CP Fit
CP Fit
FOR
COURSE: BBA
SEMESTER: I
YEAR: 2024-25
Subject Faculty: Ms. Preeti Taneja, Ms. Ankita Gulati, Ms. Gargi Mukherjee,
The institute has over the past few years emerged in the lead with a vision of Leadership in
professional education through innovation and excellence. This excellence is sustained by
consistent value enhancement and initiation of value-added academic processes in institute’s
academic systems. Based on the fabulous architecture and layout on the lines of Nalanda
Vishwa Vidyalaya, the institute is a scenic marvel of lush green landscape with modern
interiors. The Institute which is ISO 9001:2015 certified is under the ambit of Bharati
Vidyapeeth University (BVU), Pune as approved by Govt. of India on the recommendation of
UGC under Section 3 of UGC Act vide its letter notification No. F. 9 – 16 / 2004 – U3 dated
25th February, 2005.
Strategically located in West Delhi on the main Rohtak Road, BVIMR, New Delhi has a
splendid layout on sprawling four acres of plot with 'state-of-art' facilities with all class rooms,
Library Labs, Auditorium etc., that are fully air-conditioned. The Institute has an adjacent Metro
station, “Paschim Vihar (East)”, connecting the entire Delhi and NCR.
We nurture our learners to be job providers rather than job seekers. This is resorted to by
fostering the skill and enhancement of knowledge base of our students through various
extracurricular, co-curricular and curricular activities by our faculty, who keep themselves
abreast by various research and FDPs and attending Seminars/Conferences. The Alumni has a
key role here by inception of SAARTHI Mentorship program who update and create
professional environment for learners centric academic ambiance and bridging industry-
academia gap.
Our faculty make distinctive contribution not only to students but to Academia through
publications, seminars, conferences apart from quality education. We also believe in enhancing
corporate-level interaction including industrial projects, undertaken by our students under the
continuous guidance of our faculty. These form the core of our efforts which has resulted in
being one of the premier institutes of management.
At BVIMR, we are imparting quality education in management at Doctorate, Post Graduate and
Under Graduate levels
TABLE OF CONTENTS
S.NO CONTENTS PAGE NO
1 Course outline VI
6 Session Plan XI
7 Study Notes XI
9 Previous Year
DESCRIPTION OF COURSE
Expected Outcomes:
Gain the basic knowledge of Computer Technology
Know the basics of computer technology and Networking
Practically use the tools like Microsoft Word, Microsoft Excel and Power point
Understand the E-commerce technology and its applications
Understand the implementation of Information Systems in organizations
Get familiarity with new terms and trends of computer technology
3. Course contents
Unit Contents
Reference Books:
Online Resources:
MOOCs:
CO-PO mapping
Course Outcomes:
At the successful completion of the course the learner
will be able to
CO1: Understand the fundamental of computer and hardware components that make up a
computer’s hardware and the role of each of these components
CO2: Understand the difference between an operating system and an application program, and
what each is used for in a computer.
CO3: Describe some examples of computers and state the effect that the use of computer
technology has had on some common products
Possible Outcomes
On the successful completion of this Program, a student shall be able to:
1. The student will understand the basic working of computers and about hardware and
software.
2. They will be capable of recognizing and deploying the software and differentiate between
operating system and application program, and what each is used for in a computer.
3. They will come to know working with Microsoft Office, MS excel and MS office.
4. They will understand communications system, types of network, internet, WWW, emails.
5. Ability to lead themselves and others in the achievement of organizational goals,
contributing effectively to a team environment to work well with underlying systems.
6. Students will understand the E-commerce model and role of IT in it.
4. Evaluation Criteria:
Component Description Weight Objective
First Internal First internal question paper will be based on 10 To evaluate student’s
first 3 unit of syllabus. markscognitive skills (Think,
read, learn, remember,
reason, and pay
attention).
Second internal Second internal question paper will be based 10 To evaluate student’s
on last 2 unit of syllabus. marks cognitive skills (Think,
read, learn, remember,
reason, and pay
attention).
CES 1- Moodle Quiz will be conducted based on the different 5 marks To recall their subject
Based Quiz aspects of Computer Basic. learning.
5. Session Plan:
Session Topic Requirements: Learning outcomes
No Readings/ Cases
Module I: Introduction to Computers
11 Software and its needs, Types of S/W. System Handouts and notes
Software: Operating System, Utility Programs
Programming Language: Machine Language,
Assembly Language, High Level Language their
advantages & disadvantages.
16 REVISION
Module III: Data communication
17 Communication Process, Data Communication Handouts and notes Understands the
Networking &
communication
concepts
18 Data Transmission speed, Communication Types Handouts and notes
(modes)
19 Data Transmission Medias, Modem and its Handouts and notes
working, characteristics,
20 Types of Networks(LAN,MAN Handouts and notes
,WAN,PAN,CAN)
21 Types of topologies, LAN Topologies Handouts and notes
24 REVISION
25 CES II: class test
1 | Page
Studies ,Rohini Delhi and Training. Has hosted many quizzes,judged many events of singing and dancing for
inter college competitions . Member of Research group of ISTE.
Dr. Mansi Agnihotri earned her Ph.D. in March 2024 from the University School of Information,
Communication and Technology (USICT), Guru Gobind Singh Indraprastha University (GGSIPU). Her
thesis, titled "A New Metric to Identify Critically Affected Classes and Improving Their Quality Through
Refactoring," presents a novel approach to software quality. She worked as a full-time research scholar at
USICT, GGSIPU. She qualified UGC NET-JRF (DEC 2018) and availed UGC JRF and SRF during her
Ph.D. She holds a Master’s degree in Computer Applications. She has a good experience of research and has
published 6 research papers with SCIE, ESCI, Scopus indexing and has presented her work at 2 international
conferences. She has 4 years of experience of teaching as a research scholar. She has been a part of
organizing team for different Faculty Development Programme (FDP’s) conducted at USIC&T, GGSIPU.
She has taught Algorithm Analysis and Design (ADA), Data Structures (DS), C/C++, Object-Oriented
Software Engineering (OOSE), Object-Oriented Analysis and Design (OOAD), Software Testing (Lab),
Advance HTML with JavaScript and CSS.
Contact information
2 | Page
Course Title FUNDAMENTALS OF INFORMATION TECHNOLOGY
Course Code 106
No of credits 03 as per syllabus-(Expected no. of hours-20)
Department Management
Course Leader Ms. Preeti Taneja
Faculty Ms. Preeti Taneja Ms. Ankita Gulati, Ms. Gargi
Mukherjee, Dr. Mansi Agnihotri ,Ms. Apurva Gupta
Email [email protected],
[email protected]., [email protected] ,
[email protected] , [email protected]
Phone no 9999255738
Course Type Departmental
Offer in Academic Year 2024 -25 , BBA I sem
CES-1
3 | Page
Class test to be conducted as per schedule covering complete UNIT 1
CES-2
11. Innovative career opportunities due to high technology penetration in daily life
CES-3
4 | Page
STUDY NOTES
5 | Page
UNIT – I
Introduction, Definition, Characteristics of computer, Evolution, Generations of computer,
Classification of computers, Applications of computer, Advantages of computers, Block diagram
of computer
1.1 INTRODUCTION
A computer is an electronic machine that accepts data from the user, processes the data by
performing calculations and operations on it, and generates the desired output as results.
Computer components are divided into two major categories namely hardware and software.
Hardware is the machine itself and its connected devices such as monitor, keyboard, mouse etc.
Software are the set of programs that make use of hardware for performing various functions. 1.2
OBJECTIVES
The characteristics of computers that have made them so powerful and universally useful are speed,
accuracy, diligence, versatility and storage capacity. Let us discuss them briefly.
Speed
Computers work at an incredible speed. A powerful computer is capable of performing about 3-4
million simple instructions per second.
Accuracy
6
In addition to being fast, computers are also accurate. Errors that may occur can almost always be
attributed to human error (inaccurate data, poorly designed system or faulty instructions/programs
written by the programmer)
Diligence
Unlike human beings, computers are highly consistent. They do not suffer from human traits of
boredom and tiredness resulting in lack of concentration. Computers, therefore, are better than
human beings in performing voluminous and repetitive jobs.
Versatility
Computers are versatile machines and are capable of performing any task as long as it can be
broken down into a series of logical steps. The presence of computers can be seen in almost every
sphere – Railway/Air reservation, Banks, Hotels, Weather forecasting and many more.
Storage Capacity
Today’s computers can store large volumes of data. A piece of information once recorded (or stored)
in the computer, can never be forgotten and can be retrieved almost instantaneously.
A computer system consists of mainly four basic units; namely input unit, storage unit, central
processing unit and output unit. Central Processing unit further includes Arithmetic logic unit and
control unit.
A computer performs five major operations or functions irrespective of its size and make. These are
Computer Organization
a. Storage Unit: The storage unit is used for storing data and instructions before and after
processing.
b. Output Unit: The output unit is used for storing the result as output produced by the computer
after processing.
c. Processing: The task of performing operations like arithmetic and logical operations is called
processing. The Central Processing Unit (CPU) takes data and Computer’s memory can be classified
into two types; primary memory and secondary memory
7
Basic computer organization/Computer Architecture/Design
Computer Architecture/Design
A typical computer system has an Input Unit, a Central Processing Unit, Memory Unit and Output Unit. This
is also known as Von Neumann Architecture of the computer. Over the years the technology has changed but
basic design/architecture is not changed. The important
Input Unit:
The input unit links the external environment with the computer system. Data and instructions inputted to
the computer system through this unit. The data can be inputted to the computer by various means, it can
be entered through a keyboard, through a card reader, through a mouse etc. All the data supplied to the
computer is transformed into the binary codes. Unit called input interface accomplishes this
transformation. Input interface is designed to match the unique physical or electrical characteristics of
input devices with the requirements of the computer system for example Keyboard, Mouse, Joy stick,
Light Pen, Punched Cards, Optical Mark Reader, Magnetic Tape, Optical Character Reader etc.
Output Unit:
It links the computer with the external environment. The job of an output unit is just opposite of an input
unit. It supplies information and results of computation to the outside world. As computers work with
binary code, the results produced are also in the binary form. Hence, before supplying the results to the
outside world, it must be converted to human readable form. Unit called output interface accomplishes this
task. Output interface is
designed to match the unique physical or electrical characteristics of output devices (e.g. Monitor, Printer,
Plotter) with the requirement of the external environment.
8
Central Processing Unit:
The control unit and ALU of the computer are together known as the Central Processing Unit (CPU). As
in a human body, the brain takes all major decisions and controls all body parts, similarly, in a computer
system, all major computations are made by the CPU and is also responsible for activating and controlling
the operations of other units. The CPU performs the following functions:
1. Control Unit:
The control unit is able to maintain order and direct the operation of the entire system. By selecting,
interpreting, and decoding, it executes the program instructions. This unit acts as a central nervous system
for the computer. It manages and coordinates the entire computer system. It directs the flow of data
through the CPU, and to and from other devices. Control unit controls the input and output devices and the
passing of data to the Arithmetic/Logical Unit for computation. The control unit stores the CPU's
microcode, which contains the instructions for all the tasks the CPU can perform.
The Arithmetic Logic Unit (ALU) of a computer system is the place where the actual execution of the
instructions takes place during the processing operation. The data and instructions, stored in the primary
storage (RAM or Cache) prior to processing, are transferred as and when needed to the ALU. ALU uses
various CPU registers to store intermediate results of computations. The Final result of computations is
transferred back to the primary storage. After the completion of processing, the final results that are stored
in the primary storage unit are released to an output device or to a secondary storage device.
The ALU is designed to perform all the basic Arithmetic Operations – add, subtract, multiply, divide,
Relational Operations such as comparisons using < , <=, > , >=, == etc and Logical Operations such as AND,
OR, NOT.
The storage unit of the computer holds data and instructions that are entered through the input unit, before
they are processed. It preserves the intermediate and final results before these are sent to the output
devices. It also saves the data for the later use. The various storage devices of a computer system are
divided into two categories.
1. Primary Storage: Stores and provides very fast. This memory is generally used to hold the program
being currently executed in the computer, the data being received from the input unit, the intermediate and
final results of the program. The primary memory is temporary in nature. The data is lost, when the
9
computer is switched off. In order to store the data permanently, the data has to be transferred to the
secondary memory.
The cost of the primary storage is more compared to the secondary storage. Therefore most computers have
limited primary storage capacity.
2. Secondary Storage: Secondary storage is used like an archive. It stores several programs,
documents, data bases etc. The programs that you run on the computer are first transferred to the primary
memory before it is actually run. Whenever the results are saved, again they get stored in the secondary
memory. The secondary memory is slower and cheaper than the primary memory. Some of the commonly
used secondary memory devices are Hard disk, CD, etc.,
Memory Organization
RAM or Random Access Memory is the unit in a computer system. It is the place in a computer
where the operating system, application programs and the data in current use are kept temporarily
so that they can be accessed by the computer’s processor. It is said to be ‘volatile’ since its
contents are accessible only as long as the computer is on. The contents of RAM are no more
available once the computer is turned off.
ROM or Read Only Memory is a special type of memory which can only be read and contents of
which are not lost even when the computer is switched off. It typically contains manufacturer’s
instructions. Among other things, ROM also stores an initial program called the ‘bootstrap loader’
whose function is to start the operation of computer system once the power is turned on.
b. Secondary Memory
RAM is volatile memory having a limited storage capacity. Secondary/auxiliary memory is storage
other than the RAM. These include devices that are peripheral and are connected and controlled by
the computer to enable permanent storage of programs and data.
Secondary storage devices are of two types; magnetic and optical. Magnetic devices include hard disks
and optical storage devices are CDs, DVDs, Pen drive, Zip drive etc.
• Hard Disk
10
Fig. 1.3: Hard Disk
Hard disks are made up of rigid material and are usually a stack of metal disks sealed in a box. The
hard disk and the hard disk drive exist together as a unit and is a permanent part of the computer where
data and programs are saved. These disks have storage capacities ranging from 1GB to 80 GB and
more. Hard disks are rewritable.
Compact Disk
Compact Disk (CD) is portable disk having data storage capacity between 650-700 MB. It can
hold large amount of information such as music, full-motion videos, and text etc. CDs can be
either read only or read write type.
Digital Video Disk (DVD) is similar to a CD but has larger storage capacity and enormous clarity.
Depending upon the disk type it can store several Gigabytes of data. DVDs are primarily used to
store music or movies and can be played back on your television or the computer too. These are
not rewritable.
These devices are used to enter information and instructions into a computer for storage or
processing and to deliver the processed data to a user. Input/output devices are required for users
to communicate with the computer. In simple terms, input devices bring information INTO the
computer and output devices bring information OUT of a computer system. These input/output
devices are also known as peripherals since they surround the CPU and memory of a computer
system.
a) Input Devices
An input device is any device that provides input to a computer. There are many input devices, but
the two most common ones are a keyboard and mouse. Every key you press on the keyboard and
every movement or click you make with the mouse sends a specific input signal to the computer.
