0% found this document useful (0 votes)
233 views153 pages

Overview of Computer System Components

The document defines a computer system and its elements. A computer system consists of hardware, software, people, data, procedures, and connectivity. It then provides details on each element: hardware includes physical components like input/output devices and memory; software includes system and application programs; people are users of the system; data are raw facts; procedures are instruction sets; and connectivity refers to connecting devices via networks. The document also lists and explains different types of computer input devices such as keyboards, pointing devices, microphones, scanners, and digital cameras.

Uploaded by

Fifa 21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
233 views153 pages

Overview of Computer System Components

The document defines a computer system and its elements. A computer system consists of hardware, software, people, data, procedures, and connectivity. It then provides details on each element: hardware includes physical components like input/output devices and memory; software includes system and application programs; people are users of the system; data are raw facts; procedures are instruction sets; and connectivity refers to connecting devices via networks. The document also lists and explains different types of computer input devices such as keyboards, pointing devices, microphones, scanners, and digital cameras.

Uploaded by

Fifa 21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ITFB by P Nagaiah Goud

Unit-I
Q1) Define Computer system and explain its elements?

Software

Connec
Hardware
tivity
Computer
System

Data
People

Procedure

Definition:

 Computer system is an electronic device which performs the calculations with high speed
and accuracy.
 Computer takes the data, processes the data and generates useful information.
 Every computer takes the data from input unit, stores the data in memory unit, processes
the data in CPU and gives output through output unit.
 Computer system is a combination of hardware and software.

There are 6 elements that make up computer system they are.

 Software
 Hardware
 People
 Connecting
 Data
 Procedure

Software:
Software is a collection of programs and each program is a set of instructions. Software is used to
execute particular tasks. There are 2 types of software.

i.) System software


ii.) Application software
ITFB by P Nagaiah Goud

The software which is used by system to execute particular task is called as system software.

Example: Operating System.

The software which is used by user to execute particular task is called as application software.

Example: MS-Word, MS-Excel, MS-PowerPoint

Hardware:

The physical components of the computer which we can see and touch are called hardware.

The following are the physical components of computer system.

 Input devices
 Output devices
 Memory devices
 CPU

User makes use of input devices to supply data to computer system.

User makes use of output devices to receive information from computer system.

Computer system makes use of memory devices to store the data.

Computer system makes use of CPU to process the data.

Data:

Data is a collection of RAW facts

Example: Rithin, 19, BBA

Procedure:

It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.

People:

Are the persons they make use of computer system.

Examples: user, programmer, designer, tester, analysts.

Connectivity:

It means connecting computer system to any network. Group of computers connected together to
share data and resources is called as network.

Computer system can be connected to other devices by LAN cable or WIFI of Bluetooth.
ITFB by P Nagaiah Goud

Q2) Write about computer system hardware?

The physical components of the computer which we can see and touch are called hardware.

The following are the physical components of the computer system.

 Input devices
 Output devices
 Memory devices
 CPU

User makes use of input devices to supply data to computer system.

Example: keyboard, mouse

User receives information from computer system through output devices.

Examples: monitor, printer

Computer system makes used of memory devices to store the data.

Examples: RAM, ROM, HD

Computer system makes use of central processing unit to process the data.

Q3) List and explain different types of input Devices?

Input:

 Input is any data or instructions entered into the computer in the form of
signals

 The input into the computer can be entered:

 Through keyboard

 By selecting commands on the screen and then clicking with mouse

 By pressing finger on touch screen

 By speaking into a microphone

 By sending image through digital camera

 By scanning data printed on paper through scanner

Input devices:
ITFB by P Nagaiah Goud

 The devices that are used to enter data and instructions or commands into the
computer in the form binary data

Commonly used input devices are:

• Keyboard

• Pointing devices(Mouse, joystick, Trackball, touchpad, Light Pen,


Electronic pen)

• Digitizer

• Micro phone

• Digital camera

• Scanner(OCR, OMR, MICR, Barcode reader)

• Touch screen

Keyboard:

 The Most commonly used input device is keyboard

 Contain keys for each alphabetic characters, digits and special characters,
functional keys

 Used to feed data and instructions into a computer by pressing related keys on
the keyboard

 It is used to enter textual data

 Most commonly keyboard consists of 108 keys

Pointing devices:

 A pointer represents a small symbol on the screen

 Appears on the screen in Graphical User Interface

◦ For example, an arrow appears on the screen in Windows environment

 A pointing device is an input device that is used to control a pointer on the


screen
ITFB by P Nagaiah Goud

 Used to select item on the screen, to select commands from the command
menu, to draw graphs etc

 Mouse, Joystick, Trackball etc are examples of pointing devices

Mouse:

 Pointing input device

 Used to input instruction with a pointer on the screen

 Mouse can be moved on the flat surface to control the movement of the
cursor or pointer on the screen

 Has two or three buttons on the top of its body

 Used to select any option from the group of options by pointing the mouse
pointer on it and then clicking one of the mouse buttons.

Track ball:

 Pointing input device

 It is similar to mouse but it is a stationary pointing device with a ball on its top

Joystick:

 Pointing input device


ITFB by P Nagaiah Goud

 Small box with a moving handheld stick and buttons

◦ Stick is used to control the movement of the pointer on the screen

◦ Button is pressed to activate certain events

Light pen:

 Another input pointing device

 Detect the presence of light

 Handheld pen shaped device with a photocell mounted at its front end

 Used by engineers, graphic designers etc

 Used in PDA’s and other hand held computers

Electronic pen:

 Also called stylus

 Ballpoint like pen

 Used to write texts and draw lines with the help of its pressure

 Used in graphics application


ITFB by P Nagaiah Goud

Digitizer:

 It a flat, rectangular, electronic plastic board

 Mainly used for drawing purposes in computer aided design applications

 Makes easy to enter free-hand drawing in the computer

Microphone:

 Input device used to enter the sound signals of user into the computer

 Record the voice of the user in computer

 Sound card translates the sound signals into digital signals for processing by
computer

 Also translates the sound digital signals back into the analog signals

Digital camera:

 Input and output device


ITFB by P Nagaiah Goud

 Input device used to take pictures and to store directly into the computer in
digital form

 Digital data will be supplied to computer.

SCANNERS:

A scanner is a device usually connected to a computer. Its main function is to scan or


take a picture of the document, digitize the information and present it on the
computer screen. It is used to eliminate manual entry of data. It used to eliminate
user typing mistakes.

The following are the different types of scanners.

 Digital Scanner(image scanner)

 OCR

 OMR

 MICR

 Barcode Reader

Digital scanner:

 Light sensing input device

 Read images and text printed on paper and then translates into electronic form
that can be processed and stored by the computer

 Also called image scanner


ITFB by P Nagaiah Goud

Optical character recognition(OCR)

 It is a type of scanner

 It converts scanned images of handwritten, typewritten text into machine text.

 It is common method of digitizing printed texts so that they can be


electronically searched, stored more compactly, displayed on line.

 Used in machine processes such as machine translation, text to speech and


text mining.

Optical mark Reader(OMR) :

 It is a type of scanner

 Is the process, in which we use hardware, software or both to capture the


human marked filling of multiple choice questions, questionnaires with true or
false fields, and all types of document forms.

 Used to recognize special type marks made with pen or pencil.

 Used to evaluate OMR based exam papers.

Magnetic ink character recognition(MICR):

 It is a type of scanner

 It is a character recognition technology used primarily by the banking industry


to facilitate the processing and clearance of cheques and other documents.

 The MICR encoding, called the MICR line, is located at the bottom of a cheque
or other voucher and typically includes the document type indicator, bank
code, bank account number, cheque number and the amount, plus some
control indicator. The technology allows MICR readers to scan and read the
information directly into a data collection device.
ITFB by P Nagaiah Goud

Barcode readers (barcode scanners):

Are electronic devices for reading printed barcodes. These are optical machine-
readable representations of data relating to the object to which they are attached.
Used in super markets and shopping malls

Touch screen:

 Sensitive display screen

 Touch the different areas of screen with the finger tip just as you click different
areas with the help of mouse

 User can select file or folder with finger

Q4) List out and explain Output devices?


Output device

An output device is any piece of computer hardware equipment which converts information into
human-readable form. It can be text, graphics, audio, and video.

There two types output devices

• Soft copy output devices:

Data will be displayed on the scree

• Hard copy output devices:

Data will be printed on the paper.

Following are output devices used in a computer.

 Monitors

 Printer

 Plotter

 Computer Speakers

 Headphones

 Projectors

Monitors
ITFB by P Nagaiah Goud

Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer.
It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness
of the image depends upon the number of pixels.

There are two kinds of viewing screen used for monitors.

 Cathode-Ray Tube (CRT)

 Flat-Panel Display

Cathode-Ray Tube (CRT) Monitor

 The monitors that use cathode ray tube for producing the output are known as CRT
monitors.

 In CRT Monitor, a cathode ray tube is used as the picture tube of the monitor.

 In CRT monitor cathode ray tubes are glass vacuum tubes into which an electron gun emits a
flow of electrons guided by an electrical field towards a screen.

 Thus screen of this tube is divided into rows and columns. So the intersection of rows and
columns makes a cell and that cell is called a pixel.

 The number of pixels per unit area of the screen is called resolution. More the resolution,
more clearly will be the picture

 Size is more, designed for non-portable computers

Flat-Panel Display Monitor

The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT. You can hang them on walls or wear them on your
wrists. Current uses of flat-panel displays include calculators, video games, monitors, laptop
computer, and graphics display.

The flat-panel display is divided into two categories −

 Emissive Displays − Emissive displays are devices that convert electrical energy into light.
For example, plasma panel and LED (Light-Emitting Diodes).

 Non-Emissive Displays − Non-emissive displays use optical effects to convert sunlight or


light from some other source into graphics patterns. For example, LCD (Liquid-Crystal
Device).
ITFB by P Nagaiah Goud

 These are designed for portable computers.

Printer:

Printers

Printer is an output device, which is used to print information on paper.

There are two types of printers −

 Impact Printers

 Non-Impact Printers

Impact Printers

Impact printers print the characters by striking them on the ribbon, which is then pressed on the
paper.

Characteristics of Impact Printers are the following −

 Very low consumable costs

 Very noisy
ITFB by P Nagaiah Goud

 Useful for bulk printing due to low cost

 There is physical contact with the paper to produce an image

impact printers are of two types −

 Character printers

 Line printers

Character Printers

Character printers are the printers which print one character at a time.

These are further divided into two types:

 Dot Matrix Printer(DMP)

 Daisy Wheel

Dot Matrix Printer

In the market, one of the most popular printers is Dot Matrix Printer. These printers are popular
because of their ease of printing and economical price. Each character printed is in the form of
pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or 9*9) which come out
to form a character which is why it is called Dot Matrix Printer.

Advantages

 Inexpensive

 Widely Used

 Other language characters can be printed

Disadvantages

 Slow Speed

 Poor Quality

Daisy Wheel
ITFB by P Nagaiah Goud

Is very similar to typewriters. A circular printing element is the heart of these printers that contains
all text, numeric characters and symbols mould on each petal on the circumference of the circle.
The printing element rotates rapidly with the help of a servo motor and pauses to allow the printing
hammer to strike the character against the paper..

Advantages

 More reliable than DMP

 Better quality

 Fonts of character can be easily changed

Disadvantages

 Slower than DMP

 Noisy

 More expensive than DMP

Line Printers

Line printers are the printers which print one line at a time.

These are of two types −

 Drum Printer

 Chain Printer

Drum Printer

This printer is like a drum in shape hence it is called drum printer. The surface of the drum is divided
into a number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper width of 132
characters, drum will have 132 tracks. A character set is embossed on the track. One rotation of
drum prints one line. Drum printers are fast in speed and can print 300 to 2000 lines per minute.
ITFB by P Nagaiah Goud

Advantages

 Very high speed

Disadvantages

 Very expensive

 Characters fonts cannot be changed

Chain Printer

In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard character
set may have 48, 64, or 96 characters.

Advantages

 Character fonts can easily be changed.

 Different languages can be used with the same printer.

Disadvantages

 Noisy

Non-impact Printers

Non-impact printers print the characters without using the ribbon. These printers print a complete
page at a time, thus they are also called as Page Printers.

These printers are of two types −

 Laser Printers

 Inkjet Printers

Characteristics of Non-impact Printers


ITFB by P Nagaiah Goud

 Faster than impact printers

 They are not noisy

 High quality

 Supports many fonts and different character size

Laser Printers

These are non-impact page printers. They use laser lights to produce the dots needed to form the
characters to be printed on a page.

Advantages

 Very high speed

 Very high quality output

 Good graphics quality

 Supports many fonts and different character size

Disadvantages

 Expensive

 Cannot be used to produce multiple copies of a document in a single printing

Inkjet Printers

Inkjet printers are non-impact character printers based on a relatively new technology. They print
characters by spraying small drops of ink onto paper. Inkjet printers produce high quality output
with presentable features.

They make less noise because no hammering is done and these have many styles of printing modes
available. Color printing is also possible. Some models of Inkjet printers can produce multiple copies
of printing also.

Advantages

 High quality printing


ITFB by P Nagaiah Goud

 More reliable

Disadvantages

 Expensive as the cost per page is high

 Slow as compared to laser printer

Computer Speakers

Computer speakers are hardware devices that transform the signal from the computer's sound card
into audio. Speakers are essential if you want a louder sound, or just a better quality of audio.
External computer speakers began to appear in stores in the early 1990's when computer gaming,
digital music, and other forms of media became popular. Some computer speakers are wireless
nowadays, connecting to the computer via Bluetooth

Headphones

Also known as earphones, headphones allow you to listen to audio without disrupting other people
in the vicinity. They connect via the computer line out, or to the speakers. Nowadays, headphones
come in all sorts of shapes and sizes.

Projector

As its name suggests, this output device "projects" computer images onto a wall or screen.
Projectors are typically used for presentations, watching movies, or as a teaching aid, as they
enable an entire roomful of people to see images generated by a single computer.
ITFB by P Nagaiah Goud

QP5) Define network and explain different types of network?


Collection of computers connected together to share data and resources is called as network. The
network consists of

 Computer systems
 Communication link
 Connecting devices such as router, hub, bridge etc.

Types of networks

The following are the different types of networks.

i. LAN(Local Area Network)


ii. MAN(Metropolitan Area Network)
iii. WAN(Wide Area Network)
iv. PAN(Personal Area Network)

Local Area Network

The systems which are in the same building are connected together to share data and resources is
called as local area network. The speed of local area network is more compared to WAN and MAN.
Local area network covers 1 km distance. Example of local area network is Ethernet.

System A System B

Communication link

System C System D

Metropolitan Area Network

The systems which are in metropolitan cities are connected together to share data and resources is
called as metropolitan area network. It covers the distance of 50 kilometers. The speed of MAN is
more compared to WAN but less compared to LAN. Example of Metropolitan area network is cable
TV.

System A System B System A System B

Communication link
Connec
ting
device
System C System D System C System D

Different systems in the same city are connected by using connecting device
ITFB by P Nagaiah Goud

Wide Area Network

Sys A Sys A Sys B


Sys B

Connecting
device Sys C
Sys C

Network in India
Network in USA
The systems which are geographically separated are connected together to share data and
resources is called as wide area network. It covers unlimited distance. The Speed of WAN is very
less compared to LAN and MAN. Example of wide area network is Internet.

Personal Area Network

If the personal devices such as mobile, Bluetooth, speakers, printer etc are connected to personal
computer then that type of network is called as personal area network. The speed of PAN is more
compared to LAN because the radius of PAN is 10 meters.

Laptop

Speaker Mo
bil
e

QP6) Define Topology and explain types of topologies?

Or

Explain LAN Topology?

Definition

The physical or logical arrangement of the systems in the network is called as topology. Or a
geometric connection of the systems in the network is called as topology. The following are the
different types of topologies.
ITFB by P Nagaiah Goud

 Bus topology
 Ring topology
 Star topology
 Mesh topology
 Hybrid topology

Bus topology

In Bus topology all the systems are connected to a single communication line called Bus. That is all
the systems make use of single communication line for communication. Because of single
communication line collision of data may occur. If collision of data occurs then the receiver will not
receive the data even though it receives the data it cannot understand because whenever collision
occurs there is a possibility that 1 will be replaced with 0 and 0 will be replaced with 1.

Sys A Sys B Sys C

Communication link

Sys D Sys E

Ring topology

In ring topology all the systems are arranged in a ring shape. There is a token rotates freely in a
circular path. Before going to transmit the data the sender has to obtain the token. The ring allows
only one sender to transmit the data at a time. It is designed to overcome the limitations of Bus
topology. The ring topology allows only one sender to transmit the data so there is no collision of
data. In this network if any system is not working then the entire network will not work.

Sys A

Ring token

Sys D Sys C

Sys C
ITFB by P Nagaiah Goud

Star topology

In star topology all the systems are connected to a central system called HUB. Hub is responsible for
controlling communication between the systems. In this topology every system has a separate
communication line with HUB. The benefits of having separate communication line are :

 There is no collision of data.


 If one system is not working then it will not affect other communication lines.

In this topology if HUB is not working then entire network will not work.

Mesh topology

In mesh topology every system is connected with every other system. There are multiple
communication lines between the systems. The benefit of having multiple communication lines
is that, if any communication line is not working then the sender can select other
communication line to transmit the data. The following are the disadvantages of mesh topology.

 Implementation of mesh topology is difficult.


 Maintenance cost is more.

Total number of connections in mesh topology is = n(n-1)/2 where n is the number of


systems.

Hybrid topology
ITFB by P Nagaiah Goud

It is a combination of 2 or more other types of topologies. As shown in the below diagram.

Q7) Explain Memory Devices?

Memory is used to store the data either temporarily or permanently. The following are the
different types of memories in the computer.

Memory

Main memory Secondary


memory

Examples:
RAM ROM
CD, DVD,HD

SRAM PROM
 Main Memory

 DRAMMemory
Secondary EPROM

Main Memory: EEPROM

It is divided into following:

i) RAM

ii) ROM

Random Access Memory (RAM):

 It is the main memory of the computer system.

 It holds the currently running program data and instructions.

 It is temporary or volatile memory.


ITFB by P Nagaiah Goud

 It holds the instructions as long as the system is on when the system is switched off then the
instructions in the RAM will be destroyed automatically.

 We can perform read and write operations on RAM.

Integrated RAM chips are available in two form:

 SRAM(Static RAM)

 DRAM(Dynamic RAM)

SRAM:

 The SRAM memories consist of circuits capable of retaining the stored information as long
as the power is applied. That means this type of memory requires constant power.

 SRAM memories are used to build Cache Memory.

 It consumes more power

 It makes use of transistors

 The storage capacity of SRAM is 1MB to 16MB.

 SRAM is of a smaller size.

DRAM:

 The main memory is generally made up of DRAM chips.

 It consumes less power compared to SRAM

 Uses capacitors and very few transistors.

 The storage capacity of DRAM is 1 GB to 16GB.

 DRAM has a higher access time. It is slower than SRAM.

 DRAM is available in larger storage capacity

Read only Memory (ROM):

 A solid-state semiconductor memory that can only read data stored in advance.

 It contains BIOS

 Its characteristic is that once the data is stored, it can no longer be changed or deleted.

 It is non-volatile or permanent memory

 It allows the user to read the data but not write the data.
ITFB by P Nagaiah Goud

 It has additional forms those devices will allow the user to re-write the data. They are

 PROM

 EPROM

 EEPROM

PROM (Programmable Read Only Memory)

 PROM is read-only memory chip that data can be written only once by a user.

 The user buys a PROM, the user will need a special device called a PROM programmer or
PROM burner to write the desired data onto the blank PROM chip.

EPROM (Erasable Programmable Read Only Memory)

 EPROM is a special kind of read only memory chip that has the opportunity to erase the
programmed data.

 The programmable read-only memory can be programmed to write data with high voltage,
and the data remains until it is exposed to ultraviolet light for lasting up to 10 minutes or
longer.

EEPROM (Electrically Erasable and Programmable Read Only Memory)

 Program and erase are done by exposing it to an electrical charge

 It can be erased and reprogrammed about 10,000 times.

Secondary storage devices:

Secondary/Auxiliary memory is used to store large amount of data permanently for long period.
The following are the examples of secondary memory devices.

 Hard disk
 Compact disk
 Digital versatile disk

Hard disk:

It is made up of rigid material and is usually a stack of metal disks sealed in a box. The hard disk and
the hard disk drive exist together as a unit and is a permanent part of the computer where data and
programs are saved. These disks have storage capacities ranging from 1 GB TO 1TB and more. Hard
disks are rewritable.

Compact disk:
ITFB by P Nagaiah Goud

Compact disk is portable disk having data storage capacity between 650 to 700 MB. It can hold
large amount of information such as music, videos and text. CD can be either read only or read and
write type.

