CSC 425 Lecture Note-2 PDF
CSC 425 Lecture Note-2 PDF
Course Unit: 2
1.0 Introduction
Organization is the aggregated body that makes up the whole labour force. It is also refers to as
2.0 Objectives
define organization
There are five areas of organization in which data processing manager must give adequate
Establishing Objectives
Physical Installation
Staffing Policy
2
3.1.1 Planning the installation
Before a computer is received at the user’s premises the data processing manager must give many
man- hours of thought to the preliminaries and must draw up detailed plans for the three major
phases, viz:
Pre installation
Installation and
Productive running
Beside, there are also (i) Detailed planning (sitting, systems and programming, staffing etc) and (ii)
All company’s personnel must be involved for successful installation of computer system.
A steeling committee must be appointed for a fairly high- level control of the planning. The
compositions are: the must senior executive of the company’s the chairman, the manager of the
computer department, a representative from the computer manufacturer, and other representative
from the various departments within the company. The committee should be given specifies terms
of reference.
The aims and objectives of establishing a data processing department must not be left out. The
senior executive should have the following questions in mind which explain both short term and
long term objectives. Why is the company considering a computer? What would be the benefit to
the company of these applications? What are the long term implications? What major role will the
computer play in the company activities? The usefulness of computer in any firm comes under the
objectives like keeping records accurately, forecasting, and simulation among others.
3
3.1.3 Company Education Policy
Management must play emphasis on how computer are used, the stages in applying a computer,
the difficulties in problem definition, data collection and communication. The education
programme should not be rushed simply because it is for busy men. In short, the education
programme policy must made adequate provisions for formal training progrmme, and formal
The purpose of a company education policy is to motivate staff at every level to think about using
The environmental conditions of a computer are important to trouble -free running. All necessary
conditions must be met before installation exercise. The layout of the computer room should be
4
TAPE/DISK MAGNETIC MAGNETIC
RACK TAPE UNIT DISC UNIT
O
P
E PROCESSOR
R
A
T
O
R
The operator should be near to the input and output units which are most in use e.g. card or tape
reader, printer, and tape or disc unit. The room must have air condition used for dust filtration,
5
3.1.5 Staffing Policy
A typical computer centre team consist of the operations team who performs daily management of
the computer centre including 7/24 operator coverage, logistical planning for the computer centre,
There are obviously two choices open to management. They can recruit experience personnel and
thus reap the benefit of that experience or they can re-train existing staff in computer techniques.
In doing this, a number of factors used to be considered or the advantages and disadvantages of
each option.
Advantages
6
(iii) A fresh eye often sees weakness in a system.
Disadvantages:
Advantages:
Disadvantages:
(ii) Over familiarities with the way thing are done and reluctant to change the present methods.
4.0 Conclusion
This unit has introduced you to the organization of a computer centre. You have also been
7
5.0 Summary
There are five areas of organization in which data processing manager must give adequate
Establishing Objectives
Physical Installation
Staffing Policy
Discuss five areas of organization in which data processing manager must give adequate attention
to.
8
UNIT 2: Administrative Structure of a Computer Centre
1.0 Introduction
The administrative structure is being organized in such a way that a skilled professional personnel
is put in place to oversee the administration of the computer centre who in turn reports to the
executives or the directors board on the necessary protocols needed in putting the computer
department in such a way that it would be in line with the company objective.
The size of the data processing department of an organization and the degree of separation of
functions within it depend on the size of the organization and the extent of computerization within
it. Another factor that determined the size of an organization’s data processing department is the
financial considerations. That is the capital cost of the equipment. The major items to be
- Maintenance of equipment
- Stationery
- Replacement recruitment
- Further education
9
2.0 Objectives
In the department various staff with different computer skills is being employed. The data
processing manager is the head of the department under which you have the computer analyst,
programmer, operation manager, etc. There is probably no standard structure for data processing
department. Precise responsibilities and reporting procedures vary. Figure 2 and 3 show some
alternatives.
DP Manager
Analyst Programmer
s Data Control
Senior Control Chief
Operator Cleck
Punch/
Verify Operator Cleck
10
Computer Centre Manager
Computer Room
Supervisor
Database
Administrator
The DPM is responsible for both research and development and for production. He is also in
11
3.2.2 Project Leader
A system analyst carries out feasibilities study on a system. He works with other individuals within
an organization to evaluate their information needs, design computer software and hardware to
meet those needs and then implement the information system. He defines error messages to be
incorporated and checks to be embedded into the system. He functions as project team leader and
(i) Collect, records and analysis details of existing procedure and systems
(ii) Develop ideals for computerized systems superior to the current and existing system.
(vii) Define actions required to deal with various conditions arising in the system.
