Chikki
Chikki
MBA (HR)
1st Semester (Section- B)
pg. 1
1) Five Input and Five Output device
Computer is electronics device which takes instructions from the user for input data further it
process the data and required the output or result. Computer consists of five elements
hardware, software, the user, procedures and data.
Hardware components of computer basically consists of input devices, output devices, CPU
(CU+AIU), Storage Unit. Input devices consists of Keyboard, Mouse, Scanner, Joystick,
Light pen, Microphone where as Output devices consists of Monitor, Printer, Speaker,
Projector, Plotter. Elaboration of Input and Output devices given below,
Input devices and output devices are essential components in information technology systems
for business applications. Here are five examples of each:
Input Devices:
Keyboard: Keyboards are common input devices that allow users to input alphanumeric
characters, commands, and other data into a computer system. They are widely used for
various business applications, including data entry and communication. The design of the
keyboard comes from the typewriter keyboards, and numbers and letters are arranged on the
keyboard in that way, which helps to type quickly.
The above keyboard design is called QWERTY design because of its first six letters across in
the upper-left-hand corner of the keyboard. Although the keyboard design is derived from the
typewrites, nowadays, it also includes many other keys as well as Alt/Option, Control, and
Windows key can be used as shortcuts to perform the particular operation by combination
with other keys. For example, if you press Control + S while working on a document
in Microsoft Word, it will save the document you are working on. Furthermore, most of the
keyboards have function keys (F1 to F12 or F16) at the top of the keyboard and arranged
arrow keys in the downside used to perform numerous functions.
Types of keyboards
Most computer users use the standard keyboard, which connects to the computer. Although
there are many types of a computer keyboard, such are as follows:
Flexible keyboard
Ergonomic Keyboard
pg. 2
Wireless Keyboard
Mechanical Keyboard
Virtual Keyboard
Projection Keyboard
Gaming Keyboard
Mouse: A mouse is a pointing device that enables users to interact with graphical user
interfaces. It is commonly used for navigation, selection, and manipulation of on-screen
objects in business applications. It controls the movement of the cursor on the computer
screen and allows users to move and select folders, text, files, and icons on a computer. It is
an object, which needs to put on a hard-flat surface to use. When the users move the mouse,
the cursor moves in the same direction on the display screen. The name mouse is derived
from its size as it is a small, corded, and elliptical shape device that looks a bit like a mouse.
A connecting wire of a mouse is imaginable to be the mouse's tail. Additionally, some of the
mice have combined features like extra buttons, which may be assigned and programmed
with many commands. The mouse invention is considered as one of the most important
breakthroughs in the computer field as it helps to reduce the use of a keyboard.
pg. 3
Hovering: When you move the mouse pointer on any object, hover changes the color
of links, and by clicking on that link, you can go on the destination page.
Scroll Up & Down: If you are viewing a long web page or working with a large
document, you need to scroll up or down a page. The mouse's scroll button helps to up
and down your document page; otherwise, you can also click and drag the scroll bar.
Perform other functions: Most of the desktop mouse contains buttons, which can
perform any function by programming them according to the requirement. For
instance, on the thumb portion, many mouses have two side buttons that can be
programmed to go back on web pages.
Playing Game: A mouse provides users the option to play various games like chase
games, in which a mouse is used to select any particular objects.
Barcode Scanner: Barcode scanners are used to input data by scanning barcodes on products
or documents. In business applications, they are often employed for inventory management,
sales transactions, and tracking. A barcode reader is a handheld optical scanner that includes a
lens, light sensors and light source to translate the optical data and impulses into the electrical
impulse. A barcode generally consists of a decoder circuit that helps to analyse the data in the
image printed in the barcode. The decoder circuit sends the printed information to the output
and helps in preparing the documents of the objects. Barcode readers successfully scan the
barcode that is machine-readable information in the form of parallel lines or groups of
numbers generally used for inventory management and payment.
Reading barcodes needs some technology and they help in knowing the process. Barcode can
be read by dragging the barcode tip across its bars. The light was absorbed by the dark bars
and the lights were reflected back by the white space. Laser scanners, pan readers, camera-
based readers, and CCD readers are the technology or process that helps in the process of
reading a barcode. It is also important to note that reading barcodes also faces some
challenges. They can be such as bleed in ink, colour contrast that is insufficient, peeling of
the barcode labels and many more.