Digital versatile disk:

DVD is similar to a CD but has larger storage capacity and enormous clarity. Depending upon the
disk it can store several Gigabytes of data.

Q8) Explain the following

a) Processor or explain CPU?

b) Software and its classifications?

a) Answer:

Processor:

A processor is an integrated electronic circuit that performs the calculations that run a computer. A
processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are
passed from an operating system (OS).

CPU (Central Processing Unit):

A central processing unit (CPU), also called a central processor, main processor or just processor.
Central Processing Unit (CPU) consists of the following features

 CPU is considered as the brain of the computer.


 CPU performs all types of data processing operations.
 It stores data, intermediate results, and instructions (program).
 It controls the operation of all parts of the computer.
CPU itself has following three components.

 Memory or Storage Unit


 CU (Control Unit)
 ALU (Arithmetic Logic Unit)
ITFB by P Nagaiah Goud

Memory or Storage Unit

This unit can store instructions, data, and intermediate results. This unit supplies information to
other units of the computer when needed. It is also known as internal storage unit or the main
memory or the primary storage or Random-Access Memory (RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory are two
types of memories in the computer. Functions of the memory unit are −
 It stores all the data and the instructions required for processing.
 It stores intermediate results of processing.
 It stores the final results of processing before these results are released to an output
device.
 All inputs and outputs are transmitted through the main memory.

Control Unit

This unit controls the operations of all parts of the computer but does not carry out any actual
data processing operations.
Functions of Control unit are `
 It is responsible for controlling the transfer of data and instructions among other units of a
computer.
 It manages and coordinates all the units of the computer.
 It obtains the instructions from the memory, interprets them, and directs the operation of
the computer.
 It communicates with Input/Output devices for transfer of data or results from storage.
 It does not process or store data.

ALU (Arithmetic Logic Unit)


ITFB by P Nagaiah Goud

This unit consists of two subsections namely,

 Arithmetic Section
 Logic Section

Arithmetic Section

It performs arithmetic operations such as addition, subtraction, multiplication, division, and


modulo division.

Logical Section

It performs logical operations such as comparing, selecting, matching, and merging of data.
B) Answer:

Software and its classification:

Software is a set of programs, which is designed to perform a well-defined function. A program is a


sequence of instructions written to solve a particular problem.
There are two types of software

 System Software
 Application Software

System Software

The software which is used by system itself is called as system software. The system software is a
collection of programs designed to operate, control, and extend the processing capabilities of the
computer itself. System software serves as the interface between the hardware and the end users.
Some examples of system software are
 Operating System.
 Compilers
 Interpreter
 Assemblers
Features of a system software

 Close to the system


 Fast in speed
 Difficult to design
 Difficult to understand
 Less interactive
 Difficult to manipulate
 Generally written in low-level language
ITFB by P Nagaiah Goud

Application Software:

The software which is used by user to execute particular task is called as application software.
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the category
of Application software. Application software may consist of a single program, such as Microsoft's
notepad for writing and editing a simple text. It may also consist of a collection of programs, often
called a software package, which work together to accomplish a task, such as a spreadsheet
package.
Examples of Application software:

 Payroll Software
 Student Record Software
 Inventory Management Software
 Income Tax Software
 Railways Reservation Software
 Microsoft Word
 Microsoft Excel
 Microsoft PowerPoint
Features of application software

 Close to the user


 Easy to design
 More interactive
 Slow in speed
 Generally written in high-level language
 Easy to understand
 Easy to manipulate and use
Q9) Define Operating System, explain its functions and types of Operating Systems?

Definition:

Operating System is a system software. it is a collection of programs. It provides interface to its


users. Interface is also called as virtual machine. With the help of interface user can easily write the
programs. User can easily interact with the computer; user can easily access the resources of the
computer.

The following are the objectives of Operating System: -

 The Operating System makes a computer system easier to use.


 The Operating System manages the resources of the computer system.

Functions of Operating System:


ITFB by P Nagaiah Goud

The following are the functions of Operating System.

 Process Management
 Memory Management
 File Management
 Device Management
 Security
 Command Interpretation

Process Management

A process is a program in execution. There are n numbers of processes in the computer system.
During the execution, a process needs certain resources such as CPU time, memory space, files and
I/O devices. Process Management module takes care of creation and deletion of processes,
scheduling of system resources to different processes requesting them and providing
communication among processes.

Memory Management

Before going to execute a program, we need to load the program in to main memory. Memory
management module takes care of allocation and de-allocation of memory space to programs in
the computer.

File Management

In computer system information is stored in a small unit called file. Processes read information from
files and create new files for storing newly generated information. File management module takes
care of file related activities such as organization, storage, retrieval, naming, sharing and protection
of files.

Device Management

There are n numbers of programs in computer to execute, computer consists of only one CPU and
several I/O devices such as terminal, printer, disk, and tape. The device management module
controls all I/O devices. It keeps track of I/O requests from processes. It issues commands to I/O
devices, and ensures correct data transmission to/from an I/O device.

Security Management

Computer system stores large amount of information, some of which are highly sensitive and
valuable to their users. Security module protects the resources and information of a computer
system against destruction and unauthorized access.

Command Interpretation
ITFB by P Nagaiah Goud

For using various system resources, a user communicates with the Operating System via a set of
commands provided by it. The operating system also provides a simple language called as
command language (CL) or job control language (JCL); Using which a user can send the request for
particular resource. Command interpretation module interprets and directs system resources to
process the commands.

Types of Operating System:

Single user operating system:-

In single user operating system one user can operate only one system. We cannot run more
than one application at a time, if you want to run another program, we have to close the
current application or program. The best example for single user operating system is MS Dos.

Multi user operating system:


The name itself suggest that, this operating system allows many users to work at any instant of
time. Here many users are connected to different monitors. A multiuser operating system can have
hundreds of users at any point of time and keeping track of every events. It requires large amount
of RAM. Here the computer gives a user his time and goes to another user giving his quota of time
and shifts to another and this process goes on.
Examples: Linux, Unix

Batch processing: -

Operating system executes various tasks and requests in batches not as individual task this
operating system accepts various tasks from the user and places them in queue waiting
execution. This process of placing requests in a queue for execution is known as spooling. Each
job task is assigned a priority, where execution time is available then these jobs are selected on
the basis of their priority from the queue.

Interactive OS:

Interactive OS do provide for features where the user can directly interact with the computer
from a terminal. The user can interrupt the execution of high priority batch job and get his low
priority job done by the computer. Most of the main frame-based OS today use these
interactive OS.

Multi-tasking OS:-
ITFB by P Nagaiah Goud

A running state of program is called a process or a task. Multitasking OS is a type of multi


program OS which can perform several processes simultaneously. The earliest multi-tasking OS
available to home users was the amigo OS. All current major OS support this feature.
Examples: Windows

Multi programming OS: -

 In multi programming OS several numbers of programs are feed into main memory of
the computer and processed.
 The multi programming OS runs one program at a time. When the program requires
some I/O operation which is slow process the CPU switches to another job for
execution.
 If the second job also requires I/O operation the C.P.U switches to third job and so on.
 Always a program will be in one of the 3 states ready, running and blocked.
 Until the first program completes I/O operation it is blocked and once completed the
C.P.U switches back to it.
 Multi programming is the inter leaved execution of 2 or more separate and independent
programs by the same computer.
 Example: windows
Multi-processing OS: -

Multi-processing refers to the ability of a system to support more than one processor at the
same time. Applications in a multi-processing system are broken to smaller routines that run
independently. The operating system allocates these threads to the processors improving
performance of the system.
Example: windows, Linux, Unix

Q10) Explain OSI model?

OSI Model: OSI stands for Open Systems Interconnection. The ISO (International Standards
Organization) was introduced the OSI model in 1983.
The OSI model is a standard reference model for communication between two users in a network.
Each layer of this model does not depend on the other layer, but the data is transmitted from one
layer to another layer. The OSI model describes how to send and receive data in a network. All
layers of the OSI model have their different functions so that data can be easily accessed from one
system to another. It is a seven-layer model.
ITFB by P Nagaiah Goud

Physical Layer

 Physical layer is the lowest layer of the OSI Model.

 It activates, maintains and deactivates the physical connection.

 It is responsible for transmission and reception of the unstructured raw data over network.

 Voltages and data rates needed for transmission is defined in the physical layer.

 It converts the digital/analog bits into electrical signal or optical signals.

 Data encoding is also done in this layer.

Data Link Layer

 Data link layer synchronizes the information which is to be transmitted over the physical
layer.

 The main function of this layer is to make sure data transfer is error free from one node to
another, over the physical layer.

 Transmitting and receiving data frames sequentially is managed by this layer.

 This layer sends and expects acknowledgements for frames received and sent respectively.
Resending of non-acknowledgement received frames is also handled by this layer.
ITFB by P Nagaiah Goud

 This layer establishes a logical layer between two nodes and also manages the Frame traffic
control over the network. It signals the transmitting node to stop, when the frame buffers
are full.

Network Layer

 Network layer routes the signal through different channels from one node to other.

 It acts as a network controller. It manages the Subnet traffic.

 It decides by which route data should take.

 It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.

Transport Layer

 Transport layer decides if data transmission should be on parallel path or single path.

 Functions such as Multiplexing, Segmenting or Splitting on the data are done by this layer

 It receives messages from the Session layer above it, convert the message into smaller units
and passes it on to the Network layer.

 Transport layer can be very complex, depending upon the network requirements.

Transport layer breaks the message (data) into small units so that they are handled more efficiently
by the network layer.

The Session Layer

 Session layer manages and synchronize the conversation between two different
applications.

 Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely and
data loss is avoided.

Presentation Layer

 Presentation Layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.

 While receiving the data, presentation layer transforms the data to be ready for the
application layer.
ITFB by P Nagaiah Goud

 Languages (syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role of translator.

 It performs Data compression, Data encryption, Data conversion etc.

Application Layer

 Application Layer is the topmost layer.

 Transferring of files disturbing the results to the user is also done in this layer. Mail services,
directory services, network resource etc are services provided by application layer.

 This layer mainly holds application programs to act upon the received and to be sent data.

Q11) Explain TCP/IP model?

TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network
model. Protocols are set of rules which govern every possible communication over a network.
These protocols describe the movement of data between the source and destination or the
internet. They also offer simple naming and addressing schemes.

TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department
of Defence's Project Research Agency (ARPA, later DARPA) as a part of a research project of
network interconnection to connect remote machines. It has 4 layers.

Host-to-network Layer

 Lowest layer of the all.

 Protocol is used to connect to the host, so that the packets can be sent over it.

 Varies from host to host and network to network.

Internet layer
ITFB by P Nagaiah Goud

 Selection of a packet switching network which is based on a connectionless internetwork


layer is called an internet layer.

 It is the layer which holds the whole architecture together.

 It helps the packet to travel independently to the destination.

 Order in which packets are received is different from the way they are sent.

 IP (Internet Protocol) is used in this layer.

 The various functions performed by the Internet Layer are:

 Delivering IP packets

 Performing routing

 Avoiding congestion

Transport Layer

 It decides if data transmission should be on parallel path or single path.

 Functions such as multiplexing, segmenting or splitting on the data is done by transport


layer.

 The applications can read and write to the transport layer.

 Transport layer adds header information to the data.

 Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.

 Transport layer also arrange the packets to be sent, in sequence.

Application Layer

The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.

 TELNET is a two-way communication protocol which allows connecting to a remote machine


and run applications on it.

 FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
ITFB by P Nagaiah Goud

 SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic


mail between a source and destination, directed via a route.

 DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.

 It allows peer entities to carry conversation.

 It defines two end-to-end protocols: TCP and UDP

 TCP (Transmission Control Protocol): It is a reliable connection-oriented protocol


which handles byte-stream from source to destination without error and flow
control.

 UDP (User-Datagram Protocol): It is an unreliable connection-less protocol that does


not want TCPs, sequencing and flow control. Eg: One-shot request-reply kind of
service.

Merits of TCP/IP model

 It operated independently.

 It is scalable.

 Client/server architecture.

 Supports a number of routing protocols.

 Can be used to establish a connection between two computers.

Demerits of TCP/IP

 In this, the transport layer does not guarantee delivery of packets.

 The model cannot be used in any other application.

 Replacing protocol is not easy.

 It has not clearly separated its services, interfaces and protocols.

Q12) Explain physical communication media?


ITFB by P Nagaiah Goud

Physical communication media is a physical path between the transmitter and the receiver i.e. it
is the channel through which data is sent from one place to another. Transmission Media is
broadly classified into the following types:

 Guided media (wired)


 Unguided media (wireless)

Guided media:

It is defined as the physical medium through which the signals are transmitted. It is also known as
Bounded media. The following are different types of guided media

 Twisted pair
 Coaxial cable
 Fiber optic

Twisted pair:

Twisted pair is a physical media made up of a pair of cables twisted with each other. A twisted pair
cable is cheap as compared to other transmission media. Installation of the twisted pair cable is
easy, and it is a lightweight cable. The frequency range for twisted pair cable is from 0 to 3.5KHz. A
twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.

Coaxial Cable
• Coaxial cable is very commonly used transmission media, for example, TV wire is usually
a coaxial cable.
• The name of the cable is coaxial as it contains two conductors parallel to each other.
• It has a higher frequency as compared to twisted pair cable.
• The inner conductor of the coaxial cable is made up of copper, and the outer conductor
is made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
• The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
ITFB by P Nagaiah Goud

Fiber Optic

• Fiber optic cable is a cable that uses electrical signals for communication.
• Fiber optic is a cable that holds the optical fibers coated in plastic that are used to send the
data by pulses of light.
• The plastic coating protects the optical fibers from heat, cold, electromagnetic interference
from other types of wiring.
• Fiber optics provides faster data transmission than copper wires.

UnGuided Transmission
• An unguided transmission transmits the electromagnetic waves without using any physical
medium. Therefore it is also known as wireless transmission.
• In unguided media, air is the media through which the electromagnetic energy can flow
easily.

The following are the different types of unguided media.

• Radio waves
• Microwaves
• Infrared waves

Radio Waves

• Radio wave is a wireless transmission medium that distributes radio signals through the air.
Radio waves are widely used as signals on radio communication .
ITFB by P Nagaiah Goud

• A transmitter is needed to send the broadcast signal and a receiver is needed to accept the
signal.
• Some networks use a transceiver, which both sends and receives signals from wireless
devices.

Microwaves

• Microwaves are radio waves that provide a high-speed signal transmission. Microwaves
transmission involves sending signals from one microwave station to another.
• Microwaves transmission is fast but is limited to line-of-sight transmission, which means
that the microwaves must transmit in a straight line with no obstructions between
microwave antennas.
• Microwaves stations are often located on the tops of buildings, towers, or mountains to
avoid possible obstructions. Microwaves transmission is used where installing physical
transmission media is difficult or impossible (e.g., deserts, lakes), but where line-of-sight
transmission is available.
• Radio waves in general have long distance communication capabilities, than microwaves.

Infrared

• Infrared (IR) is a wireless transmission media that sends signals using infrared light waves.
• IR transmission also requires a line-of-sight transmission as that required by microwaves.
• Computer devices such as a mouse, printer, and digital camera, which have an IrDA port
may transfer data from one device to another using infrared light waves.
• IR is an alternative to short-range broadcast radio communications such as Bluetooth
ITFB by P Nagaiah Goud

Satellite Communication

• A communications satellite is a station in space that receives microwaves signals from an


earth-based station, amplifies the signals, and broadcasts the signals back over a wide area
to many earth-based stations.
• Communications satellites are usually placed about 22,300 miles above the Earth's equator
and moves at the same rate as the Earth.
• Applications of communications satellite include television and radio broadcasts,
videoconferencing, paging, and global positioning systems(GPS)

Q13) Understanding of GUI?

GUI is an interface that allows users to interact with different electronic devices using icons and
other visual indicators. The graphical user interfaces were created because command line interfaces
were quite complicated and it was difficult to learn all the commands in it.
In today’s times, graphical user interfaces are used in many devices such as mobiles, MP3 players,
gaming devices, smartphones etc.
The below diagram provides the position of the graphical user interface with respect to the
computer system
ITFB by P Nagaiah Goud

Elements in Graphical User Interface


Graphical User Interface makes use of visual elements mostly. These elements define the
appearance of the GUI. Some of the GUI elements are.
 Window
This is the element that displays the information on the screen. It is very easy to manipulate a
window. It can be opened or closed with the click of an icon. Moreover, it can be moved to any area
by dragging it around. In a multitasking environment, multiple windows can be open at the same
time, all of them performing different tasks.
There are multiple types of windows in a graphical user interface, such as container window,
browser window, text terminal window, child window, message window etc.
 Menu
A menu contains a list a choice and it allows users to select one from them. A menu bar is displayed
horizontally across the screen such as pull-down menu. When any option is clicked in this menu,
then the pull-down menu appears.
Another type of menu is the context menu that appears only when the user performs a specific
action. An example of this is pressing the right mouse button. When this is done, a menu will
appear under the cursor.
 Icons
Files, programs, web pages etc. can be represented using a small picture in a graphical user
interface. This picture is known as an icon. Using an icon is a fast way to open documents, run
programs etc. because clicking on them yields instant access.
 Controls
Information in an application can be directly read or influences using the graphical control
elements. These are also known as widgets. Normally, widgets are used to display lists of similar
ITFB by P Nagaiah Goud

items, navigate the system using links, tabs etc. and manipulating data using check boxes, radio
boxes etc.
 Tabs
A tab is associated with a view pane. It usually contains a text label or a graphical icon. Tabs are
sometimes related to widgets and multiple tabs allow users to switch between different widgets.
Tabs are used in various web browsers such as Internet Explorer, Firefox, Opera, Safari etc. Multiple
web pages can be opened in a web browser and users can switch between them using tabs.
Advantages of GUI:

 GUI tend to be very user friendly and easy to use.


 Makes the system look very interesting and eye catching.
 Colors used and aesthetics can help make the interface look clear and easy to navigate.
ITFB by P Nagaiah Goud

UNIT-II

Q1) Write about Data, Information and knowledge

Data
Data can be defined as a representation of facts, concepts, or instructions in a formalized
manner, which should be suitable for communication, interpretation, or processing by human
or electronic machine.
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or
special characters (+,-,/,*,<,>,= etc.)
Information
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
The following are the characteristics of Information
 Timely − Information should be available when required.
 Accuracy − Information should be accurate.
 Completeness − Information should be complete.

Differences between Data and Information:


Data Information
Data is unorganized and unrefined facts Information comprises processed, organized data
presented in a meaningful context
Data is an individual unit that contains raw Information is a group of data that collectively
materials which do not carry any specific carries a logical meaning.
meaning.
Data doesn’t depend on information. Information depends on data.
It is measured in bits and bytes. Information is measured in meaningful units like
time, quantity, etc.
Raw data alone is insufficient for decision Information is sufficient for decision making
making
An example of data is a student’s test score The average score of a class is the information
derived from the given data.

Knowledge:
ITFB by P Nagaiah Goud

Knowledge is a combination of information, experience and insight that may benefit the
individual or the organization. Knowledge is a very important concepts as it is the process by
which data turns into useful information. The process of this transformation between data and
valuable information depends on the creation of relationships between sets of data
understanding of a set of information and the ways that information can be used to support a
specific task or reach a decision.

Characteristics of knowledge:

 General awareness or possession of information, facts, ideas, truths, or principles.


 Clear awareness or explicit information, for example, of a situation or fact
 All the information, facts, truths, and principles learned throughout time
 Familiarity or understanding gained through experience or study.

Q2) Write about Information System?

Definition

An Information system is a combination of hardware and software and telecommunication


networks that people build to collect, create and distribute useful data, typically in an
organization, it defines the flow of information within the system. The objective of an
information system is to provide appropriate information to the user, to gather the data,
processing of the data and communicate information to the user of the system.

Elements of Information System:

There are 6 elements that make up information system they are.

 Software
 Hardware
 Database
 Network
 Procedure
 Human resources

Software:

Software is a collection of programs and each program is a set of instructions. Software is used
to execute particular tasks. It is used to organize, process and analyze data. There are 2 types of
software.

 System software
ITFB by P Nagaiah Goud

 Application software

The software which is used by system to execute particular task is called as system software.

Example: Operating System.

The software which is used by user to execute particular task is called as application software.

Example: MS-Word, MS-Excel, MS-PowerPoint

Hardware:

The physical components of the computer which we can see and touch are called hardware.

The following are the physical components of computer system.

 Input devices
 Output devices
 Memory devices
 CPU

Database:

A Database is an organized collection of logical related data stored in the form of tables.

Network:

Group of computers connected to share data and resources is called as network.

Procedure:

It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.

