SCS 1101 Handout
SCS 1101 Handout
The term computer is derived from the Latin word compute, which means to calculate. A
computer is an electronic machine, devised for performing calculations and controlling operations
that can be expressed either in logical or numerical terms. In simple terms, a computer is an
electronic device that performs diverse operations with the help of instructions to process the
information in order to achieve the desired results. Computer application extends to cover huge area
including education, industries, government, medicine, scientific research etc.
A computer is one of the most influential forces available in modern times. Due to its
memory, high speed and perfection, its application can be extended to almost infinite levels.
Millions of complex calculations can be done in mere fraction of time. Difficult decisions can be
made with accuracy for comparatively little cost. Computers are widely seen as instruments for
future progress and as tools to achieve substantiality by way of improved access to information by
means of video conferencing and e- mail. Indeed computers have left such an impression on modern
civilization that we call this era as the information age.
Characteristics of Computers
The main characteristics of computers are:
a) Speed
b) Storage
c) Accuracy
d) Versatility
e) Automation
f) Diligence
g) Reliability
a) Speed :
Computers are capable of carrying out the task with enormous speed. Today‟s computers,
according to their class, can perform from 4 MIPS (Millions of instructions per second) to 100
MIPS. What may take days for manual calculations may take only a few hours for computers to
perform. Inside the computer the information signal travels at incredible electronic speed.
b) Storage:
Computers can store enormous quantity of information. Which is expressed in terms of
Kilobytes (or) Mega Bytes (MB) or Gega Bytes (GB). It is achieved through its „Main memory‟ or
„Primary storage‟ and through „auxiliary storage‟ or „Secondary storage‟. The Hard disks Floppy
disk, Compact Disc(CD) and Magnetic Tape storage are examples of secondary storages. These
large volumes of storage occupy much lesser space compared to paper documents and this aspect of
computers makes them more powerful.
c) Accuracy:
The accuracy of a Computer is consistently high. In fact, this quality of the computers make
them indispensable in various fields such as Scientific Research, Space Research, Weather
Predictions and many other areas where precision of a high order is required. The accuracy of the
computer is best achieved by programming them in the most efficient manner. When it comes to
very complex mathematical or scientific problem the computer‟s accuracy has no substitute.
1
d) Versatility:
Computers are versatile in that they can perform almost any task, provided they are given
the appropriate logical steps. For example, they are capable of performing wide ranging tasks such
as construction of a payroll, inventory management in a factory, hotel billing, hospital management,
banking applications and any imaginable task in every walk of life.
e) Automation:
The biggest advantage of computers is that it is automatic in its operation. Once a programming
logic is initiated the computer performs repeated operations without human interventions until
program completion.
f) Diligence:
Computers are machines and that do not get tired or „lose concentration‟ like human beings.
If a large number of calculations say million calculations are to be performed the resultant output
will remain exactly the same even if operations are repeated any number of times. But when a
human being is asked to do the same job this consistency cannot be achieved. Thus for those who
want consistent and continuous standard output, computer‟s „diligence‟ is of great help.
g) Reliability:
The computers give very accurate results with predetermined values. They correct and
modify the parameters automatically, giving suitable signals. They give formatted results with high
degree of precisions.
Computer Generations
Introduction
The history of computer development is often discussed with reference to different
generations of computing devices. In computer terminology, the word generation is described as a
stage of technological development or innovation/evolution. A major technological development
that fundamentally changed the way computers operate resulting in increasingly smaller, cheaper,
more powerful and more efficient and reliable devices characterize each generation of computers.
Generations of Computers
2
These computers were very large, and required a lot of space for installation.
Since thousands of vacuum tubes were used, they generated a large amount of heat. Therefore,
air conditioning was essential.
These were non-portable and very slow equipments.
The lacked in versatility and speed.
They were very expensive to operate and used a large amount of electricity.
These machines were unreliable and prone to frequent hardware failures. Hence, constant
maintenance was required.
Since machine language was used, these computers were difficult to program and use.
Each individual component had to be assembled manually. Hence, commercial appeal of these
computers was poor.
The smaller size of components saw mass production of computers which became
cheaper. Many companies started buying and using them increasing the demand. Computer
programming languages developed further to make programming easier and user friendly. Yet if
you compare today‟s computers, they were a lot behind. The increased use of computers and the
consequent mass production sent the prices crashing down. Computer scientists and electronic
engineers were developing more sophisticated computers.
3
Characteristics of third generations computers:
These computers were based on integrated circuit (IC) technology.
They were able to reduce computational time from microseconds to nanoseconds.
They were easily portable and more reliable than the second generation.
These devices consumed less power and generated less heat. In some cases, air conditioning was
still required.
The size of these computers was smaller as compared to previous computers.
Since hardware rarely failed, the maintenance cost was quite low.
Extensive use of high- level languages became possible.
Manual assembling of individual components was not required, so it reduced the large
requirement of labour and cost. However, highly sophisticated technologies were required for
the manufacture of IC chips.
Commercial production became easier and cheaper.
4. Fourth Generation Computers (Early 1970s – till date): Micro processors
More and more circuits were packed in a microprocessor. The components were integrated
further and very large scale integration (VLSI) technology revolutionized computer field further.
Intel Corporation made chips such as 8080 and 8086 to be followed by 80286, 80386, 80486 and
now the Pentium processor. These chips perform calculations faster. They are not only used in
computers, but also in measuring devices and even in house hold devices such as washing
machines.
Computers using such VLSI chips progressively shrunk in size. Computers using the
microprocessors are termed as microcomputers. The software technology also developed further.
Programmers developed more sophisticated and user friendly software. In course of time, the cost
of these computers have come down so much that even individuals bought them so they came to be
known as personal computers.
Characteristics of Fourth generation computers:
Fourth generation computers are microprocessor-based systems.
These computers are very small.
Fourth generation computers are the cheapest among all the other generations.
They are portable and quite reliable.
These machines generate negligible amount of heat, hence they do not require air
conditioning.
Hardware failure is negligible so minimum maintenance is required.
The production cost is very low.
GUI and pointing devices enable users to learn to use the computer quickly.
Interconnection of computers leads to better communication and resource sharing.
4
amount of storage capacity. Mega chips may enable the computer to approximate the memory
capacity of the human mind.
Parallel Processing:
Most computers today access and execute only one instruction at a time. This is called serial
processing. However, a computer using parallel processing accesses several instructions at once and
works on them at the same time through use of multiple central processing units.
COMPUTER SYSTEM
1. Hardware
The physical components of the computer, such as electrical, electronics and mechanical
unit are known as the hardware of the computer. That is, the input units, output units and CPU are
called hardware. Thus hardware is the equipment involved in the function of a computer. It consists
of the components that can be physically handled. The function of these components is typically
divided into three main categories: input, output, and storage. Components in these categories
connect to microprocessors, output and storage. Components in these categories connect to
microprocessors, specifically, the computer's central processing unit (CPU), the electronic circuitry
that provides the computational ability and control of the computer, via wires or circuitry called a
bus.
2. Software:
The computer performs operations like addition, subtraction, multiplication and division
only when the user instructs it to do so. The user issues instructions and the CPU acts in accordance
with the instructions. The sets of instructions, which control the sequence of operations, are known
as programs, and collectively programs are called software. The software can be broadly classified
into two types. They are:
a. System Software
b. Application software
5
3. Human ware:
The man- machine interface is called a human ware. The people who work with the
computer are collectively called the human ware or livewire.
4. Firmware:
The computer programs permanently stored in ROM or PROM are called firmware. These
programs are provided by hardware manufacturer along with the computers. Generally these are
booting programs which help in the starting of a computer. Such programs cannot be erased or
overwritten.
5. Bridge ware:
The computer components and programs used to translate instructions and information
written for one type of computer into a format that another type of computer can understand is
called bridge ware. This is necessary because different computers are made by different
manufacturers.
INTRODUCTION:
A computer system consists of hardware, the physical unit (parts) of the computer that are
capable of computing and manipulating information and software (set of instructions or programs)
that carries out predefined tasks to complete a given job. The computer performs operations like
addition, subtraction, multiplication and division only when the user instructs it to do so. The user
issues instructions and the CPU acts in accordance with the instructions. The sets of instructions,
which control the sequence of operations, are known as programs, and collectively programs are
called software.
We can equate hardware and software with human body and human intelligence,
respectively. All human physical actions such as walking and eating are based on the thoughts and
feelings, which is raised by the brain. If the brain does not raise thoughts and feelings, we do not
perform any physical activity. Similarly, the actions and functioning of every hardware equipment
is driven by software. The combination of physical equipment (hardware) and logical instructions
(software) gives modern computing system their power and versatility.
6
(2) Output Unit
(3) Storage Unit
(4) Central Processing Unit [CPU] { the Control Unit and Arithmetic Logic Unit of a Computer
System are jointly known as Central Processing Unit
INPUT UNIT
The input unit is used for entering the data and instruction into the computer for
performing computation of the data. The input unit accepts or reads the list of instructions and
data and converts these instructions and data in computer acceptable form. It supplies the
converted instructions and data to the computer for further processing. The devices used for this
purpose are called as Input Devices. Key Board and Mouse are the important input devices used
in our offices. Light pen, Joy stick, tracker ball, Touch pad, Scanner and Pointing stick are some
of the Input Devices.
a) Key Board:
The keys in Computer keyboards are almost similar to the keys in a typewriter but in addition
there are some special operational keys carrying special symbols that help us in giving instructions
to computer.
b) Mouse:
Mouse is an essential component in the modern computers which use
Windows and other Graphical Use Interface [GUI] applications.
Mouse is a small service in which a small ball is kept inside and the
ball touches the pad through a hole at the bottom of the mouse. When
the mouse is held in hand pushed along a flat surface [mouse pad],
the ball inside the mouse rolls and this movement of the ball is
converted into electronic signals and sent to the computer, now we
get advanced versions of mouse like optical mouse, scroll mouse
cordless mouse etc. using the mouse the cursor [the small blinking
vertical line we see in the monitor ] can be moved in any direction.
The mouse is used for selecting part or full text or object, and also for
dragging and dropping the selected text or object.
How to handle the mouse?
When we slide the mouse left across the mouse pad the mouse pointer of the screen moves
left on the screen. When we slide it right the pointer moves right. When the mouse is moved
forward or backward, it causes the pointer to move up and down.
The following actions are performed with the mouse:
Clicking:
Keeping the mouse pointer at any position, if we click the mouse button the cursor will
move to that position.
Selecting:
To select a text for copying or deleting, keeping the mouse pointer at the beginning of the
text, click the mouse button [left button] and without releasing the finger move the mouse till the
end of the text and then release the finger. The text thus selected is highlighted and can be copied or
deleted.
7
Dragging:
After selecting the text as above, bring the mouse pointer at the selected text, press the left
mouse button with the finger and without releasing the finger drag the selected text to any desired
position.
Right clicking:
By pressing and releasing the right mouse button, the short cut menu is activated.
c) Scanner:
Scanner is an image acquisition device connected to the computer, which captures either
an image of a text document or a picture and transfers it into bits of information, which a
computer can understand and manipulate.
Uses of scanners:
Optical Character Recognition OCR – We can convert text based document images into text
that can be edited by a word – processing software. Enrich our presentations and documents by
adding images. Convert hard-copy images or documents into a fax format for faxing or for record
purpose. Add scanned images to our e- mil to enrich the content.
A sheet containing text can be scanned using the scanner and saved as an image file. There is
software to convert the image file once again into a text file.
Sheet fed scanner:
This scanner allows us to scan pieces of paper. The sheet
fed scanner is a less expensive solution when compared to the
flatbed scanner.
8
Card scan Scanner:
This scanner is mainly used to scan visiting cards for creating
data base of the addresses.
Card scan
Scanner
d) Punched cards
Punched cards are still in use as medium for recording data and instructions in the form of
punched holes to denote and then they are sequentially read by the card Reader. The card Reader
sends the data and instructions to the CPU to process them. The punched cards used for data
processing are made generally of 80 columns and 12 rows. Today 96 columns cards are available.
In these cards a hole in punched to represent the binary l. The absence of a hole represents binary 0.
If a card is punched wrongly, it cannot be corrected. Further, the punched cards are not reusable,
i.e., cannot be used for any other data. Many numbers of cards are required for the computer
programs. Such a collection of cards is called a deck. Each card has the left top corner cut to
identify the arrangement of the cards is correct or not. The cards are read by a Unit called a card
Reader. The punched cards are placed in the Read Hopper after verification. On receiving the
command from the control unit the device moves the cards one by one over two sub-devices. One of
which, sense the punched holes (0s and 1s) and transcribes the pulses to the CPU. Then the output is
given as per user specification.
Advantages
1. It is very easy to read data on the cards
2. The cards are less expensive than other storage media.
3. It is much simple to operate.
4. After inserting a card, if an error is detected, the whole system stops functioning.
Disadvantages
1. Punched cards are bulky when put together, so they require large space to store them.
2. The cards are easily damaged and perishable.
3. Transfer of data is relatively very slow.
4. An incorrectly punched card cannot be corrected, it must be replaced.
5. Unit Record machines require manual intervention at every stage.
6. Data is not processed in ordinary language. It has to be translated into something we can
understand.
e) Paper Tapes
The punched paper tape is a continuous strip of a paper about one inch wide and up to 300
meters long. The characters are recorded on tape, which may be 5 or 8 as per the design of the tape.
These punched positions are called as channels. It is the oldest media, of input and output media.
Her also, a hole represent 1 and its absence represents 0. Data from the tape is read through a Tape
Recorder per second. The tape comes in various forms viz., Oil paper, dry paper, metalized paper
and laminated paper.
Advantages
1. Compared to the punched card, it is more compact and economic on storage.
2. It is less in weight and easy for mailing etc.
Disadvantages
1. Since the roll is so long, correcting or inserting data can be very tedious process and time
consuming.
9
2. The life of the paper tape is short. This makes it inconvenient for storing over a long period. It
is not durable.
3. Moreover, it is sequential data processing medium.
f) Magnetic Tape
Because of the problems faced in the paper media, magnetic substances have come. First
among these was the magnetic tape. This is also a sequential media for normally between 1.25-
2cms. Wide and up to 900 meters long. It is made of plastic with a metallic magnetic oxide coating
on one side. Generally, data is recorded on either a 7 parallel-rack-tape or on a 9 parallel-track-tape.
Writing on and reading from the tape is done with the assistance of READ/WRITE head. The
number of characters per inch length of tape stored is called the 'density' of the tape. This varies
from 550 to 1600 or even 16K. The 9 Track tapes have the higher densities. Then comparing with
the punched card and punched tape, the magnetic tape has certain advantages and disadvantages.
Advantages
1. Data are stored very compactly.
2. It is very easy to handle the Magnetic Tape than the Deck of Cards.
3. The Magnetic tape costs less than the cards.
4. It requires less storage space for data and therefore has a large capacity.
5. It is reusable i.e., the old data can be wiped out and fresh information could be recorded on it.
6. The speed of transferring the data is very high comparing to paper devices.
Disadvantages
1. In magnetic tapes, the data has to be accessed sequentially. This makes the retrieval of data
slow.
2. The punched cards can be read visually, whereas to read the magnetic tape a I machine is
needed.
3. The tape is subject to the usual wear and tear of time.
4. Data will be erased if the tape is exposed or placed nearby any Magnetic field or high voltage
circuits.
g. Magnetic Disk
It is yet another step in the evolution of Input/Output devices. The Magnetic Disk has an
advantage over the punched cards and Magnetic Tapes i.e., the data stored on a disk can be read
randomly while in the magnetic tape, the data are read sequentially. Random access is that the
particular record in the file can be detected directly and the access time is saved. In Magnetic disk
the record is accessed in a fraction of second i.e., less than 0.01 sec. The disk varying in diameter
are generally coated on both sides with magnetic oxide. Each surface of the disk is divided into a
number of sectors, called storage segments. The storage segment is a specific portion of a specific
side of the disk. A segment can store one or more record of a file, which will vary according to the
size of the record. While searching, a particular record can randomly be selected and directly
accessed, because, each storage segment is uniquely marked by an address with side number, track
number, sector number etc.
