ITB Notes (OU BBA 3rd Sem)
ITB Notes (OU BBA 3rd Sem)
ITB Notes (OU BBA 3rd Sem)
Unit - 1
In today's world computer has become a necessity for everyone. It’s almost
impossible to imagine that someone can live without computers. They have
become an electronic device of almost every day use for individuals of every age,
and essential in almost all the business dealings that are made nowadays as
huge information that need to be processed.
⮚ Input
⮚ Output
⮚ Processing
⮚ Storage
1
The computer system is made up of the central processing unit (CPU), memory
and related electronics (main cabinet), all the peripheral devices connected to it
and its operating system
The various components that make the computer system are as follows:
⮚ Power Supply
⮚ Processor (CPU)
⮚ Memory Stick
⮚ Video Card
⮚ Motherboard
⮚ Monitor
⮚ Operating System
Power Supply
2
Processor or Central Processing Unit (CPU)
RAM is a short term memory that handles data to be processed before it goes to
the CPU. Every time an application is opened, the CPU allocates a specified
amount of available RAM space to provide faster reaction time to user
commands within that application. RAM similar to a Hard Disk Drive (HDD) is a
storage device, but unlike HDDs, which are permanent storage spaces, RAM is a
temporary storage space meaning once the application is done using the RAM
space, it will be once again available to be used by the next application that
needs it.
Video Card
A video card inserted into the motherboard, give the system display capabilities.
The video card turns the processed and translated user input, along with any
other information provided by an application and turns it into a video signal to be
sent to a display device.
Motherboard
Hard disk drive is the long-term storage for files and settings. This is equivalent to
the Micro SD Card of mobile phone. Computer’s hard disk is of certain size and
can fill up and run out of space if periodic deletion of unwanted files are not
carried out.
Keyboard and mouse are the input devices which are used to provide input to the
computer system.
3
Monitor
Monitory is the output unit which is used to display the output generated by the
computer system.
Operating System
For hardware functions such as input and output and memory allocation, the
operating system acts as an intermediary between programs and the computer
hardware.
Input device:
When data is entered into the computer system, it is called an input. Input comes
in various forms such as texts, graphics, audio and video. Input devices are
needed to input data into the computer system.
Keyboard, mouse, scanner, barcode reader and digital camera are some
example of input devices.
Input is any data or instructions that we enter into the computer system for
processing.
There are some common ways of feeding input data into the system, which are:
• typing on a keyboard
• pointing with a mouse
Output device:
Output is the result of raw input data that has been processed by the central
processing unit into meaningful information. Common forms of output are texts,
numbers, graphics, sounds, animations and videos.
The most common output devices are computer screens, speakers and printers.
4
Figure: Output Devices
There are four types of output, which are texts, graphics, audio and video.
● The text consists of characters that are used to create texts, sentences
and paragraphs.
● Graphics are digital representations of non text information such as
drawings, charts and photographs.
● Audio is music, speech or any other sound.
A memory is just like a human brain. It is used to store data and instruction.
Computer memory is the storage space in computer where data is to be
processed and instructions required for processing are stored.
⮚ Cache Memory
⮚ Secondary Memory
5
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up
the CPU. It acts as a buffer between the CPU and the main memory. It is used to
hold those parts of data and program which are most frequently used by the
CPU. The parts of data and programs are transferred from the disk to cache
memory by the operating system, from where the CPU can access them.
✔ It stores the program that can be executed within a short period of time.
✔ It is very expensive.
Primary memory holds only those data and instructions on which the computer is
currently working. It has a limited capacity and data is lost when power is
switched off. It is generally made up of semiconductor device. These memories
are not as fast as registers. The data and instruction required to be processed
resides in the main memory. It is divided into two subcategories RAM and ROM.
6
✔ These are semiconductor memories.
Secondary Memory
✔ It is a non-volatile memory.
7
1.4 Processor
CPU is considered as the brain of the computer and performs all types of data
processing operations. It stores data, intermediate results, and instructions
(program) and controls the operation of all parts of the computer.
⮚ Control Unit
Storage unit can store instructions, data, and intermediate results. This unit
supplies information to other units of the computer when needed. It is also known
as internal storage unit or the main memory or the primary storage or Random
Access Memory (RAM).
8
Its size affects speed, power, and capability. Primary memory and secondary
memory are two types of memories in the computer.
✔ It stores the final results of processing before these results are released to
an output device.
✔ All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry
out any actual data processing operations.
✔ It obtains the instructions from the memory, interprets them, and directs
the operation of the computer.
✔ It communicates with Input/Output devices for transfer of data or results
from storage.
✔ It does not process or store data.
✔ Logic Section
Arithmetic Section
9
Logic Section
1.5 Hardware
1.6 Software
⮚ System Software
⮚ Application Software
System Software
10
✔ Fast in speed
✔ Difficult to design
✔ Difficult to understand
✔ Less interactive
✔ Smaller in size
✔ Difficult to manipulate
Application Software
✔ Easy to design
✔ More interactive
✔ Slow in speed
✔ Easy to understand
11
Definition
⮚
Memory Management Keeps track of the primary memory, i.e. what part of it is in use by whom, wh
⮚
Processor Management Allocates the processor (CPU) to a process and deallocates the processor wh
⮚
Device Management Keeps track of all the devices. This is also called I/O controller that decides wh
⮚
File Management Allocates and de-allocates the resources and decides who gets the resources.
12
⮚
Security Prevents unauthorized access to programs and data by means of passwords and other simila
⮚
Interaction with the Operators Interaction may take place via the console of the computer in the form
⮚
Error-detecting Aids Production of dumps, traces, error messages, and other debugging and error-det
1.9 Types of OS
1) Real Time
A real-time system is defined as a data processing system in which the time
interval required to process and respond to inputs is so small that it controls the
environment. The time taken by the system to respond to an input and display of
required updated information is termed as the response time. So in this method,
the response time is very less as compared to online processing.
Real-time systems are used when there time bound requirements on the
operation of a processor or the flow of data. A real-time operating system must
have well-defined, fixed time constraints, otherwise the system will fail.
For example, Scientific experiments, weapon systems, robots, air traffic control
systems, etc.
2) Time Sharing
Time-sharing or multitasking is a technique which enables many people, located
at various terminals, to use a particular computer system at the same time.
13
Processor's time which is shared among multiple users simultaneously is termed
as time-sharing.
Multiprogramming
Multiprocessing
14
A computer’s capability to process more than one task simultaneously is called
multiprocessing. A multiprocessing operating system is capable of running many
programs simultaneously, and most modern network operating systems (NOSs)
support multiprocessing.
A multiprocessing system uses more than one processor to process any given
workload, increasing the performance of a system’s application environment
beyond that of a single processor’s capability.
