0% found this document useful (0 votes)
311 views160 pages

All Part Computer

Uploaded by

marckentulang
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
311 views160 pages

All Part Computer

Uploaded by

marckentulang
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 160

Diploma in Business management

MODULE Information Technology in Business PPT 143

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management

Chapter 1: Introduction to computers

Objectives:
1. Recognize the importance of computer literacy

2. Identify the components of a computer 3. Discuss the uses of the Internet and World Wide Web 4. Identify the categories of software 5. Describe the categories of computers 6. Identify the types of computer users 7. Discuss various computer applications in society

Computer literacy: Also known as a digital literacy Computer are everywhere : o its is use at work, at school and at home o example: mobile devices (cell phone), news, weather report, sport scores, airline schedules, telephone directories, maps and directions, job listing, credits report, tutorial online, shares photo and video, files taxes, online shopping, email, book flights, share opinion. Involves having a current knowledge and understanding of computers and their uses. The requirements changes. of computer literacy changes as technology

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


What is Computer?

Electronic device operating under the control of instructions stored in its own memory Computer can accept data, process the data according to specified rules then produces results and store the results for future use.

Information processing cycle: Is a series of input, process, output, storage and communication activities Normally computer process data (input) into information (output) then its holds data, information and instruction in storage for future use. Instruction is a step that tells the computer how to perform a particular task.

Advantages and Disadvantages of using computers:

Advantages: 1. Speed: when data, instruction and information flow along electronic circuits in a computer, they travel at incredibly fast speeds. Many computers process billions or trillions of operations in a single second. 2. Reliability: the electronic components in modern computers are dependable and reliable because they rarely break or fail.
3. Consistency: Given the same input and processes, a computer will

produce the same results. 4. Storage: computers store enormous amounts of data and make this data available for processing anytime it is needed. 5. Communications: most computers today can communicate with other computer, often wirelessly.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 3

Diploma in Business management

Disadvantages: 1. Violation of privacy: where personal and confidential records were not protected properly, this privacy can be violated and stolen.
2. Public safety: Adults, teens, and children around the world are using

computers to share publicly their photos, videos, journals, music and other personal information. Some of these u suspecting, innocent computer users have fallen victim to crimes committed by dangerous strangers.
3. Impact

on labor force: Although computers have improved productivity and created an entire industry with hundreds of thousands of new jobs, the skills of millions of employees have been replaced by computers. injuries or disorders. Computer users can protect themselves from health risks through proper workplace design, good posture while at the computer and appropriately spaced work breaks. Another health risk. Called computer addiction, occurs when someone becomes obsessed with using the computer.

4. Health risk: prolonged or improper computer use can lead to health

5. Impact on environment: computer manufacturing processes and

computer waste are depleting natural resources and polluting the environment. Strategies that can help protect the environment include recycling, regulating manufacturing processes, extending the life of computers and immediately donating replaced computers.

The components of a computer A computer contains many electric, electronic and mechanical components known as HARDWARE. These components include input devices, output devices, a system unit, storage devices and communications devices.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


Input devices: Any hardware that allows user to enter data and instructions into a computer Example: keyboard, mouse, microphone, scanner, digital camera and web cam.

Output devices: Hardware component that conveys information to one or more people. Example: printer, monitor, speaker and portable media player.

System unit:

Is a case that contains electronic components of the computer used to process The data. The circuit of the system unit usually is part of or is connected to a circuit board called the motherboard Example of component in system unit: motherboard, RAM, ROM, battery, floppy disk, hard disk etc.

Storage devices: Storage hold data, instructions and information for future use and permanently Storage device records (write/ reads) items to and from storage media. ( storage media: physical material on which data, instruction and information are stored such as USB flash drives, hard disk, CDs, DVDs an d memory card) Storage device often function as a source of input because they transfer items from storage to memory.

USB flash drive:


o

Is a portable storage device that is small and lightweight enough to transported on a keychain or in a pocket.

o Its can hold about 2 billion characters.


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 5

Diploma in Business management


Hard disk: o Can hold more than 320 billion characters. o Much greater storage capacity than a USB flash drive. o Can use either inside of system unit or portable (external and removable). CD: o Hold data from 650 million to 1 billion characters o Can access using CD and DVD drives. DVD: o Store two full-length movies or 17 billion characters. o Can access using DVD drive. Memory card: o Use card reader/ writer to transfer stored item such as digital photos.

Communication devices:
o

Is a hardware component that enables a computer to send (transmit) and receive data, instruction and information to and from one or more computers.

o Example: modem o Communications occur over cables, telephone lines, cellular radio networks, satellites and other transmission media.

Network and Internet

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


A network is a collection of computers and devices connected together, often wireless, via communications devices and transmission media. Network allow computers to share resources, hardware, software, data and information. The internet is a world wide collection of networks that connects millions of business, government agencies, educational institutions and individuals. People use internet for: o Communication o Get and share information o Shopping o Banking and investing o Classes o Entertainment o Download music, video and etc. Web (World wide web) is a popular services on the internet. Its contains billions of documents called web pages. Web page is a document that contain text, graphics, audio and video. Web site is a collection of related web pages. Social networking web site encourage members to share their interests, ideas, stories, photos, music and video with other registered users. Blog is an informal web site consisting of time-stamped articles in a diary or journal format. Podcast is recoded audio stored on a web site that can be downloaded to a computer or a portable media player such as ipod.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management

Computer Software Also called a program Is a series of instructions that tells the computer what to do and how to do it. Software today often has a graphical user interface (GUI). With GUI: o its allow us to interact with the software using text,graphics and visual image such as icons. o An icon is a miniature image that represents a program, an instruction or some other object. o We ca use mouse to select the icons to performs the operations.

2 categories of software are o System software o Application software

System software: Consists of the program that control or maintain the operation of the computer and its devices. System software serves as the interface between the user, the application software and the computers hardware. 2 types of system software: o Operating system Is a set of programs that coordinates all the activities among computer hardware devices. Example: Microsoft OS (windows vista, windows XP), Apple OS( Mac OS X)
8

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


When we start a computer, portions of the OS load into memory from the computers hard disk. Its remains in memory while the computer is on.

o Utility program Allows a user to perform maintenance type tasks usually related to managing a computer, its devices or its program. Example: use to transfer digital photos to a CD or DVD, managing disk drivers, printers and other devices or media

Application software: Consists of program designed to make users more productive and assist them with personal tasks. Example: word processing, presentation software. spreadsheet, database and

Categories of a computer: 7 categories o Personal computer/ desktop o Mobile computer/ mobile devices o Game consoles o Servers o Mainframes o Supercomputers o Embedded computers
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 9

Diploma in Business management


Personal computer/ desktop: o Can perform all of its input, processing, output and storage activities by itself. o Contains a processor, memory and one or more input, output , storage and communications devices o 2 popular styles of personal computer are : PC (use OS windowsIBM design) and Apple computers (use Macintosh OS) o 2 types of Personal Computer are : desktop and notebook computer.

Desktop: is designed with the system unit, input devices, output devices and any other devices fit entirely on or under a desk or table.

Notebook: Also called as a laptop computer. Is portable, personal computer designed to fit on your lap. More expensive than desktop with equal capabilities. Weigh from 2.5 to more than 10 pounds. Can operate on batteries or power supply or both.

Mobile computers: o Is a personal computer can be carry from place to place such as notebook and tablet PC

Tablet PC: Is a special type of notebook computer that allows us to write or draw on the screen using digital pen

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

10

Diploma in Business management


We can attach a keyboard to Tablet PC. Useful especially for taking notes in locations where the standard notebook computer is not practical. Widely used in medical and legal communities.

Mobile devices: Small & can carry in a pocket. Stores program and data permanently on memory inside the system unit or on small storage media such as memory card. Can connect information. to a personal computer to exchange

Some mobile device are internet enabled, meaning they can connect to the internet wirelessly. 3 types: Handheld computer o Referred to as Ultra-Mobile PC (UMPC) o Small and can fit in one hand. o The screens are small PDAs o Personal digital assistant o Provides personal organizer functions such as calendar, appointment book, address book, calculator and notepad
o

Are internet enabled so users can access to the web

o Have a camera and phone capabilities


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 11

Diploma in Business management


o Also function as a portable media player. o Input device use stylus ( like a small ballpoint pen, but use pressure instead of ink to write and draw). Smart Phone o Is an internet enabled phone that provides PDA capabilities. o Its allow a user to send and receive e-mail message and access the web (with a fee) o Simply as handhelds.

Games consoles: Is a mobile computing device designed for single player or multiplayer video games. Standard game consoles use handheld controller as an input devices, a television screen as output device and hard disks, CD,DVD and memory card for storage. 3 popular model are: o Microsoft Xbox 360 o Nintendos Wii o Sonys PlayStation 3. A handheld game console is small enough to fit in one hand. Many handheld game console can communicate wirelessly with other similar consoles for multiplayer gaming.

Servers:
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 12

Diploma in Business management


Use to control access to the hardware, software and other resource on a network and provide a centralized storage area for programs, data and information. Its support from 2 to several thousand connected computer at the same time. People use personal computer or terminal (a device with a monitor, keyboard and memory) to access data, information and programs on a server.

Mainframes: Is a large, expensive and powerful computer that can handle hundreds or thousands of connected users simultaneously. Its store huge information. amount of data, instructions and

Most major corporations use mainframe for business activities. With mainframe, large business are able to bill millions of customers, prepare payroll for thousands of employees, and manage thousands of items in inventory. Its process more than 83 percent of transaction around the world. Server and other mainframes can access data and information from a mainframe. People can access programs on the mainframe using terminals or personal computers.

Supercomputers: The fastest, most powerful computer and most expensive.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

13

Diploma in Business management

Can process more than 135 trillion instructions in a single second. Use for large scale simulations, application in medicine, aerospace, automotive design, online banking, weather forecasting, nuclear energy research and petroleum exploration. Its use complex and calculations applications. sophisticated mathematical

Embedded computers: A special purpose computer that functions as a component in a large product. Use in consumer electronics, home automation devices, automobiles, process controllers / robotics and computer device/ office machines.

Computer application in society: Computer has changed society today as mush as the industrial revolution changed society in the eighteenth and nineteenth centuries. People interact directly with computers in fields: o Education Online note and tutorial Access school network / internet wirelessly

o Finance Online banking Online investing (buy and sell stocks and bonds without using a broker)

o Government Provide citizens with up-to date information


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 14

Diploma in Business management


Have a offices web site to file taxes, apply for permits and licenses, pay parking tickets, buy stamps, report crimes, apply for financial aid, renew vehicle registrations and drivers licenses.

o Health care Doctor use the web and medical software to assist with researching and diagnosing health conditions. Doctor use e-mail to correspond with patients. Pharmacists use computer to file insurance claims. Robots can hospitals. deliver medication to nurse stations in

Computers and computerized devices assist nurses, and technicians with medical test.

doctors,

o Science Computer use for collecting, analyzing and modeling data Scientists use the internet to communicate with colleagues around the world.

o Publishing Special software assists graphic designers in developing pages that include text, graphics, photos, artists in composing and enhancing songs, film markers in creating and editing film, journalists and mobile user in capturing and modifying video clips. These works include books, magazines, newspaper, music, film and video. Some of the publisher makes their works available online.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

15

Diploma in Business management


o Travel Use for order airline tickets on the web, print directions and a map from the web.

