4. MBA Computer Application in Management
4. MBA Computer Application in Management
(MBA)
Table of Contents
Unit Title Page No.
Unit 1 Introduction of Computer 01-10
Unit 2 Computer Interface 11-20
Unit 3 Number system 21-28
Unit 4 Computer Memory 29-35
Unit 5 Computer Hardware 36-42
Unit 6 Programming Languages 43-51
Unit 7 Software 52-57
Unit 8 Operating System 58-63
Unit 9 Types of Operating Systems 64-72
Unit 10 Data Communication 73-82
Unit 11 Computer Network Topologies 83-94
Unit 12 Network Types 95-102
Unit 13 MS Word 2007 103-110
Unit 14 MS Excel 2007 111-120
References 121
Expert Committee
Prof. R.L. Raina
Former Vice Chancellor, JKLU
Professor of Communication, IIM Lucknow
Prof. Sunil Gupta
Dept. Of Computer & System Sciences
Jaipur National University, Jaipur
Course Coordinator
Ms. Shish Kumar Dubey
Assistant Professor
Department of Business & Management, JNU, Jaipur
Unit Preparation
Unit Writers Assisting & Proof Editor
Mr. Yatendra Verma Reading Ms. Heena Srimali
Department of Business & Dr. Anurag Solanki Department of Computer &
Management, JNU, Jaipur Department of Business & System Sciences, JNU,
(Unit 1-7) Management, JNU, Jaipur Jaipur
Secretarial Assistance
Mr. Nitin Parashar
Course Introduction
Course Outcomes
Acknowledgement
The content we have utilized is solely educational in nature. The copyright proprietors of the
materials reproduced in this book have been tracked down as much as possible. The editors
apologize for any violation that may have happened, and they will be happy to rectify any
such material in later versions of this book.
Unit: 1
Introduction of Computer
Learning Objectives:
Structure:
1.0 Introduction
1.1 What is a Computer?
1.2 Computer Organisation
1.3 Characteristics
1.4 Evolution
1.5 Computer Generations
1.6 Classification
1.7 Classification of Computers Based on Size
1.8 Output/Summary
1.9 Important Terms/Keywords
1.10 Questions -Self-Assessment
1.11 Case Study
1
1. Introduction to Computers
The word "computer" is derived from the verb "to compute," which implies to perform
calculations. Computers have a huge, obvious impact on all aspects of our daily lives. In this
module, you will learn how computers operate, how they evolved, and different
classifications.
1.1 Computer?
A computer is an electrical machine that can receive in sequence or data and carry out a
number of tasks in line with an established set of tasks. Data or information is produced as a
result of this. A computer is a device that can act on data and solve issues. It accepts the
input, goes through various mathematical and logical processes to process it, and then
produces the desired result.
Thus, a computer can be defined as a device of electronic equipment that converts data into
information. The capabilities of a computer can also be used to characterise it. High speed,
precision, diligence, adaptability, and storage are key attributes of a computer.
2
A computer system's central processing unit (CPU) refers to both the ALU and the CU.
3
Difference Engine automatic mechanical digital computer that went into production in 1833.
He earned the title of "father of the modern computer" as well.
The development of punch cards, an automatic calculating employed for the first time by
Herman Hollerith and James
4
1.5.2 “The Second Generation: 1959-1964 (Transistors)”
The second generation of computers was powered by transistors, which replaced vacuum
tubes. Vacuum tubes were surpassed by transistors. This made these computers smaller and
cheaper. They were more dependable than their first-generation forebears. In place of the
opaque binary machine language, Symbolic, or assembly, languages were introduced in
second-generation computers. It helped programmers to define commands in words. COBOL
and FORTRAN (High-level programming languages), were also introduced.
Magnetic core technology was used instead of a magnetic drum for storing instructions.
Few Examples are: IBM 7094, Honeywell
Important Features:
Use of transistors
Reliable
Small Size
Generate less heat
Consumption of Less Electricity
Fast.
Features:
Use if Integrated Circuits
Reliability
Compact Size
Less heat was generated
Fast
Low maintenance required
Less electricity was consumed
5
high level languages were supported
Few Examples are: IBM 4341, DEC 10, STAR 1000, PUP 11
Features:
VLSI technology used
Very Affordable
Portable and reliable
Very small size
Introduction of ―Internet‖.
This generation uses all higher-level languages like C and C++, Java,.Net, etc.
Few Examples are: Desktop, Laptop, NoteBook, UltraBook, Chromebook
Features:
True Artificial Intelligence
ULSI technology
6
Parallel Processing
Natural language processing
Superconductor technology
User-friendly interfaces and multimedia features
7
Scientific applications and industrial process control require the use of hybrid computers. In
either of the case, a user can use the machine's capacity for processing discrete and
continuous data.
1.7.1 Supercomputers
A supercomputer has multiple processing units that work in parallel to increase speed. They
are employed for more complex applications since they are, in fact, extremely large
computers. Among major super computers in India, one of them was used by the
meteorological service for weather forecasting.
8
Minicomputers can accommodate several users thanks to their operating systems'
multitasking and network features. The primary applications for these systems are in local
government and education, as well as front-end processors for main-frame computers.
Additionally, word processing uses it. They are used in business for things like billing,
inventory management, payroll, sales analysis, etc.
1.8 Summary
A computer is a device that can act on data and solve issues.
CPU refers to ALU and CU.
Fourth generation of computers used integrated circuits.
The goal of fifth-generation computing was to develop systems that could learn, self-
organize, and respond to natural language inputs.
Analogue computers are extensively employed in manufacturing facilities where
temperatures, pressure, or liquid flow must be continuously monitored
For scientific applications or for industrial process control Hybrid computers are used.
A supercomputer has multiple processing units that work in parallel to increase speed.
Minicomputers can accommodate several users thanks to their operating systems'
multitasking and network features.
1.9Keywords
Iteration: the repetition of a process
9
Forerunner: a person or thing that precedes the coming or development
Reliability: performing consistently well
Handheld devices: They are the portable devices.
quantum: a required or allowed amount
magnitude; a numerical quantity or value
Questions
Discuss how the school would have implemented the new ICT curriculum.
Do you think it would be easy for junior and senior learners to adapt to the new
curriculum?
10
Unit: 2
Computer Interface
Learning Objectives:
Structure:
2. 0 Introduction
2. 1 Function of Computer Interface
2.2 Data Processing
2.3 Block Diagram
2.4 Computer System Architecture
2.5 Input Devices
2.6 Output Devices
2.7 Summary
2.8 Key words
2.9 Self Assessment Questions
11
2. Introduction
The art of linking computers and devices is known as computer interfacing. Even though the
PC has many plug-and-play internal hardware options, connecting various external devices
requires technical expertise. The interface is the link and interaction between the user, the
software, and the hardware. It needs to be created, tested and then redesigned.
Hardware Interfaces: They are the cables, sockets, plugs, and electrical impulses. Examples
include ATA/IDE, Ethernet, FireWire,
Software/Programming Interfaces: They are the languages, codes, and messages that are
used to communicate. Examples include the Windows, Mac, and Linux operating systems,
2.2.1 Data
Data is any unprocessed information such as facts, figures, and text. It comprises:
12
● Information about operations or transactions. For example sales, costs, inventories,
payroll, and accounting.
● Information including industry sales, forecasts, and macroeconomic information.
● Metadata is information about the data, such as definitions from a data dictionary or a
logical database design.
2.2.2 Information
These data's patterns, interactions, and affiliations may have information. For instance,
analysing transaction data from retail point-of-sale systems might reveal when products are
selling.
2.3.1 Input
Intake of data by a computer is the focus of the input stage of computing. This is
accomplished using input devices. The keyboard and mouse are the two most often utilised
input methods.
2.3.2 Processing
The application includes instructions on how to handle the input. The computer uses the
recently input data to execute these instructions during processing. The output quality that the
computer generates after this phase depends on the program's instructions.
2.3.3 Output
It is the processed data in the form of information. This information is valuable to the user. It
is done using output devices.
