BBA-ComputerApplication
BBA-ComputerApplication
INTRODUCTION TO COMPUTER
A computer is an electronic device that receives input, stores or processes the input
as per user instructions and provides output in desired format.
GENERATION OF COMPUTER
The history of the computer dates back to several years. There are five prominent
generations of computers. Each generation has witnessed several technological
advances which change the functionality of the computers. This results in more
compact, powerful, robust systems which are less expensive. The brief history of
computers is discussed below −
• ENIAC
• UNIVACTBM 701
• Transistors
• Magnetic Tapes
Features
It had features like −
• Batch operating system
• Faster and smaller in size
• Reliable and energy efficient than the previous generation
• Less costly than the previous generation
Memory
The capacity of the memory was 32,000 bits.
Data Input
The input was provided through punched cards.
Examples
The examples of second-generation computers are −
• Honeywell 400
• CDC 1604
• IBM 7030
• IBM 360/370
• CDC 6600
• PDP 8/11
Memory
The capacity of the memory was 100 million bits.
Data Input
The input was provided through improved hand held devices, keyboard and mouse.
Examples
The examples of fourth generation computers are −
• Apple II
• VAX 9000
• CRAY 1 (super computers)
These are the modern and advanced computers. Significant changes in the
components and operations have made fifth generation computers handy and more
reliable than the previous generations.
APPLICATION OF COMPUTER
Computers play a role in every field of life. They are used in homes, business,
educational institutions, research organizations, medical field, government offices,
entertainment, etc.
Home
Computers are used at homes for several purposes like online bill payment,
watching movies or shows at home, home tutoring, social media access, playing
games, internet access, etc. They provide communication through electronic mail.
They help to avail work from home facility for corporate employees. Computers
help the student community to avail online educational support.
Medical Field
Entertainment
Computers help to watch movies online, play games online; act as a virtual
entertainer in playing games, listening to music, etc. MIDI instruments greatly help
people in the entertainment industry in recording music with artificial instruments.
Videos can be fed from computers to full screen televisions. Photo editors are
available with fabulous features.
Industry
Computers are used to perform several tasks in industries like managing inventory,
designing purpose, creating virtual sample products, interior designing, video
conferencing, etc. Online marketing has seen a great revolution in its ability to sell
various products to inaccessible corners like interior or rural areas. Stock markets
have seen phenomenal participation from different levels of people through the use
of computers.
Education
Computers are used in education sector through online classes, online examinations,
referring e-books, online tutoring, etc. They help in increased use of audio-visual
aids in the education field.
Government
Banking
In the banking sector, computers are used to store details of customers and conduct
transactions, such as withdrawal and deposit of money through ATMs. Banks have
reduced manual errors and expenses to a great extent through extensive use of
computers.
Business
Nowadays, computers are totally integrated into business. The main objective of
business is transaction processing, which involves transactions with suppliers,
employees or customers. Computers can make these transactions easy and accurate.
People can analyze investments, sales, expenses, markets and other aspects of
business using computers.
Training
Arts
Computers are extensively used in dance, photography, arts and culture. The fluid
movement of dance can be shown live via animation. Photos can be digitized using
computers.
Science and Engineering
Computers with high performance are used to stimulate dynamic process in Science
and Engineering. Supercomputers have numerous applications in area of Research
and Development (R&D). Topographic images can be created through computers.
Scientists use computers to plot and analyze data to have a better understanding of
earthquakes.
CHARACTERISTICS OF COMPUTER
Speed
A computer works with much higher speed and accuracy compared to humans while
performing mathematical calculations. Computers can process millions (1,000,000)
of instructions per second. The time taken by computers for their operations is
microseconds and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.
Diligence
A computer can perform millions of tasks or calculations with the same consistency
and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also
makes it superior to that of human beings.
Versatility
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we
give same set of input any number of times, we will get the same result.
Automation
Computer performs all the tasks automatically i.e. it performs tasks without manual
intervention.
Memory
A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are
also used to store data.
COMPONENTS OF COMPUTER
Computer consist of Hardware and Software.
Hardware
The term hardware refers to mechanical device that makes up computer. Computer
hardware consists of interconnected electronic devices that we can use to control
computer’s operation, input and output. Examples of hardware are CPU, keyboard,
mouse, hard disk, etc.
Software
• System software
• Application software
System Software
System software operates directly on hardware devices of computer. It provides a
platform to run an application. It provides and supports user functionality.
Examples of system software include operating systems such as Windows, Linux,
Unix, etc.
Application Software
An application software is designed for benefit of users to perform one or more
tasks. Examples of application software include Microsoft Word, Excel,
PowerPoint, Oracle, etc.
MICRO COMPUTER:
Micro Computer are small low cast and single user digital computers.
It is a device with microprocessor, Input unit, storage unit and CPU (Central
Processing Unit).
Microcomputer Computer formerly a commonly used term for Personal
Computers particularly any of class of any small digital computers. Its CPU
contained on a single integrated semi-conductor chip.
IBM PC based on Pentium microprocessor and Apple Macintosh are some
Examples of microcomputers.
Microcomputers include desktop computers, notebook computers or laptop,
tablet compute, handheld computer, smartphones and notebook.
Types of Micro Computers:
D) Tablet:
▪ A tablet is a wireless, portable personal computer with
a touchscreen interface.
▪ The tablet form factor is typically smaller than a notebook computer,
but larger than a smartphone.
E) Handheld Computer or Personal Digital Assistant(PDA):
▪ It is a small computer that can be held on the top of the palm.
▪ It is small in size. PDA uses a pen or a stylus for input, instead of the
keyboard. They have a limited memory and are less pitiful.
▪ PDAs can be connected to the internet via wireless connection.
F) Smart Phones:
▪ A smartphone is a mobile phone with highly advanced features.
▪ A typical smartphone has a high-resolution touch screen display, Wi-Fi
connectivity, Web browsing capabilities, and the ability to accept
sophisticated applications.
▪ The majority of these devices run on any of these popular mobile
operating systems: Android, Symbian, iOS, BlackBerry OS and
Windows Mobile.
MINI COMPUTER
▪ These perform multi-tasking and allow terminals to be connected to their
services. The ability to connect minicomputers to each other and mainframes
has popularized them among larger businesses.
▪ This use is being challenged by the development in the microcomputer range
and the practice of starting resources of microcomputer under a network.
▪ Minicomputer are still recognized as being able to process large amounts of
data.
