0% found this document useful (0 votes)
6 views23 pages

Internet

Chapter Fourteen discusses the Internet as a decentralized global network that connects millions of computers and facilitates various services, including email, online shopping, and information access. It distinguishes between the Internet and the World Wide Web, highlighting the advantages and disadvantages of Internet use, such as privacy concerns and the prevalence of pornography. The chapter also covers technologies like ATMs, teleconferencing, and videoconferencing, emphasizing their roles in modern communication and business operations.

Uploaded by

hmasadulislam58
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views23 pages

Internet

Chapter Fourteen discusses the Internet as a decentralized global network that connects millions of computers and facilitates various services, including email, online shopping, and information access. It distinguishes between the Internet and the World Wide Web, highlighting the advantages and disadvantages of Internet use, such as privacy concerns and the prevalence of pornography. The chapter also covers technologies like ATMs, teleconferencing, and videoconferencing, emphasizing their roles in modern communication and business operations.

Uploaded by

hmasadulislam58
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Chapter Fourteen Internet and MIS

CHAPTER FOURTEEN
INTERNET AND MIS
Overview
Internet is a global network connecting millions of computers. More than 100 countries are linked into
exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the
Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators
can choose which Internet services to use and which local services to make available to the global
Internet community. Remarkably, this anarchy by design works exceedingly well. There are a variety
of ways to access the Internet. Most online services, such as America Online, offer access to some
Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP).
Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of
millions of people worldwide. Physically, the Internet uses a portion of the total resources of the
currently existing public telecommunication networks. Technically, what distinguishes the Internet is its
use of a set of protocols called TCP/IP
The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called
"the Web"). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web
sites, certain words or phrases appear in text of a different color than the rest; often this text is also
underlined. When you select one of these words or phrases, you will be transferred to the site or page
that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that
are "clickable." If you move the pointer over a spot on a Web site and the pointer changes into a hand,
this indicates that you can click and be transferred to another site.
Using the Web, you have access to millions of pages of information. Web browsing is done with a Web
browser, the most popular of which are Microsoft Internet Explorer and Netscape Navigator. The
appearance of a particular Web site may vary slightly depending on the browser you use. Also, later
versions of a particular browser are able to render more "bells and whistles" such as animation, virtual
reality, sound, and music files, than earlier versions.
Learning Objectives
In this chapter you will learn about:
 Internet
 Functions of Internet
 Automated teller machine (ATM)
 Teleconference
 Videoconferencing
 Expert system
 Robotics
 Electronic Mail
 Web browser
 World Wide Web
 TCP/IP
 HTML
Page- 1
Chapter Fourteen Internet and MIS

 HTTP
 File Transfer Protocol
 Electronic Commerce
 Management Information System.

Introduction
The Internet is a global system of interconnected
computer networks that use the standard Internet Protocol
Suite (TCP/IP) to serve billions of users worldwide. It is a
network of networks that consists of millions of private,
public, academic, business, and government networks, of
local to global scope, that are linked by a broad array of
electronic, wireless and optical networking technologies.
The Internet can also be defined as a worldwide
interconnection of computers and computer networks that
facilitate the sharing or exchange of information among
users. The Internet carries a vast range of information
resources and services, such as the inter-linked hypertext
documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.

The terms “Internet” and “World Wide Web” are often used in every-day speech without much
distinction. However, the internet and the World Wide Web are not one and the same. The Internet is a
global data communication system. It is a hardware and software infrastructure that provides
connectivity between computers. In contrast the web is one of the services communicated via the
internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and
URLs.

Advantages of the Internet


The Internet provides opportunities galore, and can be used for a variety of things. Some of the things
that you can do via the Internet are:
 E-mail: E-mail is an online correspondence system. Using e-mail you can send and receive an
instant electronic message, which works like writing letters or faxes. Your messages are
delivered instantly to people anywhere in the world, unlike traditional mail that takes a lot of
time.
 Access Information: The Internet is a virtual treasure trove of information. Any kind of
information on any topic under the sun is available on the Internet. The ‘search engines’ on the
Internet can help you to find data on any subject that you need.
 Shopping: Along with getting information on the Internet, you can also shop online. There are
many online stores and sites that can be used to look for products as well as buy them using
your credit card. You do not need to leave your house and can do all your shopping from the
convenience of your home.
 Online Chat: There are many ‘chat rooms’ on the web that can be accessed to meet new
people, make new friends, as well as to stay in touch with old friends.

Page- 2
Chapter Fourteen Internet and MIS

 Downloading Software: This is one of the most happening and fun things to do via the
Internet. You can download innumerable, games, music, videos, movies, and a host of other
entertainment software from the Internet, most of which are free.

Disadvantages of the Internet


There are certain cons and dangers relating to the use of Internet that can be summarized as:
 Personal Information: If you use the Internet, your personal information such as your name,
address, etc. can be accessed by other people. If you use a credit card to shop online, then your
credit card information can also be ‘stolen’ which could be akin to giving someone a blank
check.
 Pornography: This is a very serious issue concerning the Internet, especially when it comes to
young children. There are thousands of pornographic sites on the Internet that can be easily
found and can be a detriment to letting children use the Internet.
 Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and
unnecessarily clog up the entire system.