10
i. Touch Screens
Touch Screens are another favorite "user friendly" method for feeding data into computer.
User can command the computer to perform various useful tasks simply by touching specific
sectors of the screen with their forefingers. The computer senses the Location of the finger in
various ways.
OUTPUT UNIT
The results of the data processed by the computer are available in electronic signals. The
output unit converts these signals into a form which could be easily understood by us. The output is
usually given either on the screen by visual display unit/monitor or in a printed form by printers.
This capability is known as resolution. The characters typed with the keyboard are displayed
on the screen. We can thus verify whether the programs we enter into computer is corrector not.
b) Printer
Printer is the most commonly used output device. It is used to prepare permanent documents
in human – readable form [hard copy]. There are several types of printers that are designed for
different types of applications.
Printers are of two types- impact and non impact. Impact printers use the familiar typewriter
approach of hammering a typeface against paper and inked ribbon. Non- impact printers do not hit
or impact a ribbon to print. They use thermal, electrostatic, chemical and inkjet technologies.
Depending on their speed and approach of printing, printers are also classified as
character printers, and page printers.
11
Types of Printers:
1. Dot Matrix Printer:
In this printer characters to print are made up of a finite
number of dots and so, the print head consists of an array of pins.
Characters to be printed are made up of a finite number of dots and so,
the printer. The character code is decoded by the printer electronics
and activates the appropriate pins in the print head. Many dot matrix
printers are bi-directional. i.e., they print from left to right as well as
from right to left on return. This enhances the speed of printing. The
printing speed is around 300 characters per Dot Matrix Printer second.
2. Line Printer:
Unlike a dot matrix printer, line printer prints a
complete line at a time. Two types of line printers are
available.
3. Drum Printer
It consists of cylindrical drum. The characters to
be printed are embossed on its surface.
Line Printer
4. Chain Printer:
It has a steel band on which the character sets are embossed. Printing speed varies from 150
lines to 2500 lines per minute with 96 to 160 characters on a15 inch line. Six to eight lines per
vertical inch are printed. Usually 64 and 96 character sets are used with English letters.
5. Inkjet Printer:
It consists of print heard, which has a number of small holes of
nozzles. Individual holes are heated very rapidly by an integrated
circuit resistor. When the resistor heats up, the ink near it vaporizes
and is ejected through the nozzle and makes a dot on paper placed
near the head. A high – resolution inkjet printer has around 50
nozzles within a height of 7mm and can print with a resolution of
more than 300 dots per inch. Latest inkjet printers have multimedia Inkjet Printer
heads, one per color , which allow color printing. The printing speed
is around 120 characters per second.
6. Laser Printers:
In laser printer an electronically controlled laser beam traces out
the desired character to be printed on a photo conductive drum
The drum attracts an ink toner on to the exposed areas. This
image is transferred to the paper, which comes in contract with
the drum.
The drum attracts an ink toner on to the exposed areas. This
image is transferred to the paper, which comes in contract with
the drum.
Very fast printers print 10,000 lines per minute. These printers
give excellent outputs and can print a variety of fonts. Laser Printer
Low speed laser printers, which can print 4 to 16 pages per
minute, are now very popular.
12
STORAGE UNIT AND CPU
The purpose of the storage unit of the computer is to store the data entered before processing
and also to store the results after processing. The Central Processing Unit [CPU] is the brain of any
computer system. In a computer system all major calculations and comparisons are made inside the
CPU. The CPU is also responsible for activating and controlling the operations of other units of a
computer system.
Storage Unit
This section of the memory is also referred to as backup storage because it is used to store
large volume of data on a permanent basis which can be partially transferred to the primary storage
as and when required for processing.
The storage capacity of the primary storage of today‟s computers is not sufficient to store
the large volume of time handled by most data processing centres. As a result, additional memory,
called auxiliary memory or secondary storage, is used with most computer systems.
Hard Disk, Floppy Disk, Tape and Compact Disc are the main secondary storage devices.
13
ii). Floppy Disk:
Floppy disk is flexible circular disk of diameter 3.inches made of
plastic coated with a magnetic material. This is housed in a square plastic
jacket. The floppy disk can store 1.4 Mbytes of data [also called 1.44Mnytes,
since it holds 1440Kytes]. Data recorded on a floppy disk is read and stored in
a computer‟s memory by a device called a floppy disk drive[FDD]. A floppy
disk is inserted in a slot of the FDD. Some of the floppies have limited life
time. The floppies have to be recycled periodically to keep them alive. A
frequently recycled floppy. [i.e used] will have a life time of 3to 4 years to do
recycling take out old floppies occasionally and try to read them once, at least
the directory.
iii). Compact Disk:
Since tape is a sequential, and not a random- access media, a tape drive has to wind through
a tape to locate a specific bit of data. This makes accessing data slow so tape is mainly used for
system backups and regular archiving of files and records.
Tape dives allow users to backup large amounts of data. Tape drives are capable of backing
up a couple hundred megabytes to several gigabytes of information without having to spend large
sums of money on disks.
14
standards but the most common is Digital Data Storage [DDS]. DAT
tapes can hold 2GB [SSS] to 40GB [DDS-4] of compressed data.
Micro Vault media plugs directly into the computer‟s SB port – and acts
just like another drive. It is small, light, Shock-proof and moisture
– proof. This nifty flash memory storage device is compact and durable
enough to carry in any pocket. The device is recognized automatically
when we connect it to the computer. By connecting it via USB, the files
can be transferred by dragging and dropping. There are no cables or
adaptors needed, no power cord and no driver software to install. It‟s
compatible with both Macintosh and Windows operating systems, and even comes with
software that password protects the contents of the device.
They are perfect for sharing PowerPoint presentations, digital photos, MPEG video and
MP3s, transporting files between work and home, or sharing files with friends and colleagues.
Central Processing Unit (CPU): This unit performs processing of instructions and data inside
the computer.
The Central Processing Unit [CPU] is the brain of any computer system. In a computer system all
major calculations and comparisons are made inside the CPU. The CPU is also responsible for
activating and controlling the operations of other units of a computer system.
The control unit and the arithmetic logic unit of a computer system are jointly known as the Central
Processing Unit. While the control unit takes care of the flow of data from input unit to storage unit
and the flow of final results to the output unit, the arithmetic logic unit is the place where the actual
execution of instructions taking place during the processing operation.
15
(a) Instruction Register
(b) Decoder
(c) Address Register and
(d) Instruction Counter
The instruction register receives one by one the instructions to be executed in the required
sequence. Then, the operation code of the instructions is transferred to decoder, which decodes the
operation code. And it activates the appropriate circuits of the arithmetic and logic unit to perform
the operation. The address register enables the data in the location specified in the instruction to be
transferred to a specified accumulator for the arithmetic and logic unit.
b) Arithmetic Logic Unit (ALU)
This unit performs two kinds of operations, the arithmetic processing and logical processing.
In arithmetic processing it performs all mathematical operations such as addition, subtraction,
multiplication and division. In logical processing, it performs the relational and logical operations
such as comparing larger or smaller values, true or false statements, etc.
c) Memory Unit
This unit holds the intermediate results during the course of calculations and provides the
data as and when required. This internal storage is also called primary memory or main memory.
This memory takes the data from an input device and stores it until the computer is ready to
process it. It also stores processed data and intermediate results. When the processing is finished,
it transfers the results to an output device.
HARDWARE SOFTWARE
1.It is the physical unit of the 1.It is a collection of programs to bring the
computer hardware system into operation
2. It has no permanent structure but can
2. It has permanent structure and be altered and reused
cannot be altered 3. It is not affected by these agents to
3. It is normally affected by agent some extent
like dust, heat, humidity, etc 4. It is written by a well versed
4. Hardware understands only programmer and generally in higher
machine language ,lower level level language which is readable by
language or binary human being
5. It is represented by the Higher Level
5. It works with binary code, the Languages such as BASIC, COBOL,
presence or absence of Pulses as 1‟s Etc.,
or 0‟s.
16
SOFTWARE
Software is a generic term for organized collection of computer data and instructions. It is
responsible for controlling, integrating, and managing the hardware components of a computer and
to accomplish specific tasks. In other words, software tells the computer what to do and how to do
it. For example, software instructs the hardware what to display on the user‟s screen, what kinds of
input to take from the user, and what kinds of output to generate. Thus, software communicates with
the hardware by organizing the control sequences, and the hardware carries out the instructions
defined by the software.
A computer needs to be instructed to perform any task. These instructions are given in the
form of computer programs, which are written in computer programming languages. A program
controls the activity of the processor. The moment the hardware (processor, memory, etc.), acts as
per the instructions of a program, the program is said to be in running or executing state.
A set of programs, which are specifically written to provide the user a precise functionality
like solving a specific problem is termed as a software package. For example, word processing
software package provides functionality to the computer so that it can be used to create text
documents like letters and mailing lists. Similarly, an image processing software package assists a
user in drawing and manipulating graphics.
FEATURES OF SOFTWARE
1. Ease of use
The software systems and applications are becoming more and more easy to use. In fact,
software developers and system analysts go to great lengths to ensure that the products they develop
are user- friendlier than their competitor‟s products.
3. Multi-platform capability
Today‟s software applications are not developed for just one platform. Most of the software
applications supports multiple platforms-both hardware and software platforms. There are software
applications that support hardware platforms ranging from mainframes to PCs and different
software platforms like MVS, Solaris, AIX, UNIX, Windows and so on. For example IBM‟s DB2
Universal database is available for a variety or hardware and software platforms.
Another important feature of today‟s software application is that they support multiple languages
and multiple currencies. Many vendors are providing their applications in many languages like
English, Arabic, Japanese, and Chinese and so on.
17
on. The two features –compatibility with earlier versions and compatibility with other products
make it easier for the users, as they can choose the application they want and still use the old files
they have created using other applications or using older versions of the same application.
5. Mail enabling
Mail enabled applications are designed to take advantage of on e- mail. These are the
familiar word processors, spreadsheets, and other individual desktop applications that have e-mail
features built to them. There is another class of message-centered programs that are built
specifically around e- mail functions.
6. Web enabling
With the ever- increasing popularity of internet and the amount of information that is
available on the net, most software applications are now web-enabled. Web enabling helps the user
in many different ways. Its use starts while the user is installing the application. During installation,
most of the applications will automatically connect to the Internet and to the vendor‟s web site and
will register their products (earlier one had to fill in a paper form and mail or fax it to the vendor).
The computer being a machine cannot perform on its own. It needs to be instructed to
perform even a simple task like adding two numbers. Computers work on a set of instructions called
computer software (programs), which clearly specify the ways to carry out a task.
CATEGORIES OF SOFTWARE
SYSTEM SOFTWARE:
System software consists of several programs, which are directly responsible for controlling,
integrating, and managing the individual hardware components of a computer system. You must
have noticed that a new computer system is always accompanied by some software, either stored in
a floppy or CD, which is supplied by the manufacturer. This software manages and supports the
computer system and its information processing activities.
System software is more transparent and less noticed by the users, they usually interact with
the hardware or the applications this software provides a programming environment in which
programmers can create applications to accommodate their needs. This environment provides
functions that are not available at the hardware level and performs the tasks related to the execution
of an application program. Hence, system software acts as an interface between the hardware of the
computer and the software application.
In simple terms, system software makes the computer functional. They provide basic
functionality like file management, visual display, and keyboard input are used by application
software to accomplish these functions. Some examples of system software are:
1. Operating system
2. Device drivers
3. Language translators
4. System utilities.
18
1. Operating System:
It is the first layer of software loaded into computer memory when it starts up. As the first
software layer, all other software that gets loaded after it depends on it for various common core
services. These common core services include disk access, memory management, takes scheduling,
and user interfacing. In addition the operating system ensures that different programs executing at
the same time do not interfere with each other. It provides a software platform on top of which other
programs can run. In simple words, the operating system organizes and controls the hardware.
Examples of operating systems are Windows XP, UNIX, and Linux. The basic functions of an
operating systems are:
a) Process Management:
It handles the creation, deletion, suspension, resumption, and synchronization of process.
b) Memory Management:
It handles allocation and de-allocation of memory space as required by various programs.
c) File Management:
It is responsible for creation and deletion of files and directories. It also organizes, stores,
retrieves, names, and protects all the files.
d) Device Management:
It manages all the devices of the computer system such as I/O devices like printers and
modems. If any device fails, it detects the device failure and notifies the same to the user.
e) Security Management:
Protects system resources and information against destruction and unauthorized use.
f) User interface:
Provides the interface between the user and the hardware.
2. Device Drivers:
Device drivers are system programs, which are responsible for proper functioning of
devices. Every device, whether it is a printer, monitor, mouse or keyboard, has a driver program
associated with it for its proper functioning. Whenever a new device is added to the computer
system, a new device driver must be installed before the device is used. A device driver is not an
independent program; it assists and is assisted by the operating system for the proper functioning of
the device.
3. Language translators:
Computers only understand a language consisting of 0s and 1s called machine language. To
ease the burden of programming entirely in 0s and 1s, special programming languages called high-
level programming languages were developed that resembled natural languages like English.
Language translators help in converting programming languages into machine language. To be
precise, they convert programming statements into the 0s and 1s that the computer is able to
process.
Depending on the programming language used, language translators are divided into three
major categories: compilers, interpreter, and assembler.
a) Compiler:
The programs written in any high- level programming language (C or Pascal) needs to be
converted into machine language. This is achieved by using a complier.
19
b) Interpreter:
An interpreter analyses and executes the source code in line-by- line manner, without
looking at the entire program. In other words, an interpreter translates a statement in a program and
executes the statement immediately, before translating the next source language statement.
c) Assembler:
Compared to all the types of programming languages, assembly language is closest to the
machine code. It is fundamentally a symbolic representation of machine code. The assembly
language program must be translated into machine code by a separate program called an assembler.
The assembler program recognizes the character strings that make up the symbolic names of the
various machine operations, and substitutes the required machine code for each instruction. In short,
an assembler converts the assembly codes into machine codes, making the assembly program ready
for execution.
4. System Utility:
System utility programs perform day-to-day tasks related to the maintenance of the
computer system. They are used to support, enhance, and secure existing programs and data in the
computer system. They are generally small programs, having specific tasks to perform:
a) File Management:
These utilities make it easier to manage data files. Many programs are written to help users to
find the files, create and organize directions, copy, move, and remove files.
b) Backup:
It may happen that sometime data files are corrupted, or accidentally deleted. In such a case,
data backups become very useful. A backup system utility is essential for those organizations,
which want to keep their data intact.
c) Data Recovery:
It is the process of retrieving deleted or inaccessible data from failed electronic storage
media such as computer hard disk drives, removable media, optical devices, and tape cartridges.
d) Virus Protection:
Anti- virus programs are essential system utilities for a computer system functioning in a
network. They provide the security to the system form viruses that can damage the computer
system.
e) Disk Management:
Disk management program includes various system softwares like disk defragmenter, data
compressor and disk formatting tools. De-fragmentation implies putting fragments of files in a
sequential order onto the disk which reduces the time to access the file.
20
f) Firewall:
It is commonly used to protect information such as e- mail and data files within a physical
building or organization. Essentially, a firewall is designed to protect a computer from unauthorized
access, especially via network.
g) Disk Cleanup:
To keep a computer running smoothly, regular maintenance is vital. Therefore, one should
use the disk cleanup utility, which easily determines which files on hard drive are no longer needed,
then delete those files.
