0% found this document useful (0 votes)
26 views10 pages

Unit 1 Comp

Uploaded by

65kzmdy4xr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views10 pages

Unit 1 Comp

Uploaded by

65kzmdy4xr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

PGDM 207 - COMPUTER FUNDAMENTALS AND APPLICATIONS IN

MANAGEMENT
UNIT 1: INTRODUCTION TO COMPUTERS AND WORLD WIDE WEB
CLASS 1
1. Introduction to computers
What is a computer?
A computer is an electronic device, operating under the control of instructions (software) stored
in its own memory unit, that can accept data (input), manipulate data (process), and produce
information (output) from the processing. Generally, the term is used to describe a collection
of devices that function together as a system.
Types of Computers
On the basis of Computing Power & Size:
Laptop / Desktop
Mini Computer
Mainframe
Super Computer
What Does a Computer Do?
Computers can perform four general operations, which comprise the information processing
cycle.
• Input
• Process
• Output
• Storage
Why Is a Computer So Powerful?
• The ability to perform the information processing cycle with amazing speed.
• Reliability (low failure rate).
• Accuracy.
• Ability to store huge amounts of data and information.
• Ability to communicate with other computers.
What Are the Primary Components Of a Computer?
• Input devices.
• Central Processing Unit (containing the control unit and the arithmetic/logic unit).
• Memory.
• Output devices.
• Storage devices.
Advantages of Using Computers
• Speed: Computers can carry out instructions in less than a millionth of a second.
• Accuracy: Computers can do the calculations without errors and very accurately.
• Diligence: Computers are capable of performing any task given to them repetitively.
• Storage Capacity: Computers can store large volume of data and information on
magnetic media.
Computer Software
Computer software is the key to productive use of computers. Software can be categorized into
two types:
• Operating system software
• Application software.
Computer Network
A Computer Network is interconnection of Computers to share resources.
Resources can be: Information, Load, Devices etc.
LAN, WAN, MAN
CLASS 2
Applications of computers in management
Computers play a pivotal role in various aspects of management across industries. Some key
applications of computers in management include:
• Data Management and Analysis: Computers facilitate the storage, organization, and
analysis of vast amounts of data. Management information systems (MIS) and
databases help store and retrieve information efficiently, enabling data-driven decision-
making.
• Project Management: Specialized software assists in planning, scheduling, and
monitoring projects. These tools help track tasks, allocate resources, manage budgets,
and facilitate collaboration among team members.
• Financial Management: Computers aid in financial analysis, accounting, and
bookkeeping. Accounting software automates tasks like payroll processing, invoicing,
and financial reporting, ensuring accuracy and compliance with regulations.
• Customer Relationship Management (CRM): CRM software allows businesses to
manage interactions with customers, track sales leads, and analyze customer data. This
helps in improving customer service and building stronger relationships.
• Human Resource Management: HR software assists in employee recruitment,
onboarding, performance management, and payroll processing. These systems maintain
employee records, automate HR processes, and facilitate workforce planning.
• Decision Support Systems: Computers aid managers in making informed decisions by
providing tools like simulations, forecasting models, and analytical tools. These
systems analyze data to generate insights for strategic planning.
• Risk Management: Computers assist in identifying, assessing, and mitigating risks
within organizations. Risk management software helps in analyzing potential risks,
compliance issues, and developing risk mitigation strategies.
• Business Intelligence and Reporting: Business intelligence tools generate reports,
dashboards, and visualizations to provide insights into business performance. These
tools assist managers in monitoring KPIs and making informed decisions.
Computers and technology have become integral to modern management practices, enhancing
efficiency, accuracy, and decision-making across various organizational functions. The
applications continue to evolve, offering new tools and capabilities that transform management
processes.
2. Categories of computers and their applications in business
Laptop/Desktop
Mini Computer
Main frame Computer
Super computer
Fundamentals of Computer Networks.
3. Types of software,
