[go: up one dir, main page]

0% found this document useful (0 votes)
36 views61 pages

Computer MBA

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 61

COMPUTER APPLICATIONS IN

MANAGEMENT

Nagendra Reddy Dwarampudi


www.examtree.in
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-1
Introduction to Computer Concepts – Elements of computer –
Characteristics of a Computer – Classification of Computers – Basic
Computer Architecture – Input-output Devices
UNIT-2
Software Concepts: Types of software – Software: its nature and qualities –
Windows Operating System Functions
UNIT-3
MS Office- Applications of MS Word in Business Correspondence: letters,
tables, mail merge, labels Applications of MS Excel: Graphs and Charts –
Calculation of various financial functions - MS Access: Tables and Queries
UNIT-4
MS Power Point: Introduction – Toolbar, their Icons and Commands –
Navigating in Power point - Creation of slides, animation, and templates -
Designing Presentations – Slide show controls – Making notes on Pages and
Handouts – Printing Presentations – Customizing Presentations - Auto
content Wizard
UNIT-5
Computer Networks: Overview of a Network – Communication processors
– Communications Media – Types of Networks – Network Topologies-
Network protocols – Network Architecture.

Let's learn together on Unacademy. Get a Plus subscription using


my referral code PLUSXA25B and get 10%-20 off !

1
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-1
1.Computer Concepts - Introduction to Computer?
ANS). In today's world, we use computers for all our tasks. Our day-to-day
activities: paying bills, buying groceries, using social media, seeking
entertainment, working from home, communicating with a friend, etc., can all be
done using a computer.
What is computer
A computer is an electronic device that accepts data from the user, processes it,
produces results, displays them to the users, and stores the results for future
usage.
Data is a collection of unorganized facts & figures and does not provide any
further information regarding patterns, context, etc. Hence data means
"unstructured facts and figures".
Information is a structured data i.e., organized meaningful and processed data.
To process the data and convert into information, a computer is used.
Functions of Computers
A computer performs the following
Receiving Input: Data is fed into computer through various input devices like
keyboard, mouse, digital pens, etc. Input can also be fed through devices like
CD-ROM, pen drive, scanner, etc.
Processing the information: Operations on the input data are carried out based
on the instructions provided in the programs.
Storing the information: After processing, the information gets stored in the
primary or secondary storage area.
Producing output: The processed information and other details are
communicated to the outside world through output devices like monitor, printer,
etc.

2. Characteristics of Computer System?

2
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Ans) Speed: A computer works with much higher speed and accuracy compared
to humans while performing mathematical calculations. Computers can process
millions (1,000,000) of instructions per second. The time taken by computers for
their operations is microseconds and nanoseconds.
Accuracy: Computers perform calculations with 100% accuracy. Errors may
occur due to data inconsistency or inaccuracy.
Diligence: A computer can perform millions of tasks or calculations with the
same consistency and accuracy. It doesn’t feel any fatigue or lack of
concentration. Its memory also makes it superior to that of human beings
Versatility: Versatility refers to the capability of a computer to perform different
kinds of works with same accuracy and efficiency.
Reliability: They are reliable machines, because of the reliability of many
organizations, institutions, companies rely on them hugely.
They can store huge amounts of data and can be recalled or retrieve quickly at
any time or any place as the user demands.
Automation: They can perform Automatically when assigned a task or
operation say you have started a download of movies the computer will
download the entire movie in spite the user is present or not without any
interruption unless there are network errors or connectivity issues.
They can perform huge numerical and logical calculations when given proper
instruction automatically.

3
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Even pilots can hand over the controls to a computer as they can fly huge
aircraft which are called AUTO-PILOT Mode.
Memory:
This is also one of the most essential characteristics of computers these days
they can store or save almost any volume of data due to their high storage
capabilities.

Once the data or instruction is saved to the computer memory it remains in the
memory, until and unless someone deletes, users can recall or retrieve the data
anytime, at any location they require.

3. Explain broad classification of digital computers on the basis of their size


speed memory and use? VV IMP
ANS) There are different classes of computer technology available these days.
The functionality and data processing of each type of computer is different and
output results as well.
However, the methods or techniques, Size, capacity, characteristics, and data
handling of the data of each computer may be different too. Let’s Get to Know
the “What are the Classifications of Computers System “

classification of computers according to Purpose

4
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

1. Analog Computer
An analog computer performs tasks using continuous data (the physical amount
that changes continuously). Analog computers are used primarily to measure
physical units like the voltage, pressure, electric current, temperature, and
convert them into digits.
It is also used to measure and perform arithmetic calculations of numbers, the
length of an object, or the amount of voltage that passes through a point in an
electrical circuit. Analog computers obtain all their data from some
measurement way.
They are used in the fields of technology, science, research, engineering, etc.
Because quantities like voltage, pressure, electric current, temperature are
used more in these areas, these types of computers give only approximate
estimates
2. Digital Computer
As its name suggests, a digital computer represents the digital computer’s letters,
numerical values, or any other special symbols. This computer is the computer
that calculates the number for processing the data. They run on electronic signs,
and the binary numeral method Binary System 0 or 1 is used for calculation.
Their speed is fast.
It can perform arithmetic operations such as addition, occurrence, subtraction,
multiplication, or division and all types of logical(mathematical)
operations. Today, most of the computers available in the market are digital
computers.
Examples of Digital Computers
 Personal Desktop Computers,
 Calculators,
 Laptops, Smartphones, and Tablets,
 Chromebooks,
 Digital watch,
 Accounting machines,
 Workstations,

5
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Digital clock, etc.

3. Hybrid Computer
A hybrid computer is a combined complex computer unit built using both analog
and digital properties and united by a single control system. The purpose of
designing hybrid computers is to provide functions and features that can be
found on both analog and digital devices.
The aim behind creating a hybrid computer is to create a kind of work unit that
offers the best of both types of computers. Hybrid computers are extremely fast
when driving equations, even when those calculations are incredibly complex.
As both the properties of a computer consist in the form of a single hybrid
computer made possible to solve too complex calculations or problems, at the
same time, these devices are not only too expensive but also able to solve
complex issues a bit fatly.
Examples:
Auto Gasoline pump is the example of a hybrid computer, this device is
installed on a petrol pump do not only to measure the amount of petrol but also
to calculates its value, in this way It is capable of both functions i.e. hybrid
function.

Classification of Computers
1. Supercomputer
A Supercomputer is the very fastest and powerful, and expensive type of
computer for processing data. Supercomputers’ size and storage capacity are
also huge (can occupy huge premises) designed to process vast amounts of data
in a short time with high productivity.
The uses of supercomputers
 In research and study of energy and nuclear weapons and designing the
aircraft, airplanes, and flight simulators.
 Climate research and Weather Forecasting and Prediction of Natural
Disasters.
 Spaceship and Satellite Launching.

6
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Used in scientific research laboratories.


 Used in Chemical and Biological research and for highly calculation
complex tasks.
2. Mainframe Computer
Mainframe computers are multi-programming, high-performance computers,
and multi-user, which means they can handle the workload of more than 100
users at a time on the computer.
The storage capacity of the mainframe is enormous, with a high-speed data
process as well. As well as handling hundreds of input and output devices at a
time.
In today, IBM company is leading the production of mainframe computers.
Mainframe reliability is increased with development in the past 60 years. These
computers can fix most of the hardware and software bugs.
Uses of Mainframe Computer
Mainframe computers are mainly used by departmental and commercial
organizations like Banks, Companies, Scientific research centres, and
governmental departments like railways. These computers can work for 24
hours. Hundreds of users can work on these computations simultaneously.
Using the mainframe completes the tasks, such as keeping details of payments,
research centres, advertising, sending bills and notices, paying employees, ticket
booking, maintaining details of purchases by users, keeping detailed tax details,
etc.
Examples: IBM Es000 series, ICL39 Series, and CDC 6600
3. Mini Computer
Minicomputer is a digital and multi-user computer system with the connection
of more than one CPU. Thus, many people can work on these computers
simultaneously instead of a single person. Also, it can process with other
accessories like a printer, plotter, etc.
Minicomputers are the medium type of computers that have more functionality
power and are expensive than microcomputers. On the other hand, the size,
storage, and speed of minicomputers are large but less than the mainframe and
supercomputers.