13
devices (Keyboard, mouse etc) and transforms it into relevant information. After this the
output data is transferred to printers and monitors.
The central processing unit (CPU) is a silicon chip microprocessor made up of micro
electrical switches known as "transistors." Megahertz (MHz) or Gigahertz (GHz) are units
used to express how quickly a processor performs its tasks. The processing speed of the
computer increases with the MHz value. Today's typical CPU operates at 3 GHz or more.
2.5.1 Keyboard
It is the most popular input device for entering data and commands into computers. It is
organised into four primary regions, each with a set of alphabetic, numeric, and function
keys:
Function keys are on the top, letter keys are in the middle portion. There is a numeric keypad
to the right. Keys for editing and cursor movement are also there.
A QWERTY keyboard is the configuration of the keys on a keyboard. It is used in many
nations. QWERTY is in the first six keys on the top row of the alphabetic characters. Other
keyboards include incorporated wrist support, while others offer additional Internet keys.
Hundreds of times every second, the computer's processor checks the keyboard to determine
whether any keys have been pressed.
Advantages:
● Is commonly attached to computers.
● It is the means for text and number data input.
● Data can be entered quickly by a proficient typist.
● There are specialty keyboards available.
Disadvantages:
● Mistakes might happen while entering data
● It may be quite time-consuming process
● Entering data, such as the specifics of diagrams and images, is particularly
challenging
14
2.5.2 Mouse
The most common pointing device you will encounter is a mouse. You can slide it about the
desk to adjust the on-screen cursor's position and movement.
The mouse's buttons allow you to click and drag items about the screen and choose options
from menus. 'Mouse click' is the sound made when a mouse button is pressed. The terms
"double click," "click and drag," and "drag and drop" may be familiar to you.
Most mice move in the direction using a little ball that is situated underneath them. Two
rollers inside the mouse rotate. One is for recording in an east-west direction. The computer
moves the pointer based on information the mouse gives to it about how far and in which
direction the ball is turning.
Advantages:
● They work well with desktop computers
● Most computer users are accustomed to using them.
Disadvantages:
● They require a flat surface area next to function
● It is difficult to operate the mouse with a laptop, notebook, or palmtop. Touch
sensitive pad is required.
2.5.3 Trackball
The pointer on the screen is moved when you turn the ball with your hand. It operates with
extremely minimum room requirements and frequently works in conjunction with computer-
aided design. It features buttons like a regular mouse. Instead of a traditional mouse, you will
frequently find a little trackball incorporated into laptop computers.
Advantages:
● It is helpful with laptops as they can be integrated into the keyboard.
● It is useful where flat space next to the computer is restricted.
Disadvantage:
Not included as standard, thus they cost extra
15
2.5.4 Joystick
It is similar to tracker ball, with the exception that you move the stick rather than a rolling
ball. Computer games require joysticks to be played. An ordinary joystick has eight
directions in which it can be moved.
The computer uses the information provided by the joystick, which indicates the direction in
which it is being moved, to, for instance, drive a racing vehicle on the screen. Several buttons
on a joystick may also be used to initiate activities like firing a missile.
Advantage:
When you shift the stick, a direction change is immediately felt.
Disadvantages:
● It can break easily.
● Some people may find it challenging to use
Since they are user-friendly and convenient, touch screens are frequently used as input
devices in public locations including airports, museums, ATMs, etc.
Advantages:
● Easy to use
● No further peripherals are required beyond the touch screen display itself
● Neither computer system proficiency nor expertise required to use it.
Disadvantages:
● It is quite expensive
● Entering large data is not possible
● Does not work with accuracy
● Touch displays are not reliable
16
2.5.6 Digital Camera
A digital camera resembles a traditional camera. It makes use of several light sensors. When
a photograph is taken, sensors that are at the behind of lens convert the colors that make up
the image into digital signals (binary).
Digital cameras allow to view the image instantly and you can erase it if you don't like it..
The image can be uploaded to a computer and can be edited by using photo editing software.
The resolution of each image determines how much memory it uses. The number of dots that
make the image determines the resolution. More the dots sharper the image is.
Advantages:
● Photographs can be printed, distributed via email, or uploaded to websites.
● Unwanted photographs can be immediately erased.
● Editing or enhancing images is possible
Disadvantages
● They are typically more expensive than conventional cameras
● Photographs take up too much memory space
2.5.7 Scanner
A scanner captures still images and text that can be used on a computer. During scanning
beam of light shines onto the surface of the object. The reflected light builds up the image.
Commonly used scanners are Flatbed and Handheld
Most popular one is flatbed. It is similar to a Xerox machine. Flatbed scanners are more
accurate.
Handheld scanners are rolled across the image which is to be scanned.
Advantages:
● Flat-bed scanners are more accurate as compared to a digital camera
● Image in Computer Format
Disadvantages:
● Scanned images consume memory space.
● Quality of image largely depends upon the original image..
17
2.5.8 Graphics Tablets
They are used by designers and illustrators. A graphics tablet has a flat pad (the tablet) on
which a drawing can be made by using a special pen. Image is created on the screen when
you draw. It produces accurate screen design. It is accurate to within hundredths of an inch.
Device called puck is used to draw on the graphics tablet.
Advantage:
It is the most efficient tool for accuracy.
Disadvantage:
Clicking on the tools is sometimes difficult.
2.6.1 Monitor
Very first window that we see just after loading operating system is called as monitor.It
displays the output on the screen.
Measures of a monitor are 17 inches, 19 inch, 20 inch and 21 inches. Output quality depends
upon the resolution, contras, viewing angle and how fast it refreshes the screen.
The picture on a monitor is made up of pixels. The quality of the picture on a monitor
depends on pixels. Denser pixels give the clarity to the screen image.
Matrix of dots of Red, Green and Blue (RGB) displays millions of colors.
Advantages of monitors
● Affordable
● More Reliable
18
● Display in a wide range of colours
Disadvantages of monitors:
● Results disappear when the computer is switched off
● Limited information can be displayed at once.
● Fragile glass screens
2.6.2 Printers
Printers produce outputs on papers. Output can be in the form of a text or image on paper.
Colour Printers gives the colored outputs. Special paper can be used for generating
photographs also.
There are three main types of printers. Classification is based on purchase costs, running
costs, quality and speed.
Laser
Dot Matrix
Inkjet
2.6.3 Plotter
A plotter is a type of output device used to produce high-quality, large-scale graphics such as
architectural blueprints, engineering designs, maps, and other technical drawings.
Advantage:
Larger paper sizes than those found on most printers can be used.
Disadvantages:
● Plotters are slower than printers.
● Cost is more as compared to printers.
2.7 Summary
❖ CPU takes the input from the devices (Keyboard, mouse etc) and transforms it into
relevant information
❖ Data must be converted into machine-readable form and to be entered into the
computer by a input devices
19
❖ Very first window that we see just after loading operating system is called as monitor
❖ Printers produce outputs on papers. Output can be in the form of a text or image on
paper.
20
Unit: 3
Number System
Learning Objectives:
Structure:
21
3.1 Introduction to Number System
Decimal number takes up ten values i.e. from 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. On the other hand
binary number takes only two values i.e. zeros and ones.
22
It has values from 0-9. After this A = 10, B = 11, C = 12, D = 13, E = 14, F = 15.
It has base 16
Example 16 X where X represents the last position - 1.
=1x4+0x2+1x1.1x (1/2)+0x(1/4)+1x(1/8)
=4+0+1.(1/2)+0+(1/8)
= 5+0.5+0.125
= 5.625
Therefore (101.101)2= (5.625)10
23
Example :
Add (1010)2 and (0011)2
1010 (Augends)
0011 (Addend)
____ ____ _____ ____ __
1101 (sum)
____ ____ ____ ___ ____
Step-1: The least significant bits are added, i.e. 0+1=1 with a carry of 0
Step-2: The carry in the previous is added to the next higher significant bits, i.e.
