Professional Documents
Culture Documents
Tasks in process
Definition Business process flow
management
Sequence of events
Accounting O2C P2P
Use inputs to produce outputs
Source Customer Order Purchase
Coordinated and standardized b. Performance
measures Document Recording Requisition
c. Organizational
Performed by people or setup Journal Pick release Request for
machines quote
Ledger Shipping
Can traverse functional or Quotation
departmental boundaries Invoice
Purchase order
Adjustments Receipt
and creates value for internal or Receipts.
external customers Reconciliation
Balance Payments
Closing
Entries:
Financial
statement
Basis Function based organization Process based organization
Key figure
executive.
Responsive to market
benefits Focus on functional excellence.
requirements.
The product, service and price options activities along different applications
have increased the complexity of the
business A business process can be tracked
E-R Decision
Auditing information system table
Diagram
Flowchart
DFD Decision
tree
Boxes: entities i. One-to-One relationship
Diamonds: relationships (1:1)
ii. One-to-Many relationships Advantages:
Ovals: attributes
(1:N) a) Helpful in database design
iii. Many-to-One relationships b) Gives higher level description
(M:1) of system
iv. Many-to-Many relationships c) Simple and easily
(M:N) understandable
Limitations:
a) Diagram may lead to
misrepresentation
b) Diagram may have some
amount of ambiguity
Entity: An entity is the source or Logical Data Flow Diagram:
destination of data. It focuses on business and how Advantages:
the business operates. Support the logic behind the data
Process: The process is the It describes the business events
manipulation or work that that take place and the data Use as a part of system
transforms data. required and produced by each
event. Easy to understand for technical
Data Store: A data store is where or non-technical person
a process stores data between Physical Data Flow Diagram:
processes. It shows how the system will be Limitations:
implemented. Little confusing for programmers
Data Flow: Data Flow is the It depicts the system. It takes long time to create DFD
movement of data between the
entity, the process and the data
store.
documents through an organization. a) Documentation
c) Program maintenance
d) Effective analysis
the operations or activities performed
and the persons or work-stations.
detailed.
Concerned with the
logical/arithmetic operations on data
Decision
a) Simple to understand and interpret,
Events b) Possible scenarios can be added.
PARTS
decision table.
Decision table do not
express the sequence.
Data
Hardwar
REASONS OF PERVASIVE USE OF IT IN BUSINESS
computers
ARCHITECTURE
ISA
It, also known as computer
CISC Emphasis is on organization, is a lower level buses and switches
In this more emphasis is on software detailed description of the
hardware. Small and limited hierarchies
Instructions are lengthy number of completely describing the
and complex. instructions operation of all parts of the Direct
High cycles per second Cycles per second computing system, and how Memory Access(DMA) is a feature of
Consumes more power are low they are inter-connected and modern computers that allows certain
More expensive and Consumes less inter-operate in order to hardware subsystems within the
complex power implement the ISA computer to access system memory
In this memory-to-memory: Less Expensive independently of the central
LOAD & STORE incorporated Register-to-register processing unit(CPU).
in instructions LOAD & STORE are
independent virtualization, software features
instructions etc.
Deployment Services Architecture of cloud Characteristics of cloud Advantages and
Model (Location Model (XaaS) computing computing disadvantages of cloud
and usage) computing
HYBRID CLOUD
A private cloud is a Services, such as A hybrid cloud is CLOUD
applications and storage, a mix of public
virtualized data center
are available for general and private clouds.
that operates within a
use over the Internet.
Private clouds are Public cloud services
highly virtualized, joined may be offered on a pay-
together by mass per-usage mode or other
quantities of IT purchasing models.
infrastructure into IBMs Blue Cloud
resource pools, and
privately owned and
managed.
IaaS: PaaS: CaaS:
related applications.
Service delivery to client.
All time connectivity
Productivity increases as employee can communicate anytime.
Improved management due to better communication.