Types of minicomputer
The types of minicomputer are- tablet PC, Desktop minicomputers, cell phones,
notebooks, high-end mP3 players, etc.
Examples:- IBM’sAS/400e
MAINFRAME COMPUTER
Main frame computers generally require special attention and are kept in a controlled
atmosphere. They are multi-tasking and generally used in areas where large database
is maintained example as government agency or airline industry.
Examples: - IBM Linux ONE
SUPER COMPUTER
▪ Super Computers operate very fast and have multiple processors. There are
very few of these machines in existence due to their cost.
▪ This type of computer has been developed for scientific applications usually
involving complex arithmetic and mathematical operations. One such use is
in weather forecasting.
▪ A super computer is a type of computer that has the architecture, resources
and components to achieve massive computing power. Although advances
like multi-core processors and GPGPUs (general-purpose graphics processing
units) have enabled powerful machines for personal use (see: desktop
supercomputer, GPU supercomputer), by definition, a supercomputer is
exceptional in terms of performance.
China has owned the fastest supercomputer in the world. “Fast” is defined by the
number of petaflops the computer system can perform. A petaflop is one thousand
teraflops, or one quadrillion floating-point operations per second.
The Central Processing Unit (CPU) is called "the brain of computer" as it controls
operation of all parts of computer. It consists of two components: Arithmetic Logic
Unit (ALU), and Control Unit.
Arithmetic Logic Unit (ALU)
Data entered into computer is sent to RAM, from where it is then sent to ALU,
where rest of data processing takes place. All types of processing, such as
comparisons, decision-making and processing of non-numeric information takes
place here and once again data is moved to RAM.
Control Unit
Memory Unit
This is unit in which data and instructions given to computer as well as results given
by computer are stored. Unit of memory is "Byte".
1 Byte = 8 Bits
Memory
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored. The memory is
divided into large number of small parts called cells. Each location or cell has a
unique address, which varies from zero to memory size minus one. For example, if
the computer has 64k words, then this memory unit has 64 * 1024 = 65536 memory
locations. The address of these locations varies from 0 to 65535.
Primary memory holds only those data and instructions on which the computer is
currently working. It has a limited capacity and data is lost when power is switched
off. It is generally made up of semiconductor device. These memories are not as
fast as registers. The data and instruction required to be processed resides in the
main memory. It is divided into two subcategories RAM and ROM.
a) Random Access Memory (RAM): The primary storage is referred to as
Random Access Memory (RAM) because it is possible to randomly select and
use any location of the memory directly to store and retrieve data. It takes same
time to any address of the memory as the first address. It is also called read/write
memory. The storage of data and instructions inside the primary storage is
temporary. It disappears from RAM as soon as the power to the computer is
switched off. The memories, which lose their content on failure of power supply,
are known as volatile memories. So now we can say that RAM is volatile
memory
Introduction
• Historically, the most common forms of auxiliary storage have been
magnetic tapes or rotating magnetic drums and disks.
• Other technologies, such as the magnetic bubble, have been tested but
have achieved only limited success.
• One promising new technology is the optical disk. Another level of
storage is provided by mass storage units, which permit access to a large
number of disks or tapes, but the rapidly improving disk technology has
led to limited use.
• As was mentioned before, auxiliary storage has many attributes similar to
other I/0 units. For this reason, many of the same ideas, such as buffering,
apply to auxiliary storage units.
• This lesson will consider the auxiliary storage devices used with today's
computing systems.
Auxiliary storage
• Auxiliary storage units behave in a manner similar to other I/O devices,
but users do not interact directly with them.
• If you were to place yourself inside the computer, in many ways you
would not be able to distinguish among the various kinds of I/O
equipment.
• Auxiliary storage equipment has data transmission rates that may be
significantly higher than other I/O devices but are still much slower than
the internal speeds of the processor; hence, many of the techniques
already discussed, such as buffering, are used.
• Auxiliary storage serves two main purposes: it serves as an extension of
the main memory or as a medium to permanently archive information.
• The computer can use it as a memory extension for its own purposes
outside the control of the user.
• Called virtual memory, this concept will be discussed later. On the other
hand, the user can employ the extra storage to maintain almost limitless
information.
Type of Access
• Data are stored in memory in three different ways.
• In the first method, random access memory (RAM), any element may be
accessed in equal time. This is most commonly associated with the
processor's primary or main memory.
• The second technique, direct access memory (DAM), behaves in a way
analogous to RAM. Through an addressing scheme, it permits direct
access to each storage location; however, the access time depends on the
location of the data. Direct access is generally associated with magnetic
and optical disks.
• The third method, the one most often associated with magnetic tape,
stores each data element sequentially.
• It is known as sequential access memory (SAM). This means that to
access the last data element, one must first scan through all the preceding
items.
• The terminology that has been used with personal computers confuses
random access and direct access. Floppy disk and hard disk drives are
often called random access devices.
• To better understand the differences between the last two techniques, let's
consider a hypothetical situation in which we have a cassette tape with
four songs and a phonograph record with the same four songs. Suppose
you wish to play the third song.
• With the tape, you must sequentially move the first two songs past the
reading head of the recorder.
• With the phonograph record, if you have been told where the third song is
located, you may move the record arm directly over that position and
begin to play the music.
Disk
• Disk storage devices are by far the most popular of the DASD systems.
• Magnetic disk, like magnetic drum storage, provides the computing
system with the ability to read or retrieve data sequentially or directly.
• The magnetic disk is a flat platter with magnetic oxide coated on the
surface.
• Since the disk is solid in the direction perpendicular to the direction of
rotation, it does not suffer from the distortion problems associated with
the magnetic drum.
• The recording surface of each disk is divided into concentric tracks. Data
are stored serially bit by bit along a track as magnetic spots.
• Read/write heads are positioned above the track to record or read the
data.
• There are fixed head disks with one head for each track and movable
head disks with an arm to position the head over a particular track.
• At present, the technology is sufficient to move the arms so rapidly that
the moving head disks are more cost-effective.
• Some disk systems have several movable heads.
• The capacity or density of the disk is determined by how closely the
tracks are placed together and how closely the bits are packed.
• The data transmission speed depends on the density and how fast the disk
is spinning under the read/write head.
• Recording may be on ą single surface or on both surfaces of the disk.
Larger disk systems stack several disks in a single pack (disk pack).
Access to the different surfaces is accomplished.
