases.
Define relational databases.
Define object-oriented databases.
Types of DBMS: Hierarchical Databases
34
There are four structural types of database management systems: hierarchical, network, relational,
and object-oriented.
Hierarchical Databases (DBMS), commonly used on mainframe computers, have been around for a
long time. It is one of the oldest methods of organizing and storing data, and it is still used by some
organizations for making travel reservations. A hierarchical database is organized in pyramid fashion,
like the branches of a tree extending downwards. Related fields or records are grouped together so
that there are higher-level records and lower-level records, just like the parents in a family tree sit
above the subordinated children. Based on this analogy, the parent record at the top of the pyramid
is called the root record. A child record always has only one parent record to which it is linked, just
like in a normal family tree. In contrast, a parent record may have more than one child record linked
to it. Hierarchical databases work by moving from the top down. A record search is conducted by
starting at the top of the pyramid and working down through the tree from parent to child until the
appropriate child record is found. Furthermore, each child can also be a parent with children
underneath it.
The advantage of hierarchical databases is that they can be accessed and updated rapidly because
the tree-like structure and the relationships between records are defined in advance. However, this
feature is a two-edged sword. The disadvantage of this type of database structure is that each child
in the tree may have only one parent, and relationships or linkages between children are not
permitted, even if they make sense from a logical standpoint. Hierarchical databases are so rigid in
their design that adding a new field or record requires that the entire database be redefined.
Types of DBMS: Network Databases
35
Network databases are similar to hierarchical databases by also having a hierarchical structure.
There are a few key differences, however. Instead of looking like an upside-down tree, a network
database looks more like a cobweb or interconnected network of records. In network databases,
children are called membersand parents are called owners. The most important difference is that
each child or member can have more than one parent (or owner). Like hierarchical databases,
network databases are principally used on mainframe computers. Since more connections can be
made between different types of data, network databases are considered more flexible. However,
two limitations must be considered when using this kind of database. Similar to hierarchical
databases, network databases must be defined in advance. There is also a limit to the number of
connections that can be made between records.
Types of DBMS: Relational Databases
In relational databases, the relationship between data files is relational, not hierarchical.
Hierarchical and network databases require the user to pass down through a hierarchy in order to
36
access needed data. Relational databases connect data in different files by using common data
elements or a key field. Data in relational databases is stored in different tables, each having a key
field that uniquely identifies each row. Relational databases are more flexible than either the
hierarchical or network database structures. In relational databases, tables or files filled with data
are called relations, tuples designates a row or record, and columns are referred to as attributes or
fields. Relational databases work on the principle that each table has a key field that uniquely
identifies each row, and that these key fields can be used to connect one table of data to another.
Thus, one table might have a row consisting of a customer account number as the key field along
with address and telephone number. The customer account number in this table could be linked to
another table of data that also includes customer account number (a key field), but in this case,
contains information about product returns, including an item number (another key field). This key
field can be linked to another table that contains item numbers and other product information such
as production location, color, quality control person, and other data. Therefore, using this database,
customer information can be linked to specific product information.
The relational database has become quite popular for two major reasons. First, relational databases
can be used with little or no training. Second, database entries can be modified without redefining
the entire structure. The downside of using a relational database is that searching for data can take
more time than if other methods are used.
Types of DBMS: Object-oriented Databases (OODBMS)
Able to handle many new data types, including graphics, photographs, audio, and video, object-
oriented databases represent a significant advance over their other database cousins. Hierarchical
and network databases are all designed to handle structured data; that is, data that fits nicely into
fields, rows, and columns. They are useful for handling small snippets of information such as names,
addresses, zip codes, product numbers, and any kind of statistic or number you can think of. On the
other hand, an object-oriented database can be used to store data from a variety of media sources,
such as photographs and text, and produce work, as output, in a multimedia format. Object-oriented
databases use small, reusable chunks of software called objects. The objects themselves are stored
in the object-oriented database. Each object consists of two elements: 1) a piece of data (e.g.,
sound, video, text, or graphics), and 2) the instructions, or software programs called methods, for
what to do with the data. Part two of this definition requires a little more explanation. The
instructions contained within the object are used to do something with the data in the object. For
example, test scores would be within the object as would the instructions for calculating average
test score. Object-oriented databases have two disadvantages. First, they are more costly to
develop. Second, most organizations are reluctant to abandon or convert from those databases that
37
they have already invested money in developing and implementing. However, the benefits to object-
oriented databases are compelling. The ability to mix and match reusable objects provides incredible
multimedia capability. Healthcare organizations, for example, can store, track, and recall CAT scans,
X-rays, electrocardiograms and many other forms of crucial data.
Now that you have completed this lesson, you should be able to:
Compare and contrast the structure of different database management systems.
Define hierarchical databases.
