You are on page 1of 120

Business process

Tasks in process
Definition Business process flow
management
 Sequence of events
 Accounting O2C P2P
 Use inputs to produce outputs
 Source  Customer Order  Purchase
 Coordinated and standardized b. Performance
measures  Document  Recording  Requisition
c. Organizational
 Performed by people or setup  Journal  Pick release  Request for
machines quote
 Ledger  Shipping
 Can traverse functional or  Quotation
departmental boundaries  Invoice

 Purchase order
  Adjustments  Receipt
and creates value for internal or  Receipts.
external customers   Reconciliation
Balance  Payments

 Closing
Entries:

 Financial
statement
Basis Function based organization Process based organization

 In this work unit is


Work unit
Department.

Key figure
executive.

 Responsive to market
benefits  Focus on functional excellence.
requirements.

 In this organization, there are


barriers to communication. Only  Both vertical and horizontal
vertical communication is communication is established.
present.
weakness

 Lack of end-to-end focus to End-to-en streamlining of


optimize organizational functions hence increased
processes. operational complexity.

 Support cost leadership


Strategic value Support differentiation.
strategy.
Organizational Business Operational Business Strategy describes long term concepts to
Processes Processes Business Strategy develop a sustainable competitive advantage in
the market.
 high-level processes  The activities and their Business strategy is broken down to
relationship are goals operational goals.
textual form by their implementation aspects
inputs, their outputs, their of business process are Organizational in textual form by their inputs, their outputs,
expected results and their ignored. Business their expected results and their dependencies
dependencies on other Processes on other organizational business processes.
organizational business  These are the basis for
processes. developing implemented
business processes. In this the activities and their relationship are
Operational
Business business process are ignored. These are the
Processes basis for developing implemented business
processes
It contain information on the execution of the
Implemented process activities and the technical and
business process organizational environment in which they will
be executed.
BPM

Benefit of using tech


Principles of BPM Practices of BPM BPM L-Cycle
for BPM
a. Effectiveness through
automated coordination process are key vehicle i. Process oriented
of success. organizational  Analysis of the current
b. Distribution of tasks structure environment and current
among individuals and ii. Appoint process owner processes
integration of By measuring,
applications monitoring, controlling, commitment and
and analyzing business Bottom-up execution
c. Creation of basic processes. iv. Use IT to manage  Evaluation of potential
operational value process solutions to meet the
proposition. 3. Continuous v. Collaborate with
improvement: business partners  Business process designing
organization needs to vi. Align employees bonus and business process
improve its processes and rewards with modeling.
continuously to stay business process
competitive. performance  Project preparation, blue
vii. Common integrated
information system to preparation, go live and
it's an essential enabler monitor, analyze and support.
of BPM. improve process.
It provides effectiveness, viii. Utilize both  Execution or deployment
incremental (Six and business process
Sigma) and Radical monitoring.
(BPR) methodologies. Iterate for
continuous improvement.
Theories of BPM

BPR TQM Six-Sigma

TQM processes are divided


and breakthrough into four sequential categories:
Plan, Do, Check, and Act. and their requirements
 Reinvention
 Clean-slate approach II.
 It involves gathering
not enhancing or improving.  Collecting relevant data information on current
 Ascertain root cause of process and attributes of
Success Factors problem. CTQ are determined.

ii. Do: III.


involvement and empowerment of all employees.  Develop and implement  In this possible causes of
include active solutions.
representatives from top management, business  Determine measurement  These possible causes are
process owners, technical experts and users. parameters to gauge analyzed statistically to
It is important to effectiveness. determine root cause of
identify exactly what current processes need variation.
reengineering. Evaluate result.
Set of hardware,
software, networks, facilities, etc. iv. Act:  Alternative solutions are
BPR involves  Results are documented,
changes in people behavior and culture, processes recommendations are  Elimination of errors.
and technologies. given.
BPR is V. Control:
an ongoing process.  Process is standardized
and documented. Pilot
run.
BPM
Implementation

Key factors Need for BPM Implementation BPA=Benefits and risks

Long-term future positioning


or entire company  Create short-term cost effectiveness i. Saving on costs: labor costs
 Initiate continuous improvement ii. Staying ahead in competition
 Introduce a knowledge of product and iii. Fast service to customers
improvement, automation, iv. Reducing the impact of human
reengineering.  Re-engineer the business radically error
 Address the cultural barriers
 Introduce leadership and a role for
managers and improved staff. i. Risk to job
ii. False sense of security:
employees, basic education, existing Automating poor processes will
skills set. not gain better business practices.

TOOLS: White boards, sticky notes,


software for mapping, documentation
etc.

department level, process owner level,


employee level.
BPM Implementation

Challenges in BPA Implementation BPM Technology

 The number of interfaces with the  BPM provides an independent process


customers is growing (e.g. phone, fax, layer.
email, sms, PDA, etc.)

 The product, service and price options activities along different applications
have increased the complexity of the
business  A business process can be tracked

 Low Budgets.  An organization can monitor its


performance

management can make instant changes and


validate

 Short-term return on investment (ROI) by


better management and elimination of
errors and issues.
AIS

I. Collect and store data:


capturing transaction data A.
from source document and 1. Financial cycle
posting data from journals 2. Production cycle
to ledgers. 3. Revenue cycle
4. Expenditure cycle
II. Record transaction: 5. HR cycle
B. General ledger and reporting
into journals cycle
C. Data processing cycle

Provide adequate controls to


ensure that data are
recorded and processed
accurately by safeguarding
organizational assets.
Capabilities  Lack of training
 Lack of security policy
 Closer business (a) Automating repetitive
involvement in designing IT business processes executive involvement
enabled business processes. (b) BPMS works by
 Ability to integrate people ‘loosely coupling’ with management
and systems that participate a company’s existing
in business processes. applications complicated to be customized
 Ability to simulate (c) Operational Savings  Failure to identify future
business processes to design (d) Reduction in the business needs
the most optimal processes administration  Resources not available when
for implementation. involved in desirable
 Ability to monitor, control, Compliance and ISP  Software fails to meet
and improve business Activities business needs
processes in real time, and (e) Saving of employee  System may be over-
 Ability to effect change on time and hence cost engineered when compared
existing business processes to the actual requirements
in real time without an
elaborate process conversion
effort.
 Helpful in training

 Designing new system

 Depicting how the system works

 Controlling system development and


cost

E-R Decision
 Auditing information system table
Diagram
Flowchart

DFD Decision
tree
 Boxes: entities i. One-to-One relationship
 Diamonds: relationships (1:1)
ii. One-to-Many relationships Advantages:
 Ovals: attributes
(1:N) a) Helpful in database design
iii. Many-to-One relationships b) Gives higher level description
(M:1) of system
iv. Many-to-Many relationships c) Simple and easily
(M:N) understandable

Limitations:
a) Diagram may lead to
misrepresentation
b) Diagram may have some
amount of ambiguity
Entity: An entity is the source or Logical Data Flow Diagram:
destination of data.  It focuses on business and how Advantages:
the business operates.  Support the logic behind the data
Process: The process is the  It describes the business events
manipulation or work that that take place and the data  Use as a part of system
transforms data. required and produced by each
event.  Easy to understand for technical
Data Store: A data store is where or non-technical person
a process stores data between Physical Data Flow Diagram:
processes.  It shows how the system will be Limitations:
implemented.  Little confusing for programmers
Data Flow: Data Flow is the  It depicts the system.  It takes long time to create DFD
movement of data between the
entity, the process and the data
store.
documents through an organization. a) Documentation

c) Program maintenance
d) Effective analysis
the operations or activities performed
and the persons or work-stations.

between inputs, processing and b) Standardization


outputs. c) Reproduction
d) Complex logic

detailed.
 Concerned with the
logical/arithmetic operations on data

between the CPU on the one hand and


the input/output peripherals on the
other.
Decision Tree

 Decision
a) Simple to understand and interpret,
 Events b) Possible scenarios can be added.

 consequences be determined for different


scenarios.

a) Calculation may be complex.