Human Resources:

It is associated with the manpower required to run and manage the system. People are the end
user of the information system, end-user use information produced for their own purpose, the
main purpose of the information system is to benefit the end user. The end user can be
accountants, engineers, salespersons, customers, clerks, or managers etc.

Dimensions of information system:

 Organizational dimension
 Management dimension
ITFB by P Nagaiah Goud

 Technology dimension

Organizational Dimension:

In organizational dimensions, management understands what is embodied in its information


system relating organizational stuff like; culture, norms and values, core tasks of organization,
hierarchy of organization etc… Management should understand that all decisions that we made
depend on the information which is provided by information systems. Organizational
dimensions of any organization are easy to understand for manager because it is his line and he
is better aware of the culture and norms of his organization.

Management Dimension:

In management dimension of information systems, information systems assist manager to


allocate resources, hire staff, motivate staff, realize risky areas and allocate experienced staff of
such risky areas. Information system assists manager to see different designs of products and to
make new products. Manager use different techniques from information system to reduce the
cost of its product like; target costing technique Organization produces its reports, financial
statements and forecasts by the help of information systems.

Technological Dimension:

Technology dimension of an information system includes; hardware and software.


Management uses technology dimension to store its data in a safe custody. Through this
dimension, management communicates throughout the world via internet and networking.
They must be aware of this stuff with a knowledge of business because this is an era of
technology and even if you are not in this line, but you must possess know-how of information
technology.

Q3) Explain Types of Information System?

The following are the different types of information systems.

 TPS

 MIS

 DSS

 Expert System

 AIS

 SIS
ITFB by P Nagaiah Goud

Transaction Processing System (TPS):


Transaction Processing System are information system that processes data resulting from the
occurrences of business transactions
Their objectives are to provide transaction in order to update records and generate reports i.e
to perform store keeping function
The transaction is performed in two ways: Batching processing and Online transaction
processing.
Example: Bill system, payroll system, Stock control system.

Management Information System (MIS):


Management Information System is designed to take relatively raw data available through a
Transaction Processing System and convert them into a summarized and aggregated form for
the manager, usually in a report format. It reports tending to be used by middle management
and operational supervisors.
Many different types of report are produced in MIS. Some of the reports are a summary report,
on-demand report, ad-hoc reports and an exception report.
Example: Sales management systems, Human resource management system.

Decision Support System (DSS):


Decision Support System is an interactive information system that provides information,
models and data manipulation tools to help in making the decision in a semi-structured and
unstructured situation.
Decision Support System comprises tools and techniques to help in gathering relevant
information and analyze the options and alternatives, the end user is more involved in creating
DSS than an MIS.
Example: Financial planning systems, Bank loan management systems.

Experts System:
Experts systems include expertise in order to aid managers in diagnosing problems or in
problem-solving. These systems are based on the principles of artificial intelligence research.
Experts Systems is a knowledge-based information system. It uses its knowledge about a specify
are to act as an expert consultant to users.
Knowledgebase and software modules are the components of an expert system. These modules
perform inference on the knowledge and offer answers to a user’s question

Accounting Information System (AIS)


An accounting information system (AIS) is a structure that a business uses to collect, store,
manage, process, retrieve, and report its financial data so it can be used by accountants,
consultants, business analysts, managers, chief financial officers (CFOs), auditors, regulators,
and tax agencies.
ITFB by P Nagaiah Goud

(SIS) Strategic Information System


Strategic information systems (SIS) are information systems that are developed in response to
corporate business initiative. They are intended to give competitive advantage to the
organization. They may deliver a product or service that is at a lower cost, that is differentiated,
that focuses on a particular market segment, or is innovative.

Q4) Explain Management Information System?

Definition:

A Management Information System (MIS) is an information system that provides managers


with the tools to effectively organize, evaluate, and manage departments within an
organization. It’s used for decision making and the coordination, control, analysis, and
visualization of information in an organization.

When used in a corporate context, a MIS is used to increase the value and profits of a business
by providing managers with the relevant and appropriate information needed to make
important decisions quickly.

The three components of MIS such as Management, Information, and System provide a more
complete and focused definition,
Management information system can be analyzed as follows −
Management
Management covers the planning, control, and administration of the operations of a concern.
The top management handles planning; the middle management concentrates on controlling;
and the lower management is concerned with actual administration.
Information
Information, in MIS, means the processed data that helps the management in planning,
controlling and operations. Data means all the facts arising out of the operations of the
concern. Data is processed i.e. recorded, summarized, compared and finally presented to the
management in the form of MIS report.
System
Data is processed into information with the help of a system. A system is made up of inputs,
processing, output and feedback or control.
Thus MIS means a system for processing data in order to give proper information to the
management for performing its functions.
ITFB by P Nagaiah Goud

Objectives of MIS
The goals of an MIS are to implement the organizational structure and dynamics of the
enterprise for the purpose of managing the organization in a better way and capturing the
potential of the information system for competitive advantage.
Following are the basic objectives of an MIS −
 Capturing Data − Capturing contextual data, or operational information that will
contribute in decision making from various internal and external sources of
organization.
 Processing Data − The captured data is processed into information needed for planning,
organizing, coordinating, directing and controlling functionalities at strategic, tactical
and operational level. Processing data means −
o making calculations with the data
o sorting data
o classifying data and
o summarizing data
 Information Storage − Information or processed data need to be stored for future use.
 Information Retrieval − The system should be able to retrieve this information from the
 storage as and when required by various users.
 Information Propagation − Information or the finished product of the MIS should be
circulated to its users periodically using the organizational network.
Characteristics of Computerized MIS
Following are the characteristics of a well-designed computerized MIS −
 It should be able to process data accurately and with high speed, using various
techniques like operations research, simulation, heuristics, etc.
 It should be able to collect, organize, manipulate, and update large amount of raw data
of both related and unrelated nature, coming from various internal and external
sources at different periods of time.
 It should provide real time information on ongoing events without any delay.
 It should support various output formats and follow latest rules and regulations in
practice.
 It should provide organized and relevant information for all levels of management:
strategic, operational, and tactical.

 It should aim at extreme flexibility in data storage and retrieval.


ITFB by P Nagaiah Goud

Advantages of MIS:

A good management information system can be used not only for the storage of electronic data
alone but must be able to support the analysis required by management. There are
many advantages of MIS which are utilized by manager to achieve organization goal.

The following are some of the benefits of a good MIS.


 Increased customer satisfaction
 Improved quantity and quality of information
 Improved quality and quantity management decisions
 Improved responsiveness number of the competitor’s condition
 Improved operational efficiency and flexibility
 Improved quality of internal and external communications
 Improved quality of planning
 Improved quality control and supervision

Components of MIS
A management information system is made up of five major components namely people,
business processes, data, hardware, and software. All of these components must work together
to achieve business objects.

 Software
 Hardware
 Database
 Network
 Procedure
 Human resources

Software:

Software is a collection of programs and each program is a set of instructions. Software is used
to execute particular tasks. It is used to organize, process and analyze data. There are 2 types of
software.

 System software
 Application software

The software which is used by system to execute particular task is called as system software.

Example: Operating System.

The software which is used by user to execute particular task is called as application software.
ITFB by P Nagaiah Goud

Example: MS-Word, MS-Excel, MS-PowerPoint

Hardware:

The physical components of the computer which we can see and touch are called hardware.

The following are the physical components of computer system.

 Input devices
 Output devices
 Memory devices
 CPU

Database:

A Database is an organized collection of logical related data stored in the form of tables.

Network:

Group of computers connected to share data and resources is called as network.

Procedure:

It is a set of instructions used to execute particular task. Procedure is used to instruct computer
system to solve particular problem.

Human Resources:

It is associated with the manpower required to run and manage the system. People are the end
user of the information system, end-user use information produced for their own purpose, the
main purpose of the information system is to benefit the end user. The end user can be
accountants, engineers, salespersons, customers, clerks, or managers etc.

5). Explain Decision Support System (DSS)?

Definition:

Decision support systems (DSS) are interactive software-based systems intended to help
managers in decision-making by accessing large volumes of information generated from
various related information systems involved in organizational business processes, such as
office automation system, transaction processing system, etc.
DSS uses the summary information, exceptions, patterns, and trends using the analytical
models. A decision support system helps in decision-making but does not necessarily give a
decision itself. The decision makers compile useful information from raw data, documents,
ITFB by P Nagaiah Goud

personal knowledge, and/or business models to identify and solve problems and make
decisions.

Characteristics of a DSS

 Support for decision-makers in semi-structured and unstructured problems.


 Support for managers at various managerial levels, ranging from top executive to line
managers.
 Support for individuals and groups. Less structured problems often requires the
involvement of several individuals from different departments and organization level.
 Support for interdependent or sequential decisions.
 Support for intelligence, design, choice, and implementation.
 Support for variety of decision processes and styles.
 DSSs are adaptive over time.
Benefits of DSS
 Improves efficiency and speed of decision-making activities.
 Increases the control, competitiveness and capability of futuristic decision-making of
the organization.
 Facilitates interpersonal communication.
 Encourages learning or training.
 Since it is mostly used in non-programmed decisions, it reveals new approaches and
sets up new evidences for an unusual decision.
 Helps automate managerial processes.
Components of a DSS
Following are the components of the Decision Support System −
 Database Management System (DBMS) − To solve a problem the necessary data may
come from internal or external database. In an organization, internal data are
generated by a system such as TPS and MIS. External data come from a variety of
sources such as newspapers, online data services, databases (financial, marketing,
human resources).
 Model Management System − It stores and accesses models that managers use to
make decisions. Such models are used for designing manufacturing facility, analysing
the financial health of an organization, forecasting demand of a product or service, etc.
ITFB by P Nagaiah Goud

 Support Tools − Support tools like online help; pulls down menus, user interfaces,
graphical analysis, error correction mechanism, facilitates the user interactions with the
system.
Classification of DSS
There are several ways to classify DSS.
 Text Oriented DSS − It contains textually represented information that could have a
bearing on decision. It allows documents to be electronically created, revised and
viewed as needed.
 Database Oriented DSS − Database plays a major role here; it contains organized and
highly structured data.
 Spread sheet Oriented DSS − It contains information in spread sheets that allows
create, view, modify procedural knowledge and also instructs the system to execute
self-contained instructions. The most popular tool is Excel and Lotus 1-2-3.
 Solver Oriented DSS − It is based on a solver, which is an algorithm or procedure
written for performing certain calculations and particular program type.
 Rules Oriented DSS − It follows certain procedures adopted as rules.
 Compound DSS − It is built by using two or more of the five structures explained above.
Types of DSS
Following are some typical DSSs −
 Status Inquiry System − It helps in taking operational, management level, or middle
level management decisions, for example daily schedules of jobs to machines or
machines to operators.
 Data Analysis System − It needs comparative analysis and makes use of formula or an
algorithm, for example cash flow analysis, inventory analysis etc.
 Information Analysis System − in this system data is analysed and the information
report is generated. For example, sales analysis, accounts receivable systems, market
analysis etc.
 Accounting System − It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of
the major aspects of the business.
 Model Based System − Simulation models or optimization models used for decision-
making are used infrequently and creates general guidelines for operation or
management.
6). Explain Expert System (ES)?
ITFB by P Nagaiah Goud

An expert system is a computer program that is designed to solve complex problems and to
provide decision-making ability like a human expert. It performs this by extracting knowledge
from its knowledge base using the reasoning and inference rules according to the user queries.

The expert system is a part of AI, and the first ES was developed in the year 1970, which was
the first successful approach of artificial intelligence. It solves the most complex issue as an
expert by extracting the knowledge stored in its knowledge base. The system helps in decision
making for complex problems using both facts and heuristics like a human expert. It is called
so because it contains the expert knowledge of a specific domain and can solve any complex
problem of that particular domain. These systems are designed for a specific domain, such
as medicine, science, etc.

The performance of an expert system is based on the expert's knowledge stored in its
knowledge base. The more knowledge stored in the KB, the more that system improves its
performance. One of the common examples of an ES is a suggestion of spelling errors while
typing in the Google search box.

Components:

Knowledge Acquisition Subsystem:


Knowledge represented in the knowledge base has to be acquired from the expert. This is the

job of the knowledge engineer.


ITFB by P Nagaiah Goud

As this is a skilled & time consuming operation, it is often this which limits the designing and
functioning of expert system in a commercial environment. Knowledge Acquisition program is

used by an individual, who has expertise in the problem to, creates, add to or change the
knowledge base. Potential sources of knowledge include human expert, research reports,
textbooks, databases and the user’s own experience.

Experts make decisions based on qualitative & quantitative information. The system engineer

has to translate the standard procedures into the form suitable for the expert system. Acquiring
the knowledge from experts is a complex task that often is a bottleneck in expert system
construction.

Knowledge Base:
This is the most important element of an expert system since it holds the expert’s problem

solving knowledge. It is where the knowledge elicited from the expert is stored. It contains
rules, facts and descriptions of objects etc.

With newer expert system products, the knowledge base is always stored in data. The
information in knowledge base is everything that is necessary for understanding & formulating
the problem & then solving it.

The key to knowledge base is how the knowledge is represented. The knowledge acquired from
the expert has to be represented formally. Such knowledge representation deals with the
structuring of the information, manipulation of information, and knowledge acquisition. The
power of a system tends to be r elated from all sides of the knowledge in the knowledge base.

Interference engine

The interference engine is that part of the program which regains & determines how to apply
the knowledge in the knowledge base to the facts & premises presented at the user interface. It
ITFB by P Nagaiah Goud

performs this task in order to deduce new facts which are subsequently used to draw further
conclusions. The interference engine is the active component of an expert system. It is the
Brain of the expert system.

Interference engine is also known as the control structure or the rule interpreter. This
component is essentially a computer program that processes the knowledge base to achieve
the goal stipulated by the user, who is communicating with the system via the user interface. It

provides a methodology for reasoning about information in the knowledge base & for
formulating conclusions.

User Interface:

Expert system contains a language processor for friendly problem oriented-communications


between the manager-user & the computer. This communication is best carried out in a natural
language and in some cases; it is supplemented by the graphics.

The human computer interface or user interface technology allows users to interact with the
system. The user presents the problem and has the conclusions presented to him. A significant
feature of some expert systems is that they can justify the conclusions reached as well as
explain why certain options were used or discarded.

Advantages of Expert System


 These systems are highly reproducible.
 They can be used for risky places where the human presence is not safe.
 Error possibilities are less if the KB contains correct knowledge.
 The performance of these systems remains steady as it is not affected by emotions,
tension, or fatigue.
 They provide a very high speed to respond to a particular query.
ITFB by P Nagaiah Goud

Limitations of Expert System


 The response of the expert system may get wrong if the knowledge base contains the
wrong information.
 Like a human being, it cannot produce a creative output for different scenarios.
 Its maintenance and development costs are very high.
 Knowledge acquisition for designing is much difficult.
 For each domain, we require a specific ES, which is one of the big limitations.
 It cannot learn from itself and hence requires manual updates.

Applications of Expert System


The following table shows where ES can be applied.
Application Description

Design Domain Camera lens design, automobile design.

Medical Domain Diagnosis Systems to deduce cause of disease from observed data,
conduction medical operations on humans.

Monitoring Systems Comparing data continuously with observed system or with


prescribed behavior such as leakage monitoring in long petroleum
pipeline.

Process Control Systems Controlling a physical process based on monitoring.

Knowledge Domain Finding out faults in vehicles, computers.

Finance/Commerce Detection of possible fraud, suspicious transactions, stock market


trading, Airline scheduling, cargo scheduling.

7). Explain Executive Information System?

An executive information system (EIS) is a decision support system (DSS) used to assist senior
executives in the decision-making process. It does this by providing easy access to important
data needed to achieve strategic goals in an organization. An EIS normally features graphical
displays on an easy-to-use interface.
ITFB by P Nagaiah Goud

Executive information systems can be used in many different types of organizations to monitor
enterprise performance as well as to identify opportunities and problems.

Components of EIS

 USER INTERFACE: User Interface allows the users to communicate with the EIS.
User interface must be easy to use and understand. Users should not be required
to understand the complex query languages and other mathematical or
statistical formulas.
 HARDWARE: Hardware refers to devices by which users give input, data
processing and the output is received. Users may give input via keyboard and
mouse and CPU may be used for processing and output may be received on
monitor or from printer.
 SOFTWARE: Software is required for various calculations, providing graphical
view to the management, storing data in the form of Information, etc. Software
allows user to get information in the form it is actually required.
 TELECOMMUNICATION: In today’s world the most important thing is
communication. Users may require transferring information from one point to
another point. The information might be a little confidential in nature. The
secrecy of the information should be well maintained.
Applications of EIS

MANUFACTURING:
 It determines whether a process is running correctly or not.
 It helps in ensuring proper quality control of finished goods.
 It measures the actual process time and compares with the standard time
required for the process.
 It provides management with daily production report, daily consumption
report, safety stock report, economic order quantity, etc.
FINANCIAL:
 Every organization needs to ensure financial activities are running sound.
 EIS may help to analyze whether payment has been realized from creditors within
stipulated period of time.
 It can help management in managing various other sources of finance.
ACCOUNTING:
 It helps in proper accounting and disbursement of accounting functions.
Advantages

 EIS is easy for use and saves time of the top level management of the
organization.
 EIS provide access to timely information in a rapid manner.
 EIS provides extensive online analysis tools.
 EIS can easily be given a DSS support.
Characteristics:
ITFB by P Nagaiah Goud

 Detailed data – EIS provides absolute data from its existing database.
 Integrate external and internal data – EIS integrates external and internal data. The
external data collected from various sources.
 Presenting information – EIS represents available data in graphical form which helps to
analyze it easily.
 Trend analysis – EIS helps executives of the organizations to data prediction based on
trend data.
 Easy to use – It is a very simplest system to use.

Q8) Define DBMS and explain its Architecture? Or Explain Architecture of database system?

Database:

A database is an organized collection of logically related data stored in the form of tables or
relation. As shown in the below diagram.

STUDENT Table

Htno Name age Courseid


101 AAA 18 684
102 BBB 18 684
103 CCC 19 405

COURSE Table

Courseid Cname
684 BBA
405 [Link] CA

Table is a collection of rows and columns, each column is called as attribute and each row is
called as record. Every table contains Primary Key, which is used to uniquely identify every row
in the database.

DBMS (Database Management System):

It is defined as the application software system that allows users to define, create, maintain and
control access to the database. DBMS makes it possible for end users to create, read, update
and delete data in database. It is a layer between programs and data.

Advantages of DBMS:

 Reducing Data Redundancy


ITFB by P Nagaiah Goud

 Sharing of Data
 Data Integrity
 Data Security
 Privacy
 Backup and Recovery
 Data Consistency

DBMS Architecture:

The DBMS architecture describes how data in the database are viewed by the users. It is not
concerned with how the data are handled and processed by the DBMS. It shows different levels
of data abstraction. Data Abstraction is a process of hiding unwanted or irrelevant details from
the end user. It provides a different view and helps in achieving data independence which is
used to enhance the security of data. The DBMS architecture, consists of three levels they are

• Internal level
• Conceptual level
• External levels

Thus named three-level DBMS architecture.


ITFB by P Nagaiah Goud

Internal level:

It is the lowest level of data abstraction that deals with the physical representation of the
database on the computer and, thus, is also known as the physical level. It describes how the
data are physically stored and organized on the storage medium.

Conceptual level:

This level of abstraction deals with the logical structure of the entire database and, thus, is also
known as the logical level. It describes what data are stored in the database, the relationships
among the data and a complete view of the user's requirements without any concern for the
physical implementation.

External level:

It is the highest level of abstraction that deals with the user's view of the database and, thus, is
also known as the view level. It permits users to access data in a way that is customized
according to their needs, so that the same data can be seen by different users in different ways,
at the same time. In this way, it provides a powerful and flexible security mechanism by hiding
the parts of the database from certain users as the user is not aware of the existence of any
attributes that are missing from the view.
9Q) Explain advantages and disadvantages of DBMS?
ITFB by P Nagaiah Goud

DBMS is an application software that allows users to define, create, maintain and control access
to the database. DBMS makes it possible for end users to create, read, update and delete data
in database. It is a layer between programs and data. DBMS has the following advantages.

 Reducing Data Redundancy


 Data Consistency
 Sharing of Data
 Data Integrity
 Data Security
 Privacy
 Backup and Recovery

Reducing Data Redundancy:

Redundancy is the concept of repetition of data i.e., each data may have more than a single
copy. The file system cannot control redundancy of data as each user defines and maintains
the needed files for a specific application to run. There may be a possibility that two users are
maintaining same files data for different applications. Hence changes made by one user does
not reflect in files used by second users, which leads to inconsistency of data. Whereas DBMS
controls redundancy by maintaining a single repository of data that is defined once and is
accessed by many users. As there is no or less redundancy, data remains consistent.

