0% found this document useful (0 votes)
4 views23 pages

Information Technology Infrastructure Module 5 (1)

Module 5 covers various aspects of Information Technology Infrastructure, including data processing, transaction processing, application processing, and information system processing. It outlines the stages and types of data processing, advantages and disadvantages, as well as principles of Total Quality Management (TQM) and network topologies. The document emphasizes the importance of efficient data handling and communication in modern information systems.

Uploaded by

jahnavisuresh06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views23 pages

Information Technology Infrastructure Module 5 (1)

Module 5 covers various aspects of Information Technology Infrastructure, including data processing, transaction processing, application processing, and information system processing. It outlines the stages and types of data processing, advantages and disadvantages, as well as principles of Total Quality Management (TQM) and network topologies. The document emphasizes the importance of efficient data handling and communication in modern information systems.

Uploaded by

jahnavisuresh06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

MODULE 5

Information Technology Infrastructure: Introduction, data processing, transaction processing, application


Processing ,information system processing, TQM of IS, introduction network, network topology, data
communication, Data & Clint Service Architecture RDBMS, Data Ware House, Introduction to E-business, models
of E-business, internet and World Wide Web (WWW), Intranet and extranet, Security in E-business, electronic
payment system, Impact of web on strategic management, web enabled business management, MIS in web
environment.

Information Technology Infrastructure: Data Processing


Data processing is the process of converting raw data into meaningful information. It plays a major role in
today’s data-driven world. From business to science and real-time systems, data processing helps us
understand and use information effectively.
Data processing means changing the format of data to make it more useful. When data is well-organized and
presented, it becomes useful information. The data processing system is also known as an information
system. In some cases, it can even mean converting information back into data and vice-versa.
Processing Data vs Processed Data
 Processing Data means managing how data is structured and described within an organization.
 Processed Data is the final result after data goes through several steps of processing. It is clean,
organized, and ready to use.
Stages of Data Processing
There are six main stages in the data processing cycle:
1. Collection
Raw data is collected from different sources like surveys, sensors, or databases. This step ensures
that all the necessary data is gathered.
2. Preparation
The data is cleaned and organized. Unnecessary or incorrect data is removed. The data is then
formatted properly for easy analysis.
3. Input
The prepared data is entered into a computer system. This can be done manually or automatically.
4. Processing
This is the core step. The data is analyzed using methods like sorting, calculations, and summarizing
to find patterns and useful insights.
5. Output
The processed data is shown in an easy-to-understand format such as charts, graphs, or reports to
help in decision-making.
6. Storage
The final results are saved for future use. Storing processed data helps in keeping records and using
the information later.
Types of Data Processing
1. Manual Data Processing
Data is processed by hand without machines or electronic devices. This includes activities like
calculations, sorting, and recording. It is a slow and time-consuming process.
2. Mechanical Data Processing
This method uses mechanical devices such as punch cards or mechanical calculators. It is more
efficient than manual processing but still not as fast or capable as electronic processing.
3. Electronic Data Processing
Electronic Data Processing (EDP) uses computers to manage and analyze data. It is much faster and
more accurate than manual or mechanical methods, making a major improvement in data processing.
4. Batch Data Processing
In batch processing, data is grouped into batches and then processed at scheduled times. It works
well for tasks that are not urgent and is efficient for processing large amounts of data.
5. Real-time Data Processing
Real-time processing handles data as it is generated. It is important for time-sensitive applications,
such as financial transactions and monitoring systems, where immediate updates are needed.
6. Online Data Processing
Online Data Processing (OLTP) processes data while it is being collected. It is interactive and
supports transactions from multiple users at the same time, making it ideal for applications that need
instant data updates and user interaction.
7. Automatic Data Processing
Automatic Data Processing (ADP) uses computers and software to perform data processing tasks
without much human help. It includes methods like batch and real-time processing to manage large
volumes of data efficiently.
Examples of Data Processing
 Stock Exchanges:
Stock markets process huge amounts of data during trades. They match buy and sell orders, update
stock prices immediately, and record every transaction accurately.
 Manufacturing:
In manufacturing, data processing helps with quality control. Sensors and devices gather data on
production, and algorithms analyze this data to spot any defects.
 Smart Home Devices:
Smart devices in homes process data from sensors and user inputs. They use this data to control
lights, adjust thermostats, and manage security systems according to settings or user preferences.
 Electronic Health Records (EHRs):
In healthcare, electronic records store and process patient information, such as medical history, test
results, and treatment plans. This helps in providing accurate and efficient healthcare services.
Advantages of Data Processing
 It is highly efficient.
 It saves time.
 It works at a high speed.
 It reduces errors.
Disadvantages of Data Processing
 It uses a lot of power.
 It takes up a large amount of memory.
 The installation cost is high.
 It can lead to memory wastage.
Transaction Processing
Single User System:
Only one user can access the system at a time.
Multi-User System:
Multiple users can use the system at the same time. Concurrency is achieved in two ways:
1. Interleaved Processing:
In interleaved processing, a single CPU switches between multiple transactions. This means that a
new transaction may start before the previous one finishes. While this approach allows concurrent
work, it can sometimes lead to inconsistencies in the system.
2. Parallel Processing:
In parallel processing, a large task is split into smaller tasks that run at the same time on several
CPUs or nodes. This method allows multiple processes to be executed concurrently, improving
overall efficiency.
Transaction
A transaction is a logical unit of database work that includes one or more operations such as reading,
inserting, or updating data. It serves as a complete unit of work that accesses or updates various data items.
A transaction can be embedded within an application program or executed interactively using a high-level
language like SQL.
Example:
Imagine a transaction that transfers $1700 from a customer's savings account to their checking account. This
transaction involves two parts: debiting the savings account by $1700 and crediting the checking account by
$1700. If one of these parts fails, the bank's records will not balance correctly.