Types of Barcode Reader
Various types of Barcode readers can be seen in this field and Pen-type readers are one of
them. LED scanners that are also famous as CCD readers are another type of Barcode Reader.
pg. 4
A laser scanner is another part of this type and it helps in scanning the beam of a laser.
Camera-based readers are another type of reader in this study and it is a new type of barcode
reader. Other types related to this aspect are cell phone cameras, barcode scanners related to
the omni-directional part, Housing as well as the Barcode library. All these are considered to
be the types of Barcode readers, and they have different roles in this field.
For navigating a GUI, the touch screens are alternative to a mouse or keyboard and also offer
an easier way to give input. The various devices, such as smartphones, information kiosks,
computers, laptop displays, tablets, and cash registers, all have a touch screen. Instead than
using touch-sensitive input, some touch screens use a grid of infrared beams to detect the
presence of a finger.
Although it may look like a simple display screen, it contains numerous layers that identify
input. The hard protective is the first layer, which preserves touchscreen components and the
actual display. An electronic grid is located under the protective layer that identifies inputs
given by users. Instead of using this grid, most modern touchscreens utilize capacitive
material in which, when the screen is touched, the electrical charge changes. The LCD layer,
which is located under the touchscreen layer used for the actual display.
A touch screen has two major advantages: it eliminates the need for an intermediary device
and allows users to interact directly with what is displayed rather than using a mouse or
touchpad to control a pointer. They can also be used as a terminal to connect to a network or
a computer. In the design of digital appliances like video games, satellite navigation devices,
personal digital assistants, and mobile phones, touch screens play a vital role. Modern touch
screens are capable of supporting "multi-touch" input, whereas older touchscreens were only
able to identify a single point of input at a time. Originally, iPhone made this technology
popular, which makes it capable of the screen to identify several finger motions at once. On
some touchscreen devices, for example, you can rotate photos by twisting three fingers
clockwise or counterclockwise.
pg. 5
Microphone: Microphones are input devices that convert sound waves into electrical signals.
They are used for voice input, enabling users to interact with speech recognition systems in
various business applications, such as voice commands and dictation. The first electronic
microphone was based on a liquid mechanism, which used a diaphragm that was connected to
a current- charged needle in a diluted sulfuric acid solution. It was not able to reproduce the
intelligible speech.
Regularly, microphones are designed on the basis of directionality, besides the type of device.
Such as, Omnidirectional microphones are capable of picking up all sounds in an area, but it
is unable to focus on a particular subject with background noise. Bidirectional, directional,
and shotgun microphones are beneficial for an interview. However, two
unidirectional devices can provide the same effect, like cardioid microphones. the use of a
microphone on the computer:-
Output Devices:
Monitor/Display: Monitors or displays are output devices that present visual information
generated by a computer. They are essential for viewing documents, reports, graphics, and
other output from business applications. The first computer monitor was introduced on 1
March 1973, which was part of the Xerox Alto computer system.
Older monitors were built by using a fluorescent screen and Cathode Ray Tube (CRT), which
made them heavy and large in size and thus causing them to cover more space on the desk.
Nowadays, all monitors are made up by using flat-panel display technology, commonly
backlit with LEDs. These modern monitors take less space on the desk as compared to older
CRT displays.
pg. 6
Types of monitor
Printer: Printers produce hard copies of digital documents and reports. In business
applications, printers are used for creating physical records, invoices, reports, and other
printed materials. A printer is a hardware output device that is used to generate hard copy and
print any document. A document can be of any type such as a text file, image, or the
combination of both. It accepts input command by users on a computer or on other devices to
print the documents. For example, if you have to submit a project report at your college, you
need to create a soft copy of your report and print it with the help of the printer.
Printers are one of the common computer peripheral devices that can be classified into two
categories that are 2D and 3D printers. The 2D printers are used to print text and graphics on
a paper, and 3D printers are used to create three dimensional physical objects.