Data consistency:

Data consistency is ensured in a database because there is no data redundancy. All data
appears consistently across the database and the data is same for all the users viewing the
database. Moreover, any changes made to the database are immediately reflected to all the
0users and there is no data inconsistency.

Sharing of Data

In a database, the users of the database can share the data among themselves. There are
various levels of authorization to access the data, and consequently the data can only be shared
based on the correct authorization protocols being followed. Many remote users can also
access the database simultaneously and share the data between themselves.

Data Integrity

Data integrity means that the data is accurate and consistent in the database. Data Integrity is
very important as there are multiple databases in a DBMS. All of these databases contain data
ITFB by P Nagaiah Goud

that is visible to multiple users. So it is necessary to ensure that the data is correct and
consistent in all the databases and for all the users.

Data Security

Data Security is vital concept in a database. Only authorized users should be allowed to access
the database and their identity should be authenticated using a username and password.
Unauthorized users should not be allowed to access the database under any circumstances as it
violates the integrity constraints.

Privacy

The privacy rule in a database means only the authorized users can access a database according
to its privacy constraints. There are levels of database access and a user can only view the data
he is allowed to. Limited access means privacy of data. For example - In social networking sites,
access constraints are different for different accounts a user may want to access.

Backup and Recovery

Database Management System automatically takes care of backup and recovery. The users
don't need to backup data periodically because this is taken care of by the DBMS. Moreover, it
also restores the database after a crash or system failure to its previous condition.

Disadvantages

 Increased cost
 Management complexity
 Maintaining currency
 Frequent upgrade/replacement cycles

Increased costs

One of the disadvantages of DBMS is Database systems require sophisticated hardware and
software and highly skilled personnel. The cost of maintaining the hardware, software, and
personnel required to operate and manage a database system can be substantial. Training,
licensing, and regulation compliance costs are often overlooked when database systems are
implemented.

Management complexity

Database systems interface with many different technologies and have a significant impact on a
company’s resources and culture. The changes introduced by the adoption of a database
system must be properly managed to ensure that they help advance the company’s objectives.
ITFB by P Nagaiah Goud

Given the fact that database systems hold crucial company data that are accessed from
multiple sources, security issues must be assessed constantly.

Maintaining currency

maximize the efficiency of the database system, you must keep your system current. Therefore,
you must perform frequent updates and apply the latest patches and security measures to all
components. Because database technology advances rapidly, personnel training costs tend to
be significant. Vendor dependence. Given the heavy investment in technology and personnel
training, companies might be reluctant to change database vendors. As a consequence, vendors
are less likely to offer pricing point advantages to existing customers, and those customers
might be limited in their choice of database system components.

Frequent upgrade/replacement cycles

DBMS vendors frequently upgrade their products by adding new functionality. Such new
features often come bundled in new upgrade versions of the software. Some of these versions
require hardware upgrades. Not only do the upgrades themselves cost money, but it also costs
money to train database users and administrators to properly use and manage the new
features.

Q10) Explain Ethical and Social issues in information System?

Understanding Ethical and Social Issues Related to information Systems

Ethics are the principles of right and wrong individuals, acting as free moral agents, use to make
choices to guide their behavior. Information systems raise new ethical questions for both
individuals and societies because they create opportunities for intense social change.

Ethical, social, and political issues are closely linked. Introduction of new technology has a ripple
effect in the current equilibrium, creating new ethical, social, and political issues that must be
dealt with on individual, social, and political levels. Both social and political institutions require
time before developing new behaviors, rules, and laws.
ITFB by P Nagaiah Goud

Five Moral Dimensions of the Information Age:


There are five main moral dimensions that tie together ethical, social, and political issues in an
information society. These moral dimensions are:

 Information rights and obligations

 Property rights and obligations

 Accountability and control

 System quality

 Quality of life

Information rights and obligations:

 What information rights do individuals and organizations possess with respect to


information about themselves? What can they protect?
 What obligations do individuals and organizations have concerning this information?

Property rights and obligations:

 What are the intellectual property rights?


 How will traditional intellectual property rights be protected in a digital society in which
tracing and accounting for ownership is difficult and ignoring such property rights is so
easy?

Accountability and control:

 Who can and will be held accountable and liable for the harm done to individual and
collective information and property rights?
ITFB by P Nagaiah Goud

System quality:

 What standards of data and system quality should we demand to protect individual
rights and the safety of society?

Quality of life:

 What values should be preserved in an information-and knowledge-based society?


Which institutions should we protect from violation?
 Which cultural values and practices are supported by the new information technology?

Technology trends:

Four key technology trends have heightened the ethical stresses on existing social
arrangements and laws.

 Computing power has doubled every 18 months allowing growing numbers of


organizations to use information systems in their core business processes. This growing
dependence on critical systems increases vulnerability to system errors and poor data
quality.
 Advances in data storage techniques have enabled for the multiplying databases on
individuals maintained by private and public organizations - making the violation of
individual privacy both cheap and effective.
 Advances in data analysis techniques enable companies and government agencies
use profiling to determine detailed information about individual's habits and tastes and
create dossiers of detailed information. Nonobvious relationship awareness (NORA) is a
new data analysis technology that can take data about people from many sources and
correlate relationships to find hidden connections to identify potential criminals and
terrorists.
 Advances in networking reduce the costs of moving and accessing data, permitting
privacy invasions on a vast scale.

Ethics in an Information Society

Ethical decisions draw on the concepts of:

 Responsibility: Accepting the potential costs, duties, and obligations of one's decisions
accountability

 Accountability: A feature of systems and social institutions, accountability means that


mechanisms are in place to determine who took responsible action and who is
responsible for an action
ITFB by P Nagaiah Goud

 Liability: Refers to the existence of laws that permit individuals to recover the damages
done to them by other actors, systems, or organizations

 Due process: Requires that laws are known and understood by all, and that individuals
can appeal to higher authorities to ensure laws were properly applied

Analyze ethical issues:

A five-step process can help analyze ethical issues:

 Identifying the facts


 Defining the conflict or dilemma and identifying the values involved
 Identifying the stakeholders
 Identifying options that can be taken
 Identifying potential consequences of actions.
ITFB by P Nagaiah Goud

UNIT-III

Q1) Explain Audio files formats?

Sound can be stored in many different formats.

 The MIDI Format


 The RealAudio Format
 The AU Format
 The AIFF Format
 The SND Format
 The WAVE Format
 The MP3 Format (MPEG)

The MIDI Format:

The MIDI (Musical Instrument Digital Interface) is a format for sending music information
between electronic music devices like synthesizers and PC sound cards. The MIDI format was
developed in 1982 by the music industry. The MIDI format is very flexible and can be used for
everything from very simple to real professional music making. MIDI files do not contain
sampled sound, but a set of digital musical instructions (musical notes) that can be interpreted
by your PC's sound card.

The MIDI format is supported by many different software systems over a large range of
platforms. MIDI files are supported by all the most popular Internet browsers. Sounds stored in
the MIDI format have the extension .mid or .midi.

The RealAudio Format:

The RealAudio format was developed for the Internet by Real Media. The format also supports
video. The format allows streaming of audio (on-line music, Internet radio) with low
bandwidths. Because of the low bandwidth priority, quality is often reduced. Sounds stored in
the RealAudio format have the extension .rm or .ram.

The AU Format:

The AU format is supported by many different software systems over a large range of
platforms. It was developed by Sun microsystems. Sounds stored in the AU format have the
extension .au.
ITFB by P Nagaiah Goud

The AIFF Format:

The AIFF (Audio Interchange File Format) was developed by Apple. AIFF files are not cross-
platform and the format is not supported by all web browsers. Sounds stored in the AIFF format
have the extension .aif or .aiff.

The SND Format:

The SND (Sound) was developed by Apple. SND files are not cross-platform and the format is
not supported by all web browsers. Sounds stored in the SND format have the extension .snd.

The WAVE Format:

The WAVE (waveform) format is developed by IBM and Microsoft. It is supported by all
computers running Windows, and by all the most popular web browsers. Sounds stored in the
WAVE format have the extension .wav.

The MP3 Format (MPEG):

MP3 files are actually MPEG files. But the MPEG format was originally developed for video by
the Moving Pictures Experts Group. We can say that MP3 files are the sound part of the MPEG
video format. MP3 is one of the most popular sound formats for music recording. The MP3
encoding system combines good compression (small files) with high quality. Expect all your
future software systems to support it. Sounds stored in the MP3 format have the extension
.mp3, or .mpga (for MPG Audio).

What Format to Use?

The WAVE format is one of the most popular sound format on the Internet, and it is supported
by all popular browsers. If you want recorded sound (music or speech) to be available to all
your visitors, you should use the WAVE format. The MP3 format is the new and upcoming
format for recorded music. If your website is about recorded music, the MP3 format is the
choice of the future.
ITFB by P Nagaiah Goud

Q2) Explain Video file formats?

Video file format:

A container and a codec are two components of any video file. A video format is the container
that stores audio, video, subtitles and any other metadata. A codec encodes and decodes
multimedia data such as audio and video.

When creating a video, a video codec encodes and compresses the video while the audio codec
does the same with sound. Afterwards the encoded video and audio are synchronized and
stored in a media container—the file format.

The following are Common Video File Formats

• MP4 (Motion Picture Expert Group)

• MOV

• WMV (Widows Media Video)

• FLV (Flash Video)

• AVI (Audio Video interleave)

• AVCHD (Advanced Video Coding High Definition)

• WebM

• RV (RealVideo)

MP4:

MP4 is one of the earliest digital video file formats introduced in 2001. Most digital platforms
and devices support MP4. An MP4 format can store audio files, video files, still images, and
text. Additionally, MP4 provides high quality video while maintaining relatively small file sizes.
Extension is .mp4

MOV :

MOV is a popular video file format designed by Apple. It was designed to support the
QuickTime player. MOV files contain videos, audio, subtitles, timecodes and other media types.
It is compatible across different versions of QuickTimePlayer, both for Mac and Windows. Since
it is a very high-quality video format, MOV files take significantly more memory space on a
computer. Extension is .mov
ITFB by P Nagaiah Goud

WMV

The WMV video format was designed by Microsoft and is widely used in Windows media
players. WMV format provides small file sizes with better compression than MP4. That is why
it’s popular for online video streaming. Although it is not compatible with Apple devices, users
can download Windows Media Player for their iPhone or Mac. Extension is .wmv

FLV

FLV is a file format used by Adobe Flash Player. It is developed by Adobe Systems. It is one of
the most popular and versatile video formats supported by all video platforms and browsers.
The FLV format is a good choice for online video streaming platforms like YouTube. They have a
relatively small file size which makes them easy to download. The only drawback is that it’s not
compatible with many mobile devices like iPhones. Extension is .flv

AVI

The AVI file format was introduced in 1992 by Microsoft and is still widely used today. The AVI
video format uses less compression than other video formats such as MPEG or MOV. This
results in very large file sizes, approximately 2-3 GB per minute of video. It can be a problem for
users with limited storage space. You can also create AVI video files without any compression.
This makes the files lossless. A lossless file will keep its quality over time, regardless of how
many times you open or save the file. Additionally, this eliminated the use of codecs in video
players. Extension is .avi

AVCHD

AVCHD is a format used for HD video playback and digital recording. This video format was
designed by Panasonic and Sony for professional high-definition video recording. AVCHD also
lets you store hours of high-quality video using only a tiny amount of data by using video
compression technology. Additionally, the latest version of the format AVCHD 2.0 supports
three-dimensional video. File extension is .avchd . Supported by VLC player, Widows media
player.

WebM
ITFB by P Nagaiah Goud

First introduced by Google in 2010, WebM is an open-source video format that was developed
with the current and future state of the Internet in mind. WebM is intended for use with
HTML5. The video codecs of WebM require very little computer power to compress and unzip
the files. The aim of this design is to enable online video streaming on almost any device, such
as tablets, desktop, smartphones or devices like smart TV. Extension is. Webm. Supported by
VLC player

RealVideo (RV)

RV is a proprietary video format developed by RealNetworks and released in 1997. The


RealVideo files are stored with the .rv extension. RealVideo is supported on multiple platforms
like Windows, Mac, Linux, etc. Usually, RealVideo is paired with RealAudio (RA) in
the RealMedia (RM) container. It is suitable for streaming content over the internet and can be
used for streaming live television for example. Supported by realplayer.
ITFB by P Nagaiah Goud

Q3) Define Multimedia and Explain Multimedia devices?

Multimedia:

It is a form of communication that combines different content forms such as text, audio,
images, animations, or video into a single presentation, in contrast to traditional mass media,
such as printed material or audio recordings. Popular examples of multimedia include video
podcasts, audio slideshows, animated shows, and movies. Multimedia can be recorded for
playback on computers, laptops, smartphones, and other electronic devices, either on demand
or in real time.

Multimedia device:

It can allow a person to accomplish a wide range of tasks. To begin with, a person may need to
develop communication. This can be done by typing a document, taking a picture, or producing
a video. Once this is done, individuals may want to save these items. Later, they may want to
access them again and alter them. There is also a possibility that a person will want to transfer
media files from one device to another or share them with someone else.

Multimedia Devices:

Multimedia devices such as

• Webcams
• Digital camera
• MIDI ports
• Microphones
• Sound cards
• Video capture cards

are used by both home and business-oriented PCs.

Webcam:

A webcam is a simple digital camera capable of taking video or still images for transmission over
the Internet. Unlike digital cameras, webcams don't include storage capabilities. Most webcams
plug into a USB port, but a few have used parallel ports. Webcams are generally used in live
chat situations.
ITFB by P Nagaiah Goud

Digital Camera:

Digital cameras have largely replaced film cameras for both amateur and professional
photography. They use CMOS or CCD image sensors to record images onto internal or card-
based flash memory form factors such as Compact Flash, SD, Memory Stick, and Smart Media.
Digital cameras transfer images to computers for emailing, printing, or storage via either flash
memory card readers or direct USB port connections.

MIDI Music and MIDI Ports:

MIDI (Musical Instrument Digital Interface) is a protocol developed in the 1980's which allows
electronic instruments and other digital musical tools to communicate with each other. MIDI
itself does not make sound, it is just a series of messages like "note on," "note off,"
"note/pitch," "pitchbend," and many more. These messages are interpreted by a MIDI
instrument to produce sound. A MIDI instrument can be a piece of hardware (electronic
keyboard, synthesizer) or part of a software environment.

Sound Card:

Sound cards are used to record and play back analog audio, and most can also play back digital
audio sources as well. When recording analog audio sources such as CDs, line in or microphone
in, sound cards digitize the audio at varying sample rates and store files in either uncompressed
forms such as WAV or compressed forms such as WMA or MP3.

Microphone:
ITFB by P Nagaiah Goud

Microphone is a device that captures audio by converting sound waves into an electrical signal.
We can easily connect it to Computer.

Video Capture Card:

As the name suggests, video capture cards are used to capture live video from various sources,
including analog camcorders, VCRs, analog output from DV camcorders, broadcast TV, and
cable TV. Most recent cards with video capture capabilities are actually multi-purpose cards
that include other functions. These include ATI's All-in-Wonder series of video (graphics) cards
with onboard TV tuner and video capture functions, video (graphics) cards with VIVO (video-
in/video-out) S-video or composite video ports, and TV tuner cards and USB devices. Video can
be stored in a variety of formats, including MPEG, AVI, and others for use in video productions.
ITFB by P Nagaiah Goud

Q4) Explain compression and de-compression in multimedia?

OR

Explain compression and de-compression issues in multimedia

Compression, or "data compression," is used to reduce the size of one or more files. When a file
is compressed, it takes up less disk space than an uncompressed version and can be transferred
to other systems more quickly. Therefore, compression is often used to save disk space and
reduce the time needed to transfer files over the Internet.

There are two main types of compression:

 Lossy Compression
 Lossless Compression

Lossy compression

Lossy compression removes some of a file’s original data in order to reduce the file size. This
might mean reducing the numbers of colors in an image or reducing the number of samples in a
sound file. This can result in a small loss of quality of an image or sound file.

 A popular lossy compression method for images is the JPEG, which is why most images
on the internet are JPEG images.
 A popular lossy compression method for sounds is MP3. Once a file has been
compressed using lossy compression, the discarded data cannot be retrieved again.

Lossless compression

Lossless compression doesn’t reduce the quality of the file at all. No data is lost, so lossless
compression allows a file to be recreated exactly as it was when originally created. There are
various algorithms for doing this, usually by looking for patterns in the data that are repeated.

 Zip files are an example of lossless compression. The space savings of lossless
compression are not as good as they are with lossy compression.

CODEC

• Short for compressor/decompressor.

• A codec is any technology for compressing and decompressing data.

JPEG

• "Joint Photographic Expert Group" -- an international standard in 1992.


ITFB by P Nagaiah Goud

• Works with color and grayscale images.

• It can reduce files sizes to about 5% of their normal size; some detail is lost in the
compression.

• The JPEG compression algorithm is at its best on photographs and paintings of realistic
scenes with smooth variations of tone and color.

• JPEG is not as well suited for line drawings and other textual or iconic graphics.

GIF

• Stands for Graphics Interchange Format.

• It is a bit-mapped graphics file format.

• It is limited to 256 colors; it is more effective for scanned images such as illustrations
rather than color photos.

• GIFs are suitable for sharp-edged line art (such as logos) with a limited number of colors.

• GIFs can also be used to store low-color sprite data for games.

• GIFs can be used for small animations and low- resolution film clips.

PNG

• Short for Portable Network Graphics, and pronounced ping.

• It is a new bit-mapped graphics format similar to GIF.

MPEG

• Short for Moving Picture Experts Group, and pronounced m-peg.

• MPEG algorithms compress data to form small bits that can be easily transmitted and
then decompressed.

• MPEG uses a type of lossy compression, since some data is removed.


ITFB by P Nagaiah Goud

Compression Techniques

• Simple Repetition Suppression

• Run-length coding

Simple Repetition Suppression

Example: 89400000000000000000000000000000000

We can replace with 894f32

where f is the flag for zero.

Run-length Encoding

Example:

Original Sequence: 111122233333311112222

can be encoded as: (1,4),(2,3),(3,6),(1,4),(2,4)

Decompression

It is the process of restoring compressed data to its original form. Data decompression is
required in almost all cases of compressed data, including lossy and lossless compression.
Similar to compression of data, decompression of data is also based on different algorithms.
Decompression is considered important, as compressed data needs to be restored back to
standard state for usage. Decompression is widely used in data communications, multimedia,
audio, video and file transmissions. Decompression is also known as uncompressing.
ITFB by P Nagaiah Goud

Q5) Explain business applications of Multimedia?

Multimedia:

Multimedia is a form of communication it is combination of text, images, audio, video,


animation.

 Multimedia devices such as mobile phones, laptops etc. plays and important role to
grow business.

 Millions of online websites (form of multimedia) are available on internet to reach end
user and grow business.

 More and more companies are taking an advantages of World Wide Web to increase
sales of their products.

 Using multimedia anyone can sell their product anywhere in the world on internet.

 PowerPoint presentation (multimedia) is also an effective way to give details of their


product.

The following are the different areas where we use multimedia.

 Business
 Research and medicine
 entertainment
 Industry
 Education
 Multimedia in public places
 Engineering

Business:

In business multimedia is used for

 Presentation
 Online marketing
 Sharing information with employees
 Videoconferencing

Research and medicine:

 Doctor makes use of multimedia to analyze patients reports


ITFB by P Nagaiah Goud

 Doctor makes use of virtual video to practice surgery.


 Multimedia is used to record patients details
 Multimedia helps in finding new medicines.

Entertainment:

 Playing video games


 Multimedia is used in movies
 Multimedia is used in TV shows.
 Multimedia is used in social media

Industry:

In industry multimedia is used for

 Record production details.


 Generate profit and loss reports.
 Record market details.
 Conducting training sessions for employees.

Education:

In education institutions multimedia is used for

 Conducting online classes.


 Recording attendance.
 Result analysis.
 Presentations for digital classes.

Multimedia in public places:

 Multimedia is used to control traffic.


 Multimedia is used in public places such as railway stations, bus stations to make
announcements.
 Multimedia is used in public places such as railway stations, bus stations to create
awareness in public.

Engineering:

 Software engineer makes use of multimedia to create animation.


 Used to create new program.
 Civil engineer makes use of multimedia to draw blue print of building.
ITFB by P Nagaiah Goud

UNIT-IV

Q1) Write about history of internet?

Internet Definition:

The Internet is a global information network that connects millions of computers. It is growing
exponentially and provides a unique information resource that is global, diverse and current. It
is a network of networks.

Uses of internet

 Browsing information
 Social media and creating awareness
 For entertainment (music, videos, movies)
 Communicating with people all over the world.
 Sharing information
 E-commerce and banking

Internet in the 1950’s

The Internet got its start in the United States more than 50 years ago as a government weapon
in the Cold War. Scientists and researchers used it to communicate and share data with one
another through what was known as DARPANET (Defense’s Advanced Research Projects Agency
Network). This was in response to the Soviet Union bombings and a need to create a
communication network which was free from interference and disruption.