Transaction Boundaries
Transactions have clear start (begin) and end boundaries. An application program may contain several
transactions, each clearly separated by its beginning and ending points.
Granularity of Data
 Granularity refers to the size of a data item.
 A data item can be as small as an individual field (or attribute), a value within a record, an entire
record, or even a whole disk block.
 The basic concepts of data processing work the same way regardless of the size of the data item.

Advantages
 Batch processing and real-time processing: Both modes are available.
 Faster processing: Leads to reductions in processing time, lead time, and order cycle time.
 Cost Reduction: Lowers inventory, personnel, and ordering costs.
 Improved Productivity: Increases overall productivity and customer satisfaction.
Disadvantages :
 High setup costs.
 Lack of standard formats.
 Hardware and software incompatibility.
Application processing:
Application processing" typically refers to the procedures and steps involved in handling and
evaluating applications submitted for various purposes, such as job applications, college
admissions, visa applications, etc. This process involves receiving, reviewing, and making
decisions on applications based on specified criteria or requirements.
Here are some common steps involved in application processing:
1. Receiving Applications: Applications are received through various channels such as
online portals, email, mail, or in-person submissions.
2. Initial Screening: Applications are initially screened to ensure that they meet basic
requirements or qualifications. This may involve checking for completeness, verifying
credentials, or ensuring that applicants meet minimum eligibility criteria.
3. Review and Evaluation: Qualified applications are then reviewed and evaluated based on
specific criteria relevant to the purpose of the application. This may involve assessing
qualifications, skills, experience, academic records, personal statements, or any other
relevant information provided by the applicant.
4. Decision Making: Based on the evaluation, decisions are made regarding the outcome of
the application. This could include accepting, rejecting, or placing applications on hold for
further review.
5. Communication: Applicants are notified of the decision through various communication
channels such as email, mail, or phone. Feedback may also be provided to unsuccessful
applicants.
6. Follow-up Actions: Depending on the outcome, further actions may be taken, such as
scheduling interviews, issuing offers of admission or employment, processing visas, or
providing additional documentation.
7. Record Keeping: Records of all applications and related correspondence are maintained
for future reference and auditing purposes.

Information system processing:


Information system processing refers to the activities involved in managing, manipulating, storing,
retrieving, and disseminating data within an information system. Information systems are
composed of hardware, software, data, procedures, and people that work together to collect,
process, store, and distribute information for decision-making and organizational operations.
Here are the key components of information system processing:
1. Data Collection: The process of gathering raw data from various sources, such as sensors,
forms, databases, or external systems.
2. Data Entry: Inputting collected data into the information system, which can be done
manually or automatically through interfaces or integrations with other systems.
3. Data Processing: Manipulating and transforming raw data into meaningful information
through various operations such as sorting, filtering, aggregating, calculating, or
summarizing.
4. Data Storage: Storing processed data in databases, files, or other data storage mechanisms
for future retrieval and reference.
5. Data Retrieval: Accessing stored data when needed for analysis, reporting, decision-
making, or other purposes.
6. Data Analysis: Examining and interpreting data to uncover patterns, trends, insights, or
relationships that can inform decision-making or support organizational goals.
7. Information Dissemination: Distributing processed information to relevant stakeholders
through reports, dashboards, alerts, emails, or other communication channels.
8. Security and Privacy: Implementing measures to protect data confidentiality, integrity, and
availability, as well as ensuring compliance with regulations and organizational policies.
9. Monitoring and Control: Monitoring system performance, data quality, and user activities
to detect and address issues, ensure compliance, and optimize processes.
10. Feedback and Improvement: Gathering feedback from users and stakeholders to identify
areas for improvement in the information system, processes, or data quality.
Total Quality Management (TQM):

