SlideShare a Scribd company logo
1 of 185
Computer Application In BusinessPREPARED BY
MONCY KURIAKOSE
Assistant Professor,
Girideepam Business School
References
 June Jamrich Parsons, Computer Concepts, Thomas
Learning, New Delhi.
 Leon & Leon, Introduction to Computer, Vikas
publishing house, New Delhi.
 Comer, Computer networks and Internet, Pearson
Education, New Delhi.
 White, Data Communication & Computers Network,
Thomson Learning, New Delhi.
MODULE I
Introduction to Computers
Fast electronic
calculating machine
Accept digitized input
information
Process it
Produces output
information
Positive impact of Computers
 Reducing the cost of operation
 Improving revenues
 Improving customer satisfaction
 Improve the standard of living
Negative impacts
 Systems security problem
 Theft of information
 Computer errors
Computer Applications
 Commerce
 Industry
 Administration
 Science & Technology
 Transportation
 Education
 Professionals
 Individuals
Characteristics of Computer
 Speed
 Storage
 Accuracy
 Diligence
 Versatility
 Automation
 Consistency
 No feelings
 Reliability
 Communication
Limitations of Computer
 Programmed by human being
 Cannot think and work independently
 Cannot take decisions
 Maintained and updated by user
 No feelings and ethics
 Cannot work with out power
History of Computers
 Various stages of evolution
1. The Mechanical Era (1623-1945)
2. First Generation Computers (1946-1959)
3. Second Generation Computers (1959-1965)
4. Third Generation Computers (1965-1971)
5. Fourth Generation Computers (1971-1980)
6. Fifth Generation Computers (1980-Till date)
Mechanical Era
Abacus –Chinese
mathematical
calculators
Analytical engine –
Charles Babbage (1834)
Punched cards - 1890
First Generation Computers
Vaccum Tubes
No operating system
ENIAC – 1946
EDVAC - 1949
Second Generation Computers
Transistors
No operating system
CDC 1604
IBM 7094
Third Generation Computers
IC
Operating system
included
IBM 360 Series
TDC 316
Fourth Generation Computers
VLSI Chip
Improved operating
system
STAR 1000
CRAY-1
Fifth Generation Computers
ULSI Technology
Artificial Intelligence
AMD ATHLON 64
INTEL PENTIUM
Type of Computer
 On the basis of operating principle
 On the basis of application
 On the basis of capacity or size
Basis of operating principle
 Digital Computers
 Analog Computers
 Hybrid Computers
Basis of application
 General purpose computer
 Special purpose computer
Basis of capacity
 Micro / Personal Computer
 Mini Computer
 Mainframe Computer
 Super Computer
Computer Architecture
Control unit
ALU
MAIN MEMORY
SECONDARY MEMORY
OUTPUTINPUT
CPU
Input Unit
 Accept data or instruction
 Convert it into computer acceptable form
 Supplies converted instructions to computer system
for further processing
CPU
Data processed as per
instructions given
through programmer
CPU comprises of :
1. ALU
2. Control unit
3. Primary memory
ALU
 Arithmetic logic unit
 Execution of instruction take place
 Calculation and decision are made
Control unit
 Directs all operations
 Nerve center of computer
 Controls and coordinate all hardware operation
Primary memory
Storing data and
instruction during
processing
RAM
Secondary memory
Saving data permanently
for future use
Hard disk
CD/DVD
Floppy Disk
Output Unit
 Supplies information and results to user
 Monitor
Hardware
HARDWARE
CPU
PRIMARY MEMORY PROCESSOR
PERIPHERALS
INPUT
DEVICES
OUTPUT
DEVICES
STORAGE
DEVICES
PROCESSOR
 ALU and Control unit
 Brain of the computer
 Microprocessor is plugged into motherboard
 Intel Pentium and AMD processor
 Intel I7 dual or quad core processor
 AMD Athlon 64X2 and FX8
Primary Memory
 Fast memory used to store data during computer
operation
 Types of main memory :
1. RAM
2. ROM
3. PROM
4. EPROM
Secondary Memory
 Comparatively slow memory for bulk and permanent
storage
 Non volatile
 Types are :
1. Hard disk
2. Floppy disk
3. CD
4. DVD
Secondary Memory
Input Devices
Keyboard
Mouse
Joystick
Scanner
Light pen
Optical mark recognition
(OMR)
Optical character
recognition (OCR)
Magnetic ink character
recognition (MICR)
Optical bar code reader
Web camera
Microphone
Output Devices
 Monitor
I. Cathode ray tube (CRT)
II. Liquid crystal display (LCD)
 Printer
 Impact printer
a) Dot matrix printer
b) Daisy wheel printer
c) Line printer
 Non impact printer
a) Inkjet printer
b) Laser printer
• Plotters
a) Flatbed plotters
b) Drum plotters
Output Devices
Software
Instructions or programs
given to the computer to
perform desired task
Acts as interface b/w
user and computer
Classified into two :
1. System
software
2. Application
software
System software
 Consist of computer programs that manage and
support computer system and its processing
 Interface between hardware & application programs
 Three basic types :
a) Operating system
b) Network operating system
c) Utility
Application software
 Contains programs employed by users to perform
specific tasks
 Classified into two:
1. User application programs
2. Application packages
Operating System
Users
Application
programs
Operating
system
Hardware
Operating System
 Series of programs which control, coordinate &
supervise the activities of various components of
computer
 provide link between hardware and user programs
GUI
 Graphical user interface
 Incorporation of pictorial representation
 System interact with user with the help of pictures
Types of OS
1. Single user operating system
2. Batch operating system
3. Real time operating system
4. Multiprogramming operating system
Component of OS
1. Input/output management
2. Command interpreter
3. Data management
4. Program development tools
5. Time sharing
6. Security
7. Communication
8. Accounting
Functions of OS
1) Memory management
2) Processor management
3) Device management
4) File management
Important operating system
 CP/M ( Control program for microcomputer)
 MS-DOS
 Windows NT for powerful workstations and network servers
 Microsoft Windows
1. Windows 95
2. Windows 98
3. Windows 2000 professional
4. Windows XP
5. Windows Vista
6. Windows 7
7. Windows 8
8. Windows 10
 UNIX
 LINUX
LINUX
 Freeware operating system
 32 bit multitasking OS
 Runs in any computer and support almost all
application
 Most popular – Red Hat and Novell
Introduction to Embedded Software
 Specialized for particular hardware
 Time and memory constraints
 Build in electronics of cars, telephone, robots etc
 Fixed hardware and capabilities
MODULE II
MS OFFICE
 Set of carefully integrated tools designed to work
together
 Developed by Microsoft
 MS Office family of products are
1. MS Word
2. MS Excel
3. MS PowerPoint
4. MS Outlook
5. MS Access
Advantage of MS Office
 Universal software
 Complete software suite
 Most businesses have a use for it
 Ease of use
 Online support from Microsoft
 Online tutorials
 Cloud integration
 Tablet friendly
 Editable ease
 Adding videos to document
Word Processing Programs
 Tools for creating all kind of text based document
 Enable you to add images to documents
 Design documents that look like professional print
 Can create long documents with separate chapters
 Embed sounds, videos and animation
 Microsoft Word (MS Word) is the most popular
Word processors interface
 Main editing window displays a document and
several tools
 Tools includes :
i. Menu bar
ii. Tool bar
iii. Rulers
iv. Scroll bars
v. Status bar
MS Word
MENU
BAR
TOOL BARS
DOCUMENT
AREA
STATUS BAR
SCROLL
BARS
Working with word document
 To create new document , choose File – New or use
shortcut ctrl + N
 To save document, choose File – Save as or use
shortcut ctrl + S
 Customization of settings for margin, paper size and
layout is done through page setup option
 Document, paragraph, text and character formatting
 Tables and images can be inserted
Mail Merging
 Set of documents sent to many customer
 Two steps
1. Set up the main document
2. Connect the document to a data source
Types of mail merge
 Letters
 Email
 Envelopes
 Labels
 Directory
Spreadsheet programs
 Software tool for entering, calculating, manipulating
and analyzing set of numbers
 Wide range of users
 Traditional row and column format
 Slick report format
 Microsoft Excel (MS Excel) most commonly used
Spreadsheet interface
 Work in document called worksheet
 Workbook is collection of related worksheet
 Tools includes
a) Menu bar
b) Toolbar
c) Scroll bar
d) Status bar
e) Formula bar
 Intersection of any raw and column is called cell
MS Excel
MENU
BAR
TOOL
BAR
FORMULA
BAR
WORK
SHEET
CELL
STATUS
BAR
SCROLL
BAR
Working with spreadsheet
 New spreadsheet, select File-New or use shortcut
Ctrl + N
 Worksheet cells can hold – labels, values, dates and
formulas
 Arithmetic and logical calculation
 Cells can be formatted – font style & size
 Charts, video, audio and images can be added
Advanced features of MS Excel
 Types of operators
1. Arithmetic operators
2. Comparison operators
3. Text concatenation operators
4. Reference operators
Arithmetic operators
Arithmetic operator Meaning Example
+ (plus sign) Addition 3+3
- (minus sign) Subtraction 3 - 2
* (asterisk) Multiplication 3*3
/ (forward slash) Division 4/2
% (percent sign) Percent 20%
^ ( caret) Exponentiation 3^2
Comparison operators
Comparison operator Meaning Example
= Equal to A1=B1
> Greater than A1>B1
< Less than A1<B1
>= Greater than or equal to A1>=B1
<= Less than or equal to A1<=B1
<> Not equal to A1 <> B1
Text concatenation operators
Text operator Meaning Example
& (ampersand) Connects or concatenates
two values to produce one
continuous text value
North & Wind
Reference operators
Reference operator Meaning Example
: (Colon) Range operator, which
produces one reference to
all the cells between two
reference including the
two references.
B5 : B15
, (Comma) Union operator, which
combines multiple
reference into one
reference.
SUM(B5:B15 , D5 : D15)
Referencing
 Particular cell is referred to in formula – cell
referencing
 Referencing in three types
1. Relative referencing
2. Absolute referencing
3. Mixed referencing
Relative Referencing
 Cells referred to by their position on the basis of
their position relative to the cell containing the
formula
 Example, D2= B2 + C2 then
D3 = B3 + C3
D4 = B4 + C4
Absolute Referencing
 Referencing in which references do not change when
formula is copied to a different cell
 $ (Dollar) sign is used for specifying fixed position.
 Example, C2 = A2 + $B$2 then
C3 = A3 + $B$2
C4 = A4 + $B$2
Mixed Referencing
 Combination of both relative and absolute
referencing
 $ sign before row number or column letter makes it
mixed cell address
 In such address one part of the cell is relative and
other is absolute
 Example, B3 = A3 * D$1 then
B4 = A4 * E$1
B5 = A5 * F$1
STATISTICAL FUNCTIONS
Function Description
AVEDEV Returns the average of the absolute deviations of data points
from their mean
AVERAGE Returns average of its arguments
CORREL Returns the correlation coefficient between two data sets