Internet in the 1960’s

 In 1962, a scientist from M.I.T. and DARPA named J.C.R. Licklider proposed: a “galactic
network” of computers that could talk to one another. Such a network would enable
government leaders to communicate even if the Soviets destroyed the telephone
system.
 In 1965, another M.I.T. scientist developed a way of sending information from one
computer to another that he called “packet switching.” Packet switching breaks data
down into blocks, or packets, before sending it to its destination. Without packet
switching, the government’s computer network—now known as the ARPANET—would
have been just as vulnerable to enemy attacks as the phone system.
ITFB by P Nagaiah Goud

 In 1969, ARPANET delivered its first message: a “node-to node” communication from
one computer to another but it crashed the full network. The internet was yet to be
born.

Internet in the 1970’s

 By the end of 1969, just four computers were connected to the ARPANET, but the
network grew steadily during the 1970s.
 As packet-switched computer networks multiplied, however, it became more difficult
for them to integrate into a single worldwide “Internet.
 By the end of the 1970s, a computer scientist named Vinton Cerf had begun to solve this
problem by developing a way for all of the computers on all of the world’s mini-
networks to communicate with one another.
 He called his invention “Transmission Control Protocol,” or TCP. (Later, he added an
additional protocol, known as “Internet Protocol.” The acronym we use to refer to these
today is TCP/IP.)
 TCP/IP was described to be the “handshake” between computers all over the world. It
enabled each computer to have its own identity.

Internet in the 1980’s

 Cerf’s protocol transformed the Internet into a worldwide network. Throughout the
1980s, researchers and scientists used it to send files and data from one computer to
another.
 However, this network was still between scientists and researchers from different
universities and labs.

Internet in the 1990’s

 In 1991 the Internet changed again. Berners-Lee created the first browser and the
Internet that we know today.
 In 1992, a group of students and researchers at the University of Illinois developed a
sophisticated browser that they called Mosaic. (It later became Netscape.)
 Mosaic offered a user-friendly way to search the Web: It allowed users to see words and
pictures on the same page for the first time and to navigate using scrollbars and
clickable links.
 That same year, Congress decided that the Web could be used for commercial purposes.
As a result, companies of all kinds hurried to set up websites of their own, and e-
commerce entrepreneurs began to use the Internet to sell goods directly to customers.
ITFB by P Nagaiah Goud

 More recently, social networking sites like Facebook have become a popular way for
people of all ages to stay connected.

Q2) Write about Internet Addressing?

An internet protocol address is a numerical label assigned to each device connected to a


computer network that uses the internet protocol for communication. An IP address serves two
main functions: Host or Network interface identification and location addressing.

Types of Addressing:

 Physical Addressing
 Logical Addressing
 Friendly Addressing

Physical addressing

Physical addressing (MAC), which identifies hardware, specifying the constructor and the
product serial. It is unique and can theoretically be used to communicate. But as it does not
include any networking information, communications based only on MAC addresses would be
very unscalable (huge routing tables). This is the reason why another kind of addressing (logical)
has been chosen.

Logical addressing

Logical addressing (IP), which identifies a logical host (not always the same hardware) of
a given network. Every address is built through the concatenation of a netid (network
identifier) and a hostid (host identifier). Consequently, routing tables can be highly
reduced (one entry per network instead of one entry per host).

Friendly addressing

Friendly addressing (DNS), introduced to help users remembering (or even guessing) the
name of a host. Whereas the previous addressing’s were digital, DNS is alpha-digital. In other
words, DNS addresses look like understandable names. They are built through the hierarchical
concatenation of different domains and a hostname.

IP addresses classification
ITFB by P Nagaiah Goud

class leading bits end address


Class A 0 [Link]
Class B 10 [Link]
Class C 110 [Link]
Class D 1110 [Link]
For example, the mask of class A ([Link]) means that the first byte is the netid and the 3
following bytes are the hostid.
ITFB by P Nagaiah Goud

Q3) Explain internet Architecture?

Internet is a network of interconnected networks and is designed to operate without a central


control. If a portion of the network fails, connection is made through alternative paths
available. The architecture of Internet is hierarchical in nature. A brief description of the
architecture of Internet is as follows:

1. Client (user of computer) at home or in a LAN network is at the lowest level in hierarchy.
2. Local Internet Service Provider (ISP) is at the next higher level.
a. An ISP is an organization that has its own computers connected to the internet
and provides facility to individual users to connect to Internet through their
computers.
b. Local ISP is the local telephone company located in the telephone switching
office, where the telephone of client terminates. Examples of local ISP in India
Bharat Sanchar Nigam Ltd. (BSNL), Mahanagar Telephone Nigam (MTNL) and
Airtel.
c. The client calls local ISP using a modem or Network Interface Card.
3. Regional ISP is next in the hierarchy. The local ISP is connected to regional ISP
a. A router is a special hardware system consisting of a processor, memory, and an
I/O interface, used for the purpose of interconnecting networks. A router can
interconnect networks having different technologies, different media, and
physical addressing schemes or frame formats.
b. The regional ISP connects the local ISPs located in various cities via routers.
c. If the packet received by regional ISP is for a client connected to this regional
ISP, then the packet is delivered; otherwise, packet is sent to the regional ISP's
backbone
4. Backbone is at top of the hierarchy Backbone operators are large corporations like AT&T
which have their own server farms connected to the backbone There are many
Backbones existing in the world.
a. The backbone networks are connected to Regional ISP's with a large number of
routers through high speed fiber optics.
b. Network Access Point (NAP) connects different backbones, so that packets travel
across different Backbones.
c. If a packet at the backbone is for a Regional ISP connected to this backbone, the
packet is sent to the closest router to be routed to local ISP and then to its
destination; otherwise, packet is sent to other backbone via NAP. The packet
ITFB by P Nagaiah Goud

traverses different Backbones until it reaches the Backbone of regional ISP for
which it is destined.

Q4) Explain internet Services?

Internet Services

Allows us to access huge amount of information such as text, graphics, sound and software
over the internet. Following diagram shows the four different categories of Internet Services.

Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups. The following are the communication services:

 Electronic Mail: Used to send electronic message over the internet.


ITFB by P Nagaiah Goud

 Telnet: Used to log on to a remote computer that is attached to internet.


 Newsgroup: Offers a forum for people to discuss topics of common interests.
 Internet Relay Chat (IRC): Allows the people from all over the world to communicate in
real time.
 Mailing Lists: Used to organize group of internet users to share common information
through e-mail.
 Internet Telephony (VoIP): Allows the internet users to talk across internet to any PC
equipped to receive the call.
 Instant Messaging: Offers real time chat between individuals and group of people. Eg.
Yahoo messenger, MSN messenger.

Information Retrieval Services

There exist several Information retrieval services offering easy access to information
present on the internet. The following table gives a brief introduction to these services:

 File Transfer Protocol (FTP): Enable the users to transfer files.


 Gopher: Used to search, retrieve, and display documents on remote sites.

Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other.

World Wide Web (WWW)


WWW is also known as W3. It offers a way to access documents spread over the several servers
over the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The
hyperlinks allow the users to navigate between the documents.

Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating by two-way video
and audio transmission with help of telecommunication technologies.
ITFB by P Nagaiah Goud

Q5) Write about E-mail?

Email

Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.

E-Mail Address

Each user of email is assigned a unique name for his email account. This name is known as E-
mail address. Different users can send and receive messages according to the e-mail address.

E-mail is generally of the form username@domainname. For example, nagesh@[Link] is an


e-mail address where nagesh is username and [Link] is domain name.

 The username and the domain name are separated by @ (at) symbol.
 E-mail addresses are not case sensitive.
 Spaces are not allowed in e-mail address.

E-mail Message Components

E-mail message comprises of different components:

 E-mail Header
 Greeting
 Text
 Signature.

E-mail Header

The first five lines of an E-mail message is called E-mail header.

The header part comprises of following fields:

 From
 Date
 To
 Subject
 CC
 BCC

From: The From field indicates the sender’s address i.e. who sent the email.

Date: The Date field indicates the date when the e-mail was sent.
ITFB by P Nagaiah Goud

To: The To field indicates the recipient’s address i.e. to whom the e-mail is sent.

Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point.

CC:CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.

BCC: Cc means carbon copy and Bcc means blind carbon copy. For emailing, you use Cc
when you want to copy others publicly and Bcc when you want to do it privately. Any recipients
on the Bcc line of an email are not visible to others on the email.

Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.

Text: It represents the actual content of the message.

Signature: This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.

Advantages

E-mail has proved to be powerful and reliable medium of commmunication. Here are the
benefits of E-mail:

 Reliable
 Convenience
 Speed
 Inexpensive
 Printable
 Global
 Generality

Disadvantages

Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
ITFB by P Nagaiah Goud

 Forgery
 Overload
 Misdirection
 Junk
 No response

Q6) Write about chatting, messaging and Groups?

Chatting:

Chat refers to the process of communicating, interacting and/or exchanging messages over the
Internet. It involves two or more individuals that communicate through a chat-enabled service
or software. Chat is also known as chatting, online chat or Internet chat.

Chat may be delivered through text, verbal, audio, visual or audio-visual (A/V) communication
via the Internet. If conducted through a desktop, chat requires software that supports Internet
Relay Chat (IRC) or an instant messenger application, where a central server manages chat
communication between different end user clients.

There are also online chat services that require users to sign up with a valid email address. After
signing up, a user may join a group chat room or send a private message to another individual.
Online chat services have purpose-built chat interfaces that manage the entire communication
processes.

Messaging:

Instant messaging (IM) is a form of communication over the Internet, that offers an
instantaneous transmission of text-based messages from sender to receiver. In push mode
between two or more people using personal computers or other devices, along with shared
clients, instant messaging basically offers real-time direct written language-based online chat.
The user's text is conveyed over a network, such as the Internet. It may address point to-point
communications as well as multicast communications from one sender to many receivers. More
advanced instant messaging allows enhanced modes of communication. such as live voice or
video calling, video chat and inclusion of hyperlinks to media.

Groups:

Newsgroups are international discussion groups that focus on a particular topic and helps in
gathering information about that topic. The topics discussed here cover all the fields such as
politics, computers, technology, and many more. The information or articles that make up the
"news" are written by people interested in a specific topic. These articles are posted to the
newsgroup so that others can read, reply, and comment on them.
ITFB by P Nagaiah Goud

Q7) Explain WWW Architecture?

www:

World Wide Web, which is also known as a Web, is a collection of websites or web pages stored
in web servers and connected to local computers through the internet. These websites contain
text pages, digital images, audios, videos, etc. Users can access the content of these sites from
any part of the world over the internet using their devices such as computers, laptops, cell
phones, etc. The WWW, along with internet, enables the retrieval and display of text and media
to your device.

The building blocks of the Web are web pages which are formatted in HTML and connected by
links called "hypertext" or hyperlinks and accessed by HTTP. These links are electronic
connections that link related pieces of information so that users can access the desired
information quickly. Hypertext offers the advantage to select a word or phrase from text and
thus to access other pages that provide additional information related to that word or phrase.

A web page is given an online address called a Uniform Resource Locator (URL). A particular
collection of web pages that belong to a specific URL is called a website,
e.g., [Link], [Link], etc. So, the World Wide Web is like a huge
electronic book whose pages are stored on multiple servers across the world.

WWW Architecture
WWW architecture is divided into several layers as shown in the following diagram:
ITFB by P Nagaiah Goud

Identifiers and Character Set


Uniform Resource Identifier (URI) is used to uniquely identify resources on the web
and UNICODE makes it possible to build web pages that can be read and write in human
languages.
Syntax
XML (Extensible Markup Language) helps to define common syntax in semantic web.
Data Interchange
Resource Description Framework (RDF) framework helps in defining core representation of
data for web. RDF represents data about resource in graph form.
Taxonomies
RDF Schema (RDFS) allows more standardized description of taxonomies and
other ontological constructs.
Ontologies
Web Ontology Language (OWL) offers more constructs over RDFS.
Rules
RIF and SWRL offers rules beyond the constructs that are available
from RDFs and OWL. Simple Protocol and RDF Query Language (SPARQL) is SQL like language
used for querying RDF data and OWL Ontologies.
ITFB by P Nagaiah Goud

Proof
All semantic and rules that are executed at layers below Proof and their result will be used to
prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of sources is used.
User Interface and Applications
On the top of layer User interface and Applications layer is built for user interaction.

WWW Operation

WWW works on client- server approach. Following steps explains how the web works:
 User enters the URL (say, [Link] of the web page in the
address bar of web browser.
 Then browser requests the Domain Name Server for the IP address corresponding to
[Link].
 After receiving IP address, browser sends the request for web page to the web server
using HTTP protocol which specifies the way the browser and web server
communicates.
 Then web server receives request using HTTP protocol and checks its search for the
requested web page. If found it returns it back to the web browser and close the HTTP
connection.
 Now the web browser receives the web page, It interprets it and display the contents of
web page in web browser’s window.

Q8) Explain web browsers, servers, and search engines?

Web browser:

Web Browser (or browser) is a software program that extracts information on user request
from the Internet and presents it as a web page to the user. It is also referred to as the user
ITFB by P Nagaiah Goud

interface of the web. Some of the popular web browsers are Internet Explorer from Microsoft,
Mosaic browser, Google's chrome, and Netscape Navigator from Netscape Inc.

Browsers are of two types

 Graphical browser
 Text-based browser

Graphical browser :

Graphical browsers provide a graphical user interface where the user can jump from one web
page to the other by clicking on the hyperlink (displayed in blue color with underline) on a web
page. Internet Explorer, Chrome and More are examples of graphical browsers.

Text browsers:

Text browsers are used on computers that do not support graphics. Lynx is a text browse. The
process of using browser to view information on the Internet is known as Browsing or Surfing.
During browsing, the user can navigate from one web page to another using URLs, hyperlinks,
browser navigation tools like forward and back button, bookmarks etc.

Web Servers:

A server is a computer that provides data to other computers. It may serve data to systems on
a local area network (LAN) or a wide area network (WAN) over the Internet.

Many types of servers exist, including web servers, mail servers, and file servers Each type runs
software specific to the purpose of the server. For example, a Web server may run Apache
HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail
server may run a program like Exim or iMail, which provides SMTP services for sending and
receiving email. A file server might use Samba or the operating system's built-in file sharing
services to share files over a network.

Internet Search Engines:

Internet Search engines or Search engines are specific web sites that help the users to find
information stored on the Internet. Search engines search the Internet based on some
important words (Keywords) or combinations of words. Some of the common and well-known
search engines are [Link], [Link] and [Link].

Uses of Search Engine

The user uses the search engine as follows:


ITFB by P Nagaiah Goud

 Enter the address of search engine, for example [Link]


 Enter the word, or combinations of words, or symbols with words, based on which the
Internet is to be searched.

Working of Search Engine

The search engines work as follows:

 Search engines maintain a data repository of words along with the URL's which these
words are found.
 When the user uses the search engine to search for a word or group of words, the
search engine checks its data repository and returns a list of URLs that satisfy the search.
 To narrow down the scope of search, the search engines also provide different criteria
for search. For example, some of the search criteria provided by Google search engine
are Images, News, and Scholar to search for images, news, and published papers,
respectively.
 Sites like [Link] are metasearch engines. Such sites do not maintain their own
data repository, but send the search request to other search engines. The search results
are collected from different search engines and displayed to the user.
ITFB by P Nagaiah Goud

Q9) Explain E-Commerce?

E-Commerce:

E-Commerce also known as Electronic Commerce, refers to buying and selling of products or
services over the Internet. Normally e-commerce is used to refer to the sale of physical
products online, but it can also describe any kind of commercial transaction that is facilitated
through the internet.

Types of E-commerce model:


There are basically 4 main types of e-commerce models that can describe almost every
transaction that takes place between consumers and businesses.

• Business to Consumer (B2C)

• Business to Business (B2B)

• Consumer to Consumer (C2C)

• Consumer to Business (C2B)

Business to Consumer (B2C):


When a good or service is sold to an individual consumer by a business, e.g., we buy a pair of
shoes from an online retailer.

Business to Business (B2B):


When a good or service is sold by a business to another business, e.g., a software-as-a-service is
sold by a business for other businesses to use.

Consumer to Consumer (C2C):


When a good or service is sold by a consumer to another consumer, e.g., we sell our old
furniture on eBay to another consumer.

Consumer to Business (C2B):


When a consumer’s own products or services is sold to a business or organization, e.g., an
authority offers exposure to their online audience in exchange for a fee or a photographer
licenses their photo for a business to use.

Business Application of E-commerce:

• Conversational commerce: e-commerce via chat

• Digital Wallet
ITFB by P Nagaiah Goud

• Document automation in supply chain and logistics

• Electronic tickets

• Enterprise content management

• Group buying

• Instant messaging

• Newsgroups

• Online banking

• Online office suites

• Online shopping and order tracking

• Print on demand

• Shopping cart software

• Social networking

• Teleconferencing

• Virtual assistant (artificial intelligence)

• Domestic and international payment systems

Advantages of E-commerce:

• E-commerce enables fast and secure shopping.

• It is making digitalized world.

• E-commerce also enables to choose different goods and services according to your
choice.

• It is a simple way of selling and buying products and services.

• E-commerce replaced the paper work as all transactions are through internet today.

• It provides better management system, as it has a centralized database.

• E-commerce via internet covers a large number of customers worldwide.


ITFB by P Nagaiah Goud

Disadvantages of E-commerce:

• E-commerce has no universal standard for quality and reliability.

• E-commerce works through internet; it is possible that navigation on internet itself may
be slow.

• Strong security is required in e-commerce as all transactions are through internet.

• There is high risk of buying unsatisfactory products through e-commerce.

• It uses public key infrastructure which is not safe.

• Customers also trap in banking fraud which is quite frequent.

• Hackers also try to get access of data or to destroy data in e-commerce.

Q10) Explain M-Commerce?

Definition of M-commerce

M-commerce is defined as an extended version of E-commerce in which handheld devices are


used instead of desktop for buying and selling of goods. In other words, it is an innovative way
of doing business over the internet. M-commerce can be defined as "Any electronic transaction
or information interaction conducted using a mobile device and mobile networks that leads to
transfer of real or perceived value in exchange for information services or goods.

Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods
and services, which is initiated or completed by using mobile access to computer mediated
networks with the help of an electronic device. This definition provides for a differentiation of
Mobile Commerce from other related fields such as Electronic Commerce Electronic Business
and Mobile Business.

M-commerce is at a very early stage. It's about purchase and sale of goods and services through
the mobile with the use of a financial institution.

Examples of M-Commerce

Typical Examples of M-commerce are:

 Purchasing airline tickets


 Purchasing movie tickets
 Restaurant booking and reservation
 Hotel booking and reservation
ITFB by P Nagaiah Goud

Applications of M-commerce

Other than the straightforward m-commerce transactions of buying and selling of goods and
services, they have so many applications. Let us take a look at a few examples,

 Mobile Banking: Using a mobile website or application to perform all your banking
functions. It is one step ahead of online banking and has become commonplace
these days. For example, in Nigeria, the majority of banking transactions happen on
mobile phones.

 Mobile Ticketing and Booking: Making bookings and receiving your tickets on the
mobile. The digital ticket or boarding pass is sent directly to your phone after you
make the payment from it. Even in India now IRTC and other services provide m-
ticketing services.

 E-bills: This includes mobile vouchers, mobile coupons to be redeemed and even
loyalty points or cards system.

 Auctions: Online auctions having now been developed to be made available via
mobile phones as well.

 Stock Market Reports and even stock market trading over mobile applications.

Advantages of M-commerce

 It provides a very convenient and easy to use the system to conduct business
transactions.

 Mobile commerce has a very wide reach. A huge part of the world’s population has a
mobile phone in their pocket. So the sheer size of the market is tremendous.

 M-commerce also helps businesses target customers according to their location,


service provider, the type of device they use and various other criteria. This can be a
good marketing tool.

 The costs of the company also reduced. This is due to the streamlined processes,
now transaction cost, low carrying cost and low order processing cost as well.

Disadvantages of M-commerce

 The existing technology to set up an m-commerce business is very expensive. It has


great start-up costs and many complications arise.

 In developing countries, the networks and service providers are not reliable. It is not
most suitable for data transfer.
ITFB by P Nagaiah Goud

 Then there is the issue of security. There are many concerns about the safety of the
customer’s private information. And the possibility of a data leak is very daunting.
ITFB by P Nagaiah Goud

Q11) Explain Social networking?

Social Networking is the process of creating, building and nurturing virtual communities and
relationships between people online. Social working revolves allows like-minded individuals to be in
touch with each other using websites and web-based applications.