Principles of Total Quality Management (TQM)


The principles of Total Quality Management (TQM) encompass the following:
1. Customer Focus: TQM places a strong emphasis on understanding and meeting customer
needs and expectations. It involves gathering customer feedback, conducting market research,
and using that information to improve products, services, and overall customer satisfaction.
2. Continuous Improvement: TQM promotes a culture of continual improvement throughout the
organisation. It encourages all employees to actively participate in identifying opportunities for
enhancement, eliminating waste, and implementing incremental improvements in processes,
products, and services.
3. Employee Involvement: TQM recognizes the importance of involving employees at all levels
in quality improvement initiatives. It fosters a collaborative and empowered work environment,
where employees are encouraged to contribute ideas, make decisions, and take ownership of
quality-related activities.
4. Process-Oriented Approach: TQM focuses on managing and improving processes rather than
individual tasks or departments. It involves mapping, analyzing, and optimizing workflows to
enhance efficiency, effectiveness, and consistency.
5. Data-Driven Decision-Making: TQM relies on the collection and analysis of relevant data to
support decision-making. It emphasizes the use of facts and figures to identify areas for
improvement, measure performance, and monitor progress toward quality objectives.
6. Supplier Relationships: TQM recognizes the significance of strong relationships with
suppliers. It emphasizes collaboration, communication, and mutually beneficial partnerships
with suppliers to ensure the quality of inputs and optimize the overall value chain.
7. Leadership Commitment: TQM requires committed leadership that actively supports and
promotes quality principles throughout the organisation. Leaders serve as role models, set clear
quality goals, provide necessary resources, and foster a culture that prioritizes continuous
improvement and customer satisfaction.

Network:
A network is a group of two or more computers or other electronic devices that are
interconnected for the purpose of exchanging data and sharing resources
A computer network is a system that connects numerous independent computers in order to share
information (data) and resources. The integration of computers and other different devices
allows users to communicate more easily.
A computer network is a collection of two or more computer systems that are linked together.
A network connection can be established using either cable or wireless media. Hardware and
software are used to connect computers and tools in any network.
A computer network consists of various kinds of nodes. Servers, networking hardware,
personal computers, and other specialized or general-purpose hosts can all be nodes in a computer
network. Host names and network addresses are used to identify them.
1. Bus Topology
Structure:
 All devices (computers, printers, etc.) are connected to a single central cable known as the bus or
backbone.
 Data travels in both directions along the cable, and each device checks if the data is meant for it.
Advantages:
 Easy to implement and extend.
 Requires less cable than other topologies.
 Ideal for small networks or temporary setups.
Disadvantages:
 If the main cable fails, the entire network stops functioning.
 Difficult to troubleshoot.
 Performance degrades as more devices are added or network traffic increases.
Example Use:
 Small office networks or temporary event setups.

⭐ 2. Star Topology
Structure:
 All devices are connected to a central hub or switch.
 The hub acts as a mediator, forwarding data to the correct device.
Advantages:
 Easy to manage and expand.
 If one device or cable fails, the rest of the network continues to function.
 Efficient performance with centralized control.
Disadvantages:
 If the central hub fails, the entire network goes down.
 Requires more cable than bus topology.
Example Use:
 Common in home and office LANs.

3. Ring Topology
Structure:
 Each device connects to exactly two other devices, forming a circular path.
 Data travels in one direction (unidirectional) or sometimes both directions (bidirectional).
Advantages:
 Data collisions are rare because of the one-directional data flow.
 Orderly network, with each device having access in turn.
Disadvantages:
 If a single device or cable fails, it can disrupt the entire network.
 Troubleshooting is more difficult compared to star topology.
Example Use:
 Used in Token Ring Networks and some MANs (Metropolitan Area Networks).