7
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

The uses of Minicomputers


The minicomputers are used as real-time applications in Industries, bookings,
and Research Centres. Banks also use minicomputers for preparing payroll for
employees’ salaries, records, tracking of financial accounts, etc. As well as in the
field of Higher Education and Engineering.
Examples: PDP 11 and IBM (8000 Series).
4. Micro Computer
Today we are using many computers at home is also the most common
microcomputer. With this invention of the microprocessors in the year 1970, it
became possible to use computers for people personally at a low cost and
reasonable price known as Digital Personal Computer.
The design of microcomputers is minimal in size and storage capacity. These
computers consist of many parts like Input and Output devices, Software,
operating systems, networks, and Servers all these need to connect to form a
complete Personal Digital Computer.
The uses of Microcomputer
PC is being widely used in many fields like home, office, data
collection, business, education, entertainment, publishing, etc.
It keeps the details and prepares letters for correspondence in small businesses,
creating bills, accounting, word processing, and operation of the filing systems
in a large company.
Some of the major PC manufacturers are IBM, Lenovo, Apple, HCL, HP, etc.
Examples: Desktops, tablets, smartphones, and Laptops.
The fast development of microcomputers with technology. As a result, today,
microcomputers coming in the form of a book, a phone, and even a clock in the
name of a digital clock.

8
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

4.Describe various input devices with neat diagrams and mention its
working principle? OR Computer System Architecture VVIMP
ANS) The electromagnetic devices that accept data or a set of instructions from
the outside world and then translate that data into machine-readable and
understandable form are known as input devices. Computer input devices serve
as an interface between the outside world and the computer for proper
communication.
Different Input Devices
1. Keyboard: For entering data into a computer, the keyboard is the most
common and commonly used input device. It contains various keys for entering
letters, numbers, characters. Although there are some additional keys for
completing various activities, the keyboard layout is identical to that of a
standard typewriter. It is generally available in two different sizes: 84 keys or
101/102 keys and for Windows and the Internet, it is also available with 104
keys or 108 keys. It is connected to a computer system with the help of a USB or
a Bluetooth device.
The keys on the keyboard are:
 Numeric Keys: These keys are used to enter numeric data and move the
cursor. It is typically made up of 17 keys.
 Keyboard Shortcuts: These keys include the letter keys (A-Z) and the
number keys (09).
 Control Keys: The pointer and the screen are controlled by these keys. It
comes with four directional arrow keys. Control keys include Home, End,
Insert, Alternate (Alt), Delete, Control (Ctrl), and Escape.
 Special Keys: Enter, Shift, Caps Lock, Numb Lk, Tab, and Print Screen
are some of the special function keys on the keyboard.
 Function Keys: The 12 keys from F1 to F12 are on the topmost row of the
keyboard.
Type of keyboard:
Generally, the keyboard is of three types:
 QWERTY Keyboard
 AZERTY Keyboard
9
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 DVORAK Keyboard
Characteristics of Keyboard:

The keyboard has various


functions keys for a different
purpose.
Instead of using the mouse,
we can utilize the arrow keys on
the keyboard to do the same
purpose as the mouse.

The main keyboard, cursor keys, numeric keypad, and function keys are
the four primary components of a keyboard.
Keyboards are more affordable.
2.Mouse: The mouse is the most used pointing device. While clicking and
dragging, the mouse moves a little cursor across the screen. If you let off of the
mouse, the cursor will come to a halt. You must move the mouse for the
computer to move; it will not move on its own. As a result, it’s a device that
accepts input. Or we can say that a mouse is an input device that allows you to
control the coordinates and movement of the on-screen cursor/pointer by
moving the mouse on a flat surface. The left mouse button can be used to pick or
move items, while the right mouse button displays additional menus when
clicked. It was invented in 1963 by Douglas C. Engelbart.
Types of mouse:
Generally, the mouse is of four types:
 Trackball Mouse
 Mechanical Mouse
 Optical Mouse
 Wireless Mouse

10
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Characteristics of the mouse:

A mouse is used to move the cursor


on the screen in the desired direction.
A mouse allows users to choose
files, folders, or multiple files or text or,
all at once.
Hover over any object with the mouse pointer.
A mouse can be used to open a file, folder, etc. You must first move your
pointer to a file, folder, and then double-click on it to open or execute.
3. Joystick: A pointing device used to move the cursor around the screen is the
joystick. Both the bottom and top ends of the stick have a spherical ball affixed
to them. A socket contains the lower spherical ball. You can adjust the joystick
in all directions. Trackballs became quite popular in laptops and PCs since they
fit neatly inside the case and take up less room when in use.
Characteristics of Joystick:
 It’s utilized to regulate the cursor’s
position across a display screen.
 It’s utilized in computer games to
move the characters and symbols
around.
 It commonly features one or more
push buttons, the condition of which can
be controlled by the computer as well.

4. Light Pen: A light pen is a pointing device that has the appearance of a pen.
It can be used to draw on the monitor screen or to
pick a menu item. In a small tube, a photocell and
an optical system are housed. The photocell
sensor element determines the screen location and
sends a signal to the CPU when the tip of a light
pen is moved across a monitor screen while the
pen button is pressed.
11
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Characteristics of the light pen:


 When drawing graphics, a light pen comes in very handy.
 Objects on the display screen are selected with a light pen.
5. Scanner: A scanner is a type of input device that works in the same way as a
photocopier. It’s used when there’s data on paper that needs to be transferred to
the computer’s hard disc for further processing. The scanner collects images
from the source and translates them to a digital version that can be saved on the
hard disks. These graphics can be changed before they are printed.
Characteristics of Scanner:
 You can scan film negatives via a scanner if
there is a transparent media adaptor.
 A scanner may also scan low-quality or non-
standard-weight paper.
 The scanners are adaptable, allowing you to scan
a wide range of items regardless of their size. You can
scan small items as well as large documents if you can
locate them.
Characteristics of Barcode Reader:
 When a card is inserted, auto-start barcode
scanners begin scanning immediately.

 Reading indicators give the user confirms


that the card has been swiped correctly.

It’s simple to use, simply hold your phone


up to the code and scan it.

6. Web Camera: A webcam is an input device since it records a video


image of the scene in front of it. It can either be incorporated inside the
computer (for example, a laptop) or connected via USB. A webcam is a
small digital video camera that is connected to a computer. Because it
can capture pictures and record video, it’s also known as a web
camera.

12
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Characteristics of Web Camera:


 Webcams are used to allow individuals to see
one other while chatting online. This is formally
referred to as ‘teleconferencing’.
 Because webcams can take a picture only if
movement is detected in the scene in front of them,
they are commonly utilized in burglar alarms and other
security systems.

5. Explain Task bar, Toolbar, contral bar, scandisk.


ANS) Task bar: The taskbar is the access point for programs
displayed on the desktop, even if the program is minimized. Such
programs are said to have desktop presence. With the taskbar, users
can view the open primary windows and certain secondary windows on
the desktop, and can quickly switch between them.