0+1+1=0 with a carry 1.
Step-3: The carry in the previous is added to the next higher significant bits, i.e.
1+0+0=1 with a carry 0.
Step-4: The preceding carry is added to the most significant bit i.e. 0+1+0 = 1 with a
carry 0 .
Thus the sum is 1101.
24
Example:
Subtract (0101)2 from (1011)2
1011 (Minuend)
0101 (Subtrahend)
___ ___ ___ ___ __ ___
0110 (Difference)
___ ___ ___ ___ __ ___
Steps:
Step-1: The LSB in the first column are 1 and 1. Thus, the difference is 1 - 1 = 0
Step-2: The column, the subtraction is performed as 1-0=1
Step-3: In the third column, the difference is given by 0-1=1
Step- 4: In the fourth column (MSB), the difference is given by 0-0 = 0 since 1 is
borrowed for the third column.
25
3.8 Binary Division
The following is the Binary Division table
A÷B PRODUCT
0÷0 Undefined
0÷1 0
1÷0 Undefined
1÷1 1
Example:
Dividend ÷ Divisor
11011.1 ÷ 101
101.1 (QUOTIENT)
DIVISOR 101 11011.1 (DIVIDEND)
101
______________
111
101
_______________
101
101
_____________
0
_____________
The first bit describes the non-zero part of the number which is known as the ‗Mantissa‘, the
second part describes how many positions the decimal point needs to be shifted. This is
26
known as the ‗Exponent‘. It can be positive when shifting the decimal point to the right and
negative when shifting to the left.
6.63 x 10-34
Mantissa Exponent
If it is needed to write out that number in full, one will have to shift the decimal point in the
exponent 34 places to the left, resulting in:
0.000000000000000000000000000000000663
This would need a significant amount of time to write and make it difficult for the naked eye
to count the zeros. Planck's constant, for example, is a multi-digit quantity that can be stored
in a small number of digits when we are willing to accept a particular level of accuracy (6.63
= 3 significant figures). You are constantly balancing the accuracy (number of significant
bits) of the number with its scope (or range).
3.10 Summary
Binary System is very important technique. Computer can only understand language of 0 & 1
to respond to a command
3.11 Keywords
Integers
Floating Point representation of numbers
Mantissa
27
1. What is the correct answer for the same?
Answer- 1
28
Unit: 4
Computer Memory
Learning Objectives:
Structure:
4.0 Introduction
4.1 What is Computer Memory?
4.2 Why is computer memory so important?
4.3 What is a memory cell?
4.4 Storage
4.5 Quantity Information
4.6 Types of Computer Memory
4.7 Output
4.8 Important Terms
4.9 Questions for Self-Assessment
29
4.0 Introduction
The maintenance of a computer's performance requires a variety of factors. Computers need
memory to store data that the central processor unit uses to process and execute instructions
in order to operate effectively. This chapter will explain to us what computer memory is, why
it's crucial, and the various kinds of computer memory.
You need a way to store the data if you want to keep all your work on your computer. Many
storage systems can take care of this for you. Hard disks, floppy disks, CD-ROMs, and DVDs
are a few of the more popular types you have encountered.
When looking into SSDs or memory, you've encountered a memory cell. You may have also
come across acronyms like SLC, MLC, or TLC. These words describe various memory cell
types that are utilized by flash storage. Any time you purchase a USB flash drive, SD card, or
SSD, you will discover these variations in your available alternatives.
30
4.3.1 Where are memory cells found?
Memory cells of any kind, whether RAM or ROM, can be found in almost every part of the
computer.
Many little segments make up the memory. For instance, a memory unit holds 64 × 1024 =
65536 memory locations if the machine has 64k words. These places have addresses ranging
from 0 to 65535.
There are mainly two types of memory.
Internal Memory: Primary and cache memory
External memory: Examples include Magnetic disks, optical disks, etc.
4.4 Storage
Bytes measure a computer's storage capacity. The smallest data unit that can be stored is a
byte consisting of 8 bits (also known as binary digits).
Binary numbers, such as 1 or 0, represent bits.
A keyboard letter, number, or symbol equals one byte (a binary term).
More storage is required to keep the work safe.
Typically, Kilobytes (kB), Megabytes (MB), and Gigabytes (GB) are used to describe a
computer's storage capacity (or, on really big systems, Terabytes!).
31
4.6 Types of Memory
4.6.1 Internal
Where smaller bits of information are stored is called as internal memory. It is considered as
primary memory. Chips comprise internal memory. RAM and ROM are the two primary
types into which internal memory is separated.
32
4.6.3 Read-Only Memory (ROM)
Another type of primary internal memory is read-only memory (ROM), although unlike
RAM, ROM is non-volatile and retains data over time. 'Non-volatile memory' is another
name for this kind of memory.
A ROM chip is placed on the motherboard of a computer. The BIOS is another name for this
program.
A ROM is an ideal option whenever any data needs to be permanently stored. For example
many automotive computers will have ROM chips that are used to run the relevant engine.
The various ROM kinds are as follows.
33
Sequential access memory allows for uncontrolled access by "seeking" the desired position.
However, this process could be more efficient.
4.7 Summary
The computing industry uses a variety of memory cell types.
Non-volatile cells retain the value they were given whilst in use even after you turn
them off.
A cell in dynamic RAM memory has a transistor and a capacitor.
A cell in static RAM memory contains roughly five transistors
Memory cells of any kind, whether they are RAM or storage, can be found in almost
every part of the computer.
Bytes are used to measure a computer's storage capacity.
Binary numbers, such as 1 or 0, are used to represent bits.
Terabyte (TB) Equal to 1,099,000,000,000 bytes.
CD ROM disks have a capacity of 650 MB.
PROM is read-only memory that a user can only modify once.
Electrical currents are used for programming and erasing the EEPROM.
Random Access Memory, as opposed to ROM, is volatile memory.
RAM is of two types: Static RAM and Dynamic RAM
DRAM, is to be refreshed to keep the data.
Serial Access Memory is frequently employed as supplementary storage in general-
purpose computers
4.8 Keywords
Non-volatile memory
34
Volatile memory
Byte
Mounting
Supplementary Storage
35
Unit: 5
Computer Hardware
Learning Objectives:
Structure:
5.0 Introduction
5.1 Internal Computer Hardware Components
5.2 Physical Devices Used to Construct Memories
5.3 External Memory
5.4 Output/Summary
5.5 Important Terma/Keywords
5.6 Questions for Self-Assessment
36
5.0 Introduction
Any sort of tangible component of a digital or analogue computer will be called as ―computer
hardware‖ altogether. The term ―hardware‖ is tangible and term ―Software‖ in non tangible.
Software tells hardware what task is to be completed. A machine cannot work if there is no
coordination between hardware and software.
Semiconductors, transistors, power sources, and USB ports are also the Internal hardware‘s.
37
5.2 Physical Devices Used to Construct Memories
The amount of RAM installed in your computer is known as physical memory. The operating
system, as well as particular apps and files, are loaded onto your computer using this RAM.
What are physical devices? They are any computing device that deals with input/output,
storage, etc., such as a disk, printer, modem, or screen.
What is the physical memory of a computer? Physical memory is simply the computer's
physical RAM, typically installed on motherboards as cards (DIMMs). It is the only storage
type that the CPU can way in directly and is often referred to as primary memory. It contains
the executable program instructions.
High physical memory utilization is due to a flaw in a process that would typically be much
less resource-intensive or by running too many resource-intensive apps. Numerous factors
might contribute to slow processing, some of which will be more challenging to address than
others.
38
Floppy Disk
Floppy disks, which have been around since about 1980, are among the earliest types of
mobile storage devices still considered for usage.
You can create backup copies of your work to guard against losing it using the floppy disk
drive to fetch micro files between different systems. The material used to create floppy disks
is known as Mylar. They have a magnetic surface that enables data to be recorded. While the
first (3 1/2 inch) floppy disks were actually "floppy," the ones we use today are covered in
hard plastic. The read/write head may access the disk because the disk rotates in the drive.
