http://cur.cursors-4u.net/cursors/images11/cur1058.gif

Wednesday, 26 October 2016

MIA


1.      Apple iphone
-        Safari: This is the built-in web browser that has come with all iphone OSes.
-        Itunes: to organize and enjoy the music, movies, and TV shows you already have — and shop for the ones you want to get.
-        Appstores: provide a specific set of functions which, by definition, do not include the running of the computer itself.
-        Imessage: Use Messages to send and receive texts, photos, videos, personalized effects, and more — all on your iPhone, iPad, iPod touch, Apple Watch, and Mac.
-        Find iphone: an app and service provided by Apple Inc. that allows remote location-tracking of iOS devices and Mac computers
-        Facetime: FaceTime is a proprietary videotelephony product developed by Apple Inc.
2.      Blackberry
-        BlackBerry Messenger: BlackBerry Messenger, also known as BBM, is a proprietary Internet-based instant messenger and videotelephony application included on BlackBerry devices that allows messaging and voice calls between BlackBerry, iOS, Android, and Windows Mobile users
-        Blackberry operating system: The operating system provides multitasking and supports specialized input devices that have been adopted by BlackBerry for use in its handhelds, particularly the trackwheel, trackball, and most recently, the trackpad and touchscreen.
3.      Samsung
-        Playstore: Google Play is a digital distribution service, including a digital media store, the Google Play Store (originally the Android Market), operated and developed by Google
-        Galaxy Apps: Samsung Galaxy Apps, formerly known and in feature phones as Samsung Apps is an app store used for devices manufactured by Samsung Electronics that was launched in September 2009
-        Play music: Google Play Music is a music streaming service and online music locker operated by Google
-        Android operating system: Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets

Business apps
1.      Evernote
Evernote is a cross-platform, freemium app designed for note taking, organizing, and archiving. It is developed by the Evernote Corporation, a private company headquartered in Redwood City, California. The app allows users to create a "note" which can be a piece of formatted text, a full webpage or webpage excerpt, a photograph, a voice memo, or a handwritten "ink" note.

2.      Trello
This is the app for syncing notes across mobile and desktop devices. Evernote’s free version lets users upload up to 60 megabytes of data per month. The Plus version costs $34.99 per year but features monthly uploads of 1 gigabyte and allows you to access notes when you’re offline and save emails to the app.

3.      Polaris Office

Polaris Office is a reliable alternative to Apple’s iWork that lets you edit, create and sync Microsoft Office files from anywhere on your phone or device. The basic version is free, while the smart version costs $3.99 per month and the pro version costs $5.99 per month. The latest version of the app received a rating of four out of five stars on Google Play and was named 2015’s best app by the site.

Unit 7 Learning Outcome 3: Discuss the advantages and disadvantages of open source technology.

ADVANTAGES OF OPEN SOURCE
1. It’s generally free – it has been estimated that open source software collectively saves businesses $60 billion a year. These days for virtually every paid for proprietary software system you will find an open source version.
2. It’s continually evolving in real time as developers add to it and modify it, which means it can be better quality and more secure and less prone to bugs than proprietary systems, because it has so many users poring over it and weeding out problems.
3. Using open source software also means you are not locked in to using a particular vendor’s system that only work with their other systems.
4. You can modify and adapt open source software for your own business requirements, something that is not possible with proprietary systems.
5. Created by skillful and talented people.  Large and well-established software companies have the financial capability to hire the best talent in the business to create their products. Because of this, many people opt to buy computer programs from these firms because they think they’ll get great value for their money by doing so.

DISADVANTAGES OF OPEN SOURCE
1. Because there is no requirement to create a commercial product that will sell and generate money, open source software can tend to evolve more in line with developers’ wishes than the needs of the end user.
2. For the same reason, they can be less “user-friendly” and not as easy to use because less attention is paid to developing the user interface.
3. There may also be less support available for when things go wrong – open source software tends to rely on its community of users to respond to and fix problems.
4. Although the open source software itself is mostly free, there may still be some indirect costs involved, such as paying for external support.

5. Although having an open system means that there are many people identifying bugs and fixing them, it also means that malicious users can potentially view it and exploit any vulnerabilities.

Unit 7 Learning Outcome 2: Differentiate between proprietary and open source software

Open-source software
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development. The open-source model, or collaborative development from multiple independent sources, generates an increasingly more diverse scope of design perspective than any one company is capable of developing and sustaining long term

Proprietary software

Proprietary software is computer software for which the software's publisher or another person retains intellectual property rights usually copyright of the source code, but sometimes patent rights.

