The document provides an overview of IT concepts for managers, including the history and generations of computers from vacuum tubes to modern devices with artificial intelligence. It discusses software and operating systems such as Windows, Linux, and Mac OS. The lecture also covers computer hardware components like the CPU, memory units, and input/output devices. Managers are introduced to fundamental IT topics to help them understand modern computing and technology.
The document discusses different types of computer languages. It explains that there are low-level languages like machine language and assembly language that correspond directly to machine code, as well as high-level languages that are more independent of hardware. Machine language uses binary and is directly understood by computers, while assembly language uses alphanumeric codes. High-level languages resemble English and simplify programming but require translation.
The document discusses operating systems (OS). It explains that an OS controls hardware, converts user inputs to machine language for processing, and converts outputs back to a high-level language for the user. It also manages tasks like process scheduling. The document then discusses specific OS like Windows and Linux, covering their features, functions, and common distributions.
CSE 370 - Introduction to Operating SystemsDev Khare
The document provides an overview of operating systems, including:
1) Their purpose is to provide an efficient and convenient environment for executing user programs while abstracting hardware details and sharing resources.
2) They have evolved from dedicated single-user systems in the 1940s to modern networked and mobile systems, driven by hardware advances.
3) Key concepts include processes, system calls, and services like CPU scheduling, memory management, and file systems.
This document provides an introduction to computers, programming languages, and the history of the internet and world wide web. It discusses the basic components of a computer and how they work together. It describes the different types of programming languages from machine language to high-level languages like C. It outlines the history and purposes of various programming languages including Fortran, COBOL, Pascal, Ada, and C. It also summarizes the history of the internet and world wide web and how they have changed communication globally.
System software is a type of software that operates basic computer functions and provides a platform for running other application software. There are different types of system software including operating systems, device drivers, and programming software. The most important system software is the operating system, which acts as an interface between users and hardware and manages other programs. Major operating systems include Windows, Macintosh, and Linux. Windows 7 was developed by Microsoft as an improved version of earlier Windows operating systems with enhanced features, speed, and resource usage. As technology has evolved, operating systems and devices have shifted from desktop computers to mobile devices like smartphones and tablets.
Computer software, or just software, is a set of data or computer instructions that tell a computer how to work. In computing and software engineering , computer software is all the information processed by computer systems , programs and data . Computer software includes computer programs , libraries, and related non-executable data , such as digital media . Computer hardware and software are closely connected, and cannot be used alone.
This document discusses types of software, operating systems, and programming languages. It describes system software as managing computer resources, while application software is for specific business uses. It examines operating systems, their functions, and examples like Windows, Linux, and Mac OS. It also summarizes the evolution of programming languages from machine to assembly to modern high-level languages and fourth generation languages.
The document discusses different types of computer languages. It explains that there are low-level languages like machine language and assembly language that correspond directly to machine code, as well as high-level languages that are more independent of hardware. Machine language uses binary and is directly understood by computers, while assembly language uses alphanumeric codes. High-level languages resemble English and simplify programming but require translation.
The document discusses operating systems (OS). It explains that an OS controls hardware, converts user inputs to machine language for processing, and converts outputs back to a high-level language for the user. It also manages tasks like process scheduling. The document then discusses specific OS like Windows and Linux, covering their features, functions, and common distributions.
CSE 370 - Introduction to Operating SystemsDev Khare
The document provides an overview of operating systems, including:
1) Their purpose is to provide an efficient and convenient environment for executing user programs while abstracting hardware details and sharing resources.
2) They have evolved from dedicated single-user systems in the 1940s to modern networked and mobile systems, driven by hardware advances.
3) Key concepts include processes, system calls, and services like CPU scheduling, memory management, and file systems.
This document provides an introduction to computers, programming languages, and the history of the internet and world wide web. It discusses the basic components of a computer and how they work together. It describes the different types of programming languages from machine language to high-level languages like C. It outlines the history and purposes of various programming languages including Fortran, COBOL, Pascal, Ada, and C. It also summarizes the history of the internet and world wide web and how they have changed communication globally.
System software is a type of software that operates basic computer functions and provides a platform for running other application software. There are different types of system software including operating systems, device drivers, and programming software. The most important system software is the operating system, which acts as an interface between users and hardware and manages other programs. Major operating systems include Windows, Macintosh, and Linux. Windows 7 was developed by Microsoft as an improved version of earlier Windows operating systems with enhanced features, speed, and resource usage. As technology has evolved, operating systems and devices have shifted from desktop computers to mobile devices like smartphones and tablets.
Computer software, or just software, is a set of data or computer instructions that tell a computer how to work. In computing and software engineering , computer software is all the information processed by computer systems , programs and data . Computer software includes computer programs , libraries, and related non-executable data , such as digital media . Computer hardware and software are closely connected, and cannot be used alone.
This document discusses types of software, operating systems, and programming languages. It describes system software as managing computer resources, while application software is for specific business uses. It examines operating systems, their functions, and examples like Windows, Linux, and Mac OS. It also summarizes the evolution of programming languages from machine to assembly to modern high-level languages and fourth generation languages.
The document provides information on computer software, types of software including system software and application software, programming languages including object-oriented, structured, and procedural languages, and assemblers, compilers, and interpreters. It also discusses operating systems, types of operating systems including batch processing, multi-tasking, real-time, single user, multi-user, and distributed operating systems. Finally, it covers database management systems including components, data definition language, data manipulation language, and data control language.
The document discusses software and its different types. It defines software as the logical component of a computer that provides instructions. There are two main types: system software and application software. System software includes operating systems, utilities, and programming languages. It controls the fundamental operations of the computer and allows communication between hardware and software. Application software is used to perform specific tasks like word processing. Popular examples provided are Windows, Linux, and programming languages like COBOL and BASIC.
The filing system manages files and storage devices to prevent simultaneous access and ensure resources are allocated efficiently. The operating system allows multiple programs and users to run concurrently through techniques like multi-programming and multi-access. Processing can occur interactively, in batches, or with background jobs alongside foreground tasks.
System software includes operating systems, utility programs, and programming tools that manage computer hardware resources and provide platforms for application software. Application software are programs designed to perform tasks that directly help users, such as word processors, games, web browsers, and business software. There are many types of programming languages, each designed for different types of tasks, from low-level machine code to high-level languages that are easier for humans to read and write.
Computer languages can be categorized into high-level languages, low-level languages, and machine language. High-level languages are easier for humans to read and write but require compilers or interpreters, while low-level languages like assembly language are closer to machine language but still use symbolic instructions. Machine language uses only binary and is directly executable by computers. Languages have evolved through five generations from low-level machine and assembly languages to modern high-level languages.
Software programs include operating systems, utilities, and applications. Operating systems manage computer resources and allow multiple programs to run simultaneously. Popular operating systems include Windows, Mac OS, and Linux. Application software performs specific tasks for users like word processing, games, or data management. Programming languages have evolved from machine language to modern languages like Java and C++. Object-oriented programming organizes programming concepts around objects and classes. Emerging trends include more interactive software, client/server models, and integrated enterprise applications.
The document discusses various types of computer input devices including keyboards, mice, touch screens, scanners, cameras, and biometric devices. It describes how each device works and provides examples of their common uses. Input devices allow users to enter data, instructions, and commands into computers through typing, pointing, speaking, scanning, and other methods. The document aims to provide an overview of the different input technologies available.
Computer software can be categorized into two main types: system software and application software. System software includes operating systems like Windows and Linux, as well as BIOS and programs that allow computers to run applications. Application software performs specific tasks for users, such as web browsers like Chrome and Safari, media players, and office productivity tools. Computer software provides instructions that allow computers to function and enables users to perform tasks.
The document provides an overview of operating systems and application software. It discusses how the operating system manages hardware resources and allows multiple programs to run concurrently. It also describes common types of application software like word processors, spreadsheets, databases, and web browsers. The document explains that while companies typically use commercially available software, customized software may be developed internally using programming languages to gain a competitive advantage.
Computer languages can be categorized as either low-level or high-level. Low-level languages like machine language and assembly language provide little abstraction from computer hardware and use numeric codes that are directly understandable by computers. High-level languages allow problems to be solved using terminology more familiar to humans and are easier for programmers to use. Examples include C, C++, Java, and JavaScript. Operating systems act as an interface between application software, hardware, and users, performing functions like memory management, task scheduling, and file handling.
This document provides information about different types of computers and their components. It discusses personal computers, mainframes, supercomputers, and other categories. It also summarizes the main parts of a computer including the CPU, memory, motherboard, keyboard, mouse, monitor, and software. The document describes input and output devices, system and application software, and how to start and close applications.
The document discusses computer programming and utilization. It introduces computers and their evolution over the past 50-60 years. It then describes the basic hardware components of a computer system and defines a computer. The document outlines the advantages of computers such as speed, accuracy, storage, reliability and automation. It also discusses limitations, types of software including system and application software. It describes compilers, interpreters and types of programming languages. Finally, it discusses problem decomposition, algorithms and flowcharts as problem solving methods.
This document provides an overview of information technology concepts across five units:
Unit I introduces computers, including the development of generations from vacuum tubes to integrated circuits. A computer is defined as an electronic device that processes data under a stored program.
Unit II covers operating systems, their functions and types, including commands, graphical user interfaces, and security issues like viruses and cryptography.
Unit III discusses word processing software, including menus, creating and editing documents, and mail merge.
Unit IV covers spreadsheets, including creating and formatting worksheets, formulas, functions, and data analysis tools.
Unit V reviews presentation software, including creating and formatting slides, templates, and multimedia elements like objects and charts.
This document provides an overview of computers and programming languages. It discusses the goals of programming and components of computers like hardware, software, CPU, memory and I/O devices. It also describes different types of programming languages from machine language to assembly language to high-level languages like Java. The document explains how a Java program is compiled into bytecode and run on a Java Virtual Machine. It discusses common errors in programming like syntax errors, runtime errors and logic errors.
This document provides an overview of computer software, including its definition, history, types, and categories. Computer software is any set of instructions that direct a computer's processor to perform tasks. It is intangible and stored in computer memory. There are two main types: system software, which runs computer systems and networks, and application software, which allows users to perform specific tasks. Application software categories include browsers, antivirus software, media players, photo editors, and more. The first software was developed in the 19th century but did not truly exist until the 1940s with stored-program computers. Programming was initially done through punching holes in cards and flipping switches, though languages have since become much more advanced and user-friendly
Operating systems have evolved through four generations from the 1940s to present. Early systems in the 1940s had no operating systems, while systems in the 1950s introduced batch processing with punch cards. In the 1960s, multiprogramming and time-sharing were developed to better utilize resources. Personal computers and workstations emerged in the 1980s with operating systems like MS-DOS, Mac OS, and Windows facilitating use by non-technical users. Modern operating systems provide interfaces, process management, system resource management, security, and file management. Popular operating systems today include Mac OS X, Ubuntu, Linux, Android, and Fedora.