Business processes can be transformed by using mobile
devices.
Users get freedom to roam.
Application Network
DBMS System Software Hardware People
Software Links
hardware.
Hierarchical Database Network Database Relational Database Object Oriented
Model Model Model Database Model
Hierarchical Structure
It is an upside-down tree, a network database looks more like a cobweb or interconnected
network of records.
In network databases, children are calledmembers and parents are calledowners.
Unlike Hierarchical in Network structure, each child or member can have more than one
parent (or owner).
Like hierarchical databases, network databases are principally used on mainframe
computers.
Hierarchical Database
Model
Relational Database
Model
In relational databases, the relationship between data les is relational, not hierarchical.
Relational databases connect data in different les by using common data elements or a key
eld.
Data in relational databases is stored in different tables, each having a key eld that uniquely
identies each row.
Relational databases are more exible than either the hierarchical or network database
structure.
In relational databases, tables or les lled with data are called relations, and row or records
are called as tuples, and columns are referred to as attributes or elds.
Relational databases work on the principle that each table has a key eld that uniquely
identies each row, and that these key elds can be used to connect one table of data to
another.
Hierarchical and network databases are all designed to handle structured data; On the other hand, an object-oriented
database can be used to store data from a variety of media sources, such as photographs and text, and produce work, as
output, in a multimedia format.
manipulation.
O.O.databases use small, reusable chunks of software called objects. The objects themselves are stored in the object-
oriented database.
independence
Hardware
Cache
ROUTER SWITCH
network.
Surveys
network resources and trafc
patterns and users needs to
determine how best to
accommodate the needs of the
network as it grows and changes.
LAN VPN
WAN
Local area networks are Covers metropolitan Wide Area
telecommunications area (roughly 40 km Networks are
networks that connect in length from one telecommuni
information processing point to another). cations
devices within a limited PEER
networks
physical area. that cover NETWORK
interconnects
These networks cover large
computer resources in
a geographic area or geographic
Classrooms, Buildings, TIER
region larger than that areas with
Manufacturing plant etc. various
covered by a large NETWORK
communicati
telecommunications on facilities
the area covered by a
media, such as ordinary such as long
telephone writing, coaxial distance
cable, or wireless radio telephone
both data and voice. A
systems to interconnect service,
microcomputer satellite
two cables and does
workstations and transmission,
not contain switching
computer peripherals. and under-
elements.
Examples: Cable sea cables.
television networks.
MAN WAN
LAN
A single computer that contains a A two-tier system consists of a client Three-tier architecture is a client-
and a server. server architecture in which the
access the database is known as A two-tier architecture is a software functional process logic, data access,
. architecture in which a presentation computer data storage and user
There is one computer which stores all layer or interface runs on a client, and a interface are developed and
of the company’s data on a single data layer or data structure gets stored maintained as independent modules
database. on a server. on separate platforms.
The interface used to interact with The database is stored on the server,
the database may be part of the and the interface used to access the Its three tiers are the presentation tier,
database or another program which database is installed on the client. application tier and data tier.
ties into the database itself.
computing devices.
Servers provide the operating system, applets, databases, and database management software needed by the end users in the
network.
In centralized computing all or most of the In decentralized computing resources are not centralized.
processing/computing is performed on a central server. Resources i.e. both hardware and software are allocated to each
The computer itself may control all the peripherals
directly. Most used in modern days and is just opposite of centralized
Centralized computing offers greater security because computing, which was prevalent during the early days of
all the processing is controlled in a central location. computers.
If one terminal breaks down the system still works. The
user can simply go to another terminal and log in again systems.
All computers have to be updated individually with new
The disadvantage of this system is that if central software, unlike a centralized computer system.
computer fails entire system will be unavailable.
Accessing network may also be slow. computers can share peripherals such as printers and scanners as
well as modems, allowing all the computers in the network to
connect to the internet.