• There is a separate read/write head for each surface.
• These arms move as a unit and access the tracks on different surfaces at
the same time.
• The set of tracks at the same radius on different surfaces is referred to as
a cylinder. Very large disk systems will have several packs mounted on
different spindles.
• Disk packs may be movable or fixed, although the newer high-capacity
disk systems tend to be fixed for reliability considerations.
• The read/write heads move so close to the surface of the disk that a
collision with a smoke particle would cause a serious problem.
• In the 1970s a new disk technology called floppy diskettes became very
popular.
• Floppy disks are now still used extensively with personal computers. The
basic ideas are the same, except the recording surface is a flexible mylar
disk.
• There are several standard sizes including 5 1 /4", 8", and 3 1 /2". The
first two are usually housed in a cardboard envelope, while the 3 1 /2" is
housed in a sealed hard plastic container.
• The trend is to the 3 1 /2" diskette. Capacities vary from less than 100
kbytes to more than 1 mbyte.
There is a series of terms used to describe the way the data are recorded on the
diskette:
· single density-lowest recording density
· double density-next highest density
· quad density-highest density
· single sided-recording on a single side of the diskette
· double sided-recording on both sides of the diskette.
Another disk technology that is very popular with personal computers is called
the Winchester drive.
• This drive is sometimes referred to as a hard disk.
• During the read/write operation, the Winchester head "flies" above the
surface of the disk on an air-bearing supported by carefully balanced
aerodynamic forces.
• Winchester drives can store GB bytes of data. The large storage
capacities on these relatively small and inexpensive disk drives have
opened up a large number of applications for microcomputers that
previously could only be accomplished with more expensive mini and
mainframe computers.
• Winchester drives are also used on mainframes.
One of the major considerations in designing any information processing system
is the time needed to access the information (access time). Before we stated that
access time to the primary memory was on the order of microseconds or even
nanoseconds. Access time to data on a disk consists of three components:
(1) seek time-the time it takes to position the read/write head over the
correct cylinder or track;
(2) rotational delay time-the time it takes to rotate the data under the
read/write head; and
(3) transmission time-the time it takes to transmit data to the CPU.
• The seek time is much longer than the other two time components. Most
attempts to improve performance utilize both hardware and software
techniques to decrease the seek time.
• Access times are in the range of ten milliseconds, or thousands to
millions of times slower than primary memory.
• Disks are organized in a manner analogous to blocked records on tape.
Each disk is divided into sectors.
• The size of the sector depends on how much data can be read into the
buffer in main memory.
• Although any sector on the disk can be arbitrarily accessed, the access
time is dependent on the sector location and the present position of the
read/write head.
• This type of access has traditionally been called direct access to
distinguish it from access to main memory.
• Main memory access is called random since the access time does not
depend on the location.
• More recently, particularly in the personal computer environment, the
terms have become confused, and disk access is often called random
access.
• There are several software techniques used to access information on a
disk drive when there are many concurrent requests for data.
• One simple idea is to use a first-came first-served approach.
• This tends to be inefficient, since the read/write head has to be moved on
the average halfway across the disk.
• Another scheme serves the request that is closest to the present position
of the head. This is efficient but is very unfair to requests for data near the
outer extremes of the disk.
• One technique that is both efficient and fair is to move the head from the
outer edge of the disk to the innermost track, serving all requests as
encountered.
• Disks generally store the magnetic information horizontally on the
surface of the platter. A newer technique to increase the density is to store
the magnetic information vertically, standing the magnets on end in a
crystal structure of cobalt and chrome. Using this method permits 5 1/4"
floppy diskettes to store as much information as the Winchester drives.
Optical Disks
• In the rapidly changing world of computing, it is hard to predict what new
technologies will be developed and what their impact will be.
• Just as magnetic bubble memory seemed to be the answer for the next
generation of auxiliary storage devices in the 1970s, optical disk units
seem to hold great promise in the 1980s and is still widely used.
• The optical disk can store incredible amounts of data. An entire
encyclopedia can be recorded on a single disk. Bits are stored by a finely
focused laser beam burning microscopic dots on the surface.
• These are then read by scanning with a laser of much lower intensity.
Addressing particular items of data can be accomplished using a
microcomputer.
• The major restriction with the early optical disk systems is that they are
read-only devices; that is, once the data images are recorded, they may
not be changed. Newer systems are being developed that permit both the
reading and recording of information similar to the magnetic storage
devices.
• Just as with any new technology, it is hard to predict how video disks will
be used in the future; however, video disks offer an excellent medium for
electronic printing and publishing due to their low reproduction costs and
their text and graphics capabilities.
• The ability to store visual images also gives them the potential of being a
versatile way to deliver computer assisted instruction.
UNIT-II
Introduction to computer software-operating system-programming
language-general software features and trends.
INTRODUCTION OF COMPUTER SOFTWARE
• Software is a set of programs, which is designed to perform a well-defined
function. A program is a sequence of instructions written to solve a
particular problem.
There are two types of software −
• System Software
• Application Software
System Software
Application Software
• Payroll Software
• Student Record Software
• Inventory Management Software
• Income Tax Software
• Railways Reservation Software
• Microsoft Office Suite Software
• Microsoft Word
• Microsoft Excel
• Microsoft PowerPoint
Features of application software are as follows −
OPERATING SYSTEM
• An Operating system (OS) is a software which acts as an interface between
the end user and computer hardware.
• Every computer must have at least one OS to run other programs. An
application like Chrome, MS Word, Games, etc needs some environment
in which it will run and perform its task.
• The OS helps you to communicate with the computer without knowing
how to speak the computer's language.
• It is not possible for the user to use any computer or mobile device without
having an operating system.
History Of OS
• Operating systems were first developed in the late 1950s to manage tape
storage
• The General Motors Research Lab implemented the first OS in the early
1950s for their IBM 701
• In the mid-1960s, operating systems started to use disks
• In the late 1960s, the first version of the Unix OS was developed
• The first OS built by Microsoft was DOS. It was built in 1981 by
purchasing the 86-DOS software from a Seattle company
• The present-day popular OS Windows first came to existence in 1985 when
a GUI was created and paired with MS-DOS.
What is a Kernel?
The kernel is the central component of a computer operating systems. The only
job performed by the kernel is to the manage the communication between the
software and the hardware. A Kernel is at the nucleus of a computer. It makes the
communication between the hardware and software possible. While the Kernel is
the innermost part of an operating system, a shell is the outermost one.