There are three things you’ll need to connect to the Internet


• An Internet Service Provider (ISP): An Internet Service Provider is a lot like a phone company,
except instead of letting you make telephone calls to other people; an Internet Service Provider lets your
computer connect to the Internet. Just like your telephone company, Internet Service Providers charge
for their services— currently the average rate seems to be about $20 a month for unlimited usage.
You’ve probably already heard of the most famous Internet Service Provider—America Online, or
AOL.
• A Web Browser: A Web browser is a program that lets your computer view and navigates the World
Wide Web. One of the biggest improvements in Windows XP is that it comes with a built-in Web
browser—Internet Explorer. Another Web browsing program that is very popular is Netscape
Navigator.
• A Phone Line and Modem or Other Connection: A modem is your computer’s very own telephone
that lets it talk to other computers over the telephone line. Your existing phone line will work just fine
with your modem, although it will be tied up whenever you’re connected to the Internet. If you or
someone in your home is a heavy Internet user, you might consider getting a second phone line for your
computer. If you have the Internet at work, you might have a network connection to the Internet, which
is much, much faster than a modem and is connected to the Internet 24 hours a day.

Saving Pictures and Files to Disk (Downloading)


Another common way people use the Internet is to download files from a Web server on the Internet
and save them onto their local hard drive. Some of the most common types of files people download
from the Internet include:
• Images: You can save any picture that you see on a Web page, print it, use it as your Windows
wallpaper, or anything else you can think of.

Page- 3
Chapter Fourteen Internet and MIS

 Programs: Many software companies have demo versions of their programs available on the
Internet that you can download and evaluate. In addition, thousands of shareware programs are
available for you to download for free!
 Patches, Fixes, and Drivers: One of the great things about the Internet is how you can find
and download bug fixes for your programs, and drivers for your hardware devices, such as a
driver for a discontinued foreign printer.
 Music: A new file format called MP3 is revolutionizing the music industry. MP3 files are
sound files that you can listen to on your computer. They have digital CD quality sound, but
use compression so that they are 11 times smaller than the CD equivalent and small enough to
be easily downloadable from the Internet.
 Viruses: Just kidding—the last thing the world you want to download from the Internet is a
computer virus! Since you won’t always know where a program or file you want to download
comes from, you should make sure your computer has a virus protection program installed
before you download anything from the Internet.

Automated teller machine (ATM)


An automated teller machine (ATM), also known as a Cash Point
(which is a trademark of Lloyds TSB), Cash Machine or sometimes
a Hole in the Wall in British English, is a computerized
telecommunications device that provides the clients of a financial
institution with access to financial transactions in a public space
without the need for a cashier, human clerk or bank teller. ATMs are
known by various other names including automatic banking
machine, cash machine, and various regional variants derived from
trademarks on ATM systems held by particular banks.
Using an ATM, customers can access their bank accounts in order to
make cash withdrawals, credit card cash advances, and check their
account balances as well as purchase prepaid cell phone credit. If the
currency being withdrawn from the ATM is different from that which
the bank account is denominated in Fig 14.1: Picture of ATM
the money will be converted at a wholesale exchange rate. Thus, ATMs often provide the best possible
exchange rate for foreign travelers and are heavily used for this purpose as well.

Hardware of ATM

An ATM is typically made up of the following devices:


 CPU (to control the user interface and transaction devices)
 Magnetic and/or Chip card reader (to identify the customer)
 PIN Pad (similar in layout to a Touch tone or Calculator keypad), often manufactured as part
of a secure enclosure.
 Secure crypto processor, generally within a secure enclosure.
 Display (used by the customer for performing the transaction)
 Function key buttons (usually close to the display) or a Touch screen (used to select the
various aspects of the transaction)
 Record Printer (to provide the customer with a record of their transaction)

Page- 4
Chapter Fourteen Internet and MIS

 Vault (to store the parts of the machinery requiring restricted access)
 Housing (for aesthetics and to attach signage to)

Page- 5
Chapter Fourteen Internet and MIS

Computer reservations system


A computer reservations system (or central reservation system) (CRS) is a computerized system used
to store and retrieve information and conduct transactions related to air travel. Originally designed and
operated by airlines, CRSes were later extended for the use of travel agencies. Major CRS operations
that book and sell tickets for multiple airlines are known as global distribution systems (GDS).
Airlines have divested most of their direct holdings to dedicated GDS companies, who make their
systems accessible to consumers through Internet gateways. Modern GDSes typically allow users to
book hotel rooms and rental cars as well as airline tickets. They also provide access to railway
reservations in some markets although these are not always integrated with the main system.
Teleconference
A teleconference or video conference is the live exchange and mass articulation of information among
several persons and machines remote from
one another but linked by a
telecommunications system. Terms such as
audio conferencing, telephone conferencing
and phone conferencing are also sometimes
used to refer to teleconferencing.
The telecommunications system may
support the teleconference by providing one
or more of the following: audio, video,
and/or data services by one or more means,
such as telephone, computer, telegraph,
teletype, radio, and television.
Fig 14.2: Teleconferencing Method
Internet teleconferencing
Internet teleconferencing includes internet telephone conferencing, videoconferencing, web
conferencing, and Augmented Reality conferencing. Internet telephony involves conducting a
teleconference over the Internet or a Wide Area Network. One key technology in this area is Voice over
Internet Protocol (VOIP). Popular software for personal use includes Skype, Google Talk, Windows
Live Messenger and Yahoo Messenger.

Videoconferencing
A videoconference or video conference (also known as a
video teleconference) is a set of interactive
telecommunication technologies which allow two or more
locations to interact via two-way video and audio
transmissions simultaneously. It has also been called 'visual
collaboration' and is a type of groupware.
Videoconferencing differs from videophone calls in that it's
designed to serve a conference rather than individuals.

Fig 14.3: Videoconferencing Method

Page- 6
Chapter Fourteen Internet and MIS

The other components required for a videoconferencing system include:


 Video input : video camera or web cam
 Video output: computer monitor , television or projector
 Audio input: microphones, CD/DVD player, cassette player, or any other source of Preamp
audio outlet.
 Audio output: usually loudspeakers associated with the display device or telephone
 Data transfer: analog or digital telephone network, LAN or Internet
 Computer: a data processing unit that ties together the other components, does the
compressing and decompressing, and initiates and maintains the data linkage via the network.