Toolbar: A toolbar is part of a window, often a bar across the top, that
contains buttons that execute commands when you click them. Many
applications contain toolbars that you can customize so the commands you use
frequently are readily available and easily identifiable. Many dialog boxes also
contain toolbars.

13
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

control bar: Control bars are windows that display rows of controls with which
users can select options, execute commands, or obtain program information.
Types of control bars include toolbars, dialog bars, and status bars. Toolbars, in
class CToolBar.

Scandisk: Scandisk is a Windows utility used to check your hard disk for errors
and to correct problems that are found. These errors often occur when Windows
locks up and must be restarted.
To run Scandisk in Windows 95 and NT, click the Start button, select Programs,
then Accessories, then System Tools, and then Scandisk. It is recommended that
you run Scandisk at least once per month. In OSR2 (a later release of Windows
95) and in Windows 98, Scandisk is initiated for you automatically following
system restarts in which shutdown was not complete.

14
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-2
What is operating system? and explain the major functions of
operating system. Windows Operating System Functions
ANS) An Operating system forms the core of any computer device. The
functioning and processing of a computer system can come to hold without an
operating system.
What is an Operating System
An Operating System is the interface between the computer hardware and the
end-user. Processing of data, running applications, file management and
handling the memory is all managed by the computer OS. Windows, Mac,
Android etc. Are examples of Operating systems which are generally used
nowadays.
All modern computing devices including Laptops, Tablet, mobile phones, etc.
comprise an Operating System which helps in the smooth working of the device.
History of the Operating System
It took years to evolve the Operating Systems and make them as modernised and
advanced as they are today. Given below are the details about the evolution and
history of Operating systems.
 Initially, the computers made did not have an Operating system and to run
each program a different code was used. This had made the processing of
data more complex and time taking
 In 1956, the first operating systems were developed by General Motors to
run a single IBM computer
 It was in the 1960s that IBM had started installing OS in the devices they
launched
 The first version of the UNIX operating system was launched in the 1960s
and was written in the programming language C
 Later on, Microsoft came up with their OS on the request of IBM
 Today, all major computer devices have an operating system, each
performing the same functions but with slightly different features
15
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Types of Operating System


Given below are the different types of Operating System along with brief
information about each of them:
1. Batch Operating System
 There is no direct communication between the computer and the OS
 There is an intermediate, the Operator, which needs to distribute the work
into batches and sort similar jobs
 Multiple users can use it
 Can easily manager a large amount of work
2. Real-Time Operating System
 It has a data processing system
 The processing time is very small between the user’s command and the
output
 Used in fields where the response needs to be quick and rapid
3. Time-Sharing Operating System
 Multiple people at various terminals can use a program at the same time
 The main motive is to minimize the response time
4. Distributed Operating System
 When two or more systems are connected to each other and one can open
files which are not present in their system but in other devices connected
in the network
 Its usage has now increased over the years
 They use multiple central processors to serve real-time applications
 Failure of one system does not affect the other systems connected in the
network
5. Embedded Operating System
 These special Operating systems are built into larger systems
 They generally are limited to single specific functions like an ATM

16
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

6. Network Operating System


 They have one main server which is connected to other client servers
 All the management of files, processing of data, access to sharing files,
etc. are performed over this small network
 It is also a secure operating system for working with multiple users
7. Mobile Operating System
 With the advancement in the field of technology, smartphones now are
released with an Operating system.
 They are designed in a manner that they can help a small device work
efficiently

Functions of Operating System


Given below are the various functions of an Operating System:

 It helps with memory management. It keeps a track of the files


being saved in the Main memory and the primary memory of the
computer device
 Whenever a computer is turned on, the Operating system
automatically starts to work. Thus, the booting and rebooting
process of a computer device is also an important function of the
OS
 It provides a user interface
 Managing of basic peripheral devices is done by the operating
system
 Using the password protection option of an operating system, the
data in the device can be kept secure
 It coordinates with the software and the user
 Easy navigation and organisation of files and programs are
managed by the OS
 Any kind of program which needs to be run through the system is
done by the operating system
 If any kind of error or bug is found during the program is detected
using the operating system

17
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

2. Explain in detail the steps involved in software development


process? (OR) Software nature and qualities
ANS) We cannot overemphasize the importance of software in our lives.
Whether we shop online, chat with our long-distance relatives, or do simple
tasks such as making phone calls or playing games, software plays an integral
role in making all of these possible. In the development of software, there are
different systems employed in the process development of software, known
as Software Development Models.
Some common software development process models
Examples of such models are the Spiral model, V-model, and the Agile model
among others. These models follow a definite step in ensuring the completion of
software application development.
Ex:
even websites, or desktop/ mobile applications.
Steps of the software development life cycle (SDLC)
In the software development service, different software development models
are employed depending on the development team and the project to be
completed. The software process involved in these models clearly defines the
steps of the software application development life cycle. Every step in the
development life cycle gives rise to the end-product needed by the next stage in
the cycle. The layout design for the product is made from the gathered
requirements. The design determines the codes to be written. This step is the
development phase. The testing confirms the resulting product from the
development stage, and checks to see if it meets the requirements.
In the software development service, six basic steps define the process of
software development.
They are:
 General Analysis and Requirements Gathering
 Product Design
 Coding
 Testing

18
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Deployment of product
 Product Maintenance and Operations
1. General analysis and requirements gathering:
In software development, requirements for the products to be designed are
sourced in this step. For most projects, this step happens to be the primary focus.
Project managers and interested stakeholders gather around to meet and put
together the requirements. Questions such as “Who gets to use the product?
Utilization of the product, what kind of data goes into the product? And what
kind of data is returned by the product as output?” are all answered in this step.
2. Product Design:
During this step, the creation of the product design from the requirement’s
documentation ensues. Product design assists in the specification of the
necessary hardware required to run the product, in other words, the deployment.
It also helps in clearly marking out the general product architecture, depicting
the software modules required to be developed and their relationships.
It is also time to make a choice of development platform, e.g. .NET, Java,
Laravel, Ruby on Rails, or FileMaker. This choice depends on the requirements
themselves, but also on which platform is commonly used within the company.
3. Coding:
After the phase of product design, the development team moves on to the stage
of coding and implementation. Once the development team has the requirement
specification and the design documents in hand, the software developers can
start programming. Besides coding, the developers also perform unit or module
testing in this phase, as to detect potential problems as early as possible in the
development phase.
Some companies prefer to outsource the coding activities, and many times also
the previous step of Product Design, to a third-party software application
development company.
4. Testing:
After the step of coding and implementation, the team can then proceed to
integration and validation testing. Software development service teams are in the
constant software process of releasing different software applications for various

19
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

purposes, as this process is necessary as it is important to test the product against


all parameters available vigorously. This phase exposes potential bugs in the
product, and if any, these are corrected. This also means that the software
product will be a risk assessment in this stage.
5. Deployment of the Product:
Once the software product passes the testing phase, deployment of the product
can ensue. Once the product is ready, the first batch is rolled out and opened to
the public. That is known as Beta testing. If any changes are required due to
customer feedback, or any bugs not seen during the testing phase arise, they can
be corrected and implemented during this phase of software application
development.
Maintenance and Operations:
Once all the above steps have been successfully passed, and the software
product is fully released into the market, the product must be kept operational
and maintenance of the product is required. This involves fixing issues and
keeping the systems up to date with the latest operating system patches or
updates of used third-party software. In case the user base of the software
product increases significantly, expansion in the form of additional processing
power, memory, and/or database capacity might need to be done to keep the
system running smoothly
We went through the 6 basic steps of high-quality software development. As
it is probably understandable, the used steps will vary at each company, to
accommodate the environment and situations at each company and for each
individual software development project.

Let's learn together on Unacademy. Get a Plus subscription using


my referral code PLUSXA25B and get 10%-20 off!

