Professional Documents
Culture Documents
ITM Mba
ITM Mba
1|P ag e
Information Technology And Management By USMS Academic Support Team
This unit can store instructions, data, and intermediate results. This unit supplies information
to other units of the computer when needed. It is also known as internal storage unit or the
main memory or the primary storage or Random Access Memory (RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory are two
types of memories in the computer. Functions of the memory unit are −
It stores all the data and the instructions required for processing.
It stores intermediate results of processing.
It stores the final results of processing before these results are released to an output device.
All inputs and outputs are transmitted through the main memory.
2|P ag e
Information Technology And Management By USMS Academic Support Team
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual
data processing operations.
It is responsible for controlling the transfer of data and instructions among other units of a
computer.
It manages and coordinates all the units of the computer.
It obtains the instructions from the memory, interprets them, and directs the operation of the
computer.
It communicates with Input/Output devices for transfer of data or results from storage.
It does not process or store data.
Arithmetic Section
Logic Section
Arithmetic Section
Logic Section
Computer Memory
RAM (Random Access Memory) is the internal memory of the CPU for storing data,
program, and program result. It is a read/write memory which stores data until the machine is
working. As soon as the machine is switched off, data is erased.
Access time in RAM is independent of the address, that is, each storage location inside the
memory is as easy to reach as other locations and takes the same amount of time. Data in the
RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a
power failure. Hence, a backup Uninterruptible Power System (UPS) is often used with
computers. RAM is small, both in terms of its physical size and in the amount of data it can
hold.
3|P ag e
Information Technology And Management By USMS Academic Support Team
RAM is of two types
The word static indicates that the memory retains its contents as long as power is being
supplied. However, data is lost when the power gets down due to volatile nature. SRAM
chips use a matrix of 6-transistors and no capacitors. Transistors do not require power to
prevent leakage, so SRAM need not be refreshed on a regular basis.
There is extra space in the matrix, hence SRAM uses more chips than DRAM for the same
amount of storage space, making the manufacturing costs higher. SRAM is thus used as
cache memory and has very fast access.
Long life
No need to refresh
Faster
Used as cache memory
Large size
Expensive
High power consumption
DRAM, unlike SRAM, must be continually refreshed in order to maintain the data. This is
done by placing the memory on a refresh circuit that rewrites the data several hundred times
per second. DRAM is used for most system memory as it is cheap and small. All DRAMs are
made up of memory cells, which are composed of one capacitor and one transistor.
ROM stands for Read Only Memory. The memory from which we can only read but cannot
write on it. This type of memory is non-volatile. The information is stored permanently in
such memories during manufacture. A ROM stores such instructions that are required to start
4|P ag e
Information Technology And Management By USMS Academic Support Team
a computer. This operation is referred to as bootstrap. ROM chips are not only used in the
computer but also in other electronic items like washing machine and microwave oven.
Let us now discuss the various types of ROMs and their characteristics.
The very first ROMs were hard-wired devices that contained a pre-programmed set of data or
instructions. These kind of ROMs are known as masked ROMs, which are inexpensive.
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM program. Inside the PROM chip, there
are small fuses which are burnt open during programming. It can be programmed only once
and is not erasable.
EEPROM is programmed and erased electrically. It can be erased and reprogrammed about
ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased
one byte at a time, rather than erasing the entire chip. Hence, the process of reprogramming is
flexible but slow.
Advantages of ROM
Non-volatile in nature
Cannot be accidentally changed
Cheaper than RAMs
Easy to test
More reliable than RAMs
Static and do not require refreshing
Contents are always known and can be verified
5|P ag e
Information Technology And Management By USMS Academic Support Team
Mass Storage Devices
The first invention that revolutionized storage for the personal computer industry was the
introduction of floppy disks. Similar to tape, these magnetic storage devices were flat discs
that rotated within a sleeve. The original 5-inch size soon had an 8-inch larger version to
store more data, and both of these were eventually replaced by a smaller 3½-inch size that
actually stored more data–up to 1.44 megabytes. These were great improvements, but speed
and reliability were still a problem. Today, floppy disks have been almost entirely replaced
by other storage devices, such as CDs and DVDs, that are faster, more reliable, and have
huge storage capacities.
The addition of hard disk drives finally gave personal computers more reliable storage, with
faster loading and saving of programs and data. Similar to the concept of floppy disks, the
magnetic medium was placed on a hard metal platter that could spin much faster. Hard drives
soon became standard internal devices on PCs, although storage capacities of 20, 32 and 40
megabytes were filled rather rapidly. External hard drives, which are still in use, became
desirable add-ons. Today, however, external hard drives are small, fast, inexpensive and
available in storage capacities of 500 gigabytes and even 1 terabyte (1,000 gigabytes).