Unit 7 Learning Outcome 1: Describe the concept of open source technology

Open source technology is an often-misused term; too often, users often think open source is synonymous with free. With the relatively recent rise of the Internet’s influence on production and development of software, open source has become a popular vehicle to obtain widespread use and support of some very popular software titles. It has relationship with software such as the Linux operating system. Open source technology is defined as the production and development philosophy of allowing end users and developers to not only see the source code of software, but modify it as well. The Linux operating system is a one of the best-known examples of open source software technology. The Linux operating system’s open source paradigm is in direct contrast to Microsoft’s approach to development and production of its popular Windows operating system. Unlike Linux, Windows is built on a closed source paradigm that does not allow the end user the ability to see or edit the code that makes up the operating system. In fact, certain aspects of the end-user license for the Windows operating system specifically forbids the end user from attempting to view or modify the code that makes up the software. Such attempts are often known as reverse engineering or reverse compiling. 

Unit 7 Activity 3: Explain Linux Program


Unit 7 Activity 1: Name TWO Open Source Software

Look through the applications installed on your PC and identify TWO that are categorised as Open Source.
·          Google Chrome
Google Chrome is a freeware web browser developed by Google. It was first released in 2008, for Microsoft Windows, and was later ported to LinuxOS XiOS and Android. Google Chrome is also the main component of Chrome OS, where it serves a platform for running web apps. Google releases the majority of Chrome's source code as the Chromium open-source project. A notable component that is not open-source is the built-in Adobe Flash Player (that Chrome will start blocking later in 2016). Chrome used the WebKit layout engine until version 27. As of version 28, all Chrome ports except the iOS port use Blink, a fork of the WebKit engine. As of September 2016, StatCounter estimates that Google Chrome has a 62% worldwide usage share of web browsers as a desktop browser. It also has 50% market share across all platforms combined because it's also the most popular browser for smartphones. Its success has led to Google expanding the "Chrome" brand name on various other products such as ChromecastChromebookChromebit,Chromebox and Chromebase.

Mozilla Firefox


Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Firefox is available for WindowsmacOS and Linuxoperating systems, with its Firefox for Android available for Android (formerly Firefox for mobile, it also ran on the discontinued Firefox OS); where all of these versions use the Gecko layout engine to render web pages, which implements current and anticipated web standards. An additional version, Firefox for iOS, was released in late 2015, but this version doesn't use Gecko due to Apple's restrictions limiting third-party web browsers to the WebKit-based layout engine built into iOS. Firefox was created in 2002, under the name "Phoenix" by the Mozilla community members who wanted a standalone browser rather than the Mozilla Application Suite bundle. Even during its beta phase, Firefox proved to be popular with its testers and was praised for its speed, security, and add-ons compared to Microsoft's then-dominant Internet Explorer 6. Firefox was released in November 2004, and was highly successful with 60 million downloads within nine months, which was the first time that Internet Explorer's dominance was challenged. Firefox is considered the spiritual successor of Netscape Navigator, as the Mozilla community was created by Netscape in 1998 before their acquisition by AOL

Case study 4

It implies that the use of iPhones not only improved a particular sector of the organization but rather helped the organization to succeed as a whole since the complete process from collection of raw material to delivery of products was unmatched. D.W. Morgan's CEO stated that the use of iPhone in the business completely transformed their old techniques and methods with the sophisticated but simple-to-use which changed their working methodology in a positive way. His statement implies that the use of iPhone not only benefitted a particular domain or sector of the organization but completely revolutionized it as a whole. The certain task for which its rival took 20 minutes to 12 hours can be completed by the Morgan within no time. Thus it provided an opportunity for them also to enhance or change their techniques as well. This increase in the competition will improve the quality and the technology used which will definitely produce quality services and products. Thus the whole industry is revolutionized for a better tomorrow. As for D.W. Morgan, having operations in more than 85 countries, the use of iPhones helped a great deal to improve their just-in-time strategy with a better time management (up-to-the-minute information) of delivery trucks. Earlier the process of tracking the delivery trucks and then guiding them to the next location required a great deal of manual efforts and time but now all this was just the matter of few seconds. Also the information collection and updating process was digitalized with a date-stamp and time-stamp. This whole process kept the suppliers and the clients updated with the required information and helped D.W. Morgan to expand and make profits at a much faster pace.