APPLICATION SOFTWARE:
The most often seen software by a user is the application software. It used to accomplish
specific tasks rather than just managing a computer system. For a user, the computer system has no
specific use without application software. Application software may consist of a single program,
such as Microsoft‟s Note pad (for writing and editing simple text). It may also consist of a
collection of programs, often called a software package, which work together to accomplish a task,
such as database management software. Application software may also include a larger collection of
related but independent programs and packages (a software suite), which have a common user
interface or shared data format, such as Microsoft Office suite.
Application software ranges from games, calculators, and word processors (document
creating programs), to programs that “paint” images on screen (image editors). Applications
represent real world tasks. They can be easily divided by looking at exactly what function they
serve. Some of the most commonly used application software is discussed below:
1. Word processor:
A word processor is software used to compose, format, edit, and print electronic documents.
Word processing is one of the earliest applications for office productivity and the personal
computer. It involves not only typing, but also checking the spelling and grammar of the text and
arranging it correctly on the page. A variety of different typefaces is available for a verity of effects.
It is possible to include pictures, graphs, charts and many other things within the text of the
document. It also allows for changes in margins, fonts, and colour. Nowadays, virtually all personal
computers are equipped with a word processing program, which has the same function as a
typewriter for writing letters, reports or other documents, and printing. Examples of some well-
known word processors are Microsoft Word and Word Perfect.
2. Spreadsheets:
One of the first commercial uses of computers was in processing payroll and other financial
records, so the programs were designed to generate reports in the standard “spreadsheet” format
bookkeepers and accountants used. A spreadsheet application is a rectangular grid, which allows
21
text, numbers, and complex functions to be entered into a matrix of thousands of individual cells.
The spreadsheet provides sheets containing cells each of which may contain text and / or numbers.
Cells may also contain equations that calculate results from data placed in other cells or series of
cells. A simple example might be a column of numbers totaled in a single cell containing an
equation relating to that column.
3. Image Editors:
Image editor programs are designed specifically for capturing, creating, editing, and
manipulating images. These graphics programs provide a variety of special features for creating and
altering images. In addition to offering a host of filters and image transformation algorithms, some
image editors also enable the user to create and superimpose layers. Most graphic programs have
the ability to import and export one or more graphic file formats. These computer programs enable
the user to adjust an image to improve its appearance. With image editing software, one can darken
or lighten an image, rotate it, adjust it contrast, crop out extraneous detail, and much more.
Examples of these programs are Adobe Photoshop, Adobe Illustrator and CorelDraw.
5. Presentation applications:
A presentation is a means of assessment, which requires presentation providers to present
their work orally in the presence of an audience. It combines both visual and verbal elements.
Presentation software allows the user to create presentations by producing slides or handouts for
presentation of projects. Essentially, such computer programs allow users to create a variety of
visually appealing electronic slides for presentation. Microsoft PowerPoint is one of the most
famous presentation application.
22
ii. Identify and explain the functions of computer parts/hardware
iii. Write short notes on input and output devices
iv. What is the difference between memory and storage? Why do we require both to function
properly?
v. What are the functions performed by CPU?
vi. Explain in detail the various types of printers
vii. Write short notes on Primary Storage Devices and Secondary Storage Devices
viii. List out the differences between hardware & software.
A computer is an electronic machine, operating under the control instructions stored inside
its memory. As an aid in problem solving, it accepts data, both numeric and non numeric, processes
and presents it in the desired form.
The following are the various types of computer systems:
23
The analog computer works on the supply of continuous electrical signals. The display is
also continuous. Its output is in the form of graphs.
2. Digital Computers
These computers work with quantities represented as digits. They operate on discrete
quantities. In digital computer, both numeric and non- numeric information are represented as
strings of digits. These computers use binary codes, 0‟s and 1‟s, to represent the information. The
information is given to the computer in the form of discrete electrical signals.
The basic operation performed by a digital computer is addition. Hence, the other operations
such as multiplication, division, subtraction and exponentiation are first converted into “addition”
and then computed.
Characteristics of digital computer
The digital computer has the following characteristics:
a) It operates by counting.
b) It functions on discrete numbers.
c) The calculations are converted into binary numbers i.e., 1s and 0s.
d) The output is represented in the form of discrete values.
e) Its accuracy is good.
f) It has large memory space
g) It is versatile in nature and is suitable for a number of applications
h) In digital computers, the numbers, words and symbols can be used.
i) Its processing speed is high.
j) It is highly suitable for business application.
24
Analog VS Digital computer
3. Hybrid computers:
The computer which possess the features of both analog and digital computers are called
hybrid computers. That is, the hybrid computers have the good qualities of both analog and
digital computer.
With the hybrid computer the user can process both continuous and discrete data. This
computer accepts either digital or analog or both types of input and gives the results as per
requirements through special devices. In the hybrid computers a converter is fixed to convert the
analog data into digital data and vice versa. These are special purpose devices and are not widely
used.
Hybrid Computers
General purpose
Digital
25
4. General Purpose Computer
These are designed and constructed to cater almost all the needs of the society. They can
perform various operations. In fields of engineering, science, commerce and industry. They are
able to perform according to the programs created to meet different needs. The general – purpose
computer can be used to prepare stores reports, sales reports, payroll, etc. a general purpose
computer can solve a much broader class problems specifically a general purpose digital
computer is remarkably versatile.
6. Micro Computers
Because of its small size and the use of micro-processor, this computer is called micro
computer. All the computers have three units namely input, output and central processing unit,
(CPU). The entire CPU is contained in a single or a few microchips. When equipped with
memory and input/output control circuitry, it is called micro computer. Its storage capacity is low
when compared to mini and main frame computers. It is able to accept most of the high level
languages. However, it uses an interpreter or complier for running high level languages.
Microchips contain micro electronic circuitries which are very tiny. Large numbers of
these can be packed tightly on to a single tiny piece of silicon. Silicon is a material found in sand.
The microchip is made by building up a series of very thin layers of silicon and of the tiny
components which are held in it.
The Micro computers are small and portable. They are relatively inexpensive, the micro
computers have excellent graphic capabilities. The maximum word length varies according to the
configuration of the microcomputers.
Kinds of Microchips
The microchips can be classified as follows:
a) Micro Processors: These are the most powerful kind. They are almost tiny computers in
themselves. Each one ahs a processing Unit, a memory and a special area to handle input and
output. Microprocessors are the most important part of the CPU of a modern computer
b) Memory Chips: These are the common form of computer memory. They are used to hold
information either temporarily or permanently.
c) Input and Output Chips: In these chip circuits the flow of information is the both
directions.
Features of Micro Computers
a) Its storage capacity is low.
b) Its rate of acceptance and transfer of data is limited i.e., a maximum of 5 lack bytes / second.
c) It is able to accept most high level languages. However it uses an interpreter when running
high level language because most micros do not have sufficiently large memory to support
compliers.
d) The maximum word length it holds is 16-bits.
26
Advantages
a) They are small and portable.
b) They are relatively inexpensive.
c) They work as soon as they are switched on.
d) They have excellent graphic capabilities,
e) They do not occupy much space.
f) They do not consume much power.
Disadvantages
a) Micros have a limited storage capacity.
b) They are relatively slow.
7. Workstation
Workstation is a type of computer used for engineering applications (CAD/ CAM), desk
top publishing, software development, and other types of applications that required a moderate
amount of computing power and relatively high quality graphics capabilities. Workstations
generally come with a large, high-resolution graphics screen, at least 64MB (Mega bytes) of
RAM, built – in network support, and a graphical user interface. Most workstations also have a
mass storage device such as a dish drive, but a special type of workstation, called a diskless
workstation, comes without a disk drive. The most common operating systems for workstations
are UNIX and Windows NT. In terms of computing power, workstations lie between personal
computers and mini-computers, although the line is fuzzy on both ends high-end personal
computers are equivalent to low-end workstations. And high-end workstations are equivalent to
minicomputers. Like personal computers, most workstations are single-user computers.
However, workstations are typically liked together to form a local-area network, although they
can also be used as stand-alone systems.
8. Mini Computers
The size of the mini-computer is in between the size of micro and main frame computers.
It is more powerful than a micro computer. Mini computers are usually designed to serve
multiple users. Today, mini- computers are the popular data processing systems in the field of
business and industry. These computers accept all high level languages.
Characteristics
1. It is a general purpose machine with a smaller CPU than a main frame
2. Its storage capacity is about 2 mega words
3. Its word lengths are usually 12, 16, 24, 32 bits.
4. Its rate of acceptance and transfer of data is a maximum of 4 million bytes/seconds
5. It can support all high level languages.
6. It can support many terminals i.e., more than 20 terminals.
Advantages
a) It performs almost all the tasks that a mainframe computer does.
b) It is relatively inexpensive and is within the purchasing power of the small and medium sized
business firms.
Disadvantages
a) They are very expensive
b) They required large room space.
c) Their consumption of electricity is very high.
d) Maintenance coast is also very high.
27
9. Mainframe
A mainframe is an ultra high performance computer made for high volume, processor intensive
computing. It is mainly used for large volumes of data processing, high performance online
transaction processing systems.
Mainframe is an industry term for a large computer. The name comes from the way the
machine is build up: all units (processing, communication etc.) were hung into a frame. Thus
the main computer is build into a frame, therefore: Mainframe. Mainframes are typically
manufactured by large companies such as IBM, Amdahl, Hitachi.
Their main purpose is to run commercial applications of Fortune 1000 businesses and other
large-scale computing purposes.
Think here of banking and insurance businesses where enormous amounts of data are
processed, typically (at least) millions of records, each day.
But what classifies a computer as a mainframe?
A mainframe has 1 to 16 CPU's (modern machines more)
Memory ranges from 128 Mb over 8 Gigabyte on line RAM
Its processing power ranges from 80 over 550 MIPS
Large number of simultaneous users
Large memory and storage capacity
Characteristics
a) They use several processors working simultaneously.
b) They process at a rapid speed.
c) The main memory ranges form 8 to 64 megabytes.
d) They have operations done in parallel, rather than sequentially. They are used in weather
forecasting, supersonic aircrafts design and other works that require billions of calculations
per second.
e) They can be used for animated graphics- fluid dynamic calculations etc.,
Laptops usually run on a single main battery or from an external AC/DC adapter which
can charge the battery while also supplying power to the computer itself. Many computers also
have a 3 volt cell to run the clock and other processes in the event of a power failure.
As personal computers, laptops are capable of the same tasks as a desktop computer,
although they are typically less powerful for the same price. They contain components that are
28
similar to their desktop counterparts and perform the same functions, but are miniaturized and
optimized for mobile use and efficient power consumption. Laptops usually have liquid crystal
displays and most of them use different memory modules for their random access memory
(RAM), for instance, SO-DIMM in lieu of the larger DIMMs. In addition to a built- in keyboard,
they may utilize a touchpad (also known as a trackpad) or a pointing stick for input, though an
external keyboard or mouse can usually be attached.
IPO - Cycle
Input Output
Process
Instructions
The data are provided to the computer through the input devices. They are encoding
such a way, which the computer can understand. The computer then processes the data with the
help of instructions provided to it, then it produces a meaningful and desired output known as
information.
The above functions are collectively known as the basic principles of operation of a
digital computer. These can be expanded as follows:
a) Accepting inputs
b) Memory manipulation
c) Arithmetic operations
d) Decision making and
e) Giving output
Block diagram of a computer
ALU
CONTROL
29
1. Analog computers- calculations are converted to equations and then converted into electrical
signals. Output is in the form of graph.
2. Digital computers- calculations are converted into binary numbers and output is in the form
of discrete numbers.
3. Hybrid computers include the characteristics of both analog and digital computers.
4. A micro computer is a small, low cost digital computer, which usually consists of a
microprocessor, a storage unit, an input and output channel, all of which maybe on one chip
inserted into one or several PC boards. Micro computers include desktop, laptop and
handheld models such as PDAs
5. A mini computer is a small digital computer, which is normally able to process and store less
data than a mainframe but more than a micro computer.
6. A mainframe is an ultra high performance computer made for high volume, processor
intensive computing. It is mainly used for large volumes of data processing, high
performance online transaction processing systems.
7. A super computer is a special purpose machine. There are unique and parallel architectures in
order to achieve high speed and being effective on a small range of problems.
1. Office Automation
Computers have helped automation of many industrial and business systems. They are
used extensively in manufacturing and processing industries, power distribution systems, airline
reservation systems, transportation systems, banking systems, and so on. Computer aided design
(CAP) and computer-aided manufacture (CAM) are becoming popular among the large industrial
establishment.
30
4. Sharing of data and information
Due to networking of computers, where a number of computers are connected together to
share the data and information, use of e- mail and internet has changed the ways of business
operations.
5. Competitiveness
Computers offer a reliable and cost-effective means of doing business electronically.
Routine tasks can be automated. The customers can be provided support round the clock, which
is 24 hours a day. With advancement in IT sector, corporates are spreading business around the
world thus, increasing their presence and entering new markets.
6. Security
To provide security to data and important computer programs, almost every organisation
has some security programs to avoid the illegal access of the company‟s information by
unauthorized persons. The three fundamental attributor of a security program are confidentially,
integrity and availability which allow access to only authorized persons in an organization.
7. Cost Benefits
The extensive availability of internet based information means that companies have a wider
choice of suppliers which leads to a more competitive pricing. Due to the presence of internet the
role of the middleman becomes less important as companies can sell their product or services
directly to the customer.
8. Marketing
Corporates engaged in e-business can take help of their respective websites to create brand
awareness of their products, thus, creating new avenues of promotion of their products. In
addition, companies‟ websites can also provide better services such as after sales service to the
customer.
APPLICATION OF COMPUTERS
Introduction
Computer plays a very important role in each and every aspect of our life, be it banking,
insurance or transportation, it is useful for preparing payroll of the employees, maintenance of
optimum inventory level, sales order processing, reservation of tickets etc. It processes the
transactions very quickly and accurately. So, it finds applications in various stages of business
Business Applications
The following are some of the areas of business in which computers are applied:
1. Payroll Processing:
Business means selling goods and services. To carry out such activities, business
management employs people. They have to be paid monthly salaries and the details regarding
pay particulars of employees have to be kept track.
Business community employs computers for such payroll applications and runs a
program consisting of a number of smaller programs or modules. Each module performs a
particular function of the payroll. Sometimes we call this set of programs as payroll system.
31
To calculate the pay of an employee, management normally uses the following details
employees.
(1) Employee number (This is a unique number assigned to the employee to identify him just as
your roll number in the school) (2) Name, (3) Basic pay, (4) Allowances (House rent allowance
and other allowances), (5) deductions (Example Provident Fund deduction) and (6) Bank account
number. These details above the employees do not change but they have to be used every month.
So they are entered into a file in a computer storage medium and permanently stored. This file
goes with the name master file. The file creation module of the payroll system creates this file
once.
Before calculation of the pay of employees every month, some figures in the master need
changes. For example, if an employee completes a year of service, he normally gets an
increment. Such figures are updated using the master update module of the payroll system. After
updating, another module of the payroll system reads details from master file and calculates net
pay. The program also prints out pay slip for each employee to be handed over to him. A pay slip
shows the employee number, name, basic pay, various allowances, various deductions and net
pay.
The payroll system also generates a number of statements. It prints out the statement
showing employee number, name, bank account number and net pay. This statement is sent to
the bank, which transfers the net pay from the company‟s account to the individual employee‟s
account in the bank. Some companies copy this statement on to a floppy and send to the bank
which processes this statement on its computer.
The payroll system generates a provident fund deduction statement. This statement shows
the employee numbers, names and amount deducted. Another statement showing the names,
employee numbers and tax deducted is printed. The company sends it to Income Tax office. Thus
we see that a number of statements can be printed from the same master file.
2. Inventory Control:
The second application is the use of computers to keep track of the purchase and issues of
parts and raw materials needed in an organization. These parts and raw materials are called
inventories and the set of programs used to keep track of the purchase and issue of these
inventories constitute the inventory control system.
