Dev Dives: Streamline document processing with UiPath Studio Web
IT for managers
1. IT FOR MANAGERSAP Shareef MBA,M.Phil,NET,M.Com
Asst. Professor & Head, Dept. Of Management
Studies
Markaz Law College, Markaz Knowledge City
2. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer and generations
Software and Hardware
Algorithm and Flow Charts
Binary and Decimal systems
Introduction to computersUnit
I
3. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.1What is a computer ?
Google Dictionary defines computer as “An
electronic device which is capable of receiving
information (data) in a particular form and of
performing a sequence of operations in
accordance with a predetermined but variable
set of procedural instructions (program) to
produce a result in the form of information or
signals”
4. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.2Generation/Evolution of
computers
The history of the computer goes back several
decades however and there are five notable
generations of computers.
Each generation is characterized by an
important technological development that
changes fundamentally how computers work–
leading to more compact, less expensive, but
more powerful, efficient and robust machines.
5. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1940 – 1956: First Generation – Vacuum
Tubes
The first generation computers used vacuum
tubes as circuitry and magnetic drums for
memory. As a result they were big, and
occupied an entire room. These were
inefficient materials which consumed huge
electricity and subsequently generated a lot of
heat which caused for continuous
breakdowns.
Important characteristics or this generation
are….
6. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
They relied on ‘machine language’.
They were limited to solving one problem at a
time.
Input was based on punched cards and paper
tape. Output came out on print-outs.
The two notable machines of this era were the
UNIVAC and ENIAC machines – the UNIVAC
is the first every commercial computer which
was purchased in 1951 by a business -the US
Census Bureau.
8. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1956 – 1963: Second Generation –
Transistors
Although first invented in 1947, transistors weren’t
used significantly in computers until the end of the
1950s.
They were superior to the vacuum tubes because
they made computers smaller, faster, cheaper and
less heavy on electricity use.
The language evolved from cryptic binary
language to symbolic (‘assembly’) languages.
This meant programmers could create instructions
in words. About the same time high level
programming languages were being developed
(early versions of COBOL and FORTRAN).
9. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1964 – 1971: Third Generation – Integrated
Circuits
By this phase, transistors were now being
miniaturised and installed on silicon chips
(called semiconductors). This led to a massive
increase in speed and efficiency of these
machines. These were the first computers
where users interacted using keyboards and
monitors which interfaced with an operating
system.
As a result of these advances which again
made machines cheaper and smaller, a new
mass market for computer users emerged
during the ‘60s.
10. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1972 – 2010: Fourth Generation –
Microprocessors
Intel Corporation is the more related word with
fourth generation. Intel developed the Intel
4004 chip in 1971, which assembled all
computer components (CPU, memory,
input/output controls) on a single chip. What
filled a room in the 1940s now fit in the palm of
the hand.
Another major advance during this period have
been the Graphical user interface (GUI), the
mouse and more recently the advances in lap-
top capability and hand-held devices.
11. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2010- : Fifth Generation – Artificial
Intelligence
Computer devices with artificial intelligence
are still in development, but some of these
technologies are beginning to emerge and be
used such as voice recognition.
AI is a reality made possible by using parallel
processing and superconductors.
quantum computation, molecular and nano-
technology etc. are some of the other
characteristics of this generation.
12. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The essence of fifth
generation will be using
these technologies to
ultimately create
machines which can
process and respond to
natural language, and
have capability to learn
and organize themselves.
13. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.3 SOFTWARE
A set of computer instructions is called a
program. A set of computer programs is called
a software. It is a collection of programs which
increase the capabilities of computer
hardware. The process of developing software
is known as programming.
Software is intangible
Software is the soul of computer
It activates the dead machines.
15. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System software
Computer software designed to operate the
computer hardware and to provide a platform
for running application software is what is
system software. It controls the entire
computer program. System software helps use
the operating system and computer system.
It controls all operations
Moves data into and out the computer
It is essential for running the computer
16. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Operatingsystem An operating system is a program designed to
run other programs on a computer. It is that
part of a system software which acts as an
interface between hardware and end user.
Operating system is considered to be the
back bone of a computer, managing both
hardware and software.
17. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Basic functions of an operating system
Schedule jobs
Manage hardware and software resources
Maintain system security
Enable multiple user resource sharing
Handle interrupts
Maintain usage records
18. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Types of Operating system
Single tasking: It allows only one program to run
at a time. One program has to close for opening
another program.
Multi tasking: It enables a single user to have two
or more applications open at the same time.
19. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MS DOS: MS Disk Operating System
Non graphical command line OS
Released in 1981 and last updated in 1994
User is required to type commands instead of
using a mouse.
20. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Micro Soft Windows
GUI
No commands
Simple and user friendly
Multi tasking features
22. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows versions
Windows 1995
Developed for home and professional users
Network ready OS
Windows NT
Known as New Technology
A stable multitasking environment
Enhanced security features
Increased memory
Network utilities
Portability
23. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows 2000
It is used on personal computers,
business desktops, laptops and servers
Windows ME was designed for home use while 2000
for business purpose
Windows XP
It was released in 2001
Home and Professional variants
Features
Faster start up
User friendly interface
Fast user switching
Clear Type font rendering mechanism
Remote desktop functionality
24. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows vista
Released in the year 2007
Comes with many technical changes
Updated GUI
Visual style dubbed aero
Redesigned search function
Multimedia tools (Windows DVD Maker)
Redesigned networking, audio, print, and display
subsystems
26. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows 7.0
It is designed for
Home & Business desktops
Personal computers
Laptops
Notebooks
Tablet PCs
Media centre PCs
It was more focused on applications and hardware
It excluded Windows calendar, Windows Mail,
Windows Movie Maker and Windows Photo Gallery.
These are offered in Windows live Essentials Suite.
27. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
UNIX OS
Unix OS is a computer OS
developed in 1969 by a group of
American Telephone & Telegraph
Company employees at labs
Featured with client server model
Unix is generally seen as an OS
on workstations or a network
server
It allows multiple processors going
at once
Unix philosophy
Use of plain text
for storing data
Hierarchical file
system
Use of large
number of
software tools
28. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MAC OS
GUI
Developed by Apple Inc.
First introduced in the year 1984
29. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classic Mac OS
Completely graphical OS
Ease of use
Cooperative multitasking
Mac OS X
Server edition
Runs on Apple’s line of Macintosh server hardware
Includes work group management and administration
tools for key network services
30. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Linux OS
It is a UNIX-Like operating system
Modifiable codes
Used on devices from supercomputers to wrist
watches
Widely adopted for servers and embedded
systems
31. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Programming languages
They are vocabulary and set of grammatical
rules for instructing a computer to perform
specific tasks. It usually refers to high level
languages such as BASIC, C, C++, COBOL,
FORTRAN etc.
32. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Types of Programming
Languages
Machine Level Languages or First Gen
Languages.
It is the language of the computer, the only
language the computer understands without
translation. Each particular computer model
has a machine language, which is based on
the internal architecture of the equipment.
33. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Assembler languages or second gen
languages. They are also known as symbolic
languages because they include arithmetical
and logical operations.
Because of the use of mnemonic symbols this
eases up the programmers’ risk gradually.
Assembly languages are translated by
assemblers to machine level languages so as
to be understandable to machines.
34. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Compiler languages (High Level Languages)or
third gen languages. They are also known as
procedural languages. COBOL , FORTRAN,
BASIC, C++, C etc. are examples.
They include plain English like and
mathematical expressions. They are easy to
write and learn and are relatively error free.
Compilers are used to translate High level
languages to Machine language.
36. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other system software
Device drivers: These are small files that act
as an interface between hardware and the
operating system in a computer. Hardware
requires device drivers so that the OS can see
the device and handle them properly.
37. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Utility programs or Service programs.: these
are system programs for performing general
system support tasks. Following tasks are
performed by utility programs.
Sorting and storing the data
Checking or scanning the data for security
Making a copy of all information
Deleting, renaming, moving, copying, merging,
generating and modifying data sets.
Providing encryption. Etc.
38. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
• Compilers: High level language Machine
level codes (translation is done at once
before the program is executed)
• Interpreters: High level language
Machine level codes (translation is done line
by line)
• Assemblers: Assembly language
Machine level codes
Language translators:
39. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
General purpose
software
This software provides the framework for a great
number of business, scientific, and personal
applications.
Word processors: It is a document preparation
system. E.g. MS Word, Polaris Word
Spreadsheet program: Commonly known as pay roll
application. Lotus, MS Excel, Polaris Spreadsheet
DBMS: MS Access, Oracle
CAD and CAM Programs: Auto CAD, Revit Etc.
Internet Browser: Opera, Netscape Navigator, Internet
Explorer, Google Chrome
E-Mail Software: Hotmail, Yahoo mail, Gmail,
Rediffmail.
40. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Application software
Software which is used for applications specifically
designed for users to fit their needs
ERP: The system to integrate all data and processes
of an organization into a single unified system.
Tally
Peachtree
QuickBooks
SAP
Decision Support System:
Cost accounting system
Capital Budgeting system
General Decision Support System
41. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Artificial Intelligence System : E.g. Robotics
Expert Systems: Used for complex and ill
structured tasks. It helps non experts to make
decisions comparable to those of an expert.
42. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.4 Hardware
The physical parts of computer are called
hardware. Computer hardware is the
collection of physical parts of a
computer system. This includes
the computer case, monitor, keyboard, and
mouse. It also includes all the parts inside the
computer case, such as the hard disk drive,
motherboard, video card, and many
others. Computer hardware is what you can
physically touch.
44. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The CPU
It is also known as the processor.
CPU is the heart, brain and soul of computer.
Programs and instructions are read and
executed by CPU.
Intel, AMD, Motorola are popular processor
manufacturers.
Two basic parts of the CPU are
Control unit and
Arithmetic and logic unit.
45. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Control unit
It is the most important unit of the CPU. All the
computer resources are managed from the
control unit. It takes instructions from the
memory and sends the necessary signals to
ALU to perform the operation needed.
46. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ALU
ALU is a separate section of CPU which
performs computation like addition,
subtraction, multiplication and division and
logical operations such as the comparison of
two numbers. The tasks are performed with
special storage locations called registers.
47. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Memory Unit
Memory is a storing device which stores
programs, data etc. any program to be used in
the computer should be stored in the memory.
The memory capacity is measured in KB, MB,
GB, TB, PB,EB, ZB and YB
Computer memory is divided into
Internal memory or main memory or Primary
memory
Additional memory or, secondary memory or
Auxiliary memory
48. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internal memory or main memory or
Primary memory
It stores data needed for current tasks by the
computer and receives data from the
secondary storage as and when needed.
Magnetic core memory was used previously
but it is now outdated.
In modern computers, Micro electronic
semiconductor storage circuits are used to as
primary storage. They are small sized, high
speed, shock and temperature resistant chips.
Semi conductor memories are of two types.
They are RAM and ROM
49. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
RAM- Random Access Memory
RAM is the popular primary storage medium. It
is read write memory. RAM is a temporary
memory or volatile memory. All the information
goes out when the system is switched off.
51. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ROM-Read Only Memory
This memory is used to store information
permanently. The data is not lost if power is
switched off. It is read only memory since data
cant be written. E.g. ROM-BIOS (ROM-Basic
Input Output System). This program controls
and supervises the basic operations of I/O
devices.
Types of ROM are
PROM
EPROM
EEPROM
52. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Additional memory or, secondary memory or
Auxiliary memory
Primary storage is inbuilt with CPU, but
secondary memory is used in separate unit or
units. The capacity of Primary memory is
limited whereas secondary memory has
infinite capacity of millions and billions of
bytes.
Different secondary storage devices are
discussed below.
53. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Magnetic Tape
The oldest storage system
It makes copies of audio, video and data.
It is employed with a tap drive to store
and retrieve data.
The biggest drawback is that it can only
access data sequentially.
54. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Floppy diskettes
It was first introduced by IBM in the year 1970.
It consists of a circle shaped plastic material
which is coated with an oxide material. This
Plastic material is covered by a protective
square jacket with a hole to read the data by
the floppy drive.
The maximum storage capacity of a latest
Floppy disk is 1.44 MB.
56. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Organization of data on a disk
To use a disk for storing data, it must be
magnetically mapped. Then only the computer
can go directly to a specific location in the disk.
The process of mapping a disk is called formatting
or initializing.
Initializing is done by creating tracks and sectors.
Magnetic concentric circles are called tracks.
Short segments created like dividing a pie is
called sectors.
Each sector is assigned a unique number so that
the data access by the computer is easy.
58. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hard disc
They are the most popular device for storing
data.
Large volume of data can be stored.
A hard disc is a set of different platters fixed on
a spindle. Each platter is coated with iron
oxides.
Unlike floppy, the drive and disc is a single
chamber.
TBs of data can be stored in Hard disks.
They may be internal or external
60. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
An external hard drive is a
portable storage device that
can be attached to a computer
through
a USB or FireWire connection,
or wirelessly. External hard
drives typically have high
storage capacities and are
often used to back up
computers
External/ Portable Hard disk
61. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-ROM Disks
It stands for Compact Disk Read Only
Memory.
It is an Optical Laser Disk.
There are two lasers. One laser beam writes to
the recording surface and another laser reads
the data from light sensitive recording surface.
The data on the disk are fixed, they cant be
altered.
It has a storage capacity of over 650 MB
62. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-R
CD-R stands for Compact Disk Recordable.
It is a WORM (Write Once Read Many)
Memory.
One can write only once on CD-R
63. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-Rewritable
CD-RW was first introduced by Hewlett
Packard
It permits for repeated recordings on a disk
Data on this CD can be altered.
64. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
DVD
DVD stands for Digital Video Disk or Digital
Versatile Disk.
It stores up to 20 GB of Text, Graphics and
video.
Variations are
DVD-ROM
DVD-R
DVD-RW
DVD-RAM
65. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Blu Ray Disc
It is developed to enable recording, rewriting
and playback of High Definition Video, as well
as high volume of data.
They can hold up to 50 GB capacity.
66. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WORM Cards
A Write Once Read Many (WORM) digital memory
card is intended for professional uses such as
police investigations, court testimony, electronic
voting and other applications where data files
must be protected from alteration or deletion.
Applications
Police photography and witness/suspect
interviews, where courts require proof that photos
and audio recordings are genuine.
Court proceedings, such as trials and depositions.
Electronic voting, where recorded votes must be
tamper-proof.
67. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cash registers which record
transactions for tax collection
purposes.
Event recorders, such as security
cameras and “black box” flight-data
recorders.
Medical devices which retain
individual patient treatment data.
Personal digital assistants (PDAs)
and similar devices used by physicians
and other health-care professionals to
track patient interactions.
68. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
SD Cards
SD stands for Secure Digital Cards
Its is a non volatile memory card.
It is commonly used in mobile phones and
other portable electronic devices.
A card reader is used to connect to the
computer.
69. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flash Drive
USB flash drive/ pen drive is a popular storage
medium.
It is highly portable because of its small size.
Large volume of data can be stored in it
IT uses USB(Universal Serial Bus) technology.
They are removable and rewritable.
70. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
INPUT DEVICES
They are the devices used for giving
necessary data into the computer, then they
are converted into a form that is acceptable to
the computer.
