0% found this document useful (0 votes)
42 views64 pages

It Bcom

Uploaded by

Anitha Sakthivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views64 pages

It Bcom

Uploaded by

Anitha Sakthivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 64

CORE XIV - INFORMATION TECHNOLOGY IN BUSINESS

Objectives:
· To provide an in-depth knowledge on Information Technology in business.
· To enable the students to appreciate the utility of IT in industries.

UNIT – I
Introduction to Computers - Characteristics of Computers - Classification of Computers -
Uses of Computers - Components of a Computer - Input Devices - Output Devices.

UNIT – II
Computer Main Memory - Auxiliary Storage Devices - Computer Software - Classification of
Software - Operating Systems - Functions and Classifications –Programming Languages

UNIT – III
Data Processing –Database Management Systems - Components of a DBMS - Types of
DBMS -Functions of DBMS – Computer Networks – Types of Network - Network
Topology.

UNIT – IV
Internet Access - Internet Protocol - Internet Addressing – www - Internet Relay Chat-E-Mai
l-Mailing Basics – E-Mail Ethics - Introduction to Multimedia - Multimedia tools
.
UNIT – V
Electronic Commerce – Classification of E-Commerce - System Analysis and Design – Life
Cycle – Mobile Commerce - Business on the Internet.
55
Text Books :

1. Introduction to Information Technology - Alexis Leon, Methews Leon, Leena Leon,Vijay


Nicole,2013.
2. Information Technology – R.Saravanakumar, R.Parameswaran, T. Jayalakshmi – S.
CHAND,
2010.
3. E – COMMERCE_ – Dr. K. Abirami Devi, Dr. M. Alagammai – MARGHAM
PUBLICATIONS, 2016

Reference Books :

1. An Introduction to Information Technology - Dr.S.V.Sreeneevasa Vallabhan, - Sultan


Chand
2007.
2. Information Technology & Its Implication in business - Dr. A. Krishnan & P.
Bagkialakshmi -
Akshaya Publications.
56

1
CORE XIV - INFORMATION TECHNOLOGY IN BUSINESS
UNIT – I

Introduction to Computers:
A computer is an electronic device, operating under the control of instructions stored
in its own memory that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use.

1.1 Functionalities of a computer

Any digital computer carries out five functions in gross terms:

Characteristics of Computers:

Speed, accuracy, diligence, storage capability and versatility are some of the key
characteristics of a computer. A brief overview of these characteristics are
• Speed: The computer can process data very fast, at the rate of millions of instructions per
second. Some calculations that would have taken hours and days to complete otherwise, can
be completed in a few seconds using the computer. For example, calculation and generation
of salary slips of thousands of employees of an organization, weather forecasting that requires
analysis of a large amount of data related to temperature, pressure and humidity of various
places, etc.

2
• Accuracy: Computer provides a high degree of accuracy. For example, the computer can
accurately give the result of division of any two numbers up to 10 decimal places.
• Diligence: When used for a longer period of time, the computer does not get tired or
fatigued. It can perform long and complex calculations with the same speed and accuracy
from the start till the end.
• Storage Capability: Large volumes of data and information can be stored in the computer
and also retrieved whenever required. A limited amount of data can be stored, temporarily, in
the primary memory. Secondary storage devices like floppy disk and compact disk can store
a large amount of data permanently.
• Versatility: Computer is versatile in nature. It can perform different types of tasks with the
same ease. At one moment you can use the computer to prepare a letter document and in the
next moment you may play music or print a document. Computers have several limitations
too. Computer can only perform tasks that it has been programmed to do.
Computer cannot do any work without instructions from the user. It executes instructions as
specified by the user and does not take its own decisions.

Classification of Computers:

Computers can be generally classified by size and power as follows, though there is
Considerable overlap:
• Personal computer: A small, single-user computer based on a microprocessor. In addition
to the microprocessor, a personal computer has a keyboard for entering data, a monitor for
displaying information, and a storage device for saving data.
• workstation : A powerful, single-user computer. A workstation is like a personal computer,
but it has a more powerful microprocessor and a higher-quality monitor.
• minicomputer : A multi-user computer capable of supporting from 10 to hundreds of users
simultaneously.
• mainframe : A powerful multi-user computer capable of supporting many hundreds or
thousands of users simultaneously.
• supercomputer : An extremely fast computer that can perform hundreds of millions of
instructions per second.

3
Uses of Computers:
Education : Getting the right kind of information is a major challenge as is getting
information to make sense. College students spend an average of 5-6 hours a week on
the internet.Research shows that computers can significantly enhance performance in
learning. Students exposed to the internet say they think the web has helped them improve the
quality of their academic research and of their written work. One revolution in education is
the advent of distance learning. This offers a variety of internet and video-based online
courses.

Health and Medicine :

Computer technology is radically changing the tools of medicine. All medical information
can now be digitized. Software is now able to computer the risk of a disease. Mental health
researchers are using computers to screen troubled teenagers in need of psychotherapy. A
patient paralyzed by a stroke has received an implant that allows communication between his
brain and a computer; as a result, he can move a cursor across a screen by brainpower and
convey simple messages.

Science :

Scientists have long been users of it. A new adventure among scientists is the idea of a
“collaboratory”, an internet based collaborative laboratory, in which researchers all over the
world can work easily together even at a distance. An example is space physics where space
physicists are allowed to band together to measure the earth’s ionosphere from instruments
on four parts of the world.

Business :

Business clearly see the interest as a way to enhance productivity and competitiveness. Some
areas of business that are undergoing rapid changes are sales and marketing, retailing,
banking, stock trading, etc. Sales representatives not only need to be better educated and
more knowledgeable about their customer’s businesses, but also must be comfortable with
computer technology. The internet has become a popular marketing tool. The world of
cybercash has come to banking – not only smart cards but internet banking, electronic
deposit, bill paying, online stock and bond trading, etc.

4
Recreation and Entertainment:

Our entertainment and pleasure-time have also been affected by computerization. For
example:
• In movies, computer generated graphics give freedom to designers so that special effects
and even imaginary characters can play a part in making movies, videos, and commercials.
• In sports, computers compile statistics, sell tickets, create training programs and diets for
athletes, and suggest game plan strategies based on the competitor’s past performance.
• In restaurants, almost every one has eaten food where the clerk enters an order by indicating
choices on a rather unusual looking cash register; the device directly enters the actual data
into a computer, and calculates the cost and then prints a receipt.

Government:

Various departments of the Government use computer for their planning, control and law
enforcement activities. To name a few – Traffic, Tourism, Information & Broadcasting,
Education, Aviation and many others.

Components of a Computer:
Any kind of computers consists of HARDWARE AND SOFTWARE.
1.Hardware:

Computer hardware is the collection of physical elements that constitutes a computer system.
Computer hardware refers to the physical parts or components of a computer such as the
monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit
(graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical
objects that can be touched.

2.Software

Software is a generic term for organized collections of computer data and instructions, often
broken into two major categories: system software that provides the basic non-task-specific
functions of the computer, and application software which is used by users to accomplish
specific tasks.

Software Types

A. System software is responsible for controlling, integrating, and managing the


individual hardware components of a computer system so that other software and the
users of the system see it as a functional unit without having to be concerned with the
5
low-level details such as transferring data from memory to disk, or rendering text onto
a display.
B. B. Application software is used to accomplish specific tasks other than just running
the computer system. Application software may consist of a single program, such as
an image viewer; a small collection of programs.

Input Devices:
Input device is any peripheral (piece of computer hardware equipment to provide data and
control signals to an information processing system such as a computer or other information
appliance.
Input device Translate data from form that humans understand to one that the computer can
work with. Most common are keyboard and mouse

Example of input device:

Output Devices:
An output device is any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form.

UNIT I COMPLETED

6
UNIT – II
Computer Main Memory:
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data is to be processed and
instructions required for processing are stored. The memory is divided into large number of
small parts called cells. Each location or cell has a unique address which varies from zero to
memory size minus one.
For example if computer has 64k words, then this memory unit has 64 * 1024=65536
memory locations. The address of these locations varies from 0 to 65535.
Memory is primarily of three types
 Cache Memory
 Primary Memory/Main Memory
 Secondary Memory
1.Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up CPU.
It acts as a buffer between the CPU and main memory. It is used to hold those parts of data
and program which are most frequently used by CPU. The parts of data and programs are
transferred from disk to cache memory by operating system, from where CPU can access
them.
Advantages
The advantages of cache memory are as follows:
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
The disadvantages of cache memory are as follows:
Cache memory has limited capacity.
It is very expensive.

