Computer MBA
Computer MBA
Computer MBA
MANAGEMENT
UNIT-1
Introduction to Computer Concepts – Elements of computer –
Characteristics of a Computer – Classification of Computers – Basic
Computer Architecture – Input-output Devices
UNIT-2
Software Concepts: Types of software – Software: its nature and qualities –
Windows Operating System Functions
UNIT-3
MS Office- Applications of MS Word in Business Correspondence: letters,
tables, mail merge, labels Applications of MS Excel: Graphs and Charts –
Calculation of various financial functions - MS Access: Tables and Queries
UNIT-4
MS Power Point: Introduction – Toolbar, their Icons and Commands –
Navigating in Power point - Creation of slides, animation, and templates -
Designing Presentations – Slide show controls – Making notes on Pages and
Handouts – Printing Presentations – Customizing Presentations - Auto
content Wizard
UNIT-5
Computer Networks: Overview of a Network – Communication processors
– Communications Media – Types of Networks – Network Topologies-
Network protocols – Network Architecture.
1
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
UNIT-1
1.Computer Concepts - Introduction to Computer?
ANS). In today's world, we use computers for all our tasks. Our day-to-day
activities: paying bills, buying groceries, using social media, seeking
entertainment, working from home, communicating with a friend, etc., can all be
done using a computer.
What is computer
A computer is an electronic device that accepts data from the user, processes it,
produces results, displays them to the users, and stores the results for future
usage.
Data is a collection of unorganized facts & figures and does not provide any
further information regarding patterns, context, etc. Hence data means
"unstructured facts and figures".
Information is a structured data i.e., organized meaningful and processed data.
To process the data and convert into information, a computer is used.
Functions of Computers
A computer performs the following
Receiving Input: Data is fed into computer through various input devices like
keyboard, mouse, digital pens, etc. Input can also be fed through devices like
CD-ROM, pen drive, scanner, etc.
Processing the information: Operations on the input data are carried out based
on the instructions provided in the programs.
Storing the information: After processing, the information gets stored in the
primary or secondary storage area.
Producing output: The processed information and other details are
communicated to the outside world through output devices like monitor, printer,
etc.
2
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Ans) Speed: A computer works with much higher speed and accuracy compared
to humans while performing mathematical calculations. Computers can process
millions (1,000,000) of instructions per second. The time taken by computers for
their operations is microseconds and nanoseconds.
Accuracy: Computers perform calculations with 100% accuracy. Errors may
occur due to data inconsistency or inaccuracy.
Diligence: A computer can perform millions of tasks or calculations with the
same consistency and accuracy. It doesn’t feel any fatigue or lack of
concentration. Its memory also makes it superior to that of human beings
Versatility: Versatility refers to the capability of a computer to perform different
kinds of works with same accuracy and efficiency.
Reliability: They are reliable machines, because of the reliability of many
organizations, institutions, companies rely on them hugely.
They can store huge amounts of data and can be recalled or retrieve quickly at
any time or any place as the user demands.
Automation: They can perform Automatically when assigned a task or
operation say you have started a download of movies the computer will
download the entire movie in spite the user is present or not without any
interruption unless there are network errors or connectivity issues.
They can perform huge numerical and logical calculations when given proper
instruction automatically.
3
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Even pilots can hand over the controls to a computer as they can fly huge
aircraft which are called AUTO-PILOT Mode.
Memory:
This is also one of the most essential characteristics of computers these days
they can store or save almost any volume of data due to their high storage
capabilities.
Once the data or instruction is saved to the computer memory it remains in the
memory, until and unless someone deletes, users can recall or retrieve the data
anytime, at any location they require.
4
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
1. Analog Computer
An analog computer performs tasks using continuous data (the physical amount
that changes continuously). Analog computers are used primarily to measure
physical units like the voltage, pressure, electric current, temperature, and
convert them into digits.
It is also used to measure and perform arithmetic calculations of numbers, the
length of an object, or the amount of voltage that passes through a point in an
electrical circuit. Analog computers obtain all their data from some
measurement way.
They are used in the fields of technology, science, research, engineering, etc.
