Unit -1 introduction
1. Introduction to IT/ITeS Industry
2. Understanding of Computers
3. M.S Office & Data Confidentiality
4. Enhance Typing Skills
Unit -1 introduction
1. Introduction to IT/ITeS Industry
2. Understanding of Computers
3. M.S Office & Data Confidentiality
4. Enhance Typing Skills
The concept of outsourcing started with the automobile industry/ Another trend that emerged in the late 1980s was that of corporate outsourcing. A number of noncore business processes, such as accounts, Human Resources (HR), and finance, were outsourced to vendors. This resulted in the emergence of the BPO or the IT-Enabled Services (ITeS) industry./
The IT-BPM industry has almost doubled in terms of revenue and contribution to India’s GDP over the last six years (2008-2013)./ Indian Business Process Management (BPM) sub-sector of Indian IT-BPM industry has crossed significant growth milestones in FY2013 i.e. revenue generation of USD19 Billion and providing direct employment to nearly 1 million people
The IT BPM industry has not only contributed to India’s GDP and exports but has also provided a wide range of socio-economic benefits such as creating employment, raising income levels,and promoting exports, etc.
Structure of the IT BPM Industry ; Multi-national Companies (MNCs) / Indian Service Providers (ISP):/ Global In-house Centers (GIC)/
4 Sub-sectors within the IT-BPM Industry; IT Services (ITS)/ Business Process Management (BPM)/ Engineering and R&D (ER&D)/ Software Products (SPD)
IT Services( Custom Application Development (CAD) Hardware Deployment and Support , Software Deployment and Support , IT Consulting , System Integration , Information Systems(IS) Outsourcing , Software Testing, Network Consultation and Integration , Education and Training / )
Engineering and R&D (ER&D) : [ Embedded Services Engineering Services ] /
Offshore and Onshore Product Development
BPM : [ / Customer Interaction and Support (CIS) , Finance and Accounting (F&A) , Human Resource Management (HRM), Knowledge Services Procurement and Logistics ]
Key Trends in the BPM sub-sector
Verticulization: / Emergence of Big Data: / Continued locational advantage / Emergence of Knowledge Services specialization:/ Increasing use of Social Media and Internet for Customer Relationship Management (CRM):
Helpdesk: Helpdesk is an entity to which the customers will report their IT problems. IT Service Helpdesk Attendant is responsible for managing the helpdesk.
IT-ITeS : Information Technology - Information Technology enabled Services / KPO Knowledge Process Outsourcing/ LPO Legal Process Outsourcing/ IPO Information Process Outsourcing/ MOLE Ministry of Labor and Employment/ NSQF National Skill Qualification Framework / NVEQF National Vocational Education Qualifications Framework / NVQF National Vocational Qualifications Framework / UGC University Grants Commission / MHRD Ministry of Human Resource Development / NOS National Occupational Standard(s) /
History of Computers: Functions of Computer : a. Accepts data - Input b. Processes data - Processing c. Produces output - Output d. Stores results – Storage / Computer System : COMPUTER SYSTEM = HARDWARE + SOFTWARE+ USER / Generations of Computers : First Generation (1940-56): used vacuum tubes & machine language was used for giving the instructions. Were large in size & their programming was difficult task. The electricity consumption was very high. Some computers of this generation are ENIAC, EDVAC, EDSAC & UNIVAC-1. / Second Generation (1956-63): vacuum tubes were replaced by transistors. They required only 1/10 of power required by tubes. This generation computer generated less heat & were reliable. The first operating system developed in this generation. / The Third Generation (1964-71): The 3rd generation computers replaced transistors with Integrated circuit known as chip(IC). From Small scale integrated circuits which had 10 transistors per chip(SSI), technology developed to MSI circuits with 100 transistors per chip. These computers were smaller, faster & more reliable. High level languages invented in this generation./ The fourth Generation (1972- present): LSI & VLSI were used in this generation. As a result, microprocessors came into existence. The computers using this technology known to be Micro Computers. High capacity hard disk were invented. There is great development in data communication./ The Fifth Generation (Present & Beyond): Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. / Architecture of Computers : INPUT DEVICES/OUTPUT DEVICES/ CPU/STORAGE DEVICES / Windows and its components: The main components of Windows when you start your computer are the Desktop, My Computer, Recycle Bin, Start Button, Taskbar, and shortcuts to applications./ The Desktop