Define network databases.
Define relational databases.
Define object-oriented databases.
38
US: 14926, NQF Level 4 Worth 3 Credits
Learning Unit 3 Describe information systems departments in business
organisations
The learner achieving this unit standard will be able to implement a data
collection plan in the agricultural sector. S/he will be able to effectively
analyze, interpret and evaluate agricultural data and be able to
communicate findings accurately. In addition to this, the learner will be able
to recognize, interpret and report on a range of deviations in data collection
processes.
Learners will be well positioned to extend their learning and practice into
other areas of information management and dissemination in the
agricultural sector. Competent learners will understand the value of
Unit Standard
accurate data collection to the agricultural sector and be able to implement
Purpose
best practices in the area of information gathering.
Learners will understand the importance of the application of business
principles in agricultural production with specific reference to information
systems and technology.
They will be able to operate farming practices as businesses and will gain the
knowledge and skills to move from a subsistence orientation to an economic
orientation in agriculture. Farmers will gain the knowledge and skills to
access mainstream agriculture through a business-oriented approach to
agriculture.
Learning It is assumed that a learner attempting this unit standard will demonstrate
Assumed to be competence against unit standard
NQF 3: Supervise the Collection of Agricultural Data.
in Place
39
Session 1
Describe the roles of IS departments in business organisations.
SO 1
Learning
The description identifies the roles typically found in an IS department.
Outcomes
The description identifies the purpose of each role and outlines their tasks.
(Assessment The description compares the tasks of each role.
Criteria)
An information system (IS) is the study of complementary networks of hardware and software
(see information technology) that people and organizations use to collect, filter, process, create, and
distribute data.
The study bridges business and computer science using the theoretical foundations
of information and computation to study various business models and related algorithmic processes
within a computer science discipline. Computer Information System(s) (CIS) is a field studying
computers and algorithmic processes, including their principles, their software and hardware
designs, their applications, and their impact on society while IS emphasizes functionality over design.
Any specific Information System aims to support operations, management and decision making. In a
broad sense, the term is used to refer not only to the information and communication
technology (ICT) that an organization uses, but also to the way in which people interact with this
technology in support of business processes.
Some authors make a clear distinction between information systems, computer systems,
and business processes. Information systems typically include an ICT component but are not purely
concerned with ICT, focusing instead on the end use of information technology. Information systems
are also different from business processes. Information systems help to control the performance of
business processes.
40
digitally enabled. Businesses today use information systems to achieve six major objectives:
operational excellence; new products, services, and business models; customer/supplier intimacy;
improved decision making; competitive advantage; and day-to-day survival.
Define an information systems from both a technical and a business perspective.
From a technical perspective, an information system collects, stores, and disseminates information
from an organization’s environment and internal operations to support organizational functions and
decision making, communication, coordination, control, analysis, and visualization. Information
systems transform raw data into useful information through three basic activities: input, processing,
and output. From a business perspective, an information system provides a solution to a problem or
challenge facing a firm and provides real economic value to the business.
Identify and describe the three dimensions of information systems.
An information system represents a combination of management, organization, and technology
elements. The management dimension of information systems involves leadership, strategy, and
management behavior. The technology dimensions consist of computer hardware, software, data
management technology, and networking/telecommunications technology (including the Internet).
The organization dimension of information systems involves the organization’s hierarchy, functional
specialties, business processes, culture, and political interest groups.
41
Key terms in Information systems
Chief information officer (CIO)—senior manager in charge of the information systems function in
the firm.
Customer relationship management (CRM) systems— business and technology
discipline that uses information systems to coordinate all of the business processes surrounding the
firm’s interactions with its customers in sales, marketing, and service.
Decision-support systems (DSS) — information systems at the organization’s management level that
combine data and sophisticated analytical models or data analysis tools to support semistructured
and unstructured decision making.
Electronic business (e-business) — the use of the Internet and digital technology to execute all the
business processes in the enterprise.Includes e-commerce as well as processes for the internal
management of the firm and for coordination with suppliers and other business partners.
Electronic commerce (e-commerce)— the process of buying and selling goods and services
electronically, involving transactions using the Internet, networks, and other digital technologies.
End users — representative of departments outside the information systems group for whom
applications are developed.
Enterprise applications— a system that can coordinate activities, decisions, and
knowledge across many different functions, levels, and business management systems, and
knowledge management systems.
Enterprise systems— integrated enterprise-wide information systems that coordinate key
internal processes of the firm.Executive support systems (ESS) — information systems at the
organization’s strategic level designed to address unstructured decision making through advanced
graphics and communications.
Finance and accounting information systems— systems used to keep track of the firm’s financial
assets and fund flows.
Human resources information systems— systems that maintain employee records, track employee
skills, job performance, and training; and support planning for employee compensation and career
development.