Flash drive
Solid state memory devices called “flash drives” have become a welcomed storage medium
for personal computer users. These small devices are only about 2 inches long and
conveniently plug into a computer‟s USB port. This makes them portable, enabling an easy
transfer of files between desktop and laptop computers, and even between PCs and Apple
computers. To the computer user, flash drives appear as another hard drive to which data can
be written and read at high speeds. Because there are no moving parts, flash drives are very
reliable and can sustain “bumps and bruises.” Storage capacities of up to 32 megabytes are
common. Flash drives are also referred to as “travel drives” and “removable disks.”
CDs and DVDs are optical storage media that are well suited for external storage, with DVDs
storing up to 4.7 gigabytes. These discs are easy to read and write, and are very reliable,
though scratches caused by mishandling can cause problems.
Now, even DVDs are being improved upon, with Blu-Ray versions increasing storage
capacity and “light scribe” technology enabling users to utilize the laser in their DVD drives
to etch labels on their discs.
6|P ag e
Information Technology And Management By USMS Academic Support Team
There are five computer generations known till date. Each generation has been discussed in
detail along with their time period and characteristics. In the following table, approximate
dates against each generation has been mentioned, which are normally accepted.
First Generation
1
The period of first generation: 1946-1959. Vacuum tube based.
Second Generation
2 The period of second generation: 1959-1965. Transistor based.
Third Generation
3 The period of third generation: 1965-1971. Integrated Circuit based.
Fourth Generation
4 The period of fourth generation: 1971-1980. VLSI microprocessor based.
Fifth Generation
5 The period of fifth generation: 1980-onwards. ULSI microprocessor based.
Input Technologies
Following are some of the important input devices which are used in a computer −
7|P ag e
Information Technology And Management By USMS Academic Support Team
Keyboard
Mouse
Joy Stick
Light pen
Track Ball
Scanner
Graphic Tablet
Microphone
Magnetic Ink Card Reader(MICR)
Optical Character Reader(OCR)
Bar Code Reader
Optical Mark Reader(OMR)
Keyboard
Keyboard is the most common and very popular input device which helps to input data to the
computer. The layout of the keyboard is like that of traditional typewriter, although there are
some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or
108 keys are also available for Windows and Internet.
Typing Keys
1
These keys include the letter keys (A-Z) and digit keys (09) which generally give
the same layout as that of typewriters.
Numeric Keypad
It is used to enter the numeric data or cursor movement. Generally, it consists of a
2 set of 17 keys that are laid out in the same configuration used by most adding
machines and calculators.
Function Keys
The twelve function keys are present on the keyboard which are arranged in a row
3 at the top of the keyboard. Each function key has a unique meaning and is used for
some specific purpose.
Control keys
4 These keys provide cursor and screen control. It includes four directional arrow
keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
8|P ag e
Information Technology And Management By USMS Academic Support Team
Control(Ctrl), Alternate(Alt), Escape(Esc).
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device having a
small palm size box with a round ball at its base, which senses the movement of the mouse
and sends corresponding signals to the CPU when the mouse buttons are pressed.
Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on the screen,
but it cannot be used to enter text into the computer.
Advantages
Easy to use
Not very expensive
Moves the cursor faster than the arrow keys of the keyboard.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends. The lower
spherical ball moves in a socket. The joystick can be moved in all four directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. It consists of a photocell and an optical system placed in
a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button is pressed, its
photocell sensing element detects the screen location and sends the corresponding signal to
the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of a
mouse. This is a ball which is half inserted and by moving fingers on the ball, the pointer can
be moved.
9|P ag e
Information Technology And Management By USMS Academic Support Team
Since the whole device is not moved, a track ball requires less space than a mouse. A track
ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used when
some information is available on paper and it is to be transferred to the hard disk of the
computer for further manipulation.
Scanner captures images from the source which are then converted into a digital form that
can be stored on the disk. These images can be edited before they are printed.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer can
convert a signal from the television or camera into a series of numbers that could be stored in
a computer. They can be used by the computer to create a picture of whatever the camera had
been pointed at.
Digitizer is also known as Tablet or Graphics Tablet as it converts graphics and pictorial data
into binary inputs. A graphic tablet as digitizer is used for fine works of drawing and image
manipulation applications.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
The microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.
MICR input device is generally used in banks as there are large number of cheques to be
processed every day. The bank‟s code number and cheque number are printed on the cheques
with a special type of ink that contains particles of magnetic material that are machine
readable.
This reading process is called Magnetic Ink Character Recognition (MICR). The main
advantages of MICR is that it is fast and less error prone.
OCR scans the text optically, character by character, converts them into a machine readable
code, and stores the text on the system memory.
