Applications of Computer in Business by Gerald Okeke PDF free download

Gerald Okeke Applications of Computer in Business PDF, was published in 2008 and uploaded for 200-level Administration, Social and Management science students of National Open University of Nigeria (NOUN), offering SMS208, CIT202 course. This ebook can be downloaded for FREE online on this page.

Applications of Computer in Business ebook can be used to learn computer applications, computer hardware, computer software, computer operations, operating systems, Computer Application Systems, Database Management System, Systems Development Life Cycle, computer networks, internet, computer security, Information Communication Technology, Processing Devices, storage, input Devices output Devices.

Technical Details
Updated at:
Size: 3.38 MB
Number of points needed for download: 19
Number of downloads: 11

Books related to Applications of Computer in Business

Computers in Organizations

Author: Madu Galadina, Musa Abraham Abaka

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: BUS701

Topics: Information Communication Technology, Computer, Computing, e System Unit, Central Processing Unit, Input Devices, Output Devices, Storage Devices, Memory, Databases, Computer Networks, Database Management System, Database Queries, Enterprise Databases, Data Warehouses, Computer Networks, Networking Technologies, Distributed Networks, Internet, Communications Networks, Wireless Communications Networks, World Wide Web, Electronic Commerce, Electronic Business, Project Management, Enterprise Applications, Web Based Application

Database Systems, 6th edition

Author: Thomas Connolly, Carolyn Begg

School: Edo University

Department: Science and Technology

Course Code: CMP222, CMP214

Topics: Database Systems, database environment, database languages, data definition language, data models conceptual modeling, database architectures, Multi-user DBMS Architectures, teleprocessing, Distributed DBMSs, data warehousing, cloud computing, Oracle Architecture, relational models, relational calculus, SQL, writing SQL commands, data manipulation, advanced SQL, object-relational DBMs, Database System Development Lifecycle, database analysis, database design, database planning, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, normalization, Data Redundancy, Advanced Normalization, database security, data administration, database administration, concurrency control, database recovery, query processing, query optimization, distributed DBMs, Distributed Transaction Management, Distributed Concurrency Control, Distributed Deadlock Management, Distributed Database Recovery, data replication, data Replication Architecture, data Replication Schemes, object oriented DBMs, Scripting Languages, web, Common Gateway Interface, HTTP cookies, Microsoft’s Web Platform, JAVA, Oracle Internet Platform, Semi structured Data, XML, XML schema, XML Query Languages, Data Warehouse Architecture, Data Warehousing Tools, Data Warehousing Technologies, Data Warehousing Using Oracle, data mart, Data Warehousing Design, Online Analytical Processing, data mining, oracle data mining

Information System Security Management

Author: AD Ikuomola

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS343

Topics: Information System Security Management, Information gathering, Information security, system analysis, system design, Information system security, information security integration, information communication technology, information assurance, information systems usability, business security, Risk assessment, Risk mitigation options, Mitigating economic risk, Information age militaries, Information technology impacts, information security investment

Database Management Application System

Author: Gerald Okereke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: MBA859

Topics: Database Management Application System, Database, Database Models, Structured Query Languages, Information Systems Security, Database Administrator, database Administration, Document Management System

Fundamentals of Database Management Systems ,2nd Edition

Author: Mark Gillenson

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: DATA MODELING, data, DATABASE MANAGEMENT SYSTEM, Relational Data Retrieval, Relational Database Model, Logical Database Design, Physical Database Design, Object-Oriented Database Management, Data Administration, Database Administration, Data Dictionaries, Database Control Issues, Security, Backup, Recovery, Concurrency, Client Database, Server Database, Distributed Database, Data Warehouse

