Computers For Managers Notes
Computers For Managers Notes
CREDIT UNITS : 3
EXAMINATION SCHEME
INTERNALS. = 30
END TERM EXAMINATION = 70
TOTAL = 100
COURSE CONTENTS
MODULE 3. : E COMMERCE
MODULE 4 : ERP
MODULE 5 : DBMS
World of Computers
Generations of computers
• The history of computers is often referred to in terms of generations
• Each new generation is characterized by a major technological
development
• Pre computers and early computers (before 1946)
– Abacus, slide rule, mechanical calculator
– Punch Card Tabulating Machine and Sorter
• First-generation computers (1946-1957)
– Enormous and powered by vacuum tubes
– Used a great deal of electricity, and generated a lot of heat
– ENIAC and UNIVAC
• Second-generation computers (1958-1963)
– Used transistors
– Computers were smaller, more powerful, cheaper, more
energy-efficient, and more reliable
– Punch cards and magnetic tape were used to input and store
data
– Computers Then and Now
• Third-generation computers (1964-1970)
– Used integrated circuits (ICs)
– Keyboards and monitors introduced
• Fourth-generation computers (1971-present)
– Use microprocessors
– IBM PC, Apple Macintosh
– Use keyboards, mice, monitors, and printers
– Use magnetic disks, flash memory, and optical disks for
storage
– Computer networks, wireless technologies, Internet
introduced
– Computers Then and Now
• Fifth-generation (now and the future)
– Infancy stage
– No precise classification
– May be based on artificial intelligence (AI)
– Likely use voice and touch input
– May be based on optical computers and utilize
nanotechnology
Hardware
• Hardware: The physical parts of a computer
– Internal hardware
• Located inside the main box (system unit) of the
computer
– External hardware
• Located outside the system unit
• Connect to the computer via a wired or wireless
connection
– There is hardware associated with all five computer
operations
• Input devices
– Used to input data into the computer
– Keyboards, mice, scanners, cameras, microphones,
joysticks, touch pads, touch screens, fingerprint readers, etc.
• Processing devices
– Perform calculations and control computer’s operation
– Central processing unit (CPU) and memory
• Output devices
– Present results to the user
– Monitors, printers, speakers, projectors, etc.
• Storage devices
– Used to store data on or access data from storage media
– Hard drives, CD/DVD discs and drives, USB flash drives, etc.
• Communications devices
– Allow users to communicate with others and to electronically
access remote information
– Modems, network adapters, etc.
Software
• Software: The programs or instructions used to tell the computer
hardware what to do
– System software: Operating system starts up the computer
and controls its operation
• Without OS computer cannot function
• Boots the computer and launches programs at the
user’s direction
• Most use a GUI to interact with the user via windows,
icons, menus, buttons, etc.
• Windows, Mac OS, Linux, etc.
•
• Application Software
– Application software: Performs specific tasks or applications
• Creating letters, budgets, etc.
• Managing inventory and customer databases
• Editing photographs
• Scheduling appointments
• Viewing Web pages
• Sending and receiving e-mail
• Recording / playing CDs/DVDs
• Designing homes
• Playing games
• Computer users (end users): People who use a computer to obtain
information
• Computer professionals include:
– Programmers
– Systems analysts
– Computer operations personnel
– Security specialists
Types of Networks
• Networks can be classified in terms of their topologies ,or physical
arrangement
• Common network Topologies
• Star network: Typically consists of a central device ( Hub, switch ,
or router) to which all these computers are and other devices in the
network connect forming a star shape
• Ring networks: Do not have a central hub ,but the computers and
other devices are connected in a ring formation from one device to
the next. Data travels in one direction only
• Bus network: Does not have a central hub. Instead it consists of a
central cable to which all the network cables are attached .
• Mesh network : Each computer or network device is connected to
all other devices
• Combination topologies: Some networks do not confine to a single
topology. Some networks combine topologies . E.g. Two star
networks may be joined by a bus line
Star ,Ring and Bus networks-Advantages and Disadvantages
• A star network is considerably less reliable than a ring network,
since the other computers are heavily dependant on the central
host computer . If it fails there is no back up and processing and
communication capability, and local computers are cut of from
each other
• Ring networks are considered to be more reliable and less costly
for the type of communications in Local area network. If one
computer goes down in the network the other computers can
continue to process their own work and continue to communicate
with each other
Network Architecture
• Architecture : They way they are designed to communicate .
