6. About the Author
Amir Manzoor holds a bachelor’s degree in engineering from NED
University, Karachi and an MBA from Lahore University of Management
Sciences (LUMS). He also holds more than 12 international IT industry
certifications such as MCSE, MCDBA, CCNA, CCDA, CSA, CCA, A+ etc.
He is an Associate of Institute of Bankers, Pakistan and Certified Supply
Chain Management Professional from NPO, Pakistan. He has served at
senior technical consulting position in New York for many years. He is
currently serving as Assistant Professor at management sciences department
at Bahria University, Karachi.
7.
8. Preface
Present and future age is the age of information technology (IT). In-
formation technology (IT) and business, always closely linked, are becoming
virtually inseparable. Moving forward from their traditional role as an
enabler of organizational effectiveness and efficiency, IT departments now
days often assume leadership roles to drive businesses into new industries
and markets. A growing number of businesses are putting more and more
emphasis on leveraging their IT investments and aligning them with the
organizational goals/objectives. For today’s online businesses the failure of
their IT systems are the business failure. For those businesses a much more
rigorous IT management is needed. The IT management is no longer a sole
IT issue but a business management issue of great interest that is on top
priority of most businesses around the globe.
Most books on IT management are either too lengthy, provide out-
dated material, or lack coverage of the essential topics of information
technology related to business. This book provides coverage of essential
topics related to information technology at work place such as hardware and
software, computer business applications, computer networks, system
analysis and design, information technology in the enterprise, health, safety,
and environment, and ethics in information technology. The book provides
up-to-date coverage of various topics and a large number of examples have
been provided to explain the key concepts.
Amir Manzoor
9.
10. Acknowledgements
It is not possible for me to list everyone who assisted in the prepara-
tion of this book. I thank and am very grateful for the teachers, students and
all individuals who provided their valuable suggestions, feedback, and help
during the preparation of this book.
11.
12. List of Tables
TABLE 1-1: ASCII CODING SCHEME......................................................................... 8
TABLE 1-2: COMPARISON OF COMPUTER AND CALCULATOR ...............................12
TABLE 1-3: GENERATIONS OF COMPUTER.............................................................14
TABLE1-4: COMPARISON OF ANALOG AND DIGITAL COMPUTER ..........................16
TABLE 1-5: COMPARISON OF MAINFRAME, MINI, AND MICROCOMPUTER ..........27
TABLE 2-1: COMPARISON OF CURRENTLY AVAILABLE PROCESSORS .....................47
TABLE 2-2: VARIOUS MEMORY SIZES ....................................................................57
TABLE 2-3: VARIANTS OF DRAM ...........................................................................61
TABLE 2-4: COMPARISON OF FLOPPY DISK AND HARD DISK .................................74
TABLE 2-5: VARIOUS OPTICAL DISCS .....................................................................76
TABLE 2-6: DVD AND BLU-RAY DISCS’ STORAGE CAPACITIES ................................79
TABLE 2-7: VARIOUS MEMORY CARDS AND THEIR USE ........................................82
TABLE 2-8: COMPARISON OF MAGNETIC TAPE AND MAGNETIC DISK ...................84
TABLE 2-9: CLOUD STORAGE PROVIDERS..............................................................86
TABLE 2-10: VARIOUS VIDEO STANDARDS ..........................................................104
TABLE 2-11: COMPARISON OF DOT-MATRIX AND DAISY-WHEEL PRINTER..........109
TABLE 2-12: COMPARISON OF IMPACT AND NON-IMPACT PRINTERS.................114
TABLE 2-13: VARIOUS ADAPTER CARDS ..............................................................119
TABLE 3-1: COMPARISON OF HARDWARE AND SOFTWARE ................................133
TABLE 3-2: VARIOUS UTILITIES............................................................................136
TABLE 3-3: COMPARISON OF SYSTEM AND APPLICATION SOFTWARE ................138
TABLE 3-4: POPULAR WEB APPLICATIONS ..........................................................140
TABLE 4-1: COMPARISON OF SOFT AND HARD COPY ..........................................150
TABLE 4-2: TYPICAL HARDWARE AND SOFTWARE ..............................................155
13. TABLE 4-3: TYPICAL RECOMMENDED PROCESSOR REQUIREMENTS....................157
TABLE 4-4: TYPICAL RAM REQUIREMENTS..........................................................159
TABLE 4-5: TYPICAL INPUT DEVICES ....................................................................161
TABLE 4-6: TYPICAL OUTPUT DEVICES ................................................................163
TABLE 4-7: TYPICAL STORAGE DEVICES...............................................................165
TABLE 6-1: VARIOUS GRAPHIC FORMATS ...........................................................217
TABLE 6-2: COMMONLY USED AUDIO FILE FORMATS .........................................222
TABLE 6-3: VARIOUS APPLICATION SOFTWARE ..................................................230
TABLE 8-1: COMPARISON OF DATA AND INFORMATION ....................................300
TABLE 8-2: FIELDS DATA TYPES ...........................................................................305
TABLE 8-3: POPULAR DATABASE TYPES ..............................................................308
TABLE 8-4: DATABASE MODELS ..........................................................................325
TABLE 9-1: USER INVOLVEMENT IN SYSTEM DESIGN ..........................................345
TABLE 9-2: COMPARISON OF HIGH-LEVEL AND LOW-LEVEL LANGUAGES ...........367
TABLE 9-3: COMPARISON OF MACHINE LANGUAGE AND ASSEMBLY LANGUAGE
...........................................................................................................................367
TABLE 9-4: CLASSIC PROGRAMMING LANGUAGES .............................................375
TABLE 10-1: LAYERS OF OSI MODEL ....................................................................387
TABLE 10-2: TRANSFER SPEEDS OF 802.11 STANDARDS......................................409
TABLE 10-3: THICK COAX CABLE CHARACTERISTICS ............................................419
TABLE 10-4: THICK COAX CABLE CHARACTERISTICS ............................................420
TABLE 10-5: TRANSMISSION SPEEDS OF WIRED MEDIA......................................421
TABLE 10-6: TRANSMISSION SPEEDS OF WIRELESS MEDIA .................................427
TABLE 10-7: COMPARISON OF IP ADDRESS CLASSES...........................................431
TABLE 10-8: GENERIC TOP-LEVEL DOMAINS AND THEIR USE ..............................433
TABLE 11-1: SEARCH ENGINES AND SEARCH DIRECTORIES .................................449
TABLE 11-2: COMMONLY USED SEARCH ENGINE OPERATORS AND THEIR USE...450
14. TABLE 11-3: POPULAR PLUG-INS.........................................................................455
TABLE 11-4: BANDWIDTHS OF INTERNET CONNECTIVITY OPTIONS ....................471
TABLE 12-1: ONLINE SECURITY SERVICES ............................................................506
TABLE 13-1: JOB CHARACTERISTICS AND THEIR MEANING TO WORKERS ...........511
TABLE 14-1: FUNCTIONAL UNITS AND APPLICATIONS USED ...............................531
TABLE 14-2: COMPARISON OF BACKUP METHODS .............................................562
TABLE 15-1: INTERNATIONAL PRIVACY LAWS .....................................................574
TABLE 15-2: CRITERIA FOR WEB SITE CONTENT EVALUATION.............................580
15.
16. List of Figures
FIGURE 1-1: DATA PROCESSING CYCLE................................................................... 6
FIGURE 1-2: COMMON DATA TYPES ...................................................................... 9
FIGURE 1-3: PARALLEL PROCESSING .....................................................................32
FIGURE 2-1: DUAL CORE PROCESSOR....................................................................45
FIGURE 2-2: QUAD CORE PROCESSOR...................................................................45
FIGURE 2-3: COMMUNICATION MECHANISM BETWEEN PROCESSOR AND OTHER
DEVICES ................................................................................................................49
FIGURE 2-4: MACHINE CYCLE ................................................................................54
FIGURE 2-5: MACHINE CYCLE WITH OR WITHOUT PIPELINING..............................55
FIGURE 2-6: MEMORY CACHE ...............................................................................65
FIGURE 2-7: DISK CACHE .......................................................................................66
FIGURE 2-8: COMPONENTS OF A HARD DISK ........................................................69
FIGURE 2-9: CYLINDERS, PLATTERS, TRACKS, AND SECTORS .................................70