Features of Kennel
Types of Kernels
There are many types of kernels that exists, but among them, the two most popular
kernels are:
1.Monolithic
10. Job accounting - Keeping track of time & resource used by various job
and users.
Real time OS
• A real time operating system time interval to process and respond to inputs
is very small.
• Examples: Military Software Systems, Space Software Systems.
Mobile OS
• If any issue occurs in OS, you may lose all the contents which have been
stored in your system
• Operating system's software is quite expensive for small size organization
which adds burden on them. Example Windows
• It is never entirely secure as a threat can occur at any time.
PROGRAMMING LANGUAGES
Merits:
• Because of their flexibility, procedural languages are able to solve a variety
of problems.
• Programmer does not need to think in term of computer architecture which
makes them focused on the problem.
• Programs written in this language are portable.
Demerits:
• It is easier but needs higher processor and larger memory.
• It needs to be translated therefore its execution time is more.
• Now a day’s software projects are becoming more and more complex —
in size, sophistication, and technologies used.
• Most software products are used by huge number of people, not only that,
these software support different national languages and come in different
sizes and shapes — desktop, standard, professional, Enterprise Resource
Planning (ERP) packages and so on.
• Almost all application software products (like word processors, ERP
packages) support more than on hardware and/or software platform.
• For example, we have web browsers for the PC and Mac; we have database
management systems that run on MVS, UNIX, Windows NT, and Linux
and so on.
• The competition and the advancements in technology are driving software
vendors to include additional functionality and new features to their
products— just to stay in business.
• The Information Technology is revolutionizing the way we live and work.
• The digital technology has given mankind the ability to treat information
with mathematical precision, to transmit it at very high accuracy and to
manipulate it at will.
Features of Software
Ease of use
• The software systems are applications are becoming more and more easy
to use. Software developers and system analysts are concerned for ensuring
that the software they develop are user-friendly than their competitor’s
products.
• The user interfaces are more intuitive, the error messages are more
descriptive, there is context sensitive help, and there are wizards and
templates to help the user when one encounters a problem.
• Because software vendors are incorporating more and more features into
their products this software need more and powerful machines to run.
• They need more main memory, more secondary storage, and faster and
powerful processors.
• It is also not very difficult to go for new powerful computers as the price
of computers are decreasing day by day.
Multi-platform capability
• Today’s software applications are not developed for just one platform.
Most of the software applications supports multiple platforms— both
hardware and software platforms.
• There are software applications that support hardware platforms ranging
from mainframes to PCs and different software platforms like MVS,
Solaris, AIX, UNIX, Windows and so on.
• Database like IBM’s DB2 Universal is available for a variety of hardware
and software platforms.
• Another important feature of today’s software application is that they
support multiple languages and multiple currencies.
• Many vendors are providing their application in many languages like
English, Arabic, Japanese and Chinese and so on.
Network Capabilities
• Network computers are becoming popular as they can work with minimal
memory, disk storage and processor power.
• These computers are connected to a network especially the Internet. The
idea behind network computers is that many users who are connected to a
network don’t need all the computer power they get from a typical personal
computer.
• Instead, they can rely on the power of the network servers.
• As the popularity of network computers increase, the demand for software
that can run these computers are increasing and the software applications
of today and tomorrow will have that capability.
Compatibility with other software
• Now a day’s most of the software products are compatible with each other.
For example, we can import HTML documents and other text documents
into a Microsoft Word document.
• Also as newer versions of software are released, most vendors maintain
backward
compatibility i.e. compatibility with earlier versions.
• These two features— backward compatibility and compatibility with other
products make it easier for the users, as they can choose the application
they want and still use the old files they created using other
applications or using older versions of the same application.
• Collecting data is the first step in data processing. Data is pulled from
available sources, including data lakes and data warehouses.
• It is important that the data sources available are trustworthy and well-built
so the data collected (and later used as information) is of the highest
possible quality.
2. Data preparation
• Once the data is collected, it then enters the data preparation stage.
• Data preparation, often referred to as “pre-processing” is the stage at which
raw data is cleaned up and organized for the following stage of data
processing.
• During preparation, raw data is diligently checked for any errors. The
purpose of this step is to eliminate bad data (redundant, incomplete, or
incorrect data) and begin to create high-quality data for the best business
intelligence.
3. Data input
• The clean data is then entered into its destination (perhaps a CRM
like Salesforce or a data warehouse like Redshift), and translated into a
language that it can understand.
• Data input is the first stage in which raw data begins to take the form of
usable information.
4. Processing
• During this stage, the data inputted to the computer in the previous stage is
actually processed for interpretation.
• Processing is done using machine learning algorithms, though the process
itself may vary slightly depending on the source of data being processed
(data lakes, social networks, connected devices etc.) and its intended use
(examining advertising patterns, medical diagnosis from connected
devices, determining customer needs, etc.).
5. Data output/interpretation
6. Data storage
DATA MANAGEMENT
• Data are organized in a hierarchy that begins with the smallest piece of data
used by a computer—for purposes of this discussion, a single character
such as a letter or number.
• Characters form fields such as names, telephone numbers, addresses, and
purchases. A collection of fields makes up a record.
• A collection of records is referred to as a file. Integrated and related files
make up a database.
• An entity is a class of people, objects, or places for which data are stored
or collected. Examples include employees and customers.
• Consequently, data are stored as entities, such as an employee database and
a customer database. An attribute is a characteristic of an entity.
• For example, the name of a customer is an attribute of a customer.
• A specific value of an attribute is referred to as a data item. That is, data
items are found in fields.
• The traditional approach to data management consists of maintaining
separate data files for each application.
• For example, an employee file would be maintained for payroll purposes,
while an additional employee file might be maintained for newsletter
purposes.
• One or more data files are created for each application. However,
duplicated file results in data redundancy.
• The problem with data redundancy is the possibility that updates are
accomplished in one file but not in another, resulting in a lack of data
integrity.
• Likewise, maintaining separate files is generally inefficient because the
work of updating and managing the files is duplicated for each separate file
that exists.
• To overcome potential problems with traditional data management, the
database approach was developed.
• The database approach is such that multiple business applications access
the same database.
• Consequently, file updates are not required of multiple files. Updates can
be accomplished in the common database, thus improving data integrity
and eliminating redundancy.
• The database approach provides the opportunity to share data, as well as
information sources.
• Additional software is required to implement the database approach to data
management.