There are basically two kinds of videoconferencing systems:


1. Dedicated systems have all required components packaged into a single piece of equipment,
usually a console with a high quality remote controlled video camera. These cameras can be
controlled at a distance to pan left and right, tilt up and down, and zoom. They became known
as PTZ cameras. The console contains all electrical interfaces, the control computer, and the
software or hardware-based codec. Omni directional microphones are connected to the
console, as well as a TV monitor with loudspeakers and/or a video projector. There are several
types of dedicated videoconferencing devices:
1. Large group videoconferencing is non-portable, large, more expensive devices used
for large rooms and auditoriums.
2. Small group videoconferencing is non-portable or portable, smaller, less expensive
devices used for small meeting rooms.
3. Individual videoconferencing are usually portable devices, meant for single users,
have fixed cameras, microphones and loudspeakers integrated into the console.
2. Desktop systems are add-ons (hardware boards, usually) to normal PCs, transforming them
into videoconferencing devices. A range of different cameras and microphones can be used
with the board, which contains the necessary codec and transmission interfaces. Most of the
desktops systems work with the H.323 standard. Videoconferences carried out via dispersed
PCs are also known as e-meetings.

Advantages of Video Conferencing System


Video conferencing systems are being widely embraced by organizations of all sizes as they offer a
number of benefits to businesses. This technology can be used in different environments to cater
different requirements. Video conferencing is most commonly used for conducting business meetings,
trainings, online seminars etc.
Video conferencing solutions are being widely used in the fields of telemedicine, telecommunication,
education, surveillance, security, emergency response etc.
The organizations using video conferencing systems for improving their businesses are deriving many
benefits from its use. Some of the advantages are mentioned below:
 The basic advantage of using video conferencing is that it facilitates people located remotely to
meet up without having to travel. Therefore, it enables efficient communication between
people, while saving both time and money.
 Another advantage of using video conferencing is that it facilitates to conduct business
meetings, seminars, training sessions etc, while the participants are located in different places.

Page- 7
Chapter Fourteen Internet and MIS

 It fastens decision making processes and facilitates to take quicker actions during times of
emergency.
 It facilitates better sharing of data and knowledge. Business organizations can use this
technology for making presentations to the important members of an organization even if they
are separated by vast distances.

Expert system
An expert system is software that uses a knowledge base of human expertise for problem solving, or to
clarify uncertainties where normally one or more human experts would need to be consulted. Expert
systems are most common in a specific problem domain, and are a traditional application and/or
subfield of artificial intelligence (AI). A wide variety of methods can be used to simulate the
performance of the expert; however, common to most or all are: 1) the creation of a knowledge base
which uses some knowledge representation structure to capture the knowledge of the Subject Matter
Expert (SME); 2) a process of gathering that knowledge from the SME and codifying it according to the
structure, which is called knowledge engineering; and 3) once the system is developed, it is placed in
the same real world problem solving situation as the human SME, typically as an aid to human workers
or as a supplement to some information system. Expert systems may or may not have learning
components.

Advantages and disadvantages


Advantages
 Compared to traditional programming techniques, expert-system approaches provide the added
flexibility (and hence easier modifiability) with the ability to model rules as data rather than as
code. In situations where an organization's IT department is overwhelmed by a software-
development backlog, rule-engines, by facilitating turnaround, provide a means that can allow
organizations to adapt more readily to changing needs.
 In practice, modern expert-system technology is employed as an adjunct to traditional
programming techniques, and this hybrid approach allows the combination of the strengths of
both approaches. Thus, rule engines allow control through programs (and user interfaces)
written in a traditional language, and also incorporate necessary functionality such as inter-
operability with existing database technology.
Disadvantages
 The Garbage In, Garbage Out (GIGO) phenomenon: A system that uses expert-system
technology provides no guarantee about the quality of the rules on which it operates. All self-
designated "experts" are not necessarily so, and one notable challenge in expert system design
is in getting a system to recognize the limits to its knowledge.
 Expert systems are notoriously narrow in their domain of knowledge — as an amusing
example, a researcher used the "skin disease" expert system to diagnose his rust bucket car as
likely to have developed measles — and the systems are thus prone to making errors that
humans would easily spot. Additionally, once some of the mystique had worn off, most
programmers realized that simple expert systems were essentially just slightly more elaborate
versions of the decision logic they had already been using. Therefore, some of the techniques
of expert systems can now be found in most complex programs without drawing much
recognition.
 An expert system or rule-based approach is not optimal for all problems, and considerable
knowledge is required so as to not misapply the systems.
Page- 8
Chapter Fourteen Internet and MIS

 Ease of rule creation and rule modification can be double-edged. A system can be sabotaged
by a non-knowledgeable user who can easily add worthless rules or rules that conflict with
existing ones. Reasons for the failure of many systems include the absence of (or neglect to
employ diligently) facilities for system audit, detection of possible conflict, and rule lifecycle
management (e.g. version control, or thorough testing before deployment). The problems to be
addressed here are as much technological as organizational.