Because quantities like voltage, pressure, electric current, temperature are
used more in these areas, these types of computers give only approximate
estimates
2. Digital Computer
As its name suggests, a digital computer represents the digital computer’s letters,
numerical values, or any other special symbols. This computer is the computer
that calculates the number for processing the data. They run on electronic signs,
and the binary numeral method Binary System 0 or 1 is used for calculation.
Their speed is fast.
It can perform arithmetic operations such as addition, occurrence, subtraction,
multiplication, or division and all types of logical(mathematical)
operations. Today, most of the computers available in the market are digital
computers.
Examples of Digital Computers
Personal Desktop Computers,
Calculators,
Laptops, Smartphones, and Tablets,
Chromebooks,
Digital watch,
Accounting machines,
Workstations,
5
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
3. Hybrid Computer
A hybrid computer is a combined complex computer unit built using both analog
and digital properties and united by a single control system. The purpose of
designing hybrid computers is to provide functions and features that can be
found on both analog and digital devices.
The aim behind creating a hybrid computer is to create a kind of work unit that
offers the best of both types of computers. Hybrid computers are extremely fast
when driving equations, even when those calculations are incredibly complex.
As both the properties of a computer consist in the form of a single hybrid
computer made possible to solve too complex calculations or problems, at the
same time, these devices are not only too expensive but also able to solve
complex issues a bit fatly.
Examples:
Auto Gasoline pump is the example of a hybrid computer, this device is
installed on a petrol pump do not only to measure the amount of petrol but also
to calculates its value, in this way It is capable of both functions i.e. hybrid
function.
Classification of Computers
1. Supercomputer
A Supercomputer is the very fastest and powerful, and expensive type of
computer for processing data. Supercomputers’ size and storage capacity are
also huge (can occupy huge premises) designed to process vast amounts of data
in a short time with high productivity.
The uses of supercomputers
In research and study of energy and nuclear weapons and designing the
aircraft, airplanes, and flight simulators.
Climate research and Weather Forecasting and Prediction of Natural
Disasters.
Spaceship and Satellite Launching.
6
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
7
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
8
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
4.Describe various input devices with neat diagrams and mention its
working principle? OR Computer System Architecture VVIMP
ANS) The electromagnetic devices that accept data or a set of instructions from
the outside world and then translate that data into machine-readable and
understandable form are known as input devices. Computer input devices serve
as an interface between the outside world and the computer for proper
communication.
Different Input Devices
1. Keyboard: For entering data into a computer, the keyboard is the most
common and commonly used input device. It contains various keys for entering
letters, numbers, characters. Although there are some additional keys for
completing various activities, the keyboard layout is identical to that of a
standard typewriter. It is generally available in two different sizes: 84 keys or
101/102 keys and for Windows and the Internet, it is also available with 104
keys or 108 keys. It is connected to a computer system with the help of a USB or
a Bluetooth device.
The keys on the keyboard are:
Numeric Keys: These keys are used to enter numeric data and move the
cursor. It is typically made up of 17 keys.
Keyboard Shortcuts: These keys include the letter keys (A-Z) and the
number keys (09).
Control Keys: The pointer and the screen are controlled by these keys. It
comes with four directional arrow keys. Control keys include Home, End,
Insert, Alternate (Alt), Delete, Control (Ctrl), and Escape.
Special Keys: Enter, Shift, Caps Lock, Numb Lk, Tab, and Print Screen
are some of the special function keys on the keyboard.
Function Keys: The 12 keys from F1 to F12 are on the topmost row of the
keyboard.
Type of keyboard:
Generally, the keyboard is of three types:
QWERTY Keyboard
AZERTY Keyboard
9
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
DVORAK Keyboard
Characteristics of Keyboard:
The main keyboard, cursor keys, numeric keypad, and function keys are
the four primary components of a keyboard.
Keyboards are more affordable.
2.Mouse: The mouse is the most used pointing device. While clicking and
dragging, the mouse moves a little cursor across the screen. If you let off of the
mouse, the cursor will come to a halt. You must move the mouse for the
computer to move; it will not move on its own. As a result, it’s a device that
accepts input. Or we can say that a mouse is an input device that allows you to
control the coordinates and movement of the on-screen cursor/pointer by
moving the mouse on a flat surface. The left mouse button can be used to pick or
move items, while the right mouse button displays additional menus when
clicked. It was invented in 1963 by Douglas C. Engelbart.