• Keyboard: The keyboard is very much like a standard typewriter keyboard with a few
additional keys. The basic QWERTY layout of characters is maintained to make it easy to use the
11
system. The additional keys are included to perform certain special functions. These are known as
function keys that vary in number from keyboard to keyboard. (see fig. 1.4)
• Mouse: A device that controls the movement of the cursor or pointer on a display screen. A
mouse is a small object you can roll along a hard and flat surface (Fig. 1.5). Its name is derived
from its shape, which looks a bit like a mouse. As you move the mouse, the pointer on the display
screen moves in the same direction.
• Trackball: A trackball is an input device used to enter motion data into computers or other
electronic devices. It serves the same purpose as a mouse, but is designed with a moveable ball on
the top, which can be rolled in any direction.
• Touchpad: A touch pad is a device for pointing (controlling input positioning) on a
computer display screen. It is an alternative to the mouse. Originally incorporated in laptop
computers, touch pads are also being made for use with desktop computers. A touch pad works by
sensing the user’s finger movement and downward pressure.
• Touch Screen: It allows the user to operate/make selections by simply touching the display
screen. A display screen that is sensitive to the touch of a finger or stylus. Widely used on ATM
machines, retail point-of-sale terminals, car navigation systems, medical monitors and industrial
control panels.
• Light Pen: Light pen is an input device that utilizes a light-sensitive detector to select
objects on a display screen. (Fig. 1.6)
• Magnetic ink character recognition (MICR): MICR can identify character printed with a
special ink that contains particles of magnetic material. This device particularly finds applications
in banking industry.
• Optical mark recognition (OMR): Optical mark recognition, also called mark sense reader
is a technology where an OMR device senses the presence or absence of a mark, such as pencil
mark. OMR is widely used in tests such as aptitude test.
• Bar code reader: Bar-code readers are photoelectric scanners that read the bar codes or
vertical zebra strips marks, printed on product containers. These devices are generally used in
super markets, bookshops etc.
12
• Scanner: Scanner is an input device that can read text or illustration printed on paper and
translates the information into a form that the computer can use. A scanner works by digitizing an
image. (Fig. 1.7)
b. Output Devices:
Output device receives information from the CPU and presents it to the user in the desired from.
The processed data, stored in the memory of the computer is sent to the output unit, which then
converts it into a form that can be understood by the user. The output is usually produced in one of
the two ways – on the display device, or on paper (hard copy).
Monitors come in two major types — LCD or CRT, but others exist, too, like OLED. CRT
monitors look much like old-fashioned televisions and are very deep in size. LCD monitors are
much thinner, use less energy, and provide a greater graphics quality. OLED is an improvement on
LCD that provides even better color and and viewing angles but also requires more power.
Today, all monitors are created using flat panel display technology, usually backlit with LEDs. The
image to the right shows an ASUS LCD monitor.
• Printer: Printers are used to produce paper (commonly known as hardcopy) output. Based
on the technology used, they can be classified as Impact or Non-impact printers.
Impact printers use the typewriting printing mechanism wherein a hammer strikes the paper through
a ribbon in order to produce output. Dot-matrix and Character printers fall under this
13
category.
Non-impact printers do not touch the paper while printing. They use chemical, heat or electrical
signals to etch the symbols on paper. Inkjet, Deskjet, Laser, Thermal printers fall under this
category of printers.
•
• Plotter: Plotters are used to print graphical output on paper. It interprets computer
commands and makes line drawings on paper using multicoloured automated pens. It is
capable of producing graphs, drawings, charts, maps etc. (Fig. 1.9)
• Facsimile (FAX): Facsimile machine, a device that can send or receive pictures and text
over a telephone line.
• Sound cards and Speaker(s): An expansion board that enables a computer to manipulate
and output sounds. Sound cards are necessary for nearly all CD-ROMs and have become
commonplace on modern personal computers. Sound cards enable the computer to output
sound through speakers connected to the board, to record sound input from a microphone
connected to the computer, and manipulate sound stored on a disk.
14
Computer software is the set of programs that makes the hardware perform a set of tasks in
particular order. Hardware and software are complimentary to each other. Both have to work
together to produce meaningful results. Computer software is classified into two broad categories;
system software and application software.
System software consists of a group of programs that control the operations of a computer
equipment including functions like managing memory, managing peripherals, loading, storing, and
is an interface between the application programs and the computer. MS DOS (Microsoft’s Disk
Operating System), UNIX are examples of system software.
Software that can perform a specific task for the user, such as word processing, accounting,
budgeting or payroll, fall under the category of application software. Word processors,
spreadsheets, database management systems are all examples of general purpose application
software.
• Word processing software: The main purpose of this software is to produce documents.
MS-Word, Word Pad, Notepad and some other text editors are some of the examples of
word processing software.
• Database software: Database is a collection of related data. The purpose of this software is
to organize and manage data. The advantage of this software is that you can change the
way data is stored and displayed. MS access, dBase, FoxPro, Paradox, and Oracle are some
of the examples of database software.
• Spread sheet software: The spread sheet software is used to maintain budget, financial
statements, grade sheets, and sales records. The purpose of this software is organizing
numbers. It also allows the users to perform simple or complex calculations on the numbers
entered in rows and columns. MS-Excel is one of the example of spreadsheet software.
• Presentation software: This software is used to display the information in the form of
slide show. The three main functions of presentation software is editing that allows
insertion and formatting of text, including graphics in the text and executing the slide
shows. The best example for this type of application software is Microsoft PowerPoint.
• Multimedia software: Media players and real players are the examples of multimedia
software. This software will allow the user to create audio and videos. The different forms
of multimedia software are audio converters, players, burners, video encoders and
decoders.
SOFTWARE ACQUISITION:
Different kinds of software are made available for use to users in different ways.
The user may have to purchase the software, can download for free from the
Internet, or can get it bundled along with the hardware.
Retail Software is off-the-shelf software sold in retail stores. It comes with printed
manuals and installation instructions. For example, Microsoft Ms Office
15
OEM Software stands for “Original Equipment Manufacturer” software. It refers
to software which is sold, and bundled with hardware. Microsoft sells its operating
system as OEM software to hardware dealers. OEM software is sold at reduced
price, without the manuals, packaging and installation instructions. For example,
Dell computers are sold with the “Windows 7” OS pre-loaded on them.
Demo Software is designed to demonstrate what a purchased version of the
software is capable of doing and provides a restricted set of features. To use the
software, the user must buy a fully- functional version.
Shareware is a program that the user is allowed to try for free, for a specified
period of time, as defined in the license. It is downloadable from the Internet.
When the trial period ends, the software must be purchased or uninstalled.
Freeware is software that is free for personal use. It is downloadable from the
Internet. The commercial use of this software may require a paid license. The
author of the freeware software is the owner of the software, though others may use
it for free.
Open source software is software whose source code is available and can be
customized and altered within the specified guidelines laid down by the creator.
open-source software has restrictions on their use and modification, redistribution
limitations, and copyrights.
Linux, Apache, Firefox, Open Office are some examples of open-source software.
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of
malware can include computer viruses, worms, Trojan horses and spyware. These malicious
programs can perform a variety of different functions such as stealing, encrypting or deleting
sensitive data, altering or hijacking core computing functions and monitoring users' computer
activity without their permission.
16
• A virus is the most common type of malware which can execute itself and spread by
infecting other programs or files. The first known computer virus was developed in
1971 by Robert Thomas, an engineer at BBN Technologies. Known as the "Creeper"
virus, The "Brain" virus, which initially appeared in 1986, is considered to be the first
MS-DOS personal computer virus. Brain was a boot sector virus; he "Jerusalem" virus,
also known as the "Friday the 13th" virus, was discovered in 1987 and spread throughout
Israel via floppy disks and email attachments. Cabir" virus is the first verified example
of a mobile phone virus for the now defunct Nokia Symbian operating system..
There are some indicators that will tell you that your computer is infected:
• A worm can self-replicate without a host program and typically spreads without any
human interaction or directives from the malware authors.
• A Trojan horse is designed to appear as a legitimate program in order to gain access
to a system. Once activated following installation, Trojans can execute their malicious
functions.
• Spyware is made to collect information and data on the device user and observe their
activity without their knowledge.
• Ransomware is designed to infect a user's system and encrypt the data. Cybercriminals
then demand a ransom payment from the victim in exchange for decrypting the system's
data.
• Keyloggers, also called system monitors, are used to see nearly everything a user does
on their computer. This includes emails, opened web-pages, programs and keystrokes.
Antivirus software is a class of program designed to prevent, detect and remove malware infections on
individual computing devices, networks and IT systems.
Antivirus software, originally designed to detect and remove viruses from computers, can also
protect against a wide variety of threats, including other types of malicious software, such as
keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets and
ransomware.
17
What Does AntiVirus Software Do?
Several different companies build antivirus software and what each offer can vary but all perform
some essential functions:
• Scan specific files or directories for any malware or known malicious patterns
• Allow you to schedule scans to automatically run for you
• Allow you to initiate a scan of a particular file or your entire computer, or of a CD or
flash drive at any time.
• Remove any malicious code detected –sometimes you will be notified of an infection
and asked if you want to clean the file, other programs will automatically do this behind
the scenes.
• His efforts established a number of principles that are fundamental to the design of any digital
computer
18
19
1.9 Classification of computers
Microcomputers:
Microcomputers are relatively small and low-cost. They consist of a CPU, an input unit, an output unit, a
storage unit, and the software. Although microcomputers are stand-alone machines, they can be connected
together to create a network of computers that can serve more than one user. Microcomputers include
desktop computers, notebook computers or laptops, tablet computers
Minicomputers:
Minicomputers are digital computers, generally used in multi-user systems. They have high processing
speed and high storage capacity than the microcomputers. Minicomputers can support up to 4 – 200 users
simultaneously. The users can access the minicomputer through their PCs or terminal. They are used for
real-time applications in industries, research centers, etc. PDP 8, IBM (8000 series) are some of the widely
used minicomputers.
Mainframe Computers:
Mainframe computers are multi-user, multi-programming, and high-performance computers. They operate
at a very high speed, have a very large storage capacity, and can handle the workload of many users.
20
Mainframe computers are large and powerful systems generally used in centralized databases. The user
accesses the mainframe computer via a terminal that may be a dumb terminal, an intelligent terminal, or a
PC. A dumb terminal cannot store data or do the processing of its own. It has the input and output device
only. An intelligent terminal has the input and output device, can do processing, but, cannot store data of
its own. The dumb and the intelligent terminal use the processing power and the storage facility of the
mainframe computer. Mainframe computers are used in organizations like banks or companies, where
many people require frequent access to the same data. Some examples of mainframes are CDC 6600 and
IBM ES000 series.
Supercomputers:
Supercomputers are the fastest and most expensive machines. They have high processing speed compared
to other computers. The speed of a supercomputer is generally measured in FLOPS (Floating Point
Operations Per Second). Some of the faster supercomputers can perform trillions of calculations per second.
Supercomputers are built by interconnecting thousands of processors that can work in parallel.
Supercomputers are used for highly calculation-intensive tasks, such as weather forecasting, climate
research (global warming), molecular research, biological research, nuclear research, and aircraft design.
They are also used in major universities, military agencies, and scientific research laboratories. Some
examples of supercomputers are IBM Roadrunner, IBM Blue Gene, and Intel ASCI red. PARAM is a
series of supercomputers assembled in India by C-DAC (Center for Development of Advanced
Computing), in Pune. PARAM Padma is the latest machine in this series. The peak computing power of
PARAM Padma is 1 TeraFLOP (TFLOP).
Analog : An analog computer is a form of computer that uses the continuously-changeable aspects of
physical fact such as electrical, mechanical, or hydraulic quantities to model the problem being solved.
Any thing that is variable with respect to time and continuous can be claimed as analog just like an
analog clock measures time by means of the distance traveled for the spokes of the clock around the
circular dial.
Digital : A computer that performs calculations and logical operations with quantities represented as
digits, usually in the binary number system of “0” and “1”, “Computer capable of solving problems by
processing information expressed in discrete form. from manipulation of the combinations of the binary
digits, it can perform mathematical calculations, organize and analyze data, control industrial and other
processes, and simulate dynamic systems such as global weather patterns.
Hybrid : A computer that processes both analog and digital data, Hybrid computer is a digital computer
that accepts analog signals, converts them to digital and processes them in digital form.
Which of the following devices can be sued to directly image printed text?
a. OCR b. OMR
21
The output quality of a printer is measured by
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
22
VDU is also called
a. Screen b. Monitor
c. Both 1 & 2 d. printer
A modem is connected to
a. a telephone line b. a keyboard
c. a printer d. a monitor
Trackball is a...........
a. Input device b. Output device
c. Programming language d. Software
23
UNIT 2
Hardware vs Software
24
Data Storage
• Data storage is a common term for archiving data or information in a storage medium for use by a
computer.
• It’s like a hierarchy of comprehensive storage solution for fast access to computer resources.
• A computer stores data or information using several methods, which leads to different levels of data
storage.
• Primary storage is the most common form of data storage which typically refers to the random access
memory (RAM).
• It refers to the main storage of the computer because it holds data and applications that are currently in
use by the computer.
• Then, there is secondary storage which refers to the external storage devices and other external media
such as hard drive and optical media.
Data Retrieval
25
• In databases, data retrieval is the process of identifying and extracting data from a database, based on
a query provided by the user or application.
• It enables the fetching of data from a database in order to display it on a monitor and/or use within an
application.
• Data retrieval typically requires writing and executing data retrieval or extraction commands or
queries on a database. Based on the query provided, the database looks for and retrieves the data
requested.
• Applications and software generally use various queries to retrieve data in different formats.
• Primary storage is commonly referred to as simply “primary memory” which is volatile in nature such
as the RAM which is a primary memory and tends to lose data as soon as the computer reboots or
loses power.
• It holds data or information that can be directly accessed by the central processing unit.
• RAM is stored in integrated circuits for immediate access with minimum or no delay.
• It’s a high-speed data storage medium which is directly connected to the processing unit via the
memory bus, allowing active programs to interact with the processor.
• Simple speaking, primary storage refers to internal storage devices that provide fast and efficient
access to data or information. However, it stores data or applications for a short period of time while
the computer is running.
• Other examples of primary storage include Read Only Memory (short for ROM), which represents
both the primary memory of the computer and a non-volatile storage because it’s able to retain data
and applications even if the device loses power.
• PROM (Programmable read-only memory) which is kind of a memory chip that is programmed after
the memory is constructed. PROM is a sophisticated version of ROM that can be programmed once
after it has been created.
• Cache memory which is also a common example of primary storage that is directly integrated with the
CPU chip to provide high-speed data access for future requests.
