Unit 1 {Book} | |
Information Technology | VIEW |
Concept of Data, Information and Knowledge | VIEW |
Database | VIEW |
Information System and its Major Components | VIEW |
Types and Levels of Information System | VIEW |
Main Types of Information Technology Support System | VIEW |
Computer Based Information System | VIEW |
Types of Computer Based Information System | VIEW |
Office Automation System (OAS) | VIEW |
Transaction Processing System (TPS) | VIEW |
Management Information System (MIS) | VIEW |
Decision Support System (DSS) | VIEW |
Executive Information System (EIS) | VIEW |
Knowledge Based System (KBS) | VIEW |
Expert Systems | VIEW |
Success and Failure of Information Technology: Failure of Nike and AT&T | VIEW |
IT Development Trends | VIEW |
Major Areas of Information Technology Applications in Management | VIEW |
Digital Economy | VIEW |
Digital Organization | VIEW |
IT Resources | VIEW |
Open Source Software | VIEW |
Different Operating Systems | VIEW |
Unit 2 {Book} | |
Microsoft Word | VIEW |
Spreadsheet Applications Part 1 | VIEW |
Spreadsheet Applications Part 2 | VIEW |
Presentation Software | VIEW |
Rehearsal of Presentation | VIEW |
Unit 3 {Book} | |
VIEW | |
Outlook and Use of Outlook | VIEW |
Configuring Outlook | VIEW |
Bulk Email Software | VIEW |
Intranet | VIEW |
Extranet | VIEW |
Networking Basics | VIEW |
Different Types of Network | VIEW |
Hubs | VIEW |
Bridges | VIEW |
Routers | VIEW |
IP Address | VIEW |
Local Area Network (LAN) | VIEW |
Metropolitan Area Network (MAN) | VIEW |
Wide Area Network (WAN) | VIEW |
Domain Name Registration | VIEW |
e-Commerce | VIEW |
M-Commerce | VIEW |
Business Models of e-Commerce | VIEW |
e-Governance | VIEW |
Electronic Fund Transfer | VIEW |
Electronic Data Interchange (EDI) | VIEW |
Unit 4 {Book} | |
Threats to Computer System | VIEW |
Types of Security Threads | VIEW |
Information Technology Risk | VIEW |
Measuring Information Technology Risk | VIEW |
Risk Mitigation | VIEW |
Risk Management | VIEW |
Information System Security | VIEW |
Internet Security | VIEW |
Network and Website Security Risks | VIEW |
Website Hacking and issues Therein | VIEW |
Security and Email | VIEW |
e-Business Risk Management issues | VIEW |
Firewall: Meaning, Components and Types | VIEW |
Advantage and Disadvantage of Firewall | VIEW |
Enterprise Wide Security Framework | VIEW |
Information Security Environment in India | VIEW |
Types of Real Time System | VIEW |
Distinguish between Real Time, Online and Batch Processing System | VIEW |
Real Time Applications Viz. Railway, Airway and Hotel Reservation System | VIEW |
ATMs | VIEW |
EDI Transactions | VIEW |
e-Cash | VIEW |
Security Requirements for Safe e-payment Systems | VIEW |
Security Measures in International and Cross Boarder Financial Transaction | VIEW |
Threat Hunting Software | VIEW |
One thought on “Information Technology in Business Management 1 University of Mumbai BMS 3rd Sem Notes”