Chief Programmers work closely with a system analyst to either create new software or to review
12
software programmers. The programmers are in change of programming (applications) and
program documentation
program testing
He is responsible for the day- to –day running of the computer, control and flow of work, data
preparation and distribution, and computer operation and also lias with the engineers during
maintenance procedure. He will be required to scheduled the workload so as to obtain the best use
of the resources to ensure that work progress through the department ( receipt of data, data
preparation, operation, dispatch and control at all stages ) and to maintain all the necessary files.
The following specialists work with the operation manager: the data control staff, data preparation
staff, database administrators, computer room supervisor and computer operators. To assist him, he
He may also have under his control certain auxiliary machines such as decollators, sorters,
tabulators, busters, and the appropriate operators. He will act as liaison between the operations
department and the systems programming functions and as new systems are completed, he will
13
Operation manager is a person who runs the day- to- day operations of the computer systems. He
maintains records on equipment utilization and ensuring that data is received on time from user
department.
Operators are the professionals that make use of the computers to do their jobs. They make
judicious use of both the hardware and the software, which includes the utility programs e.g. file
conversion, file copy, file maintenance and reorganization, sorting, back up files, etc.
He is in change of:
(v) maintenance of log book in respect of machine performance, utilization and failures,
A full description of other rules is not given here as most of them will already be familiar to us as
student.
(i) Punch Operators: punch data into card or paper tape. Required skill-manual dexterity,
rhythm, concentration.
(ii) Verifier Operators: verifies work of punch operators, frequently a senior punch operator.
14
(iii) Control Clerks: verily flow of work, maintain totals to ensure no data
loss or incorrectly processed. It required skill normal clerical ability, accuracy and numeracy.
(iv) Librarian: maintains library of tapes or card files in use usually also library of programs in
4.0 Conclusion
In this unit, you have learnt on the administrative structure of a computer centre and the roles of
5.0 Summary
In this unit you have learnt that the data processing manager is the head of the department under
which you have the computer analyst, programmer, operation manager, etc.
(b) Write five responsibilities for each of the following personnel’s in Computer Centre
(i) Data Processing Manager (DPM)
(ii) System Analyst
(iii) Programmer
(iv) Computer Operator
15
UNIT 3: Computer Centre
1.0 Introduction
The Computer Centre is a service unit that utilizes computing resources to provide diverse
computer services to the general public. It is an institution which contains one or more computers
being operated upon by specialized set of people. A computer centre is a data processing centre
where various data are being processed and turned to reliable information.
Every organization has an objective of setting up a computer centre, this is to ascertain the extend
of relevance of the computer centre to an organization. The organization must put in place a good
detail planning and layout of how the computer department should be. The manager must give
detail planning to productive running, equipment selection, types of programs to be used, sitting
2.0 Objective
16
Chief Executive
Officer
Computer
Centre
Chief Executive
Officer
Computer centre may be, instead, a separated unit under chief executive officer at the same
Normally, all computer centres are responsible for virtually similar tasks in all organizations;
however, their focuses may not be the same. Using a certain name would identify its focused
17
Data Processing Centre: To provide business data (Sales, Deposit/Withdrawal, Airline
Ticketing, Student Registration, etc.) and produce summary report or other business
documents.
MIS Centre: To provide information for managers and executives for making timely and
Data Centre: To provide data for use by all departments (e.g. centre to provide criminal
Office Automation and Internet Centre: To provide services to all departments with office
provide services of all types related to business data processing, business applications, and
To ensure that the organization has adequate/advanced IT progress, which is in line with the
organization’s vision
18
To ensure that services provided are meeting with users’ requirements
The nature of data being processed and level of computerization determined the type of computer
3.4.1 Centralized DP
Centralized computing is computing done at a central location, using terminals that are attached to
a central computer. The computer itself may control all the peripherals directly (if they are
physically connected to the central computer), or they may be attached via a terminal server.
Alternatively, if the terminals have the capability, they may be able to connect to the central
computer over the network. The terminals may be text terminals or thin clients, for example.
19
At this centre, all the data under processing must pass through the central location. All the facilities
and staffs are concentrated in a place. There is a complete standardization at this centre. Besides,
the centre ensures efficient utilization of the system throughout the day (24 hours service).
It offers greater security over decentralized systems because all of the processing is controlled in a
central location. In addition, if one terminal breaks down, the user can simply go to another
terminal and log in again, and all of their files will still be accessible. Depending on the system,
they may even be able to resume their session from the point they were at before, as if nothing had
happened.