• It’s more of a volatile memory of the computer that is placed between the CPU and the main memory.
• Secondary storage is yet another ideal storage solution in the computer’s memory hierarchy that is
used to store data or information on the long term basis, more like permanently.
26
• Unlike primary storage, they are non-volatile memory or commonly referred to as external memory
that are not directly accessed by the central processing unit.
• They are also called as auxiliary storage which can be both internal and external, plus beyond the
primary storage.
• Because they are not directly accessed by the I/O channels, they are relatively slower than primary
storage devices when it comes to data access.
• However, it’s one of the most valuable assets of data storage hierarchy that is capable of storing
applications and programs permanently.
• Unlike RAM, it’s a long-term storage solution that expands the data storage capability.
• Common example of secondary storage includes hard disk drives (HDD) which is the most common
data storage device used to store and retrieve digital information.
• It’s a high-capacity secondary storage device which also comes in internal storage mediums as internal
hard drives.
• It’s one of the most versatile mediums of data storage that uses magnetic storage to archive
applications or data permanently.
• Other examples of secondary storage include optical media such as CDs and DVDs which are capable
of storing any substantial amount of data; magnetic tapes which are conventional methods of data
storage used across corporate environments.
• However, secondary storage devices are quite slower than their primary counterparts, which make
them relatively cheaper but equally efficient.
27
Difference between Primary and Secondary storage
• In a computer system memory is a physical device, that is used to store, retain, acquire and retrieve
data and information.
• The memory device contains different cells, every cell contains a unique location.
• It stores all types of data like raw data (given input by the user), intermediate results and final results
are stored in memory.
• It may be or may not be store data permanently. There are mainly 2 types of primary memory.
However, if we considered Cache Memory, it is of 3 types.
28
RAM
• RAM (Random Access Memory), contains one or multiple memory modules that store data
temporarily.
• It is also called volatile memory because data get erased when the computer is turned off.
• Random Access Memory (RAM) is the most important component in the computer system, for
determining a system’s performance.
DRAM
29
• DRAM stands for Dynamic RAM, It is the most important part of RAM used in computers.
• There is a faster dual data rate(DDR) in DRAM. New versions of DDR are DDR2, DDR3, and DDR4.
New versions are of better performance and more energy-efficient than
SRAM
• It stands for Static RAM, It is also one common type of RAM used in a computer system.
• It is only used for data cache within a CPU itself or as RAM in the high-speed server system.
• While the data in the SRAM memory does not need to be refreshed dynamically, it is still volatile,
meaning that when the power is removed from the memory device, the data is not held, and will
disappear.
• Processers only read the content of ROM but cannot change the content.
• Read-only memory, or ROM, is a type of computer storage containing non-volatile, permanent data
that, normally, can only be read, not written to.
• ROM contains the programming that allows a computer to start up or regenerate each time it is turned
on.
• ROM also performs large input/output (I/O) tasks and protects programs or software instructions.
Once data is written on a ROM chip, it cannot be removed.
• Almost every computer incorporates a small amount of ROM that contains the start-up firmware.
• This software consists of code that instructs the boot-up processes for the computer -- such as loading
the operating system (OS) into the random access memory (RAM) or running hardware diagnostics.
30
• Consequently, ROM is most often used for firmware updates.
• However, ROM is also utilized in video game consoles, allowing one system to run various games.
• Additionally, ROM is used in optical storage, including different kinds of compact discs (CD) -- such
as CD-ROM and CD-RW.
• ROM is also used frequently in calculators and peripheral devices like laser printers, whose fonts are
commonly stored in ROM.
Types of ROM
• PROM
• EPROM
• EEPROM
PROM
31
• PROM stands for Programmable Read Only Memory. It is a computer memory chip, and it is possible
to program it once after creation.
• Therefore, we cannot erase or delete that written data. The PROM chip was commonly used in earlier
computers’ BIOS systems.
• After creating PROM, all the bits are ‘1’. If a certain bit should be 0, we can make that 0 by burning.
• One major drawback of PROM is that it is not possible to update it. In other words, we cannot
reprogram it.
EPROM
• It is possible to erase and write to it by exposing the memory chip to ultraviolet light.
• EPROM is used more commonly than PROM because it allows the manufacturers to modify or
reprogram the chip.
EEPROM
• It is a memory chip that we can erase and reprogram using electrical charge.
• The flash memory is a type of EEPROM which has a higher density and lower number of write cycles.
Cache Memory
• With the use of main memory, memory processor speed mismatch becomes a bottleneck in the speed
with which the CPU can process instructions because there is 1 to 10 speed mismatch between the
processor and memory.
• That is ,the rate at which data can be fetched from memory is about 10 times slower than the rate at
which CPU can process data.
32
• The overall performance of a processor can be improved greatly by minimizing the memory processor
speed mismatch.
• Cache memory is commonly used for this purpose.It is an extremely fast, small memory between CPU
and main memory whose access time is closer to the processing speed of CPU.
• It acts as a high speed buffer between CPU and main memory and it is used to temporarily store very
active data and instructions during processing.
Arrival at the desired storage location may be preceded by sequencing through other locations
Data can only be retrieved in the same sequence in which it is stored
Access time varies according to the storage location of the information being accessed
Suitable for sequential processing applications where most, if not all, of the data records need to be processed
one after another
Magnetic tape is a typical example of such a storage device
Direct--access Storage Devices
Devices where any storage location may be selected and accessed at random
33
Permits access to individual information in a more direct or immediate manner
Approximately equal access time is required for accessing information from any storage location
Suitable for direct processing applications such as online ticket booking systems, on-line banking systems
Magnetic, optical, and magneto-optical disks are typical examples of such a storage device
Magnetic Tape Basics
Commonly used sequential-access secondary storage device
Physically, the tape medium is a plastic ribbon, which is usually ½ inch or ¼ inch wide and 50 to 2400 feet
long
Plastic ribbon is coated with a magnetizable recording material such as iron-oxide or chromium dioxide
Data are recorded on the tape in the form of tiny invisible magnetized and non-magnetized spots (representing
1s and 0s) on its coated surface
Tape ribbon is stored in reels or a small cartridge or Cassette
34
35
Floppy Disks
Round, flat piece of flexible plastic disks coated with magnetic oxide
So called because they are made of flexible plastic plates which can bend
Also known as floppies or diskettes
Plastic disk is encased in a square plastic or vinyl jacket cover that gives handling protection to the disk
surface
The two types of floppy disks in use today are: 5¼-
inch diskette, whose diameter is 5¼-inch.
It is encased in a square, flexible vinyl jacket
3½-inch diskette, whose diameter is 3½-inch.
It is encased in a square, hard plastic jacket
Most popular and inexpensive secondary storage medium used in small computers
Hard Disks
Round, flat piece of rigid metal (frequently aluminium) disks coated with magnetic oxide Come
in many sizes, ranging from 1 to 14-inch diameter.
Depending on how they are packaged, hard disks are of three types:
Zip/Bernoulli disks
Disk packs
Winchester disks
Primary on-line secondary storage device for most computer systems today
More suitable than magnetic tapes for a wider range of applications because they support direct access of data
Random access property enables them to be used simultaneously by multiple users as a shared device. A tape
is not suitable for such type of usage due to its sequential-access property
Suitable for both on-line and off-line storage of data
Except for the fixed type Winchester disks, the storage capacity of other magnetic disks is virtually unlimited
as many disks can be used for storing very large data sets
36
Due to their low cost and high data recording densities, the cost per bit of storage is low for magnetic disks.
An additional cost benefit is that magnetic disks can be erased and reused many times
Floppy disks and zip disks are compact and light in weight. Hence they are easy to handle and store.
Very large amount of data can be stored in a small storage space
Due to their compact size and light weight, floppy disks and zip
disks are also easily portable from one place to another
They are often used for transferring data and programs from one computer to another, which are not linked
together
Any information desired from a disk storage can be accessed in a few milliseconds because it is a direct access
storage device
Data transfer rate for a magnetic disk system is normally
higher than a tape system
Magnetic disks are less vulnerable to data corruption due to careless handling or unfavorable temperature and
humidity conditions than magnetic tapes
Cartridge Tape
37
Magnetic tape cartridge (tape cartridge) A casing containing one or more reels carrying a length of
magnetic tape, so arranged that it can be loaded on a suitable tape transport for access without the tape
being handled by the operator.
Optical Discs
• An optical disc is a storage media that is written and read by a laser. It consists of a flat, round,
portable disc made of metal and plastic.
• The size of the optical discs are 4.75 inches in diameter and less than one-twentieth of an inch thick.
Some smaller computers, game consoles, and mobile devices, however, often use mini discs that have
a diameter of 3 inches or less.
• You can store software, data, digital photos, movies, and music on optical discs. Some optical disc
formats are read-only, which means users are not able to write (save) on the media.
• Others are read/write, which allows us to save on the disc exactly as they save on a hard disk drive.
The computer designates an optical disc drive by following the alphabetical order after that of all the
hard discs.
• Consists of a circular disk, which is coated with a thin metal or some other material that is highly
reflective
• Laser beam technology is used for recording/reading of data on the disk
• Also known as laser disk / optical laser disk, due to the use of laser beam technology
• Proved to be a promising random access medium for high capacity secondary storage because it can
store extremely large amounts of data in a limited space
38
• CD-ROM
• CD-R (CD-Recordable)
• CD-RW (CD-ReWritable)
• Blu-ray Disc
❖ CD-ROM
• CD-ROM (Compact Disc Read-Only Memory) is a Compact Disc that contains data accessible
with the help of the computer. Compact Disc format was only designed for music and playback
music but later made to store all kinds of data.
• CD-ROMS are popularly used to share computer software, including games and multimedia
applications, though any data can be stored (up to the capacity limit of a disc). A standard 120 mm
CD-ROM can store 650 or 700 MB of data.
❖ CD-R (CD-Recordable)
• A CD-R (Compact Disc-Recordable) is a multi-session compact disc onto which you can record
your own items such as text, graphics, and audio. With a CD-R, you can write on one part of the
disc at one time and another part later.
• After recording the CD-R, you can read from it as multiple times as you want. You can write on
each part only for one time, and you cannot erase the disc’s contents. Most CD-ROM drives can
read a CD-R.
• You write on the CD-R using a CD recorder or a CD-R drive and special software. A CD-R drive
can able to read and write both the audio CDs and standard CD-ROMs.
• These drives read at speeds of up to 24% and write at speeds of up to 8X. Manufacturers always
list the write speed first, like the example, as 8/24. CD-R drives are slightly more expensive than
standard CD-ROM drives.
❖ CD-RW (CD-ReWritable)
• A CD-RW (Compact Disc-Re-Writable) is an erasable disc that allows you to write multiple times.
• Initially, called an erasable CD (CD E), a CD-RW overcomes the major disadvantage of CD-R discs,
of writing on them only once with CD-RW, the disc acts like a floppy or hard disk, allowing you to
write and rewrite data, instructions, and information onto it multiple times.
• To write on a CD-RW disc, you have CD-RW software and a CD-RW drive.
39
• These drives have a write speed up to 12x, rewrite speed up to 4X, and a read speed up to 32X.
Manufacturers typically state the speeds in this order, for example, as 12/4/32
• A family of optical discs that have similar overall dimensions to a CD, but have significantly higher
capacities.
• DVDs are double-sided, where CDs are single-sided. Dual-layer versions are also planned. Mostly
used DVDs are able to store 4.7 GB to 17 GB, depending on the storage techniques used.
❖ Blu-ray Disc
• Blu-ray has a higher capacity and best quality than other standard DVDs, especially for high definition
audio and video. Blu-ray is the most expensive optical discs type available on the market.
• A Blu-ray Disc ROM (BD-ROM) has a storage ability of 100 GB, with an exceeding limit of 200 GB
in the future.
• Blu-ray Disc (BD) drives and players are easily compatible with DVD and CD formats. Some game
consoles always Include a Blu-ray drive.
The cost-per-bit of storage for optical disks is very low because of their low cost and enormous storage
density.
The use of a single spiral track makes optical disks an ideal storage medium for reading large blocks of
sequential data such as music.
Optical disk drives do not have any mechanical read/write heads to rub against or crash into the disk surface.
This makes optical disks a more reliable storage medium than magnetic tapes or magnetic disks. Optical
disks have a data storage life in excess of 30 years. This makes them a better storage medium for data
archiving as compared to magnetic tapes or magnetic disks.
As data once stored on an optical disk becomes permanent, danger of stored data getting inadvertently
erased/overwritten is removed
Due to their compact size and light weight, optical disks are easy to handle, store, and port from one place
to another
Music CDs can be played on a computer having a CDROM drive along with a sound board and speakers. This
allows computer systems to be also used as music systems
Limitations of Optical Disks
It is largely read-only (permanent) storage medium.
Data once recorded, cannot be erased and hence the optical disks cannot be reused
40
The data access speed for optical disks is slower than magnetic disks Optical
disks require a complicated drive mechanism
Uses of Optical Disks
For distributing large amounts of data at low cost
For distribution of electronic version of conference proceedings, journals, magazines, books, product catalogs,
etc
For distribution of new or upgraded versions of software products by software vendors
For storage and distribution of a wide variety of multimedia applications
For archiving of data, which are not used frequently,but which may be used once in a while
WORM disks are often used by end-user companies to make permanent storage of their own proprietary
information
Memory Storage Devices
Flash Drive (Pen Drive)
Relatively new secondary storage device based on flash memory, enabling easy transport of data from one
computer to another
Compact device of the size of a pen, comes in various shapes and stylish designs and may have
different added features
Plug-and-play device that simply plugs into a USB(Universal Serial Bus) port of a computer, treated as
removable drive
Available storage capacities are 8MB, 16MB, 64MB,128MB, 256MB, 512MB, 1GB, 2GB, 4GB, and 8GB.
Zip Drive
• A Zip drive is a medium-capacity and portable magnetic disk storage system launched by Iomega in
the mid-1990s.
• It was popular at the time of launch as cost per storage unit was lower than that of hard disks, and it
could store a larger amount of data than a floppy disk.
Types of software
Software is used to control a computer. There are different types of software that can run on a computer: system
software, utility software, and application software.
1. System software
• If you think of software as being in layers, the system software is the bottom layer: it sits between the
hardware and the application software.
• Operating systems like Windows, macOS, Android and iOS are examples of system software.
Operating systems are loaded into RAM when the device starts up, and have access to the hard drive.
1. Utility software
41
• Utility software is part of the system software and performs specific tasks to keep the computer
running. Utility software is always running in the background. Examples of utility software are
security and optimization programs.
• Security programs include anti-virus software that scans and removes viruses. Most computers will
include some sort of anti-virus software, but you can add your own.
• Optimization programs can include tools for system clean-up, disk defragmentation, and file
compression. These tools are typically installed as part of the operating system. They have access to
the hard drive to keep it tidy.