10 | P a g e
Information Technology And Management By USMS Academic Support Team
Bar Code Readers
Bar Code Reader is a device used for reading bar coded data (data in the form of light and
dark lines). Bar coded data is generally used in labelling goods, numbering the books, etc. It
may be a handheld scanner or may be embedded in a stationary scanner.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which is
then fed to the computer that the bar code reader is connected to.
OMR is a special type of optical scanner used to recognize the type of mark made by pen or
pencil. It is used where one out of a few alternatives is to be selected and marked.
It is specially used for checking the answer sheets of examinations having multiple choice
questions.
Output Technologies
Monitors
Graphic Plotter
Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular
form. The sharpness of the image depends upon the number of pixels.
The CRT display is made up of small picture elements called pixels. The smaller the pixels,
the better the image clarity or resolution. It takes more than one illuminated pixel to form a
whole character, such as the letter „e‟ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be divided
into a series of character boxes – fixed location on the screen where a standard character can
11 | P a g e
Information Technology And Management By USMS Academic Support Team
be placed. Most screens are capable of displaying 80 characters of data horizontally and 25
lines vertically.
Large in Size
High power consumption
The flat-panel display refers to a class of video devices that have reduced volume, weight and
power requirement in comparison to the CRT. You can hang them on walls or wear them on
your wrists. Current uses of flat-panel displays include calculators, video games, monitors,
laptop computer, and graphics display.
Emissive Displays− Emissive displays are devices that convert electrical energy into light.
For example, plasma panel and LED (Light-Emitting Diodes).
Non-Emissive Displays− Non-emissive displays use optical effects to convert sunlight or
light from some other source into graphics patterns. For example, LCD (Liquid-Crystal
Device).
Printers
Impact Printers
Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then pressed on
the paper.
Character printers
Line printers
12 | P a g e
Information Technology And Management By USMS Academic Support Team
Character Printers
Character printers are the printers which print one character at a time.
In the market, one of the most popular printers is Dot Matrix Printer. These printers are
popular because of their ease of printing and economical price. Each character printed is in
the form of pattern of dots and head consists of a Matrix of Pins of size (5*7, 7*9, 9*7 or
9*9) which come out to form a character which is why it is called Dot Matrix Printer.
Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally used for
word-processing in offices that require a few letters to be sent here and there with very nice
quality.
Advantages
Disadvantages
Line Printers
13 | P a g e
Information Technology And Management By USMS Academic Support Team
Line printers are the printers which print one line at a time.
Drum Printer
Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the drum is
divided into a number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper
width of 132 characters, drum will have 132 tracks. A character set is embossed on the track.
Different character sets available in the market are 48 character set, 64 and 96 characters set.
One rotation of drum prints one line. Drum printers are fast in speed and can print 300 to
2000 lines per minute.
Advantages
Disadvantages
Very expensive
Characters fonts cannot be changed
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard
character set may have 48, 64, or 96 characters.
Advantages
Disadvantages
Noisy
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a
complete page at a time, thus they are also called as Page Printers.
Laser Printers
14 | P a g e
Information Technology And Management By USMS Academic Support Team
Inkjet Printers
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to form
the characters to be printed on a page.
Advantages
Disadvantages
Expensive
Cannot be used to produce multiple copies of a document in a single printing
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology. They
print characters by spraying small drops of ink onto paper. Inkjet printers produce high
quality output with presentable features.
They make less noise because no hammering is done and these have many styles of printing
modes available. Color printing is also possible. Some models of Inkjet printers can produce
multiple copies of printing also.
Advantages
Disadvantages
15 | P a g e
Information Technology And Management By USMS Academic Support Team
The digit
The position of the digit in the number
The base of the number system (where the base is defined as the total number of digits
available in the number system)
The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the
successive positions to the left of the decimal point represent units, tens, hundreds, thousands,
and so on.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds
position, and 1 in the thousands position. Its value can be written as
1000 + 200 + 30 + 4
1234
16 | P a g e
Information Technology And Management By USMS Academic Support Team
Binary Number System
1
Base 2. Digits used : 0, 1
Example
Binary
Step Decimal Number
Number
Step
101012 ((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10
1
Step
101012 (16 + 0 + 4 + 0 + 1)10
2
Step
101012 2110
3
17 | P a g e
Information Technology And Management By USMS Academic Support Team
Characteristics of the octal number system are as follows −
Example
Octal
Step Decimal Number
Number
Step
125708 ((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80))10
1
Step
125708 (4096 + 1024 + 320 + 56 + 0)10
2
Step
125708 549610
3
Example
18 | P a g e
Information Technology And Management By USMS Academic Support Team
Calculating Decimal Equivalent −
Binary
Step Decimal Number
Number
Step
19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10
1
Step
19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
2
Step
19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
3
Step
19FDE16 10646210
4
There are many methods or techniques which can be used to convert numbers from one base
to another. In this chapter, we‟ll demonstrate the following −
Step 1 − Divide the decimal number to be converted by the value of the new base.
Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant digit) of the
new base number.
Step 3 − Divide the quotient of the previous divide by the new base.
Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the new base
number.
19 | P a g e
Information Technology And Management By USMS Academic Support Team
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD) of the new base
number.
Example
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so
that the first remainder becomes the Least Significant Digit (LSD) and the last remainder
becomes the Most Significant Digit (MSD).
Step 1 − Determine the column (positional) value of each digit (this depends on the position
of the digit and the base of the number system).
Step 2 − Multiply the obtained column values (in Step 1) by the digits in the corresponding
columns.
Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in decimal.
Example
20 | P a g e
Information Technology And Management By USMS Academic Support Team
Binary Number: 111012
Step 2 − Convert the decimal number so obtained to the new base number.
Example
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5/2 2 1
Step 4 2/2 1 0
Step 5 1/2 0 1
Step 1 − Divide the binary digits into groups of three (starting from the right).
Step 2 − Convert each group of three binary digits to one octal digit.
Example
Step 2 101012 28 58
22 | P a g e
Information Technology And Management By USMS Academic Support Team
Shortcut Method ─ Octal to Binary
Step 1 − Convert each octal digit to a 3-digit binary number (the octal digits may be treated
as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single binary
number.
Example
Step 1 − Divide the binary digits into groups of four (starting from the right).
Step 2 − Convert each group of four binary digits to one hexadecimal symbol.
Example
23 | P a g e
Information Technology And Management By USMS Academic Support Team
Step 2 101012 110 510
Step 1 − Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits
may be treated as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single binary
number.
Example
24 | P a g e
Information Technology And Management By USMS Academic Support Team
The computer programmer (or several computers programmers) write the instructions
using a programming language that tell the software how to function and what to do.
Once the program has been completed, it is compiled into a language that the computer
can understand.
Applications Software
Application software, or simply applications, are often called productivity programs or
end-user programs because they enable the user to complete tasks, such as creating
documents, spreadsheets, databases and publications, doing online research, sending
email, designing graphics, running businesses, and even playing games! Application
software is specific to the task it is designed for and can be as simple as a calculator
application or as complex as a word processing application. When you begin creating a
document, the word processing software has already set the margins, font style and
size, and the line spacing for you. But you can change these settings, and you have
many more formatting options available. For example, the word processor application
makes it easy to add color, headings, and pictures or delete, copy, move, and change
the document’s appearance to suit your needs.
Systems Software
Systems software includes the programs that are dedicated to managing the computer
itself, such as the operating system, file management utilities, and disk operating system
(or DOS). The operating system manages the computer hardware resources in addition
to applications and data. Without systems software installed in our computers we would
have to type the instructions for everything we wanted the computer to do!
25 | P a g e
Information Technology And Management By USMS Academic Support Team
Different kinds of languages have been developed to perform different types of work on the
computer. Basically, languages can be divided into two categories according to how the
computer understands them.
System languages:These are designed for low-level tasks, like memory and process
management
Scripting languages:These tend to be high-level and very powerful
Domain-specific languages:These are only used in very specific contexts
Visual languages:Languages that are not text-based
Esoteric languages:Languages that are jokes or are not intended for serious use
These languages are not mutually exclusive, and some languages can belong to multiple
categories. The terms low-level and high-level are also open to interpretation, and some
languages that were once considered high-level are now considered low-level as languages
have continued to develop.
Low-Level Languages
Low-level computer languages are either machine codes or are very close them. A computer
cannot understand instructions given to it in high-level languages or in English. It can only
understand and execute instructions given in the form of machine language i.e. binary. There
are two types of low-level languages:
26 | P a g e
Information Technology And Management By USMS Academic Support Team
Machine Language:a language that is directly interpreted into the hardware
Assembly Language: a slightly more user-friendly language that directly corresponds to
machine language
Machine Language
Machine language is the lowest and most elementary level of programming language and was
the first type of programming language to be developed. Machine language is basically the
only language that a computer can understand and it is usually written in hex.
In fact, a manufacturer designs a computer to obey just one language, its machine code,
which is represented inside the computer by a string of binary digits (bits) 0 and 1. The
symbol 0 stands for the absence of an electric pulse and the 1 stands for the presence of an
electric pulse. Since a computer is capable of recognizing electric signals, it understands
machine language.
Advantages Disadvantages
Machine language
All operation codes have
makes fast and efficient
to be remembered
use of the computer.
