SlideShare a Scribd company logo
1 of 273
IT FOR MANAGERSAP Shareef MBA,M.Phil,NET,M.Com
Asst. Professor & Head, Dept. Of Management
Studies
Markaz Law College, Markaz Knowledge City
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer and generations
Software and Hardware
Algorithm and Flow Charts
Binary and Decimal systems
Introduction to computersUnit
I
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.1What is a computer ?
 Google Dictionary defines computer as “An
electronic device which is capable of receiving
information (data) in a particular form and of
performing a sequence of operations in
accordance with a predetermined but variable
set of procedural instructions (program) to
produce a result in the form of information or
signals”
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.2Generation/Evolution of
computers
 The history of the computer goes back several
decades however and there are five notable
generations of computers.
 Each generation is characterized by an
important technological development that
changes fundamentally how computers work–
leading to more compact, less expensive, but
more powerful, efficient and robust machines.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1940 – 1956: First Generation – Vacuum
Tubes
The first generation computers used vacuum
tubes as circuitry and magnetic drums for
memory. As a result they were big, and
occupied an entire room. These were
inefficient materials which consumed huge
electricity and subsequently generated a lot of
heat which caused for continuous
breakdowns.
Important characteristics or this generation
are….
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 They relied on ‘machine language’.
 They were limited to solving one problem at a
time.
 Input was based on punched cards and paper
tape. Output came out on print-outs.
 The two notable machines of this era were the
UNIVAC and ENIAC machines – the UNIVAC
is the first every commercial computer which
was purchased in 1951 by a business -the US
Census Bureau.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ENIAC
UNIVAC
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1956 – 1963: Second Generation –
Transistors
 Although first invented in 1947, transistors weren’t
used significantly in computers until the end of the
1950s.
 They were superior to the vacuum tubes because
they made computers smaller, faster, cheaper and
less heavy on electricity use.
 The language evolved from cryptic binary
language to symbolic (‘assembly’) languages.
This meant programmers could create instructions
in words. About the same time high level
programming languages were being developed
(early versions of COBOL and FORTRAN).
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1964 – 1971: Third Generation – Integrated
Circuits
 By this phase, transistors were now being
miniaturised and installed on silicon chips
(called semiconductors). This led to a massive
increase in speed and efficiency of these
machines. These were the first computers
where users interacted using keyboards and
monitors which interfaced with an operating
system.
 As a result of these advances which again
made machines cheaper and smaller, a new
mass market for computer users emerged
during the ‘60s.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1972 – 2010: Fourth Generation –
Microprocessors
 Intel Corporation is the more related word with
fourth generation. Intel developed the Intel
4004 chip in 1971, which assembled all
computer components (CPU, memory,
input/output controls) on a single chip. What
filled a room in the 1940s now fit in the palm of
the hand.
 Another major advance during this period have
been the Graphical user interface (GUI), the
mouse and more recently the advances in lap-
top capability and hand-held devices.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2010- : Fifth Generation – Artificial
Intelligence
 Computer devices with artificial intelligence
are still in development, but some of these
technologies are beginning to emerge and be
used such as voice recognition.
 AI is a reality made possible by using parallel
processing and superconductors.
 quantum computation, molecular and nano-
technology etc. are some of the other
characteristics of this generation.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The essence of fifth
generation will be using
these technologies to
ultimately create
machines which can
process and respond to
natural language, and
have capability to learn
and organize themselves.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.3 SOFTWARE
 A set of computer instructions is called a
program. A set of computer programs is called
a software. It is a collection of programs which
increase the capabilities of computer
hardware. The process of developing software
is known as programming.
 Software is intangible
 Software is the soul of computer
 It activates the dead machines.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System software
 Computer software designed to operate the
computer hardware and to provide a platform
for running application software is what is
system software. It controls the entire
computer program. System software helps use
the operating system and computer system.
 It controls all operations
 Moves data into and out the computer
 It is essential for running the computer
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Operatingsystem An operating system is a program designed to
run other programs on a computer. It is that
part of a system software which acts as an
interface between hardware and end user.
Operating system is considered to be the
back bone of a computer, managing both
hardware and software.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Basic functions of an operating system
 Schedule jobs
 Manage hardware and software resources
 Maintain system security
 Enable multiple user resource sharing
 Handle interrupts
 Maintain usage records
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Types of Operating system
 Single tasking: It allows only one program to run
at a time. One program has to close for opening
another program.
 Multi tasking: It enables a single user to have two
or more applications open at the same time.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 MS DOS: MS Disk Operating System
 Non graphical command line OS
 Released in 1981 and last updated in 1994
 User is required to type commands instead of
using a mouse.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Micro Soft Windows
 GUI
 No commands
 Simple and user friendly
 Multi tasking features
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Windows versions
 Windows 1995
 Developed for home and professional users
 Network ready OS
 Windows NT
 Known as New Technology
 A stable multitasking environment
 Enhanced security features
 Increased memory
 Network utilities
 Portability
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Windows 2000
 It is used on personal computers,
 business desktops, laptops and servers
 Windows ME was designed for home use while 2000
for business purpose
 Windows XP
 It was released in 2001
 Home and Professional variants
 Features
 Faster start up
 User friendly interface
 Fast user switching
 Clear Type font rendering mechanism
 Remote desktop functionality
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Windows vista
 Released in the year 2007
 Comes with many technical changes
 Updated GUI
 Visual style dubbed aero
 Redesigned search function
 Multimedia tools (Windows DVD Maker)
 Redesigned networking, audio, print, and display
subsystems
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Windows 7.0
 It is designed for
 Home & Business desktops
 Personal computers
 Laptops
 Notebooks
 Tablet PCs
 Media centre PCs
 It was more focused on applications and hardware
 It excluded Windows calendar, Windows Mail,
Windows Movie Maker and Windows Photo Gallery.
 These are offered in Windows live Essentials Suite.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 UNIX OS
 Unix OS is a computer OS
developed in 1969 by a group of
American Telephone & Telegraph
Company employees at labs
 Featured with client server model
 Unix is generally seen as an OS
on workstations or a network
server
 It allows multiple processors going
at once
 Unix philosophy
 Use of plain text
for storing data
 Hierarchical file
system
 Use of large
number of
software tools
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 MAC OS
 GUI
 Developed by Apple Inc.
 First introduced in the year 1984
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Classic Mac OS
 Completely graphical OS
 Ease of use
 Cooperative multitasking
 Mac OS X
 Server edition
 Runs on Apple’s line of Macintosh server hardware
 Includes work group management and administration
tools for key network services
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Linux OS
 It is a UNIX-Like operating system
 Modifiable codes
 Used on devices from supercomputers to wrist
watches
 Widely adopted for servers and embedded
systems
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Programming languages
 They are vocabulary and set of grammatical
rules for instructing a computer to perform
specific tasks. It usually refers to high level
languages such as BASIC, C, C++, COBOL,
FORTRAN etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Types of Programming
Languages
 Machine Level Languages or First Gen
Languages.
It is the language of the computer, the only
language the computer understands without
translation. Each particular computer model
has a machine language, which is based on
the internal architecture of the equipment.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Assembler languages or second gen
languages. They are also known as symbolic
languages because they include arithmetical
and logical operations.
 Because of the use of mnemonic symbols this
eases up the programmers’ risk gradually.
Assembly languages are translated by
assemblers to machine level languages so as
to be understandable to machines.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Compiler languages (High Level Languages)or
third gen languages. They are also known as
procedural languages. COBOL , FORTRAN,
BASIC, C++, C etc. are examples.
 They include plain English like and
mathematical expressions. They are easy to
write and learn and are relatively error free.
Compilers are used to translate High level
languages to Machine language.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 4th Gen Languages:
 RAMIS and FOCUS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other system software
 Device drivers: These are small files that act
as an interface between hardware and the
operating system in a computer. Hardware
requires device drivers so that the OS can see
the device and handle them properly.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Utility programs or Service programs.: these
are system programs for performing general
system support tasks. Following tasks are
performed by utility programs.
 Sorting and storing the data
 Checking or scanning the data for security
 Making a copy of all information
 Deleting, renaming, moving, copying, merging,
generating and modifying data sets.
 Providing encryption. Etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
• Compilers: High level language Machine
level codes (translation is done at once
before the program is executed)
• Interpreters: High level language
Machine level codes (translation is done line
by line)
• Assemblers: Assembly language
Machine level codes
Language translators:
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
General purpose
software
 This software provides the framework for a great
number of business, scientific, and personal
applications.
 Word processors: It is a document preparation
system. E.g. MS Word, Polaris Word
 Spreadsheet program: Commonly known as pay roll
application. Lotus, MS Excel, Polaris Spreadsheet
 DBMS: MS Access, Oracle
 CAD and CAM Programs: Auto CAD, Revit Etc.
 Internet Browser: Opera, Netscape Navigator, Internet
Explorer, Google Chrome
 E-Mail Software: Hotmail, Yahoo mail, Gmail,
Rediffmail.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Application software
 Software which is used for applications specifically
designed for users to fit their needs
 ERP: The system to integrate all data and processes
of an organization into a single unified system.
 Tally
 Peachtree
 QuickBooks
 SAP
 Decision Support System:
 Cost accounting system
 Capital Budgeting system
 General Decision Support System
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Artificial Intelligence System : E.g. Robotics
 Expert Systems: Used for complex and ill
structured tasks. It helps non experts to make
decisions comparable to those of an expert.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.4 Hardware
 The physical parts of computer are called
hardware. Computer hardware is the
collection of physical parts of a
computer system. This includes
the computer case, monitor, keyboard, and
mouse. It also includes all the parts inside the
computer case, such as the hard disk drive,
motherboard, video card, and many
others. Computer hardware is what you can
physically touch.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Basic computer architecture.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The CPU
 It is also known as the processor.
 CPU is the heart, brain and soul of computer.
 Programs and instructions are read and
executed by CPU.
 Intel, AMD, Motorola are popular processor
manufacturers.
 Two basic parts of the CPU are
 Control unit and
 Arithmetic and logic unit.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Control unit
 It is the most important unit of the CPU. All the
computer resources are managed from the
control unit. It takes instructions from the
memory and sends the necessary signals to
ALU to perform the operation needed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ALU
 ALU is a separate section of CPU which
performs computation like addition,
subtraction, multiplication and division and
logical operations such as the comparison of
two numbers. The tasks are performed with
special storage locations called registers.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Memory Unit
 Memory is a storing device which stores
programs, data etc. any program to be used in
the computer should be stored in the memory.
 The memory capacity is measured in KB, MB,
GB, TB, PB,EB, ZB and YB
 Computer memory is divided into
 Internal memory or main memory or Primary
memory
 Additional memory or, secondary memory or
Auxiliary memory
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internal memory or main memory or
Primary memory
 It stores data needed for current tasks by the
computer and receives data from the
secondary storage as and when needed.
Magnetic core memory was used previously
but it is now outdated.
 In modern computers, Micro electronic
semiconductor storage circuits are used to as
primary storage. They are small sized, high
speed, shock and temperature resistant chips.
 Semi conductor memories are of two types.
They are RAM and ROM
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
RAM- Random Access Memory
 RAM is the popular primary storage medium. It
is read write memory. RAM is a temporary
memory or volatile memory. All the information
goes out when the system is switched off.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ROM-Read Only Memory
 This memory is used to store information
permanently. The data is not lost if power is
switched off. It is read only memory since data
cant be written. E.g. ROM-BIOS (ROM-Basic
Input Output System). This program controls
and supervises the basic operations of I/O
devices.
 Types of ROM are
 PROM
 EPROM
 EEPROM
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Additional memory or, secondary memory or
Auxiliary memory
 Primary storage is inbuilt with CPU, but
secondary memory is used in separate unit or
units. The capacity of Primary memory is
limited whereas secondary memory has
infinite capacity of millions and billions of
bytes.
 Different secondary storage devices are
discussed below.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Magnetic Tape
 The oldest storage system
 It makes copies of audio, video and data.
 It is employed with a tap drive to store
and retrieve data.
 The biggest drawback is that it can only
access data sequentially.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Floppy diskettes
 It was first introduced by IBM in the year 1970.
 It consists of a circle shaped plastic material
which is coated with an oxide material. This
Plastic material is covered by a protective
square jacket with a hole to read the data by
the floppy drive.
 The maximum storage capacity of a latest
Floppy disk is 1.44 MB.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Organization of data on a disk
 To use a disk for storing data, it must be
magnetically mapped. Then only the computer
can go directly to a specific location in the disk.
The process of mapping a disk is called formatting
or initializing.
 Initializing is done by creating tracks and sectors.
 Magnetic concentric circles are called tracks.
 Short segments created like dividing a pie is
called sectors.
 Each sector is assigned a unique number so that
the data access by the computer is easy.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hard disc
 They are the most popular device for storing
data.
 Large volume of data can be stored.
 A hard disc is a set of different platters fixed on
a spindle. Each platter is coated with iron
oxides.
 Unlike floppy, the drive and disc is a single
chamber.
 TBs of data can be stored in Hard disks.
 They may be internal or external
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internal architecture of a HD
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 An external hard drive is a
portable storage device that
can be attached to a computer
through
a USB or FireWire connection,
or wirelessly. External hard
drives typically have high
storage capacities and are
often used to back up
computers
External/ Portable Hard disk
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-ROM Disks
 It stands for Compact Disk Read Only
Memory.
 It is an Optical Laser Disk.
 There are two lasers. One laser beam writes to
the recording surface and another laser reads
the data from light sensitive recording surface.
 The data on the disk are fixed, they cant be
altered.
 It has a storage capacity of over 650 MB
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-R
 CD-R stands for Compact Disk Recordable.
 It is a WORM (Write Once Read Many)
Memory.
 One can write only once on CD-R
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-Rewritable
 CD-RW was first introduced by Hewlett
Packard
 It permits for repeated recordings on a disk
 Data on this CD can be altered.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
DVD
 DVD stands for Digital Video Disk or Digital
Versatile Disk.
 It stores up to 20 GB of Text, Graphics and
video.
 Variations are
 DVD-ROM
 DVD-R
 DVD-RW
 DVD-RAM
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Blu Ray Disc
 It is developed to enable recording, rewriting
and playback of High Definition Video, as well
as high volume of data.
 They can hold up to 50 GB capacity.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WORM Cards
 A Write Once Read Many (WORM) digital memory
card is intended for professional uses such as
police investigations, court testimony, electronic
voting and other applications where data files
must be protected from alteration or deletion.
Applications
 Police photography and witness/suspect
interviews, where courts require proof that photos
and audio recordings are genuine.
 Court proceedings, such as trials and depositions.
 Electronic voting, where recorded votes must be
tamper-proof.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cash registers which record
transactions for tax collection
purposes.
Event recorders, such as security
cameras and “black box” flight-data
recorders.
Medical devices which retain
individual patient treatment data.
Personal digital assistants (PDAs)
and similar devices used by physicians
and other health-care professionals to
track patient interactions.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
SD Cards
 SD stands for Secure Digital Cards
 Its is a non volatile memory card.
 It is commonly used in mobile phones and
other portable electronic devices.
 A card reader is used to connect to the
computer.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flash Drive
 USB flash drive/ pen drive is a popular storage
medium.
 It is highly portable because of its small size.
 Large volume of data can be stored in it
 IT uses USB(Universal Serial Bus) technology.
 They are removable and rewritable.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
INPUT DEVICES
 They are the devices used for giving
necessary data into the computer, then they
are converted into a form that is acceptable to
the computer.
1. Key board
2. Mouse
3. Light pen
4. Track ball
5. Joystick
6. MICR
7. OMR
7. OCR
8. Bar coding
9. Voice input
10. Touch screen
11. Touch pad
12. scanner
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Keyboard
 A keyboard detects key pressings with the
help of an electronic circuit called keyboard
encoder. The encoder sends a binary code to
the computer. It can be connected to the CPU
with or without cable.
 Types of keys in a keyboard are
 Alphanumeric keys
 Punctuation keys
 Special keys.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Mouse
 Mouse is a pointing device.
 It controls the movement of cursor in the
display unit.
 Types of mice include
 Mechanical mouse
 Opto-mechanical mouse
 Optical mouse
 Cordless mouse
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Light pen
 Light pen also is a pointing device.
 It selects an option by simply pointing at it.
 It is used in menu based applications
 It is also used in drawing graphics in CAD
 An engineer or architect or fashion designer
can draw sketches or pictures directly on the
screen.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Track ball
 Track ball is a pointing device.
 It works like a mouse but is fixed and takes
less space.
 It has a ball in the middle, a right and left
clicks.
 Apple computer’s Power Book and IBM
ThinkPad notebooks used Track balls.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Joystick
 It is a vertical stick which moves
the graphic cursor in a direction
the stick is moved
 It is popularly used by children to
play video games.
 Pilots use it as flight control in the
cockpit of aircraft.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MICR
 Magnetic Ink Character Reader.
 Human readable characters printed on
documents using a special magnetic ink is
read by MICR.
 MICR reads the magnetic pattern of letters and
compares it with the one which is stored in its
memory.
 Bank details such as branch code, account
number, cheque number etc. can be read by
MICR.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OMR
 Stands for Optical Mark Reader
 This device is designed to read markings
placed in specific places on a form or card.
 Pre-printed documents are designed with
boxes or circles that can be filled by a Pen or
Pencil. This documents are then given to the
reader.
 The reader reads the position of markings and
processes it.
 OMR sheets are commonly used in various
entrance and competitive examinations.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OMR Machine
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OCR
 It reads numeric and alpha numeric data from
printed documents
 It can read up to 300 papers per hour.
 It is used in the preparation of electricity bills,
telephone bills, insurance premium notices
etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Bar Code Reader
 It can read barcodes printed
on packages, badges and
books.
 A barcode uses small bars on
varying thickness and spacing
with some numbers.
 Manufactures use UPC-
Universal Product Code.
 In case of books ISBN is used.
 The information stored in the
barcode is displayed on the
screen when it is read.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Voice input
 Voice or audio input is given through a Mic
 The given voice instructions will be compared
with those already stored in the system.
 Only the trained systems can recognize voice
inputs.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch pad
 They are pads sensitive to finger touch.
 It is another type of pointing device.
 Laptops use this technology instead of mouse.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch screen
 They are screens sensitive to finger touches.
 The touch sensitive transparent panel covered
in the screen enables the sensitivity.
 Smart phones, information kiosks, and tablet
computers use touch screens.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Scanner
 Scanners are used to scan papers and paper
type documents. They can convert hard copies
into soft copies by creating electronic images.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OUTPUT DEVICES
 O/P devices are used to present computer
information in a readable form. LCD screens
and Printers are the most commonly used
output devices.
1. Monitors
2. Printers
3. COM(Computer Output on Microfilm)
4. Audio System (speaker)
5. Graphical O/P devices
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Monitors
 Monitors are also called VDU- Visual Display
Unit
 A monitor may be
 CRT
 LCD
 CRT monitors use an electronic gun and an
emitting display in which tiny colored dots are
thrown.
 LCD’s are flat screens which use TFT
technology.
 All monitors depend on a video card, which is
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Printers
 They are used to print hard copies of
documents.
 They are connected to the system by a cable
to the parallel port or a USB port.
 They print on ordinary paper, specially
prepared dispatch notes, invoices or packing
slips.
 Printers are classified on the basis of their
printing mechanism into
 Impact printers and
 Non impact printers
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Impact printers
 Impact printers utilize some form of striking
device to transfer ink from a ribbon onto the
paper being printed to form images or
characters.
 They fall into two types- Serial or Line printing
 Serial printers print one character at a time.
 Commonly used Serial Printers are
 Dot Matrix Printers and
 Daisywheel printers.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Dot matrix printers
 They use wire needles or pins which strike the
ribbon against the paper in the pattern
necessary to produce each character.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Daisy wheel printers
 They use a new element of printing called a
‘daisywheel’.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Line printers
 A line printer works with much higher speed
than a serial printer.
 It can print one line at a time.
 Chain printers and drum printers are the
commonly used line printers
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Chain printers
 A chain printer has a chain that rotates at a
constant speed in a horizontal plane.
 The chain has a 48 numbers, alphabets and
special symbols.
 The magnetically controlled hammers press
the chain onto the paper.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Drum printers
 These printers have a solid cylinder and as
many bands on it as the number of print
positions.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Non impact printers
 They don’t strike the paper.
 They produce prints with electro static, chemicals,
inkjet and thermal technologies.
 Non impact printers are most widely used
nowadays.
 They are faster, smarter and clearer.
 The three different types are
 Thermal printers
 Ink-Jet printers
 Laser printers
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Thermal printers
 They are used commonly as portable printers
to make print out of tiny slips such as an ATM
Slip or a Debit or Credit Card payment slip.
 They use pins which are heated by the electric
element and then pressed against the paper.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Inkjet printers
 They make use of fine spray nozzles that
create the image of character or graphics on
the paper by spraying tiny or small drops of ink
into the paper.
 It uses ink cartridges. Usually an inkjet printer
has a black cartridge and a color cartridge.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Laser jet printers
 They use both laser and xerographic
technology.
 They can print with high quality
 They print not only alphanumeric characters