In business, a particularly quantity of each item or raw material has to be stocked. Too
less a stock would result in non-availability of these items, when the manufacturing activity
needs it. Too much of stock of these means, more money in terms of investment in buying the
excess stock. Business pays interest on money invested, and the excess interest paid on cost of
excess stock is a loss to business. So the business maintains an optimum quantity of material.
The inventory control system maintains a file with part number, name, quantity on stock a level
of stock at which the company orders for fresh quantity (called reorder level) and the suppliers‟
addresses. This file is the inventory master.
When an item is issued, the inventory update program updates the inventory master reducing
the stock by the quantity issued. If the resultant stock falls below the reorder level, the inventory
control program prints out an order to the supplier of the item automatically. It can be mailed to
the supplier. When the supplier supplies the item, the inventory control program updates the
stock on hand.
32
The inventory control system keeps track of the supplies and issues. So, it can tell the
management of the company the usage of these items over a period of time quickly. It also
maintains an optimum level of stock of these items.
ON-LINE APPLICATIONS
4. Banking:
In banks the customers, present cheques for withdrawing money. The clerk verifies from
the register the signature of the customer. (The customer has signed in the application form while
opening an account). Then he checks from a ledger the customer‟s balance. If the customer has
sufficient balance to cover the cheque amount, the clerk passes the cheque for payment, and
updates the balance
There are a number of operations that the bank carries out of which the above is an example. We
will see how the above operation called personal banking is computerized.
Suppose you want to open a bank account. The bank official hands over a form to you.
You fill up the details (such as name, address, profession etc.) and sign the application. The bank
stores this information in a computer on which a banking software runs. The customer‟s
signature is scanned by suitable devices and incorporated in the computer file.
If you present a cheque to the clerk in the bank, he can check the signature manually. If
he is satisfied with the correctness, he can enter you account number and the cheque amount into
the computer which checks your account and updates the amount. The clerk then pays you the
money. In the method, the payment is manual and accounting is automatic. There is another way
where the checking of you accounts as well as payment is made by computer using an automatic
teller machine. Let us study this.
33
automatic teller machine. It asks you to enter the amount. You may enter the amount through the
buttons on the machine. Again the computer checks if you have sufficient balance. If so, it
instructs the machine to pay you. The ATM then delivers the cash on the tray fixed in it. You
may collect the money.
This is only one example of application of computer in banks. Now large systems
installed at the head office of a particular bank are connected to systems installed at its branches
all over the country. The computers of different banks are also connected together. By sending
suitable messages money can be transferred from one bank to the other. This is called Electronics
Funds Transfer.
He puts seat numbers on a page one by one and keeps writing the names of passengers for
whom he reserves seats against seat numbers. After some time, if somebody cancels his ticket, he
strikes off the name. When the next person reserves for that time and date, the clerk writes his
name above the cancelled name. This gives rise to lot of confusions. In a number of situations,
two persons used to be allotted the same seat.
With the increasing population the Government is increasing the number of trains. Thus
the volume of data to be handled has also increased enormously. You can just imagine the
confusion this will create if we are still following the manual system of reservation.
We just saw how manual system has become unsuitable in the present context. Now let us
study how the computerized railway reservation system works.
There is a central computer with a number of terminals connected to it the details of all
trains for which reservation is done at the region are stored in the computer. The railway
reservation system runs on this computer. The terminals are situated in booking counters. It is
possible to install the terminals in a far off place and connect them to the computer through
cables.
When the passenger presents the reservation form to the booking clerk he enters the train
number, date, name, age and other details of the passenger. The program checks availability of
seats in that particular train on that particular date. If accommodation is available, the clerk
presses a button on the key board and the computer prints out the ticket on the printer connected
to the terminal. It also updates the computer file to reflect the new reservation position.
Suppose you wanted the ticket for train number 1, but you get only a waiting list. The
clerk tells you your position in the waiting list. If you want you can get a wait listed ticket. If not,
you tell the clerk to check for accommodation in a different train to your destination. The clerk
only has to re-enter the train number. The computer checks availability, reserves you ticket on
that train if a seat is available and prints the ticket.
34
Thus you can go to any booking counter and request for reservation in any train being
operated on that station. Also the errors found in the manual reservation method are eliminated.
The reservation system is broader based as follows: Today computers in different cities
are connected together. (It is called networking). Suppose you are in Coimbatore. You want to
book your journey from Madras to Coimbatore. You can go to a booking counter (Railways have
opened a number of booking counters in the same city) in Coimbatore and reserve your ticket
from Madras to Coimbatore. Thus there is lot of flexibility in reservation.
We studied that computers are capable of storing lot of data on the hard disk. They are
also capable of retrieving data fast. So the list of passengers for a particular day for a particular
train is also printed out very fast.
The reservation data for a number of trains over a period of time is available. By suitable
software, the railway authorities can prepare the data regarding passengers traveling in different
trains to different places during different periods. This helps them plan for new trains, reschedule
the running trains and make lot of analysis regarding passenger traffic.
REAL-TIME APPLICATIONS
In real time applications, computers control an on going activity. Let us consider the
example of a manufacturing process. A product C is made from raw materials A and B. The
quality of C depends upon, among other things, the quality of A and B and their quantities. In big
manufacturing processes, raw materials are fed by machineries. Due to problems i n machineries,
the performances may vary from machine to machine. This affects the quality of final product.
Manual inspection of quality and operation of these machineries to control the quantity are slow.
This slows the manufacture of C from raw materials A and B. Signals from C are fed to the
computer. Suitable sensors are installed in the lines carrying raw materials as well as finished
product. These generate signals. The values of these signals for correct proportion of raw
materials are stored in the computer. When the process is on signals keep coming from the output
line depending up the quality of finished product.
Let us see what happens if either A or B varies in quality. The quality of the finished
product also suffers. The sensor in the finished product line senses this. The signals generated by
it change in strength. They are sent to the computer. It compares the signals with already stored
signals. The difference is used to change the quantity of raw materials A and B.
Manual control of this process is slow. Moreover, if people inspect quality and operate
machineries feeding raw materials, they become tired after sometime. But computer does not. So
the quality of product is uniform. Moreover, there may be processes where the presence of
35
human beings continuously for hours together will be injurious to their health. In such places
computer control avoids such ill-effects.
7. Education
Today, most schools and higher educational institutions have computers in the
classroom for teacher and students. In education, teachers, students, researchers and school
administrators benefits from the usage of ICT. Teachers use computers to research for teaching
materials, participate in online forums and online conferences as well as to aid their teaching.
Students use the computers as a reference tool. They use computers to browse the Internet to look
for information. Researchers use computers to collect and process data. School administrators use
computers for administrative purposes to make sure that the entire operation runs smoothly.
Open Distance Learning (ODL) or online learning can be implemented as computers are the main
medium in delivering the knowledge from one location to the other locations. This type of
learning consists of online forum, discussion, quizzes, test questions and many more.
8. Industry
Computers are used to facilitate production planning and control systems, to support
chain management and to help in product design in the industrial sector. In the industrial sector,
workers, researchers and administrators benefits from the usage of ICT. Workers use machines
that are connected to computers to operate. In some productions, robots are used to take over jobs
that are dangerous to the workers. Researchers use computers to analyze and collect research data
for future reference. Administrators use computers to oversee the entire operations in the plant or
factory to detect specific errors or defects that occurred in the process.
9. E-Commerce
E-commerce helps in boosting the economy. It makes buying and selling activities
easier, more efficient and faster. For this application, computers, Internet and shared software
are needed. In the e-commerce sector, customers, suppliers and employees benefits from the
usage of ICT. Customers use computers to be connected online with suppliers to purchase
products. This method can save time and cost as they do not have to go to any outlets. Suppliers
use computers to keep track of their transactions. All products are bar coded and can be read by
the computer scanner to help in determining prices and managing inventory. Employees use
computers and telephones to communicate with their customers for any enquiries.
10. Healthcare
In the medical field, computers are very important in running the operations. Medical staffs use
computers for various purposes, namely:
Maintaining patient records
Monitoring patients‟ vital sign
Assisting doctors, nurses and technicians with medical tests by using computer and
computerised devices.
Using medical software to help with researching and diagnosing health conditions.
36
SUM UP
1. Computer is useful in business processes like payroll processing for generating statements
useful for various departments like provident office, ESI etc.
2. It is useful for inventory control activities such as maintaining optimum inventory level and
re-order level.
3. Online applications in banking and reservation have brought about advantages like saving of
time and money.
4. Car manufacturing industries and other production functions use real time applications
effectively.
For example visit Indian railways website to know how online ticket reservation is made.
DATA PROCESSING
Data Processing Concepts
Data
Data means any collection of raw hand figures facts. Data can be considered as the raw
material of information. The data may be numerical such as payroll, employee Number, etc.
or non- numerical like Student names, Product names, etc.
Data Processing
As data is in its raw form it cannot solve any problem. The data needs some processing to
make it useful. Data processing is the conversion of data into a more useful form. That is,
transmission of data into meaningful information is called data processing.
Information
The result obtained by data processing is called information. That is, the processed data is
known as information. However, information produced in one data processing step may be
used as data in the next data processing step.
DATA Vs INFORMATION
Data
Information
37
DATA PROCESSING CYCLE
Data Processing is viewed as a system that accepts data as input, processes it into
information as output. This can be explained with the help of the following diagram.
INPUT OUTPUT
DATA TYPES
The data types may be as follows:
1. Qualitative data: It denotes the characteristics of things such as Average, Fair etc.
2. Quantitative data: It is expressed in terms of measurable quantities such as 10 KG, 40
degree Celsius etc.
3. Numeric Types: The data types may also be an integer (+, -) without any fractional part or
real number which includes integers and fractions.
4. Floating Point Representation: These data types consist of 3 components namely:
(1) Mantissa (2) Radix or Base and (3) Exponent
Besides the above, the data types include alphabetic data and alphanumeric data.
38
3. Proper and Timely Information:
Different kinds of information are needed in almost all organizations. Data processing
provides correct and timely information.
5. Helps in Decision-making:
In every organization various decisions are taken at different levels. Such decisions can
be more accurate if effective data processing system is used
6. Improves Productivity:
To improve productivity, various measures are to be identified and implemented. It is
possible through the properly designed data processing system.
2. Input of data:
After extracting the necessary data from the source documents, they must be transposed
in a suitable form acceptable to the computer. Great care should be taken to avoid wrong entries
in the forms.
3. Manipulation of data:
It involves the process of shifting, sorting and rearranging the given input. Before
processing, validation procedures may be built in to the code to so that input forms do not accept
any incorrect data.
39
4. Output of information:
The main purpose of data processing is to provide meaningful information to the
decision- maker. Hence, in data processing the person involved must be very careful about what
information is needed and in what form he likes to have it.
5. Storage of information:
The data processed need to be kept for future use. All the processed data will need some
form of secondary storage. When storing the data, it is always important to maintain a backup. It
should be noted that at each and every step the storage might be done.
2. Accounting:
The Data Processing System can be used to maintain the accounting records and in
preparation of final accounts. The general ledger, Accounts Payable, Accounts Receivable, etc.,
are the examples for the computerized accounting systems followed in most business
organizations.
3. Payroll preparation:
In personnel department the data processing system is used to record the operations of the
number of employees of different departments in each shifts, leave taken, deductions such as
ESI, PF and finally in the preparation of Pay Slips.
4. Sales Analysis:
The Data Processing system is highly useful in sales analysis. The sales manager can
prepare the sales forecast on the basis of per month‟s sales reports and subsequent future actions
can be taken.
5. Inventory Management:
Actually the Data Processing System is a boon to every organization, in respect of
inventory management. Data Processing is used to maintain up-to-date information about stock,
their costs and to initiate orders when the times are about to be exhausted.
6. Office Automation:
The modem offices and business organizations are dependent upon computer based office
automation for their competitiveness and better management.
40
8. Insurance and stock broking:
Insurance companies and stock broking firms also use the computerized data processing
systems. Large volume of data have to be processed for the preparation of policy statements,
interest calculations, renewal notices and in dealing with the securities.
9. Managerial aid:
The Data Processing System is used as a managerial aid in decision-making for solving
business problems. It is also very useful in the areas of linear programming, PERT, CPM etc.
Today it appears that the computer is everywhere. Not only the business organization, the
other institutions are also using data processing system for their regular use. We cannot think
about a situation without a computer. Robotics and Artificial Intelligence are the two promising
areas of applications.
6. Merging
It is the operation of combining two or more ordered (sorted) sets of data to form another
single ordered set.
7. Calculating
Here calculation of greater magnitude can be processed. Calculation involves solving
equations and manipulation of the source data such as addition, subtraction, etc.
8. Data Storage
The results of processing one set of data are retained in storage for future use of
reference. The basic requirement for utilizing the computer in all business applications is the
41
ability to store and access data. The data is stored in a location called memory referred by its
address. In large organizations, huge volume of data is to be stored and accessed. Hence, some
auxiliary storage devices are also needed for the effective data processing.
(e) WORD
The combination of 2 bytes or 4 bytes or 8 bytes is a word.
The data measurement is as follows:
8 bits - 1 byte
1024 bytes - 1 kilobyte (KB)
1024 KB - 1 Mega Byte (MB)
1024 MB - 1 Giga Byte (GB)
1024 GB - 1 Tetra Byte (TB)
9. Data Retrieving:
Data retrieving is the process of searching or locating a data item from the storage. In
EDP system, the data is retrieved from the storage device in sequential, indexed sequential or
random access mode. The on-line data storage and retrieval is very useful for the proper
functioning of a modern business establishment.
10. Reporting:
Generally in business data processing, the processing operation comes to an end with the
reporting of data. In this operation the results of the data processing are made available to others.
The processed information may be reported in a number of ways depending on the use of results.
The results may be printed out in the form of pay slips, bills, etc. or in the form of reports as ESI
Reports, PF Reports or Sales Reports, etc.,
SUM UP
1. Data in its raw form cannot be used. It must be converted into information to make it useful.
42
2. To process the data various steps are involved such as identification of data, input and
manipulation of data etc.
3. Data processing is useful for decision making and improving productivity in an organisation.
Introduction
The methods of data processing depend upon the following factors:
(a) Volume of data to be processed
(b) Complexity of data processing operations
(c) Computational demands
(d) Processing time constraints and
(e) Economic factors.
Various methods or modes of data processing are given below:
(i). The single user system
(ii). Batch processing
(iii). Multi-programming
(iv). On-line Processing
(v). Real-Time processing
(vi). Time sharing concept
(vii). Distributed processing
2. Batch Processing
This is an old system but even today it is used for data processing in computing
machines, in which the capacity of the CPU is limited. In this system, the data is collected for a
predetermined period of time, after which it is accumulated in sequential manner.
In this system the source transaction documents are first collected before being sent to
computer room. A batch of transactions is entered onto a computer media by data entry devices.
The transactions are validated during data entry and verified with the source documents from the
43
check lists. The validated and verified results on reports are returned to the user departments. In
batch processing system the emphases is on maximizing the computer resource utilization.
In batch processing, the processing cycle called Batch processing cycle repeats itself at
every regular intervals. The elements this cycle are given below:
Features
(a) Here, the data is accumulated into batches and processed periodically.
(b) The jobs are processed one after the other without any user interaction.
The concept of Batch Processing is dearly explained with the help of the following
diagram:
Concept of Batch Processing
Stores Department Production Department
Transaction Transaction
Punch Cards
Punch Cards
Computer
Report
(1) Payroll Processing: In payroll processing the data are collected for a stipulated period of
time usually one month and processed at regular intervals after which payments are
distributed to all the employees.
(2) Telephone Billing: Here the subscriber does not get a bill for every call he makes. Instead,
his calls are recorded at a centralized place and are processed on a predetermined period of
time to prepare his bills.