FIGURE 2-10: VARIOUS HARD DISK CONTROLLERS................................................73
FIGURE 2-11: SPEED OF VARIOUS STORAGE MEDIA AND ITEMS STORED..............87
FIGURE 2-12: WORKING OF BUSES......................................................................125
FIGURE 2-13: BUS WIDTH ...................................................................................126
FIGURE 3-1: INTERACTION AMONG VARIOUS SOFTWARE TYPES ........................139
FIGURE 4-1: ELEMENTS OF INFORMATION SYSTEM ............................................151
FIGURE 5-1: VIRTUAL MEMORY ..........................................................................200
FIGURE 7-1: INTERNET EXPLORER USER INTERFACE............................................235
FIGURE 7-2: WORD 2010 USER INTERFACE .........................................................243
FIGURE 7-3: EXCEL 2012 USER INTERFACE...........................................................259
FIGURE 7-4: POWERPOINT 2010 USER INTERFACE ..............................................271
17. FIGURE 7-5: PROJECT TRIANGLE .........................................................................283
FIGURE 7-6: PROJECT 2010 USER INTERFACE ......................................................284
FIGURE 8-1: FIELDS AND RECORDS .....................................................................306
FIGURE 8-2: DATA DICTIONARY ..........................................................................315
FIGURE 8-3: TABLES IN A DATABASE...................................................................326
FIGURE 8-4: ACCESS 2010 USER INTERFACE ........................................................328
FIGURE 8-5: ACCESS 2010 DATABASE .................................................................329
FIGURE 9-1: PEOPLE INVOLVEMENT IN SYSTEM ANALYSIS .................................344
FIGURE 9-2: PROJECT REQUEST ..........................................................................347
FIGURE 9-3: AN ERD ...........................................................................................351
FIGURE 9-4: DFD OF HOSPITAL PHARMACY ........................................................352
FIGURE 9-5: DIFFERENT LEVELS OF DFD ..............................................................353
FIGURE 9-6: STRUCTURED ENGLISH ....................................................................354
FIGURE 9-7: DECISION TABLE..............................................................................355
FIGURE 9-8: DECISION TREE................................................................................355
FIGURE 9-9: USE CASE DIAGRAM ........................................................................357
FIGURE 9-10: CLASS DIAGRAM ...........................................................................358
FIGURE 9-11: INTERACTION OF PROGRAMMING LANGUAGES WITH HARDWARE
...........................................................................................................................368
FIGURE 10-1: THE OSI MODEL.............................................................................386
FIGURE 10-2: A WAN ..........................................................................................394
FIGURE 10-3: A CLIENT-SERVER NETWORK .........................................................395
FIGURE 10-4: BUS TOPLOGY ...............................................................................398
FIGURE 10-5: RING TOPOLOGY ...........................................................................399
FIGURE 10-6: STAR TOPOLOGY ...........................................................................400
FIGURE 10-7: WORKING OF INTERNET................................................................403
FIGURE 10-8: A WIRELESS LAN............................................................................408
18. FIGURE 10-9: CLASSIFICATION OF TRANSMISSION MEDIA ..................................417
FIGURE 10-10: WORKING OF CELLULAR RADIO ...................................................423
FIGURE 10-11: WORKING OF TERRESTRIAL MICROWAVE ...................................425
FIGURE 10-12: WORKING OF COMMUNICATION SATELLITE................................426
FIGURE 10-13: IPV4 AND IPV6 ADDRESSES .........................................................430
FIGURE 10-14: WORKING OF DNS .......................................................................432
FIGURE 11-1: WORKING OF E-MAIL ....................................................................443
FIGURE 11-2: WEB ADDRESS STRUCTURE ...........................................................446
FIGURE 11-3: SUBJECT DIRECTORY......................................................................451
FIGURE 11-4: VOIP CONFIGURATION ..................................................................461
FIGURE 11-5: DIAL-UP INTERNET CONNECTION ..................................................465
FIGURE 11-6: ISDN INTERNET CONNECTION .......................................................466
FIGURE 11-7: DSL INTERNET CONNECTION .........................................................468
FIGURE 11-8: LASED-LINE CONNECTION..............................................................470
FIGURE 11-9: SATELLITE INTERNET CONNECTION ...............................................472
FIGURE 12-1: A PHISHING MESSAGE ...................................................................485
FIGURE 12-2: A CAPTCHA....................................................................................495
FIGURE 12-3: WORKING OF FIREWALL ................................................................500
FIGURE 12-4: THE PROCESS OF ENCRYPTION ......................................................502
FIGURE 12-5: WORKING OF VPN .........................................................................505
FIGURE 14-1: IT IN ENTERPRISE...........................................................................525
FIGURE 14-2: AN EIS ...........................................................................................534
FIGURE 14-3: AN EXPERT SYSTEM .......................................................................535
FIGURE 14-4: WORKING OF CRM SYSTEM...........................................................537
FIGURE 14-5: WORKING OF CIM SYSTEM ............................................................538
FIGURE 14-6: WORKING OF ERP SYSTEM ............................................................539
19. FIGURE 14-7: WORKING OF CMS ........................................................................540
FIGURE 14-8: WORKING OF DATA WAREHOUSE .................................................542
FIGURE 14-9: WORKING OF WEB SERVICE ..........................................................545
FIGURE 14-10: WORKING OF NAS .......................................................................553
FIGURE 14-11: WORKING OF SAN AND NAS .......................................................554
FIGURE 14-12: ENTERPRISE STORAGE SYSTEM ...................................................555
FIGURE 14-13: A BLADE SERVER .........................................................................556
FIGURE 14-14: A THIN CLIENT .............................................................................557
FIGURE 14-15: WORKING OF CDP .......................................................................561
20. T ABLE OF C ONTENTS
INTRODUCTION TO INFORMATION TECHNOLOGY ................................................. 1
INFORMATION TECHNOLOGY: INTRODUCTION................................................................... 2
Definition of Computer...................................................................................... 2
Communications Technology (or Telecommunication technology)................... 3
THREE KEY CONCEPTS TO UNDERSTAND HOW COMPUTERS WORK....................................... 3
COMMON CHARACTERISTICS OF COMPUTER..................................................................... 4
DATA PROCESSING CYCLE ............................................................................................. 5
DATA REPRESENTATION ............................................................................................... 6
TYPES OF DATA........................................................................................................... 9
String Data ...................................................................................................... 10
Numeric Data .................................................................................................. 10
TYPES OF DATA PROCESSING DEVICES ........................................................................... 11
IMPACTS OF USING COMPUTERS .................................................................................. 12
Health.............................................................................................................. 12
Public Safety .................................................................................................... 13
Labor Force...................................................................................................... 13