Case study 3

      What business likely to be benefited by equpping their employee with mobile digital device such as Iphone, Ipad and BlackBerry?
    A number of business groups can be helped by the use of mobile digital services. Particularly those, which require dealing with a handsome amount of data and information and then using various tools and techniques to properly interpret the data, are likely to benefit with the use of these technologically advanced devices. Also the businesses which require a secure and efficient communication among the employees and clients are also likely to benefit by the use of iPhones, BlackBerrys and other similar devices. These digital phones provide a secure communication channel line which will verify the authentication of the organization's employees and clients accordingly. Even some dedicated services, tools and techniques can also be developed (if required) for the different organizations. The supply and chain management business firms are also likely to benefit with the use of these devices as time plays a major role in the profits and success of the organization. This business of delivery goods/ products will now be managed in an efficient delivery and tracking methodology. This can easily be supported by the use of certain applications (software) on these Smartphones. For example the use of Global Positioning System and Google maps can help an organization to develop an efficient system. The business firms which are located globally or have their services which require a great amount of travelling will also be benefitted with the use of these devices. This will provide the employees to communicate easily as they need not to have a laptop carrying with them for video chats and conferencing. Even if they are away from the office, they can easily be communicated without affecting the business activities. They can also analyze the collected data, graphs; charts etc. on their phones and then interpret the same. Then they can easily communicate their opinions / findings back to the concerned authorities without hampering any profit making opportunity. Thus the business involving sophisticated problem solving tools and techniques can also be benefited where every employee can apply all these tools easily on his own digital mobile device.




Case study 2

    Identify the problems that businesses in this case study solved by using mobile digital devices.
Owner of TCHO Chocolate, Timothy Childs developed an iPhone app that enables him to remotely log into each chocolate-making machine, control time and temperature, turn the machines on and off, and receive alerts about when to make temperature changes.The iPhone app also enables the owner to remotely view several video cameras that show how the TCHO Flavour Lab is doing. TCHO employees also use the iPhone to exchange photos, e-mail, and text messages.
To access email, contacts, documents, and electronic presentations, General Electric (GE) employees use the iPads. GE’s Mobile Centre of Excellence has developed dozens of iPhone and iPad applications, including industry-specific diagnostic and monitoring tools and business intelligence tools that help decision makers find patterns and trends in large volumes of data. The company’s Transformer Monitoring app helps manage gas turbine inventory and electronic transformers throughout the world, with the ability to zoom in from a global map to a specific transformer and read all of the key performance indicators. To let the service personnel monitor railway tracks and obtain diagnostic information on locomotives, a PDS Movement Planner app is launched.
A Roambi Visualizer app lets Dow Corning executives use their iPhone to quickly view and analyse real-time data from their core corporate system, including sales figures, trends, and projections. When Dow Corning rolls out XIAMETER Web sites across the globe, executives will be able to monitor what content is and isn’t being used whether they are home, travelling or at the office.
More than 1,200 Sunbelt Rental Company employees, including sales staff, field personnel, and executives, are equipped with iPhones to interact with contacts and stay abreast of calendar events. In addition to using iPhones for e-mail, scheduling, and contact management, Sunbelt deployed a custom application called Mobile SalesPro, which ties multiple systems and databases into a single package for the sales team. This application connects to the corporate point-of-sale system, inventory control and management system also the enterprise system which integrates data from many different business functions.

To enable users to stay connected to business and customer data in real time when they are away from the office, SAP has developed a Business One mobile application for the iPhone. The mobile application enables sales managers to receive alerts on specific events, such as deviations from approved discounts, while sales reps can retrieve and update customer records as well as manage their appointments in real time. Managers are also able to check inventory availability and access detailed information about products in stock.

Case study 1

1.     What kinds of applications are described here?
What business function do they support?
How do they improve operational efficiency and decision making?

The case study told us about the using of mobile phone also known as smartphone in a running a business.
Smartphone is functioning to use the e-mail and messaging to connect with everyone in the easiest way. For example, Blackberry but nowadays, Apple’s product such as iPhone and iPad has leading the technology of smartphone in running a business. Many apps has developed and produced. This enables a business to conduct more of work. Furthermore, they are enhancing good security system that cannot be access by third party easily.
There are many application are described in this case study.