(3) Financial accessing
(4) Budgeting and Budgeting control
44
(5) Production planning and control
(6) Project planning and control
(7) Project planning and control
3. Multi-programming:
In batch processing, programs are executed one by one. The memory and ALU of the
machine are not being fully utilized. To get the maximum use of the machine, multi-
programming system is used. “Multi-programming enables to store and execute more than one
program in the CPU at the same time”. The multi-programming concept is event based. The
purpose of multi-programming is to increase utilization of the computer system as whole.
Programs that have the highest priority normally are stored in an area called the
„foreground partition‟. Programmes with lowest priority are stored in an area called „background
partition‟.
45
4. On-Line Processing
Definition of Online Processing:
Online processing refers to processing of individual transactions as they occur from their
point of origin as opposed to accumulating them into batches. This is made possible by such
direct access devices as Magnetic disk and Magnetic Drum and number of terminals connected
to, and controlled by a central processor. In this way, various departments in a company can be
connected to the process by cables. If operating companies are a number of miles away from the
processor then they are linked by means of telegraph or telephone lines. This type of processing
provides multi access to information files by terminal users and also enables them to update with
transactions data.
Special Features
1. In this method data is not accumulated, instead it is entered and executed directly.
2. Quick Processing - By means of direct communication with the computer and continuous
flow of input, the delay between transactions and their processing is avoided.
3. This method reduces the data entry errors, because the user who generates, the data is the one
who keys it in.
4. This system validates data at various points and ensures that correct data is being entered.
5. Under this method the system performs the whole task in a conversational 'manner helping
the data entry process.
6. In on line processing, one has the latest update immediately.
Online processing ensures that the records are in updated at any time whereas this is so
with batch processing say once a week but the fact remains that online processing is usually more
costly. Therefore in choosing one of the processing both updating of records and costs are to be
considered.
CONCEPT OF ON-LINE PROCESSING
Record MEMORY
TERMINAL 1
Input
Input Storage
Output Storage
Record
Storage
Disk
Program
Storage
Query
TERMINAL 2
Record
System Retrieval
Response
On-line Applications:
Systems are being developed and are already in use for a wide range of application in
different type of industries described below:
46
a. Electricity and Gas Boards: By means of terminals situated in showroom it is possible to
inform perspective customers of the availability of the appliances in response to their
inquiries.
b. Banking: It is possible to inform bank customers of the status of their accounts in
response to an inquiry by accessing relevant file using on online terminal.
c. Tour Operators Reservation Offices accept telephone inquiries from travel agents
regarding the availability of holidays in respect of client's inquiries. By means of
terminals, the availability of the required holidays can be checked and booked
immediately.
d. Stock Exchange: Terminals located in major stock Exchange through out the country and
the offices of participating brokerage from enable the speedy processing of share
dealings.
e. Stock Control: Terminals located in warehouse provide the means for automatic
recording of stocks, updating of stock records, reservations, follow-up of outstanding
orders and the printing of picking list etc.,
Benefits provided by Online Systems: Online systems provide a number of benefits all of
which assist in improving administrative efficiency which is essential in today's competitive
business environment. A number of benefits are out-lined below:
47
h. Reduced data preparations cost:
On-line system dispense with the need to convert human sensible data into machine
sensible data thereby eliminating punching and verifying operations. This saves time and the cost
associated with such operations.
5. Real Time Processing
It is also called as interactive mode or Direct mode. This system makes the user to have
direct contact with the computer through his terminal. It is an alternative approach to an on- line
processing system. Here the data is processed, the instant it occurs. There is no delay between the
time data is available, and the time it is processed.
The term real time refers to the technique of updating files transactions date immediately
after the event to which it relates occurs. This is in distinction to batch processing which
processes related data to batches of pre-defined periods of time. Real time systems are basically
on- line systems with one specially in inquiry processing. The response of the system to the
inquiry itself is used to control the activity. An on- line production data collection system that
simply accepts input and utilities it for payroll and costing purposes cannot be termed real-time,
but if, on the other hand, the system is designed to provide immediate information to monitor the
production processes, it is a real time system.
Special Features
(a) Program is always under execution.
It produces output to control, direct or affect the outcome of an ongoing activity or process.
(c) In this method, the control is exercise during the actual functioning.
(d) It is meant exclusively to perform one task.
(e) It is like an online system with; title constraints on response time availability.
(f) It is called a real time system because it has to give results based on dead lines
which are imposed by the real world outside.
(g)The data which has to be produced by the systems has to be in such a less time, that they can
influence the external events which are based on this data.
Thus the response of a real time system is one type of feedback control system. The
response time would naturally differ from one activity to another. If the example, it is the
launching of a space vehicle, the response time should be in split second whereas in business
situation even a few minutes of response time may be alright. Online updating in real time
usually leads to transaction as a by-product. For example, the updating in real time a customer's
order may lead to such transactions as dispatch noted and purchase requests, etc. Real time
systems offer accountants and others in business a chance to fulfill the potential of the computer
as a tool of management.
Concept of Real Time Processing
Terminal Terminal Terminal Terminal
1 2 3 4
Computer
Data
48
Guided Missile System
Real Time Processing is suitable in the following type of business operations:
i. Wholesale supplier and manufacture - Availability of stocks.
j. Airline - Flight seat availability.
k. Manufacturing - Status of production orders.
l. Process Control.
m. Space Craft Control.
6. Time Sharing
It is a special type of on- line processing in which several users share the resources of an
on- line computer system to avoid turn about time, especially when results are needed quickly;
another system is available i.e., time sharing system. In this method the individual user has an
independent local terminal. The terminal is connected to a main computer, which does all the
processing work.
Under this system each person on a terminal has to log into the system. The system then
lists him in the order in which he has logged on. Once everybody has logged on, the system will
permit the first in the list to run his program. The time given for running the program is generally
10 milliseconds. It is called a time slice or a time slot or a quantum. Starting then, with the first
to log on, each user is given his time slice. Once all have made use of it, the system starts all over
again, repeating the cycle. The system maintained is called a polling system whereby each
terminal is polled on a round robin basis.
All the instructions given by the users are carried to the centrally located main computer
system and processed there and retrieve back by the user instantaneously. Since, the centrally
located main computer has high-speed processor, users may feel that they are sharing the same
computer resources.
Features
1. The processor time is shared between two or more persons.
2. The processor switches from one user's job to another at a rapid rate under the
control of a monitor program.
3. This concept is time based.
49
The concept of time-sharing can be explained with the help of the following diagram.
Program
Terminal 1 Program Terminal 1
NI
M
O
O
R
T
Area
Data of
Terminal 1
Terminal 2
Program of
Terminal 2
Terminal 3 Data Area
Program
Data of
Terminal 2
Printer
Let us suppose that there are three terminals, each person on a terminal has to log into
the system. The system then lists him the order in which he has logged on. Once everyone has
logged on, the system will permit the first on the list to run his program. The time given for
writing a program is called a time slice or time slot. Starting from the first, each user is given
his time slice. Once, all the three users have made use of it, the system starts all over again,
repeating the cycle. The sequence maintained is called Polling System. Most time sharing
systems respond to user's instructions in milli/micro seconds.
Time-Sharing Vs Multi-programming
The difference between these two methods is that in "time, sharing" the CPU links only
one terminal at a time and its total time is shared uniformly by all the users. But in
multiprogramming, the CPU links more than one terminal or other peripherals at a time.
Therefore, multiprogramming more efficiently utilizes the main memory and the central
resources than time sharing. Time sharing is employed only for multi terminal system
whereas multi programming is meant both for single as well as the multi terminal system.
7. Distributed Processing
In computer science, a form of information processing in which work is performed by
separate computers that are linked through a communications network. Distributed processing
is usually categorized as either plain distributed processing or true distributed processing.
Plain distributed processing shares the workload among computers that can communicate with
one another. True distributed processing has separate computers perform different tasks in
such a way that their combined work can contribute to a larger goal, such as the transfer of
funds from one bank to another. This latter type of processing requires a highly structured
50
environment that allows hardware and software to communicate, share resources, and
exchange information freely. At the highest (and most visible) levels, such distributed
processing can also require data-transfer mechanisms that are relatively invisible to users but
that enable different programs to use and share one another's data.
Distributed data processing system is a network of several computers in remote
stations, each of which is linked to a single host computer. The larger, central computer
maintains the firm's master data base and system log. Each remote system is a fully
independent computer that maintains its own local data base in addition to communication
with the master computer. These individual computers are tied together through a high speed
communication network. This allows individual computers to communicate with one another
in a variety of ways depending on the CIS requirements.
Many small computers (called nodes) are employed as data collection points in several
departments. They are connected to a main computer system (called File Server) in a
centralised department, which controls the entire database. The processing involved here is
known as distributed processing.
The distributed data processing system exists because of the need for large interactive
installations with a high degree of reliability and accuracy. Moreover, large number of mini
computers can be connected in this system which results in cost reduction.
Features
i. Decentralized computer system
ii. Interconnected by communication network (c) More reliable
iii. Since more than one computer is used in the network, it is economical.
Advantages:
Distributed data processing system has many advantages:
a. Local computers on the network offer immediate response to local needs.
b. Systems can be expanded in modular fashion as needed because many small
c. Computers are used as the system is not dependant on large unit that could shut down
the network if it failed.
d. Equipment operating and managing costs are often lower.
e. Minicomputers tend to be less complex than large systems; therefore, the system is
more useful to local users.
Distributed data processing system a number of computer systems are linked together. So the
facilities available-in one computer system can be shared by all. This link is called computer network.
SUM UP
1. There are various methods of data processing such as the single user system, Batch
processing, Multi-programming, On- line Processing, Real- Time processing, Time sharing
concept, Distributed processing.
2. In batch processing data is accumulated and then processed.
3. In online processing data is not accumulated, instead it is entered and executed immediately.
4. Real time processing is an interactive or direct mode. In this type of processing there is no
delay in time between the availability of data and the time taken for processing.
Points for discussion
1) What are the different methods of Data Processing? Explain.
2) List out the applications in which batch processing can be used.
3) What are the features of online processing.
4) List out the various benefits of on- line processing.
51
DATA REPRESENTATION
Section 3.1 Data Types
Registers contain either data or control information
Control information is a bit or group of bits used to specify the sequence
of command signals needed for data manipulation
Data are numbers and other binary-coded information that are operated on
Possible data types in registers:
o Numbers used in computations
o Letters of the alphabet used in data processing
o Other discrete symbols used for specific purposes
All types of data, except binary numbers, are represented in binary-coded form
A number system of base, or radix, r is a system that uses distinct symbols for r
digits
Numbers are represented by a string of digit symbols
The string of digits 724.5 represents the quantity
2 1 0 -1
7 x 10 + 2 x 10 + 4 x 10 + 5 x 10
The string of digits 101101 in the binary number system represents the quantity
5 4 3 2 1 0
1 x 2 + 0 x 2 + 1 x 2 + 1 x 2 + 0 x 2 + 1 x 2 = 45
(101101)2 = (45)10
We will also use the octal (radix 8) and hexidecimal (radix 16) number systems
2 1 0 -1
(736.4)8 = 7 x 8 + 3 x 8 + 6 x 8 + 4 x 8 = (478.5)10
1 0
(F3)16 = F x 16 + 3 x 16 = (243)10
Conversion from decimal to radix r system is carried out by separating the
number into its integer and fraction parts and converting each part separately
Divide the integer successively by r and accumulate the remainders
Multiply the fraction successively by r until the fraction becomes zero as you note its
whole numbe
52
Each octal digit corresponds to three binary digits
Each hexadecimal digit corresponds to four binary digits
Rather than specifying numbers in binary form, refer to them in octal or
hexadecimal and reduce the number of digits by 1/3 or ¼, respectively
53
n
A binary code is a group of n bits that assume up to 2 distinct combinations
A four bit code is necessary to represent the ten decimal digits – 6 are unused
The most popular decimal code is called binary-coded decimal (BCD)
BCD is different from converting a decimal number to binary
For example 99, when converted to binary, is 1100011
99 when represented in BCD is 1001 1001
54
The standard alphanumeric binary code is ASCII
This uses seven bits to code 128 characters
Binary codes are required since registers can hold binary information only
Complements are used in digital computers for simplifying subtraction and logical
manipulation
Two types of complements for each base r system: r‟s complement and (r –
1)‟s complement
Given a number N in base r having n digits, the (r – 1)‟s complement of N
n
is defined as (r – 1) – N
n
For decimal, the 9‟s complement of N is (10 – 1) – N
The 9‟s complement of 546700 is 999999 – 546700 = 453299
55
The 9‟s complement of 453299 is 999999 – 453299 = 546700
n
For binary, the 1‟s complement of N is (2 – 1) – N
The 1‟s complement of 1011001 is 1111111 – 1011001 = 0100110
The 1‟s complement is the true complement of the number – just toggle all bits
n
The r‟s complement of an n-digit number N in base r is defined as r – N
This is the same as adding 1 to the (r – 1)‟s complement
The 10‟s complement of 2389 is 7610 + 1 = 7611
The 2‟s complement of 101100 is 010011 + 1 = 010100
Subtraction of unsigned n-digit numbers: M – N
o Add M to the r‟s complement of N – this results
n n
in M + (r – N) = M – N + r
n
o If M ≥ N, the sum will produce an end carry r which is discarded
o If M < N, the sum does not produce an end carry and is equal to
n
r – (N – M), which is the r‟s complement of (N – M). To obtain the
answer in a familiar form, take the r‟s complement of the sum and place a
negative sign in front.
M = 72352
10‟s comp. of N = +86750
Sum = 159282
Discard end carry = -100000
Answer = 59282
M = 13250
10‟s comp. of N = +27468
Sum = 40718
No end carry
Answer = -59282 (10‟s comp. of 40718)
X = 1010100
2‟s comp. of Y = +0111101
Sum = 10010001
Discard end carry = -10000000
Answer X – Y = 0010001
Y = 1000011
2‟s comp. of X = +0101100
Sum = 1101111
No end carry
Answer = -0010001 (2‟s comp. of 1101111)
56
Section 3.3 – Fixed-Point Representation
Positive integers and zero can be represented by unsigned numbers
Negative numbers must be represented by signed numbers since + and – signs
are not available, only 1‟s and 0‟s are
Signed numbers have msb as 0 for positive and 1 for negative – msb is the sign bit
Two ways to designate binary point position in a register
o Fixed point position
o Floating-point representation
Fixed point position usually uses one of the two following positions
o A binary point in the extreme left of the register to make it a fraction
o A binary point in the extreme right of the register to make it an integer
o In both cases, a binary point is not actually present
The floating-point representations uses a second register to designate the position
of the binary point in the first register
When an integer is positive, the msb, or sign bit, is 0 and the remaining bits
represent the magnitude
When an integer is negative, the msb, or sign bit, is 1, but the rest of the number
can be represented in one of three ways
o Signed-magnitude representation
o Signed-1‟s complement representation
o Signed-2‟s complement representation
57
+6 00000110 -6 11111010
+13 00001101 +13 00001101
+19 00010011 +7 00000111
+6 00000110 -6 11111010
-13 11110011 -13 11110011
-7 11111001 -19 11101101
An overflow occurs when two numbers of n digits each are added and the
sum occupies n + 1 digits
Overflows are problems since the width of a register is finite
Therefore, a flag is set if this occurs and can be checked by the user
Detection of an overflow depends on if the numbers are signed or unsigned
For unsigned numbers, an overflow is detected from the end carry out of the msb
For addition of signed numbers, an overflow cannot occur if one is positive and
one is negative – both have to have the same sign
An overflow can be detected if the carry into the sign bit position and the carry
out of the sign bit position are not equal
58
0 375 (0000 0011 0111 1010)BCD
+9 760 (1001 0111 0110 0000) BCD
0 135 (0000 0001 0011 0101) BCD
59
Binary codes for decimal digits require a minimum of four bits
Other codes besides BCD exist to represent decimal digits
The 2421 code and the excess-3 code are both self-complementing
The 9‟s complement of each digit is obtained by complementing each bit in
the code
The 2421 code is a weighted code
The bits are multiplied by indicated weights and the sum gives the decimal digit
The excess-3 code is obtained from the corresponding BCD code added to 3
60
Section 3.6 – Error Detection Codes
Transmitted binary information is subject to noise that could change bits 1 to
0 and vice versa
An error detection code is a binary code that detects digital errors during
transmission
The detected errors cannot be corrected, but can prompt the data to
be retransmitted
The most common error detection code used is the parity bit
A parity bit is an extra bit included with a binary message to make the total
number of 1‟s either odd or even
The P(odd) bit is chosen to make the sum of 1‟s in all four bits odd
The even-parity scheme has the disadvantage of having a bit combination of
all 0‟s
Procedure during transmission:
o At the sending end, the message is applied to a parity generator
o The message, including the parity bit, is transmitted
o At the receiving end, all the incoming bits are applied to a parity checker
o Any odd number of errors are detected
Parity generators and checkers are constructed with XOR gates (odd function)
An odd function generates 1 iff an odd number if input variables are
61
COMPUTER ETHICS
Ethics in General
A guideline is needed to stop the current technology products from being exploited for example
replicating original CDs and selling them as pirated software, this unethical behaviour can be
controlled by the code of conducts.