• Client Server Networks : Include both clients (PC,s and other
devices that request and utilize the network resources) and
servers( computers that are dedicated to Processing client
requests )
• Peer to Peer Networks : A central server is not used . Instead all
the computers on the network work at the same level
LAN’s WAN’s and other types of networks
• A Local Area Network (LAN) is a network that covers a relatively
small geographical area, such as a building ,college, or an office
building .
• Wide Area Network:(WAN) Is a network that covers a large
geographical area. Typically a WAN could consist of 2 or more
LAN’s. A WAN can be a private owned or a public network
• Metropolitan Area MAN :A network designed for a city or a country
• Intranets and Extranets
• Virtual Private Network (VPN):is a private , secure path
communications network (usually the Internet) that is se up to
allow authorized users private , secure access to the company
network.
Internet addressing
• A way to locate computers people and resources on the internet
Host
• IP address or Domain Name uniquely identifies a computer on the
internet
• 32 bit IP address is used :
• URL: Uniform resource Locator : Identifies a web page
• A major concern for users
• Computer crime : An illegal act involving a computer including:
1. Breaking through the security of a network
2. Theft of financial assets
3. Manipulating data for personal advantage
4. Act of sabotage: e.g. Releasing a computer virus or shutting down
a web server
• Unauthorized access: Gaining access to a computer network or file
, or other resource without permission
• Unauthorized Use: Using a computer for unauthorized activities
• Hacking: The act of breaking into another computer system
WI FI hacking : Gaining free access to the internet via a Wi Fi
network( War driving or Wi Fi piggy banking
Interception of communications : Gaining
unauthorized access to data s it is being sent over the internet. Once
intercepted the contents can be read , altered or otherwise used for
unintended purpose
• Computer sabotage :Acts of malicious destruction to a computer
resource
• BOT: A PC that is controlled by a computer criminal- could be
used to send spam, launch internet attacks and malware
• Malware(Malicious software program
Computer Virus : Malicious program embedded in a file that is designed
to cause harm to a computer system.
Computer worm : Malicious programs designed to spread rapidly by
sending copies of itself to other computers
Trojan Horse: Malicious program that masquerades as something else
E-COMMERCE
BRP
*Automation
refers to computerizing processes to speed up the existing tasks.
Improves efficiency and effectiveness.
*Rationalization of Procedures
refers to streamlining of standard operating procedures, eliminating
obvious bottlenecks, so that automation makes operating procedures
more efficient.
improves efficiency and effectiveness.
Business Process Reengineering
refers to radical redesign of business processes.
Aims at
eliminating repetitive, paper-intensive, bureaucratic tasks
reducing costs significantly
improving product/service quality.
Paradigm Shift
refers to a more radical form of change where the nature of business
and the nature of the organization is questioned.
improves strategic standing of the organization.
Business Process Reengineering
“Reengineering is the fundamental rethinking and radical redesign
of business processes to achieve dramatic improvements in critical,
contemporary measures of performance such as cost, quality,
service, and speed.”
Key Word
Fundamental
Why do we do what we do?
Ignore what is and concentrate on what should be.
Radical
Business reinvention vs. business improvement
Dramatic
Reengineering should be brought in “when a need exits for
heavy blasting.”
Companies in deep trouble.
Companies that see trouble coming.
Companies that are in peak condition.
Business Process
a collection of activities that takes one or more kinds of
inputs and creates an output that is of value to a customer.
What is a Process?
A specific ordering of work activities across time and space, with a
beginning, an end, and clearly identified inputs and outputs: a
structure for action.
Summary
Reengineering is a fundamental rethinking and redesign of business
processes to achieve dramatic improvements
BPR has emerged from key management traditions such as scientific
management and systems thinking
Rules and symbols play an integral part of all BPR initiatives
Summary
Don’t assume anything - remember BPR is fundamental rethinking of
business processes
EIS
Summary
• Data - one of the most valuable resources a firm possesses.
• Entity - a generalized class of objects for which data is collected,
stored, and maintained.
• Attribute - a characteristic of an entity.
• DBMS - a group of programs used as an interface between a
database and application programs.
