Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Http www rsa com node aspx id 1159

25/10/2021 Client: muhammad11 Deadline: 2 Day

Biola University Biola University

Digital Commons @ Biola Digital Commons @ Biola

Open Textbooks

2019

Information Systems for Business and Beyond Information Systems for Business and Beyond

David T. Bourgeois Biola University

James L. Smith

Shouhong Wang

Joseph Mortati

Follow this and additional works at: https://digitalcommons.biola.edu/open-textbooks

Part of the Databases and Information Systems Commons, Information Security Commons, Management Information Systems Commons, Programming Languages and Compilers Commons, and the Systems Architecture Commons

Recommended Citation Recommended Citation Bourgeois, David T.; Smith, James L.; Wang, Shouhong; and Mortati, Joseph, "Information Systems for Business and Beyond" (2019). Open Textbooks. 1. https://digitalcommons.biola.edu/open-textbooks/1

This Book is brought to you for free and open access by Digital Commons @ Biola. It has been accepted for inclusion in Open Textbooks by an authorized administrator of Digital Commons @ Biola. For more information, please contact eileen.walraven@biola.edu.

https://digitalcommons.biola.edu/
https://digitalcommons.biola.edu/open-textbooks
https://digitalcommons.biola.edu/open-textbooks?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
http://network.bepress.com/hgg/discipline/145?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
http://network.bepress.com/hgg/discipline/1247?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
http://network.bepress.com/hgg/discipline/636?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
http://network.bepress.com/hgg/discipline/148?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
http://network.bepress.com/hgg/discipline/144?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
https://digitalcommons.biola.edu/open-textbooks/1?utm_source=digitalcommons.biola.edu%2Fopen-textbooks%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages
mailto:eileen.walraven@biola.edu
Information Systems for Business and Beyond (2019)

Information Systems for Business and Beyond (2019) pg. 1

Information Systems for Business and Beyond (2019)

Information systems, their use in business, and the larger impact they are having on our world.

DAVID BOURGEOIS

JOSEPH MORTATI, SHOUHONG WANG, AND JAMES SMITH

Information Systems for Business and Beyond (2019) pg. 2

Information Systems for Business and Beyond (2019) by David Bourgeois is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.

This book was initially developed in 2014 by Dr. David Bourgeois as part of the Open Textbook Challenge funded by the Saylor Foundation. This 2019 edition is an update to that textbook.

This book was produced with Pressbooks (https://pressbooks.com) and rendered with Prince.

Information Systems for Business and Beyond (2019) pg. 3

https://creativecommons.org/licenses/by-nc/4.0/
https://www.saylor.org/2011/10/open-textbook-challenge-making-textbooks-available/
https://saylor.org/
http:https://pressbooks.com
Information Systems for Business and Beyond

Updated edition: August 1, 2019

DAVID T. BOURGEOIS, PH.D.

JAMES L. SMITH, PH.D.

SHOUHONG WANG, PH.D.

JOSEPH MORTATI, MBA

Information Systems for Business and Beyond (2019) pg. 4

Copyright

Information Systems for Business and Beyond (2019) by David Bourgeois is licensed

under a Creative Commons Attribution-NonCommercial 4.0 International License,

except where otherwise noted.

https://opentextbook.site/informationsystems2019
https://creativecommons.org/licenses/by-nc/4.0/
Book Contributors Information Systems for Business and Beyond was originally developed in 2014 by David T. Bourgeois Ph.D.

Updates for the 2019 edition were graciously contributed by:

• James L. Smith Ph.D. (all chapters)

• Shouhong Wong, Ph.D. (chapters 4 and 8)

• Joseph Mortati, MBA (chapter 10)

Information Systems for Business and Beyond (2019) pg. 6

Changes from Previous Edition Information Systems for Business and Beyond was written by Dr. David Bourgeois and originally published in 2014 as part of the Open Textbook Challenge at the Saylor Foundation. Since then, it has been accessed thousands of time and used in many courses worldwide. This 2019 update to the textbook brings it up to date and adds many new topics. True to its open textbook roots, many of the updates have come from the community of instructors and practitioners who are passionate about information systems. See the page Book Contributors to see the primary contributors to this edition. A majority of the changes listed below were made by Dr. James Smith, who did a revision to this text in 2018.

Here is a summary of the changes made:

Overall • New and updated images, especially those related to

statistics, in order to bring them up to date.

• References brought up to date.

• Added labs for every chapter.

• Added an index.

• Editing for consistency.

Chapter 1: What is an information system? • Added video: Blum’s fibre optic TED Talk

Information Systems for Business and Beyond (2019) pg. 7

Chapter 2: Hardware • Removed text which discussed increasing dependency on

tablets and decreasing use of desktops

• Clarification of bit vs. byte, binary vs. digital. Added tables to Understanding Binary sidebar

• Added Huang’s Law on graphics processor units

• Modified text regarding Moore’s Law to state that his law is no longer able to be maintained

Chapter 3: Software • Added information about Ubuntu Linux

• Added information about Tableau

• Supply Chain Management: added an emphasis on use of Information Systems up and down supply chain by Walmart to gain competitive advantage

Chapter 4: Data and Databases • Database schemas redesigned

• Data types added

• SQL examples include output

• NoSQL described

• Data Dictionary re-ordered to column name

• New section on “Why database technology?”

• Differentiation of data, information, and knowledge

• Section on Data models

• Changed illustrative example of database tables and relationships.

Information Systems for Business and Beyond (2019) pg. 8

• Updated section on Business Intelligence to focus on the rise of analytics and data science. Includes a new “What is Data Science?” sidebar.

Chapter 5: Networking and Communication • History of ARPANET initial four nodes, etc.

• Metcalfe’s Law

Chapter 6: Information Systems Security • Added information on blockchain and Bitcoin.

Chapter 8: Business Processes • Introduce tools (DFD, BPMN, UML) of business process

modeling

• Introduce examples of DFD.

Chapter 10: Information Systems Development • Java sample code

• Mismanaging Change side bar

• Added section on mobile development.

• Added sidebar on risks of end-user computing

• Added Eclipse IDE

Information Systems for Business and Beyond (2019) pg. 9

Chapter 11: Globalization and the Digital Divide • World 3.0 written by economist Pankaj Ghemawat; also, his

TED talk video

Chapter 12: The Ethical and Legal Implications of Information Systems

• Facebook and Cambridge Analytics data privacy

• General Data Protection Regulation section

Chapter 13: Trends in Information Systems • Waze mapping app

• Drone video

• Drone blood delivery in Kenya video

• Added sidebar on Mary Meeker and her Internet Trends report

Information Systems for Business and Beyond (2019) pg. 10

How you can help This is an open textbook and relies on the support of its users to stay relevant and available. Here’s how you can help:

1. Let us know you are using this textbook.

◦ If you are an instructor, please let us know you’ve adopted this textbook by filling out the instructor survey.

