Modern business computer Dr. Nazih Abdallah Table of contents To display a chapter or topic please click its hyperlink below Author statement: About the book and the author Chapter I: 1234567891011121314151617- What is business? Business classification Business ownership categories Business creation priorities Business organization and organizational charts The vertical or hierarchical model The horizontal model The Matrix model Business cycle Computer impact Impact of computer networking Modern business Business IT Importance of business information system Business classification Annex A: SIC (Standard Industrial Classification Annex B: NAICS (North American Industry Classification System) Chapter II 1234- Business fundamentals Information fundamentals Quotes about information Definition of information Quality of information Digital information a. Important numeration systems i. Mayan ii. Roman iii. Arabic or Decimal iv. Binary v. Hexadecimal b. Data and information 5- 6- 7- 89- c. Levels of information Other types of information: a. Conventional information b. Coded information Data representation a. ASCII and EBCDIC b. Unicode Data digitization (binary representation of data) a. Digitizing text b. Digitizing picture c. Resolution d. Digitizing sounds and audio files e. Digitizing video files f. CODEC (Coder-Decoder) Business and information Modern business and information needs a. Introduction b. Information and business activities i. Information technology (IT) ii. Human resources iii. Financial department iv. Material department v. Production department vi. Transportation department Chapter III 12345- Understanding computer hardware Computer evolution Digital electronic device / computer Computer hardware Computer input Input technology a. Keyboard b. Pointing technology i. Motion detection ii. Touch detection c. Gaming technology d. Multimedia input technology i. Picture input ii. Video input iii. Audio input iv. Bare voice input 6- 7- 8- 9- e. Medical input technology i. MRI input ii. CT input f. Network and Internet input g. Internal input Computer processing a. Computer processor b. Computer clock i. Computer speed ii. Machine cycle c. Word size Processor speed technology a. Pipelining technology b. Co-processing technology c. Parallel processing technology d. Multicore technology e. Computer instruction set Computer output a. Printed output b. Audio output c. Video output d. Display technology i. CRT (Cathode Ray Tube) ii. LCD (Liquid Crystal Display) iii. Gas plasma display iv. LED (Light Emitting Diode) e. Display resolution f. Spoken words output Storage a. Temporary storage i. RAM ii. Cache b. Internal permanent storage i. ROM ii. CMOS c. Virtual memory (VRAM) d. Permanent mass storage i. Magnetic technology ii. Optical technology iii. Solid state technology e. Future storage technologies Chapter IV: Computer software 1- Introduction 2- System software a. Operating system legacy i. Important operating systems ii. Operational role of OS b. Utility software i. Introduction ii. Disk care utility iii. File management utility iv. Compilers v. Computer security software (anti-virus, back-up, crypto, etc…) vi. Other maintenance utilities vii. Why utilities are not part of the OS? c. Device drivers i. What is a driver? ii. What devices need drivers? 3- Application software a. Productivity software b. Word processing i. MS word 2010 ii. MS Word 2013 c. Spreadsheet software i. EXCEL 2013 ii. Other spreadsheet software d. Presentation graphics software i. General information ii. MS Power point 2013 iii. Other presentation software e. Database software i. MS Access 2013 ii. Other database software f. Management software g. Statistical software h. Web authoring software i. and games software j. Educational software k. Design software l. Cloud computing 4- Software market a. Horizontal market software b. Vertical market software 5- Programming languages a. Language generations and levels b. Programming technology i. Procedural ii. Object oriented programming c. Future languages 6- Program conversion a. General b. Assembler c. Compiler d. Interpreter 7- Software licensing a. Introduction b. Types of licenses Chapter V Fundamentals of telecommunications 1- Introduction 2- Electricity and electronics 3- Telegraphy a. Introduction b. Morse and telegraphy evolution 4- Telephony a. Introduction b. How it works? c. Telephony evolution d. Pros and cons of the telephone 5- Wired telecommunications a. Twisted pair cables b. Co-axial cable c. Fiber optic cable d. How fiber optic technology works? e. T 1 line f. T 3 line 6- Wireless telecommunications a. Introduction b. Signal characteristics c. Frequency distribution table d. Signal propagation e. Types of antennas f. Wireless- Line of sight g. Relays and coverage 7- 8- 9- 10- 11- 1213- h. Tower and relays i. Satellites as relays j. Other roles of