• A database management system (DBMS) is needed.
• A DBMS consists of a group of programs that are used in an interface
between a database and the user, or between the database and the
application program.
DATABASE MODELS
• The structure of the relationships in most databases follows one of three
logical database models: hierarchical, network, and relational.
• A hierarchical database model is one in which the data are organized in a
top-down or inverted tree-like structure.
• This type of model is best suited for situations where the logical
relationships between data can be properly represented with the one-
parent-many-children approach.
• A network model is an extension of the hierarchical database model.
• The network model has an owner-member relationship in which a member
may have many owners, in contrast to a one-to-many-relationship.
• A relational model describes data using a standard tabular format.
• All data elements are placed in two-dimensional tables called relations,
which are the equivalent of files.
• Data inquiries and manipulations can be made via columns or rows given
specific criteria.
• Network database models tend to offer more flexibility than hierarchical
models.
• However, they are more difficult to develop and use because of relationship
complexity.
• The relational database model offers the most flexibility, and was very
popular during the early 2000s.
CREATE: to create a database and its objects like (table, index, views, store
procedure, function, and triggers)
ALTER: alters the structure of the existing database
DROP: delete objects from the database
TRUNCATE: remove all records from a table, including all spaces allocated for
the records are removed
COMMENT: add comments to the data dictionary
RENAME: rename an object
DML is short name of Data Manipulation Language which deals with data
manipulation and includes most common SQL statements such SELECT,
INSERT, UPDATE, DELETE, etc., and it is used to store, modify, retrieve, delete
and update data in a database.
SELECT: retrieve data from a database
INSERT: insert data into a table
UPDATE: updates existing data within a table
DELETE: Delete all records from a database table
MERGE: UPSERT operation (insert or update)
CALL: call a PL/SQL or Java subprogram
EXPLAIN PLAN: interpretation of the data access path
LOCK TABLE: concurrency Control
Super Key – A super key is a set of one of more columns (attributes) to uniquely
identify rows in a table.
Alternate Key – Out of all candidate keys, only one gets selected as primary key,
remaining keys are known as alternate or secondary keys.
Composite Key – A key that consists of more than one attribute to uniquely
identify rows (also known as records & tuples) in a table is called composite key.
Foreign Key – Foreign keys are the columns of a table that points to the primary
key of another table. They act as a cross-reference between tables.
TYPES OF DBMS
Hierarchical DBMS
Network Model
• The network database model allows each child to have multiple parents.
• It helps you to address the need to model more complex relationships like
as the orders/parts many-to-many relationship.
• In this model, entities are organized in a graph which can be accessed
through several paths.
Relational model
• Relational DBMS is the most widely used DBMS model because it is one
of the easiest.
• This model is based on normalizing data in the rows and columns of the
tables.
• Relational model stored in fixed structures and manipulated using SQL.
Object-Oriented Model
Advantages of DBMS
Disadvantage of DBMS
• Although, DBMS system is useful. It is still not suited for specific task
mentioned below:
• Not recommended when you do not have the budget or the expertise to
operate a DBMS. In such cases, Excel/CSV/Flat Files could do just fine.
DATABASE DESIGN
• Database design is a collection of processes that facilitate the designing,
development, implementation and maintenance of enterprise data
management systems.
• Properly designed database is easy to maintain, improves data consistency
and are cost effective in terms of disk storage space.
• The database designer decides how the data elements correlate and what
data must be stored.
• The main objectives of database designing are to produce logical and
physical designs models of the proposed database system.
• The logical model concentrates on the data requirements and the data to be
stored independent of physical considerations.
• It does not concern itself with how the data will be stored or where it will
be stored physically.
• The physical data design model involves translating the logical design of
the database onto physical media using hardware resources and software
systems such as database management systems (DBMS).
Note, the genius of a database is in its design. Data operations using SQL is
relatively simple
Requirements analysis
Database designing
Implementation
• Data conversion and loading - this stage is concerned with importing and
converting data from the old system into the new database.
• Testing - this stage is concerned with the identification of errors in the
newly implemented system .It checks the database against requirement
specifications.
Unit-IV
Introduction to Telecommunication-Networking-Communication System-
Distributed System-Internet-Intranet
NETWORKS
• Networking, also known as computer networking, is the practice of
transporting and exchanging data between nodes over a shared medium in
an information system.
• Networking comprises not only the design, construction and use of a
network, but also the management, maintenance and operation of the
network infrastructure, software and policies.
• Computer networking enables devices and endpoints to be connected to
each other on a local area network (LAN) or to a larger network, such as
the internet or a private wide area network (WAN).
• This is an essential function for service providers, businesses and
consumers worldwide to share resources, use or offer services, and
communicate.
• Networking facilitates everything from telephone calls to text messaging
to streaming video to the internet of things (IoT).
• The level of skill required to operate a network directly correlates to the
complexity of a given network.
• For example, a large enterprise may have thousands of nodes and rigorous
security requirements, such as end-to-end encryption, requiring specialized
network administrators to oversee the network.
• At the other end of the spectrum, a layperson may set up and perform basic
troubleshooting for a home Wi-Fi network with a short instruction manual.
Both examples constitute computer networking.
TYPES OF NETWORKING
COMPONENTS OF NETWORKING
• It considers that something may be and will be lost in the process; hence
the term ‘telecommunication’ includes all kinds of distances and all kinds
of techniques such as radio, telegraphy, television, telephony, data
communication, and computer networking.
Telecommunication System
• We can define telecommunication as, communicating information such as
data, text, pictures, voice, audio, video, feelings, thoughts over a long
distance.
• The medium for such signal transmission can be thro electrical wire or
cable (also known as “copper”), optical fibre or ether etc.
Messages
• The message can be voice, music, Data, Video, Temperature, Light,
Pressure etc
Input Transducer
• The input can be in any energy form (temperature, pressure, light) but for
transmission purposes, this needs to be converted to electrical energy.
Transducer does this.
Modulator
• Translates the input signal to a higher frequency spectrum and also
modulates (camouflages) the signal to combat noise (Amplitude
Modulation, Freq Modulation, Phase Modulation, PCM, Delta
Modulation, ASK, FSK, PSK, QPSK, QAM, GMSK, etc). The output can
be analog or digital (thro A/D converters).
Transmitter
• It converts information into a signal that is suitable for transmission over a
medium.