COUNT Counts how many numbers are in the list of arguments
COVAR Returns covariance
FORECAST Returns a value along a linear trend
FREQUENCY Returns a frequency distribution as a vertical array
MEDIAN Returns the median of the given numbers
MIN Returns the minimum value in a list of arguments
SMALL Returns the smallest value in a data set
STANDARDIZE Returns a normalized value
STDEV Estimates standard deviation based on a sample
Mathematical Functions
Function Description
AVERAGE Returns the average of the arguments
CEILING Rounds a number to the nearest integer
EVEN Rounds a number up to the nearest even integer
EXP Returns e raised to the power of a given number
FACT Returns the factorial of a number
LOG Returns the logarithm of a number
POWER Returns the result of a number raised to a power
PRODUCT Multiplies its arguments
SQRT Returns a positive square root
SUM Adds its arguments
MAX Returns the largest value in a set of values
MIN Returns the smallest number in a set of values
Examples
FUNCTION SYNTAX EXAMPLE
SUM SUM(NUM1,NUM2…) SUM(3,2), SUM(D4:D6)
AVERAGE AVERAGE(NUM1,NUM2
…)
AVERAGE(D4:D8)
MAX MAX(NUM1,NUM2…) MAX(A2:A8)
MIN MIN(NUM1,NUM2….) MIN(D2:D8)
IF IF(TEST, if_true, if_false) IF(C3>85, “GOOD”,
“OK”)
AND AND(LOGICAL1,
LOGICAL2,….)
AND(A2>1, A2<100)
OR OR(LOGICAL1,
LOGICAL2…)
OR(A2>100, A2<50)
Presentation Programs
 To create and edit presentation to support discussion
 Allows user to design slides
 Series of slides displayed in order is called
presentation
 Microsoft PowerPoint is most commonly used
Advantages Of Presentation
 Creates presentation and slides
 Graphical objects images, charts etc can be included
 Various sound effects can be added
 Create handouts, notes and outlines
 Slide show can be presented non stop
Presentation program interface
 Tools are
a) Menu bar
b) Toolbar
c) Document area
d) Slide
e) Drawing tools
f) Status bar
MS POWERPOINT
MENU
BAR
TOOLBAR
DOCUMENT
AREA
SLIDE
STATUS
BAR
DRAWING
TOOL
SCROLL
BAR
Working with presentation
 Four main views
a) Normal view
b) Slide sorter view
c) Slide show view
d) Notes page view
Creating presentation
 Choose layout of slide
 Choose themes for the slide
 Add text, chart, graph and image
 Applying speaker notes
 Applying hyperlink
 Visual movements during slide change can be added
 Animation can added – movement text, image etc
MODULE III
Microsoft Access
 Powerful program to create and manage database on
computer
 Many built in features
 Assists in constructing and viewing information
Access interface
 The main screen elements are :
i. Title bar
ii. Menu bar
iii. Toolbar
iv. Database window
v. Object bar
vi. Database objects
vii. Status bar
MS Access
DATABASE
OBJECT
MS Access
MENU
BAR
TOOLBAR
DATABASE
WINDOW
STATUS BAR
Table components
 Information of database are stored in tables
 Database have more than one table
 Table displayed as rows and columns
 Records displayed as row
 Field displayed as column
 Table created using database wizard
 Primary key uniquely identifies each record
Key
 Field or combination of field
 Types of keys
1. Candidate Key
2. Composite key
3. Foreign key
4. Primary key
5. Secondary key
DBMS
 Database is collection related data
 DBMS – Database management system
 Software tool that allow user to create, access and
process data into useful information
 Tables – records and field
 Flat file database –single data table
 Relational database – set of tables with common
field existing in any two tables creating relationship
Purpose of Database
 Data Redundancy Reduces
 Sharing of Data is possible
 Security Feature
 Integrity is possible
 Easy storage
Data management task
 Fall into one of four general categories
1. Entering data into database
2. Housekeeping tasks – updating, deleting and
backing up the database
3. Sorting the data
4. Obtaining subsets of the data
Working with a database
 Creating database tables – three step
i. Name the field
ii. Specify the field type
iii. Specify the field size
 Entering data in table
 Viewing records
 Sorting records
 Querying database – SQL
 Generating reports
Advantage of DBMS
 Improved data sharing
 Improved data security
 Better data integration
 Minimized data inconsistency
 Improved data access
 Improved decision making
 Increased end user productivity
Disadvantage of DBMS
 Increased cost
 Management complexity
 Maintain currency
 Frequent upgrade
RDBMS
 Relational database management system
 Program used for creating, updating and administering a
relational database
 Relational database is organized collection of data
present as set of formally described tables
 Tables are connected using relationships formed by
primary key and foreign key
 Three type of relationship
1. One to one relationship
2. One to many relationship
3. Many to many relationship
Normalization
 Set of rules designed for ensuring organization of
database in best possible way
 Enables efficient processing of data and query
 Normalization is used for mainly two purpose,
1. Eliminating redundant(useless) data.
2. Ensuring data dependencies make sense i.e data is
logically stored.
Problem Without Normalization
S_id S_Name S_Address Subject_opted
401 Adam Noida Bio
402 Alex Panipat Maths
403 Stuart Jammu Maths
404 Adam Noida Physics
Updation Anamoly : To update address of a student who occurs twice or more
than twice in a table, we will have to update S_Address column in all the rows,
else data will become inconsistent.
Insertion Anamoly : Suppose for a new admission, we have a Student id(S_id),
name and address of a student but if student has not opted for any subjects yet
then we have to insert NULL there, leading to Insertion Anamoly.
Deletion Anamoly : If (S_id) 401 has only one subject and temporarily he drops
it, when we delete that row, entire student record will be deleted along with it.
Stages of normalization
 First normal form – has attributes which do not get
repeated
 Second normal form- there must not be any partial
dependency of any column on primary key
 Third normal form – all its attributes completely
depends on primary key
First Normal Form (1NF)
 As per First Normal Form, no two Rows of data must
contain repeating group of information i.e each set of
column must have a unique value, such that multiple
columns cannot be used to fetch the same row.
 Student Table :
Student Age Subject
Adam 15 Biology, Maths
Alex 14 Maths
Stuart 17 Maths
Contd…
 Student Table following 1NF will be :
Student Age Subject
Adam 15 Biology
Adam 15 Maths
Alex 14 Maths
Stuart 17 Maths
Second Normal Form (2NF)
 As per the Second Normal Form there must not be any partial
dependency of any column on primary key. It means that for a table
that has concatenated primary key, each column in the table that is not
part of the primary key must depend upon the entire concatenated key
for its existence. If any column depends only on one part of the
concatenated key, then the table fails Second normal form.
 In the previous example, Age of Student only depends on Student
column, which is incorrect as per Second Normal Form. To achieve
second normal form, it would be helpful to split out the subjects into an
independent table, and match them up using the student names as
foreign keys.
Contd . .
 New Student Table following 2NF will be :
Student Age
Adam 15
Alex 14
Stuart 17
Student Subject
Adam Biology
Adam Maths
Alex Maths
Stuart Maths
Third Normal Form (3NF)
 Third Normal form applies that every non-prime
attribute of table must be dependent on primary key,
or we can say that, there should not be the case that a
non-prime attribute is determined by another non-
prime attribute. So this transitive functional
dependency should be removed from the table and
also the table must be in Second Normal form.
 For example, consider a table with following fields.
 Student Detail Table :
 In this table Student_id is Primary key, but street, city and state depends upon Zip. The dependency
between zip and other fields is called transitive dependency. Hence to apply 3NF, we need to move
the street, city and state to new table, with Zip as primary key.
 New Student Detail Table :
 Address Table :
Student_id
Student_na
me
DOB Street city State Zip
Student_id Student_name DOB Zip
Zip Street city state
Sorting
 Three ways – alphabetical, numerical and date order
sorting
 Filter – provides the tool by which data is sorted as
per condition
 Filter can be applied to multiple columns
Indexing
 Indexing is a data structure technique to efficiently
retrieve records from the database files based on
some attributes on which indexing is done
 To set primary and foreign key
 To speed up the query
Report
 Reports are generated on a query or table
 Created with the help of report wizard
 Blank report can be generated with editable feature
 Printing of report is possible
Programming using software
 To manipulate the database tables
 SQL is considered the best – lets access and
manipulate database based on query
 SQL –Structured Query Language
SQL
 Used for interacting RDBMS
 Managing all tasks of DBMS which includes
1. Data definition
2. Data manipulation
3. Access control
4. Data sharing
Advantage of SQL
 Vendor portability
 Ease of use
 Language for all users
 Standardized
 Dynamic data definition
Forms of SQL
 Two forms
1. Interactive – operates on database to produce
output for user demand
2. Embedded – SQL commands written in some other
language- data is passed to program through SQL
Types of SQL command
 Five primary types
1. Data definition language (DDL)
2. Data manipulation language (DML)
3. Data query language (DQL)
4. Data control language (DCL)
5. Transactional control language (TCL)
DDL
 Allow user to create and restructure database
 Fundamental DDL commands are
i. CREATE
ii. ALTER
iii. DROP
CREATE COMMAND
 To create a database in RDBMS, create command is uses. Following is the
Syntax,
create database database-name;
Example : create database Test;
 create command is also used to create a table. We can specify names and
datatypes of various columns along.Following is the Syntax,
create table table-name { column-name1 datatype1, column-name2 datatype2,
column-name3 datatype3, column-name4 datatype4 };
Example :
create table Student(id int, name varchar, age int);
ALTER COMMAND
 Using alter command we can even add multiple columns to an existing
table. Following is the Syntax,
alter table table-name add(column-name1 datatype1, column-
name2 datatype2, column-name3 datatype3);
Here is an Example for this,
alter table Student add(father-name varchar(60), mother-name
varchar(60), dob date);
 alter command is used to modify data type of an existing column .
Following is the Syntax,
alter table table-name modify(column-name datatype);
Here is an Example for this,
alter table Student modify(address varchar(30));
Contd..
 Using alter command you can rename an existing
column. Following is the Syntax,
alter table table-name rename old-column-name to