Types of printer
pg. 7
Although there are different types of printers, nowadays, two types of printers are commonly
used, which are inkjet and laser printers. A list of all the various types of printers is given
below:
Inkjet Printers
Laser Printers
3D Printers
LED Printers
Solid Ink Printers
Dot Matrix Printers
Multifunction or All-in-One Printers
Thermal printer
Plotter
Speakers: Speakers are output devices that produce audio output. In business applications,
they are used for multimedia presentations, conference calls, and other audio-related
activities.
Speakers are used to connect to a computer to generate sound, which are one of the most
common output devices. Some speakers are designed to connect with any kind of sound
system, while some can be hooked up only with computers. With the computer speaker, the
computer's sound card creates a signal that is used to produce sound. The primary objective
of speakers is to offer audio output for the listener. The electromagnetic waves are converted
into sound waves through the speaker as they are transducers. The devices, like an audio
receiver or computer, give audio input to speakers, which may be in the form of analog or
digital. The function of the analog speaker is simply to magnify the analog electromagnetic
waves into sound waves.
There are many tasks or events that can be completed through speakers. They are used to
produce sound to hear by the listener, create surround sound, add more bass with a
subwoofer. External speakers are also available in the market that needs to attach to the
computer or another device to produce the sound. The external speakers are not needed if you
do not need louder sounds, louder sounds, more bass, or you have a smartphone, laptop, or
other devices that have internal speakers.
Projector: Projectors are used to display digital content, such as presentations and
multimedia, on a larger screen or surface. They are often utilized in business meetings,
conferences, and training sessions. A projector is an output device that is capable of
connecting to a computer, which may be an other option for a monitor or television in terms
of displaying pictures to a large number of people. It takes images generated by a Blu-ray
pg. 8
player or a computer and projects them onto a large surface like a wall or white screen.
Projectors come in many shapes and sizes and are used in conditions like a classroom, home
cinemas, office training or presentation sessions, etc. The projector looks like the below
picture.
Commonly, projectors come a few inches tall and about a foot long and wide. They may be
portable and freestanding and can be mounted on ceilings. Ceiling-mounted projectors come
in a large size with a long-distance like 30 feet or more. The main applications of these kinds
of projectors are places of worship, conference rooms, classrooms, and auditoriums.
On the other hand, some of the projectors have the potential to support Wi-Fi and Bluetooth
conectivity, and most projectors are designed in a way that they can have different input
sources, such as VGA ports for older devices and HDMI ports for newer equipment.
Plotter: Plotters are specialized output devices used for producing large-scale graphics,
engineering drawings, and architectural designs. In business applications, plotters are
valuable for industries such as architecture, engineering, and design. A plotter is a type of
printer that prints vector graphics. It is a piece of computer gear that converts computer
commands into paper line drawings. It draws a line with one or more automatic pens. Unlike
a traditional printer, a plotter uses a pen, marker, pencil, or other writing tools to draw
multiple rather than toner. It may also use vector graphics files or commands to draw
continuous point-to-point lines. Though it was previously widely used for computer-aided
design, it is now only used to print hard copies of schematics and other comparable
application.
Applications of Plotters
Draw charts
Computer-aided designs
Architectural Blueprints
Textile Printing
pg. 9
These input and output devices collectively enable users to interact with and extract
information from business applications, facilitating efficient and effective business processes.
Internet Services: Internet services refer to the various resources and capabilities that can be
accessed over the internet. These services are provided by servers and can be utilized by
individuals, organizations, and other entities connected to the internet. Internet services
enable users to communicate, share information, access data, and perform various tasks
online. Some common examples of internet services include:
Email (Electronic Mail): Email, short for electronic mail, is a method of exchanging digital
messages over the internet. It is a widely used form of communication that allows individuals
and businesses to send messages, documents, and other files to one or more recipients. Email
operates on a store-and-forward model, where messages are sent from the sender's email
client to a server, and then the server delivers the messages to the recipient's email server.
The recipient can then retrieve the messages using their email client.