The need for GUI was clear since the first human/computer interface was through
keyboard text creation by what is called a DOS prompt. Commands were typed
on a keyboard at the DOS prompt to initiate responses from a computer. The use
of these commands and the need for exact spelling created a cumbersome and
inefficient interface.
15
1.12 Types of Network
There are several different types of computer networks. Computer networks can
be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and
the number of computers that are part of the network. Networks can cover
anything from a handful of devices within a single room to millions of devices
spread across the entire globe.
The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. A LAN typically relies mostly on wired
connections for increased speed and security, but wireless connections can
also be part of a LAN. High speed and relatively low cost are the defining
characteristics of LANs.
LANs are typically used for single sites where people need to share resources
among themselves but not with the rest of the outside world. Think of an office
building where everybody should be able to access files on a central server or
be able to print a document to one or more central printers. Those tasks
should be easy for everybody working in the same office, but you would not
want somebody just walking outside to be able to send a document to the
printer from their cell phone! If a local area network, or LAN, is entirely
wireless, it is referred to as a wireless local area network, or WLAN.
A wide area network, or WAN, occupies a very large area, such as an entire
country or the entire world. A WAN can contain multiple smaller networks,
such as LANs or MANs. The Internet is the best-known example of a public
WAN.
Network Topology refers to the layout of a network and how different nodes in a
network are connected to each other and how they communicate. Topologies are
either physical (the physical layout of devices on a network) or logical (the way
that the signals act on the network media, or the way that the data passes
through the network from one device to the next).
⮚ Mesh Topology
⮚ Star Topology
⮚ Bus Topology
⮚ Ring Topology
⮚ Tree Topology
1. Mesh Topology:
In a mesh topology every node has a connection to every other node in the
network. There are two types of mesh topologies:
Full mesh topology: occurs when every node has a circuit connecting it to every
other node in a network. Full mesh is very expensive to implement but yields the
17
greatest amount of redundancy, so in the event that one of those nodes fails,
network traffic can be directed to any of the other nodes. Full mesh is usually
reserved for backbone networks.
2. Star Topology:
Main Advantage: In a star network, one malfunctioning node doesn't affect the
rest of the network.
Main Disadvantage: If the central computer fails, the entire network becomes
unusable.
3. Bus Topology:
In networking a bus is the central cable,the main wire that connects all devices
on a local-area network (LAN). It is also called the backbone. This is often used
to describe the main network connections composing the Internet. Bus networks
are relatively inexpensive and easy to install for small networks. Ethernet
systems use a bus topology.
18
Main Advantage: It's easy to connect a computer or device and typically it
requires less cable than a star topology.
Main Disadvantage: The entire network shuts down if there is a break in the main
wire and it can be difficult to identify the problem if the network shuts down.
4. Ring Topology:
A local-area network (LAN) whose topology is a ring. That is, all of the nodes are
connected in a closed loop. Messages travel around the ring, with each node
reading those messages addressed to it.
Main Advantage: One main advantage to a ring network is that it can span larger
distances than other types of networks, such as bus networks, because each
node regenerates messages as they pass through it.
5. Tree Topology:
This is a "hybrid" topology that combines characteristics of linear bus and star
topologies. In a tree network, groups of star-configured networks are connected
to a linear bus backbone cable.
Main Advantage: A Tree topology is a good choice for large computer networks
as the tree topology "divides" the whole network into parts that are more easily
manageable.
Main Disadvantage: The entire network depends on a central hub and a failure of
the central hub can cripple the whole network.
19
1.14 Physical Communication Media
Physical communication media are the physical channels through which data is
transmitted between computers in a network. Media may be classified as
bounded (eg. wires, cables, and optical fibres) and unbounded (eg. radion wave,
microwave, infrared etc)
Bounded Media:
Bounded media are the physical links through which signals are confined to
narrow path. These are also called guide media. Bounded media are made up of
an external conductor (Usually Copper) bounded by jacket material. Bounded
media are great for LABS because they offer high speed, good security and low
cast. However, some time they cannot be used due distance communication.
Three common types of bounded media are used of the data transmission.
These are
⮚ Coaxial Cable
Coaxial Cable:
20
Coaxial cable is very common & widely used commutation media. For example
TV wire is usually coaxial.Coaxial cable gets its name because it contains two
conductors that are parallel to each other. The center conductor in the cable is
usually copper. The copper can be either a solid wire or stranded martial.
Outside the copper mesh is the final protective cover. The actual data travels
through the center conductor in the cable. EMI interference is caught by outer
copper mesh. There are different types of coaxial cable vary by gauge &
impedance.
Gauge is the measure of the cable thickness. It is measured by the Radio grade
measurement, or RG number. The high the RG number, the thinner the central
conductor core, the lower the number the thicker the core.
✔ Easy to install
✔ Up to 10Mbps capacity
✔ Medium of attenuation
✔ Easy to wire
✔ Easy to expand
21
DISADVANTAGE COAXIAL CABLE
✔ Single cable failure can take down an entire network
UTP is more common. It can be either voice grade or data grade depending on
the condition. UTP cable normally has an impedance of 100 ohm. UTP cost less
than STP and easily available due to its many use. There are five levels of data
cabling
Category 1
These are used in telephone lines and low speed data cable.
Category 2
These cables can support up to 4 mps implementation.
Category 3
These cable supports up to 16 mps and are mostly used in 10 mps.
Category 4
These are used for large distance and high speed. It can support 20mps.
Category 5
22
This is the highest rating for UTP cable and can support up to 100mps.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11
connector and 4 pair cable use RJ-45 connector.
Characteristics of UTP
✔ low cost
✔ easy to install
✔ High attenuation
✔ Effective to EMI
Advantages of UTP
✔ Easy installation
✔ Low cost
Disadvantages of UTP
✔ Short distance due to attenuation
It is similar to UTP but has a mesh shielding that’s protects it from EMI which
allows for higher transmission rate. IBM has defined category for STP cable.
Type 1
STP features two pairs of 22-AWG
Type 2
This type include type 1 with 4 telephone pairs
Type 6
This type feature two pairs of standard shielded 26-AWG
23
Type 7
This type of STP consist of 1 pair of standard shielded 26-AWG
Type 9
This type consist of shielded 26-AWG wire
Characteristics of STP
✔ Medium cost
✔ Easy to install
Advantages of STP:
✔ Shielded
Disadvantages of STP:
✔ More expensive than UTP and coaxial
3. Fiber Optics
Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber
optic cable light only moves in one direction for two way communication to take
place a second connection must be made between the two devices. It is actually
two stands of cable. Each stand is responsible for one direction of
communication. A laser at one device sends pulse of light through this cable to
other device. These pulses translated into “1’s” and “0’s” at the other end.
In the center of fiber cable is a glass stand or core. The light from the laser
moves through this glass to the other device around the internal core is a
reflective material known as CLADDING. No light escapes the glass core
because of this reflective cladding.