column-name;
Here is an Example for this,
alter table Student rename address to Location;
 alter command is also used to drop columns also.
Following is the Syntax,
alter table table-name drop(column-name);
Here is an Example for this,
alter table Student drop(address);
DROP COMMAND
 drop query completely removes a table from
database. This command will also destroy the table
structure. Following is its Syntax,
drop table table-name
Here is an Example explaining it.
drop table Student;
DML
 Used to manipulate data within the objects od
relational database
 Three basic commands
i. INSERT
ii. UPDATE
iii. DELETE
INSERT COMMAND
 Insert command is used to insert data into a table.
Following is its general syntax,
INSERT into table-name values(data1,data2,..)
Example :
INSERT into Student values(101,'Adam',15);
Example to Insert NULL value to a column :
INSERT into Student values(102,'Alex',null);
UPDATE COMMAND
 Update command is used to update a row of a table.
Following is its general syntax,
UPDATE table-name set column-name = value
where condition;
example,
UPDATE Student set age=18 where s_id=102;
Example to Update multiple columns
UPDATE Student set s_name='Abhi',age=17 where
s_id=103;
DELETE COMMAND
 Delete command is used to delete data from a table.
Delete command can also be used with condition to
delete a particular row. Following is its general
syntax,
DELETE from table-name where condition;
Example
DELETE from Student where s_id=103;
DQL
 Used to compose queries against a relational
database
 Comprising only one command - SELECT
SELECT COMMAND
 Select query is used to retrieve data from a tables.
SELECT column-name1, column-name2, column-
name3, column-nameN from table-name;
 Where condition Syntax : SELECT column-name1,
column-name2, column-name3, column-nameN
from table-name WHERE [condition];
Example : SELECT s_id, s_name, age, address from
Student WHERE s_id=101;
 Example to Select all Records from Table
SELECT * from student;
LIKE Command
 Like clause is used as condition in SQL query. Like clause compares
data with an expression using wildcard operators.
 There are two wildcard operators that are used in like clause.
Percent sign % : represents zero, one or more than one character.
Underscore sign _ : represents only one character.
 SELECT * from Student where s_name like 'A%';
The above query will return all records where s_name starts with
character 'A'.
 SELECT * from Student where s_name like '_d%';
The above query will return all records from Student table where
s_name contain 'd' as second character.
Order By Clause
 Order by clause is used with Select statement for arranging
retrieved data in sorted order. The Order by clause by default sort
data in ascending order. To sort data in descending order DESC
keyword is used with Order by clause.
 Syntax of Order By
SELECT column-list|* from table-name order by asc|desc;
 Example using Order by
SELECT * from Emp order by salary;
The above query will return result in ascending order of the salary.
SELECT * from Emp order by salary DESC;
The above query will return result in descending order of the
salary.
HAVING Clause
 Having clause is used with SQL Queries to give more precise
condition for a statement. It is used to mention condition in
Group based SQL functions, just like WHERE clause.
Syntax for having will be,
select column_name, function(column_name) FROM
table_name WHERE column_name condition GROUP BY
column_name HAVING function(column_name) condition
 Suppose we want to find the customer whose
previous_balance sum is more than 3000.
We will use the below SQL query,
SELECT * from sale group customer having
sum(previous_balance) > 3000
DCL
 Allow user to control access to data within the
database
 Used to create objects related to user access and
control the distribution of privileges
 Two basic commands –
 GRANT - Gives user access privileges to database
Eg. grant create table to username;
(To Allow a User to create Table)
 REVOKE - Take back permissions from user.
TCL
 Used to manage database transaction
 Basic commands –
1. COMMIT - Commit command is used to permanently
save any transaction into database.
2. ROLLBACK - restores the database to last committed
state
3. SAVEPOINT - used to temporarily save a transaction so
that you can rollback to that point whenever necessary.
Application of computers in documentation
 Preparing and making reports
 Preparation of questionnaires
 Presentation
 Tables
 Charts
 Graphs
Sample Question
 Create a database with name library which have two tables
named bookdetail and userdetail?
 Bookdetail
 Userdetail
Bid Bname Author
B101 Progamming in C Balaguruswami
B102 COA Morismano
B103 MIS Preethi Sinha
Uid Uname Date
MB146 Murali 5/7/2015
Contd…
 Add column named ‘publishingYear’ to bookdetail table
and insert values to it.
 Display the new table bookdetail
 Rename the column name ‘publishingYear’ to ‘Year’ and
display the new bookdetail table
 Delete data of Bid = B103 from table bookdetail and
display the new table
 Insert new details in userdetail table with values
uid=m154, uname= mahesh and date=16/10/2016
 Display the table userdetail.
 Delete the table userdetail
MODULE IV
Data communication
 Electronic transfer of information between computer
 Communication take place over media like cables,
wireless link
 Communication through telephone system – plain
old telephone system (POTS)
 Two way transmission of electronic information
 Modem – modulator and demodulator required for
transmission
Modem
 Internal and external modem
 Broadband connection
 WiFi connection
 Uploading and downloading of files
Network
 Set of technologies used to connect computers
 Communicate, exchange information and share
resources in real time
 Access shared data and programs
 Network server
 Teleconference - multiway communication using
network
i. Video conferencing
ii. Audio conferencing
iii. Data conferencing
Need of network
 To share data at different locations of the
organization.
 To share information with other people on the
network.
 To make quick link with other persons using
network.
 To communicate in the form of mail messages and
chatting.
 To gain knowledge using internet.
Benefits of network
 File sharing
 Printer / peripheral sharing
 Internet connection sharing
 Multi player games via LAN
 Video sharing
Types of network
 LAN
 WAN
 Hybrid network
i. Campus area network
ii. Metropolitan area network
iii. Home area network
Communication through computer network
 Exchange of data between source and receiver
 Coding and encoding of data
 Start bit and stop bit – asynchronous
communication
 Two data transmission methods
1. Offline
2. Online
Components of data communication
 Data circuit terminating equipment
 Data terminal equipment
 Communication software
TRANSMITTER
TRANSMISSION
MEDIUM
RECEIVER
I/P
DATA
TRANSMITTED
SIGNAL RECEIVED
SIGNAL
OUTPUT
DATA
Synchronous vs Asynchronous communication
 Synchronous and asynchronous transmissions are two
different methods of transmission synchronization.
 Synchronous transmissions are synchronized by an
external clock,
 For example, in a computer, address information is
transmitted synchronously—the address bits over the
address bus, video conferencing etc.
 asynchronous communication is transmission of data,
generally without the use of an external clock signal,
where data can be transmitted intermittently rather than
in a steady stream
 Examples are file transfer, email and the World Wide
Web
Analog signal
 Form of electronic communication
 Information represented as continuous
electromagnetic waveform
 Transmission of signal such as sound or human
speech over an electrified copper wire
 Varies in terms of volume or power (amplitude) and
its pitch or tone(frequency)
 Audio and video data can be send
Digital signal
 Communication of information in binary form
through series of discrete pulse
 Combination of 1 and 0 – binary digit (bit)
 Digital signaling involves signal which varies in
voltage to represent one of two well defined state
 Serial and parallel transmission
Bandwidth and Frequency
 Frequency is the number of waves that pass a fixed place
in given amount of time
 If time taken to pass a place is ½ sec, then frequency is 2
per second
 Frequency is measured in hertz
 Bandwidth is the range of frequencies assigned to
channel
 It is difference between highest and lowest frequencies of
a band
 Higher the bandwidth more will be data transmission
rate
 Bandwidth is measured in bits per second
Network communication devices
 A communication device is a hardware device capable of transmitting an
analog or digital signal over the telephone, other communication wire, or
wirelessly.
 Types -
1. NIC Adapters: Communication mediums (cables) are attached to this
card to build network.
2. Routers: Router is intelligent device which routes data to destination
computers.
3. Repeater: It connects two segments of network cable
4. Hubs: networks on larger scale, hub(s) are required to build network.
5. Switches: Send the data to only requested address unlike hub which
broadcasts the data too all the ports.
6. Bridge: connect one LAN to another LAN
7. Gateways: Connects LAN with internet
8. Modem
Network Topologies
 The logical layout of the cable and devices that
connect the nodes of the network
 Data moves through the network in packets
 Packets are pieces of message broken down into
small units by sending PC and reassembled by
receiving PC
 Packets have two parts – header and payload
Types of topology
 Bus topology
 Star topology
 Ring topology
 Mesh topology
 Tree topology
 Hybrid topology
Bus Topology
 In this type, all the nodes of a network are connected to a
common transmission medium having two endpoints.
 The data that travels over the network is transmitted
through a common transmission medium known as the
bus or backbone of the network.
 When the transmission medium has exactly two
endpoints -linear bus topology.
 In case the transmission medium has more than two
endpoints - distributed bus topology.
Star Topology
 In this type of network topology, each node of the
network is connected to a central node, which is known
as a hub.
 The data that is transmitted between the network nodes
passes across the central hub.
 The hub acts as a signal repeater; i.e., it receives signals
and retransmits them such that they can travel longer
distances on the network.
 In an extended star, repeaters are introduced between
the hub and the network nodes. The repeaters are used to
increase the distance over which signals can travel.
Ring Topology
 In a ring topology, every node in the network is connected
to two other nodes and the first and last nodes are
connected to each other.
 The data transmitted over the network passes through
each of the nodes in the ring until it reaches the
destination node.
Mesh Topology