20
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-3

1.Write about different financial functions existing in MS-Access2019?


ANS) S Access is a Database Management system which was launched by
Microsoft. It is a part of the Microsoft Office suite and stores data in its own
format.
Since no software or program becomes an instant success, given below are a few
details regarding the history and development of MS Access:
 On November 13, 1992, the first version on MS Access was released by
Microsoft
 Before Access was introduced, Borland and Fox were the two Database
Management systems which were dominating the market
 It was Windows’ first mass-market database program
 Multiple changes were made in the program and gradually Microsoft
started releasing different versions of MS Access. Each new version came
in with a modified RAM and storage requirement
 The current version of MS Access which is being used requires 2 GB
RAM and this memory requirement has been constant since the version
released in the year 2000
Moving forward we will know more about the advancements that MS Access
brought in, with regard to the Database Management system.
Components of MS Access
The main usage of MS Access is for accounting. Since it is Microsoft’s primary
accounting database, it can be used to manage invoice/bills, manage accounts,
keep an eye on credit and debit, etc.
When we create a document of Access, data can be stored and accessed easily
through multiple components. There are seven major components of MS Access
database. Discuss below are the same in brief:
 Tables: A table in Access is similar to any other tabulated data in the form
of rows and columns. However, when adding data to a program to create a
table, all the information entered must be correct as if any incorrect data is

21
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

entered the processing may become slow or may not give the correct
answer. The appearance of the table may look similar to the one formed in
Excel with column heading and titles
 Queries: Once a table is created and the user or programmer is looking
for a calculated output, then it is called queries. This may include
filtering, calculating, sorting, updating, etc.
 Relationships: As the name suggests, when more than one table is added,
the relation or connection between them can be achieved. There three
ways in which the connection between the tables can be determined:
1.
1.
1. One to one
2. One to Many
3. Many to Many
 Macros: The tool using which predefined actions which can automate
tasks on an Access report is called macros. Multiple tasks can be assigned
and they will function whenever the macros option is selected on a report
 Forms: A user interface for a database application can be created using
forms. Forms can further be divided into two: bound and unbound forms
 Report: Once all the information is entered into the database, it can be
reviewed or analysed using a report. A report can then be customised or
modified as per the user’s requirement
 Module: This allows a set of pre-defined instructions to be created by a
programmer in the database. They can be used throughout the database
financial functions:

22
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Benefits and Limitations of using MS Access


It was Microsoft’s first database software, and came along with a lot of
advantages and convenience for its users. At the same time, there were
limitations to it. Discussed below are the benefits and limitations which came
along with MS Access usage.
Benefits:
 Easy to create database within lesser time duration
 Used a very comprehensive programming language which made it user
friendly
 With each revised version, new options and features were made available
to the users for their convenience
 It is easy to install and then easy to understand its working
 Importing data was easy
 Graphical user interface made it easy to use
Limitations:
 Not too many people can use the same database at a single time. This may
affect its speed and efficiency
 The same database was tough to use with different Operating systems
 Better database systems can be used for confidential data
2.How to draw graphs in MS-excel? Give different types of graphs in MS-
excel.
ANS) What is Bar Graph?
The pictorial representation of grouped data, in the form of vertical or horizontal
rectangular bars, where the lengths of the bars are equivalent to the measure of
data, are known as bar graphs or bar charts.
The bars drawn are of uniform width, and the variable quantity is represented on
one of the axes. Also, the measure of the variable is depicted on the other axes.
The heights or the lengths of the bars denote the value of the variable, and these
graphs are also used to compare certain quantities. The frequency distribution
tables can be easily represented using bar charts which simplify the calculations
and understanding of data.
23
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

The three major attributes of bar graphs are:


 The bar graph helps to compare the different sets of data among different
groups easily.
 It shows the relationship using two axes, in which the categories are on
one axis and the discrete values are on the other axis.
 The graph shows the major changes in data over time.
Types of Bar Graphs
The bar graphs can be vertical or horizontal. The primary feature of any bar
graph is its length or height. If the length of the bar graph is more, then the
values are greater than any given data.
Bar graphs normally show categorical and numeric variables arranged in class
intervals. They consist of an axis and a series of labelled horizontal or vertical
bars. The bars represent frequencies of distinctive values of a variable or
commonly the distinct values themselves. The number of values on the x-axis of
a bar graph or the y-axis of a column graph is called the scale.
The types of bar charts are as follows:
1. Vertical bar chart
2. Horizontal bar chart
Even though the graph can be plotted using horizontally or vertically, the most
usual type of bar graph used is the vertical bar graph. The orientation of the x-
axis and y-axis are changed depending on the type of vertical and horizontal bar
chart. Apart from the vertical and horizontal bar graph, the two different types of
bar charts are:
 Grouped Bar Graph
 Stacked Bar Graph
Now, let us discuss the four different types of bar graphs.

Vertical Bar Graphs


When the grouped data are represented vertically in a graph or chart with the
help of bars, where the bars denote the measure of data, such graphs are called
vertical bar graphs. The data is represented along the y-axis of the graph, and the

24
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

height of the bars shows the values.

Horizontal Bar Graphs


When the grouped data are represented horizontally in a chart with the help of
bars, then such graphs are called horizontal bar graphs, where the bars show the
measure of data. The data is depicted here along the x-axis of the graph, and the
length of the bars denote the values.

Grouped Bar Graph


The grouped bar graph is also called the clustered bar graph, which is used to
represent the discrete value for more than one object that shares the same
category. In this type of bar chart, the total number of instances are combined
into a single bar. In other words, a grouped bar graph is a type of bar graph in
which different sets of data items are compared. Here, a single colour is used to
represent the specific series across the set. The grouped bar graph can be
represented using both vertical and horizontal bar charts.

Stacked Bar Graph


The stacked bar graph is also called the composite bar chart, which divides the
aggregate into different parts. In this type of bar graph, each part can be
represented using different colours, which helps to easily identify the different
categories. The stacked bar chart requires specific labelling to show the different
parts of the bar. In a stacked bar graph, each bar represents the whole and each
segment represents the different parts of the whole.

Properties of Bar Graph


Some of the important properties of a bar graph are as follows:
 All the bars should have a common base.
 Each column in the bar graph should have equal width.
 The height of the bar should correspond to the data value.
 The distance between each bar should be the same.

25
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Applications of Bar Graphs


Bar graphs are used to match things between different groups or to trace changes
over time. Yet, when trying to estimate change over time, bar graphs are most
suitable when the changes are bigger.
Bar charts possess a discrete domain of divisions and are normally scaled so that
all the data can fit on the graph. When there is no regular order of the divisions
being matched, bars on the chart may be organized in any order. Bar charts
organized from the highest to the lowest number are called Pareto charts.
Advantages and Disadvantages of Bar Chart
Advantages:
 Bar graph summarises the large set of data in simple visual form.
 It displays each category of data in the frequency distribution.
 It clarifies the trend of data better than the table.
 It helps in estimating the key values at a glance.
Disadvantages:
 Sometimes, the bar graph fails to reveal the patterns, cause, effects, etc.
 It can be easily manipulated to yield fake information.

3.Write about text processing tools and header and footer in MS word2019?
ANS) In Microsoft Word, Headers and Footers are used to insert additional
information such as title, file name, date, page numbers, etc. The presence of
both header and footer in the Word document makes your document more
professional and easier to read as well as understand.
Headers appear at the top margin of the Word document,
while Footers appear at the bottom margin of the Word document.
To insert a header and footer in Microsoft Word
follow the below given basic steps –
Step 1: Open the new or an existing Word document in which you want to insert
header and footer
Step 2: Go to the Insert tab at the top of the Ribbon.
26
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Step 3: Click on either header or footer drop-down menu in the Header &
Footer section.