1. Key board
2. Mouse
3. Light pen
4. Track ball
5. Joystick
6. MICR
7. OMR
7. OCR
8. Bar coding
9. Voice input
10. Touch screen
11. Touch pad
12. scanner
71. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Keyboard
A keyboard detects key pressings with the
help of an electronic circuit called keyboard
encoder. The encoder sends a binary code to
the computer. It can be connected to the CPU
with or without cable.
Types of keys in a keyboard are
Alphanumeric keys
Punctuation keys
Special keys.
72. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Mouse
Mouse is a pointing device.
It controls the movement of cursor in the
display unit.
Types of mice include
Mechanical mouse
Opto-mechanical mouse
Optical mouse
Cordless mouse
73. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Light pen
Light pen also is a pointing device.
It selects an option by simply pointing at it.
It is used in menu based applications
It is also used in drawing graphics in CAD
An engineer or architect or fashion designer
can draw sketches or pictures directly on the
screen.
75. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Track ball
Track ball is a pointing device.
It works like a mouse but is fixed and takes
less space.
It has a ball in the middle, a right and left
clicks.
Apple computer’s Power Book and IBM
ThinkPad notebooks used Track balls.
76. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Joystick
It is a vertical stick which moves
the graphic cursor in a direction
the stick is moved
It is popularly used by children to
play video games.
Pilots use it as flight control in the
cockpit of aircraft.
77. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MICR
Magnetic Ink Character Reader.
Human readable characters printed on
documents using a special magnetic ink is
read by MICR.
MICR reads the magnetic pattern of letters and
compares it with the one which is stored in its
memory.
Bank details such as branch code, account
number, cheque number etc. can be read by
MICR.
78. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OMR
Stands for Optical Mark Reader
This device is designed to read markings
placed in specific places on a form or card.
Pre-printed documents are designed with
boxes or circles that can be filled by a Pen or
Pencil. This documents are then given to the
reader.
The reader reads the position of markings and
processes it.
OMR sheets are commonly used in various
entrance and competitive examinations.
80. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OCR
It reads numeric and alpha numeric data from
printed documents
It can read up to 300 papers per hour.
It is used in the preparation of electricity bills,
telephone bills, insurance premium notices
etc.
81. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Bar Code Reader
It can read barcodes printed
on packages, badges and
books.
A barcode uses small bars on
varying thickness and spacing
with some numbers.
Manufactures use UPC-
Universal Product Code.
In case of books ISBN is used.
The information stored in the
barcode is displayed on the
screen when it is read.
82. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Voice input
Voice or audio input is given through a Mic
The given voice instructions will be compared
with those already stored in the system.
Only the trained systems can recognize voice
inputs.
83. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch pad
They are pads sensitive to finger touch.
It is another type of pointing device.
Laptops use this technology instead of mouse.
84. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch screen
They are screens sensitive to finger touches.
The touch sensitive transparent panel covered
in the screen enables the sensitivity.
Smart phones, information kiosks, and tablet
computers use touch screens.
85. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Scanner
Scanners are used to scan papers and paper
type documents. They can convert hard copies
into soft copies by creating electronic images.
86. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OUTPUT DEVICES
O/P devices are used to present computer
information in a readable form. LCD screens
and Printers are the most commonly used
output devices.
1. Monitors
2. Printers
3. COM(Computer Output on Microfilm)
4. Audio System (speaker)
5. Graphical O/P devices
87. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Monitors
Monitors are also called VDU- Visual Display
Unit
A monitor may be
CRT
LCD
CRT monitors use an electronic gun and an
emitting display in which tiny colored dots are
thrown.
LCD’s are flat screens which use TFT
technology.
All monitors depend on a video card, which is
88. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Printers
They are used to print hard copies of
documents.
They are connected to the system by a cable
to the parallel port or a USB port.
They print on ordinary paper, specially
prepared dispatch notes, invoices or packing
slips.
Printers are classified on the basis of their
printing mechanism into
Impact printers and
Non impact printers
89. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Impact printers
Impact printers utilize some form of striking
device to transfer ink from a ribbon onto the
paper being printed to form images or
characters.
They fall into two types- Serial or Line printing
Serial printers print one character at a time.
Commonly used Serial Printers are
Dot Matrix Printers and
Daisywheel printers.
90. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Dot matrix printers
They use wire needles or pins which strike the
ribbon against the paper in the pattern
necessary to produce each character.
91. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Daisy wheel printers
They use a new element of printing called a
‘daisywheel’.
92. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Line printers
A line printer works with much higher speed
than a serial printer.
It can print one line at a time.
Chain printers and drum printers are the
commonly used line printers
93. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Chain printers
A chain printer has a chain that rotates at a
constant speed in a horizontal plane.
The chain has a 48 numbers, alphabets and
special symbols.
The magnetically controlled hammers press
the chain onto the paper.
94. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Drum printers
These printers have a solid cylinder and as
many bands on it as the number of print
positions.
95. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Non impact printers
They don’t strike the paper.
They produce prints with electro static, chemicals,
inkjet and thermal technologies.
Non impact printers are most widely used
nowadays.
They are faster, smarter and clearer.
The three different types are
Thermal printers
Ink-Jet printers
Laser printers
96. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Thermal printers
They are used commonly as portable printers
to make print out of tiny slips such as an ATM
Slip or a Debit or Credit Card payment slip.
They use pins which are heated by the electric
element and then pressed against the paper.
97. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Inkjet printers
They make use of fine spray nozzles that
create the image of character or graphics on
the paper by spraying tiny or small drops of ink
into the paper.
It uses ink cartridges. Usually an inkjet printer
has a black cartridge and a color cartridge.
98. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Laser jet printers
They use both laser and xerographic
technology.
They can print with high quality
They print not only alphanumeric characters
but also drawings graphics and other
documents
99. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer output microfilm.
It records computer output as microscopic
images on roll or sheet film.
A microfilm reader reads the output.
100. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Speakers.
They create audio output.
Computer speakers do the same as other
speakers do.
Speaker system is controlled by a sound card.
101. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Plotters
It is a device that can draw graphs, designs
and maps into a paper and even to a plastic or
metal plates.
It is used in fashion designing, engineering
drawings, business analysis using visual terms
such as bar charts, graphs and diagrams.
102. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.5 Algorithm & Flow Charts
An algorithm is a finite list of instructions specifying a
sequence of operations and that give the answer to
any problem of a given type.
Example consider the Euclidean Algorithm stated as
follows
Given two positive integers A and B, find their common
divisor
The algorithm involves the construction of descending
sequence of numbers.
The first is the larger of two numbers, the second is the
smaller, the third is the reminder from dividing the
first by the second, the fourth is the remainder from
dividing the second by the third; and so forth. The
process stops when there is zero remainder. The
G.C.D is the last divisor in the series.
103. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For example, the descending sequence of numbers for
greatest common divisor of 44 and 28 is
44, 28, 16, 12, 4, 0
The last divisor is 4, so 4 is the result. The algorithm can be
written as follows.
1. Write down A, B
2. If B is greater than A, exchange them.
3. Divide A by B to get the remainder
4. If R is equal to Zero, stop; B is the G.C.D
5. Replace A by B; (i.e. B A)
6. Replace B by R; (i.e. R B)
7. Go to step 3
104. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flow charts
A flow chart is a diagram prepared by the
programmer for describing the sequence of steps
of complex processes involved in solving a
problem. It helps the programmer avoid
comprehensive thinking and probable mistakes in
programming process. Four categories of flow
charts are
• System outline charts (Global map)
• System flow charts (National map)
• Run flow charts (State map)
• Program flow charts (District map)
105. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System outline charts:
• These charts only lists the inputs, files processed and outputs
without regard to any sequence whatever.