• Transmitter increases the power of the signal thro power amplifiers and
also provides interfaces to match the transmission medium, such as an
antenna interface, fiber interface and so on.
Antenna
• If it is wireless communication, antenna propagates (radiates) the signal
through the air (atmosphere)
Channel
• A channel in a communication system just refers to the medium through
which an electrical signal travel.
• These media are classified into two types such as guided as well as
unguided. Guided media can be directed from a source in the direction of
the receiver by using connecting cables.
• In OFC-optical fibre communication, an optical fibre is a medium.
• Additional guided media may comprise telephone wire, coaxial cable, and
twisted pairs, etc.
• The second type of media namely unguided media that refers to a
communication channel which forms space among the source as well as
the receiver.
• In RF communication, the medium is space which is called air.
• It is the only thing among the source & receiver whereas in further cases
such as sonar, the medium is generally water since sound waves tour
powerfully through assured liquid media.
• The two types of Medias are measured unguided for the reason that there
are no connecting wires between the source as well as the receiver.
Noise
• Noise is the challenge for communication engineers.
• The word “Optical” stands for light. As the name itself suggests,
optical communication system depends on light as the medium for
communication.
• The receiver also with the help of an antenna receives the signal.
• When you interact with your friend over the telephone, both of you
can listen to each other at the same time.
• The sender sends the signals to the receiver who receives it then and
there and also give his valuable feedback to the speaker for him to
respond.
• The sender has to stop sending the signals to the recipient and then
only the recipient can respond.
• He needs to speak the security code correctly for the other person to
speak.
• The other party will never communicate unless and until the code is
correct and complete.
DISTRIBUTED SYSTEMS
1. Each machine works toward a common goal and the end-user views results
as one cohesive unit.
2. Each machine has its own end-user and the distributed system facilitates
sharing resources or communication services.
Distributed systems generally fall into one of four different basic architecture
models:
INTERNET
• The Internet, sometimes called simply "the Net," is a worldwide system of
computer networks -- a network of networks in which users at any one
computer can, if they have permission, get information from any other
computer (and sometimes talk directly to users at other computers).
• The original aim was to create a network that would allow users of a
research computer at one university to "talk to" research computers at other
universities.
• Physically, the Internet uses a portion of the total resources of the currently
existing public telecommunication networks.
• The protocols, such as the TCP/IP suite, present sets of rules that devices
must follow in order to complete tasks.
• The protocols are also responsible for translating the alphabetic text of a
message into electronic signals that can be transmitted over the Internet,
and then back again into legible, alphabetic text.
• The transmission lines that exchange the data can either be wireless signals
from satellites or 4G and cell phone towers, or physical lines, such as
cables and fibre optics.
• When one device attempts to send a message to another device, the data is
sent over the Internet in the form of manageable packets.
• Each packet is assigned a port number that will connect it to its endpoint.
• A packet that has both a unique IP address and port number can be
translated from alphabetic text into electronic signals by travelling through
the layers of the OSI model from the top application layer to the
bottom physical layer.
• The message will then be sent over the Internet where it is received by the
Internet service provider's (ISP) router.
• The router will examine the destination address assigned to each packet
and determine where to send it.
• Eventually, the packet reaches the client and travels in reverse from the
bottom physical layer of the OSI model to the top application layer.
• During this process, the routing data -- the port number and IP address --
is stripped from the packet, thus allowing the data to be translated back into
alphabetic text and completing the transmission process.
USES OF THE INTERNET
• The key difference between the Internet and the World Wide Web (WWW
or the Web) is that the Internet is a global connection of networks while
the Web is a collection of information that can be accessed using the
Internet. In other words, the Internet is the infrastructure and the Web is a
service on top.
• The Web is the most widely used part of the Internet. Its outstanding
feature is hypertext, a method of instant cross-referencing.
• When a user selects one of these words or phrases, they will be transferred
to the related site or page. Buttons, images, or portions of images are also
used as hyperlinks.
• Hackers and crackers can break into networks and systems and steal
information such as login information or bank and credit card account
records.
• While this anonymity can be a great way to protect an online user's security
and free speech or for the government to keep classified data hidden, the
dark web also creates an environment that facilitates cybercrime, the
transfer of illegal goods and terrorism.
• The social impact of the Internet can be seen as both positive and negative.
• On one side, people argue that the Internet has increased the risk of
isolation, alienation and withdrawal from society, pointing to increases in
an emotional response called FOMO, or the fear of missing out.
• On the other side, people believe the Internet to have had the opposite
effect on society, arguing that the Internet increases civic engagement,
sociability and the intensity of relationships.
• Whether the impacts are good or bad, the Internet has changed the way
society interacts and connects.
• Social networking sites -- like Facebook and LinkedIn -- have become the
preferred platforms for both businesses and individuals looking to perform
all kinds of tasks and communicate with others.
• The ARPANet, the predecessor of the Internet, was first deployed in 1969.
In 1983, the ARPANet transitioned into using the TCP/IP open networking
protocol suite and in 1985, the National Science Foundation Network
(NSFN) designed the network to connect university computer science
departments around the country.
• The Internet has continued to grow and evolve over the years of its
existence. IPv6, for example, was designed to anticipate enormous future
expansion in the number of available IP addresses.
INTRANET
BENEFITS
• Intranet is very efficient and reliable network system for any organization.
It is beneficial in every aspect such as collaboration, cost-effectiveness,
security, productivity and much more.
COMMUNICATION
Intranet offers easy and cheap communication within an organization.
Employees can communicate using chat, e-mail or blogs.
Time Saving
• Information on Intranet is shared in real time.
Collaboration
• Information is distributed among the employees as according to
requirement and it can be accessed by the authorized users, resulting in
enhanced teamwork.
Platform Independency
• Intranet can connect computers and other devices with different
architecture.
Cost Effective
• Employees can see the data and other documents using browser rather
than printing them and distributing duplicate copies among the employees,
which certainly decreases the cost.
Workforce Productivity
• Data is available at every time and can be accessed using company
workstation. This helps the employees work faster.
Business Management
• It is also possible to deploy applications that support business operations.
Security
• Since information shared on intranet can only be accessed within an
organization, therefore there is almost no chance of being theft.
Specific Users
• Intranet targets only specific users within an organization therefore, once
can exactly know whom he is interacting.
Immediate Updates
• Any changes made to information are reflected immediately to all the
users.
Issues
• Apart from several benefits of Intranet, there also exist some issues..