Advantages
Sharing resources: A well-planned centralized system holds data used across the organization
in one place, allowing all staff to access it. This makes it both faster and easier to undertake
organization-wide activities. Central planning and operation also allows compatible technology
and skills to be introduced. Exchange of hardware, software and staff between organizational
version of any particular information system for the whole organization, and to store any item
of data once and only once. As a result, there is no wasted effort, no wasted storage capacity,
organizational focus for learning and for control. This is likely to produce higher quality
20
avoiding the decentralization problems of inadequate security, maintenance and
documentation, and by
allowing technology purchases and system developments that are not organizational
undertaken more cheaply per unit. Items purchased externally – computers, software packages,
consumables, staff training, etc. can be decided upon once and then bought in greater bulk.
Easy to manage
Disadvantages
Resource Constraints: Centralized approaches require the commitment of four key resources:
The central computer performs the computing functions and controls the remote terminals.
This type of system relies totally on the central computer. Should the central computer crash,
3.4.2 Decentralized DP
Decentralized computing is a trend in modern day business environments. This is the opposite of
centralized computing, which was prevalent during the early days of computers. Decentralized
computing is the allocation of resources, both hardware and software, to each individual
workstation, or office location. In contrast, centralized computing exists when the majority of
21
Unlike the centralized centre, each location has its own data processing equipments and staffs. The
system can operate independently but may be linked to bigger systems for enhanced operations i.e.
the centre can operate on their own but may be affiliated to larger systems for enhanced
performance. The method used here is otherwise called distributed data processing.
Advantages of Decentralized DP
Disadvantages of Decentralized DP
The system may not be large enough to justify employment of specialize DP staff therefore
Duplication of effort: it tends to be very costly because units will often duplicate what others
are doing. Duplication may cover analysis, design and implementation of information systems,
gathering and administration of data, and system operation, support and maintenance.
Since data of similar entities are held simultaneously in two or more different locations, it
tends to become inconsistent. No one knows which, if any, version of the data is the most
accurate or up-to-date.
22
Centralization versus Decentralization
A centralized computer centre handles all processing at a single computer site, maintains a single
central database, has centralized development of applications, provides central technical services,
sets development priorities centrally, and allocates computer resources centrally. The system’s
remote users are served by transporting input and output data physically or electronically.
communication links among autonomous computing units, and stand-alone processors and
databases at various sites. Each unit funds its own information processing activities and is totally
An advantage of centralized computer centre is that they provide for standardization in the
collection of data and the release of information. There are also some economies of scale.
Centralized computer centre reduces the need for multiple hardware’s, software’s, space, personnel
and databases. It may be possible to recruit more qualified personnel in a central facility.
User motivation and satisfaction are increased under a decentralized environment. This is attained
because users feel more involved and more responsible, systems are better customized to their
specific needs, and they usually get better response time in routine operations as well as in requests
for changes.
Depending on the type of computer centre, certain factors have to be considered when installing
23
a) Local Support: It is important to discover the level of support available locally from different
manufactures of hardware. In most cases, the availability of such support would be a major
factor in preferring a particular make of machine, even if initial cost are higher.
b) Hardware Security: Physical security around computer centres and laboratories need to be
stepped up because of the activities of looters. Security attention should be given to the
computer hardwares because of their small sizes; if the physical security is slack valuable and
c) Dust: It is almost always advisable to provide dust cover on computer equipment when not in
use, and in some areas special dust filters may be needed to prevent dust penetrating the casing.
d) Heat: Because of the heat been produced by the computer, full air conditioned office is highly
imperative. It is advisable to buy portable air condition unit or install cooling fan in micro
itself.
e) Power Supply: Computers can not function without electricity. Electric generators must be
provided at the centre incase of the public power supply failure. In addition, the generator
should be supported with power stabilizer and uninterruptible power supply (UPS). Power
stabilizer protect the computer the harmful effects of fluctuations while UPS maintain the
continuity of power supply in the gap between the switch over public supply to in- house
electric contact; it may be advisable to use non- corrodible plugs and socket or to use a contact
g) Accessories: It is essential to have a supply of computer accessories and part of a micro and
24
h) Workshop: Basic maintenance facilities will be needed. It is not necessary to be an electronic
engineer to do routine maintenance such as disc head alignment, to change board in the
computer, or to run the diagnostics programs which will at least help to locate a fault.
i) Communication Facilities: These facilities must be provided to provide a link between the
j) Space Requirement: From 400sq. ft. to several hundred thousand sq. ft; length-to-width ratio
k) Floor loading: should be sufficient, preferably with a sound-absorbent and antistatic covering.