System flow charts:
• These flow charts present an overview of the data flow through all
parts of a processing system. It shows the flow of documents,
operations and activities; persons and work stations. It depicts the
relationship between input, processing and output. The system
flow chart includes the following main elements
• Input data sources and their medium
• Processing steps
• Intermediary and final output and storage devices
107. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Run flow charts
These are extracted from system flow charts to
show the reference of computer operations to be
performed.
109. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Program flow charts
They are the detailed and are concerned with the
logical/arithmetic operations on data within the
CPU and the flow of data between the CPU. It
shows the flow between input/output peripherals
also.
112. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.6 Decimal v/s binary number
systems
The radix or base of decimal system is 10
because it uses numbers 0 to 9 . It is also
called base 10 number system.
Here, the weight of each digit depends upon
its relative position. E.g. 3256
=3000+200+50+6
=3x103 +2x102 +5x101 +6x100
if the left most digit of the number is nth digit ,
then we can write nth digit x 10n-1 (nth digit x
(base)n-1 )
113. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The radix of the binary system is 2. It uses only 0s
and 1s . Data is stored in a digital or electronic
device such as a computer in binary system.
The data are based on the right to left position of
digits. E.g. take the binary number 10100. using
the equation (nth bit x (base)n-1 )
10100= 1x24 +0x23 +1x22 +0x21 +0x20
10100=16+0+4+0+0
10100=20
Above shown is the binary decimal conversion.
114. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For fraction numbers
1.001= 1x20 +0x2-1 +0x2-2 +1x2-3
1.001=1+0+0+.125
1.001=1.125
115. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Decimal to binary conversion (double dabble
method)
Therefore, the binary equivalent of 14 is 1110.
2 14 Remainde
r
2 7 0
2 3 1
2 1 1
0 1
116. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For fractions
E.g. 0.125
Binary equivalent of 0 is 0 itself
And for fractional part it is 001 therefore 0.125 is
converted as 0.001
0.125
X2
0.25 0
X2
0.5 0
X2
0 1
117. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classification of Networks-
LAN,MAN,WAN
Methods of Networking
Internet and services
E-Commerce
Computer networking, internet
and E-Commerce.Unit II
118. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.1 Computer Networks
A network is a set of devices interconnected by
communication links. It is a collection of
computers and other devices set together for
the purpose of sharing information and
resources.
Networking improves the capabilities of
computers.
Scope of networks include
File sharing
Print sharing
E- Mail
Remote access
119. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Area based classification of
networks.
LAN- Local Area Network
MAN-Metropolitan Area Network
WAN-Wide Area Network
120. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Local Area Network
A LAN is a group of computers and network
devices connected together, usually within the
same building, campus or spread over a
limited distance. It facilitates high speed data
transmission at cheap cost.
LANs are privately owned and operated. LAN
uses high speed media (1mbps to 30 mbps or
more)
121. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of LAN
Different users are connected together
Terminals are located in a small geographic
location
Devices are connected via cables or wireless
connectivity like Wi-Fi
A LAN could be connected to other LANs and
the internet or other WAN.
122. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MAN-Metropolitan Area
Network
It is larger and spans over a city or town.
It refers to networks which interconnect
systems or LANs within a metropolitan area
A MAN can support both data and voice.
Cable TV networks are examples of MANs.
123. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAN-Wide Area Networks
It covers a very large geographic area and
uses different communication systems such as
Telephone services.
E.g. banking networks, Railway Reservation
Systems etc.
124. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of WAN
Thousands of computers spread over a wide
geographic region are connected together.
They use communication channels of a third
party.
These channels are of low capacity and error-
prone.
125. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.2 Network Topology
Topology means the method in which
terminals are connected in a network.
Commonly, there are following types of
methods.
Star network
Ring network
Bus network
126. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.Star network
It is the connection between a host computer and
local computers. The host computer works as the
central computer. Different terminals can
communicate only via the host computer which
centrally controls the others.
Advantages are
Minimal line cost
Adding of new nodes will not increase delay in
communication between two nodes.
Failure of one node doesn’t affect the network.
The most important problem with this is that the
entire network depends on the host computer. The
whole network fails when it fails.
128. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Ring network
Computers are linked by a closed loop in a ring
network to facilitate data transfer from one
computer to the other. If the data is not needed for
a particular computer, it ignores and simply
passes to the other. The process continues till it
reaches the destination.
This is a true distributed processing since there is
no central computing.
It is reliable because it doesn’t depend upon any
host computer.
Addition of nodes will increase delay. And it
requires complicated control softwares.
130. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Bus network
Bus network also has no central computer.
Computers are connected by a single circuit
used as communication path.
It is reliable.
New computers can be very easily added.
It also uses high complicated software.
Breakdown in the main circuit affects the entire
network.
132. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.3 Internet
Internet is the network of networks. It is the
connection of crores and crores of computers
connected together. The word internet is the
combination of interconnection and network.
133. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Uses of internet
1. E-Mail
2. FTP
3. Social networks
4. Internet Chatting
5. WWW
134. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Mail
Electronic mail system has overridden the
traditional mailing systems such as telegram
and Fax.
Any type of massages can be sent on an E-
Mail. Video, audio, text and files can be sent
along with mails.
Most popular E-Mail providers are Google,
Yahoo, Hotmail, rediffmail etc.
135. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
FTP
FTP stands for File Transfer Protocol
It helps users to download files from internet.
It is the most secure way of transferring files
over the internet.
136. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Social Networks
The recent trend in internet
Lakhs of people are connected together.
People can chat, express their opinions on
various issues so that anyone can view it.
They turn to Social Media- creating a new
media culture.
E.g. Face book, Twitter, Whatsapp Etc.
137. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internet chatting
It may be an audio-video chatting or only text
chatting.
It makes use of various chat providers such as
Skype or IMO.
Anyone can be connected to anywhere in the
world using this facility.
138. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WWW
www stands for World Wide Web
It’s a web of information
It’s the fastest growing facility using internet.
Web sites are the collection of web pages and
WWW is the collection of web sites.
A web page is created using a web language
such as HTML or front page or PHP.
HTTP helps users to access web pages from
www.
Contd.
139. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
A web browser is the program to access web
pages from internet. E.g. internet explorer,
Mozilla firefox, Google Chrome etc.
Search engines are devices to search for
information on the internet. They are the
database that contain references to thousands
of resources.
140. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
VPNs-Intranet and Extranet
VPNs are private data networks that make use
of public networks such as internet for data
transmission.
A VPN may be Intranet based or Extranet
based.
An intranet is a network for users in an
organization, Although they geographically
disperse. It can be used only by authorized
personnel of an organization. External users
are not allowed to use it.
Contd.
141. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
An intranet is an integration of E-Mail, FTP,
and web servers with the internal applications.
An Extranet on the other hand is a connection
of intranets used by different organizations to
facilitate inter-organizational data transfer.
E.g. clients and suppliers network.
142. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAP- Wireless Application
Protocol
Wireless Application Protocol (WAP) is a technical
standard for accessing information over a
mobile wireless network. A WAP browser is a web
browser for mobile devices such as mobile
phones that uses the protocol. Before the introduction
of WAP, mobile service providers had limited
opportunities to offer interactive data services.
Following mobile services use WAP
Email by mobile phone
Tracking of stock-market prices
Sports results
News headlines
Music downloads
143. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.4 E-Commerce
WTO defines E-Commerce as “ a commercial
process that includes production, distribution,
sales or delivery of goods and services
through the electronic means”
In the process of E-Commerce, data is
transmitted from one organization to the other
in electronic form. This data interchange is
known as EDI- Electronic Data Interchange.
144. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Commerce models/types of E-
Commerce
Business to Business (B2B)
Business to Customer (B2C)
Consumer to consumer (C2C)
Business to Government (B2G)
Business to Employee (B2E)
145. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Business –B2B
In B2B, transactions take place between 2
different business organizations.