Operating Systems – types, characteristics.
4. World Wide Web - Introduction to Web Pages and Databases.
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites
or pages that users can access on their local computers and other devices through the internet.
These pages and documents are interconnected by means of hyperlinks that users click on
for information. This information can be in different formats, including text, images, audio and
video. The WWW is like a vast electronic book whose pages are stored or hosted on different
servers worldwide.
Is WWW same as Internet?
The term World Wide Web isn't synonymous with the internet. Rather, the World Wide Web is
part of the internet.
• The Hypertext Transfer Protocol (HTTP) is another key component of the WWW. It
enables users to access web pages by standardizing communications and data transfer
between the internet's servers and clients.
• Most web documents and pages are created using Hypertext Markup Language
(HTML), a text-based way of describing how content within an HTML file is
structured. HTML describes the structure of web pages using elements or tags and
displays the content of these pages through a web browser.
• To access one of these pages, a user and their client machine supply a universal
identifier to the web server via a browser. This identifier may be a uniform resource
locator (URL) or uniform resource identifier (URI) and is unique to each web page.
A collection of web pages belonging to a URL is called a website. For example,
www.techtarget.com is a website, while https://www.techtarget.com/whatis/definition/World-
Wide-Web is a web page.
How does the World Wide Web work?
Webpages are the primary component or building blocks of the WWW and are linked through
hyperlinks, which provide access from one specific spot in a hypertext or hypermedia
document to another spot within that document or a different one. Hyperlinks are another
defining concept of the WWW and provide its identity as a collection of interconnected
documents.
CLASS 3
Databases
A database is an organized collection of structured information, or data, typically stored
electronically in a computer system. A database is usually controlled by a database management
system (DBMS). Together, the data and the DBMS, along with the applications that are
associated with them, are referred to as a database system, often shortened to just database.
Data within the most common types of databases in operation today is typically modeled in
rows and columns in a series of tables to make processing and data querying efficient. The data
can then be easily accessed, managed, modified, updated, controlled, and organized. Most
databases use structured query language (SQL) for writing and querying data.
Spreadsheets
Microsoft excel
What’s the difference between a database and a spreadsheet?
Databases and spreadsheets (such as Microsoft Excel) are both convenient ways to store
information. The primary differences between the two are:
• How the data is stored and manipulated
• Who can access the data
• How much data can be stored
Spreadsheets were originally designed for one user, and their characteristics reflect that.
They’re great for a single user or small number of users who don’t need to do a lot of incredibly
complicated data manipulation. Databases, on the other hand, are designed to hold much larger
collections of organized information—massive amounts, sometimes. Databases allow multiple
users at the same time to quickly and securely access and query the data using highly complex
logic and language.
Types of databases
There are many different types of databases. The best database for a specific organization
depends on how the organization intends to use the data.
• Relational databases: Relational databases became dominant in the 1980s. Items in a
relational database are organized as a set of tables with columns and rows. Relational
database technology provides the most efficient and flexible way to access structured
information.
• Distributed databases: A distributed database consists of two or more files located in
different sites. The database may be stored on multiple computers, located in the same
physical location, or scattered over different networks.
• Data warehouses: A central repository for data, a data warehouse is a type of database
specifically designed for fast query and analysis.
• Cloud databases: A cloud database is a collection of data, either structured or
unstructured, that resides on a private, public, or hybrid cloud computing platform.
There are two types of cloud database models: traditional and database as a service
(DBaaS). With DBaaS, administrative tasks and maintenance are performed by a
service provider.