1. Site Selection
False ceiling
Air conditioner
Rooms to be designed
Machine room
25
Technician area
Training rooms
Director rooms
Secretary rooms
Toilet
Rest rooms
Areas for storing power units and air conditioners: such areas are needed to be designed so
3.7 Planning should take into account the following special conditions:
Quiet zone in personnel areas (management offices, system support, operations scheduling,
Solid and soundproof walls (over 40 dB in passage ways to separate air conditioned from non
Extensive use of moveable walls to allow for ongoing adjustments to technical and task-related
developments
Inclusion of reserve space in air conditioned and non air conditioned areas
26
Provisions for visitors so that they do not disturb operations: (Many computer centers no
longer permit machine room tours for security reasons, but portion of the operation may be
4.0 Conclusion
The Computer Centre is a service unit that utilizes computing resources to provide diverse
computer services to the general public. The two types of computer centre are: centralized
5.0 Summary
In this unit you have learnt that depending on the type of computer centre, certain factors have to
be considered when installing computer system. These factors are: Local Support, Hardware
Security, Dust, Heat, Power Supply, Humidity Accessories, Workshop, Communication Facilities,
27
Unit 4: Recruitment Techniques
1.0 Introduction
Employment, recruitment and selection of personnel depend on the position of the economy of a
country. These account for situations where people tend to remain in a particular job for many
years while in some cases, people move to another job for better offer, hence recruitment exercise
is necessary. Therefore recruitment is a way of hiring people and their skills in particular field or
industry. Recruitment thus opens the window for skill evaluation and a quality control over
This exercise may involve the use of appointment consultants or direct employment into an
It is important to state that ‘recruitment is more than the literal meaning employment’. It means
Duration of services
2.0 Objectives
define recruitment
28
explain the types of recruitment techniques
discuss the main sources of recruitment
state the procedures for recruiting staffs
mention the policy for recruiting staff
(i) Advertisements: This can be done through, media houses like newspapers, journals, radio,
television, internet and so on. Advertising agencies could be used to execute this task. Correct
choice of media is highly necessary. Emphasis should be laid on the quality of the placed
adverts. Such advertisement must be carefully worded, neatly set out, and stressing the main
features. On the other hand, a poor advertisement may raise doubts about the company’s ability
and efficiency. Salary range, name of the company, prospects and box numbers should be
(ii) Employment Services Agency: The method is used to recruit manual worker and clerical
staff. A register is maintained which shows the reward of the people seeking jobs.
(iii)Employee Recommendations: These have the advantage that applicants will know a lot
about the firm when they arrive and employee may have more interest in their work if
allowed to recommend workers. This can be done by employee or by other personalities that
have a good knowledge about the job and its state. It helps to acquire scarce skills at reduced
prices.
29
(iv) Private employment bureaus which charge fees for every employee supplied.
(v) Universities, technical colleges, schools and other training centres can be used as a source of
recruitment. This avenue gives an opportunity to employ the best from bodies.
The aims and objective of management development is to get the right man, with the right
equipment, in the right place at the right time. Many organizations tend to use consultants for the
following reason:
iii) Information about the candidates, the abilities and experience acquired will be known.
This is a method of recruiting workers whereby a panel is set up in an organization to carry out the
exercise. When the short list of candidates for interview is drown up. A time table should be
prepared allocating specific periods for each interview so that there is sufficient time to interview
30
iv) to provide candidates with more information about the job.
a) A staff requisition form is required to be completed by the department where the vacancy
arises, noting full detains of the vacancy, job title date of commencement. This form can then be
d) References can be taken up before the interviews and are used to determine the final selection of
the interviews.
e) Interviewing of the candidates. This may be structured using standard procedures and techniques
or unstructured.
f) Test for specific skill often come up during interview. Professional qualifications claimed should
be checked.
g) Medical examination is also necessary to determine those that are fit or otherwise for the job.
The nature of job in consideration determines what policy is used. The management of the company
31
(a) Recruitment of Experienced Personnel: Some job don’t allow for inexperience personnel. The
employ of experienced personnel could be more expensive but it will provide a good ground for
Advantages:
Disadvantages
Staff of the present company could be asked to go for training courses to build the necessary skill
Advantages
No change of personnel
Versatility of personnel
Less expensive
Disadvantages
32
4.0 Conclusion
In this unit, you have learnt on recruitment techniques, main source of recruitment, procedure for
5.0 Summary
In this unit you have learnt that recruitment is a way of hiring people and their skills in particular
field or industry. The main sources of recruitment are advertisement, employment service agency,
employee recommendation, professional Organizations, the use of staff notice board, private
employment bureaus and universities, technical colleges, schools and other training centres.
33
Unit 5: Performance Measurement
1.0 Introduction
During all phases of the production of a real - time system it is necessary to be able to measure the
performance of those parts of the system already constructed or to be built, this will enable the
designer to know how to gauge whether the system is going to meet the performance requirements
or in some point during the system development, a decision must be made as to what computing
Once the system is constructed, it is possible to obtain an accurate measure of system performance.
From this, it is possible that the system will meets its requirement and to highlight any areas needing
further optimization.