but also drawings graphics and other
documents
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer output microfilm.
 It records computer output as microscopic
images on roll or sheet film.
 A microfilm reader reads the output.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Speakers.
 They create audio output.
 Computer speakers do the same as other
speakers do.
 Speaker system is controlled by a sound card.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Plotters
 It is a device that can draw graphs, designs
and maps into a paper and even to a plastic or
metal plates.
 It is used in fashion designing, engineering
drawings, business analysis using visual terms
such as bar charts, graphs and diagrams.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.5 Algorithm & Flow Charts
 An algorithm is a finite list of instructions specifying a
sequence of operations and that give the answer to
any problem of a given type.
 Example consider the Euclidean Algorithm stated as
follows
Given two positive integers A and B, find their common
divisor
The algorithm involves the construction of descending
sequence of numbers.
The first is the larger of two numbers, the second is the
smaller, the third is the reminder from dividing the
first by the second, the fourth is the remainder from
dividing the second by the third; and so forth. The
process stops when there is zero remainder. The
G.C.D is the last divisor in the series.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 For example, the descending sequence of numbers for
greatest common divisor of 44 and 28 is
44, 28, 16, 12, 4, 0
The last divisor is 4, so 4 is the result. The algorithm can be
written as follows.
1. Write down A, B
2. If B is greater than A, exchange them.
3. Divide A by B to get the remainder
4. If R is equal to Zero, stop; B is the G.C.D
5. Replace A by B; (i.e. B A)
6. Replace B by R; (i.e. R B)
7. Go to step 3
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flow charts
A flow chart is a diagram prepared by the
programmer for describing the sequence of steps
of complex processes involved in solving a
problem. It helps the programmer avoid
comprehensive thinking and probable mistakes in
programming process. Four categories of flow
charts are
• System outline charts (Global map)
• System flow charts (National map)
• Run flow charts (State map)
• Program flow charts (District map)
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System outline charts:
• These charts only lists the inputs, files processed and outputs
without regard to any sequence whatever.
System flow charts:
• These flow charts present an overview of the data flow through all
parts of a processing system. It shows the flow of documents,
operations and activities; persons and work stations. It depicts the
relationship between input, processing and output. The system
flow chart includes the following main elements
• Input data sources and their medium
• Processing steps
• Intermediary and final output and storage devices
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Run flow charts
 These are extracted from system flow charts to
show the reference of computer operations to be
performed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Program flow charts
 They are the detailed and are concerned with the
logical/arithmetic operations on data within the
CPU and the flow of data between the CPU. It
shows the flow between input/output peripherals
also.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.6 Decimal v/s binary number
systems
 The radix or base of decimal system is 10
because it uses numbers 0 to 9 . It is also
called base 10 number system.
 Here, the weight of each digit depends upon
its relative position. E.g. 3256
=3000+200+50+6
=3x103 +2x102 +5x101 +6x100
if the left most digit of the number is nth digit ,
then we can write nth digit x 10n-1 (nth digit x
(base)n-1 )
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 The radix of the binary system is 2. It uses only 0s
and 1s . Data is stored in a digital or electronic
device such as a computer in binary system.
 The data are based on the right to left position of
digits. E.g. take the binary number 10100. using
the equation (nth bit x (base)n-1 )
10100= 1x24 +0x23 +1x22 +0x21 +0x20
10100=16+0+4+0+0
10100=20
Above shown is the binary decimal conversion.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 For fraction numbers
1.001= 1x20 +0x2-1 +0x2-2 +1x2-3
1.001=1+0+0+.125
1.001=1.125
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Decimal to binary conversion (double dabble
method)
Therefore, the binary equivalent of 14 is 1110.
2 14 Remainde
r
2 7 0
2 3 1
2 1 1
0 1
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 For fractions
E.g. 0.125
Binary equivalent of 0 is 0 itself
And for fractional part it is 001 therefore 0.125 is
converted as 0.001
0.125
X2
0.25 0
X2
0.5 0
X2
0 1
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classification of Networks-
LAN,MAN,WAN
Methods of Networking
Internet and services
E-Commerce
Computer networking, internet
and E-Commerce.Unit II
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.1 Computer Networks
 A network is a set of devices interconnected by
communication links. It is a collection of
computers and other devices set together for
the purpose of sharing information and
resources.
 Networking improves the capabilities of
computers.
 Scope of networks include
 File sharing
 Print sharing
 E- Mail
 Remote access
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Area based classification of
networks.
 LAN- Local Area Network
 MAN-Metropolitan Area Network
 WAN-Wide Area Network
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Local Area Network
 A LAN is a group of computers and network
devices connected together, usually within the
same building, campus or spread over a
limited distance. It facilitates high speed data
transmission at cheap cost.
 LANs are privately owned and operated. LAN
uses high speed media (1mbps to 30 mbps or
more)
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of LAN
 Different users are connected together
 Terminals are located in a small geographic
location
 Devices are connected via cables or wireless
connectivity like Wi-Fi
 A LAN could be connected to other LANs and
the internet or other WAN.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MAN-Metropolitan Area
Network
 It is larger and spans over a city or town.
 It refers to networks which interconnect
systems or LANs within a metropolitan area
 A MAN can support both data and voice.
 Cable TV networks are examples of MANs.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAN-Wide Area Networks
 It covers a very large geographic area and
uses different communication systems such as
Telephone services.
 E.g. banking networks, Railway Reservation
Systems etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of WAN
 Thousands of computers spread over a wide
geographic region are connected together.
 They use communication channels of a third
party.
 These channels are of low capacity and error-
prone.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.2 Network Topology
 Topology means the method in which
terminals are connected in a network.
Commonly, there are following types of
methods.
 Star network
 Ring network
 Bus network
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.Star network
 It is the connection between a host computer and
local computers. The host computer works as the
central computer. Different terminals can
communicate only via the host computer which
centrally controls the others.
 Advantages are
 Minimal line cost
 Adding of new nodes will not increase delay in
communication between two nodes.
 Failure of one node doesn’t affect the network.
 The most important problem with this is that the
entire network depends on the host computer. The
whole network fails when it fails.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Ring network
 Computers are linked by a closed loop in a ring
network to facilitate data transfer from one
computer to the other. If the data is not needed for
a particular computer, it ignores and simply
passes to the other. The process continues till it
reaches the destination.
 This is a true distributed processing since there is
no central computing.
 It is reliable because it doesn’t depend upon any
host computer.
 Addition of nodes will increase delay. And it
requires complicated control softwares.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Bus network
 Bus network also has no central computer.
Computers are connected by a single circuit
used as communication path.
 It is reliable.
 New computers can be very easily added.
 It also uses high complicated software.
 Breakdown in the main circuit affects the entire
network.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.3 Internet
 Internet is the network of networks. It is the
connection of crores and crores of computers
connected together. The word internet is the
combination of interconnection and network.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Uses of internet
1. E-Mail
2. FTP
3. Social networks
4. Internet Chatting
5. WWW
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Mail
 Electronic mail system has overridden the
traditional mailing systems such as telegram
and Fax.
 Any type of massages can be sent on an E-
Mail. Video, audio, text and files can be sent
along with mails.
 Most popular E-Mail providers are Google,
Yahoo, Hotmail, rediffmail etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
FTP
 FTP stands for File Transfer Protocol
 It helps users to download files from internet.
 It is the most secure way of transferring files
over the internet.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Social Networks
 The recent trend in internet
 Lakhs of people are connected together.
 People can chat, express their opinions on
various issues so that anyone can view it.
 They turn to Social Media- creating a new
media culture.
 E.g. Face book, Twitter, Whatsapp Etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internet chatting
 It may be an audio-video chatting or only text
chatting.
 It makes use of various chat providers such as
Skype or IMO.
 Anyone can be connected to anywhere in the
world using this facility.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WWW
 www stands for World Wide Web
 It’s a web of information
 It’s the fastest growing facility using internet.
 Web sites are the collection of web pages and
WWW is the collection of web sites.
 A web page is created using a web language
such as HTML or front page or PHP.
 HTTP helps users to access web pages from
www.
Contd.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 A web browser is the program to access web
pages from internet. E.g. internet explorer,
Mozilla firefox, Google Chrome etc.
 Search engines are devices to search for
information on the internet. They are the
database that contain references to thousands
of resources.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
VPNs-Intranet and Extranet
 VPNs are private data networks that make use
of public networks such as internet for data
transmission.
 A VPN may be Intranet based or Extranet
based.
 An intranet is a network for users in an
organization, Although they geographically
disperse. It can be used only by authorized
personnel of an organization. External users
are not allowed to use it.
Contd.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 An intranet is an integration of E-Mail, FTP,
and web servers with the internal applications.
 An Extranet on the other hand is a connection
of intranets used by different organizations to
facilitate inter-organizational data transfer.
E.g. clients and suppliers network.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAP- Wireless Application
Protocol
 Wireless Application Protocol (WAP) is a technical
standard for accessing information over a
mobile wireless network. A WAP browser is a web
browser for mobile devices such as mobile
phones that uses the protocol. Before the introduction
of WAP, mobile service providers had limited
opportunities to offer interactive data services.
Following mobile services use WAP
 Email by mobile phone
 Tracking of stock-market prices
 Sports results
 News headlines
 Music downloads
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.4 E-Commerce
WTO defines E-Commerce as “ a commercial
process that includes production, distribution,
sales or delivery of goods and services
through the electronic means”
In the process of E-Commerce, data is
transmitted from one organization to the other
in electronic form. This data interchange is
known as EDI- Electronic Data Interchange.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Commerce models/types of E-
Commerce
 Business to Business (B2B)
 Business to Customer (B2C)
 Consumer to consumer (C2C)
 Business to Government (B2G)
 Business to Employee (B2E)
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Business –B2B
 In B2B, transactions take place between 2
different business organizations.
 For example, Amazon.com’s online book store.
 Various book publishers may develop their
own distribution channel or may have a
rapport with Amazon.com. In the second case,
they transact with Amazon in B2B mode. They
do this because the books will be viewed by a
large audience.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Consumer (B2C)
 B2C means sale of goods by a business to the
public. It may be either products or services
such as airline booking or stock trading.
 Low marketing costs, lower order processing
costs, better customer services etc. are the
benefits of B2C
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Consumer to consumer
 It consists of individuals using the online
advertisement websites to sell products and
services directly to other individuals. Online
auction is a very good example for C2C
 Dubizzile, OLX etc are mostly used online ad-
websites.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Government B2G
 Apart from the main B2G activities such as
paying government taxes like vehicle tax,
property tax and income tax, Government
procure goods and services from the Business
organizations. These products and services
range from office stationary to military
equipments.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Employee (B2E)
 It is an internal E-commerce model and it uses
intranet.
 Examples are, online insurance policy
management, corporate dissemination, special
offers for the employees etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database concepts
Information Systems
System development life cycle
Various types of information systems
DBMS and Information
Systems
Unit
III
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.1 Types of databases
Operational databases: They store detailed
data needed to support operations of the entire
organization. They are called as Subject Area
Databases (SADB), Transaction Database,
Inventory Database and Production Database.
E.g. Customer Database, Personnel Database.
Management database: They store data and
information extracted from selected operational
and external database. It consists of
summarized data and information needed by the
organization’s managers and other end users.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Information Warehouse database: An
information warehouse stores data from
current and previous years. This is usually
data taken from the various operational and
management databases of an organization.
External database: For some databases,
there is option to connect with external
privately owned online databases. Its for
smooth commercial information services.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Text databases: A full-text database is
a database that is comprised of several books,
articles, journals, magazines, newspapers and
other textual documents but does not include
graphical documents such as drawings, diagrams
or pictures. Each of the referenced documents
can be viewed, printed or downloaded online.
Image databases: Wide variety of images can be
stored electronically in image databases. Even
electronic encyclopaedia are available on CD
ROM disks which store thousands of
photographs of text. Image data processing is the
use of image database in business organizations
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.2What is an information
system
 An information system can be defined as a set
of interrelated components that collect,
process, store and distribute information to
support decision making and control in an
organization.
 In addition to the above, information systems help
managers and workers analyze problems,
visualize complex subjects, and create new
products.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERSAP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.3 System Development Life Cycle
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Preliminary analysis
 Conduct the preliminary analysis
 Propose alternative solutions
 Describe the costs and benefits
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Systems analysis, requirements
definition
 Collection of Facts
 Scrutiny of the existing system
 Analyzing the proposed system
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Systems design
 Describes desired features and operations in
detail, including screen layouts, business
rules, process diagrams, pseudocode and
other documentation
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.Development
 Development of different software modules is
done at this stage.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5. Integration and testing
 All the different modules are brought together.
They are integrated and tested for errors.
Corrections are made if errors are found
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Acceptance, installation,
deployment
 Top management officials approve the system
 Install the system and allocate the tasks
 Appropriate staff is deployed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
7. Maintenance and evaluation
 Ensure the smooth working of the system
 Maintenance team observes the work
 Mistakes are repaired
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.4 Types of information
systems
Transaction processing systems.
TPS is an information system that keep track of
the elementary activities and transactions of
the organization, such as sales, receipts, cash
deposits, payroll, credit decisions, and the flow
of materials in a factory.
It is a computerized system that performs and
records the daily routine transactions
necessary to conduct business
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Management information systems
MIS provide middle managers with reports on
the organization’s current performance. This
information is used to monitor and control the
business and predict future performance. It
uses data supplied by TPS and compresses
them into reports.
The picture depicts how MIS transforms
transaction level data from inventory,
production, and accounting into MIS files that
ate used to provide managers with reports.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Decision Support Systems
DSS focuses on problems that are unique and
rapidly changing, for which the procedure for
arriving at a solution may not be fully
predefined in advance.
It takes information from TPS and MIS. But
often bring in information from external
sources, such as the current stock prices or
product prices of competitors
These systems are employed by “super-user”
managers and business analysts who want to
use sophisticated analytics and model to
analyze data
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
• Production data
• Marketing data
• Finance data
• HR data
Model base
• Statistical models
• Forecasting models
• Planning models
• Operational models
DSS Software
• Manage database
• Manage model base
• Manage end user
interface
User interface
User
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Executive Support System (ESS)
ESS addresses the decision making needs of
senior management. It supports strategic
issues and long term trends.
ESS present graphs and information from many
sources through an interface that is easy for
senior management. It is designed to
incorporate data about external events, such
as tax laws or competitors, but they draw
summerized information from internal MIS and
DSS.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
Data warehouse
datamart
Data mining
EIS SoftwareExecutive’s staff
Executive
Query
Output
Components of an executive information
system
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Enterprise Resource Planning Systems
These integrate business processes in
manufacturing and production, finance and
accounting, sales and marketing, and human
resources into a single software system .
For example, when a customer places an order, the
data automatically go to the other parts which are
affected by it. The transaction gives information to
the warehouse to pick the products and arrange
for shipment. The warehouse informs the factory
to replenish what has been reduced. Accounting
department takes steps to send customer an
invoice. Customer service executives observe the
progress of the order.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Supply Chain Management System
This system help the business to manage
relationship with suppliers. Suppliers,
purchasing firms, distributing men and logistics
companies benefit by this system. It shares
information on orders, production, inventory
levels and delivery of goods and services so
that the above groups can get efficient
services.
It is an inter-organizational system because they
automate the flow of information across
organizational boundaries.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Customer Relationship Management System
CRMS helps the management to keep effective
relationship with its customers. It provides
information to coordinate the sales and
marketing activities in such a way as to create
delighted customers. The most profitable
customers can be retained by this system.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Knowledge Management Systems.
These enable an organization to better manage
process for capturing and applying knowledge and
experience in the firm, and make it available
wherever and whenever it is needed to improve
business and management decisions.
They link the firm to external sources of knowledge.
This firm knowledge is unique, difficult to imitate and
can be leveraged into long term strategic benefits.
The basic elements of knowledge management are
1.Knowledge creation
2.Knowledge sharing
3.Knowledge utilization
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.5 Functional information
systems
 These are the systems based on different
functions of a business organization
 Different functional subsystems are as follows
1. Production information systems
2. Marketing information systems
3. Financial information systems
4. HR information systems
 These systems are dealt with in detail.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Production Information Systems
 These systems facilitate efficient
productions/operations management.
Production management encompasses
design, implementation, operation and control
of systems made up of people, materials,
capital equipment, money and information to
accomplish specific objectives
 Following is a model of production information
system
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Marketing information systems
 Marketing information systems are designed
and operated to provide relevant information
on the following aspects
1. Type of products to be offered
2. Price at which products to be offered
3. Place where products have to reach
4. Promotion of products to create loyal customers
 The outline of the system is as follows
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Financial Information Systems
 Finance is the life blood of every business
organization. Financial Information systems
help manage financial affairs effectively. It is
useful in taking major financial decisions, i.e.
finance decisions, investment decisions and
dividend decisions.
 The outline of a FIS is depicted below
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Accounting Information System
 It consists of the people, records, and methods
used to gather financial information about
business events, record it, process it into a
useful form, and communicate the information
to end users and decision makers in planning,
forecasting and controlling.
 It works with many subsystems such as budget,
final accounts, costing, inventory, receivables etc
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computerized Accounting
Package
 It is a package designed for accounting with
the use of computers for recording, reporting
and analysing the financial data of a business.
These are software programs that are stored
on a company’s computer, network server, or
remotely and accessed via the internet. A
business can customize the software to suite
the particular needs.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Salient features of Computerized Accounting
Package.
 Fast, Powerful and integrated.
 Complete visibility.
 Enhanced user experience
 Accuracy.
 Improves the business performance
 Quick decision making
 Complete reliability.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
HR Information System
 HR Management is a major function in any
business firm. HRIS facilitate systematic ways
for HRM.
 It is an organized method of providing
information about HR , their functioning, and
external factors relevant to HRM.
 The outline is depicted below
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer Viruses
Cyber Crimes
IT act 2000 and Cyber laws
Computer Viruses, Cyber Crimes and
LawsUnit
IV
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.1 COMPUTER VIRUSES
 A computer virus is a program designed to
harm or cause harm on an infected computer.
Its spreads through e-mail attachments,
portable devices, websites containing
malicious scripts and file downloads. A
computer virus attaches itself to the host files
and always activate whenever you open the
infected files. The virus can replicate itself and
then infect the other files on your computer
causing more damage. Below is a list of
different types of computer viruses and what
they do.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Macro Viruses
These viruses infect the files created using some
applications or programs that contain macros
such as doc, pps, xls and mdb. They
automatically infect the files with macros and also
templates and documents that are contained in
the file. They hide in documents shared through e-
mail and networks.
 Macro viruses include:
 Relax
 bablas
 Melissa.A
 097M/Y2K
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Memory Resident Viruses
They usually fix themselves inside the computer
memory. They get activated every time the OS
runs and end up infecting other opened files.
They hide in RAM.
 Memory Resident Viruses Include:
 CMJ
 meve
 randex
 mrklunky
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Overwrite Viruses
These types of viruses delete any information in
a file they infect, leaving them partially or
completely useless once they are infected.
Once in the computer, they replaces all the file
content but the file size doesn’t change.
 Overwrite Viruses Include:
 Trj.Reboot
 way
 trivial.88.D
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Direct Action Viruses
These viruses mainly replicate or take action
once they are executed. When a certain
condition is met, the viruses will act by
infecting the files in the directory or the folder
specified in the AUTOEXEC.BAT. The viruses
are generally found in the hard disk’s root
directory, but they keep on changing location.
 Direct Action Viruses Include:
 Vienna virus
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Directory Virus
Also known as cluster virus or file system virus.
They infect the computer’s directory by
changing the path indicating file location. They
are usually located in the disk but affect the
entire directory.
 Directory Viruses Include:
 dir-2 virus
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Web Scripting Virus
Most web pages include some complex codes in
order to create an interactive and interesting
content. Such a code is often exploited to
cause certain undesirable actions. They mostly
originate from the infected web pages or
browsers.
 Web Scripting Viruses Include:
 JS.Fortnight – a virus that spreads via malicious
emails.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Multipartite Virus
These type of viruses spread in many different
