Computer Application Study Material
Computer Application Study Material
CONTENTS
2 BIBS
Fundamentals of Computer Computer Applications for Business
FUNDAMENTALS OF COMPUTER
Objectives
After completion of this unit you should be able to
3 BIBS
Computer Applications for Business Fundamentals of Computer
Introduction
Computer is an advanced electronic device that takes raw data as input from the user and
processes these data under the control of set of instructions (called program) and gives the
result (output) and saves output for the future use. It can process both numerical and non-
numerical (arithmetic and logical) calculations. A computer has four functions:
Input (Data): Input is the raw information entered into a computer from the input devices. It
is the collection of letters, numbers, images etc.
Process: Process is the operation of data as per given instruction. It is totally internal process
of the computer system.
Output: Output is the processed data given by computer after data processing. Output is
also called as result. We can save these results in the storage devices for the future use.
4 BIBS
Fundamentals of Computer Computer Applications for Business
Characteristics of Computer:
Computer is a versatile device. It can be designed to do any kind of activity provided all data
and instructions are made available to it in digital form. The important characteristics of
computer are:
Huge storage and fast retrieval: Computer has huge storage capability. For a
personal computer, 128 MB RAM is almost a standard toady. The main memory can
be upgraded further by inserting RAM chips that are available in modules of 64 MB,
128 MB and so on. Cache memory is also available in Pc. Cache memory is faster
access memory device and hence it improves processor performance. Secondary or
auxiliary storage devices are used for permanent storage. Modern computers have
enormous secondary storage capacity, e.g., a PC hard disk can store more than 80
GB of data. Pen drives, DVDs, CD-ROMs, CD-Rs, magnetic tapes etc. are other
secondary storage devices. A CD-ROM can store 650 MB and more of data on a
single disk.
Versatility: Initially computer was designed to carry out only arithmetic operations.
By regular Upgradation now computer can perform multiple activities. They are
capable of performing almost any task that has a series of finite logical steps.
Computers can be used for communications, process control, research, weather
forecasting, healthcare, online trading, education, training, defense applications and
so on.
Free from fatigue: Computer is free from fatigue. It does not get tired of work and
never loses concentration. It can perform basic arithmetic operations with the same
degree of speed and accuracy for any extent of time continuously, with the same
amount of efficiency as the first transaction. That enhances the usability of
computer. Huge volume of calculations can be done on computers without any fear
of loss of data.
5 BIBS
Computer Applications for Business Fundamentals of Computer
Components of Computer
As per Charles Babbage’s basic structure of computer have components to receive inputs,
process inputs and communicate the outputs with users. The system is organized as follows:
Central Processing Unit (CPU): CPU is the most important component of a computer. It
typically consists of a control unit (CU), arithmetic and logical unit (ALU) and a primary
storage. CPU is the brain of a computer and all processing takes place in the CPU.
• Von Neumann Architecture: Model for designing and building computers, based on
the following three characteristics:
• Memory
• ALU (Arithmetic/Logic Unit)
• Control Unit
• Input / Output System (I/O)
2) Program is stored in memory during execution.
3) Program instructions are executed sequentially
6 BIBS
Fundamentals of Computer Computer Applications for Business
Magnetic tape,
magnetic disc,
optical disk
Primary memory
7 BIBS
Computer Applications for Business Fundamentals of Computer
Arithmetic Logic Unit (ALU): ALU does all the arithmetic and logical operations.
Arithmetical operations involve manipulation of numerical data such as addition,
subtraction, division and multiplication. Logical operations compare relative magnitudes of
two numeric, alphabetic or alphanumeric data items such as greater than, less than, and
equal to.
• carry-in
• carry-out,
• overflow,
• division-by-zero
• And . . .
8 BIBS
Fundamentals of Computer Computer Applications for Business
Function of ALU: An ALU performs basic arithmetic and logic operations. Examples of
arithmetic operations are addition, subtraction, multiplication, and division. Examples of
logic operations are comparisons of values such as NOT, AND, and OR. All information in a
computer is stored and manipulated in the form of binary numbers, i.e. 0 and 1.
Transistor switches are used to manipulate binary numbers, since there are only two
possible states of a switch: open or closed. An open transistor, through which there is no
current, represents a 0. A closed transistor, through which there is a current, represents a 1.
Operations can be accomplished by connecting multiple transistors. One transistor can be
used to control a second one, in effect turning the transistor switch on or off depending on
the state of the second transistor. This is referred to as a gate, because the arrangement can
be used to allow or stop a current.
9 BIBS
Computer Applications for Business Fundamentals of Computer
Control Unit (CU): The control unit controls and co-ordinates all the operations of the CPU
and peripheral devices. Its functions are to ensure that the program instructions are carried
out in the desired sequence and to control and co-ordinate the flow of data between the
CPU and the input-output devices.
The Instruction Cycle: The Instruction Fetch Execute Cycle is one of the most important
mental models of computation as aptly put by Prof. Rockford Ross. This embodies the basic
principle of how all modern processors work. This functional model has remained more or
less the same over the decades no matter how and when the development of processors
have taken place ever since the days of Von Newmann architecture to today’s Super
computers.
The principles are fairly simple and can be easily generalized to any processor or Operating
System. It further proceeds to explain what happens when a computer is first switched on till
the time it is ready to accept instructions from the user.
Once a computer has been powered on it performs a continuous cycle of the following:
10 BIBS
Fundamentals of Computer Computer Applications for Business
An instruction as the name instructs the computer what to do. In simple terms, every line of
a program that we as users write instructs the computer to perform a series of operations.
We may argue that our programs comprise of the instructions belonging to one of those of
the High Level Languages like C, C++, Java etc. A computer understand these high level
instructions by converting them into a machine understandable form known as machine
language comprising of 1’s and 0’s. Thus the following instruction in C
int cnt;
cnt = cnt +2;
may get translated into the corresponding machine language as:
000101010101111101010101010000000111111…..
Users would not be able to understand this machine language. To make better sense we
resort to Assembly Language where each machine language instruction is assigned a code
known as a mnemonic. So instead of remembering some string of 0's and 1's, the
programmer would only need to remember short codes like ADD, MOV etc.
The above mnemonic means to move the value of the hexadecimal number 21 into a
register called al. These mnemonics are in turn converted into machine instructions.
11 BIBS
Computer Applications for Business Fundamentals of Computer
Start
Fetch instruction
Execute instruction
Start
Fetch instruction
Decode instruction
Fetch operand
Execute instruction
12 BIBS
Fundamentals of Computer Computer Applications for Business
Instruction Fetch Execute Cycle: A more complete form of the Instruction Fetch Execute
Cycle can be broken down into the following steps:
1. Fetch Cycle: The fetch cycle begins with retrieving the address stored in the Program
Counter (PC). The address stored in the PC is some valid address in the memory
holding the instruction to be executed. (In case this address does not exist we would
end up causing an interrupt or exception).The CPU completes this step by fetching
the instruction stored at this address from the memory and transferring this
instruction to a special register – Instruction Register (IR) to hold the instruction to
be executed. The program counter is incremented to point to the next address from
which the new instruction is to be fetched.
2. Decode Cycle: The decode cycle is used for interpreting the instruction that was
fetched in the Fetch Cycle. The operands are retrieved from the addresses if the
need be.
3. Execute Cycle: This cycle as the name suggests, simply executes the instruction that
was fetched and decoded.
4. Interrupt Cycle: An interrupt can occur any time during the program execution.
Whenever it is caused, a series of events take place so that the instruction fetch
execute cycle can again resume after the OS calls the routine to handle the
interrupt. Therefore, when an interrupt occurs, the following steps are performed by
the OS:
Suspend the execution of current instruction
Loading the PC with the address of the interrupt handler. This starts the
Instruction Fetch Execute cycle again for the instructions in the Interrupt
handler.
Set the mode of operation as a privileged one often termed as the Supervisor
mode so that the OS can execute the handler.
Once the OS completes the execution of the interrupt handler, the address of
the next instruction to be executed is obtained from popping the value of the
address in the stack. The suspended instruction can now continue with its
execution.
13 BIBS
Computer Applications for Business Fundamentals of Computer
PC IR
+1 Instruction Decoder
Program Execution:
PC is set to the address where the first program instruction is stored in memory.
Repeat until HALT instruction or fatal error
Fetch instruction
Decode instruction
Execute instruction
End of loop
Fetch phase
PC --> MAR (put address in PC into MAR)
Fetch signal (signal memory to fetch value into MDR)
MDR --> IR (move value to Instruction Register)
PC + 1 --> PC (Increase address in program counter)
Decode Phase
IR -> Instruction decoder (decode instruction in IR)
Instruction decoder will then generate the signals to activate the circuitry to carry
out the instruction
Execute Phase
Differs from one instruction to the next.
Example:
LOAD X (load value in addr. X into register)
14 BIBS
Fundamentals of Computer Computer Applications for Business
15 BIBS
Computer Applications for Business Fundamentals of Computer
Computer System
All of the components of a computer system can be summarized with the simple equations.
Computer System
Hardware: the term hardware refers to all physical parts of the computer (or everything that
we can touch) are known as Hardware.
Hardware
Output
Input Secondary
Control Arithmetic Main devices
devices storage
Unit Logic Unit Memory
16 BIBS
Fundamentals of Computer Computer Applications for Business
Computer peripherals: The input/output and storage devices surround the central
processing unit (CPU). Hence, they are called the peripheral devices. They are usually the
electromechanical devices connected to the CPU that exchange data and programs with the
CPU. The users interact with the CPU through these devices. Thus, they act as interface
between users and the CPU. The CPU uses machine language, which is difficult for most
users. The input- output (1/0) devices help in taking the translated version of the input to
the machine's memory and similarly, to render the processed symbols into the language of
the user.
Input devices: Input devices allow the user to input data and instructions to the computer.
There are a variety of input devices. Direct entry of data generally requires a keyboard. It
may also use other devices for direct data entry like a touch sensitive screen, voice
recognition system and scanners. The popular input devices are as follows:
Keyboard: Keyboard is the most popular input device for direct entry of data and
instructions into computer. The standard QWERTY keyboard is used for computer. The
enhanced keyboard has 101 keys. In addition to them, the computer keyboard usually has
special keys like PageUp, PageDown, Print Screen etc. The computer keyboard is very much
like the electronic typewriter keyboard. But it has additional keys. Computer keyboard has
three types of keys:
Alphanumeric keys for typing character and numeric data
Punctuation keys like comma, period colon, semicolon, question mark etc.
Special keys like function keys, control keys, arrow keys, caps lock etc.
The keyboard is linked to the CPU and it is also linked to the computer screen so that the
data entered into the memory can be seen by the user as he types in the data.
Mouse: A mouse is a small hand-held 'point and click' device that is connected to the CPU
through a cable. With the adoption of Graphical User Interface technology, mouse became
an essential input device for computer later in the 1980's. There are three types of mouse:
mechanical,
optomechanical
optical.
Light Pen: Light pen consists of a stylus connected by a cable to the computer terminal.
When the stylus is brought into contact with the screen, a dot appears there on the
screen. By moving the stylus on the screen, lines and curves can be drawn on the screen
that can be stored and used as input.
Scanners: Scanners are direct-entry input devices. As the data entry is automatic, the
scanners ensure more accurate data entry. These scanners include optical scanners and
17 BIBS
Computer Applications for Business Fundamentals of Computer
magnetic ink character readers. The optical scanners use light for sensing input and they
include OCR, OMR and Barcode reader.
Optical Mark Reader (OMR) reads the presence or absence of a mark on a paper
optically. Light is directed on to the paper and the reflected light is analyzed for the
detection of a mark. If a mark is there on the surface of the paper, that area sends
back lesser light are to the OMR. It is used to read multiple choice answers in a test
and the data are transferred to a computer for processing.
Optical Character Reader detects shape, and can identify characters. It can examine
each character as if it were made up of a collection of minute spots. Once the whole
character has been scanned, the pattern detected is matched against a set of
patterns stored in the computer. The pattern that matches or nearly matches is
taken to be the character read. Patterns that cannot be identified are rejected. It is
used in mail sorting and credit card billing.
Output devices: Output devices return processed data that is information, back to the user.
Some of the commonly used output devices are:
Monitor (Visual Display Unit): Out of all the output devices, monitor is perhaps the
most important output device because people interact with this device most
intensively than others. Computer information is displayed, visually with a video
adapter card and monitor. Information processed within the CPU, that needs to be
visually displayed, is sent to video adapter. The video adapter converts information
from the format used, in the same manner as a television displays information sent
to it by a cable service. Two basic types of monitors are used with microcomputers:
o Cathode Ray Tube (CRT): CRT or Cathode Ray Tube Monitor is the typical
monitor on a desktop computer. It looks a lot like a television screen, and
works the same way. This type uses a large vacuum tube, called cathode ray
tube (CRT).
o Liquid Crystal Displays (LCD): This type of monitors are also known as flat
panel monitor. Most of these employ liquid crystal displays (LCDs) to render
images.
18 BIBS
Fundamentals of Computer Computer Applications for Business
Printer: After a document is created on the computer, it can be sent to a printer for
a hard copy (printout). Some printers offer special features such as colored and large
page formats. Some of the most commonly used printers are:
o Laser Printer: A laser printer produces high quality print that one normally
finds in publishing. It is extremely fast and quiet. Moreover, the operation of
a laser printer is easy with automatic paper loading and no smudging or
messing up of ink ribbons. Laser Printer can print up to 200 pages per
minute in monochrome (black and white) and up to 100 pages per minute in
colour.
o Dot Matrix Printer: The dot matrix printer was very popular at one point of
time. It is a very versatile and inexpensive output device. In dot matrix
printer the print head physically "hits" the paper through the ribbon and
produces text (or images) by combinations of dots; hence the name dot
matrix printer. Its speed is measured in characters per second (CPS).