2.0 Objectives
Hardware performance is usually modeled as a set of parameters like clock cycle rates, instruction
execution times, store access time, bus speed and direct memory access speeds. The magnitude of
these parameters will have a fundamental effect on the ultimate performance of the system. Great
care must be taken when using any given parameters to compare the efficiency of two difference
pieces of hardware. The parameters cannot be taken in isolation; they must be viewed in light of
34
overall system behavior. Other techniques that can be used to model system hardware including the
following:
i) Instruction Mixes: These are mathematical models (models of programs) formed by calculating
a figure of merit and this model are expected in running system. This figure is determined by
adding together the execution times of each instruction weighted by the relative frequency with
ii) Synthetic Program: This involves an act of writing a program to emulate the behavior
expected of typical programs in the final system rather than making assumptions as to the
expected instruction mix. This is called a synthetic program. The program simply exercises the
hardware in a way thought to be typical of the future system software. Again, a figure of merit is
program in a complete system. This program forms part of the system. It runs on the hardware
and the performance is measured, hence the method provides a more realistic workload. The
method is limited to existing system; the hardware must be available and the program written.
Modeling techniques are used during preliminary stages of system design and development, when
the system and its facilities are not yet in operation. However, once the system reaches the
construction stage, performance information can be obtained by observing the actual system. This
35
(i) Hardware Monitors
These consist of hardware devices design for data performance with an analysis program which
summarizes the data collected. Hardware monitor have great advantages of being totally
independent of the system under examination. The monitor can be used to measure clock cycles,
values in any part of the hardware as well as event occurring simultaneously in different part of the
system.
Limitation
The monitor can only provide information as to data bus and address bus values, register values,
etc, but can not translate information derived from a hardware monitor into meaningful behavior
system data.
A software monitor is program whose job is to collect and store data concerning the state of the
system pre- determined times. The major advantage of software is that it can be given knowledge
of the variable names, process and other logical items in the system. It can monitor the system as it
is seen by designer.
Limitation
Software monitors have inherent disadvantages. Running a software performance monitor can be
disturb and may even bias the behavior of the system under observation. This is especially true in a
real- time environment where the timing of process activity is so important. Software monitors can
be standing or embedded.
36
Properties of Performance Monitor
(a) At the prime requirements, the monitor must be able to extract the necessary performance
characteristics from the system it is measuring, that is, the monitor should access information
associated with the status of the various system entities. Again, it implies that the sampling rate
is sufficiently rapid to recognize every occurrence of all significant events and that some
(b) The monitor must not cause minimum interference to the system being measured. That is, the
monitor must use the minimum of processing time and take up a small area of memory as
possible.
(c) The monitor must be convenient to use. It must be easily incorporated in the system; the user
must be able to adjust the fineness of observation and the events when triggering the
4.0 Conclusion
This unit explains the modeling techniques used to predict system behavior and the monitoring
5.0 Summary
Hardware performance is usually modeled as a set of parameters like clock cycle rates,
instruction execution times, store access time, bus speed and direct memory access speeds.
Other techniques that can be used to model system hardware including the following: instruction
37
Performance information can be obtained by observing the actual system and this can be done in
38
UNIT 6: Backup Processing Alternatives
1.0 Introduction
For security and other reasons like cost effectiveness, there is a need to plan for an alternative
centre. This unit describes the alternatives that are currently available and provide guidance on
2.0 Objectives
Contingency planning involves the preparation of procedures that will facilitate a timely recovery
from events that disrupt data processing and recovery action procedures.
processing requirements. These document specifies requirement categories that planner may use as
a guide for defining site-specific requirements. This requirement will serve as criteria for selecting
Selection of any alternative depends upon the severity and longevity of a harmful effect. No matter
what circumstances arise, it is prudent to develop backup procedures and to select alternative
39
processing support in advance. A well documented, thoroughly tested and workable strategy will
help reduce long delays and hasten a rapid return to normal operations. Depending on the size of
Senior management must take responsibility for planning, funding, implementation, testing and
follows:
i) Conduct risk analysis, that is, the process of identifying, either quantitatively or qualitatively,
ii) Identify critical applications. These are those without which the organization could not
function. Prior identification of applications which support major business functions will help
reduce delays and hasten the prompt start of critical processing. These critical applications
iii) Rank critical applications based on their importance to the mission of the organization. This
hasten implementation with fewer delays and loses that can result in interrupt data processing
iv) Defined critical time delays that can be tolerated without degrading the mission.
vi) Ensure the backup site can provide sufficient computer resources to handle the critical work
load.