5. What is netiquette,
Netiquette is a made-up word from the words net and etiquette (the rules of polite and correct
behaviour). Netiquette thus describes the rules of conduct for respectful and appropriate
communication on the internet.
Netiquette is often referred to as etiquette for the internet. These are not legally binding rules,
but recommended rules of etiquette. Netiquette is mostly used for dealing with unknown people
on the internet. The rules of netiquette very depending on the platform and its participants.
Generally, it is up to the operator of a website or communication app to specify the type and
scope of netiquette. It is also their responsibility to monitor compliance with these basic rules
and to penalize violations of them
Below you will find a few general recommendations for conduct on the internet that you should
follow when communicating online.
• Stick to the rules of conduct online that you follow in real life
When communicating online, remember the rules of etiquette that you follow in your everyday
life. Refrain from insulting, provoking, threatening or insulting others. Respect the opinions of
your chat counterparts and express constructive criticism. Remember that you can be
prosecuted for insulting people online.
• Present your best side online
Communication on the internet comes with a certain anonymity that does not exist in real life
when you are talking to someone face to face. Often this anonymity leads to a lower inhibition
threshold for many users and they behave rudely online if, for example, you disagree with
them.
Make sure that you show your best side online. Remain friendly and respectful, even if you
disagree. Good netiquette is characterized by respect, politeness and professionalism.
• Pay attention to grammar and punctuation
Take time to read through your answers again. Check them for grammar, punctuation and
correct spelling. It can be very frustrating for the other person if they have to decipher poorly
written sentences in order grasp the meaning behind them. In addition, faulty grammar distracts
from the goal of your message.
Grammar, spelling and punctuation become especially important when composing emails or
other correspondence that you submit to colleagues or superiors. If you have a weakness in
grammar and spelling, don't be discouraged. Use spelling aids before you send messages.
Tip: When composing emails, always remember to use the appropriate salutation and parting
formula as well. These are also part of netiquette.
• Respect the privacy of others
This rule should be followed not only in everyday use of online communication, but also at
work. Do not simply forward information that has been sent to you without first obtaining
permission from the original sender. When sending private emails to multiple recipients, use
BCC (blind carbon copy) instead of CC (carbon copy). Many people do not like their names
and email addresses being passed on to people they do not know themselves.
This rule on the internet also applies to uploading and sharing photos or videos that show other
people. Before circulating such private files, be sure to check with the people concerned before
doing so.
Last but not least: Respect the privacy of others and do not sign up for newsletters, forums or
the like with someone else's name or email address.
• Respect the time and bandwidth of others
We live in a much faster world than our parents or grandparents are used to. Information can
be sent to different people around the world in a matter of seconds – and without much effort.
Nevertheless, the bandwidth, that is to say the information capacity of wires and channels, is
limited. It is similar with humans. Think of this limited receptivity of information when you
send messages to your friends, colleagues or superiors.
Do you get to the point quickly enough in your emails? Are your arguments formulated
correctly and clearly recognizable? No one wants to waste time unnecessarily on an email
whose core message is only at the end of the email. That consumes time and effort, and is
simply annoying. Also, consider who really needs to be on the list of recipients. After all,
respect for other people's time and bandwidth is also part of netiquette.
• Don't abuse your power
On the internet, as in real life, some people have more power than others. Moderators in a
forum, experts in companies or system administrators. If you have more power than others,
you do not have the right to exploit this power.
Don't spy on colleagues or chat participants just because you have the technical means to do
so. For example, system administrators should never read private emails or find out about the
salary structure in the company.
• Use a neutral nickname
Make sure that your child uses a neutral nickname in chat rooms. This should under no
circumstances reveal your child's identity. In addition, a neutral nickname ensures that other
people do not feel insulted or ridiculed.