1. Application software
• Anything that is not an operating system or a utility is an application or app. So a word processor,
spreadsheet, web browser, and graphics software are all examples of application software, and they can
do many specific tasks.
• You can remove and add applications on your computer using the operating system.
• Application software like a word processor regularly directs the operating system to load and save files
from to the hard drive. When you are working on a file, it is saved temporarily in the RAM. It is only
when you choose to save it that it is written to the hard drive.
• This is why, if the computer crashes while you’re working on a file, you may lose any changes you
didn’t save. Data stored in the RAM is volatile. The data is lost when the RAM loses power.
42
Programming Languages
• Machine Language
• Assembly Language
1. Machine Language
• A machine language consists of the numeric codes for the operations that a particular computer can
execute directly.
• The codes are strings of 0s and 1s, or binary digits (“bits”), which are frequently converted both from
and to hexadecimal (base 16) for human viewing and modification.
• Machine language instructions typically use some bits to represent operations, such as addition, and
some to represent operands, or perhaps the location of the next instruction.
• Machine language is difficult to read and write, since it does not resemble conventional mathematical
notation or human language, and its codes vary from computer to computer.
Advantages
Disadvantages:
3.It is difficult to change or discover blunders in a project written in the machine language
2. Assembly language
• It uses short mnemonic codes for instructions and allows the programmer to introduce names for
blocks of memory that hold data.
• One might thus write “add pay, total” instead of “0110101100101000” for an instruction that adds two
numbers.
Advantages
43
Below are the advantages:
4. It is mainly hardware-oriented.
5. It requires less instruction to get the result.
Disadvantages
Below mentioned are the disadvantages:
1. It takes a lot of time and effort to write the code for the same.
5. It needs more size or memory of the computer to run the long programs written in Assembly
Language.
• The syntax used and the programming style can be easily understood by humans if it is compared to
low-level language.
• As the program written in a high-level language is not directly understood by the computer system.
Before the execution of high-level programs, it needs to be converted to machine-level language.
44
• Examples of high-level languages are C++, C, JAVA, FORTRAN, Pascal, Perl, Ruby, and Visual
Basic.
Advantages of High-Level Language
Listed are a few advantages of High-Level Language.
1. Simple to use: Since the language used for instruction is English or familiar to the user, he can easily
command or instruct without learning any proper language. The language is closer to the natural
language we use daily and modifications can be made. Therefore it becomes simple and easy to use for
the users.
2. User familiar: As the language used by the user is closer to the natural language which we use,
therefore the high-level language is user-friendly and familiar. Users need not understand the structure
of the detailed architecture of the programs they can simply write the program without any
complication.
3. Time management is easy: As the language used by the computer is the natural language used by the
user therefore time taken to write the syntax as well as the codes is reduced and managing time
becomes easy. Since a programmer needs to execute and get the result fast so that decision making can
be possible promptly.
4. Easy to understand: The output produced depends on the input given to the computer which is the
task of the user. Therefore it becomes of utmost importance that a user must understand the input
instruction to be given to the computer. As the language used is user-friendly thus users can
understand it clearly.
5. Languages used are mostly English and user-friendly language: The Language mostly used in
computers is English which is a common language for people and easily understandable. This makes a
computer user-friendly. The high-level language uses English words that make it a friendly interface
with users. Therefore language must be user-friendly for both programmer and computer.
6. More than machine language it is problem-oriented: High-level language makes it easy to solve the
problems coming as it may not happen in machine language. They help the user to write the program
without learning much of the syntax and codes.
7. Easy to debug: Debugging refers to identifying and removing errors from the computer. High-level
language makes debugging an easy process. It allows users to evaluate the logic rather than think
about the code. With the use of an interpreter and compilers errors could be easily identified and
removed.
1. Execution is slow: The computer can only understand the binary machine language thus High-level
language has to be converted with the help of a compiler and interpreter. This whole process therefore
takes time and thus the execution is slow.
2. Occupies more memory: The High-level Language first stores the instruction that they get from the
user and then it interprets and analyzes the result thus from conversion to interpretation it has to store
a lot of data thus it occupies more memory as compared to machine language.
3. Hardware control is less: Programmer need not be aware of the hardware as the high-level language
are far away from the hardware of the computers. Therefore users have very little control over the
hardware.
4. Not Time efficient: The process of conversion of a high-level language into machine language takes
time thus if any user wants prompt Interpretation of data by the computer then it won’t be possible.
Thus high-level language is not a time-efficient language.
45
5. Object code: The object code generated is also might be inefficient as compared to the machine
language. The machine language codes provided as well as the results generated are always accurate
and efficient
Operating System
An operating system is a program that controls the execution of application Programs and acts as
an interface between the user of a computer and the computer hardware .An operating system can
be thought of as having two objectives or performing two functions:
Efficiency: An operating system allows the computer system resources to be used in an efficient
manner.
An operating system is the program that, after being initially loaded into the computer by a boot
program, manages all the other programs in a computer. The other programs are called
applications or application programs. The application programs make use of the operating system
by making requests for services through a defined application program interface (API). In addition,
users can interact directly with the operating system through a user interface such as a command
language or a graphical user interface (GUI).
46
3. Job accounting –
Operating system Keeps track of time and resources used by various tasks and users, this information
can be used to track resource usage for a particular user or group of users.
4. Error detecting aids –
The operating system constantly monitors the system to detect errors and avoid the malfunctioning of a
computer system.
5. Coordination between other software and users –
Operating systems also coordinate and assign interpreters, compilers, assemblers, and other software to
the various users of the computer systems.
6. Memory Management –
The operating system manages the Primary Memory or Main Memory. Main memory is made up of a
large array of bytes or words where each byte or word is assigned a certain address. Main memory is
fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first
loaded in the main memory
7. Processor Management –
In a multi-programming environment, the OS decides the order in which processes have access to the
processor, and how much processing time each process has. This function of OS is called process
scheduling.
8. Device Management –
An OS manages device communication via their respective drivers. It performs the following activities
for device management. Keeps track of all devices connected to the system. designates a program
responsible for every device known as the Input/Output controller. Decides which process gets access
to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates
devices when they are no longer required.
9. File Management –
A file system is organized into directories for efficient or easy navigation and usage. These directories
may contain other directories and other files. An Operating System carries out the following file
management activities. It keeps track of where information is stored, user access settings and status of
every file, and more… These facilities are collectively known as the file system.
Moreover, Operating System also provides certain services to the computer system in one form or the other.
The Operating System provides certain services to the users which can be listed in the following manner:
1. Program Execution: The Operating System is responsible for the execution of all types of programs
whether it be user programs or system programs. The Operating System utilizes various resources available
for the efficient running of all types of functionalities.
2. Handling Input/Output Operations: The Operating System is responsible for handling all sorts of inputs,
i.e, from the keyboard, mouse, desktop, etc. The Operating System does all interfacing in the most
appropriate manner regarding all kinds of Inputs and Outputs.
For example, there is a difference in the nature of all types of peripheral devices such as mice or keyboards,
the Operating System is responsible for handling data between them.
3. Manipulation of File System: The Operating System is responsible for making decisions regarding the
storage of all types of data or files, i.e, floppy disk/hard disk/pen drive, etc. The Operating System decides
how the data should be manipulated and stored.
4. Error Detection and Handling: The Operating System is responsible for the detection of any type of error
or bugs that can occur while any task. The well-secured OS sometimes also acts as a countermeasure for
preventing any sort of breach to the Computer System from any external source and probably handling
them.
47
5. Resource Allocation: The Operating System ensures the proper use of all the resources available by
deciding which resource to be used by whom for how much time. All the decisions are taken by the
Operating System.
6. Accounting: The Operating System tracks an account of all the functionalities taking place in the computer
system at a time. All the details such as the types of errors that occurred are recorded by the Operating
System.
7. Information and Resource Protection: The Operating System is responsible for using all the information
and resources available on the machine in the most protected way. The Operating System must foil an
attempt from any external resource to hamper any sort of data or information.
Operating system performance metrics
• OS: Memory. Shows memory usage metrics in megabytes.
• OS: CPU-Shows how much time the CPU devotes to system and user processes,
• OS: Load-The amount of work that a computer system performs
• OS: Disk usage (GB)-Tracks growth or reduction in the amount of available disk space used.
• OS: Disk Usage (percentage)-The percentage of disk space that is being used at a given time.
• OS: Disk Throughput-The average disk throughput for read and write operations, measured in
megabytes per second.
• OS: Disk Rates-Averaged disk speed for read and write operations.
• OS: Disk Latency-Measures the average time consumed by disk seeks in milliseconds.
Types of OS
48
2. Time-Sharing Operating Systems –
Each task is given some time to execute so that all the tasks work smoothly. Each user gets the time of
CPU as they use a single system. These systems are also known as Multitasking Systems. The task can be
from a single user or different users also. The time that each task gets to execute is called quantum. After
this time interval is over OS switches over to the next task.
Advantages of Time-Sharing OS:
● Each task gets an equal opportunity
● Fewer chances of duplication of software
● CPU idle time can be reduced
3.Multiprogrammed System
49
• CPU utilization is increased by organizing the jobs so that the CPU always has one to execute.
• OS keeps several jobs in memory simultaneously, and begins executing one of them. Once this job
has to wait for some tasks, OS switches to another job.
• In a non-multiprogramming environment, OS sits idle if one job has to wait for some tasks.
• Single user cannot keep CPU and I/O devices busy all the time.
• When it has to wait (for example-I/O), OS switches to another job.
• Multiprogramming organizes jobs so that CPU always has one to execute.
• Advantage-Effective resource utilization.
• Drawback-Poor user experience.
4. Multitasking
Multitasking term used in a modern computer system. It is a logical extension of a multiprogramming
system that enables the execution of multiple programs simultaneously. In an operating system,
multitasking allows a user to perform more than one computer task simultaneously. Multiple tasks are also
known as processes that share similar processing resources like a CPU. The operating system keeps track
of where you are in each of these jobs and allows you to transition between them without losing data.
Early operating system could execute various programs at the same time, although multitasking was not
fully supported. As a result, a single software could consume the entire CPU of the computer while
completing a certain activity. Basic operating system functions, such as file copying, prevented the user
from completing other tasks, such as opening and closing windows. Fortunately, because modern
operating systems have complete multitasking capability, numerous programs can run concurrently
without interfering with one other. In addition, many operating system processes can run at the same time.
5.Multiprocessor System
▪ Multiprocessor systems have more than one CPU.
50
▪ All the processors share memory and a clock; communication usually takes place through the
shared memory.
▪ Also known as Tightly-coupled Systems or Parallel Systems.
▪ Example-Windows, Unix
▪ Advantages of Parallel Systems:
▪ Increased through put – When N processors work together, the speed up is huge.
Although this speed up ratio is not N times due to sharing of data.
▪ Economical – Multiprocessor save money than multiple single-processor systems coz they
share memory and peripherals.
▪ Increased reliability – If one of the 10 processors fail, other 9 processors should be able to
share the work without halting the system.
Language Processors –
Compilers, interpreters, translate programs written in high-level languages into machine code that a computer
understands. And assemblers translate programs written in low-level or assembly language into machine
code. In the compilation process, there are several stages. To help programmers write error-free code, tools
are available.
Assembly language is machine-dependent, yet mnemonics used to represent instructions in it are not
directly understandable by machine and high-Level language is machine-independent. A computer
understands instructions in machine code, i.e. in the form of 0s and 1s. It is a tedious task to write a
computer program directly in machine code. The programs are written mostly in high-level languages like
Java, C++, Python etc. and are called source code. These source code cannot be executed directly by the
computer and must be converted into machine language to be executed. Hence, a special translator system
software is used to translate the program written in a high-level language into machine code is called
Language Processor and the program after translated into machine code (object program/object code).
The language processors can be any of the following three types:
1. Compiler :
The language processor that reads the complete source program written in high-level language as a whole in
one go and translates it into an equivalent program in machine language is called a Compiler.
Example: C, C++, C#, Java.
In a compiler, the source code is translated to object code successfully if it is free of errors. The compiler
specifies the errors at the end of the compilation with line numbers when there are any errors in the source
code. The errors must be removed before the compiler can successfully recompile the source code again
2. Assembler :
The Assembler is used to translate the program written in Assembly language into machine code. The
source program is an input of an assembler that contains assembly language instructions. The output
generated by the assembler is the object code or machine code understandable by the computer.
Assembler is basically the 1st interface that is able to communicate humans with the machine. We need
an Assembler to fill the gap between human and machine so that they can communicate with each other.
code written in assembly language is some sort of mnemonics(instructions) like ADD, MUL, MUX,
SUB, DIV, MOV and so on. and the assembler is basically able to convert these mnemonics in Binary
51
code. Here, these mnemonics also depend upon the architecture of the machine. For example, the
architecture of intel 8085 and intel 8086 are different.
3. Interpreter :
The translation of a single statement of the source program into machine code is done by a language
processor and executes immediately before moving on to the next line is called an interpreter. If there is an
error in the statement, the interpreter terminates its translating process at that statement and displays an
error message. The interpreter moves on to the next line for execution only after the removal of the error.
An Interpreter directly executes instructions written in a programming or scripting language without
previously converting them to an object code or machine code. Example: Perl, Python and Matlab.
52
Difference Between DOS, Linux & Windows Operating System
DOS: DOS stands for Disk Operating System, which is an operating system that was popular till 1995 in
IBM PCs. It is a single-tasking OS i.e., it can perform one task at a time. It is based on a command-line
interface where one has to provide instructions to the computer in the command form. It runs from hard
disks, floppy disks, or any other storage devices and thus provides an environment for the execution of
programs. It occupies less memory. To use more than 64kb of memory, memory extenders were used,
which older Windows used to use more memory. It was originally released only to OEMs(Original
Equipment Manufacturers) who added support for their hardware. It was eventually released to the public.
Windows: Windows is a product of Microsoft. It is an operating system with various versions, Windows
10 being the latest version. It is a Graphics-Based user interface. Users give commands through clicking
or choosing icons and images with the help of a mouse, keyboard, or touchscreen to the computer.
Windows was originally a DOS extender running on top of DOS. The Windows 9x family consisting of
Windows 95, Windows 98, Windows 98SE, and Windows ME ran on top of MS-DOS and is capable of
running DOS programs directly. Windows NT was released separately and is portable, and initially, it was
written in C and C++ languages where processor reliability code is separated into DAL and HLL and was
designed to be more secure than DOS and the Windows 9x family. The Windows NT family includes
Windows NT 3.x,4.x, Windows 2000, Windows XP, Windows Vista, Windows 7, and so on. Windows is
more reliable than DOS and handles errors with ease due to various tools available for debugging and
error handling.
Linux: Linux is a freely distributed multitasking and multi-user operating system that behaves like
UNIX. It was originally developed by a Finnish student, LINUS TORVALDS in 1991. It is the best
53
known and most commonly used open - source operating system. It is a cross - platform operating system
based on UNIX that can be installed on PCs and laptops.