For example, Amazon.com’s online book store.
Various book publishers may develop their
own distribution channel or may have a
rapport with Amazon.com. In the second case,
they transact with Amazon in B2B mode. They
do this because the books will be viewed by a
large audience.
146. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Consumer (B2C)
B2C means sale of goods by a business to the
public. It may be either products or services
such as airline booking or stock trading.
Low marketing costs, lower order processing
costs, better customer services etc. are the
benefits of B2C
147. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Consumer to consumer
It consists of individuals using the online
advertisement websites to sell products and
services directly to other individuals. Online
auction is a very good example for C2C
Dubizzile, OLX etc are mostly used online ad-
websites.
148. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Government B2G
Apart from the main B2G activities such as
paying government taxes like vehicle tax,
property tax and income tax, Government
procure goods and services from the Business
organizations. These products and services
range from office stationary to military
equipments.
149. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Employee (B2E)
It is an internal E-commerce model and it uses
intranet.
Examples are, online insurance policy
management, corporate dissemination, special
offers for the employees etc.
150. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database concepts
Information Systems
System development life cycle
Various types of information systems
DBMS and Information
Systems
Unit
III
151. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.1 Types of databases
Operational databases: They store detailed
data needed to support operations of the entire
organization. They are called as Subject Area
Databases (SADB), Transaction Database,
Inventory Database and Production Database.
E.g. Customer Database, Personnel Database.
Management database: They store data and
information extracted from selected operational
and external database. It consists of
summarized data and information needed by the
organization’s managers and other end users.
152. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Information Warehouse database: An
information warehouse stores data from
current and previous years. This is usually
data taken from the various operational and
management databases of an organization.
External database: For some databases,
there is option to connect with external
privately owned online databases. Its for
smooth commercial information services.
153. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Text databases: A full-text database is
a database that is comprised of several books,
articles, journals, magazines, newspapers and
other textual documents but does not include
graphical documents such as drawings, diagrams
or pictures. Each of the referenced documents
can be viewed, printed or downloaded online.
Image databases: Wide variety of images can be
stored electronically in image databases. Even
electronic encyclopaedia are available on CD
ROM disks which store thousands of
photographs of text. Image data processing is the
use of image database in business organizations
154. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.2What is an information
system
An information system can be defined as a set
of interrelated components that collect,
process, store and distribute information to
support decision making and control in an
organization.
In addition to the above, information systems help
managers and workers analyze problems,
visualize complex subjects, and create new
products.
156. AP SHAREEF’S LECTURE ON IT FOR MANAGERSAP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.3 System Development Life Cycle
157. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Preliminary analysis
Conduct the preliminary analysis
Propose alternative solutions
Describe the costs and benefits
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
158. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Systems analysis, requirements
definition
Collection of Facts
Scrutiny of the existing system
Analyzing the proposed system
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
159. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Systems design
Describes desired features and operations in
detail, including screen layouts, business
rules, process diagrams, pseudocode and
other documentation
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
160. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.Development
Development of different software modules is
done at this stage.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
161. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5. Integration and testing
All the different modules are brought together.
They are integrated and tested for errors.
Corrections are made if errors are found
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
162. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Acceptance, installation,
deployment
Top management officials approve the system
Install the system and allocate the tasks
Appropriate staff is deployed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
163. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
7. Maintenance and evaluation
Ensure the smooth working of the system
Maintenance team observes the work
Mistakes are repaired
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
164. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.4 Types of information
systems
Transaction processing systems.
TPS is an information system that keep track of
the elementary activities and transactions of
the organization, such as sales, receipts, cash
deposits, payroll, credit decisions, and the flow
of materials in a factory.
It is a computerized system that performs and
records the daily routine transactions
necessary to conduct business
166. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Management information systems
MIS provide middle managers with reports on
the organization’s current performance. This
information is used to monitor and control the
business and predict future performance. It
uses data supplied by TPS and compresses
them into reports.
The picture depicts how MIS transforms
transaction level data from inventory,
production, and accounting into MIS files that
ate used to provide managers with reports.
168. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Decision Support Systems
DSS focuses on problems that are unique and
rapidly changing, for which the procedure for
arriving at a solution may not be fully
predefined in advance.
It takes information from TPS and MIS. But
often bring in information from external
sources, such as the current stock prices or
product prices of competitors
These systems are employed by “super-user”
managers and business analysts who want to
use sophisticated analytics and model to
analyze data
169. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
• Production data
• Marketing data
• Finance data
• HR data
Model base
• Statistical models
• Forecasting models
• Planning models
• Operational models
DSS Software
• Manage database
• Manage model base
• Manage end user
interface
User interface
User
170. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Executive Support System (ESS)
ESS addresses the decision making needs of
senior management. It supports strategic
issues and long term trends.
ESS present graphs and information from many
sources through an interface that is easy for
senior management. It is designed to
incorporate data about external events, such
as tax laws or competitors, but they draw
summerized information from internal MIS and
DSS.
171. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
Data warehouse
datamart
Data mining
EIS SoftwareExecutive’s staff
Executive
Query
Output
Components of an executive information
system
172. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Enterprise Resource Planning Systems
These integrate business processes in
manufacturing and production, finance and
accounting, sales and marketing, and human
resources into a single software system .
For example, when a customer places an order, the
data automatically go to the other parts which are
affected by it. The transaction gives information to
the warehouse to pick the products and arrange
for shipment. The warehouse informs the factory
to replenish what has been reduced. Accounting
department takes steps to send customer an
invoice. Customer service executives observe the
progress of the order.
174. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Supply Chain Management System
This system help the business to manage
relationship with suppliers. Suppliers,
purchasing firms, distributing men and logistics
companies benefit by this system. It shares
information on orders, production, inventory
levels and delivery of goods and services so
that the above groups can get efficient
services.
It is an inter-organizational system because they
automate the flow of information across
organizational boundaries.
176. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Customer Relationship Management System
CRMS helps the management to keep effective
relationship with its customers. It provides
information to coordinate the sales and
marketing activities in such a way as to create
delighted customers. The most profitable
customers can be retained by this system.
178. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Knowledge Management Systems.
These enable an organization to better manage
process for capturing and applying knowledge and
experience in the firm, and make it available
wherever and whenever it is needed to improve
business and management decisions.
They link the firm to external sources of knowledge.
This firm knowledge is unique, difficult to imitate and
can be leveraged into long term strategic benefits.
The basic elements of knowledge management are
1.Knowledge creation
2.Knowledge sharing
3.Knowledge utilization
180. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.5 Functional information
systems
These are the systems based on different
functions of a business organization
Different functional subsystems are as follows
1. Production information systems
2. Marketing information systems
3. Financial information systems
4. HR information systems
These systems are dealt with in detail.
181. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Production Information Systems
These systems facilitate efficient
productions/operations management.
Production management encompasses
design, implementation, operation and control
of systems made up of people, materials,
capital equipment, money and information to
accomplish specific objectives
Following is a model of production information
system
183. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Marketing information systems
Marketing information systems are designed
and operated to provide relevant information
on the following aspects
1. Type of products to be offered
2. Price at which products to be offered
3. Place where products have to reach
4. Promotion of products to create loyal customers
The outline of the system is as follows
185. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Financial Information Systems
Finance is the life blood of every business
organization. Financial Information systems
help manage financial affairs effectively. It is
useful in taking major financial decisions, i.e.
finance decisions, investment decisions and
dividend decisions.
The outline of a FIS is depicted below
187. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Accounting Information System
It consists of the people, records, and methods
used to gather financial information about
business events, record it, process it into a
useful form, and communicate the information
to end users and decision makers in planning,
forecasting and controlling.