Decision Table

PARTS

a. Condition Stub  Condition Statement

b. Action Stub  Condition Entries  Easy to Draw


 Simplicity
c. Condition Entries  Action Statements  Non-technical: No need
to have extensive
d. Action Entries  Action Entries knowledge of computer
 Compact presentation
 Rules

 Header  Flowcharts are more


common than decision
table as all programmers
may not be familiar with
decision table.
 Presentation of logic is

decision table.
 Decision table do not
express the sequence.
Data

Hardwar
REASONS OF PERVASIVE USE OF IT IN BUSINESS

IT provides various means is a strategy that is used to


and methods to an IT provides a cost effective, fast, reliable and optimize and streamline the
organization to low cost means to store and share data. essential business processes. Using
communicate quickly and IT also provides measure to protect data from the latest technology to automate
manmade or natural disasters. the functions involved in carrying
Some technologies used for Different security process and procedures them out.
communication are : includes:
 Email  Authentications and passwords to limit
equipment : VOIP  Encryption of data to prevent unauthorized
 Internal chat room use.
 Whats app messenger  Tracking lost devices like computers by
using security software's etc.
AUDITORS CONCERN
i. Existence: Verify that the assets, liabilities, The key concerns of auditor are
ownership, and/or activities are real: as follows:
Verify that events have A Know the Methodology of i. Develop and apply new
occurred in accordance with management’s Audit so to ensure that the criteria in evaluating
intent: standards, proper usage of control weaknesses in
iii. Valuation: Verify that the accounting values common procedures and Computerized Information
fairly present items worth: techniques in the Systems (CIS):
Verify that the transaction is re- performance of audits is ii. Tailor testing techniques
coded in the proper accounting period: adhered to. to the CIS under study;
Verify that the processing is in B Understand the steps and and
compliance with governmental laws and techniques necessary to iii. Use computers to perform
regulations, generally accepted accounting plan, perform and complete some portions of audit
procedures, and the organization’s policies the Audit. examination
and procedures:
Verify that the program, area,
as “any goal-oriented
activity requiring,

computers
ARCHITECTURE

 “Server can be said as a


computer (Hardware) or
device on a network ISA MICROARCH SYSTEM
dedicated to run one or ITECTURE DESIGN
more services (as a host), to
serve the needs of the
clients on a network.”
and art of selecting and interconnecting hardware
components to create computers that meet functional
performance and cost goals.

ISA
It, also known as computer
CISC  Emphasis is on organization, is a lower level buses and switches
 In this more emphasis is on software detailed description of the
hardware.  Small and limited hierarchies
 Instructions are lengthy number of completely describing the
and complex. instructions operation of all parts of the Direct
 High cycles per second  Cycles per second computing system, and how Memory Access(DMA) is a feature of
 Consumes more power are low they are inter-connected and modern computers that allows certain
 More expensive and  Consumes less inter-operate in order to hardware subsystems within the
complex power implement the ISA computer to access system memory
 In this memory-to-memory:  Less Expensive independently of the central
LOAD & STORE incorporated  Register-to-register processing unit(CPU).
in instructions LOAD & STORE are
independent virtualization, software features
instructions etc.
Deployment Services Architecture of cloud Characteristics of cloud Advantages and
Model (Location Model (XaaS) computing computing disadvantages of cloud
and usage) computing

HYBRID CLOUD
 A private cloud is a  Services, such as  A hybrid cloud is CLOUD
applications and storage, a mix of public
virtualized data center
are available for general and private clouds.
that operates within a
use over the Internet.
 Private clouds are  Public cloud services
highly virtualized, joined may be offered on a pay-
together by mass per-usage mode or other
quantities of IT purchasing models.
infrastructure into  IBMs Blue Cloud
resource pools, and
privately owned and
managed.
IaaS: PaaS: CaaS:

 IaaS provides offers the  CaaS is an outsourced


access to runtime allow us to communication
fundamental environment for model allows access to network solution which can be
resources such as applications. It providing software infrastructure directly availed from a vendor.
physical machines, also offers application as a All hardwares and
virtual machines, development & service to the end makes it possible to softwares are installed
virtual storage etc. deployment tools, users. It refers to and managed by the
Apart from these required to software that is . vendor and they offer
resources > IaaS also develop deployed on a their guaranteed
 NaaS uses
offers: applications. hosted service and quality of services to
 PaaS has a is accessible via clients.
to
 disk storage feature of point- Internet.  It allows businesses
provide network
tools to selectively deploy
services to the
that enables non- communication devices
consumer.
 Load balancers developers to and modes on a pay-as-
create web you-go basis and as-
 Software bundles applications. needed basis.
refers to the client part of cloud refers to the cloud itself. It consists of all
computing system. It consists of interfaces and the resources required to provide cloud
applications that are required to access the
cloud computing platforms, e.g., Web Browser.

It refers to expand or reduce the level of service as per the


requirement.
It is based on pay as you go either for short period of time or long time.
Cloud services are available on demand there is no need to keep dedicated
resources waiting to be used.
It refers to the ability of cloud where it completely isolates the failure
of server and storage resources from cloud users.
Public cloud service providers often can host the cloud services for
multiple users within the same infrastructure.
a) Technical Issues
b) Almost Unlimited Storage b) Security in the Cloud
c) Backup and Recovery c) Prone to Attack
d) Automatic Software
Integration
e) Easy Access to Information
Mobile Computing, is the use of COMPUTING
portable computing devices (such as
laptop and handheld computers) in  Mobile Computing involves
conjunction with mobile
communications technologies to Hardware
enable users to access the Internet
and data on their home or work
computers from anywhere in the
world.

 It has Universal reach CONCERNS

related applications.
 Service delivery to client.
 All time connectivity
 Productivity increases as employee can communicate anytime.
 Improved management due to better communication.
 Business processes can be transformed by using mobile
devices.
Users get freedom to roam.
Application Network
DBMS System Software Hardware People
Software Links

Application Suite Enterprise Content Access


Has multiple applications Addresses an enterprise’s
bundled together. Related
functions, features and huge distributed Provides capabilities  Spreadsheets,
user interfaces interact environment. required to support
with each other. enterprise software (Computer
systems. Assisted Audit
E.g. email services, Tools), etc.
Security software.
An important function
of any operating system Every computer could Memory O/s makes
Operating system acts is to provide user have different Management features optimum
as an intermediary interface. User of Operating System utilization of
between the allow controlling how resources which
application program command line or hardware. Operating memory is accessed facilitates a user to
and the hardware Graphical user system provides and maximize work with more
interface. Application Program available memory & than one
storage. application at a
which can be used by time i.e.
application developers multitasking and
to create application also allows more
software, thus than one user to
obviating the need to use the system i.e.
understand the inner timesharing.

hardware.
Hierarchical Database Network Database Relational Database Object Oriented
Model Model Model Database Model

Hierarchical Structure
 It is an upside-down tree, a network database looks more like a cobweb or interconnected
network of records.
 In network databases, children are calledmembers and parents are calledowners.
 Unlike Hierarchical in Network structure, each child or member can have more than one
parent (or owner).
 Like hierarchical databases, network databases are principally used on mainframe
computers.
Hierarchical Database
Model

 Commonly used on mainframe computers.


 It is one of the oldest methods. Even today used by some organizations for making travel reservations.
 A hierarchical database is organized in pyramid fashion.
 Related elds or records are grouped together so that there are higher-level records and lower-level records.
 Looks similar to family tree as parents sits above the subordinated children.
 The parent record at the top of the pyramid is called the root record.
 A child record always has only one parent record to which it is linked, just like in a normal family tree.
 A parent record may have more than one child record linked to it.
 Hierarchical databases work by moving from the top down.