4. Tree Topology
Structure:
 A hierarchical structure where star topologies are connected to a main “root” bus.
 Resembles a tree structure with branches and sub-branches.
Advantages:
 Highly scalable and supports future expansion.
 Easier maintenance due to hierarchical division.
Disadvantages:
 If the root node or central backbone fails, it can bring down large sections of the network.
 Complex configuration and cabling.
Example Use:
 Large organizations or educational institutions with departmental divisions.

5. Mesh Topology
Structure:
 Each device is connected to every other device in the network (fully connected).
 Can also be partially connected in some cases.
Advantages:
 Offers high redundancy and fault tolerance.
 Data can take multiple paths to reach the destination — best for reliability.
Disadvantages:
 High cost due to extensive cabling and configuration.
 Complex to install and manage.
Example Use:
 Mission-critical applications like military systems or banking networks.

6. Hybrid Topology
Structure:
 A combination of two or more topologies (e.g., star + ring, star + bus).
 Can be designed to suit specific network requirements.
Advantages:
 Flexible and scalable.
 Can be customized based on network needs.
Disadvantages:
 Complex to design and manage.
 Costly, especially in large implementations.
Example Use:
 Large corporate networks, data centers, or campus networks.
Data communication:
Communication is defined as a process in which more than one computer transfers
information, instructions to each other and for sharing resources. Or in other words,
communication is a process or act in which we can send or receive data. A network of
computers is defined as an interconnected collection of autonomous computers.
Autonomous means no computer can start, stop or control another computer.

Components of Data Communication


A communication system is made up of the following components:
1. Message: A message is a piece of information that is to be transmitted from one person to
another. It could be a text file, an audio file, a video file, etc.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile,
telephone, laptop, video camera, or workstation, etc.
3. Receiver: It is a device that receives messages. It can be a computer, telephone mobile,
workstation, etc.
4. Transmission Medium / Communication Channels: Communication channels are the
medium that connect two or more workstations. Workstations can be connected by either
wired media or wireless media.
5. Set of rules (Protocol): When someone sends the data (The sender), it should be
understandable to the receiver also otherwise it is meaningless. For example, Sonali sends a
message to Chetan. If Sonali writes in Hindi and Chetan cannot understand Hindi, it is a
meaningless conversation.

Therefore, there are some set of rules (protocols) that is followed by every computer connected
to the internet and they are:

 TCP(Transmission Control Protocol): It is responsible for dividing messages into


packets on the source computer and reassembling the received packet at the destination or
recipient computer. It also makes sure that the packets have the information about the
source of the message data, the destination of the message data, the sequence in which the
message data should be re-assembled, and checks if the message has been sent correctly to
the specific destination.

 IP(Internet Protocol): Do You ever wonder how computer determines which packet
belongs to which device. What happens if the message you sent to your friend is received
by your father? Scary Right. Well! IP is responsible for handling the address of the
destination computer so that each packet is sent to its proper destination.

Data & Client Service Architecture RDBMS:


Definition:
Data & Client Service Architecture with RDBMS involves organizing the system in such a way that data
storage, retrieval, and processing are efficiently managed using relational database technologies, while
ensuring smooth and secure client interaction with the data through software layers.\

🧱 Architectural Layers Overview:


1️⃣ Client Layer (Presentation/UI Layer):
 Role: Interface for end-users to interact with the system.
 Examples: Web browsers, mobile apps, desktop applications.
2️⃣ Application Layer (Business Logic Layer):
 Role: Handles processing, validations, business rules.
 Functions: Order processing, user authentication, calculations.
 Tech Stack Examples: Java, .NET, Python, Node.js.
3️⃣ Service/API Layer:
 Role: Facilitates communication between application and database.
 Examples: REST APIs, SOAP, GraphQL.
 Functions: Handles request routing, security, and scalability.
4️⃣ Data Access Layer (DAL):
 Role: Translates business logic into SQL queries.
 Tools: ORM tools (Hibernate, Sequelize, Entity Framework).
 Functions: Performs CRUD operations (Create, Read, Update, Delete).
5️⃣ RDBMS Layer (Database Layer):
 Role: Stores structured data in tables with relationships.
 Examples: MySQL, PostgreSQL, Oracle, SQL Server.
 Features: Indexing, constraints, ACID properties, transactions.
6️⃣ Physical Storage Layer:
 Role: Actual storage of data on disk or in cloud infrastructure.
 Examples: Local storage, AWS RDS, Azure SQL, Google Cloud SQL.