Manufacturing Computer-aided manufacturing (CAM) refers to the use of computers to assist with manufacturing processes such as fabrication and assembly. Robot carry out processes in a CAM environment CAM is used by a variety of industries, including oil drilling, power generation, food production and automobile manufacturing.

Chapter 2: Application software


Application software With the proper software, a computer is a valuable tool Software allows user to create letter, report, design web pages, draw images, enhance audio and video clips, prepare taxes, play games, compose e-mail, instant message and much more. Application software consists of program designed to make users more productive and assist them with personal tasks. Application software are uses : o To make business activities more efficient
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 16

Diploma in Business management


o To assist with graphics and multimedia projects o To support home, personal and educational tasks o To facilitate communications 4 categories of application software and utility programs are:

Application software is available or distributed in a variety of form :

o Packaged software Is mass- produced

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

17

Diploma in Business management


Copyrighted retail software that needs of a wide variety of users(single user or company) Example Microsoft office 2007 Is available in retail stores or on web

o Custom software Perform functions specific to business or industry. The company may use programmers to develop tailormade custom software Example : sistem pengiraan markah pelajar

o Web base software Programs hosted by a web site User access and interact with web based software from any computer or device that connect to the internet. Example: e-mail, game programs.

o Open source software Software provided for use, modification and redistribution. This software has no restrictions from the copyright holder regarding modification of the softwares internal instructions and redistribution of the software. Open source software usually can be downloaded from the internet, sometimes at no cost.

o Shareware

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

18

Diploma in Business management


Is copyright software that is distributed at no cost for a trial period. To use a shareware program beyond that period, you need to send payment to the program developer.

o Freeware Is copyright software provided at no cost to a user by an individual or a company that retains all rights to the software.

o Public domain software Has been donated for public use and has no copyright restrictions. Anyone can copy or distribute public-domain software to others at no cost.

Business software Is application software that assists people in becoming more effective and efficient while performing their daily business activities.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

19

Diploma in Business management


The popular business program :

Graphics and multimedia software

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

20

Diploma in Business management


The popular software for graphics and multimedia are:

Software for home, personal and educational use


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 21

Diploma in Business management


Application software Software suite Personal Finance Legal Manufacturer Microsoft sun Intuit Microsoft Broderbund Cosmi Nolo Tax Preparation Desktop Publishing Paint/ image editing 2nd story software H & R Block Intuit Broderbund Program name Works OpenOffice.org Quicken money Home and business lawyer will writer Perfect attorney Quicken legal business quicken will maker TacACT TaxCut Turbo Tax The Print Shop Printmaster Publisher 2007 CorelDRAW The Gimp Photoshop elements Paint shop pro photo Ulead photoimpact Ulead Photo Express Picasa Photo story Photo Suite ClickArt Art Explosion Ulead VideoStudio Movie maker Studio MovieBox VideoWave Instant Architect Better Homes & gardens Home Designer Street Atlas Streets & Trips Merriam-Webster Collegiate Dictionary & Thesaurus Encarta

Microsoft Corel The GIMP Team Photo editing and Adobe photo management Corel Google Microsoft Roxio Clip art/ image gallery Broderbund Nova Development Video and audio Corel editing Microsoft Pinnacle systems Roxio Home design/ Broderbund landscaping Travel and mapping reference DeLorme Microsoft Fofware Publishing Microsoft

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

22

Diploma in Business management


Learning aids and support tools for application software Learning how to use application software effectively involves time and practice. To assist in the learning process, many programs provide online Help and Web-based Help.

Online Help Is the electronic equivalent of a user manual. Its usually is integrated in a program. We use the Help feature to ask a question or access the help topic in subject or alphabetical order. Most online help also links to web site that offer web-based help, which provides updates and more comprehensive resources to respond to technical issues about software. Some web site contain chat room, in which a user can talk directly with a technical support person.

Web-based Trainning

Is a type of CBT (computer based training) that uses internet technology and consists of application software on the web. WBT typically consists of self-directed, self-paced instruction about a topic. WBT is popular in business, industry and schools for teaching new skills or enhancing existing skills of employees, teachers or students. WBT is combined with other materials for distance learning and e-learning. Distance learning is the delivery of education at one location while the learning takes place at other locations.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

23

Diploma in Business management


E-learning, short for electronic learning is the delivery of education via some electronic method such as the internet, networks, CDs/DVDs. E-learning system also may include video conferencing, email, blogs, wikis, newsgroups, chat rooms and groupware.

Chapter 3: System software, operating systems and utility programs

System software Consists of programs that control or maintain the operations of the computer and its devices. Its serves as the interface between the user, the application software and the computers hardware. 2 types of system software: o Operating system o Utility programs Operating systems (OS) Is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Function of OS includes: o Starting a computer o Provide a user interface o Managing programs o Managing memory
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 24

Diploma in Business management


o Coordinating tasks. o Configuring devices o Establishing an internet connection o Monitoring performance o Providing file management utilities. Also allow users to control a network and administer security The OS is installed and resides on the computers hard disk. For handheld computer and mobile devise, the OS may reside on a ROM chip. Different size of computer normally uses different Operating system. When we purchasing application software, we must ensure its work with the OS installed on our computer. We also can call Operating system as a platform. We can install more than one OS in one computer.

Operating system functions

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

25

Diploma in Business management

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

26

Diploma in Business management

1. Starting a computer
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 27

Diploma in Business management


Booting is the process of starting or restarting a computer. When turning on a computer that has been powered off completely. You are performing a Cold Boot. A worm boot is the process of using the OS to restart a computer. Each time we boot a computer, the kernel and other frequently used OS instruction are loaded or copied from the hard disk into the computer memory (RAM) The kernel is the core of an OS that manages memory and device, maintains the computers clock, start programs, data and information. The kernel is memory residents, which means it remains in memory while the computer is running, other parts of the OS are nonresident, that is, these instructions remain on hard disk until they are needed.

2. Provide a user interface User interface control how to enter data and instructions and information is displayed on the screen. 2 types of user interface: Command line (Configure devices, manage system resources and troubleshoot network) graphical

OS use a combination of this interface to define how a user interacts with computer.

3. Managing programs Some OS support a single user and only run a program at a time and some of them support Thousands of users and running multiple programs at a time.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 28

Diploma in Business management


Smart phones and personal mobile device use single user & single tasking OS. A single user/ multitasking OS allows a single user to work on 2 or more program that resides in memory at a time

4. Managing memory/ memory management

Is used to optimize the use of random access memory (RAM) Ram consists of one or more chips on the motherboard that hold items such as data and instruction while the processor interprets and execute them. The OS allocates or assigns data and instruction to an area of memory while they are being processed. Then it carefully monitors the contents of memory and finally OS releases these items from being monitored in memory when the processor no longer requires them. Virtual memory is a concept in which the OS allocates a portion of a storage medium (usually hard disk), to work as a additional RAM. OS use area of hard disk for virtual memory to swaps (exchanges) data, information and instructions between memory and storage and we call its as a paging.

5. Coordinating tasks. The operating system determines the order in which tasks are processed. A task or job is an operation the processor manages. Tasks include receiving data from an input device, processing instructions, sending information to an output device and transferring items from storage to memory and from memory to storage. A multi-user operating system does not always process tasks on a first come, first served basic. Sometimes, one
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 29

Diploma in Business management


user may have a higher priority than other users. In this case, the operating system adjusts the schedule of tasks.

Sometimes, a devices already may be busy processing one task when it receives a second task. This occurs because the processor operates at mush faster rate of speed then peripheral devices. For example, if the processor sends five documents to a printer, the printer can print only one document at a time and store as many documents as its memory can handle. While waiting for device to become idle, the operating system places items in buffers. A buffer is a segment of memory or storage in which items are places while waiting to be transferred from an input device or to an output device. The operating system commonly uses buffer with printer documents. This process, called spooling, sends documents to be printed to a buffer instead of sending them immediately to the printer. The buffer holds the information waiting to print while the printer prints from the buffer at its own rate speed. By spooling documents to a buffer, the processor can continue interpreting and executing instructions while the printer prints. This allows users to work on the computer for other tasks while a printer is printing. Multiple print job line up a queue in the buffer. A program, called a print spooler, intercepts documents to be printed from the operating system and places them in the queue.

6. Configuring devices A driver is a small program that tells the operating system how to communicate with a specific device. Each device on a computer, such as the mouse, keyboard, monitor, printer and scanner has its own specialized set of commands and

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

30

Diploma in Business management


thus requires its own specific driver. When we boot a computer, the operating system loads each devices driver. If we attach a new device to a computer, its driver must be installed before we can use the device. For many devices, the computers operating system includes the necessary driver, if it does not, we can install the drivers from the CD provided with the purchased device. Today, many devices and operating systems support Plug and Play, Plug and Play means the operating system automatically configures new devices as you install them. With plug and play, a user can plug in a device , turn on the computer and them use the device without having to configure the system manually.

7. Establishing an internet connection Operating system typically provides a means to establish internet connection. For example, windows vista includes a connect a network wizard that guides users through the process of setting up a connection between a computer and an internet access provider. Some operating systems also include a web browser and email program, enabling user to begin using the web and communication with others as soon as user set up the internet connection. Some also include utilities to protect computers from unauthorized instructions and unwanted software such as viruses and spyware.

8. Monitoring performance
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 31

Diploma in Business management


Operating system typically contains a performance monitor. A performance monitor is a program that accesses and report information about various computer resources and device. The information in performance reports help users and administrators identify a problem with resources so that they can try to resolve any problem. If a computer is running extremely slow, for example, the performance monitor may determine that the computer memory is being used to its maximum. Thus, you might consider installing additional memory in the computer.

9. Providing file management utilities.

Operating system often provide users with the capability of managing files, searching for files, viewing images, securing a computer from unauthorized access, uninstalling programs, scanning disks, defragmenting disks, diagnosing problems, backing up file and disks and setting up screen savers.

10.

controlling a network some operating system are network operating systems. A network operating system or network OS is an operating system that organizes and coordinates how multiple users access and share resources on a network. Resources include hardware, software, data and information. Some operating system has features built into them. In other case the network OS is a set of programs separate from the operating system on the network, the client computers use their own operating system. When connected to the network, the network OS may assume some of the operating system functions. The network administrator, the person overseeing network operations, uses the network OS to add and removes
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 32

Diploma in Business management


users, computers and other devices to and from the network. The network administrator also uses the network operating system to install software and administer network security.

11.

administering security the network administrator uses the network OS to establish permissions to resources. These permissions define who can access certain resources and when they can access those recourses. For each user, the network administrator establishes a user account, which enables a user to access, or log on to a computer or a network. Each user account typically consists of a user name and password. A user name or user ID is a unique combination of characters such as letter or numbers. A password is a private combination of characters associated with the user name that allows access to certain computer resources. Some operating system allows the network administrator to assign password to files and command, restricting access to only authorized users. To prevent unauthorized user from accessing computer recourses, keep your password confidential. While entering your password, most computer hide the actual password characters by displaying some other characters such as asterisks (*) or dots.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

33

Diploma in Business management


After entering a user name and password, the operating system compare the users entry with a list of authorized user name and password. If the entry does not match, the operating system denies access to the user. To protect sensitive data and information as it travels over the network, a network operating system may encrypt it. Encryption is the process of encoding data and information into an unreadable form. Network administrators can set up a network to encrypt data as it travels over the network to prevent unauthorized users from reading the data. When an authorized user attempts to read the data, it automatically is decrypted or converted back into a readable form.