Although it is less expensive, it is louder, slower and produces lower print
quality.
o Line Printer: A line printer is generally used with large computer systems to
produce text based data processing reports. Line printers are high-speed
printers with speeds ranging anywhere from 100 to about 3800 lines per
minute. In the past, print quality on line printers was not high.
Developments in technology are improving the print quality on line printers.
These are in the cost range of lakhs of Rupees.
Plotter: A plotter is a special kind of output device that, like a printer, produces
images on paper, but does so in a different way. Plotters are designed to produce
large drawings or images, such as construction plans for buildings or blueprints for
mechanical objects. A plotter can be connected to the port normally used by a
printer. An array of different colored pens in a clip rack and a robotic arm is part of
plotter. The instructions that a plotter receives from a computer consist of a color,
and beginning and ending coordinates for a line. With that information, the plotter
picks up the appropriate pen through its arm, positions it at the beginning
19 BIBS
Computer Applications for Business Fundamentals of Computer
coordinates drops the pen down to the surface of the paper and draws to the ending
coordinates. Plotters draw curves by creating a sequence of very short straight lines.
Plotters usually come in two designs:
o Flat Bed: Plotters of small size to be kept on table with restriction of paper
size.
o Drum: These plotters are of big size using rolls of paper of unlimited length.
Software: Computer cannot do anything on its own. It is the user who instructs computer;
what to do, how to do and when to do. In order to perform any task, asset of instructions
needs to be given to the computer in a particular sequence. These sets of instructions are
called Programs. Software refers to a set of programs that makes the hardware perform a
particular set of tasks in particular order. Software can be classified mainly into following
categories and sub-categories:
System Software: When you switch on the computer the programs stored in ROM
are executed which activates different units of your computer and makes it ready
for you to work on it. This set of programs can be called system software. System
software are sets of programs, responsible for running the computer, controlling
various operations of computer systems and management of computer resources.
Operating System (OS) falls under this category. An operating system is a system
software that provides an interface for a user to communicate with the computer,
manages hardware devices (disk drives, keyboard, monitor, etc), manages and
maintains disk file systems and supports application programs. Some popular
Operating systems are UNIX, Windows and Linux. Although operating system
provides all the features users need to use and maintain their systems, inevitably,
they still do not meet everyone’s expectations. This has led to another type of
system software called "Utilities". These are programs that bridge the gap between
the functionality of an OS and the needs of users. Utility programs are a broad
category of software such as compress (zip)/uncompress (unzip) files software,
antivirus software, split and join files software, etc
20 BIBS
Fundamentals of Computer Computer Applications for Business
o Customized packages: These are the applications that are customized (or
developed) to meet the specific requirements of an
organization/institution. For example: Student information details, Payroll
packages, inventory control etc. These packages are developed using high-
level computer language.
21 BIBS
Computer Applications for Business Fundamentals of Computer
Generations of Computer:
Based on the characteristics of various computers developed from time to time they
are categorized in five generations.
o Unreliable
o Very costly
o Huge size
o Need of A.C.
o Non-portable
o ENIAC
o EDVAC
o UNIVAC
o IBM-701
o IBM-650
22 BIBS
Fundamentals of Computer Computer Applications for Business
Second Generation (1959 – 1963): The second generation of computers used transistors
for the internal operations. They used magnetic core for the memory. These machines used
assembly language. The technology which was used in second generation computers is
called transistors, the processing was faster compared to first generation and the size was
smaller compared to first generation computers. The main features of Second Generation
are:
o Use of transistors
o A.C. needed
o IBM 1620
o IBM 7094
o CDC 1604
o CDC 3600
o UNIVAC 1108
23 BIBS
Computer Applications for Business Fundamentals of Computer
Third Generation (1963-1975): The third generation computers used integrated circuits
(IC) which used to incorporate many transistors and electronic circuits on a single chip. They
were characterized with high-level programming languages which required logic such as
BASIC, Pascal, C, COBOL, and Fortran. The processing is faster as compare to second
generation computer and it is smaller in size. The main features of Third Generation are:
o IC used
o More reliable
o Smaller size
o Faster
o Lesser maintenance
o Still costly
o A.C. needed
o IBM-360 series
o Honeywell-6000 series
o IBM-370/168
o TDC-316
24 BIBS
Fundamentals of Computer Computer Applications for Business
Fourth Generation (1975 onward): The fourth generation computers used VLSI (very
large scale integration) technology which incorporates millions of transistors and electronic
circuits on a single chip. Object-Oriented Programming (OOP) Languages such as Visual Basic,
and JAVA are characteristic of this computer generation. The main features of Fourth
Generation are:
o VLSI technology used
o Very cheap
o Portable and reliable
o Use of PC's
o Very small size
o Pipeline processing
o No A.C. needed
o Concept of internet was introduced
o Great developments in the fields of networks
o Computers became easily available
o DEC 10
o STAR 1000
o PDP 11
25 BIBS
Computer Applications for Business Fundamentals of Computer
Fifth Generation (Future technology): The period of Fifth Generation is 1980-till date. In
the fifth generation, the VLSI technology became ULSI (Ultra Large Scale integration)
technology, resulting in the production of microprocessor chips having ten million electronic
components.
AI includes:
o Robotics
o Neural networks
o Game Playing
o ULSI technology
o Desktop
o Laptop
o NoteBook
o UltraBook
o ChromeBook
26 BIBS
Fundamentals of Computer Computer Applications for Business
Types of Computer
Computers vary widely in terms of their size and purpose they serve. There are very small
computers that can be held on a palm. There are also large computers that take a whole
room to occupy. They are used by big organisations, public and private. Organisations use
computers for a variety of applications ranging from scientific to commercial in nature. The
most widely used computers are called personal computers that typically fit on a desktop.
Computers can be classified on several bases as follows.
Hybrid computer: Hybrid computer combines features of both analog and digital
computers. In this computer, some calculations are done in the analog portion of
the computer and some are done in the digital portion of it. In a hospital, for
example, analog devices may measure patient's heart function, temperature and
other vital signs. These measurements may then be converted into numbers and
supplied to a digital component in the system.
27 BIBS
Computer Applications for Business Fundamentals of Computer
28 BIBS
Fundamentals of Computer Computer Applications for Business
users at a time with multi-terminal, time-sharing system. Minis are the popular
data processing systems among the business organisations today. They have
many uses in business such as payroll processing, process control, invoicing, and
stock control. They are mainly used as departmental computers in large and
medium-sized organisations. They are also used in government departments,
universities and R & D establishments.
Supercomputer: It is the fastest and the most expensive computer. This has
extremely large storage capacities and computing speeds that are at least ten
times faster than that of other computers. It can perform hundreds of millions of
instructions per second. The super computer is used for specialized applications
such as large-scale numerical problems in scientific and engineering disciplines.
These include applications in electronics, petroleum engineering, weather
forecasting, medicine and nuclear energy research.
Computer Memory
Computer memory
29 BIBS
Computer Applications for Business Fundamentals of Computer
Random Access Memory: RAM or Random Access Memory is the central storage
unit in a computer system. It is the place in a computer where the operating system,
application programs and the data in current use are kept temporarily so that they can be
accessed by the computer’s processor. The more RAM a computer has, the more data a
computer can manipulate. Random access memory, also called the Read/Write memory, is
the temporary memory of a computer. It is said to be ‘volatile’ since its contents are
accessible only as long as the computer is on. The contents of RAM are cleared once the
computer is turned off.
Dynamic Random Access Memory (DRAM): It is one of the least expensive RAMs. But it
requires frequent power refreshing to retain memory contents.
SDRAM (Synchronous Dynamic Random Access Memory): It is a generic name for the
types of DRAM that are synchronized with the clock speed of the processor. The speed
of SDRAM is measured in terms of Megahertz. If the speed of the SDRAM and processor
is optimized, the processor can improve its performance.
Static RAM: It does not need frequent power refreshing as is required for DRAM.
Hence, it is much faster than DRAM. But, it is more expensive than DRAM.
Video RAM: It is used to store data for the video display monitor. It is actually a buffer
between the processor and the monitor.
ROM or Read Only Memory: It is a special type of memory which can only be read
and contents of which are not lost even when the computer is switched off. It typically
contains manufacturer’s instructions. Among other things, ROM also stores an initial
program called the ‘bootstrap loader’ whose function is to start the computer software
operating, once the power is turned on. Read-only memories can be manufacturer-
programmed or user-programmed.
30 BIBS
Fundamentals of Computer Computer Applications for Business
Cache memory: Processors are generally able to perform operations on operands faster
than the access time of large capacity main memory. Though semiconductor memory which
can operate at speeds comparable with the operation of the processor exists, it is not
economical to provide all the main memory with very high speed semiconductor memory.
The problem can be solved by introducing a small block of high speed memory called a cache
between the main memory and the processor.
The CPU searches cache before it searches main memory for data and instructions. Cache is
physically located close to the CPU and hence access to cache is faster than to any other
memory. Often used instructions are kept in this cache to speed up the fetching of
instructions. Some processors use the cache as a work area also for temporary storage of
intermediate results.
Registers: The computer uses a number of special memory units called registers to speed
up the rate of information transfer between various units of the computer. They are not
treated as part of main memory and are used to retain information on a temporary basis.
The number of registers varies from computer to computer. Most computers use several
types of registers each designed to perform a specific function. These registers can receive
information, retain it temporarily and pass it on as directed by the control unit. The length of
31 BIBS
Computer Applications for Business Fundamentals of Computer
a register depends on the number of bits it can store. Thus a register which can store 16 bits
is normally referred to as 16-bit register. Although the number of registers varies from
computer to computer, some registers are common to all computers such as instruction
register, program counter register, etc.
Memory address register: This holds the address of the active memory location. When
an instruction is read from memory, the address is loaded from the program into this
register.
Memory buffer register: It holds the contents of the memory word read from or written
in memory. A word to be stored in memory location must first be transferred to this
register frorn where it is written in memory.
Program counter register: It holds the address of the next instruction to be executed by
the computer.
Accumulator register: It holds the initial data to be operated upon, the intermediate
results and also the final results of processing operations.
Instruction register: It holds the current instruction that is being executed.
Input - output register: This holds all input information to be passed to the memory
and also the output information to be transferred to an output device
Summary:
ALU does all the arithmetic and logical operations. Arithmetical operations involve
manipulation of numerical data such as addition, subtraction, division and
multiplication. Logical operations compare relative magnitudes of two numeric,
alphabetic or alphanumeric data items such as greater than, less than, and equal to.
CPU is the most important component of a computer. It typically consists of a
control unit (CU), arithmetic and logical unit (ALU) and a primary storage. CPU is the
brain of a computer and all processing takes place in the CPU.
The control unit controls and co-ordinates all the operations of the CPU and
peripheral devices.
The Instruction Fetch Execute Cycle is one of the most important mental models of
computation as aptly put by Prof. Rockford Ross. This embodies the basic principle
of how all modern processors work.
System software are sets of programs, responsible for running the computer,
controlling various operations of computer systems and management of computer
resources. Operating System (OS) falls under this category.
Application software is a set of programs, which are written to perform specific
tasks, for example: An application package for managing library known as library
information system is used to manage information of library such as: keeping book
details, account holder details, book issue details, book return details etc.
RAM or Random Access Memory is the central storage unit in a computer system. It
is the place in a computer where the operating system, application programs and
the data in current use are kept temporarily so that they can be accessed by the
computer’s processor.
The computer uses a number of special memory units called registers to speed up
the rate of information transfer between various units of the computer. They are
not treated as part of main memory and are used to retain information on a
temporary basis.
Secondary storage has virtually unlimited capacity as the cost per bit of storage is
very low. Operating speed of secondary memory is far slower than the primary
memory. These are used to store large volumes of data on a permanent basis.
33 BIBS
Computer Applications for Business Fundamentals of Computer
34 BIBS
Computer Applications for Business Computer Software
COMPUTER SOFTWARE
Objectives
After completion of this unit you should be able to
35 BIBS
Computer Software Computer Applications for Business
Introduction:
Computer needs to be given instructions to perform any task. A set of instructions for a
specific task is termed a routine and a complete set of instructions to execute a related set
of tasks is a program. Computer programs or software can be divided into two major
categories: systems software and applications software. Application programs consist of
programs written for specific applications such as payroll processing and sales analysis.
System software is machine oriented, which creates an environment for, and facilitates, the
execution of application software. Software programs vary widely in size. A simple program
may consist of a few hundred lines of instructions in a programming language, while a large
one may consist of tens of thousands of lines of instructions.
Computer Software
General Purpose
System Management
Programs
Programs
System Support
Programs
Application Specific
Programs
System Development
Programs
System Software: System Software is a set of programs that manage the resources of a
computer system. System Software is a collection of system programs that perform a variety
of functions like File Editing; Resource Accounting; I/O Management; Storage, Memory
Management access management.
36 BIBS
Computer Applications for Business Computer Software
System Management Programs: These programs manage the hardware, software and
data resources of the computer system. It includes operating system, database
management system (DBMS) and telecommunication monitors. Operating system is an
integrated system of complex programs that manages the resources of the computer
and provides a user-interface that is easy to manage. DBMS is a set of programs that
controls creation, maintenance and use of database. It allows different applications to
share data and programs concurrently. It also secures data in the database from
misuses. DB2, Oracle, MS SQL Server etc are some of the examples of database
management systems.
System support Programs: System support programs provide routine service functions
to the other computer programs & computer users: E.g. Utilities, libraries, performance
monitors & job accounting.