🔄 Workflow Example:
1. User logs in via mobile app (Client Layer).
2. App sends request to server (Application Layer).
3. Server uses API (Service Layer) to request user data.
4. API queries database using SQL via Data Access Layer.
5. RDBMS fetches data from tables and returns it.
6. Result is shown back to user in UI.
✅ Advantages:
 Clear separation of concerns
 Easier to manage and scale
 Enhances data integrity and security
 Enables reusability and modularity
 Supports multiple clients (web, mobile) accessing the same database
Data
This is the initial form of data which hasn't been processed yet. It includes:
 Figures
 Facts
 Observations
 Values
 Statistics
These data elements are stored in a Database.

2. Data Processing
The raw data undergoes processing to convert it into meaningful information.
 Data Processing is shown as a green block (though there's a typo: "DADA" should be "DATA").
 It involves a software program that uses business logic to process the raw data.
 The actual processing happens within a computer system designed for this purpose.

3. Information
Once processed, the raw data is transformed into Information.
 Information is processed data – it is organized, structured, and meaningful.
 This stage involves visualizations, analysis reports, and dashboards (represented by graphs, charts,
and search icons in the image).
Overall Flow:
RAW DATA → DATA PROCESSING → INFORMATION
Stored in a Database → Processed by a Computer System → Resulting in Useful Insights

Purpose in RDBMS:
In an RDBMS, structured data is stored in tables. The system enables:
 Efficient storage and retrieval of raw data,
 Application of business logic through queries and procedures,
 Transformation of data into meaningful information for decision-making.

Difference Between DBMS and RDBMS

DBMS RDBMS

DBMS stores data as file. RDBMS stores data in tabular form.

Data elements need to access


Multiple data elements can be accessed at the same time
individually.

Data is stored in the form of tables which are related to


No relationship between data.
each other.

Normalization is not present. Normalization is present.

DBMS does not support distributed


RDBMS supports distributed database.
database.

🧊 1. Data Warehouse (DW)


A Data Warehouse is a centralized repository that stores integrated and historical data from multiple
sources for business analysis and reporting.
Features:
 Stores large volumes of data.
 Optimized for analytical queries (OLAP – Online Analytical Processing).
 Supports trend analysis, forecasting, and decision-making.
 Data is cleaned, transformed, and structured.
🏢 Example:
A retail company’s data warehouse may contain 10 years of sales, customer, and inventory data from all
branches.

🧊 2. Data Mart
A Data Mart is a subset of a Data Warehouse, focused on a specific department or business area (e.g.,
sales, marketing).
Features:
 Smaller and more focused than a full Data Warehouse.
 Faster and cheaper to build.
 Tailored for departmental use.
 Can be dependent (linked to DW) or independent (stand-alone).
🏢 Example:
The sales data mart may contain only sales data, helping the sales team analyze regional performance.

3. Operational Data Store (ODS)


An Operational Data Store (ODS) is a real-time or near real-time database that integrates data from
multiple sources for operational reporting.
Features:
 Designed for short-term, daily operations.
 Frequently updated (unlike DW which is updated periodically).
 Supports current or near-current view of operational data.
 Acts as a staging area before data moves to the Data Warehouse.
🏢 Example:
A bank’s ODS may contain today’s transactions from all branches, used for fraud detection or real-time
customer service.
🧊 Comparison Table:

Operational Data Store


Feature Data Warehouse Data Mart
(ODS)
Departmental (e.g., HR,
Scope Organization-wide Operational systems
Sales)
Operational Data Store
Feature Data Warehouse Data Mart
(ODS)
Data Type Historical Subject-specific Current/Recent
Users Analysts, Executives Department Users Operational Managers

Update Periodic (batch


Periodic Real-time/Near real-time
Frequency updates)

Purpose Strategic decisions Tactical analysis Operational reporting


Introduction to E-Business
E-Business (Electronic Business) refers to conducting business processes and transactions using
electronic means, especially via the internet. It involves not only buying and selling but also a wide
range of digital interactions with customers, partners, and internal systems.

Key Aspects of E-Business:

1️⃣ Online Presence


 Digital identity through websites or online stores.
 Showcases products/services, provides information, and enables online transactions.
2️⃣ E-Commerce
 A subset of e-business focused on buying and selling online.
 Includes:
o B2B (Business to Business)
o B2C (Business to Consumer)
o Online retail, auctions, and marketplaces.