Robotics
A robot is a mechanical intelligent agent which can
perform tasks on its own, or with guidance. In practice
a robot is usually an electro-mechanical machine
which is guided by computer and electronic
programming. Robots can be autonomous or semi-
autonomous and come in those two basic types: those
which are used for research into human-like systems,
such as ASIMO and TOPIO, as well as those into
more defined and specific roles, such as Nano robots
and Swarm robots; and helper robots which are used to
make or move things or perform menial or dangerous
tasks, such as Industrial robots or mobile or servicing
robots. Another common characteristic is that, by its
appearance or movements, a robot often conveys a
sense that it has intent or agency of its own. Figure 14.4: Picture of a Robot

Robotics Applications
Robotics has been of interest to mankind for over one hundred years. However our perception of robots
has been influenced by the media and Hollywood.
In my eyes, robots' characteristics change depending on the environment it operates in. Some of these
are:
Outer Space - Manipulative arms that are controlled by a human are used to unload the docking bay of
space shuttles to launch satellites or to construct a space station

The Intelligent Home - Automated systems can now monitor home security, environmental conditions
and energy usage. Door and windows can be opened automatically and appliances such as lighting and
air conditioning can be pre programmed to activate. This assists occupants irrespective of their state of
mobility.
Exploration - Robots can visit environments that are harmful to humans. An example is monitoring the
environment inside a volcano or exploring our deepest oceans. NASA has used robotic probes for
planetary exploration since the early sixties.
Military Robots - Airborne robot drones are used for surveillance in today's modern army. In the future
automated aircraft and vehicles could be used to carry fuel and ammunition or clear minefields
Farms - Automated harvesters can cut and gather crops. Robotic dairies are available allowing
operators to feed and milk their cows remotely.
The Car Industry - Robotic arms that are able to perform multiple tasks are used in the car
manufacturing process. They perform tasks such as welding, cutting, lifting, sorting and bending.
Page- 9
Chapter Fourteen Internet and MIS

Similar applications but on a smaller scale are now being planned for the food processing industry in
particular the trimming, cutting and processing of various meats such as fish, lamb, beef.

Hospitals - Under development is a robotic suit that will enable nurses to lift patients without damaging
their backs. Scientists in Japan have developed a power-assisted suit which will give nurses the extra
muscle they need to lift their patients - and avoid back injuries.
Disaster Areas - Surveillance robots fitted with advanced sensing and imaging equipment can operate
in hazardous environments such as urban setting damaged by earthquakes by scanning walls, floors and
ceilings for structural integrity.
Entertainment - Interactive robots that exhibit behaviors and learning ability. SONY has one such
robot which moves freely, plays with a ball and can respond to verbal instructions.

What is Email - Electronic Mail


Email full meaning Electronic Mail. Email much the same as a letter, only that it is exchanged in a
different way. Computers use the TCP/IP protocol suite to send email messages in the form of packets.
The first thing you need to send and receive emails is an email address. When you create an account
with a Internet Service Provider you are usually given an email address to send from and receive
emails. If this isn't the case you can create an email address / account at web sites such as yahoo,
hotmail and lycos. Anatomy of an E-Mail
Message The header of an email includes
the From:, To:, Cc: and Subject: fields. So
you enter the name and address of the
recipient in the Fom: field, the name and
address of anyone who is being copied to in
the Cc: field, and the subject of the message
obviously in the Subject: field. The part
below the header of the email is called the
body, and contains the message itself. Spelling the correct address is critical with an email. Like with a
normal postal letter, if you get the address wrong it won't go the correct receiver. If you send an email
to an address which doesn’t exist the message will come back to you as a Address Unknown error
routine.

Email Addresses

An e-mail address typically has two main parts:


[email protected]
The first field is the user name (editor) which refers to the recipient's mailbox. Then there is the sign
(@) which is the same in every email address. Then comes the host name (internet-guide), which can
also be called the domain name. This refers to the mail server address, most usually having a individual
IP address. The final part of an email address includes the top-level domain (TLD). For the above
address this is 'co.uk', which is for commercial sites based in the UK.

Table 14.1: Email Folder

Page- 10
Chapter Fourteen Internet and MIS

Advantages of Email
1. Cheap. Once you’re online, there is no further expense.
2. Easy to reference. Sent and received messages and attachments can be stored safely, logically
and reliably.
3. Easy to use. Once you’re set up, sending and receiving messages is simple. That goes for a
host of other email functions. Data storage and contacts can be accessed quickly and easily.
4. Easy to prioritize. Incoming messages have subject lines that mean you can delete without
opening. How much time does that save compared to ‘snail mail?’
5. Fast. Message to send? Done, under a second! Email is by far the fastest form of written
communication.
6. Global. Web based email means you can access your messages anywhere online. Going
oversees? Before you go, mail yourself a copy of your passport number, travel insurance
details or your accommodation details.
7. Good for the planet. Actually the advantages and disadvantages of email are clear here.
Computers themselves aren’t 'green', but email offsets some of the damage by reducing the
environmental cost of contact.
8. Info at your fingertips. Storing data online means less large, space taking file cabinets,
folders and shelves. You can access information far quicker if you learn how to use email this
way.
9. Leverage. Send the same message to any number of people. Adaptations are simple, too. If
you have a product or service to sell, email is an effective medium to get your message out.
10. Send reminders to yourself. Do you use more than one account? Email yourself messages
from work to home or vice versa. Does the idea of two or more accounts seem complicated?
It's not if you know how to manage multiple accounts.

Disadvantages of Email
1. Emotional responses. Some emails cause upset or anger. A reply in the heat of the moment
can’t be retracted.