is the very first screen you see after Windows starts. / My Computer icon on the desktop, it will open a window similar to the one shown below, where you can navigate between the computer's drives and Control Panel tools. / When you delete a file from your computer's hard drive, it is removed to the folder called Recycle Bin. Files deleted from your hard drive are still available for restoring if needed, unless you empty your Recycle Bin. To restore the files, open the Recycle Bin folder by double-clicking the icon on your desktop, select the file and then select Restore./ To clear the Recycle Bin, select Empty Recycle Bin and the files will be permanently removed from your computer./ Minimize/Maximize/Close Buttons In the top-right corner of your document are the Minimize/Maximize/Close buttons. The first one when clicked minimize your screen, sending it to the taskbar. The second one maximize your screen, filling all desktop with the document you are working with. The last button is used to close your document. / Start Menu: Start Menu By clicking the Start button, in the very bottom-left corner of the screen, a vertical window will come up with the Start Menu. The list of submenus in the pop-up window let you navigate and select the application you want to run/ Taskbar: The Taskbar is the row at the bottom of the Windows screen where all currently open applications or files are listed. / Shortcut: A shortcut creates a button or icon which typically stays on the desktop and when clicked, quickly allows you to start a program or open a file without having to go to its permanent location on your computer./
The personal computer (PC): a computer designed for general use by a single person. /Systems that run the Windows operating system. PCs were first known as microcomputers because they were a complete computer but built on a smaller scale than the huge systems in use by most businesses. / notebooks, laptops; are portable computers that integrate the display, keyboard, a pointing device or trackball, processor, memory and hard drive all in a battery-operated package /Personal Digital Assistants (PDAs); are tightly integrated computers that often use flash memory instead of a hard drive for storage. These computers usually do not have keyboards but rely on touch screen technology for user input. very lightweight with a reasonable battery life./ Workstation; is simply a desktop computer that has a more powerful processor, additional memory and enhanced capabilities for performing a special group of task, such as 3D Graphics or game development. / Server A computer that has been optimized to provide services to other computers over a network. Servers usually have powerful processors, lots of memory and large hard drives. The next type of computer can fill an entire room. / Mainframe : huge computers that could fill an entire room or even a whole floor!, in large companies to describe the huge machines processing millions of transactions every day. / Wearable Computer ; The latest trend in computing is wearable computers. Essentially, common computer applications (e-mail, database, multimedia, calendar/scheduler) are integrated into watches, cell phones, visors and even clothing. / Computer Hardware and Software : Computer hardware includes all the electrical, mechanical, and the electronic parts of a computer. Any part that we can see or touch is the hard ware./ Advantages and disadvantages of computers / Applications of Computers: Business:/education/Ecommerce /Medical/science/ Communication/
ICT SKILL
ICT stands for Information and CommunicationTechnology. ICT refers to all the methods, tools,concepts related to storing, recording and sending digital information.
A computer system consists of two main parts—the hardware and the software. The physical parts that we can see and touch are called hardware. It is the machinery of a computer.These are the keyboard, monitor, CPU, mouse, printer etc/ Software is a programs use to operate computers or perform specific task.
Operating System: interface between user and computer/ Functions: file and folder management, device management, memory management, process management /Mobile OS:✓ Android ✓ Symbian ✓ Windows Phone✓ iOS /Computer OS:Linux: Free and Open Source OS ,Windows: Developed by Microsoft , BOSS(Bharat Operating System Solutions), Solaris: Free Unix based Operating system /
BIOS A computer automatically runs a basic program called BIOS (Basic Input/Output System) as soon as it is switched on or the power button is pushed on. The BIOS first does a self-test. If the self-test shows that the system is fine, the BIOS will load the Operating System
A login and password is like a key to the lock which allows you to use the computer.