Relational Database
Model

 In relational databases, the relationship between data les is relational, not hierarchical.
 Relational databases connect data in different les by using common data elements or a key
eld.
 Data in relational databases is stored in different tables, each having a key eld that uniquely
identies each row.
 Relational databases are more exible than either the hierarchical or network database
structure.
 In relational databases, tables or les lled with data are called relations, and row or records
are called as tuples, and columns are referred to as attributes or elds.
 Relational databases work on the principle that each table has a key eld that uniquely
identies each row, and that these key elds can be used to connect one table of data to
another.
 Hierarchical and network databases are all designed to handle structured data; On the other hand, an object-oriented
database can be used to store data from a variety of media sources, such as photographs and text, and produce work, as
output, in a multimedia format.

manipulation.
 O.O.databases use small, reusable chunks of software called objects. The objects themselves are stored in the object-
oriented database.

Two major disadvantages


are:

independence
Hardware

Cache

CU  This is Read  This is non  There is a huge speed users.


ALU Write memory volatile difference between
REGISTERS EXECUTE  Information Registers and Primary
can be read as are used to store
well as small amount of bridge these speed
information for differences, we have
quick reference
Cache (pronounced as
 Information cash) is a smaller, faster
can be read not
copies of the data from
 Generally used the most frequently
by manufacturers used main memory
to store data & locations so that
programs Processor/Registers can
access it more rapidly
 It is a collection of computers
and other hardware
interconnected by
communication channels that Connection Connectionless
allow sharing of resources and oriented network Network
information. Each component,  Where in a  Where no prior
namely the computer in a connection is
computer network is called a established and made before data
Node. then data is exchanges.
exchanged like it
happens in case of
telephone
networks.
SDLC

System System Analysis System Design Implementation Maintenance and


Investigation  Activities performed  This phrase involves  System implementation is Review
This phase to gather details concerned with putting the system Post
involves about the current aspects of the proposed into effect implementation
examining system includes system. Here it is  This phase involves the following review would be done
problems and examined that How will steps: Coding and testing of the to address
determining the Information System system; Programming
that is it worth do what it must do to  Acquisition of hardware and
solving? out obtain the solution to the software; and
problem?  Either installation of the new System maintenance
 Technical system or conversion of the old could be with
current  Technical aspects are system to the new one following different
procedures etc. Installation: objectives:
In this phase Systems
Analyst will:
 Examine data and  Output a) Installing the new hardware
 Operationa b) Training the users on the new
 Inputs
the enterprise using system; and
 Schedule
 Establish what the  Test plan new system or creation of new
proposed system will
actually do (not how
it will do it):
Wi-Fi is a popular Android Laptop & Notebook Smartphone
wireless networking Android is a Linux- Laptop is a small, A Smart Phone is a
technology which uses based operating portable computer and mobile phone built on a subnotebooks, have a
radio waves to provide system designed small enough that it mobile operating system.
wireless high-speed primarily for touch can sit on a lap. It consists advanced (diagonally) about 12.7 to
Internet and network screen mobile devices But Notebook is an computing capability 17.8 cm (5 to 7 inch
connections. Wi-Fi such as smart phones extremely lightweight which allows it to store screen), are operated like
networks have limited and tablet computers personal computer. information, e-mail and
range. install programs, and to screen or a stylus, and
run several small can also have a physical
applications. keyboard.

Touchpad Tablet Bluetooth Ipad IPOD


A touchpad is a A tablet computer, or Bluetooth is a widely It was Introduces by The iPod is a line of
pointing device simply tablet is a one used wireless Apple. The iPad runs a portable media players
featuring a tactile piece general-purpose technology standard designed and marketed
sensor, a specialized computer contained in for exchanging data by Apple Inc. Like
surface that can a single panel. Its over short distances up based use these is no other digital music
translate the motion distinguishing to 50 meters (164 feet) need of stylus. players, iPods can
and position of a user’s characteristic is the use serve as external data
of a touch screen as the devices. storage devices.
position on screen. input device.
Competitive vendors, carriers, alliances and network

Digital ber-optic cable, wireless technology, voice,


data image communication

Use on internet, intranet, extranets, e-commerce


enterprise collaboration....

Overcome geographical barriers Overcome time barriers

Overcome cost barriers Overcome structural barriers


Resource Remote Shared Internet
File sharing
sharing access Database access

ROUTER SWITCH

 Forwards data  A network switch is a  Bridge is a device  A hub is used in a


packets along small hardware device that connects two wired network to
networks, that joins multiple local- area networks connect Ethernet
computers together cables from a number
 A router is connected within one local area segments of the same of devices together.
to at least two protocol, such as
networks, commonly Ethernet or Token-  The hub allows each
Ring. device to talk to the
others.
networks.

 Routers are located


at gateways, the places
where two or more
networks connect.
NIC

 In  A multiplexer  Gateway is a node on  Network Interface


telecommunications, a network that serves
a repeater is an allowing one or more as an entrance to computer hardware
electronic device that low-speed analog or another network, computer that
receives a signal and digital input signals to connects a computer
retransmits it at a be selected, combined  In enterprises, the to a computer
higher level or higher and transmitted at a gateway is the network.
higher speed on a computer that routes
other side of an single shared medium the trafc from a work  It has additional
obstruction, so that or within a single station onto the
the signal can shared device. outside network. incoming and
cover longer outgoing data
distances  In home, the gateway packets, thus
improving the
connects the networks through put,
user to the internet.
 Also called as coax.  The media consists of one or more
telephone wire, consisting of
copper wire twisted into pairs.  Copper wire as its core that is wrapped in a protective jacket.
surrounded by two layers of
 It is the most widely used protective shielding  Signals are converted to light from
media for telecommunications and xed by laser in bursts.
and is used for both voice and data  Co-axial cables used in
transmissions. computer network are of two
type thick co-axial and thin co- electromagnetic radiation and not
 It is used extensively in home axial cable. susceptible to electronic noise
and ofce telephone systems and and so it has must lower error
rate than twisted-pair
volume of data and allows high- and coaxial cable.
 High Interference. speed data transmission.
 Fiber optic cables are easy to
 Signals must be “refreshed”  Three cables can be bundled install since they are smaller
every one two miles through and more exible and can
the use of repeaters, which are for ease of installation and can be used undersea for
very expensive and does not transatlantic use.
laid on the oors of lakes  Installation can be difcult
and oceans.
 Costly
 Wireless networks do not  Microwaves are radio  Infrared light is used in
require any physical waves with wavelengths industrial, scientic, and
media or cables for ranging from as long as medical application
data transmission one meter to as short as
one millimeter  Night-vision devices using
 Radio wave are an invisible infrared illumination allow
form of electromagnetic people or animals to be
radiation frequencies between observed without the
observer being detected.
(0.3 Ghz) and 300 Ghz.
 Infrared tracking, also
 These are used for known as infrared homing,
communication, radar refers to a passive missile
guidance system.
navigation and
Satellite Connection

 A satellite is some solar-powered


earthbound microwave. electronic device.

 That receives, amplies, and


in a line-of sight. retransmits signals.

 Relay stations spaced approximately  The satellite acts as a relay station


30 miles apart. between satellite transmissions
stations on the ground (earth
stations).
the atmosphere as the medium.
 They are used extensively fro high-
 High-volume as well as long- volume as well as long-distance
distance communication of both data communication of both data and
and voice in the form of voice.
electromagnetic waves.
 Satellites have an age limit of 7-10
 Major disadvantage of terrestrial years.
microwave is that it cannot bend
around the curvature of the earth.
 Provides  Manages network Manages
authentication, watch over the resources and trafc network resources and trafc to
encryption, and network, informing to avoid congestion avoid congestion.
auditing functions, network and optimize Provides
and enforces security administrators of telecommunications authentication, encryption, and
policies. potential problems service levels to users. auditing functions, and enforces
before they occur. security policies.

network.
Surveys
network resources and trafc
patterns and users needs to
determine how best to
accommodate the needs of the
network as it grows and changes.
LAN VPN
WAN
 Local area networks are  Covers metropolitan  Wide Area
telecommunications area (roughly 40 km Networks are
networks that connect in length from one telecommuni
information processing point to another). cations
devices within a limited PEER
networks
physical area. that cover NETWORK
interconnects
 These networks cover large
computer resources in
a geographic area or geographic
Classrooms, Buildings, TIER
region larger than that areas with
Manufacturing plant etc. various
covered by a large NETWORK
communicati
telecommunications on facilities
the area covered by a
media, such as ordinary such as long
telephone writing, coaxial distance
cable, or wireless radio telephone
both data and voice. A
systems to interconnect service,
microcomputer satellite
two cables and does
workstations and transmission,
not contain switching
computer peripherals. and under-
elements.
 Examples: Cable sea cables.
television networks.
MAN WAN
LAN

i. Inexpensive transmission media


ii. Inexpensive devices such as modems, repeaters and
transceiver are used
iii. Easy physical connection of devices to the media
iv. High data transmission rates
v. A high degree of inter-connection between devices
vi. Every attached device having the potential to
communicate with every other device on the network
vii. There can be a central controlling processor which polls
the attached devices on the network
viii. In the majority of cases, each attached device hears (but
does not process) messages intended for other devices
as well as for itself.
CHARACTERISTICS

 There are no dedicated servers.