Page- 11
Chapter Fourteen Internet and MIS

2. Information overload. Too many people send too much information. They often cite ‘need to
know’ as the justification. Learn how to use email effectively and you’ll reduce time wasted on
this.
3. Lacks the personal touch. Some things are best left un typed. Email will never beat a hand
written card or letter when it comes to relationships.
4. Misunderstandings. Emails from people who don’t take the time to read what they write
before clicking ‘send’. Time is wasted, either to clarify or, worse, acting on a misinterpretation
of the message.
5. No respite. The law of the empty inbox – leaves it and will grow. Ignore it at your peril!
Discover how to get an empty inbox every day.
6. Pressure to reply. Once it’s in your inbox, you feel an ever increasing obligation to act on it.
Procrastinating doesn’t making it go away.
7. Spam. Having to deal with spam and spoofs is one of the worst avoidable time wasters online.
8. Sucks up your time. Over checking messages is time wasted on low value, passive activity.
9. Too long. How long is too long? It’s hard to say exactly, but the longer it goes on, the harder it
is to take in. Email is suited to brevity.
10. Viruses. A virus could seriously affect your computer. If you want know how to use email,
you need to know how to deal with these.
Functions of Email
1. File Storage
Most email programs provide storage space worth several gigabytes for attachments, which means you
can send large files via email. Naturally, you can use your email as a means of storing files. How?
 You can either send files to yourself then save them.
 Set your account to automatically store sent files.
This way, you can still access your most important documents, through your email, if your computer
crashes or your hard drive gets corrupted. Having a backup is a necessity, especially if your work
requires the use of a computer.
2. Early - Morning Reminder
People usually check their accounts, first thing in the morning, since some companies send tasks and
reminders through email. You probably share the same morning routine. If you have an important task
to do for the following day, you can send it to yourself via email before leaving the office. Chances are,
you will check your account tomorrow morning and address the reminder in an instant.
3. Carrier for Pending Work
Aside from sending short reminders, you can also use your email for doing unfinished work. You just
have to attach your unfinished document and send it to yourself. If attaching your work is not possible,
you can copy-paste the document onto the message. Open the message at home then paste the document
on the program assigned to run it. Just don’t forget to run the file through an anti-virus and an anti-spy
ware program, in case your office computer is infected by malicious programs.

4. Event Invitations

Page- 12
Chapter Fourteen Internet and MIS

Physically sending invitations to a event can be tedious, especially if you don’t know some of the
invited guests personally. What you can do is create a
virtual invitation on your computer and send it through
email. When creating an invite, you can use Page maker
and Photoshop, so the designs will look stunning. Write
all the necessary info then open the invitation with a
striking line or title. After doing the invitation, attach it to
an email message. Gather the email addresses of those
invited, which you can secure through your mobile phone
or the Internet (company site, social networking sites,
etc.). Send the message to the invited parties. Of course,
an actual invitation is still better than an emailed invite.
So just save this method for emergencies.
5. Backup for Your Phone Book
Mobile phones are becoming smaller and more advanced as each year passes. A brand new model can
easily be lost to muggers or through sheer absent mindedness. The funny thing is, many cell phone
users grieve more over their lost contacts than the actual phone. In your case, you can save all of your
contacts if you write them down in your email account’s contact list. The list will store their names and
numbers, even if you don’t have their email addresses.
6. Unconventional Brainstorming
For projects and group presentations, scheduling a meeting can be
a problem, especially if the team members live far away from one
another. Email comes as an unconventional solution to this
concern. The people who cannot attend the meeting can send their
suggestions, comments and proposals by shooting mail to the other
members. The others will then reply their own set of comments
and suggestions, creating a cycle. The cycle continues until a solid
concept is formulated.

7. Archiving Important Documents and Conversations


Remembering every detail of a conversation is not easy. In fact, some people take notes or use voice
recorders to capture the whole thing. You can eliminate the stress of recalling details simply by having
an email conversation with the other party. With the exchange of online messages, everything you need
to know and recall are found in your account’s inbox. You can even track down each of your own
replies by viewing the sent items folder.
To make things easier, you can categorize the other party/ies into a group, using your email settings.
The messages from the group will be stored in a separate folder. You can then view the folder’s
contents and weed out all the important messages in an instant.
8. Prank
Want to give your friends and co-workers a jolt? You can look no further than your email account.
Change the name set in your account into your boss’ or your grandfather’s name. Message your
“victims” with a stern lecture about their behavior. Not before long, you’ll receive calls from your
buddies regarding the email. Let them off the hook when they can’t take the heat any longer. Just keep
watch on the email addresses in your inbox. Some of them might retaliate pretty soon.
9. Patching Things Up with Enemies

Page- 13
Chapter Fourteen Internet and MIS

After a heated issue, facing your enemy would seem awkward. You can kill the unnecessary tension by
shooting him/her an email instead. Explain your points in your message and why you’re sorry for
everything that happened. If you construct your message in a civil and objective tone, your enemy will
soften his/her stance on the matter and send you an apology email as well. Remember, peace sells, if
you make others feel the peace residing in you.
10. Collecting Payments
For organization heads, sending the bill through snail mail takes too much time, especially if you badly
need funds for a project. The subject of the mailman, losing the bill, also comes in the picture. You can
get funds faster if you email your members their billing statements. That way, they can settle their
obligations, the moment they open their emails.
The email, being a convenient form of communicating information, has figured in the lives of many
people. The truth is, checking and sending mail has become part of their routines. Once you discover
everything that you can do with the service, almost every situation will swing in your favor.
Technology, after all, is made to make daily life a bit more tolerable.

Web browser
A web browser is a software application for retrieving, presenting, and traversing information
resources on the World Wide Web. An information resource is identified by a Uniform Resource
Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in
resources enable users easily to navigate their browsers to related resources. A web browser can also be
defined as an application software or program designed to enable users to access, retrieve and view
documents and other resources on the Internet.

Although browsers are primarily intended to access the World Wide Web, they can also be used to
access information provided by web servers in private networks or files in file systems. The major web
browsers are Internet Explorer, Firefox, Google Chrome, Safari, and Opera.