Utility program also called as a operating system utility programs. Is a type of system software that allows a user to perform maintenance-type task (such as managing a computer, its devices or its programs).

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

34

Diploma in Business management


Most OS include several built in utility program and some of them buy by user (stand alone utility). Example: o File manager o Search utility o Image viewer o Personal firewall o Uninstaller o Disk scanner o Disk defragmenter o Diagnostic utility o Backup utility o Screen server.

Types of operating systems Category Stand alone Operating system name DOS Early windows versions Is a complete OS that works on (windows 3.X, windows 95, a desktop, notebook or mobile windows NT workstation, device. windows 98, windows 2000 Some of them are called as professional, windows client operating system millennium edition) Windows xp Windows vista Mac OS x UNIX Linux designed specifically to Early windows server versions (Windows NT server, windows 2000 server, windows server
35

Network Is

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


support network. Typically resides on a server 2003) Windows server 2008 UNIX Linux Solaris Netware Windows Embedded CE Windows mobile Palm OS Embedded Linux Symbian OS

Embedded OS on most smart phones and small device. Resides on a ROM chip.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

36

Diploma in Business management

Chapter 4: The components of the system unit

The system unit Is a case that contains electronic components of the computer used to process data. Are available in a variety of shapes and size The case of the system unit is made of metal or plastic and its protects the internal components from damage. All computers have a system unit Common components inside the system unit: o Processor o Memory o Adapter card Sound card Video card

o Drive bays o Power supply o Motherboard/ circuit board

Motherboard: Also called as a system board The main circuit board of the system unit

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

37

Diploma in Business management


Many electronic components attach to the motherboard (built in) such as expansion slots, processor chip, memory slots Memory chips are installed on memory cards that fit in a slot on the motherboard. A computer chip is a small piece of semiconducting material, usually silicon on which integrated circuit electrical current. Each integrated circuit can contain millions of elements such as resistors, capacitors and transistors.

Processor Also called the central processing unit (CPU) Interprets and carries out the basic instructions that operate a computer. On a personal computer, all functions of the processor usually are on a single chip and normally called as a microprocessor. Most processor chip manufacturers now offer multi core processors. Multi-core processor is a chip with 2 or more separate processors. 2 common multi-core processor used today are o Dual- core ( is a chip that contains 2 separate processors) o Quad-core (is a chip with four separate processors) Multi-core chip runs at a slower clock speed than a single-core processor, but multi-core chips typically increase overall performance. Processor contain : o Control unit (CU) o Arithmetic logic unit (ALU) CU and ALU work together to perform processing operations.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

38

Diploma in Business management

The Control Unit: o The component of the processor that directs and coordinates most of the operations in the computer. o Has a role much like a traffic cop: it interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction.

The Arithmetic Logic Unit:


o

Performs arithmetic (addition, subtraction, multiplication and division), comparison( comparing one data item with another such as equal to or less than), and other operations.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

39

Diploma in Business management


Machine cycle: o The steps involves: 1. Fetching 2. Decoding 3. Executing 4. Storing

The system clock: o To control the timing of all computer operations.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

40

Diploma in Business management


o Its generates regular electronic pulses or ticks that set the operating pace of components of the system unit. o Clock speed is measured by the number of ticks per second. o Current personal computer processors have clock speeds in the gigahertz range.

Comparison of personal computer processor: o Types of processor used Devices), IBM and Motorola o Intel: Used a model number to identify the various chips. After learning that processor model numbers could not be trademarked and protected from use by competitors. Intel began identifying its processors with names. Most high performance desktop PCs today use a processor in the Intel core family. Less expensive, basic PCs today use a brand of Intel processor in the Pentium or Celeron family. The Xeon and Itanium families of processors are ideal for workstations and low-end servers. are Intel, AMD (Advanced Micro

o AMD: Is the leading manufacturer of Intel-compatible processors. Which have an internal design similar to the Intel processor. Less expensive.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

41

Diploma in Business management


o Apple computer used only an IBM processor or Motorola Processor, which had a design different from the Intel-style processor.

Data representation To understand the way a computer processes data, we should know how a computer represents data. Most computer are digital. The recognize only 2 discrete states ( ON and OFF). The digit 0 represents the electronic state of OFF and digit 1 represents the electronic state of ON. The computer uses a binary system because it recognizes only 2 states. The binary system is a number system that has just 2 unique digits 0 and 1 called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. When 8 bits are grouped together as a unit, they form a byte. A byte provides enough different combination of 0 and 1 to represent 256 individual characters.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 42

Diploma in Business management


These characters include numbers, uppercase and lowercase letters of the alphabet, punctuation marks and other such as the Greek alphabet. The combinations of 0 and 1 that represent characters are defined by patterns called a CODING SCHEME. 2 popular coding scheme are: ASCII (American standard code for information interchange) EBCDIC (Extended Binary Coded Decimal Interchange code: use in mainframe and high-end server) Example :

Symbol 0 1 2 A B C ! # & +

ASCII 00110000 00110001 00110010 01000001 01000010 01000011 00100001 00100011 00100110 00101011

EBCDIC 11110000 11110001 11110010 11000001 11000010 11000011 01011010 01111011 01010000 01001110

How a letter is converted to binary form and back

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

43

Diploma in Business management

Memory
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 44

Diploma in Business management


Consist of electronic components that store instructions waiting to be executed by the processor. Data needed by those instructions and the result of processed data (information). Memory Usually consists of one or more chips on the motherboard or some other circuit board on the computer. Memory stores 3 basic categories of items: The operating system and other system software that control or maintain the computer and its device. Application programs that carry out a specific task such as word processing. The data being processed by the application programs and resulting information. A byte (character) is the basic storage unit in memory. Terms commonly used to define memory size are:

Term

Abbreviati on KB or K MB GB TB

Approxima te Number of Bytes 1 1 1 1 thousand million billion trillion

Exact Amount of bytes 1,024 1,048,576 1,073,741,824 1,099,511,627 ,776

Kilobyte Megabyte Gigabyte Terabyte

Approxima te Number of Pages of Text 500 500,000 500,000,000

2 types of memory: Volatile

Temporary memory When the computers power is turned off , volatile memory loses its contents. Example : RAM
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 45

Diploma in Business management


Nonvolatile Is permanent memory Does not lose its contents when power is removed from the computer. Example: ROM, flash memory and CMOS

RAM:

Stand for random access memory Also called as a main memory Its consists of memory chips that can be read from and written to by the processor and other divice.
When we turn on power to a computer, certain OS files load into

RAM from a storage devices such as hard disk. These files remain in RAM as long as the computer has continuous power, some of additional programs and data are requested also load into RAM. Ram can hold multiple programs simultaneously. Most of RAM is volatile, which means it loses its contents when the power is removed from the computer.
Saving is the process of copying items from RAM to storage

devices such as a hard disk. 3 basic types of RAM chips are: o Dynamic RAM DRAM pronounced DEE-ram Chips must be re-energized constantly or they lose their contents.

o Static RAM SRAM pronounced ESS-ram


46

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


Chips are faster and more reliable than any variation of DRAM chips. These chips do not have to be re-energized as often as DRAM chips.

o Magnetoresistive RAM A new types of RAM MRAM pronounced EM-ram Store data using magnetic charges. Has greater storages capacity, consumes less power and has faster access times than electronic RAM.

Ram chips usually reside on a memory module in memory slots on the motherboard.
The more RAM a computer has, the faster the computer will

respond. o Example: Run windows vista and using basic application software ( word processing) at least 1GB RAM For accounting, financial, spreadsheet programs and multimedia 1 until 4 GB of RAM. Creating professional web site or using graphics 4GB or more

The amount of RAM in computer purchased today ranges from 1GB to 64 GB. Cache: Most of todays computers improve processing times with cache. 2 types of cache memory are: memory cache and disk cache.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 47

Diploma in Business management


Memory cache helps speeds up processing time by storing frequently used instruction and data. 2 types of memory cache are: L1 cache Built into processor Has a small capacity(8 KB to 128 KB)

L2 cache Slower but has larger capacity (64KB to 16MB) L2 advanced transfer cache is faster and built directly on processor chip (512 KB to 8 MB)

When the processors need an instruction or data, it searches memory in this order: L1 cache, then L2 cache then RAM. If the instruction or data is not found in memory, then it must search a slower speed storage medium such as hard disk, CD or DVD.

ROM:
Stand for READ ONLY MEMORY

Store data and instruction permanently The data on most ROM chips cannot be modified ROM is nonvolatile, which means its contents are not lost when power is removed from the computer. Manufacturers of ROM chips often record data, instruction or information on the chips when they manufacture the chips. These ROM chips called FIRMWARE, that contain permanently written data, instruction and information.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

48

Diploma in Business management


Flash memory: Is a type of nonvolatile memory that can be erased electronically and rewritten. Most computer use flash memory to hold their startup instructions because it allows the computer easily to update its contents. Used in smart phones, portable media player, PDAs, printers, digital cameras, automotive devices, digital voice recorders and pagers. CMOS: Some RAM chips, flash memory chips and other types of memory chips use complementary metal oxide semiconductor (CMOS) technology because it provides high speeds and consumes little power. CMOS technology uses battery power to retain information even when the power to computer is off.

Memory access times: Is the amount of time it takes the processor to instructions and information from memory. read data,

Accessing data in memory can be more than 200,000 times faster than accessing data on hard disk because of the mechanical motion of the hard disk.

Expansion slots and adapter cards An expansion slot is a socket on the motherboard that can hold an adapter card.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

49

Diploma in Business management


An adapter card sometimes called an expansion card, is a circuit board that enhances functions of component of the system unit and/ or provides connections to peripherals. A peripheral (modems, disk drives, printers, scanners and keyboards) is a device that connects to the system unit and is controlled by the processor in the computer. Types of adapter card are:

Some motherboard includes all necessary capability and do not require adapter card and some of them may require adapter card to provide capabilities such as sound and video.

A sound card enhances the sound generating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones.

A video card or graphics card, convert computer output into a video signal that travels through a cable to the monitor, which display an image on the screen.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 50

Diploma in Business management


Port and connectors

A port is the point at which a peripheral attaches to or communicates with system unit so that the peripheral can send data to or receive information from the computer. An external device such as a keyboard, monitor, printer, mouse and microphone often attaches by a cable to a port on the system unit. Instead of port, the term jack sometimes is used to identify audio and video ports. The front and back of the system unit contain many ports.