STAR
A single cable connects all All nodes are connected in the Every node has a dedicated All nodes are emerging from
computers. form of a loop or ring. point-to-point link. centralized control.
Each computer is There is a direct point-to-point Network lines are expensive. The processing nodes in a
connected to a shared link. The reliability is very high. star network topology
cable. These links are unidirectional. In fully interconnected interconnect directly with a
Allow only one computer There is no any master node for central system.
to transmit at a time. controlling other nodes. connected by a dedicated point If a computer is desired to
Both ends of Cable are to point link to every node. transmit information from one
terminated with a Ring networks offer high Partially connected mesh node to another, it can be done
terminator. performance for a small number of topology is the general only by sending the details to
workstations. topology for wide area the central node, which in turn
Reliable in very small Longer span networks. sends them to the destination.
networks as well as easy to Appropriate for
use and understand. Yields the greatest amount organizations that require a
Requires the least to install of redundancy if nodes fails. centralized data base.
amount of cable. Failure of one computer on the Network problems are easier
Is easy to extend. network can affect the whole to diagnose. It is easy to add new nodes
A repeater can also be network and remove existing nodes.
used to extend a bus The cost of installation and A node failure does not
ring network. maintenance is high bring down the entire network.
Adding or removing computers More complex It is easier to diagnose
can disrupt the network network problems through a
show a bus considerably central hub.
because any computer can
transmit at any time. If a central hub fails, the
Each connection between whole network ceases to
two cables weakens the function.
electrical signal. It requires more cable than
Asynchronous Synchronous
Each character is accompanied by start No start or stop bite are used.
and stop bit.
stop bit is used.
start and stop bit. Needs clock signal between sender and
Doesn’t need clock signal between receiver
sender and the receiver.
A is a A is
connection in which the data (sometimes called an a connection in which the data
alternating connection or semi-
from the transmitter to the duplex) is a connection in which simultaneously.
receiver.
or the other, but not both at the Example: Mobile phones.
same time.
computer to the printer or from
the mouse to computer.
Broadcasting Switched network
In broadcasting networks, data transmitted by one The way in which the nodes switch data from one link to another as it
node is received by many, sometimes all, of the other is transmitted from source to destination node is referred to as a
nodes. switching techniques.
Refers to format of data being exchanged like encoding scheme, character set used etc.
OSI
Threats Vulnerabilities
Security threats can be categorized (i) Software Bugs
into four broad themes:
i. Unstructured Threats
ii. Structured Threats
iii. External Threats information
iv. Internal Threats (v) End users
after organizing it, preparing resources budget, Schedule for task completion.
-Personnel, Hardware, Facilities, Documentation, Supplies, Data, Application, Software and System Software.
-External or Internal
-Accidental/non-deliberate or deliberate.
This step is an assessment of the probability of
-This involves the adjustment of controls which means whether over some time period any control can be
designed, implemented and operated such that the cost of control is lower than the reduction in the expected
losses.
Cryptography is the practice In Cryptography, encryption is the process of a. Authentication: It
and study of techniques for encoding messages (or information) in such a
secure communication in the way that eavesdroppers or hackers cannot read identity of person.
presence of third parties it, but only authorized parties can.
(called Adversaries). This means
It is the message that is to be
data must arrive at the
encrypted.
receiver exactly as it was
Cipher Text: It is the output of the
sent.
encryption process that is transmitted often by
a messenger or radio.
c. Non-repudiation: It
This intruder may hear
refers to inability of
and accurately copies down the complete cipher
either party to deny their
text. However, unlike the intended recipient, he
online actions.
does not know what the decryption key is and
so cannot decrypt the cipher text easily.
The art of breaking ciphers, known as
, and the art of devising them
(cryptography) are collectively known as
.
