Skip to the content
Information Technology in Business Management 1
9th April 2020
By
indiafreenotes
Unit 1 {Book}
|
|
Information Technology
|
|
Concept of Data, Information and Knowledge
|
|
Database
|
|
Information System and its Major Components
|
|
Types and Levels of Information System
|
|
Main Types of Information Technology Support System
|
|
Computer Based Information System
|
|
Types of Computer Based Information System
|
|
Office Automation System (OAS)
|
|
Transaction Processing System (TPS)
|
|
Management Information System (MIS)
|
|
Decision Support System (DSS)
|
|
Executive Information System (EIS)
|
|
Knowledge Based System (KBS)
|
|
Expert Systems
|
|
Success and Failure of Information Technology: Failure of Nike and AT&T
|
|
IT Development Trends
|
|
Major Areas of Information Technology Applications in Management
|
|
Digital Economy
|
|
Digital Organization
|
|
IT Resources
|
|
Open Source Software
|
|
Different Operating Systems
|
|
Unit 2 {Book}
|
|
Microsoft Word
|
|
Spreadsheet Applications Part 1
|
|
Spreadsheet Applications Part 2
|
|
Presentation Software
|
|
Rehearsal of Presentation
|
|
Unit 3 {Book}
|
|
Email
|
|
Outlook and Use of Outlook
|
|
Configuring Outlook
|
|
Bulk Email Software
|
|
Intranet
|
|
Extranet
|
|
Networking Basics
|
|
Different Types of Network
|
|
Hubs
|
|
Bridges
|
|
Routers
|
|
IP Address
|
|
Local Area Network (LAN)
|
|
Metropolitan Area Network (MAN)
|
|
Wide Area Network (WAN)
|
|
Domain Name Registration
|
|
e-Commerce
|
|
M-Commerce
|
|
Business Models of e-Commerce
|
|
e-Governance
|
|
Electronic Fund Transfer
|
|
Electronic Data Interchange (EDI)
|
|
Unit 4 {Book}
|
|
Threats to Computer System
|
|
Types of Security Threads
|
|
Information Technology Risk
|
|
Measuring Information Technology Risk
|
|
Risk Mitigation
|
|
Risk Management
|
|
Information System Security
|
|
Internet Security
|
|
Network and Website Security Risks
|
|
Website Hacking and issues Therein
|
|
Security and Email
|
|
e-Business Risk Management issues
|
|
Firewall: Meaning, Components and Types
|
|
Advantage and Disadvantage of Firewall
|
|
Enterprise Wide Security Framework
|
|
Information Security Environment in India
|
|
Types of Real Time System
|
|
Distinguish between Real Time, Online and Batch Processing System
|
|
Real Time Applications Viz. Railway, Airway and Hotel Reservation System
|
|
ATMs
|
|
EDI Transactions
|
|
e-Cash
|
|
Security Requirements for Safe e-payment Systems
|
|
Security Measures in International and Cross Boarder Financial Transaction
|
|
Threat Hunting Software
|
|
Like this:
Like Loading...
Related
error: Content is protected !!
[…] VIEW […]