1. Email Address: Each user has a unique email address, typically in the format
"username@domain.com." This address is used to identify and route messages to the
intended recipient.
pg. 10
3. Email Server: Email servers handle the storage and forwarding of emails. They store
messages until the recipient's email client requests them. Common email protocols for
communication between clients and servers include POP3 (Post Office Protocol) and
IMAP (Internet Message Access Protocol).
4. Subject Line: Emails have a subject line that briefly describes the content or purpose
of the message.
5. Attachments: Users can attach files, such as documents, images, or videos, to their
emails.
6. CC (Carbon Copy) and BCC (Blind Carbon Copy): These options allow users to
send copies of an email to additional recipients. CC is visible to all recipients, while
BCC keeps the additional recipients hidden.
7. Inbox and Sent Items: Most email clients have folders to organize received emails
(inbox) and sent emails (sent items).
8. Spam and Filters: Email services often include spam filters to automatically identify
and separate unwanted or suspicious emails from legitimate ones.
Email has become a fundamental communication tool for personal and professional purposes.
It is used for sending messages, collaborating on projects, sharing information, and
conducting business communication.
FTP (File Transfer Protocol): FTP is a protocol used for transferring files between
computers on a network. It enables the upload and download of files from one host to
another. Businesses often use FTP for sharing documents and files securely.
1. Client-Server Model: FTP operates on a client-server model. The user interacts with
an FTP client on their local machine, which connects to an FTP server on a remote
host.
4. Modes: FTP supports two modes of data transfer: ASCII and binary. ASCII mode is
used for text files, while binary mode is used for non-text files, ensuring that the data
is transferred correctly.
pg. 11
5. Passive and Active Mode: FTP can operate in passive or active mode. In active
mode, the client opens a random port for data transfer, while in passive mode, the
server opens a random port. Passive mode is often used in situations where the client
is behind a firewall.
6. Anonymous FTP: Some FTP servers allow anonymous access, where users can log
in with the username "anonymous" or "ftp" and provide their email address as the
password. This is commonly used for public file repositories.
FTP has been widely used for decades and is still employed in various scenarios, although
more secure alternatives like SFTP (Secure File Transfer Protocol) and FTPS (FTP Secure)
have gained popularity. These secure alternatives provide encryption and authentication,
addressing some of the security concerns associated with traditional FTP.
Search Engine: A search engine is a software system designed to retrieve information from
the internet. It allows users to search for content such as web pages, images, videos, and other
types of files based on keywords or phrases. The primary function of a search engine is to
index and organize the vast amount of information available on the internet, making it easily
accessible to users. Search engines like Google, Bing, and Yahoo provide a service that
allows users to search for information on the internet. They index web pages and return
relevant results based on user queries.
Key components and features of search engines include:
1. Web Crawling: Search engines use automated programs called web crawlers or
spiders to browse the internet and discover new web pages. These crawlers follow
links from one page to another, indexing the content they find along the way.
2. Indexing: The information collected by web crawlers is organized and stored in a
searchable index. This index is a database that contains information about the content
of web pages, the keywords used, and the relationships between different pages.
3. Ranking Algorithm: When a user enters a search query, the search engine uses a
ranking algorithm to determine the most relevant results. The algorithm takes into
account factors such as keyword relevance, page quality, and the number of links
pointing to a particular page.
4. User Interface: Search engines provide a user interface, usually a website, where
users can enter their search queries and view the search results. The results are
typically presented as a list of links, along with brief descriptions or snippets of the
content.
5. Query Processing: Search engines process user queries to understand the intent
behind the search. They may use natural language processing and other techniques to
provide more accurate and relevant results.
6. Sponsored Results: In addition to organic (non-paid) search results, search engines
often display sponsored results or advertisements. Advertisers pay to have their
content displayed prominently in the search results for specific keywords.
pg. 12
Search engines play a crucial role in helping users find relevant information on the internet
quickly and efficiently. They are a fundamental tool for research, information retrieval, and
navigation in the digital age.
Telnet: Telnet is a protocol that allows users to remotely access and manage devices or
systems over a network. While it has been largely replaced by more secure protocols like
SSH (Secure Shell), Telnet is still used in some specific applications.
Key features and concepts related to Telnet include:
1. Terminal Emulation: Telnet enables terminal emulation, allowing a user to access a
remote system's command-line interface as if they were physically present at that
system. This is useful for managing remote devices or servers.
