Detailed Table of Contents

advertisement
Modern business computer
Dr. Nazih Abdallah
Table of contents
To display a chapter or topic please click its hyperlink below
Author statement: About the book and the author
Chapter I:
1234567891011121314151617-
What is business?
Business classification
Business ownership categories
Business creation priorities
Business organization and organizational charts
The vertical or hierarchical model
The horizontal model
The Matrix model
Business cycle
Computer impact
Impact of computer networking
Modern business
Business IT
Importance of business information system
Business classification
Annex A: SIC (Standard Industrial Classification
Annex B: NAICS (North American Industry Classification System)
Chapter II
1234-
Business fundamentals
Information fundamentals
Quotes about information
Definition of information
Quality of information
Digital information
a. Important numeration systems
i. Mayan
ii. Roman
iii. Arabic or Decimal
iv. Binary
v. Hexadecimal
b. Data and information
5-
6-
7-
89-
c. Levels of information
Other types of information:
a. Conventional information
b. Coded information
Data representation
a. ASCII and EBCDIC
b. Unicode
Data digitization (binary representation of data)
a. Digitizing text
b. Digitizing picture
c. Resolution
d. Digitizing sounds and audio files
e. Digitizing video files
f. CODEC (Coder-Decoder)
Business and information
Modern business and information needs
a. Introduction
b. Information and business activities
i. Information technology (IT)
ii. Human resources
iii. Financial department
iv. Material department
v. Production department
vi. Transportation department
Chapter III
12345-
Understanding computer hardware
Computer evolution
Digital electronic device / computer
Computer hardware
Computer input
Input technology
a. Keyboard
b. Pointing technology
i. Motion detection
ii. Touch detection
c. Gaming technology
d. Multimedia input technology
i. Picture input
ii. Video input
iii. Audio input
iv. Bare voice input
6-
7-
8-
9-
e. Medical input technology
i. MRI input
ii. CT input
f. Network and Internet input
g. Internal input
Computer processing
a. Computer processor
b. Computer clock
i. Computer speed
ii. Machine cycle
c. Word size
Processor speed technology
a. Pipelining technology
b. Co-processing technology
c. Parallel processing technology
d. Multicore technology
e. Computer instruction set
Computer output
a. Printed output
b. Audio output
c. Video output
d. Display technology
i. CRT (Cathode Ray Tube)
ii. LCD (Liquid Crystal Display)
iii. Gas plasma display
iv. LED (Light Emitting Diode)
e. Display resolution
f. Spoken words output
Storage
a. Temporary storage
i. RAM
ii. Cache
b. Internal permanent storage
i. ROM
ii. CMOS
c. Virtual memory (VRAM)
d. Permanent mass storage
i. Magnetic technology
ii. Optical technology
iii. Solid state technology
e. Future storage technologies
Chapter IV:
Computer software
1- Introduction
2- System software
a. Operating system legacy
i. Important operating systems
ii. Operational role of OS
b. Utility software
i. Introduction
ii. Disk care utility
iii. File management utility
iv. Compilers
v. Computer security software (anti-virus, back-up, crypto, etc…)
vi. Other maintenance utilities
vii. Why utilities are not part of the OS?
c. Device drivers
i. What is a driver?
ii. What devices need drivers?
3- Application software
a. Productivity software
b. Word processing
i. MS word 2010
ii. MS Word 2013
c. Spreadsheet software
i. EXCEL 2013
ii. Other spreadsheet software
d. Presentation graphics software
i. General information
ii. MS Power point 2013
iii. Other presentation software
e. Database software
i. MS Access 2013
ii. Other database software
f. Management software
g. Statistical software
h. Web authoring software
i. and games software
j. Educational software
k. Design software
l. Cloud computing
4- Software market
a. Horizontal market software
b. Vertical market software
5- Programming languages
a. Language generations and levels
b. Programming technology
i. Procedural
ii. Object oriented programming
c. Future languages
6- Program conversion
a. General
b. Assembler
c. Compiler
d. Interpreter
7- Software licensing
a. Introduction
b. Types of licenses
Chapter V
Fundamentals of telecommunications
1- Introduction
2- Electricity and electronics
3- Telegraphy
a. Introduction
b. Morse and telegraphy evolution
4- Telephony
a. Introduction
b. How it works?
c. Telephony evolution
d. Pros and cons of the telephone
5- Wired telecommunications
a. Twisted pair cables
b. Co-axial cable
c. Fiber optic cable
d. How fiber optic technology works?
e. T 1 line
f. T 3 line
6- Wireless telecommunications
a. Introduction
b. Signal characteristics
c. Frequency distribution table
d. Signal propagation
e. Types of antennas
f. Wireless- Line of sight
g. Relays and coverage
7-
8-
9-
10-
11-
1213-
h. Tower and relays
i. Satellites as relays
j. Other roles of the relay
Topology of radio communication
a. Simplex
b. Half-duplex (HDX)
c. Full duplex (FDX)
Global Positioning System (GPS)
a. GPS technology
b. GPS evolution
c. Other GPS systems
i. Russian GLONASS
ii. Chinese BEIDOU
iii. European Galileo
d. How GPS works?
e. Areas of GPS use
Cellphone technology
a. Fundamentals
b. Operational data
c. Link with ground phone network
d. Operational technologies
i. Code Division multiple Access (CDMA)
ii. GSM/TDMA (Global System for Mobile communications/
Time Division Multiple Access).
e. How the technologies compare?