2.Primary Memory /MainMemory


Primary memory holds only those data and instructions on which computer is
currently working. It has limited capacity and data is lost when power is switched off. It is

7
generally made up of semiconductor device. These memories are not as fast as registers. The
data and instruction
required to be processed reside in main memory. It is divided into two subcategories RAM
and
ROM.
Characteristics of Main Memory
These are semiconductor memories
It is known as main memory.
Usually volatile memory.
Data is lost in case power is switched off.
It is working memory of the computer.
Faster than secondary memories.
A computer cannot run without primary memory.

3.Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower
than main memory. These are used for storing data/Information permanently. CPU directly
does not access these memories instead they are accessed via input-output routines. Contents
of secondary
memories are first transferred to main memory, and then CPU can access it. For example :
disk,
CD-ROM, DVD etc.
Characteristic of Secondary Memory
These are magnetic and optical memories
It is known as backup memory.
It is non-volatile memory.
Data is permanently stored even if power is switched off.
It is used for storage of data in a computer.
Computer may run without secondary memory.
Slower than primary memories.

Auxiliary Storage Devices:

Stores data and programs permanently :its retained after the power is turned off

8
1. Hard drive (HD):
A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk
drive," that store and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
2. Optical Disk:

An optical disc drive (ODD) is a disk drive that uses laser light as part of the process
of reading or writing data to or from optical discs. Some drives can only read from discs, but
recent drives are commonly both readers and recorders, also called burners or writers.
Compact discs, DVDs, and Blu-ray discs are common types of optical media which can be
read and recorded by such drives.

Optical drive is the generic name; drives are usually described as "CD" "DVD", or
"Bluray", followed by "drive", "writer", etc. There are three main types of optical media: CD,
DVD, and Blu-ray disc. CDs can store up to 700 megabytes (MB) of data and DVDs can
store up to 8.4 GB of data. Blu-ray discs, which are the newest type of optical media, can
store up to 50 GB of data. This storage capacity is a clear advantage over the floppy disk
storage media (a magnetic media), which only has a capacity of 1.44 MB.

3. Flash Disk
A storage module made of flash memory chips. A Flash disks have no mechanical
platters or access arms, but the term "disk" is used because the data are accessed as if they
were on a hard drive. The disk storage structure is emulated.

Computer Software:

Software is a generic term for organized collections of computer data and instructions,
often broken into two major categories: system software that provides the basic non-task-
specific functions of the computer, and application software which is used by users to
accomplish specific tasks.
Software Types
A. System software is responsible for controlling, integrating, and managing the
individual hardware components of a computer system so that other software and the
users of the system see it as a functional unit without having to be concerned with the
low-level details such as transferring data from memory to disk, or rendering text onto
a display. Generally, system software consists of an operating system and some

9
fundamental utilities such as disk formatters, file managers, display managers, text
editors, user authentication (login) and management tools, and networking and device
control software.
Here is a list of some of the most prominent features of a system software :

 Close to the system

 Fast in speed

 Difficult to design

 Difficult to understand

 Less interactive

 Smaller in size

 Difficult to manipulate

 Generally written in low-level language

B. Application software is used to accomplish specific tasks other than just running the
computer system. Application software may consist of a single program, such as an
image viewer; a small collection of programs (often called a software package) that
work closely together to accomplish a task, such as a spreadsheet or text processing
system; a larger collection (often called a software suite) of related but independent
programs and packages that have a common user interface or shared data format, such
as Microsoft Office, which consists of closely integrated word processor, spreadsheet,
database, etc.; or a software system, such as a database management system, which is
a collection of fundamental programs that may provide some service to a variety of
other independent applications.

Features of application software are as follows −

 Close to the user

 Easy to design

 More interactive

 Slow in speed

 Generally written in high-level language

 Easy to understand
10
 Easy to manipulate and use

 Bigger in size and requires large storage space

Classification of Software:
The following diagram shows the way we classify software.

 System Software
 Application Software

11
1.System Software

We use the term System Software for software which is primarily used to operate the
hardware.

1.1Operating Systems

The operating system is the software that allows you to operate the hardware. The programs
that we want to execute, the applications that we want to use all require a platform on which
to execute. That platform is provided by the operating system.

One role of the operating system is to provide a virtual machine. This refers to the way that,
by clicking on icons and menus, or by typing in commands at a prompt, we get to interact
with the computer hardware without having to understand its complexity. By hiding the true
complexity of the system from the user, the operating system makes it easier for ordinary
people to make computers perform useful tasks.

1.2Utility Programs

Some utility programs are bundled in with operating system software these days. Others you
buy or source in some other way.

Utility programs tend to perform specific tasks related to the management of hardware.
Examples of utility programs include compression programs, formatters, defragmenters and
other disk management tools.

1.3Library Programs

Library programs are compiled libraries of commonly-used routines. On a Windows system


they usually carry the file extension dll and are often referred to as run-time libraries. The
libraries are run-time because they are called upon by running programs when they are
needed. When you program using a run-time library, you typically add a reference to it either
in your code or through the IDE in which you are programming.

Some library programs are provided within operating systems like Windows or along with
development tools like Visual Studio. For example, it is possible to download and use a
library of routines that can be used with Windows Media Player. This includes things like
making playlists, functions and procedures for accessing and manipulating the music library
(which is a binary file) and playback routines.

12
Using library programs saves time when programming. It also allows the programmer to
interact with proprietary software without having access to its source code.

1.4Language Translators

Whatever language or type of language we use to write our programs, they need to be in
machine code in order to be executed by the computer. There are 3 main categories of
translator used,

Assembler

An assembler is a program that translates the mnemonic codes used in assembly language
into the bit patterns that represent machine operations. Assembly language has a one-to-one
equivalence with machine code, each assembly statement can be converted into a single
machine operation.

Compiler

A compiler turns the source code that you write in a high-level language into object code
(machine code) that can be executed by the computer.

The compiler is a more complex beast than the assembler. It may require several machine
operations to represent a single high-level language statement. As a result, compiling may
well be a lengthy process with very large programs.

Interpreter

Interpreters translate the source code at run-time. The interpreter translates statements one-at-
a-time as the program is executed.

Interpreters are often used to execute high-level language programs whilst they are being
developed since this can be quicker than compiling the entire program. The program would
be compiled when it is complete and ready to be released.

Interpreters are also used with high-level scripting languages like PHP, Javascript and many
more. These instructions are not compiled and have to be interpreted either by the browser (in
the case of Javascript) or by interpreters on the server (in the case of PHP).

Some programming languages make use of both compilers and interpreters. If you were to
write a Java program in a text editor, when you came to compile it with the Java compiler,
you would actually be creating something called bytecode. Bytecode can be thought of as an
intermediate stage between source code and object code. When a computer executes a Java
program, library programs on that machine interpret the bytecode. This allows Java to be
13
platform-independent - a user needs the correct run-time libraries for Java on their machine in
order to execute the programs.

2.Application Software

Application software tends be used for the tasks that have some relationship to the world
outside of the computer. For example, you might use a word processor to write a letter or an
essay. Although you use the computer to perform the task, the task itself might reasonably be
considered to be a non-computer task.

2.1General-Purpose Software

Software is general-purpose if it can be used for lots of different tasks. You can use a word
processor to write letters, memos, essays, instructions, notes, faxes, invoices and lots more.

These days we tend to use integrate suites of office software where a range of general-
purpose software is provided, usually with the facility to combine elements from each
application in a single file.

2.2Special-Purpose Software

This software performs a single specific task. This task might be complex like payroll
calculation, stock control etc. but will be based on a single task.

As with many abstract concepts, you can stretch these definitions until they blur a little.
These days, web browsers can contain a lot of features. They are still primarily focused on a
single task, rendering web pages and so the web browser is special-purpose. Being able to
access an application using a browser does not change the main purpose of the browser
software itself.

2.3Bespoke Software

Bespoke software is written for a single client. Large organisations have a need for well-
developed applications suited to their specific needs. Such software is often expensive to
develop since the development costs are not shared among a large number of people
purchasing the software.