24
Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)
✔ No EMI interference
✔ Low attenuation
✔ No EMI interference
✔ Hard to install
UnBounded Media
Unguided or wireless media sends the data through air (or water), which is
available to anyone who has a device capable of receiving them. Types of
unguided/ unbounded media are discussed below:
⮚ Radio Transmission
⮚ MicroWave Transmission
1. Radio Transmission
Its frequency is between 10 kHz to 1GHz. It is simple to install and has high
attenuation. Radio waves can operate on a single or multiple frequency bands.
2. MicroWave Transmission
Microwaves have been used in data communications for a long time. They have
a higher frequency than radio waves and therefore can handle larger amounts of
data.
25
1.15 TCP/IP
Have you ever wondered how your computer talks to other computers on your
local LAN or to other systems on the internet?
A protocol suit consists of a layered architecture where each layer depicts some
functionality which can be carried out by a protocol. Each layer usually has more
than one protocol options to carry out the responsibility that the layer adheres to.
TCP/IP is normally considered to be a 4 layer system. The 4 layers are as
follows:
⮚ Application layer
⮚ Transport layer
⮚ Network layer
1. Application layer
This is the top layer of TCP/IP protocol suite. This layer includes applications or
processes that use transport layer protocols to deliver the data to destination
computers.
At each layer there are certain protocol options to carry out the task designated
to that particular layer. So, application layer also has various protocols that
applications use to communicate with the second layer, the transport layer.
2. Transport Layer
This layer provides backbone to data flow between two hosts. This layer receives
data from the application layer above it. There are many protocols that work at
this layer but the two most commonly used protocols at transport layer are TCP
and UDP.
26
TCP is used where a reliable connection is required while UDP is used in case of
unreliable connections.
TCP divides the data(coming from the application layer) into proper sized chunks
and then passes these chunks onto the network. It acknowledges received
packets, waits for the acknowledgments of the packets it sent and sets timeout to
resend the packets if acknowledgements are not received in time. The term
‘reliable connection’ is used where it is not desired to loose any information that
is being transferred over the network through this connection. So, the protocol
used for this type of connection must provide the mechanism to achieve this
desired characteristic. For example, while downloading a file, it is not desired to
loose any information(bytes) as it may lead to corruption of downloaded content.
3. Network Layer
This layer is also known as Internet layer. The main purpose of this layer is to
organize or handle the movement of data on network. By movement of data, we
generally mean routing of data over the network. The main protocol used at this
layer is IP. While ICMP(used by popular ‘ping’ command) and IGMP are also
used at this layer.
One thing which is worth taking note is that the interaction between two
computers over the network through TCP/IP protocol suite takes place in the
form of a client server architecture.
Client requests for a service while the server processes the request for client.
Now, since we have discussed the underlying layers which help that data flow
27
from host to target over a network. Lets take a very simple example to make the
concept more clear.
As seen in the above figure, the information flows downward through each layer
on the host machine. At the first layer, since http protocol is being used, so an
HTTP request is formed and sent to the transport layer.
Here the protocol TCP assigns some more information(like sequence number,
source port number, destination port number etc) to the data coming from upper
layer so that the communication remains reliable i.e, a track of sent data and
received data could be maintained.
At the next lower layer, IP adds its own information over the data coming from
transport layer. This information would help in packet travelling over the network.
Lastly, the data link layer makes sure that the data transfer to/from the physical
media is done properly. Here again the communication done at the data link layer
can be reliable or unreliable.
This information travels on the physical media (like Ethernet) and reaches the
target machine.
Now, at the target machine (which in our case is the machine at which the
website is hosted) the same series of interactions happen, but in reverse order.
The packet is first received at the data link layer. At this layer the information
(that was stuffed by the data link layer protocol of the host machine) is read and
rest of the data is passed to the upper layer.
28
Similarly at the Network layer, the information set by the Network layer protocol
of host machine is read and rest of the information is passed on the next upper
layer. Same happens at the transport layer and finally the HTTP request sent by
the host application(your browser) is received by the target application(Website
server).
One would wonder what happens when information particular to each layer is
read by the corresponding protocols at target machine or why is it required? Well,
lets understand this by an example of TCP protocol present at transport layer. At
the host machine this protocol adds information like sequence number to each
packet sent by this layer.
At the target machine, when packet reaches at this layer, the TCP at this layer
makes note of the sequence number of the packet and sends an
acknowledgement (which is received seq number + 1).
Now, if the host TCP does not receive the acknowledgement within some
specified time, it re sends the same packet. So this way TCP makes sure that no
packet gets lost. So we see that protocol at every layer reads the information set
by its counterpart to achieve the functionality of the layer it represents.
29
Application Layer (Layer-7):
This is where the user application sits that needs to transfer data between or
among hosts. For example: HTTP, file transfer application (FTP) and electronic
mail etc.
30
This layer takes the raw transmission data (signal, pulses etc.) from the Physical
Layer and makes Data Frames, and sends that to the upper layer and vice versa.
This layer also checks any transmission errors and sorts it out accordingly.
31
Unit - 2
Data:
Facts and figures which relay something specific, but which are not organized in
any way and which provide no further information regarding patterns, context,
etc.
Information:
For data to become information, it must be contextualized, categorized,
calculated and condensed. Information gives a bigger picture, it is data with
relevance and purpose. It may convey a trend in the environment, or perhaps
indicate a pattern of sales for a given period of time.
Knowledge:
Knowledge is closely linked to doing and implies know-how and understanding.
The knowledge possessed by each individual is a product of his experience, and
encompasses the norms by which he evaluates new inputs from his
surroundings.
It is often observed that term information system and information technology are
used interchangeably. Information technology is a subset of information systems.
Information systems consist of people, processes, machines and information
technology. The great advancement in information systems is due to
development in information technology and introduction of computers.
32
An information system can be defined as set of coordinated network of
components, which act together towards producing, distributing and or
processing information. An important characteristic of computer-based
information systems information is precision, which may not apply to other types.
In any given organization information system can be classified based on the
usage of the information. Therefore, information systems in business can be
divided into operations support system and management support system.
Information technology has brought big change in our daily life be it education,
life at home, work place, communication and even in function of government.
Information system and information technology are similar in many ways but at
the same time they are different. Following are some aspects about information
system as well as information technology.
33
Origin: Information systems have been in existence since pre-mechanical era in
form of books, drawings, etc. However, the origin of information technology is
mostly associated with invention of computers.
The MIS data is mostly derived from various units of the organization. However it
is very difficult to say the exact structure of MIS as the structure and goals of
different types of organizations are different. Hence both the data and structure
of MIS is dependent on the type of organization and often customized to the
specific requirement of the management.