It requires no translator
to translate the code. It All memory addresses
is directly understood have to be remembered.
by the computer.
It is hard to amend or
find errors in a program
written in the machine
language.
Assembly Language
These alphanumeric symbols are known as mnemonic codes and can combine in a maximum
of five-letter combinations e.g. ADD for addition, SUB for subtraction, START, LABEL etc.
Because of this feature, assembly language is also known as „Symbolic Programming
Language.‟
27 | P a g e
Information Technology And Management By USMS Academic Support Team
This language is also very difficult and needs a lot of practice to master it because there is
only a little English support in this language. Mostly assembly language is used to help in
compiler orientations. The instructions of the assembly language are converted to machine
codes by a language translator and then they are executed by the computer.
Advantages Disadvantages
Assembly language is
Like machine language, it
easier to understand and
is also machine
use as compared to
dependent/specific.
machine language.
Since it is machine
It is easy to locate and dependent, the
correct errors. programmer also needs to
understand the hardware.
It is easily modified.
High-Level Languages
High-level computer languages use formats that are similar to English. The purpose of
developing high-level languages was to enable people to write programs easily, in their own
native language environment (English).
High-level languages are basically symbolic languages that use English words and/or
mathematical symbols rather than mnemonic codes. Each instruction in the high-level
language is translated into many machine language instructions that the computer can
understand.
Advantages Disadvantages
A high-level language
has to be translated into
High-level languages
the machine language by
are user-friendly
a translator, which takes
up time
28 | P a g e
Information Technology And Management By USMS Academic Support Team
Advantages Disadvantages
A program written in a
high-level language can
be translated into many
machine languages and
can run on any
computer for which
there exists an
appropriate translator
The language is
independent of the
machine on which it is
used i.e. programs
developed in a high-
level language can be
run on any computer
text
Many languages have been developed for achieving a variety of different tasks. Some are
fairly specialized, and others are quite general.
29 | P a g e
Information Technology And Management By USMS Academic Support Team
These languages are oriented towards the computational procedures for solving mathematical
and statistical problems.
Examples include:
These languages are best able to maintain data processing procedures and problems involved
in handling files. Some examples include:
These are used for string manipulation, including search patterns and inserting and deleting
characters. Examples are:
C++
Java
Visual Basic
Visual Java
Visual C
30 | P a g e
Information Technology And Management By USMS Academic Support Team
Assembler:
Assembler is a computer program which is used to translate program written in Assembly
Language in to machine language. The translated program is called as object program.
Assembler checks each instruction for its correctness and generates diagnostic messages, if
there are mistakes in the program. Various steps of assembling are:
Compiler:
A compiler is a program that translates a programme written in HLL to executable machine
language. The process of transferring HKK source program in to object code is a lengthy and
complex process as compared to assembling. Compliers have diagnostic capabilities and
prompt the programmer with appropriate error message while compiling a HLL program. The
corrections are to be incorporated in the program, whenever needed, and the program has to
be recompiled. The process is repeated until the program is mistake free and translated to an
object code. Thus the job of a complier includes the following:
Interpreter:
The basic purpose of interpreter is same as that of complier. In compiler, the program is
translated completely and directly executable version is generated. Whereas interpreter
translates each instruction, executes it and then the next instruction is translated and this goes
on until end of the program. In this case, object code is not stored and reused. Every time the
program is executed, the interpreter translates each instruction freshly. It also has program
diagnostic capabilities. However, it has some disadvantages as below:
1. Instructions repeated in program must be translated each time they are executed.
31 | P a g e
Information Technology And Management By USMS Academic Support Team
2. Because the source program is translated fresh every time it is used, it is slow process or
execution takes more time. Approx. 20 times slower than complier.
The process of software development services in India goes through a series of stages in step
wise fashion that almost every developing company follows. Known as the „software
development life cycle,‟ these six steps include planning, analysis, design, development &
implementation, testing & deployment and maintenance. Let‟s study each of these steps to
know how the perfect software is developed.
1. Planning: Without the perfect plan, calculating the strengths and weaknesses of the
project, development of software is meaningless. Planning kicks off a project flawlessly and
affects its progress positively.
2. Analysis: This step is about analyzing the performance of the software at various stages
and making notes on additional requirements. Analysis is very important to proceed further to
the next step.
3. Design: Once the analysis is complete, the step of designing takes over, which is basically
building the architecture of the project. This step helps remove possible flaws by setting a
standard and attempting to stick to it.
4. Development & Implementation: The actual task of developing the software starts here
with data recording going on in the background. Once the software is developed, the stage of
implementation comes in where the product goes through a pilot study to see if it‟s
functioning properly.
32 | P a g e
Information Technology And Management By USMS Academic Support Team
5. Testing: The testing stage assesses the software for errors and documents bugs if there are
any.