◦ If you are not an instructor, please fill out the student survey.

2. Let us know how to improve the textbook. If you have suggestions, please let us know by filling out our feedback form.

3. Finally, the domain, web hosting, security, backup and export tools used by this textbook are not free. Please consider supporting us financially through PayPal. Please note: this donation goes directly to Imperial Digital LLC, the company hosting and supporting this open textbook project. All contributions are marked as donations towards this open textbook project.

Information Systems for Business and Beyond (2019) pg. 11

https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
https://docs.google.com/forms/d/e/1FAIpQLScdszjD9mXsCd8IBbTraPJt8rgIJ_I2eIEJuJakqKmd31K5XQ/viewform
https://docs.google.com/forms/d/e/1FAIpQLScdszjD9mXsCd8IBbTraPJt8rgIJ_I2eIEJuJakqKmd31K5XQ/viewform
https://docs.google.com/forms/d/e/1FAIpQLScdszjD9mXsCd8IBbTraPJt8rgIJ_I2eIEJuJakqKmd31K5XQ/viewform
https://docs.google.com/forms/d/e/1FAIpQLSfhClva6Vcu10_xxFgLqWapKewr44NmoHsEy108alfomMg3bA/viewform
https://docs.google.com/forms/d/e/1FAIpQLSfhClva6Vcu10_xxFgLqWapKewr44NmoHsEy108alfomMg3bA/viewform
https://docs.google.com/forms/d/e/1FAIpQLSfhClva6Vcu10_xxFgLqWapKewr44NmoHsEy108alfomMg3bA/viewform
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=UBXGVAUNGK5U8&source=url
Introduction Welcome to Information Systems for Business and Beyond. In this book, you will be introduced to the concept of information systems, their use in business, and how information systems can be used to gain competitive advantage.

Audience This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a bit technical, every effort has been made to convey the information essential to understanding a topic while not getting overly focused in detailed terminology.

Chapter Outline The text is organized around thirteen chapters divided into three major parts, as follows:

• Part 1: What Is an Information System?

◦ Chapter 1: What Is an Information System? – This chapter provides an overview of information systems, including the history of how information systems got to where it is today.

◦ Chapter 2: Hardware – This is a discussion of information systems hardware and how it works. You will look at different computer parts and learn how they interact.

Information Systems for Business and Beyond (2019) pg. 12

◦ Chapter 3: Software – Without software, hardware is useless. This chapter covers software and the role it plays in an organization.

◦ Chapter 4: Data and Databases – This chapter explores how organizations use information systems to turn data into information that can then be used for competitive advantage. Special attention is paid to the role of databases.

◦ Chapter 5: Networking and Communication – Today’s computers are expected to also be communication devices. This chapter reviews the history of networking, how the Internet works, and the use of networks in organizations today.

◦ Chapter 6: Information Systems Security – This chapter discusses the information security triad of confidentiality, integrity, and availability. Different security technologies are reviewed, and the chapter concludes with a primer on personal information security.

• Part 2: Information Systems for Strategic Advantage

◦ Chapter 7: Does IT Matter? – This chapter examines the impact that information systems have on an organization. Can IT give a company a competitive advantage? This chapter discusses the seminal works by Brynjolfsson, Carr, and Porter as they relate to IT and competitive advantage.

◦ Chapter 8: Business Processes – Business processes are the essence of what a business does, and information systems play an important role in making them work. This chapter will discuss business process management, business process reengineering, and ERP systems.

◦ Chapter 9: The People in Information Systems – This chapter will provide an overview of the different types of people involved in information systems. This includes

Information Systems for Business and Beyond (2019) pg. 13

people who create information systems, those who operate and administer information systems, those who manage information systems, and those who use information systems.

◦ Chapter 10: Information Systems Development – How are information systems created? This chapter will review the concept of programming, look at different methods of software development, review website and mobile application development, discuss end-user computing, and look at the “build vs. buy” decision that many companies face.

• Part 3: Information Systems beyond the Organization

◦ Chapter 11: Globalization and the Digital Divide – The rapid rise of the Internet has made it easier than ever to do business worldwide. This chapter will look at the impact that the Internet is having on the globalization of business and the issues that firms must face because of it. It will also cover the concept of the digital divide and some of the steps being taken to alleviate it.

◦ Chapter 12: The Ethical and Legal Implications of Information Systems – The rapid changes in information and communication technology in the past few decades have brought a broad array of new capabilities and powers to governments, organizations, and individuals alike. This chapter will discuss the effects that these new capabilities have had and the legal and regulatory changes that have been put in place in response.

◦ Chapter 13: Future Trends in Information Systems – This final chapter will present an overview of some of the new technologies that are on the horizon. From wearable technology to 3-D printing, this chapter will provide a look forward to what the next few years will bring.

Information Systems for Business and Beyond (2019) pg. 14

For the Student Each chapter in this text begins with a list of the relevant learning objectives and ends with a chapter summary. Following the summary is a list of study questions that highlight key topics in the chapter. In order to get the best learning experience, you would be wise to begin by reading both the learning objectives and the summary and then reviewing the questions at the end of the chapter.

For the Instructor Instructors: if you have adopted this book for your course, would you be so kind as to let us know in the instructor survey?

Learning objectives can be found at the beginning of each chapter. Of course, all chapters are recommended for use in an introductory information systems course. However, for courses on a shorter calendar or courses using additional textbooks, a review of the learning objectives will help determine which chapters can be omitted.

At the end of each chapter, there is a set of study questions and exercises (except for chapter 1, which only offers study questions). The study questions can be assigned to help focus students’ reading on the learning objectives. The exercises are meant to be a more in-depth, experiential way for students to learn chapter topics. It is recommended that you review any exercise before assigning it, adding any detail needed (such as length, due date) to complete the assignment. Some chapters also include lab assignments.

As an open textbook, support for supplemental materials relies on the generosity of those who have created them and wish to share them. Supplemental materials, including slides and quizzes, are located on the home page for this book. If you wish to contribute materials that you have created, please fill out the instructor survey and communicate that fact.

Information Systems for Business and Beyond (2019) pg. 15

https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
https://opentextbook.site/
https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
PART I: WHAT IS AN INFORMATION SYSTEM?

Information Systems for Business and Beyond (2019) pg. 16

Chapter 1: What Is an Information System?

Upon successful completion of this chapter, you will be able to:

• Define what an information system is by identifying its major components;

• Describe the basic history of information systems; and

• Describe the basic argument behind the article “Does IT Matter?” by Nicholas Carr.

Introduction Welcome to the world of information systems, a world that seems to change almost daily. Over the past few decades information systems have progressed to being virtually everywhere, even to the point where you may not realize its existence in many of your daily activities. Stop and consider how you interface with various components in information systems every day through different

Information Systems for Business and Beyond (2019) pg. 1

electronic devices. Smartphones, laptop, and personal computers connect us constantly to a variety of systems including messaging, banking, online retailing, and academic resources, just to name a few examples. Information systems are at the center of virtually every organization, providing users with almost unlimited resources.