Recycle bin: Files and folders deleted by the user are stored in the Recycle Bin. /File: that contains information in form of text /Folder is a location in computer hardisk: where you can store files and other folders/Start button It is located on the left of the taskbar. Clicking the Start button opens the Start menu and provides access to programs and features/Shut Down:- allows the user to turn off the computer / Control panel: - This allows the user to change various settings of computer/ Search Box: - This allows the user to search a file or a folder / Regular maintenance of the system includes: /CTRL+z — undo CTRL+y — redo CTRL+a — select all CTRL+x — cut CTRL+c — copy CTRL+v — paste CTRL+p — print CTRL+s — save /
Using Keyboard:
Function Keys Keys labeled from F1 to F12 are function keys. /Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB, are special control keys that perform special functions /Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE DOWN are navigation keys. /Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys.
Using a Mouse :
Point and Click When you click a particular file, it gets selected /Roll Over or Hover Some actions can be done by simply rolling over or hovering over an item. When you bring the mouse over a file in File Explorer, it will show the details of that file/Drag and Drop To move an item, you need to click it, and then holding the mouse button down, move the item to a new location. After you move the item to the new location, you release the mouse button. This is called drag and drop. Double-click Double-clicking means to quickly click the left mouse button twice. When we double click on a file, it will open the file /
Backup : Your Data Backing up data means to save the information present on your computer on another device, such as CD/DVD drives as shown in Figure 3.28 or hard disk. Data can recovered from here in case the computer stops working completely
Notepad (a type of computer application to create simple text files) will have the extension .txt. There are other types like .doc, .xls, etc. An image file usually has an extension .jpg while a sound file usually has .mp3.
Protecting your Data :Use passwords to login to your computer: Install Anti-virus and Firewall: Encrypt Data: Visit only Secure sites:
Threats to Computer
Virus: Viruses are computer programs that can damage the data and software programs or steal the information stored on a computer. / Trojan Horse: It appears to be a useful software program but once it reaches a computer it starts behaving like a virus and destroying data / Worms: These are viruses that replicate themselves and spread /Internet Scams: Sometimes you may receive very attractive offers saying you have won a huge money in a lottery and that you can claim the prize by depositing a certain amount of money. When you deposit the money using credit card or online banking, you not only lose the deposit money but your card / account information may be misused later /Software Piracy: This is stealing of software and includes using or distributing unlicensed and unauthorised copies of a computer program or software./ Identity theft : Where a hacker steals your personal information and assumes your identity. Using this false identity, the hacker can gain access to your account information or perform illegal activity.
spam mails :we get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called SPAM. We should never respond to SPAM and delete it on a regular basis.
Basic Tips for Taking Care of Devices: 1. keep the screen, keyboard and mouse clean.(First we should not eat anything over a keyboard.You can clean a keyboard with a soft brush. Avoid eating and keeping glasses of water or cups of coffee near a computer ) 2. Handle and move your laptop carefully and avoid dropping or banging it against a hard surface. Even a short fall can damage the screen or the hard disk and make the device useless. 3.Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal parts can be damaged. 4.Do not overcharge your battery: Sometimes we keep a device plugged in for charging even after it is fully charged. If we leave the device plugged in for a long time 5.Do not run too many programs at a time.the computer can become slow and even crash.
M.S. Office& Data Confidentiality; It was first announced by Bill Gates on 1 August 1988
Microsoft Word and its working: MS word can be explained as a word processor. Microsoft Word is a full-featured word processing program for writing and editing text documents. Word includes tools that let multiple users share information and collaboratively edit documents. Word has useful tools to prepare documents. Word is included in every edition of Microsoft Office2007.