6. Maintenance: Once the software passes through all the stages without any issues, it is to
undergo a maintenance process wherein it will be maintained and upgraded from time to time
to adapt to changes. Almost every software development Indian company follows all the six
steps, leading to the reputation that the country enjoys in the software market today.
The cost of software development services in India is comparatively lower than in other
countries, making it a much sought after destination today. Custom software development
in India is a big hit among clients who are able to get their business needs fulfilled at highly
cost-effective rates.
You will be learning these data analysis techniques with Excel as part of two parts −
33 | P a g e
Information Technology And Management By USMS Academic Support Team
Data Analysis is a process of collecting, transforming, cleaning, and modeling data with the
goal of discovering the required information. The results so obtained are communicated,
suggesting conclusions, and supporting decision-making. Data visualization is at times used
to portray the data for the ease of discovering the useful patterns in the data. The terms Data
Modeling and Data Analysis mean the same.
Data Analysis Process consists of the following phases that are iterative in nature −
The data required for analysis is based on a question or an experiment. Based on the
requirements of those directing the analysis, the data necessary as inputs to the analysis is
identified (e.g., Population of people). Specific variables regarding a population (e.g., Age
and Income) may be specified and obtained. Data may be numerical or categorical.
Data Collection
Data is collected from various sources ranging from organizational databases to the
information in web pages. The data thus obtained, may not be structured and may contain
irrelevant information. Hence, the collected data is required to be subjected to Data
Processing and Data Cleaning.
Data Processing
The data that is collected must be processed or organized for analysis. This includes
structuring the data as required for the relevant Analysis Tools. For example, the data might
have to be placed into rows and columns in a table within a Spreadsheet or Statistical
Application. A Data Model might have to be created.
Data Cleaning
The processed and organized data may be incomplete, contain duplicates, or contain errors.
Data Cleaning is the process of preventing and correcting these errors. There are several
types of Data Cleaning that depend on the type of data. For example, while cleaning the
financial data, certain totals might be compared against reliable published numbers or defined
thresholds. Likewise, quantitative data methods can be used for outlier detection that would
be subsequently excluded in analysis.
Data Analysis
Data that is processed, organized and cleaned would be ready for the analysis. Various data
analysis techniques are available to understand, interpret, and derive conclusions based on the
requirements. Data Visualization may also be used to examine the data in graphical format, to
obtain additional insight regarding the messages within the data.
Statistical Data Models such as Correlation, Regression Analysis can be used to identify the
relations among the data variables. These models that are descriptive of the data are helpful in
simplifying analysis and communicate results.
The process might require additional Data Cleaning or additional Data Collection, and hence
these activities are iterative in nature.
Communication
The results of the data analysis are to be reported in a format as required by the users to
support their decisions and further action. The feedback from the users might result in
additional analysis.
The data analysts can choose data visualization techniques, such as tables and charts, which
help in communicating the message clearly and efficiently to the users. The analysis tools
provide facility to highlight the required information with color codes and formatting in
tables and charts.
35 | P a g e
Information Technology And Management By USMS Academic Support Team
Excel Data Analysis – Overview
Excel provide commands, functions and tools that make your data analysis tasks easy. You
can avoid many time consuming and/or complex calculations using Excel. In this tutorial,
you will get a head start on how you can perform data analysis with Excel. You will
understand with relevant examples, step by step usage of Excel commands and screen shots
at every step.
The data that you have can be in a range or in a table. Certain operations on data can be
performed whether the data is in a range or in a table.
However, there are certain operations that are more effective when data is in tables rather
than in ranges. There are also operations that are exclusively for tables.
You will understand the ways of analyzing data in ranges and tables as well. You will
understand how to name ranges, use the names and manage the names. The same would
apply for names in the tables.
You need to clean the data obtained from various sources and structure it before proceeding
to data analysis. You will learn how you can clean the data.
Conditional Formatting
Excel provides you conditional formatting commands that allow you to color the cells or font,
have symbols next to values in the cells based on predefined criteria. This helps one in
visualizing the prominent values. You will understand the various commands for
conditionally formatting the cells.
During the preparation of data analysis and/or to display certain important data, you might
have to sort and/or filter your data. You can do the same with the easy to use sorting and
filtering options that you have in Excel.
As you are aware, PivotTable is normally used to summarize data. However, Subtotals with
Ranges is another feature provided by Excel that will allow you to group / ungroup data and
summarize the data present in ranges with easy steps.
36 | P a g e
Information Technology And Management By USMS Academic Support Team
Quick Analysis
With Quick Analysis tool in Excel, you can quickly perform various data analysis tasks and
make quick visualizations of the results.
