Thursday, April 14, 2011

Finalize.......

Time flies...!! it's now comes to the end of 2nd semester....
In this semester, we found that IT is actually an interesting subject as the lectures won't be so boring compared to other subjects which only sitting in the classroom listening to the lecturer...
At least we still can do something different for this subject such as doing blog assessment and listening to lecturer with the computer in class..

After this semester, we have learnt a lot of information and knowledge about IT...
we also have the urge learn it because we believe that IT will be a very important issue in the future, the growth of the civilization will depends on it..

Furthermore, the content of this subject such as the internet and PC devices are the most favorable for the teenagers in university today..as what I have seen other people wrote,
"if you want to kill an undergraduate student, you just need to cut off his or her internet connection !! " hahax !
it's means that internet is very important to us today for every single minutes...

Through this subject, we have learnt about the information system which are people, procedure, software, hardware and data. We known about many different types of hardware available for different function. 

Other than that, we learn about the internet and web access, knowing how to use the web to help in making our daily more conveniently for example the electronic commerce, using databases to help in management procedures and etc. Besides that, we learnt about the privacy and security of the networks so that we will have a mind of prevention against hazards  and computer crimes.

IT has made us know more clearly about the details for the parts in computer such as the input and output, secondary storage and other computer devices. We also have been introduced about many other software we do not know before and giving variety choices of software as well as internet browser when we doing our works. Introduction on the procedures of programming also new to us.

With all this knowledge, we can follow up the trend of the growth of information technology from time to time and assure of our standing in technology field. Although we are management course students, but who knows that maybe in the future, we will work in the technology industry? 

Lastly, thanks to our lecturer Puan Sharin Hazlin bt. Huspi for guiding us along the semester.


Tuesday, April 12, 2011

TECHNOLOGY & ORGANIZATIONS

Technology play an important role nowaday. It can introduce news ways for business to compete with each other.  They can compete by
  • creating new products
  • establishing new enterprises
  • developing new customer and supplier relationships
NEW PRODUCTS
Products created are often better quality and operate faster. Somemore they are cheaper if compare to others. New products can be individually tailored to a particular customer's need.

NEW ENTERPRISES
New businesses can be builded by technology. There are two examples which are Internet service providers and Web site development companies. Now, there are thousands of national and local internet service providers available. Thousands of small companies specializing in developing web sites have sprung up too!!

NEW CUSTOMER AND SUPPLIER RELATIONSHIPS
Business that make the information system easily available make customer less likely to take their business anywhere.

citation: Timothy J.O'Leary , Linda I.O'Leary, 2011, Computing Essentials Complete 2011, Your Future and Information Technology, (pg434-443)

Monday, April 4, 2011

C++ programming tutorial

,



C++ Pragramming Language - Tutorial

Structure of a program

Probably the best way to start learning a programming language is by writing a program. Therefore, here is our first program:






The first panel shows the source code for our first program. The second one shows the result of the program once compiled and executed. The way to edit and compile a program depends on the compiler you are using. Depending on whether it has a Development Interface or not and on its version. Consult the compilers section and the manual or help included with your compiler if you have doubts on how to compile a C++ console program.

The previous program is the typical program that programmer apprentices write for the first time, and its result is the printing on screen of the "Hello World!" sentence. It is one of the simplest programs that can be written in C++, but it already contains the fundamental components that every C++ program has.



Programming language

A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it understands) and a special syntax for organizing program instructions.

High-level programming languages, while simple compared to human languages, are more complex than the languages the computer actually understands, called machine languages. Each different type of CPU has its own unique machine language.

Lying between machine languages and high-level languages are languages called assembly languages. Assembly languages are similar to machine languages, but they are much easier to program in because they allow a programmer to substitute names for numbers. Machine languages consist of numbers only.

Lying above high-level languages are languages called fourth-generation languages (usually abbreviated 4GL). 4GLs are far removed from machine languages and represent the class of computer languages closest to human languages.