 In a mesh topology, all the network nodes are connected
to each other.
 The interconnections between nodes introduce
redundancy and also make it more reliable. In case a link
between two nodes breaks, any other link connecting
them can take over. A mesh network can be designed
using routing or flooding.
In routing, the nodes possess some kind of routing logic
so that the signals and data traveling over the network
take the shortest path during each transmission
Tree Topology
 It is also known as a hierarchical topology and has a
central root node that is connected to one or more nodes
of a lower hierarchy.
 In a symmetrical hierarchy, each node in the network has
a specific number of nodes connected to those at a lower
level.
 A tree topology can also be described as a combination of
star and bus topologies.
 The primary or root node is connected to one or more
secondary nodes, which are connected to tertiary nodes,
thus forming a hierarchical or tree structure.
Hybrid Topology
 Hybrid network topologies, which have a
combination of two or more basic network
structures.
 The main advantage of a hybrid network is that two
dissimilar topologies can be combined without
disturbing the existing architecture of a network.
 The use of hybrid technologies makes a network
easily expandable.
Topology
Distributed Bus topology
Structure of data communication network
 Bounded media or wired transmission – employs
physical media which are tangible
a) Twisted pair
b) Shielded copper pair
c) Coaxial cable
d) Optical fibre
e) Multimode fibre
f) Graded index multimode fibre
 Unbounded media- data transmitted using
electromagnetic waves
a) Radio
b) Microwave transmission
c) Satellite communication
Security
 Threats – anything that can be a burglar, virus,
earthquake or simple user error
 Identify theft- impersonates you by using your name,
social security number or other personal information
 Spying – secretly collecting information
 Web bugs - to monitor user behavior
 Spyware - software that aims to gather information about
a person or organization without their knowledge
 Spam - irrelevant or unsolicited messages sent over the
Internet
Contd..
 Virus - a piece of code which is capable of copying itself
and typically has a detrimental effect, such as corrupting
the system or destroying data
 Sniffing - attempt to find out confidential
information(like passwords) about someone.
 Phishing - the fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individuals to reveal personal information, such
as passwords
 Spoofing - intruder attempts to gain unauthorized access
to a user's system
 Security measures – Firewall and Antivirus
Firewall and Antivirus
 Firewall is a network security system that monitors and
controls the incoming and outgoing network traffic based
on predetermined security rules.
 Firewalls are often categorized as either network
firewalls or host-based firewalls.
 Network firewalls filter traffic between two or more
networks.
 Host-based firewalls provide a layer of software on one
host that controls network traffic in and out of that single
machine.
 Antivirus or anti-virus software sometimes known
as anti-malware software, is computer software used to
prevent, detect and remove malicious software
MODULE V
WWW and Business Community
 World wide wed- represents the networking of
internetworking resources and collection of internet
sites
 Started in 1989
 Web consisted of web pages that are linked
documents
 Web pages can be accessed across network
 Web pages addressed by URL
 Web browser fetch the web pages
WWW and Business community
 Online presence to global customers providing
security and stability about product and payment
mode – Digital web marketing
 E-Business
 E marketing
 Websites
 Search engine optimization
Application of WWW
 Main application areas where www is attracting
business are
i. In the field of publicity, marketing and advertising
ii. In the field of online selling
iii. In the field of research and development
iv. In the field of communication
v. In the field of business collaboration
Internet
 Network of networks that links computer systems
around the world
 Allows communication across networks
 Access to information from different websites,
location and machines
 ARPANET in 1950 led to establishment of internet
 Gained momentum in 1980s after ARPANET was
used by national science foundation
 ISP – internet service providers
Features of internet
 World wide web
 Direct communication
 Round the clock availability
 Central repository of data
 Search engines
 Advertisement
 E commerce
 Distance learning
 BBS(Bulletin board system) and new services
 Wide area network
 Shareware software
Intranet and Extranet
 Intranet is an application of internet to a closed
networking system or corporate network
 Extranet is a network which links some of the
intranets of a company with its partner, customer etc
E-Mail
 Electronic mail – enables to send your
correspondence instantaneously anywhere via
internet
 Send and receive messages anytime anywhere
without any cost
 Allows you to send and receive variety of file type
such as text, image, video, sound and graphics
 Multiple recipients using broadcasting
E-Mail
 Need to create email account using website
 Various sites that provide email facility – Gmail,
Yahoo, Hotmail etc
 Creating user id
 Changing password
 Composing and sending e-mail
Internet Protocols
 It enables the transfer of data over network/internet
in efficient manner
 To efficiently use network bandwidth and avoid
collisions
 Protocol defines a language that contain rules and
convention necessary for reliable communication
Types of protocol
 Transmission control protocol/Internet protocol
(TCP/IP)
 Hyper text transfer protocol (HTTP)
 File transfer protocol (FTP)
 Telnet
TCP
 Transmission Control Protocol (TCP) is one of the main
protocols of the Internet protocol suite.
 It originated in the initial network implementation in which it
complemented the Internet Protocol (IP).
 Therefore, the entire suite is commonly referred to as
TCP/IP.
 TCP/IP is the communication protocol for internet
 TCP provides reliable, ordered, and error-checked delivery of
a stream of octets(8BITS) between applications running on
hosts communicating by an IP network.
 Major Internet applications such as the World Wide Web,
email, remote administration and file transfer rely on TCP.
IP
 Internet protocol is the method or protocol by which
data is sent from one computer to another in
internet.
 Each computer on the internet has unique IP address
 A message gets divided into little chunks called
packets
 Each packet contains both sender and receiver
address
 Packet is sent to gateway computer that inturn send
it to respective destination.
Hyper text transfer protocol
 The Hypertext Transfer Protocol (HTTP) is an
application protocol for distributed, collaborative,
hypermedia information systems.
 HTTP is the foundation of data communication for the
World Wide Web.
 HTTP functions as a request–response protocol in the
client–server computing model. A web browser, for
example, may be the client and an application running on
a computer hosting a website may be the server.
 The client submits an HTTP request message to the
server. The server, which provides resources such as
HTML returns a response message to the client.
File transfer protocol
 FTP is a standard network protocol used to transfer
computer files between a client and server on a
computer network.
 FTP is built on a client-server model architecture
and uses separate control and data connections
between the client and the server.
Telnet
 Telnet is an application layer protocol used on the
Internet or local area networks to provide a
bidirectional interactive text-oriented
communication facility using a virtual terminal
connection.
 Telnet is a user command and an underlying TCP/IP
protocol for accessing remote computers.
 Through Telnet, an administrator or another user
can access someone else's computer remotely.
ERP
 Enterprise resource planning – It’s a system that
integrates the business and management process to
provide an organisation a structured environment in
which decisions relating to demand, supply,
operation, personal, finance etc are made
Objectives of ERP
 To provide support for adopting best business
practices in the organisation
 To implement these practices with a view towards
enhancing productivity
 To empower the customers and suppliers to modify
the implemented business processes to suit their
requirements.
Characteristics of ERP
 Flexibility – different languages, currencies, account
standards etc can be covered
 Modular and open – any module can be interfaced or
detached without effecting others
 Integrated- data of related business function is
automatically updated as soon as the time of
transaction occurs. Hence real time decision can be
made.
 Best business practices - Best business practices is
adopted by organisation through benchmarking
ERP Implementation
1. Defining the need for ERP
2. Engaging consultant for ERP implementation
3. Reengineering business processes
4. Identifying and evaluating ERP packages
5. Installing hardware and network
6. Implementation of ERP package
Benefits of ERP
 Optimum use of organizational resources
 Lower operating costs
 Proactive decision making
 Decentralized decision making
 Flexibility in business operation
 Enhanced customer satisfaction
Limitation of ERP
 Managers often need past along with current status
to identify trend but ERP provides current status
only
 It does not include external intelligence as it is not
integrated with other organisation
SAP
 Established in the year 1972
 World largest provider of business software
 Business solution for small, midsize and large scale
enterprises of all sectors and industries
 mySAP ERP is an ERP Software product developed
by SAP SE a German Multinational Software
company
 SAP is acronym for System, Applications and
Products
SAP Business Application
 mySAP ERP
 mySAP CRM
 mySAP Product life cycle management
 mySAP Supplier Relationship Management
 mySAP Supply Chain Management
SAP
 These applications update and process transactions
in real time mode
 SAP mainly categorized into logistics, financial and
human resources functional area
 SAP empowers people and organizations to work
together more efficiently and use business insight
more effectively to stay ahead of competition
 Reduce cost, improve performance and gain agility
to respond to changing business need.
mySAP ERP
 Improves operational excellence through –
1. Improved alignment of strategies and operation.
2. Increased productivity for greater efficiency and
bottom line growth
3. Strategic insight for more assured decision making
4. Adaptability to support changing industry
requirement
5. Better financial management and enhanced
corporate governance