Famous Social Networking sites

Famous Social Networking sites have created a massive presence in today's world. While There are
many types of these sites some are more famous than the others

 Facebook: Facebook is the largest social networking site. It has more than 1 billion users which
keep increasing every day. Moreover, it also helps you promote your business or brand through
ads.
 Instagram: it is owned by Facebook only. Similar this app allows you to share photos and videos
with your followers. It gives users a lot of filters to beautify your photos.
 Twitter: twitter is also a great social networking site. It is mostly used by celebrities. This allows
you to post short messages called tweets to share your thoughts. Twitter is a great platform to
convey your message in limited words.
 Linkedin: This is one of the most sought after sites which allow professionals to Locate and hire
employees. Subsequently, it is available in more than twenty languages to give a user friendly
interface.
 WhatsApp: Finally, we have WhatsApp. Though it entered the game quite late, this instant
messaging app made a place for itself instantaneously. Facebook acquired this app as well. It
allows you to share text messages, images, videos, audios, documents and more.

Advantages of Social Media Sites

Social media websites are the tools for anyone to make the best use out of it. Millions of people around
the world are using social media platforms for fundraising, social awareness, promoting local business,
and so many good things. There are so many benefits of social networking sites if used properly. Below
is the list of pros of social media platforms.

 Networking without border: One of the primary goals of any social networking site, networking
is a primary feature any social media platform has to offers to consider the platform as a social
networking site. One of the most important and noteworthy advantages of social networking
sites is that it enables everyone to connect no matter which country they belong to.
 Instant News and Information: Before the social media era, we used to communicate on email
and instant messengers like Yahoo, AOL, and MSN. All those IMs and communication tools were
mostly one to one communication. But in Social networking sites, communication can be one-
to-many instantly. We do not have to look for the news visiting different news websites, the
news will find us on the modern social networking sites like Facebook, Twitter.
 Great marketing channel for Business: Social networking sites are one of the best marketing
channels available in this world. Social Media Marketing is the term described for the marketing
ITFB by P Nagaiah Goud

technique used on social networking sites or platforms like Facebook, Instagram. Tiktok, Twitter,
YouTube, etc. There are currently over 4 billion social media users globally ready to discover
your information about your business or service.
 Awareness and Activism: We have already witnessed the great modern revolutions and events
around the world. Social networking sites played a very important role in such revolutions and
events like Occupy Wallstreet, Arab Spring, The Libyan Revolution, Hongkong protests, etc.
Almost all internet users do use at least one social media platform. It is easy to spread the
message and invite many people to take part in events for awareness and activism.
 Exchange of ideas and Collaboration: Social networking sites like Facebook do have
collaboration features like Group and Document sharing. One can create a group and start to
share ideas and information for a specific purpose. Social networking sites are very useful to
collect feedback and comments on the various idea.
 Stay in touch: While ignoring the rest of the advantages of social media, some people prefer to
use it just like a contact book. Not being actively engaged in the social feed, social media
platforms like Facebook and Instagram are also being used only for communication purposes.
Such platforms help us easily stay in touch with friends and family, and other like-minded
people as well.

Disadvantages of social network media:

The following are the disadvantages of social media.

 Addiction: The compulsion to use social media can make one social media addict.
 Mental illness: Social networking sites are linked to increased risk of mental health problems
like depression, anxiety and loneliness.
 Frauds and scams
 Misleading information
 Cyber bullying
 Hacking
 Privacy issues

Q12) Explain internet in business?

Internet in business:

The internet plays a major role in every aspect of our modern life. Internet technologies play a
major role in business. As a business owner, knowing the role of internet in business all help
you take advantage of the powerful opportunities it offers to grow your business and make
operations more effective.

Here are different ways in which the internet has contributed to the success and growth of
businesses.
ITFB by P Nagaiah Goud

 Communication: The internet makes communication fast and cost efficient. Businesses
use internet technologies such as Skype internet and video calls, email and video
conferencing to make communication virtually instant.
 Growth: The internet plays a big role in the growth of businesses. It gives businesses an
opportunity to reach a wider global audience. Promoting through the internet is also a
way to increase sales and reach the desired growth level. Business can also expand by
having an online division.
 Marketing: One of the roles of internet in business involves marketing and advertising.
Most businesses are taking advantage of the internet to market their products and
services to a global audience. The most notable internet technologies here include
search engines such as Google.
 Networking and Recruiting: Social networking websites play a role in business networking by
connecting like-minded professionals. Through the internet, people have found business
partners and great employees.
 Outsourcing services: The internet has helped cut costs by outsourcing services to countries
where it is cheaper to provide these services. Apart from the cost reduction through the
outsourcing role of internet in business, outsourcing enables businesses to concentrate on their
core services and become more efficient.
 Online Shopping Role: One role of internet in business is the birth of ecommerce websites and
online payment solutions that allow people to shop online from the comfort of their own
homes.
 New Opportunities: The internet has opened up new business opportunities and giving rise to a
group of successful online business owners. This is a powerful role as anyone can now start an
online business.

Application of Internet in Business

The Internet is a rapidly growing network of millions of business education and research and
network connecting hundreds of millions of computers and they are users in over two hundred
countries. It is a network of global exchanges – including private, public, business, academic and
government networks – connected by guided, wireless and fiber-optic technologies.

The applications of the internet in business areas follow:

 Sales and Market Reach:

A small company selling hot sauce realized an increase in sales of over $60,000 annually with an
investment of a few thousand dollars in a World Wide Web site. Entertainment companies use
the Internet and World Wide Web to showcase their products to consumers, who can see still
photographs, video clips and hear audio of their favorite entertainers. And, of course,
consumers can purchase the products they preview on the Internet.

 Financial and Legal Enterprises:


ITFB by P Nagaiah Goud

Financial and legal firms save time, printing and distribution costs by posting legal notices and
filings on the Internet. Electronic publication of white papers and useful information for clients
increases public awareness of the firms.

 Advertising:

Advertising agencies and publishers increase income from existing clients by utilizing the
Internet as part of their marketing mix.

 Internet Electronic Mail:

Companies with nation-wide or world-wide ‘ communications needs have saved many


thousands of dollars in telephone expenses through the use of electronic, mail on the Internet.
Audio and video conferences are also available. One of the great advantages of Internet e-mail
is that your message gets through without constant phone tag delays.

 Collaboration:

An engineering firm based in California is able to use the best worldwide engineering talent for
its projects by exchanging design drawings over the Internet. They are able to complete
projects in half the time of their competitors who must travel across town to design review
meetings.

 Electronic Data Interchange:

A firm marketing to the government utilizes Electronic Data Interchange (EDI) over the Internet
to process purchase orders and automatically tile reports to government agencies, saving
personnel costs and time involved to receive payments. A major manufacturer uses EDI to
connect all of its suppliers to its purchasing and stockroom computers to provide automated
inventory replenishment, saving a quarter million dollars in inventory expense per year.

 Worldwide communication:

An art broker specializing in major artworks conducts her worldwide business entirely on the
Internet.

 Keeping Employees Productive and Informed:

Thousands of small and large companies use the Internet to communicate with their field sales
forces, including automatic updates of lead tracking databases, order entry, and electronic mail.
The Internet allows companies to reduce overhead and increase productivity by facilitating
telecommuting of personnel. The Internet can also reduce overhead by providing centralized,
paperless internal access to databases of personal information, company policy, broadcast
notices, technical and sales information.
ITFB by P Nagaiah Goud

 Publishing:

Publishers put their products on the Internet, increasing circulation, advertising income and
reducing the ever-escalating costs of printing, paper, and distribution. Publishers use the
Internet to transmit photographs, advertisements, and editorial copy to reduce the time and
expense required to get the publication to press.

 Public Service:

A non-profit organization uses the Internet to match donors to individual needs during a
disaster. The Internet remained available while other means of communication were cut off. A
county sheriff posts “most wanted” information, crime statistics and receives tips from citizens
on the World Wide Web. Chambers of Commerce, city and county governments use the
Internet to inform citizens and promote commerce to a worldwide community.

 Research:

Researchers have vast data warehouses available everywhere on the globe. Marketing and
competitive analyses, government documents and requests for bid, international trade
information, financial data, patent and trademark research, demographic and census data, SEC
filings and the entire catalog of the Library of Congress are a few among the thousands of
research tools available on the Internet.

 Direct Marketing on the Internet:

Direct marketers, catalog retailers and people operating home-based businesses use the
Internet to sell products. Entire shopping malls exist in cyberspace, selling everything from
flowers to automobiles.

The Internet has tremendous potential to reduce costs and increase profits by the following
methods:

 Simply being connected to the Internet enhances communication


 A World Wide Web site attracts customers.
ITFB by P Nagaiah Goud

Q13) Explain Security issues in internet

Security Issues

Although Internet led to many benefits, it also poses a greater potential for security threats.
Below are a number of common Internet security issues.

 Hacker
 Malware
 Computer virus
 Worm
 Phishing
 Spyware
 Identity theft

Hackers:

Hackers refers to a person who can gain unauthorized access to (break into) a computer or a
network to commit crimes.

Some things a skilled hacker can do to your computer:

 Hijack your usernames and passwords;


 Gain access to the personal information (credit card numbers, bank account, Social
Insurance Number, etc.);
 Steal, change, exploit, sell, or destroy data;
 Damage or bring down the system;
 Hold the system hostage to collect ransom;

Malware

Malware (short for malicious software) – a software that is designed to damage, disrupt, or
infect computers.

 Malware is a single term that refers to all the different types of threats to your
computer safety such as virus, Trojan horse, worm, spyware, etc.
 Malware can gain unauthorized access to a computer and continuously run in the
background without the owner’s knowledge.
ITFB by P Nagaiah Goud

Computer virus

Computer virus – a specific type of malware that is designed to replicate (copy) and spread
from one computer to another.

 A virus can make a copy of itself over and over again.


 A virus can spread from one computer to another through email attachments,
removable storage devices, networks (Internet messaging services, download infected
files …), etc.
 A virus can damage your computer by corrupting system files, sending spam, stealing
data and personal information from your computer, destroying data, deleting
everything on your hard drive, etc.

Worm

Worm – it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and


spread copies of itself from one computer to another.

 The key difference between a worm and a virus is that a worm does not require any
human action to replicate while a virus does. A virus only spreads when a user opens an
affected file whereas a worm spreads without the use of a host file.

Phishing

Phishing – a scammer uses deceptive emails or websites and tries to obtain valuable personal
information (i.e., username, password, account number, etc.).

 Phishing is a common online scam used by cyber criminals.


 A scammer may use a deceptive email or website appearing to represent a legitimate
firm.

Spyware

Spyware – software that secretly monitors (spies) user’s online behavior and gets sensitive
information about a person or organization without the user’s knowledge.

 A spyware can record a user’s Web browsing habits, email messages, keystrokes on
online advertisements, personal information, etc., and forward it to a third party.
 Advertisers can use spyware to target specific advertisements to your tastes.
ITFB by P Nagaiah Goud

 Criminal organizations can use spyware to collect financial information (banking


accounts, credit card information, password, etc.).

Identity Theft:

Identity theft is a growing problem, both online and off. This crime can seriously damage a
victim’s finances for many years. Identity thieves acquire information about someone through a
variety of means of which the favorite is phishing. If they can get personal data, such as names,
dates of birth, social security numbers, etc, then they can quite literally steal the identity of the
owner of that information. That fake identity can then be utilized in a variety of other crimes,
such as credit card fraud, bank fraud and a whole host of other financial misdemeanours, all of
which will be blamed upon the victim who will then have an incredibly hard job of clearing their
name, recovering the money they have lost and then repairing their credit file.
ITFB by P Nagaiah Goud

Q14) Explain different types of online business?

The following are the different type of online business you can start doing.

 Web design
 Graphics design
 Writing
 Editing
 Online store
 Coaching
 Business coaching
 Affiliated marketing
 Re selling
 Virtual assistance
 Online courses
 E book selling
 Online tutorial
 Blogging
 Advertiser

Web Design:

One of the most obvious businesses that you can start is a web design business, creating websites for
other people. With online businesses erupting, it can be easy to find work in the web design field since
most businesses want to maintain a modern web presence.

Graphic Design:
Do you have a talent creating all things graphic and visual? Digital art work that can be found across the
internet and on every website – which means there’s a high demand for this type of service. If you want
to share your artistry with the world, offering graphic design services might be perfect for you.

Writing:
Freelance writing and other forms of writing have become the backbone of the internet. Not only do
readers want reliable content, business owners are looking to hire writers like crazy. You can easily find
paid writing gigs just by performing a simple internet search!

Editing:
Since we mentioned writing, we want to add that editing might be right up your ally. Do you find
yourself critiquing articles or social media posts as you read them? Editing might be perfect for
you. With so many people writing, whether it be for school, work, or fun, almost all of those people
need editing services and the internet makes a perfect place to offer those services.

Online Store:
ITFB by P Nagaiah Goud

eBay, Amazon, Shopify and Easy are excellent choices to start online stores. T-shirts, jewelry, shoes,
pretty much any kind of product. If you have stuff that you want to sell, there is almost certainly
someone on the internet who wants to buy it.

Coaching:
There are people all over the world who need a helping hand and coaching over the internet is the
perfect way for them to get it. There has been an explosion of coaches happening since there’s no
regulation or certification needed. You can use your expertise to help others!

Business Coaching:
Is your specialty helping other businesses succeed? Business coaching might be your niche. Where many
business owners are familiar with their industry, they might need some help with other aspects of
running a business. Marketing, Sales, Web Strategy and more. If you have solid results and business
experience, you can make a lot of money helping people get the job they want.

Affiliate Marketing:
Affiliate marketing is essentially the process of selling products for another website. Many people
operate more than one affiliate marketing sites making them extra money. If you’re just starting out
with an online business idea – you don’t even need a product. With programs like Amazon
Affiliate, JVZoo, here at Marketing Solved and other affiliate networks – you can simply earn money by
sharing other people’s products!
Re-Selling
Re-selling products on the internet can be a great way to earn money; the key is finding a source for low
cost items that you can sell for more. Are you a low price ninja, garage sale guru or an antique shopper?
You can find items at a low cost and then sell them online on sites like eBay for a higher price. You keep
the profit and continue sourcing new products. Buy low, sell high!

Digital/Virtual Assistant
Everyone has trouble getting all of their work done and keeping track of what is happening. A virtual
assistant job can earn you a lot of money because of this. With the increase in online entrepreneurs, as
their businesses grow – they find themselves needing help! That’s where being a VA can come in.
Answering emails, helping with customer service, even social media. Hours can be flexible and you can
easily work from home.

Online Courses
According to Forbes, market research projected that online learning would reach $107 Billion in 2015.
Not only is there a lot of opportunity for you to jump in to this space – there’s a lot of money to make as
well. Can you create an online course around your expertise? Teaching someone a new skill? Showing a
How To or Tutorial? Here at Marketing Solved, online courses are our favorite way to monetize an online
business.
EBook Selling:
Whether you write an eBook or sell someone else’s you can make a lot of money doing so with the
popularity of Kindle’s and other devices. You can use online programs like [Link] or even [Link]
to design your very own ebook to sell. This is a great entry level business to start with low overhead
ITFB by P Nagaiah Goud

since delivery of the program is completely digital! No need to print a book, have merchandise on hand
– or even worry about shipping.

Online Tutoring:
Students of all ages come across subjects that they need a little extra help with and you could be just the
person to help them over the internet. Use your expertise to help others who need it!

Blogging:
Marketing Solved Founder, Katherine Sullivan started her career out as a blogger and was able to
leverage her authority into a paid business. Blogging opens the doors to business in many ways. Being a
paid writer, affiliate marketing, selling advertising on your site, even offering your expertise and services
to help others. Plus – blogging is a budget friendly business.

Advertiser:
Do you have a special skill for creating advertising that people love? You could pitch these services to
business owners worldwide and help create their advertising campaigns, graphics, and ad copy to bring
them more business. If it’s successful – you could make a lot of money.
Q1) Explain Intranet?

Intranet Definition:

Intranet is defined as private network of computers within an organization with its own server
and firewall. Moreover, we can define Intranet as:
 Intranet is a system in which multiple PCs are networked to be connected to each
other. PCs in intranet are not available to the world outside of the intranet.
 Usually, each company or organization has their own Intranet network and
members/employees of that company can access the computers in their intranet.
 Each computer in Intranet is identified by an IP Address, which is unique among the
computers in that Intranet.

Advantages:

Intranet is very efficient and reliable network system for any organization. It is beneficial in
every aspect such as collaboration, cost-effectiveness, security, productivity and much more.
Communication
Intranet offers easy and cheap communication within an organization. Employees can
communicate using chat, e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can be
accessed by the authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing them
and distributing duplicate copies among the employees, which certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the
employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an organization, therefore
there is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know
whom he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.

Issues

Apart from several benefits of Intranet, there also exist some issues.
 Unauthorized access
 Denial of services
 Hidden complexity

Applications

Intranet applications are same as that of Internet applications. Intranet applications are also
accessed through a web browser. The only difference is that, Intranet applications reside on
local server while Internet applications reside on remote server.
Document publication applications
Document publication applications allow publishing documents such as manuals, software
guide, employee profits etc without use of paper.
Electronic resources applications
It offers electronic resources such as software applications, templates and tools, to be shared
across the network.
Interactive Communication applications
Like on internet, we have e-mail and chat like applications for Intranet, hence offering an
interactive communication among employees.
Support for Internet Applications
Intranet offers an environment to deploy and test applications before placing them on
Internet.
Q2) Explain extranet?

Definition of Extranet

An extranet is an organization’s private network and its available only for selected users. It’s a
way to connect to third parties like vendors, customers, and partners in a secure and
controlled way. The users typically have a login mechanism such as username and password
to access the network. Extranet in simple terms provides a secure network for an organization
to share information with relevant people outside the organization. It is part of an
organization’s intranet divided via a firewall.
Examples:
 An e-commerce site exchanges information with its retailers, a supplier through an
extranet network.
 Multinational organizations handle their project information, clients and
communicate with another organization over an extranet network.
 University provides an e-learning platform for their students over the extranet
network.

Implementation of extranet

An extranet is implemented as a Virtual private network (VPN) that provides secure


communication between the organizations. VPN creates a secure connection over a public
network such as the internet. The VPN is formed on Internet Protocol security (IPsec) which
provides an extra layer on the already present TCP/IP i.e. Transmission Control Protocol/
Internet Protocol.
The IPsec connection (tunneling) provides:
 Privacy: To maintain confidentiality between the sources.
 Integrity: To protect and share the data securely between the resources.
 Authentication: To allow only authorized users on the network.

Features of extranet

Following are the features of the extranet:


 Data security: Sharing confidential data is of utmost priority and the extranet provides
a safe environment for data sharing between the organizations. This decreases the
chance of loss of confidential data and increases productivity.
 Faster communication: Extranet allows to connect multiple organizations and escalate
the communication between them.
 Flexibility: Extranet provides a flexible and scalable environment to work on for
everyone involved, which also increases the productivity of the organization.
 Cost: It may decrease the cost of paperwork and travel to some extent.
 Authentication: It provides authentication mechanisms like username and password.
Therefore, only authorized users can access the network.

Advantages

 Security: Extranet is formed as a Virtual private network (VPN) as it assures a


protected and secure communication across the network. The information shared
between the organizations could be highly confidential and an extra level of
security makes sure that none of it is lost or accessed by anyone else other than
the parties involved.
 Data: Sometimes there could be a large amount of data to be transferred between
organizations. An extranet allows a large amount of data transfer across the
network in a secure fashion.
 Network Sharing: One or multiple organizations could connect via the extranet.
For example, three organizations collaboratively working on the same project
could make use of an extranet or an e-commerce site sharing its network with
various small businesses.
 Communication: It is a medium for internal and external members to connect or
organizations to connect to third parties. Instead of allowing third parties in the
company’s intranet network and giving access to the internal resources, the
extranet provides a lot more flexibility and security for everyone to communicate.

Disadvantage

 Complex Security: Extranet needs an additional firewall if hosted on its own server
which expands workload and complex security mechanism.
 Hosting: Hosting could be an issue as it requires a high bandwidth internet
connection. A High bandwidth internet connection may not be possible for
everyone, which would lead to inefficiency in work.
 Expensive: It is costly compared to intranet due to the extra layer of security and
hosting charges.
 limited: It can only be accessed through the internet. So, the work would come to
halt or slow down if the internet goes down.
Q3) Explain Virtual Private Network (VPN)?

Definition of VPN:

A Virtual private network (VPN) is a secure connection between two or more endpoints. It can
also be seen as an extension to a private network.