34
✔ To computerize day-to-day transactions like sales etc., print sales
vouchers, prepare daily reports, summary reports etc. This system intends
to reduce manual work and speed up operations by using computers.
At the operational level the tasks and goals are predefined and the processes are
highly structured. There are specific rules on how a payslip is to be calculated
and specific format on how a payslip is to be printed. Hence, in most cases,
ready made software packages are available for transaction processing systems.
✔ Often the TPS is used as input to MIS. The summary of TPS is periodically
transferred to MIS.
✔ There are many office automation systems such as MS Office Suite, Star
Office (from Sun Microsystems), IBM Lotus symphony, Open Office etc.
35
✔ Office automation systems have nothing to do with MIS. But they are used
for all types of purposes at every level. Hence sometimes office
automation tools are useful for compiling and presenting MIS reports/
presentations.
Thus as we saw above all these systems including MIS, DSS, ESS etc. are used
by the senior management to take effective decisions. But there are certain
differences between them so far as their field of application is concerned.
Decision support systems are meant for assisting the decision makers (human
beings) in taking non-standard and complex decisions. Decision support systems
use intelligence like human beings to decide “what if this happens…”. Decision
support systems are intelligent systems and similar to expert systems.
✔ Decision Support Systems use data from both TPS and MIS. They also take
information input from other sources such as competitors’ reports, information
from websites.
✔ The decision support systems are based on highly unstructured data. As the
problem environment is frequently changing there is no ready-made decision
support software. There are various software tools for advanced statistical
36
calculations and presentations. The decision maker may use some of these
tools to fine-tune his decisions.
The expert systems are the computer applications developed to solve complex
problems in a particular domain, at the level of extra-ordinary human intelligence
and expertise.
✔ Understandable
✔ Reliable
✔ Highly responsive
✔ Advising
✔ Deriving a solution
✔ Diagnosing
✔ Explaining
✔ Interpreting input
✔ Predicting results
✔ Inference Engine
✔ User Interface
37
No technology can offer easy and complete solution. Large systems are costly, require significant developme
✔ Manpower planning.
✔ Staffing
38
✔ Performance evaluation, and
✔ Separation activities
✔ Pricing
✔ Packaging
✔ Distribution
✔ Media
✔ Promotion
39
The levels of management decision making that must be supported by
information technology in a successful organization (independently of its size,
shape, and participants), are often shown as a managerial pyramid as shown
below
40
2.8 Executive Information System (EIS) or Executive Support Systems
(ESS)
Thus as we saw above all these systems including MIS, DSS, ESS etc. are used
by the senior management to take effective decisions. But there are certain
differences between them so far as their field of application is concerned.
DBMS A database management system is the software system that allows users
to define, create and maintain a database and provides controlled access to the
data.
41
2.11 Advantages & Disadvantages of DBMS
Advantages of DBMS
ii. Integrity can be enforced: Integrity of data means that data in database
is always accurate, such that incorrect information cannot be stored in
database. In order to maintain the integrity of data, some integrity
constraints are enforced on the database. A DBMS should provide
capabilities for defining and enforcing the constraints.
iii. Inconsistency can be avoided: When the same data is duplicated and
changes are made at one site, which is not propagated to the other site, it
gives rise to inconsistency and the two entries regarding the same data
will not agree. At such times the data is said to be inconsistent. So, if the
redundancy is removed chances of having inconsistent data is also
removed.
iv. Data can be shared: The data can be shared by multiple applications in
centralized DBMS as compared to file system, applications can be
developed to operate against the same stored data.
42
viii. Providing Backup and Recovery: A DBMS provides facilities for
recovering from hardware or software failures.
Disadvantages of DBMS
ii. Size: The complexity and breadth of functionality makes the DBMS an
extremely large piece of software, occupying many megabytes of disk
space and requiring substantial amounts of memory to run efficiently.
vi. Additional Hardware costs: The disk storage requirements for the DBMS
and the database may necessitate the purchase of additional storage
space. Furthermore, to achieve the required performance it may be
necessary to purchase a larger machine, perhaps even a machine
dedicated to running the DBMS. The procurement of additional hardware
results in further expenditure.
43
Criminals gaining access to credit card information can lead to financial loss to
the owners of the cards or financial institute. Using organization information
systems i.e. posting inappropriate content on Facebook or Twitter using a
company account can lead to lawsuits and loss of business.
Some of the threats that information system face and what can be done to
eliminate or minimize the damage if the threat were to materialize are as follows
The threats posed by viruses can be eliminated or the impact minimized by using
Anti-Virus software and following laid down security best practices of an
organization.
Data loss – If the data center caught fire or was flooded, the hardware with the
data can be damaged, and the data on it will be lost. As a standard security best
practice, most organizations keep backups of the data at remote places. The
backups are made periodically and are usually put in more than one remote area.
Ethics refers to rules of right and wrong that people use to make choices to guide
their behaviors. Ethics in MIS seek to protect and safeguard individuals and
society by using information systems responsibly. Most professions usually have
defined a code of ethics or code of conduct guidelines that all professionals
affiliated with the profession must adhere to.
44
Unit - 3
3. Multimedia Concepts
3.1 Multimedia
For example, a presentation involving audio and video clips would be considered
a "multimedia presentation." Educational software that involves animations,
sound, and text is called "multimedia software." CDs and DVDs are often
considered to be "multimedia formats" since they can store a lot of data and most
forms of multimedia require a lot of disk space.
People use multimedia audio devices to record and play audio such as speech,
sound effects and music. The most common multimedia device for recording
audio is a microphone, which can be an internal microphone built into a computer
or an external microphone attached to a computer with a plug. Some headsets
provide a microphone to record audio along with speakers in the headphones to
play audio. Other devices that play audio are external speakers and earphones.
Multimedia video devices are designed for recording and playing videos,
animations and slide shows. Recording devices include cameras, which are often
built into a computer or phone. Dedicated camcorders are separate devices that
record live action and can be attached to a computer with a cable. Display
screens and digital projectors are multimedia devices for playing video.
People use similar devices to take and display photos. For example, they use
cameras to take photos and display screens to view them. Cameras can be built
into a computer, making them webcams. They can be separate devices, such as
a point-and-shoot digital camera, and they can also be built into a phone.
Multimedia elements (like audio or video) are stored in media files. The most
common way to discover the type of a file, is to look at the file extension.
Multimedia files have formats and different extensions
like: .swf, .wav, .mp3, .mp4, .mpg, .wmv, and .avi.
45
3.4 Compression / Decompression Issues
Most people have downloaded large files, such as music or video, from the
Internet. Because of the large size of these files, downloading them can take
hours. To solve this problem, and make better use of disk space, large files are
compressed, using various software. Once downloaded, they can then be
decompressed, and viewed, using a decompression program.