Environment: ................................................................................................... 13
GENERATIONS OF COMPUTERS .................................................................................... 13
CLASSIFICATION OF COMPUTERS .................................................................................. 15
Classes of Computers by Working Principle..................................................... 15
Classes of Computers by Capabilities .............................................................. 17
Classes of Computers by Function ................................................................... 27
Other Classifications of Computers ................................................................. 31
COMPUTER APPLICATIONS IN EVERYDAY LIFE.................................................................. 32
Education......................................................................................................... 32
Finance ............................................................................................................ 33
Banking............................................................................................................ 33
Government..................................................................................................... 33
HealthCare....................................................................................................... 34
Science............................................................................................................. 34
Business ........................................................................................................... 35
Publishing ........................................................................................................ 35
Travel............................................................................................................... 36
21. Engineering...................................................................................................... 36
Transportation................................................................................................. 36
Entertainment ................................................................................................. 37
Construction .................................................................................................... 37
Sports............................................................................................................... 37
Hospitality ....................................................................................................... 37
Space Exploration ............................................................................................ 38
Meteorology .................................................................................................... 38
Agriculture ....................................................................................................... 39
National and Local Security ............................................................................. 39
Textile Industry ................................................................................................ 40
Municipal Services ........................................................................................... 40
Informatics ...................................................................................................... 40
References/Further Readings .......................................................................... 41
COMPUTER HARDWARE .......................................................................................43
INTRODUCTION ......................................................................................................... 44
PROCESSING DEVICES................................................................................................. 44
Central Processing Unit (CPU) ......................................................................... 44
Memory ........................................................................................................... 56
STORAGE DEVICES ..................................................................................................... 66
Storage Disks ................................................................................................... 67
Removable Storage and/or Disk Drives ........................................................... 80
Flash Memory Storage .................................................................................... 80
Other Types of Storage.................................................................................... 83
How the Processor Searches for Data or Program Instructions....................... 87
INPUT DEVICES ......................................................................................................... 88
Keyboard ......................................................................................................... 88
Pointing Devices .............................................................................................. 89
Other Pointing Devices .................................................................................... 90
Touch Screens and Touch-Sensitive Pads ........................................................ 90
Pen Input ......................................................................................................... 91
Scanners and Reading Devices ........................................................................ 91
Mark Recognition and Character Recognition Devices.................................... 94
Audio Input ...................................................................................................... 96
Voice Input....................................................................................................... 96
Video Input ...................................................................................................... 96
22. Biometric Input Devices................................................................................... 98
Terminals......................................................................................................... 98
Input Devices for Physically Challenged Users................................................. 99
OUTPUT DEVICES .................................................................................................... 101
Display Devices .............................................................................................. 101
Printers .......................................................................................................... 106
Audio Output Devices .................................................................................... 114
Other Output Devices .................................................................................... 115
Output Devices for Physically Challenged Users............................................ 116
COMMUNICATION DEVICES ....................................................................................... 116
Modem .......................................................................................................... 117
SYSTEM UNIT (SYSTEM CASE).................................................................................... 117
Expansion Slots and Adapter Cards............................................................... 118
Cables, Ports, And Connectors....................................................................... 119
BUSES................................................................................................................... 123
BAYS .................................................................................................................... 127
POWER SUPPLY ...................................................................................................... 127
POWER PROTECTION DEVICES ................................................................................... 127
REFERENCES/FURTHER READINGS .............................................................................. 129
COMPUTER SOFTWARE ......................................................................................131
INTRODUCTION ....................................................................................................... 132
RELATIONSHIP OF COMPUTER SOFTWARE TO COMPUTER HARDWARE ............................... 133
TYPES OF COMPUTER SOFTWARE ............................................................................... 134
System software ............................................................................................ 134
Programming software ................................................................................. 137
Application software ..................................................................................... 137
SOFTWARE VERSION AND RELEASES............................................................................ 143
SOFTWARE REGISTRATION/ACTIVATION ...................................................................... 143