CLASS 4
Basic services over Internet
Internet services refer to the services needed for accessing or exchanging a large amount of
data, including audio clips, videos, texted files, images, various such documents, and so on.
Also, these internet services are beneficial in attaining connectivity to the internet. Along with
this, data can be shared using Internet servers through Internet services. Thus, some of the
commonly utilized Internet services include the following:
• Communication Services: Chat, Email, VoIP, Video Call
• Services for Retrieval of Information: Net Surfing. procedure for attaining access to the
information or data stored over the internet.
• Transferring the files: Exchanging data files across computer-based systems.
• World Wide Web Services:
• Web Services: Security and standards
• Directory Services: Used to share printers data servers. Eg: DNS
• Automatic Network Address Configuration: Gives unique IP address to each device
connecting to the internet.
• Network Management Services: Diagnosis tools. Eg: Ping, traceroute.
• E-commerce: Online businesses.
URL: uniform resource locator

DOMAIN NAMES:
A domain name serves as the user-friendly identifier for accessing a specific website on the
internet. It's the recognizable text that people type into a browser's address bar to navigate to a
particular web location. Behind the scenes, every device connected to the internet, including
websites, has an associated numerical IP address. For instance, the domain name for Google is
‘google.com’.
What is the difference between a domain name and a URL?
A uniform resource locator (URL), sometimes called a web address, contains the domain name
of a site as well as other information, including the protocol and the path. For example, in the
URL ‘https://cloudflare.com/learning/’, ‘cloudflare.com’ is the domain name, while ‘https’ is
the protocol and ‘/learning/’ is the path to a specific page on the website.
Top-level domain
Each part of a domain name contains certain information. The first field is the host name,
identifying a single computer or organization. The last field is the top-level domain, describing
the type of organization and occasionally country of origin associated with the address.
Top-level domain names include:
.com Commercial
.edu Educational
.gov US Government
.int Organization
.mil US Military
.net Networking Providers
.org Non-profit Organization

Domain name country codes include, but are not limited to:
.au Australia
.de Germany
.fr France
.nl Netherlands
.uk United Kingdom
.us United States
Web Browsers
A web browser is an application for accessing websites and the Internet. When a user requests
a web page from a particular website, the browser retrieves its files from a web server and then
displays the page on the user's screen.
Internet Basics
What is the Internet?
The Internet is a worldwide telecommunications system that provides connectivity for millions
of other, smaller networks; therefore, the Internet is often referred to as a network of networks.
It allows computer users to communicate with each other across distance and computer
platforms.
The Internet began in 1969 as the U.S. Department of Defense's Advanced Research Project
Agency (ARPA) to provide immediate communication within the Department in case of war.
Computers were then installed at U.S. universities with defense related projects. As scholars
began to go online, this network changed from military use to scientific use. As ARPAnet grew,
administration of the system became distributed to a number of organizations, including the
National Science Foundation (NSF). This shift of responsibility began the transformation of
the science oriented ARPAnet into the commercially minded and funded Internet used by
millions today.
The Internet acts as a pipeline to transport electronic messages from one network to another
network. At the heart of most networks is a server, a fast computer with large amounts of
memory and storage space. The server controls the communication of information between the
devices attached to a network, such as computers, printers, or other servers.
An Internet Service Provider (ISP) allows the user access to the Internet through their server.
Many teachers use a connection through a local university as their ISP because it is free. Other
ISPs, such as America Online, telephone companies, or cable companies provide Internet
access for their members.
You can connect to the Internet through telephone lines, cable modems, cellphones and other
mobile devices.
Ethical use of IT tools
What are IT Tools? Software, hardware, communication tools, web browsers, Business tools
(Enterprise Resource Planning (ERP), Project Management Tools) etc.
Ethical use of IT tools involves responsible and conscientious behavior when utilizing
technology.
Web/Google Searching
Google Search works in three stages, and not all pages make it through each stage:
• Crawling: Google downloads text, images, and videos from pages it found on the
internet with automated programs called crawlers.
• Indexing: Google analyzes the text, images, and video files on the page, and stores the
information in the Google index, which is a large database.
• Serving search results: When a user searches on Google, Google returns information
that's relevant to the user's query.
When a search query is entered into a search engine by a user, all of the pages which are deemed
to be relevant are identified from the index and an algorithm is used to hierarchically rank the
relevant pages into a set of results.
In addition to the search query, search engines use other relevant data to return results,
including:
• Location – Some search queries are location-dependent e.g. ‘cafes near me’ or ‘movie
times’.
• Language detected – Search engines will return results in the language of the user, if it
can be detected.
• Previous search history – Search engines will return different results for a query
dependent on what user has previously searched for.
• Device – A different set of results may be returned based on the device from which the
query was made.
The algorithms used to rank the most relevant results differ for each search engine. For
example, a page that ranks highly for a search query in Google may not rank highly for the
same query in Bing.
Use of Google drives, folders, sheets for managerial support.

You might also like