A VPN is commonly used to provide secure connectivity to a site in order to share resources
between two organizations or departments or to facilitate remote users with their corporate
services as if they were in sitting at their desk in the office. There are two key scenarios where
you would deploy VPN technology, that are known as

 Site-to-Site VPN
 Remote Access VPN

Site-to-Site VPN

In site-to-site VPN, data is encrypted from one VPN gateway to another VPN gateway, providing
a secure link between two sites\organizations\departments over the internet. This would
enable both sites to share resources such as documents and other types of data over the secure
VPN link. The following figure illustrates a site-to-site VPN deployment, where an organization
has two offices and would like to provide a secure VPN link between the two.

Remote Access VPN

In a remote access VPN scenario, which is sometimes known as mobile VPN, a secure
connection would be made from an individual computer to a VPN gateway device that is
situated at the organization's data center. This VPN device would enable a user to access their
e-mail, files and other resources at work from anywhere in the world, providing they have an
internet connection. There are two common forms of frameworks\technology that exists in
remote access VPN known as Ipsec and SSL. The following figure illustrates a remote access
user VPN deployment.

VPN Networking Protocols

VPN tunnels use one of four main networking protocols, which provide sufficient level of
security.

 Point to Point Tunneling Protocol (PPTP)

 Layer 2 Tunneling Protocol (L2TP)

 IPsec (IP Security)

 Secure Socket Layer (SSL) VPN

Advantages

• VPNs eliminate the need for expensive leased lines. Historically T1 lines have been used
connecting office locations together in a secure manner. If the office locations are
further away, the cost of renting these least lines can be unbearable. A VPN though,
only requires you to have a broadband internet connection, and so avoiding paying a
hefty sum of monthly rental on dedicated leased lines. VPNs are also a replacement for
remote access servers and dial up network connections although rarely used anymore.
• Through the use of link balancing and link bonding, VPN's can use two or more internet
connections, where if one connection experienced a failure, VPN traffic would
automatically traverse over the remaining connections. Once the failed connection is
back online, VPN traffic would automatically use the original connection when it is back
up again.

Disadvantages

• You have to remember, having a VPN tunnel means having to rely on the Internet, and
having to rely that your ISP (Internet Service Provider) is reliable, although this problem
can be reduced by having two or more ISP’s and using the 2nd connection in a VPN
failover scenario.

• Also, VPN’s require careful configuration, and possibly some troubleshooting, and the
terminology can be overwhelming for administrators not familiar with the technology.
Q4) Explain Internet Telephony?

Internet telephony:

Internet telephony is a type of communications technology that allows voice calls and other
telephony services like fax, SMS and other voice-messaging applications to be transmitted using
the Internet as a connection medium. Software under this technology is cost-effective and
convenient because it allows the user to communicate through fax, voice and video calls
anywhere in the world as long as there is an Internet connection.

An internet telephony service provider (ITSP) offers digital telecommunications services


based on voice over internet protocol (VoIP) that are provisioned via the internet. ITSPs provide
services to end users directly or as wholesale.

How Internet Telephony Works

Internet Telephony is the transmission of telephone calls over computer networks. One
of the most common applications involves computer to traditional telephone communications.
This process uses a special internet phone service provider and typically involves four steps.

Request: Using the software provided by the internet phone service provider, the caller enters
a telephone number and requests a connection.

Relay: The request is relayed to the provider’s internet server that is located closest to the
requested number.

Connection: Using traditional local telephone communication lines, the server connects to the
requested telephone.

Talk: The requested telephone rings, the party answers, and communication begins using the
local telephone communication line and the internet.

Different types of Internet Telephony

• Phone to Phone

• PC to Phone

• PC to PC

Phone to Phone:

This is process that involves a telephone to another telephone routed over the internet.

 Place a call from a regular phone


 The sound is compressed into data

 The compressed packets are sent over the internet

 Packets arrive to the other computer

 The call is then decompressed back to sound.

PC to Phone: These are calls that go from a computer to a phone.

The PC gets the voice and compresses the information.

• The compressed packets are sent over the internet

• The other computer receives the packets

• The packets are received and decompressed to voice

PC to PC: These calls are from computer to computer.

• Both users use specific software to communicate to each other

• Download needed software

• Connect to the software

• Use the data voice to communicate through the software.

Advantages of Internet Telephony

• Low cost: The main benefit of internet telephony is the low cost. PC to PC calls are
generally free, and PC to Phone connections are generally a fraction of the cost of a
traditional phone line.

• Portability: One only needs a laptop and an internet connection to use internet
telephony, whether in an airport, a library, or a fast-food restaurant.

• Wide range of features and services: Internet telephony also offers a wide range of
features and services that are not found on traditional landline phone. Just a few of
these amazing features are text voicemail, video voicemail, and voicemail to email, call
parking, and the busy line feature.

• Scalable: The software-oriented nature of IP Telephony it easily scalable, making it


possible to integrate other services and applications as well. Adding a new phone to the
already running system of IP Telephony does not require an additional new line. It can
be directly incorporated in the system, within the existing infrastructure, which is not in
the case of traditional phones.

• Toll free Access: While US toll free numbers are generally not accessible from outside
the US, Internet calling enables users to reach toll free numbers from anywhere in the
world.

Disadvantages of Internet Telephony

• Unreliable: Traditional phone services functions with or without electricity. Not so with
Internet Telephony. If the power goes out, taking the internet connection with it, no
phone service is available.

• Emergency calls: When traditional 911 calls are made, the emergency dispatch operator
is able to see the exact location of the caller due to the direct relationship between the
number and an address. However, there is no such fixed relationship with internet
telephony and location. IP address generally cannot be pinpointed with the accuracy
needed for 911 calls.

• Compatibility: VoIP connections have been known to have issues with devices such as
satellite television receivers and conventional modems that need to dial an outgoing
number.
Q5) Explain Audio conferencing?

Audio Conferencing:

Audio conferencing is the conduct of an audio conference (also called a conference call or audio
teleconference) between two or more people in different locations using a series of devices
that allow sounds to be sent and received, for the purpose of communication and collaboration
simultaneously.

An audio conference may involve only two parties, or many parties involved at the same time.
Audio conferencing can be conducted either through telephone line or the Internet by using
devices such as phones or computers. If one only wants to listen, he/she just needs speakers. If
he/she decides to speak as well, he/she may need a microphone as well.

Advantages of Audio Conferencing

Just like any other products or services, audio conferencing also has its advantages and
disadvantages. The following are three key benefits of audio conferencing.

• Audio conferencing is a cost-effective communication tool

• Audio conferencing is easily accessible

• Audio conferencing can save you a lot of time and money

Audio conferencing is a cost-effective communication tool:


In comparison to other means of conferencing, audio conferencing is a little cheaper.
Meanwhile, you can also get a relative high quality of call by using audio conferencing
system. It means that you can perfectly achieve you purpose of communicating and
collaborating with your colleagues, customers and partners with a friendly price.

Audio conferencing is easily accessible

Audio conferencing is very accessible and easy to set up. By adopting a familiar technology,
audio conferencing makes it easy to host a conference call through telephone lines. Besides,
you can also enhance it by using devices such as computers.

Audio conferencing can save you a lot of time and money:

As an employer, it is inevitable to have business trips or invest a lot of money in your employee
to have business travel. Audio conferencing can be a practical alternative to business trip. You
don’t have travel around the country or the world to attend a meeting or seminar any more.
Hence, it saves you a lot of time spent on the road and money for the trip.

Disadvantages of Audio Conferencing:

Apart from the advantages, audio conferencing also has its downsides and drawbacks. The
following are three obvious disadvantages of audio conferencing and its possible solutions.

• The communication is only verbal

• Audio conferencing cannot keep you focused on the meeting

• The quality of conference call is not reliable

The communication is only verbal:

Studies show that effective communication is always non-verbal, yet audio conferencing
is only verbal. The communication means doesn’t support visual images, so you can’t
see and understand the facial expression, eye movement and body language of the
attendee you are talking to. One way to solve this problem is to select an audio and
video conferencing system to replace it. By just utilizing a free audio video conferencing
software like ezTalks Meetings, you can easily host a voice and visual conferencing,
which makes your communication and cooperation more productive, effective and
efficient.

Audio conferencing cannot keep you focused on the meeting:


Since you can see the visual images of participants during a conference call, so you don’t know
whether your audience is carefully listening to you or just sitting on the toilet. Under such
circumstance, audio visual video conferencing from ezTalks is a great alternative to you. Voice
& visual conferencing forces participants to focus on the task during the meeting because they
are exposed to the camera.

The quality of conference call is not reliable:

At times, the sound transmission may be of poor quality during the audio conferencing as it
mainly relies on the telephone lines. The background noise can also affect the audio
conferencing, or even cut you out.
Q6) Explain Video conferencing?

Video conferencing:

Video Conferencing is a visual communication session between two or more users regardless of
their location, featuring audio and video content transmission in real time. In broad terms,
video conferencing software is a solution that allows two or more persons to talk and see each
other remotely. Initially video conferencing software only enabled users to make video calls or
hold group video conferences. However, as technology advanced, video conferencing software
acquired plenty of helpful tools and features for remote communication and learning.

Components of Video Conferencing System:

The following are the components of Video Conferencing

 Video camera or webcam


 Audio input
 Codec Device
 Endpoint devices
 The Right Computer System

Video camera or webcam

Video conferencing wouldn’t be possible without modern camera technology. It’s vital that
anyone communicating by video can be clearly seen, without jerky or unreliable footage getting
in the way of their message. Camera quality has greatly improved in the last several years, and
prices have steadily dropped.

Audio input

Similarly, a video conferencing system cannot be successful without clear, understandable


audio. Although you can’t always control the quality of the technology on the other end of your
customers’ video conferencing calls, you can ensure that their speech is captured as effectively
as possible with high-quality (and well-placed) microphones.

Codec Device

This is also a vital piece of the puzzle. The codec is the hardware or software that digitally
compresses both the audio and video for each conferencing session. Then, the “packets” are
transmitted through a digital network (increasingly, IP networks) to the endpoint or endpoints.
Look for a codec device that can achieve high compression rates so audio and video are relayed
seamlessly, in real-time.
Endpoint devices

This refers to the multiple devices that handle the video and audio output in a conferencing
system, which might include a video display, loudspeakers, a telephone, TV screen, projector
and more. These devices can be tailored to your customer’s needs, ranging from stand-alone
desktop units to larger room-based systems. Seek out an endpoint system that is well-
established and has been proven with other customers.

The Right Computer System

In any video conferencing system, computers take care of the data compressing and
decompressing and provide access to the network. Depending on your customer’s needs and
the size of their video conferencing system, they may require more powerful computers with
higher processing speeds than others.

Types of Video Conferencing Systems

 Telepresence Video Conferencing System


 Integrated Video Conferencing System
 Desktop Video Conferencing System

Telepresence Video Conferencing System

Telepresence is designed to host a meeting as closely as possible. Even if the participants are
not in the same room physically, the set-up is done in a way easily. Large screens are used and
cameras are positioned at eye level. The result is a videoconference set-up that appears as if all
the participants are sitting in the same room and around the same table.

Integrated Video Conferencing System

Integrated video conferencing systems are designed generally for group video conferencing
where there's a centralized location for the equipment. It includes both the hardware and
codec. All the main camera, displays and other peripheral videos are mounted in the main
conference location. Integrated video conferencing systems are typically ideal for boardroom
and classroom conferences.

Desktop Video Conferencing System

As an important one of types of video conferencing systems, desktop video conferencing


system is very popular with people on-the-go and typical office workers. Within this option
there are two choices available: a software client on your desktop or a hardware codec that
doubles as your computer monitor. By using this type of set-up, the video conferencing system
is brought right into your personal computer while still pulling off a full-motion conference.

Benefits of Video conferencing:

The following are the bene

fits of Video Conferencing.

It’s More Engaging than Audio Conferencing:

Participants in audio conferences tend to zone out and multitask because they feel
disconnected from the other members in the meeting. With video, however, there’s pressure
to maintain “virtual eye contact”, translating to superior levels of engagement. When each
conference member is visible, you’re inclined to use the communication skills we’ve all
practiced in face-to-face conversations.

It’s Efficient:

Reduced commuting time is one of the most obvious but significant benefits of video
conferencing. Inperson meetings with suppliers, clients and satellite offices can take up
valuable hours of your day; even an hour-long meeting can quickly eat up an entire morning
when accounting for travel time, making it a frustrating and inefficient activity.

It Saves on Travel Money:

Not only is travel time-consuming, but it’s also expensive. People often travel great distances
for training, conferences and business meetings, and in most cases, these in-person
communications can be accomplished via video conferencing. Save the money you would spend
on business travel and put it toward other business priorities.

It Improves Communication:

Research has shown that humans process visual information more quickly and accurately than
text and audio. Therefore, when you have a meeting via video conferencing, your attendees will
retain more information and comprehend it more effectively than they would if you held the
meeting via audio.

It Connects Teams:

Teams are becoming increasingly geographically separated for several reasons. Freelancers and
even permanent staff may be working from home, some are contractors working from other
continents, and some are simply on the road for business purposes. But vast distances don’t
matter when you can bring your team together via video conferencing, either for regular
meetings or spur-of-the-moment checkups.

It Improves Productivity:

Need a quick answer to a tricky question? Instead of sending an email to your colleague and
hoping for an answer tomorrow, connect for a quick video conference conversation and use a
screen-share function to move on with your project.

It Improves Attendance:

It’s often challenging to coordinate busy schedules and bring staff together for in-person
meetings. Video conferencing allows the kind of flexibility that can boost meeting attendance
rates, and record the discussion for non-attendees.
Q7) Explain Wireless Communication?

Wireless communication involves the transmission of information over a distance without the
help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal through
wireless communication technologies and devices.
Basic Elements of a Wireless Communication System

A typical Wireless Communication System can be divided into three elements: the Transmitter,
the Channel and the Receiver. The following image shows the block diagram of wireless
communication system.

The Transmission Path

A typical transmission path of a Wireless Communication System consists of Encoder,


Encryption, Modulation and Multiplexing. The signal from the source is passed through a
Source Encoder, which converts the signal in to a suitable form for applying signal processing
techniques.

The Channel
The channel in Wireless Communication indicates the medium of transmission of the signal i.e.
open space. A wireless channel is unpredictable and also highly variable and random in nature.
A channel maybe subject to interference, distortion, noise, scattering etc. and the result is that
the received signal may be filled with errors.

The Reception Path

The job of the Receiver is to collect the signal from the channel and reproduce it as the source
signal. The reception path of a Wireless Communication System comprises of Demultiplexing,
Demodulation, Channel Decoding, Decryption and Source Decoding. From the components of
the reception path it is clear that the task of the receiver is just the inverse to that of
transmitter.

Advantages of Wireless Communication

The following are advantages of wireless communication.

 Cost

 Mobility

 Ease of installation

 Reliability

 Disaster Recovery

Cost

The cost of installing wires, cables and other infrastructure is eliminated in wireless
communication and hence lowering the overall cost of the system compared to wired
communication system. Installing wired network in building, digging up the Earth to lay
the cables and running those wires across the streets is extremely difficult, costly and
time consuming job.

Mobility

Mobility is the main advantage of wireless communication system. It offers the freedom
to move around while still connected to network.

Ease of Installation

The setup and installation of wireless communication network’s equipment and infrastructure
is very easy as we need not worry about the hassle of cables. Also, the time required to setup a
wireless system like a Wi-Fi network for example, is very less when compared to setting up a
full cabled network.

Reliability

Since there are no cables and wires involved in wireless communication, there is no chance of
communication failure due to damage of these cables which may be caused by environmental
conditions.

Disaster Recovery

In case of accidents due to fire, floods or other disasters, the loss of communication
infrastructure in wireless communication system can be minimal.

Types of Wireless Communication:

 Satellite Communication

 Mobile Telephone Communication System

 Bluetooth

 Wireless Local Area Network (WLAN)

 Infrared Communication

Satellite Communication

 Satellite Communication System is an important type of Wireless Communication.


Satellite Communication Networks provide worldwide coverage independent to
population density.

 Satellite Communication Systems offer telecommunication (Satellite Phones),


positioning and navigation (GPS), broadcasting, internet, etc. Other wireless services like
mobile, television broadcasting and other radio systems are dependent of Satellite
Communication Systems.

Mobile Telephone Communication System

Perhaps, the most commonly used wireless communication system is the Mobile Phone
Technology. The development of mobile cellular device changed the World like no other
technology. Today’s mobile phones are not limited to just making calls but are
integrated with numerous other features like Bluetooth, Wi-Fi, GPS, and FM Radio.

Bluetooth
Bluetooth is another important low range wireless communication system. It provides
data, voice and audio transmission with a transmission range of 10 meters. Almost all
mobile phones, tablets and laptops are equipped with Bluetooth devices. They can be
connected to wireless Bluetooth receivers, audio equipment, cameras etc.

Wireless Local Area Network (WLAN)

Wireless Local Area Network or WLAN (Wi-Fi) is an internet related wireless service.
Using WLAN, different devices like laptops and mobile phones can connect to an access
point and access internet.

Infrared Communication

Infrared Communication is another commonly used wireless communication in our daily


lives. It uses the infrared waves of the Electromagnetic (EM) spectrum. Infrared (IR)
Communication is used in remote controls of Televisions, cars, audio equipment etc.

Q8) Explain WLAN?

WLAN:

A wireless local area network (WLAN) is a wireless distribution method for two or more devices.
WLANs use high-frequency radio waves and often include an access point to the Internet. A
WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection. A WLAN is sometimes called a local area wireless network
(LAWN).

Wireless LAN is made by connecting different devices through wireless communication to make
a local area network. WLAN follows a standard named IEEE 802.11. WLAN connects laptops,
smartphones, personal digital assistants, desktop computers, workstations and printers. This
network is easy to install and use at the home or any other place.
Advantages of WLANs

 Flexibility
 Planning
 Design
 Robustness
 Cost
 Ease of Use

Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio
waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible,
e.g., within devices, in walls etc.).

Planning: Only wireless ad-hoc networks allow for communication without previous planning,
any wired network needs wiring plans.

Design: Wireless networks allow for the design of independent, small devices which can for
example be put into a pocket. Cables not only restrict users but also designers of small
notepads, PDAs, etc.

Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas,
networks requiring a wired infrastructure will usually break down completely in disasters.

Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of
installing and maintaining a traditional wired LAN,
Ease of Use: Wireless LAN is easy to use and the users need very little new information to take
advantage of WLANs.

Disadvantages of WLANs

 Quality of wireless LAN is typically lower than wired networks.


 Proprietary Solutions: Due to slow standardization procedures, many companies
have come up with proprietary solutions offering standardization functionality plus
many enhanced features. Most components today adhere to the basic standards
IEEE 802.11a or 802.11b.
 Restrictions: Several govt. and non-govt. institutions world-wide regulate the
operation and restrict frequencies to minimize interference.
 Global operation: Wireless LAN products are sold in all countries so, national and
international frequency regulations have to be considered.
 Low Power: Devices communicating via a wireless LAN are typically power
consuming, also wireless devices running on battery power. Whereas the LAN design
should take this into account and implement special power saving modes and power
management functions.
 License free operation: LAN operators don't want to apply for a special license to be
able to use the product. The equipment must operate in a license free band, such as
the 2.4 GHz ISM band.

Q9) Write about Blue tooth, WI-FI and WI MAX?

Bluetooth:

Bluetooth is an open wireless technology standard for transmitting fixed and mobile electronic
device data over short distances. Bluetooth was introduced in 1994 as a wireless substitute for
RS-232 cables.

Bluetooth communicates with a variety of electronic devices and creates personal networks
operating within the unlicensed 2.4 GHz band.A variety of digital devices use Bluetooth,
including MP3 players, mobile and peripheral devices and personal computers.

Bluetooth features include:

 Specifications based on frequency-hopping spread spectrum technology

 Network communicates with a master Bluetooth device and is formed with up to seven
devices
 FreeBSD stack is executed with a Netgraph framework via short wavelength radio
transmission signals.

 Device technology includes confidentiality, key derivation and authentication via Secure
and Fast Encryption Routine (SAFER)+ block cipher algorithms

Wi-Fi

Wi-fi is a wireless networking technology that allows devices such as computers (laptops
and desktops), mobile devices (smart phones), and other equipment such as printers
and video cameras to interface with the Internet. It allows these devices and many more
to exchange information with one another, creating a network. Internet connectivity
occurs through a wireless router. When you access Wi-Fi, you are connecting to a
wireless router that allows your Wi-Fi-compatible devices to interface with the Internet.

WiMAX:

 WiMAX technology is a wireless broadband communications technology based around


the IEEE 802.16 standard providing high speed data over a wide area.

 The letters of WiMAX stand for Worldwide Interoperability for Microwave Access, and it
is a technology for point to multipoint wireless networking.