 All computers are equal, and therefore,
are termed as peer to peer.  Peer to Peer Networks (i) There can be
 Each computer works as clients or server. are easy and simple to set problem in accessing
 This arrangement is suitable for up and only require a
environments with a limited number of Hub or a Switch to not connected
users (usually ten or less). connect all the properly.
 Less secure and users are located in the computers together.
same area. (ii) It does not support
 No centralized control.  It is very simple and connections with too
 Less costly. cost effective. many computers.
 Main advantage is simplicity of design
and maintenance.  If one computer fails to (iii) The data security is
 Peer-to-peer networks are also known as work, all other very poor in this
workgroup. computers connected to architecture.
 A failure of a node on a peer-to-peer it continue to work.
network means that the network can no
longer access the applications or data on
that node but other nodes can function
properly.
ARCHITECTURE

 A single computer that contains a  A two-tier system consists of a client Three-tier architecture is a client-
and a server. server architecture in which the
access the database is known as A two-tier architecture is a software functional process logic, data access,
. architecture in which a presentation computer data storage and user
There is one computer which stores all layer or interface runs on a client, and a interface are developed and
of the company’s data on a single data layer or data structure gets stored maintained as independent modules
database. on a server. on separate platforms.
 The interface used to interact with  The database is stored on the server,
the database may be part of the and the interface used to access the Its three tiers are the presentation tier,
database or another program which database is installed on the client. application tier and data tier.
ties into the database itself.

 The system  Performance  Clear  It creates an


performance is deteriorates if separation of increased need for
 Requires only  Only one user at higher because number of users user-interface-
one stand-alone a time. business logic and is greater than control and data management,
computer. database are 100. presentation server load
 Requires only physically close.  There is from application- balancing, and
one installation  Since processing restricted logic. fault tolerance.
of proprietary is shared between  Dynamic load
software. the client and balancing
 Most cost- server. More users  Change
effective system could interact with management
available. system.
Private data networks provide
as a network shared and accessed businesses, government agencies public network (usually the Internet)
by users not belonging to a single and organizations of all sizes a to connect remote sites or users
organization. dedicated network to continuously together.
Example: Internet. receive and transmit data critical to
both the daily operations and  Instead of using a dedicated, real-
mission critical needs of the world connection such as leased line, a
organization.
through the Internet from the
company’s private network to the
remote site or employee.

those are “ client to site” and “site to


site”.
 Network computers provide a browser-based user interface for processing small applications programs called applets.

computing devices.
 Servers provide the operating system, applets, databases, and database management software needed by the end users in the
network.

 In centralized computing all or most of the  In decentralized computing resources are not centralized.
processing/computing is performed on a central server.  Resources i.e. both hardware and software are allocated to each
 The computer itself may control all the peripherals
directly.  Most used in modern days and is just opposite of centralized
 Centralized computing offers greater security because computing, which was prevalent during the early days of
all the processing is controlled in a central location. computers.
 If one terminal breaks down the system still works. The
user can simply go to another terminal and log in again systems.
 All computers have to be updated individually with new
 The disadvantage of this system is that if central software, unlike a centralized computer system.
computer fails entire system will be unavailable.
 Accessing network may also be slow. computers can share peripherals such as printers and scanners as
well as modems, allowing all the computers in the network to
connect to the internet.
STAR
 A single cable connects all  All nodes are connected in the  Every node has a dedicated  All nodes are emerging from
computers. form of a loop or ring. point-to-point link. centralized control.
 Each computer is  There is a direct point-to-point  Network lines are expensive.  The processing nodes in a
connected to a shared link.  The reliability is very high. star network topology
cable.  These links are unidirectional.  In fully interconnected interconnect directly with a
 Allow only one computer  There is no any master node for central system.
to transmit at a time. controlling other nodes. connected by a dedicated point  If a computer is desired to
 Both ends of Cable are to point link to every node. transmit information from one
terminated with a  Ring networks offer high  Partially connected mesh node to another, it can be done
terminator. performance for a small number of topology is the general only by sending the details to
workstations. topology for wide area the central node, which in turn
 Reliable in very small  Longer span networks. sends them to the destination.
networks as well as easy to  Appropriate for
use and understand.  Yields the greatest amount organizations that require a
 Requires the least to install of redundancy if nodes fails. centralized data base.
amount of cable.  Failure of one computer on the  Network problems are easier
 Is easy to extend. network can affect the whole to diagnose.  It is easy to add new nodes
 A repeater can also be network and remove existing nodes.
used to extend a bus  The cost of installation and  A node failure does not
ring network. maintenance is high bring down the entire network.
 Adding or removing computers  More complex  It is easier to diagnose
can disrupt the network network problems through a
show a bus considerably central hub.
because any computer can
transmit at any time.  If a central hub fails, the
 Each connection between whole network ceases to
two cables weakens the function.
electrical signal.  It requires more cable than

shoot. other topologies.


Serial Parallel
 All bits of a byte are transmitted serially  All bits of a byte are transmitted
one by one. simultaneously.
 Relatively cheaper  Relatively expensive mode of
 Relatively slower transmitting data.
 Useful for long distance transmission  Relatively faster.
 Data is transmitted over a single wire.
communication.
 8 parallel path are available for
transmission.

Asynchronous Synchronous
 Each character is accompanied by start  No start or stop bite are used.
and stop bit.
 stop bit is used.
start and stop bit.  Needs clock signal between sender and
 Doesn’t need clock signal between receiver
sender and the receiver.
A is a A is
connection in which the data (sometimes called an a connection in which the data
alternating connection or semi-
from the transmitter to the duplex) is a connection in which simultaneously.
receiver.
or the other, but not both at the Example: Mobile phones.
same time.
computer to the printer or from
the mouse to computer.
Broadcasting Switched network
 In broadcasting networks, data transmitted by one The way in which the nodes switch data from one link to another as it
node is received by many, sometimes all, of the other is transmitted from source to destination node is referred to as a
nodes. switching techniques.

 It is based on Store and forward  In packet switching Message is


circuit is established between nodes and mechanism. broken down into packets and then
terminals before the users may  An intermediated storage device transmitted along different routes.
communicate. (Usually computer) is used to store and  Packets contains data transmitted
 Once circuit is established it is further forward message to other and other control information like
available for communicating devices devices towards destination. destination address, priority etc.
only.  No direct or dedicated connection is
 The dedicated connection between the established between communicating receives the packets and inspects the
nodes exists until connection is not nodes. destination address and it either
terminated by either of them.  Due to store-forward mechanism in removes the headers or forward packet
 The system decides on which route to to another system.
follow, based on a resource-optimizing Example: Electronic mail (e-mail),  In packet switching, all type of
algorithm, and transmission goes voice mail information like password and data are
according to the path. included within the packet.
 It is more reliable than packet Flow control and error control
switching.
 Old and Expensive than Packet
switching.
Network Protocols

Refers to format of data being exchanged like encoding scheme, character set used etc.

OSI

Threats Vulnerabilities
Security threats can be categorized (i) Software Bugs
into four broad themes:
i. Unstructured Threats
ii. Structured Threats
iii. External Threats information
iv. Internal Threats (v) End users
after organizing it, preparing resources budget, Schedule for task completion.