Types of Compression
Compressed files usually end with .zip, .sit and .tar. These are called extensions,
and they indicate different compression formats--different types of software used
to compress files. For PCs, .zip is most common, .sit is used often with Macs and
.tar used with Linux. When you see a file with one of these extensions, it may be
either a single large file or a group of files bundled together.
Lossless Compression
Lossless compression is a way to compress files without losing any data. This
method shoves the data closer together by replacing it with a type of shorthand. It
can reduce file sizes by around half. The .zip format uses lossless compression.
With this form, the file decompresss to provide an exact duplicate of the
compressed file, with the same quality. However, it cannot compress files to a
really small size, making it less useful for very large files.
Lossy Compression
46
Decompression
In order to use a compressed file, you must first decompress it. The software
used to decompress depends on how the file was compressed in the first place.
To decompress a .zip file you need software, such as WinZip. To decompress
a .sit file, you need the Stuffit Expander program. WinZip does not
decompress .sit files, but one version of StuffIt Expander can decompress
both .zip and .sit files. Files ending in .sea or .exe are called self-extracting files.
These are compressed files that do not require any special software to
decompress. Just click on the file and it will automatically decompress and open.
Information that can only be delivered through texts on a traditional print platform,
such as newspapers and magazines, can now be conveyed through multimedia
– photos, graphics, videos, and even social media.
For business, these changes in the communication landscape could mean that
publicity and promotions of products and services are no longer limited to the
three traditional platforms – print, radio, and television.
Other online platforms like blogs, websites, social media sites such as Facebook
and Twitter, among others, are now available and accessible. These multimedia
tools and platforms, if used suitably, can help entrepreneurs and startup founders
in growing the business.
47
especially multimedia entertainment. The idea of media convergence is also
becoming a major factor in education, particularly higher education.
3.5.2 Entertainment
Multimedia games are a popular pastime and are software programs available
either as CD-ROMs or online. Some video games also use multimedia features.
Multimedia applications that allow users to actively participate instead of just
sitting by as passive recipients of information are called Interactive Multimedia
3.5.3 Business
Presentation are very useful in many aspects of work and life and are important
in business for sales, training, teaching, lectures and entertainment.
48
Unit 4 - Internet & Security Issues
Internet
History
This marvelous tool has quite a history that holds its roots in the cold war
scenario. A need was realized to connect the top universities of the United States
so that they can share all the research data without having too much of a time
lag. This attempt was a result of Advanced Research Projects Agency (ARPA)
which was formed at the end of 1950s just after the Russians had climbed the
space era with the launch of Sputnik. After the ARPA got success in 1969, it
didn’t take the experts long to understand that how much potential can this
interconnection tool have. In 1971 Ray Tomlinson made a system to send
electronic mail. This was a big step in the making as this opened gateways for
remote computer accessing internet.
During all this time, rigorous paper work was being done in all the elite research
institutions. From giving every computer an address to setting out the rules,
everything was getting penned down. 1973 saw the preparations for the vital
TCP/IP and Ethernet services. At the end of 1970s, Usenet groups had surfaced
up. By the time the 80s had started, IBM came up with its PC based on Intel 8088
processor which was widely used by students and universities for it solved the
purpose of easy computing. By 1982, the Defence Agencies made the TCP/IP
compulsory and the term “internet” was coined.
In 1992, internet browser called “Mosaic” came into existence. One of the very
popular internet browsers, Netscape Navigator made its debut in 1994 which
ultimately went to compete with Microsoft’s Internet Explorer.
50
Local connection lines are owned by regional telephone and cable television
companies in the United States that connect retail users in homes and
businesses to the Internet. The regional networks lease access to ISPs, private
companies, and government institutions. Each organization pays for its own
networks and its own local Internet connection services, a part of which is paid to
the long-distance trunk line owners. Individual Internet users pay ISPs for using
their service, and they generally pay a flat subscription fee, no matter how much
or how little they use the Internet.
WWW
WWW stands for World Wide Web. The World Wide Web is a way of exchanging
information between computers on the Internet, tying them together into a vast
collection of interactive multimedia resources.
Evolution
World Wide Web was created by Timothy Berners Lee in 1989 at CERN in
Geneva. World Wide Web came into existence as a proposal by him, to allow
researchers to work together effectively and efficiently at CERN. Eventually it
became World Wide Web.
WWW Architecture
WWW architecture is divided into several layers as shown in the following
diagram:
52
Syntax
XML (Extensible Markup Language) helps to define common syntax in semantic
web.
Data Interchange
Resource Description Framework (RDF) framework helps in defining core
representation of data for web. RDF represents data about resource in graph
form.
Taxonomies
RDF Schema (RDFS) allows more standardized description of taxonomies and
other ontological constructs.
Ontologies
Web Ontology Language (OWL) offers more constructs over RDFS. It comes in
following three versions:
⮚ OWL Lite for taxonomies and simple constraints.
Rules
RIF and SWRL offers rules beyond the constructs that are available from RDFs
and OWL. Simple Protocol and RDF Query Language (SPARQL) is SQL like
language used for querying RDF data and OWL Ontologies.
Proof
All semantic and rules that are executed at layers below Proof and their result will
be used to prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of
sources is used.
Browser
53
Web browser can show text, audio, video, animation and more. It is the
responsibility of a web browser to interpret text and commands contained in the
web page.
Earlier the web browsers were text-based while now a days graphical-based or
voice-based web browsers are also available. Following are the most common
web browser available today:
Browser Vendor
Architecture
There are a lot of web browser available in the market. All of them interpret and
display information on the screen however their capabilities and structure varies
depending upon implementation. But the most basic component that all web
browser must exhibit are listed below:
✔ Controller/Dispatcher
✔ Interpreter
✔ Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or
mouse, interpret it and make other services to work on the basis of input it
receives.
Interpreter receives the information from the controller and execute the
instruction line by line. Some interpreter are mandatory while some are optional
For example, HTML interpreter program is mandatory and java interpreter is
optional.
Client Program describes the specific protocol that will be used to access a
particular service. Following are the client programs tat are commonly used:
54
✔ HTTP
✔ SMTP
✔ FTP
✔ POP
Servers
Web server is a computer where the web content is stored. Basically web server
is used to host the web sites but there exists other web servers also such as
gaming, storage, FTP, email etc.
Web site is collection of web pages while web server is a software that respond
to the request for web resources.
⮚ Sending the file to the client associated with the requested URL.
Key Points
⮚ When client sends request for a web page, the web server search for the
requested page if requested page is found then it will send it to client with
an HTTP response.
⮚ If the requested web page is not found, web server will the send an HTTP
response:Error 404 Not found.
⮚ If client has requested for some other resources then the web server will
contact to the application server and data store to construct the HTTP
response.