This document summarizes AP Shareef's lecture on IT for managers. It discusses different types of software including system software like operating systems. It describes operating systems like Windows, Linux, Mac OS and MS-DOS. It also discusses general purpose software, application software, databases and management information systems. The key topics covered include functions of operating systems, versions of Windows OS, types of databases and how management information systems process transaction data.
The document discusses the history of computers from the zeroth generation to the fourth generation. It describes the key characteristics of each generation including the hardware technologies used and developments in operating systems and software. It also covers topics like computer classifications, processors, notebooks, booting processes, graphical user interfaces, basic computer organization, CPU operations, and input/output devices.
First generation computers used machine language and could only solve one problem at a time. Input was via punched cards and paper tape, and output was printed. Examples included the UNIVAC and ENIAC. Second generation computers introduced symbolic languages like assembly languages and early versions of COBOL and FORTRAN. Storage moved from drums to magnetic cores. Third generation computers saw the introduction of operating systems to provide a software platform for applications. Fourth generation computers featured graphical user interfaces with icons, windows, menus, pointers and desktop workspaces to make programs easier to use. Fifth generation computers involve artificial intelligence techniques like expert systems, neural networks and robotics.
The document discusses operating systems, providing a brief history and overview of key concepts. It describes how operating systems manage computer resources and enable application programs to function. Early computers did not have operating systems, while modern operating systems evolved in complexity throughout the 1960s. The document outlines several major operating systems including UNIX, Windows, Mac OS X, Linux, Android, and iOS, and notes how operating systems will continue to rapidly evolve in the future.
Evolution of OS (Operating System)/CS.pptxcetaw81672
This document summarizes the evolution of operating systems from the first to fourth generations. The first generation from 1940-1950 involved manually loading programs to control computers without an operating system. The second generation from 1955-1965 introduced batch processing systems like GMOS. The third generation from 1965-1980 developed multiprogramming operating systems to serve multiple users simultaneously. The fourth generation from 1980 to present saw the rise of personal computers and graphical user interfaces, popular operating systems including Windows, Mac OS, and Linux. The history of operating systems over the past 50+ years has largely been determined by advances in hardware and the need to process increasing amounts of data more efficiently.
The document provides information on computer software, types of software including system software and application software, programming languages including object-oriented, structured, and procedural languages, and assemblers, compilers, and interpreters. It also discusses operating systems, types of operating systems including batch processing, multi-tasking, real-time, single user, multi-user, and distributed operating systems. Finally, it covers database management systems including components, data definition language, data manipulation language, and data control language.
The document discusses software and its different types. It defines software as the logical component of a computer that provides instructions. There are two main types: system software and application software. System software includes operating systems, utilities, and programming languages. It controls the fundamental operations of the computer and allows communication between hardware and software. Application software is used to perform specific tasks like word processing. Popular examples provided are Windows, Linux, and programming languages like COBOL and BASIC.
The filing system manages files and storage devices to prevent simultaneous access and ensure resources are allocated efficiently. The operating system allows multiple programs and users to run concurrently through techniques like multi-programming and multi-access. Processing can occur interactively, in batches, or with background jobs alongside foreground tasks.
System software includes operating systems, utility programs, and programming tools that manage computer hardware resources and provide platforms for application software. Application software are programs designed to perform tasks that directly help users, such as word processors, games, web browsers, and business software. There are many types of programming languages, each designed for different types of tasks, from low-level machine code to high-level languages that are easier for humans to read and write.
Computer languages can be categorized into high-level languages, low-level languages, and machine language. High-level languages are easier for humans to read and write but require compilers or interpreters, while low-level languages like assembly language are closer to machine language but still use symbolic instructions. Machine language uses only binary and is directly executable by computers. Languages have evolved through five generations from low-level machine and assembly languages to modern high-level languages.
Software programs include operating systems, utilities, and applications. Operating systems manage computer resources and allow multiple programs to run simultaneously. Popular operating systems include Windows, Mac OS, and Linux. Application software performs specific tasks for users like word processing, games, or data management. Programming languages have evolved from machine language to modern languages like Java and C++. Object-oriented programming organizes programming concepts around objects and classes. Emerging trends include more interactive software, client/server models, and integrated enterprise applications.
The document discusses various types of computer input devices including keyboards, mice, touch screens, scanners, cameras, and biometric devices. It describes how each device works and provides examples of their common uses. Input devices allow users to enter data, instructions, and commands into computers through typing, pointing, speaking, scanning, and other methods. The document aims to provide an overview of the different input technologies available.
Computer software can be categorized into two main types: system software and application software. System software includes operating systems like Windows and Linux, as well as BIOS and programs that allow computers to run applications. Application software performs specific tasks for users, such as web browsers like Chrome and Safari, media players, and office productivity tools. Computer software provides instructions that allow computers to function and enables users to perform tasks.
The document provides an overview of operating systems and application software. It discusses how the operating system manages hardware resources and allows multiple programs to run concurrently. It also describes common types of application software like word processors, spreadsheets, databases, and web browsers. The document explains that while companies typically use commercially available software, customized software may be developed internally using programming languages to gain a competitive advantage.
Computer languages can be categorized as either low-level or high-level. Low-level languages like machine language and assembly language provide little abstraction from computer hardware and use numeric codes that are directly understandable by computers. High-level languages allow problems to be solved using terminology more familiar to humans and are easier for programmers to use. Examples include C, C++, Java, and JavaScript. Operating systems act as an interface between application software, hardware, and users, performing functions like memory management, task scheduling, and file handling.
This document provides information about different types of computers and their components. It discusses personal computers, mainframes, supercomputers, and other categories. It also summarizes the main parts of a computer including the CPU, memory, motherboard, keyboard, mouse, monitor, and software. The document describes input and output devices, system and application software, and how to start and close applications.
The document discusses computer programming and utilization. It introduces computers and their evolution over the past 50-60 years. It then describes the basic hardware components of a computer system and defines a computer. The document outlines the advantages of computers such as speed, accuracy, storage, reliability and automation. It also discusses limitations, types of software including system and application software. It describes compilers, interpreters and types of programming languages. Finally, it discusses problem decomposition, algorithms and flowcharts as problem solving methods.
This document provides an overview of information technology concepts across five units:
Unit I introduces computers, including the development of generations from vacuum tubes to integrated circuits. A computer is defined as an electronic device that processes data under a stored program.
Unit II covers operating systems, their functions and types, including commands, graphical user interfaces, and security issues like viruses and cryptography.
Unit III discusses word processing software, including menus, creating and editing documents, and mail merge.
Unit IV covers spreadsheets, including creating and formatting worksheets, formulas, functions, and data analysis tools.
Unit V reviews presentation software, including creating and formatting slides, templates, and multimedia elements like objects and charts.
This document provides an overview of computers and programming languages. It discusses the goals of programming and components of computers like hardware, software, CPU, memory and I/O devices. It also describes different types of programming languages from machine language to assembly language to high-level languages like Java. The document explains how a Java program is compiled into bytecode and run on a Java Virtual Machine. It discusses common errors in programming like syntax errors, runtime errors and logic errors.
This document provides an overview of computer software, including its definition, history, types, and categories. Computer software is any set of instructions that direct a computer's processor to perform tasks. It is intangible and stored in computer memory. There are two main types: system software, which runs computer systems and networks, and application software, which allows users to perform specific tasks. Application software categories include browsers, antivirus software, media players, photo editors, and more. The first software was developed in the 19th century but did not truly exist until the 1940s with stored-program computers. Programming was initially done through punching holes in cards and flipping switches, though languages have since become much more advanced and user-friendly
Operating systems have evolved through four generations from the 1940s to present. Early systems in the 1940s had no operating systems, while systems in the 1950s introduced batch processing with punch cards. In the 1960s, multiprogramming and time-sharing were developed to better utilize resources. Personal computers and workstations emerged in the 1980s with operating systems like MS-DOS, Mac OS, and Windows facilitating use by non-technical users. Modern operating systems provide interfaces, process management, system resource management, security, and file management. Popular operating systems today include Mac OS X, Ubuntu, Linux, Android, and Fedora.
This document summarizes AP Shareef's lecture on IT for managers. It discusses different types of software including system software like operating systems. It describes operating systems like Windows, Linux, Mac OS and MS-DOS. It also discusses general purpose software, application software, databases and management information systems. The key topics covered include functions of operating systems, versions of Windows OS, types of databases and how management information systems process transaction data.
The document discusses the history of computers from the zeroth generation to the fourth generation. It describes the key characteristics of each generation including the hardware technologies used and developments in operating systems and software. It also covers topics like computer classifications, processors, notebooks, booting processes, graphical user interfaces, basic computer organization, CPU operations, and input/output devices.
First generation computers used machine language and could only solve one problem at a time. Input was via punched cards and paper tape, and output was printed. Examples included the UNIVAC and ENIAC. Second generation computers introduced symbolic languages like assembly languages and early versions of COBOL and FORTRAN. Storage moved from drums to magnetic cores. Third generation computers saw the introduction of operating systems to provide a software platform for applications. Fourth generation computers featured graphical user interfaces with icons, windows, menus, pointers and desktop workspaces to make programs easier to use. Fifth generation computers involve artificial intelligence techniques like expert systems, neural networks and robotics.
The document discusses operating systems, providing a brief history and overview of key concepts. It describes how operating systems manage computer resources and enable application programs to function. Early computers did not have operating systems, while modern operating systems evolved in complexity throughout the 1960s. The document outlines several major operating systems including UNIX, Windows, Mac OS X, Linux, Android, and iOS, and notes how operating systems will continue to rapidly evolve in the future.
Evolution of OS (Operating System)/CS.pptxcetaw81672
This document summarizes the evolution of operating systems from the first to fourth generations. The first generation from 1940-1950 involved manually loading programs to control computers without an operating system. The second generation from 1955-1965 introduced batch processing systems like GMOS. The third generation from 1965-1980 developed multiprogramming operating systems to serve multiple users simultaneously. The fourth generation from 1980 to present saw the rise of personal computers and graphical user interfaces, popular operating systems including Windows, Mac OS, and Linux. The history of operating systems over the past 50+ years has largely been determined by advances in hardware and the need to process increasing amounts of data more efficiently.
Microsoft Windows operating systems have significantly impacted human behavior in several ways. Windows applications like Microsoft Word have made documentation more efficient, saving time for office workers and allowing for the management of large document collections. Excel has also impacted industries by facilitating calculations and scientific data processing. More recently, applications like OneNote have changed notetaking behaviors, making it easier for students and professionals to take and organize notes digitally rather than printing notes. Overall, Windows operating systems have streamlined many workplace and educational tasks through integrated applications.
An operating system provides an environment for program execution and services to programs and users. It manages computer memory, processes, software and hardware. Without an operating system, a computer is useless. Common operating systems include Linux, Windows, Mac OS X, and Solaris. Operating systems are also classified as single-user or multi-user and by whether they support mobile devices, multi-threading or multiprocessing. Key software for operating systems includes kernels and system programs. Examples of operating systems include Mac OS 9, Android OS, Debian Linux and Windows 7.
