Software information PowerPoint Presentation.pptx

abikuhillary46 17 views 17 slides Oct 10, 2024
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

A fully explained software information system ppt


Slide Content

SOFTWARE/PROGRAMS Software are sets of instructions that control functioning of a computer. Programs are series of instructions that tell a computer what to do. They can also be defined as series of instructions that when executed performs a task. These software are hard to write and are detail-ridden. Software in two categories: i . open-source ii. proprietary open-source: These are software which are released under a license in which the license holder grants the users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. The examples of these are: Python, Manzilla Firefox, Blender, Chromium, virtual DJ, etc.

Proprietary: These on the other hand, grants the writer, publisher, or other rightsholders and rightsholder partners a monopoly by modern copyright and property law. These companies make money by selling the software or earning by anyone using it but not the source code. Examples of these are: Microsoft windows, Microsoft office, skype, adobe reader, adobe photoshop , oracle, antiviruses, etc. Software are in two types : system software, Application software System software These are collective terms for a computer program that carry out tasks that give results that are not directly useful but facilitates the development or use of other software. These results are not directly useful since they give indirect values.

Operating system (OS) This is a component of the system software that manages activity of other programs. It starts programs, copies file, organizes files, accepts requests from programs such as start on their behalf, saving data on disk drive, etc. The main three proponents of OS are: Defining user interface A user interface is a section that allows a user to interact with a system. The evolution talks majorly about three: Graphical user interface (GUI), touch-based user interface (TBI)& command-line user interface (CLI). Graphical User Interface . Most of computers use graphical user interface. This is an interface that shows a user location on screen and allows the user to navigate by clicking the folders, icons, or directory to execute a task.

Command line interface This is where the computer is directed through commands. These commands are entered by typing on keyboard hence provide much information than the GUI. These commands are faster for the literate but hard for the ones who don’t know much about it. Managing shred resources OS also manage the shared resources like RAM, disk space, screen space, communication line/links, hardware devices, program timings, top displays over other apps when in use. Providing shared services Common functioning: interface like printing, playing music, etc. are common in all programs designed. It also eases the creating and use of programs and makes performance of tasks easy.

Note: OS built for a particular processor normally functions in the processor it is designed for. The combination of the processor and the OS is called platform. There are two types of operating systems; multi-user Single-user Application software These are software that provide direct value to the users. They are of two types; vertical and horizontal Vertical application/tailor made These are designed for specific company. Examples of these are; banking applications, retail POS systems, legal practice management systems, etc. Horizontal applications These are made to for wide variety of use cases across the globe. Examples of these are: word processors, spreadsheets, etc.

NETWORK A network refers to the interconnected system of devices and communication channels that facilitate the exchange of data and resources among various computing entities. Networks play a crucial role in enabling communication, data sharing, and access to resources such as servers, databases, and applications within an organization or across multiple organizations.

TYPES OF NETWORK Local Area Network (LAN): A LAN connects devices within a limited geographic area, such as a building or campus. It is used for sharing resources like printers and data within a small group. Wide Area Network (WAN): A WAN covers a larger geographic area, often connecting multiple LANs across cities, countries, or even continents. The internet is an example of a WAN Metropolitan Area Network (MAN): A MAN spans a city or a large campus and is larger than a LAN but smaller than a WAN . Personal Area Network (PAN): A PAN connects personal devices within a range of a few meters, such as smartphones, laptops, or tablets using technologies like Bluetooth.

NETWORK TOPOLOGY Bus Topology: All devices are connected to a single communication line (bus). It’s simple but can be less reliable . Star Topology: Devices are connected to a central hub or switch, making it easier to manage but dependent on the central node . Ring Topology: Devices are connected in a circular format. Each device is connected to two other devices, forming a ring . Mesh Topology: Every device is interconnected, providing high reliability and redundancy . Hybrid Topology: A combination of two or more different types of topologies.