Examples
Following table describes the most leading web servers available today:
S.N. Web Server Description
55
Apache HTTP Server
This is the most popular web server in the world developed by the Apache Software
1 Foundation. Apache web server is an open source software and can be installed on almost
all operating systems including Linux, UNIX, Windows, FreeBSD, Mac OS X and more.
About 60% of the web server machines run the Apache Web Server.
Search engines
User can search for any information by passing query in form of keywords or
phrase. It then searches for relevant information in its database and return to the
user.
⮚ Web Crawler
⮚ Database
⮚ Search Interfaces
Web crawler
It is also known as spider or bots. It is a software component that traverses the
web to gather information.
Database
56
All the information on the web is stored in database. It consists of huge web
resources.
Search Interfaces
This component is an interface between user and the database. It helps the user
to search through the database.
⮚ The search engine looks for the keyword in the index for predefined
database instead of going directly to the web to search for the keyword.
⮚ It then uses software to search for the information in the database. This
software component is known as web crawler.
⮚ Once web crawler finds the pages, the search engine then shows the
relevant web pages as a result. These retrieved web pages generally
include title of page, size of text portion, first several sentences etc.
Internet services
57
There are various Communication Services available that offer exchange of
information with individuals or groups. The following table gives a brief
introduction to these services:
Remote Login
Once you gain access to remote computer, you can use it for the intended
purpose. The TELNET works in a very step by step procedure. The commands
typed on the client computer are sent to the local Internet Service Provider (ISP),
and then from the ISP to the remote computer that you have gained access. Most
of the ISP provides facility to TELENET into your own account from another city
and check your e-mail while you are traveling or away on business.
Chatting
Allows the people from all over the world to communicate in real time. Online
chatting is a text-based communication between two or more people over the
network. In this, the text message is delivered in real time and people get
immediate response.
Examples:
Messaging groups
58
Offers real time chat between individuals and group of people. Eg. Yahoo
messenger, MSN messenger. Instant messaging is a software utility that allows
IM users to communicate by sending text messages, files, and images. Some of
the IMs also support voice and video calls.
Example:
It is an instant messaging service application available on smart
WhatsApp
phones.
Social networking
There are several web based social network services are available such as
facebook, twitter, linkedin, Google+ etc. which offer easy to use and interactive
interface to connect with people with in the country an overseas as well. There
are also several mobile based social networking services in for of apps such as
Whatsapp etc.
The following table describes some of the famous social networking services
provided over web and mobile:
S.N
Service Description
.
Facebook
1. Allows to share text, photos, video etc. It also offers interesting online
games.
Twitter
2. Twitter allows the user to send and reply messages in form of tweets.
These tweets are the small messages, generally include 140+ characters.
Linkedin
3.
Linkedin is a business and professional networking site.
Whatsapp
4. It is a mobile based messaging app. It allows to send text, video, and audio
messages
Internet in Business
59
Due to its incredible potential, it is an effective platform for customers and
entrepreneurs for enabling transactions, right from email services to e-shopping.
⮚ Information: 90% of users surf online for tracking desired information. Before
purchasing products, buyers may look for information about the products or
services on the net. They may check for product functionalities and features.
Make sure to provide unique information about your products which builds
trust.
⮚ Research: If you’re not aware of marketing skills, research online. Identify the
best marketing strategies which give best results. If you’re unable to manage
your finances, take the help of financial adviser who can give better solutions
to cut down your business expenses. Research online where you can find
required information within seconds.
60
⮚ Sales: Internet is the biggest marketing channel. You can promote your
business online and can attract the global customers. Your business can
expand beyond horizons and can target the potential dealers. Compared to
traditional marketing, online marketing increases your productivity rates.
⮚ Better services: Through internet, you can solve customer issues more
quickly and rapidly. You can connect with your targeted clients and can get
their valuable feedback. Listen to your customer’s words. You can ask them
to rate your products which may increase your business standards.
⮚ Eliminate risks: You can eliminate business risks. For instance, in traditional
business, you may require middle man to market your products. He acts as a
channel between entrepreneur and customers. By shifting to online trade, you
can not only eliminate risks but can also cut down costs as you do not require
a middleman.
e-commerce definition
61
Features
E-Commerce provides following features
⮚ Non-Cash Payment
E-Commerce enables use of credit cards, debit cards, smart cards, electronic fu
⮚ Advertising / Marketing
E-commerce increases the reach of advertising of products and services of busine
⮚ Improved Sales
Using E-Commerce, orders for the products can be generated any time, any where
⮚ Support
E-Commerce provides various ways to provide pre sales and post sales assistance to provi
⮚ Inventory Management
Using E-Commerce, inventory management of products becomes autom
62
⮚ Communication improvement
E-Commerce provides ways for faster, efficient, reliable commu
M-Commerce
M-commerce refers to online payment transactions that happen over a mobile
device. The advancement of mobile connectivity, security, and apps development
has spurred retailers to offer services, products, and payment gateways over the
smartphone. The m-commerce trend is also spurred by the increasing population
that own smartphones.
It is tedious to flip open your laptop just to order a pair of sneakers online.
However, shoppers can easily whip up their mobile phone and start browsing for
the right products on an m-commerce app.
The difference between the ability to make purchases easily on the spot and
logging into an e-commerce website later favors retailers with e-commerce apps.
Impulsive shoppers are also better targeted by means of instant access to the
shopping cart.
With the introduction of mobile payment wallets like Apple Pay and Android Pay,
mobile users are given more choices to make instantaneous transactions on the
spot.
From a retailer point of view, push notifications are deemed to be more effective.
Promotion emails risk being delivered to the spam folder or ignored by users.
Push notification, on the other hand, is delivered instantly to the user’s mobile.
63
an average opt-in rate of 67.5%, the chances of getting the attention of users
with push notification are high.
For example, a retail outlet that is having an on-going sales can send
notifications to users within a 5-miles radius. A fitness gym could target
consumers in the vicinity with yearly membership signups by piggy-backing on a
navigational app.
Even without massive breaches of credit card data, the accounts of e-commerce
shoppers aren’t exactly safe. The security provided by a username and password
isn’t the best protection against modern-day hackers.
M-commerce, where transactions are conducted over a mobile phone, has the
potential to incorporate better security. The use of phone identification as a
second layer of security removes the possibility of a fraud committed remotely.
Mobile apps technologies have allowed better engagement with retailers and
consumers. It will enable personalization and a customized shopping experience
64
that is unique to users. Retailers are also able to immediately respond to the
needs of a shopper and suggest recommendations, which results in higher
conversion.
Advantages of M-Commerce
For those who are used to the traditional e-commerce platforms, making a shift
towards m-commerce can be challenging. However, there are proven benefits
that will make the shift worthy in every business sense.
With the rise of big data and AI, retailers can send better-targeted promotions
that are more likely to engage and convert. The historical data collected also
helps retailers to strengthen their branding efforts by prioritizing elements that
resonate with their shoppers.