A connector joins a cable to a port. A connector at one end of cable attaches to a port on the system unit and at the other end of the cable attaches to a port on the peripheral. Desktop personal computers may have a serial port, a parallel port, USB port and a FireWire port.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

51

Diploma in Business management

Serial ports: Is a type of interface that connect a device to the system unit by transmitting data one bit at a time
Usually connect devices that do not require fast data transmission rate

such as mouse, keyboard or modem Example COM port (short for communication port) Diagrams:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

52

Diploma in Business management

Parallel ports: Is an interface that connects devices by transferring more than one bit at a time. Were developed as an alternative to the slower speed serial ports such as used to connect a printer. This parallel port can transfer eight bits of data (1 byte) simultaneously through 8 separate lines in a single cable. Diagrams:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

53

Diploma in Business management

USB ports: Short for universal serial bus port. Can connect up to 127 different peripheral together with a single connector. Personal computer have 6 to 8 USB ports on the front and back of the system unit. The latest version of USB called USB 2.0 is a more advanced and faster USB with speeds 40 times higher than its predecessor. Device that connect to a USB port o Mouse, printer, digital camera, scanner, speakers, portable media player, CD, DVD, smart phone, PDA, game console and removable hard disk. To attach multiple peripheral using a single port, we can use a USB hub. USB hub is a device that plugs in a USB port on the system unit and contains multiple USB ports in which you plug cables from USB devices. FireWire ports: Previously called an IEEE 1394 port. Similar to a USB port. Io can connect multiple types of devices that require faster data transmission speeds such as digital video camera. Digital VCRs, color printers, scanners, digital camera and DVD drivers to a single connector. A FireWire port allows you to connect up to 63 devices together. The latest version called FireWire 800. We can use a FireWire hub to attach multiple devices to a single FireWire port
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 54

Diploma in Business management

Special purpose ports: These ports are not included in typical computers. 5 special-purpose port are: MIDI, eSATA,SCSI,IrDA and Bluetooh.

Power supply The power supply is the component of the system unit that converts the wall outlet AC power into DC power. Some external peripheral such as a cable modem, speakers or printer have an AC adapter which is an external power supply that converts AC power into DC power.

Mobile computer and device

Mobile computers and devices have a motherboard that contains electronic components that process data. Notebook computer may have video, modem, network, FireWire, USB, headphone and microphone ports. Some mobile users prefer connecting peripherals to a port replicator( an external device that attach to mobile computer, provides connections to peripherals through ports built into the replicator). Mobile devices have an IrDA port or Bluetooth so users can communicate wirelessly with other computer or devices such as a printer.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

55

Diploma in Business management

Chapter 5: Input and Output

What is an input and input devices

Input is any data and instructions entered into the memory of a computer. Input device is any hardware component that allows user to enter data and instructions into a computer. Variety of input devices uses: 1. Keyboard
2. Mouse (optical mouse, air mouse)

3. Trackball 4. Touchpad

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

56

Diploma in Business management


5. Pointing stick 6. Light pen 7. Gamepads 8. Light guns 9. Dance pads 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. Touch screen Stylus (pen input) Graphics tablet Game controller Joystick Touch sensitive Microphone Digital camera Web cam Scanner Optical mark and character recognition Bar code readers RFID reader Magnetic stripe card readers MICR Biometric devices.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

57

Diploma in Business management

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

58

Diploma in Business management


What is output and output devices

Output is a data that has been processed into a useful form. 4 basic categories of output are : text, graphics, audio and video Output devices: is any hardware information to one or more people. Example of output device: 1. Printers 2. Speakers 3. Headphones 4. Earphones
5. Fax machines / fax modems

component

that

conveys

6. Multifunction peripherals 7. Data projectors 8. Interactive whiteboards.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

59

Diploma in Business management


Chapter 6: Secondary Storage

Storage Storage hold data, instruction and information for future use. The usage of storage:
o

At home: store letters, budgets, bank statements, household inventory, stock purchase, tax data, address, daily schedules, email messages, assignments, recipes, digital photos, music and video.

In business: customer order, invoices, vendor payments, payroll records, tax data, inventory records, presentations, digital photo, contracts, marketing literature, appointments and web pages. Other: drawing, application software, OS, blueprints, product catalogs

Storage medium or secondary storage is the physical material on a computer to keeps data, instructions and information. Example of storage medium are:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

60

Diploma in Business management


o

Hard disk (internal, external and miniature), CDs, DVDs, PC cards, Expresscard modules, flash memory cards, USB flash

drives, smart cards and microfilm.

Storage device is the computer hardware that records and/or retrieves items to and from storage media. Writing is the process of transferring data, instruction and information from memory to a storage medium. Reading is the process of transferring these items from a storage medium into memory. When storage devices write data on storage media, they are creating output and when storage devices read from storage media, they function as a source of input. The speed of storage devices is defined by access time. Access time measures the amount of time it takes a storage device to allocate an item on a storage medium. The access time of storage devices is slow compared with the access time of memory.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

61

Diploma in Business management


Storage devices, access time in thousandths of a second (milliseconds) or millionths of a second (microseconds) The number of bytes (characters) can be store/hold in storage medium was called as a CAPACITY. The table below shown the capacity of a storage medium:

Storage term Kilobyte (KB) Megabyte (MB) Gigabyte (GB) Terabyte (TB) Petabyte (PB) Exabyte (EB) Zettabyte (ZB) Yottabyte (YB)

Approximate Exact number of bytes number of bytes 1 thousand 1024 1 million 1048576 1 1 1 1 1 1 billion trillion quadrillion quintillion sextillion septillion 1073741824 1099511627776 1125899906842624 1152921504606846976 1180591620717411303424 1208925819614629174706176

Magnetic disk Use magnetic particles to store items such as data, instruction and information on a disks surface. Its represent either a 0 bit or 1 bit. Magnetic disks store data and instruction in track and sectors.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 62

Diploma in Business management


A track is a narrow recording band that forms a full circle on the surface of the disk. The disks storage locations consist of pie shaped section, which break the track into small arcs called sectors. A sector typically stores up to 512 bytes of data. A component used type of magnetic disk is hard disk. Some of magnetic disk are portable (can remove from one computer and carry it to another computer) and some of them are not

Sector
Track

Cluster

Hard disk: INTRODUCTION Is a storage device that contains one or more inflexible, circular platters that store data, instruction and information.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

63

Diploma in Business management


The device is enclosed in an airtight, sealed case to protect it from contamination. A hard disk is mounted inside the system unit is called fixed disk. Current personal computer hard disks have storage capacities from 160 GB to 1 TB and more. Hard disk store data using: o Longitudinal recording: Aligned the magnetic particles horizontally around the surface of the disk.

o Perpendicular recording: Align the magnetic particles vertically or perpendicular to the disks surface, making much greater storage capacities possible. Provide storage capacities longitudinal recording 10 times greater than

Hard disks are read/write storage media.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

64

Diploma in Business management

Hard disk: CHARACTERISTICS

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

65

Diploma in Business management

Hard disk:

HOW

IT WORK

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

66

Diploma in Business management

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

67

Diploma in Business management

Hard disk: EXTERNAL AND REMOVABLE

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

68

Diploma in Business management


Hard disk : CONTROLLERS

ONLINE STORAGE:

Optical disk

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

69

Diploma in Business management


A type of optical storage media that consist of a flat, portable, disc made of metal, plastic and lacquer. These discs usually are 4.75 inches in diameter and less than onetwentieth of an inch think. Use to store software, data, digital photos, movies and music. Some optical discs formats are read only, others are read/write. Optical discs store items by using microscopic pits (indentations) and lands (flat areas) that are in the middle layer of the disc. Guidelines for the proper care of optical discs:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

70

Diploma in Business management


Optical disk format: 1. CD-ROM 2. CD-R 3. CD-RW 4. DVD-ROM 5. BD-ROM 6. HD DVD-ROM 7. DVD-R 8. DVD+R 9. BD-R 10. 11. 12. 13. 14. 15. HD DVD-R DVD-RW DVD+RW DVD-RAM BD-RE HD DVD-RW

CD-ROM: Stand for compact disc read-only memory. Is a type of optical disc that users can read but not write or erase. The contents manufactures. for standard CD-ROMs was write by

A standard CD-ROMs is called a single-session disc because manufactures write all items on the disc at one time. These CD-ROM normally used to distribute the software.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 71

Diploma in Business management


A typical CD-ROM holds from 650 MB to 1 GB of data, instruction and information. We can read the CD-ROM by using CD-ROM drive or CD-ROM player.

CD-R and CD-RW CD-R (compact disc-recordable) is a multisession optical disc on which user can write but not erase. Multisession means you can write on part of the disc at one time and another part at a later time. CD-RW (compact disc-rewritable) is an erasable multisession disc you can write on multiple times. To write on a CD-RW disc, we must use CD-RW software and CD-RW drive. The process of writing on an optical disc is called burning. The process of copying audio and video data from a purchased disc and saving it on digital media is called ripping.

DVD-ROM, BD-ROM and HD DVD-ROM DVD-ROM (digital versatile disc-read-only memory or digital video disc-read-only memory) is a high-capacity optical disc on which users can read but not write or erase. Manufacturers write the contents of DVD-ROMs and distribute them to consumers. DVD-ROMs store movie, music, huge database and complex software. To read a DVD-ROM, we must have a DVD-ROM drive or DVD player. Most DVD drivers can read audio CDs, CD-ROMs, CDRs and CD-RWs.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 72

Diploma in Business management


Drives called DVD/CD-RW, are combination drives that read DVD and CD media. 2 newer and more expensive DVD format are Blu-ray and HD DVD, both of them have a higher capacity and better quality than standard DVDs. A Blu-ray (BD) has storage capacities of 100GB with expectations of exceeding 200 GB in the future. The HD DVD disc (high-density-DVD) has storage capacities up to 60 GB with future projection of 90 GB capacities

RECORDABLE AND REWRITABLE DVDs DVD-R, DVD+R, BD-R and HD DVD-R allow users to write on the disc once and read (play) it many times. DVD-RW, DVD+RW and DVD+RAM are three competing rewritable DVD formats. DB-RE and HD DVD-RW are competing high-capacity rewritable DVD formats. To write on these discs, we must have compatible driver or recorder.

Tape

One of the storage media used with mainframe.


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 73

Diploma in Business management


Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. Uses for long-term storage and backup. Tape drive reads and writes data and information on a tape. Todays tape drives use tape cartridges. Tape cartridges is a small, rectangular, plastic housing for tape.