Types of mouse:
Generally, the mouse is of four types:
Trackball Mouse
Mechanical Mouse
Optical Mouse
Wireless Mouse
10
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
4. Light Pen: A light pen is a pointing device that has the appearance of a pen.
It can be used to draw on the monitor screen or to
pick a menu item. In a small tube, a photocell and
an optical system are housed. The photocell
sensor element determines the screen location and
sends a signal to the CPU when the tip of a light
pen is moved across a monitor screen while the
pen button is pressed.
11
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
12
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Toolbar: A toolbar is part of a window, often a bar across the top, that
contains buttons that execute commands when you click them. Many
applications contain toolbars that you can customize so the commands you use
frequently are readily available and easily identifiable. Many dialog boxes also
contain toolbars.
13
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
control bar: Control bars are windows that display rows of controls with which
users can select options, execute commands, or obtain program information.
Types of control bars include toolbars, dialog bars, and status bars. Toolbars, in
class CToolBar.
Scandisk: Scandisk is a Windows utility used to check your hard disk for errors
and to correct problems that are found. These errors often occur when Windows
locks up and must be restarted.
To run Scandisk in Windows 95 and NT, click the Start button, select Programs,
then Accessories, then System Tools, and then Scandisk. It is recommended that
you run Scandisk at least once per month. In OSR2 (a later release of Windows
95) and in Windows 98, Scandisk is initiated for you automatically following
system restarts in which shutdown was not complete.
14
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
UNIT-2
What is operating system? and explain the major functions of
operating system. Windows Operating System Functions
ANS) An Operating system forms the core of any computer device. The
functioning and processing of a computer system can come to hold without an
operating system.
What is an Operating System
An Operating System is the interface between the computer hardware and the
end-user. Processing of data, running applications, file management and
handling the memory is all managed by the computer OS. Windows, Mac,
Android etc. Are examples of Operating systems which are generally used
nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc.
comprise an Operating System which helps in the smooth working of the device.
History of the Operating System
It took years to evolve the Operating Systems and make them as modernised and
advanced as they are today. Given below are the details about the evolution and
history of Operating systems.
Initially, the computers made did not have an Operating system and to run
each program a different code was used. This had made the processing of
data more complex and time taking
In 1956, the first operating systems were developed by General Motors to
run a single IBM computer
It was in the 1960s that IBM had started installing OS in the devices they
launched
The first version of the UNIX operating system was launched in the 1960s
and was written in the programming language C
Later on, Microsoft came up with their OS on the request of IBM
Today, all major computer devices have an operating system, each
performing the same functions but with slightly different features
15
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
16
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
17
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
18
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Deployment of product
Product Maintenance and Operations
1. General analysis and requirements gathering:
In software development, requirements for the products to be designed are
sourced in this step. For most projects, this step happens to be the primary focus.
Project managers and interested stakeholders gather around to meet and put
together the requirements. Questions such as “Who gets to use the product?
Utilization of the product, what kind of data goes into the product? And what
kind of data is returned by the product as output?” are all answered in this step.
2. Product Design:
During this step, the creation of the product design from the requirement’s
documentation ensues. Product design assists in the specification of the
necessary hardware required to run the product, in other words, the deployment.
It also helps in clearly marking out the general product architecture, depicting
the software modules required to be developed and their relationships.
It is also time to make a choice of development platform, e.g. .NET, Java,
Laravel, Ruby on Rails, or FileMaker. This choice depends on the requirements
themselves, but also on which platform is commonly used within the company.
3. Coding:
After the phase of product design, the development team moves on to the stage
of coding and implementation. Once the development team has the requirement
specification and the design documents in hand, the software developers can
start programming. Besides coding, the developers also perform unit or module
testing in this phase, as to detect potential problems as early as possible in the
development phase.
Some companies prefer to outsource the coding activities, and many times also
the previous step of Product Design, to a third-party software application
development company.