The maximum capacity of Floppy Disk is 1.44 Mb which equalizes to text of approximately
300 pages on an A4 size page. However, as graphic images are frequently quite huge, floppy
disk are not suggested mediums to work on those files.
Prior to writing data to the disk, all disks must be formatted. The disk is divided into sectors
during formatting so that data files can be put there. Pre-formatted floppy disks are frequently
marketed.
Floppy Disks should be handled carefully to safeguard the data. You should avoid touching
the disk's surface and keep it away from hot or cold places and strong magnetic fields like
those that may be present next to speakers, as doing so could cause all of your data to be lost.
Zip Drive
The Zip drive resembles a floppy disk but has a storage capacity of 100 MB to 250 MB,
which is approximately 70 times greater than a floppy.
The Zip disk requires a separate drive and is marginally thicker than a floppy disk. Zip disks
are very helpful for recovering crucial data and for quickly transferring data between
computers. Data is compressed to make big files to fit on a floppy disk smaller.
Magnetic Tape
Magnetic tapes are considered as the most popular media for bulk data holding, back-up,
archiving, and exchange. Hard disk and tape have historically had a far higher capacity-to-
price ratio than hard disk, but the two have moved closer together recently. Numerous
formats exist, many exclusive to specific platforms or industries, such as mainframes or a
specific type of personal computer.
Though entrance time on tape is slow, the rate of continuous exploration of data is quick as
the tape is a sequential access medium.
39
Examples of organizations using this medium:-
Space Borne Photography companies have a pile-up of many photographs.
Film studios that store their digital films in archives
Companies that specialize in architecture, automobiles, and design and hold
hundreds of CAD drawings.
Scientific institutions like CERN keep the outcomes of previous experiments.
Weather service providers.
There are two types of magnetic tape:
Tape reels: It can store huge data and used for backup data from mainframe
systems.
Cassettes or cartridges: It is small but stores enough data to back up the
information stored on a personal computer or network.
Compact Disc
Compact discs hold the data that can be recovered or used at a later time. Software for your
computer can be found on CDs. Storing music to play in a CD player and files to access on
system.
A typical CD can store 650 MB of data or 72 minutes of music. Data on an 80-minute CD
can be stored in 700 MB.
Compact Discs can be categorized on:
End-use: Video, Audio, Photo, Graphics
Operations: Read-Only, Recordable, Rewritable
Optical Drive
External memory known as an optical drive may store and read data using light. CDs, DVDs,
and Blu-ray discs are the three most popular varieties. You insert the disc into the optical
drive and the computer spins it so you can access the information on the disc.
It is scanned by an internal laser beam, which also downloads the data from the optical disk
into the computer after receiving it. This sort of memory can be helpful because it often costs
little, is simple to use, and holds a lot of data.
40
Magnetic Data Storage
Data is encoded as an electric current in magnetic storage devices, which have a covering of
magnetic material. Small portions of a metal spinning disk are magnetized in this sort of
memory using magnetic fields.
Each segment, which denotes a "1" or a "0," is quite large, frequently containing many
terabytes of data. Users favor this sort of memory because it is inexpensive, robust, and
capable of holding a large amount of data. Floppy disks, hard drives, and magnetic tape are
examples of common magnetic storage media.
Virtual Storage
Virtual memory transfers data to a paging file, a section of a hard drive that serves as an
extension of RAM, when RAM space is running low. This is a transient process that ends
once there is enough RAM space available.
5.4 Summary
Storage capacity is determined in bytes.
Kilobytes (KB), Megabytes (MB), and Gigabytes (GB) are common numbers used to
describe a computer's storage capacity
The Zip drive resembles a floppy drive but has a storage capacity of 100 MB, which is
at least 70 times greater than a floppy
Hardware for has internal and exterior parts. The whirring sound a hard drive
generates is caused by the hundreds of times per minute that it spins inside its metal
shell.
You may quickly back up the work on DVDs for security.
41
5.5 Keywords
Back-up
Storage
Hardware
42
Unit: 6
Programming Languages
Learning Objectives:
Computer languages
Classification of programming languages –machine, assembly, and high-level
languages
Common programming language tools
Concepts of flowcharts and Decision Table
Features of an Ideal Programming Language.
Structure:
6.0 Introduction
6.1 Features Of Programming Languages
6.2 Computer language Hierarchy
6.3 Programming Languages characteristics
6.4 Benefits of Programming language
6.5 The Need for Assembly Language
6.6 Advantages of Using Assembly Language
6.7 Languages of the High Level and Low Level
6.8 Language Processors: Assembler, Compiler and Interpreter
6.9 Algorithm
6.10 Flow Chart
6.11 Decision Table
6.12 Summary
6.13 Keywords
6.14 Self-Assessment Questions
43
6.0 Introduction
To do any task with the data supplied by the user, a computer needs instructions. A program
is a combination of commands that are supplied to a device to carry out particular activities.
The actions that are outlined by the software should be carried out by the computer. A
program controls how a computer interprets and utilizes data.
set of instructions that carry out certain activities on a computer system is known as a
program. Software instructs a machine to carry out a certain processing function or set of
procedures. A combination of coding commands used to guide the device to perform
sequence of calculations or operations is referred to as a program. The keyboard, a magnetic
disk, or any other device can be used to enter these commands into the computer.
44
6.2 Computer language Hierarchy
Assembly Language
Machine Language
Computer Hardware
Figure 1: Hierarchy of Computer Languages
Few of the popular programming languages are mentioned below:
C and C++
Python, Java, SCALA
R, Ruby, Go, Swift, JavaScript
45
6.4 Benefits of Programming language
Enhanced Productivity: Programming languages provides developers a combination
of inputs that enable them to write code more rapidly and effectively.
Portability/Flexibility: High-level programming languages are portable, meaning they
may be used to create programs that run across a wide range of platforms and
operating systems.
Readability: Effective programming languages can help both the original author and
other developers understand and read code more easily.
Large Communities: There are sizable user and developer communities for many
programming languages, which can offer assistance, libraries, and tools.
46
The mnemonic ADD is used, for example, to add two numbers. These mnemonics facilitate
the symbolic representation of machine language instructions, with each machine instruction
being represented by a single equivalent symbolic instruction. This is referred to as an
assembly language.
47
Figure 2: Table Illustrating the Difference Between High-level and Low-level Languages
6.8.1 Compiler
A compiler is a language processor. It can read an entire high-level program written in
source code and translate it into an equivalent machine code program in one sitting. For
instance, C, C++, Java, and C#.
If there are no errors in the source code, a compiler can properly translate it into object code.
48
6.8.2 Assembler
The Assembler converts the Assembly language program into machine code. The source code
is a set of assembly language instructions that is fed into an assembler. Assembler is required
for humans and machines to connect with one another. The assembler can turn mnemonics
(instructions) such as ADD, MUL, MUX, SUB, DIV, MOV etc into binary code.
6.8.3 Interpreter
It is a language processor which moves on to the next line after translating a single statement.
If there is a problem in the statement the translator stops translating and creates an error
message. After fixing the error the interpreter moves on to the next line. An interpreter reads
the instructions line by line,
For instance, Python, Perl and Matlab.
6.9 Algorithm
Algorithms are used to describe a program's logic. It provides a step-by-step breakdown to
solve a problem. It is the set of instructions which is carried out in the right order to produce
the desired results.
An instruction set has following qualities:
Every instruction needs to be clear and concise.
Every instruction should be carried out in a set amount of time.
A command or a series of commands shouldn't be repeated endlessly.
The intended outcomes are attained when the instructions have been followed.
The verbose and confusing nature of natural language statements makes them unsuitable for
complex or specialized algorithms.
Pseudocode and flowcharts are structured approaches to express algorithms that, while
remaining independent of a specific implementation language, avoid numerous ambiguities
present in regular language assertions.
Algorithm definition or documentation is frequently done using programming languages,
which are primarily designed for expressing algorithms in a computer-executable form.