Compiler: The development of high level language made computer programming a lot
easier. But the computer does not understand instructions in high level language. To
overcome this communication problem, system software was developed to translate the
instructions in high level language into machine language instructions. Compiler is a type of
system software that translates source code into object code and thus renders translator's
job between the machine and the user. The compiler is language specific and each high level
language requires a separate compiler for it. For example a COBOL compiler can translate
only source program in COBOL into equivalent machine code.
This software is called compiler as it compiles a set of machine instructions corresponding to
each instruction in high level language. During compilation the compiler analyses each
statement in the source code and generates a sequence of machine instructions to carry out
precisely the same operation specified by the statement. As the compiler analyses each
statement it uncovers certain types of errors called diagnostic errors such as the following:
37 BIBS
Computer Software Computer Applications for Business
Interpreters: Interpreter is another type of system software used to translate the source
code in high level language into machine code. This translator program takes one instruction
in high level language and translates it into machine instruction for immediate execution.
Translation and execution alternate for each statement in the high level program.
Compiler converts the entire source code into machine code and is not involved in its
execution. After compilation the object code is permanently stored for future use.
Whenever the program execution is required the object code is used to execute the
job. But in case of an interpreter, the object code is not permanently saved as the
translation and execution occur alternatively for each statement in the source program.
Every time the program is run each of the statements in source program is translated
and executed one by one.
In the case of compiler, the source code needs to be translated into machine code only
once and the object code is used for repeated execution. Whereas interpreter
translates the source code instruction wise.
The advantage of an interpreter over compiler is fast response to changes in source
program. The interpreter eliminates the need for separate compiling run after each program
change to add features or correct errors. Moreover, a compiler is a complex program
compared to an interpreter. Interpreters are easy to write and they do not require large
memory space in the computer. The Interpreter, however, is a time consuming translation
method because each statement must be translated every time it is executed from the
source program. Thus, a compiled machine language program runs faster than an
interpreted program
Loaders and Linkers: Once the assembler produces an object program, it must be placed
into memory and executed. This loading of the object code into the memory of a computer
is done by a loader. A loader is a program that places programs into memory and prepares
38 BIBS
Computer Applications for Business Computer Software
them for execution. In a loading scheme the assembler outputs the machine language
translation of a program on secondary storage device and a loader is placed in main
memory. The loader places into memory the machine language version of the users program
and transfers control to it. Since the loader program is much smaller than the assembler, this
makes more memory available to the user's program. The time taken for loading and
preparing an object program for execution is less.
Structured programs are designed in modules. Each module represents a small program for
a particular processing. The translator program converts these modules into object codes.
These object modules must be combined to form a load module for execution. The software
that links these object modules into a load module is called linker. Even if program is a single
unit without sub routines, it may have to be linked with sample routines offered by the
translator. These are called library routines. The linker program links the program with these
library routines and enables it to use these routines during execution. The load module,
which is ready for execution is usually stored on a secondary storage device. When the
program is run, the module is loaded into computer memory for execution by a piece of
system software called loader. Sometimes both linking and loading are done by the same
system software called loaders and linkers.
Editors: Editors are system software to facilitate editing of text and data. Editors are also
required for coding and debugging. For writing programs files are opened using an editor
program. The program file is saved on secondary storage device and retrieved for correction
of errors, modification, etc. The editor permits adding and deletion of texts, blocking of
texts, copying the blocked text, moving the block and combining files.
39 BIBS
Computer Software Computer Applications for Business
Operating System
Definition
An operating system is a program that acts as an interface between the user and the
computer hardware and controls the execution of all kinds of programs
Operating system
Designer
Application Software
Utility
Operating System
Computer Hardware
40 BIBS
Computer Applications for Business Computer Software
File Management: A file system is normally organized into directories for easy
navigation and usage. These directories may contain files and other directions.
Operating System does the following activities for file management.
Keeps track of information, location, uses, status etc. The collective facilities are
often known as file system.
Decides who gets the resources.
41 BIBS
Computer Software Computer Applications for Business
Batch Operating System: In Batch processing, same type of jobs batch together and
execute at a time. In this system the major task of operating system is to transfer
control from one job to the next. The job is submitted to the computer operator in form
of punch cards. The monitor is system software that is responsible for interpreting and
carrying out the instructions in the batch jobs. When the monitor starts a job, the entire
computer is dedicated to the job, which then controls the computer until it finishes. The
OS is always resident in memory. Common Input devices are card readers and tape
drives.
Common output devices were line printers, tape drives, and card punches. Users do not
interact directly with the computer systems, but he prepared a job (comprising of the
program, the data & some control information).
Operating system
42 BIBS
Computer Applications for Business Computer Software
reside in main memory at a time. The OS picks and begins to execute one of the jobs in
the main memory. If any I/O wait happened in a process, then CPU switches from that
job to another job. Hence CPU in not idle at any time
Operating
Job 1 Job 2 Job 3 Job 4 Job 5
System
The main memory consists of 5 jobs at a time, the CPU executes one by one.
Advantages:
o Efficient memory utilization
o Throughput increases
o CPU is never idle, so performance increases
Operating System
CPU Assigned
All processes Process
43 BIBS
Computer Software Computer Applications for Business
between processes. CPU is taken away from a running process when the allotted time
slice expires. Examples: Multics, Unix, etc.
Operating system
Operating system
44 BIBS
Computer Applications for Business Computer Software
Operating System
CPU CPU CPU CPU
CPU 0 CPU 1
Memory
Single User Operating System: Provides a platform for only one user at a time. Single-
User, Single Tasking. As the name implies, this operating system is designed to manage
the computer so that one user can effectively do one thing at a time. The Palm OS for
Palm handheld computers is a good example of a modern single-user, single-task
operating system.
Single-User, Multi-Tasking: This is the type of operating system most people use on
their desktop and laptop computers today. Example Microsoft's Windows, it's entirely
possible for a Windows user to be writing a note in a word processor while downloading
a file from the Internet while printing the text of an e-mail message.
45 BIBS
Computer Software Computer Applications for Business
o With resource sharing facility user at one site may be able to use the
resources available at another.
o Speedup the exchange of data with one another via electronic mail.
o If one site fails in a distributed system, the remaining sites can potentially
continue operating.
o Better service to the customers.
o Reduction of the load on the host computer.
o Reduction of delays in data processing
Network operating System: Network Operating System runs on a server and provides
server the capability to manage data, users, groups, security, applications, and other
networking functions. The primary purpose of the network operating system is to allow
shared file and printer access among multiple computers in a network, typically a local
area network (LAN), a private network or to other networks. Examples of network
operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
46 BIBS
Computer Applications for Business Computer Software
Real Time operating System: Real time system is defined as a data processing system in
which the time interval required to process and respond to inputs is so small that it
controls the environment. Real time processing is always on line whereas on line system
need not be real time. The time taken by the system to respond to an input and display
of required updated information is termed as response time. So in this method response
time is very less as compared to the online processing.
Real-time systems are used when there are rigid time requirements on the operation of
a processor or the flow of data and real-time systems can be used as a control device in
a dedicated application. Real-time operating system has well-defined, fixed time
constraints otherwise system will fail. For example Scientific experiments, medical
imaging systems, industrial control systems, weapon systems, robots, and home-
appliance controllers, Air traffic control system etc.
47 BIBS
Computer Software Computer Applications for Business
o Soft real time systems are less restrictive. Critical real-time task gets priority
over other tasks and retains the priority until it completes. These have
limited utility than hard real time systems. For example multimedia, virtual
reality, advanced science projects like under sea exploration, planetary rover
etc.
Advantages
The spooling operation uses a disk as a very large buffer.
Spooling is capable of overlapping I/O operation for one job with processor
operations for another job.
49 BIBS
Computer Software Computer Applications for Business
50 BIBS
Computer Applications for Business Computer Software
Process Control Block, PCB: Each process is represented in the operating system by a
process control block (PCB) also called a task control block. PCB is the data structure used by
the operating system. Operating system groups all information that needs about particular
process. PCB contains many pieces of information associated with a specific process which is
described below.
The process scheduling is the activity of the process manager that handles the removal of
the running process from the CPU and the selection of another process on the basis of a
particular strategy. Process scheduling is an essential part of a Multiprogramming operating
system.
Scheduling queues refers to queues of processes or devices. When the process enters into
the system, then this process is put into a job queue. This queue consists of all processes in
the system. The operating system also maintains other queues such as device queue. Device
queue is a queue for which multiple processes are waiting for a particular I/O device. Each
device has its own device queue.
51 BIBS
Computer Software Computer Applications for Business
Ready queue :
Device queue
A newly arrived process is put in the ready queue. Processes waits in ready queue for
allocating the CPU. Once the CPU is assigned to a process, then that process will execute.
While executing the process, any one of the following events can occur.
The process could issue an I/O request and then it would be placed in an I/O
queue.
The process could create new sub process and will wait for its termination.
The process could be removed forcibly from the CPU, as a result of interrupt
and put back in the ready queue.
Schedulers: Schedulers are special system software which handles process scheduling in
various ways. Their main task is to select the jobs to be submitted into the system and to
decide which process to run. Schedulers are of three types
Long Term Scheduler: It is also called job scheduler. Long term scheduler
determines which programs are admitted to the system for processing. Job
scheduler selects processes from the queue and loads them into memory for
execution. Process loads into the memory for CPU scheduling. The primary
objective of the job scheduler is to provide a balanced mix of jobs, such as
I/O bound and processor bound. It also controls the degree of
multiprogramming. If the degree of multiprogramming is stable, then the
average rate of process creation must be equal to the average departure
rate of processes leaving the system.
52 BIBS
Computer Applications for Business Computer Software
Speed is in between
Speed is fastest
both
Speed is lesser than short among
2 short and long term
term scheduler other two
scheduler.
It provides lesser
It controls the degree of It reduces the degree
control
3 multiprogramming of multiprogramming.
over degree of
multiprogramming
It is also minimal in
It is almost absent or It is a part of Time
time
4 minimal sharing systems.
sharing system
in time sharing system
It selects those It can re-introduce the
It selects processes from processes process into memory
5 pool and loads them into which are ready to and execution can be
memory for execution execute continued.
53 BIBS
Computer Software Computer Applications for Business
Context Switch: A context switch is the mechanism to store and restore the state or context
of a CPU in Process Control block so that a process execution can be resumed from the same
point at a later time. Using this technique a context switcher enables multiple processes to
share a single CPU. Context switching is an essential part of a multitasking operating system
features. When the scheduler switches the CPU from executing one process to execute
another, the context switcher saves the content of all processor registers for the process
being removed from the CPU, in its process descriptor. The context of a process is
represented in the process control block of a process. Context switch time is pure overhead.
Context switching can significantly affect performance as modern computers have a lot of
general and status registers to be saved.
Thread: A thread is a flow of execution through the process code, with its own program
counter, system registers and stack. A thread is also called a light weight process. Threads
provide a way to improve application performance through parallelism. Each thread belongs
to exactly one process and no thread can exist outside a process. Each thread represents a
separate flow of control. Threads have been successfully used in implementing network
servers and web server. They also provide a suitable foundation for parallel execution of
applications on shared memory multiprocessors.
Advantages of Thread:
Thread minimizes context switching time.
Use of threads provides concurrency within a process.
Efficient communication.
54 BIBS
Computer Applications for Business Computer Software
Process switching needs interaction with Thread switching does not need to
2
operating system. interact with operating system.
If one process is blocked then no other process While one thread is blocked and waiting,
4
can execute until the first process is unblocked. second thread in the same task can run.
Multiple processes without using threads use Multiple threaded processes use fewer
5
more resources. resources.
In multiple processes each process operates One thread can read, write or change
6
independently of the others. another thread's data.
Memory Management
Load time: When it is not known at compile time where the process will reside in
memory, then the compiler generates re-locatable code.
Execution time: If the process can be moved during its execution from one memory
segment to another, then binding must be delayed to be done at run time
Dynamic Loading: In dynamic loading, a routine of a program is not loaded until it is called
by the program. All routines are kept on disk in a re-locatable load format. The main
program is loaded into memory and is executed. Other routines methods or modules are
loaded on request. Dynamic loading makes better memory space utilization and unused
routines are never loaded.
Dynamic Linking: Linking is the process of collecting and combining various modules of code
and data into an executable file that can be loaded into memory and executed. Operating
system can link system level libraries to a program. When it combines the libraries at load
time, the linking is called static linking and when this linking is done at the time of execution,
it is called as dynamic linking. In static linking, libraries linked at compile time, so program
code size becomes bigger whereas in dynamic linking libraries linked at execution time so
program code size remains smaller.
Logical versus Physical Address Space: An address generated by the CPU is a logical address
whereas address actually available on memory unit is a physical address. Logical address is
also known a Virtual address. Virtual and physical addresses are the same in compile-time
and load-time address-binding schemes. Virtual and physical addresses differ in execution-
time address-binding scheme. The set of all logical addresses generated by a program is
referred to as a logical address space. The set of all physical addresses corresponding to
these logical addresses is referred to as a physical address space. The run-time mapping
from virtual to physical address is done by the memory management unit (MMU) which is a
hardware device. MMU uses following mechanism to convert virtual address to physical
address:
The value in the base register is added to every address generated by a user process
which is treated as offset at the time it is sent to memory. For example, if the base
register value is 10000, then an attempt by the user to use address location 100 will
be dynamically reallocated to location 10100.
The user program deals with virtual addresses; it never sees the real physical
addresses.
store is a standard hard disk with transfer rate of 1 MB per second. The actual transfer of the
100K process to or from memory will take
100KB / 1000KB per second
= 1/10 second
= 100 milliseconds
Multiple partition allocation: In this type of allocation, main memory is divided into a
number of fixed-sized partitions where each partition should contain only one process.