It works with many subsystems such as budget,
final accounts, costing, inventory, receivables etc
189. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computerized Accounting
Package
It is a package designed for accounting with
the use of computers for recording, reporting
and analysing the financial data of a business.
These are software programs that are stored
on a company’s computer, network server, or
remotely and accessed via the internet. A
business can customize the software to suite
the particular needs.
190. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Salient features of Computerized Accounting
Package.
Fast, Powerful and integrated.
Complete visibility.
Enhanced user experience
Accuracy.
Improves the business performance
Quick decision making
Complete reliability.
191. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
HR Information System
HR Management is a major function in any
business firm. HRIS facilitate systematic ways
for HRM.
It is an organized method of providing
information about HR , their functioning, and
external factors relevant to HRM.
The outline is depicted below
193. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer Viruses
Cyber Crimes
IT act 2000 and Cyber laws
Computer Viruses, Cyber Crimes and
LawsUnit
IV
194. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.1 COMPUTER VIRUSES
A computer virus is a program designed to
harm or cause harm on an infected computer.
Its spreads through e-mail attachments,
portable devices, websites containing
malicious scripts and file downloads. A
computer virus attaches itself to the host files
and always activate whenever you open the
infected files. The virus can replicate itself and
then infect the other files on your computer
causing more damage. Below is a list of
different types of computer viruses and what
they do.
195. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Macro Viruses
These viruses infect the files created using some
applications or programs that contain macros
such as doc, pps, xls and mdb. They
automatically infect the files with macros and also
templates and documents that are contained in
the file. They hide in documents shared through e-
mail and networks.
Macro viruses include:
Relax
bablas
Melissa.A
097M/Y2K
196. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Memory Resident Viruses
They usually fix themselves inside the computer
memory. They get activated every time the OS
runs and end up infecting other opened files.
They hide in RAM.
Memory Resident Viruses Include:
CMJ
meve
randex
mrklunky
197. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Overwrite Viruses
These types of viruses delete any information in
a file they infect, leaving them partially or
completely useless once they are infected.
Once in the computer, they replaces all the file
content but the file size doesn’t change.
Overwrite Viruses Include:
Trj.Reboot
way
trivial.88.D
198. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Direct Action Viruses
These viruses mainly replicate or take action
once they are executed. When a certain
condition is met, the viruses will act by
infecting the files in the directory or the folder
specified in the AUTOEXEC.BAT. The viruses
are generally found in the hard disk’s root
directory, but they keep on changing location.
Direct Action Viruses Include:
Vienna virus
199. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Directory Virus
Also known as cluster virus or file system virus.
They infect the computer’s directory by
changing the path indicating file location. They
are usually located in the disk but affect the
entire directory.
Directory Viruses Include:
dir-2 virus
200. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Web Scripting Virus
Most web pages include some complex codes in
order to create an interactive and interesting
content. Such a code is often exploited to
cause certain undesirable actions. They mostly
originate from the infected web pages or
browsers.
Web Scripting Viruses Include:
JS.Fortnight – a virus that spreads via malicious
emails.
201. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Multipartite Virus
These type of viruses spread in many different
ways. Their actions vary depending on the OS
installed and presence of certain files. They
tend to hide in the computer’s memory but do
not infect the hard disk.
Multipartite Viruses Include:
flip
invader
tequila
202. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
FAT Viruses
These lardy viruses attack the file allocation
table (FAT) which is the disc part used to store
every information about the available space,
location of files, unusable space etc.
FAT Viruses Include:
the link virus
203. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Companion Viruses
These types of viruses infect files just like the
direct action and the resident types. Once
inside the computer, they ‘accompany’ other
existing files.
Companion Viruses Include:
Asimov.1539
stator and terrax.1069
204. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Polymorphic Virus
They encode or encrypt themselves in a different
way every time they infect your computer. They
use different encryption and algorithms. This
makes it difficult for the antivirus software to
locate them using signature or string searches
(since they are very different in each encryption).
Polymorphic Viruses Include:
Marburg
tuareg
Satan bug
elkern
205. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Worm
This program is very similar to a virus and has the
ability to self-replicate leading to negative effects
on your computer.
Worm Viruses Include:
lovgate.F
sobig.D
trile. C
PSWBugbear.B
Mapson
206. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Trojans
Trojans can illegally trace important login details
of users online. For example E-Banking is very
common among users, therefore, vulnerability
of tracing your login details whenever your PC
is working without any strong powerful
antivirus installed.
207. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Email Virus
This is a virus spread via an email. Such a virus will
hide in an email and when the recipient opens the
mail.
Browser Hijacker
This virus can spread in many different ways
including a voluntary download. If infects certain
browser functions especially in form of re-directing
the user automatically to certain sites. A good
example is
Browser Hijackers Include:
the cool web search
208. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Boot Infectors
They include the boot sector plus master boot
record types. All the viral codes can be
separate location; however they infect the hard
disks or the floppy.
Boot Infectors Include:
The brain virus -it is the very first wild virus to be
created.
209. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
From what we have seen, the many types of
computer viruses and their effects are very
harmful and can completely damage your
system. Always make sure your system is up to
date. Also install antivirus software. The
antivirus program protects your computer and
the personal information in it.
210. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.2 Introduction to Cyber
Crimes
Due to increase in the number of netizens,
misuse of technology in the cyberspace was
clutching up which gave birth to cyber crimes
at the domestic and international level as well.
Though the word Crime carries its general
meaning as “a legal wrong that can be
followed by criminal proceedings which may
result into punishment” whereas Cyber Crime
may be “unlawful acts wherein the computer is
either a tool or target or both”.
211. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classifications Of Cyber Crimes: Cyber
Crimes which are growing day by day, it is very
difficult to find out what is actually a cyber
crime and what is the conventional crime so to
come out of this confusion, cyber crimes can
be classified under different categories which
are as follows:
212. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Cyber Crimes against Persons:
There are certain offences which affects the
personality of individuals can be defined as:
Harassment via E-Mails: It is very common type of
harassment through sending letters, attachments of
files & folders i.e. via e-mails. At present harassment
is common as usage of social sites i.e. Facebook,
Twitter etc. increasing day by day.
Cyber-Stalking: It means expressed or implied a
physical threat that creates fear through the use to
computer technology such as internet, e-mail, phones,
text messages, webcam, websites or videos.
213. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Dissemination of Obscene Material: It includes
Indecent exposure/ Pornography (basically child
pornography), hosting of web site containing
these prohibited materials. These obscene
matters may cause harm to the mind of the
adolescent and tend to deprave or corrupt their
mind.
Defamation: It is an act of imputing any person
with intent to lower down the dignity of the person
by hacking his mail account and sending some
mails with using vulgar language to unknown
persons mail account.
214. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hacking: It means unauthorized control/access
over computer system and act of hacking
completely destroys the whole data as well as
computer programmes. Hackers usually hacks
telecommunication and mobile network.
Cracking: It is amongst the gravest cyber crimes
known till date. It is a dreadful feeling to know that
a stranger has broken into your computer
systems without your knowledge and consent and
has tampered with precious confidential data and
information.
215. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Mail Spoofing: A spoofed e-mail may be said
to be one, which misrepresents its origin. It shows
it’s origin to be different from which actually it
originates.
SMS Spoofing: Spoofing is a blocking through
spam which means the unwanted uninvited
messages. Here a offender steals identity of
another in the form of mobile phone number and
sending SMS via internet and receiver gets the
SMS from the mobile phone number of the victim.
It is very serious cyber crime against any
individual.
216. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Carding: It means false ATM cards i.e. Debit and
Credit cards used by criminals for their monetary
benefits through withdrawing money from the
victim’s bank account mala-fidely. There is always
unauthorized use of ATM cards in this type of
cyber crimes.