Private key
Public key encryption
encryption/decryption
SSH SSL
ARCHITECTURE
ARACTERISTICS
Normal List Normal List
The internet is Paragraph E-mail, Paragraph Strategic
developed from a packets with all of the other accessible hosts on thy browsing the sites on business alliances
variety of Internet. Providing
university and Electronic customer and
government line to our house, in which case our phone company is commerce vendor support
sponsored transactions between Collaboration
computer businesses and their among business
networks. Sub suppliers and partners
networks Dial up Connection customers. Buying and
throughout the The Internet selling products
world. the Wireless Connection provide electronic and services
Internet is the discussion forums Marketing, sales
network that and bulletin board and customer
serves as the systems. service applications
backbone for the Downloading Growth of cross-
software and functional business
digital and packet switched. applications
Real-time Emergence of
conversations with applications in
other Internet users. engineering,
cities around the world. The Internet allows manufacturing,
gathering information human resources
through online and accounting.
services using web Enterprise
browsers and search communications
(F) The path a packet takes through the Internet depends on engines. and collaboration.
INTRANET
INTRANET
Secured access: An Intranet
The Intranet is a type usually has a system of access
Productivity privileges controlled by passwords,
that facilitates restricting access to certain areas of
communication within the network.
the organization,
among widely Communication communication.
dispersed departments, Facilitate Information sharing.
divisions, and regional Intranets also can be set up
locations. provide an electronic directory
Business Operations service.
Intranet connect and Management An Intranet also may have a
people together with whiteboard, an electronic chat space
Internet technology, Cost-effective where employees can “talk” to each
other in real time by posting text
Promote Common messages.
Corporate Culture Use of an Intranet for access to
view.
Enhance high potential.
Collaboration It is the name
protocol as in the case given to software used in a group
decision support system, in which
several people jointly solve a
problem.
EXTRANET
ATM
Automated Point-of-Sale
Preauthorized
(PoS)
Machines
Smile cost a million !
and hard work brings a million;
CHAPTER 4
so work hard!
BUSINESS INFORMATION
SYSTEMS
enabler
An information
Information system as an integrated components of a
system used for generic system:
Business Enabler & collecting, storing,
Driver now a days as it processing and a. Input,
helps managing communicating b. Process,
information which information. c. Output,
ultimately increases the d. Feedback and
of e. Control
organization and also
brings innovation.
Management level
Middle managers DSS, MIS
system
Exchange information
the use of computer Management of Electronic mail
systems to execute a variety administrative documents Voice mail
Handling of numerical data Video conferencing
word processing, Meeting planning and Electronic calendaring
accounting, and e-mail. management of work
schedule etc. Imaging
Desktop publishing
always implies a network of Desktop video
computers with a variety of conferencing
available programs.
KM is about I. Rapidly
making the right a. Explicit a. Information is piecemeal, changing
knowledge Knowledge fragmented, particular, business
available to the whereas knowledge is environment
right people. Knowledge structured, coherent and II. Globalization
often universal.
It is about making b. Information is timely, organizational
sure that an transitory, and perhaps composition
organization can even short lived, whereas
learn, and that it knowledge is of enduring
will be able to
retrieve and use its
knowledge assets in message whereas
current knowledge is stock.
applications as they d. Information is acquired by
are needed. being told whereas
knowledge can be acquired
by thinking.
Management Information dos Don’ts Airline reservations
System is an integrated,
user-machine system for Simple and Large and Bank operations
providing information to manageable complex system
support operation, system Delay in hiring
management and decision- Involve programmer
making functions in an programmers in Go for large
organization. need assess me application
Adopt modular In vet heavily
approach in house
Have simple application
software development
Involve users in Depend on
MIS vendor
development completely
DSS
Definition Applications of AI
a. Decision support
b. Information retrieval
is the science and c. Virtual reality
engineering of making d. Robotics
intelligent machines, e. Neural network
especially intelligent f. Expert system
computer programs. It is
related to the similar task
of using computers to
understand human
intelligence.
Business Intelligence
The online e-commerce transaction is composed of three main functions: sales, payment and delivery.