54
MCQ for Practice
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
What do you call the programs that are used to find out possible faults and their causes?
c. 680 MB d. 680 GB
1 Byte =?
a. 8 bits b. 4 bits
55
c. 2 bits d. 9 bits
a. CD b. DVD c. ROM d. RW
A device that connects to a network without the use of cables is said to be-
The process of transferring files from a computer on the Internet to your computer is called
a. Downloading b. uploading
c. FTP d. JPEG
.......... is the process of dividing the disk into tracks and sectors.
a. End b. Start
c. Turnoff d. Restart
56
Which of the following does not store data permanently?
Which of the following contains permanent data and gets updated during the processing of transactions?
Which of the following helps to protect floppy disks from data getting accidentally erased?
a. Compiler b. Loader
57
a. Homepage b. Index c. JAVA script d. Bookmark
a. NAV b. F-Prot
c. Oracle d. McAfee
58
Malicious software is known as:
c. Assemblers d. Compiler
a. Windows b. Unix
59
UNIT 3
Data refers to the raw facts that are collected while information refers to processed data that enables us to
take decisions.
Ex. When result of a particular test is declared it contains data of all students, when you find the marks you
have scored you have the information that lets you know whether you have passed or failed.
The word data refers to any information which is presented in a form that is agreed and accepted upon by is
creators and users.
DATA COMMUNICATION
In case of computer networks this exchange is done between two devices over a transmission medium.
This process involves a communication system which is made up of hardware and software. The hardware
part involves the sender and receiver devices and the intermediate devices through which the data passes.
The software part involves certain rules which specify what is to be communicated, how it is to be
communicated and when. It is also called as a Protocol.
The following sections describes the fundamental characteristics that are important for the effective
working of data communication process and is followed by the components that make up a data
communications system.
The effectiveness of any data communications system depends upon the following four fundamental
characteristics:
• Delivery: The data should be delivered to the correct destination and correct user.
• Accuracy: The communication system should deliver the data accurately, without introducing any
errors. The data may get corrupted during transmission affecting the accuracy of the delivered data.
• Timeliness: Audio and Video data has to be delivered in a timely manner without any delay; such a
data delivery is called real time transmission of data.
• Jitter: It is the variation in the packet arrival time. Uneven Jitter may affect the timeliness of data
being transmitted.
Components of Data Communication
A Data Communication system has five components as shown in the diagram below:
60
Fig. Components of a Data Communication System
1. Message
Message is the information to be communicated by the sender to the receiver.
2. Sender
The sender is any device that is capable of sending the data (message).
3. Receiver
The receiver is a device that the sender wants to communicate the data (message).
4.Transmission Medium
It is the path by which the message travels from sender to receiver. It can be wired or wireless and many
subtypes in both.
5. Protocol
It is an agreed upon set or rules used by the sender and receiver to communicate data.
A protocol is a set of rules that governs data communication. A Protocol is a necessity in data
communications without which the communicating entities are like two persons trying to talk to each
other in a different language without know the other language.
Data transmission speed is the rate of transferring data from source to destination. It is also referred as
Bandwidth. Unit of bandwidth is Bit Per Second or bps. This is also called Band speed, which is the
number of bits transmitted in a second is bps or Bandwidth. There are 3 types of Bands which are as
follows:
Narrow Band
Speed or bandwidth of this band can be 45bps to 300bps in general. Data transmission in narrow band is
called sub-voice band. This band is used in slow data transmission. Narrow band is used in telegraphy. In
telegraphy, use of more cable slows down the speed.
Voice Band
Speed of this band can be up to 9600bps. This band is mostly used in telephone communication. Also in
computer, this band is used in transferring data from computer to printer or card reader to computer.
Broad Band
61
Broad band is ideal for very high speed data transmission where the minimum data transmission speed can
be 1Mbps (Mega bits per second) and reach up to a few giga bits per second. This band is used in data
transmission through coaxial cable and optical fiber cable. Beside these, board band is also used in
satellite and microwave communication.
Mode of Transmission
Analog & Digital Data
Data can be analog or digital.
Digital data refers to information that has discrete states. For example, an analog clock that has hour,
minute, and second hands gives information in a continuous form; the movements of the hands are
continuous. On the other hand, a digital clock that reports the hours and the minutes will change suddenly
from 8:05 to 8:06.
Analog data, such as the sounds made by a human voice, take on continuous values. When someone
speaks, an analog wave is created in the air. This can be captured by a microphone and converted to an
analog signal or sampled and converted to a digital signal.
Digital data take on discrete values. For example, data are stored in computer memory in the form of 0s
and 1s. They can be converted to a digital signal or modulated into an analog signal for transmission
across a medium.
Like the data they represent, signals can be either analog or digital.
A digital signal, on the other hand, can have only a limited number of defined values. Although
each value can be any number, it is often as simple as 1 and 0.
Simplex –
• In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices
on a link can transmit; the other can only receive. Keyboards and traditional monitors are examples of
simplex devices. The key-board can only introduce input; the monitor can only accept output. The simplex
mode can use the entire capacity of the channel to send data in one direction.
62
Half-Duplex –
• In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device
is sending, the other can only receive, and vice versa.
• The half-duplex mode is like a one-lane road with traffic allowed in both directions.
* When cars are traveling in one direction, cars going the other way must wait. In a half duplex
transmission, the entire capacity of a channel is taken over by whichever of the two devices is transmitting
at the time. Walkie-talkies and CB (citizens band) radios are both half-duplex systems.
Full-Duplex –
• In full-duplex made (also, called duplex), both stations can transmit and receive simultaneously. The full-
duplex mode is like a two-way street with traffic flowing in both directions at the same time.
• One common example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time.
Transmission Modes
The transmission of binary data across a link can be accomplished in either parallel or serial mode.
• In parallel mode, multiple bits are sent with each clock tick.
• In serial mode, 1 bit is sent with each clock tick.
• While there is only one way to send parallel data, there are three subclasses of serial transmission:
asynchronous, synchronous shown below.
Parallel Transmission
• Binary data, consisting of ls and 0s, may be organized into groups of n bits each.
• The mechanism for parallel transmission is a conceptually simple one. It uses n wires to send n bits at one
time.
That way each bit has its own wire, and all n bits of one group can be transmitted with each clock tick from
one device to another. Figure given below shows how parallel transmission works for n = 8.
Serial Transmission
• In serial transmission one bit follows another, so we need only one communication channel rather than n to
transmit data between two communicating devices.
• Figure given below depicts the serial transmission.
The advantage of serial over parallel transmission is that with only one communication channel, serial
transmission reduces the cost of transmission over parallel by roughly a factor of n
• Since communication within devices is parallel, conversion devices are required at the interface between the
sender and the line (parallel-to-serial) and between the line and the receiver (serial-toparallel).
• Serial transmission occurs in one of three ways: asynchronous, synchronous.
63
Transmission Modes
Mode of transmission can be synchronous or asynchronous. The data to be transmitted are assembled with
special code in order to indicate the start and ending of characters. When two computers communicate
with each other, they must have a way to synchronize the flow of data so that the receiving computer can
read at the same speed.
In the synchronous mode, characters are transmitted in a group, preceded and followed by special control
characters,. At the time of sending or receiving these characters are checked by originating and
destinations computer to ensure the proper synchronization. Data bytes are sent one after the other at a
regular interval. The data form a continuous stream of bits spaced at regular interval, with no space
between consecutive bytes. A timing mechanism causes the receiving modem to read the steam at the
precise frequency. When the receiving modem has read the required number of bits to make up a
character, it sends the character to the receiving computer.
Advantage
Fewer bits are needed to identify the beginning and ending of characters.
Disadvantage
Biggest drawbacks is inaccuracy, when the receiver goes out of synchronization, then track of individual
characters where they start and end is lost, such correction of errors takes additional time. It is expensive
Asynchronous
In asynchronous communication, each bit in the character is preceded and followed by a control character.
These characters mark the starting and ending of a bit in the word. This is the advantage that start and stop
bit synchronize the communication between the two computers. This is the most commonly used method
worldwide, because of its accuracy.
Disadvantage
It is slow because of lots of start and stop bits. This type of communication is used mostly with the
communication rate less than 2400 baud
Asynchronous Transmission
• In asynchronous transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (ls) at the end
of each byte. There may be a gap between each byte.
• The start and stop bits and the gap alert the receiver to the beginning and end of each byte and allow it to
synchronize with the data stream.
• This mechanism is called asynchronous because, at the byte level, the sender and receiver do not have to be
synchronized. But within each byte, the receiver must still be synchronized with the incoming bit stream. •
That is, some synchronization is required, but only for the duration of a single byte.
• Asynchronous here means "asynchronous at the byte level," but the bits are still synchronized; their
durations are the same.
64
Synchronous Transmission
• In synchronous transmission, the bit stream is combined into longer "frames," which may contain multiple
bytes.
• Each byte, however, is introduced onto the transmission link without a gap between it and the next one.
• It is left to the receiver to separate the bit stream into bytes for decoding purposes.
• In synchronous transmission, we send bits one after another without start or stop bits or gaps. It is the
responsibility of the receiver to group the bits.
• Figure given below gives a schematic illustration of synchronous transmission.
• We have drawn in the divisions between bytes. In reality, those divisions do not exist; the sender puts its
data onto the line as one long string.
• If the sender wishes to send data in separate bursts, the gaps between bursts must be filled with a special
sequence of 0s and ls that means idle.
• The receiver counts the bits as they arrive and groups them in 8-bit units.
Transmission mode means transferring data between two devices. It is also known as a communication
mode. Buses and networks are designed to allow communication to occur between individual devices that
are interconnected. There are three types of transmission mode:-
Two devices communicate with each other by sending and receiving data. The data can
flow between the two devices in the following ways.
• Simplex
• Half Duplex
• Full Duplex
Simplex
65
Figure: Simplex mode of communication
Only one of the devices sends the data and the other one
only receives the data.
Example: in the above diagram: a cpu send data while a monitor only
receives data.
Half Duplex
66
Data Transmission Media A communication channel that is used to carry the data from the
transmitter to the receiver through the electromagnetic signals. The main function of this is to
carry the data in the bits form through the Local Area Network (LAN). In data communication, it
works like a physical path between the sender & the receiver. For instance, in a copper cable
network the bits in the form of electrical signals whereas in a fiber network, the bits are available
in the form of light pulses. The quality, as well as characteristics of data transmission, can be
67
determined from the characteristics of medium & signal. The properties of different transmission
media are delay, bandwidth, maintenance, cost, and easy installation.
Transmission media is classified into two types namely wired media & wireless media. The
medium characteristics of wired media are more significant but, in wireless media the signal
characteristics are important.
Types-of-Transmission-Media
Guided Media
This kind of transmission media is also known as wired otherwise bounded media. In this type,
the signals can be transmitted directly & restricted in a thin path through physical links.
The main features of guided media mainly include secure, high-speed, and used in small
distances. This kind of media is classified into three types which are discussed below.
It includes two separately protected conductor wires. Normally, some pairs of cables are
packaged jointly in a protective cover. This is the most frequently used type of transmission
media and it is available in two types.
This UTP cable has the capacity to block interference. It doesn’t depend on a physical guard and
used in telephonic applications. The advantage of UTP is a low cost, very simple to install, and
high speed. The disadvantages of UTP is liable to exterior interference, transmits in fewer
distances, and less capacity.
STP cable includes a particular jacket for blocking outside interference. It is used in rapid data
rate Ethernet, in voice & data channels of telephone lines. The main advantages of STP cable
mainly include good speed, removes crosstalk. The main disadvantages are hard to manufacture
as well as install, It is expensive and bulky also
Coaxial Cable
This cable contains an external plastic cover and it includes two parallel conductors where each
conductor includes a separate protection cover. This cable is used to transmit data in two modes
like baseband mode as well as broadband mode. This cable is widely used in cable TVs & analog
TV networks.
68
The advantages of the coaxial cable include high bandwidth, noise immunity is good, low cost
and simple to install. The disadvantage of this cable is, the failure of cable can disturb the whole
network
This cable uses the notion of light reflected through a core that is made with plastic or glass. The
core is enclosed with less thick plastic or glass and it is known as the cladding, used for large
volume data transmission.
The main advantages of this cable include lightweight, capacity & bandwidth will be increased,
signal attenuation is less, etc. The disadvantages are high cost, fragile, installation & maintenance
is difficult and unidirectional.
Unguided Media
It is also known as unbounded otherwise wireless transmission media. It doesn’t require any
physical medium to transmit electromagnetic signals. The main features of this media are less
secure, the signal can be transmitted through air, and applicable for large distances. There are
three types of unguided media which are discussed below.
Radiowaves
These waves are very easy to produce as well as penetrate through buildings. In this, the
transmitting & receiving antennas no need to align. The frequency range of these waves ranges
from 3 kHz to 1GHz. These waves are used in AM & Fm radios for transmission. These waves
are classified into two types namely Terrestrial & Satellite.
Microwaves
It is a sightline transmission which means the transmitting & receiving antennas need to align
correctly with each other. The distance which is covered through the signal can be directly
proportional to the antenna’s height. The frequency range of microwaves ranges from 1GHz to
300GHz. These are extensively used in TV distribution & mobile phone communication
Infrared Waves
69
Infrared (IR) waves are used in extremely small distance communication as they cannot go
through obstacles. So it stops intrusion between systems. The range of frequency of these waves
is 300GHz to 400THz. These waves are used in TV remotes, keyboards, wireless mouse, printer,
etc.
Some Factors
The following factors must be considered to design the transmission media like the following.
70
Bandwidth
The bandwidth mainly refers to the capacity of data-carrying in a medium otherwise a channel.
So, high BW communication channels mainly support high data rates.
Radiation
The radiation refers to the signal leakage from the medium because of its unwanted electrical
characteristics.
Absorption of Noise
The absorption of noise refers to the vulnerability of the media to exterior electrical noise. This
noise can cause data signal distortion.
Attenuation
Attenuation refers to the energy loss when signal broadcasts externally. The loss of energy
amount mainly depends on frequency. Radiation, as well as physical media characteristics,
contributes to attenuation.
Attenuation
It is the loss of energy which can be occurred due to the decrease in signal & increase in the
distance. Distortion
Distortion mainly occurs because of the change in signal shape. This kind of distortion can be
observed from various signals which have different frequencies. Every frequency component has
its separate propagation speed because they arrive at a different time which leads to the delay in
distortion. Noise
When data is transmitted above a transmission medium, an unwanted signal can be added to it.
So the noise can be created.
The term Modem Definition is an acronym for modulator-demodulator. The primary modem
function is to convert digital data into an analog form which is suitable for transmission on
71
common carrier circuits (example telephone lines). Modulation is the D/A conversion in which
the digital data is placed on the transmission line by modulation of a tone or carrier.