PC cards and Express cards

A PC card is a thin, credit card sized removable flash memory device that fits into a PC card slot. An ExpressCard module is a removable device, smaller than a PC card and fits in a ExpressCard slot. PC card and ExpressCard modules can be used to add memory, storage, communications, multimedia and security capabilities to a computer. Its commonly used in notebook computers.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

74

Diploma in Business management

Miniature mobile storage media Allow mobile users easily to transport digital images, music or documents to and from computers and other devices. Many desktop, notebook, tablet PCs, digital cameras, portable media players, smart phones and other personal mobile devices have built in ports or slots to hold miniature mobile storage media. For computers or devices without built in slots, user can insert the media in separate peripherals such as card reader/writers, which typically plugs in a USB port.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

75

Diploma in Business management


3 types of miniature mobile storage are: 1. Flash memory cards

Various flash memory cards: Media name Compact flash Storage capacity 64 MB to 16 GB use Digital cameras, smart phones, PDAs, photo printers, portable media players, notebook computers, desktop computers Digital cameras, digital video cameras, smart phones, PDAs, photo printers, portable media players. Smart phones, portable media players, handheld game consoles, handheld navigation devices. Smart phones, portable media
76

Secure digital (SD)

64MB to 8 GB

MicroSD

512 MB to 6 GB

MiniSD

512 MB to 4 GB

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


players, digital cameras xD picture card Memory stick 64 MB to 2 GB 256 MB to 4 GB Digital cameras, photo printers Digital cameras, digital video cameras, photo printers, smart phones, PDAs, handheld game consoles, notebook Digital cameras, smart phones, handheld game consoles

Memory stick PRO 128 MB to 8 GB Duo

2. USB flash drivers Plugs in at USB port on a computer or mobile device. Storage capacities from 256 MB to 64 GB

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

77

Diploma in Business management

3. Smart cards Stores data on microprocessor embedded in small card Contain a processor and have input, process, output and storage capabilities. Smart card sis uses to storing medical records, vaccination data and other health care or identification information, customer purchases, employee attendance, prepaid amount of money

Microfilm and microfiche Microfilm and microfiche store microscopic images of documents on roll or sheet film.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

78

Diploma in Business management


Microfilm is a 100 to 215 foot roll of film and microfiche is a small sheet of film about 6 X 6 inches. Is uses to: 1. Store back issues of newspapers, magezines and genealogy records. 2. Store transactions and canceled checks 3. Store personal records ( US army)

Enterprise storage Use by large business/ enterprise. Enterprise use computer and computer networks to manage and store huge volumes of data and information about customers, suppliers and employee. In an enterprise, some storage system provide more than 185 TB of storage capacity CD server and DVD server hold hundreds of CDs and DVDs.

Suggested storage devices for various types of computer users: User Home Typical storage devices 250 GB hard disk Online storage CD or DVD drive Card reader/writer USB flash drive 500 GB hard disk Online storage CD or DVD drive External hard drive for backup USB flash drive
79

Small office/ home office

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


Mobile 100 GB hard disk Online storage CD or DVD drive Card reader/writer Portable hard disk for backup USB flash drive 1.5 TB hard disk Online storage CD or DVD drive Portable hard disk for backup USB flash drive Desktop computer 500 GB hard disk CD or DVD drive Smart card reader Tape drive USB flash drive Server or Mainframe Network storage server 40 TB hard disk system CD-ROM or DVD-ROM server Microfilm or microfiche

Power

Large busines

Chapter 7: Communications and Networks

Communications

Is a process in which 2 or more computers or devices transfer data, instructions and information. Some communications involve cables and wires and other are sent wirelessly through the air.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

80

Diploma in Business management

For successful communications we need:

All types of computers and mobile devices serve as sending and receiving devices in communication system. Modem is a communication communications channel. device that uses to connect to

2 popular communications channel are: television lines and telephone lines.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

81

Diploma in Business management


Use of computer communications Variety of computer communications: purpose o World wide collection of networks that links millions of business, government agencies, educational institutions and individual. o World wide collection of electronic documents on the internet that users access through a web browser. o Transmission of messages and files via a computer network o Real-time one-on-one communications service on the internet that notifies you when one or more people are online and then allows you to exchange messages, pictures, file, audio and video. o Real time type conversation among 2 or more people that takes place on a computer connected to a network that also may allow the exchange of messages, pictures, file, audio and video. o Online areas in which users have written discussions about a particular subject. o Time-stamped articles on a network that reflect the authors interests, opinions and personality. o Collaborative web sites that allow users to create, add to, modify or delete web site content. o Specification that enables web content to be distributed to subscribers. o Conversation that takes place over the internet using a telephone connected to a
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 82

Uses of communication Internet

Web

e-mail Instant messaging

Chat rooms

Newsgroups Blogs

Wikis

RSS VoIP

Diploma in Business management


computer or mobile device or telephone adapter. FTP o Internet standard that permits users to upload and download files to and from FTP server on the internet. o Location on web server to which user publish documents and other files. o Real time meeting between 2 or more geographically separated people who use a network to transmit audio and video data. o Transmits and receives telephone lines. documents over

Web Folders Video conferencing

Fax machine or computer fax/modem Wireless services messaging

o Send and received messages to and from smart phones, cell phones, handheld game consoles and other personal mobile devices o The 3 techniques use to send and receive messages are: 1. Text messaging o Also call SMS (short message service) o Option for sending and receiving messages: - Mobile to mobile - Mobile to e-mail - Web to mobile - Mobile to provider ( example television program contstant) 2. Wireless instant messaging Is a real time internet communications service that allows wireless mobile devices to exchanges message with one or more mobile devices or online user. 3. Picture/video messaging With picture messaging, user can send picture and sounds files as well as short text
83

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


messages to phone or other personal mobile device or a computer. With video messaging , user can send short video clips ( about 30 seconds in length) to all pictures messaging services. Also called as a MMS ( multimedia message service) Wireless internet access point is to connect the internet wirelessly by using mobile computer, smart phones, handheld game consoles or other devices. User can access wireless internet access point with built in wireless capacity or the other appropriate wireless network card, PC card, expresscard module or USB network adapter. 2 types of wireless internet access point are: ~ hot sport ~ mobile wireless networks A hot sport is a wireless network that provides internet connections to mobile computer and other devices. 3 hot sport technologies are: Wi-Fi (users in public such as airport, restaurants, hotels, shopping mall etc) WiMAX (coverage much wider than Wi-Fi such as an entire city) Bluetooth ( provide location based service such as sending coupons or menus) A mobile wireless network Provides user with high speed internet connection Have a subscription fee

Wireless internet access points

Cybercaf

Is a location that provides personal computer with internet access to its customers. Some provide free internet access, most charge a per-hour or per minute fee and some of them also are hot sport.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 84

Diploma in Business management


Global systems positioning GPS is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receivers geographic location. A GPS receiver is a handheld, mountable or embedded device that contains an antenna, a radio receiver and a processor and screen to display an individual location on a map. Many mobile devices such as smart phones have GPS Is a work online with other users connected to a server. 2 method of collaboration are: 1. Collaborative software 2. Document management systems. Collaborative software: Includes tools that enable users to share documents via online meetings and communication with other connected users. An online meeting allows users to share documents with other in real time and we call its as a WEB CONFERENCE. Collaborative software often has chat, white board and video/audio conferencing. Some companies use document management system to make collaboration possible among employees. Document management system: Provide for storage and management of a companys documents such as word processing, presentations and spreadsheets. User can access these documents depending on their needs. Google Docs is a web based document management system that provides
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 85

Collaboration

Diploma in Business management


basic services to its subscribers at no cost. Groupware Is software that helps group of people work together on projects and share information over a network. Is a component of a broad concept called workgroup computing which includes network hardware and software that enables group members to communicate, manage project, schedule meeting and make group decisions. Most group ware provide personal information manager (PIM) function such as an electronic appointment calendar, an address book and a notepad. Which functions much like an answering machine, allows someone to leave a voice message for one or more people. Some voice mail system can send digital voice mail files to an email address and others can convert a voice mail message to a text message for display on a computer or mobile devices. Describe standardized software that enables programmers to create applications that communicate with other remote computers over the internet or over an internal business network.

Voice mail

Web services

Network-types or classifications, architecture, topology

Introduction: Network is a collection of computers and devices connected together via communication devices and transmission media. Network is used to facilitate communications, share hardware, share data and information, share software and transfer funds.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 86

Diploma in Business management


Network can be internal to an organization connecting to the internet. or span the word by

Value added network(VAN) is a third party business that provides networking services for a fee.

Types or classification of network: 3 types of networks: 1. LAN (Local area network) 2. WAN (wide area network) 3. MAN (metropolitan area network)

LAN Is a network that connects computer and devices in a limited geographical area such as a home, school computer laboratory, office building.
Each computer and device on the network are called a node,

often shares resources such as printer, large hard disk and program. The nodes are connected via cables. A wireless LAN (WLAN) is a LAN that uses no physical wires.

WAN

Is a network that covers a large geographic area (such as a city, country or the world) using a communications channel that combines many types of media such as telephone lines, cables and radio waves.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

87

Diploma in Business management


A WAN can be one large network or can consist of 2 or more LANs connected together. The internet is the worlds largest WAN.

MAN

Is a high-speed network that connect local area network in a metropolitan area such as a city or town and handles the bulk of communications activity across the region. A MAN typically includes one or more LANs, but covers a smaller geographic area then a WAN.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

88

Diploma in Business management


A MAN usually is managed by a consortium of users or by a single network provider that sells the service to the users. Example: telephone companies, cable television operators.

Network architectures: Is a design of computer, devices and media in a network. 2 categories of network architectures are: o Client/ Server One or more computer act as a server; the other computer on the network request services from the server. A server control access to the hardware, software and other resources on the network and provides a centralized storage area for programs, data and information. Some servers, called dedicated servers, perform a specific task and can be places with other dedicated servers to perform multiple tasks. The clients are other computer and mobile devices on the network that rely on the server for its resources. A client/ server network typically provides a efficient means to connect 10 or more computer and require a person to serve as a network administrator ( because of the large size of the network)

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

89

Diploma in Business management

o Peer To-Peer Called P2P An internet network on which users access each others hard disk and exchange files directly. These type of P2P network sometimes called as a file sharing network because users with compatible software and an internet connation copy files from someone elses hard disk. And when users log off, other no longer have access to their hard disks. Example: BitTorrent, Gnutella, Kaza and LimWire.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

90

Diploma in Business management

Network topolgies: Refers to the layout of the computers and devices in a communication network. 3 common network topologies uses are: o Bus Consists of a single central cable to which all computers and other devices connect.

The bus is the physical cable that connects the computers and other devices. The bus in a bus network transmit data, instruction and information in both direction. bus networks are popular on LANs because they are inexpensive and easy to install. The advantage: 1. The computers and other devices can be attached and detected at any point on the bus without disturbing the rest of the network.
2. Failure of one device usually does not affect the rest

of the bust network.


Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 91

Diploma in Business management

o Ring A cable forms a closed loop (ring) with all computers and devices arranged along the ring. Data transmitted on a ring network travels from device to device around the entire ring in one direction. When a computer or devices sends data, the data travels to each computer on the ring until it reaches its destination. If a computer or devices on a ring network fails, all devices before the failed are unaffected but those after the failed device cannot function. Span a larger distance than a bus network, but it is more difficult to install. Used in LANs and also in WANs.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

92

Diploma in Business management

o Star All the computers and devices (nodes) on the network connect to a central device, thus forming a star. 2 types of devices that provide a common central connection point for nodes on the network are hub and a switch. All data that transfer from one node to another passes through the hub /switch. Easy to install and maintain. Nodes can be added and removed from the network with little or no disruption to the network.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 93

Diploma in Business management


On star network, if one node fails, only that node is affected but if the hub/switch fails, the entire network is inoperable until the device is repaired.

Communications software Is a program that use to: 1. Help users establish a connection to another computer or network 2. Manage the transmission of data, instruction and information. 3. Provide an interface for user to communicate with one another.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

94

Diploma in Business management

Example: e-mail, FTP, web browser, newsgroup, chat rooms, instant messaging, video conferencing and VoIP.