-Personnel, Hardware, Facilities, Documentation, Supplies, Data, Application, Software and System Software.

-Valuation of both physical assets and logical assets.

-External or Internal
-Accidental/non-deliberate or deliberate.
This step is an assessment of the probability of

Expected loss is estimated.

-This involves the adjustment of controls which means whether over some time period any control can be
designed, implemented and operated such that the cost of control is lower than the reduction in the expected
losses.
Cryptography is the practice In Cryptography, encryption is the process of a. Authentication: It
and study of techniques for encoding messages (or information) in such a
secure communication in the way that eavesdroppers or hackers cannot read identity of person.
presence of third parties it, but only authorized parties can.
(called Adversaries). This means
It is the message that is to be
data must arrive at the
encrypted.
receiver exactly as it was
 Cipher Text: It is the output of the
sent.
encryption process that is transmitted often by
a messenger or radio.
c. Non-repudiation: It
This intruder may hear
refers to inability of
and accurately copies down the complete cipher
either party to deny their
text. However, unlike the intended recipient, he
online actions.
does not know what the decryption key is and
so cannot decrypt the cipher text easily.
The art of breaking ciphers, known as
, and the art of devising them
(cryptography) are collectively known as
.

Private key
Public key encryption
encryption/decryption
SSH SSL

program to log into protocol that provides a


another computer over a secure channel between
network, to execute two machines operating communications protocol
commands in a remote network protocol for over the Internet or an for secure
machine, and to move accessing and managing internal network. communication over a
computer network, with
another. It provides systems. especially wide
strong authentication and deployment on the
secure communications Internet.
over insecure channels.
IDS
AUTHENTICATION is a
Firewall is a It is a software- device or software application that monitors
device that forms based approach Message network or system activities for malicious
a barrier between that prohibits authentication activities or policy violations and produces
a secure and an access to certain makes sure that a reports to a Management Station.
open environment message is really
when the latter deemed from whom it follows:
environment is inappropriate by purports to be and
is
usually considered management. that it has not been
hostile, for tampered with.
search of unwanted or malicious events on the
example, the
wire between hosts.
Internet. It acts as
a system or
Host-based Intrusion Detection
combination of systems are designed to monitor, detect, and
systems that respond to user and system activity and
enforces a attacks on a given host.
boundary between
more than one
networks.
both host-based intrusion detection devices.

Network-Node Intrusion Detection was

and puts it on the host. It is an advanced type


NETWORK
ADMINISTRATION AND
MANAGEMENT

In computer networks, network FCAPS


managementrefers totheactivities,
methods,procedures,andtoolsthat
A common way of characterizing network management functions
pertain to the operation, is FCAPS - Fault, Conguration, Accounting, Performance and
administration, maintenance, and Security. FCAPS is the ISO Telecommunications Management
provisioningofnetworkedsystems. Network model and framework for network management.

(i) Fault Management - A fault is an event that has a


(a) Operation: It deals with keeping negative signicance. The goal of fault management is to
recognize, isolate, correct and log faults that occur in the
the network up and running network. Fault management identies and isolates network issues,
smoothly. proposes problem resolution, and subsequently logs the issues
(b) Administration: It deals with and associated resolutions.
keeping track of resources in the (ii) Conguration Management - Monitors network and
network and how they are system conguration information so that the
assigned. impact on network operations (hardware and
software elements) can be tracked and managed.
(c)Maintenance: It is concerned
with performing repairs and (iii) Accounting Management - Accounting management is
concerned with tracking network utilization
upgrades. information, such that individual users, departments,
(d)Provisioning: It is concerned with or business units can be appropriately billed or charged for
conguring resources in the accounting purposes.
network to support a given (iv) Performance Management - Measures and makes network
service. performance data available so that performance can be maintained
and acceptable thresholds. It enables the manager to prepare
the network for the future, as well as to determine the efciency
of the current network.

(v) Security Management - Most network management systems


address security regarding network hardware, such as someone
logging into a router. Security management functions include
managing network authentication, authorization, and auditing,
such that both internal and external users only have access
to appropriate network resources, conguration and management
of network rewalls, intrusion detection systems, and security
policies (such as access lists).
INTERNET

ARCHITECTURE
ARACTERISTICS
Normal List Normal List
The internet is Paragraph E-mail, Paragraph Strategic
developed from a packets with all of the other accessible hosts on thy browsing the sites on business alliances
variety of Internet.  Providing
university and  Electronic customer and
government line to our house, in which case our phone company is commerce vendor support
sponsored transactions between  Collaboration
computer businesses and their among business
networks. Sub suppliers and partners
networks  Dial up Connection customers.  Buying and
throughout the  The Internet selling products
world. the  Wireless Connection provide electronic and services
Internet is the discussion forums  Marketing, sales
network that and bulletin board and customer
serves as the systems. service applications
backbone for the  Downloading  Growth of cross-
software and functional business
digital and packet switched. applications
 Real-time  Emergence of
conversations with applications in
other Internet users. engineering,
cities around the world.  The Internet allows manufacturing,
gathering information human resources
through online and accounting.
services using web  Enterprise
browsers and search communications
(F) The path a packet takes through the Internet depends on engines. and collaboration.
INTRANET

INTRANET
 Secured access: An Intranet
The Intranet is a type usually has a system of access
Productivity privileges controlled by passwords,
that facilitates restricting access to certain areas of
communication within the network.
the organization,
among widely  Communication communication.
dispersed departments,  Facilitate Information sharing.
divisions, and regional Intranets also can be set up
locations. provide an electronic directory
 Business Operations service.
Intranet connect and Management  An Intranet also may have a
people together with whiteboard, an electronic chat space
Internet technology,  Cost-effective where employees can “talk” to each
other in real time by posting text
 Promote Common messages.
Corporate Culture  Use of an Intranet for access to
view.
 Enhance high potential.
Collaboration It is the name
protocol as in the case given to software used in a group
decision support system, in which
several people jointly solve a
problem.
EXTRANET

An Extranet is an extension of Companies can use an extranet


an Intranet that makes the to do the following tasks: business
latter accessible to outside  Exchange large volumes of Deploy in “Internet time”
2.
companies or individuals with data using Electronic Data 3. Protect the interests of the
or without an Intranet.
data owner
 Share product catalogs 4. Serve the partner as a
exclusively with wholesalers or customer
collaborative Internet those “in the trade” 5. Drive information to the
connection with other  Collaborate with other decision-maker
companies and business companies on joint
partners. Parts of an Intranet development efforts.
are made available to  Jointly develop and use
customers or business training programs with other
companies.
applications.  Provide or access services
provided by one company to a
The Extranet is thus an group of other companies.
extended Intranet.  Share news of common
interest exclusively with
partner companies.
Electronic commerce  Reduction in costs to  Integrity There are four
popularlyknownasE- buyers.  Non-repudiation generalclassesofe-
commerce refers to  Reduction in errors,  Authenticity Commerce
buying and selling of time and overhead costs in  Condentiality applications:
goods and services information processing.  Privacy (a)Business-to-
online.  Reduction in costs to Business (B2B)
Denitions of As suppliers. e-Commerce
 Reduction in time to Some additional (b)Business-to-
“Electronic Commerce, complete business concernsare: Consumer
simply put, is the transactions.  Reliability (B2C) e-
automation of the  Easier entry into new  Scalability Commerce
business process markets, especially  Ease of use (c)Consumer-to-
between buyers and geographically remote  Payment Business (C2B)
sellers” markets. methods e-Commerce
 Faster time to market as (d)Consumer-to-
business processes are Consumer (C2C)
linked. e-Commerce
 Reduction in inventories
and reduction of risk of
obsolete inventories.
 Reduction in advertising
costs.
DEFINITION 1. Like Banking, trading etc.
2. like services changes, bill
M-commerce (mobile commerce) is the buying payment and account reviews etc.
and selling of goods and services through 3. as consumers are given the ability
wireless handheld devices such as cellular to place and pay for orders on-the-y.
telephone. 4. which include the
delivery of nancial news, sports, gures and
trafc updates to a single mobile device.