Regardless of what language you use, you eventually need to convert your program into machine language so that the computer can understand it. There are two ways to do this:
# compile the program

 # interpret the program

The question of which language is best is one that consumes a lot of time and energy among computer professionals. Every language has its strengths and weaknesses. For example, FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. Pascal is very good for writing well-structured and readable programs, but it is not as flexible as the C programming language. C++ embodies powerful object-oriented features, but it is complex and difficult to learn.

The choice of which language to use depends on the type of computer the program is to run on, what sort of program it is, and the expertise of the programmer. 

http://www.webopedia.com/TERM/P/programming_language.html 

Saturday, April 2, 2011

10 Essential Design Tools for Social Media Pros

Good design is a critical part of any web or social media presence. Like the clothes you wear to a job interview or a business meeting, a sharp looking social profile or website is the first step toward being taken seriously online.
Whether you’re a professional designer or an armchair artiste, tools abound that you can use to snazz up your web presence, and give it that polish that professionals, potential customers, and online friends have come to expect from a social media maven. We’ve talked to the experts about what they use for inspiration, collaboration, and getting down to the business of design in a social media world. Here are some of the suggestions they offered up.

1. Core Application Alternatives







InkScape Image

2. Design Communities

 
Society6 Image

3. Design Element Resources


Dezignus Image

4. IconFinder

 

5. MockFlow

 
MockFlow Image

6. Notable


Noteable Image
 

7. Campaign Monitor

 
Campaign Monitor Image

8. Proposable


Proposable Image

9. Freshbooks


Freshbooks Image

10. 960 Grid System


960 Grid Image



Programming

Clarify Programming Needs


Six mini steps:
  • Clarify objectives and users
  • Clarify desired outputs
  • Clarify desired inputs
  • Clarify desired processing
  • Double - check feasibility of implementing the program
  • Document the analysis

Design the Program

Programs use algorithms which are like equations that tell the computer what task to perform. The aim of the programmer is to create algorithms that are clear and simple. Algorithms are expressed first in logical hierarchical form known as modularzation. Using modules or (a complete thought) the programmer creates a logical thought process for the computer to follow. After that the program is broken down in greater detail using pseudocode. Pseudocode uses terms like if, else, and, then to relate the programs rules to the computer.


Code the Program

After the program has been designed it must be coded or written. Using the pseudocode and logic requirements from step two an appropriate programming language must be selected. As stated in the introduction, coding languages differ in specifications and usability. Once the appropriate code language has been chosen, it is imperative that the programmer follow the syntax rules with as little deviation as possible in oder for the program to have high accuraccy.
Two mini steps:
  • Select the appropriate high-level programming language
  • Code the program in that language following the syntax carefully

Test the Program

Testing the program comes in two phases, alpha and beta.
  • Alpha testing is the process of reading through the program in search of errors in logic. The second step is to run a diagnostic program to search for syntax or input errors.
  • Beta testing involves using the program in the real world to see if it contains any bugs or other deficiencies.

Document and Maintain

Documentation should be ongoing from the very beginning because it is needed for those involved with program now and future. Upon completion User Documentation for commercial use, Operator Documentation for people who run computer systems, and Programmer Documentation for programmers charged with maintenance.
Four mini steps:
  • Write user documentation
  • Write operator documentation
  • Write programmer documentation
  • Maintain the program
http://en.wikibooks.org/wiki/The_Computer_Revolution/Programming/Five_Steps_of_Programming

Sunday, March 27, 2011

PROTOTYPE

A prototype is an early sample or model built to test a concept or process or to act as a thing to be replicated or learned from.