Cheating & Fraud: It means the person who is
doing the act of cyber crime i.e. stealing
password and data storage has done it with
having guilty mind which leads to fraud and
cheating.
217. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
Assault by Threat: refers to threatening a person
with fear for their lives or lives of their families
through the use of a computer network i.e. E-mail,
videos or phones.
218. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Crimes Against Persons Property: As there
is rapid growth in the international trade
where businesses and consumers are
increasingly using computers to create,
transmit and to store information in the
electronic form instead of traditional paper
documents. There are certain offences which
affects persons property which are as follows:
219. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Intellectual Property Crimes: Intellectual
property consists of a bundle of rights. Any
unlawful act by which the owner is deprived
completely or partially of his rights is an offence.
The common form of IPR violation may be said to
be software piracy, infringement of copyright,
trademark, patents, designs and service mark
violation, theft of computer source code, etc.
220. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Squatting: It means where two persons
claim for the same Domain Name either by
claiming that they had registered the name first
on by right of using it before the other or using
something similar to that previously. For example
two similar names i.e. www.yahoo.com and
www.yaahoo.com.
221. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Vandalism: Vandalism means deliberately
destroying or damaging property of another. Thus
cyber vandalism means destroying or damaging
the data when a network service is stopped or
disrupted. It may include within its purview any
kind of physical harm done to the computer of any
person. These acts may take the form of the theft
of a computer, some part of a computer or a
peripheral attached to the computer.
222. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hacking Computer System: Hacktivism attacks
those included Famous Twitter, blogging platform
by unauthorized access/control over the
computer. Due to the hacking activity there will be
loss of data as well as computer. Also research
especially indicates that those attacks were not
mainly intended for financial gain too and to
diminish the reputation of particular person or
company.
223. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Transmitting Virus: Viruses are programs that
attach themselves to a computer or a file and
then circulate themselves to other files and to
other computers on a network. They usually affect
the data on a computer, either by altering or
deleting it. Worm attacks plays major role in
affecting the computerize system of the
individuals.
Cyber Trespass: It means to access someone’s
computer without the right authorization of the
owner and does not disturb, alter, misuse, or
damage data or system by using wireless internet
connection.
224. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internet Time Thefts: Basically, Internet time
theft comes under hacking. It is the use by an
unauthorised person, of the Internet hours paid
for by another person. The person who gets
access to someone else’s ISP user ID and
password, either by hacking or by gaining access
to it by illegal means, uses it to access the
Internet without the other person’s knowledge.
You can identify time theft if your Internet time has
to be recharged often, despite infrequent usage.
225. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Cybercrimes Against Government:
There are certain offences done by group of
persons intending to threaten the international
governments by using internet facilities. It
includes:
Cyber Terrorism: Cyber terrorism is a major
burning issue in the domestic as well as global
concern. The common form of these terrorist
attacks on the Internet is by distributed denial of
service attacks, hate websites and hate e-mails,
attacks on sensitive computer networks etc.
Cyber terrorism activities endanger the
sovereignty and integrity of the nation.
226. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Warfare: It refers to politically motivated
hacking to conduct sabotage and espionage. It is a
form of information warfare sometimes seen as
analogous to conventional warfare although this
analogy is controversial for both its accuracy and its
political motivation.
Distribution of pirated software: It means
distributing pirated software from one computer to
another intending to destroy the data and official
records of the government.
Possession of Unauthorized Information: It is very
easy to access any information by the terrorists with
the aid of internet and to possess that information for
political, religious, social, ideological objectives.
227. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Cybercrimes Against Society at large:
An unlawful act done with the intention of causing
harm to the cyberspace will affect large number of
persons. These offences includes:
Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
It also includes activities concerning indecent
exposure and obscenity.
228. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Trafficking: It may be trafficking in drugs,
human beings, arms weapons etc. which affects
large number of persons. Trafficking in the
cyberspace is also a gravest crime.
Online Gambling: Online fraud and cheating is
one of the most lucrative businesses that are
growing today in the cyber space. There are
many cases that have come to light are those
pertaining to credit card crimes, contractual
crimes, offering jobs, etc.
229. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Financial Crimes: This type of offence is
common as there is rapid growth in the users of
networking sites and phone networking where
culprit will try to attack by sending bogus mails or
messages through internet. Ex: Using credit cards
by obtaining password illegally.
Forgery: It means to deceive large number of
persons by sending threatening mails as online
business transactions are becoming the habitual
need of today’s life style.
230. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Affects To Whom: Cyber Crimes always affects
the companies of any size because almost all
the companies gain an online presence and
take advantage of the rapid gains in the
technology but greater attention to be given to
its security risks. In the modern cyber world
cyber crimes is the major issue which is
affecting individual as well as society at large
too.
231. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.3“INFORMATION TECHNOLOGY ACT,
2000”
With the emergence of technology the misuse
of technology has also expanded to its
optimum level and then there arises a need of
strict statutory laws to regulate the criminal
activities in the cyber world and to protect
technological advancement system. It is under
these circumstances Indian parliament passed
its “INFORMATION TECHNOLOGY ACT,
2000” on 17th oct to have its exhaustive law to
deal with the technology in the field of e-
commerce, e-governance, e-banking as well
as penalties and punishments in the field of
cyber crimes.
232. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CYBER LAWS
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Law encompasses the rules of conduct:
1. That have been approved by the government, and
2. Which are in force over a certain territory, and
3. Which must be obeyed by all persons on that
territory. Violation of these rules could lead to
government action such as imprisonment or fine or
an Order to pay compensation.
233. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
234. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber crimes
These are unlawful acts where the computer is
used either as a tool or a target or both. The
enormous growth in electronic commerce (e-
commerce) and online share trading has led to
a phenomenal spurt in incidents of cyber
crime.
235. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Electronic signatures
These are used to authenticate electronic
records. Digital signatures are one type of
electronic signature. Digital signatures satisfy
three major legal requirements – signer
authentication, message authentication and
message integrity. The technology and
efficiency of digital signatures makes them
more trustworthy than hand written signatures.
236. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Intellectual property
These refer to creations of the human mind e.g. a
story, a song, a painting, a design etc. The facets
of intellectual property that relate to cyber space
are covered by cyber law. These include:
copyright law in relation to computer software,
computer source code, websites, cell phone content
etc,
software and source code licenses
trademark law with relation to domain names, meta
tags, mirroring, framing, linking etc
semiconductor law which relates to the protection of
semiconductor integrated circuits design and layouts,
patent law in relation to computer hardware and
software.
237. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Data protection and privacy laws
These laws aim to achieve a fair balance
between the privacy rights of the individual
and the interests of data controllers such as
banks, hospitals, email service providers etc.
These laws seek to address the challenges to
privacy caused by collecting, storing and
transmitting data using new technologies.
238. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Strategic advantage and IT
Problems and Prospects of Computerization
Selection of Hardware and Software
Managing the changes of IT
Strategic role of IT and Emerging
issues
Unit
V
239. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.1What is strategic
advantage?
Strategic advantage is the result of using
organizational capability measured in financial
terms by profitability, shareholder value etc.
and in non financial terms by market share,
reputation etc.
Competitive advantage exists when there is
match between the distinctive competencies of
a firm and the critical success factors within its
industry that permits the firm to outperform
competitors. Information technology helps the
organizations gain competitive advantage in
240. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Becoming low-cost producer
2. Creating new products and services
3. Focus on market niche
4. Linking with new customers and suppliers
5. Managing value chain.
6. Creating strategic alliances
241. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Become Low-cost producer
Information systems reduce cost by focusing
on
Internal operations
Management planning and control and
Human resources
Reduced cost helps in increasing profit.