2. Client-Server Model: Telnet operates on a client-server model. The user's device
runs a Telnet client, which connects to a Telnet server on the remote device.
3. Port Number: Telnet typically uses port 23 for communication. When connecting,
the user specifies the IP address or hostname of the target device along with the port
number.
4. Plain Text Transmission: One important aspect to note is that Telnet transmits data,
including usernames and passwords, in plain text. This makes Telnet less secure
compared to modern alternatives like SSH (Secure Shell), which encrypts the
communication between the client and server.
5. Authentication: Users need to provide a valid username and password to log in to the
remote system via Telnet, assuming the system is configured to require authentication.
While Telnet was widely used in the past for remote access and management of systems, its
use has diminished in favor of more secure protocols like SSH. The security concerns
associated with Telnet, particularly the lack of encryption, make it vulnerable to
eavesdropping and unauthorized access. Therefore, it is generally recommended to use more
secure alternatives when managing remote systems, especially over the internet.
If security is a concern, it's advisable to use SSH instead of Telnet for remote access, as SSH
encrypts the data transmitted between the client and server, providing a more secure
communication channel.
DSL (Digital Subscriber Line): DSL uses telephone lines for internet connectivity
but provides a faster connection compared to dial-up. It allows for simultaneous
internet access and phone use. There are different types of DSL, such as ADSL
(Asymmetric DSL) and SDSL (Symmetric DSL).
pg. 13
Cable Modem: Cable internet uses the same coaxial cables that deliver cable
television. It offers higher speeds than DSL and is widely used in residential and
business settings.
Mobile Data (3G, 4G, 5G): Mobile data connections use cellular networks to provide
internet access. They are commonly used on mobile devices like smartphones and
tablets. The evolution from 3G to 4G and now 5G has significantly increased data
transfer speeds.
pg. 14
Windows XP: Windows XP is a Microsoft operating system that was released on October
25, 2001, as part of the Windows NT family of operating systems. It succeeded Windows
2000 and was designed to be a more consumer-friendly version of the Windows operating
system. Windows XP brought about significant improvements in terms of user interface,
stability, and performance compared to its predecessors. It introduced a more visually
appealing interface, with a start menu, taskbar, and other features that have become standard
in subsequent Windows versions.
Basic Operations:
1. Desktop Interface: Windows XP features a graphical user interface with a desktop
where users can place shortcuts to applications, files, and folders. The desktop
includes the Start button, taskbar, and system tray.
2. Start Menu: The Start menu provides access to programs, documents, settings, and
shut down options. Users can navigate through the Start menu to launch applications
and access various system functions.
3. File Management: Windows Explorer is the file management tool in Windows XP.
Users can create, copy, move, and delete files and folders. The interface allows for
easy navigation and organization of files.
4. Taskbar: The taskbar at the bottom of the screen displays open applications and
system tray icons. Users can switch between open programs by clicking on their
respective taskbar buttons.
5. Control Panel: The Control Panel is a centralized hub for configuring system
settings. Users can customize display settings, manage hardware, install printers, and
perform other system-related tasks.
6. System Security: Windows XP includes basic security features such as user accounts,
file permissions, and a built-in firewall. However, it's important to note that Windows
XP is no longer supported, and users are encouraged to upgrade to a more secure
operating system.
7. Networking: Windows XP supports networking features, enabling users to connect to
the internet, share files and printers on a local network, and configure network
settings.
Utilities:
pg. 15
Disk Cleanup: This utility allows users to free up disk space by removing temporary
files, system cache, and unnecessary files.
Disk Defragmenter: Disk Defragmenter rearranges fragmented data on the hard
drive, optimizing disk performance and improving overall system speed.
System Restore: System Restore enables users to revert the system to a previous state
in case of errors or issues. It creates restore points that capture the system's settings at
a specific moment.
Task Manager: Task Manager provides an overview of running processes, CPU
usage, and memory usage. Users can end unresponsive tasks or monitor system
performance.
Device Manager: Device Manager allows users to view and manage hardware
devices installed on the system. It is used for updating drivers, troubleshooting device
issues, and managing hardware resources.
