MindMap Gallery Information Systems and Society
This is a mind map about information systems and society. The main contents include: Chapter 4: Examples of building information systems, Chapter 3: Information system security, Chapter 2: Basics of algorithm and programming, Chapter 1: Information systems overview.
Edited at 2024-02-13 18:52:48This is a flowchart illustrating the process of archiving monthly failure analysis reports and tracking the implementation of improvement measures. The diagram is structured into five main steps, each with specific tasks and sub-tasks.Monthly Report Collection & Organization: This step involves collecting failure analysis reports from various departments, reviewing them for completeness, and categorizing them by product, failure mode, and severity. Root Cause Analysis & Statistics: Here, the focus is on categorizing causes, analyzing trends, identifying root causes, and compiling statistics on high-frequency failure modes and key components. Improvement Measure Formulation & Assignment: This step includes formulating improvement measures, assigning responsibilities, and setting timelines for implementation.Measure Implementation Tracking & Verification: It involves tracking the progress of implementation, verifying effectiveness, and confirming issue closure.Knowledge Base Update & Monthly Report Output: The final step covers archiving reports, updating the knowledge base, and compiling monthly summaries.This template can be easily reused and adapted using tools like EdrawMind to suit different organizational needs.
This is a timeline infographic detailing the annual product certification acquisition countdown process, structured into four sequential phases. The first phase, Certification Planning & Initiation, encompasses goal setting, timeline planning, resource preparation, defining specific certification objectives such as CCC/CE/FCC, formulating an annual plan with key milestones, and allocating necessary budget, personnel, and sample resources. Following this, the Application & Testing Phase involves material submission, coordination with certification agencies, core testing procedures, preparation of technical documents, application forms, and samples, selection of the appropriate certification agency, and execution of critical safety, EMC, and RF tests. The subsequent Rectification & Acquisition Phase focuses on addressing and rectifying any identified issues, re-verification processes, acquisition of the certificate, analysis of test issues, implementation of necessary fixes, and modification of samples for supplemental testing. Finally, the Countdown Monitoring phase emphasizes tracking progress, managing risks, monitoring remaining days and key milestones, managing time, technical, and cost risks, and maintaining effective internal and external communication throughout the process. This comprehensive template can be readily reused and adapted using tools like EdrawMind to meet diverse organizational requirements.
This is a flowchart detailing the weekly update and review plan for technical documents. The process is divided into six main stages, each with specific tasks and responsibilities. It begins with Weekly Planning, where the document scope is defined, update objectives are set, and schedules are arranged. Next, Document Updates involve maintaining various documents such as hardware design documents, test specifications, and BOM tables, alongside version control and archiving. Internal Review Preparation follows, focusing on compiling review materials, identifying participants, and setting agendas. The Review Meeting stage includes document examination, problem discussion, decision recording, and responsibility allocation. After the meeting, Review Feedback Processing takes place, involving issue tracking, document modification, quality checks, and closure verification. Finally, Output Deliverables are prepared, including official release versions, release notifications, review reports, and plans for the next week. This structured approach ensures systematic and efficient management of technical documents, and the template can be easily adapted using tools like EdrawMind.
This is a flowchart illustrating the process of archiving monthly failure analysis reports and tracking the implementation of improvement measures. The diagram is structured into five main steps, each with specific tasks and sub-tasks.Monthly Report Collection & Organization: This step involves collecting failure analysis reports from various departments, reviewing them for completeness, and categorizing them by product, failure mode, and severity. Root Cause Analysis & Statistics: Here, the focus is on categorizing causes, analyzing trends, identifying root causes, and compiling statistics on high-frequency failure modes and key components. Improvement Measure Formulation & Assignment: This step includes formulating improvement measures, assigning responsibilities, and setting timelines for implementation.Measure Implementation Tracking & Verification: It involves tracking the progress of implementation, verifying effectiveness, and confirming issue closure.Knowledge Base Update & Monthly Report Output: The final step covers archiving reports, updating the knowledge base, and compiling monthly summaries.This template can be easily reused and adapted using tools like EdrawMind to suit different organizational needs.