40
vii) Ensure the site being considered will be available within sufficient time to meet processing
schedules.
viii) Ensure the backup site can provide a compatible hardware configuration.
ix) Ensure the operation system software at the alternate facility is compatible.
x) Ensure the alternate site can provide enough space to accommodate essential staff.
xi) Ensure the adequacy of the environmental systems at the alternate facility.
xiii) Evaluate the location of the backup facility, planning resolutions for possible problems that
xiv) Develop a comprehensive test plan ensuring the backup facility will allow adequate time for
testing.
xv) Ensure that security controls at the alternate facility provide a sufficient level of protection
xvi) Understand all pricing agreements, allocating funds for backup supporting advance of an
emergency.
The preceding section discussed the requirements and criteria for evaluating alternate processing
methods. This section describes the alternatives and discusses the criterion that is significant for
each alternative.
41
All this backup alternatives help to recover from disaster and prevent the occurrence of such. The
Application backup
Service bureaus
Time brokers
Empty shells
Reciprocal agreements
Portable sites
Empty buildings
The company orders new equipment: hardware, software and prepare for the physical facilities set
42
(ii) Application Backup
The Company goes into agreement with a vendor who will supply the detail computing facilities to
Service bureaus provides contingency for a fee that are primarily used for production processing.
A contract is generally negotiated which requires subscribers to pay a monthly membership fee for
Advantages
Disadvantages
Support given to these service bureaus may change with normal business.
These serve as a resource for obtaining backup support. Time brokers fine, for a fee, available
processing time on other systems. Processing arrangements are made entirely through this third-
party service. Advantages and disadvantages are same as that of the service bureaus.
43
(v) Dedicated Contingency Centres (Or Hot Sites)
These are fully equipped computer centres which include one or more computer and standard
peripheral equipment. These centres are equipped with that of a large number of subscribing
organizations.
Telephone
Writing
Services are provided to the subscribers based on the order in which the notifications are received.
The centres provide compatible hardware and software configurations and additional peripheral
Advantages
Disadvantage
Shared contingency facilities are essentially the same as dedicated contingency centres. The
differences is in the fact that membership is typically formed by a group of similar organizations
which used or could use identical hardwares. Limited members are involved and as a result of this;
44
the use of facility is reduced. Again shared costs by members reduce budget impact on each
organization.
These are large unfurnished space which can be leased to house computers and
telecommunications equipment. Clients must provide hardware, prepare the shell for processing
and test the air condition, power and other facilities provided for effective use.
NOTE: that users are required to restore the site to its original state before leaving.
Advantages
Disadvantages
Reciprocal agreements are formally written, signed document between two or more facilities. Each
as agreed to allow other use of its computer resources during an emergency. A reciprocal
agreement requires that both organizations recognized that during an emergency both will operate
Advantages
It is less expensive
45
Disadvantages
The method consists of two or more data processing installations which are managed by the same
organization but are geographically located far enough so that they are not likely to be physically
affected by the same disaster. The hardware must be sufficient at each location to support the
Advantages
The approach proves effective provided such firm has means of establishing this centre.
Here all resources are put in one location. There is complete duplication of all hardware, software
and environmental systems. This method is viable in areas where there is no danger from floods,
tornados, hurricanes, earth faults and like conditions. Heavy security needs to be put in place.
Advantages
Disadvantages
It is very expensive
46
(xi) Reversion to Manual Processing
This approach reverts back to a manual operation: It may be workable choice if manual procedures
that duplicate the automated processes are documented otherwise the method may be impractical
to rewrite them. This approach can be used with another alternative. Although the completion of
work is slow.
ensure less dependence on the central host for computing power because of the jobs that can be
Advantages
Disadvantages
Database Inconsistence
Trailers can be equipped with minimal hardware and environmental control and brought to a
designated location for backup processing. It provides some processing support and may be
47
(xiv) Empty Building
These are warehouses or other buildings which can be wired, equipped, furnished and
environmentally prepared.
Advantages
It can be converted into data facility and later used for overload operations.
It can provide office space when it is not available at the alternate facility.
Disadvantages
(xv) Insurance
Insurance is neither a method nor a substitute for developing an alternate processing strategy. It is
a method for obtain financial reimbursement for the loss of hardware and the physical facility but
4.0 Conclusion
This unit explains the action necessary for developing a successful backup processing strategy and
also describes the alternatives and the criterion that is significant for each alternative.
5.0 Summary
48
Contingency planning involves the preparation of procedures that will facilitate a timely
recovery from events that disrupt data processing and recovery action procedures.
Selection of any alternative depends upon the severity and longevity of a harmful effect.
All this backup alternatives help to recover from disaster and prevent the occurrence of such.
The alternatives described in this section include: Passive approach method, Application
backup, Service bureaus, Time brokers, Dedicated contingency centre, Membership in shared
contingency facilities, Empty shells, Reciprocal agreements, Separate facilities under the same
management, Fortress concept with full redundancy, Reversion to manual processing, Use of
An effective system requires a steady backup processing alternatives and good plan. For the
security and cost effectiveness of the laboratory under care, briefly discuss the followings:
(a) Contingency planning
(b) Five actions that are necessary to develop a successful backup processing strategy
(c) Backup alternative considered the best for the laboratory and why?