Firstly, Transformers Monitoring App from General Electric company (GE). This app helps manage gas turbine inventory and electronic transformers throughout the world. Secondly, a PDS Movement Planner app lets service personnel monitor railway tracks and obtain diagnostic information on locomotives. Next, A Roambi Visualizer app lets Dow Corning executives use their iPhones to quickly view and analyze real-time data from their core corporate system, including sales figures, trends and projection. This show us that this app helps the managers with simple, intuitive dashboards of complex data hence helps the manager to make a good decision for their company. Dow Corning also produces a Dow Corning’s Analytic App . This app interfaces with Google Analytics. When Dow Corning rolls out Xiameter Web Sites across the globe, executives will be able to monitor what content is and isn’t being used whether they are home, travelling or at the office. Last but not least, Sunbelt company deployed a custom application called Mobile SalesPro, which ties multiple systems and databases into a single package for the sales team. This application connects every business activities, which integrates date from different business functions. Lastly, SAP company has developed a Business One mobile application for the iPhone, which enables users to stay connected to business and customer data in real time when they are away from the office. It is a software system integrating all core business function of their company. All the application that I mentioned above are really helps and improves the operational efficiency and decision making in many big success company. 

Unit 6 Learning Outcome 3: Provide examples of computational thinking in daily life.

·       Example of computatuional thinking in daily life

    Putting things in your child’s knapsack for the day
-Pre-fetching and caching

·       Taking your kids to soccer, gymnastics, and swim practice
-Travelling salesman (with more constraints)

·       Cooking a gourmet meal
-Parallel processing:
You don’t want the meat to get cold while you’re cooking the vegetables

·       Cleaning out your garage
-Garbage collection:
 Keeping only what you need vs. throwing out stuff when you run out of space

·       Storing away your child’s Lego pieces scattered on the LR floor
-Using hashing (e.g., by shape, by color)

·       Doing laundry, getting food at a buffet

-Pipelining the wash, dry, and iron stages; plates, salad, entrée, dessert stations

Unit 6 Learning Outcome 2: Describe the "three pillars" of computational thinking

Computational Thinking is the thought processes involved in formulating problems and their solutions so that the solutions are represented in a form that can be effectively carried out by an information-processing agent [CunySnyderWing10]

Three pillars of CT :

1. Abstraction 
 
   Abstraction means stripping down a problem to its bare essentials and/or capturing common characteristics or actions into one set that can be used to represent all other instances.

2. Automation
 
 Automation is using a computer as a labor saving device that executes repetitive tasks quickly and efficiently.

3. Analysis

  Analysis described validating if the abstractions made were correct.

Unit 6 Learning Outcome 1: Describe the concept of computational and algorithmic thinking

Concept of computational and algorithm thinking

COMPUTATIONAL THINKING
       Computational Thinking (CT) is the thought processes involved in formulating a problem and expressing its solution(s) in such a way that a computer—human or machine—can effectively carry out. Computational Thinking is an iterative process based on three stages: 1) Problem Formulation (abstraction), 2) Solution Expression (automation), and 3) Solution Execution & Evaluation (analyses) captured by the figure to the right. The term computational thinking was first used by Seymour Papert in 1980 and again in 1996. Computational thinking can be used to algorithmically solve complicated problems of scale, and is often used to realize large improvements in efficiency.

ALGORITHM THINKING

          Algorithmic thinking is a way of getting to a solution through the clear definition of the steps needed – nothing happens by magic. Rather than coming up with a single answer to a problem, like 42, pupils develop algorithms. They are instructions or rules that if followed precisely (whether by a person or a computer) leads to answers to both the original and similar problems. For example, we all learn algorithms for doing multiplication at school. If we (or a computer) follow the rules we were taught precisely we can get the answer to any multiplication problem. Once we have the algorithm we don’t have to work out how to do multiplication from scratch every time we are faced with a new problem.

Unit 6 Activity 3: What is computational thinking?

Computational thinking is the thought processes involved in formulating problems and their solutions so that the solutions are represented in a form that can be effectively carried out by an information-processing agent. It describes the "problem" and the "solution to that particular problem" not only regards on mathematically well-defined problems but also real-world problems. It is useful in the way that we are able to recognize the information-processing agent that  can lead to our particular problems. 

Computational thinking involves:
- Formulating problems.
- Logically organizing and analyzing data.
- Representing data through abstractions.
- Automating solutions through algorithmic thinking.
- Identifying, analyzing and implementing possible solution.
- Generalizing and transferring this problem solving process.