14
Operating Systems:

• An operating system is a program that acts as an intermediary between a user of a computer


and the computer hardware.
• The purpose of an operating system is to provide an environment in which a user can
execute programs. The primary goal of an operating system is thus to make the computer
system convenient to use.
• A secondary goal is to use the computer hardware in an efficient manner.
• In brief, an operating system is the set of programs that controls a computer. Some
examples of
operating systems are UNIX, Mach, MS-DOS, MSWindows, Windows/NT, OS/2 and
MacOS.
• An operating system is an important part of almost every computer system.
• A computer system can be divided roughly into four components: the hardware, the
operating system, the application programs and the users.
1.Objectives of Operating Systems
• To hide details of hardware by creating abstraction.
• To allocate resources to processes (Manageresources).
• Provide a pleasant and effective user interface.
2.History of Operating Systems
• The 1940's - First Generations
The earliest electronic digital computers had no operating systems. Machines of the
time were so primitive that programs were often entered one bit at time on rows of
mechanical switches (plug boards). Programming languages were unknown (not even
assembly languages).
Operating systems were unheard of.
• The 1950's - Second Generation
By the early 1950's, the routine had improved somewhat with the introduction of
punch cards. The General Motors Research Laboratories implemented the first operating
systems in early 1950's for their IBM 701. The system of the 50's generally ran one job at a
time.
• The 1960's - Third Generation
The systems of the 1960's were also batch processing systems, but they were able to
take better advantage of the computer's resources by running several jobs at once.
15
• Fourth Generation
With the development of LSI (Large Scale Integration) circuits, chips, operating
system entered in the personal computer and the workstation age. Microprocessor technology
evolved to the point that it becomes possible to build desktop computers as powerful as the
mainframes of the 1970s.
3.Operating Systems Structure
• System Components
• Operating Systems Services
• System Calls and System Programs
3.1System Components
• Process Management
A process is only ONE instant of a program in execution. There are many processes
can be running the same program.
• Main-Memory Management
Main-Memory is a large array of words or bytes. Each word or byte has its own
address. Main memory is a repository of quickly accessible data shared by the CPU and I/O
devices.
3.2Operating Systems Services
• Program Execution
The system must be able to load a program into memory and to run it. The program
must be able to end its execution, either normally or abnormally (indicating error).
• I/O Operations
A running program may require I/O. This I/O may involve a file or an I/O device.
3.3System Calls and System Programs
System calls provide the interface between a process and the operating system. These
calls are generally available as assembly-language instructions, and are usually listed in the
manuals used by assembly-language programmers.

Functions and Classifications:


We can define a function as a special relation which maps each element of set A with
one and only one element of set B. Both the sets A and B must be non-empty. A function

16
defines a particular output for a particular input. Hence, f: A → B is a function such that for a ∈
A there is a unique element b ∈ B such that (a, b) ∈ f

Types of Functions

We have already learned about some types of functions like Identity, Polynomial, Rational,
Modulus, Signum, Greatest Integer functions. In this section, we will learn about other types of
function.

One to One Function

A function f: A → B is One to One if for each element of A there is a distinct element of B. It is


also known as Injective. Consider if a1 ∈ A and a2 ∈ B, f is defined as f: A → B such that f (a1)
= f (a2)

Many to One Function

It is a function which maps two or more elements of A to the same element of set B. Two or
more elements of A have the same image in B.

17
Onto Function

If there exists a function for which every element of set B there is (are) pre-image(s) in set A, it
is Onto Function. Onto is also referred as Surjective Function.

One – One and Onto Function

A function, f is One – One and Onto or Bijective if the function f is both One to One and Onto
function. In other words, the function f associates each element of A with a distinct element of B
and every element of B has a pre-image in A.

Programming Languages:
1.Computer Program
•A program is a set of instructions following the rules of the chosen language.

•Without programs, computers are useless.

•A program is like a recipe.

18
•It contains a list of ingredients (called variables) and a list of directions (called statements)
that tell the computer what to do with the variables.
2.Programming Language
•A vocabulary and set of grammatical rules (syntax) for instructing a computer to perform
specific tasks.

•Programming languages can be used to create computer programs.

•The term programming language usually refers to high-level languages, such as BASIC, C,
C++, COBOL, FORTRAN, Ada, and Pascal.
•You eventually need to convert your program into machine language so that computer can
understand it.

•There are two ways to do this:


 –Compile the program
 –Interpret the program
Compile the Program:
 Compileistotransformaprogramwritteninahigh-
levelprogramminglanguagefromsourcecodeintoobjectcode.
 Thiscanbedonebyusingatoolcalledcompiler.
 Acompilerreadsthewholesourcecodeandtranslatesitintoacompletemachinecodeprogra
mtoperformtherequiredtaskswhichisoutputasanewfile
Interpret the Program:
 Interpreterisaprogramthatexecutesinstructionswritteninahigh-levellanguage.
 Aninterpreterreadsthesourcecodeoneinstructionorlineatatime,convertsthislineintomach
inecodeandexecutesit.
3.Types of Programming Language
•There are three type of programming language:
 –Machinelanguage(Low-levellanguage)
 –Assemblylanguage(Low-levellanguage)
 –High-levellanguage
•Low-levellanguagesareclosertothelanguageusedbyacomputer,whilehigh-
levellanguagesareclosertohumanlanguages.
3.1Machine Language
•Machinelanguageisacollectionofbinarydigitsorbitsthatthecomputerreadsandinterprets.

19
•Machinelanguagesaretheonlylanguagesunderstoodbycomputers.

•Whileeasilyunderstoodbycomputers,machinelanguagesarealmostimpossibleforhumanstouseb
ecausetheyconsistentirelyofnumbers
3.2Assembly Language
•A program written in assembly language consists of a series of instructions mnemonics that
correspond to a stream of executable instructions, when translated by an assembler, that can
be loaded into memory and executed.

•Assembly languages use keywords and symbols, much like English, to form a programming
language but at the same time introduce a new problem.
•The problem is that the computer doesn't understand the assembly code, so we need a way to
convert it to machine code, which the computer does understand.

•Assembly language programs are translated into machine language by a program called an

assembler

3.3High Level Language


•High-levellanguages allow us to write computer code using instructions resembling
everyday spoken language (for example: print, if, while) which are then translatedinto
machine language to be executed.

•Programs written in a high-levellanguage need to be translated into machine


languagebefore they can be executed.

•Some programming languages use a compilerto perform this translation and others use an
interpreter.

UNIT II COMPLETED

20
UNIT – III
Data Processing:
Data processing occurs when data is collected and translated into usable information.
Usually performed by a data scientist or team of data scientists, it is important for data
processing to be done correctly as not to negatively affect the end product, or data output.

Data processing starts with data in its raw form and converts it into a more readable
format (graphs, documents, etc.), giving it the form and context necessary to be interpreted by
computers and utilized by employees throughout an organization.

Six stages of data processing

1. Data collection

Collecting data is the first step in data processing. Data is pulled from available sources,
including data lakes and data warehouses. It is important that the data sources available are
trustworthy and well-built so the data collected (and later used as information) is of the
highest possible quality.

2. Data preparation

Once the data is collected, it then enters the data preparation stage. Data preparation, often
referred to as “pre-processing” is the stage at which raw data is cleaned up and organized for
the following stage of data processing. During preparation, raw data is diligently checked for
any errors. The purpose of this step is to eliminate bad data (redundant, incomplete, or
incorrect data) and begin to create high-quality data for the best business intelligence.

3. Data input

The clean data is then entered into its destination (perhaps a CRM like Salesforce or a data
warehouse like Redshift), and translated into a language that it can understand. Data input is
the first stage in which raw data begins to take the form of usable information.

4. Processing

During this stage, the data inputted to the computer in the previous stage is actually processed
for interpretation. Processing is done using machine learning algorithms, though the process
21
itself may vary slightly depending on the source of data being processed (data lakes, social
networks, connected devices etc.) and its intended use (examining advertising patterns,
medical diagnosis from connected devices, determining customer needs, etc.).

5. Data output/interpretation

The output/interpretation stage is the stage at which data is finally usable to non-data
scientists. It is translated, readable, and often in the form of graphs, videos, images, plain text,
etc.). Members of the company or institution can now begin to self-serve the data for their
own data analytics projects.

6. Data storage

The final stage of data processing is storage. After all of the data is processed, it is then stored
for future use. While some information may be put to use immediately, much of it will serve
a purpose later on. Plus, properly stored data is a necessity for compliance with data
protection legislation like GDPR. When data is properly stored, it can be quickly and easily
accessed by members of the organization when needed.

Database Management Systems:


Data: It is a collection of information. The facts that can be recorded and which have implicit
meaning known as 'data'.

Example: Customer ----- 1.cname. 2.cno. 3.ccity.

Database: It is a collection of interrelated data. These can be stored in the form of tables. A
database can be of any size and varying complexity. A database may be generated and
manipulated manually or it may be computerized.

Example: Customer database consists the fields as cname, cno, and ccityCnameCnoCcity

Database System: It is computerized system, whose overall purpose is to maintain the


information and to make that the information is available on demand.

Advantages:

1.Redundency can be reduced.

2.Inconsistency can be avoided.

22
3.Data can be shared. Department of IT, SVECW 2

4.Standards can be enforced.

5.Security restrictions can be applied.

6.Integrity can be maintained.

7.Data gathering can be possible.

8.Requirements can be balanced.

Database Management System (DBMS):

It is a collection of programs that enables user to create and maintain a database. In


other words it is general-purpose software that provides the users with the processes of
defining, constructing and manipulating the database for various applications.

Disadvantages in File Processing Data redundancy and inconsistency. Difficult in


accessing data. Data isolation. Data integrity. Concurrent access is not possible. Security
Problems. .