Demodulation is the reverse process.
Modem is an abbreviation for Modulator – Demodulator. Modems are used for data transfer from
one computer network to another computer network through telephone lines. The computer
network works in digital mode, while analog technology is used for carrying messages across
phone lines.
The device which performs modulation is called a modulator and the device which recovers the
information signal from the modulated carrier is called a demodulator. In data transmission, we
usually come across devices which perform both modulation as well as demodulation functions
and these devices are called modems. When data is to be transmitted over long distances,
modems are needed. In a modem, the input signal modulates a carrier which is transmitted to the
distant end. At the distant end, another modem demodulators the received carrier to obtain the
digital signal. Thus, a pair of modems is always required. The term ‘modem’ is derived from the
words, Modulator and Demodulator.
Modulator converts information from digital mode to analog mode at the transmitting end and
demodulator converts the same from analog to digital at receiving end. The process of converting
analog signals of one computer network into digital signals of another computer network so they
can be processed by a receiving computer is referred to as digitizing.
A modem contains a modulator as well as a demodulator. Nearly all the modems are designed for
utilizing the analog voice band service provided by the telecommunication network. Thus, the
modulated carrier produced by a modem fits into the 300-400 Hz bandwidth of the speech
channel. The figure shows a typical data connection set up using modems. The digital terminal
devices exchange digital signals and are known as Data Terminal Equipment (DTE). Two
modems are always needed, one at each end. At the transmitting end, the modem converts the
digital signal from the DTE into an analog signal by modulating a carrier. At the receiving end,
the modem demodulates the carrier and hands over the demodulated digital signal to the DTE.
A dedicated leased circuit or a switched telephone circuit can be used as transmission medium
between the two modems. In the latter case, moderns are connected to the local telephone
exchanges. Whenever data transmission is needed, connection between the modems is established
through the telephone exchanges. Modems are also needed within a building to connect terminals
which are located at distances, more than 15 metres from the host.
72
Block diagram of Modem is as
below:
A block diagram of a modem is shown in the above figure, which comprises a transmitter, a
receiver and two interfaces. The digital signal to be sent is given to the transmitter. The
modulated carrier that is received from the distant end is given to the receiver. TI1e digital
interface connects the modem to the DTE which produces and receives the digital signals. In
order to transmit it and receive the modulated signals, the line interface connects the modem to
the transmission channel. Modems connected to telephone exchanges have additional provision
for connecting a telephone instrument, which enables establishment of the telephone connection.
Networking
Networking refers to the creation of networks. Network is a group of devices linked to one
another. For example a network of telephones, or radio network.
73
Need Of Networking
The need for networking lies mainly to break the barriers of distance, time and cost. This is
because the communications via computers can be done to any distance in very short amount of
time and in very cost-effective manner. It breaks the barriers of distance, cost and time. It is very
cost-effective as compared to telephone networks.
All types of data viz text, audio, video, pictures, graphics etc, can be transmitted through it.
Network Criteria
• A network must meet a number of criteria that are important to consider the network
effective and efficient. These are performance, security and reliability.
• Performance: The performance of the network depends on a number of factors including
the number of users, the type of transmission medium.
• Reliability: Network reliability is measured by frequency of failure • Recovery time
of a network after a failure
The size of a network should be expressed by the geographic area and number of computers,
which are a part of their networks. It includes devices housed in a single room to millions of
devices spread across the world. Following are the popular types of Computer Network:
74
Types of Computer Networks
PAN (Personal Area Network) is a computer network formed around a person. It generally consists of a computer,
mobile, or personal digital assistant. PAN can be used for establishing communication among these personal devices
for connecting to a digital network and the internet.
Characteristics of PAN
Below are the main characteristics of PAN:
Advantages of PAN
Here are the important pros/benefits of PAN network:
75
• Strictly restricted to a small area
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
• It may establish a bad connection to other networks at the same radio bands.
Distance limits.
•
Characteristics of LAN
Here are the important characteristics of a LAN network:
Advantages of LAN
Here are the pros/benefits of LAN:
76
• Computer resources like hard-disks, DVD-ROM, and printers can share local area
networks. This significantly reduces the cost of hardware purchases.
• You can use the same software over the network instead of purchasing the licensed
software for each client in the network.
• Data of all network users can be stored on a single hard disk of the server computer.
• You can easily transfer data and messages over networked computers.
• It will be easy to manage data at only one place, which makes data more secure.
• Local Area Network offers the facility to share a single internet connection among all the
LAN users.
77
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will in deed save cost because of shared computer resources, but the initial cost of
•
installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does not offer
•
good privacy.
Unauthorized users can access criti cal data of an organization in case LAN admin is not
•
able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are issues related to
•
software setup and hardware failures
WAN (Wide Area Network) is another important computer network that which is spread across a large geographical
area. WAN network system could be a connection of a LAN which connects with other LAN’s using telephone lines
and radio waves. It is mostly limited to an enterprise or an organization.
Characteristics of WAN
Below are the characteristics of WAN:
78
• The software files will be shared among all the users; therefore, all can access to the latest
files.
• Any organization can form its global integrated network using WAN.
Advantages of WAN
Here are the benefits/pros of WAN:
• WAN helps you to cover a larger geographical area. Therefore business offices situated at
longer distances can easily communicate.
• Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
• WLAN connections work using radio transmitters and receivers built into client devices.
Disadvantages of WAN
Here are the drawbacks/cons of WAN network: • The
• It is difficult to maintain the WAN network. You need skilled technicians and network
administrators.
• There are more errors and issues because of the wide coverage and the use of different
technologies.
• It requires more time to resolve issues because of the involvement of multiple wired and
wireless technologies.
• Offers lower security compared to other types of network in computer.
79
Metropolitan Area Network (MAN)
Characteristics of MAN
Here are important characteristics of the MAN network:
Advantages of MAN
Here are the pros/benefits of MAN network:
It offers fast communication using high - speed carriers, like fiber optic cable s.
•
It provides excellent support for an extensive size network and greater access to WANs.
•
The dual bus in MAN network provides support to transmit data in both directions co n
•
currently.
A MAN network mostly includes some areas of a city or an entire city.
•
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
You need more cable to establish MAN connection from one place to another.
•
In MAN network it is tough to make the system secure from hackers
•
Apart from above mentioned computer networks, here are some other important types of networks:
80
• Home Area Network
• POLAN- Passive Optical LAN
• Enterprise private network
• Campus Area Network
• Virtual Area Network
1) WLAN
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using
wireless communication within a limited area like home, school, or office building. It gives users
an ability to move around within a local coverage area which may be connected to the network.
Today most modern day’s WLAN systems are based on IEEE 802.11 standards.
3) System-Area Network
System Area Network is used for a local network. It offers high-speed connection in server-to-
server and processorto-processor applications. The computers connected on a SAN network
operate as a single system at quite high speed.
POLAN allows you to use optical splitter which helps you to separate an optical signal from a
single-mode optical fiber. It converts this single signal into multiple signals.
These types of network connections help computer owners to interconnect with multiple
computers. This network allows sharing files, programs, printers, and other peripherals.
81
7) Campus Area Network (CAN):
A Campus Area Network is made up of an interconnection of LANs within a specific
geographical area. For example, a university campus can be linked with a variety of campus
buildings to connect all the academic departments.
8) Virtual Private Network:
A VPN is a private network which uses a public network to connect remote sites or users
together. The VPN network uses “virtual” connections routed through the internet from the
enterprise’s private network or a thirdparty VPN service to the remote site.
It is a free or paid service that keeps your web browsing secure and private over public WiFi
hotspots.
Network topology
The term Network Topology defines the geographic Physical or logical arrangement of computer networking
devices . The term Topology refers to the way in which the various nodes or computers of a network are linked
together. It describes the actual layout of the computer network hardware. Two or more devices connect to a link;
two or more links form a topology. Topology determines the data paths that may b e used between any pair of
devices of the network.
The selection of a Network Topology for a network can not be done in isolation as it affects the choice of media
and the access method used. Because it determines the strategy used in wiring a building for a network and
deserves some careful study.
Type s of Topologies
82
• Mesh
• Star
• Bus
• Ring
• Tree and Hybrid
Mesh Topology
83
In mesh topology each device is connected to every other device on the network through a dedicated point -to-point
link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we
have n devices in the net work then each device must be connected with (n-1) devices of the network. Number of links
in a mesh topology of n devices would be n(n-1)/2.
1. Full Mesh Topology: In this topology each device is connected to the all devices
available on the network.
2. Partial Mesh Topology: In partial mesh topology, each device is connected to o n
ly those devices, to which they communicate frequently. This serves the purpose of
mesh topology and saves the cost of redundant connection, wh ere no communic a
tion happens and connection is not required.
1. No data loss: No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.
2. Reliable: Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
3. Secure: Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.
4. Easy to troubleshoot: Fault detection is easy as there is a separate connection between each
devices.
5. Fast communication: As there is a dedication connection between two devices on a network,
the communication is fast.
Disadvantages of Mesh topology
84
1. Amount of wires required to connected each system is tedious and headache.
2. Since each device needs to be connected with other devices, number of I/O ports required must
be huge.
3. Scalability issues because a device cannot be connected with large number of devices with a
dedicated point to point link.
Star Topology
85
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star
topology doesn’t allow direct communication between devices, a device must have to communicate through hub.
If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that
data to the designated device.
The central device is known as hub and other devices connected to hub are called clients . Generally Coaxial
cable or RJ-45 cables are used to connect the clients to the hub.
1. Less expensive: Less expensive because each device only need one I/O port and needs to be connected with
hub with one link.
2. Easier to install
3. Cost effective: Less amount of cables required because each device needs to be connected with
the hub only.
4. Robust: If one link fails, other links will work just fine.
5. Easy to troubleshoot: Easy fault detection because the link can be easily identified.
6. Reliable: Each device is separately connected to the hub, so a connection failure between a
device and hub doesn’t affect the connection of the other devices.
7. Expendable: It is easy to add new devices to the network in star topology. This is because a
new device just requires a connection to the hub and it can easily communicate with other
devices on the network.
86
1. If hub goes down everything goes down, none of the devices can work without hub.
2. Hub requires more resources and regular maintenance because it is the central system of star topology.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through
drop lines. There is a device called tap that connects the drop line to the main cable. Since all the
87
data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable
can have.
• The main cable that is connected to the devices on the network using drop line is
called backbone cable.
• The main cable broadcast the message to all the devices connected to it.
• When a device wants to sends a message, it transmits the message to the
backbone cable. All the other devices connected to the backbone cable receives the
message whether they are intended to receive the message or not.
• The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access). This method is used to prevent the collision of data as two or
more devices can send the data to main cable at the same time.
CSMA: This method is developed to decrease the chance of collisions when two or more devices
starts sending the signal at the same time.
CSMA CD (Carrier Sense Multiple Access with Collision Detection): In this method, a device
monitors the transmission medium after it sends the data to see if the transmission was successful.
If successful, the device marks the communication successful else it sends the data again.
CSMA CA (Carrier Sense Multiple Access with Collision Avoidance): This method tries to
prevent the collision from happening. In this method, before sending the data, the device checks
the transmission medium to see if it is busy or not. If busy, then the sender device waits until the
transmission medium becomes idle.
Advantages of bus topology
88
Disadvantages of bus
topology
1. Difficultly in fault detection.
2. Not scalable as there is a limit of how many nodes you can connect with cable.
backbone
3. Difficult to troubleshoot:
It is difficult to identify the cause of failure.
4. Data collision: When two or more devices send the data simultaneously then there is a chance of data collision.
However this can be solved by implementing CSMA ques that
techni
we discussed above.
Ring Topology
89
In ring topology each device is connected
wo with
devices
the ton either side of it. There are two dedicated point to
point links a device has with the devices on the either side of it. This
a ring
structure
thus it is
forms
known as ring
topology.
If a device wants to send data to another device then it sends the data in one direction, each device in ring topology
has a repeater, if the received data is intended for other device then repeater
ata until
forwards
the intended
this d
device receives it.
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only two links are required
to be changed.
90
3. Less expensive: Generally Twisted pair cabling is used in ring topology which is inexpensive
and easily available.
4. Easy maintenance: The network in ring topology is easy to maintain as a system failure
doesn’t affect other systems on network, the failed system can be easily removed and installed
again after fixing the issue.
Hybrid topolo
gy
A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh
topology is known as hybrid topology.
Advantages of Hybrid
topology
1. We can choose the topology based on the requirementscalability
for example,
is our concern then we can use star
topology instead of bus technology.
2. Scalable as we can further connect other computer networks with the existing networks with different topologies.
91
1. Fault detection is difficult.
2. Installation is difficult.
3. Design is complex so maintenance is high thus expensive.
Tree topology
Tree topology is an
example of hybrid topology as it is a combination of
star t o
•
pology and bus topology .
The devices are connected to each
other in hierarchical manner. Each node has
r a
•
bitrary number of child nodes. The device at the top of the hierarchy is known as
root node and other devices that are lower in hierarchy known as descendants of
the root node.
There is a single path betweenotw
devices and this is the path of the communic
a
•
tion between devices.
Tree topology is also called
star - bus topology .
•
Advantages of Tree
topology
1. Easy error detection.
2. Expendable:It is easy to add new devices to the network in tree topology.
92
3. Easy maintenance: Devices are grouped in small star networks and these star networks
are connected to each other using bus topology. It is easy to manage a device in small star
network.
4. Reliable: One system failure doesn’t bring the whole network down. The failed system
can be easily managed. 5. Supports broadband transmissions: It supports broadband
transmission that is reason this topology is frequently used in corporate networks.
Disadvantages of Tree topology
For successful communication to occur, the sender and receiver must agree upon certain
rules called protocol. A Protocol is defined as a set of rules that governs data
communications. A protocol defines what is to be communicated, how it is to be
communicated and when it is to be communicated.
Elements of a Protocol
93
There are three key elements of a protocol:
A. Syntax
It means the structure or format of the data.
B. Semantics
It tells the meaning of each section of bits and indicates the interpretation of each section.
C. Timing
It tells the sender about the readiness of the receiver to receive the data
It tells the sender at what rate the data should be sent to the receiver to avoid overwhelming
the receiver.
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
94
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and
documents, etc.
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext
among two or more systems. HTML tags are used for creating links. These links may be
in any form like text or images. HTTP is designed on Client-server principles which allow
a client system for establishing a connection with the server machine for making a
request. The server acknowledges the request initiated by the client and responds
accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text
Transfer Protocol Secure is a standard protocol to secure the communication among two
computers one using the browser and other fetching data from web server. HTTP is used
for transferring data between the client browser (request) and the web server (response) in
the hypertext format, same in case of HTTPS except that the transferring of data is done in
an encrypted format. So it can be said that https thwart hackers from interpretation or
modification of data throughout the transfer of packets.
