FIT M-1 & M-2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

FIT & ERP

MODULE-1
Role of IT in modern business:-

 Automation
IT automates routine tasks, such as managing inventory, handling financial transactions, and
processing customer orders. This allows employees to focus on more strategic and creative tasks.
 Communication
IT tools like email, instant messaging, video conferencing, and collaboration platforms make it easier
to connect with people worldwide. This helps businesses better understand and cater to customer
wants.
 Data collection and analysis
IT helps businesses collect and analyze data more quickly, which can help them make better
decisions in real time.
 Streamlined workflows
IT systems and applications can streamline workflows through software and applications, which can
reduce manual errors.
 Improved efficiency and productivity
IT can help businesses improve efficiency and productivity. IT systems include computer programs,
computer systems, and computer hardware, as well as system software and network administration.
Basic Concepts of Computer Networks:-
Computer Networking is the practice of connecting computers together to enable communication and
data exchange between them. In general, Computer Network is a collection of two or more computers. It
helps users to communicate more easily.

Basics building blocks of a Computer network are Nodes and Links. A Network Node can be illustrated
as Equipment for Data Communication like a Modem, Router, etc., or Equipment of a Data Terminal like
connecting two computers or more. Link in Computer Networks can be defined as wires or cables or free
space of wireless networks.
The working of Computer Networks can be simply defined as rules or protocols which help in sending
and receiving data via the links which allow Computer networks to communicate. Each device has an IP
Address that helps in identifying a device.
Basic Terminologies of Computer Networks
 Network: A network is a collection of computers and devices that are connected together to enable
communication and data exchange.
 Nodes: Nodes are devices that are connected to a network. These can include computers, Servers,
Printers, Routers, Switches, and other devices.
 Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a
network. Examples of protocols include TCP/IP, HTTP, and FTP.
 Topology: Network topology refers to the physical and logical arrangement of nodes on a network.
The common network topologies include bus, star, ring, mesh, and tree.
 Service Provider Networks: These types of Networks give permission to take Network Capacity
and Functionality on lease from the Provider. Service Provider Networks include Wireless
Communications, Data Carriers, etc.
 IP Address: An IP address is a unique numerical identifier that is assigned to every device on a
network. IP addresses are used to identify devices and enable communication between them.
 DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable
domain names (such as www.google.com) into IP addresses that computers can understand.
 Firewall: A firewall is a security device that is used to monitor and control incoming and outgoing
network traffic. Firewalls are used to protect networks from unauthorized access and other security
threats.
Types of Enterprise Computer Networks
 LAN: A Local Area Network (LAN) is a network that covers a small area, such as an office or a
home. LANs are typically used to connect computers and other devices within a building or a
campus.
 WAN: A Wide Area Network (WAN) is a network that covers a large geographic area, such as a city,
country, or even the entire world. WANs are used to connect LANs together and are typically used
for long-distance communication.
 Cloud Networks: Cloud Networks can be visualized with a Wide Area Network (WAN) as they can
be hosted on public or private cloud service providers and cloud networks are available if there is a
demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.
Types of Computer Network Architecture
Computer Network falls under these broad Categories:
 Client-Server Architecture: Client-Server Architecture is a type of Computer Network Architecture
in which Nodes can be Servers or Clients. Here, the server node can manage the Client Node
Behavior.
 Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture, there is not any concept of a
Central Server. Each device is free for working as either client or server.
Network Devices
An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for
the purpose of sending/receiving data or media. Computer networks can also include multiple
devices/mediums which help in the communication between two different devices; these are known
as Network devices and include things such as routers, switches, hubs, and bridges.

Network Devices

Network Topology
The Network Topology is the layout arrangement of the different devices in a network. Common
examples include Bus, Star, Mesh, Ring, and Daisy chain.

Network Topology
OSI Model
OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer. The OSI has been developed by the
International Organization For Standardization and it is 7 layer architecture. Each layer of OSI has
different functions and each layer has to follow different protocols. The 7 layers are as follows:
 Physical Layer
 Data link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer
Protocol
A protocol is a set of rules or algorithms which define the way how two entities can communicate across
the network and there exists a different protocol defined at each layer of the OSI model. A few such
protocols are TCP, IP, UDP, ARP, DHCP, FTP, SMTP and so on.

Internet Security

While the internet unarguably opens these new gateways of convenience and communication, it also
exposes our systems, data, and network to threats that can steal our personal data. These threats can
put your system and identity in danger. Some common internet security issues include ransomware
attacks, code injection, phishing scams, mobile malware, and PC and mobile ransomware. To prevent
these issues from happening to you or your business, it is important to secure our internet or have a
thorough backup of critical data in a secure environment.
What is Internet Security?

