BENEFITS TO PARTICIPANTS
On completion of the Programme, the participants will be able to -
1. Make Error free data entry
2. Take Data backup with due care & restore the data
3. Identify problems in the computer hardware devices like keyboard, printer, CPU, monitor, UPS, scanner etc.
4. Update anti-virus software
5. Monitor UPS and battery performance
6. Utilise optimally various features available in the application software.
7. Use Office package effectively for organisational requirements like
Office correspondence, simple calculations, accounting,
forecasting & budgeting and preparing business presentations
8. Use Internet effectively for searching information and to Send & receive e-mails
9. Update website contents
10. Maintain inventory of IT Assets
11. Resolve minor operational problems while using application software
12. Ensure use of licensed software
13. Maintain secrecy of the confidential data
ORGANISATIONAL BENEFITS
The course will enable the organization -
1. To Develop a strong IT culture in the organisation
2. To gear up towards paperless functioning by increased IT enabling activities
3. To ensure full utilisation of application software
4. To broaden the base of office automation
5. To provide better services through reduced IT operational problems
6. To optimize the budgets through reduced maintenance cost on IT - hardware, software and network
7. To ensure optimal performance of application software deployed to take care of requirements of various departments/sections
8. To facilitate implementation of latest IT solutions for software and hardware within the organisation
9. To take timely decisions on upgradation/replacement of hardware, software set up by maintaining IT assets inventory scientifically
10. To ensure prolonged life cycle of IT assets through appropriate routine maintenance.
11. To enable effective and efficient usage of IT set up in the organisation
12. To establish appropriate accountability through segregation of roles and responsibilities of users
13. To develop conducive environment through the reduced instances of IT related crimes and frauds
14. To facilitate development of Information Security framework and policies ensuring protected environment for data security