When a partition is free, a process is selected from the input queue and is loaded into the
free partition. When the process terminates, the partition becomes available for another
process.
57 BIBS
Computer Software Computer Applications for Business
Fragmentation: As processes are loaded and removed from memory, the free memory
space is broken into little pieces. It happens after sometimes that processes cannot be
allocated to memory blocks considering their small size and memory blocks remains unused.
This problem is known as Fragmentation.
58 BIBS
Computer Applications for Business Computer Software
Segmentation: Segmentation is a technique to break memory into logical pieces where each
piece represents a group of related information. For example, data segments or code
segment for each process, data segment for operating system and so on. Segmentation can
be implemented using or without using paging. Unlike paging, segment is having varying
sizes and thus eliminates internal fragmentation. External fragmentation still exists but to
lesser extent.
Segment number (s): segment number is used as an index into a segment table which
contains base address of each segment in physical memory and a limit of segment.
Segment offset (o): segment offset is first checked against limit and then is combined with
base address to define the physical memory address.
Virtual memory: Virtual memory is a technique that allows the execution of processes which
are not completely available in memory. The main visible advantage of this scheme is that
programs can be larger than physical memory. Virtual memory is the separation of user
logical memory from physical memory. This separation allows an extremely large virtual
memory to be provided for programmers when only a smaller physical memory is available.
Following are the situations, when entire program is not required to be loaded fully in main
memory.
User written error handling routines are used only when an error occurred in the
data or computation.
Certain options and features of a program may be used rarely.
Many tables are assigned a fixed amount of address space even though only a small
amount of the table is actually used.
The ability to execute a program that is only partially in memory would counter
many benefits.
Less number of I/O would be needed to load or swap each user program into
memory.
A program would no longer be constrained by the amount of physical memory that
is available.
Each user program could take less physical memory, more programs could be run
the same time, with a corresponding increase in CPU utilization and throughput.
Demand Paging: A demand paging system is quite similar to a paging system with swapping.
When we want to execute a process, we swap it into memory. Rather than swapping the
entire process into memory, however, we use a lazy swapper called pager. When a process
is to be swapped in, the pager guesses which pages will be used before the process is
swapped out again. Instead of swapping in a whole process, the pager brings only those
necessary pages into memory. Thus, it avoids reading into memory pages that will not be
used in anyway, decreasing the swap time and the amount of physical memory needed.
Hardware support is required to distinguish between those pages that are in memory and
59 BIBS
Computer Software Computer Applications for Business
those pages that are on the disk using the valid-invalid bit scheme. Marking a page will have
no effect if the process never attempts to access the page. While the process executes and
accesses pages that are memory resident, execution proceeds normally.
Step 1: Check an internal table for this process, to determine whether the reference was a
valid or it was an invalid memory access.
Step 2: If the reference was invalid, terminate the process. If it was valid, but page have not
yet brought in, page in the latter
Step 4: Schedule a disk operation to read the desired page into the newly allocated frame.
Step 5: When the disk read is complete, modify the internal table kept with the process and
the page table to indicate that the page is now in memory.
60 BIBS
Computer Applications for Business Computer Software
Step 6: Restart the instruction that was interrupted by the illegal address trap. The process
can now access the page as though it had always been in memory. Therefore, the operating
system reads the desired page into memory and restarts the process as though the page had
always been in memory.
File System: A file is a named collection of related information that is recorded on secondary
storage such as magnetic disks, magnetic tapes and optical disks. In general, a file is a
sequence of bits, bytes, lines or records whose meaning is defined by the files creator and
user.
File Structure: File structure is a structure, which is according to a required format that
operating system can understand:
A file has a certain defined structure according to its type.
A text file is a sequence of characters organized into lines.
A source file is a sequence of procedures and functions.
An object file is a sequence of bytes organized into blocks that are understandable
by the machine.
When operating system defines different file structures, it also contains the code to
support these file structure. UNIX, MS-DOS support minimum number of file
structure.
File Type: File type refers to the ability of the operating system to distinguish different types
of file such as text files source files and binary files etc. Many operating systems support
many types of files. Operating system like MS-DOS and UNIX has the following types of files:
Ordinary files
o These are the files that contain user information.
o These may have text, databases or executable program.
o The user can apply various operations on such files like add, modify, delete
or even remove the entire file.
61 BIBS
Computer Software Computer Applications for Business
Directory files
o These files contain list of file names and other information related to these
files.
Special files:
o These files are also known as device files.
o These files represent physical device like disks, terminals, printers, networks,
tape drive etc.
These files are of two types
o Character special files - data is handled character by character as in case of
terminals or printers.
o Block special files - data is handled in blocks as in the case of disks and
tapes.
File Access Mechanisms: File access mechanism refers to the manner in which the records of
a file may be accessed. There are several ways to access files
Sequential access
Direct/Random access
Indexed sequential access
Sequential access: A sequential access is that in which the records are accessed in
some sequence i.e. the information in the file is processed in order, one record after
the other. This access method is the most primitive one. Example: Compilers usually
access files in this fashion.
Space Allocation: Files are allocated disk spaces by operating system. Operating systems
deploy following three main ways to allocate disk space to files.
Contiguous Allocation
Linked Allocation
Indexed Allocation
Contiguous Allocation:
o Each file occupies a contiguous address space on disk.
o Assigned disk address is in linear order.
62 BIBS
Computer Applications for Business Computer Software
o Easy to implement.
o External fragmentation is a major issue with this type of allocation
technique.
Linked Allocation:
o Each file carries a list of links to disk blocks.
o Directory contains link / pointer to first block of a file.
o No external fragmentation
o Effectively used in sequential access file.
o Inefficient in case of direct access file.
Indexed Allocation:
o Provides solutions to problems of contiguous and linked allocation.
o An index block is created having all pointers to files.
o Each file has its own index block which stores the addresses of disk space
occupied by the file.
o Directory contains the addresses of index blocks of files.
A deadlock occurs if and only if the following four conditions hold in a system
simultaneously:
1. Mutual Exclusion: At least one of the resources is non-sharable (that is; only a limited
number of processes can use it at a time and if it is requested by a process while it is being
used by another one, the requesting process has to wait until the resource is released.).
2. Hold and Wait: There must be at least one process that is holding at least one resource
and waiting for other resources that are being hold by other processes.
3. No Preemption: No resource can be preempted before the holding process completes its
task with that resource.
4. Circular Wait: There exists a set of processes: {P1, P2, ..., Pn} such that
• Deadlock prevention
• Deadlock avoidance
• Deadlock detection and recovery
Deadlock Prevention: To prevent the system from deadlocks, one of the four discussed
conditions that may create a deadlock should be discarded. The methods for those
conditions are as follows:
Mutual Exclusion: In general, we do not have systems with all resources being sharable.
Some resources like printers, processing units are non-sharable. So it is not possible to
prevent deadlocks by denying mutual exclusion.
Hold and Wait: One protocol to ensure that hold-and-wait condition never occurs says each
process must request and get all of its resources before it begins execution. Another
protocol is “Each process can request resources only when it does not occupy any
resources.”
The second protocol is better. However, both protocols cause low resource utilization and
starvation. Many resources are allocated but most of them are unused for a long period of
time. A process that requests several commonly used resources causes many others to wait
indefinitely.
No Preemption: One protocol is “If a process that is holding some resources requests
another resource and that resource cannot be allocated to it, then it must release all
resources that are currently allocated to it.” Another protocol is “When a process requests
some resources, if they are available, allocate them. If a resource it requested is not
available, then we check whether it is being used or it is allocated to some other process
waiting for other resources. If that resource is not being used, then the OS preempts it from
the waiting process and allocate it to the requesting process. If that resource is used, the
requesting process must wait.” This protocol can be applied to resources whose states can
easily be saved and restored (registers, memory space). It cannot be applied to resources
like printers.
Circular Wait: One protocol to ensure that the circular wait condition never holds is “Impose
a linear ordering of all resource types.” Then, each process can only request resources in an
increasing order of priority.
64 BIBS
Computer Applications for Business Computer Software
Another protocol is “Whenever a process requests a resource rj, it must have released all
resources rk with priority(rk) ≥ priority (rj).
Deadlock avoidance: Given some additional information on how each process will request
resources, it is possible to construct an algorithm that will avoid deadlock states. The
algorithm will dynamically examine the resource allocation operations to ensure that there
won't be a circular wait on resources. When a process requests a resource that is already
available, the system must decide whether that resource can immediately be allocated or
not. The resource is immediately allocated only if it leaves the system in a safe state. A state
is safe if the system can allocate resources to each process in some order avoiding a
deadlock. A deadlock state is an unsafe state.
Recovery from Deadlock: If the system is in a deadlock state, some methods for recovering
it from the deadlock state must be applied. There are various ways for recovery:
If preemption is used:
2. Rollback: If we preempt a resource from a process, roll the process back to some safe
state and make it continue.
Here the OS may be probably encounter the problem of starvation. How can we guarantee
that resources will not always be preempted from the same process?
Recovery from Deadlock: If the system is in a deadlock state, some methods for recovering
it from the deadlock state must be applied. There are various ways for recovery:
• Allocate one resource to several processes, by violating mutual exclusion.
• Preempt some resources from some of the deadlocked processes.
• Abort one or more processes in order to break the deadlock.
If preemption is used:
1. Select a victim. (Which resource(s) is/are to be preempted from which process?)
2. Rollback: If we preempt a resource from a process, roll the process back to some safe
state and make it continue.
65 BIBS
Computer Software Computer Applications for Business
Here the OS may be probably encounter the problem of starvation. How can we guarantee
that resources will not always be preempted from the same process?
For rollback, the simplest solution is a total rollback. A better solution is to roll the victim
process back only as far as it’s necessary to break the deadlock. However, the OS needs to
keep more information about process states to use the second solution. To avoid starvation,
ensure that a process can be picked as a victim for only a small number of times. So, it is a
wise idea to include the number of rollbacks as a parameter.
Description: Figure 2.18 below provides a general description of the UNIX architecture. The
underlying hardware is surrounded by the operating system software. The operating system
is often called the system kernel, or simply the kernel, to emphasize its isolation from the
user and applications. UNIX comes equipped with a number of user services and interfaces
that are considered part of the system. These can be grouped into the shell, other interface
software, and the components of the C compiler (compiler, assembler, loader). The layer
outside of this consists of user applications and the user interface to the C compiler. A closer
look at the kernel is provided in Figure 2.19. User programs can invoke operating system
services either directly or through library programs. The system call interface is the
boundary with the user and allows higher-level software to gain access to specific kernel
functions. At the other end, the operating system contains primitive routines that interact
directly with the hardware. Between these two interfaces, the system is divided into two
main parts, one concerned with process control and the other concerned with file
management and I/O. The process control subsystem is responsible for memory
management, the scheduling and dispatching of processes, and the synchronization and
inter process communication of processes. The file system exchanges data between memory
and external devices either as a stream of characters or in blocks. To achieve this, a variety
of device drivers are used. For block-oriented transfers, a disk cache approach is used: a
system buffer in main memory is interposed between the user address space and the
external device.
66 BIBS
Computer Applications for Business Computer Software
67 BIBS
Computer Software Computer Applications for Business
UNIX Layers: There are several “layers” in the UNIX environment, from the “lowest”
(farthest removed from the user), which is called the kernel, to the “highest”, the graphical
user interface (GUI). Each of these layers will be described very briefly below.
The Kernel: The kernel is the lowest layer of the operating system, and accounts for
hardware devices, data storage, and executing other regularly scheduled tasks. This layer is
machine dependent, unlike the rest of the operating system. Individual tasks that a user
performs constitute separate processes. Users usually run many processes concurrently
during normal operations.
The Shell: Users of UNIX systems do not interact directly with the kernel. User commands
are sent to the kernel via a shell. This part of the operating system is a high-level
programming language that interprets user commands, executes the appropriate program,
sends requests to the kernel, and delivers the resulting output to the user. The shell is an
interface that lets you customize your user environment and automate complex operations.
The Graphical User Interface (GUI): The GUI is the highest level of the UNIX operating
system. It is simply the window display environment that you see on the screen when using
a workstation. You can customize this environment to suit your tastes as well, for example,
you can set the background color, font size, window size, and have a clock or calendar
automatically appear when you log in. If you have multiple windows open simultaneously,
you will have to use the cursor to “activate” the window you want to use. A mouse controls
the movement of the cursor.
Summary
Editors are system software to facilitate editing of text and data. Editors are also
required for coding and debugging. For writing programs files are opened using an
editor program.
Multiprocessing is the use of two or more central processing units (CPUs) within a
single computer system. The term also refers to the ability of a system to support
more than one processor and the ability to allocate tasks between them.
A process is a program in execution. The execution of a process must progress in a
sequential fashion. A process is defined as an entity which represents the basic unit
of work to be implemented in the system.
68 BIBS
Computer Applications for Business Computer Software
Compiler converts the entire source code into machine code and is not involved in
its execution. After compilation the object code is permanently stored for future
use.
Each process is represented in the operating system by a process control block (PCB)
also called a task control block. PCB is the data structure used by the operating
system. Operating system groups all information that needs about particular
process.
A context switch is the mechanism to store and restore the state or context of a CPU
in Process Control block so that a process execution can be resumed from the same
point at a later time.
A thread is a flow of execution through the process code, with its own program
counter, system registers and stack. A thread is also called a light weight process.
Virtual memory is the separation of user logical memory from physical memory. This
separation allows an extremely large virtual memory to be provided for
programmers when only a smaller physical memory is available.