Step 4: A Header or Footer drop-down menu will display on the screen with a
list of built-in Header or Footer options. Select your desired option from the
Built-in list.

Step 5: A Design tab with Header & Footer option will appear at the top of the
document (on the Ribbon), as shown in the below screenshot.

Step 6: Type your desired information into the header or footer section.

Step 7: Once you type your desired text in the Header section, click on Close
Header and Footer under the Design section on the Ribbon or press the Esc key

27
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

from the keyboard to remove the dotted underline. Now, you can see that the
Header is inserted to the Word document.

Insert the Date or Time in a Header or Footer


To insert the Date or Time in a Header or Footer, follow the below instructions -
1. Go to the Insert tab on the Ribbon and click on the Date & Time option in
the Text section

2. A Date and Time dialog box will appear on the screen in which do the
following -
o Select Date format from the Available format.
o Select your desired language.
o Tick on the Update automatically checkbox.
o Click on the OK button at the bottom of the dialog box.

28
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Edit Header and Footer in Word document


Once you create Header and Footer in Word document, you can also edit it
based on your requirement.
There are the following steps to edit Header and Footer in Word document.
Step 1: Go to the Insert tab on the Ribbon and click on either Header or
Footer drop-down menu that you want to Edit.
Step 2: A Built-In Header option window will appear on the screen. Click on
the Edit Header option.
Step 3: Edit Header based on your requirement. Once you edit Header, click on
the Close Header and Footer option at the top right corner of the document to
disappear the blue dotted lines.

29
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Delete Header and Footer from Word document


To Delete Header and Footer from Word document, follow the below steps -
1. Go to the Insert tab on the Ribbon and click on the Header & Footer
option.
2. A Header or Footer dialog will appear on the screen. Click on the Remove
Header or Remove Footer option.

30
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

4. What do you understand by the term Mail Merge? Write steps to


perform mail merge.? (OR)
letters, tables, mail merge, labels Applications of MS Excel, MS word
ANS) Mail Merge:
A mail merge is a quick and easy way to personalize emails, letters, labels,
newsletters and any other customizable message you can think of. They let you
send out messages en masse that are personalized to each recipient, so you don’t
have to manually customize each document yourself.
Right Inbox has just recently launched its own mail merge feature for Gmail,
which makes it super easy to send mail merges within Gmail. Try from the
Chrome Store today!
What Can You Use Mail Merges For?
Mail merges are useful when personalizing any kind of message or document.
For example:
 Marketing emails
 Envelopes
 Mailing labels
 Newsletters
 Custom catalogs
 Form letters
How to Do a Mail Merge with Word & Excel
Step One: Create Your Address List in Microsoft Excel
1. Open Microsoft Excel.
2. Click on Blank workbook.
3. Start entering your address list details into your Excel spreadsheet.
4. Enter column headers in the first row (beginning in cell A1). Note that the
column headers must read the same as the placeholder names you want to use in
your Word template (e.g. if one of your column headers is “First name” then the
field names in your Word template will also be “First name”.

31
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

5. Fill in all the contact data, one per row, starting in cell A2.
6. When you’re finished creating your contact sheet, save it by clicking on File –
Save As.
Make sure you’ve made all the necessary edits to your Excel Spreadsheet before
you start the mail merge process.
Step Two: Create the Document in Microsoft Word
1. Open a new Word document, which will be the main document that will be
sent to each recipient in your mail merge.
2. Click on the Mailings tab and click Start Mail Merge.
3. In the drop-down menu, you’ll see all the different mail merge documents
available to you.
4. Select the appropriate one (in this case, a Letter mail merge)

32
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

5. Write the body of your letter in the Word document.

Step Three: Select Your Recipient List


Now that you have your Excel Spreadsheet and Word Documents set up, you
can select the list of recipients you want to receive your letter.
1. In the Mailings tab, clicking on Select Recipients, where a drop-down menu
of all your mail merge list sources will appear.
2. Click on Use an existing list, since your contact information is already
available as an Excel file.

3. A pop-up box will appear, then select the Excel sheet you’ve created, and
click Open.
4. In the window named Select Table, choose the Excel worksheet you want to
use, and click OK.
5. In the window named Mail Merge Recipients, uncheck the checkbox of the
recipients you don’t want in your mailing list.

33
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Step Four: Add Personalized Messages


You’ll personalize your content in the Word document letter template. Within
your Word document, you can personalize three variables:
1. Insert Address Block
2. Insert Greeting Line
3. Insert Merge Field
Insert Address Block – add a recipient’s address to your document.
1. Click on the Address Block in the Write and Insert Fields section.

2. Choose an address block format in the window that appears and click OK.
3. Now an address placeholder («AddressBlock») will automatically appear in
your letter.

34
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Step Five: Preview and Send


Once you’ve personalized your letter, you can preview it (with the data from
your Excel worksheet) before you send it out.
1. In the Mailings tab, click on Preview Results.
2. Preview the results for individual recipients by entering the recipient number
in the text box (your recipient number is the corresponding row number in your
Excel spreadsheet). You can also scroll through your recipients by clicking on
the Previous and Next buttons.
Once you’ve finished previewing your letter, click Finish and merge to
complete the mail merge process.
4. Here, you’re given the option to:
a. Edit Individual Documents – to edit your letters separately.
b. Print Documents.
c. Send Email Messages, if you want to send letters as emails (in which case
you need to set up Outlook or Gmail with Word).

35
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

5.What is macro in Ms word? Ware its Features. How to insert in a


document.
ANS)

The Microsoft Office suite is one of the most popular office solutions. From
Word and Excel to PowerPoint – the practical applications for writing,
calculating, and presenting have been proving their worth for years. But many
users are not even aware of the range of features that they provide. For instance,
MS Office programs include a function that allows you to create, save, and
execute macros in order to automate certain tasks and processes. Especially
for regularly recurring workflows, this feature lets you save valuable time and
effort.
But what role do macros play in Word and how do these command sequences
work exactly? Also find out how to create macros in Word and integrate them
into your documents.
What is a Word macro?
Macros are considered a standard feature in programming as well as the use of
computer programs.
They are basically subprograms that developers and users can create to
save sequences of commands or operating instructions, which can then be
started with a simple action. When faced with many regularly recurring tasks,
Microsoft Word is typically an application that benefits from the option to
automate work steps.
For this reason, the Editor (as well as Access, Excel or PowerPoint, for example)
include an integrated tool for recording and executing custom Word macros.
The script language Visual Basic for Applications (VBA), likewise developed by
Microsoft, serves as the recording language here.

36
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

You can automate frequently used tasks by creating and running macros.
(For e.g., you have numerous paragraph and want some of them to be of same
colour, select them and apply the shortcut)
Macro is uses and Features for following purposes:
 To speed up routine editing and formatting
 To combine multiple commands — for example, to insert a table with a
specific size and borders, and with a specific number of rows and columns
 To make an option in a dialog box more accessible
 To automate a complex series of tasks

1. Click View > Macros > Record Macro.

2. Type a name for the macro.

. To use this macro in any new documents you make, be sure the Store
macro inbox says All Documents (Normal.dotm).

37
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

4. To assign Macro either click Button or Keyboard.


5. For assigning through keyboard, click on Keyboard.
6. Type your custom Keyboard shortcut and click on assign.

Let's learn together on Unacademy. Get a Plus


subscription using my referral code PLUSXA25B and get 10%-20 off!