49
program planning tool. To indicate different types of instructions, it uses boxes with various
shapes. Within these boxes, the real instructions are given in simple, direct language.
Terminal Symbol: denotes the start, stop, and halt points in the logic flow of a program. It is
a flowchart's first and last symbol.
Input/Output Symbol: they represent all input/output functions in a program.
Processing Symbols: represent instructions for computation and data transport. This symbol
also designates the logical operations that transfer data from one area of the main memory to
another (assignment statement).
Decision Symbol: denotes a decision point, or a place where a line can split off and go in one
of two or more different directions.
Arrowheads: The exact order in which the instructions are carried out is shown by flow lines
with arrowheads, which also show the flow of operation. A flowchart typically moves from
left to right and from top to bottom. Only when the standard flow is not followed do
arrowheads become necessary.
Connectors: whenever a flowchart is too complicated connectors are used in place of flow
lines or when the flowchart occupies more than one page.
6.12 Summary
A computer program is a set of instructions to carry out certain activities on a
computer system.
Few of the popular programming languages are Ruby, JavaScript, C++, Python, and
Java.
Programming languages have their own advantages and disadvantages.
50
High-level programming languages have a tendency to run programs more slowly
than lower-level languages.
Some programming languages could lack native support for specific job types or
might need additional libraries to carry out specific tasks.
Programs written in assembly language have at least 30% more data as compared to
high-level language
Programming languages are either high-level languages or low-level languages.
Programs created in high-level languages are converted into machine code that a
computer can understand via compilers and interpreters
Algorithms describe a program's logic.
Pseudocode and flowcharts are structured approaches to express algorithms.
6.13 Keywords
Complexity
Diversity
Computer-understandable
Mnemonics
Perplexing
51
Unit: 7
Software
Learning Objectives:
Structure:
7.0 Introduction
7.1 Types of Software
7.2 System Software
7.3 Programming Software
7.4 Application Software
7.5 Difference between System Software and Application Software
7.6 Output/Summary
7.7 Important Terms/Keywords
7.8 Questions on Self-Assessment
52
7.0 Introduction
A computer system‘s two main parts are software and the other is hardware. Software is a
collective term for a group of computer programs. It instructs a computer what to do. It tells
hardware what to do.
Let‘s begin by understanding the difference between a program and software.
Program Vs Software
SOFTWARE PROGRAM
Software is an assemblage of scripts, instructions, and procedures that tell computers what to
do. System software and application software make up the majority of it.
System software keeps the system updated and directs a running path for application
software. It is important to understand that system cannot function without system software.
It is multifunctional software.
53
7.2 System Software
System software is the interface between system and application softwares. They are
developed by using low-level programming languages. They provide running path for
application software.
Example: The Basic Input/Output System (BIOS). It regulates the exchange of data among
the operating system and other connected devices. The software also includes tools like the
disk defragmenter and system restore.
Operating System: It acts as an interpreter between software and hardware. For example
when print command is given Operating System takes the instruction to printer for printing
the document.
Device Driver: It is a system that works with a device to complete specific tasks. Before you
can execute the software, a driver must be installed.
54
7.3 Programming Software
It consists of the programs and apps that software engineers use as tools to build, test,
support, and maintain other programs and applications. The components of programming
software are a compiler, a debugger, an interpreter, a linker, and a text editor.
Components of a Programming Software
Compiler- Converts High-Level language program into Low- Level language program.
Assembler- Converts an Assembly Language program into Low-Level language programs.
Interpreter- Processes high-level language line by line and simultaneously produces low-
level programs.
Linker- Most low-level languages enable programmers to create big programs with
many modules. All of the modules produced by the language translator have
their object code organized by the linker into a single program.
Debugger- Software used to find programming faults and errors. It identifies the location
of computer code faults.
Text editor- Enables computer users to work with texts.
55
7.4.2 Features of Application Software
Application software are written in High-level languages
More storage space is needed for application software than for system software.
Each application software program completes a specific task.
In comparison to system software, application software is simpler to develop.
7.6 Summary
Software is the set of instructions required to complete a certain task. It is the result of
several programs combined.
A program is a collection of lines of computer code that processes input and executes
instructions to produce output.
System Software is the interface between application software and the hardwares.
56
System software uses a language processor to translate human-readable language into
machine readable language.
The components of programming software are a compiler, a debugger, an interpreter,
a linker, and a text editor.
7.7 Keywords
Disk defragmenter
Memory Management
Processor Management
File Management
Error Detection
57
Unit: 8
Operating System
Learning Objectives:
Understanding the concept of an OS
Learning about the Objectives of the OS
Knowledge of the various views of Operating System
Structure:
58
8.0 Introduction
An operating system is a bridge that is between computer hardware, software and users. An
OS is software responsible for managing all the functions, including handling of input and
output, controlling memory and processes, monitor extensions like disc drives and printers.
Definition: An OS manage the execution of all types of functions.
59
8.1.2 Providing an Interface
The operating system arranges programs to make it simple for users to access, utilise, and
save them.
It gives apps a consistent and reliable mechanism to interact with the hardware without
requiring the user to know specific device information.
The application shows the relevant error message when a program isn't working correctly.
Five main parts of computers are:
Operating System
Utilities
Application Programs
Computer Hardware
End User
An operating system is considered as the first program encoded with the computer, which
stays in the memory forever. It regulates and programs different users.
60
platform for various programs to carry out specific tasks.
You can view the operating system from the perspective of the user or the system.
61
8.2.2 System view
The OS functions are given below:
Interface between software and hardware.
It controls the hardware
Following are some explanations of the various operating system view types:
An operating system as a resource allocator. Processes require many resources to
function, including as CPU time, memory, file storage, I/O devices, and more. The
operating system distribute resources efficiently among processes to increase system
performance.
A control program is included into the operating system. It looks for every process
and I/O device to guarantee that the computer system runs efficiently. It ensuresthat
the I/O devices work properly without generating problems.Operating systems
simplifying the use of hardware.
In order to quickly resolve user issues, computers were necessary. However, working
directly with computer hardware is not simple. Thus, operating systems were created
to interact with hardware simply.
An operating system can also be thought of as the kernel, a program that runs
continuously in the background of a computer system and manages all application
programs. The definition of an operating system that is typically used is as follows.
An operating system has hardware and software resources which include CPU, memory
space, file storage space, time and I/O devices that may be necessary to address an issue. As a
result of this, the operating system manages these resources.
Essential duties of an operating system are:
Security: It uses passwords and similar methods to check unauthorized entry.
Monitoring: Ensures that the system responds after receiving a request.
Tracking: It keeps track of the time and resources of various jobs and users.
Error-detecting: It employs debugging tools and monitors the creation of
dumps, traces, and error messages.
Coordination: It coordinates between users and other software. It distributes
compilers, interpreters, assemblers, and other software to the system users.
62
8.3 Keywords
Conducive
Embedded computer
Resource allocator
Kernel
63
Unit: 9
Learning Objectives:
Structure:
9.0 Introduction
9.1 Types of Operating Systems
9.2 Operating System Management Tasks
9.3 Memory Management
9.4 Output/Summary
9.5 Important Terms/Keywords
9.6 Self-Assessment Questions
9.7 Case Study
64
9.0 Introduction
The operating system manages all fundamental functions, like controlling files, processing,
and memory management, which means that the operating system, or resource manager, is
responsible for managing all resources. The operating system acts as an interface between the
user hardware and software. Following are the different operating systems, which are listed
below.
The following points find out the issues with batch operating systems:
User and the task don't interact more.
Mechanical input / output devices operate at a slower speed and the CPU is in idle state.
Desired priority is difficult to be provided.
Operating systems which are considered as Time-sharing
Disadvantages
Reliability issue
65
Integrity and security of data compromised
Data communication issue
2. Soft Real Time Systems: in the systems where using soft real-time are low
constrained. In this priority is given to an important task and is maintained until it is
finished.