Have you ever considered why businesses invest in technology? Some purchase computer hardware and software because everyone else has computers. Some even invest in the same hardware and software as their business friends even though different technology might be more appropriate for them. Finally, some businesses do sufficient research before deciding what best fits their needs. As you read through this book be sure to evaluate the contents of each chapter based on how you might someday apply what you have learned to strengthen the position of the business you work for, or maybe even your own business. Wise decisions can result in stability and growth for your future enterprise.

Information systems surround you almost every day. Wi-fi networks on your university campus, database search services in the learning resource center, and printers in computer labs are good examples. Every time you go shopping you are interacting with an information system that manages inventory and sales. Even driving to school or work results in an interaction with the transportation information system, impacting traffic lights, cameras, etc. Vending machines connect and communicate using the Internet of Things (IoT). Your car’s computer system does more than just control the engine – acceleration, shifting, and braking data is always recorded. And, of course, everyone’s smartphone is constantly connecting to available networks via Wi-fi, recording your location and other data.

Can you think of some words to describe an information system? Words such as “computers,” “networks,” or “databases” might pop into your mind. The study of information systems encompasses a broad array of devices, software, and data systems. Defining an

Information Systems for Business and Beyond (2019) pg. 2

-

information system provides you with a solid start to this course and the content you are about to encounter.

Defining Information Systems Many programs in business require students to take a course in information systems. Various authors have attempted to define the term in different ways. Read the following definitions, then see if you can detect some variances.

• “An information system (IS) can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support decision making and control

in an organization.” 1

• “Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data,

typically in organizational settings.” 2

• “Information systems are interrelated components working together to collect, process, store, and disseminate information to support decision making, coordination,

control, analysis, and visualization in an organization.” 3

As you can see these definitions focus on two different ways of describing information systems: the components that make up an information system and the role those components play in an organization. Each of these need to be examined.

Information Systems for Business and Beyond (2019) pg. 3

The Components of Information Systems

Information systems can be viewed as having five major components: hardware, software, data, people, and processes. The first three are technology. These are probably what you thought of when defining information systems. The last two components, people and processes, separate the idea of information systems from more technical fields, such as computer science. In order to fully understand information systems, you will need to understand how all of these components work together to bring value to an organization.

Technology Technology can be thought of as the application of scientific knowledge for practical purposes. From the invention of the wheel to the harnessing of electricity for artificial lighting, technology has become ubiquitous in daily life, to the degree that it is assumed to always be available for use regardless of location. As discussed before, the first three components of information systems – hardware, software, and data – all fall under the category of technology. Each of these will be addressed in an individual chapter. At this point a simple introduction should help you in your understanding.

Hardware

Hardware is the tangible, physical portion of an information system

– the part you can touch. Computers, keyboards, disk drives, and

Information Systems for Business and Beyond (2019) pg. 4

Flash drives are all examples of systems hardware. How these hardware components function and work together will be covered in Chapter 2.

Software

Software comprises the set of instructions that tell the hardware what to do. Software is not tangible – it cannot be touched. Programmers create software by typing a series of instructions telling the hardware what to do. Two main categories of software are: Operating Systems and Application software. Operating Systems software provides the interface between the hardware and the Application software. Examples of operating systems for a personal computer include Microsoft Windows and Ubuntu Linux. The mobile phone operating system market is dominated by Google Android and Apple iOS. Application software allows the user to perform tasks such as creating documents, recording data in a spreadsheet, or messaging a friend. Software will be explored more thoroughly in Chapter 3.

Data

The third technology component is data. You can think of data as a collection of facts. For example, your address (street, city state, postal code), your phone number, and your social

Information Systems for Business and Beyond (2019) pg. 5

networking account are all pieces of data. Like software, data is also intangible, unable to be seen in its native state. Pieces of unrelated data are not very useful. But aggregated, indexed, and organized together into a database, data can become a powerful tool for businesses. Organizations collect all kinds of data and use it to make decisions which can then be analyzed as to their effectiveness. The analysis of data is then used to improve the organization’s performance. Chapter 4 will focus on data and databases, and how it is used in organizations.

Networking Communication Besides the technology components (hardware, software, and data) which have long been considered the core technology of information systems, it has been suggested that one other component should be added: communication. An information system can exist without the ability to communicate – the first personal computers were stand-alone machines that did not access the Internet. However, in today’s hyper-connected world, it is an extremely rare computer that does not connect to another device or to an e-network. Technically, the networking communication component is made up of hardware and software, but it is such a core feature of today’s information systems that it has become its own category. Networking will be covered in Chapter 5.

Information Systems for Business and Beyond (2019) pg. 6

People Jeff Bezos, Amazon CEO When thinking about information

systems, it is easy to focus on the technology components and forget to look beyond these tools to fully understand their integration into an organization. A focus on the people involved in information systems is the next step. From the front-line user support staff, to systems analysts, to developers, all the way up to the chief information officer (CIO), the people involved with information systems are an essential element. The people component will be covered in Chapter 9.

Process The last component of information systems is process. A

process is a series of steps undertaken to achieve a desired outcome or goal. Information systems are becoming more integrated with organizational processes, bringing greater productivity and better control to those processes. But simply automating activities using technology is not enough – businesses looking to utilize information systems must do more. The ultimate goal is to improve processes both internally and externally, enhancing interfaces with suppliers and customers. Technology buzzwords such as “business process re-engineering,” “business process management,” and “enterprise resource planning” all have to do with the continued improvement of these business procedures and the integration of technology with them. Businesses hoping to gain a competitive advantage over their competitors are highly focused on this

Information Systems for Business and Beyond (2019) pg. 7

component of information systems. The process element in information systems will be discussed in Chapter 8.

The Role of Information Systems You should now understand that information systems have a number of vital components, some tangible, others intangible, and still others of a personnel nature. These components collect, store, organize, and distribute data throughout the organization. You may have even realized that one of the roles of information systems is to take data and turn it into information, and then transform that information into organizational knowledge. As technology has developed, this role has evolved into the backbone of the organization, making information systems integral to virtually every business. The integration of information systems into organizations has progressed over the decades.

The Mainframe Era From the late 1950s through the 1960s, computers were seen as

a way to more efficiently do calculations. These first

business computers were room- sized monsters, with several machines linked together. The primary work was to organize and store large volumes of

information that were tedious to manage by hand. Only large businesses, universities, and government agencies could afford them, and they took a crew of specialized personnel and dedicated facilities to provide information to organizations.