38
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-4
1.Describe the following operation in power point presentation?
(OR)
Write about various slide show controls?
(OR)
Explain Creation of slides, animation, and templates - Designing
Presentations?
ANS) Microsoft PowerPoint:
PowerPoint (PPT) is a powerful, easy-to-use presentation graphics
software program that allows you to create professional-looking electronic
slide shows.
The image given below shows the main page of MS PowerPoint, where a person
lands when the program is opened on a computer system

Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can
customise and optimise a presentation. The same have been discussed
below.
 Slide Layout

39
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Multiple options and layouts are available based on which a presentation can be
created. This option is available under the “Home” section and one can select
from the multiple layout options provided.

 Insert – Clipart, Video, Audio, etc.


Under the “Insert” category, multiple options are available where one can
choose what feature they want to insert in their presentation. This may include
images, audio, video, header, footer, symbols, shapes, etc.

 Slide Design
MS PowerPoint has various themes using which background colour and designs
or textures can be added to a slide. This makes the presentation more colourful
and attracts the attention of the people looking at it.
This feature can be added using the “Design” category mentioned on the
homepage of MS PowerPoint. Although there are existing design templates
available, in case someone wants to add some new texture or colour, the option
to customise the design is also available. Apart from this, slide designs can also
be downloaded online.

40
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Animations
During the slide show, the slides appear on the screen one after the other. In
case, one wants to add some animations to the way in which a slide presents
itself, they can refer to the “Animations” category.

Uses of PowerPoint Presentation


PowerPoint presentations are useful for both personal and professional usage.
Given below are a few of the major fields where PPT is extremely useful:
 Education – With e-learning and smart classes being chosen as a
common mode of education today, PowerPoint presentations can help in
making education more interactive and attract students towards the
modified version of studying
 Marketing – In the field of marketing, PowerPoint presentations can be
extremely important. Using graphs and charts, numbers can be shown
more evidently and clearly which may be ignored by the viewer if being
read
 Business – To invite investors or to show the increase or decrease in
profits, MS PowerPoint can be used

41
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Creating Resumes – Digital resumes can be formed using MS


PowerPoint. Different patterns, photograph, etc. can be added to the
resume
 Depicting Growth – Since both graphics and text can be added in a
presentation, depicting the growth of a company, business, student’s
marks, etc. is easier using PPT
2.Describe the following operations in power point presentation
a) Add bullets or numbers to a list
b) Add the slide in a presentation
c) Add picture on a slide
d) Aligning the text
ANS) PowerPoint (PPT) is a powerful, easy-to-use presentation graphics
software program that allows you to create professional-looking electronic
slide shows.
The image given below shows the main page of MS PowerPoint, where a person
lands when the program is opened on a computer system
a).Add bullets or numbers to a list
On the left-hand side of the
PowerPoint window, click a slide
thumbnail that you want to add
bulleted or numbered text to. On
the slide, select the lines of text in
a text placeholder or table that you want to add bullets or numbering to. On the
HOME tab, in the Paragraph group, click Bullets or Numbering.

b).Add the slide in a presentation


1. In the slide thumbnail pane on the left,
click the slide that you want your new slide to
follow.
2. On the Home tab, click New Slide.

42
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

3. In the New Slide dialog box, select the layout that you want for your new
slide. Learn more about slide layouts.
4. Select Add Slide.

c).Add picture on a slide


Open the slide you want to insert a picture on. On the Insert menu, point at
Picture, and then select Picture From
File. In the dialog box that opens,
browse to the picture that you want to
insert, select that picture, and then
click Insert.

d).Aligning the text


Select the objects you want to align. Press Shift to select multiple objects.
...
Select Picture format > Align and select how you want to align them:
1. Align Left, Align Center, or Align Right.
2. Align Top, Align Middle, or Align
Bottom.
3. Distribute Horizontally or Distribute
Vertically.

43
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

3.How to merge shapes in PowerPoint?


Microsoft PowerPoint:
ANS) PowerPoint (PPT) is a powerful, easy-to-use presentation graphics
software program that allows you to create professional-looking electronic
slide shows.
The image given below shows the main page of MS PowerPoint, where a person
lands when the program is opened on a computer system
Creating a Custom Shape in Photoshop for those unfamiliar with the custom
shape tool, it allows you to insert a shape in a cookie cutter fashion into your
document. Some of the shapes that come with the Photoshop software include
arrows, hearts, stars and other basic shapes.
Merge Shapes
You can use the Merge Shapes feature to create new, custom shapes from one or
more existing shapes.
1. Select a shape. The merged shape will take on the colour of the first shape
selected, so if you want to keep a particular colour, be sure to select that
shape first.
2. While holding the Shift key, select another shape.
3. Click the Format tab.

4.Click Merge Shapes.


5.Choose a merge option:

44
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

o Union: Merges multiple shapes into one.


o Combine: Makes one shape with the overlapping parts erased.
o Fragment: Makes both shapes one color and outlines the part
where they overlap.
o Intersect: Erases both shapes except for the parts that overlap.
o Subtract: Creates a cut-out of one shape inside the other.
4.Print your PowerPoint slides, handouts, or notes?
ANS) Print your presentation
1. Select File > Print.
2. For Printer, select the printer you want to print to.
3. For Settings, select the options you want:
 Print All Slides: To print each slide on a single sheet or change to just
print a range of slides.
 Slides: From the drop-down, choose to print all slides, selected slides,
or the current slide. Or, in the Slides box, type which slide numbers to
print, separated by a comma.
 Print Layout: Choose to print just the slides, just the speaker notes, an
outline, or handouts. The number of slides per page is also an option,
an effective way to save paper.
The Outline prints only the text in the slides, without images. The Notes of a
presentation show the slide and the related speaker notes below it. If you choose
to print Handouts, you can print several slides on one page using a variety of
layouts, some with space for note-taking.
 Color: Choose whether you want color, grayscale, or pure black and
white.
 Edit Header & Footer: Select to edit the header and footer before
printing.
4. For Copies, select how many copies you want to print.
5. Select Print.

45
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

UNIT-5
1.Explain various communication media in computer Networking? VVIMP
ANS) The communication system is a system which describes the information
exchange between two points. The process of transmission and reception of
information is called communication. The major elements of communication are
the Transmitter of information, Channel or medium of communication and
the Receiver of information.
types Of Communication Systems
Depending on Signal specification or technology, the communication system is
classified as follows:
(1) Analog
Analog technology communicates data as electronic signals of varying
frequency or amplitude. Broadcast and telephone transmission are common
examples of Analog technology.
(2) Digital
In digital technology, the data are generated and processed in two states: High
(represented as 1) and Low (represented as 0). Digital technology stores and
transmits data in the form of 1s and 0s.
Depending on the communication channel, the communication system is
categorized as follows:
Analog

46
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

1. Wired (Line communication)


 Parallel wire communication
 Twisted wire communication
 Coaxial cable communication
 Optical fibre communication
2. Wireless (Space communication)
 Ground wave communication
 Skywave communication
 Space wave communication
 Satellite communication

Examples Of Communication Systems


The following are a few examples of communication systems:
1. Internet
2. Public Switched Telephone network
3. Intranet and Extranet
4. Television

Elements Of Communication Systems


The definitions of the terms used in the communication system are discussed
below.
Information
Message or information is the entity that is to be transmitted. It can be in the
form of audio, video, temperature, picture, pressure, etc.
Signal
The single-valued function of time that carries the information. The information
is converted into an electrical form for transmission.
Transducer

47
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

A device or an arrangement that converts one form of energy to the other. An


electrical transducer converts physical variables such as pressure, force,
temperature into corresponding electrical signal variations. Example:
Microphone – converts audio signals into electrical signals. Photodetector –
converts light signals into electrical signals.

2.What do you mean by computer network? what is its various types?