A file is a named collection of related information that is recorded on secondary
storage such as magnetic disks, magnetic tapes and optical disks. In general, a file is
a sequence of bits, bytes, lines or records whose meaning is defined by the files
creator and user.
In a multiprogramming system, processes request resources. If those resources are
being used by other processes then the process enters a waiting state. However, if
other processes are also in a waiting state, we have deadlock.
UNIX is a popular multi-user, multi-tasking OS. It has the attributes as stability,
portability, security It is created at Bell Labs by Dennis Ritchie and Ken Thompson
(won the ACM Turing Award in 1983). Unix is considered one of the greatest
achievements in computer science. It has been around since the 1960s in various
forms, e.g., AIX, SCO Unix, SunOS, FreeBSD, OpenBSD, NetBSD, Linux, Mac OS X.
There are several “layers” in the UNIX environment, from the “lowest” (farthest
removed from the user), which is called the kernel, to the “highest”, the graphical
user interface (GUI).
69 BIBS
Computer Number System Computer Applications for Business
Objectives
After completion of this unit you should be able to
70 BIBS
Computer Applications for Business Computer Number System
Introduction
The original computers were designed to be high-speed calculators. The designers needed
to use the electronic components available at the time. The designers realized they could
use a simple coding system--the binary system-- to represent their numbers.
When we type some letters or words, the computer translates them in numbers as
computers can understand only numbers. A computer can understand positional number
system where there are only a few symbols called digits and these symbols represent
different values depending on the position they occupy in the number.
The digit
The position of the digit in the number
The base of the number system (where base is defined as the total number
of digits available in the number system).
All the different types of information in computers can be represented using binary code.
Numbers
Letters of the alphabet and punctuation marks
Microprocessor instruction
Graphics/Video
Sound
Bits and Bytes: A binary digit is a single numeral in a binary number. Each 1 and 0 in the
number below is a binary digit:
10010101
71 BIBS
Computer Number System Computer Applications for Business
Decimal Number System: The number system that we use regularly is the decimal number
system. The prefix “deci-” stands for 10. It has base 10. There are 10 symbols that represent
quantities: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
In decimal number system, the successive positions to the left of the decimal point
represent units, tens, hundreds, thousands and so on.
Each position represents a specific power of the base (10).
For example, the decimal number 1234 consists of the digit 4 in the units position, 3 in the
tens position, 2 in the hundreds position, and 1 in the thousands position, and its value can
be written as
1000 + 200 + 30 + 4
1234
For whole numbers, the rightmost digit position is the one’s position (100 = 1). The numeral
in that position indicates how many ones are present in the number. The next position to
the left is ten’s, then hundred’s, thousand’s, and so on. Each digit position has a weight that
is ten times the weight of the position to its right.
In a positional notation system, the number base is called the radix. Thus, the base ten
systems that we normally use have a radix of 10. The term radix and base can be used
interchangeably. When writing numbers in a radix other than ten, or where the radix isn’t
clear from the context, it is customary to specify the radix using a subscript.
Binary Numbers: The prefix “bi-” stands for 2. The binary number system is a Base 2
number system: There are 2 symbols that represent quantities 0, 1. Each place value in a
binary number is a power of 2. The binary number system is also a positional notation
numbering system, but in this case, the base is not ten, but is instead two. Each digit position
in a binary number represents a power of two. So, when we write a binary number, each
binary digit is multiplied by an appropriate power of 2 based on the position in the number:
For example:
101101 = 1 x 25 + 0 x 24 + 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20
= 1 x 32 + 0 x 16 + 1 x 8 + 1 x 4 + 0 x 2 + 1 x 1
= 32 + 8 + 4 + 1 = 45
Octal number: Octal stands for 8, so in this system there are 8 fundamental numbers:
0,1,2,3,4,5,6 and 7. Every other number can be formed by these fundamental numbers.
72 BIBS
Computer Applications for Business Computer Number System
For example:
5270 = 2560+128+56+0
5270 = 2744
Hexadecimal Numbers: The prefix “hexa-” stands for 6 and the prefix “deci-’ stands for 10.
The hexadecimal number system is a Base 16 number system:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
Hexadecimal Numbers
The reason for the common use of hexadecimal numbers is the relationship between the
numbers 2 and 16. Sixteen is a power of 2 (16 = 24). Because of this relationship, four digits
in a binary number can be represented with a single hexadecimal digit. This makes
conversion between binary and hexadecimal numbers very easy, and hexadecimal can be
used to write large binary numbers with much fewer digits. When working with large digital
systems, such as computers, it is common to find binary numbers with 8, 16 and even 32
digits. Writing a 16 or 32 bit binary number would be quite tedious and error prone. By using
hexadecimal, the numbers can be written with fewer digits and much less likelihood of error.
73 BIBS
Computer Number System Computer Applications for Business
Conversion:
Step 1 – Divide the decimal number to be converted by the value of the new base.
Step 2 - Get the remainder from Step 1 as the rightmost digit (least significant digit)
of new base number.
Step 3 - Divide the quotient of the previous divide by the new base.
Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new
base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient
becomes zero in Step 3.
The last remainder thus obtained will be the most significant digit (MSD) of the new
base number.
(37)10 = (100101)2
(93)10 = (1011101)2
74 BIBS
Computer Applications for Business Computer Number System
(93)10 = (135)8
(93)10 = (5D)16
75 BIBS
Computer Number System Computer Applications for Business
Step 1 - Determine the column (positional) value of each digit (this depends on the
position of the digit and the base of the number system).
Step 2 - Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in
decimal.
76 BIBS
Computer Applications for Business Computer Number System
Step 2 - Convert each group of three binary digits to one octal digit.
Example 10: Convert (10101101)8 to octal
010101101
2 5 5
So (10101101)8 = (255)8
Converting Binary Numbers to Hexadecimal
C 5 B
So (110001011011)2 = (C5B)16
Octal to binary: steps are as follows:
Step 1 - Convert each octal digit to a 3 digit binary number (the octal digits may be treated as
decimal for this conversion).
Step 2 - Combine all the resulting binary groups (of 3 digits each) into a single binary
number.
77 BIBS
Computer Number System Computer Applications for Business
So (67502)8= (110111101000010)2
Hexadecimal to binary: steps are as follows:
Step 1 - Convert each hexadecimal digit to a 4 digit binary number
Step 2 - Combine all the resulting binary groups (of 4 digits each) into a single binary
number.
Example 13: Convert (6E50C)16 to binary
6 E 5 0 C
So (6E50C)16 = (01101110010100001100)2
Conversion of decimal fractions to other base: Begin with the decimal fraction and multiply
by 2 or 8 or 16 depending on the base. The whole number part of the result is the first binary
or octal or hexadecimal digit to the right of the point.
Next we disregard the whole number part of the previous result and the fractional part is
again multiplied by 2 or 8or 16 and the process continues till the fractional part becomes
zero.
Example 14: Convert (0.625)10 to binary.
0.625×2 = 1.25 first binary digit will be 1
0.25×2 = 0.50 second binary digit will be 0
0.50×2 = 1.00 third binary digit will be 1
Since the fractional part becomes zero so the fraction terminates
(0.625)10 =( 0.101)2
78 BIBS
Computer Applications for Business Computer Number System
Example 17: convert the decimal number 250.5 to binary, octal and hexadecimal.
Binary conversion
Integral part = 250 and fractional part = 0.5
79 BIBS
Computer Number System Computer Applications for Business
15 / 2 = 7 remainder 1
7/2=3 remainder 1
3/2=1 remainder 1
1/2 = 0 remainder 1 (most significant digit)
(11110010)2
So (250.5)10 = (11110010.1)2
Octal conversion:
Conversion of integral part
250 / 8 = 31 remainder 2 (least significant digit)
31 / 8 = 3 remainder 7
3/8=0 remainder 3 (most significant digit)
(372)8
Conversion of fractional part
0.50×8 = 4.00 first octal digit right to the decimal point will be 4
Since the fractional part becomes zero so the fraction terminates.
So (250.5)10 = (372.4)8
Hexadecimal conversion
Conversion of integral part
250 / 16 = 15 remainder 10(A) (least significant digit)
15 / 16 = 0 remainder 15(F) (most significant digit)
(FA)16
80 BIBS
Computer Applications for Business Computer Number System
Computer Arithmetic:
Representing Negative Numbers – (Sign & Magnitude method): As there is no third symbol
available to store a negative symbol explicitly we must use a bit to show if a number is
negative or not. We name this bit the “Sign Bit”. We use the left most bit as sign bit. If the
Sign Bit is 1 then the number is negative and itf it is 0 then the number is positive.
+3 can be written as 0 0000011
Sign bit
-3 can be written as 1 0000011
Sign bit
Binary Arithmetic Rules
• 0+0=0
• 0+1=1
• 1+0=1
• 1 + 1 = 0 (carry 1)
• 1+1+1 = 1 (carry 1)
Add Carry 1
0101
Example: Perform the following operation using 1,s complement: 101011-10001
1’s complement of 010001 is 101110
Adding this number to 101011
101011
+ 101110
Carry 1 011001
Add 1
carry 11010
82 BIBS
Computer Applications for Business Computer Number System
2’s complement method: The 2’s complement of binary number can be obtained by adding
1 to its 1’s complement:
Subtract (1010)2 from (1111)2
First we have to convert 1010 to 2’s complement
1’s complement of 1010 = 0101 then add 1 to it
So 2’s complement = 0101
+ 1
0110
Now adding this number to 1111
1111
+ 0110
Carry 1 0101
Carry 100011110
1
Add carry
00011111
Answer is 00011111
84 BIBS
Computer Applications for Business Computer Number System
Adding 1 to it
0111001
1
0111010
So 2’s complement of 1000110 is 0111010
Adding this number to 1010111
1010111
0111010
1 0010001
By ignoring the carry bit the answer is 0010001
85 BIBS
Computer Number System Computer Applications for Business
The result is negative as it starts with 1 so reconversion is needed. For this 1 will be
subtracted from the answer
11111 – 1 = 11110
Then 1’s complement will be taken
1’s complement of 11110 = 00001
So the answer is – 00001
86 BIBS
Computer Applications for Business Computer Number System
87 BIBS
Computer Number System Computer Applications for Business
0+0=0
0+1=1
1+0=1
1+1=1
OR operator says that the result is true if at least one of the operand is true.
NOT operator: It is most often designated by an over bar. It is sometimes indicated
by a prime mark ( ‘ ) or an “elbow” (). It is a unary operator.
0’ = 1
1’ = 0
Boolean algebra Postulates:
Commutative Law
x•y=y•x x+y=y+x
Truth tables to prove the law
x y x.y y.x x+y y+x
0 0 0 0 0 0
0 1 0 0 1 1
1 0 0 0 1 1
1 1 1 1 1 1
Identity Element
x•1=x x+0=x
Complement
x • x’ = 0 x + x’ = 1
88 BIBS
Computer Applications for Business Computer Number System
Theorem 5: DeMorgan
● ( x • y )’ = x’ + y’ ( x + y )’ = x’ • y’
x y x.y (x.y)’ x+y (x+y)’ x’ y’ x’+y’ x’.y’
0 0 0 1 0 1 1 1 1 1
0 1 0 1 1 0 1 0 1 0
1 0 0 1 1 0 0 1 1 0
1 1 1 0 1 0 0 0 0 0
Theorem 6: Absorption
x•(x+y)=x x+(x•y)=x
x y x+y x.(x+y) x.y x+(x.y)
0 0 0 0 0 0
0 1 1 0 0 0
1 0 1 1 0 1
1 1 1 1 1 1
Example 2: C + (BC)’
C +B’ +C’ ( By D Morgan’s law)
C + C’ + B’
1 + B’ ( Since C+C’ =1)
1
(A’+B’)(A’+B)
A’A’+A’B+B’A’+B’B
A’ + A’ (B+B’) + 0 (since B’B )
A’ + A’ (since B+B’ = 1)
A’
91 BIBS
Computer Number System Computer Applications for Business
• AND gate: The AND gate is an electronic circuit that gives a gives a true output (1)
only if (1) only if all its inputs its inputs are true. A dot (·) is used to show the AND
operation i.e. A·B. Note that the dot is sometimes omitted i.e. AB.
Truth Table
A B A.B
0 0 0
0 1 0
1 0 0
1 1 1
• OR gate: The OR gate isA.B an electronic circuit that gives a true output (1) if one or
more of its inputs are true. A plus (+) is used to show the OR operation.
Truth Table
A B A+B
0 0 0
0 1 1
1 0 1
1 1 1
A+B
92 BIBS
Computer Applications for Business Computer Number System
• NOT gate: The NOT gate is an electronic circuit that produces an inverted version of
the input at its output. It is also known as an inverter. If the input variable is A, the
inverted output is known as NOT A. This is also shown as A', or Ā
Truth table
A A’
0 1
1 0
A’
NAND gate: This is a NOT-AND gate which is equal to an AND gate followed by a NOT
gate. The outputs of all NAND gates are true if any of the inputs are false. The symbol is
an AND gate with a small circle on the output. The small circle represents inversion.
Truth Table
A B (A.B)’
0 0 1
0 1 1
1 0 1
1 1 0
(XY)’
93 BIBS
Computer Number System Computer Applications for Business
Logical Equivalence: A NAND gate gives the same results as an AND gate feeding into a NOT
gate. Circuits are logically equivalent if they produce the same truth table output.
A B A.B NOT A.B NAND AB
0 0 0 1 1
0 1 0 1 1
1 0 0 1 1
1 1 1 0 0
• NOR gate: • This is a NOT-OR gate which is equal to an OR gate followed by a NOT
gate. The outputs of all NOR gates are false if any of the inputs are true. The symbol
is an OR gate with a small circle on the output. The small circle represents inversion
represents inversion.