SOFTWARE DEVELOPMENT ....................................................................................... 143
SOFTWARE LICENSE ................................................................................................. 144
PATENTS ............................................................................................................... 144
PROGRAM AND LIBRARY ........................................................................................... 144
USER-CENTRIC SOFTWARE CLASSIFICATION-LAYERED APPROACH ..................................... 144
Platform Software ......................................................................................... 145
Application Software ..................................................................................... 145
User-written Software ................................................................................... 145
23. COMPUTER SOFTWARE OPERATIONS .......................................................................... 145
ETHICS AND RIGHTS FOR SOFTWARE USERS .................................................................. 146
REFERENCES/FURTHER READINGS .............................................................................. 147
BUSINESS COMPUTER USERS AND BASIC COMPUTER OPERATIONS ...................148
INTRODUCTION ....................................................................................................... 149
WORKING OF COMPUTER ......................................................................................... 149
ELEMENTS OF AN INFORMATION SYSTEM ..................................................................... 150
CATEGORIES OF BUSINESS COMPUTER USERS ............................................................... 151
Small Office/Home Office User...................................................................... 151
Mobile User ................................................................................................... 152
Power User .................................................................................................... 152
Enterprise User .............................................................................................. 152
SELECTING APPROPRIATE HARDWARE AND SOFTWARE ................................................... 153
TIPS FOR APPROPRIATE HARDWARE SELECTION............................................................. 165
Selecting a Processor ..................................................................................... 165
Selecting Input Devices.................................................................................. 166
Selecting Output Devices ............................................................................... 166
Selecting RAM................................................................................................ 167
USING SOFTWARE ................................................................................................... 168
Files and Documents...................................................................................... 168
Folders and Directories.................................................................................. 168
Saving Files or Documents............................................................................. 169
PRINTING .............................................................................................................. 170
EXIT OR QUIT ......................................................................................................... 170
MENUS ................................................................................................................. 170
INSTALLING NEW SOFTWARE ..................................................................................... 172
BACKING UP FILES ................................................................................................... 173
COMPRESSION AND DECOMPRESSION ......................................................................... 174
THE DESKTOP ......................................................................................................... 175
PROGRAMS AND FEATURES ....................................................................................... 177
Features of Modern Software Programs ....................................................... 177
DIFFERENT METHODS OF OPENING DOCUMENTS AND PROGRAMS ................................... 179
CREATING FOLDERS ................................................................................................. 180
MOVING AND DELETING FILES AND FOLDERS ................................................................ 180
MULTIPLE FILE AND FOLDER SELECTION ....................................................................... 181
ORGANIZING YOUR FILES AND FOLDER......................................................................... 181
24. TROUBLESHOOTING ................................................................................................. 182
REFERENCES/FURTHER READINGS .............................................................................. 183
OPERATING SYSTEMS .........................................................................................185
INTRODUCTION ....................................................................................................... 186
HISTORY OF OPERATING SYSTEMS .............................................................................. 186
CATEGORIES OF OPERATING SYSTEMS ......................................................................... 187
Stand-Alone Operating Systems.................................................................... 188
Network Operating Systems.......................................................................... 192
Embedded Operating Systems ...................................................................... 194
Real-time operating system (RTOS)............................................................... 197
OPERATING SYSTEMS: FEATURES AND TECHNOLOGY ...................................................... 197
Boot-Strapping .............................................................................................. 197
Program Execution ........................................................................................ 198
Interrupts....................................................................................................... 198
Protected Mode and Supervisor Mode.......................................................... 198
Memory Management .................................................................................. 198
Multitasking .................................................................................................. 200
Disk Access and File Systems ......................................................................... 201
Device Drivers................................................................................................ 201
Networking.................................................................................................... 201
Security.......................................................................................................... 202
File System Support ....................................................................................... 202
Graphical User Interfaces .............................................................................. 203
FUNCTIONS OF OPERATING SYSTEMS .......................................................................... 203
Starting (Booting) and Shutting Down a Computer ...................................... 203
Providing User Interface................................................................................ 204
Managing the Hardware ............................................................................... 204
Managing the File System ............................................................................. 205
Supporting Programs .................................................................................... 205
Coordinating Tasks ........................................................................................ 205
Configuring Devices....................................................................................... 206
Establishing an Internet Connection.............................................................. 206
Monitoring Performance ............................................................................... 206
Updating Software Automatically................................................................. 207
Controlling a Network ................................................................................... 207
Administering Security .................................................................................. 207
25. REFERENCES/FURTHER READINGS .............................................................................. 208
BUSINESS SOFTWARE AND THEIR APPLICATIONS ...............................................209
INTRODUCTION ....................................................................................................... 210