These issues are shown in the following diagram:
APPLICATIONS
• Intranet applications are same as that of Internet applications. Intranet
applications are also accessed through a web browser.
• The only difference is that, Intranet applications reside on local server
while Internet applications reside on remote server.
• Apart from similarities there are some differences between the two.
Following are the differences between Internet and Intranet:
Intranet Internet
• The simplest form of virtual reality is a 3-D image that can be explored
interactively at a personal computer, usually by manipulating keys or the
mouse so that the content of the image moves in some direction or zooms
in or out.
The Virtual Reality Modelling Language (VRML) allows the creator to specify
images and the rules for their display and interaction using textual language
statements.
Ecommerce
• Ecommerce, also known as electronic commerce or internet commerce,
refers to the buying and selling of goods or services using the internet,
and the transfer of money and data to execute these transactions.
• The history of ecommerce begins with the first ever online sale: on the
August 11, 1994 a man sold a CD by the band Sting to his friend through
his website Net Market, an American retail platform.
• Global retail ecommerce sales are projected to reach $27 trillion by 2020.
There are four main types of ecommerce models that can describe almost every
transaction that takes place between consumers and businesses.
Examples of Ecommerce
Ecommerce can take on a variety of forms involving different transactional
relationships between businesses and consumers, as well as different objects
being exchanged as part of these transactions.
1. Retail:
The sale of a product by a business directly to a customer without any
intermediary.
2. Wholesale:
The sale of products in bulk, often to a retailer that then sells them directly to
consumers.
3. Drop shipping:
The sale of a product, which is manufactured and shipped to the consumer by a
third party.
4. Crowdfunding:
The collection of money from consumers in advance of a product being
available in order to raise the start-up capital necessary to bring it to market.
5. Subscription:
The automatic recurring purchase of a product or service on a regular basis until
the subscriber chooses to cancel.
6. Physical products:
Any tangible good that requires inventory to be replenished and orders to be
physically shipped to customers as sales are made.
7. Digital products:
Downloadable digital goods, templates, and courses, or media that must be
purchased for consumption or licensed for use.
8. Services:
A skill or set of skills provided in exchange for compensation. The service
provider’s time can be purchased for a fee.
History of Datawarehouse
• 1970- A Nielsen and IRI introduces dimensional data marts for retail
sales.
• 1983- Tera Data Corporation introduces a database management system
which is specifically designed for decision support
• Data warehousing started in the late 1980s when IBM worker Paul
Murphy and Barry Devlin developed the Business Data Warehouse.
• However, the real concept was given by Inmon Bill. He was considered
as a father of data warehouse. He had written about a variety of topics for
building, usage, and maintenance of the warehouse & the Corporate
Information Factory.
1. Structured
2. Semi-structured
3. Unstructured data
• The data is processed, transformed, and ingested so that users can access
the processed data in the Data Warehouse through Business Intelligence
tools, SQL clients, and spreadsheets.
• A data warehouse merges information coming from different sources into
one comprehensive database.
• By merging all of this information in one place, an organization can
analyze its customers more holistically. This helps to ensure that it has
considered all the information available. Data warehousing makes data
mining possible. Data mining is looking for patterns in the data that may
lead to higher sales and profits.
Operational Data Store, which is also called ODS, are nothing but data store
required when neither Data warehouse nor OLTP systems support organizations
reporting needs. In ODS, Data warehouse is refreshed in real time. Hence, it is
widely preferred for routine activities like storing records of the Employees.
3. Data Mart:
In this stage, data is just copied from an operational system to another server. In
this way, loading, processing, and reporting of the copied data do not impact the
operational system's performance.
Offline Data Warehouse:
In this stage, Data warehouses are updated whenever any transaction takes place
in operational database. For example, Airline or railway booking system.
In this stage, Data Warehouses are updated continuously when the operational
system performs a transaction. The Datawarehouse then generates transactions
which are passed back to the operational system.
Load manager: Load manager is also called the front component. It performs
with all the operations associated with the extraction and load of data into the
warehouse. These operations include transformations to prepare the data for
entering into the Data warehouse.
This is categorized into five different groups like 1. Data Reporting 2. Query
Tools 3. Application development tools 4. EIS tools, 5. OLAP tools and data
mining tools.
Airline:
In the Airline system, it is used for operation purpose like crew assignment,
analyses of route profitability, frequent flyer program promotions, etc.
Banking:
Healthcare sector also used Data warehouse to strategize and predict outcomes,
generate patient's treatment reports, share data with tie-in insurance companies,
medical aid services, etc.
Public sector:
In the public sector, data warehouse is used for intelligence gathering. It helps
government agencies to maintain and analyze tax records, health policy records,
for every individual.
In this sector, the warehouses are primarily used to analyze data patterns,
customer trends, and to track market movements.
Retain chain:
In retail chains, Data warehouse is widely used for distribution and marketing. It
also helps to track items, customer buying pattern, promotions and also used for
determining pricing policy.
Telecommunication:
A data warehouse is used in this sector for product promotions, sales decisions
and to make distribution decisions.
Hospitality Industry:
9 Extract Data from Operational Data Store Integrated D/W Data Extracts
• Decide a plan to test the consistency, accuracy, and integrity of the data.
• The data warehouse must be well integrated, well defined and time
stamped.
• While designing Datawarehouse make sure you use right tool, stick to life
cycle, take care about data conflicts and ready to learn you're your
mistakes.
• Never replace operational systems and reports
• Don't spend too much time on extracting, cleaning and loading data.
• Ensure to involve all stakeholders including business personnel in
Datawarehouse implementation process. Establish that Data warehousing
is a joint/ team project. You don't want to create Data warehouse that is
not useful to the end users.
• Prepare a training plan for the end users.
• Data warehouse allows business users to quickly access critical data from
some sources all in one place.
• Data warehouse provides consistent information on various cross-
functional activities. It is also supporting ad-hoc reporting and query.
• Data Warehouse helps to integrate many sources of data to reduce stress
on the production system.
• Data warehouse helps to reduce total turnaround time for analysis and
reporting.
• Restructuring and Integration make it easier for the user to use for
reporting and analysis.
• Data warehouse allows users to access critical data from the number of
sources in a single place. Therefore, it saves user's time of retrieving data
from multiple sources.
• Data warehouse stores a large amount of historical data. This helps users
to analyze different time periods and trends to make future predictions.