Unit 6 Activity 2: Describe a process in a sequence

A process in a sequence firstly perceives a broad problem. After recognize the problem, read literature on relevant theoretical and empirical work and then discuss with peers and tutor to define a researchable problem. Next, define the context of the problem to be researched. After define the context of the problem, review any comparable case studies, especially for research questions and methodology and then frame research questions. The next step is design an investigative procedure and the select and retrieve appropriate data. Proceed with analysis and interpretation. Lastly, compare your findings and interpretations with other relevant studies reviewed earlier.

            For example, we use the ATM machine. Firstly, we insert our bank card into the ATM machine and then we choose language that we used. After choosing the language we then enter our pin number for our bank card. If the pin number is correct then we may choose the function that we want to use such as withdraw money, save money and so on. After complete the function take out our bank card.


Unit 6 Activity 1: Computational thinking in daily life

Computational thinking is the thought processes involved in formulating problems and their solutions so that the solutions are represented in a form that can be effectively carried out by an information-processing agent. Informally, computational thinking describes the mental activity in formulating a problem to admit a computational solution. The solution can be carried out by a human or machine, or more generally, by combinations of humans and machines. Computational thinking is used in the design and analysis of problems and their solutions, broadly interpreted. The most important and high-level thought process in computational thinking is the abstraction process. Abstraction is used in defining patterns, generalizing from instances, and parameterization. It is used to let one object stand for many. It is used to capture essential properties common to a set of objects while hiding irrelevant distinctions among them. For example, an algorithm is an abstraction of a process that takes inputs, executes a sequence of steps, and produces outputs to satisfy a desired goal. An abstract data type defines an abstract set of values and operations for manipulating those values, hiding the actual representation of the values from the user of the abstract data type. Designing efficient algorithms inherently involves designing abstract data types. Abstraction gives us the power to scale and deal with complexity.

Saturday, 15 October 2016

Unit 5 Learning Outcome 5: Explain the concept of databases, data and information

Database, Data and Information

1.Database- Collection of information organized to provide efficient retrieval. The collected information could be in any number of formats (electronic, printed, graphic, audio, statistical, combinations). There are physical and electronic databases.

2.Data- Set of values of qualitative or quantitative variables.Data can exist in a variety of forms as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind. Strictly speaking, data is the plural of datum, a single piece of information.

3.Information- Data that has been processed in such a way as to be meaningful to the person who receives it.

Unit 5 Learning Outcome 4: Discuss the importance of security measures in information systems

The important of security measures in information system are:

1.Collect, analyze, and disseminate strategic intelligence about threats to systems.
-In the information systems security world, it is difficult to collect information about attackers (though such intelligence information should be sought). It is however much easier to collect and analyze information on technical and procedural vulnerabilities, both to characterize the nature of these vulnerabilities and their frequency at different installations. Dissemination of information about these vulnerabilities enables administrators of the information systems that may be affected to take remedial action.
2.Monitor indications and warnings
-All defenses,physical and cyber rely to some extent on indications and warning of impending attack. The reason is that if it is known that attack is impending, the defense can take actions to reduce its vulnerability and to increase the effectiveness of its response

3.Be able to identify intruders
-Electronic intruders into a system are admittedly hard to identify. Attacks are conducted remotely, and a chain of linkages from the attacker’s system to an intermediate node to another to another to the attacked system can easily obscure the identity of the intruder. Nevertheless, certain types of information if collected may shed some light on the intruder’s identity. For example, some attackers may preferentially use certain tools or techniques or use certain sites to gain access

4.Test for security weaknesses in fielded and operational systems
-Recognized vulnerabilities are not always corrected and known fixes are frequently found not to have been applied as a result of poor configuration management. Thus, it is essential to use available tools and conduct “red team” or “tiger team” probes often and without warning to test security defenses. In order to maximize the impact of these tests, reports should be disseminated widely.

5.Plan a range of responses
-Any organization relying upon information systems should have a number of routine information systems security activities. But when attack is imminent, an organization could prudently adopt additional security measures that during times of non-attack might not be in effect because of their negative impact on operations. Tailoring in advance a range of information systems security actions to be taken under different threat conditions would help an organization plan its response to any given attack

6.Coordinate defensive activities throughout the enterprise
-Any large, distributed organization has many information systems and subnetworks that must be defended. The activities taken to defend each of these systems and networks must be coordinated because the distributed parts have interconnections and the security of the whole organization depends on the weakest link. Furthermore, it is important for different parts of organizations to be able to learn from each other about vulnerabilities, threats, and effective countermeasures.