RADAR (Radio Detection And Ranging)
a. Principle
b. RADAR components
c. RADAR applications
LASER (Light Amplification by Simulated Emission of Radiation)
a. Principle
b. Development
c. Topology of LASER
i. Crystal LASER
ii. Gas LASER
iii. Semi-conductor LASER
d. Business apps of LASER
Infrared transmission
Light trip from select space locations to planet Earth.
Chapter VI
Networking and Internet
1- Introduction: What is networking?
2345-
Networking applications
Computer networks
Classification by size
Network physical topology
a. Star network
b. Bus network
c. Ring network
d. Mesh network
e. Peer to peer network
f. Tree network
6- Network protocol (Logical topology)
a. Handshaking process
b. Ethernet protocol
c. Token ring protocol
7- Wireless networking
a. WLAN
b. WI-FI
c. WI-MAX
8- Blue tooth networking
a. General knowledge
b. Characteristics of Blue tooth network
c. Blue tooth protocol
d. Samples of Blue tooth apps
The internet
12345-
Internetworking
Connecting networks
Packet switching/circuit switching
Evolution of the Internet
Internet protocol: TCP/IP
a. TCP (Transmission Control Protocol)
b. IP (Internet protocol)
6- Internet backbone
7- routers
8- Internet operations
a. Nobody own the Internet
b. Internet access
c. Internet access methods
i. Dial-up connection
ii. DSL
iii. Cable TV
iv. Satellite access
9- Important business special networks
a. VIRTUAL Private Network (VPN)
b. Intranet
c. Extranet
d. Value-added Network (VAN)
Chapter VII
Internet Services
1- Introduction
2- E-mail
a. Introduction
b. Early email systems
c. Modern E-mail evolution
d. Modern email technology
e. Email protocol
f. Email important features
g. How MIME works?
h. Mailing lists or distribution lists
i. Email Service provider
3- Large webmail services:
a. Hot mail
b. Yahoo
c. Gmail
4- World Wide Web (WWW)
a. Evolution
b. Website, Web page
c. Hyperlink
d. Web protocol Hyper-Text Transfer Protocol (HTTP)
e. URL
f. Web browser
g. Plug-in
h. Media Player
i. Web server
j. Web authoring languages
i. Hyper Text Mark-up Language (HTML)
ii. Extensible Mark-up language (XML)
iii. Wireless mark-up language (WML)
k. Web authoring software
l. Important WYSIYG software
m. Web authoring services (Web templates)
n. Web addressing
i. IP address
ii. URL
iii. Internet Service Provider (ISP)
o. Search engine:
i. Definition
ii. How it works?
iii. List of top 10 search engines
p. Internet telecom types
i. Chat and instant messaging
ii. Text messaging
iii. Blog
5- E-commerce
a. Evolution and tools
b. E-shopping cart
c. Cookies
d. Types of e-commerce
i. B2C
ii. Dis-intermediation
iii. B2B
iv. C2C
v. Mobile commerce
vi. Cyber-mall
vii. E-tailing
6- Internet telephony
a. Introduction
b. VoIP evolution
c. VoIP service providers
7- Social networking
a. Introduction
b. Facebook
c. Twitter
d. Other social networking sites
e. You tube
Chapter VIII
Data & file management, database and information security
1- File fundamentals
a. What is a file?
b. Types of files
i. Software file
ii. Data file
c. Physical storage model
d. Logical storage model
2- File management software
a. Move/delete files
b. File shredder
3- Database fundamentals
a. What is a database
b. Functions of Database Management System (DBMS)
c. Database structure
i. Field
ii. Record
iii. Table or relation
d. Keys
i. Primary key
ii. Secondary key
e. Database relations
i. One to one
ii. One to many
iii. Many to many
f. Data warehouse and data-mart
g. Database operations
i. Normalization
ii. Selection
iii. Joining tables
iv. Querying database (SQL)
v. Query by objectives
h. Designing user interface
i. Object Oriented Database (OODB)
j. Management approach File/database
i. File approach
ii. Database approach
Malware and computer security
1- Why Information system is always under attack?
2- Origin of the threat
3- Piracy and plagiarism
4- Authentication
a. Password
b. Badge o ID
c. Biometrics
5- Interior threat
6- War driving
7- Hacking and hackers
a. Black hat
89-
10111213-
1415-
b. White hat
c. Grey hat
Hacking conventions and conferences.
Malware: Malicious software
a. Virus
b. Worm
c. Trojan horse
Anti-virus software
Anti-spyware
Internet fraud
Other faces of malware
a. Phishing
b. Spam
c. Hoax
d. Spyware
e. Zombie
f. Botnet
How to defend yourself?
System back-up
a. Necessity of back-up policy
b. Back-up frequency
c. RAID technology
Download