Time-sharing allowed dozens or even hundreds of users to

IBM 704 Mainframe (Copyright: Lawrence Livermore National Laboratory)

Information Systems for Business and Beyond (2019) pg. 8

- - -- - -- - - - -- - -- ---- - - ---- - --- - -

simultaneously access mainframe computers from locations in the same building or miles away. Typical functions included scientific calculations and accounting, all under the broader umbrella of “data processing.”

Registered trademark of International Business Machines

In the late 1960s, Manufacturing Resources Planning (MRP) systems were introduced. This software, running on a mainframe computer, gave companies the ability to manage the

manufacturing process, making it more efficient. From tracking inventory to creating bills of materials to scheduling production, the MRP systems gave more businesses a reason to integrate computing into their processes. IBM became the dominant mainframe company. Continued improvement in software and the availability of cheaper hardware eventually brought mainframe computers (and their little sibling, the minicomputer) into most large businesses.

Today you probably think of Silicon Valley in northern California as the center of computing and technology. But in the days of the mainframe’s dominance corporations in the cities of Minneapolis and St. Paul produced most computers. The advent of the personal computer resulted in the “center of technology” eventually moving to Silicon Valley.

The PC Revolution In 1975, the first microcomputer was announced on the cover of Popular Mechanics: the Altair 8800. Its immediate popularity

Information Systems for Business and Beyond (2019) pg. 9

sparked the imagination of entrepreneurs everywhere, and there were soon dozens of companies manufacturing these “personal computers.” Though at first just a niche product for computer hobbyists, improvements in usability and the availability of practical software led to growing sales. The most prominent of these early personal computer makers was a little company known as Apple Computer, headed by Steve Jobs and Steve Wozniak, with the hugely successful “Apple II.” Not wanting to be left out of the revolution, in 1981 IBM teamed with Microsoft, then just a startup company, for their operating system software and hurriedly released their own version of the personal computer simply called the “PC.” Small businesses finally had affordable computing that could provide them with needed information systems. Popularity of the IBM PC gave legitimacy to the microcomputer and it was named Time magazine’s “Man of the Year” for 1982.

IBM PC

Because of the IBM PC’s open architecture, it was easy for other companies to copy, or “clone” it. During the 1980s, many new computer companies sprang up, offering less expensive versions of the PC. This drove prices down and spurred innovation. Microsoft developed the Windows operating system, with version 3.1 in 1992 becoming the first commercially successful release. Typical uses for the PC during this period included word processing, spreadsheets, and databases. These early PCs were standalone machines, not connected to a network.

Information Systems for Business and Beyond (2019) pg. 10

Client-Server In the mid-1980s, businesses began to see the need to connect

their computers as a way to collaborate and share resources. Known as “client-server,” this networking architecture allowed users to log in to the Local Area Network (LAN) from their PC (the “client”) by connecting to a central computer called a “server.” The server would lookup permissions for each user to determine who had access to various resources such as printers and files. Software companies began developing applications that allowed multiple users to access the same data at the same time. This evolved into software applications for communicating, with the first popular use of electronic mail appearing at this time.

Registered Trademark of SAP

This networking and data sharing all stayed mainly within the confines of each business. Sharing of electronic data between companies was a very specialized function.

Computers were now seen as tools to collaborate internally within an organization. These networks of computers were becoming so powerful that they were replacing many of the functions previously performed by the larger mainframe computers at a fraction of the cost. It was during this era that the first Enterprise Resource Planning (ERP) systems were developed and run on the client- server architecture. An ERP system is an application with a centralized database that can be used to run a company’s entire business. With separate modules for accounting, finance, inventory, human resources, and many more, ERP systems, with Germany’s SAP leading the way, represented the state of the art in information systems integration. ERP systems will be discussed in Chapter 9.

Information Systems for Business and Beyond (2019) pg. 11

The Internet, World Wide Web and E-Commerce

The first long distance transmission between two computers occurred on October 29, 1969 when developers under the direction of Dr. Leonard Kleinrock sent the word “login” from the campus of UCLA to Stanford Research Institute in Menlo Park, California, a distance of over 350 miles. The United States Department of Defense created and funded ARPA Net (Advanced Research Projects Administration), an experimental network which eventually became known as the Internet. ARPA Net began with just four nodes or sites, a very humble start for today’s Internet.

ARPA Net, 1969

Initially, the Internet was confined to use by universities, government agencies, and researchers. Users were required to type commands (today we refer to this as “command line”) in order to communicate and transfer files. The first e-mail messages on the Internet were sent in the early 1970s as a few very large companies expanded from local networks to the Internet. The computer was now evolving from a purely computational device into the world of digital communications. In 1989, Tim Berners-Lee developed a simpler way for researchers to share information over the Internet,

Information Systems for Business and Beyond (2019) pg. 12

~

a concept he called the World Wide Web.4 This invention became the catalyst for the growth of the Internet as a way for businesses to share information about themselves. As web browsers and Internet connections became the norm, companies rushed to grab domain names and create websites.

Registered trademark of Amazon.com, Inc.

In 1991 the National Science Foundation, which governed how the Internet was used, lifted restrictions on its commercial use. Corporations soon realized the huge potential of a digital marketplace on the Internet and in 1994 both eBay and Amazon were founded. A mad rush of investment in Internet-based businesses led to the dot-com boom through the late 1990s, and then the dot-com bust in 2000. The bust occurred as investors, tired of seeing hundreds of companies reporting losses, abandoned their investments. An important outcome for businesses was that thousands of miles of Internet connections, in the form of fiber optic cable, were laid around the world during that time. The world became truly “wired” heading into the new millennium, ushering in the era of globalization, which will be discussed in Chapter 11. This TED Talk video focuses on connecting Africa to the Internet through undersea fibre optic cable.

The digital world also became a more dangerous place as virtually all companies connected to the Internet. Computer viruses and worms, once slowly propagated through the sharing of computer disks, could now grow with tremendous speed via the Internet. Software and operating systems written for a standalone world found it very difficult to defend against these sorts of threats. A whole new industry of computer and Internet security arose. Information security will be discussed in Chapter 6.

Information Systems for Business and Beyond (2019) pg. 13

https://www.ted.com/talks/andrew_blum_what_is_the_internet_really
https://www.ted.com/talks/andrew_blum_what_is_the_internet_really
http:Amazon.com
http:amazon.com
Web 2.0 As the world recovered from the dot-com bust, the use of technology in business continued to evolve at a frantic pace. Websites became interactive. Instead of just visiting a site to find out about a business and then purchase its products, customers wanted to be able to customize their experience and interact online with the business. This new type of interactive website, where you did not have to know how to create a web page or do any programming in order to put information online, became known as Web 2.0. This new stage of the Web was exemplified by blogging, social networking, and interactive comments being available on many websites. The new Web 2.0 world, in which online interaction became expected, had a major impact on many businesses and even whole industries. Many bookstores found themselves relegated to a niche status. Video rental chains and travel agencies simply began going out of business as they were replaced by online technologies. The newspaper industry saw a huge drop in circulation with some cities such as New Orleans no longer able to support a daily newspaper.