49
UNIT 7: Equipment Selection
1.0 Introduction
Equipment selection involves the selection of a set of equipment to be used in production based on
technical and economical criteria. It involves the types and quantity of equipment required to
perform a variety of operation. Equipment selection should be undertaken by the data processing
committee upon the completion of the basic systems design. Recommendations are made by this
2.0 Objectives
There are two basic methods of selecting equipment but only one is recommended. These are:
Recommended approach
Alternative approach.
manufacturer conduct a length systems review on the firm’s premises. The approach is not
50
recommended because it disregards the data compiled by the feasibility study to date and requests
that the equipment manufacturers start from scratch. This approach consumes a lot of time and a
huge amount of money must have been expanded before carrying out the exercise.
Basically, there are four steps to be taken when selecting equipments for an organization, namely:
An equipment manufacture is determined on the basis of his interest in receiving a bid invitation.
Each manufacture should indicate in writing whether he wishes to receive a bid invitation. There is
no need to prepare a packet of specifications, flowchart, decision table, and comparable material if
Having shown interest in receiving invitation the company submits bid invitation to the interested
equipment supplies. In this case, the same set of data is sent to all competing manufacturers. Data
submitted to these manufacturers must be complete and self explanatory. Bid invitations submitted
51
design of new system
This is taken directly from the system analysis and system design phases. The contents of the bid
Planned inputs.
Output needs.
52
Other requirement and considerations.
The use of flowchart and decision tables accompanying each bid invitation is necessary. They
depict the new system design for each functional areas as well as interrelationships among new
systems.
During the conference, legitimate questions will be raised by the various firms. Many of questions
After submission of the proposal by each manufacturer, the next step is oral presentation. Which
will hit the important point of the proposal and the representatives then compel to answer
questions? After the completion by all manufacturers, the data processing committee then
There are many criteria that can be developed for evaluating manufacturer’s proposal. Among
these are : extent of automation proposed, evaluating of throughput performance (though analysis
of the equipment time required to process the data ), type of equipment, method for acquiring
programming assistance contracts, compliance with terms of bid invitation among others.
53
3.2.4 Select Equipment Manufacturer(s)
This is a difficult task for the data processing committee. The selection process is much easier. If
the equipment proposed is identical for all practical purpose. The choice is that this situation is
based on lowest cost equipment. In most cases, this approach is not generally used since most
manufacturers have certain equipment features that differ from their competitors. Hence various
A decision table for a final evaluation not only defines the important criteria in compact
notation, but also permits an objective evaluation, since the value has been determined before
the acceptance of the manufacturers. At the end of the exercise, a table is then prepare where
high scores are allocated for those manufacturers that perform well, the highest manufacturer is
selected. The method is realistic and precise approach in making this final decision for a real-
This consists of assigning different weighting factors to each criterion. Each manufacturer is
given a score for each for weighting factor. In most cases, the score is lower than the absolute
value of the weighting factor. The values of all criteria are totaled which represent the total
point for each manufacturer. As with decision table, the competitor with the highest score is
selected.
This involves evaluation of equipment superiority and performance. All aspect of the machines
performance must be included including those with various hardware speeds, reliability of the
54
equipment, efficient software and similar considerations. Having looked through various
methods the next step is to select best approach for evaluating process. The purpose of
spending so much time, effort and expense on the feasibility study is to obtain the best data
processing equipment for the firm. Having selected a manufacturer, the contract is signed by a
top-level executive, who has been the guiding force for both committees (executive and data
Many financing plans are available to the firm when acquiring data processing equipment.
These include rental, outright purchase, option to buy and third party leasing (lease back
arrangements).
(i) Rental Contracts: is the most common method of acquiring equipment which state the
specific monthly rate and the number of hours for operating on one, two or three shift basis
with rate adjustment for excessive down- time. Down- time is the time when the system is not
working. The terms of the contract including renewal, cancellation and manufacturer’s policy
or even rental are subject to careful evaluation by the data processing team. The policy of over
(ii) Purchase: The decision to purchase must take into account two important factors:
Obsolescence
By obsolescence, we mean a situation where equipment becomes outdated. Most firms that
purchase equipment do so just after a new generation of computers have been announced. Once
55
another generation is announced, the problem of disposal can be significant since the firm will
get a better trade on a new system with current manufacturer versus another one. This may
prevent the study group from selecting the best equipment for the proposed system because of
The decision to purchase or least is resolves sometimes by the number of shifts. An evaluation
of two or three shift operation gives a much higher return on investment resulting in a buy
decision.