Communications over the telephone network The public switched telephone network (PSTN) is the world wide telephone system that handles voice-oriented telephone calls. Nearly the entire telephone network today uses digital technology, with the exception of the final link from the local telephone company to a home (which is analog) The telephone communications. network is an integral park of computer

Data, instructions and information are transmitted over the telephone network using : dial-up lines and Dedicated lines.

Dial-up lines: Is a temporary connection that uses one or more analog telephone lines for communications.

Using a dial-up line to transmit data is similar to using the telephone to make a call. A modem at the sending end dials the telephone number of a modem at the receiving end. When the modem at the receiving end answers the call, a communication is established and data can be transmitted,
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 95

Diploma in Business management


Cost is same with a regular telephone call.

Dedicated lines: Is a type of always on connection that is established between 2 communications devices. Quality and consistency much better because dedicated lines provide a constant connection. Dedicated lines can be either analog or digital. 5 types of dedicated lines are: 1. ISDN lines Stand for Integrated Services Digital Network Is a set of standard for digital transmission of data over standard copper telephone lines. Used for home and small business. Provides faster transfer rates than dial-up ISDN requires that both ends of the connection have an ISDN modem.

2. DSL Stand for Digital Subscriber Line. Is a popular digital line alternative for the small business or home user. To connect to DSL, customer must have a special network card and a DSL modem. ADSL (asymmetric digital subscriber line) is a type of DSL that support faster rates when receiving data than when sending data.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 96

Diploma in Business management

3. FTTP Stand for Fiber to the Premises. Uses fiber-optic cable to provide extremely high speed internet access to a users physical permanent location. 2 specific types of FTTP are: FTTH (fiber to the home) FTTB (fiber to the building)

With FTTP service, an optical terminal at your premises receives the signals and transfers them to a router connected to your computer.

4. T-carrier lines Types of long distance digital telephone lines that carry multiple signals over a single communications line. Provide very fast data transfer rates. Very expensive. The popular T-carrier line is T1 line. T1 is uses to connect to the internet backbone.

5. ATM Stand for asynchronous transfer mode. Is a service that carries voice, data, video and multimedia at extremely high speeds. Telephone networks, the internet and other networks with large amounts of traffic use ATM

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

97

Diploma in Business management

Below is a list of the speeds of various lines that can be used to connect to the internet:

Communication devices A communication device is any type of hardware capable of transmitting data, instructions and information between a sending device and a receiving device. types of communication device are:
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 98

Diploma in Business management


1. Dial up modem 2. ISDN and DSL modems 3. Cable modems 4. Wireless modems 5. Network cards 6. Wireless access points 7. routers

Communication channels and media physical and wireless Communication channels and media:

is the transmission media on which data, instruction or information travel in a communication system. The amount of data, instruction and information that travel over a communication channel called bandwidth. The higher the bandwidth, the more the channel transmits. A communication channel consists of one or more transmission media. Transmission media consists of materials or substances capable of carrying one or more signals. 2 types of transmission media are: physical and wireless. An example of sending a request over the internet using a communication channel:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

99

Diploma in Business management

Physical transmission media: Used in communications include twisted-pair cable, coaxial cable and fiber optic cable. These cable are used within or underground between building. Physical transmission media normally use in Ethernet and token ring LANs.

Twisted pair cable: Used for network cabling and telephone system.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

100

Diploma in Business management


Its consists of one or more twisted pair wires bundled together. Each twisted pair wire consists of 2 separate insulated copper wires that are twisted together. The wires are twisted together to reduce noise. Noise is an electrical disturbance that can degrade communications.

Coaxial cable: Referred to as coax (pronounced KO ax). Consists of a single copper wire surrounded by at least 3 layers: 1. An insulating material 2. A woven or braided metal 3. A plastic outer coating

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

101

Diploma in Business management

Its use in cable television (CATV) network wiring because it can be cabled over longer distances than twisted pair cable.

Fiber optic cable: Consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. Each strand, called an optical fiber, is as thin as a human hair. Inside the fiber optic cable, an insulating glass cladding and a protective coating surround each optical fiber.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

102

Diploma in Business management

The advantages of using fiber optic are: 1. Capability of carrying significantly more signals than wire cables. 2. Faster data transmission 3. Less susceptible to noise from other device such as a copy machine. 4. Better security for signals during transmission because they are less susceptible to noise. 5. Smaller size.

Disadvantage of using fiber optic cable: 1. Expensive 2. Difficult to install and modify

Wireless transmission media: It more convenient than installing cable. Types of wireless transmission media are: o Infrared Transmission medium that sends signals using infrared light waves. Mobile computers and device such as a mouse, printer and smart phone have an IrDA port that enables the transfer of data from one device to another using infrared light waves.

o Broadcast radio
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 103

Diploma in Business management

Is a wireless transmission that distributes radio signals through the air over long distances such as between cities, regions and countries and short distances such as within an office or home. Example of device use broadcast radio signals are: Bluetooth, UWB, Wi-Fi and WiMAX.

o Cellular radio Is a form of broadcast. Is used for mobile communication, specifically wireless modems and cell phones. A cell phone is a telephone device that uses highfrequency radio waves to transmit voice and digital data message. Some mobile users connect their notebook or other mobile computer to a cell phone to access the web, send and receive email, enter a chat room.

o Microwaves Are radio waves that provide transmission. a high speed signal

Microwave transmission are called foxed wireless, involves sending signals from one microwave station to another. Microwaves can transmit data are rates up to 4500 times faster than a dial-up modem. A microwaves station is an earth based reflection dish that contains the antenna, transceivers, and other equipment necessary for microwave communication.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

104

Diploma in Business management


Is used in environments where installing physical transmission media is difficult or impossible and where line of sigh transmission is available.

o Communications satellites Is a space that receives microwave signals from an earthbased station, amplifies the signals and broadcasts the signals back over a wide area to any number of earth based station. Is use in air navigation, television and radio broadcasts, weather forecasting, video conferencing, paging, global positioning system and internet connection.

Chapter 8: Database Management

Database, data and information Database is a collection of data organized in a manner that allow access, retrieval and use of that data.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 105

Diploma in Business management


Data is a collection of unprocessed items, which can include text, numbers, images, audio and video. Information is processed data, that is, it is organized, meaningful and useful. Computer process data in a database into information. Example how a data process into information:

With database software, often called a database management system (DBMS), users create a computerized database; add, change and delete data in the database; sort and retrieve data from database; create forms and reports from the data in the database.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

106

Diploma in Business management

Data integrity: Most companies realize that data is one of their more valuable assets because data is used to generate information. To ensure that data is accessible on demand, a company must manage and protect its data just as it would any other resource, thus it is vital that the data has integrity and is kept secure. Data integrity identifies the quality of the data. When a database contains an error, it loses integrity. Garbage in, garbage out (GIGO) is a computing phrase that points out the accuracy of a computers output depends on the accuracy of the input. If we enter incorrect data into a computer (garbage in), the computer will produce incorrect information (garbage out).

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

107

Diploma in Business management

Garbage in

Garbage out

Data integrity is lost

Qualities of valuable information:

The information that data generates also is an important asset. People make decisions daily using all types of information such as receipts, bank statement, pensions plan summaries, stock analyses and credit reports To assist with sound decision making, the information must have value. For it to be valuable, information should be accurate, verifiable, timely, organized, accessible, useful and cost effective

o Accurate - information is error free. o Verifiable - information can be proven as correct or incorrect.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 108

Diploma in Business management


o Timely - information has an age suited to its use. o Organized - information is arranged to suit the needs and requirements of the decision maker. o Accessible information is available when the decision maker needs it. o Useful information has meaning to the person who receives it. o Cost effective information should give more value than its cost to produce.

Hierarchy of data Data is organized in layers. In the computer profession, data is classified in a hierarchy. Each higher level of data consists of one or more items from the lower level. As shown in figure below, a database contains files, a file contains records, a record contains fields and a field is made up of one or more characters.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

109

Diploma in Business management


Characters: A bit is the smallest unit of data the computer can process. Eight bits grouped together in a unit comprise a byte. In the ASCII and EBCDIC coding schemes, each byte represents a single character, which can be a number, letter, punctuation mark or other symbol.

Fields: A field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses. A field name uniquely identifies each field. When searching for data in a database, you often specify the field name. For example : field name for the data in the membership file shown in figure below are membership code, membership name and annual fee.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

110

Diploma in Business management

A database uses a variety of characteristics such as field size and data type to define each field. The field size defines the maximum number of characters a field can contain. The data type specifies the kind of data a field can contain and how the field is used. The example of data type are:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

111

Diploma in Business management

Text
(also called alphanumeric) letters, numbers, or special characters

Numeric
numbers only

AutoNumber
unique number automatically assigned to each new record

Currency
dollar and cent amounts or numbers containing decimal values

Memo Date
month, day, year, and sometimes time lengthy text entries

Yes/No
only the values Yes or No (or True or False)

Hyperlink
Web address that links to document or Web page

Object
photograph, audio, video, or document created in other application such as word processing or spreadsheet

Records:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

112

Diploma in Business management


A record is a group of related field . For example, a member record includes a set of fields about one member.

Member ID 2295 2928 3876 3928 4872

First Name Milton Shannon Louella Adelbert Elena

Last Name Address 1029 Wolf Brewer Avenue 33099 Clark Murray Street 15 Duluth Drake Street Ruiz P.O. Box 45 22 Fifth Gupta Avenue

City Montgomer y Montgomer y Prattville Clanton Auburn

Stat e AL AL AL AL AL

records

key field

fields

A key field or primary key, is a field that uniquely identifies each record in a file. The data is unique to a specific record.

Files:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

113

Diploma in Business management


A data file is a collection of related records stored on a storage medium such as a hard disk, CD or DVD.

Maintaining data File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records to, changing records in and deleting records from a file.

Adding records: Uses to add new records to a file when they obtain new data. Example:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

114

Diploma in Business management

Changing records: Users change a record in a file for 2 reasons: o To correct inaccurate data o To update old data with new data Example:

Deleting records: When a record no longer is needed, a user deletes it from a file. DBMS use a variety of techniques to manage deleted records. Sometimes, the DBMS remove the record from a file immediately, which means the deleted record cannot be restored. Other times, the record is flagged or marked so the DBMS will not process it again. From time to time, users should run a utility program that removes the flagged records and reorganizes current records. For example,
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 115

Diploma in Business management


the discount warehouse may remove from disk any accounts that have been canceled for more than one year. Example:

Validating data:

Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs a validity check that analyzes entered data to help ensure that it is correct. Its Reduce data entry errors and enhance data integrity before program writes data on disk Example:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

116

Diploma in Business management

Types of validity checks:

Check Digit number(s) or character(s) character(s) appended to or to or inserted into a primary key value to value confirm accuracy of primary key value value Alphabetic/ Numeric Check ensures correct type of correct type of Range Check Range Check data entered determines whether number is within within specified range Completenes s Check verifies that a that required field contains data contains data Consistency Consistency Check Check tests for logical tests for logical relationship relationship between two between or more fields or more fields
117

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management

File processing Vs Database management system Almost all application programs use the file processing approach, the database approach or a combination of both approaches to store and manage data. File processing system/ approach: 1. In typical file processing system, each department or area within an organization has its own set of files. 2. The records in one file may not relate to the records in any other file. 3. Companies have file processing systems for many years. A lot of these systems, however have 2 major weaknesses: Data redundancy each department or area in a company has its own files in a file processing system. Thus the same field is stored in multiple files. Isolated data often it is difficult to access data stored in separate files in different departments. Sharing data from multiple, separate files are a complicated procedure and usually require the experience of a computer programmer.