66
as a system task. For example generation of output from a printer. The process to
finish the work requires a large amount of resources, including CPU time, input,
output devices, memory files, etc. These resources are provided to the process during
its formation or while it is running. These process management tasks are managed by
the operating system.
Creating and eliminating system and user processes
Stopping & starting processes
Providing a way of synchronizing processes
Providing a process mechanism
67
9.2.4 Storage Management
The Basic function of computers is to run programs from the main memory. To protect
primary memory, the computer system must offer auxiliary storage. The following disc
management tasks fall under the purview of the operating system.
Unrestricted space usage
Storage management
Disc Planning
9.2.6 Multitasking
When the CPU switches between several tasks at once, this is known as multitasking. The
frequency of switches allows users to interact with each running program.
The OS performs and manages multitasking in a way that allows it to handle numerous tasks
or run multiple programmes simultaneously. It is also known as time-sharing systems. These
operating systems enable interactive computer use at a reasonable cost. Every user receives a
little fraction of a time-shared CPU by applying the multiprogramming and CPU scheduling
concepts in a time-shared operating system.
Computer systems designed in starting as Computers as batch systems are now modified to
time-sharing systems.
68
Advantages
Fast response
Duplication of software is not there
CPU idle time is reduced
Disadvantages
Not reliability
Security and integrity of user programs and data is a problem
The issue of data communication
9.2.7 Multiprogramming
Multiprogramming is the term for CPU sharing when two or more programmes run
simultaneously in memory. Multiprogramming relies on a solitary shared processor. The
CPU is used more frequently through many programs because there is always a job for it to
complete.
An OS performs the following multiprogramming-related tasks.
Several tasks are kept running in the OS memory at once.
Jobs kept in the job pool are a subset of this set of occupations.
The OS chooses and launches the execution of each task stored in memory.
Advantages
high and effective CPU usage
many programs can be allotted to the CPU simultaneously
Disadvantages
CPU scheduling is required.
Memory management is needed to accommodate all jobs.
9.2.8 Interactivity
The skill of people to communicate with a computer system is referred to as interactivity.
Following interactive tasks perform by an OS:
Gives the user a way to communicate with the system
Controls input devices to receive user input
Controls output devices so that users can see outputs
69
9.3 Memory Management
Internal memory is the Main Memory.. Only data stored in primary memory can be changed.
So, every operation we execute and every file we access must be copied from a storage
device to the ROM.
Some functions that come under memory management are as follows:
9.3.1 Swapping
Foe execution a process must be kept in memory. In some of the cases, internal memory is
essential for storing all active processes in a timesharing system. Swapping loads each
technique into internal memory, runs it for a moment, and then returns it to the disk.
9.3.5 Fragmentation
Fragmentation happens when most available free blocks are too tiny to accommodate
requests. Inability to employ the available memory is the common term used to describe it.
Internal fragmentation makes it possible for the RAM to receive memory that is slightly more
than what was requested.
70
9.3.6 Paging
For fragmentation problem Paging is one solution. Paging ia a memory management
approach that allows a process's physical address space to be non-contagious. Physical
memory is divided into Pages. Pages are identically sized pieces.
A specific process‘s pages are loaded into the available memory frames.
9.3.7 Segmentation
―It is a approach that shows memory can be segmented‖. Segmentation allows the division of
single process virtual address space into smaller chunks. They can be readily stored in
different memory locations.
9.4 Summary
Operating system (OS) acts as an interface between computer hardware, software and
users.
OS is software that provides help in managing all the fundamental functions,
including managing memory and processes, handling input and output and controlling
peripherals like disc drives and printers.
Multiprogramming logically provides time-sharing or multitasking.
A data processing system is considered to be real-time if processing and reaction
takes short amount of time that it affects the environment
A process is a time-shared user program.
In the main memory words or bytes with different sizes ranging from tens of
thousands to billions.
The primary memory is lost when the power is cut.
Multitasking operating systems are often known as time-sharing systems.
Multiprogramming is the term for sharing the CPU more than one programs are run
simultaneously in memory.
9.5 Keywords
Conducive: making a certain situation or outcome likely or possible
Employed: make use of
Embedded computer: a combination of computer hardware and software designed for
71
a specific function
Resource allocator: optimise business activities
Kernel: the central or most important part of something
72
Unit: 10
Data Communication
Learning Objectives:
Structure:
73
10.1 Data & Information
Data are the unprocessed facts that are gathered, whereas information are the processed facts
that allow us to make decisions. For example, when the results of a particular test are
released, the data of all students is included. When you locate the marks you received, you
have the knowledge necessary to determine whether you passed or failed the test.
Any information that is displayed in a way that its authors and users have approved is
referred to as data.
74
10.4 Components of Data Communication
75
3. Images: Images are digitally saved in computers. The smallest part of an image is called a
pixel. A picture or image is simply a matrix of pixel components, to put it simply. Bits are
used to represent the pixels. Each pixel would need a varied number of bits to indicate the
value of a pixel depending on the type of image (colour or black and white).
An image's size is determined by the number of pixels (also known as resolution) and the bit
pattern used to represent each pixel's value. For example, if an image is merely black and
white (two colours), each pixel can be represented by a value of 0 or 1. As a result, storing an
image made up of 10 by 10 pixel parts would only require 100 bits in memory.
In contrast, a grayscale image might use two bits to indicate each pixel value (00 for black,
01 for dark grey, 10 for light grey, and 11 for white). Thus, the identical 10 by 10 pixel image
would now need to be stored in 200 bits of RAM.
Popular image formats include jpg, png, bmp, etc.
4. Audio: Sound is another form of data that may be recorded and distributed. An illustration
of a source of data or information is what we hear on the radio. Audio data is not discrete; it
is continuous.
5. Video: Data streaming in the form of an image or a movie is referred to as video.
10.6.1 Simplex
76
Communication in Simplex is unidirectional. ‗Only one‘ of the devices transmits data, and
‗only one‘ of the devices receives data.
For example, a CPU sends data in the figure above, whereas a monitor just receives data.
77
10.7.1 Types of Network
Local Area Networks (LAN): A LAN is often confined to a smaller region. A LAN
is a network made up of all the computers in a building, and it can be privately owned
and be located inside an office on one of the floors.
Wide Area Network (WAN): A WAN is a set of all
the networks in a sizable geographic area. Rajasthan's
complete statewide network can be considered a
WAN.
Metropolitan Area Network (MAN): A MAN spans
the LAN and WAN in terms of scale. Although smaller
than WAN, it is bigger than LAN. It might include the
whole network in a metropolitan place like Delhi.
10.7.2 Protocol
A data communications system includes a protocol as one of its elements. Protocol is
necessary for communication to take place. Data cannot simply be sent from one device to
another and expect the other to receive it and accurately interpret it.
When a message is transmitted, it may contain text, numbers, graphics, and other data that is
broken down into bits and arranged into blocks to be conveyed. Control information is
frequently also included to aid the recipient in deciphering the data.
The sender and the recipient must agree to a set of guidelines known as protocol for
communication to be successful. A protocol is described as a collection of guidelines for
controlling data transmission.
What should be conveyed, how it should be communicated, and when it should be
communicated are all outlined in a protocol.
78
10.8 Standards in Networking
To guarantee connectivity and compatibility across diverse networking hardware and
software components, standards are required in networking. Without standards, we would
have exclusive goods that would segregate user communities and prevent them from
connecting.
79
While "internet" and "World Wide Web" are often used interchangeably, they don't represent
precisely the same concept. The web is just one of the services offered through the internet.
The term "internet" encompasses the entire global communication network, including its
hardware and infrastructure.
The backbone of communications and the main component of the internet is Internet Protocol
(IP). Because there are hardware and software layers on the internet, address schemes and
distinctive connected devices are identified using the IP communication standard. Internet
Protocol version 4 (IPv4) and Internet Protocol version 2 (IPv2) are prominent IP versions
used for communications.
80
linked together by hypertext, and are accessible through the Internet. A computer program
called a web browser allows users to access the resources of the WWW.