Functions of Web Browser


The primary purpose of a web browser is to bring information resources to the user. This process begins
when the user inputs a Uniform Resource Locator (URL), for example http://en.wikipedia.org/, into the
browser. The prefix of the URL determines how the URL will be interpreted. The most commonly used
kind of URI starts with http: and identifies a resource to be retrieved over the Hypertext Transfer
Protocol (HTTP). Many browsers also support a variety of other prefixes, such as https: for HTTPS, ftp:
for the File Transfer Protocol, and file: for local files. Prefixes that the web browser cannot directly
handle are often handed off to another application entirely. For example, mailto: URIs are usually
passed to the user's default e-mail application, and news: URIs are passed to the user's default
newsgroup reader.
In the case of http, https, file, and others, once the resource has been retrieved the web browser will
display it. HTML is passed to the browser's layout engine to be transformed from markup to an
interactive document. Aside from HTML, web browsers can generally display any kind of content that
can be part of a web page. Most browsers can display images, audio, video, and XML files, and often
have plug-ins to support Flash applications and Java applets. Upon encountering a file of an
unsupported type or a file that is set up to be downloaded rather than displayed, the browser prompts the
user to save the file to disk.

Page- 14
Chapter Fourteen Internet and MIS

Information resources may contain hyperlinks to other information resources. Each link contains the
URI of a resource to go to. When a link is clicked, the browser navigates to the resource indicated by
the link's target URI, and the process of bringing content to the user begins again.

Language of Internet
The prevalent language for communication on the Internet is English. This be a result of the Internet’s
origins, as well as English’s role as a lingua franca. It may also be related to the poor capability of early
computers, largely originating in the United States, to handle characters other than those in the English
variant of the Latin alphabet.

After English (30% of Web visitor) the most requested languages on the World Wide Web are Chinese
(17%), Spanish (9%), French (5%) and German(5%).

By continent, 38% of the Worlds Internet users are based in Asia, 27% in Europe, 18% in North
America, 10% in Latin America and the Caribbean and 7% in Australia.

The Internet access via Mobile devices


The Internet can now be accessed virtually anywhere by numerous means. Mobile phones, data cards,
handheld game consoles and cellular routers allow users to connect to the Internet from anywhere there
is a cellular network supporting that device’s technology.

Within the limitations imposed by the small screen and other limited facilities of such a pocket-sized
device, all the services of the Internet, including email and web browsing, may be available in this way.
Service provides may restrict the range of these services and charges for data access may be significant,
compared to home usage.

Common uses of Internet


Uniform Resource Locator (URL): URL is a type of Uniform Resource Identifier (URI) that specifies
where an identified resource is available and the mechanism for retrieving it. In some cases URL has
also stood for Ultimate Resource Locator.

In popular usage and in many technical documents and verbal discussions it is often, imprecisely and
confusingly, used as a synonym for URI.

The confusion in usage stems from historically different interpretations of the semantics of the terms
involved. In popular language, a RL is also referred to as a Web address.

The term domain name has multiple related meanings:

 Hostnames that identify computers on the Internet. These names appear as a component in
Uniform Resource Locators (URLs) for Internet resources such as web sites.
 Registered domain names, which are administered by domain name registrars.
 Names used to define realms of administrative autonomy, authority or control, based on the
Domain Name System (DNS).

Page- 15
Chapter Fourteen Internet and MIS

Table 14.2: What Can I do on the Internet?

Task Description

Send and Receive


E-mail. Exchanging electronic mail (or e-mail) is the most used and most
popular feature on the Internet. Just like regular paper mail, you can
send and receive e-mail with people around the world, as long as
they have access to a computer and the Internet. Unlike regular
paper mail, e-mail is usually delivered to its destination almost
instantly.
Browse the World Wide The World Wide Web is what most people think of when then think
Web. of the Internet—although it’s really only a part of the Internet. The
World Wide Web is an enormous collection of interconnected
documents stored on Web servers all over the world. The World
Wide Web has information on every subject imaginable
Join online discussions Newsgroups are discussion groups on the Internet that you can join
with newsgroups. to read and post messages to and from people with similar interests.
There are thousands of newsgroups on topics such as computers,
education, romance, hobbies, politics, religion, and more.

Chat with other online Chatting lets you communicate with people on the Internet
Users. instantly—no matter how far away they are! Most chats are text-
based, meaning you have to type when you converse with people on
the Internet. A growing number of chats have voice and even video
capabilities—all without having to pay long distance changes.

Download software. You can download pictures, demo programs, patches and drivers for
your computer, and many other types of files and save them to your
computer
Listen to music and You can listen to sound on the Web, such as radio stations, or music
watch videos by

IP address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network interface identification
and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An
address indicates where it is. A route indicates how to get there.
IP addresses are binary numbers, but they are usually stored in text files and displayed in human-
readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).

Page- 16
Chapter Fourteen Internet and MIS

The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally
and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet
registries (Internet service providers) and other entities.

The World Wide Web


Many people use the term Internet and World Wide Web interchangeably, but, the two terms are not
synonymous.
The World Wide Web is a huge set of interlinked documents, images and other resources, linked by
hyperlinks and URLs. These hyperlinks and URLs allow the web servers and other machines that store
originals, and cached copies, of these resources to deliver them as required using HTTP. HTTP is only
one of the communication protocols used on the Internet.
Web services also use HTTP to allow software systems to communicate in order to share and exchange
business logic and data.