ways. Their actions vary depending on the OS
installed and presence of certain files. They
tend to hide in the computer’s memory but do
not infect the hard disk.
 Multipartite Viruses Include:
 flip
 invader
 tequila
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 FAT Viruses
These lardy viruses attack the file allocation
table (FAT) which is the disc part used to store
every information about the available space,
location of files, unusable space etc.
 FAT Viruses Include:
 the link virus
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Companion Viruses
These types of viruses infect files just like the
direct action and the resident types. Once
inside the computer, they ‘accompany’ other
existing files.
 Companion Viruses Include:
 Asimov.1539
 stator and terrax.1069
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Polymorphic Virus
They encode or encrypt themselves in a different
way every time they infect your computer. They
use different encryption and algorithms. This
makes it difficult for the antivirus software to
locate them using signature or string searches
(since they are very different in each encryption).
 Polymorphic Viruses Include:
 Marburg
 tuareg
 Satan bug
 elkern
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Worm
This program is very similar to a virus and has the
ability to self-replicate leading to negative effects
on your computer.
 Worm Viruses Include:
 lovgate.F
 sobig.D
 trile. C
 PSWBugbear.B
 Mapson
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Trojans
Trojans can illegally trace important login details
of users online. For example E-Banking is very
common among users, therefore, vulnerability
of tracing your login details whenever your PC
is working without any strong powerful
antivirus installed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Email Virus
This is a virus spread via an email. Such a virus will
hide in an email and when the recipient opens the
mail.
 Browser Hijacker
This virus can spread in many different ways
including a voluntary download. If infects certain
browser functions especially in form of re-directing
the user automatically to certain sites. A good
example is
 Browser Hijackers Include:
 the cool web search
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Boot Infectors
They include the boot sector plus master boot
record types. All the viral codes can be
separate location; however they infect the hard
disks or the floppy.
 Boot Infectors Include:
 The brain virus -it is the very first wild virus to be
created.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
From what we have seen, the many types of
computer viruses and their effects are very
harmful and can completely damage your
system. Always make sure your system is up to
date. Also install antivirus software. The
antivirus program protects your computer and
the personal information in it.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.2 Introduction to Cyber
Crimes
 Due to increase in the number of netizens,
misuse of technology in the cyberspace was
clutching up which gave birth to cyber crimes
at the domestic and international level as well.
 Though the word Crime carries its general
meaning as “a legal wrong that can be
followed by criminal proceedings which may
result into punishment” whereas Cyber Crime
may be “unlawful acts wherein the computer is
either a tool or target or both”.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classifications Of Cyber Crimes: Cyber
Crimes which are growing day by day, it is very
difficult to find out what is actually a cyber
crime and what is the conventional crime so to
come out of this confusion, cyber crimes can
be classified under different categories which
are as follows:
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Cyber Crimes against Persons:
There are certain offences which affects the
personality of individuals can be defined as:
 Harassment via E-Mails: It is very common type of
harassment through sending letters, attachments of
files & folders i.e. via e-mails. At present harassment
is common as usage of social sites i.e. Facebook,
Twitter etc. increasing day by day.
 Cyber-Stalking: It means expressed or implied a
physical threat that creates fear through the use to
computer technology such as internet, e-mail, phones,
text messages, webcam, websites or videos.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Dissemination of Obscene Material: It includes
Indecent exposure/ Pornography (basically child
pornography), hosting of web site containing
these prohibited materials. These obscene
matters may cause harm to the mind of the
adolescent and tend to deprave or corrupt their
mind.
 Defamation: It is an act of imputing any person
with intent to lower down the dignity of the person
by hacking his mail account and sending some
mails with using vulgar language to unknown
persons mail account.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Hacking: It means unauthorized control/access
over computer system and act of hacking
completely destroys the whole data as well as
computer programmes. Hackers usually hacks
telecommunication and mobile network.
 Cracking: It is amongst the gravest cyber crimes
known till date. It is a dreadful feeling to know that
a stranger has broken into your computer
systems without your knowledge and consent and
has tampered with precious confidential data and
information.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 E-Mail Spoofing: A spoofed e-mail may be said
to be one, which misrepresents its origin. It shows
it’s origin to be different from which actually it
originates.
 SMS Spoofing: Spoofing is a blocking through
spam which means the unwanted uninvited
messages. Here a offender steals identity of
another in the form of mobile phone number and
sending SMS via internet and receiver gets the
SMS from the mobile phone number of the victim.
It is very serious cyber crime against any
individual.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Carding: It means false ATM cards i.e. Debit and
Credit cards used by criminals for their monetary
benefits through withdrawing money from the
victim’s bank account mala-fidely. There is always
unauthorized use of ATM cards in this type of
cyber crimes.
 Cheating & Fraud: It means the person who is
doing the act of cyber crime i.e. stealing
password and data storage has done it with
having guilty mind which leads to fraud and
cheating.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
 Assault by Threat: refers to threatening a person
with fear for their lives or lives of their families
through the use of a computer network i.e. E-mail,
videos or phones.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Crimes Against Persons Property: As there
is rapid growth in the international trade
where businesses and consumers are
increasingly using computers to create,
transmit and to store information in the
electronic form instead of traditional paper
documents. There are certain offences which
affects persons property which are as follows:
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Intellectual Property Crimes: Intellectual
property consists of a bundle of rights. Any
unlawful act by which the owner is deprived
completely or partially of his rights is an offence.
The common form of IPR violation may be said to
be software piracy, infringement of copyright,
trademark, patents, designs and service mark
violation, theft of computer source code, etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber Squatting: It means where two persons
claim for the same Domain Name either by
claiming that they had registered the name first
on by right of using it before the other or using
something similar to that previously. For example
two similar names i.e. www.yahoo.com and
www.yaahoo.com.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber Vandalism: Vandalism means deliberately
destroying or damaging property of another. Thus
cyber vandalism means destroying or damaging
the data when a network service is stopped or
disrupted. It may include within its purview any
kind of physical harm done to the computer of any
person. These acts may take the form of the theft
of a computer, some part of a computer or a
peripheral attached to the computer.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Hacking Computer System: Hacktivism attacks
those included Famous Twitter, blogging platform
by unauthorized access/control over the
computer. Due to the hacking activity there will be
loss of data as well as computer. Also research
especially indicates that those attacks were not
mainly intended for financial gain too and to
diminish the reputation of particular person or
company.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Transmitting Virus: Viruses are programs that
attach themselves to a computer or a file and
then circulate themselves to other files and to
other computers on a network. They usually affect
the data on a computer, either by altering or
deleting it. Worm attacks plays major role in
affecting the computerize system of the
individuals.
 Cyber Trespass: It means to access someone’s
computer without the right authorization of the
owner and does not disturb, alter, misuse, or
damage data or system by using wireless internet
connection.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Internet Time Thefts: Basically, Internet time
theft comes under hacking. It is the use by an
unauthorised person, of the Internet hours paid
for by another person. The person who gets
access to someone else’s ISP user ID and
password, either by hacking or by gaining access
to it by illegal means, uses it to access the
Internet without the other person’s knowledge.
You can identify time theft if your Internet time has
to be recharged often, despite infrequent usage.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Cybercrimes Against Government:
 There are certain offences done by group of
persons intending to threaten the international
governments by using internet facilities. It
includes:
 Cyber Terrorism: Cyber terrorism is a major
burning issue in the domestic as well as global
concern. The common form of these terrorist
attacks on the Internet is by distributed denial of
service attacks, hate websites and hate e-mails,
attacks on sensitive computer networks etc.
Cyber terrorism activities endanger the
sovereignty and integrity of the nation.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber Warfare: It refers to politically motivated
hacking to conduct sabotage and espionage. It is a
form of information warfare sometimes seen as
analogous to conventional warfare although this
analogy is controversial for both its accuracy and its
political motivation.
 Distribution of pirated software: It means
distributing pirated software from one computer to
another intending to destroy the data and official
records of the government.
 Possession of Unauthorized Information: It is very
easy to access any information by the terrorists with
the aid of internet and to possess that information for
political, religious, social, ideological objectives.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Cybercrimes Against Society at large:
 An unlawful act done with the intention of causing
harm to the cyberspace will affect large number of
persons. These offences includes:
 Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
It also includes activities concerning indecent
exposure and obscenity.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber Trafficking: It may be trafficking in drugs,
human beings, arms weapons etc. which affects
large number of persons. Trafficking in the
cyberspace is also a gravest crime.
 Online Gambling: Online fraud and cheating is
one of the most lucrative businesses that are
growing today in the cyber space. There are
many cases that have come to light are those
pertaining to credit card crimes, contractual
crimes, offering jobs, etc.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Financial Crimes: This type of offence is
common as there is rapid growth in the users of
networking sites and phone networking where
culprit will try to attack by sending bogus mails or
messages through internet. Ex: Using credit cards
by obtaining password illegally.
 Forgery: It means to deceive large number of
persons by sending threatening mails as online
business transactions are becoming the habitual
need of today’s life style.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Affects To Whom: Cyber Crimes always affects
the companies of any size because almost all
the companies gain an online presence and
take advantage of the rapid gains in the
technology but greater attention to be given to
its security risks. In the modern cyber world
cyber crimes is the major issue which is
affecting individual as well as society at large
too.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.3“INFORMATION TECHNOLOGY ACT,
2000”
 With the emergence of technology the misuse
of technology has also expanded to its
optimum level and then there arises a need of
strict statutory laws to regulate the criminal
activities in the cyber world and to protect
technological advancement system. It is under
these circumstances Indian parliament passed
its “INFORMATION TECHNOLOGY ACT,
2000” on 17th oct to have its exhaustive law to
deal with the technology in the field of e-
commerce, e-governance, e-banking as well
as penalties and punishments in the field of
cyber crimes.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CYBER LAWS
 Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
 Law encompasses the rules of conduct:
1. That have been approved by the government, and
2. Which are in force over a certain territory, and
3. Which must be obeyed by all persons on that
territory. Violation of these rules could lead to
government action such as imprisonment or fine or
an Order to pay compensation.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cyber crimes
These are unlawful acts where the computer is
used either as a tool or a target or both. The
enormous growth in electronic commerce (e-
commerce) and online share trading has led to
a phenomenal spurt in incidents of cyber
crime.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Electronic signatures
These are used to authenticate electronic
records. Digital signatures are one type of
electronic signature. Digital signatures satisfy
three major legal requirements – signer
authentication, message authentication and
message integrity. The technology and
efficiency of digital signatures makes them
more trustworthy than hand written signatures.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Intellectual property
These refer to creations of the human mind e.g. a
story, a song, a painting, a design etc. The facets
of intellectual property that relate to cyber space
are covered by cyber law. These include:
 copyright law in relation to computer software,
computer source code, websites, cell phone content
etc,
 software and source code licenses
 trademark law with relation to domain names, meta
tags, mirroring, framing, linking etc
 semiconductor law which relates to the protection of
semiconductor integrated circuits design and layouts,
 patent law in relation to computer hardware and
software.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Data protection and privacy laws
These laws aim to achieve a fair balance
between the privacy rights of the individual
and the interests of data controllers such as
banks, hospitals, email service providers etc.
These laws seek to address the challenges to
privacy caused by collecting, storing and
transmitting data using new technologies.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Strategic advantage and IT
Problems and Prospects of Computerization
Selection of Hardware and Software
Managing the changes of IT
Strategic role of IT and Emerging
issues
Unit
V
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.1What is strategic
advantage?
 Strategic advantage is the result of using
organizational capability measured in financial
terms by profitability, shareholder value etc.
and in non financial terms by market share,
reputation etc.
 Competitive advantage exists when there is
match between the distinctive competencies of
a firm and the critical success factors within its
industry that permits the firm to outperform
competitors. Information technology helps the
organizations gain competitive advantage in
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Becoming low-cost producer
2. Creating new products and services
3. Focus on market niche
4. Linking with new customers and suppliers
5. Managing value chain.
6. Creating strategic alliances
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Become Low-cost producer
 Information systems reduce cost by focusing
on
 Internal operations
 Management planning and control and
 Human resources
 Reduced cost helps in increasing profit.
 Many low cost producing organizations use
information technology as a dynamic and
intensive way rather than a mere management
tool
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Create new Products and
services
 IT is used as a tool to prevent duplication.
 IT helps in creating differentiated products and
services and this in turn raises market entry
cost for competitors.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.Focus on Market Niche
 IT helps in improving marketing techniques.
 An organization can penetrate the market by
carefully examining transactions with
customers.
 It enables the business to win more from
profitable customers ,turns non profitable
customers to profitable or drop outs.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Linking with Customers and
Suppliers
 IT Systems help the organization to follow Just
in time supply method and stock less inventory
method.
 The first method shifts all inventory
responsibilities to the distributor who manages
the supply flow. The second helps in winning
customer loyalty by providing cheap and best
goods on time.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.Managing value chain
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
contd…
 IT and information systems that have strategic
impact helps the organization to provide
products or services of higher value at the
same price or of the same value at the lower
price.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Creating Strategic Alliances
 Strategic alliance is the combination of two or
more organizations to create competitive
advantage.
 Information Technology links two independent
organizations to share skills, costs and access
to another’s market.
 The role of IT is crucial in these type of
relations.
 Such strategic alliances are recently coined as
information partnerships.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.2 Issues on Hardware and
Software
 The systems come with hardware, software
and support. Today, selecting a system is a
serious and time-consuming business.
 There are several factors to consider prior to
system selection . They are discussed below.
Procedure for hardware software
selection
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Define the system capabilities
Computers have proven valuable to business in the
following areas :
 Cost reduction includes reduction of the inventory,
savings on space and improved ability to predict
business trends
 Cost avoidance includes early detection of problems
and ability to expand operations without adding
clerical help.
 Improved service emphasizes quick availability of
information to customers, improved accuracy and fast
turnaround
 Improved profit reflects the bottom line of the
business and its ability to keep receivables within
reason.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Specify the magnitude of the problem
 It refers to clarify whether selections consist of
a few peripherals or major decision concerning
the mainframes.
3. Assess the competence of the in-house staff
 This involves determining the expertise
needed in areas such as telecommunications
and data base design. Acquiring a computer
often results in securing temporary help for
conversion. Planning for this help is extremely
important.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Consider hardware and software as a package.
 This approach ensures compatibility. In fact,
software should be considered first, because
often the user secures the hardware and then
wonders what software is available for it.
5. Provide user indoctrination.
 This is crucial, especially for first-time users.
Selling the system to the user staff, providing
adequate training, and preparing an
environment a conductive to implementation
are pre- requisites for system acquisition.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other Criteria for selection of Hardware
1. System Availability
2. Compatibility
3. Cost
4. Performance
5. Support
6. Usability
1. The programming
language and its
suitability to the
applications
2. Ease of Installation
and training
3. Extent of
enhancements to be
made prior to
installation.
Hardware Software
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Major phases in Hardware/Software
selection
The selection process should be viewed as a project,
and a project team should be organized with
management support. In larger projects, the team
includes one or more user representatives, an analyst
and EDP auditor, and a consultant. Several steps
make up the selection process:
1. Requirement Analysis
2. System Specification
3. Request for proposals (RFP)
4. Evaluation and validation
5. Vendor Selection
6. Post Installation Review
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.3 Problems and prospects
of computerization
 Problems
IT systems development problems
IT security challenges
Ethical and social problems
Global business challenges
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 IT Systems development problems
 Managers have to realign their strategies
business strategies and information systems to
environmental requirements.
 They face the challenge of developing
dynamic information systems.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 IT security challenges
• Use of internet and other types of computer
networks has become common.
• Security challenges also have multiplied
manifold
• Effective provisions have to be made to face
these problems
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Ethical and social problems
 Privacy rights
 Intellectual property rights
 Employment challenges
 Quality of work life
 Health issues
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Prospects of computerization
1. Organization
2. Self-Sufficiency
3. Cost-Effective
4. Speed
5. Cheaper Research and Development
6. Sales
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Organization: Computers allow the application
of different types of software that can help
businesses keep track of their files,
documents, schedules and deadlines.
Computers also allow businesses to organize
all of their information in a very accessible
manner. The ability to store large amounts of
data on a computer is convenient and
inexpensive, and saves space. A computer's
ability to allow a company to organize its files
efficiently leads to better time management
and productivity.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Self-Sufficiency: Computers have made staff and
companies more self-sufficient by allowing them
to do tasks that previously had to be outsourced.
For example, a company can now use office
software to create their own training material.
Desktop publishing software can be used to
create marketing materials. Online tax and
accounting programs allow companies to prepare
their own taxes. This allows the dominant
operations of a company to remain in-house and
empowers the company to become more
independent and less susceptible to errors
committed by outside parties.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cost-Effective: Emerging technology makes new
tools and services more affordable and allows
companies to save on their staff payroll and office
equipment. Because computers allow work to be
done faster and more efficiently, it is possible for a
company to hire fewer staff. In addition, with
networked and relatively inexpensive computers,
companies can store data more easily, saving on
the cost of outside file storage, and can avoid
having to purchase as many copiers, fax
machines, typewriters, and other such items that
were used before computers became popular.
Contd….
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Correspondingly, potentially profitable
businesses can be started with a smaller
overhead cost. Email capabilities decrease
postage costs; software applications reduce
the need for large accounting departments,
while videoconferencing reduces the need for
travel. All resources saved will trickle down to
the consumers, who are then provided with
much more affordable products and service.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Speed: Computers help speed up other
business operations. The collecting of
consumer feedback, ordering of raw materials,
and inspection of products is made quicker
through the use of computers, allowing
companies to operate much faster and to
produce better quality results.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Cheaper Research and Development: R&D, or
research and development, costs will also
decrease with the help of computers. Scientific
research can now be done using the Internet
and computer software applications designed
to develop and produce new products and
services. For example, instead of a company
having to do in-person focus groups on a
potential new product or to determine their
target market, the company can conduct a
widespread online survey for a far lower cost.
Contd….
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
In addition, new models of a product can be
created online using virtual pictures and
drawings instead of having to be hand-drawn.
These interactive models created using
software programs can help bring the product
and its features to life for a far lower cost than
creating an actual physical model of the given
product.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Sales: Computers can help generate higher
sales and profits for businesses via a company
website. Many businesses now operate online
and around the clock to allow customers from
around the world to shop for their products and
services.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.4 MANAGING THE CHANGES
OF IT
 It means managing the process of
implementing major changes in IT, business
processes, organizational structures, and job
assignments to reduce the risks and costs of
change, and to optimize its benefits.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 What Does Change Management Require?
A commitment from top management and an
organizational design to plan the future of IT
and Information Systems within the business.
Change management involves analyzing and
defining all changes facing the organization,
and developing programs to reduce the risks
and costs, and to maximize the benefits of
change.
``
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 End User Resistance
 New ways of doing things creates resistance
among employees.
 This is the biggest obstacle to the implementation
of new information systems.
 End User Implications
Dealing with end user resistance:
 Proper education and training.
 Direct end user participation before
implementation helps ensure that the end users
assume ownership of a system, and that its
design meets their needs.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Reengineering a Business Process
 Develop a change action plan.
 Assign selected managers as change sponsors.
 Develop employee change teams.
 Encourage open communications and feedback
about organizational changes.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Change Management Activities
Human resource management handles activities -
Such as
 developing innovative ways to measure, motivate,
and reward performance.
 Program - Design a way to recruit and train
employees in the core competencies required in a
changing workplace.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
 Recommendations of Consultants
 Involve as many people as possible in
reengineering and other change programs.
 Make constant change part of the culture.
 Tell everyone as much as possible about
everything as often as possible, preferably in
person.
 Make liberal use of financial incentives and
recognition.
 Work within the company culture, not around it.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For your kindness and
cooperation