The World Wide Web has been instrumental to the growth of the Information Age and is the
main platform for interaction on the Internet.
10.10 Summary
Data are the unprocessed facts that are gathered, whereas information are the
processed facts that assist us in making decisions.
Data communications system must possess the four key essential qualities: Delivery,
Accuracy, Timeliness& Jitter
Data is a collection of unprocessed facts that are used to deduce information.
Images are digitally saved on computers.
An image's size is determined by the number of pixels (also known as resolution).
Sound is another form of data that may be recorded and distributed.
Protocol is necessary for communication to take place.
A protocol has three essential components: Syntax, Semantics and Timing
The internet is a network of international exchanges that connects guided, wireless,
and fibre-optic technologies.
The world's most economical mode of communication is the internet,
The ‗World Wide Web‘ was created in 1989 by English scientist Tim Berners-Lee.
10.11 Keywords
Unprocessed facts
Transmission
Unidirectional
World Wide Web
81
10.12 Self-Assessment Questions
What are the differences between data and information.
Explain the features of data communication.
What are the components of a data communication system?
Define computer network and categorise.
Give the detailed note on protocols.
82
Unit: 11
Learning Objectives:
Structure:
83
11.0 Computer Network Topologies
The arrangements of computer systems or network devices are known as topology. It
specifies a network's logical and physical aspects.
11.1.1 Point-to-Point: The connection provides a dedicated link between two devices. While
physical cables or wires are frequently used in point-to-point communications, alternative
options such as microwave or satellite links are also feasible.
An infrared remote control and the television's control system create a point-to-point link
when you use it to change the station on the television.
11.1.2 Multipoint: A multipoint connection connects two or more devices with a unified
link. The capacity of the channel is shared, either temporarily or spatially, in a multipoint
setting. It's a spatially shared connection of multiple devices that can use it at the same time.
84
11.2.1 MESH: Every node is connected to each other node in the network is known as mesh
topology .
11.2.2 STAR
85
Disadvantages
Expensive
The performance support are determined by the central network
More change of failure.
11.2.3 BUS
11.2.4 RING:
86
Advantages
required single direction,
Network communication in the workstations managed without a network server.
Fast data transfer
High performance of network
Disadvantages
Slow Speed of data transfer.
One device failure affect entire network.
Expensive.
87
Fixed Channel Allocation (FCA):
A particular number of channels are assigning to the cells under this Channel Allocation
technique. The channels cannot be changed once allocating to the specific cells. Channel
allocation in FCA is done to maximize frequency reuse.
Advantages
• Easy implementation
• Easy to manage
• Require Easy equipment or algorithms
Disadvantages
Limited channel utilisation
Vulnerable to congestion and interference.
88
Advantages
FCA and DCA Benefits
Optimum allocation of resources
Disadvantages
Requires tough algorithms.
Not efficient at all levels.
Features
Fast Speed
safe
suitable for comparatively shorter distances
89
A. Unshielded Twisted Pair (UTP):
The cable is capable of blocking interference by itself and doesn't require a physical
shield for it. It finds its applications in telephone communication.
Benefits (1) Lowest cost; (2) Simple installation; and (3) Fast speed
(ii) Coaxial Cable: This has an insulated protective cover on the plastic outer shell that
holds the two parallel conductors. Coaxial cable transmits data in two different ways: in
broadband mode (various ranges of cable bandwidth) and in baseband mode (dedicated cable
bandwidth). Analogue television networks and cable TVs frequently employ coaxial
connections.
Benefits include increased bandwidth, cost-effectiveness, ease of installation, and better noise
immunity.
(iii) Optical Fibre Cable (OFC): An optical fiber cable is a type of cable made up of one or
more optical fibers (thin strands of glass or plastic) that are used to transmit light signals over
long distances. These cables are designed to carry a large amount of data with minimal loss
and are commonly used in telecommunications networks, internet connections, and various
other applications where high-speed data transmission is required.
90
Types of unguided media
(i) Radio Waves - These are easy to produce and can penetrate walls effortlessly. Antennas
for transmission and reception don't require precise placement. Their frequency spectrum
ranges from 3KHz to 1GHz. Radio Waves find application in transmitting audio for
technologies like AM, FM, and cordless phones.
(ii) Microwaves: Since this type of communication relies on line-of-sight, the sending and
receiving antennas must be correctly positioned. The height of the antennas has an inverse
relationship with the signal range. With Frequency Range of 1 GHz to 300 GHz, these are
mostly used for the mobile phone and TV Communication.
(iii) Infrared – It is useful in short distance communication. They cannot pass through
barriers. Range of frequencies: 300GHz to 400THz. Example: TV Remote.
91
11.5.1 Computing Protocols
The rules and processes that control all aspects of information management are defined by
computing and communication protocols.
The output of a computer's processing of data is referred to as information. It is possible to
say that computers produce information in this sense. However, protocols may be used to
control information generated by machines.
Storage, retrieval, and processing are among the various tasks that fall under the purview of
computer protocols. Acquisition, transmission, and dissemination make up the remaining
tasks, which are classified as communication protocols. Information dissemination is the
umbrella term encompassing transmission and distribution activities.
92
Sequences out-of-sequence received datagram
11.6 Summary
The configuration of how computer systems or network devices are connected to one
another is known as a topology.
A link is a communications pathway that transfers data from one device to another.
Physical topology refers to the way in which a network is laid out physically.
A mesh topology is the one where every node is connected to every other node in the
network.
Every node in the star topology setup is connected to a hub, switch, or computer that
serves as the hub of the network.
All devices in a bus topology share a single communication line or cable.
Channel allocation refers to distributing the available channels among the cells.
Channel Allocation Strategies: Fixed channel allocation, Dynamic channel allocation,
and Hybrid channel allocation.
Transmission Media can be Guided or Unguided
The rules and processes that control all aspects of information management are
defined by computing and communication protocols.
11.7 Keywords
Topologies
Time shared connection
Bus Master
Ethernet cards
93
11.9 Case Study
According to a senior official, a small incident that appeared to be the outcome of a mistake
that happened during regularly scheduled system maintenance, affected thousands of flights
throughout the U.S..
The official claimed that an engineer "replaced one file with another," unaware that a mistake
had been made. The FAA personnel worked furiously to determine what went wrong as the
systems started to exhibit issues and ultimately failed. The mistaken engineer was unaware of
what had happened.
Departures were delayed and the FAA had ordered airlines to pause all domestic departures
until 9 a.m. The official claimed, ―It was an honest mistake that cost the government millions,
and the employee his job.‖
Question: Discuss the case study and find out what went wrong and how it could have been
different.
94
Unit: 12
Network Types
Learning Objectives:
Networks type
Local Area Networks
ATM Networks
Interconnecting Networks
Structure:
12.0 Introduction to Network Types
12.1 Types of Network
12.2 Network Topologies
12.3 Network Devices
12.4 Asynchronous Transfer Mode (ATM)
12.5 Interconnection Network Design
12.6 Summary
12.7 Key points
12.8 Self-Assessment Questions
12.9 Case Study
95
12.0 Types of Networks
A computer network is a data communications system that connects two or more computing
devices located throughout a space, such as a room, a campus, a continent, or even an entire
planet. A network can be as tiny as one system or as vast as the user desires. The nodes are
divided into different categories. These consist of the following:
Hardware for Networking
Servers
Personal Computers
Basic Hosts
96
WAN is also primarily used to handle data and information by the Government
organizations
97
Network Bridges – The outermost section of the data packet is read to tell where the
message is going to reduce traffic on other network.
Modem – Modem is connected between a telephone and a computer system. This
device converts digital signals into analog signals.
98
every cell would arrive; in cases of extreme congestion, it was deemed acceptable to
lose a small number of cells.
2. Full-duplex, transmission through one pair of threads and reception through a
different set of threads for making nearly full use of both pairs and enabling high
continuous data transmission.