WORD PROCESSING SOFTWARE ................................................................................. 210
PRESENTATION SOFTWARE........................................................................................ 211
SPREADSHEET SOFTWARE ......................................................................................... 212
DATABASE SOFTWARE .............................................................................................. 213
GRAPHICS SOFTWARE .............................................................................................. 215
NOTE TAKING SOFTWARE ......................................................................................... 217
BUSINESS SOFTWARE SUITE ...................................................................................... 218
PERSONAL INFORMATION MANAGER SOFTWARE........................................................... 218
PHONE SOFTWARE .................................................................................................. 218
PROJECT MANAGEMENT SOFTWARE ........................................................................... 219
ACCOUNTING SOFTWARE.......................................................................................... 219
DOCUMENT MANAGEMENT SOFTWARE....................................................................... 219
ENTERPRISE COMPUTING SOFTWARE .......................................................................... 220
SOUND RECORDING SOFTWARE ................................................................................. 220
VIDEO AND AUDIO EDITING SOFTWARE ....................................................................... 221
MULTIMEDIA AUTHORING SOFTWARE ......................................................................... 223
ANIMATION SOFTWARE ............................................................................................ 224
COMPUTER-AIDED DESIGN SOFTWARE ........................................................................ 224
DESKTOP PUBLISHING (DTP) SOFTWARE ..................................................................... 224
WEB PAGE AUTHORING SOFTWARE ............................................................................ 225
LEGAL SOFTWARE ................................................................................................... 226
TAX PREPARATION SOFTWARE ................................................................................... 227
TRAVEL AND MAPPING SOFTWARE ............................................................................. 227
WEB-BASED TRAINING SOFTWARE ............................................................................. 227
REFERENCES/FURTHER READINGS .............................................................................. 231
MICROSOFT OFFICE 2010....................................................................................232
INTRODUCTION ....................................................................................................... 233
MICROSOFT INTERNET EXPLORER 9 (IE 9).................................................................... 233
Important Features........................................................................................ 233
Keyboard Shortcuts ....................................................................................... 236
Common Commands ..................................................................................... 237
MICROSOFT WORD 2010 ........................................................................................ 241
Important Features........................................................................................ 241
26. Keyboard Shortcuts ....................................................................................... 244
Common Commands ..................................................................................... 245
MICROSOFT EXCEL 2010 ......................................................................................... 258
Important Features ....................................................................................... 258
Keyboard Shortcuts ....................................................................................... 260
Common Commands ..................................................................................... 261
MICROSOFT POWERPOINT 2010............................................................................... 270
Important Features ....................................................................................... 270
Keyboard Shortcuts ....................................................................................... 272
Common Commands ..................................................................................... 273
MICROSOFT PROJECT 2010...................................................................................... 283
Project Planning and Management............................................................... 283
Keyboard Shortcuts ....................................................................................... 285
Common Commands ..................................................................................... 286
REFERENCES / FURTHER READINGS ............................................................................. 297
DATABASE MANAGEMENT SYSTEMS ..................................................................298
DATA, INFORMATION, AND KNOWLEDGE ..................................................................... 299
DATABASE ............................................................................................................. 300
Components of a Database System............................................................... 301
Advantages of Database Systems ................................................................. 304
IMPORTANT DATABASE TERMINOLOGY ........................................................................ 304
Field ............................................................................................................... 304
Record ........................................................................................................... 305
File ................................................................................................................. 306
Key................................................................................................................. 306
DATABASE MANAGEMENT SYSTEM (DBMS)................................................................ 307
Functions of DBMS ........................................................................................ 309
Characteristics of a good DBMS .................................................................... 310
Advantages of DBMS..................................................................................... 310
Disadvantages of DBMS ................................................................................ 312
Difference between DBMS and a File Management System ......................... 313
Primary Functions of DBMS........................................................................... 313
Components of the DBMS ............................................................................. 314
DATABASE UTILITIES ................................................................................................ 319
TYPES OF DATABASES............................................................................................... 320
Individual databases ..................................................................................... 320
27. Shared Databases.......................................................................................... 320
Distributed databases ................................................................................... 321
Public Databases ........................................................................................... 321
MAJOR TYPES OF DATABASE ORGANIZATIONS (OR MODELS)........................................... 322
Hierarchical Databases.................................................................................. 322
Network Database......................................................................................... 322
Relational Database ...................................................................................... 323
Object-Oriented Database............................................................................. 324
Navigational Database.................................................................................. 324
WEB-BASED DATABASES........................................................................................... 325
MICROSOFT ACCESS 2010........................................................................................ 326
Important Features........................................................................................ 326
Keyboard Shortcuts ....................................................................................... 330