Features:
User Accounts: Windows XP supports multiple user accounts, each with its settings
and preferences. Users can switch between accounts or log in with a password.
Windows Update: Windows XP introduced the Windows Update feature, allowing
users to download and install critical updates, security patches, and service packs to
keep the operating system up-to-date.
Remote Desktop Connection: Windows XP Professional includes Remote Desktop,
enabling users to connect to their computer remotely. This is useful for accessing files
or running applications from another location.
Fast User Switching: This feature allows multiple users to be logged in
simultaneously, with the ability to switch between user accounts without logging out.
Internet Explorer: Windows XP comes with Internet Explorer as the default web
browser. However, users can install alternative browsers for internet access.
pg. 16
It's important to note that Windows XP reached its end of support in April 2014, meaning
Microsoft no longer provides security updates or patches for the operating system. Users are
strongly encouraged to upgrade to a more modern and secure operating system.
pg. 17
Mail Merge: Mail Merge is a powerful feature in Word that allows users to create
personalized documents, such as letters or envelopes, by merging a document with a data
source (e.g., Excel spreadsheet). This is particularly useful for generating mass mailings with
customized content.
Mail Merge Steps:
1. Open Microsoft Word: Launch Microsoft Word and create a new blank document.
2. Select Mailings Tab: In the ribbon at the top, select the "Mailings" tab.
3. Start Mail Merge: Click on "Start Mail Merge" and choose the type of document you
want to create (e.g., Letters, Envelopes, Labels).
4. Select Recipients: Click on "Select Recipients" to choose a data source for the mail
merge. This can be an existing Excel spreadsheet, Access database, or a new list
created in Word.
5. Insert Merge Fields: Place the cursor where you want to insert personalized
information, such as a recipient's name, and click on "Insert Merge Field" to choose
fields from the data source.
6. Preview the Document: Click on "Preview Results" to see how the document will
look for each recipient.
7. Complete the Merge: Click on "Finish & Merge" and choose whether to print the
documents directly, create a new document, or send them by email.
Macro Steps: In Microsoft Word, a macro is a series of recorded actions or commands that
can be executed to automate repetitive tasks. Macros can help streamline processes and save
time by allowing users to perform complex actions with a single command. Here's a basic
overview of how macros work in MS Word:
1. Enable Developer Tab: Go to the "File" tab, click on "Options," select "Customize
Ribbon," and check the "Developer" option.
2. Open Visual Basic for Applications (VBA): In the Developer tab, click on "Visual
Basic" to open the VBA editor.
3. Create a New Macro: In the VBA editor, right-click on any item in the left pane,
choose "Insert," and then select "Module" to create a new module.
4. Write the Macro Code: Write the VBA code for the macro in the module. This code
defines the actions the macro will perform when executed.
5. Run the Macro: Close the VBA editor, return to the Word document, and go to the
Developer tab. Click on "Macros," select the macro you created, and click "Run" to
execute the macro.
Macros in Word are sequences of instructions that can automate repetitive tasks. They are
written in Visual Basic for Applications (VBA) and can be customized to perform specific
actions within the Word environment.
pg. 18
5) Features of MS-Excel (Include chart creation steps, formula)
Microsoft Excel is a spreadsheet program developed by Microsoft as part of the Microsoft
Office suite of productivity software. It is widely used for creating, managing, and analyzing
numerical data, making it a powerful tool for a variety of tasks ranging from simple
calculations to complex financial modeling. Excel provides a grid interface, known as a
worksheet, where data is organized into rows and columns.
pg. 19
13. Insert Chart: Go to the "Insert" tab in the ribbon, click on the "Chart" option, and
choose the type of chart you want to create (e.g., Column Chart, Line Chart, Pie
Chart).
14. Customize Chart: After inserting the chart, you can customize it by adding titles,
labels, and legends. Right-click on chart elements to access formatting options.
15. Change Chart Type: If you want to change the chart type, select the chart, go to the
"Design" tab in the ribbon, and choose a different chart type.
16. Adjust Chart Data: To modify the data range included in the chart, right-click on the
chart, select "Select Data," and update the data series.