This is a timeline infographic detailing the annual product certification acquisition countdown process, structured into four sequential phases. The first phase, Certification Planning & Initiation, encompasses goal setting, timeline planning, resource preparation, defining specific certification objectives such as CCC/CE/FCC, formulating an annual plan with key milestones, and allocating necessary budget, personnel, and sample resources. Following this, the Application & Testing Phase involves material submission, coordination with certification agencies, core testing procedures, preparation of technical documents, application forms, and samples, selection of the appropriate certification agency, and execution of critical safety, EMC, and RF tests. The subsequent Rectification & Acquisition Phase focuses on addressing and rectifying any identified issues, re-verification processes, acquisition of the certificate, analysis of test issues, implementation of necessary fixes, and modification of samples for supplemental testing. Finally, the Countdown Monitoring phase emphasizes tracking progress, managing risks, monitoring remaining days and key milestones, managing time, technical, and cost risks, and maintaining effective internal and external communication throughout the process. This comprehensive template can be readily reused and adapted using tools like EdrawMind to meet diverse organizational requirements.
This is a flowchart detailing the weekly update and review plan for technical documents. The process is divided into six main stages, each with specific tasks and responsibilities. It begins with Weekly Planning, where the document scope is defined, update objectives are set, and schedules are arranged. Next, Document Updates involve maintaining various documents such as hardware design documents, test specifications, and BOM tables, alongside version control and archiving. Internal Review Preparation follows, focusing on compiling review materials, identifying participants, and setting agendas. The Review Meeting stage includes document examination, problem discussion, decision recording, and responsibility allocation. After the meeting, Review Feedback Processing takes place, involving issue tracking, document modification, quality checks, and closure verification. Finally, Output Deliverables are prepared, including official release versions, release notifications, review reports, and plans for the next week. This structured approach ensures systematic and efficient management of technical documents, and the template can be easily adapted using tools like EdrawMind.
Information Systems and Society
Chapter 1: Information System Overview
Section 1: Information Systems
A human-computer interaction system composed of hardware, software, data, users, and communication networks
Section 2: Composition and Function
Composition: hardware, software, data, users, communication network
Function: data collection and input, storage, transmission, processing, output, query
Section 3: Applications, information society and its development
limitation
Dependence on external environment
There are safety risks in itself
Technology barriers may exacerbate digital divide
Main characteristics of information society
information economy
network society
online government
Chapter 2: Basics of Algorithms and Programming
Section 1: Computer Hardware
Composition: arithmetic unit, controller, memory, input device, output device
Memory and external storage; RAM and ROM
monitor, printer
Keyboard, mouse
Central processing unit (core): composed of memory and controller
Secondary storage: hard drive and flash drive
Section 2: Computer Software
system software
Operating system: windows system
Application software: software that uses computer software and hardware resources to solve a certain application field
Section 3: Mobile Terminal
Sensing and Control
Sensor: information input device (sensitive components, conversion components, other auxiliary components)
Radio Frequency Identification Technology (Sensor Technology)
RFID technology
Radio frequency: high-frequency electromagnetic current with the ability to propagate over long distances
Electronic tags: active and passive
Network Systems
Function
Data communication function
Resource sharing function
Distributed processing capabilities
Classification
Computer network: local area network (LAN), metropolitan area network (MAN), wide area network (WAN)
mobile communication network
broadcast television network
Components of a network: computer systems, data communication systems, network software and network protocols
Web application software development
Client (C\S architecture): communication overhead and development difficulty are low; application upgrade and maintenance are difficult
Browser (B\S architecture): higher communication overhead and development difficulty; lower difficulty in application upgrade and maintenance
Chapter 3: Information System Security
Section 1: Information Security and Protection
Personal information and its protection
information social responsibility
Section 2: Information system security and protection
Data encryption and security
Caesar Cipher: Substitute Cipher
Reverse order method: transposition cipher
Same as 0; different as 1: simple XOR password
Identity Authentication and Security
Username Password
Authentication technology that relies on biometrics
USB Key authentication technology
Access control (user permissions for data operations)
Viruses, vulnerabilities and their prevention
Firewall technology (between external network and internal network)
Chapter 4: Examples of building information systems
Section 1: Preparation for building an information system
Needs analysis (goal expectations)
Feasibility Analysis
Development mode selection (B/S, C/S)
Outline design
Modular structure design
System physical configuration
Database management system selection
detailed design
Database Design
Section 2: Building an information system
Section 3: Improve the information system