Internet security refers to staying safe while surfing the web. It involves protecting your systems from
unauthorized access or attacks that can harm your data or network. It is essential to protect businesses,
and individuals from malicious attacks such as hacking, malware, ransomware, and identity theft. To
ensure privacy and security on the internet it is important to be aware of different types of internet
attacks.
Here are some specific reasons why every organization needs internet security:
Confidentiality and Privacy
Private or confidential information can be read, intercepted, and stolen if security precautions are not in
place. Attacks can range from relatively inconsequential, such as spam, to detrimental, such as identity
theft or other types of fraud. Governments and businesses that keep private records of their clients or
workers face the most risk.
Identity Theft
In the information era, people purchase, trade, and exchange information online, and identity theft is a
common problem. If security is insufficient, online transactions can result in thieves obtaining employees’
credit card information, personal information, and even social security numbers. Criminals can use this
information to apply for government benefits, make fake charges and purchases, and take out loans.
While most issues can be resolved, repairing the harm caused by identity theft can consume significant
time, money, and effort.
Damaged Computers
Strong internet security can also protect your laptops, desktops, and other devices from harm. Some
cyber criminals are more concerned about fomenting chaos than stealing data. Many computer users
end up dealing with viruses, Trojans, and other forms of malware, which can sometimes steal data or
leave their machines unusable. Furthermore, these assaults can interfere with important
communications and services, particularly when the targets are governmental systems.
The five most common examples of internet security issues are malware, phishing, botnets, spam,
and data loss.
1. Malware
Malware combines the words "malicious" and "software" and is a general term that refers to worms,
viruses, Trojans, and other dangerous software that cyber criminals use to cause havoc and steal
private data. Malware is any software created to harm a computer, server, or network.
2. Phishing
Phishing is a cyberattack that uses phony emails. Hackers attempt to dupe email recipients into thinking
that an attachment or link in the message is legitimate and important, such as a request from their bank
or a note from a coworker. The intention is to trick individuals into providing personal information or
downloading malicious software.
3. Botnets
The term ―botnet‖ comes from the word "robot network.‖ A botnet is a network of computers that have
been purposefully infected with malware to help a cyber criminal automate certain actions without the
consent or knowledge of the computer’s owner.
The same methods for infecting computers with malware—such as opening email attachments that
download malware or visiting malicious websites—are typically used to infect computers with botnets.
Botnets can also propagate over a network, moving from one computer to another and using these
computers' computational power to execute attacks.
4. Spam
Spam is a general term connoting any unwanted mail. Some spam may seem innocent, irritating at
worst. But spam messages often contain malware, which can be used to infect computers, damage
networks, and launch ransomware attacks.
Spam can also present significant problems for employees within your organization, specifically because
it can clog up their email inboxes with useless, space-consuming messages. Then they have to waste
time deleting hundreds or even thousands of junk emails.
5. Data Loss
Organizations can lose data via various means. For example, a thief can steal it or a hacker can damage
a server or hard drive containing sensitive or important information.
So if a computer network is infected with ransomware, for example, completely wiping one or more
computers to regain control over your assets may be necessary. If the data has no backup or if the latest
backup is weeks or months old, serious operational interruptions can ensue.
You can protect your organization against internet threats by combining email security, firewalls, multi-
factor authentication (MFA), browser selection, URL filtering, and data loss prevention (DLP).
1. Email Security
The term "email security" refers to various processes and strategies for defending email accounts,
information, and communications from unwanted access, theft, or compromise. Phishing, spam, and
other types of attacks are frequently disseminated through email, and email security prevents these
kinds of attacks.
2. Firewalls
Firewalls filter traffic coming in and going out of your network. To do this, they inspect data packets,
looking for information about where the data is coming from and what it contains. If the firewall detects a
threat, the data packet is discarded.
3. Multi-factor Authentication (MFA)
Multi-factor authentication (MFA) involves using multiple types of identification to verify the legitimacy of
someone trying to log in to a system. MFA frequently includes information the person knows (password
or PIN code), something the person has (flash drive or physical token), and a physical attribute of the
individual (fingerprint or face scan).
4. Browser Selection
Not all browsers are created equally, and some do a better job of protecting against threats than others.
For example, safe browsers clear out cookies after you visit websites so a hacker that steals your device
cannot automatically log in to your bank or tax preparation websites. Safe browsers also use SSL
certificates to secure connections between users and the sites they visit.
5. URL Filtering
With URL filtering, a business can prevent employees from viewing particular websites on machines
owned by the organization. URL filtering, a kind of web filtering, prohibits access to harmful websites,
sites with offensive or illegal content, and websites that can reduce employee productivity.
6. Data Loss Prevention
Employees may unintentionally—or willfully—leak company information via email by visiting malicious
websites or by using insecure cloud storage. Security software should scan internet traffic for sensitive
and protected data to stop it from being stolen or leaked to unauthorized parties.

