Modern business computer

Dr.NazihAbdallah

Table of contents

To display a chapter or topic please click its hyperlink below

Author statement: About the book and the author

Chapter I:Business fundamentals

1-What is business?

2-Business classification

3-Business ownership categories

4-Business creation priorities

5-Business organization and organizational charts

6-The vertical or hierarchical model

7-The horizontal model

8-The Matrix model

9-Business cycle

10-Computer impact

11-Impact of computer networking

12-Modern business

13-Business IT

14-Importance of business information system

15-Business classification

16-Annex A: SIC (Standard Industrial Classification

17-Annex B: NAICS (North American Industry Classification System)

Chapter IIInformation fundamentals

1-Quotes about information

2-Definition of information

3-Quality of information

4-Digital information

  1. Important numeration systems
  2. Mayan
  3. Roman
  4. Arabic or Decimal
  5. Binary
  6. Hexadecimal
  7. Data and information
  8. Levels of information

5-Other types of information:

  1. Conventional information
  2. Coded information

6-Data representation

  1. ASCII and EBCDIC
  2. Unicode

7-Data digitization (binary representation of data)

  1. Digitizing text
  2. Digitizing picture
  3. Resolution
  4. Digitizing sounds and audio files
  5. Digitizing video files
  6. CODEC (Coder-Decoder)

8-Business and information

9-Modern business and information needs

  1. Introduction
  2. Information and business activities
  3. Information technology (IT)
  4. Human resources
  5. Financial department
  6. Material department
  7. Production department
  8. Transportation department

Chapter IIIUnderstanding computer hardware

1-Computer evolution

2-Digital electronic device / computer

3-Computer hardware

4-Computer input

5-Input technology

  1. Keyboard
  2. Pointing technology
  3. Motion detection
  4. Touch detection
  5. Gaming technology
  6. Multimedia input technology
  7. Picture input
  8. Video input
  9. Audio input
  10. Bare voice input
  11. Medical input technology
  12. MRI input
  13. CT input
  14. Network and Internet input
  15. Internal input

6-Computer processing

  1. Computer processor
  2. Computer clock
  3. Computer speed
  4. Machine cycle
  5. Word size

7-Processor speed technology

  1. Pipelining technology
  2. Co-processing technology
  3. Parallel processing technology
  4. Multicore technology
  5. Computer instruction set

8-Computer output

  1. Printed output
  2. Audio output
  3. Video output
  4. Display technology
  5. CRT (Cathode Ray Tube)
  6. LCD (Liquid Crystal Display)
  7. Gas plasma display
  8. LED (Light Emitting Diode)
  9. Display resolution
  10. Spoken words output

9-Storage

  1. Temporary storage
  2. RAM
  3. Cache
  4. Internal permanent storage
  5. ROM
  6. CMOS
  7. Virtual memory (VRAM)
  8. Permanent mass storage
  9. Magnetic technology
  10. Optical technology
  11. Solid state technology
  12. Future storage technologies

Chapter IV: Computer software

1-Introduction

2-System software

  1. Operating system legacy
  2. Important operating systems
  3. Operational role of OS
  4. Utility software
  5. Introduction
  6. Disk care utility
  7. File management utility
  8. Compilers
  9. Computer security software (anti-virus, back-up, crypto, etc…)
  10. Other maintenance utilities
  11. Why utilities are not part of the OS?
  12. Device drivers
  13. What is a driver?
  14. What devices need drivers?

3-Application software

  1. Productivity software
  2. Word processing
  3. MS word 2010
  4. MS Word 2013
  5. Spreadsheet software
  6. EXCEL 2013
  7. Other spreadsheet software
  8. Presentation graphics software
  9. General information
  10. MS Power point 2013
  11. Other presentation software
  12. Database software
  13. MS Access 2013
  14. Other database software
  15. Management software
  16. Statistical software
  17. Web authoring software
  18. and games software
  19. Educational software
  20. Design software
  21. Cloud computing

4-Software market

  1. Horizontal market software
  2. Vertical market software

5-Programming languages

  1. Language generations and levels
  2. Programming technology
  3. Procedural
  4. Object oriented programming
  5. Future languages

6-Program conversion

  1. General
  2. Assembler
  3. Compiler
  4. Interpreter

7-Software licensing

  1. Introduction
  2. Types of licenses

Chapter VFundamentals of telecommunications

1-Introduction

2-Electricity and electronics

3-Telegraphy

  1. Introduction
  2. Morse and telegraphy evolution

4-Telephony

  1. Introduction
  2. How it works?
  3. Telephony evolution
  4. Pros and cons of the telephone

5-Wired telecommunications

  1. Twisted pair cables
  2. Co-axial cable
  3. Fiber optic cable
  4. How fiber optic technology works?
  5. T 1 line
  6. T 3 line

6-Wireless telecommunications

  1. Introduction
  2. Signal characteristics
  3. Frequency distribution table
  4. Signal propagation
  5. Types of antennas
  6. Wireless- Line of sight
  7. Relays and coverage
  8. Tower and relays
  9. Satellites as relays
  10. Other roles of the relay

7-Topology of radio communication

  1. Simplex
  2. Half-duplex (HDX)
  3. Full duplex (FDX)

8-Global Positioning System (GPS)

  1. GPS technology
  2. GPS evolution
  3. Other GPS systems
  4. Russian GLONASS
  5. Chinese BEIDOU
  6. European Galileo
  7. How GPS works?
  8. Areas of GPS use

9-Cellphone technology

  1. Fundamentals
  2. Operational data
  3. Link with ground phone network
  4. Operational technologies
  5. Code Division multiple Access (CDMA)
  6. GSM/TDMA (Global System for Mobile communications/

Time Division Multiple Access).