Voice Telephony (VoIP)


VoIP stands for Voice over IP, where IP refers to the Internet Protocol that underlies all Internet
communication. This phenomenon began as an optional two-way voice extension to some of the instant
messaging systems that took of around the year 2000. In recent years many VoIP systems have become
as easy to use and as convenient as a normal telephone. In recent years many VoIP systems have
become an easy to use and as convenient as a normal telephone. The benefit is that, as the Internet
carries the actual voice traffic, VoIP can be free or cost much less than a normal telephone call,
especially over long distances and especially for those with always-on Internet connections such as
cable or ADSL.
Thus VoIP is maturing into a viable alternative to traditional telephones. Interoperability between
different providers has improved and the ability to call from a traditional telephone is available. Simple,
inexpensive VoIP modems are now available that eliminate the need for a PC.
VoIP is also known as:
 IP Telephony
 Internet Telephony
 Broadband Telephony
 Broadband Phone
 Voice Over Broadband

Internet Protocol Suite (commonly known as TCP/IP)


The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used
for the Internet and other similar networks. It is named from two of the most important protocols in it:
the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two
networking protocols defined in this standard.

Page- 17
Chapter Fourteen Internet and MIS

HTML
HTML, which stands for HyperText Markup Language, is the predominant markup language for
web pages. HTML elements are the basic building-blocks of webpages.
HTML is written in the form of HTML elements consisting of tags, enclosed in angle brackets (like
<html>), within the web page content. HTML tags normally come in pairs like <h1> and </h1>. The
first tag in a pair is the start tag, the second tag is the end tag (they are also called opening tags and
closing tags). In between these tags web designers can add text, tables, images, etc.
The purpose of a web browser is to read HTML documents and compose them into visual or audible
web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of
the page.
HTML elements form the building blocks of all websites. HTML allows images and objects to be
embedded and can be used to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes
and other items. It can embed scripts in languages such as JavaScript which affect the behavior of
HTML WebPages.

Hypertext Transfer Protocol (HTTP)


HTTP goes for Hypertext Transfer Protocol, the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers
should take in response to various commands. For example, when you enter a URL in your browser,
this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested
Web page. HTTP is called a stateless protocol because each command is executed independently,
without any knowledge of the commands that came before it. This is the main reason that it is difficult
to implement Web sites that react intelligently to user input. This shortcoming of HTTP is being
addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies.

File Transfer Protocol (FTP)


File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to
another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and
utilizes separate control and data connections between the client and server. FTP users may authenticate
themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured
to allow it. The first FTP client applications were interactive command-line tools, implementing
standard commands and syntax. Graphical user interface clients have since been developed for many of
the popular desktop operating systems in use today.

Electronic Commerce
Conducting business online. Selling goods, in the traditional sense, is possible to do electronically
because of certain software programs that run the main functions of an e-commerce Web site, including
product display, online ordering, and inventory management. The software resides on a commerce
server and works in conjunction with online payment systems to process payments. Since these servers
and data lines make up the backbone of the Internet, in a broad sense, e-commerce means doing
business over interconnected networks.
The definition of e-commerce includes business activities that are business-to-business (B2B), business-
to-consumer (B2C), extended enterprise computing (also known as "newly emerging value chains"), d-
commerce, and m-commerce. E-commerce is a major factor in the U.S. economy because it assists

Page- 18
Chapter Fourteen Internet and MIS

companies with many levels of current business transactions, as well as creating new online business
opportunities that are global in nature.
Here are a few examples of e-commerce:
 accepting credit cards for commercial online sales
 generating online advertising revenue
 trading stock in an online brokerage account
 driving information through a company via its intranet
 driving manufacturing and distribution through a value chain with partners on an extranet
 selling to consumers on a pay-per-download basis, through a Web site

Types of E-Commerce Technology


E-Commerce Technology
With the preceding in mind, the dynamic nature of the new economy, and particularly the Internet, calls
for decision makers to develop policies that stimulate growth and advance consumer interests. But, in
order to create the foundation for the rapid growth of e-commerce, enterprises must adopt the effective
e-commerce technology policies that embrace the following four crucial principles:
Strong intellectual property protection: Innovation drives e-commerce technology, and rewarding
creativity fosters innovation. Thus, strong copyright, patent, and other forms of intellectual property
protection are key to invigorating the information economy.
Online trust: security and privacy: Without consumer confidence in the safety, security, and privacy
of information in cyberspace, there will be no e-commerce and no growth. Protecting information and
communications on the Internet is an absolute prerequisite to the continued success of the Internet and
the information economy
Free and open international trade: Closed markets and discriminatory treatment will stifle e-business.
The Internet is a global medium, and the rules of the information economy must reflect that fact. Only
in an open, free market will the Internet’s potential be realized.
Investing in an e-commerce technology infrastructure: Supporting the physical infrastructure
necessary to deliver digital content (primarily through telecommunications deregulation and
government efforts to reduce the digital divide) is vital to spurring technological growth.

There are 6 basic types of e-commerce:


1. Business-to-Business (B2B)
2. Business-to-Consumer (B2C)
3. Consumer-to-Consumer (C2C)
4. Consumer-to-Business (C2B).
5. Business-to-Administration (B2A)
6. Consumer-to-Administration (C2A)

1. Business-to-Business (B2B)
Business-to-Business (B2B) e-commerce encompasses all electronic transactions of goods or services
conducted between companies. Producers and traditional commerce wholesalers typically operate with
this type of electronic commerce.
2. Business-to-Consumer (B2C)

Page- 19
Chapter Fourteen Internet and MIS

The Business-to-Consumer type of e-commerce is distinguished by the establishment of electronic


business relationships between businesses and final consumers. It corresponds to the retail section of e-
commerce, where traditional retail trade normally operates.
These types of relationships can be easier and more dynamic, but also more sporadic or discontinued.
This type of commerce has developed greatly, due to the advent of the web, and there are already many
virtual stores and malls on the Internet, which sell all kinds of consumer goods, such as computers,
software, books, shoes, cars, food, financial products, digital publications, etc.