17. Format Axes and Gridlines: Format the chart axes, gridlines, and other elements by
right-clicking on them and selecting formatting options.
18. Save and Share: Once the chart looks the way you want, you can save the Excel file
and share it with others. You can also copy the chart to paste it into other documents
or presentations.
Formulas
pg. 20
1. SUM:- The SUM () formula performs addition on selected cells. It works on cells
containing numerical values and requires two or more cells
2. MIN and MAX :- The MIN () formula requires a range of cells, and it returns the
minimum value The MAX () formula is the opposite of MIN (). It will return the
maximum value from the selected range of cells.
3. AVERAGE:- The AVERAGE () formula calculates the average of selected cells. You
can provide a range of cells or select individual cells.
4. COUNT:- The COUNT () formula counts the total number of selected cells. It will not
count the blank cells and different data formats other than numeric.
5. POWER:- The POWER () formula is used to square, cube, or apply any raise to
power to your cell.
Chart in excel :- chart is a visual representative of data in both columns and rows. Charts are
usually used to analyse trends and patterns in data sets. Let’s say you have been recording the
sales figures in Excel for the past three years. Using charts, you can easily tell which year had
the most sales and which year had the least. You can also draw charts to compare set targets
against actual achievements.
6) Features of MS-PowerPoint
Microsoft PowerPoint is a presentation software developed by Microsoft as part of the
Microsoft Office suite. It is a widely used tool for creating slideshows and presentations,
allowing users to convey information in a visually engaging and organized manner.
PowerPoint presentations are commonly used in business, education, and various other
settings to communicate ideas, share information, and deliver speeches.
pg. 21
Microsoft PowerPoint Features:
Slide Creation: PowerPoint is designed for creating presentation slides. Users can
add new slides, choose different layouts, and organize content in a structured manner.
Slide Design: PowerPoint offers a variety of pre-designed themes and templates,
allowing users to create visually appealing presentations with consistent design
elements.
Text Formatting: Users can format text on slides by changing fonts, sizes, colors,
and applying styles such as bold, italics, and underline. Paragraph formatting options,
including alignment and spacing, are also available.
Inserting Media: PowerPoint supports the insertion of various media elements,
including images, audio, video, and shapes. Users can enhance their presentations
with multimedia content.
Transitions and Animations: Users can add transitions between slides to create
smooth visual effects when transitioning from one slide to the next. Animations can
be applied to individual elements within a slide.
Slide Show Functionality: PowerPoint includes a powerful slide show mode that
allows users to present their slides in a full-screen view. Presenter view provides
additional features for presenters, such as speaker notes and a timer.
Notes and Comments: Users can add speaker notes to each slide, providing
additional information for the presenter. Comments can also be added for
collaboration and feedback.
SmartArt Graphics: PowerPoint includes SmartArt, which allows users to create
visually appealing diagrams and charts to represent information in a structured and
organized manner.
Charts and Graphs: Users can create various types of charts and graphs directly
within PowerPoint to visualize data and trends.
Master Slides: Master slides enable users to define the overall layout and design
elements for the entire presentation. This ensures consistency across all slides.
Hyperlinks: PowerPoint supports hyperlinks, allowing users to link to other slides,
external websites, or files. This is useful for creating interactive presentations.
Collaboration: PowerPoint supports collaboration features, allowing multiple users
to work on a presentation simultaneously. Changes are synchronized in real-time
when the presentation is stored on a shared platform like OneDrive or SharePoint.
Export and Sharing: Users can export presentations in various formats, such as PDF
or video. PowerPoint presentations can be easily shared via email or online platforms.
Slide Transition Customization: Users can customize the transition effects between
slides, controlling the speed and style of transitions for a dynamic presentation.
Screen Recording: PowerPoint allows users to record their screen or specific
application windows directly within the presentation, making it convenient for
demonstrations or tutorials.