Advantages of DBMS:

1.Data Independence.

2.Efficient Data Access.

3.Data Integrity and security.

4.Data administration.

5.Concurrent access and Crash recovery.

6.Reduced Application Development Time.

Components of a DBMS:
The database management system can be divided into five major components, they are:

1. Hardware
2. Software
3. Data
4. Procedures

23
5. Database Access Language

Let's have a simple diagram to see how they all fit together to form a database management
system.

DBMS Components: Hardware

When we say Hardware, we mean computer, hard disks, I/O channels for data, and any other
physical component involved before any data is successfully stored into the memory.

When we run Oracle or MySQL on our personal computer, then our computer's Hard Disk,
our Keyboard using which we type in all the commands, our computer's RAM, ROM all
become a part of the DBMS hardware.

DBMS Components: Software

This is the main component, as this is the program which controls everything. The DBMS
software is more like a wrapper around the physical database, which provides us with an
easy-to-use interface to store, access and update data.

The DBMS software is capable of understanding the Database Access Language and intrepret
it into actual database commands to execute them on the DB.

DBMS Components: Data

Data is that resource, for which DBMS was designed. The motive behind the creation of
DBMS was to store and utilise data.

In a typical Database, the user saved Data is present and meta data is stored.

Metadata is data about the data. This is information stored by the DBMS to better
understand the data stored in it.

For example: When I store my Name in a database, the DBMS will store when the name
was stored in the database, what is the size of the name, is it stored as related data to some
other data, or is it independent, all this information is metadata.

DBMS Components: Procedures

Procedures refer to general instructions to use a database management system. This includes
procedures to setup and install a DBMS, To login and logout of DBMS software, to manage
databases, to take backups, generating reports etc.

24
DBMS Components: Database Access Language

Database Access Language is a simple language designed to write commands to access,


insert, update and delete data stored in any database.

A user can write commands in the Database Access Language and submit it to the DBMS for
execution, which is then translated and executed by the DBMS.

User can create new databases, tables, insert data, fetch stored data, update data and delete
the data using the access language.

Types of DBMS:

Different types of Database Management Systems based in data models are as follows:

 Relational Database Management Systems


 Hierarchical Database Management Systems
 Network Database Management Systems
 Object-oriented Database Management Systems
Hierarchical DBMS

A DBMS is said to be hierarchical if the relationships among data in the database are
established in such a way that one data item is present as the subordinate of another one or a
sub unit. Here subordinate means that items have "parent-child" relationships among them.
These are good for storing data with items describing attributes, features and so on. For e.g., a
book with information on chapters and verses.

Network DBMS

A DBMS is said to be a Network DBMS if the relationships among data in the database are
of type many-to-many. The relationships among many-to-many appears in the form of a
network. Thus the structure of a network database is extremely complicated because of these
many-to-many relationships in which one record can be used as a key of the entire database.
These have mainly been replaced by Relational database management systems in today's
modern computing.

25
Object-oriented DBMS

OODBMS represent significant advance over other DBMS. While other DBMS are designed
to handle structred data, an OODBMS is designed to store data from variety of media
sources, such as photographs and text, and produce work, as output, in a multimedia format.

Relational DBMS

A DBMS is said to be a Relational DBMS or RDBMS if the database relationships are treated
in the form of a table. The data can be related to other data in the same table or other tables
which has to be correctly managed by joining one or more tables. Data in this type of model
is stored is fixed predefined structures and are usually manipulated using Structured Query
Language (SQL).

Functions of DBMS:
DBMS performs several important functions that guarantee the integrity and
consistency of the data in the database.

The most important functions of Database Management System are,

 Data Dictionary Management,


 Data Storage Management,
 Data Transformation and Presentation,
 Security Management,
 Multi user Access Control,
 Backup and Recovery Management,
 Data Integrity Management,
 Database Access Languages andApplication Programming Interfaces and
 Database Communication interfaces.

Functions of DBMS

1. Data Dictionary Management

Data Dictionary Management is the one of the most important function of database
management system.

DBMS stores definitions of the data elements and their relationships (metadata) in a data
dictionary.

26
So, all programs that access the data in the database work through the DBMS.

The DBMS uses the data dictionary to look up the required data component structures and
relationships which relieves you from coding such complex relationships in each program.

Additionally, any changes made in a database structure are automatically recorded in the data
dictionary, thereby freeing you from having to modify all of the programs that access the
changed structure.

In other words, the DBMS system provides data abstraction, and it removes structural and
data dependence from the system.

2. Data Storage Management

One of the DBMS functionality is creating and managing the complex structures required for
data storage, thus relieving you from the difficult task of defining and programming the
physical data characteristics.

A modern DBMS system provides storage not only for the data, but also for related data
entry forms or screen definitions, report definitions, data validation rules, procedural code,
structures to handle video and picture formats, and so on.

Data storage management is also important for database performance tuning. Performance
tuning relates to the activities that make the database perform more efficiently in terms of
storage and access speed. So, the data storage management is another important function of
Database ManagementSystem.
3. Data transformation and presentation

The DBMS transforms entered data in to required data structures. The DBMS relieves you of
the chore of making a distinction between the logical data format and the physical data
format. That is, the DBMS formats the physically retrieved data to make it conform to the
user’s logical expectations.

For example, imagine an enterprise database used by a multinational company. An end user
in England would expect to enter data such as July 11, 2009, as “11/07/2009.” In contrast, the
same date would be entered in the United States as “07/11/2009.” Regardless of the data
presentation format, the DBMS system must manage the date in the proper format for each
country.

27
4.SecurityManagement
Security Management is another important function of Database Management
System(DBMS). The DBMS creates a security system that enforces user security and data
privacy. Security rules determine which users can access the database, which data items each
user can access, and which data operations (read, add, delete, or modify) the user can
perform. This is especially important in multiuser database systems.

5.MultiUserAccessControl
Multiuser access control is another important DBMS Function. To provide data integrity and
data consistency, the DBMS uses sophisticated algorithms to ensure that multiple users can
access the database concurrently without compromising the integrity of the database.
6.BackupandRecoveryManagement
The DBMS provides backup and data recovery to ensure data safety and integrity.

Current DBMS systems provide special utilities that allow the DBA to perform routine and
special backup and restore procedures. Recovery management deals with the recovery of the
database after a failure, such as a bad sector in the disk or a power failure. Such capability is.
critical to preserving the database’s integrity.

7. Data Integrity Management


Data integrity management is another important DBMS function.

The DBMS promotes and enforces integrity rules, thus minimizing data redundancy and
maximizing data consistency.

The data relationships stored in the data dictionary are used to enforce data integrity.
Ensuring data integrity is important DBMS functionality in transaction-oriented database
systems.

8. Database Access Languages and Application Programming Interfaces


The DBMS provides data access through a query language. A query language is a non
procedural language—one that lets the user specify what must be done without having to
specify how it is to be done.

Structured Query Language (SQL) is the defacto query language and data access standard
supported by the majority of DBMS vendors.
9. Database Communication Interfaces
Current-generation DBMS's accept end-user requests via multiple, different network

28
environments. For example, the DBMS might provide access to the database via the Internet
through the use of Web browsers such as Mozilla Firefox or Microsoft Internet Explorer.

In this environment, communications can be accomplished in several ways:

- End users can generate answers to queries by filling in screen forms through their preferred
Web browser.

- The DBMS can automatically publish predefined reports on a Website.

- The DBMS can connect to third-party systems to distribute information via e-mail or other
productivity applications.

Computer Networks:

Open system:
A system which is connected to the network and is ready for communication.
Closed system:
A system which is not connected to the network and can’t be communicated with.
Computer Network:
It is the interconnection of multiple devices, generally termed as Hosts connected using
multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two
different devices which are known as Network devices.
Ex: Router, Switch, Hub, Bridge.

Types of Network:

29
The Network allows computers to connect and communicate with different computers via
any medium. LAN, MAN and WAN are the three major types of the network designed to
operate over the area they cover. There are some similarities and dissimilarities between
them. One of the major differences is the geographical area they cover, i.e. LAN covers the
smallest area; MAN covers an area larger than LAN and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
 PAN (Personal Area Network)
 SAN (Storage Area Network)
 EPN (Enterprise Private Network)
 VPN (Virtual Private Network)
Local Area Network (LAN) :
LAN or Local Area Network connects network devices in such a way that personal computer
and workstations can share data, tools and programs. The group of computers and devices are
connected together by a switch, or stack of switches, using a private addressing scheme as
defined by the TCP/IP protocol. Private addresses are unique in relation to other computers
on the local network. Routers are found at the boundary of a LAN, connecting them to the
larger WAN.
Data transmits at a very fast rate as the number of computers linked are limited. By
definition, the connections must be high speed and relatively inexpensive hardware (Such as
hubs, network adapters and Ethernet cables). LANs cover smaller geographical area (Size is
limited to a few kilometers) and are privately owned. One can use it for an office building,
home, hospital, schools, etc. LAN is easy to design and maintain. A Communication medium
used for LAN has twisted pair cables and coaxial cables. It covers a short distance, and so the
error and noise are minimized.