Unit 5 Learning Outcome 3: Explain the steps in System Development Life Cycle

Explain the steps in System Development Life Cycle
The System Development Life Cycle is a multistep, iterative process, structured in a methodical way. This process is used to model or provide a framework for technical and non-technical activities to deliver a quality system which meets or exceeds a business’s expectations or manage decision-making progression. 
Planning
In the planning phase, the objective of the project is determined and the requirements to produce the product are considered. Estimation of resources, such as personnel and costs, is prepared, along with a concept for the new product. All of the information is analyzed to see if there is an alternative solution to creating a new product. If there is no other viable alternative, the information is assembled into a project plan and presented to management for approval. 
Analysis
During the analysis stage the project team determines the end-user requirements. Often this is done with the assistance of client focus groups, which provide an explanation of their needs and what their expectations are for the finished product and how it will perform. The project team documents all of the user requirements and gets a sign-off from the client and management to move forward with system design.
Design
The design phase is the “architectural” phase of system design. The flow of data processing is developed into charts, and the project team determines the most logical design and structure for data flow and storage. For the user interface, the project team designs mock-up screen layouts that the developers use to write the code for the actual interface.
Implementation
This phase comes after a complete understanding of system requirements and specifications; it’s the actual construction process after having a complete and illustrated design for the requested system. In the Software Development Life Cycle, the actual code is written here, and if the system contains hardware, then the implementation phase will contain configuration and fine-tuning for the hardware to meet certain requirements and functions. In this phase, the system is ready to be deployed and installed in customer’s premises, ready to become running, live and productive, training may be required for end users to make sure they know how to use the system and to get familiar with it, the implementation phase may take a long time and that depends on the complexity of the system and the solution it presents.
Operation Support System
The final phase involves maintenance and regular required updates. This step is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.

Tuesday, 11 October 2016

Unit 5 Learning Outcome 2: Identify the purpose and task conducted in each system


 Identify the purpose and tasks conducted in each system.
·       Office Information System
-Enable employees to perform tasks in computer and other electronic devices
-Increase employees’ productivity
-Assist communication among employees

·       Transaction Processing System
-Capture process the data from day-to-day business activity.
-Help to process the transaction.
-Reduce cost.
-Improve customer service.

·       Management Information System
-Generate accurate timing.
-Organize information.
-Benefits managers and other top users to make decision, solve problem and check   progress.
-Integrated with TPS(Transport Processing System).

·       Decision Support System
-Align information to make decision.
-Online analytical processing.
-EIS(Executive Information System) support strategic information needed of the executive management.

Expert System
-Captures and stores the knowledge of human experts.
-Initiate human reasoning and decision making.

-AI(Artificial Intelligence) is being introduced to assist initiating human reasoning and decision making earlier.

Unit 5 Learning Outcome 1: Describe what is information system


  Describe what is information system.

An information system (IS) is any organized system for the collection, organization, storage and communication of information. More specifically, it is the study of complementary networks that people and organizations use to collect, filter, process, create and distribute data. A computer information system is a system composed of people and computers that processes or interprets information. The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.
Information system is an academic study of systems with a specific reference to information and the complementary networks of hardware and software that people and organizations use to collect, filter, process, create and also distribute data. An emphasis is placed on an Information System having a definitive Boundary, Users, Processors, Stores, Inputs, Outputs and the aforementioned communication networks. Any specific information system aims to support operations, management and decision-making. An information system is the information and communication technology (ICT) that an organization uses, and also the way in which people interact with this technology in support of business processes.
Some authors make a clear distinction between information systems, computer systems, and business processes. Information systems typically include an ICT component but are not purely concerned with ICT, focusing instead on the end use of information technology. Information systems are also different from business processes. Information systems help to control the performance of business processes. A work system is a system in which humans or machines perform processes and activities using resources to produce specific products or services for customers. An information system is a work system whose activities are devoted to capturing, transmitting, storing, retrieving, manipulating and displaying information.
     As such, information systems inter-relate with data systems on the one hand and activity systems on the other. An information system is a form of communication system in which data represent and are processed as a form of social memory. An information system can also be considered a semi-formal language which supports human decision making and action. Information systems are the primary focus of study for organizational informatics.