Operating System Concepts, 10th edition

Author: Abraham Silberschatz, Greg Gagne, Peter Galvin

School: Edo University

Department: Science and Technology

Course Code: CSC212

Topics: Operating System, Computer-System Organization, Computer-System Architecture, Operating-System Operations, Operating-System Structures, Operating-System Services, user interface, operating system interface, distributed systems, kernel data structures, Operating-System Debugging, process management, process scheduling, interprocess communication, Multicore Programming, Multithreading Models, Implicit Threading, CPU Scheduling, Multi-Processor Scheduling, Real-Time CPU Scheduling, Algorithm Evaluation, process synchronization, POSIX Synchronization, dead locks, memory management, Contiguous Memory Allocation, virtual memory, storage management, HDD Scheduling, NVM Scheduling, error detection, storage device management, RAID structure, file system, file-system interface, file-system implementation, file-system structure, file-system operations, directory implementation, Free-Space Management, File-System Internals, File-System Mounting, file sharing, virtual file systems, remote file systems, security, program threats, Cryptography, Role-Based Access Control, access matrix, virtual machines, networks, Distributed File Systems, remote file access, Linux system, Kernel Modules, programmer interface

Database System Concepts ,7th edition

Author: Abraham Silberschatz, Henry Korth, S Sudarshan

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Relational Model, Intermediate SQL, SQL, Advanced SQL, Database Design, E-R Model, Relational Database Design, database design, Complex Data Types, Data Analytics, big data, Physical Storage Systems, Data Storage Structures, Indexing, big data analytics, storage management, Query Processing, Query Optimization, Transactions, Transaction management, Concurrency Control, Recovery System, Database System Architectures, Parallel Storage, Distributed Storage, Parallel database, Distributed database, Parallel Query Processing, Distributed Query Processing, Parallel Transaction Processing, Distributed Transaction Processing, Advanced Indexing Techniques, Indexing Techniques, Blockchain Databases

Management Information System

Author: Samuel Toyosi Daniel, Adelowo Oluremi, Bilkisu Katagum

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: BUS401

Topics: Management Information System, DATA PROCESSING, HARDWARE COMPONENTS, memory, DATA Processing, DATA CAPTURING, REPORTING DEVICES, DATA STORAGE DEVICES, FILE ORGANIZATION, DATA PROCESSING TECHNIQUE, TRADITIONAL FILE SYSTEM PROCESSING, DATABASE PROCESSING, DATA PROCESSING PERSONNEL, EVENT PROGRAMMING, VISUAL PROGRAMMING, SYSTEM CLASSIFICATION, SYSTEM, FILE PROCESSING, IT ARCHITECTS, IT INFRASTRUCTURE, ELECTRONIC COMMERCE, E-COMMERCE MERITS, GLOBALIZATION, INTERNATIONAL INSTITUTIONS

Contemporary security studies ,3rd edition

Author: Alan collins

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS381

Topics: realism, liberalism, historical materialism, peace studies, security studies, critical security studies, social constructivism, human security, gender and security, securitization, Military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarion intervention, energy security, defence trade, health and security, transnational crime, cyber-security, child soldiers

Effective Security Management ,Seventh Edition

Author: Charles Sennewald, Curtis Baillie

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245, CSS744

Topics: security management, Organizational structure, security director’s role, security supervisor’s role, individual security employee, Ethics, conflicts of interest, Security personnel management, Hiring security personnel, Discipline, Promotions, Communication, Operational management, Planning, budgeting, Program management, Problem solving, risk, Crisis management, security survey, International security standards, Office administration, Written policies, Written procedures, effective security management, security management tool, security management, Community relations, Mismanagement, Jackass management traits

Software Engineering, Tenth Edition

Author: Ian sommerville

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MCE303, MCE506

Topics: software processes, agile software development, requirements engineering, system modelling, architectural design, design and implementation, software testing, software evolution, system dependability, system security, dependable systems, reliability engineering, safety engineering, security engineering, resilience engineering, advanced software engineering, software reuse, component-based software engineering, distributed software engineering, service-oriented software engineering, systems engineering, systems of systems, real-time software engineering, software management, project management, project planning, quality management, configuration management

Security Planning, Development and Organization

Author: Darlington Ikpi

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS245

Topics: Security Planning, Company Business Interest, Security Planning, Security Development, Security Organization, Private Security Operation, Public Security, Private Security, Security Survey System, National Interest, Security Staff, Security Staff Supervisors, Patrol Procedures, Patrol Techniques, Loss Prevention, loss Control, Security Policy, Security Design, Security Procedures