There are many Data Warehousing tools are available in the market. Here, are
some most prominent one:
1. MarkLogic:
http://developer.marklogic.com/products
2. Oracle:
https://www.oracle.com/index.html
3. Amazon RedShift:
https://aws.amazon.com/redshift/?nc2=h_m1
The financial data in banking and financial industry is generally reliable and of
high quality which facilitates systematic data analysis and data mining. Some of
the typical cases are as follows −
• Design and construction of data warehouses for multidimensional data
analysis and data mining.
• Loan payment prediction and customer credit policy analysis.
• Classification and clustering of customers for targeted marketing.
• Detection of money laundering and other financial crimes.
Retail Industry
• Data Mining has its great application in Retail Industry because it collects
large amount of data from on sales, customer purchasing history, goods
transportation, consumption and services.
• It is natural that the quantity of data collected will continue to expand
rapidly because of the increasing ease, availability and popularity of the
web.
• Data mining in retail industry helps in identifying customer buying
patterns and trends that lead to improved quality of customer service and
good customer retention and satisfaction.
Here is the list of examples of data mining in the retail industry −
• Design and Construction of data warehouses based on the benefits of data
mining.
• Multidimensional analysis of sales, customers, products, time and region.
• Analysis of effectiveness of sales campaigns.
• Customer Retention.
• Product recommendation and cross-referencing of items.
Telecommunication Industry
In recent times, we have seen a tremendous growth in the field of biology such
as genomics, proteomics, functional Genomics and biomedical research.
Biological data mining is a very important part of Bioinformatics. Following are
the aspects in which data mining contributes for biological data analysis −
• Semantic integration of heterogeneous, distributed genomic and proteomic
databases.
• Alignment, indexing, similarity search and comparative analysis multiple
nucleotide sequences.
• Discovery of structural patterns and analysis of genetic networks and
protein pathways.
• Association and path analysis.
• Visualization tools in genetic data analysis.
Scientific Applications
The applications discussed above tend to handle relatively small and
homogeneous data sets for which the statistical techniques are appropriate. Huge
amount of data have been collected from scientific domains such as geosciences,
astronomy, etc. A large amount of data sets is being generated because of the
fast numerical simulations in various fields such as climate and ecosystem
modeling, chemical engineering, fluid dynamics, etc. Following are the
applications of data mining in the field of Scientific Applications −
Intrusion Detection
There are many data mining system products and domain specific data mining
applications. The new data mining systems and applications are being added to
the previous systems. Also, efforts are being made to standardize data mining
languages.
Data mining concepts are still evolving and here are the latest trends that we get
to see in this field −
• Application Exploration.
• Scalable and interactive data mining methods.
• Integration of data mining with database systems, data warehouse systems
and web database systems.
• SStandardization of data mining query language.
• Visual data mining.
• New methods for mining complex types of data.
• Biological data mining.
• Data mining and software engineering.
• Web mining.
• Distributed data mining.
• Real time data mining.
• Multi database data mining.
• Privacy protection and information security in data mining.
GIS is more than just software. People and methods are combined with
geospatial software and tools, to enable spatial analysis, manage large datasets,
and display information in a map/graphical form.
1. Mapping where things are. We can map the spatial location of real-world
features and visualize the spatial relationships among them. Example: below we
see a map of frac sand mine locations and sandstone areas in Wisconsin. We
can see visual patterns in the data by determining that frac sand mining activity
occurs in a region with a specific type of geology.
2. Mapping quantities. People map quantities, such as where the most and
least are, to find places that meet their criteria or to see the relationships
between places.
Example: below is a map of cemetery locations in Wisconsin. The map shows
the cemetery locations as dots (dot density) and each county is color coded to
show where the most and least are (lighter blue means fewer cemeteries).
APPLICATIONS OF COMPUTER
Home
Education
The computer helps in providing a lot of facilities in the education system.
• The computer provides a tool in the education system known as CBE
(Computer Based Education).
• CBE involves control, delivery, and evaluation of learning.
• Computer education is rapidly increasing the graph of number of computer
students.
• There are a number of methods in which educational institutions can use a
computer to educate the students.
• It is used to prepare a database about performance of a student and analysis
is carried out on this basis.
Entertainment
Most of the persons are using computer for entertainment purposes such as:
• watching movies
• watching videos
• listening songs
• photos
• animations etc.
Computer can be used to create these things in an attractive manner so that user
loves to enjoy the things.
Science
Medicine
• Computers have become an important part in hospitals, labs, and
dispensaries.
• They are being used in hospitals to keep the record of patients and
medicines.
• It is also used in scanning and diagnosing different diseases. ECG, EEG,
ultrasounds and CT scans, etc. are also done by computerized machines.
Following are some major fields of health care in which computers are used.
• Diagnostic System − Computers are used to collect data and identify the
cause of illness.
• Lab-diagnostic System − All tests can be done and the reports are
prepared by computer.
• Patient Monitoring System − These are used to check the patient's signs
for abnormality such as in Cardiac Arrest, ECG, etc.
• Pharma Information System − Computer is used to check drug labels,
expiry dates, harmful side effects, etc.
• Surgery − Nowadays, computers are also used in performing surgery.
Engineering
• Computers are widely used for Engineering purpose.
• One of the major areas is CAD (Computer Aided Design) that provides
creation and modification of images. Some of the fields are −
• Structural Engineering − Requires stress and strain analysis for design
of ships, buildings, budgets, airplanes, etc.
• Industrial Engineering − Computers deal with design, implementation,
and improvement of integrated systems of people, materials, and
equipment.
• Architectural Engineering − Computers help in planning towns,
designing buildings, determining a range of buildings on a site using both
2D and 3D drawings.
Business
• Payroll calculations
• Budgeting
• Sales analysis
• Financial forecasting
• Managing employee database
• Maintenance of stocks, etc.
Banking
Military
• Computers are largely used in defence. Modern tanks, missiles, weapons,
etc. Military also employs computerized control systems. Some military
areas where a computer has been used are −
• Missile Control
• Military Communication
• Military Operation and Planning
• Smart Weapons
Communication
• E-mail
• Chatting
• Usenet
• FTP
• Telnet
• Video-conferencing
Government
Now-a-days, peoples are using computers most of the time to play games.For
online games to play, you must have the internet connectivity whereas for
offline games, you can start without any internet connectivity.
There are a variety of games available in computer world. Here are some of the
category available in the game field:
• action
• racing
• adventurous
• puzzle
• simulations
• combat etc.