Advantages of prototyping

  • May provide the proof of concept necessary to attract funding
  • Early visibility of the prototype gives users an idea of what the final system looks like
  • Encourages active participation among users and producer
  • Enables a higher output for user
  • Cost effective (Development costs reduced).
  • Increases system development speed
  • Assists to identify any problems with the efficacy of earlier design, requirements analysis and coding activities
  • Helps to refine the potential risks associated with the delivery of the system being developed
  • Various aspects can be tested and quicker feedback can be got from the user
  • Helps to deliver the product in quality easily
  • User interaction available during development cycle of prototype

Disadvantages of prototyping

  • Producer might produce a system inadequate for overall organization needs
  • User can get too involved whereas the program can not be to a high standard
  • Structure of system can be damaged since many changes could be made
  • Producer might get too attached to it (might cause legal involvement)
  • Not suitable for large applications
  • Over long periods, can cause loss in consumer interest and subsequent cancellation due to a lack of a market (for commercial products
http://en.wikipedia.org/wiki/Prototype

Rapid application development-RAD

Rapid application development (RAD) refers to a type of software development methodology that uses minimal planning in favor of rapid prototyping. The "planning" of software developed using RAD is interleaved with writing the software itself. The lack of extensive pre-planning generally allows software to be written much faster, and makes it easier to change requirements.




Pros
Minimizes feature creep by developing in short intervals resulting in miniature software projects
and releasing the product in mini-increments.
Cons
Short iteration may add too little functionality, leading to significant delays in final iterations.
 Since Agile emphasizes real-time communication (preferably face-to-face), using it is problematic
 for large multi-team distributed system development. Agile methods produce very little written
 documentation and require a significant amount of post-project documentation.
Pros
Lowers the cost of changes through quick spirals of new requirements.
Most design activity occurs incrementally and on the fly.
Cons
Programmers must work in pairs, which is difficult for some people.
 No up-front “detailed design” occurs, which can result in more redesign effort in the long term.
The business champion attached to the project full time can potentially become a
 single point of failure for the project and a major source of stress for a team.
Pros
Captures the voice of the customer by involving them in the design and development of the
application through a series of collaborative workshops called JAD sessions.
Cons
The client may create an unrealistic product vision and request extensive gold-plating,
 leading a team to over- or under-develop functionality.
Pros
Creates minimalist solutions and delivers less functionality earlier
Cons
Product may lose its competitive edge because of insufficient core functionality
and may exhibit poor overall quality.
Rapid application development (RAD)
Pros
Promotes strong collaborative atmosphere and dynamic gathering of requirements.
Business owner actively participates in prototyping, writing test cases and performing unit testing.
Cons
Dependence on strong cohesive teams and individual commitment to the project.
 Decision making relies on the feature functionality team and a communal decision-making
 process with lesser degree of centralized PM and engineering authority.
Pros
Improved productivity in teams previously paralyzed by heavy “process”, ability to prioritize work,
 use of backlog for completing items in a series of short iterations or sprints, daily measured
 progress and communications.
Cons
Reliance on facilitation by a master who may lack the political skills to remove impediments
and deliver the sprint goal. Due to relying on self-organizing teams and rejecting traditional
 centralized "process control", internal power struggles can paralyze a team.