4. Testing:
After the step of coding and implementation, the team can then proceed to
integration and validation testing. Software development service teams are in the
constant software process of releasing different software applications for various
19
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
20
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
UNIT-3
21
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
entered the processing may become slow or may not give the correct
answer. The appearance of the table may look similar to the one formed in
Excel with column heading and titles
Queries: Once a table is created and the user or programmer is looking
for a calculated output, then it is called queries. This may include
filtering, calculating, sorting, updating, etc.
Relationships: As the name suggests, when more than one table is added,
the relation or connection between them can be achieved. There three
ways in which the connection between the tables can be determined:
1.
1.
1. One to one
2. One to Many
3. Many to Many
Macros: The tool using which predefined actions which can automate
tasks on an Access report is called macros. Multiple tasks can be assigned
and they will function whenever the macros option is selected on a report
Forms: A user interface for a database application can be created using
forms. Forms can further be divided into two: bound and unbound forms
Report: Once all the information is entered into the database, it can be
reviewed or analysed using a report. A report can then be customised or
modified as per the user’s requirement
Module: This allows a set of pre-defined instructions to be created by a
programmer in the database. They can be used throughout the database
financial functions:
22
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
24
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
25
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
3.Write about text processing tools and header and footer in MS word2019?
ANS) In Microsoft Word, Headers and Footers are used to insert additional
information such as title, file name, date, page numbers, etc. The presence of
both header and footer in the Word document makes your document more
professional and easier to read as well as understand.
Headers appear at the top margin of the Word document,
while Footers appear at the bottom margin of the Word document.
To insert a header and footer in Microsoft Word
follow the below given basic steps –
Step 1: Open the new or an existing Word document in which you want to insert
header and footer
Step 2: Go to the Insert tab at the top of the Ribbon.
26
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Step 3: Click on either header or footer drop-down menu in the Header &
Footer section.
Step 4: A Header or Footer drop-down menu will display on the screen with a
list of built-in Header or Footer options. Select your desired option from the
Built-in list.
Step 5: A Design tab with Header & Footer option will appear at the top of the
document (on the Ribbon), as shown in the below screenshot.
Step 6: Type your desired information into the header or footer section.
Step 7: Once you type your desired text in the Header section, click on Close
Header and Footer under the Design section on the Ribbon or press the Esc key
27
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
from the keyboard to remove the dotted underline. Now, you can see that the
Header is inserted to the Word document.
2. A Date and Time dialog box will appear on the screen in which do the
following -
o Select Date format from the Available format.
o Select your desired language.
o Tick on the Update automatically checkbox.
o Click on the OK button at the bottom of the dialog box.
28
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
29
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
30
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
31
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
5. Fill in all the contact data, one per row, starting in cell A2.
6. When you’re finished creating your contact sheet, save it by clicking on File –
Save As.
Make sure you’ve made all the necessary edits to your Excel Spreadsheet before
you start the mail merge process.
Step Two: Create the Document in Microsoft Word
1. Open a new Word document, which will be the main document that will be
sent to each recipient in your mail merge.
2. Click on the Mailings tab and click Start Mail Merge.
3. In the drop-down menu, you’ll see all the different mail merge documents
available to you.
4. Select the appropriate one (in this case, a Letter mail merge)
32
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
3. A pop-up box will appear, then select the Excel sheet you’ve created, and
click Open.
4. In the window named Select Table, choose the Excel worksheet you want to
use, and click OK.
5. In the window named Mail Merge Recipients, uncheck the checkbox of the
recipients you don’t want in your mailing list.
33
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
2. Choose an address block format in the window that appears and click OK.
3. Now an address placeholder («AddressBlock») will automatically appear in
your letter.
34
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
35
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
The Microsoft Office suite is one of the most popular office solutions. From
Word and Excel to PowerPoint – the practical applications for writing,
calculating, and presenting have been proving their worth for years. But many
users are not even aware of the range of features that they provide. For instance,
MS Office programs include a function that allows you to create, save, and
execute macros in order to automate certain tasks and processes. Especially
for regularly recurring workflows, this feature lets you save valuable time and
effort.
But what role do macros play in Word and how do these command sequences
work exactly? Also find out how to create macros in Word and integrate them
into your documents.
What is a Word macro?
Macros are considered a standard feature in programming as well as the use of
computer programs.