More Related Content

What's hot

Computer on Business
Computer on BusinessComputer on Business
Computer on BusinessMac Mustera
 
Uses of Computers in Business
Uses of Computers in BusinessUses of Computers in Business
Uses of Computers in BusinessMargarita Sison
 
operating system
operating systemoperating system
operating systemKadianAman
 
office automation system
office automation systemoffice automation system
office automation systemVinayak Khade
 
A presentation on ms office
A presentation on ms officeA presentation on ms office
A presentation on ms officeVijayraj Daksh
 
computer applications
 computer applications computer applications
computer applications774474
 
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iwork
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iworkMs office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iwork
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iworkmrBanerjee
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and BusinessGanta Kishore Kumar
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Applications of computer
Applications of computerApplications of computer
Applications of computerGummadi Naveen
 
Ms office 2003
Ms office 2003Ms office 2003
Ms office 2003Hepsijeba
 
Introduction to Computer Applications
Introduction to Computer ApplicationsIntroduction to Computer Applications
Introduction to Computer ApplicationsNajma Alam
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 
Function of Operating system
Function of Operating systemFunction of Operating system
Function of Operating systemAmit Mehla
 
Classification of computer
Classification of computerClassification of computer
Classification of computerVicky Maliks
 

What's hot (20)

Types-of-computer-ppt
Types-of-computer-pptTypes-of-computer-ppt
Types-of-computer-ppt
 
Computer System Organization
Computer System OrganizationComputer System Organization
Computer System Organization
 
introduction to ms office –word,excel & powerpoint
introduction to ms office –word,excel & powerpointintroduction to ms office –word,excel & powerpoint
introduction to ms office –word,excel & powerpoint
 
Computer on Business
Computer on BusinessComputer on Business
Computer on Business
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
Uses of Computers in Business
Uses of Computers in BusinessUses of Computers in Business
Uses of Computers in Business
 
operating system
operating systemoperating system
operating system
 
office automation system
office automation systemoffice automation system
office automation system
 
A presentation on ms office
A presentation on ms officeA presentation on ms office
A presentation on ms office
 
computer applications
 computer applications computer applications
computer applications
 
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iwork
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iworkMs office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iwork
Ms office vs_google_docs_vs_office_365_vs_apache_openoffice_vs_iwork
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and Business
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Applications of computer
Applications of computerApplications of computer
Applications of computer
 
MS OFFICE PPT
MS OFFICE PPTMS OFFICE PPT
MS OFFICE PPT
 
Ms office 2003
Ms office 2003Ms office 2003
Ms office 2003
 
Introduction to Computer Applications
Introduction to Computer ApplicationsIntroduction to Computer Applications
Introduction to Computer Applications
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Function of Operating system
Function of Operating systemFunction of Operating system
Function of Operating system
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 

Similar to Computer application in business

Similar to Computer application in business (20)

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
1 01 Computer Components
1 01 Computer Components1 01 Computer Components
1 01 Computer Components
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdf1. Programming in C - Introduction.pdf
1. Programming in C - Introduction.pdf
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Basic IT
Basic ITBasic IT
Basic IT
 
DHANPAL COMPUTER PPT.pptx
DHANPAL COMPUTER PPT.pptxDHANPAL COMPUTER PPT.pptx
DHANPAL COMPUTER PPT.pptx
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Computer Sytem.pptx
Computer Sytem.pptxComputer Sytem.pptx
Computer Sytem.pptx
 
Essential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxEssential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptx
 
BasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
BasicComputer Training in Ambala ! BATRA COMPUTER CENTREBasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
BasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
 
Computer
ComputerComputer
Computer
 
Computer software form 4
Computer software form 4Computer software form 4
Computer software form 4
 
Infotech
InfotechInfotech
Infotech
 
Performing computer operation PCO.pptx
Performing computer operation PCO.pptxPerforming computer operation PCO.pptx
Performing computer operation PCO.pptx
 
Note book pc
Note book pcNote book pc
Note book pc
 
Itc chapter # 3
Itc   chapter # 3Itc   chapter # 3
Itc chapter # 3
 
Ntroduction to computer architecture and organization
Ntroduction to computer architecture and organizationNtroduction to computer architecture and organization
Ntroduction to computer architecture and organization
 
C with lab
C with labC with lab
C with lab
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Computer application in business