Table 1: Pros and Cons of various RAD types

System Maintenance

In the early days, home computers were largely self-referential; people used them because they were interested in them. Now, computers are usually used for real-world tasks, yet they still need some navel-gazing attention at times!
The basic routine maintenance tasks are:
User data is unique to the installation and cannot be replaced 'off the peg', and for that reason it is the central concern of system management. There's a more rigorous coverage of data management, safe computing and malware elsewhere on this site; this is an easy how-to.
Backup
To backup is to create a redundant copy, so that if anything should happen to the original file, you have recourse to the backup. The process can be as simple as copying files to diskettes, but this soon becomes a problem where files are too big for diskette, where there are too many files, or where too many diskettes are required.
A better solution is to use an archiver (such as WinZip) or a backup utility to create a single compressed file from a collection of data files, and to split this over as many diskettes as required. This uses fewer diskettes and allows large files to be backed up even if the file is larger than a diskette can hold.
For large data sets, you may need to use a bulk storage medium such as tape, Zip disk, CDR or similar. These are generally faster and more reliable than diskettes.
The systems I set up will usually have a facility to backup data and core system files to the hard drive, and another to copy the most recent of such backups to diskettes. You should use this whenever you have done more work than you would want to redo from scratch. If your work is saved outside the designated data subtree then it won't be backed up by this process; you will have to make your own arrangements to back it up (WinZip, copy, etc.)
Malware management
There's more on safe computing and malware. Malware includes viruses, worms, trojans, and increasingly invasive commercial applications, and management has several parts:
  • Risk avoidance and evaluation - choice of applications and system setup
  • Risk avoidance and evaluation - user education and safe computing practice
  • Risk detection and destruction - choice and use of antivirus software
  • Keeping abreast of malware - antivirus updates and ongoing user education
Simply running an antivirus utility is not enough, even if it is kept up to date!
For best performance, you can use on-demand rather than on-access antivirus scanners - but this requires the user to know when to use this, and act accordingly.
Updating an antivirus generally involves these steps:
  • Go to antivirus vendor's web site via (say) Internet Explorer
  • Navigate to the download section of the site
  • Download any updates that are relevant, noting where these are saved
  • Extract files from downloaded archive to the antivirus program directory
Some Windows-based antivirus utilities may automate this process to some extent, by accessing the Internet directly from within the program. You should check for updates at least once a week, and make sure your antivirus data files do not become more than a month out of date.
File system maintenance
Much can be done during system setup to improve the survivability, maintainability and recoverability of the file system and its data, as discussed on the data management page. Thereafter, there are three tasks required on a regular basis:
  • Check that sufficient free space is available; ideally 50M+ on C: volume
  • Check the file system for errors, and manage these
  • Defragment the file system once it is known to be error-free
The tools used here are Windows Explorer (or its "My Computer" incarnation), ScanDisk, and Defrag. If free space is low, you can clear .TMP files from the Windows base directory.


http://cquirke.mvps.org/9x/maintain.htm

Wednesday, March 23, 2011

System Analysis and Design

System
A collection of components that work together to realize some objective forms a system. Basically there are three major components in every system, namely input, processing and output.

                                               s1.gif (1492 bytes)
System Life cycle
System life cycle is an organisational process of developing and maintaining systems. It helps in establishing a system project plan, because it gives overall list of processes and sub-processes required developing a system.
System development life cycle means combination of various activities. In other words we can say that various activities put together are referred as system development life cycle. In the System Analysis and Design terminology, the system development life cycle means software development life cycle.

Different phases of Software development Life Cycle

(a) System Study
System study is the first stage of system development life cycle. This gives a clear picture of what actually the physical system is? In practice, the system study is done in two phases. In the first phase, the preliminary survey of the system is done which helps in identifying the scope of the system. The second phase of the system study is more detailed and in-depth study in which the identification of user’s requirement and the limitations and problems of the present system are studied. After completing the system study, a system proposal is prepared by the System Analyst (who studies the system) and placed before the user. The proposed system contains the findings of the present system and recommendations to overcome the limitations and problems of the present system in the light of the user’s requirements.

(b) Feasibility Study
On the basis of result of the initial study, feasibility study takes place. The feasibility study is basically the test of the proposed system in the light of its workability, meeting user’s requirements, effective use of resources and .of course, the cost effectiveness. The main goal of feasibility study is not to solve the problem but to achieve the scope. In the process of feasibility study, the cost and benefits are estimated with greater accuracy.(c)

(c)System Analysis
Assuming that a new system is to be developed, the next phase is system analysis. Analysis involved a detailed study of the current system, leading to specifications of a new system. Analysis is a detailed study of various operations performed by a system and their relationships within and outside the system. During analysis, data are collected on the available files, decision points and transactions handled by the present system. Interviews, on-site observation and questionnaire are the tools used for system analysis.

(d) System Design
Based on the user requirements and the detailed analysis of a new system, the new system must be designed. This is the phase of system designing. It is a most crucial phase in the development of a system.