More Related Content

What's hot

Perfect papers software
Perfect papers   softwarePerfect papers   software
Perfect papers softwareguest0a1ce99
 
Unit 2 part 1 data processing
Unit 2 part 1 data processingUnit 2 part 1 data processing
Unit 2 part 1 data processingFarhanMalik93
 
Cmp104 lec 6 computer lang
Cmp104 lec 6 computer langCmp104 lec 6 computer lang
Cmp104 lec 6 computer langkapil078
 
computer programing and utilization
computer programing and utilizationcomputer programing and utilization
computer programing and utilizationTushar Limbasiya
 
Information technology
Information technologyInformation technology
Information technologyManoj Soni
 
Introduction To Computer and Java
Introduction To Computer and JavaIntroduction To Computer and Java
Introduction To Computer and JavaPRN USM
 
Mobile computing devices
Mobile computing devicesMobile computing devices
Mobile computing devicesPrashant Laxman
 

What's hot (16)

Richa garg itm
Richa garg itmRicha garg itm
Richa garg itm
 
Software and os ch5
Software and os ch5Software and os ch5
Software and os ch5
 
Perfect papers software
Perfect papers   softwarePerfect papers   software
Perfect papers software
 
Unit 2 part 1 data processing
Unit 2 part 1 data processingUnit 2 part 1 data processing
Unit 2 part 1 data processing
 
Cmp104 lec 6 computer lang
Cmp104 lec 6 computer langCmp104 lec 6 computer lang
Cmp104 lec 6 computer lang
 
Information systems software
Information systems softwareInformation systems software
Information systems software
 
Input
InputInput
Input
 
Computer software
Computer softwareComputer software
Computer software
 
Fg b
Fg bFg b
Fg b
 
Computer Languages
Computer Languages Computer Languages
Computer Languages
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 
computer programing and utilization
computer programing and utilizationcomputer programing and utilization
computer programing and utilization
 