3️⃣ Digital Marketing


 Uses tools like SEO, social media, email, and content marketing.
 Enables:
o Targeted marketing
o Performance tracking
o Personalized customer engagement

4️⃣ Customer Relationship Management (CRM)


 Systems that manage customer data and interactions.
 Supports:
o Personalized communication
o Targeted campaigns
o Enhanced customer support
5️⃣ Supply Chain Management (SCM)
 Digital tools for inventory, logistics, orders, and supplier relations.
 Benefits:
o Reduced lead time
o Real-time inventory tracking
o Better collaboration with partners
6️⃣ Data Analytics
 Involves collecting and analyzing data from:
o Customer behavior
o Website traffic
o Transactions
 Helps in:
o Informed decision-making
o Trend prediction
o Strategy development
7️⃣ Mobile Commerce (M-Commerce)
 Shopping and business operations via smartphones and mobile apps.
 Offers:
o Anytime-anywhere access
o Location-based services
o Push notifications for marketing

8️⃣ Security and Privacy


 Ensures protection of sensitive data.
 Techniques include:
o Encryption
o Secure payment gateways
o Authentication protocols
 Builds customer trust and safeguards business reputation
🌍 Internet
The Internet is a global network of networks that connects millions of computers worldwide. It allows
people to communicate, share information, and access resources from anywhere.
 It's maintained by various organizations like IANA (Internet Assigned Numbers Authority), which
defines internet rules and standards.
 Think of it as the infrastructure that connects everything together.

🌐 World Wide Web (WWW)


The World Wide Web (or Web) is a service that runs on top of the internet.
 It allows users to access documents and information using web browsers.
 These documents are linked through hyperlinks, allowing users to jump from one page to another.
 It was invented by Tim Berners-Lee in 1989.

🔄 Difference Between Internet and WWW

S.No. Internet WWW (World Wide Web)


1 Global network of computers A service available via the Internet
2 Connects computers globally Connects documents using hyperlinks
3 Acts as infrastructure Acts as a service on top of the Internet
4 Like a bookstore Like the books inside the bookstore
5 More hardware-focused More software-focused
6 Uses routers, cables, etc. Uses browsers, HTML, HTTP, etc.
7 Began in the late 1960s (ARPANET) Invented in 1989 by Tim Berners-Lee
8 Internet is a superset WWW is a subset of the Internet
9 Early name: ARPANET Early name: NSFNET
10 Uses IP addresses Uses HTTP protocol

🏢 Intranet
An Intranet is a private network used within an organization.
 Only accessible by employees or authorized users with a username and password.
 Used for:
o Sharing documents internally
o Accessing employee directories
o Internal communication
 It's highly secure and not accessible to the public.

🌐 Extranet
An Extranet is a private network that allows external partners (like vendors or clients) to access certain
internal resources.
 Requires login credentials (username & password)
 Used for:
o Placing orders
o Checking status
o Sharing reports
 It supports collaboration between different organizations.

🔁 Intranet vs Extranet

Feature Intranet Extranet


Access Internal users only Internal + external authorized users
Purpose Internal communication External collaboration
Security Very secure Secure but accessible to selected outsiders
Example Use HR portals, internal announcements Vendor portals, client dashboards
.
MIS (Management Information Systems) in a Web Environment
MIS in a web environment means using internet technologies to manage business data and support
decision-making. It helps in collecting, storing, processing, and sharing information through web-based
systems.
1. Collecting Data
 Data is collected using online forms, file uploads, or connected systems.
 People enter data through webpages, and it can also come from other online platforms
automatically.

2. Processing and Storing Data


 The system processes the data (checks, sorts, summarizes).
 Data is stored in databases or cloud storage like Google Cloud, AWS, or Azure.
 Web tools like PHP, Python, or MySQL help in this process.
3. Getting Reports and Information

 Users can view data through web dashboards, charts, or reports.

 This makes it easy to access and understand data from any location, any time.

4. Connecting with Other Systems

 The system can connect with other services using APIs (tools to talk to other systems).

 This allows automatic updates, real-time data sharing, and better system coordination.

5. Security and Access

 To keep data safe, systems use:

o Passwords

o Two-step verification

o Data encryption

o User roles and access levels

o Activity logs to track who did what

6. Teamwork and Communication

 Users can chat, share documents, and work together in the system.

 Built-in tools like notifications, messages, and shared files help in collaboration.

7. Scalability and Speed

 Web-based MIS can grow with your business.

 It handles more users and data smoothly by using cloud services and load balancing.

8. Access on Mobile Devices

 You can use MIS from your mobile phone or tablet.

 Interfaces are mobile-friendly or have dedicated apps so you can work on the go.

You might also like