(e) Coding
After designing the new system, the whole system is required to be converted into computer understanding language. Coding the new system into computer programming language does this. It is an important stage where the defined procedure are transformed into control specifications by the help of a computer language. This is also called the programming phase in which the programmer converts the program specifications into computer instructions, which we refer as programs. The programs coordinate the data movements and control the entire process in a system.
It is generally felt that the programs must be modular in nature. This helps in fast development, maintenance and future change, if required.

(f) Testing
Before actually implementing the new system into operations, a test run of the system is done removing all the bugs, if any. It is an important phase of a successful system. After codifying the whole programs of the system, a test plan should be developed and run on a given set of test data. The output of the test run should match the expected results.

(g) Implementation
After having the user acceptance of the new system developed, the implementation phase begins. Implementation is the stage of a project during which theory is turned into practice. During this phase, all the programs of the system are loaded onto the user's computer. After loading the system, training of the users starts.
 
(h) Maintenance
Maintenance is necessary to eliminate errors in the system during its working life and to tune the system to any variations in its working environment. It has been seen that there are always some errors found in the system that must be noted and corrected. It also means the review of the system from time to time.  

From: http://www.laynetworks.com/cs05_SAD_4a.htm

Monday, March 21, 2011

How And When Database Helps Us?

The main advantages of using database is fast and efficient data retrieval. Database enable user to break data into specific parts to helps you rapidly query the data in the way you requested. We take the hypermarket sales as example, the marketing manager can store the sales details of every product in related databases, in such way, the question "What is the sales of product X for the last 3 months?" can be very easy and accurate to be answered. If all the information of the thousands of product available in the supermarket recorded into a large text file, its impossible to find out the data of specific product item.

Database also allows you to set up rules to ensure the data remains consistent and up-to-date when you modified it. You can set a unique ID for each of every product (unique identifier) so that all the product won't get mixed up, or else, telling the sales data of a product becomes impossible. A properly set-up database makes work efficiency and minimizes data redundancy.

Modified from : http://e-articles.info/e/a/title/Why-and-When-to-Use-a-Database/

Sunday, March 20, 2011

How To Create Access Database Relationships?



http://www.youtube.com/watch?v=bBHewXpSgQQ

Physical & Logical Views of Data

A database management system provides the ability for many different users to share data and process resources. But as there can be many different users, there are many different database needs. The question now is: How can a single, unified database meet the differing requirement of so many users?


A DBMS minimizes these problems by providing two views of the database data: a logical (external) view and physical (internal) view. The logical view/user's view, of a database program represents data in a format that is meaningful to a user and to the software programs that process those data. That is, the logical view tells the user, in user terms, what is in the database. The physical view deals with the actual, physical arrangement and location of data in the direct access storage devices(DASDs). Database specialists use the physical view to make efficient use of storage and processing resources. With the logical view users can see data differently from how they are stored, and they do not want to know all the technical details of physical storage. After all, a business user is primarily interested in using the information, not in how it is stored.

One strength of a DBMS is that while there is only one physical view of the data, there can be an endless number of different logical views. This feature allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. Thus the logical view refers to the way user views data, and the physical view to the way the data are physically stored.


http://astahost.com/info.php/logical-physical-view_t20654.html

What is Data???

In computing, data is information that has been translated into a form that is more convenient to move or process. Relative to today's computers and transmission media, data is information converted into binary digital form.

In computer
component interconnection and network communication, data is often distinguished from "control information," "control bits," and similar terms to identify the main content of a transmission unit.

In telecommunications, data sometimes means digital-encoded information to distinguish it from analog-encoded information such as conventional telephone voice calls. In general, "analog" or voice transmission requires a dedicated continual connection for the duration of a related series of transmissions. Data transmission can often be sent with intermittent connections in packets that arrive in piecemeal fashion.