The database approach: 1. When a company uses the database approach, many programs and users share the data in the database. 2. The database does secure its data, however only the authorized users can access certain data items.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

118

Diploma in Business management


3. While a user is working with the database, the DBMS resides in the memory of the computer. 4. The advantages of database approach: Reduced data redundancy most data items are stored in only one file, which greatly reduces duplicate data. Improve data Integrity when users modify data in the database, they make changes to one file instead of multiple files. Thus the database approach increases the datas integrity by reducing the possibility of introducing inconsistencies. Share data - the data in a database environment belongs to and is shared, usually over a network by the entire organization. Companies that use databases typically have security setting to define who can access, add, change and delete the data in a database. Easier Access the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges. Reduced development time it often is easier and faster to develop programs that use the database approach.

5. The disadvantages of database approach: More complex Its require more memory, storage and processing power.

6. Data in a database can be more vulnerable than data in file processing systems. 7. A database can store a lot of data in a single file. Many users and programs share and depend on this data. If the database is not operating properly or is damaged or destroyed, users may not be able to perform their job.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 119

Diploma in Business management

Chapter 9: Security, Ethics and Privacy


Computer security risk A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability. An intentional breach of computer security often involve a deliberately act thet is against the law. Any illegal act involving a computer generally is referred to as a computer crime.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 120

Diploma in Business management


The term cybercrime refer to online or internet based illegal acts. Perpetrators of cybercrime and other intrusions fall into 7 basic categories: 1. Hacker although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hacker claim the intent of their security breaches is to improve security.

2. Cracker also is someone who access a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both cracker and hackers have advanced computer and network skills.

3. Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.

4. Corporate spy have excellent computer and network skills and are hired to break into a specific computer and steal its proprietary data and information. Unscrupulous companies hire corporate spies, a practice known as corporate espionage, to gain a competitive advantage.

5. Unethical employee break into their employers computer for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information.

6. Cyberextortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send a company a threatening ePrepared by: Norliza Muhammad Nor KPTM Kota Bharu 121

Diploma in Business management


mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the companys network.

7. Cyberterrorist is someone who uses the internet or network to destroy or damage computers for political reasons. The extensive damage might destroy the nations air traffic control system, electricity-generating companies or telecommunications infrastructure. Cyberterrorism usually requires a team of highly skilled individuals, millions of dollars and several years of plenning.

Internet and network attacks Information transmitted over network has a higher degree of security risk than information kept on a companys premises. In a business, network usually take measures to protect a network from security risks.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

122

Diploma in Business management


Internet and network attacks that jeopardize security include computer viruses, worms and Trojan horses; botnets, denial of service attack; back doors and spoofing. 1. Computer virus is a potentially damaging computer programs that affects, or infects , a computer negatively by altering the way the computer works without the users knowledge or permission. One the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.

2. Worm is a program that copies itself repeatedly, foe example in memory or on a network, using up resources and possibly shutting down the computer or network.

3. Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.

4. Botnets is a group of compromised computer connected to a network such as the internet that are used as part of a network that attacks other networks, usually for nefarious purpose. A compromised computer, known as a zombie, is one whose owner is unaware the computer is being controlled remotely by an outsider. Cybercriminals use botnets to send spam via e-mail, spread viruses and other malware or commit a denial of service attack.

5. Denial of service attacks or Dos attack is an assault whose purpose is to disrupt computer access to an internet service such as the web e-mail. Perpetrators carry out a Dos attack in a variety of ways. For example, they may use an unsuspecting computer to send an influx of confusing data messages or
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 123

Diploma in Business management


useless traffic to a computer network. The victim computer network eventually jams, blocking legitimate visitors from accessing the network.

6. Back door is a program or set of instruction in a program that allow users to bypass security control when accessing a program, computer or network. Once perpetrators gain access to unsecured computers, they often install a back door or modify an existing program to include a back door, which allows them to continue to access the computer remotely without the users knowledge.

7. Spoofing is a technique use to make their network or internet transmission appear legitimate to a victim computer or network. E-mail spoofing occurs when the senders address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender. E-mail spoofing commonly is used for virus hoaxes, spam and phishing scams. IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

Every unprotected computer is susceptible to the first type of computer security risk. Computer viruses, worms and Trojan horses are classified as malware ( short for malicious software) which are program that act without a users knowledge and deliberately alter the computers operation. Unscrupulous programmers write malware and then test it to ensure it can deliver its payload. The payload is the destructive event or prank the program is intended to deliver. A computer infected by a virus, worm or Trojan horse often has one or more of the following symptoms: 1. Screen display unusual message or image.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 124

Diploma in Business management


2. Available memory is less than expected. 3. Files become corrupted 4. Unknown programs or file mysteriously appear. 5. Music or unusual sound plays randomly. 6. Existing programs and files disappear 7. Programs or file do not work properly 8. System properties change 9. Operating system runs much slower than usual.

Computer viruses, worms and Trojan horses deliver their payload on a computer in 4 basic way: 1. Opens an infected file 2. Run an infected program 3. Boot the computer with infected removable media inserted in a drive or plugged in a port. 4. Connect an unprotected computer to a network

A common way computer become infected with viruses, worms and Trojan horses is through users opening infected e-mail attachment.

Safeguards against computer viruses, worm and Trojan horses by using:

Do not start a computer with removable media such as CDs. DVDs and USB flash drives.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

125

Diploma in Business management


Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source. Set the macro security in programs so you can enable or disable macros Install an antivirus program on all of your computers If the antivirus program flags an e-mail attachment as infected, delete the attachment Check all downloaded programs for viruses, worms, or Trojan horses Install a personal firewall program

Safeguards against botnets, DoS attacks, back door and spoofing by using: Firewalls o Security system consisting of hardware and/or software that prevents unauthorized network access

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

126

Diploma in Business management

Personal firewall o o o Program that protects personal computer and its data from unauthorized intrusions Monitors transmissions to and from computer Informs you of attempted intrusion

Unauthorized access and use Unauthorized access Is the use of a company or network without permission Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities. Safeguards against unauthorized access and use by using:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

127

Diploma in Business management


1. Firewalls Security system consisting of hardware and/or software that prevents unauthorized network access Program that protects personal computer and its data from unauthorized intrusions Monitors transmissions to and from computer Informs you of attempted intrusion

2. 2.

Intrusion Detection software analyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior

Identifying and authenticating users: 1. Username and password

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

128

Diploma in Business management


Unique combination of characters that identifies user Password is private combination of characters associated with the user name that allows access to certain computer

2. Possessed objects

Item that you must carry to gain access to computer or facility Often used with numeric password called personal identification number (PIN)

3. Biometric devices

Authenticates persons identity using personal characteristic Fingerprint, hand geometry, voice, signature, and iris

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

129

Diploma in Business management

Hardware, software, information theft and vandalism Hardware theft and vandalism: 1. Hardware theft is the act of stealing computer equipment. Cables sometimes used to lock equipment Some notebook computers use passwords, possessed objects, and biometrics as security methods For PDAs and smart phones, you can password-protect the device

2. Hardware vandalism is the act of defacing or destroying computer equipment. 3. Safeguards against hardware theft and vandalism by using: Real time location system (RTLS)

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

130

Diploma in Business management

Software theft: 1. Occurs when someone steals software media, intentionally erase programs or illegally copies a program. 2. Software privacy is the unauthorized and illegal duplication or copyrighted software. 3. Safeguards against software theft by using: Back up the file and disks Product activation allows user to input product identification number online or by phone and receive unique installation identification number

License agreement Right to use software Single-user license agreement allows user to install software on one computer, make
131

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


backup copy, and sell software after removing from computer

Information theft: 1. Occurs when someone steals personal or confidential information 2. Safeguards against information theft by using: Encryption Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data
132

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management

Pretty good privacy (PGP)

is popular e-mail encryption program

Digital signature

is encrypted code attached to e-mail message to verify identity of sender

Secure site is Web site that uses encryption to secure data

Digital certificate is notice legitimate that guarantees Web site is

Certificate authority Authorized person or company that issues and verifies digital certificates
133

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Diploma in Business management


Users apply for digital certificate from CA

System failure System failure is another type of computer security risk. A system failure is the prolonged malfunction of a computer. System failure can cause loss of hardware, software, data or information A variety of causes can lead to system failure include natural disasters such as fire, floods or hurricanes; random events such as electrical power problem and even errors in computer programs. One of the more common accuses of system failure is an electrical power variation. Electrical power variations can cause loss of data and loss of equipment. If the computer equipment is networked, a single power disturbance can damage multiple systems. Safeguards against system failure: 1. To protect electrical power variations, use a surge protector. 2. A surge protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment. 3. Sometimes resembling a power strip, the computer and other devices plug in the surge protector, which plugs in the power source. 4. If your computer connects to a network or the internet, also be sure to have protection for your modem, telephone lines, DSL lines, internet cable lines and network lines. 5. Many surge protectors include plug-ins for telephone lines and other cables. 6. For additional electrical protection, some application connects an uninterruptible power supply to the computer.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

134

Diploma in Business management


7. An uninterruptible power supply (UPS) is a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power. 8. A UPS connects between your computer and a power source.

Backing up A backup is a duplicate of a file, program or disk that can be used if the original is lost, damaged or destroyed. We can use any media to store backups. A good choice for a home user might be CD-RW or DVD + RWs. Backup copies should keep in a fireproof and heatproof safe or vault or offsite. Most backup programs for home user provide for a full backup and a selective backup. A full backup copies all of the files in the computer. With a selective backup, users choose which folders and files to include in a backup. Some users implement a 3 generation backup policy to preserve 3 copies of important files. The grandparent is the oldest copy of the file. The parent is the second oldest copy of the file. The child is the most recent copy of file. Most operating systems include a backup program. Backup devices, such as tape and removable disk drive, also include backup programs. Some companies choose to use an online backup service to handle their backup needs. An online backup service is a web site that automatically backs up files to its online location. These sites usually charge a monthly or annual fee. If the system crashes, the online backup service typically sends the company one or more CD/DVDs that contains all its backed up data.

Wireless security

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

135

Diploma in Business management


The safeguards that improve the security of wireless network include reconfiguring the wireless access point and ensuring equipment uses one or more wireless security such as Wi-Fi protected access and 802.11i A wireless point (WAP) should be configured so that it does not broadcast a network name. The WAP also can be programmed so that only certain devices can access it. Wi-Fi protected access (WPA) is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques. An 802.11i network, the most recent network security standard, conforms to the governments security standards and uses more sophisticated encryption techniques than WPA.