Common Commands ..................................................................................... 331
REFERENCES/FURTHER READINGS .............................................................................. 338
SYSTEM ANALYSIS, DESIGN, AND DEVELOPMENT...............................................339
INTRODUCTION ....................................................................................................... 340
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC).................................................................. 340
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) MODELS ..................................................... 340
ADVANTAGES OF SDLC ............................................................................................ 342
SYSTEM DEVELOPMENT GUIDELINES ........................................................................... 342
Grouping of Activities into Phases ................................................................. 342
User Involvement in System Design............................................................... 343
Standards ...................................................................................................... 345
Documentation.............................................................................................. 346
PHASES OF SYSTEM DEVELOPMENT............................................................................. 346
Planning, Feasibility Study, and Initiation ..................................................... 348
Gathering Requirements and System Analysis .............................................. 349
System Design ............................................................................................... 359
System Implementation................................................................................. 360
System Testing............................................................................................... 361
System Maintenance/Support....................................................................... 362
Post-Implementation Review ........................................................................ 363
COMPUTER PROGRAMS AND PROGRAMMING LANGUAGES.............................................. 364
Classification of Programming languages..................................................... 364
Classification of High-Level Programming Languages .................................. 368
28. PROGRAM DEVELOPMENT TOOLS............................................................................... 371
Rapid Application Development (RAD).......................................................... 371
Microsoft .NET............................................................................................... 372
F#................................................................................................................... 372
Microsoft Visual Studio ................................................................................. 372
OTHER PROGRAMMING LANGUAGES AND DEVELOPMENT TOOLS ..................................... 374
Fourth Generation Languages (4GLs)............................................................ 374
Classic Programming Languages................................................................... 374
Application Generators ................................................................................. 376
Macros........................................................................................................... 376
WEB PAGE DEVELOPMENT ....................................................................................... 376
Hypertext Markup Language (HTML) and Extensible HTML (XHTML) .......... 376
Extensible Markup Language (XML) and wireless markup language (WML) 377
Scripts, Applets, Servlets, and ActiveX Controls............................................. 378
CGI Scripts ..................................................................................................... 379
Scripting Languages ...................................................................................... 380
Dynamic HTML (DHTML) ............................................................................... 381
Ruby on Rails (RoR) ....................................................................................... 382
REFERENCES/FURTHER READINGS .............................................................................. 383
COMPUTER NETWORKS......................................................................................384
INTRODUCTION ....................................................................................................... 385
COMPUTER COMMUNICATIONS ................................................................................. 385
OSI Reference Model ..................................................................................... 385
Uses of Computer Communications .............................................................. 388
COMPUTER NETWORK ............................................................................................. 390
ADVANTAGES OF USING NETWORKS ........................................................................... 390
NETWORK CLASSIFICATION ....................................................................................... 392
Network Classification Based on Scale .......................................................... 392
Network Classification Based on Connection Method................................... 394
Network Classification Based on Functional Relationship............................. 395
NETWORK TOPOLOGY .............................................................................................. 397
INTERNETWORK ...................................................................................................... 401
Intranet.......................................................................................................... 401
Extranet......................................................................................................... 402
Internet.......................................................................................................... 402
INTERNET2 ............................................................................................................ 404
29. NETWORK COMMUNICATIONS STANDARDS .................................................................. 405
Ethernet......................................................................................................... 406
Token Ring ..................................................................................................... 406
TCP/IP ............................................................................................................ 406
Wi-Fi .............................................................................................................. 407
Bluetooth ....................................................................................................... 409
Ultra-WideBand (UWB) ................................................................................. 409
IrDA................................................................................................................ 410
RFID ............................................................................................................... 410
Wi-Max .......................................................................................................... 410
Wireless Application Protocol (WAP)............................................................. 411
COMMUNICATIONS SOFTWARE .................................................................................. 412
BASIC HARDWARE COMPONENTS OF A NETWORK ......................................................... 412
Modems......................................................................................................... 412
Network Interface Cards................................................................................ 413
Wireless Access Points................................................................................... 414
Hub ................................................................................................................ 414
Switch ............................................................................................................ 414
Bridge ............................................................................................................ 414
Router............................................................................................................ 415
Repeater ........................................................................................................ 415
COMMUNICATION CHANNELS .................................................................................... 416
Transmission Media ...................................................................................... 416
CONNECTING TO A NETWORK .................................................................................... 427
The Network Hardware and Transmission Medium ...................................... 427