Unethical refers to any code of conducts that are not conforming to approved standards of social
or professional behaviour.
Computer ethics is a system of moral standards or values used as a guideline for
computer users.
62
selling information to other parties without the owner‟s permission
using information without authorization
involvement in stealing software
invasion of privacy
Intellectual property refers to any product of human intellect that is unique and has value in
the market place. This covers ideas, inventions, unique name, computer program codes and
many more.
Definition of Ethics
In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks
to it. On the other hand, ethics in computing means moral guidelines to refer to when using the
computer and computer networks. This includes the Internet.
Definition of Law
Law is a legal system comprising of rules and principles that govern the affairs of a
community and controlled by a political authority.
Law differs from one country to another. In the era of technology, computer law is needed to
clarify goods or actions that fall under the computer law. Computer law refers to all areas in law
that requires an understanding of computer technology such as hardware, software and Internet.
Why do we need ethics and law in computing?
Respecting Ownership
Respecting Privacy
Respecting Property
Respecting Ownership
We must respect ownership by not stealing other people‟ s work either by duplicating or
distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer
programs without permission and authorisation from the individual or company that created the
program are immoral and illegal.
63
to create a healthy computer society, so that computers are used to contribute to a
better life
to prevent any crime
ETHICS
GUIDELINE As a guideline to computer users.
MORAL STANDARDS Ethical behaviour is judged by moral
standards.
FREE TO FOLLOW Computer users are free to follow or
ignore the code of ethics.
NO PUNISHMENTS No punishment for anyone who
violates ethics.
UNIVERSALS Universal, can be applied anywhere,
all over the world.
PRODUCE ETHICAL COMPUTER To produce ethical computer users.
USERS
IMMORAL Not honouring computer ethics
means ignoring the moral elements
(immoral).
LAW
CONTROL As a rule to control computer users.
JUDICIAL STANDARDS Law is judged by judicial standards.
MUST FOLLOW Computer users must follow the
regulations and law.
PENALTIES, IMPRISONMENTS Penalties, imprisonments and other
AND OTHER PUNISHMENTS punishments for those who break the
law.
DEPENDS ON COUNTRY Depends on country and state where
the crime is committed.
PREVENT MISUSING OF COMPUTERS To prevent misuse of computers.
CRIME Not honouring the law means
committing a crime.
Law breaking:
sending a computer virus via e-mail
hacking into your school‟s database to change your examination results.
selling pirated software in a night market
64
COMPUTER CRIMES
A computer crime is defined as any criminal activity that is related to the use of computers.
These activities include computer fraud, copyright infringement, computer theft and computer
attack
COMPUTER FRAUD
Computer fraud is defined as having an intention to take advantage over or causing loss to
other people, mainly on monetary basis through the use of computers.
There are many forms of computer fraud which include e-mail hoaxes, programme fraud,
investment schemes, sales promotions and claims of expertise on certain fields.
Students need to be aware of other computer frauds such as health frauds, scams and hacking.
Students will also most likely get false information while researching information on the
Internet.
COPYRIGHT INFRINGEMENT
Copyright infringement is defined as a violation of the rights secured by a copyright. Copyright
infringement involves illegal copy or reproduction of copyrights material by the black market
group. The open commercial sale of pirated item is also illegal.
With the current technology, the most perfect copy of the original copy can be downloaded
from the internet.
COMPUTER THEFT
Computer theft is defined as the unauthorised use of another person‟s property with the
intention to deny the owner the rightful possession of that property or its use.
COMPUTER ATTACK
Computer attack may be defined as any activities taken to disrupt the equipment of computer
systems, change processing control or corrupt stored data.
Computer attack can be in the forms of:
physical attack that disrupt the computer facility or its transmission lines.
an electronic attack that uses the power of electromagnetic energy to overload computer
circuitry.
a computer network attack that uses a malicious code to exploit a weakness in
software, or in the computer security practices of a computer user
CYBER LAW
WHAT IS CYBER LAW?
Cyber law refers to any laws relating to protecting the Internet and other online communication
technologies.
65
information, legal status of online transactions, privacy and confidentiality of information,
intellectual property rights and security of government data placed on the Internet.
CYBER LAW
These concerns and issues clearly indicate why cyber laws are needed in online activities.
Beside these cyber laws, there are three other cyber laws being drafted.
Private Data Protection Bill
Electronic Government Activities Bill
Electronic Transactions Bill
By implementing the Computer Crimes Act 1997, users can protect their rights to privacy and
build trust in the computer system. At the same time, the government can have control at a
certain level over cyberspace to reduce cyber crime activities.
66
TELEMEDICINE ACT 1997
The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice
telemedicine and that their patient's rights and interests are protected.
COMPUTER SECURITY
Definition of Computer Security
Computer security means protecting our computer systems and the information they contain
against unwanted access, damage, destruction or modification.
We need to protect our computer from any intruders such as hackers, crackers and script kiddie.
We do not want strangers to read our e-mail, use our computer to attack other systems, send
forged e-mail from our computer, or examine personal information stored on our computer
such as financial statements.
a) HARDWARE SECURITY
Hardware security refers to security measures used to protect the hardware specifically the
computer and its related documents.
The examples of security measures used to protect the hardware include PC-locks, keyboard-
locks, smart cards and biometric devices.
c) NETWORK SECURITY
The transfer of data through network has become a common practice and the need to implement
network security has become significant.
Network security refers to security measures used to protect the network system. One example of
network security measures is firewall. With firewall, network resources can be protected from the
outsiders.
67
INTERNET
INTRODUCTION
Internet is a communication network which bridges all the small computer networks
worldwide as a whole. Internet is based upon Internet technology, in particular World Wide Web
(WWW), to build Information System within organization or enterprise to accomplish
standardization and automation. Fundamentally, it means network computing environments
which let the users share the information through the Internet and Web browsers. Ultimately, it
allows a certain organization to build a Groupware within Web environment at low cost on top of
existing network infrastructure. By doing this, closed organization network would be
interconnected with existing worldwide Internet, which results in diverse information that
strengthens competitive advantages of the organization. Basically, it runs on top TCP/IP and
HTTP and filters out any illegal access through firewall.
Where the Internet connects people and organizations and information sources by using
common protocols to link computers on a public and open – to – all basis, an Internet uses the
same common protocols for internal company or group purposes. Instead of adopting a common
proprietary standard for its communications, information storage and presentation, etc., the
company (or any group of people or companies) decides to use Internet standards and methods.
INTERNET
In general, a web is an unstructured client / server network that uses HTTP as its
transaction protocol. The World Wide Web comprises all HTTP nodes on the public Internet .An
internal web comprises all HTTP nodes on a private network, such as an organization‟s LAN or
WAN. If the organization is a corporation, the internal web is also a corporate web.
Note that internal webs – also known as intranets – are only logically “internal “ to an
organization. Physically they can span the globe, as long as access is limited to a defined
community of interest
a) Simplicity of Use
The software that is used access the Internet (the web browser software) is comparatively
easy to learn and simple to use. It can operate on wide range of operating system platforms and
can access any mainstream application like SAP and oracle. The flexibility of the web combined
with the simplicity of the browser software has resulted in reduced staff training costs, lower
development costs and an increase in the range of users who can have access to the organization.
b) Breadth of Access
The internet is a global network like the telephone network. Its access is not conditioned
by geographic boundaries. Unlike the telephone network the cost involved in global connection
68
is not related to the distance involved. No other communication medium has had access to such a
large audience and range of people which increases the ability to leverage the value of
information to a scale that has never before been possible.
Example:
Book, magazine and newspaper publishers have used the web to supplement and extend
their written products.
Publishers of CD-ROMs have used the web to maintain the currency of the information
they can deliver. Microsoft‟s encyclopedias CD-ROM, Encarta, allows seamless interface to
information accessed from the company‟s web site.
Publishers of software and games now deliver their products directly over the internet.
Entertainment companies regularly provide extracts of their films and music recordings to
promote the real products.
f) Flexibility of Communication
The web browsers greatly extend the ways in which individuals can communicate. They
support text, voice and multimedia formats and can provide immediate access to shared
information. These facilities are available for intra-company communications as those between
individuals in separate organizations.
g) Security
Security has been a major issue in internet as any security breach can cause financial loss,
leak of sensitive information, etc. standards for secure electronic transactions have been
developed and reasonable security is in place now.
69
INTERNET – TCP/IP
INFRASTRUCTURE
INTRANET
Network Servers
Network Servers
INTERNET SOFTWARE:
To connect to the Internet, a computer requires mainly three different kinds of software:
70
1. World Wide Web: (WWW)
The World Wide Web (abbreviated as the web or WWW) is one of the most popular
services available on Internet. It is a subset of the Internet and it presents text, images, animation,
video, sound and other multimedia in a single interface. This greatly enhances the experience of
the Internet surfer. Although the World Wide Web is often referred to as the Internet, they are
actually two different concepts. The Internet is the decentralized global network of computers
that transfer information and the wring that makes all this possible whereas the web is a
collection of documents or websites, that users can access using the Internet and a web browser.
The web is a part of the Internet and it refers to a system of Internet servers that supports
hypertext using a specific Internet protocol called HTTP on a single interface (web browsers). In
addition, almost every protocol type available on the Internet is accessible on the web. This
includes e- mail, FTP, Telnet, and Usenet News. Since the WWW is a subset of the Internet, it
stands to reason that the web could not exist without the Internet. However, the Internet would
still be the Internet without the web.
The operation of the web relies primarily on hypertext, as it is a means of information
retrieval. Hypertext is a document containing words that connect to other documents. These
words are called links, which the user can select. A single hypertext document can contain links
to documents and resources throughout the Internet. With the ability of the web to work with
multimedia and advanced programming languages, the World Wide Web is the fastest growing
and the most interesting part of the Internet. With video conferencing and wireless applications,
the Internet is ready to take us to the new realm of communication and information exchange.
2. Electronic Mail (e-mail)
Electronic mail, or e-mail, is a fast, easy, and inexpensive way to communicate with other
Internet users around the world. It is one of the basic and earliest services of the Internet and the
most used application on the Internet too. E-mail overcomes most of the problems and delays of
getting a physical document from one person to another. Rather, it has the dual advantage of not
only being faster but cheaper to sue as well.
3. File Transfer Protocol (FTP)
FTP or File transfer Protocol is a system of rules and a software program that enables a
user to long on to another computer and transfer information between it and his/ her computer. It
was the first service developed for the Internet so that government and educational institutions
could easily exchange files. FTP allows the user to get access to the files stored in the directory
of a remote computer that is connected to the Internet. Using FTP, one can upload and download
files from the remote computer (known as FTP servers), if he/she has access permission on the
remote machine.
4. Telnet
The word “telnet” is derived from telecommunications and network and is a protocol that
allows a user to log on to a remote computer. Telnet is also known as remote login, which means
connecting one machine to another in such a way that a person may interact with another
machine as if it is being used locally.
71
6. Chatting and Instant Messaging
Chart programs allow users on the Internet to communicate with each other by typing in
real time. They are sometimes included as a feature of a website, where users can log into chat
rooms to exchange comments and information about the topics addressed on the site.
7. Internet Telephony
Internet telephone is the use of the Internet rather than the traditional telephone company
infrastructure, to exchange spoken or other telephonic information. It consists of hardware and
software that enable people to use the Internet as a transmission medium for telephone calls.
There are many Internet telephony applications available. Some, such as Cool Talk and
NetMeeting, come bundled with popular web browsers.
8. Video Conferencing
Video conferencing uses the same technology as IRC, but also provides sound and video
pictures. It enables direct face-to- face communication across networks. A video conferencing
system has to or more parties in different locations, which have the ability to communicate using
a combination of video, audio, and data. A video conference can be person to person (referred to
as “point-to-point”) or can involve more than two people (referred to as “multipoint”) and the
video conferencing terminals are often referred to as “endpoints”.
The following five elements are common to all video conferencing endpoints:
Camera: The camera captures live images to send across the network.
Visual Display: It displays the images of the people taking part in the videoconference.
Audio System: It includes both microphones to capture audio from the endpoint and
loudspeakers to play back the audio received from other endpoints across the network
connection.
Compression: Videos are very bandwidth- intensive and they take a long time to load.
Therefore, video systems include technologies, often referred to as codes, to compress and
decompress video and audio data, allowing transmission across a network connection in
near-real time.
User Interface and Control System: The user interface allows the users to control
interactions for example, placing calls, storing and locating numbers, and adjust
environment settings such as volume. The control system handles the underlying
communication that takes place between endpoints.
9. Newsgroups (Usenet)
Newsgroups are international discussion groups that focus on a particular topic and helps
in gathering information about that topic. The topics discussed here cover all the fields such as
politics, computers, technology, and many more. The information or articles that make up the
“news” are written by people interested in a specific topic. These articles are posted to the
newsgroup so that others can read, reply, and comment on them.
72
SUM UP
1. Internet is a communication network which bridges all the small computer networks
worldwide as a whole.
2. Characteristics of the internet gave it the potential to deliver a special set of business benefits
over and above existing IT technologies.
3. To connect to the Internet, a computer requires mainly three different kinds of software
namely TCP/IP, Dialer Software, Browser.
4. An Internet user has access to a wide variety of services such as electronic mail, file transfer,
vast information resources, interest group membership, interactive collaboration, multimedia
displays, real-time broadcasting, shopping opportunities, and much more.
An Internet can be defined as a network connecting an affiliated set of clients using standard
Internet protocols, esp. TCP / IP and HTTP or as an IP – based network of nodes behind a
firewall, or behind several firewalls connected by secure, possibly virtual, networks.
INTRODUCTION
An Extranet is a private network that uses the internet protocol and the public
telecommunication system to securely share part of business information or operations with -
suppliers, vendors, partners, customers, or other businesses.
Through e- mail, documents are prepared and sent electronically. The recipients need not be
present at the other end to send the message. The message gets stored in the electronic mailbox of
the addressee. The recipient can open the mailbox whenever he is free and can read or print the
message.
EXTRANET
An Extranet can be viewed a-part of a company's intranet that is extended to users outside
the company. It has also been described as a "state of mind" in which the internet is perceived as
a way to do business with other companies as well as to sell products to customers. Extranet
extends the intranet from one location to another across the internet by securing data flow, to
another intranet to a business partner. In these way intranets of business partners, suppliers,
creditors, distributors, customers, and the like are connected to extranets by agreements.
73
An Extranet requires security and privacy. These require firewall server management, e-
issuance and use of digital certificate or similar means of user authentication, encryption of
messages, and the use of virtual private networks that tunnel through the public network.
Characteristics of Extranet
The following are the important characteristics of the Extranet.
a) It is an extended internet-private business networks located outside of the corporate firewall.
b) It can be referred to an intranet that is partially accessible to authorized outsiders.
c) It is a network that uses the internet to link businesses with others that share the common
goals.
Uses of Extranet
Companies can use an Extranet to:
a. Exchange large volumes of data using Electronic Data Interchange.
b. Share product catalogs exclusively with wholesalers or those in the Trade.
c. Collaborate with other companies on joint development efforts.
d. Jointly develop and use training programs with other companies.
e. Provide or access services provided by one company to a group of other companies, such as
an online banking application managed by one company on behalf or affiliated banks.
f. Share news of common interest exclusively with partner companies.
g. The manufacturing companies can coordinate the design manufacturing, scheduling and
delivery across supply chain.
h. With extranet the technology firms can support for their customers and partners and makes it
possible for remote access for employees.
i. The financial services firms by using extranet can reduce costs of proprietary networks.
j. With extranet the publishing companies can increase the speed of design and production
cycles.
k. Other benefits:
Quicker turnaround time
Improved communication
Decreased paper flow
Traceable correspondence
Better service
Lower overhead and expenses
Improved employee morale
Increased Margins. ,
Flexibility and scalability.
Reduced transitional barriers.
Versatility.
A brief list of examples of extranet could include:
Allowing suppliers access to relevant inventory levels
Allowing clients to review their account records
Allowing students to update address information in real time.
As with intranet, access is granted only where you establish that it is required. User
access is controlled by the latest in security technologies, protecting sensitive material from
intrusion.
What is the relationship between intranets, Extranets and e–commerce?
The answer has three parts. First, intranets, extranets and e-commerce have in common
the use of Internet (predominantly web) protocols to connect business users. Second, intranets
74
are more localized and can therefore move data faster than more distributed extranets.
(Bandwidth limitations also apply to e-commerce.) Third, the amount of control that network
managers can exert over users is different for the three technologies.
On an Internet, administrators can narrowly prescribe access and policy for a fixed group
of users. For example, a company could specify Red Hat Linux as its standard desktop operating
system, and Netscape Communicator 5 as its standard browser and mail client. The company
could then write intranet workflow applications that leverage the uniform computing
environment, over which it exercises strong control.
The same is true, even more, for e-commerce, in which the trading partners may be
completely unknown to one another. This is the case when you walk into a supermarket: the
common interest in communication is based on the need to transact business, and not necessarily
on a long-term trust relationship. Thus, e-commerce applications often support a level of security
and transactional integrity (for instance, non-repudiation of orders) not present in intranet or
extranet applications.
E-MAIL
E- mail is an electronic message sent form one computer to another. We can send or
receive personal and business-related messages with attachments, such as pictures or formatted
documents. We can even send songs and computer programs.
The e-mail communication is incredibly simple. A person with a PC and a modem to
connect to the network can communicate with the other(s) so connected to the network. The
message can be prepared and sent instantly. The other person finds the e-mail when he checks his
mailbox and may replay to the message in the same way. The message sent is private and no
other person can read it.
Each user of e- mail service has a user ID or password serving as e- mail address. First
thing to do is to get online using modem and communication software. The system requires user-
id and password. Now the user can prepare his message in the form of a document using a word
processor. The e- mail address of the recipient has to be typed in before the message is sent,
With e- mail each person connected to the system is allotted a mailbox and the software
required for sending and receiving e-mail. The mailbox is simply a file into which the e-mail
system stores electronic documents. The user can check his mailbox for messages over the
network. The sender specifies his identify and that of the recipient. The sender then prepares the
document or retrieves the stored document and sends it.
75
E- mail is a document communication facility. To ensure that the recipient also
understands the emotions as well, a set of special symbols is used to convey some non-verbal
signals. A few of such symbols are given below.
Symbol Emotion
:- Humor
:) Smile
:( Frown
:/ ) Not funny
p- Private
:* Kiss
(:-( Very sad
To send e- mail, we need a connection to the internet and access to a mail server that forwards
the mail. The standard protocol used for sending internet e- mail is called SMTP, short for
Simple Mail Transfer Protocol. It works in conjunction with POP servers. POP stands for Post
Office Protocol.
When we send an e- mail message, our computer routes it to an SMTP server. The server
looks at the e-mail address (similar to the address on an envelope), then forwards it to the
recipient‟s mail server. Once the message arrives at the destination mail server, It‟s stored until
the addressee retrieves it. We can send e- mail anywhere in the world to anyone who has an e-
mail address.
76
E-mail route
With the advent of MIME, which stands for multipurpose Internet Mail Extension, and
other types of encoding schemes, we can not only send messages electronically, but we can also
send formatted documents, photos, sound files, and video files.
Advantages of E-mail
Messages can be prepared and sent any time convenient for the sender.
Message can be received at the convenience of the recipient.
The transmission takes place instantly and the message gets stored in the mailbox of the
recipient.
The system can confirm delivery of message.
Copies of message can be sent to multiple recipients.
It reduces paper work.
Disadvantages
Recipients must be having e- mail connectivity. They must have computer terminals,
modem and telephone.
They must be subscribing to the same e- mail service provider.
Poor telecommunication affects the quality of message transmitted.
Despite all the disadvantages e - mail is a cheap form of information transmission.
INDONET, NICNET, DARTMAIL and ICNET provide this service in India. A user can
be a subscriber to such e- mail service providing agencies and use their facility.
E-Mail Addressing Pattern
Internet e- mail addresses typically have two main
parts: [email protected]
First there is the user name (ibcocppd) which refers to the recipients mailbox. Then
there‟s an axon sign (@). Next comes the host name (satyammail), also called the domain name.
This refers to the mail server, the computer where the recipient ha an electronic mailbox. It‟s
usually the name of a company or organization.
The end of the domain name consists of a dot (“.”) followed by two or three letters (such
as .com and .gov) that indicate the top-level domain. This part of the domain name indicates the
type of organization or the country where the host server is located.
77
E-Mail Messages
The header contains the name and address of the recipient, the name and address of
anyone who is being copied, and the subject of the message. Some e- mail programs also display
your name and address and the date of the message.
The body contains the message itself. Just like when sending letters, we need the correct
address. If we use the wrong address or mistype it, our messages will bounce back with messages
like – Return to Sender, Address Unknown routine.
When we receive an e- mail, the header tells us where it came from, how it was sent,
and when. It‟s like an electronic postmark.
Unlike a letter, which is sealed in an envelope, e- mail is not as private. It‟s more like a
post card. Messages can be intercepted and read by people who really shouldn‟t be looking at it.
We should therefore avoid including any confidential information unless we have a way to
encrypt it.
Usage of Mails
Incoming mails can be checked on a daily basis at least 3 times a day.
We can use the e-mail facility judiciously and extensively for communicating with
Circle Office / Head Office/ Service Branch / Customers.
Communicate e- mail id to all domestic and overseas customers and use the facility for
passing on information regarding new schemes launched by Bank and other important
information to them.
Encourage customers to contact branch through e- mail for information regarding their
urgent banking requirements.
Use the facility as a marketing tool to attract new customers, exchange greetings with
existing customers and also inform them about recent happenings in the locality.
US SUM UP
1. An Extranet is a private network that uses the internet protocol and the public
telecommunication system to securely share part of business information or operations with -
suppliers, vendors, partners, customers, or other businesses.
2. E- mail allows users to send and receive messages anytime and anywhere in the world.
3. E- mail is popular as it is fast, flexible, and reliable
An Extranet is a private network that uses the internet protocol and the public
telecommunication system to securely share part of business information or operations wit-
suppliers, vendors, partners, customers, or other businesses.
78
NETWORKING
Introduction
With standardized hardware and software, the microcomputers provide user- friendly
environment. It meets the computing requirements of most users. But, the need for interaction
with other computer users and with other computer systems for exchange of data etc., has
increased over the years. Networks are increasingly meeting this need. From the users‟ point of
view the networks may be of two types: Local area network and Wide area network.
Computer networking is the process of inter connecting two or more computers so that
the users can communicate with each other, share resources and overcome other limitations of
stand-alone systems. The network can be established with a variety of combinations of
computers such as a net of only microcomputers, microcomputers and one or more
minicomputers and a set of microcomputers connected to a mainframe computer. The computers
in typical network are autonomous in the sense that they have processing capability independent
of the network.
Advantages of Networking
The main advantages of networking are:
(i). Hardware resource sharing:
Network enables sharing of expensive resources such as processor, storage space and
peripherals like modern, fax, and laser printer.
TYPES OF NETWORK
The networks can be classified into three; local area network (LAN), metropolitan area
network (MAN) and wide area network (WAN). They are explained in the following sections:
79
between computer centers and sharing of hardware, software and other communication facilities.
WAN can be implemented using private or public networks. In a private network an organization
takes on lease telephone lines to connect such sites into a network. It is also possible to connect
computers in different locations using microwave or satellite transmission. Public networks are
installed by the Government owned telecommunication agencies. WAN spans large geographic
distances. It is also called long-haul network. WAN is usually operated at lower speeds then
MAN and involves delay.
Most organizations use private networks for communication. Society for Worldwide Inter
bank Financial Transactions (SWIFT), a non-profit organization of banks, owns a private
network. The network exchanges financial transactions between the participating financial
institutions, about 3000 in number in over 60 countries. The terminals of these participating
banks are hooked with SWIFT‟s access centers. The network offers data communication service
24 hours a day, 7 days a week.
INDONET, NICNET, SBINET and WELCOMENET are some of the private network in
India. CMC‟s INDONET offers e-mail service to customers for a fee. NICNET is a network of
National Informatics Center that connects all the district headquarters in the country. SBINET is
a private network of State Bank of India and connects its branches across the country.
WELCOMNET connects the hotels of the Welcome Group.
Suppose a company has its central headquarters in Coimbatore and the Coimbatore site
contains all departments and equipment for product manufacturing prod distribution, accounting,
and sales. The information pertaining to these operations is tracked by a single centralized
database system. As the company becomes more profitable and expands, it established additional
sales offices on Mumbai and Delhi. Each sales office maintains its own system to record and
track customer orders for its region. At the same time the two sites are linked to the mode at
corporate headquarters and relay each order shipment and inventory and invoice processing.
Advantages of WAN
The integration of the local nodes into the distributed database linked by the WAN
provides the following advantages:
1. The WAN allows access to database at remote sites, enabling exchange of data.
2. If a remote node fails, remaining nodes on the network can still exchange data.
3. If the network fails, the local mode can still access its own database.
80
4. The data used on daily basis by the sales offices resides at the local site, making it easier to
retrieve quickly.
5. The local offices can maintain the data more effectively. The corporate office can access the
data as needed.
6. As a site's database grows larger, its system's storage capacity can be easily upgraded without
affecting the transfer of data between other nodes on network.
One of the most significant aspects of a wide area network when comparing it with freedom of a
local area network is the involvement of a public telecommunications authority. Regardless of
whether the network is made up from system, the controlling authority is almost always the
public authority. In order to protect their equipment and employees, the authority lays down
rules, which must be observed by anyone connecting to their lines. In most countries stringent
requirements are also imposed on the characteristics of the data transmissions.
The LAN is an interconnection of computers that need to communicate with each other in a
limited geographical area. The network may have other sharable devices attached such as fax,
laser printers and copiers. The network includes a central facility with huge storage capacity for
the requirements of the organization. It also has a network operating system for managing the
network.
Types of LAN:
Local area networks are mainly of two types: Client/ Server LAN and Peer-to-Peer LAN.
b) Peer-to-Peer LAN:
I n a Peer-to-Peer LAN every computer is equal in status and functioning. All the
computers on the network are capable of communicating independently with any other computer
on the network without using a server. Thus, any computer on the network can access data and
81
programs stored on any other computer. The peer-to-peer LAN is less expensive than
client/server LAN. But at the same time this LAN may be slower than a client/server LAN.
LAN Topology
The design of network requires selection of a particular topology and an architecture for
the interconnection of network component.
Topology refers to the way the computers are physically connected into the network. The
network architecture includes the specifications of the components that can be connected to the
network. IBM‟s Systems Network Architecture (SNA) is an example of vendor developed
network architecture. Such network architecture specifies network components such as terminals,
workstations, printers, cluster controllers, host computer and communications controllers.
There area a number of network topologies. Of them ring, star and bus are popular network
topologies.
a) Star Topology:
In star network the nodes are connected to a central computer called the host computer.
The nodes cannot communicate directly. Each node can communicate with the host computer.
The host computer takes the message and routes it to the other node or nodes.
Node
Node Printer
Host
(Server)/switch
Node Node
Node
The host is the main computer to which other nodes are connected by communication
links. The host computer is responsible for the overall functioning of the network. The node may
be a microcomputer, terminal or any other device like storage device, printer etc.,
In a star network centralization of control over the network resources is easy. It is also
possible to network minicomputer or mainframe with other microcomputers and dumb terminals.
It eliminates single point failure of a common wire. If one of the host computers fails, it does not
usually affect the others in the network. If the host computer/switch breaks down, the entire
network breaks down.
82
b) Ring Topology:
In a ring network the computers can communicate directly with each other and also with
the central computer. The nodes are connected to a line that is closed like a loop. The ring
network is more reliable than star network. Even if the central computer in the network fails, the
other computers can continue to communicate with each other.
Node
Node Printer
Ring
Node Node
Node
c) Bus Topology:
A bus network configures computers to a single non- looping channel. The computers
connected to the network share the same bus or communication channel. Bus wiring is easy and
needs much less wring for small segments.
Node Node
Old Ethernet bus wiring is prone to cable failure. If the bus wiring connection is broken at
any point, the entire network fails.
d) Hybrid Network:
In most cases, instead of a single topology, a combination of topologies may be used for
greater flexibility and reliability. Hybrid network combines features of Star, Ring and Bus
network:
Features of LAN
The features of LAN include the following
a) Limited geographical area say within a few kilometers.
83
b) Common communication link for sharing information, software and peripheral devices
without regard to proximity of user to such resources on the network.
c) High transmission capability.
d) Low error rate as the network contains built- in component for detecting for system errors.
e) Private ownership by the user.
f) Not subject to regulation by the telecom service.
A large personal computer or mini computer serves as the LAN‟s hub. A high capacity
hand disk is attached to the hub as data files and software are stored on the network file server.
The users can load the software on the file server and retrieve data files for processing. The
output can be directed to the printer attached to the LAN.
Any the communication network that meets most or all of the following characteristics
can be classified as LAN,:
a) All the devices on the network share a common transmission medium, that is, the cable and/
or the controller.
b) The devices connected to the network can operate independent of the network.
c) Any device connected to it can communicate with any other device on the network, and
d) The network is capable of supporting heavy data traffic over short distances compared to
telecommunication network.
e) The network covers a limited area usually a few kilometers in radius or a single site like a
university campus, an office or a factory.
f)
LAN Components
The components of LAN are File server, workstation, network operating system, LAN
cable, Active and Passive hubs etc.
a) Workstation
It is a single- user microcomputer with high power communication facilities. It can
exchange message with other workstations or fileserver.
Workstations can be of two types: user workstation and server workstation. User
workstation is a microcomputer on the network, which is used to access the network. Service
workstation performs service to process other workstations on the network. User workstation
normally does not process requests from other workstations. Server workstation makes available
all sharable network resources to other workstations. More than one server workstations may be
added to the network such as printer server and fileserver. Normally the server workstation is the
most powerful workstation. Server workstation may be dedicated or non-dedicated. In case of
dedicated workstation, it is not available for other user applications. Non-dedicated server
workstation doubles as an individual workstation and at the same time performs network-related
functions.