Information systems department — the formal organizational unit that is responsible for the
information systems function in the organization.
Information systems managers — leaders of the various specialists in the information systems
department.
Interorganizational system— information systems that automate the flow of information across
organizational boundaries and link a company to its customers, distributors, or suppliers.
42
Knowledge management systems (KMS) — systems that support the creation, capture, storage, and
dissemination of firm expertise and knowledge.
Management information systems (MIS) — the study of information systems focusing on their use
in business and management.
Manufacturing and production information systems — systems that deal with the
planning, development, and production of products and services and with controlling the flow of
production.
Portal —Web interface for presenting integrated personalized content from a variety of sources.
Also refers to a Web site service that provides an initial point of entry to the Web.
Programmers — highly trained technical specialists who write computer software
instructions.
Sales and marketing information systems — systems that help the firm identify
customers for the firm’s products or services, develop products and services to meet their needs,
promote these products and services, sell the products and services, and provide ongoing customer
support.
Supply chain management (SCM) systems — information systems that automate the flow of
information between a firm and its suppliers to optimize the planning, sourcing, manufacturing, and
delivery of products and services.Systems analysts— the analysis of a problem that the organization
will try to solve with an information system.
Transaction processing systems (TPS) — computerized systems that perform and record the daily
routine transactions necessary to conduct the business; they serve the organization’s operational
level.
43
Session 2
Describe the structure of IS departments in business organisations.
SO 2
Define and describe business processes and their relationship to information systems.
A business process is a logically related set of activities that define how specific business tasks are
performed, and a business can be viewed as a collection of business processes. Business processes
are concrete workflows of material, information, and knowledge. They also represent unique ways in
which organizations coordinate work, information, and knowledge, and the ways in which
management chooses to coordinate work. Managers need to pay attention to business processes
because they determine how well the organization can execute its business, and thus be a potential
source of strategic success or failure. Although each of the major business functions has its own set
of business processes, many other business processes are cross functional, such as order fulfilment.
Information systems can help organizations achieve greater efficiencies by automating parts of these
processes or by helping organizations redesign and streamline them. Firms can become more
flexible and efficient by coordinating their business processes closely, and, in some cases, integrating
these processes so they are focused on efficient management of resources and customer service.
Describe the information systems supporting the major business functions: sales and marketing,
manufacturing and production, finance and accounting, and human resources.
At each level of the organization, information systems support the major functional areas of the
business. Sales and marketing systems help the firm identify customers for the firm’s products or
services, develop products and services to meet customers’ needs, promote the products and
services, sell the products and services, and provide ongoing customer support. Manufacturing and
production systems deal with the planning, development, and production of products or services,
and control the flow of production. Finance and accounting systems keep track of the firm’s financial
assets and fund flows. Human resources systems maintain employee records; track employee skills,
job performance, and training; and support planning for employee compensation and career
development.
44
Evaluate the role played by systems serving the various levels of management in a business and
their relationship to each other.
There are four major types of information systems in contemporary organizations serving
operational, middle, and senior management. Systems serving operational management are
transaction processing systems (TPS), such as payroll or order processing, that track the flow of the
daily routine transactions necessary to conduct business. MIS and DSS provide middle management
with reports and access to the organization’s current performance and historical records. Most MIS
reports condense information from TPS and are not highly analytical. DSS support management
decisions when these decisions are unique, rapidly changing, and not specified easily in advance.
They have more advanced analytical models and data analysis capabilities than MIS and often draw
on information from external as well as internal sources. ESS support senior management by
providing data of greatest importance to senior management decision makers, often in the form of
graphs and charts delivered via portals. They have limited analytical capabilities but can draw on
sophisticated graphics software and many sources of internal and external information.
Explain how enterprise applications and intranets promote business process integration and
improve organizational performance
Enterprise applications, such as enterprise systems, supply chain management systems, customer
relationship management systems, and knowledge management systems are designed to support
organization-wide process coordination and integration so that the organization can operate
efficiently. They span multiple functions and business processes and may be tied to the business
processes of other organizations. Enterprise systems integrate the key internal business processes of
a firm into a single software system so that information can flow throughout the organization,
improve coordination, efficiency, and decision making. Supply chain management systems help the
firm manage its relationship with suppliers to optimize the planning, sourcing, manufacturing, and
delivery of products and services.
Customer relationship management uses information systems to coordinate all of the business
processes surrounding the firm’s interactions with its customers to optimize firm revenue and
customer satisfaction. Knowledge management systems enable firms to optimize the creation,
sharing, and distribution of knowledge to improve business processes and management decisions.
Intranets and extranets use Internet technology and standards to assemble information from various
systems and present it to the user in a Web page format. Extranets make portions of private
corporate intranets available to outsiders.
45