Information technology
Information technologyInformation technology
Information technology
 
Introduction To Computer and Java
Introduction To Computer and JavaIntroduction To Computer and Java
Introduction To Computer and Java
 
Document of
Document of Document of
Document of
 
Mobile computing devices
Mobile computing devicesMobile computing devices
Mobile computing devices
 

Similar to IT for managers

OS , Its History and Types
OS , Its History and TypesOS , Its History and Types
OS , Its History and TypesAyesha Tahir
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for managementShareef AP
 
Ge6151 computer programming notes
Ge6151 computer programming notesGe6151 computer programming notes
Ge6151 computer programming notesshanmura
 
Operating systems
Operating systemsOperating systems
Operating systemsmhmahamuk
 
Evolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxEvolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxcetaw81672
 
Operating Systems
Operating SystemsOperating Systems
Operating SystemsLeon Lei
 
Web quest 1 group 1141617
Web quest 1 group 1141617Web quest 1 group 1141617
Web quest 1 group 1141617camm13
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC4044uday
 
Unit 1 computer concepts
Unit 1   computer conceptsUnit 1   computer concepts
Unit 1 computer conceptsMithun DSouza
 
Evolution of operating system
Evolution of operating systemEvolution of operating system
Evolution of operating systemArshad khan
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computersgyanikashukla
 
Operating System
Operating SystemOperating System
Operating Systembenremoz
 
Operating System..!
Operating System..!Operating System..!
Operating System..!benremoz
 
OPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxOPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxrajdeepcs10
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfssuserb3a23b
 
software system_and_application_software
software system_and_application_softwaresoftware system_and_application_software
software system_and_application_softwareTallat Satti
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Mahatma Gandhi University
 

Similar to IT for managers (20)

OS , Its History and Types
OS , Its History and TypesOS , Its History and Types
OS , Its History and Types
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
 
Ge6151 computer programming notes
Ge6151 computer programming notesGe6151 computer programming notes
Ge6151 computer programming notes
 
History of computer software.
History of computer software.History of computer software.
History of computer software.
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Evolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptxEvolution of OS (Operating System)/CS.pptx
Evolution of OS (Operating System)/CS.pptx
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Web quest 1 group 1141617
Web quest 1 group 1141617Web quest 1 group 1141617
Web quest 1 group 1141617
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
 
Unit 1 computer concepts
Unit 1   computer conceptsUnit 1   computer concepts
Unit 1 computer concepts
 
Evolution of operating system
Evolution of operating systemEvolution of operating system
Evolution of operating system
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Operating System
Operating SystemOperating System
Operating System
 
Operating System..!
Operating System..!Operating System..!
Operating System..!
 
OPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptxOPERATING SYSTUM class 9 Information.pptx
OPERATING SYSTUM class 9 Information.pptx
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
software system_and_application_software
software system_and_application_softwaresoftware system_and_application_software
software system_and_application_software
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