Network Protocol Software ........................................................................... 427
IP Addressing and Domain Names ................................................................ 428
Domain Name System (DNS) ......................................................................... 431
USE OF NETWORKS.................................................................................................. 435
REFERENCES/FURTHER READINGS .............................................................................. 437
THE INTERNET ....................................................................................................439
INTRODUCTION ....................................................................................................... 440
INTERNET POPULATION: LANGUAGES AND ORIGIN ......................................................... 441
INTERNET AND THE WORKPLACE ................................................................................ 441
INTERNET ON MOBILE DEVICES .................................................................................. 441
COMMON USES OF INTERNET .................................................................................... 442
30. E-MAIL ........................................................................................................... 442
Instant Messaging ......................................................................................... 444
World Wide Web (WWW) ............................................................................. 445
Search Engines and Subject Directories......................................................... 448
Blogs.............................................................................................................. 451
Podcasts ........................................................................................................ 452
Vodcasts ........................................................................................................ 452
Web Applications .......................................................................................... 452
Web 2.0 and Web 3.0.................................................................................... 452
Social Networking Sites ................................................................................. 453
Multimedia on the Web ................................................................................ 454
Web Advertising ............................................................................................ 456
Content Management ................................................................................... 456
Newsgroups and Message Boards ................................................................ 456
FTP and Telnet............................................................................................... 456
Remote Access............................................................................................... 457
Collaboration................................................................................................. 457
File Sharing .................................................................................................... 458
Streaming Media........................................................................................... 459
Voice Over IP (VoIP)....................................................................................... 460
Leisure Activities............................................................................................ 461
Marketing on The Web.................................................................................. 462
INTERNET ACCESS ................................................................................................... 463
Access Providers ............................................................................................ 463
INTERNET CONNECTIVITY OPTIONS ............................................................................. 464
Dial-Up .......................................................................................................... 465
Integrated Services Digital Network (ISDN)................................................... 466
Broadband Connections: Cable, DSL, FTTP, Leased Lines .............................. 467
Wireless Connections: Satellite, Wi-Fi, Fixed Wireless, Cellular Network...... 472
REFERENCES/FURTHER READINGS .............................................................................. 475
COMPUTER SECURITY .........................................................................................477
COMPUTER SECURITY: INTRODUCTION ........................................................................ 478
SECURITY AND SYSTEMS DESIGN ................................................................................ 478
COSTS OF COMPUTER SECURITY BREACHES .................................................................. 479
REASONS FOR ATTACK ON THE COMPUTER SYSTEM ....................................................... 479
PEOPLE RESPONSIBLE FOR SECURITY BREACHES ............................................................ 480
31. Hacker ........................................................................................................... 480
Cracker........................................................................................................... 480
Script kiddie ................................................................................................... 480
Corporate spy ................................................................................................ 481
Corrupt Employees ........................................................................................ 481
Cyber Extortionist .......................................................................................... 481
Cyber Terrorists ............................................................................................. 482
COMPUTER SECURITY RISKS ...................................................................................... 482
Internet and Network Attacks ....................................................................... 483
Unauthorized Access and Use of Computer and Network............................. 494
Hardware Theft and Vandalism..................................................................... 495
Software Theft ............................................................................................... 495
Information Theft .......................................................................................... 496
System Failure ............................................................................................... 496
MITIGATING SECURITY VULNERABILITIES ...................................................................... 496
CLASSIFICATION OF SECURITY MEASURES .................................................................... 498
SECURITY TOOLS AND TECHNIQUES ............................................................................. 499
Firewalls ........................................................................................................ 499
Intrusion Detection System (IDS) ................................................................... 500
Honeypots...................................................................................................... 501
Digital Forensics ............................................................................................ 501
Encryption...................................................................................................... 502
Digital Certificates ......................................................................................... 503
Transport Layer Security (TLS) ....................................................................... 503
Secure HTTP................................................................................................... 504
VPN................................................................................................................ 504
WIRELESS NETWORK SECURITY .................................................................................. 505
SECURITY SERVICES AND INFORMATION ....................................................................... 506
REFERENCES/FURTHER READINGS .............................................................................. 507
HEALTH, SAFETY, AND ENVIRONMENT ...............................................................509
INTRODUCTION ....................................................................................................... 510
CHARACTERISTICS OF HEALTHY JOB............................................................................. 510
HEALTH AND SAFETY ................................................................................................ 511
Health Issues of Computer Use...................................................................... 511
Ergonomics and Workplace Design ............................................................... 512