9. Telnet: Telnet is a set of rules designed for connecting one system with another. The
connecting process here is termed as remote login. The system which requests for
connection is the local computer, and the system which accepts the connection is the
remote computer.
10. Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server
principle.
95
c. Main Area Network d. Metropolitan Area Network
a. LAN b. WAN
c. MAN d. BUS
a. Mosaic b. Netscape
......... are set of rules and procedures to control the data transmission over the internet
a. IP address b. Domains
c. Protocol d. Gateway
a. MS Word b. Editors
c. PowerPoint d. MS publisher
------ is the measurement of things such as fingerprints and retinal scans used for security access.
What is the most common tool used to restrict access to a computer system?
a. Encryption. b. a firewall.
c. Firewall. d. UPS.
------Is defined as any crime completed through the use of computer technology.
c. Hacking d. Cracking
97
The process of transferring files from a computer on the Internet to your computer is called
a. Downloading b. uploading
c. FTP d. JPEG
Unit-4
Brief history of e-commerce, definitions of e-commerce, technical components and their
functions, e-commerce versus traditional business, requirements of e-commerce. Advantages and
disadvantages of e-commerce, Value chain in e-commerce, current status of e-commerce in India.
Types of business models (B2B, B2C, C2B, C2C) with examples.
Amidst the landmark events of 1969, the history of eCommerce in the USA – and the world –
begins in Columbus, Ohio with the launch of CompuServe, the first eCommerce company.
Because there’s no internet, the company provides computer sharing services to businesses by
sending data through phone lines (known as Electronic Data Interchange, or EDI).
You may hear that the first online sale was marijuana, but this is only partially true. While
Stanford University and MIT students do use an Arpanet account to make a marijuana sale,
money and product still exchanges hands in person. So while a computer facilitates the
transaction, it’s not truly “sold over the internet.”
As our nation celebrates its bicentennial, Atalla Technovation and Bunker Ramo Corporation
introduce products designed for secure online transaction processing, intended for financial
institutions.
Ten years after the founding of CompuServe, British inventor Michael Aldrich demonstrates how
electronic shopping could work by connecting a modified television to a transactionprocessing
computer via telephone line.
California State Assembly holds its first hearing on "electronic commerce." Testifying are
CPUC, MCI Mail, Prodigy, CompuServe, Volcano Telephone, and Pacific Telesis. A year later,
California's Electronic Commerce Act would pass, imposing certain requirements on systems
designed "to conduct the purchase of goods and services via a telecommunications network."
99
One of the first examples of online retail, CompuServe introduces the Electronic Mall in 1984,
allowing its users to purchase products from approximately 100 different merchants. Check out
these vintage news clips highlighting this new way to shop. Think it will catch on?
The first web browser launches, which will be a catalyst for online shopping as internet users can
quickly find what they’re looking for and retailers can reach a broader audience.
A full ten years after the launch of the Electronic Mall, Netscape 1.0 releases. Featuring a
protocol called Secure Socket Layer (SSL), it keeps both the sending and receiving side of online
transactions secure through encryption. A number of third-party credit card processing companies
launch shortly after as the internet becomes a truly commercial medium.
The first ever secure online transaction using encryption takes place on August 11, 1994, when
Phil Brandenberger purchases the Sting CD Ten Summoners’ Tales through NetMarket, as
reported in the New York Times story “Attention Shoppers: Internet is Open.”
Online marketplaces begin opening up. This includes Jeff Bezos’ Amazon, initially designed for
selling books, and Pierre Omidyar’s AuctionWeb, the first online auction site which would soon
become known as eBay. 1998: PayPal Launches
Originally introduced as Confinity, PayPal debuts as a money transfer tool. By 2000, it would
merge with Elon Musk’s online banking company and mark its rise in popularity.
Startups proliferate, with entrepreneurs being seduced by the get-rich-quick promise of the
internet. Of course, the good times won’t last forever...
The bubble bursts with the NASDAQ falling 75% from March 2000 to October 2002, erasing
most of the gains made since the internet took off. Many online and technology entities declare
bankruptcy, including Webvan, an early grocery delivery service.
Despite the bust, Google AdWords is introduced as a way for eCommerce companies to advertise
through short-text ad copy and display URLs. Pay-per-click (PPC) advertising efforts of online
retailers takes off.
100
2005: eCommerce Makes a Comeback
eCommerce bounces back from the bust big time, and Cyber Monday (the Monday after Black
Friday) is introduced to boost online holiday purchases. In addition, Amazon launches Amazon
Prime, giving members free 2-day shipping within the United States and making expedited
shipping a consumer expectation. Today, there are approximately 142 million Prime members in
the United States.
Shopify as we know it today is founded by Tobias Lütke, Daniel Weinand, and Scott Lake,
making it easy for merchants to create online stores. Many other eCommerce platforms, such as
Magento and BigCommerce, quickly enter the space and make a name for themselves.
Though the aforementioned Webvan and other grocery delivery services failed or struggled in the
past, food shopping finally finds its groove in 2012, with the founding of Instacart. Instacart
sends shoppers to local stores to pick out groceries that consumers order online. Today, with
advances in cold warehousing and delivery, online food shopping is big business.
Also in 2012, fulfillment solutions provider The Fulfillment Lab is founded by Rick Nelson,
giving eCommerce business owners further insight into their inventory, new methods of
customizing packaging, and more ways to increase sales.
The coronavirus pandemic forces many physical stores to close their doors, and lockdowns keep
many citizens quarantined at home. To purchase essentials and combat boredom, people embrace
online shopping. According to data from IBM’s U.S. Retail Index, the pandemic accelerated the
shift away from physical stores to digital shopping by roughly five years.
Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and
selling of goods or services using the internet, and the transfer of money and data to execute these
transactions. Ecommerce is often used to refer to the sale of physical products online, but it can
also describe any kind of commercial transaction that is facilitated through the internet.
101
Whereas e-business refers to all aspects of operating an online business, ecommerce refers
specifically to the transaction of goods and services.
The history of ecommerce begins with the first ever online sale: on the August 11, 1994 a man
sold a CD by the band Sting to his friend through his website NetMarket, an American retail
platform. This is the first example of a consumer purchasing a product from a business through
the World Wide Web—or “ecommerce” as we commonly know it today.
Since then, ecommerce has evolved to make products easier to discover and purchase through
online retailers and marketplaces. Independent freelancers, small businesses, and large
corporations have all benefited from ecommerce, which enables them to sell their goods and
services at a scale that was not possible with traditional offline retail.
Every business person is looking to have an online store to sell their range of products and
services. Creating an effective business strategy is one of the major keys as it defines what your
business offers. Having a clear purpose and direction will help you understand the things you
need and your consumers.
Customer Engagement
To convert potential consumers, you need to make a good first impression. Your website
represents your online presence, and you need to be creative as well.
Getting the best design for your website can last your impression, and easy navigation to your
website can give your consumers an excellent shopping experience. You can go for a less stylish
design or bold themes with colors to represent your website.
The pages of your website are also important. Your “About Us” page conveys details about your
business niche, your location, and what you serve. Adding good quality images and a unique
description of your products is also a must. Adding an FAQ page that can answer the basic
questions of your customers will add up to your customer satisfaction experience.
The quality of your products can help you gain trusted and loyal consumers. This also reduces
your time, cost, and risk of getting return requests for defective products.
This will create a negative impression that products you sell online are not of good quality. You
create a good impression and brand reputation by ensuring your online consumers that your
products are genuine and of good quality. Getting ISO accreditation is another way of gaining
your consumers’ trust.
102
Standardization Of Your Product Prices
Online consumers always look for and compare the product prices that you offer. Product pricing
is considered to be a marketing tool and has a direct effect on your conversion rates. This is the
reason why you must evaluate your product prices.
You have to keep in mind that when an online consumer visits a website, the first thing they look
for is the product’s price A proven way to standardize your product pricing is by having a
costbased model that works in three steps deciding your cost price, wholesale price, and your
retail price.
Your online store must be secured so that your consumers will have the confidence to purchase
your products. Your online retail shopping cart should have excellent security features that will
prevent your consumers’ personal information from falling into the wrong hands. This can
directly improve your business’ reputation.
There are different ways to secure your eCommerce website. One is by using an SSL (Secure
Socket Layer) certificate that encrypts data on your website to secure it from online threats.
Another is implementing advanced verification methods. This will earn your consumer’s trust
because they know you are taking good security measures.
Online consumers trust the reliability part. If your customer support attends to their questions,
queries, and problems relating to product purchase, payment, returns, and delivery adds reliability
and trust to your brand.
Your customer service should be available 24/7 and must provide your consumers with an
excellent approach. Additionally, you can use a chatbot for connecting with your audience on a
personal level.
Having good customer service will help you gain and retain consumers. This will also help you
build your brand identity.
Enabling M-Commerce
Your online eCommerce business should be able to adapt to technological advancement to stay
competitive in the market. M-Commerce or Mobile Commerce is an innovative trend in online
retailers nowadays.
Most consumers do their product research, purchase, and payment with the use of their
smartphones. Having a mobile app for your online retail store is the main component of an
103
effective eCommerce business. It is also important that you should monitor and upgrade your app
regularly.
Therefore, promoting your eCommerce business on social media will surely boost your store’s
presence, engagement, and conversion rate. 4.4 E-commerce versus traditional business
Comparison Chart
BASIS FOR TRADITIONAL COMMERCE E-COMMERCE
COMPARISON
Processing of Automatic
Transactions
24×7×365
104
Resource focus Supply side Demand side
ship
Payment Cash, cheque, credit card, etc. Credit card, fund transfer etc.
Advantages of eCommerce
There are a number of prominent and not-so-obvious advantages for doing business on an
online platform. Understanding exactly how e-Commerce works can help individuals
leverage them to their and their businesses advantage:
Disadvantages of e-Commerce
Running a business that is e-commerce is not always rainbows and unicorns. There are
unique challenges to this business model — learning about them will help business people
navigate the choppy waters and avoid common pitfalls.
A value chain is a business model that describes the full range of activities needed to
create a product or service. For companies that produce goods, a value chain comprises the
steps that involve bringing a product from conception to distribution, and everything in
between— such as procuring raw materials, manufacturing functions, and marketing
activities.
Primary Activities
Primary activities consist of five components, and all are essential for adding value and creating
competitive advantage:
Describes how widely ecommerce is used, the primary sectors that sell through ecommerce,
and how much product/service in each sector is sold through e-commerce versus brick-and-
mortar retail. Includes what a company needs to know to take advantage of ecommerce in
the local market with a list of reputable, prominent B2B websites.
Online retail sales in India are expected to grow by 31 per cent to US$ 32.70 billion in 2018,
led by Flipkart, Amazon India and Paytm Mall.
Electronics is currently the biggest online retail sales category with a share of 48 per cent,
followed closely by apparel at 29 per cent.
• Launch of Paytm Payment Bank. Paytm bank is India's first bank with zero charges
on online transactions, no minimum balance requirement and free virtual debit card
• The E-commerce industry in India witnessed 21 private equity and venture capital
deals worth US$ 2.1 billion in 2017 and 40 deals worth US$ 1,129 million in the first
half of 2018.
• Google enters India's eCommerce Space with Google Shopping. Google and Tata
Trust have collaborated for the project ‘Internet Saathi’ to improve internet penetration
among rural women in India
Government Initiatives:
• The Reserve Bank of India (RBI) has decided to allow "inter-operability" among
Prepaid Payment Instruments (PPIs) such as digital wallets, prepaid cash coupons and
prepaid telephone topup cards. RBI has also instructed banks and companies to make all
know-your-customer (KYC)compliant prepaid payment instruments (PPIs), like mobile
wallets, interoperable amongst themselves via Unified Payments Interface (UPI).
• The Government of India has distributed rewards worth around US$23.8 million to 1
million customers for embracing digital payments, under the Lucky Grahak Yojana and
Digi-Dhan Vyapar Yojana.
• To increase the participation of foreign players in the e-commerce field, the Indian
Government hiked the limit of foreign direct investment (FDI) in the E-commerce
marketplace model for up to 100 per cent (in B2B models).
• The e-commerce industry been directly impacting the micro, small & medium
enterprises (MSME) in India by providing means of financing, technology and training
and has a favorable cascading effect on other industries as well.
NEW Government Regulatory Landscape for eCommerce Foreign Direct Investment (FDI):
On December 26th, 2018 the Department for Promotion of Industry and Internal Trade
under the Ministry of Commerce (the "DPIIT"), introduced stricter guidelines that govern
foreign direct investment ("FDI") in e-commerce firms.Equity Ownership
The sizes of companies, engaged in B2B, can be different – from the smallest to the largest.
Let’s say, very small barbershops can be consumers of products of large (mass-production)
factories, which produce hair clippers, trimmers, and other similar equipment. And vice versa: a
small firm, consisting of ten developers, can supply entire corporations with exclusive software.
Originally, the term was used to describe any type of process of selling products between
enterprises. Today, it is more commonly used to describe online transactions between companies.
There are many other examples of industries, but they depend on the country, economy, and many
other factors.
B2C
B2C (Business-To-Consumer) is a commercial activity between companies and consumers.
It can be a huge supermarket, online store, or even a small branch of a law firm (consulting
individuals).
Initially, the term was used to define any type of process of selling products directly to
consumers, including shopping in-store or eating in a restaurant. Nowadays, it is used to
describe transactions between online retailers and their customers.
Stationary points of sale. It is about all kinds of brick-and-mortar stores. Any large
or small shop near your house, even a tobacco kiosk, is a B2C business;
Mobile points of sale. Hot dogs on wheels, portable coffee carts, and even
individuals (entrepreneurs) that sell goods on the street are good examples of mobile points
of sale;
Catering, such as fast food networks (McDonald’s or Burger King), cafes,
restaurants, diners, bars, pubs, etc.;
E-commerce. It is the biggest sector, including all kinds of online stores, from
specialized (for example, Oriflame or DeWalt) to general (like Amazon) ones. It is about
any product or service aimed at the final consumer.
C2C
Initially, the C2C model implies direct sales between individuals. Today, it is more about
online sales between individuals. In this case, a need for a third-party emerges (marketplaces
and classified advertisements sites, such as eBay, Craigslist, or Gumtree). Thus, if you buy
an iPad on eBay from an individual, not an entrepreneur, it is a classic C2C model. If you
sell a chainsaw to your neighbor, it is also an example of C2C, however, an offline “old-
school” type.
C2B
C2B (Consumer-To-Business) is a little unusual model of e-commerce. Consumers define
(bid) prices on goods and services (offered by businesses) by themselves. An American
company Priceline.com is a typical example of C2B. Thus, the company is more like a
broker, which searches for firms that are ready to sell goods or services for the bid (by the
customer) prices.
E-Government
With the modern development of technology, it is quite logical to move some interaction
with the government and state to the electronic form. It includes the collection of taxes and
duties, registration of vehicles and small and medium-sized businesses, communication with
the traffic police, etc.