3. Dedicated bandwidth: ATM offers various service characteristics, it allocates
bandwidth to each of the running stations. For each connection, the station requests
the necessary amount of bandwidth, which the network then provides to the user
automatically.
4. ATM leaves the medium open; point-to-point and full-duplex communications are
both conceivable using wires that resemble fibre optics. The primary speed is 155.52
Mbps, and the backup speed (SONET compatible) is 622.08 Mbps.
99
ATM infrastructure for telephonic and private-line traffic will enable the carrier
infrastructure to make better use of SONET/SDH fibre infrastructures.
100
12.6 Summary
Types of Network: LAN, PAN, WAN, MAN
ATM is a dedicated connection-oriented switched data transfer technique in which
switches establish a fictitious link or circuit between the call's sender and recipient
that is switched or permanent for the duration of the call.
The ATM (Asynchronous Transfer Mode) is compatible with two different types of
connections: Point-to-Point and Multipoint links.
Links and switches are responsible for transferring the information from the source
node to the destination node.
The network interface creates routing and control information as well as formats the
packets.
12.7 Keywords
Basic Hosts
Interpreter
Token-ring technology
Rebroadcasts
Hybrid topology
101
B1 TO B2: 60 M
B2 TO B4: 25M
B3 TO B4: 170M
B2 TO B3: 125M
B1 TO B4: 90M
102
Unit: 13
MS Word 2007
Learning Objectives:
Structure:
103
13.0 Introduction
We will learn about Introduction to Microsoft Word 2007 in this unit. ―MS Windows is a
multitasking operating system created by the Microsoft Corporation that communicates with
users through a graphical user interface. Originally known as "Traf-O-Data" in 1972,
Microsoft changed its name to "Micro-soft" in November 1975, and finally to "Microsoft" on
November 26, 1976‖. ‗Bill Gates and Paul Allen‘ created Microsoft; its flagship product is
the Windows operating system.
104
Figure 1: MS Word Window
105
alter the perspective you have of a document in one of two ways. Use the view buttons, or
click the View tab and select a specific. We'll now explore the various Word perspectives.
106
Now move your cursor over the various available font sizes in the drop-down menu.
You will see a live preview in the document.
Finally, choose the required font type and the font size
107
Modifying page size
Zoom in and not in of the page
Viewing multiple pages
13.9 Summary
Microsoft Windows is a multitasking operating system created for the
communication with users through a graphical user interface.
Microsoft Corporation was created by ‗Bill Gates and Paul Allen‘, with its flagship
product as Windows operating system.
108
Microsoft Word (MS-WORD) is a graphical word processor that accepts keyboard
input. Its objective is to enable users to create and save documents.
Formatted text can help you deliver your message and improve the appearance of
your paper
to carry out a task automatically a Macro is used as a collection of commands and
instructions into one command.
13.10 Keywords
Flagship product
Watermark
Paragraph indentation
Citation
Bibliography
109
The resume should also show that the individual has invested their time and energy into
creating an effective document that properly represents them and their experience.‘
Question: Discuss and draft an effective resume format that is optimised for readability.
110
Unit: 14
MS Excel 2007
Learning Objectives:
Structure:
111
14.0 Introduction to Microsoft Excel 2007
An online spreadsheet program that enables users to store, arrange, compute, and edit data
using formulae in a spreadsheet with rows and columns. You can perform numerical
calculations and analysis using Excel, a highly potent tool. An example of simple database is
Excel, but it is a different class. In this unit, we will look at how to start with Excel and show
you around the application.
While starting Excel first you will see this type of workbook:
Understanding of Cell reference is very important. The cell reference is the cell name,
which we can easily locate in the toolbar.
112
14.1 Understanding the Excel Program Screen
(A) Office Button: To replace the File menu found in previous edition of Excel.
(B) View Button: It is used to move between various aspects of a page including Normal
View, Page Layout View, and Page Break Views.
(C) Quick Access Toolbar: It contains general commands such as Undo and save. More
commands can be added as per requirement.
(D) Worksheet tabs: By default, workbooks have three worksheets. Worksheets can be
added, removed or renamed.
(E) Title bar: Name of the workbook on which you are working is displayed.
(F) Status bar: Status of excel is displayed here.
(G) Close button: It is used to exit from the excel.
(H) Name box: Displays the active cell addresses or object name.
(I) Ribbon: The menus and toolbars seen in earlier Excel versions have been replaced by
the tabs and groups on Ribbon.
(J) Row and column headings: Every row and column has a heading.
(K) Scroll bars: These bars are used to move horizontally and vertically in the worksheet.
(L) Active cell: Cell is considered as active when cursor is placed on it.
(M) Formula Bar: This is the area where we can apply formulas. For example: =A1+A2
14.1.1 Ribbon: Multiple commands are contained in this tab of ribbon. Various tabs of
ribbon are shown below:
113
Figure 2: Ribbon Elements
14.1.2 Tabs: There are three different types of tabs:
Command tabs: The default tabs in Excel are Home, Insert, Page Layout,
Formulas, Data, Review, and View.
Contextual tabs: Contextual tab comes into picture when you do a specific job and
offer commands related to that task. For example the Design tab displays on the
Ribbon whenever you insert a table.
Program tabs: Go to a different authoring mode. The program tabs replace the default
command tabs that display on the Ribbon.
114
14.3 Keyboard Commands
Two important keyboard commands are keystroke shortcuts and Key Tips.
In Excel 2007, easiest way to give the command is through keystroke shortcuts. Example of
such a command is ―Saving a Workbook‖
Combination of keys can be used to give commands Some combinations are given below:
115
Give the path of the file which is to be opened.
116
14.6 Formulas and Using AutoSum
14.6.1 Formula
The difference between a formula and an ordinary value is that a formula contains the
information needed to conduct a mathematical operation like adding, subtracting, or
multiplying. A formula always begins with the equal sign (=).
Example: =A1+A2+D3
14.6.2 Functions are pre-defined formulas that can be used to conduct more complex
calculations.
14.6.3 AutoSum: Range of cells can be added by using this option. It is used for addition.
117
14.7.2 Print a worksheet
Select the area to be printed by using a mouse. From the file tab click on ―Print‖. The selected
documented will be printed. Short cut is Ctrl+P
14.8.2 To cut, copy, and paste in cells: Simply select the data in cells. Either select cut or
copy from the options and move the contents to new loications. Cut and copy options are
available when you right click on mouse.
Paste Special Command: This command removes the formula out of which the value has
aroused. If we change the formula value will not be changed. In the file menu click on ―Paste
Special‖ data will be copied without associated formula.
14.8.4 Deleting Cells, Rows, and Columns: It is very easy to delete the rows and columns.
Simply right click on the rows and columns and click delete. Steps are give below:
Select the cell, column or row you need to delete.
118
Click the Home tab on the Ribbon and select the button Delete Cells.
14.9 Summary
Microsoft Excel is a very useful tool for numeric computations and analysis.
A workbook is a collection of worksheets (spreadsheets) and macros.
Columns are the vertical markers in the worksheet and are denoted by the alphabet i.e.
A, B, C.
Rows are the horizontal markers in the worksheet and are denoted by numbers i.e. 1,
2, 3.
The Ribbon keeps commands visible while you work.
Commands are organised into tabs on the Ribbon.
The Quick Access Toolbar appears to the right of the Office.
A group of cells arranged in rows and columns is referred to as a worksheet in Excel
documents.
Labels are used for worksheet, column, and row headings.
14.10 Keywords
• Excel Data Markers
• Arithmetic Operators
• Dialog box
119
For an Organization it is very important to keep the track of inventory, Orders Received,
Shipment, Price Change etc. Whenever a customer has an enquiry about the product, price,
delivery date, Invoice a company must be in a position to answer all the queries.
XYZ a logistics company has introduced the Excel spreadsheets. Using Excel automation, all
the above queries are quickly responded by XYZ.However, some employees find it difficult
and time-taking and also too much information inputs are needed.
Question: Discuss the benefits of this new approach for the business.
120
References
121