Metropolitan Area Network (MAN) :


MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area
as compared to WAN. It connects two or more computers that are apart but resides in the
same or different cities. It covers a large geographical area and may serve as an ISP (Internet
Service Provider). MAN is designed for customers who need a high-speed connectivity.
Speeds of MAN ranges in terms of Mbps. It’s hard to design and maintain a Metropolitan
Area Network.
The fault tolerance of a MAN is less and also there is more congestion in the network.
It is costly and may or may not be owned by a single organization. The data transfer rate and
the propagation delay of MAN is moderate. Devices used for transmission of data through
30
MAN are: Modem and Wire/Cable. Examples of a MAN are the part of the telephone
company network that can provide a high-speed DSL line to the customer or the cable TV
network in a city.
Wide Area Network (WAN) :
WAN or Wide Area Network is a computer network that extends over a large geographical
area, although it might be confined within the bounds of a state or country. A WAN could be
a connection of LAN connecting to other LAN’s via telephone lines and radio waves and
may be limited to an enterprise (a corporation or an organization) or accessible to the public.
The technology is high speed and relatively expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is
difficult to design and maintain. Similar to a MAN, the fault tolerance of a WAN is less and
there is more congestion in the network. A Communication medium used for WAN is PSTN
or Satellite Link. Due to long distance transmission, the noise and error tend to be more
in WAN.

WAN’s data rate is slow about a 10th LAN’s speed, since it involves increased
distance and increased number of servers and terminals etc. Speeds of WAN ranges from few
kilobits per second (Kbps) to megabits per second (Mbps). Propagation delay is one of the
biggest problems faced here. Devices used for transmission of data through WAN are: Optic
wires, Microwaves and Satellites. Example of a Switched WAN is the asynchronous transfer
mode (ATM) network and Point-to-Point WAN is dial-up line that connects a home computer
to the Internet.

Network Topology:
The arrangement of a network which comprises of nodes and connecting lines via sender and
receiver is referred as network topology. The various network topologies are :

a) Mesh Topology :

In mesh topology, every device is connected to another device via particular channel.

31
Advantages of this topology :
 It is robust.
 Fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
 Provides security and privacy.
Problems with this topology :
 Installation and configuration is difficult.
 Cost of cables are high as bulk wiring is required, hence suitable for less number of
devices.
 Cost of maintenance is high.

b) Star Topology :

In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node. The hub can be passive in
nature i.e. not intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as active hubs. Active hubs have repeaters in them.

32
Advantages of this topology :
 If N devices are connected to each other in star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
 Each device require only 1 port i.e. to connect to the hub.
Problems with this topology :
 If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
 Cost of installation is high.
 Performance is based on the single concentrator i.e. hub.

c) Bus Topology :

Bus topology is a network type in which every computer and network device is connected to
single cable. It transmits the data from one end to another in single direction. No bi-
directional feature is in bus topology.

Advantages of this topology :


 If N devices are connected to each other in bus topology, then the number of cables
required to connect them is 1 which is known as backbone cable and N drop lines are
required.
 Cost of the cable is less as compared to other topology, but it is used to built small
networks.
Problems with this topology :
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD etc.

33
d) Ring Topology :

In this topology, it forms a ring connecting a devices with its exactly two neighbouring
devices.

The following operations takes place in ring topology are :

1. One station is known as monitor station which takes all the responsibility to perform
the operations.
2. To transmit the data, station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques : Early token release releases the token just
after the transmitting the data and Delay token release releases the token after the
acknowledgement is received from the receiver.

Advantages of this topology :


 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
Problems with this topology :
 Troubleshooting is difficult in this topology.
 Addition of stations in between or removal of stations can disturb the whole topology.

34
e) Hybrid Topology :

This topology is a collection of two or more topologies which are described above. This is a
scalable topology which can be expanded easily. It is reliable one but at the same it is a costly
topology.

UNIT III COMPLETED

35
UNIT – IV
Internet Access:
Internet access is the ability of individuals and organizations to connect to
the Internet using computer terminals, computers, and other devices; and to access services
such as email and the World Wide Web. Internet access is sold by Internet service
providers (ISPs) delivering connectivity at a wide range of data transfer rates via various
networking technologies. Many organizations, including a growing number of municipal
entities, also provide cost-free wireless access.

Availability of Internet access was once limited, but has grown rapidly. In 1995,
only 0.04 percent of the world's population had access, with well over half of those living in
the United States,[1] and consumer use was through dial-up. By the first decade of the 21st
century, many consumers in developed nations used faster broadband technology, and by
2014, 41 percent of the world's population had access, broadband was almost ubiquitous
worldwide, and global average connection speeds exceeded one megabit per second.

The Internet developed from the ARPANET, which was funded by the US
government to support projects within the government and at universities and research
laboratories in the US – but grew over time to include most of the world's large universities
and the research arms of many technology companies. [4][5][6] Use by a wider audience only
came in 1995 when restrictions on the use of the Internet to carry commercial traffic were
lifted.[7]

In the early to mid-1980s, most Internet access was from personal


computers and workstations directly connected to local area networks or from dial-up
connections using modemsand analog telephone lines. LANs typically operated at 10 Mbit/s,
while modem data-rates grew from 1200 bit/s in the early 1980s, to 56 kbit/s by the late
1990s. Initially, dial-up connections were made from terminals or computers
running terminal emulation software to terminal servers on LANs.

These dial-up connections did not support end-to-end use of the Internet protocols and
only provided terminal to host connections. The introduction of network access
servers supporting the Serial Line Internet Protocol (SLIP) and later the point-to-point
protocol (PPP) extended the Internet protocols and made the full range of Internet services
available to dial-up users; although slower, due to the lower data rates available using dial-up.

36
Broadband Internet access, often shortened to just broadband, is simply defined as
"Internet access that is always on, and faster than the traditional dial-up access" [8][9] and so
covers a wide range of technologies. Broadband connections are typically made using a
computer's built in Ethernet networking capabilities, or by using a NIC expansion card.

Most broadband services provide a continuous "always on" connection; there is no dial-in
process required, and it does not interfere with voice use of phone lines. [10] Broadband
provides improved access to Internet services such as:

 Faster world wide web browsing


 Faster downloading of documents, photographs, videos, and other large files
 Telephony, radio, television, and videoconferencing
 Virtual private networks and remote system administration
 Online gaming, especially massively multiplayer online role-playing games which are
interaction-intensive

Internet Protocol:
Transmission Control Protocol (TCP)
TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as
back bone for connection.It exhibits the following key features:
 Transmission Control Protocol TCP corresponds to the Transport Layer of OSI
Model.
 TCP is a reliable and connection oriented protocol.
 TCP offers:
 Stream Data Transfer.
 Reliability.
 Efficient Flow Control
 Full-duplex operation.
 Multiplexing.
 TCP offers connection oriented end-to-end packet delivery.
 TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expect to receive.
 It retransmits the bytes not acknowledged with in specified time period.

37
Internet Protocol (IP)
Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee
of
successfully transmission of data.
In order to make it reliable, it must be paired with reliable protocol such as TCP at the
transport layer.
Internet protocol transmits the data in form of a datagram as shown in the following diagram:

Points to remember:
 The length of datagram is variable.
 The Datagram is divided into two parts: header and data.
 The length of header is 20 to 60 bytes.
 The header contains information for routing and delivery of the packet.

User Datagram Protocol (UDP)


Like IP, UDP is connectionless and unreliable protocol. It doesn’t require making a
connection with the host to exchange data. Since UDP is unreliable protocol, there is no
mechanism for ensuring that data sent is received.
UDP transmits the data in form of a datagram. The UDP datagram consists of five
parts as shown in the following diagram:

38
Points to remember:
 UDP is used by the application that typically transmit small amount of data at one
time.
 UDP provides protocol port used i.e. UDP message contains both source and
destination port number, that makes it possible for UDP software at the destination to
deliver the message to correct application program.
File Transfer Protocol (FTP)
FTP is used to copy files from one host to another. FTP offers the mechanism for the
same in following manner:
 FTP creates two processes such as Control Process and Data Transfer Process at both
ends.i.e. at client as well as at server.
 FTP establishes two different connections: one is for data transfer and other is for
control
information.
 Control connection is made between control processes while Data Connection is
made
Between FTP uses port 21 for the control connection and Port 20 for the data
connection.

39
Hyper Text Transfer Protocol(HTTP)
HTTP is a communication protocol. It defines mechanism for communication
between browser and the web server. It is also called request and response protocol because
the communication between browser and server takes place in request and response pairs.
HTTP Request
HTTP request comprises of lines which contains:
 Request line
 Header Fields
 Message body
Key Points
 The first line i.e. the Request line specifies the request method i.e. Get or Post.
 The second line specifies the header which indicates the domain name of the server
from where index.htm is retrieved.
HTTP Response
Like HTTP request, HTTP response also has certain structure. HTTP response contains:
 Status line
 Headers
 Message body

Internet Addressing:
A way to locate people, computers, and Internet resources. It can be

 IP (Internet Protocol) addresses and domain names


 Electronic mail addresses
 URLs

In general, Internet addressing is a systematic way to identify people, computers and Internet
resources. On the Internet, the term "address" is used loosely. Address can mean many
different things from an electronic mail address to a URL.

1.IP Address
An IP address is a unique number that identifies computers on the Internet; every
computer directly connected to the Internet has one. Every client, server and network device
must have a unique IP address for each network connection (network interface).

40
IP addresses are conceptually similar to phone numbers, except they are used in LANs
(Local Area Network), WANs (Wide Area Network), and the Internet. Because the numbers
are not easy for humans to remember, the Domain Name System provides a service
analogous to an address book lookup called "domain name resolution" or "name resolution".
Special DNS servers on the internet are dedicated to performing the translation from a
domain name to an IP address.

An IP address consists of four numbers separated by periods. Each number must be


between 0 and 255.

An example is: 204.81.205.32

The format of an IP address is a 32-bit numeric address written as four numbers


separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be
an IP address.

Within an isolated network, you can assign IP addresses at random as long as each one is
unique. However, connecting a private network to the Internet requires using registered IP
addresses (called Internet addresses) to avoid duplicates.

The four numbers in an IP address are used in different ways to identify a particular
network and a host on that network. Four regional Internet registries -- ARIN, RIPE NCC,
LACNIC and APNIC -- assign Internet addresses from the following three classes.

 Class A - supports 16 million hosts on each of 126 networks


 Class B - supports 65,000 hosts on each of 16,000 networks
 Class C - supports 254 hosts on each of 2 million networks

1.1Format.

An IP address is made up of four bytes of information (totaling 32 bits) expressed as


four numbers between 0 and 255 shown separated by periods. For example, your computer's
IP address might be 238.17.159.4, which is shown below in human-readable decimal form
and in the binary form used on the Internet.

41
Example IP Address

Decimal: 238 . 17 . 159 . 4

Binary: 11101110 00010001 10011111 00000100

Each of the four numbers uses eight bits of storage, and so can represent any of the
256 numbers between zero (binary 00000000) and 255 (binary 11111111). Therefore, there
are more than 4 billion possible different IP addresses in all:

(Internet Protocol address) The address of a device attached to an IP network (TCP/IP


network). Every client, server and network device must have a unique IP address for each
network connection (network interface). Every IP packet contains a source IP address and a
destination IP address.

1.2Static and Dynamic IP

Each device in an IP network is either assigned a permanent address (static IP) by the
network administrator or is assigned a temporary address (dynamic IP). Depending on one's
Internet connection the IP address can be the same every time one connects (called a static IP
address), or different every time one connects, (called a dynamic IP address).

In order to use a dynamic IP address, there must exist a server, which can provide the
address. IP addresses are usually given out through a server service called DHCP or the
Dynamic Host Configuration Protocol. If a static address is used, it must be manually
programmed into parameters of the device's network interface.

Routers, firewalls and proxy servers use static addresses. Client machines may use
static or dynamic IP addresses.In routers and operating systems, the default configuration for
clients is dynamic IP .

1.3Dotted Decimals

IP addresses are written in "dotted decimal" notation, which is four sets of numbers separated
by periods; for example, 204.171.64.2. If you knew the IP address of a Web site, you could
enter the dotted decimal number into your browser instead of the domain name .The
traditional IP address uses a 32-bit number that defines both the network and the host
42
computer. The network class determines how many of the 32 bits are used for the network
address, leaving the remaining bits for use as the host number. The host number can be
further divided between subnetworks and hosts

Class A, B and C
Although the computer identifies the class by the first three bits of the address (A=0; B=10;
C=110), people identify the class by the first number in the address (see range below). This
class-based system has also been greatly expanded, eliminating the huge disparity in the
number of hosts that each class can accommodate

An IP address is first divided between networks and hosts. The host bits are further divided
between subnets and hosts.

1.4Domain Name
 Most computers on the Internet have a unique domain name.

 Special computers, called domain name servers, look up the domain name and match
it to the corresponding IP address so that data can be properly routed to its destination
on the Internet.
 An example domain name is: healthyway.com
 Domain names are easier for most people to relate to than a numeric IP address.

2.Electronic Mail Address


An Internet electronic mail, or e-mail, address is used to identify a person (or persons) and a
computer for purposes of exchanging electronic mail messages.

An example Internet e-mail address is: [email protected]

Internet e-mail addresses are read from left to right:

43
 "abc123" is the name of the person receiving or sending the message; this is referred
to as the username.
 "columbia" is part of the domain name of the organization.
 "edu" is also part of the domain name and indicates that "columbia" is an educational
institution.

2.1Electronic Mail Address


Other networks may use different electronic mail addressing schemes within their own
networks. To be used in Internet e-mail, these addresses often need to be modified.

For example, within CompuServe an e-mail address consists only of two numbers separated
by a comma: 36547,891.

 To convert this to an address that can be used on the Internet, the comma is
changed to a period and the number serves as the username.

 The domain name is compuserve.com, so the Internet address would be:


[email protected]

3.URLs
URL stands for Uniform Resource Locator. URLs are used to identify specific sites and
files available on the World Wide Web.

The structure of a URL is: protocol://server.subdomain.top-level-domain/directory/filename

Not all URLs will have the directory and filename.

Two examples:

http://www.healthyway.com/exercise/mtbike.html

gopher://gopher.state.edu/

3.1URLs
Similar to an e-mail address, a URL is read like a sentence. For example the URL

44
http://www.healthyway.com is read as "http colon forward slash forward slash www dot
healthyway dot com".

www:

Stands for "World Wide Web." It is important to know that this is not a synonym for
the Internet. The World Wide Web, or just "the Web," as ordinary people call it, is a subset of
the Internet. The Web consists of pages that can be accessed using a Web browser. The
Internet is the actual network of networks where all the information resides.

Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and e-mail are
all part of the Internet, but are not part of the World Wide Web. The Hyper-Text Transfer
Protocol (HTTP) is the method used to transfer Web pages to your computer. With hypertext,
a word or phrase can contain a link to another Web site. All Web pages are written in the
hyper-text markup language (HTML), which works in conjunction with HTTP.

Internet Relay Chat:


Stands for "Internet Relay Chat." IRC is a service that allows people to chat with each
other online. It operates on a client/server model where individuals use a client program to
connect to an IRC server. Popular IRC clients include mIRC for Windows and Textual for
OS X. Several web-based clients are also available, including KiwiIRC and Mibbit.
In order to join an IRC conversation, you must choose a username and a channel.
Your username, also called a handle, can be whatever you want. It may include letters and
numbers, but not spaces. A channel is a specific chat group within an IRC network where
users can talk to each other.
Some networks publish lists of available channels, while others require you to
manually enter channel names in order to join them. Channels always begin with
a hashtag followed by a name that represents their intended chat topic, such as "#teenchat,"
"#politics," or "#sports". Some IRC channels require a password while others are open to the
public.
When you join a channel, the chat window will begin displayig messages people are
typing. You can join the conversation by typing your own messages. While channel members
can type whatever they want, popular channels are often moderated. That means human

45
operators or automated bots may kick people out of the channel and even ban users who post
offensive remarks or spam the channel with repeated messages.
While IRC was designed as a public chat service, it supports other features such as
private messaging and file transfers. For example, you can use an IRC command (which
typically begins with a forward slash "/") to request a private chat session with another user.
Then you can use another IRC command to send the user a file from your local system.

E-Mail:
Email, short for "electronic mail," is one of the most widely used features of
the Internet, along with the web. It allows you to send and receive messages to and from
anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to
send messages, while the POP or IMAP protocols are used to retrieve messages from a
mail server. When you configure an email account, you must define your email
address, password, and the mail servers used to send and receive messages.
Fortunately, most webmail services configure your account automatically, so you only
need to enter your email address and password. However, if you use an email client like
Microsoft Outlook or Apple Mail, you may need to manually configure each account.
Besides the email address and password, you may also have to enter the incoming and
outgoing mail servers and enter the correct port numbers for each one.
The original email standard only supported plain text messages. Eventually, email
evolved to support rich text with custom formatting. Today, email supports HTML, which
allows emails to be formatted the same way as websites. HTML email messages can include
images, links, and CSS layouts. You can also send files or "email attachments" along with
messages.
Most mail servers allow you to send multiple attachments with each message, but
they limit the total size. In the early days of email, attachments were typically limited to
one megabyte, but now many mail servers support email attachments that are 20 megabytes
in size or more.
1.Advantage of E-Mail
 Cheapest and fastest way to communication.
 Irrespective of location.
 Exchange endless amount of data/information.