Ethics and society Computer ethics are the moral guidelines that govern the use of computers and information systems. 5 frequently discussed area of computer ethic are unauthorized use of computer and network, software theft, information accuracy, intellectual property right and information privacy. Information accuracy: 1. Information accuracy today is a concern because many users access information maintained by other people or companies such as on the internet (web page/ web site). 2. Users should evaluate the value of a web page before relying on its content. 3. Be ware that the company providing access to the information may not be the creator of the information. 4. In addition to concerns about the accuracy of computer input, some individuals and organizations raise questions about the ethic of using computer to alter output, primarily graphical output such as retouched photos.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 136

Diploma in Business management


5. Using graphics equipment and software, users easily can digitize photos and then add, change or remove images.

Intellectual property rights: 1. Intellectual property (IP) refers to unique original works such as ideas, inventions, art, writing, processes, company and product names and logos. 2. Intellectual property rights are the rights to which creators are entitled for their work. 3. A copyright gives authors and arties exclusive rights to duplicate, publish and sell their materials. A copyright protects any tangible from of expression. 4. Issues of the copyright low led to the development of digital rights management (DRM), a strategy designed to prevent illegal distribution of movies, music and other digital content.

Information privacy Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. In the past, information privacy was easier to maintain because information was kept in separate locations. Each retail store had its own credit files. Today, huge database store this data online. Much of the data is personal and confidential and should be accessible only to authorized users The figure below show you how to make your personal data private:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

137

Diploma in Business management


Fill in only the necessary information on rebate, warranty, and registration forms Avoid shopping club and buyers cards Inform merchants that you do not want them to distribute Limit the amount of your personal information information you provide to Web sites; fill in only required Sign up for e-mail information Install a cookie manager to filter cookies Clear your history file when Set up a free browsing you are finished e-mail account; use this e-mail address for Turn off file and print merchant forms sharing on your Internet connection Install a personal firewall

filtering through your Internet service provider or use an antispam program, such as Brightmail Do not reply to spam for any reason Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 138

Diploma in Business management

Electronic profile: 1. Data collected when you fill out form on Web 2. Merchants sell your electronic profile 3. Often you can specify information distributed whether you want personal

Cookies: 1. E-commerce and other web application often rely on cookies to identify users. 2. A cookie is a small text file that a web server stores on your computer. 3. Cookie files typically contain data about you, such as your username or viewing preferences. 4. Many commercial web sites send a cookie to your browser and then your computer hard disk stores the cookie. The next time you visit the web site; your browser retrieves the cookie from your hard disk and sends the data in the cookie to the web site. Figure below show how web site work with cookies:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

139

Diploma in Business management

5. Web sites use cookies for: To track user prefers. To store users password. Keep track of items in a user shopping cart. To track how regularly users visit a site and the web pages they visit while at the site. To target advertisements.

Spyware and adware:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

140

Diploma in Business management


1. Spyware is program placed on computer without users

knowledge that secretly collects information about the user. 2. Spyware can enter a computer as a virus or as a result of a user installing a new program. 3. The spyware program communicates information collects to some outside source while you are online. in a banner or pop-up window on web pages, e-mail messages or other internet services. 5. To remove spyware and adware, you can obtain a spyware and adware remover that can detect and delete spyware and adware. is

4. Adware is a program that displays online advertisements

Phishing: 1. Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information. 2. Some phishing e-mail messages ask you to reply with your information; other directs you to a phony web site or pop-up window that looks like a web site that collects the information.
3. If you receive an e-mail that looks legitimate and requests you

update credit card numbers, social security, bank account numbers, password or other private information, the FTC recommends you visit the web site directly to determine if the request is valid. Never click a link in an e-mail message; instead retype the web address in your browser. 4. A phishing filter: is a program that warns or blocks you from potentially fraudulent or suspicious web site. 5. Pharming: is a scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information,
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 141

Diploma in Business management


except they do so via spoofing. That is, when you type a web address in the web browser, you are redirected to a phony web site that looks legitimate. The phony web site requests you enter confidential information.

Spam:
1. Spam is unsolicited e-mail message sent to many

recipients 2. How to control a spam by using e-mail filtering and anti spam program.

Service that blocks email messages from designated sources Attempts to remove spam

E-mail filtering

Collects spam in central location that you can view any time

Anti-spam program

Sometimes removes valid e-mail messages

Privacy laws:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

142

Diploma in Business management


1. The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data. 2. Common points in some of these laws include the following: Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data. Once collected, provisions should be made to restrict access to the data to those employees within the organization who need access to it to perform their job duties. Personal information should be released outside the organization collecting the data only when the person has agreed to its disclosure. When information is collected about an individual, the individual should know that the data is being collected and have the opportunity to determine the accuracy of the data.

3. Table below shown a summary of the major US government laws concerning privacy:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

143

Diploma in Business management

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

144

Diploma in Business management


Social engineering: 1. Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. 2. Some social engineers trick their victims into revealing confidential information such as user names and password on the telephone, in person or on the internet. 3. Techniques they use include pretending to be an administrator or other authoritative figure, feigning an emergency situation or impersonating an acquaintance. 4. Social engineers also obtain information from users who do not destroy or conceal information property. These perpetrators sift through company dumpsters, watch or film people dialing telephone numbers or using ATMs and snoop around computer looking for openly displayed confidential information.

Employee monitoring: 1. Involves the use of computer to observe, record and review an employees use of a computer, including communications such as e-mail messages, keyboard activity and web sites visited. 2. Many programs exits that easily allow employers to monitor employees, it is legal for employers to use these programs. 3. A frequently debated issue is whether an employer has the right to read employee e-mail messages. 4. Actual policies vary widely. Some companies declare that they will review e-mail messages regularly.

Content filtering: 1. Is the process of restricting access to certain material on the web.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

145

Diploma in Business management


2. Content filtering opponents argue that the burning any materials violates constitutional guarantees of free speech and personal rights. 3. Many business use content filtering to limit employees web access. 4. Web filtering software is a program that restricts access to specified web sites.

Computer forensics: 1. Also called digital forensics or network forensics or cyber forensics. 2. Is the discovery, collection and analysis of evidence found on computer and network. 3. Forensics analysis involves the examination of computer media, programs, data and log files on computer, server, and network. 4. Computer forensics use in: Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments in private sector.

5. Computer forensics analyst must have knowledge about law, technical experience with hardware, software, superior communication skills, familiarity with corporate structure and policies, a willingness to lean and update skills and a knack for problem solving.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

146

Diploma in Business management


Chapter 10: Information system development

The system development cycle

Introduction: A system is a set of components that interact to achieve a common goal. Business many types of systems such as billing system (send invoice and receive payment from customer), payroll system (receive paychecks), manufacturing system ( customer order), inventory system. Very often these system also information system. An information system (IS) is a collection of hardware, software, data, people and procedures that work together to produce quality information. As a computer user in a business, you someday may participate in the modification of an existing system or the development of a new system. Thus, it is important that you understand the system development process. The system development cycle is a set of activities used to build an information system.

System development cycle: System development cycles often organize activities by grouping them into larger categories called phase. 5 phase of system development cycle are: 1. Planning 2. Analysis 3. Design
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 147

Diploma in Business management


4. Implementation 5. Operation, support and security. Figure below shown the activities for each phase.

System development should follow 2 guidelines: arrange activities into phase, involve the users and develop standards. 1. The system development cycle should group activities into phase. Many system development cycles contain the 5 major phase.
Prepared by: Norliza Muhammad Nor KPTM Kota Bharu 148

Diploma in Business management


2. User must be involved throughout the entire system development cycle. Users include anyone for whom the system is being built. Customers, employees, students, data entry clerks, accountants, sales managers and owners all are examples of users. Users are more apt to accept a new system if they contribute to its design.
3. The system development cycle should have standards

clearly defined. Standards are sets of rules and procedures a company expects employees to accept and follow. Having standards helps people working on the same project produce consistent results. Who participates in the system development cycle? System development should involves representatives from each department in which the proposed system will be used. This includes both nontechnical users and IT professionals. During the system development cycle, the system analyst meets and works with a variety of people.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

149

Diploma in Business management

A system analyst is responsible for designing and developing an information system.

Chapter 11: Enterprise computing

What is enterprise computing Introduction:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

150

Diploma in Business management


Enterprise is refer to large multinational corporations, universities, hospitals, research laboratories and government organizations. Enterprise computing involves the use of computers in networks that encompass a variety of different operating systems, protocols and network architectures. A typical enterprise consists of corporate headquarters, remote offices, international office and hundreds of individual operating entities, call functional units. The types of functional units within a typical manufacturing enterprise are accounting and finance, human resources, engineering, manufacturing, marketing, sales, distribution, customer service and information technology. Each type of functional unit has specialized requirements for its information system. Enterprise manages large amounts of information over an extensive geographical area and disparate groups of people

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

151

Diploma in Business management


Organization structure of an enterprise: Most traditional enterprise are organized in a hierarchical below. as shown

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

152

Diploma in Business management


Level of users in the enterprise In an enterprise, users of information typically fall into 4 categories: Executive Management, Middle Management, operational management and nonmanagement employee. The types of information that users require depend on their employee level in organization.

Sample job title: Chief executive officer Chief financial officer President Vice president Chief information officer Chief operating officer
EXECUTIVE MANAGEME NT (Strategic decisions)

MIDDLE MANAGEMENT (tactical decisions)

Human resources manager Public relations manager Purchasing manager

OPERATIONAL MANAGEMENT (operational decisions)

Office manager Shop floor foreman supervisor

NONMANAGEMENT EMPLOYEES (on the job decisions) Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

Accountant Engineer Secretary Order entry cleck 153

Diploma in Business management

Enterprise information

How managers use information: Manager are responsible organizations resources. for coordinating and controlling on

Manager coordinate these resources by performing 4 activities:

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

154

Diploma in Business management

Manager utilize a variety of tools and techniques to focus on information that is important to the decision making process. The tools and techniques use are : o Business intelligence (BI)

Includes several types of applications and technologies for acquiring, storing, analyzing and providing access to information to help users make more sound business decisions. BI application includes decision support systems, query and reporting, online analytical processing (OLAP), statistical analysis and data mining.

o Business process management (BPM)

Includes a set of activities that enterprise perform to optimize their business processes such as accounting and finance, hiring employees and purchasing goods and services.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

155

Diploma in Business management


BPM almost aided by specialized software designed to assist in these activities.

o Business process automation (BPA) Provide easy exchange of information among business applications, reduce the need for human intervention in process and utilizes software to automate processes wherever possible. BPS offers greater efficiency and reduces risks by making processes more predictable.

Information system in the enterprise Enterprise-wide technologies and methodologies The technology used in enterprise are: 1. portal Collection of links, content, and services presented on Web page Designed to guide users to information they are likely to find interesting for a particular job function An information system is a set of hardware, software, data, people and procedures that work together to produce information.

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

156

Diploma in Business management

2. electronic communications infrastructure 3. data warehouses Huge database that stores data required to analyze historical and current transactions

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

157

Diploma in Business management

4. extranets Portion of network that allows customers or suppliers to access parts of enterprises intranet Replaces or supplements existing EDI systems

5. web services Technologies that allow businesses to create products and B2B (business-to-business) interactions

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

158

Diploma in Business management

6. workflow Steps involved in completing project or business process Workflow application is a program that tracks process from start to finish

7. virtual private network Provides secure connection for user connecting to company network server using Internet

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

159

Diploma in Business management

Prepared by: Norliza Muhammad Nor KPTM Kota Bharu

160

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy