Overview of Computer System Components
Overview of Computer System Components
Unit-I
Q1) Define Computer system and explain its elements?
Software
Connec
Hardware
tivity
Computer
System
Data
People
Procedure
Definition:
Computer system is an electronic device which performs the calculations with high speed
and accuracy.
Computer takes the data, processes the data and generates useful information.
Every computer takes the data from input unit, stores the data in memory unit, processes
the data in CPU and gives output through output unit.
Computer system is a combination of hardware and software.
Software
Hardware
People
Connecting
Data
Procedure
Software:
Software is a collection of programs and each program is a set of instructions. Software is used to
execute particular tasks. There are 2 types of software.
The software which is used by system to execute particular task is called as system software.
The software which is used by user to execute particular task is called as application software.
Hardware:
The physical components of the computer which we can see and touch are called hardware.
Input devices
Output devices
Memory devices
CPU
User makes use of output devices to receive information from computer system.
Data:
Procedure:
It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.
People:
Connectivity:
It means connecting computer system to any network. Group of computers connected together to
share data and resources is called as network.
Computer system can be connected to other devices by LAN cable or WIFI of Bluetooth.
ITFB by P Nagaiah Goud
The physical components of the computer which we can see and touch are called hardware.
Input devices
Output devices
Memory devices
CPU
Computer system makes use of central processing unit to process the data.
Input:
Input is any data or instructions entered into the computer in the form of
signals
Through keyboard
Input devices:
ITFB by P Nagaiah Goud
The devices that are used to enter data and instructions or commands into the
computer in the form binary data
• Keyboard
• Digitizer
• Micro phone
• Digital camera
• Touch screen
Keyboard:
Contain keys for each alphabetic characters, digits and special characters,
functional keys
Used to feed data and instructions into a computer by pressing related keys on
the keyboard
Pointing devices:
Used to select item on the screen, to select commands from the command
menu, to draw graphs etc
Mouse:
Mouse can be moved on the flat surface to control the movement of the
cursor or pointer on the screen
Used to select any option from the group of options by pointing the mouse
pointer on it and then clicking one of the mouse buttons.
Track ball:
It is similar to mouse but it is a stationary pointing device with a ball on its top
Joystick:
Light pen:
Handheld pen shaped device with a photocell mounted at its front end
Electronic pen:
Used to write texts and draw lines with the help of its pressure
Digitizer:
Microphone:
Input device used to enter the sound signals of user into the computer
Sound card translates the sound signals into digital signals for processing by
computer
Also translates the sound digital signals back into the analog signals
Digital camera:
Input device used to take pictures and to store directly into the computer in
digital form
SCANNERS:
OCR
OMR
MICR
Barcode Reader
Digital scanner:
Read images and text printed on paper and then translates into electronic form
that can be processed and stored by the computer
It is a type of scanner
It is a type of scanner
It is a type of scanner
The MICR encoding, called the MICR line, is located at the bottom of a cheque
or other voucher and typically includes the document type indicator, bank
code, bank account number, cheque number and the amount, plus some
control indicator. The technology allows MICR readers to scan and read the
information directly into a data collection device.
ITFB by P Nagaiah Goud
Are electronic devices for reading printed barcodes. These are optical machine-
readable representations of data relating to the object to which they are attached.
Used in super markets and shopping malls
Touch screen:
Touch the different areas of screen with the finger tip just as you click different
areas with the help of mouse
An output device is any piece of computer hardware equipment which converts information into
human-readable form. It can be text, graphics, audio, and video.
Monitors
Printer
Plotter
Computer Speakers
Headphones
Projectors
Monitors
ITFB by P Nagaiah Goud
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer.
It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness
of the image depends upon the number of pixels.
Flat-Panel Display
The monitors that use cathode ray tube for producing the output are known as CRT
monitors.
In CRT Monitor, a cathode ray tube is used as the picture tube of the monitor.
In CRT monitor cathode ray tubes are glass vacuum tubes into which an electron gun emits a
flow of electrons guided by an electrical field towards a screen.
Thus screen of this tube is divided into rows and columns. So the intersection of rows and
columns makes a cell and that cell is called a pixel.
The number of pixels per unit area of the screen is called resolution. More the resolution,
more clearly will be the picture
The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT. You can hang them on walls or wear them on your
wrists. Current uses of flat-panel displays include calculators, video games, monitors, laptop
computer, and graphics display.
Emissive Displays − Emissive displays are devices that convert electrical energy into light.
For example, plasma panel and LED (Light-Emitting Diodes).
Printer:
Printers
Impact Printers
Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then pressed on the
paper.
Very noisy
ITFB by P Nagaiah Goud
Character printers
Line printers
Character Printers
Character printers are the printers which print one character at a time.
Daisy Wheel
In the market, one of the most popular printers is Dot Matrix Printer. These printers are popular
because of their ease of printing and economical price. Each character printed is in the form of
pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out
to form a character which is why it is called Dot Matrix Printer.
Advantages
Inexpensive
Widely Used
Disadvantages
Slow Speed
Poor Quality
Daisy Wheel
ITFB by P Nagaiah Goud
Is very similar to typewriters. A circular printing element is the heart of these printers that contains
all text, numeric characters and symbols mould on each petal on the circumference of the circle.
The printing element rotates rapidly with the help of a servo motor and pauses to allow the printing
hammer to strike the character against the paper..
Advantages
Better quality
Disadvantages
Noisy
Line Printers
Line printers are the printers which print one line at a time.
Drum Printer
Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the drum is divided
into a number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper width of 132
characters, drum will have 132 tracks. A character set is embossed on the track. One rotation of
drum prints one line. Drum printers are fast in speed and can print 300 to 2000 lines per minute.
ITFB by P Nagaiah Goud
Advantages
Disadvantages
Very expensive
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard character
set may have 48, 64, or 96 characters.
Advantages
Disadvantages
Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a complete
page at a time, thus they are also called as Page Printers.
Laser Printers
Inkjet Printers
High quality
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.
Advantages
Disadvantages
Expensive
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology. They print
characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output
with presentable features.
They make less noise because no hammering is done and these have many styles of printing modes
available. Color printing is also possible. Some models of Inkjet printers can produce multiple copies
of printing also.
Advantages
More reliable
Disadvantages
Computer Speakers
Computer speakers are hardware devices that transform the signal from the computer's sound card
into audio. Speakers are essential if you want a louder sound, or just a better quality of audio.
External computer speakers began to appear in stores in the early 1990's when computer gaming,
digital music, and other forms of media became popular. Some computer speakers are wireless
nowadays, connecting to the computer via Bluetooth
Headphones
Also known as earphones, headphones allow you to listen to audio without disrupting other people
in the vicinity. They connect via the computer line out, or to the speakers. Nowadays, headphones
come in all sorts of shapes and sizes.
Projector
As its name suggests, this output device "projects" computer images onto a wall or screen.
Projectors are typically used for presentations, watching movies, or as a teaching aid, as they
enable an entire roomful of people to see images generated by a single computer.
ITFB by P Nagaiah Goud
Computer systems
Communication link
Connecting devices such as router, hub, bridge etc.
Types of networks
The systems which are in the same building are connected together to share data and resources is
called as local area network. The speed of local area network is more compared to WAN and MAN.
Local area network covers 1 km distance. Example of local area network is Ethernet.
System A System B
Communication link
System C System D
The systems which are in metropolitan cities are connected together to share data and resources is
called as metropolitan area network. It covers the distance of 50 kilometers. The speed of MAN is
more compared to WAN but less compared to LAN. Example of Metropolitan area network is cable
TV.
Communication link
Connec
ting
device
System C System D System C System D
Different systems in the same city are connected by using connecting device
ITFB by P Nagaiah Goud
Connecting
device Sys C
Sys C
Network in India
Network in USA
The systems which are geographically separated are connected together to share data and
resources is called as wide area network. It covers unlimited distance. The Speed of WAN is very
less compared to LAN and MAN. Example of wide area network is Internet.
If the personal devices such as mobile, Bluetooth, speakers, printer etc are connected to personal
computer then that type of network is called as personal area network. The speed of PAN is more
compared to LAN because the radius of PAN is 10 meters.
Laptop
Speaker Mo
bil
e
Or
Definition
The physical or logical arrangement of the systems in the network is called as topology. Or a
geometric connection of the systems in the network is called as topology. The following are the
different types of topologies.
ITFB by P Nagaiah Goud
Bus topology
Ring topology
Star topology
Mesh topology
Hybrid topology
Bus topology
In Bus topology all the systems are connected to a single communication line called Bus. That is all
the systems make use of single communication line for communication. Because of single
communication line collision of data may occur. If collision of data occurs then the receiver will not
receive the data even though it receives the data it cannot understand because whenever collision
occurs there is a possibility that 1 will be replaced with 0 and 0 will be replaced with 1.
Communication link
Sys D Sys E
Ring topology
In ring topology all the systems are arranged in a ring shape. There is a token rotates freely in a
circular path. Before going to transmit the data the sender has to obtain the token. The ring allows
only one sender to transmit the data at a time. It is designed to overcome the limitations of Bus
topology. The ring topology allows only one sender to transmit the data so there is no collision of
data. In this network if any system is not working then the entire network will not work.
Sys A
Ring token
Sys D Sys C
Sys C
ITFB by P Nagaiah Goud
Star topology
In star topology all the systems are connected to a central system called HUB. Hub is responsible for
controlling communication between the systems. In this topology every system has a separate
communication line with HUB. The benefits of having separate communication line are :
In this topology if HUB is not working then entire network will not work.
Mesh topology
In mesh topology every system is connected with every other system. There are multiple
communication lines between the systems. The benefit of having multiple communication lines
is that, if any communication line is not working then the sender can select other
communication line to transmit the data. The following are the disadvantages of mesh topology.
Hybrid topology
ITFB by P Nagaiah Goud
Memory is used to store the data either temporarily or permanently. The following are the
different types of memories in the computer.
Memory
Examples:
RAM ROM
CD, DVD,HD
SRAM PROM
Main Memory
DRAMMemory
Secondary EPROM
i) RAM
ii) ROM
It holds the instructions as long as the system is on when the system is switched off then the
instructions in the RAM will be destroyed automatically.
SRAM(Static RAM)
DRAM(Dynamic RAM)
SRAM:
The SRAM memories consist of circuits capable of retaining the stored information as long
as the power is applied. That means this type of memory requires constant power.
DRAM:
A solid-state semiconductor memory that can only read data stored in advance.
It contains BIOS
Its characteristic is that once the data is stored, it can no longer be changed or deleted.
It allows the user to read the data but not write the data.
ITFB by P Nagaiah Goud
It has additional forms those devices will allow the user to re-write the data. They are
PROM
EPROM
EEPROM
PROM is read-only memory chip that data can be written only once by a user.
The user buys a PROM, the user will need a special device called a PROM programmer or
PROM burner to write the desired data onto the blank PROM chip.
EPROM is a special kind of read only memory chip that has the opportunity to erase the
programmed data.
The programmable read-only memory can be programmed to write data with high voltage,
and the data remains until it is exposed to ultraviolet light for lasting up to 10 minutes or
longer.
Secondary/Auxiliary memory is used to store large amount of data permanently for long period.
The following are the examples of secondary memory devices.
Hard disk
Compact disk
Digital versatile disk
Hard disk:
It is made up of rigid material and is usually a stack of metal disks sealed in a box. The hard disk and
the hard disk drive exist together as a unit and is a permanent part of the computer where data and
programs are saved. These disks have storage capacities ranging from 1 GB TO 1TB and more. Hard
disks are rewritable.
Compact disk:
ITFB by P Nagaiah Goud
Compact disk is portable disk having data storage capacity between 650 to 700 MB. It can hold
large amount of information such as music, videos and text. CD can be either read only or read and
write type.
DVD is similar to a CD but has larger storage capacity and enormous clarity. Depending upon the
disk it can store several Gigabytes of data.
a) Answer:
Processor:
A processor is an integrated electronic circuit that performs the calculations that run a computer. A
processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are
passed from an operating system (OS).
A central processing unit (CPU), also called a central processor, main processor or just processor.
Central Processing Unit (CPU) consists of the following features
This unit can store instructions, data, and intermediate results. This unit supplies information to
other units of the computer when needed. It is also known as internal storage unit or the main
memory or the primary storage or Random-Access Memory (RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory are two
types of memories in the computer. Functions of the memory unit are −
It stores all the data and the instructions required for processing.
It stores intermediate results of processing.
It stores the final results of processing before these results are released to an output
device.
All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual
data processing operations.
Functions of Control unit are `
It is responsible for controlling the transfer of data and instructions among other units of a
computer.
It manages and coordinates all the units of the computer.
It obtains the instructions from the memory, interprets them, and directs the operation of
the computer.
It communicates with Input/Output devices for transfer of data or results from storage.
It does not process or store data.
Arithmetic Section
Logic Section
Arithmetic Section
Logical Section
It performs logical operations such as comparing, selecting, matching, and merging of data.
B) Answer:
System Software
Application Software
System Software
The software which is used by system itself is called as system software. The system software is a
collection of programs designed to operate, control, and extend the processing capabilities of the
computer itself. System software serves as the interface between the hardware and the end users.
Some examples of system software are
Operating System.
Compilers
Interpreter
Assemblers
Features of a system software
Application Software:
The software which is used by user to execute particular task is called as application software.
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the category
of Application software. Application software may consist of a single program, such as Microsoft's
notepad for writing and editing a simple text. It may also consist of a collection of programs, often
called a software package, which work together to accomplish a task, such as a spreadsheet
package.
Examples of Application software:
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
Features of application software
Definition:
Process Management
Memory Management
File Management
Device Management
Security
Command Interpretation
Process Management
A process is a program in execution. There are n numbers of processes in the computer system.
During the execution, a process needs certain resources such as CPU time, memory space, files and
I/O devices. Process Management module takes care of creation and deletion of processes,
scheduling of system resources to different processes requesting them and providing
communication among processes.
Memory Management
Before going to execute a program, we need to load the program in to main memory. Memory
management module takes care of allocation and de-allocation of memory space to programs in
the computer.
File Management
In computer system information is stored in a small unit called file. Processes read information from
files and create new files for storing newly generated information. File management module takes
care of file related activities such as organization, storage, retrieval, naming, sharing and protection
of files.
Device Management
There are n numbers of programs in computer to execute, computer consists of only one CPU and
several I/O devices such as terminal, printer, disk, and tape. The device management module
controls all I/O devices. It keeps track of I/O requests from processes. It issues commands to I/O
devices, and ensures correct data transmission to/from an I/O device.
Security Management
Computer system stores large amount of information, some of which are highly sensitive and
valuable to their users. Security module protects the resources and information of a computer
system against destruction and unauthorized access.
Command Interpretation
ITFB by P Nagaiah Goud
For using various system resources, a user communicates with the Operating System via a set of
commands provided by it. The operating system also provides a simple language called as
command language (CL) or job control language (JCL); Using which a user can send the request for
particular resource. Command interpretation module interprets and directs system resources to
process the commands.
In single user operating system one user can operate only one system. We cannot run more
than one application at a time, if you want to run another program, we have to close the
current application or program. The best example for single user operating system is MS Dos.
Batch processing: -
Operating system executes various tasks and requests in batches not as individual task this
operating system accepts various tasks from the user and places them in queue waiting
execution. This process of placing requests in a queue for execution is known as spooling. Each
job task is assigned a priority, where execution time is available then these jobs are selected on
the basis of their priority from the queue.
Interactive OS:
Interactive OS do provide for features where the user can directly interact with the computer
from a terminal. The user can interrupt the execution of high priority batch job and get his low
priority job done by the computer. Most of the main frame-based OS today use these
interactive OS.
Multi-tasking OS:-
ITFB by P Nagaiah Goud
In multi programming OS several numbers of programs are feed into main memory of
the computer and processed.
The multi programming OS runs one program at a time. When the program requires
some I/O operation which is slow process the CPU switches to another job for
execution.
If the second job also requires I/O operation the C.P.U switches to third job and so on.
Always a program will be in one of the 3 states ready, running and blocked.
Until the first program completes I/O operation it is blocked and once completed the
C.P.U switches back to it.
Multi programming is the inter leaved execution of 2 or more separate and independent
programs by the same computer.
Example: windows
Multi-processing OS: -
Multi-processing refers to the ability of a system to support more than one processor at the
same time. Applications in a multi-processing system are broken to smaller routines that run
independently. The operating system allocates these threads to the processors improving
performance of the system.
Example: windows, Linux, Unix
OSI Model: OSI stands for Open Systems Interconnection. The ISO (International Standards
Organization) was introduced the OSI model in 1983.
The OSI model is a standard reference model for communication between two users in a network.
Each layer of this model does not depend on the other layer, but the data is transmitted from one
layer to another layer. The OSI model describes how to send and receive data in a network. All
layers of the OSI model have their different functions so that data can be easily accessed from one
system to another. It is a seven-layer model.
ITFB by P Nagaiah Goud
Physical Layer
It is responsible for transmission and reception of the unstructured raw data over network.
Voltages and data rates needed for transmission is defined in the physical layer.
Data link layer synchronizes the information which is to be transmitted over the physical
layer.
The main function of this layer is to make sure data transfer is error free from one node to
another, over the physical layer.
This layer sends and expects acknowledgements for frames received and sent respectively.
Resending of non-acknowledgement received frames is also handled by this layer.
ITFB by P Nagaiah Goud
This layer establishes a logical layer between two nodes and also manages the Frame traffic
control over the network. It signals the transmitting node to stop, when the frame buffers
are full.
Network Layer
Network layer routes the signal through different channels from one node to other.
It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
Transport Layer
Transport layer decides if data transmission should be on parallel path or single path.
Functions such as Multiplexing, Segmenting or Splitting on the data are done by this layer
It receives messages from the Session layer above it, convert the message into smaller units
and passes it on to the Network layer.
Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more efficiently
by the network layer.
Session layer manages and synchronize the conversation between two different
applications.
Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely and
data loss is avoided.
Presentation Layer
Presentation Layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.
While receiving the data, presentation layer transforms the data to be ready for the
application layer.
ITFB by P Nagaiah Goud
Languages (syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role of translator.
Application Layer
Transferring of files disturbing the results to the user is also done in this layer. Mail services,
directory services, network resource etc are services provided by application layer.
This layer mainly holds application programs to act upon the received and to be sent data.
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network
model. Protocols are set of rules which govern every possible communication over a network.
These protocols describe the movement of data between the source and destination or the
internet. They also offer simple naming and addressing schemes.
TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department
of Defence's Project Research Agency (ARPA, later DARPA) as a part of a research project of
network interconnection to connect remote machines. It has 4 layers.
Host-to-network Layer
Protocol is used to connect to the host, so that the packets can be sent over it.
Internet layer
ITFB by P Nagaiah Goud
Order in which packets are received is different from the way they are sent.
Delivering IP packets
Performing routing
Avoiding congestion
Transport Layer
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
Application Layer
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.
FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
ITFB by P Nagaiah Goud
DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
It operated independently.
It is scalable.
Client/server architecture.
Demerits of TCP/IP
Physical communication media is a physical path between the transmitter and the receiver i.e. it
is the channel through which data is sent from one place to another. Transmission Media is
broadly classified into the following types:
Guided media:
It is defined as the physical medium through which the signals are transmitted. It is also known as
Bounded media. The following are different types of guided media
Twisted pair
Coaxial cable
Fiber optic
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each other. A twisted pair
cable is cheap as compared to other transmission media. Installation of the twisted pair cable is
easy, and it is a lightweight cable. The frequency range for twisted pair cable is from 0 to 3.5KHz. A
twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
Coaxial Cable
• Coaxial cable is very commonly used transmission media, for example, TV wire is usually
a coaxial cable.
• The name of the cable is coaxial as it contains two conductors parallel to each other.
• It has a higher frequency as compared to twisted pair cable.
• The inner conductor of the coaxial cable is made up of copper, and the outer conductor
is made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
• The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
ITFB by P Nagaiah Goud
Fiber Optic
• Fiber optic cable is a cable that uses electrical signals for communication.
• Fiber optic is a cable that holds the optical fibers coated in plastic that are used to send the
data by pulses of light.
• The plastic coating protects the optical fibers from heat, cold, electromagnetic interference
from other types of wiring.
• Fiber optics provides faster data transmission than copper wires.
UnGuided Transmission
• An unguided transmission transmits the electromagnetic waves without using any physical
medium. Therefore it is also known as wireless transmission.
• In unguided media, air is the media through which the electromagnetic energy can flow
easily.
• Radio waves
• Microwaves
• Infrared waves
Radio Waves
• Radio wave is a wireless transmission medium that distributes radio signals through the air.
Radio waves are widely used as signals on radio communication .
ITFB by P Nagaiah Goud
• A transmitter is needed to send the broadcast signal and a receiver is needed to accept the
signal.
• Some networks use a transceiver, which both sends and receives signals from wireless
devices.
Microwaves
• Microwaves are radio waves that provide a high-speed signal transmission. Microwaves
transmission involves sending signals from one microwave station to another.
• Microwaves transmission is fast but is limited to line-of-sight transmission, which means
that the microwaves must transmit in a straight line with no obstructions between
microwave antennas.
• Microwaves stations are often located on the tops of buildings, towers, or mountains to
avoid possible obstructions. Microwaves transmission is used where installing physical
transmission media is difficult or impossible (e.g., deserts, lakes), but where line-of-sight
transmission is available.
• Radio waves in general have long distance communication capabilities, than microwaves.
Infrared
• Infrared (IR) is a wireless transmission media that sends signals using infrared light waves.
• IR transmission also requires a line-of-sight transmission as that required by microwaves.
• Computer devices such as a mouse, printer, and digital camera, which have an IrDA port
may transfer data from one device to another using infrared light waves.
• IR is an alternative to short-range broadcast radio communications such as Bluetooth
ITFB by P Nagaiah Goud
Satellite Communication
GUI is an interface that allows users to interact with different electronic devices using icons and
other visual indicators. The graphical user interfaces were created because command line interfaces
were quite complicated and it was difficult to learn all the commands in it.
In today’s times, graphical user interfaces are used in many devices such as mobiles, MP3 players,
gaming devices, smartphones etc.
The below diagram provides the position of the graphical user interface with respect to the
computer system
ITFB by P Nagaiah Goud
items, navigate the system using links, tabs etc. and manipulating data using check boxes, radio
boxes etc.
Tabs
A tab is associated with a view pane. It usually contains a text label or a graphical icon. Tabs are
sometimes related to widgets and multiple tabs allow users to switch between different widgets.
Tabs are used in various web browsers such as Internet Explorer, Firefox, Opera, Safari etc. Multiple
web pages can be opened in a web browser and users can switch between them using tabs.
Advantages of GUI:
UNIT-II
Data
Data can be defined as a representation of facts, concepts, or instructions in a formalized
manner, which should be suitable for communication, interpretation, or processing by human
or electronic machine.
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or
special characters (+,-,/,*,<,>,= etc.)
Information
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
The following are the characteristics of Information
Timely − Information should be available when required.
Accuracy − Information should be accurate.
Completeness − Information should be complete.
Knowledge:
ITFB by P Nagaiah Goud
Knowledge is a combination of information, experience and insight that may benefit the
individual or the organization. Knowledge is a very important concepts as it is the process by
which data turns into useful information. The process of this transformation between data and
valuable information depends on the creation of relationships between sets of data
understanding of a set of information and the ways that information can be used to support a
specific task or reach a decision.
Characteristics of knowledge:
Definition
Software
Hardware
Database
Network
Procedure
Human resources
Software:
Software is a collection of programs and each program is a set of instructions. Software is used
to execute particular tasks. It is used to organize, process and analyze data. There are 2 types of
software.
System software
ITFB by P Nagaiah Goud
Application software
The software which is used by system to execute particular task is called as system software.
The software which is used by user to execute particular task is called as application software.
Hardware:
The physical components of the computer which we can see and touch are called hardware.
Input devices
Output devices
Memory devices
CPU
Database:
A Database is an organized collection of logical related data stored in the form of tables.
Network:
Procedure:
It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.
Human Resources:
It is associated with the manpower required to run and manage the system. People are the end
user of the information system, end-user use information produced for their own purpose, the
main purpose of the information system is to benefit the end user. The end user can be
accountants, engineers, salespersons, customers, clerks, or managers etc.
Organizational dimension
Management dimension
ITFB by P Nagaiah Goud
Technology dimension
Organizational Dimension:
Management Dimension:
Technological Dimension:
TPS
MIS
DSS
Expert System
AIS
SIS
ITFB by P Nagaiah Goud
Experts System:
Experts systems include expertise in order to aid managers in diagnosing problems or in
problem-solving. These systems are based on the principles of artificial intelligence research.
Experts Systems is a knowledge-based information system. It uses its knowledge about a specify
are to act as an expert consultant to users.
Knowledgebase and software modules are the components of an expert system. These modules
perform inference on the knowledge and offer answers to a user’s question
Definition:
When used in a corporate context, a MIS is used to increase the value and profits of a business
by providing managers with the relevant and appropriate information needed to make
important decisions quickly.
The three components of MIS such as Management, Information, and System provide a more
complete and focused definition,
Management information system can be analyzed as follows −
Management
Management covers the planning, control, and administration of the operations of a concern.
The top management handles planning; the middle management concentrates on controlling;
and the lower management is concerned with actual administration.
Information
Information, in MIS, means the processed data that helps the management in planning,
controlling and operations. Data means all the facts arising out of the operations of the
concern. Data is processed i.e. recorded, summarized, compared and finally presented to the
management in the form of MIS report.
System
Data is processed into information with the help of a system. A system is made up of inputs,
processing, output and feedback or control.
Thus MIS means a system for processing data in order to give proper information to the
management for performing its functions.
ITFB by P Nagaiah Goud
Objectives of MIS
The goals of an MIS are to implement the organizational structure and dynamics of the
enterprise for the purpose of managing the organization in a better way and capturing the
potential of the information system for competitive advantage.
Following are the basic objectives of an MIS −
Capturing Data − Capturing contextual data, or operational information that will
contribute in decision making from various internal and external sources of
organization.
Processing Data − The captured data is processed into information needed for planning,
organizing, coordinating, directing and controlling functionalities at strategic, tactical
and operational level. Processing data means −
o making calculations with the data
o sorting data
o classifying data and
o summarizing data
Information Storage − Information or processed data need to be stored for future use.
Information Retrieval − The system should be able to retrieve this information from the
storage as and when required by various users.
Information Propagation − Information or the finished product of the MIS should be
circulated to its users periodically using the organizational network.
Characteristics of Computerized MIS
Following are the characteristics of a well-designed computerized MIS −
It should be able to process data accurately and with high speed, using various
techniques like operations research, simulation, heuristics, etc.
It should be able to collect, organize, manipulate, and update large amount of raw data
of both related and unrelated nature, coming from various internal and external
sources at different periods of time.
It should provide real time information on ongoing events without any delay.
It should support various output formats and follow latest rules and regulations in
practice.
It should provide organized and relevant information for all levels of management:
strategic, operational, and tactical.
Advantages of MIS:
A good management information system can be used not only for the storage of electronic data
alone but must be able to support the analysis required by management. There are
many advantages of MIS which are utilized by manager to achieve organization goal.
Components of MIS
A management information system is made up of five major components namely people,
business processes, data, hardware, and software. All of these components must work together
to achieve business objects.
Software
Hardware
Database
Network
Procedure
Human resources
Software:
Software is a collection of programs and each program is a set of instructions. Software is used
to execute particular tasks. It is used to organize, process and analyze data. There are 2 types of
software.
System software
Application software
The software which is used by system to execute particular task is called as system software.
The software which is used by user to execute particular task is called as application software.
ITFB by P Nagaiah Goud
Hardware:
The physical components of the computer which we can see and touch are called hardware.
Input devices
Output devices
Memory devices
CPU
Database:
A Database is an organized collection of logical related data stored in the form of tables.
Network:
Procedure:
It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.
Human Resources:
It is associated with the manpower required to run and manage the system. People are the end
user of the information system, end-user use information produced for their own purpose, the
main purpose of the information system is to benefit the end user. The end user can be
accountants, engineers, salespersons, customers, clerks, or managers etc.
Definition:
Decision support systems (DSS) are interactive software-based systems intended to help
managers in decision-making by accessing large volumes of information generated from
various related information systems involved in organizational business processes, such as
office automation system, transaction processing system, etc.
DSS uses the summary information, exceptions, patterns, and trends using the analytical
models. A decision support system helps in decision-making but does not necessarily give a
decision itself. The decision makers compile useful information from raw data, documents,
ITFB by P Nagaiah Goud
personal knowledge, and/or business models to identify and solve problems and make
decisions.
Characteristics of a DSS
Support Tools − Support tools like online help; pulls down menus, user interfaces,
graphical analysis, error correction mechanism, facilitates the user interactions with the
system.
Classification of DSS
There are several ways to classify DSS.
Text Oriented DSS − It contains textually represented information that could have a
bearing on decision. It allows documents to be electronically created, revised and
viewed as needed.
Database Oriented DSS − Database plays a major role here; it contains organized and
highly structured data.
Spread sheet Oriented DSS − It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to execute
self-contained instructions. The most popular tool is Excel and Lotus 1-2-3.
Solver Oriented DSS − It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
Rules Oriented DSS − It follows certain procedures adopted as rules.
Compound DSS − It is built by using two or more of the five structures explained above.
Types of DSS
Following are some typical DSSs −
Status Inquiry System − It helps in taking operational, management level, or middle
level management decisions, for example daily schedules of jobs to machines or
machines to operators.
Data Analysis System − It needs comparative analysis and makes use of formula or an
algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System − in this system data is analysed and the information
report is generated. For example, sales analysis, accounts receivable systems, market
analysis etc.
Accounting System − It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of
the major aspects of the business.
Model Based System − Simulation models or optimization models used for decision-
making are used infrequently and creates general guidelines for operation or
management.
6). Explain Expert System (ES)?
ITFB by P Nagaiah Goud
An expert system is a computer program that is designed to solve complex problems and to
provide decision-making ability like a human expert. It performs this by extracting knowledge
from its knowledge base using the reasoning and inference rules according to the user queries.
The expert system is a part of AI, and the first ES was developed in the year 1970, which was
the first successful approach of artificial intelligence. It solves the most complex issue as an
expert by extracting the knowledge stored in its knowledge base. The system helps in decision
making for complex problems using both facts and heuristics like a human expert. It is called
so because it contains the expert knowledge of a specific domain and can solve any complex
problem of that particular domain. These systems are designed for a specific domain, such
as medicine, science, etc.
The performance of an expert system is based on the expert's knowledge stored in its
knowledge base. The more knowledge stored in the KB, the more that system improves its
performance. One of the common examples of an ES is a suggestion of spelling errors while
typing in the Google search box.
Components:
As this is a skilled & time consuming operation, it is often this which limits the designing and
functioning of expert system in a commercial environment. Knowledge Acquisition program is
used by an individual, who has expertise in the problem to, creates, add to or change the
knowledge base. Potential sources of knowledge include human expert, research reports,
textbooks, databases and the user’s own experience.
Experts make decisions based on qualitative & quantitative information. The system engineer
has to translate the standard procedures into the form suitable for the expert system. Acquiring
the knowledge from experts is a complex task that often is a bottleneck in expert system
construction.
Knowledge Base:
This is the most important element of an expert system since it holds the expert’s problem
solving knowledge. It is where the knowledge elicited from the expert is stored. It contains
rules, facts and descriptions of objects etc.
With newer expert system products, the knowledge base is always stored in data. The
information in knowledge base is everything that is necessary for understanding & formulating
the problem & then solving it.
The key to knowledge base is how the knowledge is represented. The knowledge acquired from
the expert has to be represented formally. Such knowledge representation deals with the
structuring of the information, manipulation of information, and knowledge acquisition. The
power of a system tends to be r elated from all sides of the knowledge in the knowledge base.
Interference engine
The interference engine is that part of the program which regains & determines how to apply
the knowledge in the knowledge base to the facts & premises presented at the user interface. It
ITFB by P Nagaiah Goud
performs this task in order to deduce new facts which are subsequently used to draw further
conclusions. The interference engine is the active component of an expert system. It is the
Brain of the expert system.
Interference engine is also known as the control structure or the rule interpreter. This
component is essentially a computer program that processes the knowledge base to achieve
the goal stipulated by the user, who is communicating with the system via the user interface. It
provides a methodology for reasoning about information in the knowledge base & for
formulating conclusions.
User Interface:
The human computer interface or user interface technology allows users to interact with the
system. The user presents the problem and has the conclusions presented to him. A significant
feature of some expert systems is that they can justify the conclusions reached as well as
explain why certain options were used or discarded.
Medical Domain Diagnosis Systems to deduce cause of disease from observed data,
conduction medical operations on humans.
An executive information system (EIS) is a decision support system (DSS) used to assist senior
executives in the decision-making process. It does this by providing easy access to important
data needed to achieve strategic goals in an organization. An EIS normally features graphical
displays on an easy-to-use interface.
ITFB by P Nagaiah Goud
Executive information systems can be used in many different types of organizations to monitor
enterprise performance as well as to identify opportunities and problems.
Components of EIS
USER INTERFACE: User Interface allows the users to communicate with the EIS.
User interface must be easy to use and understand. Users should not be required
to understand the complex query languages and other mathematical or
statistical formulas.
HARDWARE: Hardware refers to devices by which users give input, data
processing and the output is received. Users may give input via keyboard and
mouse and CPU may be used for processing and output may be received on
monitor or from printer.
SOFTWARE: Software is required for various calculations, providing graphical
view to the management, storing data in the form of Information, etc. Software
allows user to get information in the form it is actually required.
TELECOMMUNICATION: In today’s world the most important thing is
communication. Users may require transferring information from one point to
another point. The information might be a little confidential in nature. The
secrecy of the information should be well maintained.
Applications of EIS
MANUFACTURING:
It determines whether a process is running correctly or not.
It helps in ensuring proper quality control of finished goods.
It measures the actual process time and compares with the standard time
required for the process.
It provides management with daily production report, daily consumption
report, safety stock report, economic order quantity, etc.
FINANCIAL:
Every organization needs to ensure financial activities are running sound.
EIS may help to analyze whether payment has been realized from creditors within
stipulated period of time.
It can help management in managing various other sources of finance.
ACCOUNTING:
It helps in proper accounting and disbursement of accounting functions.
Advantages
EIS is easy for use and saves time of the top level management of the
organization.
EIS provide access to timely information in a rapid manner.
EIS provides extensive online analysis tools.
EIS can easily be given a DSS support.
Characteristics:
ITFB by P Nagaiah Goud
Detailed data – EIS provides absolute data from its existing database.
Integrate external and internal data – EIS integrates external and internal data. The
external data collected from various sources.
Presenting information – EIS represents available data in graphical form which helps to
analyze it easily.
Trend analysis – EIS helps executives of the organizations to data prediction based on
trend data.
Easy to use – It is a very simplest system to use.
Q8) Define DBMS and explain its Architecture? Or Explain Architecture of database system?
Database:
A database is an organized collection of logically related data stored in the form of tables or
relation. As shown in the below diagram.
STUDENT Table
COURSE Table
Courseid Cname
684 BBA
405 [Link] CA
Table is a collection of rows and columns, each column is called as attribute and each row is
called as record. Every table contains Primary Key, which is used to uniquely identify every row
in the database.
It is defined as the application software system that allows users to define, create, maintain and
control access to the database. DBMS makes it possible for end users to create, read, update
and delete data in database. It is a layer between programs and data.
Advantages of DBMS:
Sharing of Data
Data Integrity
Data Security
Privacy
Backup and Recovery
Data Consistency
DBMS Architecture:
The DBMS architecture describes how data in the database are viewed by the users. It is not
concerned with how the data are handled and processed by the DBMS. It shows different levels
of data abstraction. Data Abstraction is a process of hiding unwanted or irrelevant details from
the end user. It provides a different view and helps in achieving data independence which is
used to enhance the security of data. The DBMS architecture, consists of three levels they are
• Internal level
• Conceptual level
• External levels
Internal level:
It is the lowest level of data abstraction that deals with the physical representation of the
database on the computer and, thus, is also known as the physical level. It describes how the
data are physically stored and organized on the storage medium.
Conceptual level:
This level of abstraction deals with the logical structure of the entire database and, thus, is also
known as the logical level. It describes what data are stored in the database, the relationships
among the data and a complete view of the user's requirements without any concern for the
physical implementation.
External level:
It is the highest level of abstraction that deals with the user's view of the database and, thus, is
also known as the view level. It permits users to access data in a way that is customized
according to their needs, so that the same data can be seen by different users in different ways,
at the same time. In this way, it provides a powerful and flexible security mechanism by hiding
the parts of the database from certain users as the user is not aware of the existence of any
attributes that are missing from the view.
9Q) Explain advantages and disadvantages of DBMS?
ITFB by P Nagaiah Goud
DBMS is an application software that allows users to define, create, maintain and control access
to the database. DBMS makes it possible for end users to create, read, update and delete data
in database. It is a layer between programs and data. DBMS has the following advantages.
Redundancy is the concept of repetition of data i.e., each data may have more than a single
copy. The file system cannot control redundancy of data as each user defines and maintains
the needed files for a specific application to run. There may be a possibility that two users are
maintaining same files data for different applications. Hence changes made by one user does
not reflect in files used by second users, which leads to inconsistency of data. Whereas DBMS
controls redundancy by maintaining a single repository of data that is defined once and is
accessed by many users. As there is no or less redundancy, data remains consistent.
Data consistency:
Data consistency is ensured in a database because there is no data redundancy. All data
appears consistently across the database and the data is same for all the users viewing the
database. Moreover, any changes made to the database are immediately reflected to all the
0users and there is no data inconsistency.
Sharing of Data
In a database, the users of the database can share the data among themselves. There are
various levels of authorization to access the data, and consequently the data can only be shared
based on the correct authorization protocols being followed. Many remote users can also
access the database simultaneously and share the data between themselves.
Data Integrity
Data integrity means that the data is accurate and consistent in the database. Data Integrity is
very important as there are multiple databases in a DBMS. All of these databases contain data
ITFB by P Nagaiah Goud
that is visible to multiple users. So it is necessary to ensure that the data is correct and
consistent in all the databases and for all the users.
Data Security
Data Security is vital concept in a database. Only authorized users should be allowed to access
the database and their identity should be authenticated using a username and password.
Unauthorized users should not be allowed to access the database under any circumstances as it
violates the integrity constraints.
Privacy
The privacy rule in a database means only the authorized users can access a database according
to its privacy constraints. There are levels of database access and a user can only view the data
he is allowed to. Limited access means privacy of data. For example - In social networking sites,
access constraints are different for different accounts a user may want to access.
Database Management System automatically takes care of backup and recovery. The users
don't need to backup data periodically because this is taken care of by the DBMS. Moreover, it
also restores the database after a crash or system failure to its previous condition.
Disadvantages
Increased cost
Management complexity
Maintaining currency
Frequent upgrade/replacement cycles
Increased costs
One of the disadvantages of DBMS is Database systems require sophisticated hardware and
software and highly skilled personnel. The cost of maintaining the hardware, software, and
personnel required to operate and manage a database system can be substantial. Training,
licensing, and regulation compliance costs are often overlooked when database systems are
implemented.
Management complexity
Database systems interface with many different technologies and have a significant impact on a
company’s resources and culture. The changes introduced by the adoption of a database
system must be properly managed to ensure that they help advance the company’s objectives.
ITFB by P Nagaiah Goud
Given the fact that database systems hold crucial company data that are accessed from
multiple sources, security issues must be assessed constantly.
Maintaining currency
maximize the efficiency of the database system, you must keep your system current. Therefore,
you must perform frequent updates and apply the latest patches and security measures to all
components. Because database technology advances rapidly, personnel training costs tend to
be significant. Vendor dependence. Given the heavy investment in technology and personnel
training, companies might be reluctant to change database vendors. As a consequence, vendors
are less likely to offer pricing point advantages to existing customers, and those customers
might be limited in their choice of database system components.
DBMS vendors frequently upgrade their products by adding new functionality. Such new
features often come bundled in new upgrade versions of the software. Some of these versions
require hardware upgrades. Not only do the upgrades themselves cost money, but it also costs
money to train database users and administrators to properly use and manage the new
features.
Ethics are the principles of right and wrong individuals, acting as free moral agents, use to make
choices to guide their behavior. Information systems raise new ethical questions for both
individuals and societies because they create opportunities for intense social change.
Ethical, social, and political issues are closely linked. Introduction of new technology has a ripple
effect in the current equilibrium, creating new ethical, social, and political issues that must be
dealt with on individual, social, and political levels. Both social and political institutions require
time before developing new behaviors, rules, and laws.
ITFB by P Nagaiah Goud
System quality
Quality of life
Who can and will be held accountable and liable for the harm done to individual and
collective information and property rights?
ITFB by P Nagaiah Goud
System quality:
What standards of data and system quality should we demand to protect individual
rights and the safety of society?
Quality of life:
Technology trends:
Four key technology trends have heightened the ethical stresses on existing social
arrangements and laws.
Responsibility: Accepting the potential costs, duties, and obligations of one's decisions
accountability
Liability: Refers to the existence of laws that permit individuals to recover the damages
done to them by other actors, systems, or organizations
Due process: Requires that laws are known and understood by all, and that individuals
can appeal to higher authorities to ensure laws were properly applied
UNIT-III
The MIDI (Musical Instrument Digital Interface) is a format for sending music information
between electronic music devices like synthesizers and PC sound cards. The MIDI format was
developed in 1982 by the music industry. The MIDI format is very flexible and can be used for
everything from very simple to real professional music making. MIDI files do not contain
sampled sound, but a set of digital musical instructions (musical notes) that can be interpreted
by your PC's sound card.
The MIDI format is supported by many different software systems over a large range of
platforms. MIDI files are supported by all the most popular Internet browsers. Sounds stored in
the MIDI format have the extension .mid or .midi.
The RealAudio format was developed for the Internet by Real Media. The format also supports
video. The format allows streaming of audio (on-line music, Internet radio) with low
bandwidths. Because of the low bandwidth priority, quality is often reduced. Sounds stored in
the RealAudio format have the extension .rm or .ram.
The AU Format:
The AU format is supported by many different software systems over a large range of
platforms. It was developed by Sun microsystems. Sounds stored in the AU format have the
extension .au.
ITFB by P Nagaiah Goud
The AIFF (Audio Interchange File Format) was developed by Apple. AIFF files are not cross-
platform and the format is not supported by all web browsers. Sounds stored in the AIFF format
have the extension .aif or .aiff.
The SND (Sound) was developed by Apple. SND files are not cross-platform and the format is
not supported by all web browsers. Sounds stored in the SND format have the extension .snd.
The WAVE (waveform) format is developed by IBM and Microsoft. It is supported by all
computers running Windows, and by all the most popular web browsers. Sounds stored in the
WAVE format have the extension .wav.
MP3 files are actually MPEG files. But the MPEG format was originally developed for video by
the Moving Pictures Experts Group. We can say that MP3 files are the sound part of the MPEG
video format. MP3 is one of the most popular sound formats for music recording. The MP3
encoding system combines good compression (small files) with high quality. Expect all your
future software systems to support it. Sounds stored in the MP3 format have the extension
.mp3, or .mpga (for MPG Audio).
The WAVE format is one of the most popular sound format on the Internet, and it is supported
by all popular browsers. If you want recorded sound (music or speech) to be available to all
your visitors, you should use the WAVE format. The MP3 format is the new and upcoming
format for recorded music. If your website is about recorded music, the MP3 format is the
choice of the future.
ITFB by P Nagaiah Goud
A container and a codec are two components of any video file. A video format is the container
that stores audio, video, subtitles and any other metadata. A codec encodes and decodes
multimedia data such as audio and video.
When creating a video, a video codec encodes and compresses the video while the audio codec
does the same with sound. Afterwards the encoded video and audio are synchronized and
stored in a media container—the file format.
• MOV
• WebM
• RV (RealVideo)
MP4:
MP4 is one of the earliest digital video file formats introduced in 2001. Most digital platforms
and devices support MP4. An MP4 format can store audio files, video files, still images, and
text. Additionally, MP4 provides high quality video while maintaining relatively small file sizes.
Extension is .mp4
MOV :
MOV is a popular video file format designed by Apple. It was designed to support the
QuickTime player. MOV files contain videos, audio, subtitles, timecodes and other media types.
It is compatible across different versions of QuickTimePlayer, both for Mac and Windows. Since
it is a very high-quality video format, MOV files take significantly more memory space on a
computer. Extension is .mov
ITFB by P Nagaiah Goud
WMV
The WMV video format was designed by Microsoft and is widely used in Windows media
players. WMV format provides small file sizes with better compression than MP4. That is why
it’s popular for online video streaming. Although it is not compatible with Apple devices, users
can download Windows Media Player for their iPhone or Mac. Extension is .wmv
FLV
FLV is a file format used by Adobe Flash Player. It is developed by Adobe Systems. It is one of
the most popular and versatile video formats supported by all video platforms and browsers.
The FLV format is a good choice for online video streaming platforms like YouTube. They have a
relatively small file size which makes them easy to download. The only drawback is that it’s not
compatible with many mobile devices like iPhones. Extension is .flv
AVI
The AVI file format was introduced in 1992 by Microsoft and is still widely used today. The AVI
video format uses less compression than other video formats such as MPEG or MOV. This
results in very large file sizes, approximately 2-3 GB per minute of video. It can be a problem for
users with limited storage space. You can also create AVI video files without any compression.
This makes the files lossless. A lossless file will keep its quality over time, regardless of how
many times you open or save the file. Additionally, this eliminated the use of codecs in video
players. Extension is .avi
AVCHD
AVCHD is a format used for HD video playback and digital recording. This video format was
designed by Panasonic and Sony for professional high-definition video recording. AVCHD also
lets you store hours of high-quality video using only a tiny amount of data by using video
compression technology. Additionally, the latest version of the format AVCHD 2.0 supports
three-dimensional video. File extension is .avchd . Supported by VLC player, Widows media
player.
WebM
ITFB by P Nagaiah Goud
First introduced by Google in 2010, WebM is an open-source video format that was developed
with the current and future state of the Internet in mind. WebM is intended for use with
HTML5. The video codecs of WebM require very little computer power to compress and unzip
the files. The aim of this design is to enable online video streaming on almost any device, such
as tablets, desktop, smartphones or devices like smart TV. Extension is. Webm. Supported by
VLC player
RealVideo (RV)
Multimedia:
It is a form of communication that combines different content forms such as text, audio,
images, animations, or video into a single presentation, in contrast to traditional mass media,
such as printed material or audio recordings. Popular examples of multimedia include video
podcasts, audio slideshows, animated shows, and movies. Multimedia can be recorded for
playback on computers, laptops, smartphones, and other electronic devices, either on demand
or in real time.
Multimedia device:
It can allow a person to accomplish a wide range of tasks. To begin with, a person may need to
develop communication. This can be done by typing a document, taking a picture, or producing
a video. Once this is done, individuals may want to save these items. Later, they may want to
access them again and alter them. There is also a possibility that a person will want to transfer
media files from one device to another or share them with someone else.
Multimedia Devices:
• Webcams
• Digital camera
• MIDI ports
• Microphones
• Sound cards
• Video capture cards
Webcam:
A webcam is a simple digital camera capable of taking video or still images for transmission over
the Internet. Unlike digital cameras, webcams don't include storage capabilities. Most webcams
plug into a USB port, but a few have used parallel ports. Webcams are generally used in live
chat situations.
ITFB by P Nagaiah Goud
Digital Camera:
Digital cameras have largely replaced film cameras for both amateur and professional
photography. They use CMOS or CCD image sensors to record images onto internal or card-
based flash memory form factors such as Compact Flash, SD, Memory Stick, and Smart Media.
Digital cameras transfer images to computers for emailing, printing, or storage via either flash
memory card readers or direct USB port connections.
MIDI (Musical Instrument Digital Interface) is a protocol developed in the 1980's which allows
electronic instruments and other digital musical tools to communicate with each other. MIDI
itself does not make sound, it is just a series of messages like "note on," "note off,"
"note/pitch," "pitchbend," and many more. These messages are interpreted by a MIDI
instrument to produce sound. A MIDI instrument can be a piece of hardware (electronic
keyboard, synthesizer) or part of a software environment.
Sound Card:
Sound cards are used to record and play back analog audio, and most can also play back digital
audio sources as well. When recording analog audio sources such as CDs, line in or microphone
in, sound cards digitize the audio at varying sample rates and store files in either uncompressed
forms such as WAV or compressed forms such as WMA or MP3.
Microphone:
ITFB by P Nagaiah Goud
Microphone is a device that captures audio by converting sound waves into an electrical signal.
We can easily connect it to Computer.
As the name suggests, video capture cards are used to capture live video from various sources,
including analog camcorders, VCRs, analog output from DV camcorders, broadcast TV, and
cable TV. Most recent cards with video capture capabilities are actually multi-purpose cards
that include other functions. These include ATI's All-in-Wonder series of video (graphics) cards
with onboard TV tuner and video capture functions, video (graphics) cards with VIVO (video-
in/video-out) S-video or composite video ports, and TV tuner cards and USB devices. Video can
be stored in a variety of formats, including MPEG, AVI, and others for use in video productions.
ITFB by P Nagaiah Goud
OR
Compression, or "data compression," is used to reduce the size of one or more files. When a file
is compressed, it takes up less disk space than an uncompressed version and can be transferred
to other systems more quickly. Therefore, compression is often used to save disk space and
reduce the time needed to transfer files over the Internet.
Lossy Compression
Lossless Compression
Lossy compression
Lossy compression removes some of a file’s original data in order to reduce the file size. This
might mean reducing the numbers of colors in an image or reducing the number of samples in a
sound file. This can result in a small loss of quality of an image or sound file.
A popular lossy compression method for images is the JPEG, which is why most images
on the internet are JPEG images.
A popular lossy compression method for sounds is MP3. Once a file has been
compressed using lossy compression, the discarded data cannot be retrieved again.
Lossless compression
Lossless compression doesn’t reduce the quality of the file at all. No data is lost, so lossless
compression allows a file to be recreated exactly as it was when originally created. There are
various algorithms for doing this, usually by looking for patterns in the data that are repeated.
Zip files are an example of lossless compression. The space savings of lossless
compression are not as good as they are with lossy compression.
CODEC
JPEG
• It can reduce files sizes to about 5% of their normal size; some detail is lost in the
compression.
• The JPEG compression algorithm is at its best on photographs and paintings of realistic
scenes with smooth variations of tone and color.
• JPEG is not as well suited for line drawings and other textual or iconic graphics.
GIF
• It is limited to 256 colors; it is more effective for scanned images such as illustrations
rather than color photos.
• GIFs are suitable for sharp-edged line art (such as logos) with a limited number of colors.
• GIFs can also be used to store low-color sprite data for games.
• GIFs can be used for small animations and low- resolution film clips.
PNG
MPEG
• MPEG algorithms compress data to form small bits that can be easily transmitted and
then decompressed.
Compression Techniques
• Run-length coding
Example: 89400000000000000000000000000000000
Run-length Encoding
Example:
Decompression
It is the process of restoring compressed data to its original form. Data decompression is
required in almost all cases of compressed data, including lossy and lossless compression.
Similar to compression of data, decompression of data is also based on different algorithms.
Decompression is considered important, as compressed data needs to be restored back to
standard state for usage. Decompression is widely used in data communications, multimedia,
audio, video and file transmissions. Decompression is also known as uncompressing.
ITFB by P Nagaiah Goud
Multimedia:
Multimedia devices such as mobile phones, laptops etc. plays and important role to
grow business.
Millions of online websites (form of multimedia) are available on internet to reach end
user and grow business.
More and more companies are taking an advantages of World Wide Web to increase
sales of their products.
Using multimedia anyone can sell their product anywhere in the world on internet.
Business
Research and medicine
entertainment
Industry
Education
Multimedia in public places
Engineering
Business:
Presentation
Online marketing
Sharing information with employees
Videoconferencing
Entertainment:
Industry:
Education:
Engineering:
UNIT-IV
Internet Definition:
The Internet is a global information network that connects millions of computers. It is growing
exponentially and provides a unique information resource that is global, diverse and current. It
is a network of networks.
Uses of internet
Browsing information
Social media and creating awareness
For entertainment (music, videos, movies)
Communicating with people all over the world.
Sharing information
E-commerce and banking
The Internet got its start in the United States more than 50 years ago as a government weapon
in the Cold War. Scientists and researchers used it to communicate and share data with one
another through what was known as DARPANET (Defense’s Advanced Research Projects Agency
Network). This was in response to the Soviet Union bombings and a need to create a
communication network which was free from interference and disruption.
In 1962, a scientist from M.I.T. and DARPA named J.C.R. Licklider proposed: a “galactic
network” of computers that could talk to one another. Such a network would enable
government leaders to communicate even if the Soviets destroyed the telephone
system.
In 1965, another M.I.T. scientist developed a way of sending information from one
computer to another that he called “packet switching.” Packet switching breaks data
down into blocks, or packets, before sending it to its destination. Without packet
switching, the government’s computer network—now known as the ARPANET—would
have been just as vulnerable to enemy attacks as the phone system.
ITFB by P Nagaiah Goud
In 1969, ARPANET delivered its first message: a “node-to node” communication from
one computer to another but it crashed the full network. The internet was yet to be
born.
By the end of 1969, just four computers were connected to the ARPANET, but the
network grew steadily during the 1970s.
As packet-switched computer networks multiplied, however, it became more difficult
for them to integrate into a single worldwide “Internet.
By the end of the 1970s, a computer scientist named Vinton Cerf had begun to solve this
problem by developing a way for all of the computers on all of the world’s mini-
networks to communicate with one another.
He called his invention “Transmission Control Protocol,” or TCP. (Later, he added an
additional protocol, known as “Internet Protocol.” The acronym we use to refer to these
today is TCP/IP.)
TCP/IP was described to be the “handshake” between computers all over the world. It
enabled each computer to have its own identity.
Cerf’s protocol transformed the Internet into a worldwide network. Throughout the
1980s, researchers and scientists used it to send files and data from one computer to
another.
However, this network was still between scientists and researchers from different
universities and labs.
In 1991 the Internet changed again. Berners-Lee created the first browser and the
Internet that we know today.
In 1992, a group of students and researchers at the University of Illinois developed a
sophisticated browser that they called Mosaic. (It later became Netscape.)
Mosaic offered a user-friendly way to search the Web: It allowed users to see words and
pictures on the same page for the first time and to navigate using scrollbars and
clickable links.
That same year, Congress decided that the Web could be used for commercial purposes.
As a result, companies of all kinds hurried to set up websites of their own, and e-
commerce entrepreneurs began to use the Internet to sell goods directly to customers.
ITFB by P Nagaiah Goud
More recently, social networking sites like Facebook have become a popular way for
people of all ages to stay connected.
Types of Addressing:
Physical Addressing
Logical Addressing
Friendly Addressing
Physical addressing
Physical addressing (MAC), which identifies hardware, specifying the constructor and the
product serial. It is unique and can theoretically be used to communicate. But as it does not
include any networking information, communications based only on MAC addresses would be
very unscalable (huge routing tables). This is the reason why another kind of addressing (logical)
has been chosen.
Logical addressing
Logical addressing (IP), which identifies a logical host (not always the same hardware) of
a given network. Every address is built through the concatenation of a netid (network
identifier) and a hostid (host identifier). Consequently, routing tables can be highly
reduced (one entry per network instead of one entry per host).
Friendly addressing
Friendly addressing (DNS), introduced to help users remembering (or even guessing) the
name of a host. Whereas the previous addressing’s were digital, DNS is alpha-digital. In other
words, DNS addresses look like understandable names. They are built through the hierarchical
concatenation of different domains and a hostname.
IP addresses classification
ITFB by P Nagaiah Goud
1. Client (user of computer) at home or in a LAN network is at the lowest level in hierarchy.
2. Local Internet Service Provider (ISP) is at the next higher level.
a. An ISP is an organization that has its own computers connected to the internet
and provides facility to individual users to connect to Internet through their
computers.
b. Local ISP is the local telephone company located in the telephone switching
office, where the telephone of client terminates. Examples of local ISP in India
Bharat Sanchar Nigam Ltd. (BSNL), Mahanagar Telephone Nigam (MTNL) and
Airtel.
c. The client calls local ISP using a modem or Network Interface Card.
3. Regional ISP is next in the hierarchy. The local ISP is connected to regional ISP
a. A router is a special hardware system consisting of a processor, memory, and an
I/O interface, used for the purpose of interconnecting networks. A router can
interconnect networks having different technologies, different media, and
physical addressing schemes or frame formats.
b. The regional ISP connects the local ISPs located in various cities via routers.
c. If the packet received by regional ISP is for a client connected to this regional
ISP, then the packet is delivered; otherwise, packet is sent to the regional ISP's
backbone
4. Backbone is at top of the hierarchy Backbone operators are large corporations like AT&T
which have their own server farms connected to the backbone There are many
Backbones existing in the world.
a. The backbone networks are connected to Regional ISP's with a large number of
routers through high speed fiber optics.
b. Network Access Point (NAP) connects different backbones, so that packets travel
across different Backbones.
c. If a packet at the backbone is for a Regional ISP connected to this backbone, the
packet is sent to the closest router to be routed to local ISP and then to its
destination; otherwise, packet is sent to other backbone via NAP. The packet
ITFB by P Nagaiah Goud
traverses different Backbones until it reaches the Backbone of regional ISP for
which it is destined.
Internet Services
Allows us to access huge amount of information such as text, graphics, sound and software
over the internet. Following diagram shows the four different categories of Internet Services.
Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups. The following are the communication services:
There exist several Information retrieval services offering easy access to information
present on the internet. The following table gives a brief introduction to these services:
Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other.
Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating by two-way video
and audio transmission with help of telecommunication technologies.
ITFB by P Nagaiah Goud
Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-
mail address. Different users can send and receive messages according to the e-mail address.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
E-mail Header
Greeting
Text
Signature.
E-mail Header
From
Date
To
Subject
CC
BCC
From: The From field indicates the sender’s address i.e. who sent the email.
Date: The Date field indicates the date when the e-mail was sent.
ITFB by P Nagaiah Goud
To: The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point.
CC:CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.
BCC: Cc means carbon copy and Bcc means blind carbon copy. For emailing, you use Cc
when you want to copy others publicly and Bcc when you want to do it privately. Any recipients
on the Bcc line of an email are not visible to others on the email.
Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Signature: This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.
Advantages
E-mail has proved to be powerful and reliable medium of commmunication. Here are the
benefits of E-mail:
Reliable
Convenience
Speed
Inexpensive
Printable
Global
Generality
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
ITFB by P Nagaiah Goud
Forgery
Overload
Misdirection
Junk
No response
Chatting:
Chat refers to the process of communicating, interacting and/or exchanging messages over the
Internet. It involves two or more individuals that communicate through a chat-enabled service
or software. Chat is also known as chatting, online chat or Internet chat.
Chat may be delivered through text, verbal, audio, visual or audio-visual (A/V) communication
via the Internet. If conducted through a desktop, chat requires software that supports Internet
Relay Chat (IRC) or an instant messenger application, where a central server manages chat
communication between different end user clients.
There are also online chat services that require users to sign up with a valid email address. After
signing up, a user may join a group chat room or send a private message to another individual.
Online chat services have purpose-built chat interfaces that manage the entire communication
processes.
Messaging:
Instant messaging (IM) is a form of communication over the Internet, that offers an
instantaneous transmission of text-based messages from sender to receiver. In push mode
between two or more people using personal computers or other devices, along with shared
clients, instant messaging basically offers real-time direct written language-based online chat.
The user's text is conveyed over a network, such as the Internet. It may address point to-point
communications as well as multicast communications from one sender to many receivers. More
advanced instant messaging allows enhanced modes of communication. such as live voice or
video calling, video chat and inclusion of hyperlinks to media.
Groups:
Newsgroups are international discussion groups that focus on a particular topic and helps in
gathering information about that topic. The topics discussed here cover all the fields such as
politics, computers, technology, and many more. The information or articles that make up the
"news" are written by people interested in a specific topic. These articles are posted to the
newsgroup so that others can read, reply, and comment on them.
ITFB by P Nagaiah Goud
www:
World Wide Web, which is also known as a Web, is a collection of websites or web pages stored
in web servers and connected to local computers through the internet. These websites contain
text pages, digital images, audios, videos, etc. Users can access the content of these sites from
any part of the world over the internet using their devices such as computers, laptops, cell
phones, etc. The WWW, along with internet, enables the retrieval and display of text and media
to your device.
The building blocks of the Web are web pages which are formatted in HTML and connected by
links called "hypertext" or hyperlinks and accessed by HTTP. These links are electronic
connections that link related pieces of information so that users can access the desired
information quickly. Hypertext offers the advantage to select a word or phrase from text and
thus to access other pages that provide additional information related to that word or phrase.
A web page is given an online address called a Uniform Resource Locator (URL). A particular
collection of web pages that belong to a specific URL is called a website,
e.g., [Link], [Link], etc. So, the World Wide Web is like a huge
electronic book whose pages are stored on multiple servers across the world.
WWW Architecture
WWW architecture is divided into several layers as shown in the following diagram:
ITFB by P Nagaiah Goud
Proof
All semantic and rules that are executed at layers below Proof and their result will be used to
prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of sources is used.
User Interface and Applications
On the top of layer User interface and Applications layer is built for user interaction.
WWW Operation
WWW works on client- server approach. Following steps explains how the web works:
User enters the URL (say, [Link] of the web page in the
address bar of web browser.
Then browser requests the Domain Name Server for the IP address corresponding to
[Link].
After receiving IP address, browser sends the request for web page to the web server
using HTTP protocol which specifies the way the browser and web server
communicates.
Then web server receives request using HTTP protocol and checks its search for the
requested web page. If found it returns it back to the web browser and close the HTTP
connection.
Now the web browser receives the web page, It interprets it and display the contents of
web page in web browser’s window.
Web browser:
Web Browser (or browser) is a software program that extracts information on user request
from the Internet and presents it as a web page to the user. It is also referred to as the user
ITFB by P Nagaiah Goud
interface of the web. Some of the popular web browsers are Internet Explorer from Microsoft,
Mosaic browser, Google's chrome, and Netscape Navigator from Netscape Inc.
Graphical browser
Text-based browser
Graphical browser :
Graphical browsers provide a graphical user interface where the user can jump from one web
page to the other by clicking on the hyperlink (displayed in blue color with underline) on a web
page. Internet Explorer, Chrome and More are examples of graphical browsers.
Text browsers:
Text browsers are used on computers that do not support graphics. Lynx is a text browse. The
process of using browser to view information on the Internet is known as Browsing or Surfing.
During browsing, the user can navigate from one web page to another using URLs, hyperlinks,
browser navigation tools like forward and back button, bookmarks etc.
Web Servers:
A server is a computer that provides data to other computers. It may serve data to systems on
a local area network (LAN) or a wide area network (WAN) over the Internet.
Many types of servers exist, including web servers, mail servers, and file servers Each type runs
software specific to the purpose of the server. For example, a Web server may run Apache
HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail
server may run a program like Exim or iMail, which provides SMTP services for sending and
receiving email. A file server might use Samba or the operating system's built-in file sharing
services to share files over a network.
Internet Search engines or Search engines are specific web sites that help the users to find
information stored on the Internet. Search engines search the Internet based on some
important words (Keywords) or combinations of words. Some of the common and well-known
search engines are [Link], [Link] and [Link].
Search engines maintain a data repository of words along with the URL's which these
words are found.
When the user uses the search engine to search for a word or group of words, the
search engine checks its data repository and returns a list of URLs that satisfy the search.
To narrow down the scope of search, the search engines also provide different criteria
for search. For example, some of the search criteria provided by Google search engine
are Images, News, and Scholar to search for images, news, and published papers,
respectively.
Sites like [Link] are metasearch engines. Such sites do not maintain their own
data repository, but send the search request to other search engines. The search results
are collected from different search engines and displayed to the user.
ITFB by P Nagaiah Goud
E-Commerce:
E-Commerce also known as Electronic Commerce, refers to buying and selling of products or
services over the Internet. Normally e-commerce is used to refer to the sale of physical
products online, but it can also describe any kind of commercial transaction that is facilitated
through the internet.
• Digital Wallet
ITFB by P Nagaiah Goud
• Electronic tickets
• Group buying
• Instant messaging
• Newsgroups
• Online banking
• Print on demand
• Social networking
• Teleconferencing
Advantages of E-commerce:
• E-commerce also enables to choose different goods and services according to your
choice.
• E-commerce replaced the paper work as all transactions are through internet today.
Disadvantages of E-commerce:
• E-commerce works through internet; it is possible that navigation on internet itself may
be slow.
Definition of M-commerce
Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods
and services, which is initiated or completed by using mobile access to computer mediated
networks with the help of an electronic device. This definition provides for a differentiation of
Mobile Commerce from other related fields such as Electronic Commerce Electronic Business
and Mobile Business.
M-commerce is at a very early stage. It's about purchase and sale of goods and services through
the mobile with the use of a financial institution.
Examples of M-Commerce
Applications of M-commerce
Other than the straightforward m-commerce transactions of buying and selling of goods and
services, they have so many applications. Let us take a look at a few examples,
Mobile Banking: Using a mobile website or application to perform all your banking
functions. It is one step ahead of online banking and has become commonplace
these days. For example, in Nigeria, the majority of banking transactions happen on
mobile phones.
Mobile Ticketing and Booking: Making bookings and receiving your tickets on the
mobile. The digital ticket or boarding pass is sent directly to your phone after you
make the payment from it. Even in India now IRTC and other services provide m-
ticketing services.
E-bills: This includes mobile vouchers, mobile coupons to be redeemed and even
loyalty points or cards system.
Auctions: Online auctions having now been developed to be made available via
mobile phones as well.
Stock Market Reports and even stock market trading over mobile applications.
Advantages of M-commerce
It provides a very convenient and easy to use the system to conduct business
transactions.
Mobile commerce has a very wide reach. A huge part of the world’s population has a
mobile phone in their pocket. So the sheer size of the market is tremendous.
The costs of the company also reduced. This is due to the streamlined processes,
now transaction cost, low carrying cost and low order processing cost as well.
Disadvantages of M-commerce
In developing countries, the networks and service providers are not reliable. It is not
most suitable for data transfer.
ITFB by P Nagaiah Goud
Then there is the issue of security. There are many concerns about the safety of the
customer’s private information. And the possibility of a data leak is very daunting.
ITFB by P Nagaiah Goud
Social Networking is the process of creating, building and nurturing virtual communities and
relationships between people online. Social working revolves allows like-minded individuals to be in
touch with each other using websites and web-based applications.
Famous Social Networking sites have created a massive presence in today's world. While There are
many types of these sites some are more famous than the others
Facebook: Facebook is the largest social networking site. It has more than 1 billion users which
keep increasing every day. Moreover, it also helps you promote your business or brand through
ads.
Instagram: it is owned by Facebook only. Similar this app allows you to share photos and videos
with your followers. It gives users a lot of filters to beautify your photos.
Twitter: twitter is also a great social networking site. It is mostly used by celebrities. This allows
you to post short messages called tweets to share your thoughts. Twitter is a great platform to
convey your message in limited words.
Linkedin: This is one of the most sought after sites which allow professionals to Locate and hire
employees. Subsequently, it is available in more than twenty languages to give a user friendly
interface.
WhatsApp: Finally, we have WhatsApp. Though it entered the game quite late, this instant
messaging app made a place for itself instantaneously. Facebook acquired this app as well. It
allows you to share text messages, images, videos, audios, documents and more.
Social media websites are the tools for anyone to make the best use out of it. Millions of people around
the world are using social media platforms for fundraising, social awareness, promoting local business,
and so many good things. There are so many benefits of social networking sites if used properly. Below
is the list of pros of social media platforms.
Networking without border: One of the primary goals of any social networking site, networking
is a primary feature any social media platform has to offers to consider the platform as a social
networking site. One of the most important and noteworthy advantages of social networking
sites is that it enables everyone to connect no matter which country they belong to.
Instant News and Information: Before the social media era, we used to communicate on email
and instant messengers like Yahoo, AOL, and MSN. All those IMs and communication tools were
mostly one to one communication. But in Social networking sites, communication can be one-
to-many instantly. We do not have to look for the news visiting different news websites, the
news will find us on the modern social networking sites like Facebook, Twitter.
Great marketing channel for Business: Social networking sites are one of the best marketing
channels available in this world. Social Media Marketing is the term described for the marketing
ITFB by P Nagaiah Goud
technique used on social networking sites or platforms like Facebook, Instagram. Tiktok, Twitter,
YouTube, etc. There are currently over 4 billion social media users globally ready to discover
your information about your business or service.
Awareness and Activism: We have already witnessed the great modern revolutions and events
around the world. Social networking sites played a very important role in such revolutions and
events like Occupy Wallstreet, Arab Spring, The Libyan Revolution, Hongkong protests, etc.
Almost all internet users do use at least one social media platform. It is easy to spread the
message and invite many people to take part in events for awareness and activism.
Exchange of ideas and Collaboration: Social networking sites like Facebook do have
collaboration features like Group and Document sharing. One can create a group and start to
share ideas and information for a specific purpose. Social networking sites are very useful to
collect feedback and comments on the various idea.
Stay in touch: While ignoring the rest of the advantages of social media, some people prefer to
use it just like a contact book. Not being actively engaged in the social feed, social media
platforms like Facebook and Instagram are also being used only for communication purposes.
Such platforms help us easily stay in touch with friends and family, and other like-minded
people as well.
Addiction: The compulsion to use social media can make one social media addict.
Mental illness: Social networking sites are linked to increased risk of mental health problems
like depression, anxiety and loneliness.
Frauds and scams
Misleading information
Cyber bullying
Hacking
Privacy issues
Internet in business:
The internet plays a major role in every aspect of our modern life. Internet technologies play a
major role in business. As a business owner, knowing the role of internet in business all help
you take advantage of the powerful opportunities it offers to grow your business and make
operations more effective.
Here are different ways in which the internet has contributed to the success and growth of
businesses.
ITFB by P Nagaiah Goud
Communication: The internet makes communication fast and cost efficient. Businesses
use internet technologies such as Skype internet and video calls, email and video
conferencing to make communication virtually instant.
Growth: The internet plays a big role in the growth of businesses. It gives businesses an
opportunity to reach a wider global audience. Promoting through the internet is also a
way to increase sales and reach the desired growth level. Business can also expand by
having an online division.
Marketing: One of the roles of internet in business involves marketing and advertising.
Most businesses are taking advantage of the internet to market their products and
services to a global audience. The most notable internet technologies here include
search engines such as Google.
Networking and Recruiting: Social networking websites play a role in business networking by
connecting like-minded professionals. Through the internet, people have found business
partners and great employees.
Outsourcing services: The internet has helped cut costs by outsourcing services to countries
where it is cheaper to provide these services. Apart from the cost reduction through the
outsourcing role of internet in business, outsourcing enables businesses to concentrate on their
core services and become more efficient.
Online Shopping Role: One role of internet in business is the birth of ecommerce websites and
online payment solutions that allow people to shop online from the comfort of their own
homes.
New Opportunities: The internet has opened up new business opportunities and giving rise to a
group of successful online business owners. This is a powerful role as anyone can now start an
online business.
The Internet is a rapidly growing network of millions of business education and research and
network connecting hundreds of millions of computers and they are users in over two hundred
countries. It is a network of global exchanges – including private, public, business, academic and
government networks – connected by guided, wireless and fiber-optic technologies.
A small company selling hot sauce realized an increase in sales of over $60,000 annually with an
investment of a few thousand dollars in a World Wide Web site. Entertainment companies use
the Internet and World Wide Web to showcase their products to consumers, who can see still
photographs, video clips and hear audio of their favorite entertainers. And, of course,
consumers can purchase the products they preview on the Internet.
Financial and legal firms save time, printing and distribution costs by posting legal notices and
filings on the Internet. Electronic publication of white papers and useful information for clients
increases public awareness of the firms.
Advertising:
Advertising agencies and publishers increase income from existing clients by utilizing the
Internet as part of their marketing mix.
Collaboration:
An engineering firm based in California is able to use the best worldwide engineering talent for
its projects by exchanging design drawings over the Internet. They are able to complete
projects in half the time of their competitors who must travel across town to design review
meetings.
A firm marketing to the government utilizes Electronic Data Interchange (EDI) over the Internet
to process purchase orders and automatically tile reports to government agencies, saving
personnel costs and time involved to receive payments. A major manufacturer uses EDI to
connect all of its suppliers to its purchasing and stockroom computers to provide automated
inventory replenishment, saving a quarter million dollars in inventory expense per year.
Worldwide communication:
An art broker specializing in major artworks conducts her worldwide business entirely on the
Internet.
Thousands of small and large companies use the Internet to communicate with their field sales
forces, including automatic updates of lead tracking databases, order entry, and electronic mail.
The Internet allows companies to reduce overhead and increase productivity by facilitating
telecommuting of personnel. The Internet can also reduce overhead by providing centralized,
paperless internal access to databases of personal information, company policy, broadcast
notices, technical and sales information.
ITFB by P Nagaiah Goud
Publishing:
Publishers put their products on the Internet, increasing circulation, advertising income and
reducing the ever-escalating costs of printing, paper, and distribution. Publishers use the
Internet to transmit photographs, advertisements, and editorial copy to reduce the time and
expense required to get the publication to press.
Public Service:
A non-profit organization uses the Internet to match donors to individual needs during a
disaster. The Internet remained available while other means of communication were cut off. A
county sheriff posts “most wanted” information, crime statistics and receives tips from citizens
on the World Wide Web. Chambers of Commerce, city and county governments use the
Internet to inform citizens and promote commerce to a worldwide community.
Research:
Researchers have vast data warehouses available everywhere on the globe. Marketing and
competitive analyses, government documents and requests for bid, international trade
information, financial data, patent and trademark research, demographic and census data, SEC
filings and the entire catalog of the Library of Congress are a few among the thousands of
research tools available on the Internet.
Direct marketers, catalog retailers and people operating home-based businesses use the
Internet to sell products. Entire shopping malls exist in cyberspace, selling everything from
flowers to automobiles.
The Internet has tremendous potential to reduce costs and increase profits by the following
methods:
Security Issues
Although Internet led to many benefits, it also poses a greater potential for security threats.
Below are a number of common Internet security issues.
Hacker
Malware
Computer virus
Worm
Phishing
Spyware
Identity theft
Hackers:
Hackers refers to a person who can gain unauthorized access to (break into) a computer or a
network to commit crimes.
Malware
Malware (short for malicious software) – a software that is designed to damage, disrupt, or
infect computers.
Malware is a single term that refers to all the different types of threats to your
computer safety such as virus, Trojan horse, worm, spyware, etc.
Malware can gain unauthorized access to a computer and continuously run in the
background without the owner’s knowledge.
ITFB by P Nagaiah Goud
Computer virus
Computer virus – a specific type of malware that is designed to replicate (copy) and spread
from one computer to another.
Worm
The key difference between a worm and a virus is that a worm does not require any
human action to replicate while a virus does. A virus only spreads when a user opens an
affected file whereas a worm spreads without the use of a host file.
Phishing
Phishing – a scammer uses deceptive emails or websites and tries to obtain valuable personal
information (i.e., username, password, account number, etc.).
Spyware
Spyware – software that secretly monitors (spies) user’s online behavior and gets sensitive
information about a person or organization without the user’s knowledge.
A spyware can record a user’s Web browsing habits, email messages, keystrokes on
online advertisements, personal information, etc., and forward it to a third party.
Advertisers can use spyware to target specific advertisements to your tastes.
ITFB by P Nagaiah Goud
Identity Theft:
Identity theft is a growing problem, both online and off. This crime can seriously damage a
victim’s finances for many years. Identity thieves acquire information about someone through a
variety of means of which the favorite is phishing. If they can get personal data, such as names,
dates of birth, social security numbers, etc, then they can quite literally steal the identity of the
owner of that information. That fake identity can then be utilized in a variety of other crimes,
such as credit card fraud, bank fraud and a whole host of other financial misdemeanours, all of
which will be blamed upon the victim who will then have an incredibly hard job of clearing their
name, recovering the money they have lost and then repairing their credit file.
ITFB by P Nagaiah Goud
The following are the different type of online business you can start doing.
Web design
Graphics design
Writing
Editing
Online store
Coaching
Business coaching
Affiliated marketing
Re selling
Virtual assistance
Online courses
E book selling
Online tutorial
Blogging
Advertiser
Web Design:
One of the most obvious businesses that you can start is a web design business, creating websites for
other people. With online businesses erupting, it can be easy to find work in the web design field since
most businesses want to maintain a modern web presence.
Graphic Design:
Do you have a talent creating all things graphic and visual? Digital art work that can be found across the
internet and on every website – which means there’s a high demand for this type of service. If you want
to share your artistry with the world, offering graphic design services might be perfect for you.
Writing:
Freelance writing and other forms of writing have become the backbone of the internet. Not only do
readers want reliable content, business owners are looking to hire writers like crazy. You can easily find
paid writing gigs just by performing a simple internet search!
Editing:
Since we mentioned writing, we want to add that editing might be right up your ally. Do you find
yourself critiquing articles or social media posts as you read them? Editing might be perfect for
you. With so many people writing, whether it be for school, work, or fun, almost all of those people
need editing services and the internet makes a perfect place to offer those services.
Online Store:
ITFB by P Nagaiah Goud
eBay, Amazon, Shopify and Easy are excellent choices to start online stores. T-shirts, jewelry, shoes,
pretty much any kind of product. If you have stuff that you want to sell, there is almost certainly
someone on the internet who wants to buy it.
Coaching:
There are people all over the world who need a helping hand and coaching over the internet is the
perfect way for them to get it. There has been an explosion of coaches happening since there’s no
regulation or certification needed. You can use your expertise to help others!
Business Coaching:
Is your specialty helping other businesses succeed? Business coaching might be your niche. Where many
business owners are familiar with their industry, they might need some help with other aspects of
running a business. Marketing, Sales, Web Strategy and more. If you have solid results and business
experience, you can make a lot of money helping people get the job they want.
Affiliate Marketing:
Affiliate marketing is essentially the process of selling products for another website. Many people
operate more than one affiliate marketing sites making them extra money. If you’re just starting out
with an online business idea – you don’t even need a product. With programs like Amazon
Affiliate, JVZoo, here at Marketing Solved and other affiliate networks – you can simply earn money by
sharing other people’s products!
Re-Selling
Re-selling products on the internet can be a great way to earn money; the key is finding a source for low
cost items that you can sell for more. Are you a low price ninja, garage sale guru or an antique shopper?
You can find items at a low cost and then sell them online on sites like eBay for a higher price. You keep
the profit and continue sourcing new products. Buy low, sell high!
Digital/Virtual Assistant
Everyone has trouble getting all of their work done and keeping track of what is happening. A virtual
assistant job can earn you a lot of money because of this. With the increase in online entrepreneurs, as
their businesses grow – they find themselves needing help! That’s where being a VA can come in.
Answering emails, helping with customer service, even social media. Hours can be flexible and you can
easily work from home.
Online Courses
According to Forbes, market research projected that online learning would reach $107 Billion in 2015.
Not only is there a lot of opportunity for you to jump in to this space – there’s a lot of money to make as
well. Can you create an online course around your expertise? Teaching someone a new skill? Showing a
How To or Tutorial? Here at Marketing Solved, online courses are our favorite way to monetize an online
business.
EBook Selling:
Whether you write an eBook or sell someone else’s you can make a lot of money doing so with the
popularity of Kindle’s and other devices. You can use online programs like [Link] or even [Link]
to design your very own ebook to sell. This is a great entry level business to start with low overhead
ITFB by P Nagaiah Goud
since delivery of the program is completely digital! No need to print a book, have merchandise on hand
– or even worry about shipping.
Online Tutoring:
Students of all ages come across subjects that they need a little extra help with and you could be just the
person to help them over the internet. Use your expertise to help others who need it!
Blogging:
Marketing Solved Founder, Katherine Sullivan started her career out as a blogger and was able to
leverage her authority into a paid business. Blogging opens the doors to business in many ways. Being a
paid writer, affiliate marketing, selling advertising on your site, even offering your expertise and services
to help others. Plus – blogging is a budget friendly business.
Advertiser:
Do you have a special skill for creating advertising that people love? You could pitch these services to
business owners worldwide and help create their advertising campaigns, graphics, and ad copy to bring
them more business. If it’s successful – you could make a lot of money.
Q1) Explain Intranet?
Intranet Definition:
Intranet is defined as private network of computers within an organization with its own server
and firewall. Moreover, we can define Intranet as:
Intranet is a system in which multiple PCs are networked to be connected to each
other. PCs in intranet are not available to the world outside of the intranet.
Usually, each company or organization has their own Intranet network and
members/employees of that company can access the computers in their intranet.
Each computer in Intranet is identified by an IP Address, which is unique among the
computers in that Intranet.
Advantages:
Intranet is very efficient and reliable network system for any organization. It is beneficial in
every aspect such as collaboration, cost-effectiveness, security, productivity and much more.
Communication
Intranet offers easy and cheap communication within an organization. Employees can
communicate using chat, e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can be
accessed by the authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing them
and distributing duplicate copies among the employees, which certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the
employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an organization, therefore
there is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know
whom he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
Issues
Apart from several benefits of Intranet, there also exist some issues.
Unauthorized access
Denial of services
Hidden complexity
Applications
Intranet applications are same as that of Internet applications. Intranet applications are also
accessed through a web browser. The only difference is that, Intranet applications reside on
local server while Internet applications reside on remote server.
Document publication applications
Document publication applications allow publishing documents such as manuals, software
guide, employee profits etc without use of paper.
Electronic resources applications
It offers electronic resources such as software applications, templates and tools, to be shared
across the network.
Interactive Communication applications
Like on internet, we have e-mail and chat like applications for Intranet, hence offering an
interactive communication among employees.
Support for Internet Applications
Intranet offers an environment to deploy and test applications before placing them on
Internet.
Q2) Explain extranet?
Definition of Extranet
An extranet is an organization’s private network and its available only for selected users. It’s a
way to connect to third parties like vendors, customers, and partners in a secure and
controlled way. The users typically have a login mechanism such as username and password
to access the network. Extranet in simple terms provides a secure network for an organization
to share information with relevant people outside the organization. It is part of an
organization’s intranet divided via a firewall.
Examples:
An e-commerce site exchanges information with its retailers, a supplier through an
extranet network.
Multinational organizations handle their project information, clients and
communicate with another organization over an extranet network.
University provides an e-learning platform for their students over the extranet
network.
Implementation of extranet
Features of extranet
Advantages
Disadvantage
Complex Security: Extranet needs an additional firewall if hosted on its own server
which expands workload and complex security mechanism.
Hosting: Hosting could be an issue as it requires a high bandwidth internet
connection. A High bandwidth internet connection may not be possible for
everyone, which would lead to inefficiency in work.
Expensive: It is costly compared to intranet due to the extra layer of security and
hosting charges.
limited: It can only be accessed through the internet. So, the work would come to
halt or slow down if the internet goes down.
Q3) Explain Virtual Private Network (VPN)?
Definition of VPN:
A Virtual private network (VPN) is a secure connection between two or more endpoints. It can
also be seen as an extension to a private network.
A VPN is commonly used to provide secure connectivity to a site in order to share resources
between two organizations or departments or to facilitate remote users with their corporate
services as if they were in sitting at their desk in the office. There are two key scenarios where
you would deploy VPN technology, that are known as
Site-to-Site VPN
Remote Access VPN
Site-to-Site VPN
In site-to-site VPN, data is encrypted from one VPN gateway to another VPN gateway, providing
a secure link between two sites\organizations\departments over the internet. This would
enable both sites to share resources such as documents and other types of data over the secure
VPN link. The following figure illustrates a site-to-site VPN deployment, where an organization
has two offices and would like to provide a secure VPN link between the two.
In a remote access VPN scenario, which is sometimes known as mobile VPN, a secure
connection would be made from an individual computer to a VPN gateway device that is
situated at the organization's data center. This VPN device would enable a user to access their
e-mail, files and other resources at work from anywhere in the world, providing they have an
internet connection. There are two common forms of frameworks\technology that exists in
remote access VPN known as Ipsec and SSL. The following figure illustrates a remote access
user VPN deployment.
VPN tunnels use one of four main networking protocols, which provide sufficient level of
security.
Advantages
• VPNs eliminate the need for expensive leased lines. Historically T1 lines have been used
connecting office locations together in a secure manner. If the office locations are
further away, the cost of renting these least lines can be unbearable. A VPN though,
only requires you to have a broadband internet connection, and so avoiding paying a
hefty sum of monthly rental on dedicated leased lines. VPNs are also a replacement for
remote access servers and dial up network connections although rarely used anymore.
• Through the use of link balancing and link bonding, VPN's can use two or more internet
connections, where if one connection experienced a failure, VPN traffic would
automatically traverse over the remaining connections. Once the failed connection is
back online, VPN traffic would automatically use the original connection when it is back
up again.
Disadvantages
• You have to remember, having a VPN tunnel means having to rely on the Internet, and
having to rely that your ISP (Internet Service Provider) is reliable, although this problem
can be reduced by having two or more ISP’s and using the 2nd connection in a VPN
failover scenario.
• Also, VPN’s require careful configuration, and possibly some troubleshooting, and the
terminology can be overwhelming for administrators not familiar with the technology.
Q4) Explain Internet Telephony?
Internet telephony:
Internet telephony is a type of communications technology that allows voice calls and other
telephony services like fax, SMS and other voice-messaging applications to be transmitted using
the Internet as a connection medium. Software under this technology is cost-effective and
convenient because it allows the user to communicate through fax, voice and video calls
anywhere in the world as long as there is an Internet connection.
Internet Telephony is the transmission of telephone calls over computer networks. One
of the most common applications involves computer to traditional telephone communications.
This process uses a special internet phone service provider and typically involves four steps.
Request: Using the software provided by the internet phone service provider, the caller enters
a telephone number and requests a connection.
Relay: The request is relayed to the provider’s internet server that is located closest to the
requested number.
Connection: Using traditional local telephone communication lines, the server connects to the
requested telephone.
Talk: The requested telephone rings, the party answers, and communication begins using the
local telephone communication line and the internet.
• Phone to Phone
• PC to Phone
• PC to PC
Phone to Phone:
This is process that involves a telephone to another telephone routed over the internet.
• Low cost: The main benefit of internet telephony is the low cost. PC to PC calls are
generally free, and PC to Phone connections are generally a fraction of the cost of a
traditional phone line.
• Portability: One only needs a laptop and an internet connection to use internet
telephony, whether in an airport, a library, or a fast-food restaurant.
• Wide range of features and services: Internet telephony also offers a wide range of
features and services that are not found on traditional landline phone. Just a few of
these amazing features are text voicemail, video voicemail, and voicemail to email, call
parking, and the busy line feature.
• Toll free Access: While US toll free numbers are generally not accessible from outside
the US, Internet calling enables users to reach toll free numbers from anywhere in the
world.
• Unreliable: Traditional phone services functions with or without electricity. Not so with
Internet Telephony. If the power goes out, taking the internet connection with it, no
phone service is available.
• Emergency calls: When traditional 911 calls are made, the emergency dispatch operator
is able to see the exact location of the caller due to the direct relationship between the
number and an address. However, there is no such fixed relationship with internet
telephony and location. IP address generally cannot be pinpointed with the accuracy
needed for 911 calls.
• Compatibility: VoIP connections have been known to have issues with devices such as
satellite television receivers and conventional modems that need to dial an outgoing
number.
Q5) Explain Audio conferencing?
Audio Conferencing:
Audio conferencing is the conduct of an audio conference (also called a conference call or audio
teleconference) between two or more people in different locations using a series of devices
that allow sounds to be sent and received, for the purpose of communication and collaboration
simultaneously.
An audio conference may involve only two parties, or many parties involved at the same time.
Audio conferencing can be conducted either through telephone line or the Internet by using
devices such as phones or computers. If one only wants to listen, he/she just needs speakers. If
he/she decides to speak as well, he/she may need a microphone as well.
Just like any other products or services, audio conferencing also has its advantages and
disadvantages. The following are three key benefits of audio conferencing.
Audio conferencing is very accessible and easy to set up. By adopting a familiar technology,
audio conferencing makes it easy to host a conference call through telephone lines. Besides,
you can also enhance it by using devices such as computers.
As an employer, it is inevitable to have business trips or invest a lot of money in your employee
to have business travel. Audio conferencing can be a practical alternative to business trip. You
don’t have travel around the country or the world to attend a meeting or seminar any more.
Hence, it saves you a lot of time spent on the road and money for the trip.
Apart from the advantages, audio conferencing also has its downsides and drawbacks. The
following are three obvious disadvantages of audio conferencing and its possible solutions.
Studies show that effective communication is always non-verbal, yet audio conferencing
is only verbal. The communication means doesn’t support visual images, so you can’t
see and understand the facial expression, eye movement and body language of the
attendee you are talking to. One way to solve this problem is to select an audio and
video conferencing system to replace it. By just utilizing a free audio video conferencing
software like ezTalks Meetings, you can easily host a voice and visual conferencing,
which makes your communication and cooperation more productive, effective and
efficient.
At times, the sound transmission may be of poor quality during the audio conferencing as it
mainly relies on the telephone lines. The background noise can also affect the audio
conferencing, or even cut you out.
Q6) Explain Video conferencing?
Video conferencing:
Video Conferencing is a visual communication session between two or more users regardless of
their location, featuring audio and video content transmission in real time. In broad terms,
video conferencing software is a solution that allows two or more persons to talk and see each
other remotely. Initially video conferencing software only enabled users to make video calls or
hold group video conferences. However, as technology advanced, video conferencing software
acquired plenty of helpful tools and features for remote communication and learning.
Video conferencing wouldn’t be possible without modern camera technology. It’s vital that
anyone communicating by video can be clearly seen, without jerky or unreliable footage getting
in the way of their message. Camera quality has greatly improved in the last several years, and
prices have steadily dropped.
Audio input
Codec Device
This is also a vital piece of the puzzle. The codec is the hardware or software that digitally
compresses both the audio and video for each conferencing session. Then, the “packets” are
transmitted through a digital network (increasingly, IP networks) to the endpoint or endpoints.
Look for a codec device that can achieve high compression rates so audio and video are relayed
seamlessly, in real-time.
Endpoint devices
This refers to the multiple devices that handle the video and audio output in a conferencing
system, which might include a video display, loudspeakers, a telephone, TV screen, projector
and more. These devices can be tailored to your customer’s needs, ranging from stand-alone
desktop units to larger room-based systems. Seek out an endpoint system that is well-
established and has been proven with other customers.
In any video conferencing system, computers take care of the data compressing and
decompressing and provide access to the network. Depending on your customer’s needs and
the size of their video conferencing system, they may require more powerful computers with
higher processing speeds than others.
Telepresence is designed to host a meeting as closely as possible. Even if the participants are
not in the same room physically, the set-up is done in a way easily. Large screens are used and
cameras are positioned at eye level. The result is a videoconference set-up that appears as if all
the participants are sitting in the same room and around the same table.
Integrated video conferencing systems are designed generally for group video conferencing
where there's a centralized location for the equipment. It includes both the hardware and
codec. All the main camera, displays and other peripheral videos are mounted in the main
conference location. Integrated video conferencing systems are typically ideal for boardroom
and classroom conferences.
Participants in audio conferences tend to zone out and multitask because they feel
disconnected from the other members in the meeting. With video, however, there’s pressure
to maintain “virtual eye contact”, translating to superior levels of engagement. When each
conference member is visible, you’re inclined to use the communication skills we’ve all
practiced in face-to-face conversations.
It’s Efficient:
Reduced commuting time is one of the most obvious but significant benefits of video
conferencing. Inperson meetings with suppliers, clients and satellite offices can take up
valuable hours of your day; even an hour-long meeting can quickly eat up an entire morning
when accounting for travel time, making it a frustrating and inefficient activity.
Not only is travel time-consuming, but it’s also expensive. People often travel great distances
for training, conferences and business meetings, and in most cases, these in-person
communications can be accomplished via video conferencing. Save the money you would spend
on business travel and put it toward other business priorities.
It Improves Communication:
Research has shown that humans process visual information more quickly and accurately than
text and audio. Therefore, when you have a meeting via video conferencing, your attendees will
retain more information and comprehend it more effectively than they would if you held the
meeting via audio.
It Connects Teams:
Teams are becoming increasingly geographically separated for several reasons. Freelancers and
even permanent staff may be working from home, some are contractors working from other
continents, and some are simply on the road for business purposes. But vast distances don’t
matter when you can bring your team together via video conferencing, either for regular
meetings or spur-of-the-moment checkups.
It Improves Productivity:
Need a quick answer to a tricky question? Instead of sending an email to your colleague and
hoping for an answer tomorrow, connect for a quick video conference conversation and use a
screen-share function to move on with your project.
It Improves Attendance:
It’s often challenging to coordinate busy schedules and bring staff together for in-person
meetings. Video conferencing allows the kind of flexibility that can boost meeting attendance
rates, and record the discussion for non-attendees.
Q7) Explain Wireless Communication?
Wireless communication involves the transmission of information over a distance without the
help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal through
wireless communication technologies and devices.
Basic Elements of a Wireless Communication System
A typical Wireless Communication System can be divided into three elements: the Transmitter,
the Channel and the Receiver. The following image shows the block diagram of wireless
communication system.
The Channel
The channel in Wireless Communication indicates the medium of transmission of the signal i.e.
open space. A wireless channel is unpredictable and also highly variable and random in nature.
A channel maybe subject to interference, distortion, noise, scattering etc. and the result is that
the received signal may be filled with errors.
The job of the Receiver is to collect the signal from the channel and reproduce it as the source
signal. The reception path of a Wireless Communication System comprises of Demultiplexing,
Demodulation, Channel Decoding, Decryption and Source Decoding. From the components of
the reception path it is clear that the task of the receiver is just the inverse to that of
transmitter.
Cost
Mobility
Ease of installation
Reliability
Disaster Recovery
Cost
The cost of installing wires, cables and other infrastructure is eliminated in wireless
communication and hence lowering the overall cost of the system compared to wired
communication system. Installing wired network in building, digging up the Earth to lay
the cables and running those wires across the streets is extremely difficult, costly and
time consuming job.
Mobility
Mobility is the main advantage of wireless communication system. It offers the freedom
to move around while still connected to network.
Ease of Installation
The setup and installation of wireless communication network’s equipment and infrastructure
is very easy as we need not worry about the hassle of cables. Also, the time required to setup a
wireless system like a Wi-Fi network for example, is very less when compared to setting up a
full cabled network.
Reliability
Since there are no cables and wires involved in wireless communication, there is no chance of
communication failure due to damage of these cables which may be caused by environmental
conditions.
Disaster Recovery
In case of accidents due to fire, floods or other disasters, the loss of communication
infrastructure in wireless communication system can be minimal.
Satellite Communication
Bluetooth
Infrared Communication
Satellite Communication
Perhaps, the most commonly used wireless communication system is the Mobile Phone
Technology. The development of mobile cellular device changed the World like no other
technology. Today’s mobile phones are not limited to just making calls but are
integrated with numerous other features like Bluetooth, Wi-Fi, GPS, and FM Radio.
Bluetooth
Bluetooth is another important low range wireless communication system. It provides
data, voice and audio transmission with a transmission range of 10 meters. Almost all
mobile phones, tablets and laptops are equipped with Bluetooth devices. They can be
connected to wireless Bluetooth receivers, audio equipment, cameras etc.
Wireless Local Area Network or WLAN (Wi-Fi) is an internet related wireless service.
Using WLAN, different devices like laptops and mobile phones can connect to an access
point and access internet.
Infrared Communication
WLAN:
A wireless local area network (WLAN) is a wireless distribution method for two or more devices.
WLANs use high-frequency radio waves and often include an access point to the Internet. A
WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection. A WLAN is sometimes called a local area wireless network
(LAWN).
Wireless LAN is made by connecting different devices through wireless communication to make
a local area network. WLAN follows a standard named IEEE 802.11. WLAN connects laptops,
smartphones, personal digital assistants, desktop computers, workstations and printers. This
network is easy to install and use at the home or any other place.
Advantages of WLANs
Flexibility
Planning
Design
Robustness
Cost
Ease of Use
Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio
waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible,
e.g., within devices, in walls etc.).
Planning: Only wireless ad-hoc networks allow for communication without previous planning,
any wired network needs wiring plans.
Design: Wireless networks allow for the design of independent, small devices which can for
example be put into a pocket. Cables not only restrict users but also designers of small
notepads, PDAs, etc.
Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas,
networks requiring a wired infrastructure will usually break down completely in disasters.
Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of
installing and maintaining a traditional wired LAN,
Ease of Use: Wireless LAN is easy to use and the users need very little new information to take
advantage of WLANs.
Disadvantages of WLANs
Bluetooth:
Bluetooth is an open wireless technology standard for transmitting fixed and mobile electronic
device data over short distances. Bluetooth was introduced in 1994 as a wireless substitute for
RS-232 cables.
Bluetooth communicates with a variety of electronic devices and creates personal networks
operating within the unlicensed 2.4 GHz band.A variety of digital devices use Bluetooth,
including MP3 players, mobile and peripheral devices and personal computers.
Network communicates with a master Bluetooth device and is formed with up to seven
devices
FreeBSD stack is executed with a Netgraph framework via short wavelength radio
transmission signals.
Device technology includes confidentiality, key derivation and authentication via Secure
and Fast Encryption Routine (SAFER)+ block cipher algorithms
Wi-Fi
Wi-fi is a wireless networking technology that allows devices such as computers (laptops
and desktops), mobile devices (smart phones), and other equipment such as printers
and video cameras to interface with the Internet. It allows these devices and many more
to exchange information with one another, creating a network. Internet connectivity
occurs through a wireless router. When you access Wi-Fi, you are connecting to a
wireless router that allows your Wi-Fi-compatible devices to interface with the Internet.
WiMAX:
The letters of WiMAX stand for Worldwide Interoperability for Microwave Access, and it
is a technology for point to multipoint wireless networking.
WiMAX technology is able to meet the needs of a large variety of users from those in
developed nations wanting to install a new high speed data network very cheaply
without the cost and time required to install a wired network, to those in rural areas
needing fast access where wired solutions may not be viable because of the distances
and costs involved - effectively providing WiMAX broadband. Additionally it is being
used for mobile applications, providing high speed data to users on the move.
WiMAX is
A wireless technology optimized for the delivery of IP centric services over a wide area.
Microsoft Excel
Microsoft Excel is one of the most suitable spreadsheet functions that help us manage data,
create optically logical charts, and thought-provoking graphs. Microsoft Excel is supported by
both Mac and PC platforms. Microsoft Excel can also be used to balance a checkbook, create an
expense document, build formulas, and edit them.
It mainly comprises tabs, groups of commands, and worksheets. The worksheet is made of rows
and columns that intersect each other to form cells where data is entered. It is capable of
performing multiple tasks like calculations, data analysis, and integrating data.
Microsoft Office button, ribbon, and quick access toolbar are the three main features of excel
that you need to focus on while learning excel.
There are several features that are available in Excel to make our task more manageable. Some
of the main features are:
List AutoFill: It automatically develops cell formatting when a new component is added
to the end of a list.
AutoFill: This feature allows us to quickly fill cells with a repetitive or sequential record
such as chronological dates or numbers, and repeated document. AutoFill can also be
used to copy function. We can also alter text and numbers with this feature.
Wizard: It guides us to work effectively while we work by displaying several helpful tips
and techniques based on what we are doing. Drag and Drop feature will help us to
reposition the record and text by simply dragging the data with the help of the mouse.
Charts: These features will help us in presenting a graphical representation of our data
in the form of Pie, Bar, Line charts, and more.
PivotTable: It flips and sums data in seconds and allows us to execute data analysis and
generating documents like periodic financial statements, statistical documents, etc. We
can also analyze complex data relationships graphically.
Shortcut Menus: These commands that are appropriate to the function that we are
doing occur by clicking the right mouse button.
MS Excel allows us to keep the header and footer in our spreadsheet document.
MS Excel allows us to find the needed data (text and numbers) in the workbook and also
replace the existing data with a new one.
Password Protection
It allows the user to protect their workbooks by using a password from unauthorized
access to their information.
Data Filtering
Filtering is a quick and easy way to find and work with a subset of data in a
range. A filtered range displays only the rows that meet the criteria you specify
for a column. MS Excel provides two commands for filtering ranges:
Data sorting is the process of arranging data in some logical order. MS Excel allows us to
sort data either in ascending or descending order.
Built-in formulae
MS Excel has got many built-in formulae for sum, average, minimum, etc. We can use
those formulae as per our needs.
Spreadsheet:
Storing Data
Presentation/Visualization
Invoices
Wages
Predictions / Simulations
Storing Data:
One of the main uses of spreadsheets in business is storing data. If you have a business
organization, you will need a spreadsheet to store almost any type of information.
Examples of information to the store include a list of clients, contact information,
employee timesheets, sales, and purchases. All this information remains relevant and
useful for many years. Since spreadsheets consume very little space you can save a lot
of information without facing any storage difficulties. Searching for information on a
spreadsheet is easy. You can search using a file name or the data that it contains.
Apart from storage, you can use spreadsheets to manipulate and analyze data. For example, it
contains a feature that allows you to enter custom formulas. You can use them to perform
different functions such as addition, subtraction or calculating percentage. In addition, these
formulae sets can allow you to sort your data. Additionally, you can customize it by adding
filters until you get the results that you desire. Spreadsheets also hold a feature that provides
conditional processing. Using formulas, you can make one cell to be dependent on the results
of another cell. This is a helpful feature for calculating profit and losses.
Presentation/Visualization
Spreadsheets are used often for visualization purposes. They contain different tools and
features that make it possible. For example, you can present your data in charts or graphs.
There are various types of these charts and graphs to choose from according to your needs.
Managers can present data in a graphical way to potential investors making it easy for them to
grasp the information. The presentations can also be used to teach clients or show employees
on how the business is performing. You can control anything that you want to display from the
colors or table sizes.
Spreadsheets play a huge role when it comes to planning. You can use them in two ways. First is
by analyzing and visualizing data hence getting a clue of how your business is doing in various
fields. Next, you can highlight areas that need more attention to growth or reconsideration. The
second way to use spreadsheets in planning is by calculating the potential results due to
changes in your company. You can test various forms of data and determine if it works or not.
Decisions that a business makes determines whether it will be successful or not. Spreadsheets
help managers and investors to make well-informed decisions. Through data visualization,
management can easily identify the areas of weaknesses. Having this information at hand all
the time it will lead the manager into making decisions that can make more profits. With well-
represented data, potential investors will have a humble time when deciding whether to invest
in your business or not
Coming up with a budget is not an easy task without the use of spreadsheets. You can create a
table and list the most important things followed by the least important. There are features
that will show you the sectors that need the most attention. This information is very important,
especially when purchasing items. Spreadsheets also assist accountants in managing business
accounts. So, funds are released easily because some calculations are automated.
Invoices
Most spreadsheet platforms will allow you to integrate the invoice template. It speeds up the
process of receiving or dispatching products. The invoice template can easily fetch data from
the spreadsheet hence making the whole process automated. In addition, it produces very
accurate results. Handling invoices manually or with other external applications is a slow
process. The production of invoices for customers’ needs to be fast and accurate so as to realize
more profits. Customers are very sensitive and can easily be turned off by a slow process or one
with a lot of errors.
wages
Managing wages is now easy thanks to the spreadsheets. You can set up a formula that
automatically calculates the number of hours an individual employee has worked. It makes
payment of wages a fast and easy task hence you get to work with happy employees. It also
cuts the costs of paying employees extra money that they have not worked for. However, it
makes them work hard because they know that they will get paid what they deserve.
Furthermore, it also cuts the costs of using any external software to handle the wages.
Predictions / Simulations
Features of MS Access
Microsoft Access is a program that is very useful for those who work with database. It is
because this program can ease them related to database such as creating, editing,
manipulating, etc. Besides that, Microsoft Access also has many features that you can use. The
following are the features of MS-Access.
MS Access Table:
Table is the main feature offered by Microsoft Access. It functions to save data. For example,
you can save the data of the stored goods. If you do not make table, you cannot save data. If
there is no saved data, the data will not be able to be processed.
The first feature offered by Microsoft Access is related to data entry. Rather than you enter
data manually, you can enter data with Microsoft Access faster and more easily. There are
many data entry features offered. For example, you can create table and select objects more
easily. That is why it is considered as one of the most useful Microsoft Access features.
You can also import data from another source to the table you have created simply. Then, you
can save it later. Besides that, you can also export data from Microsoft Access with various
options of file format. So, you can choose the format that you want based on your desire.
MS Access Reports:
Then, you can also make a report from the table that is selected or other sources of data with
only one click. It is very simple and easy, is not it? You just need to use the icon of Report
Wizard that is available in the toolbar.
MS Access Queries:
Queries can be considered as a feature offered by Microsoft Access that functions to process
data in the tables become understandable information. For example, you can classify the top
seller by your customers. It can be based on one table, two tables, or more. With this feature,
you can also show the certain data on a table. Besides, you can also show data from more than
one table as long as the tables are related each other. Then, you can also operate calculation.
MS Access Forms:
Forms also belong to one of the features of MS Access. It functions to represent to the user or
receive input data from the user in the table or query in form of buttons, grids, etc. From in this
program is usually used if you work in master detail transaction.
Access Templates:
You can also use Template feature. This feature is very useful to enhance the look. It also adds
the experience in using this program. You can use the templates that are available in this
Microsoft Access or you can also download other templates.
Advantages of MS Access
You can easily customize Access according to personal and company needs
Microsoft Access online works well with many of the development languages that work
on Windows OS
It is robust and flexible, and it can perform any challenging office or industrial database
tasks.
MS-Access allows you to link to data in its existing location and use it for viewing,
updating, querying, and reporting.
Allows you to create tables, queries, forms, and reports, and connect with the help of
Macros
Macros in Access is a simple programming construct with which you can use to add
functionality to your database.
Microsoft Access online can perform heterogeneous joins between various data sets
stored across different platforms
Disadvantages of MS Access
All the information from your database is saved into one file. This can slow down
reports, queries, and forms
Technical limit is 255 concurrent users. However, the real-world limit is only 10 to 80
(depending on the type of application which you are using)
It requires a lot more learning and training compares with other Microsoft programs
Railway Reservation System: In the railway reservation system, the database is required
to store the record or data of ticket bookings, status about train’s arrival, and departure.
Also if trains get late, people get to know it through database update.
Library Management System: There are lots of books in the library so; it is tough to
store the record of all the books in a register or copy. So, the database management
system (DBMS) is used to maintain all the information related to the name of the book,
issue date, availability of the book, and its author.
Education Sector: Presently, examinations are conducted online by many colleges and
universities. They manage all examination data through the database management
system (DBMS). Inspite that student’s registrations details, grades, courses, fee,
attendance, results, etc. all the information is stored in the database.
Social Media Sites: We all use of social media websites to connect with friends and to
share our views with the world. Daily, millions of peoples sign up for these social media
accounts like Pinterest, Facebook, Twitter, and Google plus. By the use of the database
management system, all the information of users is stored in the database and, we
become able to connect with other people.
Finance: The database management system is used for storing information about sales,
holding and purchases of financial instruments such as stocks and bonds in a database.
Online Shopping: These days, online shopping has become a big trend. No one wants to
visit the shop and waste their time. Everyone wants to shop through online shopping
websites (such as Amazon, Flipkart, snapdeal) from home. So, all the products are sold
and added only with the help of the database management system (DBMS). Invoice bills,
payments, purchase information all of these are done with the help of DBMS.
GROUPWARE
Groupware is a class of software products that help people to communicate, coordinate and
work together collectively while located remotely from each other. It is so important that it
allow workgroup for the people who want to interact with each other within an organization to
share information, even when they are working together at a distance.
Groupware software allow the sharing of calendars, collective writing, e-mail handling, shared
database access, electronic meetings with each person able to see and display information to
others, and other activities. Some product examples of groupware include Lotus Notes and
Microsoft Exchange.
Groupware supports the following operations:
• Scheduling meetings and allocating resources
• E-mail
• Password protection for documents
• Telephone utilities
• Electronic newsletters
• File distribution
• Groupware can provide following benefits:
• Efficient and effective project management
• Location independence
• Increased communications capability
• Increased information availability
• Improved workflow
Types:
Groupware (software) is divided into two categories related to time
• Synchronous
• Asynchronous
Synchronous
It is a real-time groupware because it allowing multiple users to perform their works at a same
time. A primary need of synchronous groupware is real-time coordination in between all
connected users with this software, so they need shared audio channels for making
the communication
Asynchronous
In this groupware, multiple users perform their tasks at different time duration. Asynchronous
groupware allows different services like as email handling, file sharing, structured messages,
workflow, collaborative writing system, and other.
Disadvantages
There are various drawbacks and challenges of groupware
• It is not trust able system because it is totally depended on the server, if this server
performance gets down then all users get disconnected to each other.
• Harder to convince clients for using groupware software
• Need to skill users that how to use it.
• Non-verbal communication cannot be used in between all users.
• It has logistical and security problem.
• It is more expensive because it needs more money to buy and better maintain them.
• Groupware environment, in which big challenge to observe gestures and facial
expressions and hear voice inflections
Q14) Explain RFID?
RFID Definition:
Radio-Frequency Identification (RFID) is the use of radio waves to read and capture information
stored on a tag attached to an object. A tag can be read from up to several feet away and does
not need to be within direct line-of-sight of the reader to be tracked.
A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are
embedded with a transmitter and a receiver. The RFID component on the tags has two parts: a
microchip that stores and processes information, and an antenna to receive and transmit a
signal. The tag contains the specific serial number for one specific object.
RFID tags are becoming so ubiquitous in our society that the average person probably
encounters them daily without realizing it. Did you go to the bookstore today? The book you
purchased was probably inventoried using RFID technology. Have you traveled overseas
recently? The government tracks travel data using RFID chips in passports. Have you ever had
trouble finding a lost pet? Maybe you should consider having an RFID tag implanted in Fluffy to
help track her next time she gets lost!
By providing a cheap, efficient, and reliable way to collect and store data, RFID offers limitless
possibilities for current and future use. The following are applications of RFID technology:
Product Tracking – RFID tags are increasingly used as a cost-effective way to track
inventory and as a substitute for barcodes. For instance, bookstores such as Barnes &
Noble use RFID to identify books to be removed from shelves and returned to publishing
houses.
Toll Road Payments – Highway toll payment systems, such as E-Z Pass in the eastern
states, uses RFID technology to electronically collect tolls from passing cars. Instead of
stopping at the toll booth, cars pass directly through in the E-Z Pass lane and the toll is
automatically deducted from a pre-paid card.
Passports – A number of countries, including Japan, the United States, Norway, and
Spain incorporate RFID tags into passports to store information (such as a photograph)
about the passport holder and to track visitors entering and exiting the country.
Identification – RFID chips can be implanted into animals and people to track their
movements, provide access to secure locations, or help find lost pets.
Libraries – Libraries use RFID tags in books and other materials to track circulation and
inventory, store product information (such as titles and authors), and to provide security
from theft. Because RFID tags can be scanned without physically touching the item,
checking books in and out, plus doing laborious tasks such as shelf inventory, can be
accomplished quickly and efficiently using RFID technology.
Shipping – Large shipments of materials, such as retail goods, often utilize RFID tags to
identify location, contents, and movement of goods. Wal-mart is one of the largest
consumers of this technology to assist in tracking shipments of merchandise.
Other uses – RFID tags are employed in numerous other ways, including implantation in
Saguaro cacti to discourage black-market traders, placement in car tires to transmit road
condition information to the onboard computer, and placement around cities (such as
Tokyo) to transmit tourist information to visitor cell phones.
The integration of multimedia devices is crucial in modern communication systems as they combine text, audio, images, and video to enhance communication efficiency . Multimedia communication supports diverse functions such as video conferencing and digital media sharing, ensuring that businesses can perform tasks effectively across various locations . This integration results in enriched user experiences and supports a wide range of tasks from business communication to content creation .
Internet technologies have revolutionized marketing strategies by enabling global reach and facilitating new forms of advertising like search engine marketing and social media engagement . They allow for personalized customer interactions and data-driven marketing decisions . This transformation has led to decreased costs and increased efficiency in targeting customers, contributing to higher sales and competitive advantages in the market . Additionally, online platforms have opened up opportunities for direct-to-consumer marketing and e-commerce growth .
Businesses can leverage Video Conferencing systems to enhance productivity by enabling real-time audio-visual communication, thus reducing travel costs and time . Video conferencing facilitates virtual meetings, ensuring that employees remain engaged and focused, which enhances collaboration and decision-making . This technology allows for instant connectivity with remote teams or clients, maintaining effective communication and ensuring alignment on business objectives .
Decision Support Systems (DSS) enhance organizational decision-making by supporting managers in dealing with semi-structured and unstructured problems . They provide useful information summaries, identify exceptions, spot trends, and utilize analytical models to solve complex issues . DSS are adaptive, contributing to efficiency, and can accommodate a variety of decision processes and styles . They support managers at all levels, assisting in intelligence, design, choice, and implementation of decisions .
An Accounting Information System (AIS) supports financial management by collecting, storing, managing, processing, retrieving, and reporting financial data . It ensures that information is available for accountants, business analysts, and managers for decision-making and controls the financial integrity within an organization . The AIS helps in generating timely and relevant reports that aid in regulatory compliance, financial analysis, and strategic planning .
MP4 is a widely supported video format known for its high quality and relatively small file size, making it ideal for streaming and storing media content across various devices . In contrast, AVI, developed by Microsoft, offers less compression, resulting in larger file sizes but can ensure better quality and is often preferred for professional video editing and storage if quality over storage space is a concern . MP4 is more versatile for diverse applications, while AVI is typically used where maintaining high video quality is paramount .
Multimedia devices play a pivotal role in digital content creation by integrating various media types like text, audio, and video . Components such as digital cameras, webcams, sound cards, and microphones serve different functions like capturing, editing, and outputting digital content . These devices facilitate diverse tasks from basic image capture to complex video editing, allowing both professionals and hobbyists to create rich, engaging content for various platforms .
Electronic Data Interchange (EDI) significantly reduces costs by automating transactions like purchase orders, reducing paperwork, and minimizing human errors . It streamlines supply chain processes, leading to faster transaction times and improved inventory management . EDI enhances operational efficiencies by enabling seamless communication and transaction processing between businesses, allowing them to respond quickly to market changes . Enterprises using EDI often gain a competitive edge through lowered operational costs and increased process accuracy .
Expert Systems differ from other types of information systems as they are knowledge-based, using embedded expertise to act as consultants, aiding in diagnosing problems or solving issues . Unlike Decision Support Systems, which gather information and provide analytical tools, Expert Systems offer specific advice based on their knowledge base, simulating human expertise in a particular area . They are integral in situations where human-like reasoning is crucial for decision-making .
Strategic Information Systems (SIS) offer competitive advantages by aligning technology with business strategies to lower costs, differentiate products or services, or serve targeted market segments more effectively . They enhance decision-making processes, improve operational efficiency, and support innovation . SIS enable organizations to respond rapidly to market changes and consumer demands, often leading to improved market positions and increased profitability .