ATM
Automated Point-of-Sale
Preauthorized
(PoS)
Machines
Smile cost a million !
and hard work brings a million;
CHAPTER 4
so work hard!
BUSINESS INFORMATION
SYSTEMS
enabler
 An information
Information system as an integrated components of a
system used for generic system:
Business Enabler & collecting, storing,
Driver now a days as it processing and a. Input,
helps managing communicating b. Process,
information which information. c. Output,
ultimately increases the d. Feedback and
of e. Control
organization and also
brings innovation.

Now a days various


information systems
are used to ensure that
the right information is
transported to the right
person, in the right
fashion, and at the
right time.
Strategic Level
Senior managers EIS (ESS)
system

Management level
Middle managers DSS, MIS
system

Knowledge level Knowledge and OAS, KMS


system data worker

Operational level Operational


TPS
system managers
Transaction Attributes ACID TEST

A type of i. Access control a. Atomicity


information system Processing cycle of a ii. Equivalence b. Consistency
that collects, typical TPS: iii. High volume c. Isolation
I. Data entry rapid d. Durability
and retrieves the processing
day-to-day data processing
transactions of an III. Database worthiness
enterprise maintenance
IV. Document and
report generation
OAS

 Exchange information
the use of computer  Management of  Electronic mail
systems to execute a variety administrative documents  Voice mail
 Handling of numerical data  Video conferencing
word processing,  Meeting planning and  Electronic calendaring
accounting, and e-mail. management of work
schedule etc.  Imaging
 Desktop publishing
always implies a network of  Desktop video
computers with a variety of conferencing
available programs.
KM is about I. Rapidly
making the right a. Explicit a. Information is piecemeal, changing
knowledge Knowledge fragmented, particular, business
available to the whereas knowledge is environment
right people. Knowledge structured, coherent and II. Globalization
often universal.
 It is about making b. Information is timely, organizational
sure that an transitory, and perhaps composition
organization can even short lived, whereas
learn, and that it knowledge is of enduring
will be able to
retrieve and use its
knowledge assets in message whereas
current knowledge is stock.
applications as they d. Information is acquired by
are needed. being told whereas
knowledge can be acquired
by thinking.
Management Information dos Don’ts  Airline reservations
System is an integrated,
user-machine system for  Simple and  Large and  Bank operations
providing information to manageable complex system
support operation, system  Delay in hiring
management and decision-  Involve programmer
making functions in an programmers in  Go for large
organization. need assess me application
 Adopt modular  In vet heavily
approach in house
 Have simple application
software development
 Involve users in  Depend on
MIS vendor
development completely
DSS

helps users to..


(a)The user  DSS consists of 4
 A computer based (b)One or phases:  Engender data
information system that more 1: Intelligence- It models and
support decision making databases refers to Searching for “what if”
activities in an (c)Planning conditions that call for scenarios
organization. languages decision  Manipulate
 First introduced in 1970s (d)Model base 2: Design- This phase data directly
 DSSs serve the Involves Inventing,  Premeditated
management, operations developing and to make non-
and planning levels of an analyzing possible routine decisions
organization (usually mid alternative actions of  Slot in data
and higher management) the solution from external
and help to make decisions, 3: Choice- In this sources
which may be rapidly phase a course of
changing and not easily action is selected
among various
 DSS can be either fully alternatives.
computerized, human or a 4: Implementation-
combination of both. It involves Adopting
the selected course of
action in decision
situations.
EIS

 An executive information system i. Hardware


(EIS) is a decision support system
(DSS) used to assist senior base software, database and
executives in the decision-making graphic types such as time
process. series chart, scatter diagram,
 EIS provide easy access to maps, motion graphics etc.
important data and information to
top executives for the purpose of
strategic decision making.
 It provides a very user-friendly
interface and graphical display.
ERP CRM SCM HRMS CBS AIS

Stage 1: Inventory Control


 Enterprise resource planning is a Stage 2: ABC Analysis
process by which an organization Stage 3: EoQ (Economic order quantity)
integrates and manages its important
functions and activities. Stage 5: MRP-I (Material requirement
 An ERP system integrates various planning
functions like planning, purchasing, )
Stage 6: MRP-II (Manufacturing resource
resource, etc. planning)
 It is a complete software solution Stage 7: DRP (Distribution resource planning)
package for enhancing the Stage 8: ERP (Enterprise resource planning)
performance in large organizations Stage 9: MRP-III (Money resource planning)
 Customer relationship Analytical CRM Greenberg’s  CRM applications
management (CRM) is a definition definition streamline the process to
system used for managing a #CRM  Large and capture, consolidate,
company’s interactions Equation complex system analysis, dissemination of
with its current and  Delay in hiring data.
potential customers. programmer  It integrates people,
: Analysis of  Go for large process and systems.
customer data to application
gain deep  In vet heavily Policies & Procedures
understanding in house
down to the level application
of individual development  Discover: TRENDS ETC.
customer  Depend on
 Relationship vendor
completely
Interaction with
the customer
through various
channels for
various purposes.
 Procurement/Purchasing
Supply can be understood as a  Operations
chain of activities involving  Distribution
various organization to get a good  Integration
or service from supplier to the
customer or consumer.

Supply chain management, is the


active management of supply
chain activities to maximize
customer value and achiever a
sustainable competitive advantage
A Human Resource Management
System (HRMS) is a software Management
application that combines many iii. Payroll Management
human resources functions,
v. Compensation
payroll, recruiting and training, Management
and performance analysis and vi. Recruitment Management
review into one package. vii. Personnel Management
viii.Organizational
Management
ix. Employee Self Service
(ESS)
Finacle Flexcube

 A core banking Elements : empowers


system is the  Processing universal banks
software that payments and  It has several with:
provides the basic cheques. modules like:
account  The ability to i. Enterprise a) Improved bank
management originate new customer staff
features and products and information productivity
information about customers ii. Corporate with intuitive,
customers and  Processing cash banking role based
account holdings. deposits and iii. Consumer dashboard
 It supports most withdrawls banking b) Improved risk
common  Maintaining management
transactions of a records for all the and reporting
bank. banks v. Customer etc.
transactions. analytics
 Governance and
compliance & management
auditing vii. Islamic
 Security control banking
etc viii. Payments
etc.
AIS

Accounting Information Components


System 1. People
collection, storage and processing 2. Procedure and
instruction
that is used by decision makers. 3. Data
4. Software
5. Information technology
infrastructure
6. Internal controls
Artificial Intelligence

Definition Applications of AI

a. Decision support
b. Information retrieval
is the science and c. Virtual reality
engineering of making d. Robotics
intelligent machines, e. Neural network
especially intelligent f. Expert system
computer programs. It is
related to the similar task
of using computers to
understand human
intelligence.
Business Intelligence

Definition Business Intelligence Tools Reporting (MIS)