  1. How the technologies compare?

10-RADAR (Radio Detection And Ranging)

  1. Principle
  2. RADAR components
  3. RADAR applications

11-LASER (Light Amplification by Simulated Emission of Radiation)

  1. Principle
  2. Development
  3. Topology of LASER
  4. Crystal LASER
  5. Gas LASER
  6. Semi-conductor LASER
  7. Business apps of LASER

12-Infrared transmission

13-Light trip from select space locations to planet Earth.

Chapter VINetworking and Internet

1-Introduction: What is networking?

2-Networking applications

3-Computer networks

4-Classification by size

5-Network physical topology

  1. Star network
  2. Bus network
  3. Ring network
  4. Mesh network
  5. Peer to peer network
  6. Tree network

6-Network protocol (Logical topology)

  1. Handshaking process
  2. Ethernet protocol
  3. Token ring protocol

7-Wireless networking

  1. WLAN
  2. WI-FI
  3. WI-MAX

8-Blue tooth networking

  1. General knowledge
  2. Characteristics of Blue tooth network
  3. Blue tooth protocol
  4. Samples of Blue tooth apps

The internet

1-Internetworking

2-Connecting networks

3-Packet switching/circuit switching

4-Evolution of the Internet

5-Internet protocol: TCP/IP

  1. TCP (Transmission Control Protocol)
  2. IP (Internet protocol)

6-Internet backbone

7-routers

8-Internet operations

  1. Nobody own the Internet
  2. Internet access
  3. Internet access methods
  4. Dial-up connection
  5. DSL
  6. Cable TV
  7. Satellite access

9-Important business special networks

  1. VIRTUAL Private Network (VPN)
  2. Intranet
  3. Extranet
  4. Value-added Network (VAN)

Chapter VIIInternet Services

1-Introduction

2-E-mail

  1. Introduction
  2. Early email systems
  3. Modern E-mail evolution
  4. Modern email technology
  5. Email protocol
  6. Email important features
  7. How MIME works?
  8. Mailing lists or distribution lists
  9. Email Service provider

3-Large webmail services:

  1. Hot mail
  2. Yahoo
  3. Gmail

4-World Wide Web (WWW)

  1. Evolution
  2. Website, Web page
  3. Hyperlink
  4. Web protocol Hyper-Text Transfer Protocol (HTTP)
  5. URL
  6. Web browser
  7. Plug-in
  8. Media Player
  9. Web server
  10. Web authoring languages
  11. Hyper Text Mark-up Language (HTML)
  12. Extensible Mark-up language (XML)
  13. Wireless mark-up language (WML)
  14. Web authoring software
  15. Important WYSIYG software
  16. Web authoring services (Web templates)
  17. Web addressing
  18. IP address
  19. URL
  20. Internet Service Provider (ISP)
  21. Search engine:
  22. Definition
  23. How it works?
  24. List of top 10 search engines
  25. Internet telecom types
  26. Chat and instant messaging
  27. Text messaging
  28. Blog

5-E-commerce

  1. Evolution and tools
  2. E-shopping cart
  3. Cookies
  4. Types of e-commerce
  5. B2C
  6. Dis-intermediation
  7. B2B
  8. C2C
  9. Mobile commerce
  10. Cyber-mall
  11. E-tailing

6-Internet telephony

  1. Introduction
  2. VoIP evolution
  3. VoIP service providers

7-Social networking

  1. Introduction
  2. Facebook
  3. Twitter
  4. Other social networking sites
  5. You tube

Chapter VIIIData & file management, database and information security

1-File fundamentals

  1. What is a file?
  2. Types of files
  3. Software file
  4. Data file
  5. Physical storage model
  6. Logical storage model

2-File management software

  1. Move/delete files
  2. File shredder

3-Database fundamentals

  1. What is a database
  2. Functions of Database Management System (DBMS)
  3. Database structure
  4. Field
  5. Record
  6. Table or relation
  7. Keys
  8. Primary key
  9. Secondary key
  10. Database relations
  11. One to one
  12. One to many
  13. Many to many
  14. Data warehouse and data-mart
  15. Database operations
  16. Normalization
  17. Selection
  18. Joining tables
  19. Querying database (SQL)
  20. Query by objectives
  21. Designing user interface
  22. Object Oriented Database (OODB)
  23. Management approach File/database
  24. File approach
  25. Database approach

Malware and computer security

1-Why Information system is always under attack?

2-Origin of the threat

3-Piracy and plagiarism

4-Authentication

  1. Password
  2. Badge o ID
  3. Biometrics

5-Interior threat

6-War driving

7-Hacking and hackers

  1. Black hat
  2. White hat
  3. Grey hat

8-Hacking conventions and conferences.

9-Malware: Malicious software

  1. Virus
  2. Worm
  3. Trojan horse

10-Anti-virus software

11-Anti-spyware

12-Internet fraud

13-Other faces of malware

  1. Phishing
  2. Spam
  3. Hoax
  4. Spyware
  5. Zombie
  6. Botnet

14-How to defend yourself?

15-System back-up

  1. Necessity of back-up policy
  2. Back-up frequency
  3. RAID technology