The document discusses the basics of computer systems and components. It can be summarized as follows:
Computer systems consist of hardware and software. The hardware includes input/output devices, a central processing unit, primary storage, and auxiliary storage. Software is divided into system software, which manages computer resources, and application software, which helps users solve problems. Common computer languages have evolved from machine languages to today's high-level languages, making programming easier for users.
Unit - 1 provides an overview of the basic components that comprise a computer system including input devices, output devices, the system unit, and storage devices. It also summarizes the different generations of computers from first to fifth generation based on the underlying technology used from vacuum tubes to microchips. Finally, it briefly describes different types of computers such as personal computers, workstations, minicomputers, and supercomputers based on their size and capabilities.
This document summarizes the evolution of operating systems over 5 phases:
Phase 0 (1940-1955) had no operating systems and programs were manually loaded via card decks. Phase 1 (1955-1970) introduced batch processing with batch monitors. Phase 2 (1970-1980) enabled timesharing with systems like CTSS allowing multiple interactive users. Phase 3 (1980-1990) saw the rise of personal computers running single-user operating systems like MS-DOS. Phase 4 (1990-2000) focused on networking and client-server models. Phase 5 (2000-present) includes modern mobile and GUI-based operating systems on computers and phones.
An operating system is software that manages computer hardware resources and provides common services for computer programs. It acts as an interface between users, applications, and the computer. Major types of operating systems include those for mainframes, mini-computers, home computers, and modern systems. Early mainframe operating systems were diverse and specific to hardware, but IBM standardized with the System/360. Notable operating systems included UNIX, Digital Equipment's TOPS, and early versions for PCs like CP/M.
The document provides an overview of operating systems, describing their basic functions such as managing computer resources and providing a user interface. It discusses the evolution of operating systems from mainframes to personal computers and mini-computers. Different types of operating systems are used for various applications like game consoles, home computers, and virtualization platforms.
OPERATING SYSTUM class 9 Information.pptxrajdeepcs10
The document discusses operating systems, including their definition, functions, and types. An operating system manages a computer's memory, processes, hardware and software. It coordinates these components to work efficiently and provides a user interface. Operating systems come in desktop, mobile, and server varieties. Popular desktop operating systems include Windows, macOS, and Linux. Windows is known for its user-friendly interface and applications. macOS was developed by Apple and has a sleek design. Linux is open-source, customizable, stable, and secure. The document concludes that operating systems allow users to interact with devices and run applications, making computers functional.
This document provides lecture notes on programming for problem solving. It introduces key concepts related to computer systems including hardware components, memory types, software categories, programming languages, algorithms, flowcharts, and the C programming language. The document covers computer basics, different computing environments, the evolution of programming languages from machine to high-level, and the steps to create and run a computer program from writing code to execution.
A computer processes raw data by taking it in, storing it, manipulating it, and outputting the results. An operating system manages computer resources and ensures different programs do not interfere. A compiler translates human-readable source code into machine-readable object code. Applications are programs designed for end users like word processors or games. Programming languages have evolved from low-level machine code to high-level languages that more closely resemble human languages.
Application software: helps users solve particular problems
In most cases, application software resides on the computer’s hard disk
Application software can also be stored on CDs, DVDs, and flash or key chain storage devices
The document discusses computer systems and their components. It defines a computer system as having objects like users, hardware, and software. It describes the main hardware components as input, processing, and output devices. The CPU contains the ALU for arithmetic/logical operations and CU for control. Memory is classified as primary (RAM, ROM) and secondary (magnetic disks, optical disks). The document also discusses system software like the operating system, and application software for general and specific uses. Finally, it covers different computing environments and the evolution of computer languages from machine to assembly to high-level languages.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
1. IT FOR MANAGERSAP Shareef MBA,M.Phil,NET,M.Com
Asst. Professor & Head, Dept. Of Management
Studies
Markaz Law College, Markaz Knowledge City
2. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer and generations
Software and Hardware
Algorithm and Flow Charts
Binary and Decimal systems
Introduction to computersUnit
I
3. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.1What is a computer ?
Google Dictionary defines computer as “An
electronic device which is capable of receiving
information (data) in a particular form and of
performing a sequence of operations in
accordance with a predetermined but variable
set of procedural instructions (program) to
produce a result in the form of information or
signals”
4. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.2Generation/Evolution of
computers
The history of the computer goes back several
decades however and there are five notable
generations of computers.
Each generation is characterized by an
important technological development that
changes fundamentally how computers work–
leading to more compact, less expensive, but
more powerful, efficient and robust machines.
5. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1940 – 1956: First Generation – Vacuum
Tubes
The first generation computers used vacuum
tubes as circuitry and magnetic drums for
memory. As a result they were big, and
occupied an entire room. These were
inefficient materials which consumed huge
electricity and subsequently generated a lot of
heat which caused for continuous
breakdowns.
Important characteristics or this generation
are….
6. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
They relied on ‘machine language’.
They were limited to solving one problem at a
time.
Input was based on punched cards and paper
tape. Output came out on print-outs.
The two notable machines of this era were the
UNIVAC and ENIAC machines – the UNIVAC
is the first every commercial computer which
was purchased in 1951 by a business -the US
Census Bureau.
8. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1956 – 1963: Second Generation –
Transistors
Although first invented in 1947, transistors weren’t
used significantly in computers until the end of the
1950s.
They were superior to the vacuum tubes because
they made computers smaller, faster, cheaper and
less heavy on electricity use.
The language evolved from cryptic binary
language to symbolic (‘assembly’) languages.
This meant programmers could create instructions
in words. About the same time high level
programming languages were being developed
(early versions of COBOL and FORTRAN).
9. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1964 – 1971: Third Generation – Integrated
Circuits
By this phase, transistors were now being
miniaturised and installed on silicon chips
(called semiconductors). This led to a massive
increase in speed and efficiency of these
machines. These were the first computers
where users interacted using keyboards and
monitors which interfaced with an operating
system.
As a result of these advances which again
made machines cheaper and smaller, a new
mass market for computer users emerged
during the ‘60s.
10. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1972 – 2010: Fourth Generation –
Microprocessors
Intel Corporation is the more related word with
fourth generation. Intel developed the Intel
4004 chip in 1971, which assembled all
computer components (CPU, memory,
input/output controls) on a single chip. What
filled a room in the 1940s now fit in the palm of
the hand.
Another major advance during this period have
been the Graphical user interface (GUI), the
mouse and more recently the advances in lap-
top capability and hand-held devices.
11. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2010- : Fifth Generation – Artificial
Intelligence
Computer devices with artificial intelligence
are still in development, but some of these
technologies are beginning to emerge and be
used such as voice recognition.
AI is a reality made possible by using parallel
processing and superconductors.
quantum computation, molecular and nano-
technology etc. are some of the other
characteristics of this generation.
12. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The essence of fifth
generation will be using
these technologies to
ultimately create
machines which can
process and respond to
natural language, and
have capability to learn
and organize themselves.
13. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.3 SOFTWARE
A set of computer instructions is called a
program. A set of computer programs is called
a software. It is a collection of programs which
increase the capabilities of computer
hardware. The process of developing software
is known as programming.
Software is intangible
Software is the soul of computer
It activates the dead machines.
15. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System software
Computer software designed to operate the
computer hardware and to provide a platform
for running application software is what is
system software. It controls the entire
computer program. System software helps use
the operating system and computer system.
It controls all operations
Moves data into and out the computer
It is essential for running the computer
16. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Operatingsystem An operating system is a program designed to
run other programs on a computer. It is that
part of a system software which acts as an
interface between hardware and end user.
Operating system is considered to be the
back bone of a computer, managing both
hardware and software.
17. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Basic functions of an operating system
Schedule jobs
Manage hardware and software resources
Maintain system security
Enable multiple user resource sharing
Handle interrupts
Maintain usage records
18. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Types of Operating system
Single tasking: It allows only one program to run
at a time. One program has to close for opening
another program.
Multi tasking: It enables a single user to have two
or more applications open at the same time.
19. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MS DOS: MS Disk Operating System
Non graphical command line OS
Released in 1981 and last updated in 1994
User is required to type commands instead of
using a mouse.
20. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Micro Soft Windows
GUI
No commands
Simple and user friendly
Multi tasking features
22. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows versions
Windows 1995
Developed for home and professional users
Network ready OS
Windows NT
Known as New Technology
A stable multitasking environment
Enhanced security features
Increased memory
Network utilities
Portability
23. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows 2000
It is used on personal computers,
business desktops, laptops and servers
Windows ME was designed for home use while 2000
for business purpose
Windows XP
It was released in 2001
Home and Professional variants
Features
Faster start up
User friendly interface
Fast user switching
Clear Type font rendering mechanism
Remote desktop functionality
24. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows vista
Released in the year 2007
Comes with many technical changes
Updated GUI
Visual style dubbed aero
Redesigned search function
Multimedia tools (Windows DVD Maker)
Redesigned networking, audio, print, and display
subsystems
26. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Windows 7.0
It is designed for
Home & Business desktops
Personal computers
Laptops
Notebooks
Tablet PCs
Media centre PCs
It was more focused on applications and hardware
It excluded Windows calendar, Windows Mail,
Windows Movie Maker and Windows Photo Gallery.
These are offered in Windows live Essentials Suite.
27. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
UNIX OS
Unix OS is a computer OS
developed in 1969 by a group of
American Telephone & Telegraph
Company employees at labs
Featured with client server model
Unix is generally seen as an OS
on workstations or a network
server
It allows multiple processors going
at once
Unix philosophy
Use of plain text
for storing data
Hierarchical file
system
Use of large
number of
software tools
28. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MAC OS
GUI
Developed by Apple Inc.
First introduced in the year 1984
29. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classic Mac OS
Completely graphical OS
Ease of use
Cooperative multitasking
Mac OS X
Server edition
Runs on Apple’s line of Macintosh server hardware
Includes work group management and administration
tools for key network services
30. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Linux OS
It is a UNIX-Like operating system
Modifiable codes
Used on devices from supercomputers to wrist
watches
Widely adopted for servers and embedded
systems
31. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Programming languages
They are vocabulary and set of grammatical
rules for instructing a computer to perform
specific tasks. It usually refers to high level
languages such as BASIC, C, C++, COBOL,
FORTRAN etc.
32. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Types of Programming
Languages
Machine Level Languages or First Gen
Languages.
It is the language of the computer, the only
language the computer understands without
translation. Each particular computer model
has a machine language, which is based on
the internal architecture of the equipment.
33. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Assembler languages or second gen
languages. They are also known as symbolic
languages because they include arithmetical
and logical operations.
Because of the use of mnemonic symbols this
eases up the programmers’ risk gradually.
Assembly languages are translated by
assemblers to machine level languages so as
to be understandable to machines.
34. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Compiler languages (High Level Languages)or
third gen languages. They are also known as
procedural languages. COBOL , FORTRAN,
BASIC, C++, C etc. are examples.
They include plain English like and
mathematical expressions. They are easy to
write and learn and are relatively error free.
Compilers are used to translate High level
languages to Machine language.
36. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other system software
Device drivers: These are small files that act
as an interface between hardware and the
operating system in a computer. Hardware
requires device drivers so that the OS can see
the device and handle them properly.
37. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Utility programs or Service programs.: these
are system programs for performing general
system support tasks. Following tasks are
performed by utility programs.
Sorting and storing the data
Checking or scanning the data for security
Making a copy of all information
Deleting, renaming, moving, copying, merging,
generating and modifying data sets.
Providing encryption. Etc.
38. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
• Compilers: High level language Machine
level codes (translation is done at once
before the program is executed)
• Interpreters: High level language
Machine level codes (translation is done line
by line)
• Assemblers: Assembly language
Machine level codes
Language translators:
39. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
General purpose
software
This software provides the framework for a great
number of business, scientific, and personal
applications.
Word processors: It is a document preparation
system. E.g. MS Word, Polaris Word
Spreadsheet program: Commonly known as pay roll
application. Lotus, MS Excel, Polaris Spreadsheet
DBMS: MS Access, Oracle
CAD and CAM Programs: Auto CAD, Revit Etc.
Internet Browser: Opera, Netscape Navigator, Internet
Explorer, Google Chrome
E-Mail Software: Hotmail, Yahoo mail, Gmail,
Rediffmail.
40. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Application software
Software which is used for applications specifically
designed for users to fit their needs
ERP: The system to integrate all data and processes
of an organization into a single unified system.
Tally
Peachtree
QuickBooks
SAP
Decision Support System:
Cost accounting system
Capital Budgeting system
General Decision Support System
41. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Artificial Intelligence System : E.g. Robotics
Expert Systems: Used for complex and ill
structured tasks. It helps non experts to make
decisions comparable to those of an expert.
42. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.4 Hardware
The physical parts of computer are called
hardware. Computer hardware is the
collection of physical parts of a
computer system. This includes
the computer case, monitor, keyboard, and
mouse. It also includes all the parts inside the
computer case, such as the hard disk drive,
motherboard, video card, and many
others. Computer hardware is what you can
physically touch.
44. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The CPU
It is also known as the processor.
CPU is the heart, brain and soul of computer.
Programs and instructions are read and
executed by CPU.
Intel, AMD, Motorola are popular processor
manufacturers.
Two basic parts of the CPU are
Control unit and
Arithmetic and logic unit.
45. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Control unit
It is the most important unit of the CPU. All the
computer resources are managed from the
control unit. It takes instructions from the
memory and sends the necessary signals to
ALU to perform the operation needed.
46. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ALU
ALU is a separate section of CPU which
performs computation like addition,
subtraction, multiplication and division and
logical operations such as the comparison of
two numbers. The tasks are performed with
special storage locations called registers.
47. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Memory Unit
Memory is a storing device which stores
programs, data etc. any program to be used in
the computer should be stored in the memory.
The memory capacity is measured in KB, MB,
GB, TB, PB,EB, ZB and YB
Computer memory is divided into
Internal memory or main memory or Primary
memory
Additional memory or, secondary memory or
Auxiliary memory
48. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internal memory or main memory or
Primary memory
It stores data needed for current tasks by the
computer and receives data from the
secondary storage as and when needed.
Magnetic core memory was used previously
but it is now outdated.
In modern computers, Micro electronic
semiconductor storage circuits are used to as
primary storage. They are small sized, high
speed, shock and temperature resistant chips.
Semi conductor memories are of two types.
They are RAM and ROM
49. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
RAM- Random Access Memory
RAM is the popular primary storage medium. It
is read write memory. RAM is a temporary
memory or volatile memory. All the information
goes out when the system is switched off.
51. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
ROM-Read Only Memory
This memory is used to store information
permanently. The data is not lost if power is
switched off. It is read only memory since data
cant be written. E.g. ROM-BIOS (ROM-Basic
Input Output System). This program controls
and supervises the basic operations of I/O
devices.
Types of ROM are
PROM
EPROM
EEPROM
52. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Additional memory or, secondary memory or
Auxiliary memory
Primary storage is inbuilt with CPU, but
secondary memory is used in separate unit or
units. The capacity of Primary memory is
limited whereas secondary memory has
infinite capacity of millions and billions of
bytes.
Different secondary storage devices are
discussed below.
53. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Magnetic Tape
The oldest storage system
It makes copies of audio, video and data.
It is employed with a tap drive to store
and retrieve data.
The biggest drawback is that it can only
access data sequentially.
54. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Floppy diskettes
It was first introduced by IBM in the year 1970.
It consists of a circle shaped plastic material
which is coated with an oxide material. This
Plastic material is covered by a protective
square jacket with a hole to read the data by
the floppy drive.
The maximum storage capacity of a latest
Floppy disk is 1.44 MB.
56. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Organization of data on a disk
To use a disk for storing data, it must be
magnetically mapped. Then only the computer
can go directly to a specific location in the disk.
The process of mapping a disk is called formatting
or initializing.
Initializing is done by creating tracks and sectors.
Magnetic concentric circles are called tracks.
Short segments created like dividing a pie is
called sectors.
Each sector is assigned a unique number so that
the data access by the computer is easy.
58. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hard disc
They are the most popular device for storing
data.
Large volume of data can be stored.
A hard disc is a set of different platters fixed on
a spindle. Each platter is coated with iron
oxides.
Unlike floppy, the drive and disc is a single
chamber.
TBs of data can be stored in Hard disks.
They may be internal or external
60. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
An external hard drive is a
portable storage device that
can be attached to a computer
through
a USB or FireWire connection,
or wirelessly. External hard
drives typically have high
storage capacities and are
often used to back up
computers
External/ Portable Hard disk
61. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-ROM Disks
It stands for Compact Disk Read Only
Memory.
It is an Optical Laser Disk.
There are two lasers. One laser beam writes to
the recording surface and another laser reads
the data from light sensitive recording surface.
The data on the disk are fixed, they cant be
altered.
It has a storage capacity of over 650 MB
62. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-R
CD-R stands for Compact Disk Recordable.
It is a WORM (Write Once Read Many)
Memory.
One can write only once on CD-R
63. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CD-Rewritable
CD-RW was first introduced by Hewlett
Packard
It permits for repeated recordings on a disk
Data on this CD can be altered.
64. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
DVD
DVD stands for Digital Video Disk or Digital
Versatile Disk.
It stores up to 20 GB of Text, Graphics and
video.
Variations are
DVD-ROM
DVD-R
DVD-RW
DVD-RAM
65. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Blu Ray Disc
It is developed to enable recording, rewriting
and playback of High Definition Video, as well
as high volume of data.
They can hold up to 50 GB capacity.
66. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WORM Cards
A Write Once Read Many (WORM) digital memory
card is intended for professional uses such as
police investigations, court testimony, electronic
voting and other applications where data files
must be protected from alteration or deletion.
Applications
Police photography and witness/suspect
interviews, where courts require proof that photos
and audio recordings are genuine.
Court proceedings, such as trials and depositions.
Electronic voting, where recorded votes must be
tamper-proof.
67. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cash registers which record
transactions for tax collection
purposes.
Event recorders, such as security
cameras and “black box” flight-data
recorders.
Medical devices which retain
individual patient treatment data.
Personal digital assistants (PDAs)
and similar devices used by physicians
and other health-care professionals to
track patient interactions.
68. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
SD Cards
SD stands for Secure Digital Cards
Its is a non volatile memory card.
It is commonly used in mobile phones and
other portable electronic devices.
A card reader is used to connect to the
computer.
69. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flash Drive
USB flash drive/ pen drive is a popular storage
medium.
It is highly portable because of its small size.
Large volume of data can be stored in it
IT uses USB(Universal Serial Bus) technology.
They are removable and rewritable.
70. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
INPUT DEVICES
They are the devices used for giving
necessary data into the computer, then they
are converted into a form that is acceptable to
the computer.
1. Key board
2. Mouse
3. Light pen
4. Track ball
5. Joystick
6. MICR
7. OMR
7. OCR
8. Bar coding
9. Voice input
10. Touch screen
11. Touch pad
12. scanner
71. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Keyboard
A keyboard detects key pressings with the
help of an electronic circuit called keyboard
encoder. The encoder sends a binary code to
the computer. It can be connected to the CPU
with or without cable.
Types of keys in a keyboard are
Alphanumeric keys
Punctuation keys
Special keys.
72. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Mouse
Mouse is a pointing device.
It controls the movement of cursor in the
display unit.
Types of mice include
Mechanical mouse
Opto-mechanical mouse
Optical mouse
Cordless mouse
73. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Light pen
Light pen also is a pointing device.
It selects an option by simply pointing at it.
It is used in menu based applications
It is also used in drawing graphics in CAD
An engineer or architect or fashion designer
can draw sketches or pictures directly on the
screen.
75. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Track ball
Track ball is a pointing device.
It works like a mouse but is fixed and takes
less space.
It has a ball in the middle, a right and left
clicks.
Apple computer’s Power Book and IBM
ThinkPad notebooks used Track balls.
76. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Joystick
It is a vertical stick which moves
the graphic cursor in a direction
the stick is moved
It is popularly used by children to
play video games.
Pilots use it as flight control in the
cockpit of aircraft.
77. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MICR
Magnetic Ink Character Reader.
Human readable characters printed on
documents using a special magnetic ink is
read by MICR.
MICR reads the magnetic pattern of letters and
compares it with the one which is stored in its
memory.
Bank details such as branch code, account
number, cheque number etc. can be read by
MICR.
78. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OMR
Stands for Optical Mark Reader
This device is designed to read markings
placed in specific places on a form or card.
Pre-printed documents are designed with
boxes or circles that can be filled by a Pen or
Pencil. This documents are then given to the
reader.
The reader reads the position of markings and
processes it.
OMR sheets are commonly used in various
entrance and competitive examinations.
80. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OCR
It reads numeric and alpha numeric data from
printed documents
It can read up to 300 papers per hour.
It is used in the preparation of electricity bills,
telephone bills, insurance premium notices
etc.
81. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Bar Code Reader
It can read barcodes printed
on packages, badges and
books.
A barcode uses small bars on
varying thickness and spacing
with some numbers.
Manufactures use UPC-
Universal Product Code.
In case of books ISBN is used.
The information stored in the
barcode is displayed on the
screen when it is read.
82. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Voice input
Voice or audio input is given through a Mic
The given voice instructions will be compared
with those already stored in the system.
Only the trained systems can recognize voice
inputs.
83. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch pad
They are pads sensitive to finger touch.
It is another type of pointing device.
Laptops use this technology instead of mouse.
84. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Touch screen
They are screens sensitive to finger touches.