Disintermediation is the process of technology replacing a middleman in a transaction. Web 2.0 allowed users to get information and news online, reducing dependence of physical books and newspapers.

As the world became more connected, new questions arose. Should access to the Internet be considered a right? Is it legal to copy a song that had been downloaded from the Internet? Can information entered into a website be kept private? What information is acceptable to collect from children? Technology moved so fast that policymakers did not have enough time to enact appropriate laws. Ethical issues surrounding information systems will be covered in Chapter 12.

Information Systems for Business and Beyond (2019) pg. 14

-

The Post-PC World, Sort of Ray Ozzie, a technology visionary at Microsoft, stated in

2012 that computing was moving into a phase he called the post-

PC world.5 Now six years later that prediction has not stood up very well to reality. As you will read in Chapter 13, PC sales have dropped slightly in recent years while there has been a precipitous decline in tablet sales. Smartphone sales have accelerated, due largely to their mobility and ease of operation. Just as the mainframe before it, the PC will continue to play a key role in business, but its role will be somewhat diminished as people emphasize mobility as a central feature of technology. Cloud computing provides users with mobile access to data and applications, making the PC more of a part of the communications channel rather than a repository of programs and information. Innovation in the development of technology and communications will continue to move businesses forward.

Information Systems for Business and Beyond (2019) pg. 15

Eras of Business Computing

Era Hardware Operating System Applications

Mainframe (1970s)

Terminals connected to mainframe computer Time-sharing (TSO) on

Multiple Virtual Storage (MVS)

Custom-written MRP software

PC (mid-1980s)

IBM PC or compatible.

Sometimes connected to mainframe computer via

network interface card.

MS-DOS WordPerfect, Lotus 1-2-3

Client-Server (late 80s to early 90s)

IBM PC “clone” on a Novell Network.

Windows for Workgroups

Microsoft Word, Microsoft Excel

World Wide Web (mid-90s to early 2000s)

IBM PC “clone” connected to company intranet.

Windows XP Microsoft Office, Internet Explorer

Web 2.0 (mid-2000s – present)

Laptop connected to company Wi-Fi.

Windows 10 Microsoft

Office

Post-PC (today and beyond)

Smartphones Android, iOS Mobile-friendly websites, mobile apps

Can Information Systems Bring Competitive Advantage?

It has always been the assumption that the implementation of information systems will bring a business competitive advantage. If installing one computer to manage inventory can make a company more efficient, then it can be expected that

Information Systems for Business and Beyond (2019) pg. 16

~:~

installing several computers can improve business processes and efficiency. In 2003, Nicholas Carr wrote an article in the Harvard Business Review that questioned this assumption. Entitled “I.T. Doesn’t Matter.” Carr was concerned that information technology had become just a commodity. Instead of viewing technology as an investment that will make a company stand out, Carr said technology would become as common as electricity – something to be managed to reduce costs, ensure that it is always running, and be as risk-free as possible.

The article was both hailed and scorned. Can I.T. bring a competitive advantage to an organization? It sure did for Walmart (see sidebar). Technology and competitive advantage will be discussed in Chapter 7.

Sidebar: Walmart Uses Information Systems to Become the World’s Leading Retailer

Registered Trademark of Walmart, Inc.

Walmart is the world’s largest retailer, earning 8.1 billion for the fiscal year that ended on January 31, 2018. Walmart currently serves over 260 million customers every week worldwide through

its 11,700 stores in 28 countries.6In 2018 Fortune magazine for the sixth straight year ranked Walmart the number one company for annual revenue as they again exceeded $500 billion in annual sales. The next closest company, Exxon, had less than half of

Walmart’s total revenue.7 Walmart’s rise to prominence is due in large part to making information systems a high priority, especially in their Supply Chain Management (SCM) system

Information Systems for Business and Beyond (2019) pg. 17

known as Retail Linking $14.3 billion on sales of $30.

This system, unique when initially implemented in the mid-1980s, allowed Walmart’s suppliers to directly access the inventory levels and sales information of their products at any of Walmart’s more than eleven thousand stores. Using Retail Link, suppliers can analyze how well their products are selling at one or more Walmart stores with a range of reporting options. Further, Walmart requires the suppliers to use Retail Link to manage their own inventory levels. If a supplier feels that their products are selling out too quickly, they can use Retail Link to petition Walmart to raise the inventory levels for their products. This has essentially allowed Walmart to “hire” thousands of product managers, all of whom have a vested interest in the products they are managing. This revolutionary approach to managing inventory has allowed Walmart to continue to drive prices down and respond to market forces quickly.

Today Walmart continues to innovate with information technology. Using its tremendous market presence, any technology that Walmart requires its suppliers to implement immediately becomes a business standard. For example, in 1983 Walmart became the first large retailer to require suppliers to the use Uniform Product Code (UPC) labels on all products. Clearly, Walmart has learned how to use I.T. to gain a competitive advantage.

Summary In this chapter you have been introduced to the concept of information systems. Several definitions focused on the main

components: technology, people, and process. You how the business use of information systems has evolved over the years, from the use of large mainframe computers for number crunching,

Information Systems for Business and Beyond (2019) pg. 18

through the introduction of the PC and networks, all the way to the era of mobile computing. During each of these phases, new innovations in software and technology allowed businesses to integrate technology more deeply into their organizations.

Virtually every company uses information systems which leads to the question: Does information systems bring a competitive advantage? In the final analysis the goal of this book is to help you understand the importance of information systems in making an organization more competitive. Your challenge is to understand the key components of an information system and how it can be used to bring a competitive advantage to every organization you will serve in your career.

Study Questions 1. What are the five major components that make up an

information system?

2. List the three examples of information system hardware?

3. Microsoft Windows is an example of which component of information systems?

4. What is application software?

5. What roles do people play in information systems?

6. What is the definition of a process?

7. What was invented first, the personal computer or the Internet?

8. In what year were restrictions on commercial use of the Internet first lifted?

9. What is Carr’s main argument about information technology?

Exercises 1. Suppose that you had to explain to a friend the concept of an

information system. How would you define it? Write a one- paragraph description in your own words that you feel would

Information Systems for Business and Beyond (2019) pg. 19

best describe an information system to your friends or family.

2. Of the five primary components of an information system (hardware, software, data, people, process), which do you think is the most important to the success of a business organization? Write a one-paragraph answer to this question that includes an example from your personal experience to support your answer.

3. Everyone interacts with various information systems every day: at the grocery store, at work, at school, even in our cars. Make a list of the different information systems you interact with daily. Can you identify the technologies, people, and processes involved in making these systems work?

4. Do you agree that we are in a post-PC stage in the evolution of information systems? Do some original research and cite it as you make your prediction about what business computing will look like in the next generation.

