Information Technology Management : MBA-109Lecture No.DescriptionLecture ByLecture 1 CPULecture by A, Lecture by B, Lecture by C, Lecture by DLecture 2 Computer Memory & Mass Storage DevicesLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 3 Computer HierarchyLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 4 Input TechnologiesLecture by Dr. Sudhir Dawra, Lecture by , Lecture by C, Lecture by DLecture 5 Output TechnologiesLecture by Dr. Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 6 Number System & ArithmeticLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 7 Decimal, Binary SystemsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 8 Octal & Hexadecimal Number systemLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 9 Binary ArithmeticLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 10 Application & System SoftwareLecture by Dr.Sudhir Dawra , Lecture by B, Lecture by C, Lecture by DLecture 11 Programming Language & their ClassificationLecture by Dr.Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 12 Compilers & InterpretersLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 13 Process of Software DevelopmentLecture by Dr. Sudhir Dabra, Lecture by B, Lecture by C, Lecture by DLecture 14 Data Analysing using Spreadsheets Operating SystemLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 15 Function Of Operating SystemLecture by Dr.Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 16 Types of Operating SystemLecture by Dr.Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 17 Batch Processing, Multi TaskingLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 18 Multi programming & Real Time SystemsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 19 DBMS: Traditional File Concepts & EnvironmentsLecture by Dr. Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 20 Database Managements System ConceptsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 21 Types Of Data ModelsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 22 ER ModellingLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 23 Integrity ConstraintsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 24 SQL QueriesLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 25 Concept of Data communicationLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 26 Types of Data Communication NetworksLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 27 Communication MediaLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 28 Concept of Computer NetworksLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 29 Primary Network TopologiesLecture by Dr. Sudhir Dawra, Lecture by B, Lecture by C, Lecture by DLecture 30 Network Architectures – The OSI ModelLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 31 Inter-Networking DeviceLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 32 The Internet, Intranet, ExtranetsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 33 Operation of the InternetLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 34 Services Provided by InternetLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 35 World Wide WebLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 36 Creating Web Pages using HTMLLecture by Dr.Sudhir Dawra , Lecture by Dr.Sudhir Dawra, Lecture by C, Lecture by DLecture 37 Intranets & ExtranetsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 38 Data, Information & Knowledge ConceptsLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 39 Decision Making ProcessLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 40 Physical Components of Information SystemLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 41 Classification of Information SystemLecture by A, Lecture by B, Lecture by C, Lecture by DLecture 42 Overview of Security Issues in Information Technology-1Lecture by A, Lecture by B, Lecture by C, Lecture by DLecture 43 Overview of Security Issues in Information Technology-2Lecture by A, Lecture by B, Lecture by C, Lecture by DLecture 44 Emerging Trends in Information Technology-1Lecture by A, Lecture by B, Lecture by C, Lecture by DLecture 45 Emerging Trends in Information Technology-2Lecture by A, Lecture by B, Lecture by C, Lecture by DInformation Technology Management : MBA-109 was last modified: January 29th, 2022 by admin Share Facebook Twitter Google + Pinterest