Many low cost producing organizations use
information technology as a dynamic and
intensive way rather than a mere management
tool
242. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Create new Products and
services
IT is used as a tool to prevent duplication.
IT helps in creating differentiated products and
services and this in turn raises market entry
cost for competitors.
243. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.Focus on Market Niche
IT helps in improving marketing techniques.
An organization can penetrate the market by
carefully examining transactions with
customers.
It enables the business to win more from
profitable customers ,turns non profitable
customers to profitable or drop outs.
244. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Linking with Customers and
Suppliers
IT Systems help the organization to follow Just
in time supply method and stock less inventory
method.
The first method shifts all inventory
responsibilities to the distributor who manages
the supply flow. The second helps in winning
customer loyalty by providing cheap and best
goods on time.
246. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
contd…
IT and information systems that have strategic
impact helps the organization to provide
products or services of higher value at the
same price or of the same value at the lower
price.
247. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Creating Strategic Alliances
Strategic alliance is the combination of two or
more organizations to create competitive
advantage.
Information Technology links two independent
organizations to share skills, costs and access
to another’s market.
The role of IT is crucial in these type of
relations.
Such strategic alliances are recently coined as
information partnerships.
248. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.2 Issues on Hardware and
Software
The systems come with hardware, software
and support. Today, selecting a system is a
serious and time-consuming business.
There are several factors to consider prior to
system selection . They are discussed below.
Procedure for hardware software
selection
249. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Define the system capabilities
Computers have proven valuable to business in the
following areas :
Cost reduction includes reduction of the inventory,
savings on space and improved ability to predict
business trends
Cost avoidance includes early detection of problems
and ability to expand operations without adding
clerical help.
Improved service emphasizes quick availability of
information to customers, improved accuracy and fast
turnaround
Improved profit reflects the bottom line of the
business and its ability to keep receivables within
reason.
250. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Specify the magnitude of the problem
It refers to clarify whether selections consist of
a few peripherals or major decision concerning
the mainframes.
3. Assess the competence of the in-house staff
This involves determining the expertise
needed in areas such as telecommunications
and data base design. Acquiring a computer
often results in securing temporary help for
conversion. Planning for this help is extremely
important.
251. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Consider hardware and software as a package.
This approach ensures compatibility. In fact,
software should be considered first, because
often the user secures the hardware and then
wonders what software is available for it.
5. Provide user indoctrination.
This is crucial, especially for first-time users.
Selling the system to the user staff, providing
adequate training, and preparing an
environment a conductive to implementation
are pre- requisites for system acquisition.
252. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other Criteria for selection of Hardware
1. System Availability
2. Compatibility
3. Cost
4. Performance
5. Support
6. Usability
1. The programming
language and its
suitability to the
applications
2. Ease of Installation
and training
3. Extent of
enhancements to be
made prior to
installation.
Hardware Software
253. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Major phases in Hardware/Software
selection
The selection process should be viewed as a project,
and a project team should be organized with
management support. In larger projects, the team
includes one or more user representatives, an analyst
and EDP auditor, and a consultant. Several steps
make up the selection process:
1. Requirement Analysis
2. System Specification
3. Request for proposals (RFP)
4. Evaluation and validation
5. Vendor Selection
6. Post Installation Review
254. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.3 Problems and prospects
of computerization
Problems
IT systems development problems
IT security challenges
Ethical and social problems
Global business challenges
255. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
IT Systems development problems
Managers have to realign their strategies
business strategies and information systems to
environmental requirements.
They face the challenge of developing
dynamic information systems.
256. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
IT security challenges
• Use of internet and other types of computer
networks has become common.
• Security challenges also have multiplied
manifold
• Effective provisions have to be made to face
these problems
257. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Ethical and social problems
Privacy rights
Intellectual property rights
Employment challenges
Quality of work life
Health issues
258. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Prospects of computerization
1. Organization
2. Self-Sufficiency
3. Cost-Effective
4. Speed
5. Cheaper Research and Development
6. Sales
259. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Organization: Computers allow the application
of different types of software that can help
businesses keep track of their files,
documents, schedules and deadlines.
Computers also allow businesses to organize
all of their information in a very accessible
manner. The ability to store large amounts of
data on a computer is convenient and
inexpensive, and saves space. A computer's
ability to allow a company to organize its files
efficiently leads to better time management
and productivity.
260. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Self-Sufficiency: Computers have made staff and
companies more self-sufficient by allowing them
to do tasks that previously had to be outsourced.
For example, a company can now use office
software to create their own training material.
Desktop publishing software can be used to
create marketing materials. Online tax and
accounting programs allow companies to prepare
their own taxes. This allows the dominant
operations of a company to remain in-house and
empowers the company to become more
independent and less susceptible to errors
committed by outside parties.
261. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cost-Effective: Emerging technology makes new
tools and services more affordable and allows
companies to save on their staff payroll and office
equipment. Because computers allow work to be
done faster and more efficiently, it is possible for a
company to hire fewer staff. In addition, with
networked and relatively inexpensive computers,
companies can store data more easily, saving on
the cost of outside file storage, and can avoid
having to purchase as many copiers, fax
machines, typewriters, and other such items that
were used before computers became popular.
Contd….
262. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Correspondingly, potentially profitable
businesses can be started with a smaller
overhead cost. Email capabilities decrease
postage costs; software applications reduce
the need for large accounting departments,
while videoconferencing reduces the need for
travel. All resources saved will trickle down to
the consumers, who are then provided with
much more affordable products and service.
263. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Speed: Computers help speed up other
business operations. The collecting of
consumer feedback, ordering of raw materials,
and inspection of products is made quicker
through the use of computers, allowing
companies to operate much faster and to
produce better quality results.
264. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cheaper Research and Development: R&D, or
research and development, costs will also
decrease with the help of computers. Scientific
research can now be done using the Internet
and computer software applications designed
to develop and produce new products and
services. For example, instead of a company
having to do in-person focus groups on a
potential new product or to determine their
target market, the company can conduct a
widespread online survey for a far lower cost.
Contd….
265. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
In addition, new models of a product can be
created online using virtual pictures and
drawings instead of having to be hand-drawn.
These interactive models created using
software programs can help bring the product
and its features to life for a far lower cost than
creating an actual physical model of the given
product.
266. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Sales: Computers can help generate higher
sales and profits for businesses via a company
website. Many businesses now operate online
and around the clock to allow customers from
around the world to shop for their products and
services.
267. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.4 MANAGING THE CHANGES
OF IT
It means managing the process of
implementing major changes in IT, business
processes, organizational structures, and job
assignments to reduce the risks and costs of
change, and to optimize its benefits.
268. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
What Does Change Management Require?
A commitment from top management and an
organizational design to plan the future of IT
and Information Systems within the business.
Change management involves analyzing and
defining all changes facing the organization,
and developing programs to reduce the risks
and costs, and to maximize the benefits of
change.
``
269. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
End User Resistance
New ways of doing things creates resistance
among employees.
This is the biggest obstacle to the implementation
of new information systems.
End User Implications
Dealing with end user resistance:
Proper education and training.
Direct end user participation before
implementation helps ensure that the end users
assume ownership of a system, and that its
design meets their needs.
270. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Reengineering a Business Process
Develop a change action plan.
Assign selected managers as change sponsors.
Develop employee change teams.
Encourage open communications and feedback
about organizational changes.
271. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Change Management Activities
Human resource management handles activities -
Such as
developing innovative ways to measure, motivate,
and reward performance.
Program - Design a way to recruit and train
employees in the core competencies required in a
changing workplace.
272. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Recommendations of Consultants
Involve as many people as possible in
reengineering and other change programs.
Make constant change part of the culture.
Tell everyone as much as possible about
everything as often as possible, preferably in
person.
Make liberal use of financial incentives and
recognition.
Work within the company culture, not around it.