Truth Table
A B (A+B)’
0 0 1
0 1 0
1 0 0
1 1 0
EXOR gate: The 'Exclusive-OR' gate is a circuit which will give a true output if either
but not both, of its two inputs are true. An encircled plus sign is used to show the
EOR operation.
94 BIBS
Computer Applications for Business Computer Number System
Truth Table
A B (A+B)
0 0 0
0 1 1
1 0 1
1 1 0
A EXOR B
Universal gates: Any function can be implemented using only NAND or only NOR gates so
they are called universal gates.
NAND gate as a universal gate:
• Implement NOT using NAND
Truth table
A A NAND A A’
0 1 1
1 0 0
95 BIBS
Computer Number System Computer Applications for Business
Truth Table
A B (A.B)’ ((A.B)’.(A.B)’)’ A.B
0 0 1 0 0
0 1 1 0 0
1 0 1 0 0
1 1 0 1 1
Truth Table
A B (A.A)’= A’ (B.B)’= B’ (A’.B’)’ A+B
0 0 1 1 0 0
0 1 1 0 1 1
1 0 0 1 1 1
1 1 0 0 1 1
96 BIBS
Computer Applications for Business Computer Number System
Truth table
A A NOR A A’
0 1 1
1 0 0
Truth Table
A B (A+A)’= A’ (B+B)’= B’ (A’+B’)’ A.B
0 0 1 1 0 0
0 1 1 0 0 0
1 0 0 1 0 0
1 1 0 0 1 1
Example 1: construct a logical circuit with AND,OR and NOT gates for the following Boolean
expression
X = ((A+B)’+C’DE)+BC’D
97 BIBS
Computer Number System Computer Applications for Business
Example 2: Sketch the logic circuit for the Boolean expression with truth table:
Z = AC+BC+ABC
A B C ABC AC BC Z
0 0 0 0 0 0 0
0 0 1 0 0 0 0
0 1 0 0 0 0 0
0 1 1 0 0 1 1
1 0 0 0 0 0 0
1 0 1 0 1 0 1
1 1 0 0 0 0 0
1 1 1 1 1 1 1
98 BIBS
Computer Applications for Business Computer Number System
Example 3: Sketch the logic circuit for the Boolean expression with truth table:
Z = (A+B’+C+D’)’+(B’CD’)’
0 0 1 1 1 0 0 1 1 0 1
0 1 0 0 0 1 0 1 1 0 1
0 1 0 1 0 0 0 1 0 1 1
0 1 1 0 0 1 0 1 1 0 1
0 1 1 1 0 0 0 1 1 0 1
1 0 0 0 1 1 0 1 1 0 1
1 0 0 1 1 0 0 1 1 0 1
1 0 1 0 1 1 1 0 1 0 0
1 0 1 1 1 0 0 1 1 0 1
1 1 0 0 0 1 0 1 1 0 1
1 1 0 1 0 0 0 1 1 0 1
1 1 1 0 0 1 0 1 1 0 1
1 1 1 1 0 0 0 1 1 0 1
99 BIBS
Computer Number System Computer Applications for Business
Example 4: Sketch the logic circuit for the Boolean expression with truth table:
Z = A’BC’+ABC’+A’BC
100 BIBS
Computer Applications for Business Computer Number System
Example 5: Sketch the logic circuit for the Boolean expression with truth table:
Z = (A+B)C+(A’+C’)B
101 BIBS
Computer Number System Computer Applications for Business
Summary:
Number systems are simply ways to count things. Ours is the base-10 or radix-10
system.
All computers use the binary system : Binary number system: Base = 2. Thus there are 2
numbers: 0 and 1 A single binary number is called a Binary digit , or bit.
Octal numbers have base 8 and the fundamental numbers are 0,1,2,3,4,5,6 and 7
Hexa-decimal numbers have base 16 and fundamental numbers are
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E and F.
Boolean algebra provides a concise way to express the operation of a logic circuit
formed by a combination of logic gates so that the output can be determined for
various combinations of input values.
There are basically three fundamental gates OR, AND and NOT gate
102 BIBS
Computer Applications for Business Data Base Management System
Objectives
After completion of this unit you should be able to
103 BIBS
Data Base Management System Computer Applications for Business
Introduction
Data is collection of facts and figures which can be processed to produce information. Name
of a student, age, class and her subjects can be counted as data for recording purposes.
Mostly data represents recordable facts. Data aids in producing information which is based
on facts. For example, if we have data about marks obtained by all students, we can then
conclude about toppers and average marks etc.
A database is a collection of data, typically describing the activities of one or more related
organizations. A database management system stores data, in such a way which is easier to
retrieve, manipulate and helps to produce information. It is a collection of data. This is a
collection of related data with an implicit meaning and hence is a database.
The primary goal of a DBMS is to provide a way to store and retrieve database information
that is both convenient and efficient. Database systems are designed to manage large bodies
of information. Management of data involves both defining structures for storage of
information and providing mechanisms for the manipulation of information. In addition, the
database system must ensure the safety of the information stored, despite system crashes
or attempts at unauthorized access. If data are to be shared among several users, the system
must avoid possible anomalous results.
Real-world entity: Modern DBMS are more realistic and uses real world
entities to design its architecture. It uses the behavior and attributes too.
For example, an employee database may use employee as entity and their
designation as their attribute.
104 BIBS
Computer Applications for Business Data Base Management System
ACID Properties: DBMS follows the concepts for ACID properties, which
stands for Atomicity, Consistency, Isolation and Durability. These concepts
are applied on transactions, which manipulate data in database. ACID
properties maintains database in healthy state in multi-transactional
environment and in case of failure.
Multiple views: DBMS offers multiples views for different users. A user who
is in sales department will have a different view of database than a person
working in production department. This enables user to have a concentrate
view of database according to their requirements.
Security: Features like multiple views offers security at some extent where
users are unable to access data of other users and departments. DBMS
offers methods to impose constraints while entering data into database
and retrieving data at later stage. DBMS offers many different levels of
security features, which enables multiple users to have different view with
105 BIBS
Data Base Management System Computer Applications for Business
different features. For example, a user in sales department cannot see data
of purchase department is one thing, additionally how much data of sales
department he can see, can also be managed.
File Oriented Approach: The earliest business computer systems were used to process
business records and produce information. They were generally faster and more accurate
than equivalent manual systems. These systems stored groups of records in separate files,
and so they were called file processing systems. In a typical file processing systems, each
department has its own files, designed specifically for those applications. The department
itself working with the data processing staff, sets policies or standards for the format and
maintenance of its files. Programs are dependent on the files and vice-versa; that is, when
the physical format of the file is changed, the program has also to be changed. Although the
traditional file oriented approach to information processing is still widely used, it does have
some very important disadvantages.
System programmers wrote these application programs to meet the needs of the bank. New
application programs are added to the system as the need arises.
For example, suppose that the savings bank decides to offer checking accounts. As a result,
the bank creates new permanent files that contain information about all the checking
accounts maintained in the bank, and it may have to write new application programs to deal
with situations that do not arise in savings accounts, such as overdrafts. Thus, as time goes
by, the system acquires more files and more application programs.
106 BIBS
Computer Applications for Business Data Base Management System
Data redundancy and inconsistency: Since different programmers create the files and
application programs over a long period, the various files are likely to have different formats
and the programs may be written in several programming languages. Moreover, the same
information may be duplicated in several places (files). For example, the address and
telephone number of a particular customer may appear in a file that consists of savings-
account records and in a file that consists of checking-account records. This redundancy
leads to higher storage and access cost. In addition, it may lead to data inconsistency; that is,
the various copies of the same data may no longer agree. For example, a changed customer
address may be reflected in savings-account records but not elsewhere in the system.
Difficulty in accessing data: Suppose that one of the bank officers needs to find out the
names of all customers who live within a particular postal-code area. The officer asks the
data-processing department to generate such a list. Because the designers of the original
system did not anticipate this request, there is no application program on hand to meet it.
There is, however, an application program to generate the list of all customers. The bank
officer has now two choices: either obtains the list of all customers and extracts the needed
information manually or ask a system programmer to write the necessary application
program. Both alternatives are obviously unsatisfactory. Conventional file-processing
environments do not allow needed data to be retrieved in a convenient and efficient
manner. More responsive data-retrieval systems are required for general use.
Data isolation: Because data are scattered in various files and files may be in different
formats, writing new application programs to retrieve the appropriate data is difficult.
Integrity problems: The data values stored in the database must satisfy certain types of
consistency constraints. For example, the balance of a bank account may never fall below a
prescribed amount. Developers enforce these constraints in the system by adding
appropriate code in the various application programs. However, when new constraints are
added, it is difficult to change the programs to enforce them.
Atomicity problems: A computer system, like any other mechanical or electrical device, is
subject to failure. In many applications, it is crucial that, if a failure occurs, the data be
restored to the consistent state that existed prior to the failure. Consider a program to
transfer Rs.5000 from account A to account B. If a system failure occurs during the execution
of the program, it is possible that the Rs.5000 was removed from account A but was not
credited to account B, resulting in an inconsistent database state. Clearly, it is essential to
database consistency that either both the credit and debit occur, or that neither occur. That
is, the funds transfer must be atomic—it must happen in its entirety or not at all. It is
difficult to ensure atomicity in a conventional file-processing system.
107 BIBS
Data Base Management System Computer Applications for Business
Concurrent-access anomalies: For the sake of overall performance of the system and faster
response, many systems allow multiple users to update the data simultaneously. In such an
environment, interaction of concurrent updates may result in inconsistent data. Consider
bank account A, containing Rs.5000. If two customers withdraw funds (say Rs.500 and
Rs.1000 respectively) from account A at about the same time, the result of the concurrent
executions may leave the account in an incorrect (or inconsistent) state.
Security problems: Not every user of the database system should be able to access all the
data. For example, in a banking system, payroll personnel need to see only that part of the
database that has information about the various bank employees. They do not need access
to information about customer accounts. But, since application programs are added to the
system in an ad hoc manner, enforcing such security constraints is difficult.
Data integrity and security: If data is always accessed through the DBMS, the DBMS
can enforce integrity constraints on the data. For example, before inserting salary
information for an employee, the DBMS can check that the department budget is
not exceeded. Also, the DBMS can enforce access controls that govern what data is
visible to different classes of users.
Data administration: When several users share the data, centralizing the
administration of data can offer significant improvements. Experienced
professionals who understand the nature of the data being managed, and how
different groups of users use it, can be responsible for organizing the data
representation to minimize redundancy.
108 BIBS
Computer Applications for Business Data Base Management System
Disadvantages of DBMS:
Danger of a Overkill: For small and simple applications for single users a database
system is often not advisable.
Costs: Through the use of a database system new costs are generated for the system
itself but also for additional hardware and the more complex handling of the system.
Database Users: DBMS is used by various users for various purposes. Some may involve in
retrieving data and some may involve in backing it up. Some of them are described as
follows:
Administrators: A bunch of users maintain the DBMS and are responsible for
administrating the database. They are responsible to look after its usage and by
whom it should be used. They create users access and apply limitation to maintain
isolation and force security. Administrators also look after DBMS resources like
system license, software application and tools required and other hardware related
maintenance.
Designer: This is the group of people who actually works on designing part of
database. The actual database is started with requirement analysis followed by a
good designing process. They people keep a close watch on what data should be
kept and in what format. They identify and design the whole set of entities,
relations, constraints and views.
End Users: This group contains the persons who actually take advantage of
database system. End users can be just viewers who pay attention to the logs or
market rates or end users can be as sophisticated as business analysts who take the
most of it.
109 BIBS
Data Base Management System Computer Applications for Business
Databases change over time as information is inserted and deleted. The collection of
information stored in the database at a particular moment is called an instance of the
database. The overall design of the database is called the database schema. Schemas are
changed infrequently, if at all.
Database systems have several schemas, partitioned according to the levels of abstraction.
The physical schema describes the database design at the physical level, while the logical
schema describes the database design at the logical level. A database may also have several
schemas at the view level, sometimes called sub schemas that describe different views of
the database.
A data definition language (DDL) is used to define the external and conceptual schemas.
Conceptual Schema: The conceptual schema (sometimes called the logical schema)
describes the stored data in terms of the data model of the DBMS. In a relational
DBMS, the conceptual schema describes all relations that are stored in the database.
In a university database, these relations contain information about entities, such as
students and faculty, and about relationships, such as students’ enrollment in
courses. All student entities can be described using records in a Students relation. In
fact, each collection of entities and each collection of relationships can be described
as a relation, leading to the following conceptual schema:
o Students(sid: string, name: string, login: string, age: integer,)
o Faculty(fid: string, fname: string, sal: real)
o Courses(cid: string, cname: string, credits: integer)
o Rooms(rno: integer, address: string, capacity: integer)
o Enrolled(sid: string, cid: string, grade: string)
o Teaches(fid: string, cid: string)
The physical schema: This schema specifies additional storage details. Essentially,
the physical schema summarizes how the relations described in the conceptual
schema are actually stored on secondary storage devices such as disks and tapes. A
sample physical schema for the university database follows:
o Create indexes on the first column of the Students, Faculty, and Courses
relations, the sal column of Faculty, and the capacity column of Rooms
Decisions about the physical schema are based on an understanding of how
the data is typically accessed. The process of arriving at a good physical
schema is called physical database design.