VVIMP
OR
Basic components (OR) various types of computer network

ANS) computer network


As per computer networks basics, a computer network is a gathering of at least
two interconnected computer frameworks. You can set up a network utilizing
either link or remote media. Each computer includes equipment and
programming that connects tools and computers.
Basic components (OR) various types of computer network
Here are some basic components of a computer network with respect to a
computer networks basics,
1. Network Interface Card (NIC)
For the most part, NIC gives the actual connection point among PC and cabling.
NIC sends the information and controls the progression of information. It can
interpret the information into bytes for the CPU to understand.
2. Hub
Hubs are those devices utilised to interface a small number of computers
together. Hubs repeat one bit on one port and duplicate it to different ports
afterwards.
3. Switch
Switches are essentially the traffic police of a basic local area network.
Switching determines the trajectory of frames as data units and how data goes
from one part of a network to another. Switches function as controllers,

48
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

connecting computers, printers, and other hardware devices to a network on


campus or in a building.
4. Repeater
At the physical layer of the OSI model, repeaters are network devices that
amplify or regenerate an incoming signal before retransmitting it. They are used
in networks to extend their coverage. Another term for them is signal enhancers.
5. Router
Routers are networking devices that operate at the OSI model’s layer three or
network layer. They are responsible for receiving, analysing, and forwarding
data packets across computer networks. When a data packet arrives, the router
inspects the destination address, checks its routing tables to determine the best
route, and forwards the packet along that path.
6. Modem
The modem is a device that mainly permits a computer or other devices like a
switch or router to connect to the internet. A modem is a short form of
modulator-demodulator. A modem works as a digital translator, taking an
information signal from the cable, fibre, or phone lines and converting it to a
format that your computer can understand.
7. Server
A server is a system or computer that distributes resources, data, services, or
applications to other computers known as clients over a network. The server
serves information to different gadgets or PCs over a network. Servers are found
in various forms like virtual servers, intermediary servers, application servers,
web servers, data set servers, record servers, and many more.
8. Bridge
It is one more significant part of computer networks. The bridge is a layer-2
device. A bridge is primarily used to associate at least two LANs. The bridge is
used for moving the data packets fast over the network.
3.write about ring star network topologies?
Ans) A network topology is the physical and logical arrangement of nodes and
connections in a network. Nodes usually include devices such as switches, routers

49
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

and software with switch and router features. Network topologies are often
represented as a graph.
Network topologies describe the arrangement of networks and the relative
location of traffic flows. Administrators can use network topology diagrams to
determine the best placements for each node and the optimal path for traffic
flow. With a well-defined and planned-out network topology, an organization
can more easily locate faults and fix issues, improving its data transfer
efficiency.
Why is network topology important?
Network topology plays a major role in how a network functions. Namely, the
topology has a direct effect on network functionality. Choosing the right
topology can help increase performance, as a properly chosen and maintained
network topology increases energy efficiency and data transfer rates.

Types of topology:
There are 5 popular types of topology,
 Bus Topology

50
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

 Ring Topology
 Tree Topology
 Star Topology
 Mesh Topology
Bus Topology
In a bus topology, every computer is connected to a common bus. The bus is a
single cable that carries data from one computer to another. If one computer
wants to send data to another computer, it sends the data on the bus. All
computers on the bus can see the data, but only the intended recipient will
accept it.
Ring Topology
In a ring topology, every node is connected to two other nodes, forming a loop.
Data flows from one node to the next in a continuous sequence. Ring topologies
are often used in fibre optic networks, where data can be transmitted at high
speeds with minimal interference.
Tree Topology
In a tree topology, there is a central root node from which all other nodes branch
out. This type of topology is often used in bus topology networks. Tree topology
can be extended to an arbitrary depth, but it is usually only extended to two or
three levels for the sake of simplicity.
Star Topology
In a star topology, each device on the network is connected to a central hub. The
hub acts as a gateway, providing a single point of connection for all devices on
the network. Star topologies are commonly used in home and small office
networks.
Mesh Topology
In computer networking, mesh topology is a type of network topology in which
each node (computer or other devices) is connected to every other node in the
network. A mesh topology is often used in large, complex networks because it is
highly redundant and can accommodate a large number of nodes. If one node
fails, the others can still communicate with each other.

51
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

3. What is Network Architecture? And, How Does It Work?


ANS) Network architecture refers to a network’s structural and logical layout. It
describes how the network devices are connected and the rules that govern data
transfer between them.
There are many ways to approach network architecture design, which depend on
the purpose and size of the network. Wide area networks (WAN), for example,
refer to a group of interconnected networks often spanning large distances. Its
network architecture will be vastly different from that of a local area network
(LAN) of a smaller office branch.
Planning the network architecture is vital because it either enhances or hinders
the performance of the entire system. Choosing the wrong transmission media or
equipment for a particular expected server load, for instance, can cause
slowdowns on the network.
Network architecture can also facilitate security, becoming increasingly
important as more user devices connect to the network. The design and protocols
of the network need to support quick and efficient user recognition and
authorization.
Types of Networking Architecture
While there are myriads ways to design your network architecture, you’ll find
that most fall into one of two types. These are the peer-to-peer and client/server
architectures.
In a peer-to-peer model, all devices in a network have equal responsibilities and
privileges with each other. This means tasks are allocated equally throughout the
network. Files in one computer can be shared with every other computer,
essentially making every node a network storage drive. Resources like a printer
connected to one device are also visible to every other device on the network.
A peer-to-peer architecture is suitable for small networks, such as a branch
office. Your home network, by the way, often uses a peer-to-peer model.
In a client/server architecture, all devices in the network, called “clients,” are
connected to a central hub, called a “server.” The server handles the bulk of the
network operations – data storage, processing of client requests, cybersecurity,
and access control.
Network Architecture Design
52
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

The design of any digital network architecture involves optimizing its building
blocks. These include:
 Hardware
These are the equipment that forms the components of a network, such as
user devices (laptops, computers, mobile phones), routers, servers, and
gateways. So, in a way, the goal of any network architecture is to find the
most efficient way to get data from one hardware point to another.
 Transmission Media
Transmission media refers to the physical connections between the
hardware devices on a network. Different media have various properties
that determine how fast data travels from one point to another.
They come in two forms: wired and wireless. Wired media involve physical
cables for connection. Examples include coaxial and fiber optic. Wireless media,
on the other hand, relies on microwave or radio signals. The most popular
examples are WiFi and cellular.
 Protocols
Protocols are the rules and models that govern how data transfers
between devices in a network. It’s also the common language that
allows different machines in a network to communicate with each
other. Without protocols, your iPhone couldn’t access a web page
stored on a Linux server.
There are many network protocols, depending on the nature of the data.
Examples include the Transmission Control Protocol / Internet Protocol
(TCP/IP) used by networks to connect to the Internet, the Ethernet protocol for
connecting one computer to another, and the File Transfer Protocol for sending
and receiving files to and from a server.
 Topology
How the network is wired together is just as important as its parts.
Optimizing this is the goal of network topology.
Topology is the structure of the network. This is important because factors like
distance between network devices will affect how fast data can reach its
destination, impacting performance. There are various network topologies, each
with strengths and weaknesses.

53
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

A star topology, for example, describes a layout where all devices in the network
are connected to a central hub. The advantage of this layout is that it’s easy to
connect devices to the network. However, if the central hub fails, the whole
network goes down.
On the other hand, a bus topology is where all network devices are connected to
a single pathway, called the bus. The bus acts like a highway that carries data
from one part of the network to the other. While cheap and easy to implement,
its performance tends to slow down as more devices are added to the network.