  • 1. Computer Application In BusinessPREPARED BY MONCY KURIAKOSE Assistant Professor, Girideepam Business School
  • 2. References  June Jamrich Parsons, Computer Concepts, Thomas Learning, New Delhi.  Leon & Leon, Introduction to Computer, Vikas publishing house, New Delhi.  Comer, Computer networks and Internet, Pearson Education, New Delhi.  White, Data Communication & Computers Network, Thomson Learning, New Delhi.
  • 4. Introduction to Computers Fast electronic calculating machine Accept digitized input information Process it Produces output information
  • 5. Positive impact of Computers  Reducing the cost of operation  Improving revenues  Improving customer satisfaction  Improve the standard of living
  • 6. Negative impacts  Systems security problem  Theft of information  Computer errors
  • 7. Computer Applications  Commerce  Industry  Administration  Science & Technology  Transportation  Education  Professionals  Individuals
  • 8. Characteristics of Computer  Speed  Storage  Accuracy  Diligence  Versatility  Automation  Consistency  No feelings  Reliability  Communication
  • 9. Limitations of Computer  Programmed by human being  Cannot think and work independently  Cannot take decisions  Maintained and updated by user  No feelings and ethics  Cannot work with out power
  • 10. History of Computers  Various stages of evolution 1. The Mechanical Era (1623-1945) 2. First Generation Computers (1946-1959) 3. Second Generation Computers (1959-1965) 4. Third Generation Computers (1965-1971) 5. Fourth Generation Computers (1971-1980) 6. Fifth Generation Computers (1980-Till date)
  • 11. Mechanical Era Abacus –Chinese mathematical calculators Analytical engine – Charles Babbage (1834) Punched cards - 1890
  • 12. First Generation Computers Vaccum Tubes No operating system ENIAC – 1946 EDVAC - 1949
  • 13. Second Generation Computers Transistors No operating system CDC 1604 IBM 7094
  • 14. Third Generation Computers IC Operating system included IBM 360 Series TDC 316
  • 15. Fourth Generation Computers VLSI Chip Improved operating system STAR 1000 CRAY-1
  • 16. Fifth Generation Computers ULSI Technology Artificial Intelligence AMD ATHLON 64 INTEL PENTIUM
  • 17. Type of Computer  On the basis of operating principle  On the basis of application  On the basis of capacity or size
  • 18. Basis of operating principle  Digital Computers  Analog Computers  Hybrid Computers
  • 19. Basis of application  General purpose computer  Special purpose computer
  • 20. Basis of capacity  Micro / Personal Computer  Mini Computer  Mainframe Computer  Super Computer
  • 21. Computer Architecture Control unit ALU MAIN MEMORY SECONDARY MEMORY OUTPUTINPUT CPU
  • 22. Input Unit  Accept data or instruction  Convert it into computer acceptable form  Supplies converted instructions to computer system for further processing
  • 23. CPU Data processed as per instructions given through programmer CPU comprises of : 1. ALU 2. Control unit 3. Primary memory
  • 24. ALU  Arithmetic logic unit  Execution of instruction take place  Calculation and decision are made
  • 25. Control unit  Directs all operations  Nerve center of computer  Controls and coordinate all hardware operation
  • 26. Primary memory Storing data and instruction during processing RAM
  • 27. Secondary memory Saving data permanently for future use Hard disk CD/DVD Floppy Disk
  • 28. Output Unit  Supplies information and results to user  Monitor
  • 30. PROCESSOR  ALU and Control unit  Brain of the computer  Microprocessor is plugged into motherboard  Intel Pentium and AMD processor  Intel I7 dual or quad core processor  AMD Athlon 64X2 and FX8
  • 31. Primary Memory  Fast memory used to store data during computer operation  Types of main memory : 1. RAM 2. ROM 3. PROM 4. EPROM
  • 32.
  • 33. Secondary Memory  Comparatively slow memory for bulk and permanent storage  Non volatile  Types are : 1. Hard disk 2. Floppy disk 3. CD 4. DVD
  • 35. Input Devices Keyboard Mouse Joystick Scanner Light pen Optical mark recognition (OMR) Optical character recognition (OCR) Magnetic ink character recognition (MICR) Optical bar code reader Web camera Microphone
  • 36. Output Devices  Monitor I. Cathode ray tube (CRT) II. Liquid crystal display (LCD)  Printer  Impact printer a) Dot matrix printer b) Daisy wheel printer c) Line printer  Non impact printer a) Inkjet printer b) Laser printer • Plotters a) Flatbed plotters b) Drum plotters
  • 38. Software Instructions or programs given to the computer to perform desired task Acts as interface b/w user and computer Classified into two : 1. System software 2. Application software
  • 39.
  • 40. System software  Consist of computer programs that manage and support computer system and its processing  Interface between hardware & application programs  Three basic types : a) Operating system b) Network operating system c) Utility
  • 41. Application software  Contains programs employed by users to perform specific tasks  Classified into two: 1. User application programs 2. Application packages
  • 43. Operating System  Series of programs which control, coordinate & supervise the activities of various components of computer  provide link between hardware and user programs
  • 44. GUI  Graphical user interface  Incorporation of pictorial representation  System interact with user with the help of pictures
  • 45. Types of OS 1. Single user operating system 2. Batch operating system 3. Real time operating system 4. Multiprogramming operating system
  • 46. Component of OS 1. Input/output management 2. Command interpreter 3. Data management 4. Program development tools 5. Time sharing 6. Security 7. Communication 8. Accounting
  • 47. Functions of OS 1) Memory management 2) Processor management 3) Device management 4) File management
  • 48. Important operating system  CP/M ( Control program for microcomputer)  MS-DOS  Windows NT for powerful workstations and network servers  Microsoft Windows 1. Windows 95 2. Windows 98 3. Windows 2000 professional 4. Windows XP 5. Windows Vista 6. Windows 7 7. Windows 8 8. Windows 10  UNIX  LINUX
  • 49. LINUX  Freeware operating system  32 bit multitasking OS  Runs in any computer and support almost all application  Most popular – Red Hat and Novell
  • 50. Introduction to Embedded Software  Specialized for particular hardware  Time and memory constraints  Build in electronics of cars, telephone, robots etc  Fixed hardware and capabilities
  • 52. MS OFFICE  Set of carefully integrated tools designed to work together  Developed by Microsoft  MS Office family of products are 1. MS Word 2. MS Excel 3. MS PowerPoint 4. MS Outlook 5. MS Access
  • 53. Advantage of MS Office  Universal software  Complete software suite  Most businesses have a use for it  Ease of use  Online support from Microsoft  Online tutorials  Cloud integration  Tablet friendly  Editable ease  Adding videos to document
  • 54. Word Processing Programs  Tools for creating all kind of text based document  Enable you to add images to documents  Design documents that look like professional print  Can create long documents with separate chapters  Embed sounds, videos and animation  Microsoft Word (MS Word) is the most popular
  • 55. Word processors interface  Main editing window displays a document and several tools  Tools includes : i. Menu bar ii. Tool bar iii. Rulers iv. Scroll bars v. Status bar
  • 57. Working with word document  To create new document , choose File – New or use shortcut ctrl + N  To save document, choose File – Save as or use shortcut ctrl + S  Customization of settings for margin, paper size and layout is done through page setup option  Document, paragraph, text and character formatting  Tables and images can be inserted
  • 58. Mail Merging  Set of documents sent to many customer  Two steps 1. Set up the main document 2. Connect the document to a data source
  • 59. Types of mail merge  Letters  Email  Envelopes  Labels  Directory
  • 60. Spreadsheet programs  Software tool for entering, calculating, manipulating and analyzing set of numbers  Wide range of users  Traditional row and column format  Slick report format  Microsoft Excel (MS Excel) most commonly used
  • 61. Spreadsheet interface  Work in document called worksheet  Workbook is collection of related worksheet  Tools includes a) Menu bar b) Toolbar c) Scroll bar d) Status bar e) Formula bar  Intersection of any raw and column is called cell
  • 63. Working with spreadsheet  New spreadsheet, select File-New or use shortcut Ctrl + N  Worksheet cells can hold – labels, values, dates and formulas  Arithmetic and logical calculation  Cells can be formatted – font style & size  Charts, video, audio and images can be added
  • 64. Advanced features of MS Excel  Types of operators 1. Arithmetic operators 2. Comparison operators 3. Text concatenation operators 4. Reference operators
  • 65. Arithmetic operators Arithmetic operator Meaning Example + (plus sign) Addition 3+3 - (minus sign) Subtraction 3 - 2 * (asterisk) Multiplication 3*3 / (forward slash) Division 4/2 % (percent sign) Percent 20% ^ ( caret) Exponentiation 3^2
  • 66. Comparison operators Comparison operator Meaning Example = Equal to A1=B1 > Greater than A1>B1 < Less than A1<B1 >= Greater than or equal to A1>=B1 <= Less than or equal to A1<=B1 <> Not equal to A1 <> B1
  • 67. Text concatenation operators Text operator Meaning Example & (ampersand) Connects or concatenates two values to produce one continuous text value North & Wind
  • 68. Reference operators Reference operator Meaning Example : (Colon) Range operator, which produces one reference to all the cells between two reference including the two references. B5 : B15 , (Comma) Union operator, which combines multiple reference into one reference. SUM(B5:B15 , D5 : D15)
  • 69. Referencing  Particular cell is referred to in formula – cell referencing  Referencing in three types 1. Relative referencing 2. Absolute referencing 3. Mixed referencing
  • 70. Relative Referencing  Cells referred to by their position on the basis of their position relative to the cell containing the formula  Example, D2= B2 + C2 then D3 = B3 + C3 D4 = B4 + C4
  • 71. Absolute Referencing  Referencing in which references do not change when formula is copied to a different cell  $ (Dollar) sign is used for specifying fixed position.  Example, C2 = A2 + $B$2 then C3 = A3 + $B$2 C4 = A4 + $B$2
  • 72. Mixed Referencing  Combination of both relative and absolute referencing  $ sign before row number or column letter makes it mixed cell address  In such address one part of the cell is relative and other is absolute  Example, B3 = A3 * D$1 then B4 = A4 * E$1 B5 = A5 * F$1
  • 73. STATISTICAL FUNCTIONS Function Description AVEDEV Returns the average of the absolute deviations of data points from their mean AVERAGE Returns average of its arguments CORREL Returns the correlation coefficient between two data sets COUNT Counts how many numbers are in the list of arguments COVAR Returns covariance FORECAST Returns a value along a linear trend FREQUENCY Returns a frequency distribution as a vertical array MEDIAN Returns the median of the given numbers MIN Returns the minimum value in a list of arguments SMALL Returns the smallest value in a data set STANDARDIZE Returns a normalized value STDEV Estimates standard deviation based on a sample
  • 74. Mathematical Functions Function Description AVERAGE Returns the average of the arguments CEILING Rounds a number to the nearest integer EVEN Rounds a number up to the nearest even integer EXP Returns e raised to the power of a given number FACT Returns the factorial of a number LOG Returns the logarithm of a number POWER Returns the result of a number raised to a power PRODUCT Multiplies its arguments SQRT Returns a positive square root SUM Adds its arguments MAX Returns the largest value in a set of values MIN Returns the smallest number in a set of values
  • 75. Examples FUNCTION SYNTAX EXAMPLE SUM SUM(NUM1,NUM2…) SUM(3,2), SUM(D4:D6) AVERAGE AVERAGE(NUM1,NUM2 …) AVERAGE(D4:D8) MAX MAX(NUM1,NUM2…) MAX(A2:A8) MIN MIN(NUM1,NUM2….) MIN(D2:D8) IF IF(TEST, if_true, if_false) IF(C3>85, “GOOD”, “OK”) AND AND(LOGICAL1, LOGICAL2,….) AND(A2>1, A2<100) OR OR(LOGICAL1, LOGICAL2…) OR(A2>100, A2<50)
  • 76. Presentation Programs  To create and edit presentation to support discussion  Allows user to design slides  Series of slides displayed in order is called presentation  Microsoft PowerPoint is most commonly used
  • 77. Advantages Of Presentation  Creates presentation and slides  Graphical objects images, charts etc can be included  Various sound effects can be added  Create handouts, notes and outlines  Slide show can be presented non stop
  • 78. Presentation program interface  Tools are a) Menu bar b) Toolbar c) Document area d) Slide e) Drawing tools f) Status bar
  • 80. Working with presentation  Four main views a) Normal view b) Slide sorter view c) Slide show view d) Notes page view
  • 81. Creating presentation  Choose layout of slide  Choose themes for the slide  Add text, chart, graph and image  Applying speaker notes  Applying hyperlink  Visual movements during slide change can be added  Animation can added – movement text, image etc
  • 83. Microsoft Access  Powerful program to create and manage database on computer  Many built in features  Assists in constructing and viewing information
  • 84. Access interface  The main screen elements are : i. Title bar ii. Menu bar iii. Toolbar iv. Database window v. Object bar vi. Database objects vii. Status bar
  • 87. Table components  Information of database are stored in tables  Database have more than one table  Table displayed as rows and columns  Records displayed as row  Field displayed as column  Table created using database wizard  Primary key uniquely identifies each record
  • 88. Key  Field or combination of field  Types of keys 1. Candidate Key 2. Composite key 3. Foreign key 4. Primary key 5. Secondary key
  • 89. DBMS  Database is collection related data  DBMS – Database management system  Software tool that allow user to create, access and process data into useful information  Tables – records and field  Flat file database –single data table  Relational database – set of tables with common field existing in any two tables creating relationship
  • 90. Purpose of Database  Data Redundancy Reduces  Sharing of Data is possible  Security Feature  Integrity is possible  Easy storage