Generally and in science, data is a gathered body of facts.
Some authorities and publishers, cognizant of the word's Latin origin and as the plural form of "datum," use plural verb forms with "data". Others take the view that since "datum" is rarely used, it is more natural to treat "data" as a singular form.


http://searchdatamanagement.techtarget.com/definition/data

Tuesday, March 15, 2011

Types of Decision Support Systems (DSS)

Decision Support Systems (DSS) are a class of computerized information system that support decision-making activities. DSS are interactive computer-based systems and subsystems intended to help decision makers use communications technologies, data, documents, knowledge and/or models to complete decision process tasks.

A decision support system may present information graphically and may include an expert system or artificial intelligence (AI). It may be aimed at business executives or some other group of knowledge workers.
Typical information that a decision support application might gather and present would be, (a) Accessing all information assets, including legacy and relational data sources; (b) Comparative data figures; (c) Projected figures based on new data or assumptions; (d) Consequences of different decision alternatives, given past experience in a specific context.
There are a number of Decision Support Systems. These can be categorized into five types:

  • Communication-driven DSS Most communications-driven DSSs are targetted at internal teams, including partners. Its purpose are to help conduct a meeting, or for users to collaborate. The most common technology used to deploy the DSS is a web or client server. Examples: chats and instant messaging softwares, online collaboration and net-meeting systems.

  • Data-driven DSS Most data-driven DSSs are targeted at managers, staff and also product/service suppliers. It is used to query a database or data warehouse to seek specific answers for specific purposes. It is deployed via a main frame system, client/server link, or via the web. Examples: computer-based databases that have a query system to check (including the incorporation of data to add value to existing databases.

  • Document-driven DSS Document-driven DSSs are more common, targeted at a broad base of user groups. The purpose of such a DSS is to search web pages and find documents on a specific set of keywords or search terms. The usual technology used to set up such DSSs are via the web or a client/server system.

  • Knowledge-driven DSS
    Knowledge-driven DSSs or 'knowledgebase' are they are known, are a catch-all category covering a broad range of systems covering users within the organization seting it up, but may also include others interacting with the organization - for example, consumers of a business. It is essentially used to provide management advice or to choose products/services. The typical deployment technology used to set up such systems could be slient/server systems, the web, or software runnung on stand-alone PCs.

  • Model-driven DSS Model-driven DSSs are complex systems that help analyse decisions or choose between different options. These are used by managers and staff members of a business, or people who interact with the organization, for a number of purposes depending on how the model is set up - scheduling, decision analyses etc. These DSSs can be deployed via software/hardware in stand-alone PCs, client/server systems, or the web.


From: http://www.mis.cmich.edu/bis644/dss_01/sld001.htm

Transaction Processing System

Transaction processing
  • supported by programs that are called transaction processing systems.
  • provide three functional areas:
1.System runtime functions
 
Transaction processing systems provide an execution environment that ensures the integrity, availability, and security of data. It also ensures fast response time and high transaction throughput.
2.System administration functions
Transaction processing systems provide administrative support that lets users configure, monitor, and manage their transaction systems.
3.Application development functions
Transaction processing systems provide functions for use in custom business applications, including functions to access data, to perform intercomputer communications, and to design and manage the user interface.

The advantages of TPS
We have now seen the reasons why we need transaction processing systems. The advantages of three-tier applications in creating scalable and robust applications are made feasible by transaction processing systems. The ability to distribute the components that make up applications amongst separate servers without explicitly having to develop for that architecture is another advantage of transaction server processing. Transaction processing systems also ensure that transactions are atomic, consistent, isolated, and durable. This alleviates the developer from having to support these characteristics explicitly.

With all of these excellent reasons for developing an application that uses a transaction processing system, we now need a system that provides these features. We will now turn our attention to a transaction processing system that is part of the standard IIS 4.0 installation: Microsoft Transaction Server.
From:http://www.auditmypc.com/acronym/tps.asp



Office Automation System & Knowledge Work System

Knowledge work systems and office automation systems serve the information needs at the knowledge level of the organization. , where as office automation systems primary aid data workers (although they are also used extensively by knowledge workers)