5. The Walmart sidebar introduced you to how information systems was used to make them the world’s leading retailer. Walmart has continued to innovate and is still looked to as a leader in the use of technology. Do some original research and write a one-page report detailing a new technology that Walmart has recently implemented or is pioneering.

Labs 1. Examine your PC. Using a four-column table format identify

and record the following information: 1st column: Program name, 2nd column: software manufacturer, 3rd column: software version, 4th column: software type (editor/word processor, spreadsheet, database, etc.).

2. Examine your mobile phone. Create another four-column table similar to the one in Lab #1. This time identify the apps, then record the requested information.

3. In this chapter you read about the evolution of computing

Information Systems for Business and Beyond (2019) pg. 20

from mainframe computers to PCs and on to smartphones. Create a four-column table and record the following information about your own electronic devices: 1st column – Type: PC or smartphone, 2nd column – Operating system including version, 3rd column – Storage capacity, 4th column – Storage available.

1. Laudon, K.C. and Laudon, J. P. (2014) Management Information Systems, thirteenth edition. Upper Saddle River, New Jersey: Pearson.

2. Valacich, J. and Schneider, C. (2010). Information Systems Today– Managing in the Digital World, fourth edition. Upper Saddle River, New Jersey: Prentice-Hall.

3. Laudon, K.C. and Laudon, J. P. (2012). Management Information Systems, twelfth edition. Upper Saddle River, New Jersey: Prentice-Hall.

4. CERN. (n.d.) The Birth of the Web. Retrieved from

http://public.web.cern.ch/public/en/about/web- en.html

5. Marquis, J. (2012, July 16) What is the Post-PC World? Online Universities.com. Retrieved from https://www.onlineuniversities.com/blog/2012/07/what-post- pc-world/

6. Walmart (n.d.) 2017 Annual Report. Retrieved fromhttps://stock.walmart.com/investors/financial- information/annual-reports-and-proxies/default.aspx

7. McCoy, K. (2018, May 21). Big Winners in Fortune 500 List. USA Today. Retrieved from https://www.usatoday.com/story/money/2018/05/21/big- winners-fortune-500-list-walmart-exxon-mobil- amazon/628003002/

Information Systems for Business and Beyond (2019) pg. 21

http://public.web.cern.ch/public/en/about/web-
https://www.onlineuniversities.com/blog/2012/07/what-post-pc-world/
https://www.onlineuniversities.com/blog/2012/07/what-post-pc-world/
https://stock.walmart.com/investors/financial-information/annual-reports-and-proxies/default.aspx
https://stock.walmart.com/investors/financial-information/annual-reports-and-proxies/default.aspx
https://www.usatoday.com/story/money/2018/05/21/big-winners-fortune-500-list-walmart-exxon-mobil-amazon/628003002/
https://www.usatoday.com/story/money/2018/05/21/big-winners-fortune-500-list-walmart-exxon-mobil-amazon/628003002/
https://www.usatoday.com/story/money/2018/05/21/big-winners-fortune-500-list-walmart-exxon-mobil-amazon/628003002/
http:Universities.com
Chapter 2: Hardware

Upon successful completion of this chapter, you

will be able to:

• Describe information systemshardware;

• Identify the primary components of a computer and the functions they perform; and

• Explain the effect of the commoditization of the personal computer.

Introduction As you learned in the first chapter, an information system is made up of five components: hardware, software, data, people, and process. The physical parts of computing devices – those that you can actually touch – are referred to as hardware. In this chapter, you will take a look at this component of information systems, learn a little bit about how it works, and discuss some of the current trends surrounding it.

As stated above, computer hardware encompasses digital devices that you can physically touch. This includes devices such as the following:

• desktop computers

• laptop computers

• mobile phones

• tablet computers

• e-readers Information Systems for Business and Beyond (2019) pg. 22

• storage devices, such as flash drives

• input devices, such as keyboards, mice, and scanners

• output devices such as printers and speakers.

Besides these more traditional computer hardware devices, many items that were once not considered digital devices are now becoming computerized themselves. Digital technologies are being integrated into many everyday objects so the days of a device being labeled categorically as computer hardware may be ending. Examples of these types of digital devices include automobiles, refrigerators, and even beverage dispensers. In this chapter, you will also explore digital devices, beginning with defining what is meant by the term itself.

Digital Devices A digital device processes electronic signals into discrete values,

of which there can be two or more. In comparison analog signals are continuous and can be represented by a smooth wave pattern. You might think of digital (discrete) as being the opposite of analog.

Many electronic devices process signals into two discrete values, typically known as binary. These values are represented as either a one (“on”) or a zero (“off”). It is commonly accepted to refer to the on state as representing the presence of an electronic signal. It then follows that the off state is represented by the absence of an electronic signal. Note: Technically, the voltages in a system are evaluated with high voltages converted into a one or on state and low voltages converted into a zero or off state.

Each one or zero is referred to as a bit (a blending of the two words “binary” and “digit”). A group of eight bits is known as a byte. The first personal computers could process 8 bits of data at once. The number of bits that can be processed by a computer’s processor at one time is known as word size. Today’s PCs can process 64 bits of data at a time which is where the term 64-bit processor comes from.

Information Systems for Business and Beyond (2019) pg. 23

http://www.ford.com/technology/sync
http://www.npr.org/blogs/thesalt/2012/05/03/151968878/the-smart-fridge-finds-the-lost-lettuce-for-a-price
http://www.coca-colafreestyle.com/
You are most likely using a computer with a 64-bit processor.

Sidebar: Understanding Binary The numbering system you first learned was Base 10 also known as Decimal. In Base 10 each column in the number represents a power of 10 with the exponent increasing in each column as you move to the left, as shown in the table:

Thousands Hundreds Tens Units

103 102 101 100

The rightmost column represents units or the values zero through nine. The next column from the left represents tens or the values teens, twenties, thirties, etc., followed by the hundred’s column (one hundred, two hundred, etc.), then the thousands column (one thousand, two thousand) etc. Expanding the table above, you can write the number 3456 as follows:

Thousands Hundreds Tens Units

103 102 101 100

3 4 5 6

3000 400 50 6

Computers use the Base 2 numbering system. Similar to Base 10, each column has a Base of 2 and has an increasing exponent value moving to the left as shown in the table below:

Two cubed Two Two Units squared

23 22 21 20

Information Systems for Business and Beyond (2019) pg. 24

The rightmost column represents 20 or units (1). The next column from the left represents 21 twos or (2). The third column represents 22 or (4) and the fourth column represents 23 or (8). Expanding the table above, you can see how the decimal number 15 is converted to 1111 in binary as follows:

Two cubed Two Two Units squared

23 22 21 20

1 1 1 1

8 4 2 1

8 + 4 + 2 + 1 = 15

Understanding binary is important because it helps us understand how computers store and transmit data. A “bit” is the lowest level of data storage, stored as either a one or a zero. If a computer wants to communicate the number 15, it would need to send 1111 in binary (as shown above). This is four bits of data since four digits are needed. A “byte” is 8 bits. If a computer wanted to transmit the number 15 in a byte, it would send 00001111. The highest number that can be sent in a byte is 255, which is 11111111, which is equal to 27 + 26 + 25 + 24 + 23 + 22 + 21 + 20 .