Contemporary Security Studies, Third Edition

Author: Alan Collins

School: Obafemi Awolowo University

Department: Administration, Social and Management science

Course Code: IRS208

Topics: Contemporary Security Studies, realism, liberalism, historical materialism, peace studies, critical security studies, social constructivism, human security, gender, security, securitization, military security, regime security, societal security, environmental security, economic security, globalization, development, security, traditional security, non-traditional security, coercive diplomacy, weapons of mass destruction, terrorism, humanitarian intervention, energy security, defence trade, health and security, transnational crime, cyber security, child soldiers

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Public and Private Security Partnership

Author: Moses Ikoh

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: CSS807

Topics: Public and Private Security Partnership, Public-Private Security, Liberalization of Security, Public-Private Partnerships for Security, Security cooperation, Inclusive Security, National Security, Value of Security, Community Security, Social Cohesion, Security partnership, Security collaborations, Critical Security Targets

Using Information Technology ,11th edition

Author: Brian Williams, Stacey Sawyer

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: JLS843

Topics: Information Technology, internet, world wide web, software, hardware, Central processing Unit, storage, communications, networks, cyberthreats, personal technology, big data, digital age

Database Systems A Practical Approach to Design, Implementation, and Management ,6th edition

Author: Thomas Connolly, Caroline Begg

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Database Environment, Database Architecture, Relational Model, Relational languages, Relational Algebra, Relational Calculus, Data Manipulation, Data Definition, Advanced SQL, SQL, Object-Relational DBMSs, Database Analysis, Database Design, Database System Development Lifecycle, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, Normalization, Advanced Normalization, Conceptual Database Design, Logical Database Design, Physical Database Design, Database Issues, Data Management, Transaction Management, Query Processing, Distributed DBMSs, Replication, Mobile Databases, Object-Oriented DBMS, Object DBMSs, Web Technology, Semistructured Data, Business Intelligence, Data Warehousing, Data Warehousing Design, OLAP, Data mining

Concise Guide to Software Engineering

Author: Gerard O'Regan

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MCE303, MCE506

Topics: Software Project Management, Requirements Engineering, Software Design, Software Development, Configuration Management, Software Inspections, Software Testing, Supplier Selection, Supplier Management, Software Quality Assurance, Software Metrics, Problem-Solving, Software Reliability, Software Dependability, formal methods, formal specification language, unified modelling language, software process improvement, capability maturity model integration, software engineering tools, agile methodology, miscellany of innovation

Management Information System

Author: Gerald Okeke

School: National Open University of Nigeria

Department: Administration, Social and Management science

Course Code: MBA815

Topics: Management Information System, Systems Development Life Cycle, Information System Development Methods, Strategic Planning, System Design, Design of System, Dynamic Systems Development Method, Project Management, Project Planning, Risk Assessments, risk Management

Introduction to Computer System and Characteristics

Author: DO Aborisade

School: Federal University of Agriculture, Abeokuta

Department: Science and Technology

Course Code: CSC201

Topics: Computer System, computer history, computer generations, vacuum tubes, transistors, Microprocessors, Integrated Circuits, Artificial Intelligence, computer components, RAM, ROM, control unit, Arithmetic and Logic Unit, Input Hardware, keyboard, mouse, Input Hardware-Pointing devices, Composite input devices, Audio input devices, Imaging devices, Video input devices, output hardware

Past Questions related to Applications of Computer in Business

Communication engineering studio 2

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE503

Topics: Communication engineering studio, intercom system, side tone connection, communication process, transmission media, communication setup, communication system software, honey spot, service denial, eavesdropping, spoof, information leakage, data lose, hardware failure, telephone system, full duplex communications, wireless communication, telephone system side tone connection, communication systems software, information protection strategies, Antenna, Antenna radiation patterns, optical fiber, Friis transmission formula, communication systems security, communication systems protection

Information security policy

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB208

Topics: Cyber security consultant, chief information Security officer, Nigeria Data Protection Regulation, General Data Protection Regulation, information Security projects, information Security Policy