IT for managers

  • 1. IT FOR MANAGERSAP Shareef MBA,M.Phil,NET,M.Com Asst. Professor & Head, Dept. Of Management Studies Markaz Law College, Markaz Knowledge City
  • 2. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Computer and generations Software and Hardware Algorithm and Flow Charts Binary and Decimal systems Introduction to computersUnit I
  • 3. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.1What is a computer ?  Google Dictionary defines computer as “An electronic device which is capable of receiving information (data) in a particular form and of performing a sequence of operations in accordance with a predetermined but variable set of procedural instructions (program) to produce a result in the form of information or signals”
  • 4. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.2Generation/Evolution of computers  The history of the computer goes back several decades however and there are five notable generations of computers.  Each generation is characterized by an important technological development that changes fundamentally how computers work– leading to more compact, less expensive, but more powerful, efficient and robust machines.
  • 5. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1940 – 1956: First Generation – Vacuum Tubes The first generation computers used vacuum tubes as circuitry and magnetic drums for memory. As a result they were big, and occupied an entire room. These were inefficient materials which consumed huge electricity and subsequently generated a lot of heat which caused for continuous breakdowns. Important characteristics or this generation are….
  • 6. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  They relied on ‘machine language’.  They were limited to solving one problem at a time.  Input was based on punched cards and paper tape. Output came out on print-outs.  The two notable machines of this era were the UNIVAC and ENIAC machines – the UNIVAC is the first every commercial computer which was purchased in 1951 by a business -the US Census Bureau.
  • 7. AP SHAREEF’S LECTURE ON IT FOR MANAGERS ENIAC UNIVAC
  • 8. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1956 – 1963: Second Generation – Transistors  Although first invented in 1947, transistors weren’t used significantly in computers until the end of the 1950s.  They were superior to the vacuum tubes because they made computers smaller, faster, cheaper and less heavy on electricity use.  The language evolved from cryptic binary language to symbolic (‘assembly’) languages. This meant programmers could create instructions in words. About the same time high level programming languages were being developed (early versions of COBOL and FORTRAN).
  • 9. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1964 – 1971: Third Generation – Integrated Circuits  By this phase, transistors were now being miniaturised and installed on silicon chips (called semiconductors). This led to a massive increase in speed and efficiency of these machines. These were the first computers where users interacted using keyboards and monitors which interfaced with an operating system.  As a result of these advances which again made machines cheaper and smaller, a new mass market for computer users emerged during the ‘60s.
  • 10. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1972 – 2010: Fourth Generation – Microprocessors  Intel Corporation is the more related word with fourth generation. Intel developed the Intel 4004 chip in 1971, which assembled all computer components (CPU, memory, input/output controls) on a single chip. What filled a room in the 1940s now fit in the palm of the hand.  Another major advance during this period have been the Graphical user interface (GUI), the mouse and more recently the advances in lap- top capability and hand-held devices.
  • 11. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2010- : Fifth Generation – Artificial Intelligence  Computer devices with artificial intelligence are still in development, but some of these technologies are beginning to emerge and be used such as voice recognition.  AI is a reality made possible by using parallel processing and superconductors.  quantum computation, molecular and nano- technology etc. are some of the other characteristics of this generation.
  • 12. AP SHAREEF’S LECTURE ON IT FOR MANAGERS The essence of fifth generation will be using these technologies to ultimately create machines which can process and respond to natural language, and have capability to learn and organize themselves.
  • 13. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.3 SOFTWARE  A set of computer instructions is called a program. A set of computer programs is called a software. It is a collection of programs which increase the capabilities of computer hardware. The process of developing software is known as programming.  Software is intangible  Software is the soul of computer  It activates the dead machines.
  • 14. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 15. AP SHAREEF’S LECTURE ON IT FOR MANAGERS System software  Computer software designed to operate the computer hardware and to provide a platform for running application software is what is system software. It controls the entire computer program. System software helps use the operating system and computer system.  It controls all operations  Moves data into and out the computer  It is essential for running the computer
  • 16. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Operatingsystem An operating system is a program designed to run other programs on a computer. It is that part of a system software which acts as an interface between hardware and end user. Operating system is considered to be the back bone of a computer, managing both hardware and software.
  • 17. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Basic functions of an operating system  Schedule jobs  Manage hardware and software resources  Maintain system security  Enable multiple user resource sharing  Handle interrupts  Maintain usage records
  • 18. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Types of Operating system  Single tasking: It allows only one program to run at a time. One program has to close for opening another program.  Multi tasking: It enables a single user to have two or more applications open at the same time.
  • 19. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  MS DOS: MS Disk Operating System  Non graphical command line OS  Released in 1981 and last updated in 1994  User is required to type commands instead of using a mouse.
  • 20. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Micro Soft Windows  GUI  No commands  Simple and user friendly  Multi tasking features
  • 21. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 22. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Windows versions  Windows 1995  Developed for home and professional users  Network ready OS  Windows NT  Known as New Technology  A stable multitasking environment  Enhanced security features  Increased memory  Network utilities  Portability
  • 23. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Windows 2000  It is used on personal computers,  business desktops, laptops and servers  Windows ME was designed for home use while 2000 for business purpose  Windows XP  It was released in 2001  Home and Professional variants  Features  Faster start up  User friendly interface  Fast user switching  Clear Type font rendering mechanism  Remote desktop functionality
  • 24. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Windows vista  Released in the year 2007  Comes with many technical changes  Updated GUI  Visual style dubbed aero  Redesigned search function  Multimedia tools (Windows DVD Maker)  Redesigned networking, audio, print, and display subsystems
  • 25. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 26. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Windows 7.0  It is designed for  Home & Business desktops  Personal computers  Laptops  Notebooks  Tablet PCs  Media centre PCs  It was more focused on applications and hardware  It excluded Windows calendar, Windows Mail, Windows Movie Maker and Windows Photo Gallery.  These are offered in Windows live Essentials Suite.
  • 27. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  UNIX OS  Unix OS is a computer OS developed in 1969 by a group of American Telephone & Telegraph Company employees at labs  Featured with client server model  Unix is generally seen as an OS on workstations or a network server  It allows multiple processors going at once  Unix philosophy  Use of plain text for storing data  Hierarchical file system  Use of large number of software tools
  • 28. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  MAC OS  GUI  Developed by Apple Inc.  First introduced in the year 1984
  • 29. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Classic Mac OS  Completely graphical OS  Ease of use  Cooperative multitasking  Mac OS X  Server edition  Runs on Apple’s line of Macintosh server hardware  Includes work group management and administration tools for key network services
  • 30. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Linux OS  It is a UNIX-Like operating system  Modifiable codes  Used on devices from supercomputers to wrist watches  Widely adopted for servers and embedded systems
  • 31. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Programming languages  They are vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. It usually refers to high level languages such as BASIC, C, C++, COBOL, FORTRAN etc.
  • 32. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Types of Programming Languages  Machine Level Languages or First Gen Languages. It is the language of the computer, the only language the computer understands without translation. Each particular computer model has a machine language, which is based on the internal architecture of the equipment.
  • 33. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Assembler languages or second gen languages. They are also known as symbolic languages because they include arithmetical and logical operations.  Because of the use of mnemonic symbols this eases up the programmers’ risk gradually. Assembly languages are translated by assemblers to machine level languages so as to be understandable to machines.
  • 34. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Compiler languages (High Level Languages)or third gen languages. They are also known as procedural languages. COBOL , FORTRAN, BASIC, C++, C etc. are examples.  They include plain English like and mathematical expressions. They are easy to write and learn and are relatively error free. Compilers are used to translate High level languages to Machine language.
  • 35. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  4th Gen Languages:  RAMIS and FOCUS
  • 36. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Other system software  Device drivers: These are small files that act as an interface between hardware and the operating system in a computer. Hardware requires device drivers so that the OS can see the device and handle them properly.
  • 37. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Utility programs or Service programs.: these are system programs for performing general system support tasks. Following tasks are performed by utility programs.  Sorting and storing the data  Checking or scanning the data for security  Making a copy of all information  Deleting, renaming, moving, copying, merging, generating and modifying data sets.  Providing encryption. Etc.
  • 38. AP SHAREEF’S LECTURE ON IT FOR MANAGERS • Compilers: High level language Machine level codes (translation is done at once before the program is executed) • Interpreters: High level language Machine level codes (translation is done line by line) • Assemblers: Assembly language Machine level codes Language translators:
  • 39. AP SHAREEF’S LECTURE ON IT FOR MANAGERS General purpose software  This software provides the framework for a great number of business, scientific, and personal applications.  Word processors: It is a document preparation system. E.g. MS Word, Polaris Word  Spreadsheet program: Commonly known as pay roll application. Lotus, MS Excel, Polaris Spreadsheet  DBMS: MS Access, Oracle  CAD and CAM Programs: Auto CAD, Revit Etc.  Internet Browser: Opera, Netscape Navigator, Internet Explorer, Google Chrome  E-Mail Software: Hotmail, Yahoo mail, Gmail, Rediffmail.
  • 40. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Application software  Software which is used for applications specifically designed for users to fit their needs  ERP: The system to integrate all data and processes of an organization into a single unified system.  Tally  Peachtree  QuickBooks  SAP  Decision Support System:  Cost accounting system  Capital Budgeting system  General Decision Support System
  • 41. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Artificial Intelligence System : E.g. Robotics  Expert Systems: Used for complex and ill structured tasks. It helps non experts to make decisions comparable to those of an expert.
  • 42. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.4 Hardware  The physical parts of computer are called hardware. Computer hardware is the collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is what you can physically touch.
  • 43. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Basic computer architecture.
  • 44. AP SHAREEF’S LECTURE ON IT FOR MANAGERS The CPU  It is also known as the processor.  CPU is the heart, brain and soul of computer.  Programs and instructions are read and executed by CPU.  Intel, AMD, Motorola are popular processor manufacturers.  Two basic parts of the CPU are  Control unit and  Arithmetic and logic unit.
  • 45. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Control unit  It is the most important unit of the CPU. All the computer resources are managed from the control unit. It takes instructions from the memory and sends the necessary signals to ALU to perform the operation needed.
  • 46. AP SHAREEF’S LECTURE ON IT FOR MANAGERS ALU  ALU is a separate section of CPU which performs computation like addition, subtraction, multiplication and division and logical operations such as the comparison of two numbers. The tasks are performed with special storage locations called registers.
  • 47. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Memory Unit  Memory is a storing device which stores programs, data etc. any program to be used in the computer should be stored in the memory.  The memory capacity is measured in KB, MB, GB, TB, PB,EB, ZB and YB  Computer memory is divided into  Internal memory or main memory or Primary memory  Additional memory or, secondary memory or Auxiliary memory
  • 48. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Internal memory or main memory or Primary memory  It stores data needed for current tasks by the computer and receives data from the secondary storage as and when needed. Magnetic core memory was used previously but it is now outdated.  In modern computers, Micro electronic semiconductor storage circuits are used to as primary storage. They are small sized, high speed, shock and temperature resistant chips.  Semi conductor memories are of two types. They are RAM and ROM
  • 49. AP SHAREEF’S LECTURE ON IT FOR MANAGERS RAM- Random Access Memory  RAM is the popular primary storage medium. It is read write memory. RAM is a temporary memory or volatile memory. All the information goes out when the system is switched off.
  • 50. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 51. AP SHAREEF’S LECTURE ON IT FOR MANAGERS ROM-Read Only Memory  This memory is used to store information permanently. The data is not lost if power is switched off. It is read only memory since data cant be written. E.g. ROM-BIOS (ROM-Basic Input Output System). This program controls and supervises the basic operations of I/O devices.  Types of ROM are  PROM  EPROM  EEPROM
  • 52. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Additional memory or, secondary memory or Auxiliary memory  Primary storage is inbuilt with CPU, but secondary memory is used in separate unit or units. The capacity of Primary memory is limited whereas secondary memory has infinite capacity of millions and billions of bytes.  Different secondary storage devices are discussed below.
  • 53. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Magnetic Tape  The oldest storage system  It makes copies of audio, video and data.  It is employed with a tap drive to store and retrieve data.  The biggest drawback is that it can only access data sequentially.
  • 54. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Floppy diskettes  It was first introduced by IBM in the year 1970.  It consists of a circle shaped plastic material which is coated with an oxide material. This Plastic material is covered by a protective square jacket with a hole to read the data by the floppy drive.  The maximum storage capacity of a latest Floppy disk is 1.44 MB.
  • 55. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 56. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Organization of data on a disk  To use a disk for storing data, it must be magnetically mapped. Then only the computer can go directly to a specific location in the disk. The process of mapping a disk is called formatting or initializing.  Initializing is done by creating tracks and sectors.  Magnetic concentric circles are called tracks.  Short segments created like dividing a pie is called sectors.  Each sector is assigned a unique number so that the data access by the computer is easy.
  • 57. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 58. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Hard disc  They are the most popular device for storing data.  Large volume of data can be stored.  A hard disc is a set of different platters fixed on a spindle. Each platter is coated with iron oxides.  Unlike floppy, the drive and disc is a single chamber.  TBs of data can be stored in Hard disks.  They may be internal or external
  • 59. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Internal architecture of a HD
  • 60. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  An external hard drive is a portable storage device that can be attached to a computer through a USB or FireWire connection, or wirelessly. External hard drives typically have high storage capacities and are often used to back up computers External/ Portable Hard disk
  • 61. AP SHAREEF’S LECTURE ON IT FOR MANAGERS CD-ROM Disks  It stands for Compact Disk Read Only Memory.  It is an Optical Laser Disk.  There are two lasers. One laser beam writes to the recording surface and another laser reads the data from light sensitive recording surface.  The data on the disk are fixed, they cant be altered.  It has a storage capacity of over 650 MB
  • 62. AP SHAREEF’S LECTURE ON IT FOR MANAGERS CD-R  CD-R stands for Compact Disk Recordable.  It is a WORM (Write Once Read Many) Memory.  One can write only once on CD-R
  • 63. AP SHAREEF’S LECTURE ON IT FOR MANAGERS CD-Rewritable  CD-RW was first introduced by Hewlett Packard  It permits for repeated recordings on a disk  Data on this CD can be altered.
  • 64. AP SHAREEF’S LECTURE ON IT FOR MANAGERS DVD  DVD stands for Digital Video Disk or Digital Versatile Disk.  It stores up to 20 GB of Text, Graphics and video.  Variations are  DVD-ROM  DVD-R  DVD-RW  DVD-RAM
  • 65. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Blu Ray Disc  It is developed to enable recording, rewriting and playback of High Definition Video, as well as high volume of data.  They can hold up to 50 GB capacity.
  • 66. AP SHAREEF’S LECTURE ON IT FOR MANAGERS WORM Cards  A Write Once Read Many (WORM) digital memory card is intended for professional uses such as police investigations, court testimony, electronic voting and other applications where data files must be protected from alteration or deletion. Applications  Police photography and witness/suspect interviews, where courts require proof that photos and audio recordings are genuine.  Court proceedings, such as trials and depositions.  Electronic voting, where recorded votes must be tamper-proof.
  • 67. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Cash registers which record transactions for tax collection purposes. Event recorders, such as security cameras and “black box” flight-data recorders. Medical devices which retain individual patient treatment data. Personal digital assistants (PDAs) and similar devices used by physicians and other health-care professionals to track patient interactions.
  • 68. AP SHAREEF’S LECTURE ON IT FOR MANAGERS SD Cards  SD stands for Secure Digital Cards  Its is a non volatile memory card.  It is commonly used in mobile phones and other portable electronic devices.  A card reader is used to connect to the computer.
  • 69. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Flash Drive  USB flash drive/ pen drive is a popular storage medium.  It is highly portable because of its small size.  Large volume of data can be stored in it  IT uses USB(Universal Serial Bus) technology.  They are removable and rewritable.
  • 70. AP SHAREEF’S LECTURE ON IT FOR MANAGERS INPUT DEVICES  They are the devices used for giving necessary data into the computer, then they are converted into a form that is acceptable to the computer. 1. Key board 2. Mouse 3. Light pen 4. Track ball 5. Joystick 6. MICR 7. OMR 7. OCR 8. Bar coding 9. Voice input 10. Touch screen 11. Touch pad 12. scanner
  • 71. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Keyboard  A keyboard detects key pressings with the help of an electronic circuit called keyboard encoder. The encoder sends a binary code to the computer. It can be connected to the CPU with or without cable.  Types of keys in a keyboard are  Alphanumeric keys  Punctuation keys  Special keys.
  • 72. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Mouse  Mouse is a pointing device.  It controls the movement of cursor in the display unit.  Types of mice include  Mechanical mouse  Opto-mechanical mouse  Optical mouse  Cordless mouse
  • 73. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Light pen  Light pen also is a pointing device.  It selects an option by simply pointing at it.  It is used in menu based applications  It is also used in drawing graphics in CAD  An engineer or architect or fashion designer can draw sketches or pictures directly on the screen.
  • 74. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 75. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Track ball  Track ball is a pointing device.  It works like a mouse but is fixed and takes less space.  It has a ball in the middle, a right and left clicks.  Apple computer’s Power Book and IBM ThinkPad notebooks used Track balls.
  • 76. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Joystick  It is a vertical stick which moves the graphic cursor in a direction the stick is moved  It is popularly used by children to play video games.  Pilots use it as flight control in the cockpit of aircraft.
  • 77. AP SHAREEF’S LECTURE ON IT FOR MANAGERS MICR  Magnetic Ink Character Reader.  Human readable characters printed on documents using a special magnetic ink is read by MICR.  MICR reads the magnetic pattern of letters and compares it with the one which is stored in its memory.  Bank details such as branch code, account number, cheque number etc. can be read by MICR.
  • 78. AP SHAREEF’S LECTURE ON IT FOR MANAGERS OMR  Stands for Optical Mark Reader  This device is designed to read markings placed in specific places on a form or card.  Pre-printed documents are designed with boxes or circles that can be filled by a Pen or Pencil. This documents are then given to the reader.  The reader reads the position of markings and processes it.  OMR sheets are commonly used in various entrance and competitive examinations.
  • 79. AP SHAREEF’S LECTURE ON IT FOR MANAGERS OMR Machine
  • 80. AP SHAREEF’S LECTURE ON IT FOR MANAGERS OCR  It reads numeric and alpha numeric data from printed documents  It can read up to 300 papers per hour.  It is used in the preparation of electricity bills, telephone bills, insurance premium notices etc.
  • 81. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Bar Code Reader  It can read barcodes printed on packages, badges and books.  A barcode uses small bars on varying thickness and spacing with some numbers.  Manufactures use UPC- Universal Product Code.  In case of books ISBN is used.  The information stored in the barcode is displayed on the screen when it is read.
  • 82. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Voice input  Voice or audio input is given through a Mic  The given voice instructions will be compared with those already stored in the system.  Only the trained systems can recognize voice inputs.
  • 83. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Touch pad  They are pads sensitive to finger touch.  It is another type of pointing device.  Laptops use this technology instead of mouse.
  • 84. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Touch screen  They are screens sensitive to finger touches.  The touch sensitive transparent panel covered in the screen enables the sensitivity.  Smart phones, information kiosks, and tablet computers use touch screens.
  • 85. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Scanner  Scanners are used to scan papers and paper type documents. They can convert hard copies into soft copies by creating electronic images.
  • 86. AP SHAREEF’S LECTURE ON IT FOR MANAGERS OUTPUT DEVICES  O/P devices are used to present computer information in a readable form. LCD screens and Printers are the most commonly used output devices. 1. Monitors 2. Printers 3. COM(Computer Output on Microfilm) 4. Audio System (speaker) 5. Graphical O/P devices
  • 87. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Monitors  Monitors are also called VDU- Visual Display Unit  A monitor may be  CRT  LCD  CRT monitors use an electronic gun and an emitting display in which tiny colored dots are thrown.  LCD’s are flat screens which use TFT technology.  All monitors depend on a video card, which is
  • 88. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Printers  They are used to print hard copies of documents.  They are connected to the system by a cable to the parallel port or a USB port.  They print on ordinary paper, specially prepared dispatch notes, invoices or packing slips.  Printers are classified on the basis of their printing mechanism into  Impact printers and  Non impact printers
  • 89. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Impact printers  Impact printers utilize some form of striking device to transfer ink from a ribbon onto the paper being printed to form images or characters.  They fall into two types- Serial or Line printing  Serial printers print one character at a time.  Commonly used Serial Printers are  Dot Matrix Printers and  Daisywheel printers.
  • 90. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Dot matrix printers  They use wire needles or pins which strike the ribbon against the paper in the pattern necessary to produce each character.
  • 91. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Daisy wheel printers  They use a new element of printing called a ‘daisywheel’.
  • 92. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Line printers  A line printer works with much higher speed than a serial printer.  It can print one line at a time.  Chain printers and drum printers are the commonly used line printers
  • 93. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Chain printers  A chain printer has a chain that rotates at a constant speed in a horizontal plane.  The chain has a 48 numbers, alphabets and special symbols.  The magnetically controlled hammers press the chain onto the paper.
  • 94. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Drum printers  These printers have a solid cylinder and as many bands on it as the number of print positions.
  • 95. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Non impact printers  They don’t strike the paper.  They produce prints with electro static, chemicals, inkjet and thermal technologies.  Non impact printers are most widely used nowadays.  They are faster, smarter and clearer.  The three different types are  Thermal printers  Ink-Jet printers  Laser printers
  • 96. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Thermal printers  They are used commonly as portable printers to make print out of tiny slips such as an ATM Slip or a Debit or Credit Card payment slip.  They use pins which are heated by the electric element and then pressed against the paper.