As the capacities of digital devices grew, new terms were developed to identify the capacities of processors, memory, and disk storage space. Prefixes were applied to the word byte to represent different orders of magnitude. Since these are digital specifications, the prefixes were originally meant to represent multiples of 1024 (which is 210), but have more recently been rounded for the sake of simplicity to mean multiples of 1000, as shown in the table below:

Information Systems for Business and Beyond (2019) pg. 25

Prefix Represents Example

kilo one thousand kilobyte=one

thousand bytes

mega one million megabyte = one million bytes

giga one billion gigabyte = one billion bytes

tera one trillion terabyte = one trillion bytes

peta one quadrillion petabyte = one

quadrillion bytes

exa one quintillion exabyte = one

quintillion bytes

zetta one sextillion zettabyte = one sextillion bytes

yotta one septillion yottabyte = one septillion bytes

Tour of a PC All personal computers consist of the same basic

components: A Central Processing Unit (CPU), memory, circuit board, storage, and input/output devices. Almost every digital device uses the same set of components, so examining the personal computer will give you insight into the structure of a variety of digital devices. Here’s a “tour” of a personal computer.

Processing Data: The CPU The core of a computer is the Central Processing Unit, or CPU.

It can be thought of as the “brains” of the device. The CPU carries out the commands sent to it by the software and returns results to be acted upon.

Information Systems for Business and Beyond (2019) pg. 26

Intel Core i7 CPU

The earliest CPUs were large circuit boards with limited functionality. Today, a CPU can perform a large variety of functions. There are two primary manufacturers of CPUs for personal computers: Intel and

Advanced Micro Devices (AMD).

The speed (“clock time”) of a CPU is measured in hertz. A hertz is defined as one cycle per second. A kilohertz (abbreviated kHz) is one thousand cycles per second, a megahertz (mHz) is one million cycles per second, and a gigahertz (gHz) is one billion cycles per second. The CPU’s processing power is increasing at an amazing rate (see the sidebar about Moore’s Law).

Besides a faster clock time, today’s CPU chips contain multiple processors. These chips, known as dual-core (two processors) or quad-core (four processors), increase the processing power of a computer by providing the capability of multiple CPUs all sharing the processing load. Intel’s Core i7 processors contain 6 cores and their Core i9 processors contain 16 cores. This video shows how a CPU works.

Sidebar: Moore’s Law and Huang’s Law

As you know computers get faster every year. Many times, we are not sure if we want to buy today’s model because next week it won’t be the most advanced any more. Gordon Moore, one of the founders of Intel, recognized this phenomenon in 1965, noting that microprocessor transistor counts had been

Information Systems for Business and Beyond (2019) pg. 27

https://www.youtube.com/watch?v=cNN_tTXABUA
doubling every year.1 His insight eventually evolved into Moore’s Law:

The number of integrated circuits on a chip doubles every two years.

Moore’s Law has been generalized into the concept that computing power will double every two years for the same price point. Another way of looking at this is to think that the price for the same computing power will be cut in half every two years. Moore’s Law has held true for over forty years (see figure below).

The limits of Moore’s Law are now being reached and circuits cannot be reduced further. However, Huang’s Law regarding Graphics Processors Units (GPUs) may extend well into the future. Nvidia’s CEO Jensen Huang spoke at the GPU Technology Conference in March 2018 announcing that the speed of GPUs is increasing faster than Moore’s Law. Nvidia’s GPUs are 25 times faster than five years ago. He admitted that the advancement is because of advances in architecture, memory

technology, algorithms, and interconnects.2

Motherboard The motherboard is the main circuit board on the computer. The CPU, memory, and storage components, among other things, all connect into the motherboard. Motherboards come in different shapes and sizes, depending upon

how compact or expandable the computer is designed to be. Most modern motherboards have many Motherboard bus traces integrated components, such as network interface card, video, and

Information Systems for Business and Beyond (2019) pg. 28

Motherboard

https://spectrum.ieee.org/view-from-the-valley/computing/hardware/move-over-moores-law-make-way-for-huangs-law
sound processing, which previously required separate components.

The motherboard provides much of the bus of the computer (the term bus refers to the electrical connections between different computer components). The bus is an important factor in determining the computer’s speed – the combination of how fast the bus can transfer data and the number of data bits that can be moved at one time determine the speed. The traces shown in the image are on the underside of the motherboard and provide connections between motherboard components.

Random-Access Memory When a computer boots, it begins to load information on from storage into its working memory. This working memory, called Random- Access Memory (RAM), can transfer data much faster than the hard disk. Any program that you are running on the computer is loaded into RAM for processing. In order for a computer to work effectively, some minimal amount of RAM must be installed. In most cases, adding more RAM will allow the computer to run faster. Another characteristic of RAM is that it is “volatile.” This means that it can store data as long as it is receiving power. When the computer is turned off, any data stored in RAM is lost.

of a Double Data Rate (DDR) memory module. The type of DDR accepted into a computer

DDR4 Memory is dependent upon the motherboard. There have been basically four generations of DDR: DDR1, DDR2, DDR3, and DDR4. Each generation runs faster than the previous with DDR4 capable of speeds twice as fast as DDR3 while consuming less voltage.

Hard Disk

RAM is generally installed in a personal computer through the use

While the RAM is used as working memory, the computer also

Information Systems for Business and Beyond (2019) pg. 29

https://www.kingston.com/us/memory/ddr4
needs a place to store data for the longer term. Most of today’s personal computers use a hard disk for long-term data storage. A hard disk is considered non-volatile storage because when the computer is turned off the data remains in storage on the disk, ready for when the computer is turned on.

Drives with a capacity less than 1 Terabyte usually have just one platter. Notice the single platter in the image. The read/write arm must be positioned over the appropriate track before accessing or writing data.

Solid State Drives Solid State Drives (SSD) are becoming more popular in personal computers. The SSD performs the same function as a hard disk, namely long-term storage. Instead of spinning disks, the SSD uses flash memory that incorporates EEPROM (Electrically Erasable Programmable Read Only Memory) chips, which is much faster.

Solid-state drives are currently a bit more expensive than hard disks. However, the use of flash memory instead of disks makes them much lighter and faster than hard disks. SSDs

are primarily utilized in portable computers, making them lighter, more durable, and more efficient

Some computers combine the two storage technologies, using the SSD for the most accessed data (such as the operating system) while using the hard disk for data that is accessed less frequently. SSDs are considered more reliable since there are no moving parts.