Business reports are


routinely assigned to
 BI is essentially timely, facilitate us to:
accurate, high-value, and  Accomplish conclusions
actionable business insights, about a trouble or issue.
and the work processes and  Demonstrate short and
technologies used to obtain data from outside sources, transform it to apparent communication
them. skills.
and then load the results into the company  Endow with
 BI in simple words refers database. recommendations for
to the process of collecting Metadata tools gather and analyze metadata, upcoming accomplishing.
 Exhibit our analytical,
from many sources, reasoning, and evaluation
analyzing and presenting the skills in identifying and
information in useful ways iv. Scorecards: This involves providing a visual weighing-up potential
so that users can make representation of the enterprise strategy by solutions and outcomes.
better business decisions. taking critical metrics and mapping them to
strategic goals throughout the enterprise.
v. Data Mining or Statistical Analysis: Mine
through large volumes of data and
providing knowledge.
Access control
Privilege control
i. Identify Management:
This is a fundamental principle of
Applied to verify the identity of a
information security, which refers
subject attempting to access an
to give only those privileges to a
object.
user account, which are essential
ii. Authentication:
to that user’s work.
Authentication is the process of
verifying a subjects identity at the
point of object access.
iii. Authorization: Authorization

resources, etc. a subject can


access.
iv. Accountability: The logs are
stored for audits, sent to a log
management solution, etc. They
provide insight into how well the
access control process is working:
whether or not subjects abuse
their access.
Credit Card Electronic Purse
Smart Card
Electronic Cheque
 Smart cards have an
 A credit card is a (a)By the Financial
embedded microchip
payment issued to card which, with an
instead of magnetic
users as a system of Corporation (FSTC): embedded
strip.
payment. It allows the The FSTC is a consortium microchip provides
cardholder to pay for of banks and clearing multiple options,
 The chip contains all
goods and services houses that has designed such as debit card
the information a
based on the holder’s an electronic cheque. or credit card type
magnetic strip contains
promise to pay for Modeled on the traditional payments.
but offers the possibility
them. paper cheque, this new of manipulating the data
cheque is initiated It is very similar to
and executing
Processing of Credit electronically, and uses a a pre-paid card.
applications on the card.
card: digital signature for signing
A. AUTHORIZATION and endorsing. Three types of smart
B. BATCHING (b)By Cyber Cash: The
cards are as follows:
C. CLEARING Cyber Cash Secure
 Contact Cards
D. FUNDING Payment System is a
 Contactless Cards
complete system for
 Combi/Hybrid
Cards
transactions on the
Internet. It accepts both
credit card payments and
cash/coin transactions.
A typical On-line transaction

The online e-commerce transaction is composed of three main functions: sales, payment and delivery.

Terminology used are :

 Advertising: The company communicates its products and services (catalogue);

 Offering: The company offers specic goods and services;

 Selling: The company agrees with the customer on the content of a specic order;

 Billing: The company produces the invoice;

 Paying: The buyer pays the seller by giving a payment instruction;

 Matching: The seller matches the payment information (the authorization results and the actual crediting of account) with the orders
and feeds the result into the back-ofce;

 Delivering: The seller delivers to the buyer; and

 Resolving: The seller and buyer try to resolve delivery or payment issues related to the purchase.
CHAPTER 5
BUSINESS PROCESS
AUTOMATION THROUGH
APPLICATION SOFTWARE
AUTOMATION
BUSINESS APPLICATION :
CLASSIFICATION

NATURE OF SOURCE OF NATURE OF


APPLICATION SIZE OF BUSINESS APPLICATION
 Batch processing : NO  Purchased Application  Small and Medium  based on business
USER INVOLVEMENT  - In house Developed Enterprises : The best function it covers.
 lot of data processed in one Application software for small and  Example : accounting
gc  Outsourcing medium business is applications, CRM, DSS,
 Take more time  Leased Applications software designed to help ERP
 Online Processing them to rum their
 Immediate processing operations better.
 Less waiting time Example : Accounts
 Real time processing applications
 Sub – set of online  Large Business : Includes
processing CRM, DBMS, HRMS, etc.
 data is immediately
acquired and processed
Steps/ how to go about BPA
Business Process
 Cost Saving
 To remain competitive
strategy to automatic reasons : Errors in manual processes, late payments, loss
 Fast service to
business processes so as to of revenue.
customers
Understanding compliance requirements :
in terms of cost, time and Understanding various applicable rules, regulations and
effort . documentretention requirements .
Documenting processes : In this step
processes which are to be automated are documented.

SMART
Engage the business process consultant :
Experience, Capability and Expertise
calculate the ROI for project : Technical

barriers are removed.


APPLICATIONS TO ACHIEVE BPA

TALLY SAP R/3 Attendance


It is an It is ERP These are
accounting software, which This applications are
that helps allows an entity automation application
entity to to integrate its systems made helps entity to
automate business available by automate the Departmental stores
processes processes. It has Microsoft process of Two major processes
relating to the features such Corporation attendance automated are billing
accounting of as time which include tracking and processes and inventory
transactions. management, MS Word, MS report management. It has
It also helps to reporting and Excel, MS generation. features such as point of
achieve analytics, budget PowerPoint, sale, multi-channel
automation of monitoring, MS Access, etc. operation, supplier
few processes database, products
in inventory approval, sales database; purchase
management. management etc. ordering, management
reporting etc.
INFORMATION PROCESSING

In this human intervention is very high In this system computer is used for

Input : Put the facts and details


Summarize the information Input : Entering data into computer
Output : Create reports Operations performed on
data
Saving data, program or
output
Output : Create reports

DELIVERY CHANNEL

Information Delivery Channel may include : Buying from shop


 Internet Home delivery
 Email Online Purchase
 Social networking sites Brick and mortar type etc.

etc.
Controls in BPA

IS Control
To understand the controls
relevant for information
ensures that all system and their audit, the
transactions are approved by responsible study is divided into two
personnel. parts:
(ii) – ensures that no valid A. Managerial Controls
transactions have been omitted. B. Application Controls
ensures that all valid
transactions are accurate
ensures that all recorded
transactions fairly represent the economic
events that actually occurred.

ensures that errors


detected at any stage of processing receive
prompts corrective action and are reported
to the appropriate level of management.
Top Mgmt
Boundary
Programming Control Control
Mgmt Control
Input
Control
System
Development
Mgmt Control
Communication
Control

Data Resource Application


Mgmt Control CONTROL
control
Processing
Control
Operations
Mgmt Control

Output
Security Quality Control
Mgmt Control Assurance Database
Mgmt Control Control
control

information systems function : Strategic plan and Operational plan. Both the
plans need to be reviewed regularly and updated as the need arises.
The program development life cycle comprises six major phases Planning;
Control Design; Coding; Testing; and Operation and Maintenance with Control phase
running in parallel for all other phases.
Systems Development Management has responsibility for the functions
concerned with analyzing, designing, building, implementing and maintaining
information systems. Three different types of audits may be conducted those are
audit

Control
trustworthy persons, separating duties etc.
Operations management is responsible for the daily running of hardware and
Control software facilities.
Information security administrators are responsible for ensuring that information
systems assets are secure. Assets are secure when the expected losses that will
occur over some time are at an acceptable level.
Organizations are increasingly producing safety-critical systems and users are
Control becoming more demanding in terms of the quality of the software they employ to
undertake their work.
Application Controls

Some major types of controls applied in boundary subsystems are :


Cryptographic Controls
a) Access controls : An access control mechanism processes users request for

c) Digital Signatures
d) Plastic Card
Input Control Techniques are : Source Document Control, Data Coding Controls,
Input Controls
Batch Controls, Validation Controls

Run -to run

Physical Component Controls, Line Error Controls, Flow Controls, Topological


Controls
Logging of Output Program Executions, Controls Over Printing, Report
Output Controls
Distribution and Collection Controls

Database Controls processed


Consolidation  Portable
can be used as “hot  This application has applications can be
machines are used to standby” been proved very executed directly enables to create
consolidate many environments for useful in kernel from the removable portable workspaces.
physical servers into physical production development and devices.
fewer servers. servers. operating system  There is no need to
 “Physical – to – courses. install these
applications in
transformation system.
Resources Application Areas
 Grid Computing can be (i) Making use of (a) Computation
said as a network of huge Underutilized Resources (b) Storage (a) Civil engineers
number of computers where (ii) Resources Balancing (c) Communications collaborate to design,
several resources like (iii) (d) Software and Licenses execute & analyze shake
processing power, (e) Special equipment, table experiments.
storage etc. of each virtual organizations for capacities, architectures, (b) An insurance company
computers are shared with collaboration and policies mines data from partner
every other computers in the (v) Access to additional hospitals for fraud
network resources detection.
 It is a special kind of (vi) Reliability (c) An application service
distributed computing. (vii) Management
load to a compute cycle
provider.
 Enrolling and Installing  Security  Single Sign-on
Grid Software  Organization  Protection of Credentials
 Logging onto the grid  Installation  Interoperability with local
 Queries and submitting  Managing enrollment of security solutions
jobs donors and users machine to  Exportability
 Monitoring progress and which the users are not  Support for secure group
recovery entitled. communication
 Reserving resources
 Resource Management
There are 7 model test papers in this worksheet. Three (3) additional sets will be given in classroom.