the relay Topology of radio communication a. Simplex b. Half-duplex (HDX) c. Full duplex (FDX) Global Positioning System (GPS) a. GPS technology b. GPS evolution c. Other GPS systems i. Russian GLONASS ii. Chinese BEIDOU iii. European Galileo d. How GPS works? e. Areas of GPS use Cellphone technology a. Fundamentals b. Operational data c. Link with ground phone network d. Operational technologies i. Code Division multiple Access (CDMA) ii. GSM/TDMA (Global System for Mobile communications/ Time Division Multiple Access). e. How the technologies compare? RADAR (Radio Detection And Ranging) a. Principle b. RADAR components c. RADAR applications LASER (Light Amplification by Simulated Emission of Radiation) a. Principle b. Development c. Topology of LASER i. Crystal LASER ii. Gas LASER iii. Semi-conductor LASER d. Business apps of LASER Infrared transmission Light trip from select space locations to planet Earth. Chapter VI Networking and Internet 1- Introduction: What is networking? 2345- Networking applications Computer networks Classification by size Network physical topology a. Star network b. Bus network c. Ring network d. Mesh network e. Peer to peer network f. Tree network 6- Network protocol (Logical topology) a. Handshaking process b. Ethernet protocol c. Token ring protocol 7- Wireless networking a. WLAN b. WI-FI c. WI-MAX 8- Blue tooth networking a. General knowledge b. Characteristics of Blue tooth network c. Blue tooth protocol d. Samples of Blue tooth apps The internet 12345- Internetworking Connecting networks Packet switching/circuit switching Evolution of the Internet Internet protocol: TCP/IP a. TCP (Transmission Control Protocol) b. IP (Internet protocol) 6- Internet backbone 7- routers 8- Internet operations a. Nobody own the Internet b. Internet access c. Internet access methods i. Dial-up connection ii. DSL iii. Cable TV iv. Satellite access 9- Important business special networks a. VIRTUAL Private Network (VPN) b. Intranet c. Extranet d. Value-added Network (VAN) Chapter VII Internet Services 1- Introduction 2- E-mail a. Introduction b. Early email systems c. Modern E-mail evolution d. Modern email technology e. Email protocol f. Email important features g. How MIME works? h. Mailing lists or distribution lists i. Email Service provider 3- Large webmail services: a. Hot mail b. Yahoo c. Gmail 4- World Wide Web (WWW) a. Evolution b. Website, Web page c. Hyperlink d. Web protocol Hyper-Text Transfer Protocol (HTTP) e. URL f. Web browser g. Plug-in h. Media Player i. Web server j. Web authoring languages i. Hyper Text Mark-up Language (HTML) ii. Extensible Mark-up language (XML) iii. Wireless mark-up language (WML) k. Web authoring software l. Important WYSIYG software m. Web authoring services (Web templates) n. Web addressing i. IP address ii. URL iii. Internet Service Provider (ISP) o. Search engine: i. Definition ii. How it works? iii. List of top 10 search engines p. Internet telecom types i. Chat and instant messaging ii. Text messaging iii. Blog 5- E-commerce a. Evolution and tools b. E-shopping cart c. Cookies d. Types of e-commerce i. B2C ii. Dis-intermediation iii. B2B iv. C2C v. Mobile commerce vi. Cyber-mall vii. E-tailing 6- Internet telephony a. Introduction b. VoIP evolution c. VoIP service providers 7- Social networking a. Introduction b. Facebook c. Twitter d. Other social networking sites e. You tube Chapter VIII Data & file management, database and information security 1- File fundamentals a. What is a file? b. Types of files i. Software file ii. Data file c. Physical storage model d. Logical storage model 2- File management software a. Move/delete files b. File shredder 3- Database fundamentals a. What is a database b. Functions of Database Management System (DBMS) c. Database structure i. Field ii. Record iii. Table or relation d. Keys i. Primary key ii. Secondary key e. Database relations i. One to one ii. One to many iii. Many to many f. Data warehouse and data-mart g. Database operations i. Normalization ii. Selection iii. Joining tables iv. Querying database (SQL) v. Query by objectives h. Designing user interface i. Object Oriented Database (OODB) j. Management approach File/database i. File approach ii. Database approach Malware and computer security 1- Why Information system is always under attack? 2- Origin of the threat 3- Piracy and plagiarism 4- Authentication a. Password b. Badge o ID c. Biometrics 5- Interior threat 6- War driving 7- Hacking and hackers a. Black hat 89- 10111213- 1415- b. White hat c. Grey hat Hacking conventions and conferences. Malware: Malicious software a. Virus b. Worm c. Trojan horse Anti-virus software Anti-spyware Internet fraud Other faces of malware a. Phishing b. Spam c. Hoax d. Spyware e. Zombie f. Botnet How to defend yourself? System back-up a. Necessity of back-up policy b. Back-up frequency c. RAID technology