  • 91. Data management task  Fall into one of four general categories 1. Entering data into database 2. Housekeeping tasks – updating, deleting and backing up the database 3. Sorting the data 4. Obtaining subsets of the data
  • 92. Working with a database  Creating database tables – three step i. Name the field ii. Specify the field type iii. Specify the field size  Entering data in table  Viewing records  Sorting records  Querying database – SQL  Generating reports
  • 93. Advantage of DBMS  Improved data sharing  Improved data security  Better data integration  Minimized data inconsistency  Improved data access  Improved decision making  Increased end user productivity
  • 94. Disadvantage of DBMS  Increased cost  Management complexity  Maintain currency  Frequent upgrade
  • 95. RDBMS  Relational database management system  Program used for creating, updating and administering a relational database  Relational database is organized collection of data present as set of formally described tables  Tables are connected using relationships formed by primary key and foreign key  Three type of relationship 1. One to one relationship 2. One to many relationship 3. Many to many relationship
  • 96. Normalization  Set of rules designed for ensuring organization of database in best possible way  Enables efficient processing of data and query  Normalization is used for mainly two purpose, 1. Eliminating redundant(useless) data. 2. Ensuring data dependencies make sense i.e data is logically stored.
  • 97. Problem Without Normalization S_id S_Name S_Address Subject_opted 401 Adam Noida Bio 402 Alex Panipat Maths 403 Stuart Jammu Maths 404 Adam Noida Physics Updation Anamoly : To update address of a student who occurs twice or more than twice in a table, we will have to update S_Address column in all the rows, else data will become inconsistent. Insertion Anamoly : Suppose for a new admission, we have a Student id(S_id), name and address of a student but if student has not opted for any subjects yet then we have to insert NULL there, leading to Insertion Anamoly. Deletion Anamoly : If (S_id) 401 has only one subject and temporarily he drops it, when we delete that row, entire student record will be deleted along with it.
  • 98. Stages of normalization  First normal form – has attributes which do not get repeated  Second normal form- there must not be any partial dependency of any column on primary key  Third normal form – all its attributes completely depends on primary key
  • 99. First Normal Form (1NF)  As per First Normal Form, no two Rows of data must contain repeating group of information i.e each set of column must have a unique value, such that multiple columns cannot be used to fetch the same row.  Student Table : Student Age Subject Adam 15 Biology, Maths Alex 14 Maths Stuart 17 Maths
  • 100. Contd…  Student Table following 1NF will be : Student Age Subject Adam 15 Biology Adam 15 Maths Alex 14 Maths Stuart 17 Maths
  • 101. Second Normal Form (2NF)  As per the Second Normal Form there must not be any partial dependency of any column on primary key. It means that for a table that has concatenated primary key, each column in the table that is not part of the primary key must depend upon the entire concatenated key for its existence. If any column depends only on one part of the concatenated key, then the table fails Second normal form.  In the previous example, Age of Student only depends on Student column, which is incorrect as per Second Normal Form. To achieve second normal form, it would be helpful to split out the subjects into an independent table, and match them up using the student names as foreign keys.
  • 102. Contd . .  New Student Table following 2NF will be : Student Age Adam 15 Alex 14 Stuart 17 Student Subject Adam Biology Adam Maths Alex Maths Stuart Maths
  • 103. Third Normal Form (3NF)  Third Normal form applies that every non-prime attribute of table must be dependent on primary key, or we can say that, there should not be the case that a non-prime attribute is determined by another non- prime attribute. So this transitive functional dependency should be removed from the table and also the table must be in Second Normal form.
  • 104.  For example, consider a table with following fields.  Student Detail Table :  In this table Student_id is Primary key, but street, city and state depends upon Zip. The dependency between zip and other fields is called transitive dependency. Hence to apply 3NF, we need to move the street, city and state to new table, with Zip as primary key.  New Student Detail Table :  Address Table : Student_id Student_na me DOB Street city State Zip Student_id Student_name DOB Zip Zip Street city state
  • 105. Sorting  Three ways – alphabetical, numerical and date order sorting  Filter – provides the tool by which data is sorted as per condition  Filter can be applied to multiple columns
  • 106. Indexing  Indexing is a data structure technique to efficiently retrieve records from the database files based on some attributes on which indexing is done  To set primary and foreign key  To speed up the query
  • 107. Report  Reports are generated on a query or table  Created with the help of report wizard  Blank report can be generated with editable feature  Printing of report is possible
  • 108. Programming using software  To manipulate the database tables  SQL is considered the best – lets access and manipulate database based on query  SQL –Structured Query Language
  • 109. SQL  Used for interacting RDBMS  Managing all tasks of DBMS which includes 1. Data definition 2. Data manipulation 3. Access control 4. Data sharing
  • 110. Advantage of SQL  Vendor portability  Ease of use  Language for all users  Standardized  Dynamic data definition
  • 111. Forms of SQL  Two forms 1. Interactive – operates on database to produce output for user demand 2. Embedded – SQL commands written in some other language- data is passed to program through SQL
  • 112. Types of SQL command  Five primary types 1. Data definition language (DDL) 2. Data manipulation language (DML) 3. Data query language (DQL) 4. Data control language (DCL) 5. Transactional control language (TCL)
  • 113. DDL  Allow user to create and restructure database  Fundamental DDL commands are i. CREATE ii. ALTER iii. DROP
  • 114. CREATE COMMAND  To create a database in RDBMS, create command is uses. Following is the Syntax, create database database-name; Example : create database Test;  create command is also used to create a table. We can specify names and datatypes of various columns along.Following is the Syntax, create table table-name { column-name1 datatype1, column-name2 datatype2, column-name3 datatype3, column-name4 datatype4 }; Example : create table Student(id int, name varchar, age int);
  • 115. ALTER COMMAND  Using alter command we can even add multiple columns to an existing table. Following is the Syntax, alter table table-name add(column-name1 datatype1, column- name2 datatype2, column-name3 datatype3); Here is an Example for this, alter table Student add(father-name varchar(60), mother-name varchar(60), dob date);  alter command is used to modify data type of an existing column . Following is the Syntax, alter table table-name modify(column-name datatype); Here is an Example for this, alter table Student modify(address varchar(30));
  • 116. Contd..  Using alter command you can rename an existing column. Following is the Syntax, alter table table-name rename old-column-name to column-name; Here is an Example for this, alter table Student rename address to Location;  alter command is also used to drop columns also. Following is the Syntax, alter table table-name drop(column-name); Here is an Example for this, alter table Student drop(address);
  • 117. DROP COMMAND  drop query completely removes a table from database. This command will also destroy the table structure. Following is its Syntax, drop table table-name Here is an Example explaining it. drop table Student;
  • 118. DML  Used to manipulate data within the objects od relational database  Three basic commands i. INSERT ii. UPDATE iii. DELETE
  • 119. INSERT COMMAND  Insert command is used to insert data into a table. Following is its general syntax, INSERT into table-name values(data1,data2,..) Example : INSERT into Student values(101,'Adam',15); Example to Insert NULL value to a column : INSERT into Student values(102,'Alex',null);
  • 120. UPDATE COMMAND  Update command is used to update a row of a table. Following is its general syntax, UPDATE table-name set column-name = value where condition; example, UPDATE Student set age=18 where s_id=102; Example to Update multiple columns UPDATE Student set s_name='Abhi',age=17 where s_id=103;
  • 121. DELETE COMMAND  Delete command is used to delete data from a table. Delete command can also be used with condition to delete a particular row. Following is its general syntax, DELETE from table-name where condition; Example DELETE from Student where s_id=103;
  • 122. DQL  Used to compose queries against a relational database  Comprising only one command - SELECT
  • 123. SELECT COMMAND  Select query is used to retrieve data from a tables. SELECT column-name1, column-name2, column- name3, column-nameN from table-name;  Where condition Syntax : SELECT column-name1, column-name2, column-name3, column-nameN from table-name WHERE [condition]; Example : SELECT s_id, s_name, age, address from Student WHERE s_id=101;  Example to Select all Records from Table SELECT * from student;
  • 124. LIKE Command  Like clause is used as condition in SQL query. Like clause compares data with an expression using wildcard operators.  There are two wildcard operators that are used in like clause. Percent sign % : represents zero, one or more than one character. Underscore sign _ : represents only one character.  SELECT * from Student where s_name like 'A%'; The above query will return all records where s_name starts with character 'A'.  SELECT * from Student where s_name like '_d%'; The above query will return all records from Student table where s_name contain 'd' as second character.
  • 125. Order By Clause  Order by clause is used with Select statement for arranging retrieved data in sorted order. The Order by clause by default sort data in ascending order. To sort data in descending order DESC keyword is used with Order by clause.  Syntax of Order By SELECT column-list|* from table-name order by asc|desc;  Example using Order by SELECT * from Emp order by salary; The above query will return result in ascending order of the salary. SELECT * from Emp order by salary DESC; The above query will return result in descending order of the salary.
  • 126. HAVING Clause  Having clause is used with SQL Queries to give more precise condition for a statement. It is used to mention condition in Group based SQL functions, just like WHERE clause. Syntax for having will be, select column_name, function(column_name) FROM table_name WHERE column_name condition GROUP BY column_name HAVING function(column_name) condition  Suppose we want to find the customer whose previous_balance sum is more than 3000. We will use the below SQL query, SELECT * from sale group customer having sum(previous_balance) > 3000
  • 127. DCL  Allow user to control access to data within the database  Used to create objects related to user access and control the distribution of privileges  Two basic commands –  GRANT - Gives user access privileges to database Eg. grant create table to username; (To Allow a User to create Table)  REVOKE - Take back permissions from user.
  • 128. TCL  Used to manage database transaction  Basic commands – 1. COMMIT - Commit command is used to permanently save any transaction into database. 2. ROLLBACK - restores the database to last committed state 3. SAVEPOINT - used to temporarily save a transaction so that you can rollback to that point whenever necessary.
  • 129. Application of computers in documentation  Preparing and making reports  Preparation of questionnaires  Presentation  Tables  Charts  Graphs
  • 130. Sample Question  Create a database with name library which have two tables named bookdetail and userdetail?  Bookdetail  Userdetail Bid Bname Author B101 Progamming in C Balaguruswami B102 COA Morismano B103 MIS Preethi Sinha Uid Uname Date MB146 Murali 5/7/2015
  • 131. Contd…  Add column named ‘publishingYear’ to bookdetail table and insert values to it.  Display the new table bookdetail  Rename the column name ‘publishingYear’ to ‘Year’ and display the new bookdetail table  Delete data of Bid = B103 from table bookdetail and display the new table  Insert new details in userdetail table with values uid=m154, uname= mahesh and date=16/10/2016  Display the table userdetail.  Delete the table userdetail
  • 133. Data communication  Electronic transfer of information between computer  Communication take place over media like cables, wireless link  Communication through telephone system – plain old telephone system (POTS)  Two way transmission of electronic information  Modem – modulator and demodulator required for transmission
  • 134. Modem  Internal and external modem  Broadband connection  WiFi connection  Uploading and downloading of files
  • 135. Network  Set of technologies used to connect computers  Communicate, exchange information and share resources in real time  Access shared data and programs  Network server  Teleconference - multiway communication using network i. Video conferencing ii. Audio conferencing iii. Data conferencing
  • 136. Need of network  To share data at different locations of the organization.  To share information with other people on the network.  To make quick link with other persons using network.  To communicate in the form of mail messages and chatting.  To gain knowledge using internet.
  • 137. Benefits of network  File sharing  Printer / peripheral sharing  Internet connection sharing  Multi player games via LAN  Video sharing
  • 138. Types of network  LAN  WAN  Hybrid network i. Campus area network ii. Metropolitan area network iii. Home area network
  • 139. Communication through computer network  Exchange of data between source and receiver  Coding and encoding of data  Start bit and stop bit – asynchronous communication  Two data transmission methods 1. Offline 2. Online