Office Automation Systems

Automation allows Institution to update their activities 'in house'. Technical knowledge or web development experience is not necessary. Anyone who can use Microsoft Windows and can browse the internet will have no problem using this system. Entirely database driven, Automation is incredibly robust - making it suitable for sites ranging from low traffic, small business sites to large corporate sites requiring hundreds of updates daily.
One of the key elements in Office Automation is information management. The increasing volume and complexity of business dealings have forced to rely upon computers to help capture, distribute, store, and manage the information flow required in their day-to-day business operations. By having computers keep track of the details of the information, people are able to concentrate on the higher level duties such as planning and decision making.
Automation can help streamline the administration & Research updates. Make a single update within Automation and the piece of content can be updated throughout the sections and reflects in related processes. Automation is accessible via a password protected secure administration area -
with each user being given their own, username & password.
The customizable content within each site is incredibly easy to edit. The system uses an inbuilt modules that enables users to modify data, and image properties via an interface very similar to the one used within "Microsoft Word". More experienced users have the ability to swap to HTML mode for advanced editing.
Data display can be date/time driven, so the information is displayed from, to or in between particular times submitted by you. Submit information when you want, and have it display on the site at a time that suits you.

The ultimate idea is to achieve the goal for CRRI was …
• User Friendly interfaces for data entry and is easy to navigate
• Efficient tracking, monitoring, routing and auditing of various files
• Reliable reporting system that should not affect system performance
• Be easy to maintain and configure
• Be flexible for future enhancements
• Have role/group based security
• Automatic alerts to the user based on events and dead lines
• Fasten decision making process
• Efficient Master data maintenance
• Better control in Inventory Management
• Centralized Controlling System for Authorities

Results
• Paperless Office
o As most of the processes are online, the need of Papers and signature would be
drastically reduced. The system is designed in such a ways that if in any case it is
required to take a approval through papers, it can be generated from the system
and get approved form the concerned officer. This concept will definite save time
and money of the organization.
• Productivity
o Most of the calculation and business logic are intact with the system, so when any
application is sent from a particular officer, the system automatically send the
application to corresponding authority. Also the system gives alert messages when
there is a need t take action immediately. This saves the time of the officers and
also their productivity increases.
• Traceability
o In manual process it is very difficult to trace a particular file and its status. This
system tracks the file movement and the status at each level. This helps the
decision maker to take proper decision in time. Also the application can check
his/her application status any time s/he wants.
• Accountability
o The system makes each and every officer accountable for their job and
responsibility. The reminder message system embedded in the system will send
reminders to the concern officer if s/he is not taking decision in time. Also it make
not of the delay time in making decision/taking action which in turn becomes the
basis of assessing any officer's productivity and decision taking capabilities.
• Interrelated modules
o In the system all the modules share a common data source which helps any officer
to see the related information while taking decision. With single sign-on facility
once can access data from different modules without wondering where to get
proper data.

Knowledge Work System
The Knowledge Worker System (KWS) is a computer application designed to help "knowledge workers" (professionals who use information as their primary input and whose major products are distillations of that information) to capture and organize work activity information, and to learn, prioritize, and execute their tasks more efficiently and effectively. KWS integrates methods and technologies from the disciplines of information management, workflow, work scheduling, software agent, and work measurement into a "Performance Support Environment." KWS enhances productivity by delivering task-specific information as needed, and by associating all automated tools, software agents, and multimedia document references needed to complete a specific task.
KWS is "groupware" designed for use by collaborative workgroups. Processes can be assigned across organizations to support matrixed management. Knowledge workers can assign tasks to themselves, to other knowledge workers, or to a group of knowledge workers. KWS improves workgroup coordination by allowing knowledge workers to retrieve and update milestones, task completion, and priority status information.




Read more: http://wiki.answers.com/Q/Office_Automation_Systems#ixzz1GfDyHwEK
http://www.erdc.usace.army.mil/pls/erdcpub/www_welcome.navigation_page?tmp_next_page=39811
Read more: http://wiki.answers.com/Q/What_is_an_office_automation_system_and_a_knowledge_work_system#ixzz1GfDV6dDh