MODULE 6
The modern history of office automation began with the typewriter and
the copy machine, which mechanized previously manual tasks. Today,
however, office automation is increasingly understood as a term that
refers not just to the mechanization of tasks but to the conversion of
information to electronic form as well. The advent of the personal
computer revolutionized office automation, and today, popular operating
systems and user interfaces dominate office computer systems. This
revolution has been so complete, and has infiltrated so many areas of
business, that almost all businesses use at least one commercial
computer business application in the course of daily activity. Even the
smallest companies commonly utilize computer technology to maintain
financial records, inventory information, payroll records, and other
pertinent business information. "Workplace technology that started as
handy (but still optional) business tools in the 1980s evolved into a high-
priority requirement in the 1990s," summarized Stanley Zarowin
in Journal of Accountancy. "As we enter the new millennium, it has taken
another quantum leap, going from a priority to a prerequisite for doing
business."
Information Storage
The first area within office automation is information storage which is
usually considered to include office records and other primary office
forms and documents. Data applications involve the capture and editing
of files, images, or spreadsheets. Word processing and desktop
presentation packages accommodate raw textual and graphical data,
while spreadsheet applications provide users with the capacity to
engage in the easy manipulation and output of numbers. Image
applications allow the capture and editing of visual images.
Text handling software and systems cover the whole field of word
processing and desktop publishing. Word processing, the most basic
and common office automation activity, is the inputting (usually via
keyboard) and manipulation of text on a computer. Today's commercial
word processing applications provide users with a sophisticated set of
commands to format, edit, and print text documents. One of the more
popular features of word processing packages is its preformatted
document templates. Templates automatically set up such things as font
size, paragraph styles, headers and footers, and page numbers so that
the user does not have to reset document characteristics every time he
or she creates a new record.
Data Exchange
Data Management
Office automation systems are also often used to track both short-term
and long-term data in the realms of financial plans, workforce allocation
plans, marketing expenditures, inventory purchases, and other aspects
of business. Task management or scheduling systems monitor and
control various projects and activities within the office. Electronic
management systems monitor and control office activities and tasks
through timelines, resource equations, and electronic scheduling.
OFFICE AUTOMATION CONSIDERATIONS: PEOPLE, TOOLS, AND
THE WORKPLACE
Businesses engaged in launching or upgrading office automation
systems must consider a wide variety of factors that can influence the
effectiveness of those systems. These factors include budgetary and
physical space considerations, and changes in communication
infrastructure, among others. But two other factors that must be
considered are employee training and proliferating office automation
choices:
Ans : Advantages
Drawbacks:
1. Data redundancy
2. Program dependence
3. Inflexibility
4. Poor data security
5. Lack of data integration
Bus Network
-Advantages
Easy to implement and extend
Well suited for temporary networks (quick setup)
Initially less expensive than other topologies
Cheap
-Disadvantages
Difficult to administer/troubleshoot.
Limited cable length and number of stations.
If there is a problem with the cable, the entire network goes down.
Maintenance costs may be higher in the long run.
Performance degrades as additional computers are added or on
heavy traffic.
Low security (all computers on the bus can see all data
transmissions).
One virus in the network will affect all of them (but not as badly as
a star or ring network).
Proper termination is required.(loop must be in closed path).
If one node fails, the whole network will shut down.
If many computers are attached, the amount of data flowing
causes the network to slow down.
Ring Network
–Advantages
Data is quickly transferred without a ‘bottle neck’. (very fast, all
data traffic is in the same direction)
The transmission of data is relatively simple as packets travel in
one direction only.
Adding additional nodes has very little impact on bandwidth
It prevents network collisions because of the media access method
or architecture required.
-Disadvantages
Data packets must pass through every computer between the
sender and recipient therefore this makes it slower.
If any of the nodes fail then the ring is broken and data cannot be
transmitted successfully.
It is difficult to troubleshoot the ring.
Because all stations are wired together, to add a station you must
shut down the network temporarily.
In order for all computers to communicate with each other, all
computers must be turned on.
Total dependence upon the one cable
Star Network
-Advantages
Good performance
easy to set up and to expand. Any non-centralised failure will have
very little effect on the network, whereas on a ring network it would all
fail with one fault
-Disadvantages
Expensive to install
Extra hardware required
Yes, we're talking about "protocols" which are set of rules that help in
governing the way a particular technology will function for
communication. In other words, it can be said that the protocols are
digital languages implemented in the form of networking algorithms.
There are different networks and network protocols, user's use while
surfing.
Consumer - to - Consumer
A website following the C2C business model helps consumers to sell
their assets like residential property, cars, motorcycles, etc., or rent a
room by publishing their information on the website. Website may or
may not charge the consumer for its services. Another consumer may
opt to buy the product of the first customer by viewing the
post/advertisement on the website.