Excel Lookup Functions enable you to find the data values that match a defined criteria from
a huge amount of data.
PivotTables
With PivotTables you can summarize the data, prepare reports dynamically by changing the
contents of the PivotTable.
Data Visualization
You will learn several Data Visualization techniques using Excel Charts. You will also learn
how to create Band Chart, Thermometer Chart, Gantt chart, Waterfall Chart, Sparklines and
PivotCharts.
Data Validation
It might be required that only valid values be entered into certain cells. Otherwise, they may
lead to incorrect calculations. With data validation commands, you can easily set up data
validation values for a cell, an input message prompting the user on what is expected to be
entered in the cell, validate the values entered with the defined criteria and display an error
message in case of incorrect entries.
Financial Analysis
Excel provides you several financial functions. However, for commonly occurring problems
that require financial analysis, you can learn how to use a combination of these functions.
You might have to perform several identical calculations in more than one worksheet. Instead
of repeating these calculations in each worksheet, you can do it one worksheet and have it
appear in the other selected worksheets as well. You can also summarize the data from the
various worksheets into a report worksheet.
Formula Auditing
When you use formulas, you might want to check whether the formulas are working as
expected. In Excel, Formula Auditing commands help you in tracing the precedent and
dependent values and error checking.
37 | P a g e
Information Technology And Management By USMS Academic Support Team
Inquire
Excel also provides Inquire add-in that enables you compare two workbooks to identify
changes, create interactive reports, and view the relationships among workbooks, worksheets,
and cells. You can also clean the excessive formatting in a worksheet that makes Excel slow
or makes the file size huge.
Some popular Operating Systems include Linux, Windows, OS X, VMS, OS/400, AIX, z/OS,
etc.
Definition
An operating system is a program that acts as an interface between the user and the computer
hardware and controls the execution of all kinds of programs.
38 | P a g e
Information Technology And Management By USMS Academic Support Team
Following are some of important functions of an operating System.
Memory Management
Processor Management
Device Management
File Management
Security
Control over system performance
Job accounting
Error detecting aids
Coordination between other software and users
Memory Management
Main memory provides a fast storage that can be accessed directly by the CPU. For a
program to be executed, it must in the main memory. An Operating System does the
following activities for memory management −
Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in use.
In multiprogramming, the OS decides which process will get memory when and how much.
Allocates the memory when a process requests it to do so.
De-allocates the memory when a process no longer needs it or has been terminated.
Processor Management
In multiprogramming environment, the OS decides which process gets the processor when
and for how much time. This function is called process scheduling. An Operating System
does the following activities for processor management −
Keeps tracks of processor and status of process. The program responsible for this task is known
as traffic controller.
Allocates the processor (CPU) to a process.
De-allocates processor when a process is no longer required.
Device Management
An Operating System manages device communication via their respective drivers. It does the
following activities for device management −
Keeps tracks of all devices. Program responsible for this task is known as the I/O controller.
Decides which process gets the device when and for how much time.
Allocates the device in the efficient way.
De-allocates devices.
File Management
39 | P a g e
Information Technology And Management By USMS Academic Support Team
A file system is normally organized into directories for easy navigation and usage. These
directories may contain files and other directions.
Keeps track of information, location, uses, status etc. The collective facilities are often known as file
system.
Decides who gets the resources.
Allocates the resources.
De-allocates the resources.
Following are some of the important activities that an Operating System performs −
Security− By means of password and similar other techniques, it prevents unauthorized access to
programs and data.
Control over system performance− Recording delays between request for a service and response
from the system.
Job accounting− Keeping track of time and resources used by various jobs and users.
Error detecting aids− Production of dumps, traces, error messages, and other debugging and error
detecting aids.
Coordination between other softwares and users− Coordination and assignment of compilers,
interpreters, assemblers and other software to the various users of the computer systems.
40 | P a g e
Information Technology And Management By USMS Academic Support Team
Time-sharing operating systems
Time-sharing is a technique which enables many people, located at various terminals, to use a
particular computer system at the same time. Time-sharing or multitasking is a logical
extension of multiprogramming. Processor‟s time which is shared among multiple users
simultaneously is termed as time-sharing.
The main difference between Multiprogrammed Batch Systems and Time-Sharing Systems is
that in case of Multiprogrammed batch systems, the objective is to maximize processor use,
whereas in Time-Sharing Systems, the objective is to minimize response time.
Multiple jobs are executed by the CPU by switching between them, but the switches occur so
frequently. Thus, the user can receive an immediate response. For example, in a transaction
processing, the processor executes each user program in a short burst or quantum of
computation. That is, if nusers are present, then each user can get a time quantum. When the
user submits the command, the response time is in few seconds at most.