3. Consumer-to-Consumer (C2C)
Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions of goods or
services conducted between consumers. Generally, these transactions are conducted through a third
party, which provides the online platform where the transactions are actually carried out.

4. Consumer-to-Business (C2B)
In C2B there is a complete reversal of the traditional sense of exchanging goods. This type of e-
commerce is very common in crowd sourcing based projects. A large number of individuals make their
services or products available for purchase for companies seeking precisely these types of services or
products.

5. Business-to-Administration (B2A)
This part of e-commerce encompasses all transactions conducted online between companies and public
administration. This is an area that involves a large amount and a variety of services, particularly in
areas such as fiscal, social security, employment, legal documents and registers, etc. These types of
services have increased considerably in recent years with investments made in e-government.

6. Consumer-to-Administration (C2A)
The Consumer-to-Administration model encompasses all electronic transactions conducted between
individuals and public administration.

Examples of applications include:


 Education – disseminating information, distance learning, etc.
 Social Security – through the distribution of information, making payments, etc.
 Taxes – filing tax returns, payments, etc.
 Health – appointments, information about illnesses, payment of health services, etc.

Advantages of e-commerce
The main advantage of e-commerce is its ability to reach a global market, without necessarily implying
a large financial investment. The limits of this type of commerce are not defined geographically, which
allows consumers to make a global choice, obtain the necessary information and compare offers from
all potential suppliers, regardless of their locations.
By allowing direct interaction with the final consumer, e-commerce shortens the product distribution
chain, sometimes even eliminating it completely. This way, a direct channel between the producer or
service provider and the final user is created, enabling them to offer products and services that suit the
individual preferences of the target market.
E-commerce allows suppliers to be closer to their customers, resulting in increased productivity and
competitiveness for companies; as a result, the consumer is benefited with an improvement in quality

Page- 20
Chapter Fourteen Internet and MIS

service, resulting in greater proximity, as well as a more efficient pre and post-sales support. With these
new forms of electronic commerce, consumers now have virtual stores that are open 24 hours a day.

Cost reduction is another very important advantage normally associated with electronic commerce. The
more trivial a particular business process is, the greater the likelihood of its success, resulting in a
significant reduction of transaction costs and, of course, of the prices charged to customers.

Disadvantages of e-commerce
The main disadvantages associated with e-commerce are the following:
 Strong dependence on information and communication technologies (ICT);
 Lack of legislation that adequately regulates the new e-commerce activities, both nationally
and internationally;
 Market culture is averse to electronic commerce (customers cannot touch or try the products);
 The users’ loss of privacy, the loss of regions’ and countries’ cultural and economic identity;
 Insecurity in the conduct of online business transactions.

Management information system (MIS)

A management information system (MIS) is a system that provides information needed to manage
organizations effectively. Management information systems involve three primary resources:
technology, information, and people. It's important to recognize that while all three resources are key
components when studying management information systems, the most important resource is people.
Management information systems are regarded as a subset of the overall internal controls procedures in
a business, which cover the application of people, documents, technologies, and procedures used by
management accountants to solve business problems such as costing a product, service or a business-
wide strategy.

Types of Information Management Systems

There are many types of information management systems in the market that provide a wide range of
benefits for companies.
 Transaction processing systems (TPS) collect and record the routine transactions of an
organization. Examples of such systems are sales order entry, hotel reservations, payroll,
employee record keeping, and shipping.
 Management information systems (MIS) produce fixed, regularly scheduled reports based on
data extracted and summarized from the firm’s underlying transaction processing systems
(TPS) to middle and operational level managers to provide answers to structured and semi-
structured decision problems.
 Decision-support systems (DSS) are computer program applications used by middle
management to compile information from a wide range of sources to solve problems and make
decisions.
 Executive support systems (ESS) is a reporting tool that provides quick access to summarized
reports coming from all company levels and departments such as accounting, human resources
and operations.

Page- 21
Chapter Fourteen Internet and MIS

Advantages of Information Management Systems

The following are some of the benefits that can be attained for different types of information
management systems:

(1) The company is able to highlight their strength and weaknesses due to the presence of revenue
reports, employee performance records etc. The identification of these aspects can help the company to
improve their business processes and operations.

(2) The availability of the customer data and feedback can help the company to align their business
processes according to the needs of the customers. The effective management of customer data can help
the company to perform direct marketing and promotion activities.

(3) Information is considered to be an important asset for any company in the modern competitive
world. The consumer buying trends and behaviors can be predicted by the analysis of sales and revenue
reports from each operating region of the company.

Page- 22
Chapter Fourteen Internet and MIS

Exercise
1: What do you mean by Internet?

2: Describe about Internet Structure.

3: Describe Internet Language.

4: Write about the Common uses of Internet.

5: What can you do on the Internet?

6: What three things you’ll need to connect to the Internet

7: Describe the process of Displaying a Specific Web Page

8: Describe the process of Saving Pictures and Files to Disk (Downloading)

9: Describe about E-mail with its advantages and disadvantages.

10: Describe about the World Wide Web

11: Describe about Voice Telephony (VoIP).

12: Describe about Protocols and Standards.

13: Describe about Internet Protocol Suite (commonly known as TCP/IP)

14: Define E-Commerce and Discus different types of E-Commerce Technology

15: Write short note on ATM, Teleconference, Videoconferencing, Expert system and Robotics

16: Discus Mobile Electronic Commerce

17: Discus Electronic Payment Systems.

18: Discus HTML, HTTP and FTP

19: Describe the process of Internet access via Mobile devices

20: Describe Management information system (MIS).

Page- 23

You might also like