  • 97. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Inkjet printers  They make use of fine spray nozzles that create the image of character or graphics on the paper by spraying tiny or small drops of ink into the paper.  It uses ink cartridges. Usually an inkjet printer has a black cartridge and a color cartridge.
  • 98. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Laser jet printers  They use both laser and xerographic technology.  They can print with high quality  They print not only alphanumeric characters but also drawings graphics and other documents
  • 99. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Computer output microfilm.  It records computer output as microscopic images on roll or sheet film.  A microfilm reader reads the output.
  • 100. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Speakers.  They create audio output.  Computer speakers do the same as other speakers do.  Speaker system is controlled by a sound card.
  • 101. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Plotters  It is a device that can draw graphs, designs and maps into a paper and even to a plastic or metal plates.  It is used in fashion designing, engineering drawings, business analysis using visual terms such as bar charts, graphs and diagrams.
  • 102. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.5 Algorithm & Flow Charts  An algorithm is a finite list of instructions specifying a sequence of operations and that give the answer to any problem of a given type.  Example consider the Euclidean Algorithm stated as follows Given two positive integers A and B, find their common divisor The algorithm involves the construction of descending sequence of numbers. The first is the larger of two numbers, the second is the smaller, the third is the reminder from dividing the first by the second, the fourth is the remainder from dividing the second by the third; and so forth. The process stops when there is zero remainder. The G.C.D is the last divisor in the series.
  • 103. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  For example, the descending sequence of numbers for greatest common divisor of 44 and 28 is 44, 28, 16, 12, 4, 0 The last divisor is 4, so 4 is the result. The algorithm can be written as follows. 1. Write down A, B 2. If B is greater than A, exchange them. 3. Divide A by B to get the remainder 4. If R is equal to Zero, stop; B is the G.C.D 5. Replace A by B; (i.e. B A) 6. Replace B by R; (i.e. R B) 7. Go to step 3
  • 104. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Flow charts A flow chart is a diagram prepared by the programmer for describing the sequence of steps of complex processes involved in solving a problem. It helps the programmer avoid comprehensive thinking and probable mistakes in programming process. Four categories of flow charts are • System outline charts (Global map) • System flow charts (National map) • Run flow charts (State map) • Program flow charts (District map)
  • 105. AP SHAREEF’S LECTURE ON IT FOR MANAGERS System outline charts: • These charts only lists the inputs, files processed and outputs without regard to any sequence whatever. System flow charts: • These flow charts present an overview of the data flow through all parts of a processing system. It shows the flow of documents, operations and activities; persons and work stations. It depicts the relationship between input, processing and output. The system flow chart includes the following main elements • Input data sources and their medium • Processing steps • Intermediary and final output and storage devices
  • 106. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 107. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Run flow charts  These are extracted from system flow charts to show the reference of computer operations to be performed.
  • 108. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 109. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Program flow charts  They are the detailed and are concerned with the logical/arithmetic operations on data within the CPU and the flow of data between the CPU. It shows the flow between input/output peripherals also.
  • 110. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 111. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 112. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.6 Decimal v/s binary number systems  The radix or base of decimal system is 10 because it uses numbers 0 to 9 . It is also called base 10 number system.  Here, the weight of each digit depends upon its relative position. E.g. 3256 =3000+200+50+6 =3x103 +2x102 +5x101 +6x100 if the left most digit of the number is nth digit , then we can write nth digit x 10n-1 (nth digit x (base)n-1 )
  • 113. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  The radix of the binary system is 2. It uses only 0s and 1s . Data is stored in a digital or electronic device such as a computer in binary system.  The data are based on the right to left position of digits. E.g. take the binary number 10100. using the equation (nth bit x (base)n-1 ) 10100= 1x24 +0x23 +1x22 +0x21 +0x20 10100=16+0+4+0+0 10100=20 Above shown is the binary decimal conversion.
  • 114. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  For fraction numbers 1.001= 1x20 +0x2-1 +0x2-2 +1x2-3 1.001=1+0+0+.125 1.001=1.125
  • 115. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Decimal to binary conversion (double dabble method) Therefore, the binary equivalent of 14 is 1110. 2 14 Remainde r 2 7 0 2 3 1 2 1 1 0 1
  • 116. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  For fractions E.g. 0.125 Binary equivalent of 0 is 0 itself And for fractional part it is 001 therefore 0.125 is converted as 0.001 0.125 X2 0.25 0 X2 0.5 0 X2 0 1
  • 117. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Classification of Networks- LAN,MAN,WAN Methods of Networking Internet and services E-Commerce Computer networking, internet and E-Commerce.Unit II
  • 118. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.1 Computer Networks  A network is a set of devices interconnected by communication links. It is a collection of computers and other devices set together for the purpose of sharing information and resources.  Networking improves the capabilities of computers.  Scope of networks include  File sharing  Print sharing  E- Mail  Remote access
  • 119. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Area based classification of networks.  LAN- Local Area Network  MAN-Metropolitan Area Network  WAN-Wide Area Network
  • 120. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Local Area Network  A LAN is a group of computers and network devices connected together, usually within the same building, campus or spread over a limited distance. It facilitates high speed data transmission at cheap cost.  LANs are privately owned and operated. LAN uses high speed media (1mbps to 30 mbps or more)
  • 121. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Features of LAN  Different users are connected together  Terminals are located in a small geographic location  Devices are connected via cables or wireless connectivity like Wi-Fi  A LAN could be connected to other LANs and the internet or other WAN.
  • 122. AP SHAREEF’S LECTURE ON IT FOR MANAGERS MAN-Metropolitan Area Network  It is larger and spans over a city or town.  It refers to networks which interconnect systems or LANs within a metropolitan area  A MAN can support both data and voice.  Cable TV networks are examples of MANs.
  • 123. AP SHAREEF’S LECTURE ON IT FOR MANAGERS WAN-Wide Area Networks  It covers a very large geographic area and uses different communication systems such as Telephone services.  E.g. banking networks, Railway Reservation Systems etc.
  • 124. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Features of WAN  Thousands of computers spread over a wide geographic region are connected together.  They use communication channels of a third party.  These channels are of low capacity and error- prone.
  • 125. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.2 Network Topology  Topology means the method in which terminals are connected in a network. Commonly, there are following types of methods.  Star network  Ring network  Bus network
  • 126. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1.Star network  It is the connection between a host computer and local computers. The host computer works as the central computer. Different terminals can communicate only via the host computer which centrally controls the others.  Advantages are  Minimal line cost  Adding of new nodes will not increase delay in communication between two nodes.  Failure of one node doesn’t affect the network.  The most important problem with this is that the entire network depends on the host computer. The whole network fails when it fails.
  • 127. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 128. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.Ring network  Computers are linked by a closed loop in a ring network to facilitate data transfer from one computer to the other. If the data is not needed for a particular computer, it ignores and simply passes to the other. The process continues till it reaches the destination.  This is a true distributed processing since there is no central computing.  It is reliable because it doesn’t depend upon any host computer.  Addition of nodes will increase delay. And it requires complicated control softwares.
  • 129. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 130. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3. Bus network  Bus network also has no central computer. Computers are connected by a single circuit used as communication path.  It is reliable.  New computers can be very easily added.  It also uses high complicated software.  Breakdown in the main circuit affects the entire network.
  • 131. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 132. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.3 Internet  Internet is the network of networks. It is the connection of crores and crores of computers connected together. The word internet is the combination of interconnection and network.
  • 133. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Uses of internet 1. E-Mail 2. FTP 3. Social networks 4. Internet Chatting 5. WWW
  • 134. AP SHAREEF’S LECTURE ON IT FOR MANAGERS E-Mail  Electronic mail system has overridden the traditional mailing systems such as telegram and Fax.  Any type of massages can be sent on an E- Mail. Video, audio, text and files can be sent along with mails.  Most popular E-Mail providers are Google, Yahoo, Hotmail, rediffmail etc.
  • 135. AP SHAREEF’S LECTURE ON IT FOR MANAGERS FTP  FTP stands for File Transfer Protocol  It helps users to download files from internet.  It is the most secure way of transferring files over the internet.
  • 136. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Social Networks  The recent trend in internet  Lakhs of people are connected together.  People can chat, express their opinions on various issues so that anyone can view it.  They turn to Social Media- creating a new media culture.  E.g. Face book, Twitter, Whatsapp Etc.
  • 137. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Internet chatting  It may be an audio-video chatting or only text chatting.  It makes use of various chat providers such as Skype or IMO.  Anyone can be connected to anywhere in the world using this facility.
  • 138. AP SHAREEF’S LECTURE ON IT FOR MANAGERS WWW  www stands for World Wide Web  It’s a web of information  It’s the fastest growing facility using internet.  Web sites are the collection of web pages and WWW is the collection of web sites.  A web page is created using a web language such as HTML or front page or PHP.  HTTP helps users to access web pages from www. Contd.
  • 139. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  A web browser is the program to access web pages from internet. E.g. internet explorer, Mozilla firefox, Google Chrome etc.  Search engines are devices to search for information on the internet. They are the database that contain references to thousands of resources.
  • 140. AP SHAREEF’S LECTURE ON IT FOR MANAGERS VPNs-Intranet and Extranet  VPNs are private data networks that make use of public networks such as internet for data transmission.  A VPN may be Intranet based or Extranet based.  An intranet is a network for users in an organization, Although they geographically disperse. It can be used only by authorized personnel of an organization. External users are not allowed to use it. Contd.
  • 141. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  An intranet is an integration of E-Mail, FTP, and web servers with the internal applications.  An Extranet on the other hand is a connection of intranets used by different organizations to facilitate inter-organizational data transfer. E.g. clients and suppliers network.
  • 142. AP SHAREEF’S LECTURE ON IT FOR MANAGERS WAP- Wireless Application Protocol  Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services. Following mobile services use WAP  Email by mobile phone  Tracking of stock-market prices  Sports results  News headlines  Music downloads
  • 143. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.4 E-Commerce WTO defines E-Commerce as “ a commercial process that includes production, distribution, sales or delivery of goods and services through the electronic means” In the process of E-Commerce, data is transmitted from one organization to the other in electronic form. This data interchange is known as EDI- Electronic Data Interchange.
  • 144. AP SHAREEF’S LECTURE ON IT FOR MANAGERS E-Commerce models/types of E- Commerce  Business to Business (B2B)  Business to Customer (B2C)  Consumer to consumer (C2C)  Business to Government (B2G)  Business to Employee (B2E)
  • 145. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Business to Business –B2B  In B2B, transactions take place between 2 different business organizations.  For example, Amazon.com’s online book store.  Various book publishers may develop their own distribution channel or may have a rapport with Amazon.com. In the second case, they transact with Amazon in B2B mode. They do this because the books will be viewed by a large audience.
  • 146. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Business to Consumer (B2C)  B2C means sale of goods by a business to the public. It may be either products or services such as airline booking or stock trading.  Low marketing costs, lower order processing costs, better customer services etc. are the benefits of B2C
  • 147. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Consumer to consumer  It consists of individuals using the online advertisement websites to sell products and services directly to other individuals. Online auction is a very good example for C2C  Dubizzile, OLX etc are mostly used online ad- websites.
  • 148. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Business to Government B2G  Apart from the main B2G activities such as paying government taxes like vehicle tax, property tax and income tax, Government procure goods and services from the Business organizations. These products and services range from office stationary to military equipments.
  • 149. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Business to Employee (B2E)  It is an internal E-commerce model and it uses intranet.  Examples are, online insurance policy management, corporate dissemination, special offers for the employees etc.
  • 150. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Database concepts Information Systems System development life cycle Various types of information systems DBMS and Information Systems Unit III
  • 151. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.1 Types of databases Operational databases: They store detailed data needed to support operations of the entire organization. They are called as Subject Area Databases (SADB), Transaction Database, Inventory Database and Production Database. E.g. Customer Database, Personnel Database. Management database: They store data and information extracted from selected operational and external database. It consists of summarized data and information needed by the organization’s managers and other end users.
  • 152. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Information Warehouse database: An information warehouse stores data from current and previous years. This is usually data taken from the various operational and management databases of an organization. External database: For some databases, there is option to connect with external privately owned online databases. Its for smooth commercial information services.
  • 153. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Text databases: A full-text database is a database that is comprised of several books, articles, journals, magazines, newspapers and other textual documents but does not include graphical documents such as drawings, diagrams or pictures. Each of the referenced documents can be viewed, printed or downloaded online. Image databases: Wide variety of images can be stored electronically in image databases. Even electronic encyclopaedia are available on CD ROM disks which store thousands of photographs of text. Image data processing is the use of image database in business organizations
  • 154. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.2What is an information system  An information system can be defined as a set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization.  In addition to the above, information systems help managers and workers analyze problems, visualize complex subjects, and create new products.
  • 155. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 156. AP SHAREEF’S LECTURE ON IT FOR MANAGERSAP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.3 System Development Life Cycle
  • 157. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1. Preliminary analysis  Conduct the preliminary analysis  Propose alternative solutions  Describe the costs and benefits AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 158. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2. Systems analysis, requirements definition  Collection of Facts  Scrutiny of the existing system  Analyzing the proposed system AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 159. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3. Systems design  Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode and other documentation AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 160. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4.Development  Development of different software modules is done at this stage. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 161. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5. Integration and testing  All the different modules are brought together. They are integrated and tested for errors. Corrections are made if errors are found AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 162. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 6. Acceptance, installation, deployment  Top management officials approve the system  Install the system and allocate the tasks  Appropriate staff is deployed. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 163. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 7. Maintenance and evaluation  Ensure the smooth working of the system  Maintenance team observes the work  Mistakes are repaired AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 164. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.4 Types of information systems Transaction processing systems. TPS is an information system that keep track of the elementary activities and transactions of the organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of materials in a factory. It is a computerized system that performs and records the daily routine transactions necessary to conduct business
  • 165. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 166. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Management information systems MIS provide middle managers with reports on the organization’s current performance. This information is used to monitor and control the business and predict future performance. It uses data supplied by TPS and compresses them into reports. The picture depicts how MIS transforms transaction level data from inventory, production, and accounting into MIS files that ate used to provide managers with reports.
  • 167. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 168. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Decision Support Systems DSS focuses on problems that are unique and rapidly changing, for which the procedure for arriving at a solution may not be fully predefined in advance. It takes information from TPS and MIS. But often bring in information from external sources, such as the current stock prices or product prices of competitors These systems are employed by “super-user” managers and business analysts who want to use sophisticated analytics and model to analyze data
  • 169. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Database • Production data • Marketing data • Finance data • HR data Model base • Statistical models • Forecasting models • Planning models • Operational models DSS Software • Manage database • Manage model base • Manage end user interface User interface User
  • 170. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Executive Support System (ESS) ESS addresses the decision making needs of senior management. It supports strategic issues and long term trends. ESS present graphs and information from many sources through an interface that is easy for senior management. It is designed to incorporate data about external events, such as tax laws or competitors, but they draw summerized information from internal MIS and DSS.
  • 171. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Database Data warehouse datamart Data mining EIS SoftwareExecutive’s staff Executive Query Output Components of an executive information system
  • 172. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Enterprise Resource Planning Systems These integrate business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources into a single software system . For example, when a customer places an order, the data automatically go to the other parts which are affected by it. The transaction gives information to the warehouse to pick the products and arrange for shipment. The warehouse informs the factory to replenish what has been reduced. Accounting department takes steps to send customer an invoice. Customer service executives observe the progress of the order.
  • 173. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 174. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Supply Chain Management System This system help the business to manage relationship with suppliers. Suppliers, purchasing firms, distributing men and logistics companies benefit by this system. It shares information on orders, production, inventory levels and delivery of goods and services so that the above groups can get efficient services. It is an inter-organizational system because they automate the flow of information across organizational boundaries.
  • 175. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 176. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Customer Relationship Management System CRMS helps the management to keep effective relationship with its customers. It provides information to coordinate the sales and marketing activities in such a way as to create delighted customers. The most profitable customers can be retained by this system.
  • 177. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 178. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Knowledge Management Systems. These enable an organization to better manage process for capturing and applying knowledge and experience in the firm, and make it available wherever and whenever it is needed to improve business and management decisions. They link the firm to external sources of knowledge. This firm knowledge is unique, difficult to imitate and can be leveraged into long term strategic benefits. The basic elements of knowledge management are 1.Knowledge creation 2.Knowledge sharing 3.Knowledge utilization
  • 179. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 180. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.5 Functional information systems  These are the systems based on different functions of a business organization  Different functional subsystems are as follows 1. Production information systems 2. Marketing information systems 3. Financial information systems 4. HR information systems  These systems are dealt with in detail.
  • 181. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Production Information Systems  These systems facilitate efficient productions/operations management. Production management encompasses design, implementation, operation and control of systems made up of people, materials, capital equipment, money and information to accomplish specific objectives  Following is a model of production information system
  • 182. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 183. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Marketing information systems  Marketing information systems are designed and operated to provide relevant information on the following aspects 1. Type of products to be offered 2. Price at which products to be offered 3. Place where products have to reach 4. Promotion of products to create loyal customers  The outline of the system is as follows
  • 184. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 185. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Financial Information Systems  Finance is the life blood of every business organization. Financial Information systems help manage financial affairs effectively. It is useful in taking major financial decisions, i.e. finance decisions, investment decisions and dividend decisions.  The outline of a FIS is depicted below
  • 186. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 187. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Accounting Information System  It consists of the people, records, and methods used to gather financial information about business events, record it, process it into a useful form, and communicate the information to end users and decision makers in planning, forecasting and controlling.  It works with many subsystems such as budget, final accounts, costing, inventory, receivables etc
  • 188. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 189. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Computerized Accounting Package  It is a package designed for accounting with the use of computers for recording, reporting and analysing the financial data of a business. These are software programs that are stored on a company’s computer, network server, or remotely and accessed via the internet. A business can customize the software to suite the particular needs.
  • 190. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Salient features of Computerized Accounting Package.  Fast, Powerful and integrated.  Complete visibility.  Enhanced user experience  Accuracy.  Improves the business performance  Quick decision making  Complete reliability.
  • 191. AP SHAREEF’S LECTURE ON IT FOR MANAGERS HR Information System  HR Management is a major function in any business firm. HRIS facilitate systematic ways for HRM.  It is an organized method of providing information about HR , their functioning, and external factors relevant to HRM.  The outline is depicted below
  • 192. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
  • 193. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Computer Viruses Cyber Crimes IT act 2000 and Cyber laws Computer Viruses, Cyber Crimes and LawsUnit IV
  • 194. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4.1 COMPUTER VIRUSES  A computer virus is a program designed to harm or cause harm on an infected computer. Its spreads through e-mail attachments, portable devices, websites containing malicious scripts and file downloads. A computer virus attaches itself to the host files and always activate whenever you open the infected files. The virus can replicate itself and then infect the other files on your computer causing more damage. Below is a list of different types of computer viruses and what they do.
  • 195. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Macro Viruses These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros and also templates and documents that are contained in the file. They hide in documents shared through e- mail and networks.  Macro viruses include:  Relax  bablas  Melissa.A  097M/Y2K