The touch sensitive transparent panel covered
in the screen enables the sensitivity.
Smart phones, information kiosks, and tablet
computers use touch screens.
85. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Scanner
Scanners are used to scan papers and paper
type documents. They can convert hard copies
into soft copies by creating electronic images.
86. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
OUTPUT DEVICES
O/P devices are used to present computer
information in a readable form. LCD screens
and Printers are the most commonly used
output devices.
1. Monitors
2. Printers
3. COM(Computer Output on Microfilm)
4. Audio System (speaker)
5. Graphical O/P devices
87. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Monitors
Monitors are also called VDU- Visual Display
Unit
A monitor may be
CRT
LCD
CRT monitors use an electronic gun and an
emitting display in which tiny colored dots are
thrown.
LCD’s are flat screens which use TFT
technology.
All monitors depend on a video card, which is
88. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Printers
They are used to print hard copies of
documents.
They are connected to the system by a cable
to the parallel port or a USB port.
They print on ordinary paper, specially
prepared dispatch notes, invoices or packing
slips.
Printers are classified on the basis of their
printing mechanism into
Impact printers and
Non impact printers
89. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Impact printers
Impact printers utilize some form of striking
device to transfer ink from a ribbon onto the
paper being printed to form images or
characters.
They fall into two types- Serial or Line printing
Serial printers print one character at a time.
Commonly used Serial Printers are
Dot Matrix Printers and
Daisywheel printers.
90. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Dot matrix printers
They use wire needles or pins which strike the
ribbon against the paper in the pattern
necessary to produce each character.
91. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Daisy wheel printers
They use a new element of printing called a
‘daisywheel’.
92. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Line printers
A line printer works with much higher speed
than a serial printer.
It can print one line at a time.
Chain printers and drum printers are the
commonly used line printers
93. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Chain printers
A chain printer has a chain that rotates at a
constant speed in a horizontal plane.
The chain has a 48 numbers, alphabets and
special symbols.
The magnetically controlled hammers press
the chain onto the paper.
94. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Drum printers
These printers have a solid cylinder and as
many bands on it as the number of print
positions.
95. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Non impact printers
They don’t strike the paper.
They produce prints with electro static, chemicals,
inkjet and thermal technologies.
Non impact printers are most widely used
nowadays.
They are faster, smarter and clearer.
The three different types are
Thermal printers
Ink-Jet printers
Laser printers
96. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Thermal printers
They are used commonly as portable printers
to make print out of tiny slips such as an ATM
Slip or a Debit or Credit Card payment slip.
They use pins which are heated by the electric
element and then pressed against the paper.
97. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Inkjet printers
They make use of fine spray nozzles that
create the image of character or graphics on
the paper by spraying tiny or small drops of ink
into the paper.
It uses ink cartridges. Usually an inkjet printer
has a black cartridge and a color cartridge.
98. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Laser jet printers
They use both laser and xerographic
technology.
They can print with high quality
They print not only alphanumeric characters
but also drawings graphics and other
documents
99. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer output microfilm.
It records computer output as microscopic
images on roll or sheet film.
A microfilm reader reads the output.
100. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Speakers.
They create audio output.
Computer speakers do the same as other
speakers do.
Speaker system is controlled by a sound card.
101. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Plotters
It is a device that can draw graphs, designs
and maps into a paper and even to a plastic or
metal plates.
It is used in fashion designing, engineering
drawings, business analysis using visual terms
such as bar charts, graphs and diagrams.
102. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.5 Algorithm & Flow Charts
An algorithm is a finite list of instructions specifying a
sequence of operations and that give the answer to
any problem of a given type.
Example consider the Euclidean Algorithm stated as
follows
Given two positive integers A and B, find their common
divisor
The algorithm involves the construction of descending
sequence of numbers.
The first is the larger of two numbers, the second is the
smaller, the third is the reminder from dividing the
first by the second, the fourth is the remainder from
dividing the second by the third; and so forth. The
process stops when there is zero remainder. The
G.C.D is the last divisor in the series.
103. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For example, the descending sequence of numbers for
greatest common divisor of 44 and 28 is
44, 28, 16, 12, 4, 0
The last divisor is 4, so 4 is the result. The algorithm can be
written as follows.
1. Write down A, B
2. If B is greater than A, exchange them.
3. Divide A by B to get the remainder
4. If R is equal to Zero, stop; B is the G.C.D
5. Replace A by B; (i.e. B A)
6. Replace B by R; (i.e. R B)
7. Go to step 3
104. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Flow charts
A flow chart is a diagram prepared by the
programmer for describing the sequence of steps
of complex processes involved in solving a
problem. It helps the programmer avoid
comprehensive thinking and probable mistakes in
programming process. Four categories of flow
charts are
• System outline charts (Global map)
• System flow charts (National map)
• Run flow charts (State map)
• Program flow charts (District map)
105. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
System outline charts:
• These charts only lists the inputs, files processed and outputs
without regard to any sequence whatever.
System flow charts:
• These flow charts present an overview of the data flow through all
parts of a processing system. It shows the flow of documents,
operations and activities; persons and work stations. It depicts the
relationship between input, processing and output. The system
flow chart includes the following main elements
• Input data sources and their medium
• Processing steps
• Intermediary and final output and storage devices
107. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Run flow charts
These are extracted from system flow charts to
show the reference of computer operations to be
performed.
109. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Program flow charts
They are the detailed and are concerned with the
logical/arithmetic operations on data within the
CPU and the flow of data between the CPU. It
shows the flow between input/output peripherals
also.
112. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.6 Decimal v/s binary number
systems
The radix or base of decimal system is 10
because it uses numbers 0 to 9 . It is also
called base 10 number system.
Here, the weight of each digit depends upon
its relative position. E.g. 3256
=3000+200+50+6
=3x103 +2x102 +5x101 +6x100
if the left most digit of the number is nth digit ,
then we can write nth digit x 10n-1 (nth digit x
(base)n-1 )
113. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
The radix of the binary system is 2. It uses only 0s
and 1s . Data is stored in a digital or electronic
device such as a computer in binary system.
The data are based on the right to left position of
digits. E.g. take the binary number 10100. using
the equation (nth bit x (base)n-1 )
10100= 1x24 +0x23 +1x22 +0x21 +0x20
10100=16+0+4+0+0
10100=20
Above shown is the binary decimal conversion.
114. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For fraction numbers
1.001= 1x20 +0x2-1 +0x2-2 +1x2-3
1.001=1+0+0+.125
1.001=1.125
115. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Decimal to binary conversion (double dabble
method)
Therefore, the binary equivalent of 14 is 1110.
2 14 Remainde
r
2 7 0
2 3 1
2 1 1
0 1
116. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
For fractions
E.g. 0.125
Binary equivalent of 0 is 0 itself
And for fractional part it is 001 therefore 0.125 is
converted as 0.001
0.125
X2
0.25 0
X2
0.5 0
X2
0 1
117. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classification of Networks-
LAN,MAN,WAN
Methods of Networking
Internet and services
E-Commerce
Computer networking, internet
and E-Commerce.Unit II
118. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.1 Computer Networks
A network is a set of devices interconnected by
communication links. It is a collection of
computers and other devices set together for
the purpose of sharing information and
resources.
Networking improves the capabilities of
computers.
Scope of networks include
File sharing
Print sharing
E- Mail
Remote access
119. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Area based classification of
networks.
LAN- Local Area Network
MAN-Metropolitan Area Network
WAN-Wide Area Network
120. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Local Area Network
A LAN is a group of computers and network
devices connected together, usually within the
same building, campus or spread over a
limited distance. It facilitates high speed data
transmission at cheap cost.
LANs are privately owned and operated. LAN
uses high speed media (1mbps to 30 mbps or
more)
121. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of LAN
Different users are connected together
Terminals are located in a small geographic
location
Devices are connected via cables or wireless
connectivity like Wi-Fi
A LAN could be connected to other LANs and
the internet or other WAN.
122. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
MAN-Metropolitan Area
Network
It is larger and spans over a city or town.
It refers to networks which interconnect
systems or LANs within a metropolitan area
A MAN can support both data and voice.
Cable TV networks are examples of MANs.
123. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAN-Wide Area Networks
It covers a very large geographic area and
uses different communication systems such as
Telephone services.
E.g. banking networks, Railway Reservation
Systems etc.
124. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Features of WAN
Thousands of computers spread over a wide
geographic region are connected together.
They use communication channels of a third
party.
These channels are of low capacity and error-
prone.
125. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.2 Network Topology
Topology means the method in which
terminals are connected in a network.
Commonly, there are following types of
methods.
Star network
Ring network
Bus network
126. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1.Star network
It is the connection between a host computer and
local computers. The host computer works as the
central computer. Different terminals can
communicate only via the host computer which
centrally controls the others.
Advantages are
Minimal line cost
Adding of new nodes will not increase delay in
communication between two nodes.
Failure of one node doesn’t affect the network.
The most important problem with this is that the
entire network depends on the host computer. The
whole network fails when it fails.
128. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Ring network
Computers are linked by a closed loop in a ring
network to facilitate data transfer from one
computer to the other. If the data is not needed for
a particular computer, it ignores and simply
passes to the other. The process continues till it
reaches the destination.
This is a true distributed processing since there is
no central computing.
It is reliable because it doesn’t depend upon any
host computer.
Addition of nodes will increase delay. And it
requires complicated control softwares.
130. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Bus network
Bus network also has no central computer.
Computers are connected by a single circuit
used as communication path.
It is reliable.
New computers can be very easily added.
It also uses high complicated software.
Breakdown in the main circuit affects the entire
network.
132. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.3 Internet
Internet is the network of networks. It is the
connection of crores and crores of computers
connected together. The word internet is the
combination of interconnection and network.
133. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Uses of internet
1. E-Mail
2. FTP
3. Social networks
4. Internet Chatting
5. WWW
134. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Mail
Electronic mail system has overridden the
traditional mailing systems such as telegram
and Fax.
Any type of massages can be sent on an E-
Mail. Video, audio, text and files can be sent
along with mails.
Most popular E-Mail providers are Google,
Yahoo, Hotmail, rediffmail etc.
135. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
FTP
FTP stands for File Transfer Protocol
It helps users to download files from internet.
It is the most secure way of transferring files
over the internet.
136. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Social Networks
The recent trend in internet
Lakhs of people are connected together.
People can chat, express their opinions on
various issues so that anyone can view it.
They turn to Social Media- creating a new
media culture.
E.g. Face book, Twitter, Whatsapp Etc.
137. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internet chatting
It may be an audio-video chatting or only text
chatting.
It makes use of various chat providers such as
Skype or IMO.
Anyone can be connected to anywhere in the
world using this facility.
138. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WWW
www stands for World Wide Web
It’s a web of information
It’s the fastest growing facility using internet.
Web sites are the collection of web pages and
WWW is the collection of web sites.
A web page is created using a web language
such as HTML or front page or PHP.