Basic Question and Answer on Computer, Internet and Information Technology For MTN by mypastquestion

Year: 2019

School: Scholarships

Department:

Course Code: MTN

Topics: Computer, Internet, Information Technology

FSB Scholarship Question and Answer on Computer, Internet, IT and Telecom

Year: 2019

School: Scholarships

Department:

Course Code: FSB

Topics: Computer, Internet, Information Technology

Introduction to Computer Science 1 study questions

Year: 2017

School: University of Ilorin

Department: Science and Technology

Course Code: CSC111

Topics: data, information, storage device, memory, flowchart, pseudo code, number system, boolean algebra, Karnaugh map, logic gate, operating system, system software, application software

Management Accounting II

Year: 2021

School: Air Force Institute of Technology

Department: Administration, Social and Management science

Course Code: ACC304

Topics: Management Accounting, Standard cost, labor rate variance, material price variance, life cycle costing, kaizen costing

Management principles

Year: 2020

School: Nnamdi Azikiwe University

Department: Administration, Social and Management science

Course Code: BUS204

Topics: Management principles, human resource manager, staffing, staffing process, management development, employee training, performance appraisal, leader, leadership, manager, motivation, economic system, business environment

Enterprise and Perimeter Security

Year: 2021

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB206

Topics: Active network attacks, cloud computing, passive network attacks, network security, Enterprise Security, Perimeter Security

PROCESSING AND STORAGE OF AGRICULTURAL FOOD PRODUCTS

Year: 2018

School: Federal University of Technology, Owerri

Department: Agriculture and Veterinary Medicine

Course Code: AGR306

Topics: quality control, bio materials, meat processing, natural casing, milk, slaughtering, stunning, fish preservation, water quality, silage, snail, timber processing

554 likely questions on Introduction to Computer Science by casrich

Year: 2021

School: University of Nigeria, Nsukka

Department: Science and Technology

Course Code: COS101

Topics: Computer Science, Hardware, Software, Central Processing Unit, networking, memory, computer classification, input device, output device

Partial automatic labouratory

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: MCE513

Topics: Partial automatic laboratory, Programmable Logic Controller internal architecture, Programmable Logic Controller address bus, Programmable Logic Controller input processing, Programmable Logic Controller output processing, Programmable Logic Controller output channels, Programmable Logic Controller program scan, latching, latched circuits, reed switch, incremental shaft encoder, photoelectric transmissive switch, diaphragm pressure switch, field bus, OSI model, repeater, bridge, router, SCADA system, SCADA architecture, batch mixing system

Microwave communication system

Year: 2019

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: COE504

Topics: Microwave communication system, microwave design, fresnel zone, microwave system application, satellite, downlink carrier-to-noise ration, overall system carrier-to-noise ratio, satellite transponder system, FDMA Network, satellite anatomy, Radio frequency combiner, satellite communication system, microwave communication system, microwave link

Multimedia systems and technologies

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE409

Topics: Multimedia systems, multimedia technology technologies, multimedia, HCI design, hypertext, hypermedia, output device, communication devices, storage device, multimedia conferencing, data compressor, distributed computing, distributed multimedia system

Petroleum production engineering 2

Year: 2020

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: PET405

Topics: Petroleum production engineering, surface production operations, horizontal separator, vertical separator, operating temperature, separator coefficient, operating pressure, commercial absorbents, gas flow rate, gas specific gravity, operating line pressure, gas inlet temperature, emulsion formation

Tests related to Applications of Computer in Business

Biology (JAMB)

School: WAEC, JAMB & POST UTME

Department:

Course Code: JAMB

Topics: JAMB, UTME, biology, Plant cell, fern, plant biology, nutrition, circulatory system, osmoregulation, ecology, variation, hereditary, gene, chromosome, evolution

Mathematics (JAMB)

School: WAEC, JAMB & POST UTME

Department:

Course Code: JAMB

Topics: Mathematics, JAMB, Logarithm, standard form, permutation, combination, number system, set, ratio, indices, factorization, inequality