  • 196. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Memory Resident Viruses They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files. They hide in RAM.  Memory Resident Viruses Include:  CMJ  meve  randex  mrklunky
  • 197. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Overwrite Viruses These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replaces all the file content but the file size doesn’t change.  Overwrite Viruses Include:  Trj.Reboot  way  trivial.88.D
  • 198. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Direct Action Viruses These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they keep on changing location.  Direct Action Viruses Include:  Vienna virus
  • 199. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Directory Virus Also known as cluster virus or file system virus. They infect the computer’s directory by changing the path indicating file location. They are usually located in the disk but affect the entire directory.  Directory Viruses Include:  dir-2 virus
  • 200. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Web Scripting Virus Most web pages include some complex codes in order to create an interactive and interesting content. Such a code is often exploited to cause certain undesirable actions. They mostly originate from the infected web pages or browsers.  Web Scripting Viruses Include:  JS.Fortnight – a virus that spreads via malicious emails.
  • 201. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Multipartite Virus These type of viruses spread in many different ways. Their actions vary depending on the OS installed and presence of certain files. They tend to hide in the computer’s memory but do not infect the hard disk.  Multipartite Viruses Include:  flip  invader  tequila
  • 202. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  FAT Viruses These lardy viruses attack the file allocation table (FAT) which is the disc part used to store every information about the available space, location of files, unusable space etc.  FAT Viruses Include:  the link virus
  • 203. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Companion Viruses These types of viruses infect files just like the direct action and the resident types. Once inside the computer, they ‘accompany’ other existing files.  Companion Viruses Include:  Asimov.1539  stator and terrax.1069
  • 204. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Polymorphic Virus They encode or encrypt themselves in a different way every time they infect your computer. They use different encryption and algorithms. This makes it difficult for the antivirus software to locate them using signature or string searches (since they are very different in each encryption).  Polymorphic Viruses Include:  Marburg  tuareg  Satan bug  elkern
  • 205. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Worm This program is very similar to a virus and has the ability to self-replicate leading to negative effects on your computer.  Worm Viruses Include:  lovgate.F  sobig.D  trile. C  PSWBugbear.B  Mapson
  • 206. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Trojans Trojans can illegally trace important login details of users online. For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus installed.
  • 207. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Email Virus This is a virus spread via an email. Such a virus will hide in an email and when the recipient opens the mail.  Browser Hijacker This virus can spread in many different ways including a voluntary download. If infects certain browser functions especially in form of re-directing the user automatically to certain sites. A good example is  Browser Hijackers Include:  the cool web search
  • 208. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Boot Infectors They include the boot sector plus master boot record types. All the viral codes can be separate location; however they infect the hard disks or the floppy.  Boot Infectors Include:  The brain virus -it is the very first wild virus to be created.
  • 209. AP SHAREEF’S LECTURE ON IT FOR MANAGERS From what we have seen, the many types of computer viruses and their effects are very harmful and can completely damage your system. Always make sure your system is up to date. Also install antivirus software. The antivirus program protects your computer and the personal information in it.
  • 210. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4.2 Introduction to Cyber Crimes  Due to increase in the number of netizens, misuse of technology in the cyberspace was clutching up which gave birth to cyber crimes at the domestic and international level as well.  Though the word Crime carries its general meaning as “a legal wrong that can be followed by criminal proceedings which may result into punishment” whereas Cyber Crime may be “unlawful acts wherein the computer is either a tool or target or both”.
  • 211. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Classifications Of Cyber Crimes: Cyber Crimes which are growing day by day, it is very difficult to find out what is actually a cyber crime and what is the conventional crime so to come out of this confusion, cyber crimes can be classified under different categories which are as follows:
  • 212. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1. Cyber Crimes against Persons: There are certain offences which affects the personality of individuals can be defined as:  Harassment via E-Mails: It is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter etc. increasing day by day.  Cyber-Stalking: It means expressed or implied a physical threat that creates fear through the use to computer technology such as internet, e-mail, phones, text messages, webcam, websites or videos.
  • 213. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Dissemination of Obscene Material: It includes Indecent exposure/ Pornography (basically child pornography), hosting of web site containing these prohibited materials. These obscene matters may cause harm to the mind of the adolescent and tend to deprave or corrupt their mind.  Defamation: It is an act of imputing any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar language to unknown persons mail account.
  • 214. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Hacking: It means unauthorized control/access over computer system and act of hacking completely destroys the whole data as well as computer programmes. Hackers usually hacks telecommunication and mobile network.  Cracking: It is amongst the gravest cyber crimes known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems without your knowledge and consent and has tampered with precious confidential data and information.
  • 215. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates.  SMS Spoofing: Spoofing is a blocking through spam which means the unwanted uninvited messages. Here a offender steals identity of another in the form of mobile phone number and sending SMS via internet and receiver gets the SMS from the mobile phone number of the victim. It is very serious cyber crime against any individual.
  • 216. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals for their monetary benefits through withdrawing money from the victim’s bank account mala-fidely. There is always unauthorized use of ATM cards in this type of cyber crimes.  Cheating & Fraud: It means the person who is doing the act of cyber crime i.e. stealing password and data storage has done it with having guilty mind which leads to fraud and cheating.
  • 217. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children.  Assault by Threat: refers to threatening a person with fear for their lives or lives of their families through the use of a computer network i.e. E-mail, videos or phones.
  • 218. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2. Crimes Against Persons Property: As there is rapid growth in the international trade where businesses and consumers are increasingly using computers to create, transmit and to store information in the electronic form instead of traditional paper documents. There are certain offences which affects persons property which are as follows:
  • 219. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Intellectual Property Crimes: Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, infringement of copyright, trademark, patents, designs and service mark violation, theft of computer source code, etc.
  • 220. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber Squatting: It means where two persons claim for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that previously. For example two similar names i.e. www.yahoo.com and www.yaahoo.com.
  • 221. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber Vandalism: Vandalism means deliberately destroying or damaging property of another. Thus cyber vandalism means destroying or damaging the data when a network service is stopped or disrupted. It may include within its purview any kind of physical harm done to the computer of any person. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer.
  • 222. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Hacking Computer System: Hacktivism attacks those included Famous Twitter, blogging platform by unauthorized access/control over the computer. Due to the hacking activity there will be loss of data as well as computer. Also research especially indicates that those attacks were not mainly intended for financial gain too and to diminish the reputation of particular person or company.
  • 223. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Transmitting Virus: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computerize system of the individuals.  Cyber Trespass: It means to access someone’s computer without the right authorization of the owner and does not disturb, alter, misuse, or damage data or system by using wireless internet connection.
  • 224. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Internet Time Thefts: Basically, Internet time theft comes under hacking. It is the use by an unauthorised person, of the Internet hours paid for by another person. The person who gets access to someone else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s knowledge. You can identify time theft if your Internet time has to be recharged often, despite infrequent usage.
  • 225. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3. Cybercrimes Against Government:  There are certain offences done by group of persons intending to threaten the international governments by using internet facilities. It includes:  Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as global concern. The common form of these terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism activities endanger the sovereignty and integrity of the nation.
  • 226. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber Warfare: It refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.  Distribution of pirated software: It means distributing pirated software from one computer to another intending to destroy the data and official records of the government.  Possession of Unauthorized Information: It is very easy to access any information by the terrorists with the aid of internet and to possess that information for political, religious, social, ideological objectives.
  • 227. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4. Cybercrimes Against Society at large:  An unlawful act done with the intention of causing harm to the cyberspace will affect large number of persons. These offences includes:  Child Pornography: It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children. It also includes activities concerning indecent exposure and obscenity.
  • 228. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber Trafficking: It may be trafficking in drugs, human beings, arms weapons etc. which affects large number of persons. Trafficking in the cyberspace is also a gravest crime.  Online Gambling: Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. There are many cases that have come to light are those pertaining to credit card crimes, contractual crimes, offering jobs, etc.
  • 229. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Financial Crimes: This type of offence is common as there is rapid growth in the users of networking sites and phone networking where culprit will try to attack by sending bogus mails or messages through internet. Ex: Using credit cards by obtaining password illegally.  Forgery: It means to deceive large number of persons by sending threatening mails as online business transactions are becoming the habitual need of today’s life style.
  • 230. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Affects To Whom: Cyber Crimes always affects the companies of any size because almost all the companies gain an online presence and take advantage of the rapid gains in the technology but greater attention to be given to its security risks. In the modern cyber world cyber crimes is the major issue which is affecting individual as well as society at large too.
  • 231. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4.3“INFORMATION TECHNOLOGY ACT, 2000”  With the emergence of technology the misuse of technology has also expanded to its optimum level and then there arises a need of strict statutory laws to regulate the criminal activities in the cyber world and to protect technological advancement system. It is under these circumstances Indian parliament passed its “INFORMATION TECHNOLOGY ACT, 2000” on 17th oct to have its exhaustive law to deal with the technology in the field of e- commerce, e-governance, e-banking as well as penalties and punishments in the field of cyber crimes.
  • 232. AP SHAREEF’S LECTURE ON IT FOR MANAGERS CYBER LAWS  Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.  Law encompasses the rules of conduct: 1. That have been approved by the government, and 2. Which are in force over a certain territory, and 3. Which must be obeyed by all persons on that territory. Violation of these rules could lead to government action such as imprisonment or fine or an Order to pay compensation.
  • 233. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber law encompasses laws relating to: 1. Cyber Crimes 2. Electronic and Digital Signatures 3. Intellectual Property 4. Data Protection and Privacy
  • 234. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cyber crimes These are unlawful acts where the computer is used either as a tool or a target or both. The enormous growth in electronic commerce (e- commerce) and online share trading has led to a phenomenal spurt in incidents of cyber crime.
  • 235. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Electronic signatures These are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures.
  • 236. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Intellectual property These refer to creations of the human mind e.g. a story, a song, a painting, a design etc. The facets of intellectual property that relate to cyber space are covered by cyber law. These include:  copyright law in relation to computer software, computer source code, websites, cell phone content etc,  software and source code licenses  trademark law with relation to domain names, meta tags, mirroring, framing, linking etc  semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts,  patent law in relation to computer hardware and software.
  • 237. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Data protection and privacy laws These laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc. These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.
  • 238. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Strategic advantage and IT Problems and Prospects of Computerization Selection of Hardware and Software Managing the changes of IT Strategic role of IT and Emerging issues Unit V
  • 239. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5.1What is strategic advantage?  Strategic advantage is the result of using organizational capability measured in financial terms by profitability, shareholder value etc. and in non financial terms by market share, reputation etc.  Competitive advantage exists when there is match between the distinctive competencies of a firm and the critical success factors within its industry that permits the firm to outperform competitors. Information technology helps the organizations gain competitive advantage in
  • 240. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1. Becoming low-cost producer 2. Creating new products and services 3. Focus on market niche 4. Linking with new customers and suppliers 5. Managing value chain. 6. Creating strategic alliances
  • 241. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1. Become Low-cost producer  Information systems reduce cost by focusing on  Internal operations  Management planning and control and  Human resources  Reduced cost helps in increasing profit.  Many low cost producing organizations use information technology as a dynamic and intensive way rather than a mere management tool
  • 242. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2.Create new Products and services  IT is used as a tool to prevent duplication.  IT helps in creating differentiated products and services and this in turn raises market entry cost for competitors.
  • 243. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 3.Focus on Market Niche  IT helps in improving marketing techniques.  An organization can penetrate the market by carefully examining transactions with customers.  It enables the business to win more from profitable customers ,turns non profitable customers to profitable or drop outs.
  • 244. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4. Linking with Customers and Suppliers  IT Systems help the organization to follow Just in time supply method and stock less inventory method.  The first method shifts all inventory responsibilities to the distributor who manages the supply flow. The second helps in winning customer loyalty by providing cheap and best goods on time.
  • 245. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5.Managing value chain
  • 246. AP SHAREEF’S LECTURE ON IT FOR MANAGERS contd…  IT and information systems that have strategic impact helps the organization to provide products or services of higher value at the same price or of the same value at the lower price.
  • 247. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 6. Creating Strategic Alliances  Strategic alliance is the combination of two or more organizations to create competitive advantage.  Information Technology links two independent organizations to share skills, costs and access to another’s market.  The role of IT is crucial in these type of relations.  Such strategic alliances are recently coined as information partnerships.
  • 248. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5.2 Issues on Hardware and Software  The systems come with hardware, software and support. Today, selecting a system is a serious and time-consuming business.  There are several factors to consider prior to system selection . They are discussed below. Procedure for hardware software selection
  • 249. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 1. Define the system capabilities Computers have proven valuable to business in the following areas :  Cost reduction includes reduction of the inventory, savings on space and improved ability to predict business trends  Cost avoidance includes early detection of problems and ability to expand operations without adding clerical help.  Improved service emphasizes quick availability of information to customers, improved accuracy and fast turnaround  Improved profit reflects the bottom line of the business and its ability to keep receivables within reason.
  • 250. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 2. Specify the magnitude of the problem  It refers to clarify whether selections consist of a few peripherals or major decision concerning the mainframes. 3. Assess the competence of the in-house staff  This involves determining the expertise needed in areas such as telecommunications and data base design. Acquiring a computer often results in securing temporary help for conversion. Planning for this help is extremely important.
  • 251. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 4. Consider hardware and software as a package.  This approach ensures compatibility. In fact, software should be considered first, because often the user secures the hardware and then wonders what software is available for it. 5. Provide user indoctrination.  This is crucial, especially for first-time users. Selling the system to the user staff, providing adequate training, and preparing an environment a conductive to implementation are pre- requisites for system acquisition.
  • 252. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Other Criteria for selection of Hardware 1. System Availability 2. Compatibility 3. Cost 4. Performance 5. Support 6. Usability 1. The programming language and its suitability to the applications 2. Ease of Installation and training 3. Extent of enhancements to be made prior to installation. Hardware Software
  • 253. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Major phases in Hardware/Software selection The selection process should be viewed as a project, and a project team should be organized with management support. In larger projects, the team includes one or more user representatives, an analyst and EDP auditor, and a consultant. Several steps make up the selection process: 1. Requirement Analysis 2. System Specification 3. Request for proposals (RFP) 4. Evaluation and validation 5. Vendor Selection 6. Post Installation Review
  • 254. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5.3 Problems and prospects of computerization  Problems IT systems development problems IT security challenges Ethical and social problems Global business challenges
  • 255. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  IT Systems development problems  Managers have to realign their strategies business strategies and information systems to environmental requirements.  They face the challenge of developing dynamic information systems.
  • 256. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  IT security challenges • Use of internet and other types of computer networks has become common. • Security challenges also have multiplied manifold • Effective provisions have to be made to face these problems
  • 257. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Ethical and social problems  Privacy rights  Intellectual property rights  Employment challenges  Quality of work life  Health issues
  • 258. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Prospects of computerization 1. Organization 2. Self-Sufficiency 3. Cost-Effective 4. Speed 5. Cheaper Research and Development 6. Sales
  • 259. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Organization: Computers allow the application of different types of software that can help businesses keep track of their files, documents, schedules and deadlines. Computers also allow businesses to organize all of their information in a very accessible manner. The ability to store large amounts of data on a computer is convenient and inexpensive, and saves space. A computer's ability to allow a company to organize its files efficiently leads to better time management and productivity.
  • 260. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Self-Sufficiency: Computers have made staff and companies more self-sufficient by allowing them to do tasks that previously had to be outsourced. For example, a company can now use office software to create their own training material. Desktop publishing software can be used to create marketing materials. Online tax and accounting programs allow companies to prepare their own taxes. This allows the dominant operations of a company to remain in-house and empowers the company to become more independent and less susceptible to errors committed by outside parties.
  • 261. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cost-Effective: Emerging technology makes new tools and services more affordable and allows companies to save on their staff payroll and office equipment. Because computers allow work to be done faster and more efficiently, it is possible for a company to hire fewer staff. In addition, with networked and relatively inexpensive computers, companies can store data more easily, saving on the cost of outside file storage, and can avoid having to purchase as many copiers, fax machines, typewriters, and other such items that were used before computers became popular. Contd….
  • 262. AP SHAREEF’S LECTURE ON IT FOR MANAGERS Correspondingly, potentially profitable businesses can be started with a smaller overhead cost. Email capabilities decrease postage costs; software applications reduce the need for large accounting departments, while videoconferencing reduces the need for travel. All resources saved will trickle down to the consumers, who are then provided with much more affordable products and service.
  • 263. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Speed: Computers help speed up other business operations. The collecting of consumer feedback, ordering of raw materials, and inspection of products is made quicker through the use of computers, allowing companies to operate much faster and to produce better quality results.
  • 264. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Cheaper Research and Development: R&D, or research and development, costs will also decrease with the help of computers. Scientific research can now be done using the Internet and computer software applications designed to develop and produce new products and services. For example, instead of a company having to do in-person focus groups on a potential new product or to determine their target market, the company can conduct a widespread online survey for a far lower cost. Contd….
  • 265. AP SHAREEF’S LECTURE ON IT FOR MANAGERS In addition, new models of a product can be created online using virtual pictures and drawings instead of having to be hand-drawn. These interactive models created using software programs can help bring the product and its features to life for a far lower cost than creating an actual physical model of the given product.
  • 266. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Sales: Computers can help generate higher sales and profits for businesses via a company website. Many businesses now operate online and around the clock to allow customers from around the world to shop for their products and services.
  • 267. AP SHAREEF’S LECTURE ON IT FOR MANAGERS 5.4 MANAGING THE CHANGES OF IT  It means managing the process of implementing major changes in IT, business processes, organizational structures, and job assignments to reduce the risks and costs of change, and to optimize its benefits.
  • 268. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  What Does Change Management Require? A commitment from top management and an organizational design to plan the future of IT and Information Systems within the business. Change management involves analyzing and defining all changes facing the organization, and developing programs to reduce the risks and costs, and to maximize the benefits of change. ``
  • 269. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  End User Resistance  New ways of doing things creates resistance among employees.  This is the biggest obstacle to the implementation of new information systems.  End User Implications Dealing with end user resistance:  Proper education and training.  Direct end user participation before implementation helps ensure that the end users assume ownership of a system, and that its design meets their needs.
  • 270. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Reengineering a Business Process  Develop a change action plan.  Assign selected managers as change sponsors.  Develop employee change teams.  Encourage open communications and feedback about organizational changes.
  • 271. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Change Management Activities Human resource management handles activities - Such as  developing innovative ways to measure, motivate, and reward performance.  Program - Design a way to recruit and train employees in the core competencies required in a changing workplace.
  • 272. AP SHAREEF’S LECTURE ON IT FOR MANAGERS  Recommendations of Consultants  Involve as many people as possible in reengineering and other change programs.  Make constant change part of the culture.  Tell everyone as much as possible about everything as often as possible, preferably in person.  Make liberal use of financial incentives and recognition.  Work within the company culture, not around it.
  • 273. AP SHAREEF’S LECTURE ON IT FOR MANAGERS For your kindness and cooperation