110 BIBS
Computer Applications for Business Data Base Management System
External Schema: External schemas, which usually are also in terms of the data
model of the DBMS, allow data access to be customized (and authorized) at the level
of individual users or groups of users. Any given database has exactly one
conceptual schema and one physical schema because it has just one set of stored
relations, but it may have several external schemas, each tailored to a particular
group of users. Each external schema consists of a collection of one or more views
and relations from the conceptual schema. A view is conceptually a relation, but the
records in a view are not stored in the DBMS. Rather, they are computed using a
definition for the view, in terms of relations stored in the DBMS.
111 BIBS
Data Base Management System Computer Applications for Business
Conceptual schema: It hides the details of physical storage structures and concentrates on
describing entities, data types, relationships, operations, and constraints.
Internal schema: It describes the physical storage structure of the DB and uses a low-level
(physical) data model to describe the complete details of data storage and access paths Data
and meta-data. Three schemas are only meta-data (descriptions of data). Data actually
exists only at the physical level
Mapping: DBMS must transform a request specified on an external schema into a request
against the conceptual schema, and then into the internal schema.
Logical data independence: The capacity to change the conceptual schema without having
to change external schema or application programs is called logical data independence.
A view including only E# and Name is not affected by changes in any other attributes.
Logical data independence is the capacity to change the conceptual schema without having
to change external schemas or application programs. We may change the conceptual
schema to expand the database (by adding a record type or data item), or to reduce the
database (by removing a record type or data item). In the latter case, external schemas that
refer only to the remaining data should not be affected. Only the view definition and the
mappings need be changed in a DBMS that supports logical data independence.
Physical data independence: The capacity to change the internal schema without having to
change the conceptual (or external) schema.
Internal schema may change to improve the performance (e.g., creating additional
access structure)
112 BIBS
Computer Applications for Business Data Base Management System
Overview of database design: The database design process can be divided into six steps.
The ER model is most relevant to the first three steps.
Schema Refinement: The fourth step in database design is to analyze the collection
of relations in our relational database schema to identify potential problems, and to
refine it. In contrast to the requirements analysis and conceptual design steps, which
are essentially subjective, schema refinement can be guided by some elegant and
powerful theory like the theory of normalizing relations—restructuring them to
ensure some desirable properties.
Physical Database Design: In this step we must consider typical expected workloads
that our database must support and further refine the database design to ensure
that it meets desired performance criteria.
113 BIBS
Data Base Management System Computer Applications for Business
Security Design: In this step, we identify different user groups and different roles
played by various users (e.g., the development team for a product, the customer
support representatives, the product manager). For each role and user group, we
must identify the parts of the database that they must be able to access and the
parts of the database that they should not be allowed to access, and take steps to
ensure that they can access only the necessary parts.
Weak relationship
Relationship
Multi valued
Attribute attribute
114 BIBS
Computer Applications for Business Data Base Management System
Entity with attributes: let employee be an entity. It can have several attributes like employee
code (E-No.), employee name (E-NAME), address (ADD), phone number (Ph.No.),
department no.(DEPT No., designation.
E-NAME
E-No.
ADD
EMPLOYEE
DESIGNATION.
Ph. No.
DEPT No.
Several types of attributes occur in the ER model: simple versus composite; single-valued
versus multivalued; and stored versus derived.
Composite Versus Simple (Atomic) Attributes: Composite attributes can be divided into
smaller subparts, which represent more basic attributes with independent meanings. For
example, the Address attribute of the employee entity can be sub-divided into Street
Address, City, State, and PIN code Attributes that are not divisible are called simple or
atomic attributes. The value of a composite attribute is the concatenation of the values of its
constituent simple attributes.
House
no.
Address
Street no.
PIN City
State
115 BIBS
Data Base Management System Computer Applications for Business
Single-valued Versus Multi-valued Attributes: Most attributes have a single value for a
particular entity; such attributes are called single-valued. For example, Age is a single-valued
attribute of person. In some cases an attribute can have a set of values for the same entity—
for example, phone no. attribute for an employee, or a College Degrees attribute for a
person. One person may not have a college degree, another person may have one, and a
third person may have two or more degrees; so different persons can have different
numbers of values for the College Degrees attribute. Such attributes are called multi-valued.
A multi-valued attribute may have lower and upper bounds on the number of values allowed
for each individual entity.
College Degree
Stored Versus Derived Attributes: In some cases two (or more) attribute values are
related—for example, the Age and Birth Date attributes of a person. For a particular person
entity, the value of Age can be determined from the current (today’s) date and the value of
that person’s Birth Date. The Age attribute is hence called a derived attribute and is said to
be derivable from the Birth Date attribute, which is called a stored attribute. Some attribute
values can be derived from related entities; for example, an attribute Number of Employees
of a department entity can be derived by counting the number of employees related to
(working for) that department.
Entity Types and Entity Sets: A database usually contains groups of entities that are similar.
For example, a company employing hundreds of employees may want to store similar
information concerning each of the employees. These employee entities share the same
attributes, but each entity has its own value(s) for each attribute. An entity type defines a
collection (or set) of entities that have the same attributes. Each entity type in the database
is described by its name and attributes. The following figure shows two entity types, named
EMPLOYEE and DEPARTMENT, and a list of attributes for each. The collection of all entities
of a particular entity type in the database at any point in time is called an entity set; the
entity set is usually referred to using the same name as the entity type. For example,
EMPLOYEE refers to both a type of entity as well as the current set of all employee entities in
the database. An entity type is represented in ER diagrams as a rectangular box enclosing
the entity type name. Attribute names are enclosed in ovals and are attached to their entity
type by straight lines. Composite attributes are attached to their component attributes by
straight lines. Multi-valued attributes are displayed in double ovals.
116 BIBS
Computer Applications for Business Data Base Management System
E-NAME
E-No.
ADD
EMPLOYEE
DESIGNATI
ON.
Ph. No.
DEPT No.
D-NAME
D-No.
ADD
DEPARTMENT
PH. No
Key Attributes of an Entity Type: An important constraint on the entities of an entity type is
the key or uniqueness constraint on attributes. An entity type usually has an attribute whose
values are distinct for each individual entity in the collection. Such an attribute is called a key
attribute, and its values can be used to identify each entity uniquely. For example E-No
(employee code ) is unique for EMPLOYEE so this is the primary key. Sometimes, several
attributes together form a key, meaning that the combination of the attribute values must
be distinct for each entity. If a set of attributes possesses this property, we can define a
composite attribute that becomes a key attribute of the entity type. Notice that a composite
key must be minimal; that is, all component attributes must be included in the composite
attribute to have the uniqueness property. In ER diagrammatic notation, each key attribute
has its name underlined inside the oval, specifying that an attribute is a key of an entity type
means that the preceding uniqueness property must hold for every extension of the entity
type. Hence, it is a constraint that prohibits any two entities from having the same value for
the key attribute at the same time.
117 BIBS
Data Base Management System Computer Applications for Business
Binary relationship
Recursive relationship
Ternary relationship
One – to – One:
One – to – Many: One entity is associated with many number of same entity.
118 BIBS
Computer Applications for Business Data Base Management System
Many-to-many:
119 BIBS
Data Base Management System Computer Applications for Business
120 BIBS
Computer Applications for Business Data Base Management System
There will be employees. Each employee works for one department but may work on several
projects. We keep track of the number of hours per week that an employee currently works
on each project. We also keep track of the direct supervisor of each employee. Each
employee may have a number of DEPENDENTs. For each dependent, we keep track of their
name, sex, Birth date, and relationship to the employee.
121 BIBS
Data Base Management System Computer Applications for Business
Integrity Constraints: Before one can start to implement the database tables, one must
define the integrity constraints. Integrity means something like 'be right' and consistent. The
data in a database must be right and in good condition. There are the domain integrity, the
entity integrity, the referential integrity and the foreign key integrity constraints.
Domain Integrity: Domain integrity means the definition of a valid set of values for an
attribute. Definition should be like
- data type,
- length or size
- is null value allowed
- is the value unique or not for an attribute.
The default value, the range (values in between) and/or specific values for the attribute may
also be defined. Some DBMS allow defining the output format and/or inputting mask for the
attribute. These definitions ensure that a specific attribute will have a right and proper value
in the database.
Entity Integrity Constraint: The entity integrity constraint states that primary keys can't be
null. There must be a proper value in the primary key field. This is because the primary key
value is used to identify individual rows in a table. If there were null values for primary keys,
it would mean that we could not identify those rows. On the other hand, there can be null
values other than primary key fields. Null value means that one doesn't know the value for
that field. Null value is different from zero value or space.
122 BIBS
Computer Applications for Business Data Base Management System
Foreign Key Integrity Constraint: There are two foreign key integrity constraints: cascade
update related fields and cascade delete related rows. These constraints affect the
referential integrity constraint.
Cascade Update Related Fields: Any time the primary key of a row in the primary table is
changed, the foreign key values are updated in the matching rows in the related table. This
constraint overrules rule 2 in the referential integrity constraints.
Cascade Delete Related Rows: Any time you delete a row in the primary table, the matching
rows are automatically deleted in the related table. This constraint overrules rule 1 in the
referential integrity constraints.
Database Normalization
Un-normalized data exists in flat files. Normalization is the process of moving data into
related tables. Database normalization is the process of removing redundant data from
tables to improve storage efficiency, data integrity, and scalability.
In the relational model, methods exist for quantifying how efficient a database is. These
classifications are called normal forms (or NF), and there are algorithms for converting a
given database between them.
Normalization generally involves splitting existing tables into multiple ones, which must be
re-joined or linked each time a query is issued.
Edgar F. Codd first proposed the process of normalization and what came to be known as
the 1st normal form. In his paper A Relational Model of Data for Large Shared Data Banks
Codd stated: “There is, in fact, a very simple elimination procedure which we shall call
normalization. Through decomposition non simple domains are replaced by ‘domains
whose elements are atomic values.’”
123 BIBS
Data Base Management System Computer Applications for Business
Example of Normalization:
Emp No Employee Name Time Card No Time Card Date Dept No Dept
Name
10 Ranjan Banerjee 106 11/02/2013 20 Marketing
10 Ranjan Banerjee 106 11/02/2013 20 Marketing
10 Ranjan Banerjee 106 11/02/2013 20 Marketing
10 Ranjan Banerjee 115 11/09/2013 20 Marketing
99 Sonal Kapoor 10 Accounting
500 Neha Sinha 107 11/02/2013 50 Shipping
500 Neha Sinha 107 11/02/2013 50 Shipping
700 Mohan Das 108 11/02/2013 50 Shipping
700 Mohan Das 116 11/09/2002 50 Shipping
Table: Employees
124 BIBS
Computer Applications for Business Data Base Management System
Table: Departments
Dept No Dept Name
10 Accounting
20 Marketing
50 Shipping
106 10 11/02/2013
115 10 11/09/2013
Let's start by adding a couple of books written by Luke Welling and Laura Thomson. Because
this book has two authors, we are going to need to accommodate both in our table.
125 BIBS
Data Base Management System Computer Applications for Business
First, this table is not very efficient with storage. Let’s imagine for a second that Luke and
Laura were extremely busy writers and managed to produce 500 books for our database.
The combination of their two names is 25 characters long, and since we will repeat their two
names in 500 rows we are wasting 25 × 500 = 12,500 bytes of storage space unnecessarily.
This creates data redundancy.
Second, this design does not protect data integrity. Let’s once again imagine that Luke and
Laura have written 500 books. Someone has had to type their names into the database 500
times, and it is very likely that one of their names will be misspelled at least once (i.e..
Thompson instead of Thomson). Our data is now corrupt, and anyone searching for book by
author name will find some of the results missing. The same thing could happen with
publisher name. Sams publishes hundreds of titles and if the publisher's name were
misspelled even once the list of books by publisher would be missing titles.
Third, this table does not scale well. First of all, we have limited ourselves to only two
authors, yet some books are written by over a dozen people.
Example 2:
Updating problem: To update the address of a student whose record is there for more than
once we have to update S- address column more than once else data will become
inconsistent.
Insertion Problem: For inserting the record of a student who has taken new admission but
not opted for any subject yet we have to leave the subject opted column null for the
student.
Deletion Problem: Suppose the student 402 has opted out temporarily from the subject
Mathematics then we have to delete the row but it will delete the whole student record.
126 BIBS
Computer Applications for Business Data Base Management System
First Normal Form: The normalization process involves getting our data to conform to three
progressive normal forms, and a higher level of normalization cannot be achieved until the
previous levels have been achieved (there are actually five normal forms). The First Normal
Form (or 1NF) involves removal of redundant data from horizontal rows. We want to ensure
that there is no duplication of data in a given row, and that every column stores the least
amount of information possible (making the field atomic).
In our example1 table above we have two violations of First Normal Form. First, we have
more than one author field, and our subject field contains more than one piece of
information. With more than one value in a single field, it would be very difficult to search
for all books on a given subject. In addition, with two author fields we have two fields to
search in order to look for a book by a specific author. We could get around these problems
by modifying our table to have only one author field, with two entries for a book with two
authors, as in the following table:
While this approach has no redundant columns and the subject column has only one piece
of information, we do have a problem that we now have two rows for a single book. Also, to
ensure that we can do a search of author and subject (i.e. books on PHP by Luke Welling),
we would need four rows to ensure that we had each combination of author and subject.
127 BIBS
Data Base Management System Computer Applications for Business
Example 2: We want to create a table of user information, and we want to store each users'
Name, Company, Company Address, and some personal urls. You might start by defining a
table structure like this:
This table is in un-normalized form because none of rules of normalization have been
applied yet.
Notice how we're breaking that first rule by repeating the url1 and url2 fields?
Now the table is said to be in the First Normal Form. We've solved the problem of url field
problem, but by doing so we have created some problems. Every time we input a new
record into the users table, we've got to duplicate all that company and user name data. Not
only will our database grow much larger than we'd ever want it to, but we could easily begin
corrupting our data by misspelling some of that redundant information.