46
 Global communication is easier and instant.
 24 hours service.
2.Disadvantage of E-Mail
 Unsecured communication.
 Privacy problem.
 Network conjunction.
 Power problem.

Mailing Basics:
 Any system for sending and receiving messages over a network that called Electronic
Mail which can be included attachments such as pictures or sound files.
 E-Mail originated in the early 1970s by ARPANET and now it is primary method of
communication.
 Email is the process of sending and receiving messages electronically over the internet.

1.How Email works:


 Differences with regular mail:
– Email is electronic rather than paper
– Recipient receives mail normally within seconds or minutes of you sending it
 How does it do it?
– Our message travels from the computer we send it from over cables, wires, or wireless
means to a Server. The Server acts as a Post Office, verifying addresses, sorting, and sends
out our message over the internet. Once on the internet, our message travels as data “packets”
to the addressee’s email Server. The addressee’s email server assembles all the data packets
and delivers it to correct “inbox”.
 How does it go to the correct address?
– Each email address is unique. There are 3 parts to an email address. The “User ID”,
“@”, “email client name”. A complete email address example would be:
[email protected].

2.Basic requirement for E-Mail


 Networking/Internet connection
 E-Mail address
 Hardware
 Software
 Basic knowledge of e-mail operation
47
2.1Networking/Internet connection
 Networking or Internet connection must be required for e-mail because with out
networking or Internet we can’t use e-mail.
2.2E-Mail address

2.3Hardware
 Pentium-4
 Modem
 Cables
2.4Software
• Operating system
•Web browser
2.5Basic knowledge of e-mail operation
 Using Internet
 Knowledge of MS-office
 Typing
 Basic knowledge about E-mail sending, receiving, attachment etc.
3.Basic component of E-Mail
 Compose mail/Write new mail
 Inbox
 Draft

48
 Trash
 Address book/Contact
 Spam
 Setting

E-Mail Ethics:
Email etiquette refers to the principles of behavior that one should use when writing
or answering email messages. It is also known as the code of conduct for email
communication. Email etiquette depends upon to whom we are writing- Friends &
Relatives, Partners, Customers, Superior or Subordinates.

We must follow email etiquette in our professional communication because it is a


form of communication which is a reflection of senders and responders. Bad email etiquette
reflects badly on us, and a record of this is kept in mailboxes over which we have no control.
Good email etiquette reflects well on us, improves our public perception and persona and
increases the chance of a prompt and comprehensive response. It’s not hard to maintain good
email etiquette once we know what it is. A company needs to implement etiquette rules for
the following three reasons:

 Professionalism: by using proper email language your company will convey a


professional image.
 Efficiency: emails that get to the point are much more effective than poorly worded
emails.
 Protection from liability: employee awareness of email risks will protect your
company from costly law suits.

Introduction to Multimedia
 Multi
 Many, Multiple,
 Media
 Tools that is used to represent or do a certain things, delivery medium,
a form of mass communication – newspaper, magazine / tv.
 Distribution tool & information presentation – text, graphic, voice,
images, music and etc.
Multimedia is a combination of text, graphic, sound, animation, and video that is
delivered interactively to the user by electronic or digitally manipulated.
49
Multimedia is a media that uses multiple form of information content and information
processing.
Elements of Multimedia: Text, Graphics, Video, Animation, Audio.

GRAPHIC
TEXT

MULTIME
VIDEO
AUDIO

ANIMATION

Multimedia tools.
o Text,
o Graphics,
o Video,
o Animation,
o Audio.

1.Text:
 A broad term for something that contains words to express something.
 Text is the most basic element of multimedia.
 A good choice of words could help convey the intended message to the users
(keywords).
 Used in contents, menus, navigational buttons.
 Example

50
2.Graphics:
 Two-dimensional figure or illustration
 Could be produced manually (by drawing, painting, carving, etc.) or by computer
graphics technology.
 Used in multimedia to show more clearly what a particular information is all about
(diagrams, picture).
 Example:

3.Audio:
 Produced by vibration, as perceived by the sense of hearing.
 In multimedia, audio could come in the form of speech, sound effects and also music
score.
 Example:

51
4.Animation:
 The illusion of motion created by the consecutive display of images of static elements.
 In multimedia, animation is used to further enhance / enriched the experience of the
user to further understand the information conveyed to them.
 Example:

5.Video:
 Is the technology of capturing, recording, processing, transmitting, and reconstructing
moving pictures.
 Video is more towards photo realistic image sequence / live recording as in
comparison to animation.

52
 Video also takes a lot of storage space. So plan carefully before you are going to use
it.

UNIT IV COMPLETED

53
UNIT – V
Electronic Commerce:
E-commerce (EC), an abbreviation for electronic commerce, is the buying and selling
of goods and services, or the transmitting of funds or data, over an electronic network,
primarily the internet. These business transactions occur either as business-to-business (B2B),
business-to-consumer (B2C), consumer-to-consumer or consumer-to-business. The terms e-
commerce and e-business are often used interchangeably. The term e-tail is also sometimes
used in reference to the transactional processes for online shopping.

History of e-commerce

The beginnings of e-commerce can be traced to the 1960s, when businesses started
using Electronic Data Interchange (EDI) to share business documents with other companies.
In 1979, the American National Standards Institute developed ASC X12 as a universal
standard for businesses to share documents through electronic networks.

After the number of individual users sharing electronic documents with each other
grew in the 1980s, the rise of eBay and Amazon in the 1990s revolutionized the e-commerce
industry. Consumers can now purchase endless amounts of items online, from e-tailers,
typical brick-and-mortar stores with e-commerce capabilities and one another.

Classification of E-Commerce:

1.Business-to-business (B2B):

Business to business e-commerce refers to the electronic exchange of products,


services or information between businesses rather than between businesses and consumers.
Examples include online directories and product and supply exchange websites that allow
businesses to search for products, services and information and to initiate transactions
through e-procurement interfaces.

In 2017, Forrester Research predicted that the B2B e-commerce market will top $1.1
trillion in the U.S. by 2021, accounting for 13% of all B2B sales in the nation.

54
2.Business-to-consumer (B2C):

Business to consumer is the retail part of e-commerce on the internet. It is when


businesses sell products, services or information directly to consumers. The term was popular
during the dot-com boom of the late 1990s, when online retailers and sellers of goods were a
novelty.

Today, there are innumerable virtual stores and malls on the internet selling all types
of consumer goods. The most recognized example of these sites is Amazon, which dominates
the B2C market.

3.Consumer-to-consumer (C2C):

Consumer to consumer is a type of e-commerce in which consumers trade products,


services and information with each other online. These transactions are generally conducted
through a third party that provides an online platform on which the transactions are carried
out.

Online auctions and classified advertisements are two examples of C2C platforms,
with eBay and Craigslist being two of the most popular of these platforms. Because eBay is a
business, this form of e-commerce could also be called C2B2C -- consumer-to-business-to-
consumer.

4. Consumer-to-business(C2B)

Consumer-to-business (C2B) is a type of e-commerce in which consumers make their


products and services available online for companies to bid on and purchase. This is the
opposite of the traditional commerce model of B2C.

A popular example of a C2B platform is a market that sells royalty-free photographs,


images, media and design elements, such as iStock. Another example would be a job board.

5.Business-to-administration (B2A):

Business-to-administration (B2A) refers to transactions conducted online between


companies and public administration or government bodies. Many branches of government
are dependent on e-services or products in one way or another, especially when it comes to
legal documents, registers, social security, fiscals and employment.

55
Businesses can supply these electronically. B2A services have grown considerably in
recent years as investments have been made in e-government capabilities.

6.Consumer-to-administration (C2A):

Consumer-to-administration (C2A) refers to transactions conducted online between


individual consumers and public administration or government bodies. The government
rarely buys products or services from citizens, but individuals frequently use electronic
means in the following areas:

• Education: disseminating information, distance learning/online lectures, etc.

• Social security: distributing information, making payments, etc.

• Taxes: filing tax returns, making payments, etc.

• Health: making appointments, providing information about illnesses, making health


services payments, etc.

System Analysis and Design:


systems improvement is systematic process which includes stages such as planning, analysis,
design, deployment, and maintenance. here, in this tutorial, we will primarily focus on −

 systems analysis
 systems design

1.Systems analysis:

It is a procedure of collecting and interpreting data, identifying the issues, and


decomposition of a system into its components.