HTTP helps users to access web pages from
www.
Contd.
139. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
A web browser is the program to access web
pages from internet. E.g. internet explorer,
Mozilla firefox, Google Chrome etc.
Search engines are devices to search for
information on the internet. They are the
database that contain references to thousands
of resources.
140. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
VPNs-Intranet and Extranet
VPNs are private data networks that make use
of public networks such as internet for data
transmission.
A VPN may be Intranet based or Extranet
based.
An intranet is a network for users in an
organization, Although they geographically
disperse. It can be used only by authorized
personnel of an organization. External users
are not allowed to use it.
Contd.
141. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
An intranet is an integration of E-Mail, FTP,
and web servers with the internal applications.
An Extranet on the other hand is a connection
of intranets used by different organizations to
facilitate inter-organizational data transfer.
E.g. clients and suppliers network.
142. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
WAP- Wireless Application
Protocol
Wireless Application Protocol (WAP) is a technical
standard for accessing information over a
mobile wireless network. A WAP browser is a web
browser for mobile devices such as mobile
phones that uses the protocol. Before the introduction
of WAP, mobile service providers had limited
opportunities to offer interactive data services.
Following mobile services use WAP
Email by mobile phone
Tracking of stock-market prices
Sports results
News headlines
Music downloads
143. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.4 E-Commerce
WTO defines E-Commerce as “ a commercial
process that includes production, distribution,
sales or delivery of goods and services
through the electronic means”
In the process of E-Commerce, data is
transmitted from one organization to the other
in electronic form. This data interchange is
known as EDI- Electronic Data Interchange.
144. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Commerce models/types of E-
Commerce
Business to Business (B2B)
Business to Customer (B2C)
Consumer to consumer (C2C)
Business to Government (B2G)
Business to Employee (B2E)
145. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Business –B2B
In B2B, transactions take place between 2
different business organizations.
For example, Amazon.com’s online book store.
Various book publishers may develop their
own distribution channel or may have a
rapport with Amazon.com. In the second case,
they transact with Amazon in B2B mode. They
do this because the books will be viewed by a
large audience.
146. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Consumer (B2C)
B2C means sale of goods by a business to the
public. It may be either products or services
such as airline booking or stock trading.
Low marketing costs, lower order processing
costs, better customer services etc. are the
benefits of B2C
147. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Consumer to consumer
It consists of individuals using the online
advertisement websites to sell products and
services directly to other individuals. Online
auction is a very good example for C2C
Dubizzile, OLX etc are mostly used online ad-
websites.
148. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Government B2G
Apart from the main B2G activities such as
paying government taxes like vehicle tax,
property tax and income tax, Government
procure goods and services from the Business
organizations. These products and services
range from office stationary to military
equipments.
149. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Business to Employee (B2E)
It is an internal E-commerce model and it uses
intranet.
Examples are, online insurance policy
management, corporate dissemination, special
offers for the employees etc.
150. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database concepts
Information Systems
System development life cycle
Various types of information systems
DBMS and Information
Systems
Unit
III
151. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.1 Types of databases
Operational databases: They store detailed
data needed to support operations of the entire
organization. They are called as Subject Area
Databases (SADB), Transaction Database,
Inventory Database and Production Database.
E.g. Customer Database, Personnel Database.
Management database: They store data and
information extracted from selected operational
and external database. It consists of
summarized data and information needed by the
organization’s managers and other end users.
152. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Information Warehouse database: An
information warehouse stores data from
current and previous years. This is usually
data taken from the various operational and
management databases of an organization.
External database: For some databases,
there is option to connect with external
privately owned online databases. Its for
smooth commercial information services.
153. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Text databases: A full-text database is
a database that is comprised of several books,
articles, journals, magazines, newspapers and
other textual documents but does not include
graphical documents such as drawings, diagrams
or pictures. Each of the referenced documents
can be viewed, printed or downloaded online.
Image databases: Wide variety of images can be
stored electronically in image databases. Even
electronic encyclopaedia are available on CD
ROM disks which store thousands of
photographs of text. Image data processing is the
use of image database in business organizations
154. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.2What is an information
system
An information system can be defined as a set
of interrelated components that collect,
process, store and distribute information to
support decision making and control in an
organization.
In addition to the above, information systems help
managers and workers analyze problems,
visualize complex subjects, and create new
products.
156. AP SHAREEF’S LECTURE ON IT FOR MANAGERSAP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.3 System Development Life Cycle
157. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Preliminary analysis
Conduct the preliminary analysis
Propose alternative solutions
Describe the costs and benefits
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
158. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Systems analysis, requirements
definition
Collection of Facts
Scrutiny of the existing system
Analyzing the proposed system
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
159. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Systems design
Describes desired features and operations in
detail, including screen layouts, business
rules, process diagrams, pseudocode and
other documentation
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
160. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.Development
Development of different software modules is
done at this stage.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
161. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5. Integration and testing
All the different modules are brought together.
They are integrated and tested for errors.
Corrections are made if errors are found
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
162. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Acceptance, installation,
deployment
Top management officials approve the system
Install the system and allocate the tasks
Appropriate staff is deployed.
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
163. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
7. Maintenance and evaluation
Ensure the smooth working of the system
Maintenance team observes the work
Mistakes are repaired
AP SHAREEF’S LECTURE ON IT FOR MANAGERS
164. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.4 Types of information
systems
Transaction processing systems.
TPS is an information system that keep track of
the elementary activities and transactions of
the organization, such as sales, receipts, cash
deposits, payroll, credit decisions, and the flow
of materials in a factory.
It is a computerized system that performs and
records the daily routine transactions
necessary to conduct business
166. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Management information systems
MIS provide middle managers with reports on
the organization’s current performance. This
information is used to monitor and control the
business and predict future performance. It
uses data supplied by TPS and compresses
them into reports.
The picture depicts how MIS transforms
transaction level data from inventory,
production, and accounting into MIS files that
ate used to provide managers with reports.
168. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Decision Support Systems
DSS focuses on problems that are unique and
rapidly changing, for which the procedure for
arriving at a solution may not be fully
predefined in advance.
It takes information from TPS and MIS. But
often bring in information from external
sources, such as the current stock prices or
product prices of competitors
These systems are employed by “super-user”
managers and business analysts who want to
use sophisticated analytics and model to
analyze data
169. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
• Production data
• Marketing data
• Finance data
• HR data
Model base
• Statistical models
• Forecasting models
• Planning models
• Operational models
DSS Software
• Manage database
• Manage model base
• Manage end user
interface
User interface
User
170. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Executive Support System (ESS)
ESS addresses the decision making needs of
senior management. It supports strategic
issues and long term trends.
ESS present graphs and information from many
sources through an interface that is easy for
senior management. It is designed to
incorporate data about external events, such
as tax laws or competitors, but they draw
summerized information from internal MIS and
DSS.
171. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Database
Data warehouse
datamart
Data mining
EIS SoftwareExecutive’s staff
Executive
Query
Output
Components of an executive information
system
172. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Enterprise Resource Planning Systems
These integrate business processes in
manufacturing and production, finance and
accounting, sales and marketing, and human
resources into a single software system .
For example, when a customer places an order, the
data automatically go to the other parts which are
affected by it. The transaction gives information to
the warehouse to pick the products and arrange
for shipment. The warehouse informs the factory
to replenish what has been reduced. Accounting
department takes steps to send customer an
invoice. Customer service executives observe the
progress of the order.
174. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Supply Chain Management System
This system help the business to manage
relationship with suppliers. Suppliers,
purchasing firms, distributing men and logistics
companies benefit by this system. It shares
information on orders, production, inventory
levels and delivery of goods and services so
that the above groups can get efficient
services.
It is an inter-organizational system because they
automate the flow of information across
organizational boundaries.
176. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Customer Relationship Management System
CRMS helps the management to keep effective
relationship with its customers. It provides
information to coordinate the sales and
marketing activities in such a way as to create
delighted customers. The most profitable
customers can be retained by this system.
178. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Knowledge Management Systems.
These enable an organization to better manage
process for capturing and applying knowledge and
experience in the firm, and make it available
wherever and whenever it is needed to improve
business and management decisions.
They link the firm to external sources of knowledge.
This firm knowledge is unique, difficult to imitate and
can be leveraged into long term strategic benefits.
The basic elements of knowledge management are
1.Knowledge creation
2.Knowledge sharing
3.Knowledge utilization
180. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.5 Functional information
systems
These are the systems based on different
functions of a business organization
Different functional subsystems are as follows
1. Production information systems
2. Marketing information systems
3. Financial information systems
4. HR information systems
These systems are dealt with in detail.
181. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Production Information Systems
These systems facilitate efficient
productions/operations management.
Production management encompasses
design, implementation, operation and control
of systems made up of people, materials,
capital equipment, money and information to
accomplish specific objectives
Following is a model of production information
system
183. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Marketing information systems
Marketing information systems are designed
and operated to provide relevant information
on the following aspects
1. Type of products to be offered
2. Price at which products to be offered
3. Place where products have to reach
4. Promotion of products to create loyal customers
The outline of the system is as follows
185. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Financial Information Systems
Finance is the life blood of every business
organization. Financial Information systems
help manage financial affairs effectively. It is
useful in taking major financial decisions, i.e.
finance decisions, investment decisions and
dividend decisions.
The outline of a FIS is depicted below
187. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Accounting Information System
It consists of the people, records, and methods
used to gather financial information about
business events, record it, process it into a
useful form, and communicate the information
to end users and decision makers in planning,
forecasting and controlling.
It works with many subsystems such as budget,
final accounts, costing, inventory, receivables etc
189. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computerized Accounting
Package
It is a package designed for accounting with
the use of computers for recording, reporting
and analysing the financial data of a business.
These are software programs that are stored
on a company’s computer, network server, or
remotely and accessed via the internet. A
business can customize the software to suite
the particular needs.
190. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Salient features of Computerized Accounting
Package.
Fast, Powerful and integrated.
Complete visibility.
Enhanced user experience
Accuracy.
Improves the business performance
Quick decision making
Complete reliability.
191. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
HR Information System
HR Management is a major function in any
business firm. HRIS facilitate systematic ways
for HRM.
It is an organized method of providing
information about HR , their functioning, and
external factors relevant to HRM.
The outline is depicted below
193. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Computer Viruses
Cyber Crimes
IT act 2000 and Cyber laws
Computer Viruses, Cyber Crimes and
LawsUnit
IV
194. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.1 COMPUTER VIRUSES
A computer virus is a program designed to
harm or cause harm on an infected computer.
Its spreads through e-mail attachments,
portable devices, websites containing
malicious scripts and file downloads. A
computer virus attaches itself to the host files
and always activate whenever you open the
infected files. The virus can replicate itself and
then infect the other files on your computer
causing more damage. Below is a list of
different types of computer viruses and what
they do.
195. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Macro Viruses
These viruses infect the files created using some
applications or programs that contain macros
such as doc, pps, xls and mdb. They
automatically infect the files with macros and also
templates and documents that are contained in
the file. They hide in documents shared through e-
mail and networks.
Macro viruses include:
Relax
bablas
Melissa.A
097M/Y2K
196. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Memory Resident Viruses
They usually fix themselves inside the computer
memory. They get activated every time the OS
runs and end up infecting other opened files.
They hide in RAM.
Memory Resident Viruses Include:
CMJ
meve
randex
mrklunky
197. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Overwrite Viruses
These types of viruses delete any information in
a file they infect, leaving them partially or
completely useless once they are infected.
Once in the computer, they replaces all the file
content but the file size doesn’t change.
Overwrite Viruses Include:
Trj.Reboot
way
trivial.88.D
198. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Direct Action Viruses
These viruses mainly replicate or take action
once they are executed. When a certain
condition is met, the viruses will act by
infecting the files in the directory or the folder
specified in the AUTOEXEC.BAT. The viruses
are generally found in the hard disk’s root
directory, but they keep on changing location.
Direct Action Viruses Include:
Vienna virus
199. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Directory Virus
Also known as cluster virus or file system virus.
They infect the computer’s directory by
changing the path indicating file location. They
are usually located in the disk but affect the
entire directory.
Directory Viruses Include:
dir-2 virus
200. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Web Scripting Virus
Most web pages include some complex codes in
order to create an interactive and interesting
content. Such a code is often exploited to
cause certain undesirable actions. They mostly
originate from the infected web pages or
browsers.
Web Scripting Viruses Include:
JS.Fortnight – a virus that spreads via malicious
emails.
201. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Multipartite Virus
These type of viruses spread in many different
ways. Their actions vary depending on the OS
installed and presence of certain files. They
tend to hide in the computer’s memory but do
not infect the hard disk.
Multipartite Viruses Include:
flip
invader
tequila
202. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
FAT Viruses
These lardy viruses attack the file allocation
table (FAT) which is the disc part used to store
every information about the available space,
location of files, unusable space etc.
FAT Viruses Include:
the link virus
203. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Companion Viruses
These types of viruses infect files just like the
direct action and the resident types. Once
inside the computer, they ‘accompany’ other
existing files.
Companion Viruses Include:
Asimov.1539
stator and terrax.1069
204. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Polymorphic Virus
They encode or encrypt themselves in a different
way every time they infect your computer. They
use different encryption and algorithms. This
makes it difficult for the antivirus software to
locate them using signature or string searches
(since they are very different in each encryption).
Polymorphic Viruses Include:
Marburg
tuareg
Satan bug
elkern
205. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Worm
This program is very similar to a virus and has the
ability to self-replicate leading to negative effects
on your computer.
Worm Viruses Include:
lovgate.F
sobig.D
trile. C
PSWBugbear.B
Mapson
206. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Trojans
Trojans can illegally trace important login details
of users online. For example E-Banking is very
common among users, therefore, vulnerability
of tracing your login details whenever your PC
is working without any strong powerful
antivirus installed.
207. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Email Virus
This is a virus spread via an email. Such a virus will
hide in an email and when the recipient opens the
mail.
Browser Hijacker
This virus can spread in many different ways
including a voluntary download. If infects certain
browser functions especially in form of re-directing
the user automatically to certain sites. A good
example is
Browser Hijackers Include:
the cool web search
208. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Boot Infectors
They include the boot sector plus master boot
record types. All the viral codes can be
separate location; however they infect the hard
disks or the floppy.
Boot Infectors Include:
The brain virus -it is the very first wild virus to be
created.
209. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
From what we have seen, the many types of
computer viruses and their effects are very
harmful and can completely damage your
system. Always make sure your system is up to
date. Also install antivirus software. The
antivirus program protects your computer and
the personal information in it.
210. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.2 Introduction to Cyber
Crimes
Due to increase in the number of netizens,
misuse of technology in the cyberspace was
clutching up which gave birth to cyber crimes
at the domestic and international level as well.
Though the word Crime carries its general
meaning as “a legal wrong that can be
followed by criminal proceedings which may
result into punishment” whereas Cyber Crime
may be “unlawful acts wherein the computer is
either a tool or target or both”.
211. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Classifications Of Cyber Crimes: Cyber
Crimes which are growing day by day, it is very
difficult to find out what is actually a cyber
crime and what is the conventional crime so to
come out of this confusion, cyber crimes can
be classified under different categories which
are as follows:
212. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Cyber Crimes against Persons:
There are certain offences which affects the
personality of individuals can be defined as:
Harassment via E-Mails: It is very common type of
harassment through sending letters, attachments of
files & folders i.e. via e-mails. At present harassment
is common as usage of social sites i.e. Facebook,
Twitter etc. increasing day by day.
Cyber-Stalking: It means expressed or implied a
physical threat that creates fear through the use to
computer technology such as internet, e-mail, phones,
text messages, webcam, websites or videos.
213. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Dissemination of Obscene Material: It includes
Indecent exposure/ Pornography (basically child
pornography), hosting of web site containing
these prohibited materials. These obscene
matters may cause harm to the mind of the
adolescent and tend to deprave or corrupt their
mind.
Defamation: It is an act of imputing any person
with intent to lower down the dignity of the person
by hacking his mail account and sending some
mails with using vulgar language to unknown
persons mail account.
214. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hacking: It means unauthorized control/access
over computer system and act of hacking
completely destroys the whole data as well as
computer programmes. Hackers usually hacks
telecommunication and mobile network.
Cracking: It is amongst the gravest cyber crimes
known till date. It is a dreadful feeling to know that
a stranger has broken into your computer
systems without your knowledge and consent and
has tampered with precious confidential data and
information.
215. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
E-Mail Spoofing: A spoofed e-mail may be said
to be one, which misrepresents its origin. It shows
it’s origin to be different from which actually it
originates.
SMS Spoofing: Spoofing is a blocking through
spam which means the unwanted uninvited
messages. Here a offender steals identity of
another in the form of mobile phone number and
sending SMS via internet and receiver gets the
SMS from the mobile phone number of the victim.
It is very serious cyber crime against any
individual.
216. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Carding: It means false ATM cards i.e. Debit and
Credit cards used by criminals for their monetary
benefits through withdrawing money from the
victim’s bank account mala-fidely. There is always
unauthorized use of ATM cards in this type of
cyber crimes.
Cheating & Fraud: It means the person who is
doing the act of cyber crime i.e. stealing
password and data storage has done it with
having guilty mind which leads to fraud and
cheating.
217. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
Assault by Threat: refers to threatening a person
with fear for their lives or lives of their families
through the use of a computer network i.e. E-mail,
videos or phones.
218. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Crimes Against Persons Property: As there
is rapid growth in the international trade
where businesses and consumers are
increasingly using computers to create,
transmit and to store information in the
electronic form instead of traditional paper
documents. There are certain offences which
affects persons property which are as follows:
219. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Intellectual Property Crimes: Intellectual
property consists of a bundle of rights. Any
unlawful act by which the owner is deprived
completely or partially of his rights is an offence.
The common form of IPR violation may be said to
be software piracy, infringement of copyright,
trademark, patents, designs and service mark
violation, theft of computer source code, etc.
220. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Squatting: It means where two persons
claim for the same Domain Name either by
claiming that they had registered the name first
on by right of using it before the other or using
something similar to that previously. For example
two similar names i.e. www.yahoo.com and
www.yaahoo.com.
221. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Vandalism: Vandalism means deliberately
destroying or damaging property of another. Thus
cyber vandalism means destroying or damaging
the data when a network service is stopped or
disrupted. It may include within its purview any
kind of physical harm done to the computer of any
person. These acts may take the form of the theft
of a computer, some part of a computer or a
peripheral attached to the computer.
222. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Hacking Computer System: Hacktivism attacks
those included Famous Twitter, blogging platform
by unauthorized access/control over the
computer. Due to the hacking activity there will be
loss of data as well as computer. Also research
especially indicates that those attacks were not
mainly intended for financial gain too and to
diminish the reputation of particular person or
company.
223. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Transmitting Virus: Viruses are programs that
attach themselves to a computer or a file and
then circulate themselves to other files and to
other computers on a network. They usually affect
the data on a computer, either by altering or
deleting it. Worm attacks plays major role in
affecting the computerize system of the
individuals.
Cyber Trespass: It means to access someone’s
computer without the right authorization of the
owner and does not disturb, alter, misuse, or
damage data or system by using wireless internet
connection.
224. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Internet Time Thefts: Basically, Internet time
theft comes under hacking. It is the use by an
unauthorised person, of the Internet hours paid
for by another person. The person who gets
access to someone else’s ISP user ID and
password, either by hacking or by gaining access
to it by illegal means, uses it to access the
Internet without the other person’s knowledge.
You can identify time theft if your Internet time has
to be recharged often, despite infrequent usage.
225. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3. Cybercrimes Against Government:
There are certain offences done by group of
persons intending to threaten the international
governments by using internet facilities. It
includes:
Cyber Terrorism: Cyber terrorism is a major
burning issue in the domestic as well as global
concern. The common form of these terrorist
attacks on the Internet is by distributed denial of
service attacks, hate websites and hate e-mails,
attacks on sensitive computer networks etc.
Cyber terrorism activities endanger the
sovereignty and integrity of the nation.
226. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Warfare: It refers to politically motivated
hacking to conduct sabotage and espionage. It is a
form of information warfare sometimes seen as
analogous to conventional warfare although this
analogy is controversial for both its accuracy and its
political motivation.
Distribution of pirated software: It means
distributing pirated software from one computer to
another intending to destroy the data and official
records of the government.
Possession of Unauthorized Information: It is very
easy to access any information by the terrorists with
the aid of internet and to possess that information for
political, religious, social, ideological objectives.
227. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Cybercrimes Against Society at large:
An unlawful act done with the intention of causing
harm to the cyberspace will affect large number of
persons. These offences includes:
Child Pornography: It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children.
It also includes activities concerning indecent
exposure and obscenity.
228. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber Trafficking: It may be trafficking in drugs,
human beings, arms weapons etc. which affects
large number of persons. Trafficking in the
cyberspace is also a gravest crime.
Online Gambling: Online fraud and cheating is
one of the most lucrative businesses that are
growing today in the cyber space. There are
many cases that have come to light are those
pertaining to credit card crimes, contractual
crimes, offering jobs, etc.
229. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Financial Crimes: This type of offence is
common as there is rapid growth in the users of
networking sites and phone networking where
culprit will try to attack by sending bogus mails or
messages through internet. Ex: Using credit cards
by obtaining password illegally.
Forgery: It means to deceive large number of
persons by sending threatening mails as online
business transactions are becoming the habitual
need of today’s life style.
230. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Affects To Whom: Cyber Crimes always affects
the companies of any size because almost all
the companies gain an online presence and
take advantage of the rapid gains in the
technology but greater attention to be given to
its security risks. In the modern cyber world
cyber crimes is the major issue which is
affecting individual as well as society at large
too.
231. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4.3“INFORMATION TECHNOLOGY ACT,
2000”
With the emergence of technology the misuse
of technology has also expanded to its
optimum level and then there arises a need of
strict statutory laws to regulate the criminal
activities in the cyber world and to protect
technological advancement system. It is under
these circumstances Indian parliament passed
its “INFORMATION TECHNOLOGY ACT,
2000” on 17th oct to have its exhaustive law to
deal with the technology in the field of e-
commerce, e-governance, e-banking as well
as penalties and punishments in the field of
cyber crimes.
232. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
CYBER LAWS
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic
devices such as cell phones, ATM machines etc.
Law encompasses the rules of conduct:
1. That have been approved by the government, and
2. Which are in force over a certain territory, and
3. Which must be obeyed by all persons on that
territory. Violation of these rules could lead to
government action such as imprisonment or fine or
an Order to pay compensation.
233. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
234. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cyber crimes
These are unlawful acts where the computer is
used either as a tool or a target or both. The
enormous growth in electronic commerce (e-
commerce) and online share trading has led to
a phenomenal spurt in incidents of cyber
crime.
235. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Electronic signatures
These are used to authenticate electronic
records. Digital signatures are one type of
electronic signature. Digital signatures satisfy
three major legal requirements – signer
authentication, message authentication and
message integrity. The technology and
efficiency of digital signatures makes them
more trustworthy than hand written signatures.
236. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Intellectual property
These refer to creations of the human mind e.g. a
story, a song, a painting, a design etc. The facets
of intellectual property that relate to cyber space
are covered by cyber law. These include:
copyright law in relation to computer software,
computer source code, websites, cell phone content
etc,
software and source code licenses
trademark law with relation to domain names, meta
tags, mirroring, framing, linking etc
semiconductor law which relates to the protection of
semiconductor integrated circuits design and layouts,
patent law in relation to computer hardware and
software.
237. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Data protection and privacy laws
These laws aim to achieve a fair balance
between the privacy rights of the individual
and the interests of data controllers such as
banks, hospitals, email service providers etc.
These laws seek to address the challenges to
privacy caused by collecting, storing and
transmitting data using new technologies.
238. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Strategic advantage and IT
Problems and Prospects of Computerization
Selection of Hardware and Software
Managing the changes of IT
Strategic role of IT and Emerging
issues
Unit
V
239. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.1What is strategic
advantage?
Strategic advantage is the result of using
organizational capability measured in financial
terms by profitability, shareholder value etc.
and in non financial terms by market share,
reputation etc.
Competitive advantage exists when there is
match between the distinctive competencies of
a firm and the critical success factors within its
industry that permits the firm to outperform
competitors. Information technology helps the
organizations gain competitive advantage in
240. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Becoming low-cost producer
2. Creating new products and services
3. Focus on market niche
4. Linking with new customers and suppliers
5. Managing value chain.
6. Creating strategic alliances
241. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Become Low-cost producer
Information systems reduce cost by focusing
on
Internal operations
Management planning and control and
Human resources
Reduced cost helps in increasing profit.
Many low cost producing organizations use
information technology as a dynamic and
intensive way rather than a mere management
tool
242. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2.Create new Products and
services
IT is used as a tool to prevent duplication.
IT helps in creating differentiated products and
services and this in turn raises market entry
cost for competitors.
243. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
3.Focus on Market Niche
IT helps in improving marketing techniques.
An organization can penetrate the market by
carefully examining transactions with
customers.
It enables the business to win more from
profitable customers ,turns non profitable
customers to profitable or drop outs.
244. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Linking with Customers and
Suppliers
IT Systems help the organization to follow Just
in time supply method and stock less inventory
method.
The first method shifts all inventory
responsibilities to the distributor who manages
the supply flow. The second helps in winning
customer loyalty by providing cheap and best
goods on time.
246. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
contd…
IT and information systems that have strategic
impact helps the organization to provide
products or services of higher value at the
same price or of the same value at the lower
price.
247. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
6. Creating Strategic Alliances
Strategic alliance is the combination of two or
more organizations to create competitive
advantage.
Information Technology links two independent
organizations to share skills, costs and access
to another’s market.
The role of IT is crucial in these type of
relations.
Such strategic alliances are recently coined as
information partnerships.
248. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.2 Issues on Hardware and
Software
The systems come with hardware, software
and support. Today, selecting a system is a
serious and time-consuming business.
There are several factors to consider prior to
system selection . They are discussed below.
Procedure for hardware software
selection
249. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
1. Define the system capabilities
Computers have proven valuable to business in the
following areas :
Cost reduction includes reduction of the inventory,
savings on space and improved ability to predict
business trends
Cost avoidance includes early detection of problems
and ability to expand operations without adding
clerical help.
Improved service emphasizes quick availability of
information to customers, improved accuracy and fast
turnaround
Improved profit reflects the bottom line of the
business and its ability to keep receivables within
reason.
250. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
2. Specify the magnitude of the problem
It refers to clarify whether selections consist of
a few peripherals or major decision concerning
the mainframes.
3. Assess the competence of the in-house staff
This involves determining the expertise
needed in areas such as telecommunications
and data base design. Acquiring a computer
often results in securing temporary help for
conversion. Planning for this help is extremely
important.
251. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
4. Consider hardware and software as a package.
This approach ensures compatibility. In fact,
software should be considered first, because
often the user secures the hardware and then
wonders what software is available for it.
5. Provide user indoctrination.
This is crucial, especially for first-time users.
Selling the system to the user staff, providing
adequate training, and preparing an
environment a conductive to implementation
are pre- requisites for system acquisition.
252. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Other Criteria for selection of Hardware
1. System Availability
2. Compatibility
3. Cost
4. Performance
5. Support
6. Usability
1. The programming
language and its
suitability to the
applications
2. Ease of Installation
and training
3. Extent of
enhancements to be
made prior to
installation.
Hardware Software
253. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Major phases in Hardware/Software
selection
The selection process should be viewed as a project,
and a project team should be organized with
management support. In larger projects, the team
includes one or more user representatives, an analyst
and EDP auditor, and a consultant. Several steps
make up the selection process:
1. Requirement Analysis
2. System Specification
3. Request for proposals (RFP)
4. Evaluation and validation
5. Vendor Selection
6. Post Installation Review
254. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.3 Problems and prospects
of computerization
Problems
IT systems development problems
IT security challenges
Ethical and social problems
Global business challenges
255. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
IT Systems development problems
Managers have to realign their strategies
business strategies and information systems to
environmental requirements.
They face the challenge of developing
dynamic information systems.
256. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
IT security challenges
• Use of internet and other types of computer
networks has become common.
• Security challenges also have multiplied
manifold
• Effective provisions have to be made to face
these problems
257. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Ethical and social problems
Privacy rights
Intellectual property rights
Employment challenges
Quality of work life
Health issues
258. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Prospects of computerization
1. Organization
2. Self-Sufficiency
3. Cost-Effective
4. Speed
5. Cheaper Research and Development
6. Sales
259. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Organization: Computers allow the application
of different types of software that can help
businesses keep track of their files,
documents, schedules and deadlines.
Computers also allow businesses to organize
all of their information in a very accessible
manner. The ability to store large amounts of
data on a computer is convenient and
inexpensive, and saves space. A computer's
ability to allow a company to organize its files
efficiently leads to better time management
and productivity.
260. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Self-Sufficiency: Computers have made staff and
companies more self-sufficient by allowing them
to do tasks that previously had to be outsourced.
For example, a company can now use office
software to create their own training material.
Desktop publishing software can be used to
create marketing materials. Online tax and
accounting programs allow companies to prepare
their own taxes. This allows the dominant
operations of a company to remain in-house and
empowers the company to become more
independent and less susceptible to errors
committed by outside parties.
261. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cost-Effective: Emerging technology makes new
tools and services more affordable and allows
companies to save on their staff payroll and office
equipment. Because computers allow work to be
done faster and more efficiently, it is possible for a
company to hire fewer staff. In addition, with
networked and relatively inexpensive computers,
companies can store data more easily, saving on
the cost of outside file storage, and can avoid
having to purchase as many copiers, fax
machines, typewriters, and other such items that
were used before computers became popular.
Contd….
262. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Correspondingly, potentially profitable
businesses can be started with a smaller
overhead cost. Email capabilities decrease
postage costs; software applications reduce
the need for large accounting departments,
while videoconferencing reduces the need for
travel. All resources saved will trickle down to
the consumers, who are then provided with
much more affordable products and service.
263. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Speed: Computers help speed up other
business operations. The collecting of
consumer feedback, ordering of raw materials,
and inspection of products is made quicker
through the use of computers, allowing
companies to operate much faster and to
produce better quality results.
264. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Cheaper Research and Development: R&D, or
research and development, costs will also
decrease with the help of computers. Scientific
research can now be done using the Internet
and computer software applications designed
to develop and produce new products and
services. For example, instead of a company
having to do in-person focus groups on a
potential new product or to determine their
target market, the company can conduct a
widespread online survey for a far lower cost.
Contd….
265. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
In addition, new models of a product can be
created online using virtual pictures and
drawings instead of having to be hand-drawn.
These interactive models created using
software programs can help bring the product
and its features to life for a far lower cost than
creating an actual physical model of the given
product.
266. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Sales: Computers can help generate higher
sales and profits for businesses via a company
website. Many businesses now operate online
and around the clock to allow customers from
around the world to shop for their products and
services.
267. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
5.4 MANAGING THE CHANGES
OF IT
It means managing the process of
implementing major changes in IT, business
processes, organizational structures, and job
assignments to reduce the risks and costs of
change, and to optimize its benefits.
268. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
What Does Change Management Require?
A commitment from top management and an
organizational design to plan the future of IT
and Information Systems within the business.
Change management involves analyzing and
defining all changes facing the organization,
and developing programs to reduce the risks
and costs, and to maximize the benefits of
change.
``
269. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
End User Resistance
New ways of doing things creates resistance
among employees.
This is the biggest obstacle to the implementation
of new information systems.
End User Implications
Dealing with end user resistance:
Proper education and training.
Direct end user participation before
implementation helps ensure that the end users
assume ownership of a system, and that its
design meets their needs.
270. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Reengineering a Business Process
Develop a change action plan.
Assign selected managers as change sponsors.
Develop employee change teams.
Encourage open communications and feedback
about organizational changes.
271. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Change Management Activities
Human resource management handles activities -
Such as
developing innovative ways to measure, motivate,
and reward performance.
Program - Design a way to recruit and train
employees in the core competencies required in a
changing workplace.
272. AP SHAREEF’S LECTURE ON IT FOR MANAGERS
Recommendations of Consultants
Involve as many people as possible in
reengineering and other change programs.
Make constant change part of the culture.
Tell everyone as much as possible about
everything as often as possible, preferably in
person.
Make liberal use of financial incentives and
recognition.
Work within the company culture, not around it.