Selling: The company agrees with the customer on the content of a specic order;
Matching: The seller matches the payment information (the authorization results and the actual crediting of account) with the orders
and feeds the result into the back-ofce;
Resolving: The seller and buyer try to resolve delivery or payment issues related to the purchase.
CHAPTER 5
BUSINESS PROCESS
AUTOMATION THROUGH
APPLICATION SOFTWARE
AUTOMATION
BUSINESS APPLICATION :
CLASSIFICATION
SMART
Engage the business process consultant :
Experience, Capability and Expertise
calculate the ROI for project : Technical
In this human intervention is very high In this system computer is used for
DELIVERY CHANNEL
etc.
Controls in BPA
IS Control
To understand the controls
relevant for information
ensures that all system and their audit, the
transactions are approved by responsible study is divided into two
personnel. parts:
(ii) – ensures that no valid A. Managerial Controls
transactions have been omitted. B. Application Controls
ensures that all valid
transactions are accurate
ensures that all recorded
transactions fairly represent the economic
events that actually occurred.
Output
Security Quality Control
Mgmt Control Assurance Database
Mgmt Control Control
control
information systems function : Strategic plan and Operational plan. Both the
plans need to be reviewed regularly and updated as the need arises.
The program development life cycle comprises six major phases Planning;
Control Design; Coding; Testing; and Operation and Maintenance with Control phase
running in parallel for all other phases.
Systems Development Management has responsibility for the functions
concerned with analyzing, designing, building, implementing and maintaining
information systems. Three different types of audits may be conducted those are
audit
Control
trustworthy persons, separating duties etc.
Operations management is responsible for the daily running of hardware and
Control software facilities.
Information security administrators are responsible for ensuring that information
systems assets are secure. Assets are secure when the expected losses that will
occur over some time are at an acceptable level.
Organizations are increasingly producing safety-critical systems and users are
Control becoming more demanding in terms of the quality of the software they employ to
undertake their work.
Application Controls
c) Digital Signatures
d) Plastic Card
Input Control Techniques are : Source Document Control, Data Coding Controls,
Input Controls
Batch Controls, Validation Controls
Altogether these 10 model test papers covers entire syllabus of IT. Most of the questions asked in nal
exam can be seen from these ten (10) model test papers.
Students are advised to solve all papers strictly in a 3 hours format. These test papers will not be helpful
only in nal preparation but also in time management.
Students can get their answer sheet checked and evaluated by Sumit Parashar sir.
1. ANSWERALL (2 *5)
A) What do you mean by ALU and Control Unit? Be brief.
B) Explain semantics and timing of digital transmission.
C) What is Plan-Do-Check-Act?
D) Mention some applications that help entity to achieve BP A.
E) Mention some reasons of failure ofBPMS.
2. A) What are different reasons behind extensive use of IT in business? Explain in brief.
B) Briefly explain the advantages and disadvantages of DBMS.
1. ANSWERALL (2 *5)
A) Explain Logical DFD and Physical DFD.
B) What is Microarchitecture? Explain.
C) Explain ring topology.
D) What are of using a LAN?
E) Mention modules ofHRMS.
1. ANSWERALL (2 *5)
A) Mention advantages and disadvantages of decision tree.
B) Mention some features of Tablet computer.
C) What are different record relationships?
D) Mention objectives of access control.
E) Explain terrestrial micro wave and radio wave transmission.
1. ANSWERALL (2 *5)
A) What are advantages and disadvantages of Decision tree?
B) What are Input and Output devices?
C) Explain Star topology.
D) What are 5 rules of extranet?
E) Explain twisted pair cable and cable.
4. A) explain FAPS.
B) What is network administration and management? Explain various aspects of network management.
1. ANSWERALL (2 *5)
A) Mention functions of AIS.
B) What is value chain automation?
C) Explain Principle of least privilege.
D) What is CRM?
E) Mention advantages and limitation of BUStopology.