Information Systems for Business and Beyond (2019) pg. 30

Removable Media

USB Drive

Removable storage has changed greatly over the four decades of PCs. Floppy disks have been replaced by CD-ROM drives, then they were replaced by USB (Universal Serial Bus) drives. USB drives are now standard on all PCs with capacities approaching 512 gigabytes. Speeds have also increased from 480 Megabits in USB 2.0 to 10 Gigabits in USB 3.1. USB devices also use EEPROM

technology.3

Network Connection When personal computers were first stand-alone units when first developed, which meant that data was brought into the computer or removed from the computer via removable media. Beginning in the mid-1980s, however, organizations began to see the value in connecting computers together via a digital network. Because of this, personal computers needed the ability to connect to these networks. Initially, this was done by adding an expansion card to the computer that enabled the network connection. These cards were known as Network Interface Cards (NIC). By the mid- 1990s an Ethernet network port was built into the motherboard on most personal computers. As wireless technologies began to dominate in the early 2000s, many personal computers also began including wireless networking capabilities. Digital communication technologies will be discussed further in Chapter 5.

Information Systems for Business and Beyond (2019) pg. 31

Input and Output In order for a personal computer to be useful, it must have

channels for receiving input from the user and channels for delivering output to the user. These input and output devices connect to the computer via various connection ports, which

generally, are part of the motherboard and are accessible outside the computer case. In early personal computers, specific ports were designed for each type of output device. The configuration of these ports

has evolved over the years, becoming more and more standardized over time. Today, almost all devices plug into a computer through the use of a USB port. This port type, first introduced in 1996, has increased in its capabilities, both in its data transfer rate and power supplied.

Bluetooth

Besides USB, some input and output devices connect to the computer via a wireless-technology standard called Bluetooth which was invented in 1994. Bluetooth exchanges data over short distances of 10 meters up to 100 meters using radio waves. Two devices communicating with Bluetooth must both have a Bluetooth communication chip installed. Bluetooth devices include pairing your phone to your car, computer keyboards, speakers, headsets, and home security, to name just a few.

Input Devices

All personal computers need components that allow the user

Information Systems for Business and Beyond (2019) pg. 32

to input data. Early computers simply used a keyboard for entering data or select an item from a menu to run a program. With the advent operating systems offering the graphical user interface, the mouse became a standard component of a computer. These two components are still the primary input devices to a personal computer, though variations of each have been introduced with varying levels of success over the years. For example, many new devices now use a touch screen as the primary way of data entry.

Other input devices include scanners which allow users to input documents into a computer either as images or as text. Microphones can be used to record audio or give voice commands. Webcams and other types of video cameras can be used to record video or participate in a video chat session.

Output Devices

Output devices are essential as well. The most obvious output device is a display or monitor, visually representing the state of the computer. In some cases, a personal computer can support multiple displays or be connected to larger-format displays such as a projector or large-screen television. Other output devices include speakers for audio output and printers for hardcopy output.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Instant Homework Helper
Instant Assignment Writer
Top Grade Tutor
Math Exam Success
Top Academic Guru
Chartered Accountant
Writer Writer Name Offer Chat
Instant Homework Helper

ONLINE

Instant Homework Helper

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$18 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$36 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$46 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$26 Chat With Writer
Top Academic Guru

ONLINE

Top Academic Guru

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$25 Chat With Writer
Chartered Accountant

ONLINE

Chartered Accountant

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Onuf world of our making - Cie mark scheme abbreviations - Measurement of an equilibrium constant lab report - I wandered lonely as a cloud analysis - Matlab state space simulation - Boy overboard book review - Pacific wildcat resources corp - Building on strengths - Week # 9 Discussion NURSING LEADERSHIP & MANAGEMENT - Citadel art history definition - Australian citizenship form 119 - Training Needs Analysis - Kollmorgen akd workbench download - Should we celebrate the voyages of zheng he pdf - Larson and gray project management 7th edition - Z for zachariah study guide answers - Morehead cain scholarship essays - Chemical compound of cement - The 2018 human resources trends to keep on your radar - Iom future of nursing recommendations - Employee Retention Plan- PPT 5 Slides with 100 words in Note section of each slide - In regression analysis the residuals represent the - Discuss ways nursing practice is modified based on the research findings. Provide an example from the literature on either a qualitative or quantitative study that has implications for clinical practice - Adam liaw san choy bau - Writing strategies for pre-emergent ells - Capital structure decision - Human Resource Mang. (for tutorjass) - 2014 hsc physics solutions - What device is used to create a physical star topology - Service marketing questions and answers - Chapter 1 giver summary - Arnold prank calls drunk guy - Jem to kill a mockingbird character traits - Insurance expires at the rate of 450 per month - Paralleling technique vs bisecting technique - Sf 49ers ticket exchange - Economic Challenge - What is the total mass of c3h8 - Week 5 Discussion Question - Www eastanglianairambulance org uk - A green disc found in palisade cells - Advantages of assertive communication - What is case mix index used for - Lord of the flies excerpt - Poe shock and horror - Dalton inc. produces and sells three products. unit data concerning each product is shown below. - First poem for you kim addonizio analysis - Marketing - Monty python and the holy grail latin - Why do some executives refuse to function as project sponsors? - How to read literature like a professor chapter 14 summary - Should cellphones be allowed in school - Should self driving cars replace human drivers argument essay - 23 candlewick drive brockport ny - Personal and professional growth in nursing - Four page essay - Association of massage therapists ltd - For all work solver - Mind tools customer service - Stanley tookie williams documentary - Article Analysis,please add references and follow the template that I uploaded by 10/21/2020 at 4: 00 pm - Florida board of cosmetology - ENC 1101 - Specific heat capacity of sugar solution - Ephesians 5 33 nkjv - Disorders of testis, scrotum, and epididymis. - 81 bus to slough - How to find selling expense on traditional income statement - Personal philosophy of nursing paper - Discussion on accounting - How to find outliers in jmp - Organizational Behavior: Rewards and Recognitions - Achenbach system of empirically based assessment - Polygroup pool filter setup - Discuss the marketing process - Ken daly net worth - Difference between a parallelogram and a trapezoid - Chiang and wainwright mathematical economics - Is uber a public limited company - ECON Forum Replies - Foreign direct investment ireland 2016 - Vertebrates and invertebrates lesson - Nominative and objective case - Gable roof carport attached to house - Nyx medical billing company in bangalore - Do you think everyone uses gantt charts properly - DP 8 - Marble company purchased a machine costing - Coca cola inputs transformation process and outputs - Week 5 - How old is earnest pugh - T accounts debits & credits reading quiz - Six step decision making process - Definition of malevolent phantom - Onomatopoeia examples in the tell tale heart - Cloud infrastructure architecture case study - The market is strong-form inefficient when - Land registry form djp - What should costa vida's compensation strategy look like - Bluecoat proxy technical interview questions