2)Increases Revenue: All the numbers point to the potential of revenue increase
when m-commerce is put to proper use. According to Oberlo, global m-
commerce revenue is expected to hit $2.91 trillion in 2020, which is a remarkable
25.4% increase than the previous year.
Internet users are spending more of their time on mobile phones, and shopping
for products is a few touches away. Besides that, push notifications with tailor-
made promotions draw users’ attention and lead to better conversion.
Summary
The shift from e-commerce to m-commerce is inevitable. Businesses that refuse
to jump on the wagon will find themselves on the losing end. M-commerce offers
better connectedness, engagement, and personalization. For businesses, it
means higher revenues, stronger brands, and rewarding experiences for
customers.
A business owner who does any, or all, of their business using the internet, is
running an online business. Running an online business can include buying and
selling online, and providing an online service. A wide variety of businesses can
be found online, in many different industries.
Anyone can start an online business. If you have a unique product or idea, you
can find a way to sell or trade it online. It's just like a traditional business, except
your office or shop is online, so you have to decide how it will look and appeal to
customers.
⮚ websites
⮚ blogs
66
⮚ social media accounts.
1. B2C (Business to consumer): B2C businesses sell to their end-user. The B2C
model is the most common business model, so there are many unique
approaches under this umbrella.
Because of this shorter sales cycle, B2C businesses typically spend less
marketing dollars to make a sale, but also have a lower average order value and
less recurring orders than their B2B counterparts and B2C doesn’t only include
products, but services as well.
B2C innovators have leveraged technology like mobile apps, native advertising
and remarketing to market directly to their customers and make their lives easier
in the process.
Recent B2B innovators have made a place for themselves by replacing catalogs
and order sheets with ecommerce storefronts and improved targeting in niche
markets.
In 2020, close to half of B2B buyers are millennials — nearly double the amount
from 2012. As younger generations enter the age of making business
transactions, B2B selling in the online space is becoming more important.
Elance (now Upwork) was an early innovator in this model by helping businesses
hire freelancers.The C2B ecommerce model’s competitive edge is in pricing for
goods and services.
This approach gives consumers the power to name their price or have
businesses directly compete to meet their needs. Recent innovators have
creatively used this model to connect companies to social media influencers to
market their products.
Online businesses like Craigslist and eBay pioneered this model in the early days
of the internet and now Facebook has become really popular. C2C businesses
benefit from self-propelled growth by motivated buyers and sellers, but face a key
challenge in quality control and technology maintenance.
Security is an essential part of any transaction that takes place over the internet.
Customer will loose his/her faith in e-business if its security is compromised.
⮚ Confidential
Information should not be accessible to unauthorized person. It should not be intercep
68
⮚ Integrity
Information should not be altered during its transmission over the network.
⮚ Availability
Information should be available wherever and whenever requirement within time limit
⮚ Authenticity
There should be a mechanism to authenticate user before giving him/her access to req
⮚ Non-Repudiabiity
It is protection against denial of order or denial of payment. Once a sender sends a mes
⮚ Encryption
Information should be encrypted and decrypted only by authorized user.
⮚ Auditability
Data should be recorded in such a way that it can be audited for integrity requirements
Security threats
Internet security threats impact the network, data security and other internet
connected systems. Cyber criminals have evolved several techniques to threat
privacy and integrity of bank accounts, businesses, and organizations.
⮚ Mobile worms
⮚ Malware
⮚ Hacking as a Service
⮚ Spam
69
⮚ Phishing
Email Phishing
Email phishing is an activity of sending emails to a user claiming to be a
legitimate enterprise. Its main purpose is to steal sensitive information such as
usernames, passwords, and credit card details.
Such emails contains link to websites that are infected with malware and direct
the user to enter details at a fake website whose look and feels are same to
legitimate one.
⮚ Most often such emails contain grammatically incorrect text. Ignore such
emails, since it can be a spam.
⮚ Beware of links in email
Threats
Such emails contain threat like “your account will be closed if you didn’t respond
to an email message”.
70
It consists of a set of protocols designed by Internet Engineering Task Force
(IETF). It provides security at network level and helps to create authenticated and
confidential packets for IP layer.
⮚ Privacy
⮚ Integrity
⮚ Authentication
Passwords
Smart cards
A smart card is any pocket-sized card that has embedded integrated circuits.
Smart cards are made of plastic, generally polyvinyl chloride. Smart cards can be
contact, contactless, or both. They can provide personal identification,
authentication, data storage, and application processing. Smart cards may
provide strong security authentication for single sign-on within organizations.
Encryption/decryption
It is a very effective and practical way to safeguard the data being transmitted
over the network. Sender of the information encrypt the data using a secret code
and specified receiver only can decrypt the data using the same or different
secret code.
71
Intranets
Intranet is defined as private network of computers within an organization with its own
server and firewall. Moreover we can define Intranet as:
● Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their
intranet.
Benefits
Intranet is very efficient and reliable network system for any organization. It is beneficial
in every aspect such as collaboration, cost-effectiveness, security, productivity and
much more.
72
Communication
Intranet offers easy and cheap communication within an organization. Employees can
communicate using chat, e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can
be accessed by the authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing
them and distributing duplicate copies among the employees, which certainly decreases
the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This
helps the employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
Security
Since information shared on intranet can only be accessed within an organization,
therefore there is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly
know whom he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
Extranets
73
Implementation
Extranet Intranet
Internal network that can be accessed Internal network that can not be
externally. accessed externally.
Extranet is extension of company's
Only limited users of a company.
Intranet.
For limited external communication
Only for communication within a
between customers, suppliers and
company.
business partners.
A VPN or Virtual Private Network is a method used to add security and privacy to
private and public networks, like WiFi Hotspots and the Internet. VPNs are most
often used by corporations to protect sensitive data. However, using a personal
VPN is increasingly becoming more popular as more interactions that were
previously face-to-face transition to the Internet. Privacy is increased with a VPN
because the user's initial IP address is replaced with one from the VPN provider.
This method allows subscribers to attain an IP address from any gateway city the
VPN service provides. For instance, you may live in San Francisco, but with a
VPN, you can appear to live in Amsterdam, New York, or any number of gateway
cities.
74
Security is the main reason why corporations have used VPNs for years. VPN
use advanced encryption protocols and secure tunneling techniques to
encapsulate all online data transfers.
Internet telephony
In this way, users are able to bypass the charges that are common in traditional
telephone services. However, the quality of this service is not as good as that of
traditional circuit-switched networks used in traditional telephone services
because it is very dependent on the quality and speed of the Internet connection.
Internet telephony is also called IP telephony or broadband telephony.
An audio conference is a phone call made when you have multiple participants.