  • 140. Components of data communication  Data circuit terminating equipment  Data terminal equipment  Communication software TRANSMITTER TRANSMISSION MEDIUM RECEIVER I/P DATA TRANSMITTED SIGNAL RECEIVED SIGNAL OUTPUT DATA
  • 141. Synchronous vs Asynchronous communication  Synchronous and asynchronous transmissions are two different methods of transmission synchronization.  Synchronous transmissions are synchronized by an external clock,  For example, in a computer, address information is transmitted synchronously—the address bits over the address bus, video conferencing etc.  asynchronous communication is transmission of data, generally without the use of an external clock signal, where data can be transmitted intermittently rather than in a steady stream  Examples are file transfer, email and the World Wide Web
  • 142. Analog signal  Form of electronic communication  Information represented as continuous electromagnetic waveform  Transmission of signal such as sound or human speech over an electrified copper wire  Varies in terms of volume or power (amplitude) and its pitch or tone(frequency)  Audio and video data can be send
  • 143. Digital signal  Communication of information in binary form through series of discrete pulse  Combination of 1 and 0 – binary digit (bit)  Digital signaling involves signal which varies in voltage to represent one of two well defined state  Serial and parallel transmission
  • 144. Bandwidth and Frequency  Frequency is the number of waves that pass a fixed place in given amount of time  If time taken to pass a place is ½ sec, then frequency is 2 per second  Frequency is measured in hertz  Bandwidth is the range of frequencies assigned to channel  It is difference between highest and lowest frequencies of a band  Higher the bandwidth more will be data transmission rate  Bandwidth is measured in bits per second
  • 145. Network communication devices  A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.  Types - 1. NIC Adapters: Communication mediums (cables) are attached to this card to build network. 2. Routers: Router is intelligent device which routes data to destination computers. 3. Repeater: It connects two segments of network cable 4. Hubs: networks on larger scale, hub(s) are required to build network. 5. Switches: Send the data to only requested address unlike hub which broadcasts the data too all the ports. 6. Bridge: connect one LAN to another LAN 7. Gateways: Connects LAN with internet 8. Modem
  • 146. Network Topologies  The logical layout of the cable and devices that connect the nodes of the network  Data moves through the network in packets  Packets are pieces of message broken down into small units by sending PC and reassembled by receiving PC  Packets have two parts – header and payload
  • 147. Types of topology  Bus topology  Star topology  Ring topology  Mesh topology  Tree topology  Hybrid topology
  • 148. Bus Topology  In this type, all the nodes of a network are connected to a common transmission medium having two endpoints.  The data that travels over the network is transmitted through a common transmission medium known as the bus or backbone of the network.  When the transmission medium has exactly two endpoints -linear bus topology.  In case the transmission medium has more than two endpoints - distributed bus topology.
  • 149. Star Topology  In this type of network topology, each node of the network is connected to a central node, which is known as a hub.  The data that is transmitted between the network nodes passes across the central hub.  The hub acts as a signal repeater; i.e., it receives signals and retransmits them such that they can travel longer distances on the network.  In an extended star, repeaters are introduced between the hub and the network nodes. The repeaters are used to increase the distance over which signals can travel.
  • 150. Ring Topology  In a ring topology, every node in the network is connected to two other nodes and the first and last nodes are connected to each other.  The data transmitted over the network passes through each of the nodes in the ring until it reaches the destination node.
  • 151. Mesh Topology  In a mesh topology, all the network nodes are connected to each other.  The interconnections between nodes introduce redundancy and also make it more reliable. In case a link between two nodes breaks, any other link connecting them can take over. A mesh network can be designed using routing or flooding. In routing, the nodes possess some kind of routing logic so that the signals and data traveling over the network take the shortest path during each transmission
  • 152. Tree Topology  It is also known as a hierarchical topology and has a central root node that is connected to one or more nodes of a lower hierarchy.  In a symmetrical hierarchy, each node in the network has a specific number of nodes connected to those at a lower level.  A tree topology can also be described as a combination of star and bus topologies.  The primary or root node is connected to one or more secondary nodes, which are connected to tertiary nodes, thus forming a hierarchical or tree structure.
  • 153. Hybrid Topology  Hybrid network topologies, which have a combination of two or more basic network structures.  The main advantage of a hybrid network is that two dissimilar topologies can be combined without disturbing the existing architecture of a network.  The use of hybrid technologies makes a network easily expandable.
  • 156. Structure of data communication network  Bounded media or wired transmission – employs physical media which are tangible a) Twisted pair b) Shielded copper pair c) Coaxial cable d) Optical fibre e) Multimode fibre f) Graded index multimode fibre  Unbounded media- data transmitted using electromagnetic waves a) Radio b) Microwave transmission c) Satellite communication
  • 157. Security  Threats – anything that can be a burglar, virus, earthquake or simple user error  Identify theft- impersonates you by using your name, social security number or other personal information  Spying – secretly collecting information  Web bugs - to monitor user behavior  Spyware - software that aims to gather information about a person or organization without their knowledge  Spam - irrelevant or unsolicited messages sent over the Internet
  • 158. Contd..  Virus - a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data  Sniffing - attempt to find out confidential information(like passwords) about someone.  Phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords  Spoofing - intruder attempts to gain unauthorized access to a user's system  Security measures – Firewall and Antivirus
  • 159. Firewall and Antivirus  Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.  Firewalls are often categorized as either network firewalls or host-based firewalls.  Network firewalls filter traffic between two or more networks.  Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine.  Antivirus or anti-virus software sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software
  • 161. WWW and Business Community  World wide wed- represents the networking of internetworking resources and collection of internet sites  Started in 1989  Web consisted of web pages that are linked documents  Web pages can be accessed across network  Web pages addressed by URL  Web browser fetch the web pages
  • 162. WWW and Business community  Online presence to global customers providing security and stability about product and payment mode – Digital web marketing  E-Business  E marketing  Websites  Search engine optimization
  • 163. Application of WWW  Main application areas where www is attracting business are i. In the field of publicity, marketing and advertising ii. In the field of online selling iii. In the field of research and development iv. In the field of communication v. In the field of business collaboration
  • 164. Internet  Network of networks that links computer systems around the world  Allows communication across networks  Access to information from different websites, location and machines  ARPANET in 1950 led to establishment of internet  Gained momentum in 1980s after ARPANET was used by national science foundation  ISP – internet service providers
  • 165. Features of internet  World wide web  Direct communication  Round the clock availability  Central repository of data  Search engines  Advertisement  E commerce  Distance learning  BBS(Bulletin board system) and new services  Wide area network  Shareware software
  • 166. Intranet and Extranet  Intranet is an application of internet to a closed networking system or corporate network  Extranet is a network which links some of the intranets of a company with its partner, customer etc
  • 167. E-Mail  Electronic mail – enables to send your correspondence instantaneously anywhere via internet  Send and receive messages anytime anywhere without any cost  Allows you to send and receive variety of file type such as text, image, video, sound and graphics  Multiple recipients using broadcasting
  • 168. E-Mail  Need to create email account using website  Various sites that provide email facility – Gmail, Yahoo, Hotmail etc  Creating user id  Changing password  Composing and sending e-mail
  • 169. Internet Protocols  It enables the transfer of data over network/internet in efficient manner  To efficiently use network bandwidth and avoid collisions  Protocol defines a language that contain rules and convention necessary for reliable communication
  • 170. Types of protocol  Transmission control protocol/Internet protocol (TCP/IP)  Hyper text transfer protocol (HTTP)  File transfer protocol (FTP)  Telnet
  • 171. TCP  Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.  It originated in the initial network implementation in which it complemented the Internet Protocol (IP).  Therefore, the entire suite is commonly referred to as TCP/IP.  TCP/IP is the communication protocol for internet  TCP provides reliable, ordered, and error-checked delivery of a stream of octets(8BITS) between applications running on hosts communicating by an IP network.  Major Internet applications such as the World Wide Web, email, remote administration and file transfer rely on TCP.
  • 172. IP  Internet protocol is the method or protocol by which data is sent from one computer to another in internet.  Each computer on the internet has unique IP address  A message gets divided into little chunks called packets  Each packet contains both sender and receiver address  Packet is sent to gateway computer that inturn send it to respective destination.
  • 173. Hyper text transfer protocol  The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.  HTTP is the foundation of data communication for the World Wide Web.  HTTP functions as a request–response protocol in the client–server computing model. A web browser, for example, may be the client and an application running on a computer hosting a website may be the server.  The client submits an HTTP request message to the server. The server, which provides resources such as HTML returns a response message to the client.
  • 174. File transfer protocol  FTP is a standard network protocol used to transfer computer files between a client and server on a computer network.  FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.
  • 175. Telnet  Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.  Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers.  Through Telnet, an administrator or another user can access someone else's computer remotely.
  • 176. ERP  Enterprise resource planning – It’s a system that integrates the business and management process to provide an organisation a structured environment in which decisions relating to demand, supply, operation, personal, finance etc are made
  • 177. Objectives of ERP  To provide support for adopting best business practices in the organisation  To implement these practices with a view towards enhancing productivity  To empower the customers and suppliers to modify the implemented business processes to suit their requirements.
  • 178. Characteristics of ERP  Flexibility – different languages, currencies, account standards etc can be covered  Modular and open – any module can be interfaced or detached without effecting others  Integrated- data of related business function is automatically updated as soon as the time of transaction occurs. Hence real time decision can be made.  Best business practices - Best business practices is adopted by organisation through benchmarking
  • 179. ERP Implementation 1. Defining the need for ERP 2. Engaging consultant for ERP implementation 3. Reengineering business processes 4. Identifying and evaluating ERP packages 5. Installing hardware and network 6. Implementation of ERP package
  • 180. Benefits of ERP  Optimum use of organizational resources  Lower operating costs  Proactive decision making  Decentralized decision making  Flexibility in business operation  Enhanced customer satisfaction
  • 181. Limitation of ERP  Managers often need past along with current status to identify trend but ERP provides current status only  It does not include external intelligence as it is not integrated with other organisation
  • 182. SAP  Established in the year 1972  World largest provider of business software  Business solution for small, midsize and large scale enterprises of all sectors and industries  mySAP ERP is an ERP Software product developed by SAP SE a German Multinational Software company  SAP is acronym for System, Applications and Products
  • 183. SAP Business Application  mySAP ERP  mySAP CRM  mySAP Product life cycle management  mySAP Supplier Relationship Management  mySAP Supply Chain Management
  • 184. SAP  These applications update and process transactions in real time mode  SAP mainly categorized into logistics, financial and human resources functional area  SAP empowers people and organizations to work together more efficiently and use business insight more effectively to stay ahead of competition  Reduce cost, improve performance and gain agility to respond to changing business need.
  • 185. mySAP ERP  Improves operational excellence through – 1. Improved alignment of strategies and operation. 2. Increased productivity for greater efficiency and bottom line growth 3. Strategic insight for more assured decision making 4. Adaptability to support changing industry requirement 5. Better financial management and enhanced corporate governance