There are several internet security products and solutions available to help keep your internet usage
secure. These can include Antivirus software, Password manager, VPN, Firewall, and Parental control.

DBMS
The database system is an excellent computer-based record-keeping system. A collection of data,
commonly called a database, contains information about a particular enterprise. It maintains any
information that may be necessary to the decision-making process involved in the management of that
organization. It can also be defined as a collection of interrelated data stored together to serve multiple
applications, the data is stored so that it is independent of programs that use the data.
Database Abstraction
A major purpose of a database is to provide the user with only as much information as is required of
them. This means that the system does not disclose all the details of the data, rather it hides some
details of how the data is stored and maintained. The complexity of databases is hidden from them
which, if necessary, are ordered through multiple levels of abstraction to facilitate their interaction with
the system. The different levels of the database are implemented through three layers:
1. Internal Level(Physical Level): The lowest level of abstraction, the internal level, is closest to
physical storage. It describes how the data is stored concretely on the storage medium.
2. Conceptual Level: This level of abstraction describes what data is concretely stored in the
database. It also describes the relationships that exist between the data. At this level, databases are
described logically in terms of simple data structures. Users at this level are not concerned with how
these logical data structures will be implemented at the physical level.
3. External Level(View Level): It is the level closest to users and is related to the way the data is
viewed by individual users.

Data Abstraction

Since a database can be viewed through three levels of abstraction, any change at one level can affect
plans at other levels. As databases continue to grow, there may be frequent changes to it at times. This
should not lead to redesign and re-implementation of the database. In such a context the concept of
data independence proves beneficial.
Concept of Database
To store and manage data efficiently in the database let us understand some key terms:
1. Database Schema: It is a design of the database. Or we can say that it is a skeleton of the database
that is used to represent the structure; types of data will be stored in the rows and columns, constraints,
relationships between the tables.
2. Data Constraints: In a database, sometimes we put some restrictions on the table that what type of
data can be stored in one or more columns of the table, it can be done by using constraints. Constraints
are defined while we are creating a table.
3. Data dictionary or Metadata: Metadata is known as the data about the data. Or we can say that the
database schema along with different types of constraints on the data is stored by DBMS in the
dictionary is known as metadata.
4. Database instance: In a database, a database instance is used to define the complete database
environment and its components. Or we can say that it is a set of memory structures and background
processes that are used to access the database files.
5. Query: In a database, a query is used to access data from the database. So users have to write
queries to retrieve or manipulate data from the database.
6. Data manipulation: In a database, we can easily manipulate data using the three main operations
that is Insertion, Deletion, and updation.
7. Data Engine: It is an underlying component that is used to create and manage various database
queries.
Advantages of Database
Let us consider some of the benefits provided by a database system and see how a database system
overcomes the above-mentioned problems:-
1. Reduces database data redundancy to a great extent
2. The database can control data inconsistency to a great extent
3. The database facilitates sharing of data.
4. Database enforce standards.
5. The database can ensure data security.
6. Integrity can be maintained through databases.
Therefore, for systems with better performance and efficiency, database systems are preferred.
Disadvantages of Database
With the complex tasks to be performed by the database system, some things may come up which can
be termed as the disadvantages of using the database system. These are:-
1. Security may be compromised without good controls.
2. Integrity may be compromised without good controls.
3. Extra hardware may be required
4. Performance overhead may be significant.
5. The system is likely to be complex.
Trends In E-Governance

Electronic governance or e-governance is the application of information technology for


delivering government services, exchange of information, communication transactions, integration of
various stand-alone systems between government to citizen (G2C), government-to-business (G2B),
government-to-government (G2G), government-to-employees (G2E) as well as back-office processes
and interactions within the entire governance framework. Using e-governance, government services are
made available to citizens through IT. The three main target groups that can be distinguished in
governance concepts are government, citizens, and businesses/interest groups.

Government to citizen
The goal of government-to-citizen (G2C) e-governance is to offer a variety of ICT services to citizens in
an efficient and economical manner and to strengthen the relationship between government and citizens
using technology.