Consumer - to - Business
In this model, a consumer approaches a website showing multiple
business organizations for a particular service. The consumer places an
estimate of amount he/she wants to spend for a particular service. For
example, the comparison of interest rates of personal loan/car loan
provided by various banks via websites. A business organization who
fulfills the consumer's requirement within the specified budget,
approaches the customer and provides its services.
Business - to - Government
B2G model is a variant of B2B model. Such websites are used by
governments to trade and exchange information with various business
organizations. Such websites are accredited by the government and
provide a medium to businesses to submit application forms to the
government.
Government - to - Business
Governments use B2G model websites to approach business
organizations. Such websites support auctions, tenders, and application
submission functionalities.
Government - to - Citizen
Governments use G2C model websites to approach citizen in general.
Such websites support auctions of vehicles, machinery, or any other
material. Such website also provides services like registration for birth,
marriage or death certificates. The main objective of G2C websites is to
reduce the average time for fulfilling citizen’s requests for various
government services.
**
Advantage of DBMS
The more users access the data, the greater the risks of data
security breaches.Corporations invest considerable amounts of
time, effort, and money to ensure that corporate data are used
properly.
A DBMS provides a framework for better enforcement of data
privacy and security policies.
Disadvantage of DBMS
1. Increased costs:
2. Management complexity:
3. Maintaining currency:
**]] what is hacking and what are the steps taken to prevent hacking
Mail merging means to plug data from an address table into form letters,
e-mail messages, envelopes, address labels, or a directory (a list or
catalog, for example). To start a mail merge, choose Tools | Letters and
Mailings | Mail Merge Wizard to open the Mail Merge task pane. Step 1:
Select a Document Type The first step is to select what Word calls a
“document type” in the Mail Merge task pane, what kind of mail-merge
you want to undertake: form letters, e-mail messages, envelopes for
mass-mailings, labels for mass-mailings, or a directory (a list or catalog).
Choose an option button and click Next at the bottom of the task pane to
go to step 2. Step 2: Select a Starting Document What Word calls the
“starting document” is the document in which the merging takes place. In
other words, the address or other data you retrieve will land in the
document you choose or create now. You can create a new start
document or use an existing one. In the case of labels and envelopes,
you tell Word what size labels or envelopes you intend to print on. In the
case of form letters, e-mail messages, and directories, you supply the
text either by making use of a document you’ve written already or writing
a new document. Step 3: Select Recipients In step 3, you tell Word
where to get the data that you will merge into the starting document you
created or supplied in step 2. You can retrieve the data from a table in a
Word document, an Access database table or query, or the address
book or contact list where you store your addresses. You can also create
a new list for the data if you haven’t entered the data in a file yet. Step 4:
Write/Arrange Your Document In step 4, you insert the merge fields, the
parts of the starting document that differ from recipient to recipient. By
inserting merge fields, you tell Word where to plug information from the
data source into the starting document. You also tell Word which data to
take from the data source. Word offers special tools for entering an
address block – the recipient’s address, including his or her name,
company, title, street address, city, and zip code. Step 5: Preview Your
Document In step 5, you get a chance to see what your form letters, e-
mail messages, envelopes, labels, or directory will look like after they are
printed or sent. In this step, you find out what the document will look like
when real data is plugged into it. If something is amiss in the document,
you can click the Previous link to return to step 4, the Write/Arrange your
document task pane, and make changes there. Step 6: Complete the
Merge Step 6 is where you complete the merge by either printing a new
document or saving the new file and printing it later. By saving the
merged data in a new file, you can edit the file before printing it. In the
case of e-mail messages, you click the Electronic Mail link to tell Word to
send the e-mail messages. Preparing and Selecting the Data Source
The data source is the file where the addresses and other information is
kept. Step 3 of the mail-merge procedure calls for you to name your data
source, and before you name it, make sure that it is in good working
order. The data source can be any number of things, as mentioned
above. Word also offers a special dialog box for creating a data source
from scratch and storing it in Microsoft Access.
1. Input Unit
2. Output Unit
3. Storage Unit
4. Arithmetic Logic Unit
5. Control Unit
Computer architecture is a specification describing how hardware and
software technologies interact to create a computer platform or system.
When we think of the word architecture, we think of building a house or a
building. Keeping that same principle in mind, computer architecture
involves building a computer and all that goes into a computer system.
Computer architecture consists of three main categories.
2. What are generations of computers ? explain ?
1. Home Budget
2. Computer games
3. Entertainment
4. Information
5. Communication