There must not be any partial dependency on any column on primary key. It means
that for a table that has concatenated primary key each column of the table which is
not a part of the primary key must depend upon entire concatenated key for its
existence.
If any column depends on only one part of the concatenated key then it is not in 2nd
normal form.
128 BIBS
Computer Applications for Business Data Base Management System
In the above table concatenation of c-id and order –id is the primary key so the table is in 1st
Normal Form. But it is not in 2nd Normal Form as there is partial dependence. C-name only
depends on c-id and Order name only depends on Order-id. The tables will be decomposed
to make them in second normal form.
Customer detail
C-id C-name
101 Rohan
102 Ravi
103 Ranjan
Order Details
129 BIBS
Data Base Management System Computer Applications for Business
Sale details
Third normal form: the conditions for third normal form are
Example 1
The table is not is 1st normal form because there are multiple records in colour field. Row 1
and row 3 are the same so there are duplicate records and there is no primary key. So first it
needs to be converted in first normal form.
130 BIBS
Computer Applications for Business Data Base Management System
1NF
The above table is not in 2nd normal form as price and tax depend on item but not on colour.
Item Table
Item Colour
T-Shirt Red
Polo Red
T-Shirt blue
Polo Yellow
Sweat-shirt black
131 BIBS
Data Base Management System Computer Applications for Business
Price table
Item Table
Item Colour
T-Shirt Red
Polo Red
T-Shirt blue
Polo Yellow
Sweat-shirt black
Price table
Item Price
T-Shirt 240.00
Polo 240.00
132 BIBS
Computer Applications for Business Data Base Management System
Tax table
Price Tax
240.00 0.60
240.00 0.60
500.00 1.25
Student-
ID Student- Advisor- Advisor- Adv-
Class1 Class2 Class3
Name ID Name Room
Naresh 159-02
1022 Rohan 10 412 101-07 143-01
Sharma
No Repeating Fields
Data in Smallest Parts
133 BIBS
Data Base Management System Computer Applications for Business
Table: Students
Table: Registration
1022 101-07
1022 143-01
1022 159-02
4123 201-01
4123 211-02
4123 214-01
Tables in Third Normal Form: Data Not Dependent On Key is Eliminated
Advisor table:
Student table:
1022 Rohan 10
4123 Rakesh 12
134 BIBS
Computer Applications for Business Data Base Management System
Table: Registration
1022 101-07
1022 143-01
1022 159-02
4123 201-01
4123 211-02
4123 214-01
Summary
Database is collection of data which is related by some aspect. Data is collection of facts
and figures which can be processed to produce information. Name of a student, age,
class and her subjects can be counted as data for recording purposes.
3-tier architecture separates it tier from each other on basis of users.
Database (Data) Tier: At this tier, only database resides. Database along with its query
processing languages sits in layer-3 of 3-tier architecture. It also contains all relations
and their constraints.
Application (Middle) Tier: At this tier the application server and program, which access
database, resides. For a user this application tier works as abstracted view of database.
Users are unaware of any existence of database beyond application. For database-tier,
application tier is the user of it. Database tier is not aware of any other user beyond
application tier. This tier works as mediator between the two.
User (Presentation) Tier: An end user sits on this tier. From a user’s aspect this tier is
everything. He/she doesn't know about any existence or form of database beyond this
layer. At this layer multiple views of database can be provided by the application. All
views are generated by applications, which reside in application tier.
Entity-Relationship model is based on the notion of real world entities and relationship
among them. While formulating real-world scenario into database model, ER Model
creates entity set, relationship set, general attributes and constraints.
135 BIBS
Computer Applications for Business Information System
INFORMATION SYSTEM
Objectives
After completion of this unit you should be able to
Introduction
In this age of information, almost all fields of endeavor such as education, manufacturing,
research, games, entertainment, and business treat information systems as a need. Indeed,
every activity in our daily life today requires people to get involved in the use of information
systems. Have you ever used an ATM to withdraw money or to buy goods at a large
supermarket? In both cases, you are indirectly using the facilities offered by an information
system.
System: A system is simply a group of activities and elements, which have been arranged to
achieve a certain objective. An information system is a combination of hardware, software
and telecommunication systems, which can support business operations to increase
productivity, and help managers make decisions.
In this age, the success of a business depends on the information system. Organisations
today use information systems:
136 BIBS
Computer Applications for Business Information System
Modeling the business process: Many companies today use information as a basis to
increase productivity, producing quality products, providing quality services, creating
customer confidence, and making timely decisions. As such, information technology has
become the prime reason for the success and failure of a company to compete in business.
This illustrates the impact of information technology on business operations today. As a
result, designing an information system of high quality is important so that organisations can
compete successfully in the global market. Information systems experts need to understand
the business operation of a company before they can design a comprehensive system. Every
business situation is likely to be different. As an example, business transactions at a
supermarket, bank, and hotel require information systems that are different and unique. A
systems analyst applies a technique called Business Process Modeling to represent
company’s operations and information requirements. A systems analyst works in an
information technology based department. This person is responsible for planning, analysing
and implementing information systems.
Business Profile, Model and Process: In trying to understand the operation of a certain
company, a system analyst needs to develop a business profile and consider a number of
business models. Business profile covers ownership, structure, and management of the
company, together with its customers and suppliers; while a business model can take the
form of a brick-and-mortar type, a virtual store, and so on. They can be as detailed as these,
or can just be in brief forms. Business Process explains a certain process, activity, and the
results expected. It is basically a way of doing business, which begins with the customer and
ends with the customer. Customers can either be external or internal.
Sub process: Check
student status
137 BIBS
Computer Applications for Business Information System
The above business process has a beginning and an end, three sub-processes and result.
When a company tries to simplify operations, or tries to decrease operational cost, or
increase value to customers, the company is said to be involved in business process re-
engineering (BPR).
Storage
hardware
138 BIBS
Computer Applications for Business Information System
Type of
Functions Examples
Hardware
Input Giving data input to the system. Keyboard, mouse, pointer,
screen, touch ball and scanner.
Processing Operating the computer system. Central processing unit and
memory.
Output Can display results or output which are Screen, microphone and printer.
generated from the computer system.
Storage For storing data inside the computer. Hard disk, floppy disk, CD-ROM
and magnetic tape.
Software: Software consists of two categories - the system software and the application
software. System Software controls the computer and contains the operating system and
device drivers, which can communicate with the hardware. It can also modify data into a
new form, prevent viruses and make copies. Application Software contains programs which
can help users and enable companies to perform business functions. Users can increase
productivity with the presence of application software such as spreadsheets, word
processing, ordering systems, and accounts receivable.
Data: Data refers to the raw facts on anything or entities like student names, courses and
marks. The raw data that has not yet been provided can be processed to become more
useful information. Information is an organized, meaningful and useful interpretation of data
-such as a company’s performances or a student's academic performance. Information
systems change data into information, which is useful and capable of giving a certain
meaning to its users.
Based on the example in the above figure, we can understand that records inside every
attribute under the DATA item do not give any specific meaning. Every data or record here is
a raw fact. After going through processes such as addition, ordering, combining,
manipulating and so on, many kinds of information can be produced. The information
generated is not limited to a certain form. It can be interpreted in many ways according to
the needs and wills of customers.
Process: Process or procedure explains the activities carried out by users, managers and
staff. Process is important for supporting a certain business model available as written
139 BIBS
Computer Applications for Business Information System
The success or failure of an information system depends on whether the system that has
been developed can fulfill the user's requirements, and the users feel satisfied with the
results and the system's operation. A successful system requires integrated efforts from
information technology experts such as the system analysts, programmers and the
information technology managers so as to fulfill business needs and to support company's
objectives.
140 BIBS
Computer Applications for Business Information System
System
Explanation
Category
Better known as TPS and is one of the first systems to be automated.
Can access and record information about all transactions related to the
organisation.
● Transactions occur whenever there exist activities involving sales order
processing, accounts receivable, accounts payable, inventory
Transaction and ordering as well as payroll.
Processing ● These transactions involve credit and debit in the company’s ledger
System account.
● The output from this transaction is the account statement, which is used
to generate financial reports.
● TPS now uses the latest technology which uses the E-commerce concept.
This is a new challenge in the field of transaction processing which begins to
shift to the on-line transaction processing system.
This system will take the information that has been
extracted from TPS and generate reports which are required by the
Management management for planning and controlling a company's business.
Information ● This system is capable of fulfilling the needs of management in acquiring
System the information that:
(a) is brief and useful.
(b) can be obtained and processed at the right time to make a decision.
A decision support system specifically used by the
executive management in making strategic decisions.
● It is a tool that provides online access directly to the relevant information,
in the format that is useful and can be browsed.
● Relevant information is timely, precise and useful in business aspects,
according to the interest of certain managers.
● Useful format, and can be browsed easily; will mean that the system has
Executive
been specially built for the use of individuals who have little time to spare,
Information
are less skilful in using the keyboard and less experienced with computers.
System
● This system can be surfed easily so that managers can identify strategic
issues and can then explore information for getting the sources about those
issues.
It is also an information system that combines the
features of information reporting system and decision support system.
It focuses on fulfilling the strategic information needs of the top
management.
The main focus of this information system is for the
effectiveness of the manager in analysing the information and making a
Decision
decision.
Support
● It is used for handling decisions that are not structured, i.e. decisions
System
which are made when an emergency happens.
● This system uses a database management system, query language,
141 BIBS
Computer Applications for Business Information System
Systems Owner: The systems owner bears the cost of system development and
maintenance. He has the right over the system, determines the interest over the system and
determines the policies over its use. The system owner is also responsible for system
justification and system acceptance. In certain situations, the system owner is also a system
user. System owners always think of the return value, which can be obtained by developing
the information system. This return is valued from various aspects such as:
What are the benefits of the system?
What are the mission and objectives?
What is the cost of developing the system?
What is the cost of operating the system?
142 BIBS
Computer Applications for Business Information System
Systems User: The system user is an individual who uses the system for producing
something, or uses the system to help him in his daily jobs. Directly, users are the ones who
get the benefits from the system that has been developed. Besides being the initiators for
the new information system request, users also determine:
Compared to the system owner, the system users are not so interested in the cost and
benefits of the system. They often emphasize the business needs inside the system. System
users can be divided into three main categories: internet, external and mobile users.
b. Mobile User: Mobile users are the users who often do jobs outside the
company. Examples of these users are salesmen and sales
representatives. They often do jobs that require travelling from place
to place, meeting customers, buyers and so on. Organisations which
have users of this kind often have complex information system designs
because the system that is developed needs to accommodate the
information needed by users of this kind. In fulfilling the information
needs of mobile users, the information should be accessible wherever
they are. Therefore, the information system that has been developed
should provide a telecommunications environment and the network to
enable information stored in the database to be accessible by users.
c. External User: The information system can now connect the system to
other individuals as users of the system. Due to global competition,
businesses are redesigned to enable connectivity with other
organisations, partners, suppliers, customers and end users. As an
example, you need not fill up any form to apply for entry into OUM.
With the information system provided by OUM, you just need to go to
the OUM website, fill up the application form online, and send the form
143 BIBS
Computer Applications for Business Information System
Systems Designer: Systems designers are experts in the technical field who would design a
system for fulfilling the needs of users. They are responsible for manipulating the needs of
business users and the constraints in technical solutions. They design computer files,
databases, input, output, screen, networks, and programs that can fulfill the needs of system
users. They are also responsible for integrating the technical solutions into the daily business
environment. Systems designers understand the technological environment better when
compared to systems owners and systems users. They always provide alternatives and
design systems based on technological constraints at that time. Now, systems designers give
more attention to technical experts such as:
Systems Developer: Systems developers are the experts in the technical field who would
develop, test and produce a system, which can operate successfully. They build the system
components based on the design specifications of the system designers. In many situations,
system designers are the system developers. They use technology to develop information
systems. Among the individuals who get involved directly in information system
development, you maybe ask what is the role of the systems analyst? In actual fact, the
systems analysts are really acting as facilitators for information systems development. The
system analyst has the expertise that is owned by all the above individuals. They should feel
comfortable with the views of all the individuals mentioned above. For the systems owners
and users, the systems analyst should develop and update their views. The duty of the
systems analyst is to ensure that the technical knowledge of systems designers and
developers are consistent with the current business needs.
IT enabled services: IT Enabled services (ITES), also called web enabled services
or remote services or Tele-working, covers the entire gamut of operations which exploit
Information Technology for improving efficiency of an organization. These services provide a
wide range of career options that include opportunities in call centers, medical transcription,
medical billing and coding, back office operations, revenue claims processing, legal
databases, content development, payrolls, logistics management, GIS (Geographical
Information System), HR services, web services etc.
144 BIBS
Computer Applications for Business Information System
Knowledge process
Software product outsourcing
IT infrastructure services development Business and financial
Help desks Product development research
Desktop support System testing Animation
Data center services Porting1/variants Data analytics
Mainframe support Localization Legal process and patent
Network operations Maintenance and support research
Gaming Other high-end processes
Consulting
IT consulting
Network consulting
145 BIBS
Computer Applications for Business Information System
The call centre is expected to be in a position to provide expert responses with accurate
information. The various functions that a Call Center can provide are broadly listed below.
The outbound (Dialing) module can also provide for the collection reminder and follow up
service.
Enquiries
146 BIBS
Computer Applications for Business Information System
Summary
As per the functions and the scope of usage, information systems can be divided into
six main categories.
o Transaction processing system
o Management information System
o Executive information System
o Decision support System
o Office Automation system
o Expert system
147 BIBS