System analysis is conducted for the cause of studying a system or its elements in
order to identify its objectives. it is a trouble solving technique that improves the system and
ensures that all the components of the system work effectively to accomplish their purpose.

Analysis specifies what the system should do.

56
2.Systems design:

It is a method of planning a new business system or replacing an present system by


defining its components or modules to satisfy the specific requirements. before planning, you
need to understand the antique system thoroughly and decide how computers can best be used
in order to operate efficiently.

System design focuses on how to perform the objective of the system.


System analysis and design (sad) mainly focuses on −

 Systems
 Processes
 Technology

what is a system?

The word system is derived from Greek word Systema, which means an prepared relationship
between any set of components to achieve some common reason or objective.

A system is “an orderly grouping of interdependent components connected together


according to a plan to obtain a specific purpose.

3.Elements of a system:

The following diagram suggests the elements of system:

57
3.1Outputs and Inputs
 The main aim of a device is to produce an output that is useful for its user.
 Inputs are the information that enters into the system for processing.
 Output is the outcome of processing.

3.2Processor(s)

The processor is the element of a system that involves the actual transformation of input into
output.

 It is the operational element of a system. Processors may modify the input either totally or
partially, depending at the output specification.
 As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.

3.3Control

 The control element courses the system.


 It is the decision–making subsystem that controls the sample of activities governing input,
processing, and output.
 The behavior of a computer system is managed by the operating system and software. in
order to keep system in balance, what and how much input is needed is determined by
Output specifications.

3.4Feedback

 Feedback presents the control in a dynamic system.


 Positive feedback is routine in nature that encourages the performance of the system.
 Negative comments is informational in nature that provides the controller with
information for movement.

3.5Environment

 The environment is the “supersystem” within which an organization operates.


 It is the source of external elements that strike at the system.
 It determines how a system have to function. for example, vendors and competitors of
organization’s environment, may also provide constraints that affect the actual
performance of the business.

58
3.6Boundaries and Interface

 A system should be described through its boundaries. boundaries are the limits that
identify its components, processes, and interrelationship when it interfaces with any other
system.
 Every system has boundaries that determine its sphere of impact and control.
 The knowledge of the boundaries of a given system is critical in determining the nature of
its interface with other systems for successful design.

Life Cycle:
SDLC is a process followed for a software project, within a software organization. It
consists of a detailed plan describing how to develop, maintain, replace and alter or enhance
specific software. The life cycle defines a methodology for improving the quality of software
and the overall development process.
The following figure is a graphical representation of the various stages of a typical
SDLC.

A typical Software Development Life Cycle consists of the following stages:


Stage 1: Planning and Requirement Analysis
Requirement analysis is the most important and fundamental stage in SDLC. It is
performed by the senior members of the team with inputs from the customer, the sales

59
department, market surveys and domain experts in the industry. This information is then used
to plan the basic project approach and to conduct product feasibility study in the economical,
operational and technical areas.
Planning for the quality assurance requirements and identification of the risks
associated with the project is also done in the planning stage. The outcome of the technical
feasibility study is to define the various technical approaches that can be followed to
implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and document
the product requirements and get them approved from the customer or the market analysts.
This is done through an SRS (Software Requirement Specification) document which
consists of all the product requirements to be designed and developed during the project life
cycle.
Stage 3: Designing the Product Architecture
SRS(Software Requirement Specification) is the reference for product architects to
come out with the best architecture for the product to be developed. Based on the
requirements specified in SRS, usually more than one design approach for the product
architecture is proposed and documented in a DDS - Design Document Specification.
This DDS(Design Document Specification) is reviewed by all the important
stakeholders and based on various parameters as risk assessment, product robustness, design
modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along
with its communication and data flow representation with the external and third party
modules (if any). The internal design of all the modules of the proposed architecture should
be clearly defined with the minutest of the details in DDS.
Stage 4: Building or Developing the Product
In this stage of SDLC the actual development starts and the product is built. The
programming code is generated as per DDS during this stage. If the design is performed in a
detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and
programming tools like compilers, interpreters, debuggers, etc. are used to generate the code.
Different high level programming languages such as C, C++, Pascal, Java and PHP are used
for coding. The programming language is chosen with respect to the type of software being
developed.
60
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC models, the
testing activities are mostly involved in all the stages of SDLC. However, this stage refers to
the testing only stage of the product where product defects are reported, tracked, fixed and
retested, until the product reaches the quality standards defined in the SRS.
Stage 6: Deployment in the Market and Maintenance
Once the product is tested and ready to be deployed it is released formally in the
appropriate market. Sometimes product deployment happens in stages as per the business
strategy of that organization. The product may first be released in a limited segment and
tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the market, its
maintenance is done for the existing customer base.

Mobile Commerce:
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless handheld devices such as smartphones and tablets. As a form of e-
commerce, m-commerce enables users to access online shopping platforms without needing
to use a desktop computer. Examples of m-commerce include in-app purchasing, mobile
banking, virtual marketplace apps like the Amazon mobile app or a digital wallet such as
Apple Pay, Android Pay and Samsung Pay.

Over time, content delivery over wireless devices has become faster, more secure and
scalable. As of 2017 the use of m-commerce accounted for 34.5% of e-commerce sales.

The industries affected most by m-commerce include:

 Financial services, which includes mobile banking (when customers use their handheld
devices to access their accounts and pay their bills) as well as brokerage services, in
which stock quotes can be displayed and trading conducted from the same handheld
device.
 Telecommunications, in which service changes, bill payment and account reviews can all
be performed from the same handheld device.

 Service and retail, as consumers are given the ability to place and pay for orders on-the-
fly.

 Information services, which include the delivery of financial news, sports figures and
traffic updates to a single mobile device.

1.Types of m-commerce
61
M-commerce can be categorized by function as either mobile shopping, mobile
banking or mobile payments. Mobile shopping allows for a customer to purchase a product
from a mobile device, using an application such as Amazon, or over a web app. A
subcategory of mobile shopping is app commerce, which is a transaction that takes place over
a native app. Mobile banking includes any handheld technology that enables customers to
conduct fanatical transactions.

This is typically done through a secure, dedicated app provided by the banking
institution. Mobile payments enable users to buy products in-person using a mobile device.
Digital wallets, such as Apple Pay, allow a customer to buy a product without needing to
swipe a card or pay with physical cash.

2.Advantages and disadvantages of mobile commerce

The advantages of m-commerce include:

 Added customer retention by being more easily accessible.


 More convenience for customers in comparing prices, reading reviews and making
purchases without the need of a desktop computer.
 Wider variety of products and services.
 Automates a businesses’ point of customer contact and sales.

Disadvantages of m-commerce include:

 A poorly executed mobile experience can deter customers from making purchases.
 Mobile payment options are not available in every geographic location and may not
support every type of digital wallet.

Businesses must know and comply with tax laws and regulations of all countries they ship to
(some businesses will avoid this by only allowing purchases and shipping from their country
of origin).

Business on the Internet:


E-business (electronic business) is the conduct of business processes on the internet.
These e-business processes include buying and selling products, supplies and services;
servicing customers; processing payments; managing production control; collaborating
62
with business partners; sharing information; running automated employee services;
recruiting; and more.

E-business can comprise a range of functions and services, ranging from the
development of intranets and extranets to e-services, the provision of services and tasks over
the internet by application service providers. Today, as major corporations continuously
rethink their businesses in terms of the internet -- specifically, its availability, wide reach and
ever-changing capabilities -- they are conducting e-business to buy parts and supplies from
other companies, collaborate on sales promotions and conduct joint research.

As e-commerce has accelerated, stringent security protocols and tools, including


encryption and digital certificates, were adopted to protect against hackers, fraud and theft.
Nonetheless, security and data privacy remain big concerns for companies and individuals
conducting business on the internet. With the security built into browsers and with digital
certificates now available for individuals and companies from businesses such as Verisign, a
certificate issuer, some of the early concern about the security of business transaction on the
web has abated, and e-business, by whatever name, is accelerating.

1.E-business vs. e-commerce

E-commerce and e-business are similar, with e-commerce referring to buying and
selling products online. However, e-business defines a wider range of business processes by
including aspects such as supply chain management (SCM), electronic order processing and
customer relationship management (CRM) designed to help the company operate more
effectively and efficiently.

E-business processes can be handled in-house through a company's own network or


possibly outsourced to providers that specialize in these specific aspects of the transaction. In
contrast, the e-commerce definition is much clearer and basically describes any part of the
processes via which online orders are made and paid for. For example, a customer making an
online order but picking it up at the brick-and-mortar store is an example of an e-commerce
transaction.

63
UNIT V COMPLETED

64

You might also like