 WiMAX technology is able to meet the needs of a large variety of users from those in
developed nations wanting to install a new high speed data network very cheaply
without the cost and time required to install a wired network, to those in rural areas
needing fast access where wired solutions may not be viable because of the distances
and costs involved - effectively providing WiMAX broadband. Additionally it is being
used for mobile applications, providing high speed data to users on the move.

WiMAX is

 Acronym for Worldwide Interoperability for Microwave Access.

 Based on Wireless MAN technology.

 A wireless technology optimized for the delivery of IP centric services over a wide area.

 A scalable wireless platform for constructing alternative and complementary broadband


networks.
Q10) Explain features of MS-Excel?

Microsoft Excel

Microsoft Excel is one of the most suitable spreadsheet functions that help us manage data,
create optically logical charts, and thought-provoking graphs. Microsoft Excel is supported by
both Mac and PC platforms. Microsoft Excel can also be used to balance a checkbook, create an
expense document, build formulas, and edit them.

It mainly comprises tabs, groups of commands, and worksheets. The worksheet is made of rows
and columns that intersect each other to form cells where data is entered. It is capable of
performing multiple tasks like calculations, data analysis, and integrating data.

Microsoft Office button, ribbon, and quick access toolbar are the three main features of excel
that you need to focus on while learning excel.

There are several features that are available in Excel to make our task more manageable. Some
of the main features are:

 AutoSum: It helps us to add the contents of a cluster of adjacent cells.

 List AutoFill: It automatically develops cell formatting when a new component is added
to the end of a list.
 AutoFill: This feature allows us to quickly fill cells with a repetitive or sequential record
such as chronological dates or numbers, and repeated document. AutoFill can also be
used to copy function. We can also alter text and numbers with this feature.

 AutoShapes: Autoshapes toolbar will allow us to draw some geometrical shapes,


arrows, flowchart items, stars, and more. With these shapes, we can draw our graphs.

 Wizard: It guides us to work effectively while we work by displaying several helpful tips
and techniques based on what we are doing. Drag and Drop feature will help us to
reposition the record and text by simply dragging the data with the help of the mouse.

 Charts: These features will help us in presenting a graphical representation of our data
in the form of Pie, Bar, Line charts, and more.

 PivotTable: It flips and sums data in seconds and allows us to execute data analysis and
generating documents like periodic financial statements, statistical documents, etc. We
can also analyze complex data relationships graphically.

 Shortcut Menus: These commands that are appropriate to the function that we are
doing occur by clicking the right mouse button.

 Add Header and Footer

 MS Excel allows us to keep the header and footer in our spreadsheet document.

 Find and Replace Command

 MS Excel allows us to find the needed data (text and numbers) in the workbook and also
replace the existing data with a new one.

 Password Protection

 It allows the user to protect their workbooks by using a password from unauthorized
access to their information.

 Data Filtering

 Filtering is a quick and easy way to find and work with a subset of data in a
range. A filtered range displays only the rows that meet the criteria you specify
for a column. MS Excel provides two commands for filtering ranges:

• AutoFilter; which includes filter by selection, for simple criteria

• Advanced Filter; for more complex criteria


 Data Sorting

Data sorting is the process of arranging data in some logical order. MS Excel allows us to
sort data either in ascending or descending order.

 Built-in formulae

MS Excel has got many built-in formulae for sum, average, minimum, etc. We can use
those formulae as per our needs.

Q11) Explain Spread sheet and its uses in business?

Spreadsheet:

A spreadsheet is a computer application for organization, analysis and storage


of data in tabular form. Spreadsheets were developed as computerized analogs of paper
accounting worksheets. The program operates on data entered in cells of a table. Each cell may
contain either numeric or text data, or the results of formulas that automatically calculate and
display a value based on the contents of other cells. A spreadsheet may also refer to one such
electronic document.

Common uses of spreadsheets in business

 Storing Data

 Manipulate and analyze data

 Presentation/Visualization

 Modeling and Planning

 Inform the Decision-Making Process

 Business Accounts and Budgeting

 Invoices

 Wages

 Predictions / Simulations

 Statistical analysis and reports

Storing Data:
One of the main uses of spreadsheets in business is storing data. If you have a business
organization, you will need a spreadsheet to store almost any type of information.
Examples of information to the store include a list of clients, contact information,
employee timesheets, sales, and purchases. All this information remains relevant and
useful for many years. Since spreadsheets consume very little space you can save a lot
of information without facing any storage difficulties. Searching for information on a
spreadsheet is easy. You can search using a file name or the data that it contains.

Manipulate and analyze data

Apart from storage, you can use spreadsheets to manipulate and analyze data. For example, it
contains a feature that allows you to enter custom formulas. You can use them to perform
different functions such as addition, subtraction or calculating percentage. In addition, these
formulae sets can allow you to sort your data. Additionally, you can customize it by adding
filters until you get the results that you desire. Spreadsheets also hold a feature that provides
conditional processing. Using formulas, you can make one cell to be dependent on the results
of another cell. This is a helpful feature for calculating profit and losses.

Presentation/Visualization

Spreadsheets are used often for visualization purposes. They contain different tools and
features that make it possible. For example, you can present your data in charts or graphs.
There are various types of these charts and graphs to choose from according to your needs.
Managers can present data in a graphical way to potential investors making it easy for them to
grasp the information. The presentations can also be used to teach clients or show employees
on how the business is performing. You can control anything that you want to display from the
colors or table sizes.

Modeling and Planning

Spreadsheets play a huge role when it comes to planning. You can use them in two ways. First is
by analyzing and visualizing data hence getting a clue of how your business is doing in various
fields. Next, you can highlight areas that need more attention to growth or reconsideration. The
second way to use spreadsheets in planning is by calculating the potential results due to
changes in your company. You can test various forms of data and determine if it works or not.

Inform the Decision-Making Process

Decisions that a business makes determines whether it will be successful or not. Spreadsheets
help managers and investors to make well-informed decisions. Through data visualization,
management can easily identify the areas of weaknesses. Having this information at hand all
the time it will lead the manager into making decisions that can make more profits. With well-
represented data, potential investors will have a humble time when deciding whether to invest
in your business or not

Business Accounts and Budgeting

Coming up with a budget is not an easy task without the use of spreadsheets. You can create a
table and list the most important things followed by the least important. There are features
that will show you the sectors that need the most attention. This information is very important,
especially when purchasing items. Spreadsheets also assist accountants in managing business
accounts. So, funds are released easily because some calculations are automated.

Invoices

Most spreadsheet platforms will allow you to integrate the invoice template. It speeds up the
process of receiving or dispatching products. The invoice template can easily fetch data from
the spreadsheet hence making the whole process automated. In addition, it produces very
accurate results. Handling invoices manually or with other external applications is a slow
process. The production of invoices for customers’ needs to be fast and accurate so as to realize
more profits. Customers are very sensitive and can easily be turned off by a slow process or one
with a lot of errors.

wages

Managing wages is now easy thanks to the spreadsheets. You can set up a formula that
automatically calculates the number of hours an individual employee has worked. It makes
payment of wages a fast and easy task hence you get to work with happy employees. It also
cuts the costs of paying employees extra money that they have not worked for. However, it
makes them work hard because they know that they will get paid what they deserve.
Furthermore, it also cuts the costs of using any external software to handle the wages.

Predictions / Simulations

Spreadsheets are important in simulation and prediction in business organizations. Because


organizations store all financial data in the spreadsheets, they can easily predict the form in
which the business will be in the next few years. Visualization tools such as graphs and tables
make the predictions easy. For example, if a business wants to know the average number of
customers, they will have by increasing employees they just need to check the graph.

Statistical analysis and reports


By the use of spreadsheets, business organizations are able to carry out analysis easily and fast.
For example, they use formulas that calculate all the data for the whole financial year. Making
these calculations manually is a very tiresome process. The reports show how the company is
progressing. It can also be released to attract potential investors and customers to the
company. Spreadsheets are the best platforms for organizations to manage and store data.

Q12) Explain MS-Access features?

Features of MS Access

Microsoft Access is a program that is very useful for those who work with database. It is
because this program can ease them related to database such as creating, editing,
manipulating, etc. Besides that, Microsoft Access also has many features that you can use. The
following are the features of MS-Access.

MS Access Table:

Table is the main feature offered by Microsoft Access. It functions to save data. For example,
you can save the data of the stored goods. If you do not make table, you cannot save data. If
there is no saved data, the data will not be able to be processed.

Data Entry Features:

The first feature offered by Microsoft Access is related to data entry. Rather than you enter
data manually, you can enter data with Microsoft Access faster and more easily. There are
many data entry features offered. For example, you can create table and select objects more
easily. That is why it is considered as one of the most useful Microsoft Access features.

Import & Export:

You can also import data from another source to the table you have created simply. Then, you
can save it later. Besides that, you can also export data from Microsoft Access with various
options of file format. So, you can choose the format that you want based on your desire.

MS Access Reports:

Then, you can also make a report from the table that is selected or other sources of data with
only one click. It is very simple and easy, is not it? You just need to use the icon of Report
Wizard that is available in the toolbar.
MS Access Queries:
Queries can be considered as a feature offered by Microsoft Access that functions to process
data in the tables become understandable information. For example, you can classify the top
seller by your customers. It can be based on one table, two tables, or more. With this feature,
you can also show the certain data on a table. Besides, you can also show data from more than
one table as long as the tables are related each other. Then, you can also operate calculation.

MS Access Forms:

Forms also belong to one of the features of MS Access. It functions to represent to the user or
receive input data from the user in the table or query in form of buttons, grids, etc. From in this
program is usually used if you work in master detail transaction.

Access Templates:

You can also use Template feature. This feature is very useful to enhance the look. It also adds
the experience in using this program. You can use the templates that are available in this
Microsoft Access or you can also download other templates.

Advantages of MS Access

 Access offers a fully functional, relational database management system in minutes.

 Easy to import data from multiple sources into Access

 You can easily customize Access according to personal and company needs

 Microsoft Access online works well with many of the development languages that work
on Windows OS

 It is robust and flexible, and it can perform any challenging office or industrial database
tasks.

 MS-Access allows you to link to data in its existing location and use it for viewing,
updating, querying, and reporting.

 Allows you to create tables, queries, forms, and reports, and connect with the help of
Macros

 Macros in Access is a simple programming construct with which you can use to add
functionality to your database.

 Microsoft Access online can perform heterogeneous joins between various data sets
stored across different platforms
Disadvantages of MS Access

 Microsoft Access database is useful for small-to-medium business sectors. However, it is


not useful for large-sized organizations

 All the information from your database is saved into one file. This can slow down
reports, queries, and forms

 Technical limit is 255 concurrent users. However, the real-world limit is only 10 to 80
(depending on the type of application which you are using)

 It requires a lot more learning and training compares with other Microsoft programs

Applications of MS Access Database:

 Railway Reservation System: In the railway reservation system, the database is required
to store the record or data of ticket bookings, status about train’s arrival, and departure.
Also if trains get late, people get to know it through database update.

 Library Management System: There are lots of books in the library so; it is tough to
store the record of all the books in a register or copy. So, the database management
system (DBMS) is used to maintain all the information related to the name of the book,
issue date, availability of the book, and its author.

 Banking: Database management system is used to store the transaction information of


the customer in the database.

 Education Sector: Presently, examinations are conducted online by many colleges and
universities. They manage all examination data through the database management
system (DBMS). Inspite that student’s registrations details, grades, courses, fee,
attendance, results, etc. all the information is stored in the database.

 Credit card transactions: Database Management system is used for purchasing on


credit cards and generation of monthly statements.

 Social Media Sites: We all use of social media websites to connect with friends and to
share our views with the world. Daily, millions of peoples sign up for these social media
accounts like Pinterest, Facebook, Twitter, and Google plus. By the use of the database
management system, all the information of users is stored in the database and, we
become able to connect with other people.

 Telecommunications: Without DBMS any telecommunication company can’t think. The


Database management system is necessary for these companies to store the call details
and monthly postpaid bills in the database.

 Finance: The database management system is used for storing information about sales,
holding and purchases of financial instruments such as stocks and bonds in a database.

 Online Shopping: These days, online shopping has become a big trend. No one wants to
visit the shop and waste their time. Everyone wants to shop through online shopping
websites (such as Amazon, Flipkart, snapdeal) from home. So, all the products are sold
and added only with the help of the database management system (DBMS). Invoice bills,
payments, purchase information all of these are done with the help of DBMS.

 Human Resource Management: Big firms or companies have many workers or


employees working under them. They store information about employee’s salary, tax,
and work with the help of database management system (DBMS).

 Manufacturing: Manufacturing companies make different types of products and sale


them on a daily basis. In order to keep the information about their products like bills,
purchase of the product, quantity, supply chain management, database management
system (DBMS) is used.
 Airline Reservation System: This system is the same as the railway reservation system.
This system also uses a database management system to store the records of flights
departure, arrival, and delay status
Q13) Explain Groupware?

GROUPWARE
Groupware is a class of software products that help people to communicate, coordinate and
work together collectively while located remotely from each other. It is so important that it
allow workgroup for the people who want to interact with each other within an organization to
share information, even when they are working together at a distance.
Groupware software allow the sharing of calendars, collective writing, e-mail handling, shared
database access, electronic meetings with each person able to see and display information to
others, and other activities. Some product examples of groupware include Lotus Notes and
Microsoft Exchange.
Groupware supports the following operations:
• Scheduling meetings and allocating resources
• E-mail
• Password protection for documents
• Telephone utilities
• Electronic newsletters
• File distribution
• Groupware can provide following benefits:
• Efficient and effective project management
• Location independence
• Increased communications capability
• Increased information availability
• Improved workflow
Types:
Groupware (software) is divided into two categories related to time
• Synchronous
• Asynchronous
Synchronous
It is a real-time groupware because it allowing multiple users to perform their works at a same
time. A primary need of synchronous groupware is real-time coordination in between all
connected users with this software, so they need shared audio channels for making
the communication
Asynchronous
In this groupware, multiple users perform their tasks at different time duration. Asynchronous
groupware allows different services like as email handling, file sharing, structured messages,
workflow, collaborative writing system, and other.
Disadvantages
There are various drawbacks and challenges of groupware
• It is not trust able system because it is totally depended on the server, if this server
performance gets down then all users get disconnected to each other.
• Harder to convince clients for using groupware software
• Need to skill users that how to use it.
• Non-verbal communication cannot be used in between all users.
• It has logistical and security problem.
• It is more expensive because it needs more money to buy and better maintain them.
• Groupware environment, in which big challenge to observe gestures and facial
expressions and hear voice inflections
Q14) Explain RFID?

RFID Definition:

Radio-Frequency Identification (RFID) is the use of radio waves to read and capture information
stored on a tag attached to an object. A tag can be read from up to several feet away and does
not need to be within direct line-of-sight of the reader to be tracked.

RFID working procedure:

A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are
embedded with a transmitter and a receiver. The RFID component on the tags has two parts: a
microchip that stores and processes information, and an antenna to receive and transmit a
signal. The tag contains the specific serial number for one specific object.

To read the information encoded on a tag, a two-way radio transmitter-receiver called an


interrogator or reader emits a signal to the tag using an antenna. The tag responds with the
information written in its memory bank. The interrogator will then transmit the read results to
an RFID computer program.

As shown below diagram.


RFID Application:

RFID tags are becoming so ubiquitous in our society that the average person probably
encounters them daily without realizing it. Did you go to the bookstore today? The book you
purchased was probably inventoried using RFID technology. Have you traveled overseas
recently? The government tracks travel data using RFID chips in passports. Have you ever had
trouble finding a lost pet? Maybe you should consider having an RFID tag implanted in Fluffy to
help track her next time she gets lost!

By providing a cheap, efficient, and reliable way to collect and store data, RFID offers limitless
possibilities for current and future use. The following are applications of RFID technology:

 Product Tracking – RFID tags are increasingly used as a cost-effective way to track
inventory and as a substitute for barcodes. For instance, bookstores such as Barnes &
Noble use RFID to identify books to be removed from shelves and returned to publishing
houses.

 Toll Road Payments – Highway toll payment systems, such as E-Z Pass in the eastern
states, uses RFID technology to electronically collect tolls from passing cars. Instead of
stopping at the toll booth, cars pass directly through in the E-Z Pass lane and the toll is
automatically deducted from a pre-paid card.
 Passports – A number of countries, including Japan, the United States, Norway, and
Spain incorporate RFID tags into passports to store information (such as a photograph)
about the passport holder and to track visitors entering and exiting the country.

 Identification – RFID chips can be implanted into animals and people to track their
movements, provide access to secure locations, or help find lost pets.

 Libraries – Libraries use RFID tags in books and other materials to track circulation and
inventory, store product information (such as titles and authors), and to provide security
from theft. Because RFID tags can be scanned without physically touching the item,
checking books in and out, plus doing laborious tasks such as shelf inventory, can be
accomplished quickly and efficiently using RFID technology.

 Shipping – Large shipments of materials, such as retail goods, often utilize RFID tags to
identify location, contents, and movement of goods. Wal-mart is one of the largest
consumers of this technology to assist in tracking shipments of merchandise.

 Other uses – RFID tags are employed in numerous other ways, including implantation in
Saguaro cacti to discourage black-market traders, placement in car tires to transmit road
condition information to the onboard computer, and placement around cities (such as
Tokyo) to transmit tourist information to visitor cell phones.

Common questions

Powered by AI

The integration of multimedia devices is crucial in modern communication systems as they combine text, audio, images, and video to enhance communication efficiency . Multimedia communication supports diverse functions such as video conferencing and digital media sharing, ensuring that businesses can perform tasks effectively across various locations . This integration results in enriched user experiences and supports a wide range of tasks from business communication to content creation .

Internet technologies have revolutionized marketing strategies by enabling global reach and facilitating new forms of advertising like search engine marketing and social media engagement . They allow for personalized customer interactions and data-driven marketing decisions . This transformation has led to decreased costs and increased efficiency in targeting customers, contributing to higher sales and competitive advantages in the market . Additionally, online platforms have opened up opportunities for direct-to-consumer marketing and e-commerce growth .

Businesses can leverage Video Conferencing systems to enhance productivity by enabling real-time audio-visual communication, thus reducing travel costs and time . Video conferencing facilitates virtual meetings, ensuring that employees remain engaged and focused, which enhances collaboration and decision-making . This technology allows for instant connectivity with remote teams or clients, maintaining effective communication and ensuring alignment on business objectives .

Decision Support Systems (DSS) enhance organizational decision-making by supporting managers in dealing with semi-structured and unstructured problems . They provide useful information summaries, identify exceptions, spot trends, and utilize analytical models to solve complex issues . DSS are adaptive, contributing to efficiency, and can accommodate a variety of decision processes and styles . They support managers at all levels, assisting in intelligence, design, choice, and implementation of decisions .

An Accounting Information System (AIS) supports financial management by collecting, storing, managing, processing, retrieving, and reporting financial data . It ensures that information is available for accountants, business analysts, and managers for decision-making and controls the financial integrity within an organization . The AIS helps in generating timely and relevant reports that aid in regulatory compliance, financial analysis, and strategic planning .

MP4 is a widely supported video format known for its high quality and relatively small file size, making it ideal for streaming and storing media content across various devices . In contrast, AVI, developed by Microsoft, offers less compression, resulting in larger file sizes but can ensure better quality and is often preferred for professional video editing and storage if quality over storage space is a concern . MP4 is more versatile for diverse applications, while AVI is typically used where maintaining high video quality is paramount .

Multimedia devices play a pivotal role in digital content creation by integrating various media types like text, audio, and video . Components such as digital cameras, webcams, sound cards, and microphones serve different functions like capturing, editing, and outputting digital content . These devices facilitate diverse tasks from basic image capture to complex video editing, allowing both professionals and hobbyists to create rich, engaging content for various platforms .

Electronic Data Interchange (EDI) significantly reduces costs by automating transactions like purchase orders, reducing paperwork, and minimizing human errors . It streamlines supply chain processes, leading to faster transaction times and improved inventory management . EDI enhances operational efficiencies by enabling seamless communication and transaction processing between businesses, allowing them to respond quickly to market changes . Enterprises using EDI often gain a competitive edge through lowered operational costs and increased process accuracy .

Expert Systems differ from other types of information systems as they are knowledge-based, using embedded expertise to act as consultants, aiding in diagnosing problems or solving issues . Unlike Decision Support Systems, which gather information and provide analytical tools, Expert Systems offer specific advice based on their knowledge base, simulating human expertise in a particular area . They are integral in situations where human-like reasoning is crucial for decision-making .

Strategic Information Systems (SIS) offer competitive advantages by aligning technology with business strategies to lower costs, differentiate products or services, or serve targeted market segments more effectively . They enhance decision-making processes, improve operational efficiency, and support innovation . SIS enable organizations to respond rapidly to market changes and consumer demands, often leading to improved market positions and increased profitability .

You might also like