5M
1.Internet protocol Address?
ANS) IP address definition
An Internet Protocol address is referred to as an IP address. An IP address is
assigned to each instance connected to any computer communication network
using TCP/IP communication protocols.
A Dynamic Host Configuration Protocol (DHCP) server assigns IP addresses
when network nodes connect to the network. The pool of available addresses
that are part of the overall addressing system uses DHCP to issue IP addresses.
The designation also knows it of individual connections in the current network
according to their logical addresses. An IP address allows us to understand and
regulate how different devices communicate with each other over the Internet. It
also describes the characteristic features of different Internet routers.
There are two types of IP addresses:
 Classful IP addressing, a dated method that divides IP address pools into
the following five groups: A, B, C, D, and E.
 In classless IP addressing, prefixes can be of any length.
The standard representation of an IP address is a 32-bit unsigned binary value. It
is displayed using dotted decimal notation. For example, a legitimate IP address
is “192.165.20.40

54
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

2.what is mail merge?


ANS) Mail merge
Mail merge is an important feature in MS Word and MS Excel; it permits taking
data from a spreadsheet, database, or other forms of data and placing it into
those documents and letters and sending similar letters or documents to multiple
users. Mail merge works with the data file and letter template. The data file
consists of the sender’s or recipient’s information. And the second one is the
letter template; on the letter template, the information of the senders is kept
empty. Until all the letters are created, the data from the data file are placed
accordingly within the space left in the letter and is filled gradually.

Proofreading:
Proofreading is the ultimate stage of the writing process after completion of
revisions and editing, before proofreading one must complete all the details
about the writing and there are several stages of editing that the editor needs to
follow before proofreading. Proofreading is the step where the corrections of the
writings are done; the corrections include typographical errors, punctuation,
grammar, spelling, repeated words, omitted words, formatting, and spacing. In
other words, proofreading is the stage for reviewing and writing errors.
3.What is an auxiliary memory?
ANS) Auxiliary memory units are among computer peripheral equipment. They
trade slower access rates for greater storage capacity and data stability. Auxiliary
memory holds programs and data for future use, and, because it is nonvolatile
(like ROM), it is used to store inactive programs and to archive data. Early
forms of auxiliary storage included punched paper tape, punched cards, and
magnetic drums. Since the 1980s, the most common forms of auxiliary storage
have been magnetic disks, magnetic tapes, and optical discs.
Magnetic Disks
Magnetic materials are widely used to store computer data, audio and video
tapes. Commonly used devices that use magnetic storage include magnetic tape,
floppy disks and hard-disks.
4.Output devices?

55
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

ANS) A computer’s output device refers to any hardware that sends data from a
computer to another user or device. In short, the output devices of the
computer give out the result of the entered input. We can also understand the
output devices of the computers in such a way that the output devices are the
devices that receive the data from the computer and then transform the data into
a user-friendly form and send the converted data to the user so that they can see
what the output given by the computer
Output Devices vs Input Devices:
There are many differences between output and input devices. These can be
attributed to the functions and mode of handling. Some of the most critical
points of difference are as follows –
Output Devices vs Input Devices:
There are many differences between output and input devices. These can be
attributed to the functions and mode of handling. Some of the most critical
points of difference are as follows –
Parameters of
Comparison Output Devices Input Devices
Data Accep tion Output devices accept the data Input devices get the data
from the computer and give from users and send it to the
out the results of the entered computer.
input to the users.
Control Controlled by the computers. Controlled by the users.
Transformation Transforms the machine- Transforms the user-friendly
friendly outputs into user- input to computer-friendly
friendly information. input.
Output Monitors, printers, speakers, Mouse, scanner, keyboard,
Devices and headphones, projector, plotter, stylus, joystick, mic, trackball,
Input Devices and GPS. etc.

5.What is application software?

56
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

ANS) Application software is the set of instructions that perform some specific
tasks according to the requirements of the end-users rather than the basic
functions. System software is the set of instructions that are directly related to
the working of computer hardware, performing basic functions to provide the
platform for the application software to run on. Let us study how software is
used in receiving and interpreting user commands.
History of software
The 1940s – The world’s first software was invented by Tom Kilburn in England
The 1970s – Apple’s first personal computer with consumer software was
launched
The 1980s – IBM Personal computers were developed
The 2000s – Apple’s very first iPhone was launched
Present – Software is continuously being developed, including AI and IoT.
In the beginning, software was written for particular computers and sold with
the hardware the software ran on. Floppy disks, and later CDs and DVDs,
became the primary delivery methods for software in the 1980s. Nowadays,
almost all software is purchased and directly downloaded from the internet.
Applications can be purchased from the vendor’s website or an application
service provider’s website.
6.Explain MAN in network?
ANS) Metropolitan Area Network (MAN) is a personal data network used by one
company in many buildings or by multiple companies in the same locality that
connect citizens with various Organisations.
. It’s bigger than a LAN in one building but not big enough to be called a wide
area network. The length varies between 5 and 10 kilometres. A campus network
is also a cluster of buildings on a single contiguous piece of ground.
For elevated communication between MAN and the open network, a MAN can
connect to a web exchange point and use a Local Exchange Carrier to connect
LANs. This can link to other vendors via a peer exchange or cloud vendors via
Amazon Web Services Direct Connect.

57
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

7.Difference Between LAN, MAN, and WAN?


Ans)

Parameter LAN MAN WAN

Full Form LAN is an acronym MAN is an WAN is an


for Local Area acronym for acronym for Wide
Network. Metropolitan Area Network.
Area Network.

Definition and LAN is a network MAN is a The WAN network


meaning that usually comparatively spans to an even
connects a small wider network larger locality. It
group of computers that covers large has the capacity to
in a given regions- like connect various
geographical area. towns, cities, etc. countries together.
For example, the
Internet is a WAN.

Network The LAN is private. The MAN can be The WAN can also
Ownership Hospitals, homes, both private or be both private or
schools, offices, etc., public. Many public.
may own it. organizations and
telecom operators
may own them.

Maintenance Very easy to design Comparatively Very difficult to


and Designing and maintain. difficult to design design and
and maintain. maintain.

Speed LAN offers a very MAN offers a WAN offers a low


high Internet speed. moderate Internet Internet speed.
speed.

58
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

Delay in It faces a very short It faces a It faces a high


Propagation propagation delay. moderate propagation delay.
propagation
delay.

Faulty The LAN exhibits a The MAN The WAN also


Tolerance better fault exhibits a lesser exhibits a lesser
tolerance than the fault tolerance. fault tolerance.
rest of the
networks.

Congestion The congestion in It exhibits a It exhibits a


the network is very higher network higher congestion
low. congestion. in the network.

Communication LAN typically MAN allows A huge group of


Allotment allows a single pair multiple computers can
of devices to computers to easily interact
establish a interact with each other
communication. simultaneously using the WAN.
But it may also with each other.
support more
computers.

Uses Schools, homes, It basically covers It covers an entire


colleges, hospitals, a city, a small country, a
offices, etc., can town, or any given subcontinent, or
privately use it. area with a bigger an equiv
radius than the
LAN.

THE END

59
NAGENDRA REDDY DWARAMPUDI
COMPUTER APPLICATIONS IN MANAGEMENT MBA

NOTE: All answers have been updated Most of the questions are explained
with diagrams, these diagrams are not required to be included in the exam,
just for your understanding

© ...Copyright disclaimer under Section 107 of the Copyright Act This disclaimer appears on
content “examtree.in”. that uses someone else’s copyrighted content. Including this statement of
“fair use” helps protect against copyright infringement claims.
THANK YOU
D.NAGENDRA REDDY
Examtree.in

Let's learn together on Unacademy. Get a Plus subscription using my referral code
PLUSXA25B and get 10%-20 off!

60
NAGENDRA REDDY DWARAMPUDI

You might also like