They are basically subprograms that developers and users can create to
save sequences of commands or operating instructions, which can then be
started with a simple action. When faced with many regularly recurring tasks,
Microsoft Word is typically an application that benefits from the option to
automate work steps.
For this reason, the Editor (as well as Access, Excel or PowerPoint, for example)
include an integrated tool for recording and executing custom Word macros.
The script language Visual Basic for Applications (VBA), likewise developed by
Microsoft, serves as the recording language here.
36
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
You can automate frequently used tasks by creating and running macros.
(For e.g., you have numerous paragraph and want some of them to be of same
colour, select them and apply the shortcut)
Macro is uses and Features for following purposes:
To speed up routine editing and formatting
To combine multiple commands — for example, to insert a table with a
specific size and borders, and with a specific number of rows and columns
To make an option in a dialog box more accessible
To automate a complex series of tasks
. To use this macro in any new documents you make, be sure the Store
macro inbox says All Documents (Normal.dotm).
37
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
38
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
UNIT-4
1.Describe the following operation in power point presentation?
(OR)
Write about various slide show controls?
(OR)
Explain Creation of slides, animation, and templates - Designing
Presentations?
ANS) Microsoft PowerPoint:
PowerPoint (PPT) is a powerful, easy-to-use presentation graphics
software program that allows you to create professional-looking electronic
slide shows.
The image given below shows the main page of MS PowerPoint, where a person
lands when the program is opened on a computer system
Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can
customise and optimise a presentation. The same have been discussed
below.
Slide Layout
39
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Multiple options and layouts are available based on which a presentation can be
created. This option is available under the “Home” section and one can select
from the multiple layout options provided.
Slide Design
MS PowerPoint has various themes using which background colour and designs
or textures can be added to a slide. This makes the presentation more colourful
and attracts the attention of the people looking at it.
This feature can be added using the “Design” category mentioned on the
homepage of MS PowerPoint. Although there are existing design templates
available, in case someone wants to add some new texture or colour, the option
to customise the design is also available. Apart from this, slide designs can also
be downloaded online.
40
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Animations
During the slide show, the slides appear on the screen one after the other. In
case, one wants to add some animations to the way in which a slide presents
itself, they can refer to the “Animations” category.
41
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
42
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
3. In the New Slide dialog box, select the layout that you want for your new
slide. Learn more about slide layouts.
4. Select Add Slide.
43
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
44
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
45
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
UNIT-5
1.Explain various communication media in computer Networking? VVIMP
ANS) The communication system is a system which describes the information
exchange between two points. The process of transmission and reception of
information is called communication. The major elements of communication are
the Transmitter of information, Channel or medium of communication and
the Receiver of information.
types Of Communication Systems
Depending on Signal specification or technology, the communication system is
classified as follows:
(1) Analog
Analog technology communicates data as electronic signals of varying
frequency or amplitude. Broadcast and telephone transmission are common
examples of Analog technology.
(2) Digital
In digital technology, the data are generated and processed in two states: High
(represented as 1) and Low (represented as 0). Digital technology stores and
transmits data in the form of 1s and 0s.
Depending on the communication channel, the communication system is
categorized as follows:
Analog
46
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
47
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
48
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
49
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
and software with switch and router features. Network topologies are often
represented as a graph.
Network topologies describe the arrangement of networks and the relative
location of traffic flows. Administrators can use network topology diagrams to
determine the best placements for each node and the optimal path for traffic
flow. With a well-defined and planned-out network topology, an organization
can more easily locate faults and fix issues, improving its data transfer
efficiency.
Why is network topology important?
Network topology plays a major role in how a network functions. Namely, the
topology has a direct effect on network functionality. Choosing the right
topology can help increase performance, as a properly chosen and maintained
network topology increases energy efficiency and data transfer rates.
Types of topology:
There are 5 popular types of topology,
Bus Topology
50
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Ring Topology
Tree Topology
Star Topology
Mesh Topology
Bus Topology
In a bus topology, every computer is connected to a common bus. The bus is a
single cable that carries data from one computer to another. If one computer
wants to send data to another computer, it sends the data on the bus. All
computers on the bus can see the data, but only the intended recipient will
accept it.