Video conferencing is one of the most effective and efficient ways for companies
to communicate. It saves companies on travel costs, promotes more face-to-face
interactions, and increases productivity. Video plays a huge role in providing the
many benefits of video conferencing, but the importance of clear audio is too
often overlooked. However, when a video conference involves numerous
locations with multiple people, cross talk is a major issue.
Audio issues can hinder the various benefits of video conferencing, but there are
ways to combat these issues. Cross talk is an issue that will continue to arise,
despite the technology being used. However, having a clear, structured, and
outlined video conference can eliminate some cross talk. Another non-
technological solution for issues such as background noise is to simply educate
and inform participants and employees. Encouraging employees to use the mute
function on their microphone when they are listening can make a world of
difference.
Wireless Communication:
75
Wireless communication is a broad term that incorporates all procedures and
forms of connecting and communicating between two or more devices using a
wireless signal through wireless communication technologies and devices.
The evolution of wireless technology has brought many advancements with its
effective features.
Wireless – Advantages:
Wireless communication involves transfer of information without any physical
connection between two or more points. Because of this absence of any 'physical
infrastructure', wireless communication has certain advantages. This would often
include collapsing distance or space.
Wireless communication has several advantages; the most important ones are discussed below
⮚ Cost effectiveness
Wired communication entails the use of connection wires. In wireless networks,
communication does not require elaborate physical infrastructure or maintenance
practices. Hence the cost is reduced.
⮚ Flexibility
Wireless communication enables people to communicate regardless of their
location. It is not necessary to be in an office or some telephone booth in order to
pass and receive messages.
⮚ Convenience
76
Wireless communication devices like mobile phones are quite simple and
therefore allow anyone to use them, wherever they may be. There is no need to
physically connect anything in order to receive or pass messages.
⮚ Speed
Improvements can also be seen in speed. The network connectivity or the
accessibility were much improved in accuracy and speed.
⮚ Accessibility
The wireless technology helps easy accessibility as the remote areas where
ground lines can’t be properly laid, are being easily connected to the network.
⮚ Constant connectivity
Constant connectivity also ensures that people can respond to emergencies
relatively quickly.
WLANS:
In the field of computers, the wide usage of group connections have become
inevitable, which lead to the introduction of LANs (Local Area Networks). These
LANs come under the category of small scale networks within a single building or
campus.
WANs are Wide Area Networks which cover a wider area such a city, or a limited
area greater than LAN.
WLAN Uses:
✔ Users would be able to surf the Internet, check e-mail, and receive Instant
Messages on the move.
✔ There are many historic buildings where there has been a need to set up
computer networks. In such places, wiring may not be permitted or the
77
building design may not be conductive to efficient wiring. WLANs are very
good solutions in such places.
RFID:
Unlike a barcode, the tag doesn't need to be within the line of sight of the reader,
so it may be embedded in the tracked object. RFID is one method of automatic
identification and data capture (AIDC).
Wi Fi:
78
Wi-Fi is a type of wireless network technology used for connecting to the Internet.
The frequencies wi-fi works at are 2.4Ghz or 5Ghz, ensure no interference with
cellphones, broadcast radio, TV antenna and two-way radios are encountered
during transmission.
Wi-Fi is basically just radio waves broadcast from a Wi-Fi router, a device
detecting and deciphering the waves, and then sending back data to the router. It
works very similarly to an AM/ FM radio but it is two-way communication channel.
Wi-Fi works over longer distances than bluetooth or infrared and is also a low
power technology, making it suitable for portable devices such as laptops and
palmtops. Wi-Fi is governed by the Wi-Fi Alliance, an association of
manufacturers and regulators defining standards and certifying products as Wi-Fi
compatible.
There are several standards of Wi-Fi with different speeds and power
requirements. The earliest standard was 802.11b, though it is the slowest but
least expensive in terms of cost. This was soon upgraded to 802.11a and
802.11g. Both of these standards included technology for splitting the radio
signal and thus reducing interference. The latest standard is 802.11n, which
allows even longer ranges and data throughput.
A Wi-Fi network may be public (called a hotspot), for private use by an
organization or for home use.
Wi Max:
The name "WiMAX" was created by the WiMAX Forum, which was formed in
June 2001 to promote conformity and interoperability of the standard, including
the definition of predefined system profiles for commercial vendors. The forum
describes WiMAX as "a standards-based technology enabling the delivery of last
mile wireless broadband access as an alternative to cable and DSL". IEEE
802.16m or WirelessMAN-Advanced was a candidate for the 4G, in competition
with the LTE Advanced standard.
The latest version of WiMAX, WiMAX release 2.1, popularly branded as/known
as WiMAX 2+, is a backwards-compatible transition from previous WiMAX
generations. It is compatible and interoperable with TD-LTE.
79
Use of Spreadsheets for office:
80
3) Help identify trends
When presenting data in the form of charts or graphs, it can be helpful to
include average lines, which explicitly detail the key trends emerging from
the information. This may help demonstrate the key points to other users
in a straightforward manner - for instance, an executive from a different
department during a board meeting. Excel allows trend lines to be
extended beyond the graph, to offer predictions of future activity - and
such forecasts can help businesses develop their future strategy.
5) Online access
Excel is available online as part of Microsoft's Office 365 productivity suite.
This means business leaders and employees have access to the program
from a range of devices, from almost any location. Providing they have a
web-enabled PC, laptop, smartphone or tablet it should be possible to
access Excel, making remote and mobile working viable.
Spreadsheet applications
1) Uses of Microsoft Excel in Education: Teachers can use table styles, shapes,
charts, data tools, and formulas to teach students in the classrooms. Students
can learn and solve basic and logical-mathematical problems and statistics in
excel.
3) Uses of Microsoft Excel in Goal Setting and Planning: –Goal setting and
planning is a task that all we do repeatedly each day. Goal setting and
planning is very important for everyone from students to business owners. But
goal setting and planning takes white paper, time and lots of calculation but if
you use Excel then it becomes very easy and environmentally friendly.
81
5) Uses of Microsoft Excel for Housewives: – Housewives can use Excel to
manage their daily house expenses. They can create monthly expenses
report. They can track their spending habits.
6) Uses of Microsoft Excel for Data Analysis: –Data analysis is very important to
work today for an online business or website owners (eCommerce, blog,
forums etc.). Such as from tracking website visitors, products sell, customer
reviews, marketing campaigns, user behavior and events etc. Such work is
very time and brain consuming especially when things are not going
according to the plan.
7) Uses of Excel in Daily Progress Report: –Many online and offline companies
and clients making it mandatory for virtual and offline staff to maintain their
daily progress report. It is not only beneficial for employees but also for
companies to track daily progress report.
The business world depends on databases 24 hours a day, seven days a week.
Inventory, order processing, payroll, accounting, shipping and transportation
routing are often tracked within a main database that keeps the company
functioning.
Database applications
82