Altogether these 10 model test papers covers entire syllabus of IT. Most of the questions asked in nal
exam can be seen from these ten (10) model test papers.

Students are advised to solve all papers strictly in a 3 hours format. These test papers will not be helpful
only in nal preparation but also in time management.

An extra session is scheduled to discuss all sets in classroom.

Students can get their answer sheet checked and evaluated by Sumit Parashar sir.

Shortcut is a myth, success demands hard work.


Work hard_Keep shining
LEARN-ADAPT-EVOLVE SET 1 01 IS COMPULSORY, ANSWER ANY 5 FROM REST.

1. ANSWERALL (2 *5)
A) What do you mean by ALU and Control Unit? Be brief.
B) Explain semantics and timing of digital transmission.
C) What is Plan-Do-Check-Act?
D) Mention some applications that help entity to achieve BP A.
E) Mention some reasons of failure ofBPMS.

2. A) What are different reasons behind extensive use of IT in business? Explain in brief.
B) Briefly explain the advantages and disadvantages of DBMS.

3. A) What is BPA? Explain Pillars of BPA.


B) What are different processing cycles of Accounts BPM? Explain.

4. A) What are different key aspects considered in implementing E-Commerce? Explain.


B) explain the internet architecture.

5. A) What are different types of information systems used at various levels of an


organizati on?
B) What is TPS? Mention characteristics of a TPS.

6. A) What are different steps involved in BPA implementation? Explain in brief.


B) What is network virtualization? Mention application of virtualization.

7. A) Differentiate manual information processing and computerized processing.


B) Differentiate asynchronous and synchronous transmission.
LEARN-ADAPT-EVOLVE SET 2 01 IS COMPULSORY, ANSWER ANY 5 FROM REST.

1. ANSWERALL (2 *5)
A) Explain Logical DFD and Physical DFD.
B) What is Microarchitecture? Explain.
C) Explain ring topology.
D) What are of using a LAN?
E) Mention modules ofHRMS.

2. A) What are different levels ofBPM in an organization? Explain.


B) What are different types of Mention advantages and disadvantages

3. A) What are different sub-disciplines of computing Explain.


B) Explain Cloud computing architecture.

4. A) What do you mean by network security? Explain various security techniques.


B) What are different transmission techniques? Explain packet switching.

5. A) What is TPS? explain TPS


B) What is KMS? What are reasons behind increasing momentum of knowledge?

6. A) What is Control in IS? Mention major control objectives.


B) What are different objectives ofBPA?

7. A) Differentiate Hierarchical and Network model


B) Differentiate Explicit knowledge and Tacit knowledge.
LEARN-ADAPT-EVOLVE SET 3 Ql IS COMPULSORY,ANSWERANY 5 FROMREST.

1. ANSWER ALL (2*5)


A) Mention advantages and disadvantages of E-R Diagram.
B) What do you mean by Bluetooth and WiFi?
C) What are key concerns of auditors regarding Info. System control?
D) Mention some reasons of vulnerability in system.
E) What are components of SCM?

2. A) What are different needs for a BPM implementation?


B) What are plinciples and practices of BPM implementation? Explain.

3. A) What is Selver? Mention different types of Selvers.


B) Explain valious selvices model of cloud computing.

4. A) What is LAN? Explain characteristics of LAN.


B) Explain valious function of telecommunicaation

5. A) What is TPS? What are processing cycles of TPS? Explain in brief.


B) What are different DO'S and DON'T'S for MIS development.

6. A) What are different types of business applications? Briefly explain.


B) What is BPA? Mention advantages and disadvantages.

7. A) Differentiate Connectionless and Connection oriented network.


B) Differentiate Intranet and Extranet.
LEARN-ADAPT-EVOLVE SET 4 Ql IS COMPULSORY,ANSWERANY 5 FROMREST.

1. ANSWER ALL (2*5)


A) Mention advantages and disadvantages of DFD.
B) Explain in brief IPODand IPAD.
C) Wlite notes all peer to peer model.
D) What is Greenberg's defInition ofCRM?
E) Mention some business applications based all nahrre of application.

2. A) Explain BPM L-Cycle.


B) What are different success factors of BPM? Explain.

3. A) What is Software? Explain valious types of application software.


B) What do you mean by OODBMS? Explain with advantages and disadvantages.

4. A) What is CIS model? Explain characteristics and working of CIS model.


B) explain network security protocols.

5. A) What are diverse stages to ERP? Explain.


B) What are different business intelligence tools? Explain.

6. A) Explain various management function based controls.


B) explain charactelistics of cloud computing.

7. A) Differentiate RAC and RBAC.


B) Differentiate centralized and decentralized computing.
LEARN-ADAPT-EVOLVE SET 5 01 IS COMPULSORY, ANSWER ANY 5 FROM REST.

1. ANSWERALL (2 *5)
A) Mention advantages and disadvantages of decision tree.
B) Mention some features of Tablet computer.
C) What are different record relationships?
D) Mention objectives of access control.
E) Explain terrestrial micro wave and radio wave transmission.

2. A) What are different challenges involved in implementing BPA? Explain.


B) What is Six Sigma? Explain the methodology of Six Sigma.

3. A) What are different types of clouds based 0 deployment and usage?


B) Explain SDLC.

4. A) What is network computing? What are different features of network computing?


B) What is E-Commerce? Mention risks involved in E-Commerce.

5. A) What are different steps involved in payment processing? Explain.


B) What is Report? What are different of reporting through MIS?

6. A) What are different advantages and disadvantages of cloud computing?


B) Mention some major applications of Grid computing.

7. A) Write notes on EIS. Mention components as well.


B) Differentiate serial and parallel transmission.
LEARN-ADAPT-EVOLVE SET 6 01 IS COMPULSORY, ANSWER ANY 5 FROM REST.

1. ANSWERALL (2 *5)
A) What are advantages and disadvantages of Decision tree?
B) What are Input and Output devices?
C) Explain Star topology.
D) What are 5 rules of extranet?
E) Explain twisted pair cable and cable.

2. A) What is Business process? Mention some example of Business process.


B) What are different of BPMS? Explain.

3. A) What is Hierarchical database model? Mention advantages and disadvantages.


B) What are different types of memory in computer? Explain.

4. A) explain FAPS.
B) What is network administration and management? Explain various aspects of network management.

5. A) What is ES? Explain components and types of ES.


B) What is CBS? Mention various modules of FINACLEand FLEX CUBE.

6. A) Explain various application functions based control.


B) What is delivery channel? Mention some delivery channels for information and product.

7. A) Differentiate RISC and CISCo


B) Differentiate SCM, ERP and CRM.
LEARN-ADAPT-EVOLVE SETS 7 01 IS COMPULSORY, ANSWER ANY 5 FROM REST.

1. ANSWERALL (2 *5)
A) Mention functions of AIS.
B) What is value chain automation?
C) Explain Principle of least privilege.
D) What is CRM?
E) Mention advantages and limitation of BUStopology.

2. A) explain the impact of IT on BPM.


B) Differentiate function based organization and process based organization.

3. A) explain Traditional IT architecture and process architecture.


B) What are different objectives of system maintenance? Explain.
4. A) What is Multi-tier architecture? Explain with advantages and disadvantages.
B) explain TCP/IP protocol suite.
5. A) What is EIS? What are different components of EIS?
B) What is Smart card? What are different types of smartcard?

6. A) explain various transmission modes.


B) What is DSS? Explain stages/phases in working of DSS?
7. A) Draw a to largest of the three numbers A,B,& C.
B) Here are some source documents, mention which of the source document belongs
to which processing cycle: (6)
i. W4 form ii. Sales order
iii. Purchase requisition iv. Time card
v. Receiving report vi. Job time tickets
vii. Remittance advice viii. Deposit slip
IX. Credit memo x. Purchase order
Xl. Delivery ticket XlI. Check

You might also like