There are several methods of G2C e-governance. Two-way communication allows citizens to instant
message directly with public administrators, and cast remote electronic votes (electronic voting) and
instant opinion voting. These are examples of e-Participation.
Government to employees
E-governance to Employee partnership (G2E) Is one of four main primary interactions in the delivery
model of E-governance. It is the relationship between online tools, sources, and articles that help
employees to maintain the communication with the government and their own companies. E-governance
relationship with Employees allows new learning technology in one simple place as the computer.
Documents can now be stored and shared with other colleagues online.
E-governance makes it possible for employees to become paperless and makes it easy for employees to
send important documents back and forth to colleagues all over the world instead of having to print out
these records or fax G2E services also include software for maintaining personal information and
records of employees. Some of the benefits of G2E expansion include:

 E-payroll – maintaining the online sources to view paychecks, pay stubs, pay bills, and keep records
for tax information.
 E-benefits – be able to look up what benefits an employee is receiving and what benefits they have
a right to.
 E-training – allows for new and current employees to regularly maintain the training they have
through the development of new technology and to allow new employees to train and learn over new
materials in one convenient location. E-learning is another way to keep employees informed on the
important materials they need to know through the use of visuals, animation, videos, etc. It is usually
a computer-based learning tool, although not always. It is also a way for employees to learn at their
own pace (distance learning), although it can be instructor-led.
 Maintaining records of personal information – Allows the system to keep all records in one easy
location to update with every single bit of information that is relevant to a personal file. Examples
being social security numbers, tax information, current address, and other information.
Government to government (G2G)
Many governments around the world have gradually turned to Information technologies (IT) in an effort
to keep up with today's demands. Historically, many governments in this sphere have only been
reactive, but recently there has been a more proactive approach in developing comparable services
such things as e-commerce and e-business.
The framework of such an organization is now expected to increase more than ever by becoming
efficient and reducing the time it takes to complete an objective. Some examples include paying utilities,
tickets, and applying for permits. So far, the biggest concern is accessibility to Internet technologies for
the average citizen. In an effort to help, administrations are now trying to aid those who do not have the
skills to fully participate in this new medium of governance, especially now as e-government progressing
to more e-governance though.
Government to business (G2B)
E-government reduces costs and lowers the barrier of allowing companies to interact with the
government. The interaction between the government and businesses reduces the time required for
businesses to conduct a transaction. For instance, there is no need to commute to a government
agency's office, and transactions may be conducted online instantly with the click of a mouse. This
significantly reduces transaction time for the government and businesses alike.
E-Government provides a greater amount of information that the business needed, also it makes that
information more clear. A key factor in business success is the ability to plan and forecast through data-
driven future. The government collected a lot of economic, demographic and other trends in the data.
This makes the data more accessible to companies which may increase the chance of economic
prosperity.
Module 2
Conceptual Background Of MIS
Management Information Systems (MIS) is the study of people, technology, organizations, and the
relationships among them. MIS professionals help firms realize maximum benefit from investment in
personnel, equipment, and business processes. MIS is a people-oriented field with an emphasis on
service through technology.

Scope of MIS

The scope of Management Information Systems (MIS) is to generate, collect, and analyze data from
operational activities for decision-making. MIS is a combination of hardware, software, and people that
can be used by businesses of any size, industry, or budget.

Classification Of MIS

Management Information Systems (MIS) can be classified into four levels based on who uses them:

 Transaction processing systems: Used by workers to record day-to-day business transactions, such as
payroll, stock tracking, and order processing
 Management information systems: Used by middle managers
 Decision support systems: Used by senior managers
 Executive information systems: Used by executives to provide timely and accurate information about
organizational performance

Characteristics of MIS

Management Information Systems (MIS) have many characteristics, including:

 Management-oriented: MIS is designed to meet the needs of managers and provide information for
decision-making.
 Data: MIS uses technology and people to record, store, and process data from various sources.
 Data quality: A good MIS has high-quality data that is accurate, complete, timely, relevant, and
consistent.
 Information retrieval: MIS retrieves information from its stores when users request it.
 Reports: MIS provides reports on an organization's routine operations in various formats, including hard
copies and electronic copies. Users can also develop custom reports.
 Organization: MIS is usually organized along the functional areas of an organization.

Decision Support System (DSS)

A decision support system (DSS) is an information system that supports business or


organizational decision-making activities. DSSs serve the management, operations and planning levels of
an organization and help people make decisions about problems that may be rapidly changing and not
easily specified in advance.

1. DSS tends to be aimed at the less well structured, underspecified problem that upper
level managers typically face.
2. DSS attempts to combine the use of models or analytic techniques with traditional data
access and retrieval functions
3. DSS specifically focuses on features which make them easy to use by non-computer-proficient people
in an interactive mode
4. DSS emphasizes flexibility and adaptability to accommodate changes in the environment and
the decision making approach of the user.
DSSs include knowledge-based systems. A properly designed DSS is an interactive software-based
system intended to help decision makers compile useful information from a combination of raw data,
documents, personal knowledge, and/or business models to identify and solve problems and make
decisions.
Typical information that a decision support application might gather and present includes:

 Inventories of information assets (including legacy and relational data sources, cubes, data
warehouses, and data marts),
 Comparative sales figures between one period and the next,
 Projected revenue figures based on product sales assumptions.

You might also like