Video Displays at Work.................................................................................. 512
32. Repetitive Strain Injury (RSI).......................................................................... 513
Musculoskeletal Problems............................................................................. 513
Eye Strain....................................................................................................... 514
Working Environment ................................................................................... 514
Stress ............................................................................................................. 514
Computer Addiction....................................................................................... 515
Laptop Related Health Challenges ................................................................ 515
COMPUTER SYSTEMS, JOB AUTONOMY, AND POWER..................................................... 515
Computer System and Power ........................................................................ 516
COMPUTER SYSTEMS AND USE OF VALUED SKILLS ......................................................... 517
COMPUTER SYSTEMS AND MEANINGFULNESS OF WORK ................................................. 518
Variety and Scope of Work ............................................................................ 518
Computer-Mediated Work ............................................................................ 519
COMPUTER SYSTEMS AND SOCIAL RELATIONSHIPS ......................................................... 520
REFERENCES/FURTHER READINGS .............................................................................. 521
INFORMATION TECHNOLOGY IN ENTERPRISE.....................................................523
INTRODUCTION ....................................................................................................... 524
TYPES OF ENTERPRISES ............................................................................................. 525
TOOLS AND TECHNIQUES OF ENTERPRISE INFORMATION MANAGEMENT............................ 526
Business Intelligence (BI) ............................................................................... 526
Business process Management (BPM) .......................................................... 527
Business Process Automation (BPA) .............................................................. 527
INFORMATION SYSTEMS IN THE ENTERPRISE ................................................................. 528
INFORMATION SYSTEMS WITHIN FUNCTIONAL UNITS ..................................................... 528
GENERAL PURPOSE INFORMATION SYSTEMS................................................................. 532
Office Information System (OIS) .................................................................... 532
Transaction Processing System (TPS) ............................................................ 532
Management Information System (MIS)....................................................... 533
Decision Support System (DDS) ..................................................................... 533
Expert System ................................................................................................ 534
OTHER ENTERPRISE INFORMATION SYSTEMS ................................................................ 536
Artificial Intelligence (AI) Systems ................................................................. 536
Knowledge Management System (KMS) ....................................................... 536
Integrated Information system (IIS) .............................................................. 536
Customer Relationship Management (CRM)................................................. 537
Customer Interaction Management (CIM) .................................................... 538
33. Enterprise Resource Planning (ERP) System .................................................. 539
Content Management System (CMS) ............................................................ 539
ENTERPRISE-WIDE TECHNOLOGIES ............................................................................. 541
Portals ........................................................................................................... 541
Data warehouse ............................................................................................ 541
Electronic Data Interchange (EDI) ................................................................. 543
Extranets........................................................................................................ 544
Web services.................................................................................................. 544
Service – oriented Architecture (SOA) ........................................................... 547
Software As A Service (SAAS)......................................................................... 547
Data Centers.................................................................................................. 548
Document Management System (DMS) ........................................................ 548
Workflow ....................................................................................................... 549
Virtualization ................................................................................................. 549
Cloud computing and Grid computing........................................................... 549
E-commerce................................................................................................... 550
Neural Networks............................................................................................ 551
ENTERPRISE HARDWARE ........................................................................................... 551
Redundant Array of Inexpensive Disks (RAID) ............................................... 551
Network Attached Storage and Storage Area Networks............................... 552
Enterprise Storage Systems ........................................................................... 554
Blade Servers ................................................................................................. 556
Thin Clients .................................................................................................... 557
MEASURING EFFECTIVENESS OF ENTERPRISE INFORMATION SYSTEMS ................................ 558
Availability..................................................................................................... 558
Scalability ...................................................................................................... 558
Interoperability.............................................................................................. 559
DISASTER RECOVERY ................................................................................................ 559
Disaster recovery Plan ................................................................................... 559
Emergency Plan ............................................................................................. 559
Backup Plan ................................................................................................... 560
Recovery Plan ................................................................................................ 562
Test Plan ........................................................................................................ 562
REFERENCES / FURTHER READINGS ............................................................................. 564
ETHICS IN INFORMATION TECHNOLOGY.............................................................567
ETHICS AND SOCIETY ................................................................................................ 568
34. Unauthorized Access and Use of Computer and Network............................. 568
Software Piracy ............................................................................................. 568
Information Accuracy .................................................................................... 569
Intellectual Property Rights ........................................................................... 569
Information Technology Codes of Conduct ................................................... 570
Green Computing .......................................................................................... 570
INFORMATION PRIVACY ............................................................................................ 571
International Privacy Laws ............................................................................ 572
Guidelines to Protect Privacy......................................................................... 575
Threats Against Privacy................................................................................. 576
Content Filtering............................................................................................ 578
INDEX .................................................................................................................583