Ring Topology
In a ring topology, every node is connected to two other nodes, forming a loop.
Data flows from one node to the next in a continuous sequence. Ring topologies
are often used in fibre optic networks, where data can be transmitted at high
speeds with minimal interference.
Tree Topology
In a tree topology, there is a central root node from which all other nodes branch
out. This type of topology is often used in bus topology networks. Tree topology
can be extended to an arbitrary depth, but it is usually only extended to two or
three levels for the sake of simplicity.
Star Topology
In a star topology, each device on the network is connected to a central hub. The
hub acts as a gateway, providing a single point of connection for all devices on
the network. Star topologies are commonly used in home and small office
networks.
Mesh Topology
In computer networking, mesh topology is a type of network topology in which
each node (computer or other devices) is connected to every other node in the
network. A mesh topology is often used in large, complex networks because it is
highly redundant and can accommodate a large number of nodes. If one node
fails, the others can still communicate with each other.
51
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
The design of any digital network architecture involves optimizing its building
blocks. These include:
Hardware
These are the equipment that forms the components of a network, such as
user devices (laptops, computers, mobile phones), routers, servers, and
gateways. So, in a way, the goal of any network architecture is to find the
most efficient way to get data from one hardware point to another.
Transmission Media
Transmission media refers to the physical connections between the
hardware devices on a network. Different media have various properties
that determine how fast data travels from one point to another.
They come in two forms: wired and wireless. Wired media involve physical
cables for connection. Examples include coaxial and fiber optic. Wireless media,
on the other hand, relies on microwave or radio signals. The most popular
examples are WiFi and cellular.
Protocols
Protocols are the rules and models that govern how data transfers
between devices in a network. It’s also the common language that
allows different machines in a network to communicate with each
other. Without protocols, your iPhone couldn’t access a web page
stored on a Linux server.
There are many network protocols, depending on the nature of the data.
Examples include the Transmission Control Protocol / Internet Protocol
(TCP/IP) used by networks to connect to the Internet, the Ethernet protocol for
connecting one computer to another, and the File Transfer Protocol for sending
and receiving files to and from a server.
Topology
How the network is wired together is just as important as its parts.
Optimizing this is the goal of network topology.
Topology is the structure of the network. This is important because factors like
distance between network devices will affect how fast data can reach its
destination, impacting performance. There are various network topologies, each
with strengths and weaknesses.
53
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
A star topology, for example, describes a layout where all devices in the network
are connected to a central hub. The advantage of this layout is that it’s easy to
connect devices to the network. However, if the central hub fails, the whole
network goes down.
On the other hand, a bus topology is where all network devices are connected to
a single pathway, called the bus. The bus acts like a highway that carries data
from one part of the network to the other. While cheap and easy to implement,
its performance tends to slow down as more devices are added to the network.
5M
1.Internet protocol Address?
ANS) IP address definition
An Internet Protocol address is referred to as an IP address. An IP address is
assigned to each instance connected to any computer communication network
using TCP/IP communication protocols.
A Dynamic Host Configuration Protocol (DHCP) server assigns IP addresses
when network nodes connect to the network. The pool of available addresses
that are part of the overall addressing system uses DHCP to issue IP addresses.
The designation also knows it of individual connections in the current network
according to their logical addresses. An IP address allows us to understand and
regulate how different devices communicate with each other over the Internet. It
also describes the characteristic features of different Internet routers.
There are two types of IP addresses:
Classful IP addressing, a dated method that divides IP address pools into
the following five groups: A, B, C, D, and E.
In classless IP addressing, prefixes can be of any length.
The standard representation of an IP address is a 32-bit unsigned binary value. It
is displayed using dotted decimal notation. For example, a legitimate IP address
is “192.165.20.40
54
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Proofreading:
Proofreading is the ultimate stage of the writing process after completion of
revisions and editing, before proofreading one must complete all the details
about the writing and there are several stages of editing that the editor needs to
follow before proofreading. Proofreading is the step where the corrections of the
writings are done; the corrections include typographical errors, punctuation,
grammar, spelling, repeated words, omitted words, formatting, and spacing. In
other words, proofreading is the stage for reviewing and writing errors.
3.What is an auxiliary memory?