These features collectively make Microsoft PowerPoint a versatile tool for creating engaging
and impactful presentations in various professional and educational settings.
pg. 22
7) E-Business Framework and Business Model B2B, B2C and
C2C
E-Business Framework: An e-business framework refers to the underlying structure and
components that facilitate electronic business activities. It includes the technological
infrastructure, software applications, and business processes that enable organizations to
conduct business over the internet. The key components of an e-business framework typically
include:
E-Business Models: E-business models describe the approach a business takes to generate
revenue and conduct transactions online. There are several common e-business models,
including B2B, B2C, and C2C:
B2B (Business-to-Business):
Definition: B2B e-business involves transactions between businesses. It includes the buying
and selling of products, services, or information between two or more businesses.
Example: A manufacturer purchasing raw materials from a supplier through an online
platform.
B2C (Business-to-Consumer):
pg. 23
Definition: B2C e-business focuses on transactions between businesses and individual
consumers. It involves businesses selling products or services directly to end-users.
Example: An online retail store selling clothing, electronics, or other consumer goods directly
to customers.
C2C (Consumer-to-Consumer):
Definition: C2C e-business involves transactions between individual consumers. It facilitates
a platform where consumers can buy and sell directly to each other.
Example: Online auction platforms or classified ads websites where individuals sell used
goods or services to other consumers.
pg. 24
Scope: Larger than a LAN but smaller than a WAN, typically covering a city or a large
campus.
Characteristics:
Spans a larger geographical area than a LAN but is more localized than a WAN.
Provides high-speed connectivity, often using fiber-optic cables.
Commonly used for connecting multiple LANs within a city or a large organization.
Examples include city-wide networks for universities or corporations.
pg. 25
Scope: Very small, typically within the immediate proximity of an individual person.
Characteristics:
Primarily used for connecting storage devices, such as disk arrays or tape libraries, to
servers.
Enables efficient and centralized management of storage resources.
pg. 26
Commonly used in enterprise environments with extensive data storage needs.
These network types vary in size, scope, and purpose, and organizations often use a
combination of these networks to meet their communication and connectivity requirements.
pg. 27
Credit Card Fraud: Unauthorized use of credit card information for financial gain,
often through online transactions.
Online Fraud and Scams: Deceptive schemes conducted over the internet to trick
individuals into providing money, sensitive information, or valuable goods.
pg. 28
10) Social Media Evolution in Business Function
The evolution of social media has significantly impacted various business functions,
transforming the way companies engage with customers, market their products or services,
and manage their brand image. Here's an overview of how social media has evolved in
different business functions:
1. Early Days: Businesses used social media for brand presence, sharing updates, and
building a community of followers.
2. Evolution: Social media is a key tool for brand building and maintaining a positive
brand image. Companies use storytelling, visual content, and user-generated content
to create a brand narrative that resonates with their audience.
1. Early Days: Some businesses experimented with selling products directly on social
media, but it wasn't a primary sales channel.
2. Evolution: Social commerce has become a significant revenue stream. Platforms like
Instagram and Facebook allow businesses to set up online shops, tag products in
posts, and facilitate seamless transactions directly within the platform.
pg. 29
1. Early Days: Limited use of social media for recruitment, mainly through professional
networking platforms like LinkedIn.
2. Evolution: Social media platforms are now essential for recruitment and employer
branding. Companies showcase their workplace culture, engage with potential hires,
and even use platforms like LinkedIn to actively recruit talent.
1. Early Days: Limited use of social media for gathering customer feedback and
monitoring trends.
2. Evolution: Social media analytics tools provide businesses with valuable insights.
Companies analyze customer sentiment, monitor trends, and gain real-time feedback,
aiding in data-driven decision-making.
Internal Communication:
1. Early Days: Social media was primarily seen as an external communication tool,
with limited use for internal communication.
2. Evolution: Companies use internal social networks and collaboration tools to
enhance communication among employees, fostering a sense of community and
improving team collaboration.
Crisis Management:
1. Early Days: Businesses were caught off guard by the speed at which negative
information could spread on social media.
2. Evolution: Social media is now a critical component of crisis management.
Companies actively monitor and address issues on social media platforms, responding
quickly to mitigate reputational damage.
The evolution of social media in business functions reflects a broader shift towards digital
transformation. Companies that effectively integrate social media into their overall strategy
gain a competitive edge in terms of customer engagement, brand visibility, and adaptability to
changing market dynamics.
pg. 30