84
b) File Server
File server is actually a process running on a computer that provides the clients access to
files on that computer. The term is loosely applied to mean computer that runs file server
software. In this sense, it is a powerful computer with special software to serve files to other
workstations on the network. The files, which may be program files or data files, are
simultaneously shared by a number of workstations. Novell Netware is a popular network
operating system.
c) Gateway
The gateway assists in communicating between LANs. A workstation may be dedicated
to serve as gateway. This is required particularly when two networks with different technologies
have to communicate with each other. Gateway may also be used to connect LAN with a
mainframe computer.
e) Active Hub/Switch
Hub is an electronic device to which multiple computers are attached usually using
twisted pair cables. Active hub is a powered distribution point with active devices that drive
distant nodes up to one kilometer away. It can connect up to eight nodes on the network. The
maximum distance carried by an active hub is about 2000 ft.
f) Passive Hub
This hub is a distribution point that does not use power or active devices in a network to
connect up to four nodes within a short distance. The maximum distance covered by a passive
hub is nearly 300 ft.
g) LAN Cable
LAN requires superior cable capable of transferring data at high speed. Coaxial cables or
fibre optic cables may be used for networking computer.
i) Applications Software
Another component of LAN is application software. It has to be ensured that the
application software works in the multi- user environment.
j) Protocols
Data transmission between devices requires protocol. Protocols are sets of rules and
procedures to control the data transmission between computer and other devices. They are
85
common technical guidelines for communication between devices. They specify the order in
which signals will be transferred, the signal for completion of transfer etc. Only Devices using
the same protocol can communicate directly. Both the sending and receiving devices must use
the same protocol for effecting communication. For communication between devices using
different protocols requires intermediate interpretation device or software.
US SUM UP
1. Computer networking is the process of inter connecting two or more computers so that the
users can communicate with each other, share resources and overcome other limitations of
stand-alone systems.
2. A wide area network (WAN) is used to connect LANs and nodes that are separated by great
physical distance.
3. The LAN is an interconnection of computers that need to communicate with each other in a
limited geographical area.
86
OPERATING SYSTEM
Introduction
It is the first layer of software loaded into computer memory when it starts up. As the first
software layer, all other software that gets loaded after it depends on it for various common core
services. These common core services include disk access, memory management, takes
scheduling, and user interfacing. In addition the operating system ensures that different programs
executing at the same time do not interfere with each other. It provides a software platform on
top of which other programs can run. In simple words, the operating system organizes and
controls the hardware. Examples of operating systems are Windows XP, UNIX, and Linux.
OPERATING SYSTEM
The operating system is a software program that acts as an interface between the user and
the computer. It is used to control and manage the hardware components such as keyboard,
monitor, printer, scanner etc.
b) Memory Management:
It handles allocation and de-allocation of memory space as required by various programs.
c) File Management:
It is responsible for creation and deletion of files and directories. It also organizes, stores,
retrieves, names, and protects all the files.
d) Device Management:
It manages all the devices of the computer system such I/O devices like printers and
modems. If any device fails, it detects the device failure and notifies the same to the user.
e) Security Management:
Protects system resources and information against destruction and unauthorized use.
f) User interface:
Provides the interface between the user and the hardware.
87
provides essential features to control hardware devices such a keyboard, screen, disk drives,
printers, modems etc. Thus, DOS is a medium through which the user and external devices
attached to the system communicate the command with the system. DOS translate
communication issued by the computer in the format that is understandable by the computer and
instruct computer to work accordingly. It is also translates the result and any error message in the
format for the user to understand.
DOS Commands
We can type all DOS commands in either upper or lower case letters. There are two basic
types of DOS commands:
Internal commands
These commands, like COPY, DEL, and TYPE, are stored in computers memory. Many
DOS commands fall into this category.
External commands
This group of commands is stored on the disk. To use them, either insert the DOS floppy
disk, or change to the directory on hard disk which contains DOS external commands. Examples
of external commands include FORMAT, DISKCOPY, and CHKDSK.
Some commands can take several forms. These separate forms are used by including
various parameters with the command. Parameters, which will be discussed with each command,
are indicate by a / mark. Here is an example of command with an attached parameter:
C:\>DIR/W
[DOS command DIR is attached with parameter W]
All DOS commands must be activated by pressing the <Enter> key after typing the
command.
Features of DOS
Single user system
Machine independence
Program control
Peripheral management
Operating with Directories
Managing files
Processing commands
Managing input and output
Data securing
Using Batch files
Managing memory
Setting up environment
Command processing - DOS shell(a set of commands which is used to create the
programs)
Operating with Assembler.
Advantages of DOS
The DOS provides the following advantages:
Machine independence
More security
User friendly environment
More useful in commercial applications.
88
Error finding and recovery is more efficient
Facilities more graphical user interfaces.
Easy debugging
WINDOWS OPERATING SYSTEM
Microsoft Windows is the most popular operating system around the world. Even those
who are new to computers can use it with a little practice. With the help of Windows, we can
operate the computer just by clicking the mouse buttons, Windows95, Windows98, Windows
2000, Windows XP, Windows 7, 8, and Windows 10 are the various versions of Windows.
i) Applications icons - the minimized version of the currently running application programs. It
appears at the bottom of the desktop and can be maximized.
ii) Document icons - the reduced document windows.
iii) Program icons - appear with in program manager and clicking on these icons activate the
associated applications and also load the related documents or files.
89
Windows Explorer more or less acts as File Manager for windows 98, but with lots of
new features. It is more efficient, faster and user friendly. Using Explorer one can easily browse
through all the drives and network resources available and manage files.
(f) Right Mouse Button
Clicking on the right mouse button activates a pop- up menu in any program so as to help
in completing a task efficiently.
(g) Long File Names
As the MS-DOS convention follows, none-of the file used in DOS environment should be
more than 8 character of primary name and optimal secondary name (extension) of three
characters. However Windows 98 has broken this barrier. Windows 98 supports long file names
maximum of 225 characters. It also allowed space to be used in between file name. This helps to
make files and folders (directory/subdirectory) easier to organize and find.
h) Shortcuts
As the name suggests, SHORTCUTS are the shortest way to access programs, files other
resources in Windows 98. Instead of going through the structural process of accessing a program,
one can create “shortcuts” to access them. It creates links for easy access to file, programs,
folders and more.
i) Multitasking
Multitasking allows the user to activate and accomplish more than one task at a time. For
example, work on a document file WORD programs, which copies file from other computer
available in time on the network. With Windows 98, 32 - bit computing environment, the user
can do more than one task a time.
k) Software Compatibility
Windows 98 provides complete backward compatibility. It is easily compatible with other
applications developed for MS-DOS and Windows 3.x environment. It also supports latest 32-bit
technology. Most of the latest software packages are now built on Windows 98, operating
environment.
m) Hardware Compatibility
Windows 98 provides greater Hardware compatibility as compared to any other operating
environment. It has flexibility of supporting hardware from different vendors.
n) Find utility
Find Utility of windows 98 allows the user to do searches by partial name, last modified
date, or full text. In addition we can save, rename or view files from within the result pane.
(o) Help
90
Windows 98 provides online help to accomplish a task. If the user is not sure how to
perform a task, windows 98 Help will provide structured process how to accomplish the task.
Simply right-click on any object in the user interface (icon) and he can get relevant description
about that object.
2. Windows NT workstation
Windows NT is a single user; multitasking operating system designed to run on PC
workstations and incorporates all latest developments in operating system technology. It was
introduced in 1993. It includes the following:
(a) Windows NT workstation
(b) Windows NT server, and
(c) Windows NT enterprise edition
Features
a) Single User Multitasking
The main feature is that even through it is meant for a single user environment, provides
multitasking. For e.g., a user may use a word processor, a drawing program, a spreadsheet
application to produce a document. Without multitasking, simultaneous use of this will not be
possible. They must process with the s/w one by one; provide alignment making changes will be
a tedious process. In a multitasking environment, the user may keep all the applications open,
prepare the documentation and make necessary change. All of these are possible with increased
speed and memory capacity of microprocessors together with the support for virtual memory.
91
(iii) It provides a natural base for distributed computing.
However, UNIX also makes many demands of the user. In requires a different type of
commitment to understand the subject, even when the user is an experienced computer
professional. It introduces certain concepts not known to the computing community before, and
user numerous symbols whose meaning is anything but clear. It achieves unusual tasks with a
few keystrokes, but it takes time to devices a sequence of them for a specific task. Often, it
doesn‟t tell you whether you are right or wrong, and doesn‟t warn you of the consequences of
your actions. That is probably the reason why many people still prefer to stay away from UNIX.
Features of UNIX
UNIX is an operating system, so it is has all the features an operating system is expected
to have. However UNIX also looks at a few things differently and possesses features unique to it.
The following section gives a clear idea of the major features of this operating system.
92
a) UNIX: A Multi user System
From the fundamental point of view, UNIX is a multiprogramming system; it permits
multiple programs to run. This can happen in two ways
Multiple users can run separate jobs
A single user can also run multiple jobs.
d) Pattern Matching
UNIX features very sophisticated pattern matching features. UNIX features elaborate
pattern matching schemes that use several characters from the Meta character set. The matching
isn‟t confined to filenames only. Some of the most advanced and useful tools also use a special
expression called a regular expression that is framed with characters from the set.
e) Programming Facility
The UNIX shell is also a programming language; it was designed for a programmer, not a
casual end user. It has all the necessary ingredients, like control structures, loops and variables,
that establish it as a powerful programming language in its own right.
f) Documentation
UNIX documentation is no longer the sore point it once was. Even though it is sometimes
uneven at most times the treatment is quite. The principal online help facility available is the man
command, which remains the most important reference for commands and their configuration
files. Thanks to O‟Reilly & Associates, one can safely say that there‟s no feature of UNIX on
which a separate textbook is not available.
Apart from the online documentation, there‟s a vast ocean of UNIX resources available
on the internet. There are several newsgroups on UNIX where you can fire your queries in case
you are stuck with a problem – be it a problem related to shell programming or a network
configuration issue. The FAQ (Frequently Asked Questions) a document that addresses common
problems is also widely available on the Net. Then there are numerous articles published in
magazines and journals and lecture notes available by universities on their Web sites. UNIX is
easily tamed Operating System.
US SUM UP
1. There are different types of operating system: DOS (Disk Operating System), Windows
Operating System, The UNIX Operating System.
2. An operating system performs various functions like Process Management, Memory
Management, File Management, Device Management, Security Management, User interface,
93
3. The main functions of DOS are to manage files, allocate system resources according to the
requirement. There are two basic types of DOS commands: Internal commands and External
commands
4. Windows is an operating system. It is the extension of the disk operating system. It requires
DOS to run the application programs. The DOS should be loaded into the memory before the
windows is executed.
5. UNIX is a giant operating system and is way ahead of them in sheer power. It has
practically everything an operating system should have, and several features which other
operating systems never had.
LESSON END ACTIVITY
Work in windows and UNIX operating system and know the difference between the two.
Points for discussion
1) List and explain the functions of an Operating System.
2) Write short notes on different types of Operating System.
3) List out the features of DOS.
4) Write short notes on types of DOS commands.
5) Explain in detail about the features of WINDOWS.
6) Explain the various features of WINDOWS NT Work Station.
7) What are the advantages of WINDOWS NT..
i) The operating system is a software program that acts as an interface between the user and the
computer. It is used to control and manage the hardware components such as keyboard,
monitor, printer, scanner etc.
INTRODUCTION
The fast spread of IT has generated a need for highly trained workers to design and
develop new information systems and to integrate new technologies in them. It is creating the
need for professional workers who can fulfill the high performance standards in the technology-
based industries. The IT professional plan, design, develops, support, and manage the strategies
and adopt them to fulfill basic objectives of them firm. The rapidly changing technology requires
the employees to have more skills and education. The companies look out for IT professionals
who not only have sound technical knowledge of the subject but also have sound interpersonal
and communication skills.
Computer-related jobs
1. Programmer:
A programmer is a person who writes the code for a computer program. Computer
programs are the instructions given to the computer, telling the computer what to do, which
information to identify, access and process. The programmers write programs, depending on the
specifications given by the systems‟ analysts and software engineers. After the completion of the
design process, the programmer‟s job is to convert that design into a series of instructions that
94
the computer can follow. These instructions are coded in a programming language such as C,
C++, and Java, and then tested to ensure that the instructions are correct and produce the required
result. Programmers perform functions such as system designing, and its related services. They
are involved in coding of a project and the successful implementation of the developed system.
There are two types of programmers – application programmers and system
programmers. The application programmers code programs for a specific task (application) in the
organization. On the other hand, the systems programmers code programs for controlling and
maintaining the computer system software.
2. System analyst:
A systems analyst plans, designs, develops, and implements new systems or applies the
existing system resources to perform additional operations. Most of the systems analysts work
with specific type of system like business, accounting, finance, science or engineering and so on.
Some systems analysts are also known as system developers or system architects.
A system analyst determines the problem in the system by discussing it with the
managers and users before starting an assignment. They study the information needs of the
organization to determine the changes that are required to deliver a solution to the problems of
users. To design a system, the systems analysts specify the inputs required by the system, plan
the processing steps and finalize the output to meet the user‟s requirements. Next, the systems
analyst determines the hardware and software needed to set up the system.
Systems analysts prepare the specifications, flowcharts, and process diagrams for the
computer programmers to follow, and then work with the programmers to debut, and to rectify
and errors in the system. They also check the initial use of the system and organize tests to check
the working of the system to ensure that it works as required of planned. Systems analysts who
perform more intricate testing of products are referred to as software equality assurance analysts.
They not only perform tests but also diagnose the problems, suggest solutions and checks
whether the program requirements have been met or not. The analysts, who design, test and
evaluate the Internet, Intranet, local area network (LAN), wide area network (WAN) and other
data communications system are called network and data communications analysts.
3. Network administrator
A network administrator is a person who installs, configures, and supports the local area
network, wide area network, the Internet system or the segment of a network system in an
organization. Every network in an organization requires at least one network administrator.
Network administrators perform the functions such as installation, configuration, maintenance of
computers, and networking of equipment. They also check and ensure the availability of network
to all the users. They supervise the support of other networks and plan, coordinate and implement
network security measures.
4. Database administrator
A database administrator (DBA) is an individual who is responsible for the storage of
data, management of the database, and implementation of the database management system.
They work with database management systems software and determine ways to organize and
store data. They identify user requirements, set up the computer databases, and test and organize
the modifications to the systems. They also ensure the performance of the system in the
organization, understand the platform on which the database is running and adds new users to the
system. DBA is responsible for maintaining data integrity, back up systems and database
security.
95
5. Web designers
A web designer is an individual who provides an architectural structure for the effective
communication of clients‟ content by logically organizing the information and making it
accessible. With the rapid growth of the Internet, many jobs relating to design, development, and
maintenance of the web sites and servers have cropped up in the market. The web designer
controls all aspects of design and programming of elements of text and visual design. They are
responsible for maintaining all technical aspects of a web site, including its performance issues
such as speed of access and approving the content of the web site. Web designers create the
artistic feel of the web site, facilitate navigation, and make content on the web site accessible to
the users.
REFERENCES
1. Davis,Gordon.B, and Olson, Malgrethe H., Management Information systems, Mcgraw
Hill Book company
2. „O‟ Brien, James .A, Management Information systems: A managerial end user
perspective, Galgotia Publications Private Limited, New Delhi.
3. Gupta, Uma G., Management Information systems, A managerial perspective, Galgotia
Publications Private Limited, New Delhi.
4. Kenneth C. Laudon and Jane P. Laudon, Management Information system, Prentice Hall
of India.
5. ITL Education Solutions Limited, Introduction to Information Technology,Pearson
Education, New Delhi.
96