ANS) Auxiliary memory units are among computer peripheral equipment. They
trade slower access rates for greater storage capacity and data stability. Auxiliary
memory holds programs and data for future use, and, because it is nonvolatile
(like ROM), it is used to store inactive programs and to archive data. Early
forms of auxiliary storage included punched paper tape, punched cards, and
magnetic drums. Since the 1980s, the most common forms of auxiliary storage
have been magnetic disks, magnetic tapes, and optical discs.
Magnetic Disks
Magnetic materials are widely used to store computer data, audio and video
tapes. Commonly used devices that use magnetic storage include magnetic tape,
floppy disks and hard-disks.
4.Output devices?
55
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
ANS) A computer’s output device refers to any hardware that sends data from a
computer to another user or device. In short, the output devices of the
computer give out the result of the entered input. We can also understand the
output devices of the computers in such a way that the output devices are the
devices that receive the data from the computer and then transform the data into
a user-friendly form and send the converted data to the user so that they can see
what the output given by the computer
Output Devices vs Input Devices:
There are many differences between output and input devices. These can be
attributed to the functions and mode of handling. Some of the most critical
points of difference are as follows –
Output Devices vs Input Devices:
There are many differences between output and input devices. These can be
attributed to the functions and mode of handling. Some of the most critical
points of difference are as follows –
Parameters of
Comparison Output Devices Input Devices
Data Accep tion Output devices accept the data Input devices get the data
from the computer and give from users and send it to the
out the results of the entered computer.
input to the users.
Control Controlled by the computers. Controlled by the users.
Transformation Transforms the machine- Transforms the user-friendly
friendly outputs into user- input to computer-friendly
friendly information. input.
Output Monitors, printers, speakers, Mouse, scanner, keyboard,
Devices and headphones, projector, plotter, stylus, joystick, mic, trackball,
Input Devices and GPS. etc.
56
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
ANS) Application software is the set of instructions that perform some specific
tasks according to the requirements of the end-users rather than the basic
functions. System software is the set of instructions that are directly related to
the working of computer hardware, performing basic functions to provide the
platform for the application software to run on. Let us study how software is
used in receiving and interpreting user commands.
History of software
The 1940s – The world’s first software was invented by Tom Kilburn in England
The 1970s – Apple’s first personal computer with consumer software was
launched
The 1980s – IBM Personal computers were developed
The 2000s – Apple’s very first iPhone was launched
Present – Software is continuously being developed, including AI and IoT.
In the beginning, software was written for particular computers and sold with
the hardware the software ran on. Floppy disks, and later CDs and DVDs,
became the primary delivery methods for software in the 1980s. Nowadays,
almost all software is purchased and directly downloaded from the internet.
Applications can be purchased from the vendor’s website or an application
service provider’s website.
6.Explain MAN in network?
ANS) Metropolitan Area Network (MAN) is a personal data network used by one
company in many buildings or by multiple companies in the same locality that
connect citizens with various Organisations.
. It’s bigger than a LAN in one building but not big enough to be called a wide
area network. The length varies between 5 and 10 kilometres. A campus network
is also a cluster of buildings on a single contiguous piece of ground.
For elevated communication between MAN and the open network, a MAN can
connect to a web exchange point and use a Local Exchange Carrier to connect
LANs. This can link to other vendors via a peer exchange or cloud vendors via
Amazon Web Services Direct Connect.
57
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
Network The LAN is private. The MAN can be The WAN can also
Ownership Hospitals, homes, both private or be both private or
schools, offices, etc., public. Many public.
may own it. organizations and
telecom operators
may own them.
58
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
THE END
59
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA
NOTE: All answers have been updated Most of the questions are explained
with diagrams, these diagrams are not required to be included in the exam,
just for your understanding
© ...Copyright disclaimer under Section 107 of the Copyright Act This disclaimer appears on
content “examtree.in”. that uses someone else’s copyrighted content. Including this statement of
“fair use” helps protect against copyright infringement claims.
THANK YOU
D.NAGENDRA REDDY
Examtree.in
Let's learn together on Unacademy. Get a Plus subscription using my referral code
PLUSXA25B and get 10%-20 off!
60
NAGENDRA REDDY DWARAMPUDI