4.0 Conclusion
This unit explains the equipment selection, approaches to equipment selection and the necessary
5.0 Summary
Equipment selection involves the selection of a set of equipment to be used in production based
The two basic methods of selecting equipment are recommended approach and alternative
approach.
The four steps involve in equipments selection for an organization are: determine equipment
56
6.0 Tutor-Marked Assignment
(a) State the two basic approaches used in selecting computer equipment.
(b) Describe the steps involved in equipment selection.
57
UNIT8: Management Information System
1.0 Introduction
Systems, is the discipline covering the application of people, technologies and procedures -
To manage effectively, the team needs some information that summarizes the activities of other
people in and outside the organization and show their effects, activities and functions individually
and collectively in the pursuits of the organization goals. Such information needed by management
The management information is needed as to who reports what to whom and what is to be done
with information generated from the basic activities of the business. As there is going to be both
vertical and horizontal movement of information, a system has evolved. There should be a realistic
2.0 Objectives
58
3.0 Main Content
In defining MIS, many authors did not fail to send a note of warning that there is no universally
accepted definition. It will hand on a good start if we look at this component of this compound
Management
Information and
System
A process by which scarce resources are combined to achieve given ends. This described an
The Management referring to those people carrying out thje activity. This should really be the
Managers.
The body of knowledge about the activity of Managing, regarded here as a special field of
The aspect of management we need for our purpose is one use in describing the body of decision
makers from supervisors and line managers, at the lower levels, to the Board of Directors.
Management in this sense is responsible for planning, organizing, implementing and evaluating the
policies for the organization. It uses tools available to it to control, coordinate, communicate and
59
For policies to be formulated and for these policies to be translated into actions, the management
Information: is whatever is communicated in form of a processed data for effective planning and
control of organizations activities. It is the output element of data processing systems. It is derived
from data which has been subjected to an umber of data processing operations converting related
groups of related but meaningless data into a useful form for its recipients.
such a way as to ensure the efficient functioning of the system as whole, necessitate a high degree
of co-ordination between the sub-systems, each of which is designed to achieve a specific purpose.
A system is the detailed plan of management for interrelationship and interaction of available
management at all levels in all functions with appropriate information, based on data from both
internal and external sources, to enable them to make timely and effective decisions for planning,
directing and controlling the activities for which they are responsible.
The objectives of MIS include the provision of information to all levels of management at the most
60
3.3 Benefits of MIS
Management information systems can be used as a support for managers to provide a competitive
advantage which must support the goals of the organization. Most organizations are structured
(i) Accounting management information systems: All accounting reports are shared by all
levels of account managers. The emphasis of public sector MIS has been on money i.e. on
monitoring how much has been spent; on comparing this with budget; and on controlling
Statement of account: month-end, year-end, year-to-date, etc.; these will generally have to
be designed to fit the existing regulatory or legislative standards for public sector
accounting.
Warnings of budget head over or under spend against target; variance from planned budget
Statements of cash requirements in the month ahead based on payments still owed within
including the chief financial officer. The chief financial officer analyzes historical and
61
current financial activity, projects future finances and monitors and controls the use of
funds over time using the information developed by the MIS department.
(iii) Manufacturing management information systems: More than any functional area,
operations have changed. For instance, inventories are provided just in time so that great
amounts of money are not spent for wanting huge inventories. In some instances, raw
materials are even processed on railroad cars waiting to be directed to the factory. Thus
pricing, decisions, promotion effectiveness, and sales forecasting. More than any other
functional areas, marketing systems rely on the external source of data. These sources
information systems are concerned with activities related to workers, managers and other
individuals employed by the organization. Because the personnel function relates to all
other areas in business, the human resources management information system plays a
62
training, and job assignments. Management information systems are used in the entire
Recruitment and selection: for example, a summary report on the ethnic origin and sex of
all job applicants and recruits for use in equal opportunities monitoring.
Staff performance: for example, an exception report on only those secretarial staff that is
able to take shorthand dictation and type at over 50 words per minute.
Training: for example, an ad hoc report on all those staff who have received training in
gender awareness.
Staff promotion: for example, a detail report on all performance assessments for a
Staff departure: for example, a comparative report on turnover rates and reason of
Pensions: for example, a summary report on recent annual pension funds growth rates.
4.0 Conclusion
This unit explains the meaning, objectives and benefit of management information system and also
5.0 Summary
management at all levels in all functions with appropriate information, based on data from both
63
internal and external sources, to enable them to make timely and effective decisions for
planning, directing and controlling the activities for which they are responsible.
The benefits of MIS are: faster decision making and control through provision of timely
information; and better decision making and control through provision of relevant information
The five types of MIS are: accounting management information system, financial management
64