INTRODUCTION
Communication plays a vital role in the fulfillment of all marketing objectives.
Understanding communication is essential since it is the basic process through which
managers specifically and organizations in their entirety accomplish their set
objectives culminating in their success. Various communication tools are MS Word,
MS Excel, MS Powerpoint.
4.2 OBJECTIVES
What is Ms Office
Microsoft Office is the most efficient suite of applications for document creation,
communication and business information analysis. For many functions, the business
platform has evolved from paper to the Web. Microsoft Office extends desktop
productivity to the web, streamlining the way you work and making it easier to
share, access and analyze information so you get better results. Office offers a
multitude of new features. Of particular importance for this release are the features
that affect the entire suite. These Office-wide, or shared features hold the key to the
new realm of functionality enabled by Office. Office offers a new Web-productivity
work style that integrates core productivity tools with the Web to streamline the
process of sharing information and working with others. It makes it easier to use an
organization's intranet to access vital business information and provides innovative
analysis tools that help users
make better,timelierbusinessdecisions.Office deliversnew levels of resilienc
y and
intelligence, enabling users and organizations to get up and running quickly, stay working
• MS -WORD
• MS -EXCEL
• MS -POWER -POINT
• MS -ACCESS
4.3.1 MS - WORD
Ms-word is a owerful
p word processor that allows you to create :
• Memos
• Fax coversheets
• Web pages
• Reports
• Mailing labels
• Brochures
• Tables
4.3.2 MS -PowerPoint
There are many software packages to do the job of word processing. Some of them
work in DOS environment. Example are WordStar, Word Perfect and Professional
Write. But in these days working in WINDOWS is becoming more and more
popular. So let us consider software for word processing which works in
WINDOWS. Our choice is MSWORD because it is the most popular software in
these days.
MS-WORD is a part of the bigger package called MS OFFICE, which can do much more
than word processing.
4.4.1 INTRODUCTION
Word Processor is a Software package that enables you to create, edit, print and save
documents for future retrieval and reference. Creating a document involves typing by
using a keyboard and saving it. Editing a document involves correcting the spelling
mistakes, if any, deleting or moving words sentences or paragraphs.
document.
iv) Margins and page length can be adjusted as desired.
v) Spelling can be checked and modified through the spell check facility.
vi) Multiple document/files can be merged.
vii)Multiple copies of letters can be generated with different addresses through the
mailmerge facility.
To begin working in Word, start the program from within the Windows environment
or ‘workspace’. You can usually start Word by choosing Microsoft Word from the
Start menu’s Program submenu.
To start Word:
When you start working in Word, your monitor displays what appears to be a blank
piece of paper on your screen with a blinking black bar on the left. This screen, the
document window, is where you enter and manage your document text. Different
command interfaces and informational display areas, illustrated in Figure 4-1,
surround the document window. Each of these items allows you to receive
information about, or apply features to, your document. Microsoft Word wants you
to manage, organise, and create things with words. That's the essence of word
processing. What you see on the screen, on Word's interface, is designed to make
writing an easy and effortless task. The largest portion of the Word screen is for
composing text. It's blank and white, just like a fresh sheet of paper. That's where
you compose and format your text.
The title bar lists the document's title or merely Document1 until you
give the document a title by saving it to disk.
The File Ribbon Tab replaces the traditional File menu of most
Windows programmes. Clicking the File Ribbon Tab displays the File
Ribbon Tab menu, a list of commands that deal with files and documents. It's
the big round button at
the top left of the screen, with four colourful squares in it.
Tabs organise Word's various and sundry commands into groups based on word
processing activities. Tabs appear and disappear depending on what you're doing
in Word.
Groups and command buttons help keep commands for the various tabs
organised. Each group containscommand buttons that do specific things to your
text.
The Ruler may or may not be visible. When the Ruler is visible, it helps you set
margins and tabs. To show or hide the Ribbon select View Tab then Ruler.
These Microsoft Word Keyboard Shortcut will help you to complete your documents
much faster.
TABLE 4-1 STANDARD TOOLBAR
Standard Toolbar File, Print Preview Ctrl+F2 Standard Toolbar Tools, Grammar
Spelling and F7
like a two- page essay, a note for the babysitter, or a press release— a plain,
4.4.3.1 CREATING A NEW DOCUMENT
Whenunadorned
you startpageis fine. Or, when you’re just brainstorming and you’re not sure
Word without opening an existing document, the program gives you an
what you want the final document to look like, you probably want to start with
empty one to work in. If you’re eager to put words to page, then type away. Sooner or
a blank slate or use one of Word’s templates to provide structure for your text.
1.
Choose Office button → Open (Alt+F, O). In the Open window , navigate to
the folder and file you want to open .
The Open box goes away and your document opens in Word. You’re all set to get to
work. Just remember, when you
vesa
this document (Alt+F, S or Ctrl+S), you write over
the previous file. Essentially, you crea
te anew, improved, and only copy of the file you
just opened.If you don’t want to write over the existingdocument,use the Save As
command (Alt+F, A), and then type a new name in the File Name text box.
You can clear the formatting in a document by selecting the section you want to clear (or
You can quickly and easily add visual appeal to Word text using WordArt.
2. Begin typing.
3. Press the Enter key to add additional numbers.
4. Press the Enter key twice to get out of list mode.
In any working environment, there are situations when a similar type of letter or
document is to be sent to many persons who reside at different locations. The letters
may contain the address of each recipient, in addition to the standard information
contained in the letter. One way of doing this is to print the letters by changing the
address each time in the document after printing such letter. But this would mean lot
of effort and time and also results in bad organization.
Such problems are taken care of by the Mail Merge facility. In word processing,
Mail Merge is the process of transferring selected information from one document to
another document.
1) In a blank Microsoft Word document, click on the Mailings tab, and in the Start
Mail Merge group, click Start Mail Merge.
2 ) Click Step - by - Step Mail Merge Wizard.
3 ) Select your document type . In this demo we will select Letters. Click Next:
4) Select the starting document. In this demo we will use the current (blank)
Starting document.
document. Select Use the current document and then click Next: Select recipients.
5) Select recipients. In this demo we will create a new list, so select Type a new list and
then click Create.
a) Create a list by adding data in the New Address List dialog box and
clicking OK.
b)
c) Selecting Edit recipient list opens up the Mail Merge Recipients dialog
box, where you can edit the list and select or unselect records. Click OK to
accept the list as is.
d) Click Next: Write your letter.
8) Note that the address block and greeting line are surrounded by chevrons (« »).
9) Preview your letter and click Next: Complete the merge.
10) Click Print to print your letters or Edit individual letters to further personalize some
Presentation.
A) SLIDE SHOW
B) INSERTING A SOUND
Select the slide you are going to put the sound on
Insert << Audio >> Audio from File
Browse for your sound file >> Insert
MS-Excl Introduction
File, home, insert etc tab
Function related to String, maths , Date time Working of Macro
Working of vlookup, hlookup, goalseek etc.
3. Click in the Name Box, type A3, and then press Enter to make the cell active.
4. Press Ctrl+Down Arrow to go to the last row of data (cell A27). Take Note
Ctrl+Arrow shortcuts allow you to move to the start and end of ranges of data. The
worksheet title, which spans all of the columns, is not considered part of the worksheet’s
data range.
5. Press Ctrl+Right Arrow. Cell D27, the last column in the range of data, becomes the
active cell.
6. Press Ctrl+Down Arrow. The last possible row in the worksheet displays.
7. Press Ctrl+Home.
8. Use the vertical scroll bar to navigate from the beginning to the end of the data.
9. If your mouse has a wheel button, roll the wheel button forward and back to quickly
scroll through the worksheet.
The ribbon in Microsoft Office Excel 2016 is made up of a series of tabs, each related to
specific kinds of tasks that you perform in Excel. The Home tab, contains the commands
that people use the most when creating Excel documents. Having commands visible on the
work surface enables you to see at a glance most tasks you want to perform. Each tab
File Button: The leftmost tab on the Ribbon at the top of the Excel window —
replaces the Excel 2007 Office button and the Excel 2003 and earlier versions File
menu. This is where you will find commands and settings to manage and share your
files…
Quick Access Tool Bar: The Quick Access toolbar contains a few command icons. By
default, this toolbar holds buttons Save (Ctrl+S), Undo (Ctrl+Z), and Redo (Ctrl+Y).
Although you can customize the Quick Access toolbar to include your favorite
command that you frequently use.
Different Tab Ribbons: It contains tabs of Home, Insert, Page Layout, Formulas, Data,
Review, and Views. Each tab holds a group of commands associated with the tab.
Title Bar: The title bar displays the name of the active Spreadsheet.
Ribbon: Below the title bar is the Ribbon, which includes all Excel commands
available in a single area so that you can work with the program efficiently. The
commands in the Ribbon vary depending on which tab is selected. Workbook
commands are represented as buttons on the tabs that make up the Ribbon. By
default, the Home tab is active. Other tabs can be activated by clicking on one of the
other tabs, such as Insert, which displays the buttons of that tab. The Ribbon is
arranged in groups of related commands. Here’s a quick overview of the Excel tabs.
To get the respective ribbon, click on different tabs.
Home: You’re probably going to spend most of your time with the selected home
tab. ‘ This tab contains basic clipboard commands, formatting commands, style
commands, insert and delete commands for rows or columns, as well as a variety of
worksheet editing commands.
Insert: If you need to insert something into a worksheet, select this tab — a table, a
diagram, a chart, a symbol, etc.
Page Layout: This tab contains commands that affect your worksheet’s overall
appearance, including printing settings.
Formulas: Use this tab to insert a formula, name a range, access the tools for formula
auditing, or control how Excel performs calculations.
Data: Excel’ s data-related commands are on this tab.
Review: This tab contains tools for spell checking, translating words, adding
comments, or protecting sheets.
View: The View tab contains commands that control different aspects of viewing a sheet.
There are also some commands on this tab in the status bar.
Control Buttons:
At the right end of the title, the bar is the three familiar buttons that all windows
programs have the same functions. You can temporarily hide the word window by
clicking the Minimize button, adjust window size with the Restore Down /
Maximize button, and close the active document or quit Excel with the close button.
Name Box:
The address bar shows the active cell’s address. That’s why we get A1 in the name box
in the active cell above.
Formula Bar:
The formula bar is located in the top of the Excel worksheet below the toolbar. Use the
formula bar to enter and edit the data from the worksheet. In the formula bar, the
contents of the active cell will always appear.
Rows, Columns, and Cells:
Each worksheet consists of rows (numbered 1 to 1,048576) and columns (numbered
A through XFD). Each column is identified by one, two, or three letters: letters A to
Z is used in the first 26 columns. The next 26 columns are using AA to AZ, the
following 26 BA to BZ, and so on. Excel uses three letters when the two-letter
combinations are exhausted: AAA, B AAB, and so on. A number identifies each row,
ranging from 1 to 1048576.
Each cell is identified by its column lettering and its row number. For example, the cell
at the intersection of Column A and Row 1 is cell A1.
Sheet Tabs: By default, sheet tabs contain a list of worksheets, which includes three worksheets
named Sheet 1, Sheet 2, and Sheet 3.
Horizontal and Vertical Scroll Bar: The Scroll Bar is used to drop up / down / right
and left and see changes in the column/row number until you release the mouse button.
Zoom Slider: A slider that magnifies or reduces the conten t in the worksheet area.
Groups: Buttons are organized into groups on each tab. Depending on the size of the
program window, the button you are most likely to use in some groups is larger than the
rest.
Eg: 𝐴=𝑚c2
Q. Write 10 mathematics equations in MS word from Insert option using equation and symbol tab.
LAB work 8
Q. Create a manual by writing steps and pasting screenshots of Mail-Merge
LAB work 9
Q. Create a spreadsheet of the purchases made by a customer in a super mart having the following
fields:.
a. S.no
b. Product ID
c. Product Name
d. Product type(food, clothes, toys etc)
e. Quantity
f. Price per unit
Note: All the field names should be bold and underlined. Also Insert Borders to the spreadsheet. For
the spreadsheet created above, find the total bill, using the auto sum facility of Ms Excel.
LAB work 10
Q. Create a student performance report using Conditional formatting in M.S. Excel the following
specifications:
a. Greater than 70 yellow
b. Less than 50 green
c. Equal to 60 blue
d. Between 80-90 pink
LAB work 11
Q. Make use of the purpose of following functions in MS-Excel ROUND(), SQRT(), MIN(),
Lower(), ABS()
LAB work 12
Q. Create a list in Excel with the fields as CustCode, CustName, Address, OrderNo, OrderAmt,
Discount and Tax
-Calculate the following as
Discount is 10% of OrderAmt
Tax is 2% of OrderAmt
LAB work 13
Q. Draw a pie chart for sales report of XYZ Company for the last 5 years.
LAB work 14
Q. Create a record of Bank consisting of the following columns: (Goal Seek)
a. Customer id
b. Customer Name
c. Principle Deposited
d. Rate of Interest
e. Time
f. Now for the above table find the interest earned by each customer.
(i) Each customer must earn minimum interest of Rs5000, by changing the value of time period for
which money must be deposited
ii) change the minimum interest to Rs 10000 by changing the value of Principle.
LAB work 15
Q. Create a record or table of BBA(1ST Sem) consisting of the following fields:
a. S.no(number)
b. Name (text)
c. Date of birth(date)
d. Age(should not be less than 18)
e. Marks(not more than 100)
f. Remarks
g. For the above record, apply the appropriate data validation.
Q. For the record created above for BBA, protect your worksheet by providing password
a. Hide/unhide cells.
b. Allow users to select columns
c. Allow users to sort cells
d. Freeze and unfreeze the rows and columns.
Write steps for each of the following
LAB work 16
Q. Assuming you have 10 mins. time to prepare a presentation on your new business idea or product
of your choice or your dream future venture and gain attention of an angel investor to earn initial
investment amount. -Prepare an attention grabbing 2 slide presentation using template (excluding
introduction and thank you slide) Save the ppt with your name and take screen shots
LAB work 17
Q. Create a presentation on Types of Memory having a table for the Types of Memory and then
create hyperlinks on the types of Memory in the master slide that opens new slides for it.
LAB work 18
Q. Create a presentation on types of Operating Systems with different themes and apply the
animation effects on it. For the presentation created apply the different slide show options and
protect the presentation to restrict unauthorized access.
LAB work 19
Q. Create a ppt on the topic Windows versions. Apply slide number ,header and footer on the slides.
LAB work 20
Q. Create a quiz on the subject Computer application for business(10 slides)
Declaration by Faculty:
I, Preeti Taneja, Ankita Gulati, Gargi Mukherjee, Apurva Gupta and Mansi Agnihotri Ajay
Teaching Fundamental of Information Technology subject in BBA course I Sem have incorporated
all the necessary pages section/quotations papers mentioned in this check list above.