COMPONENTS OF A NETWORK Devices: These include computers, servers, printers, routers, switches, and other hardware that connect to the network . Transmission Media: Physical media (like copper cables and fiber optics) or wireless media (such as radio waves or microwaves) used to transfer data . Network Interface Cards (NICs): Hardware that allows a device to connect to a network . Routers and Switches: Routers direct data between different networks, while switches connect devices within the same network . Firewalls: Security devices that monitor and control incoming and outgoing network traffic.

NETWORK PROTOCOLS Protocols define the rules for communication between network devices. Key protocols include: TCP/IP (Transmission Control Protocol/Internet Protocol): Fundamental for internet communication, enabling data transfer and routing .   HTTP/HTTPS (Hypertext Transfer Protocol/Secure): Protocols for web browsing and secure web communication . FTP (File Transfer Protocol): Used for transferring files between devices. SMTP/POP3/IMAP: Protocols for sending and receiving emails . Ethernet: A common LAN protocol for physical data transmission

FUNCTIONS OF NETWORK IN INFORMARION SYSTEMS Data Communication: Facilitates the sharing of data between devices. Resource Sharing: Allows multiple users to access and share resources like files, printers, and databases .   Remote Access: Enables users to access systems and resources from remote locations. Data Storage and Backup: Centralized data storage on servers and networked storage devices, providing backup and recovery options . Security Management: Provides mechanisms for protecting data integrity, confidentiality, and availability through firewalls, encryption, and access controls.

NETWORK SECURITY Network security is critical for protecting the integrity, confidentiality, and availability of data. It includes the use of firewalls, intrusion detection systems, virtual private networks (VPNs), and encryption technologies to safeguard data in transit and at rest.

2. ICT FACILITIES Facilities in information system are critical component of information system infrastructure providing the physical environment and support systems necessary for IT operation.

Key component of facilities in information system infrastructure Data centers: these are specialized facilities that house servers, storage system, and networking equipment . they provide a controlled environment to ensure optimal performance. Server rooms: these are dedicated spaces within an organization where savers are housed. These rooms are designed to provide the necessary conditions for savers to operate effectively Network operation: these include the physical cabling and hard ware (like switches and routers) that connect various components of the IT infrastructure Physical Security Measures: Facilities must implement strict access control measures to protect sensitive area, such as data centers and server rooms from unauthorized personnel. Power and cooling system: reliable power supply systems including un interruptible power supplies are essential to prevent downtime and data loss during power outages. Effective cooling system are also necessary to maintain optimal operating temperature for servers and networking equipment, preventing overheating and ensuring longevity Disaster recovery facilities: these are designed to ensure business continuity in the event of disaster. Organization must have a disaster recovering plan that outlines operations during un-expected events such as natural disasters or cyber-attacks.

Importance of facilities Supports IT operation Ensures data security Provides scalability Enhances deserter recovery Supports compliance Improve IT stuff productivity Reduces downtime Optimizes energy efficiency Enhances business continuity Supports organization

3. Personnel P ersonnel are the people responsible for managing, maintaining and securing the information system infrastructure. These people ensure that the information in an organization is successfully delivered to its required destination through improved system .

Personnels include; System administrators: The role of system administrators is to manage the severs and also ensure that the operating systems are running effectively. Database administrators: They manage databases, ensure data integrity that is to say they ensure accuracy of the data and reliability. They also ensure optimum performance of databases. Network administrators: They ensure that there is enough network supply in the information system, make sure that the network is secured that is to the network being used only when authorized and also troubleshoot connectivity issues and maintaining the network hardware. Security personnel: The security personnel implement cyber security measures that is to say protect computer systems, networks, and digital data from unauthorized access, attacks, damage or theft. They also monitor for potential threats and respond to security incidents. Facility management team: This team looks at the physical aspects of the infrastructure for example ensuring that the data center environment is maintained correctly and also promoting physical security. IT support staff: This provides technical assistance to users, troubleshoot hardware and software issues and ensure smooth operations of the system
Tags