The operating system uses CPU scheduling and multiprogramming to provide each user with
a small portion of a time. Computer systems that were designed primarily as batch systems
have been modified to time-sharing systems.
Problem of reliability.
Question of security and integrity of user programs and data.
Problem of data communication.
The processors communicate with one another through various communication lines (such as
high-speed buses or telephone lines). These are referred as loosely coupled systems or
distributed systems. Processors in a distributed system may vary in size and function. These
processors are referred as sites, nodes, computers, and so on.
With resource sharing facility, a user at one site may be able to use the resources available at
another.
41 | P a g e
Information Technology And Management By USMS Academic Support Team
Speedup the exchange of data with one another via electronic mail.
If one site fails in a distributed system, the remaining sites can potentially continue operating.
Better service to the customers.
Reduction of the load on the host computer.
Reduction of delays in data processing.
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.
Real-time systems are used when there are rigid time requirements on the operation of a
processor or the flow of data and real-time systems can be used as a control device in a
dedicated application. A real-time operating system must have well-defined, fixed time
constraints, otherwise the system will fail. For example, Scientific experiments, medical
imaging systems, industrial control systems, weapon systems, robots, air traffic control
systems, etc.
42 | P a g e
Information Technology And Management By USMS Academic Support Team
Hard real-time systems
Hard real-time systems guarantee that critical tasks complete on time. In hard real-time
systems, secondary storage is limited or missing and the data is stored in ROM. In these
systems, virtual memory is almost never found.
The OS defines a job which has predefined sequence of commands, programs and data as a single
unit.
The OS keeps a number a jobs in memory and executes them without any manual information.
Jobs are processed in the order of submission, i.e., first come first served fashion.
When a job completes its execution, its memory is released and the output for the job gets copied
into an output spool for later printing or processing.
Advantages
Batch processing takes much of the work of the operator to the computer.
Increased performance as a new job get started as soon as the previous job is finished, without any
manual intervention.
43 | P a g e
Information Technology And Management By USMS Academic Support Team
Disadvantages
Multitasking
Multitasking is when multiple jobs are executed by the CPU simultaneously by switching
between them. Switches occur so frequently that the users may interact with each program
while it is running. An OS does the following activities related to multitasking −
The user gives instructions to the operating system or to a program directly, and receives an
immediate response.
The OS handles multitasking in the way that it can handle multiple operations/executes multiple
programs at a time.
Multitasking Operating Systems are also known as Time-sharing systems.
These Operating Systems were developed to provide interactive use of a computer system at a
reasonable cost.
A time-shared operating system uses the concept of CPU scheduling and multiprogramming to
provide each user with a small portion of a time-shared CPU.
Each user has at least one separate program in memory.
A program that is loaded into memory and is executing is commonly referred to as a process.
When a process executes, it typically executes for only a very short time before it either finishes or
needs to perform I/O.
Since interactive I/O typically runs at slower speeds, it may take a long time to complete. During this
time, a CPU can be utilized by another process.
The operating system allows the users to share the computer simultaneously. Since each action or
command in a time-shared system tends to be short, only a little CPU time is needed for each user.
As the system switches CPU rapidly from one user/program to the next, each user is given the
impression that he/she has his/her own CPU, whereas actually one CPU is being shared among many
users.
44 | P a g e
Information Technology And Management By USMS Academic Support Team
Multiprogramming
Sharing the processor, when two or more programs reside in memory at the same time, is
referred as multiprogramming. Multiprogramming assumes a single shared processor.
Multiprogramming increases CPU utilization by organizing jobs so that the CPU always has
one to execute.
The following figure shows the memory layout for a multiprogramming system.
Advantages
Disadvantages
45 | P a g e
Information Technology And Management By USMS Academic Support Team
Interactivity
Interactivity refers to the ability of users to interact with a computer system. An Operating
system does the following activities related to interactivity −
The response time of the OS needs to be short, since the user submits and waits for the result.
In such systems, Operating Systems typically read from and react to sensor data.
The Operating system must guarantee response to events within fixed periods of time to ensure
correct performance.
Distributed Environment
A distributed environment refers to multiple independent CPUs or processors in a computer
system. An operating system does the following activities related to distributed environment
−
Spooling
Spooling is an acronym for simultaneous peripheral operations on line. Spooling refers to
putting data of various I/O jobs in a buffer. This buffer is a special area in memory or hard
disk which is accessible to I/O devices.
46 | P a g e
Information Technology And Management By USMS Academic Support Team
Handles I/O device data spooling as devices have different data access rates.
Maintains the spooling buffer which provides a waiting station where data can rest while the slower
device catches up.
Maintains parallel computation because of spooling process as a computer can perform I/O in
parallel fashion. It becomes possible to have the computer read data from a tape, write data to disk
and to write out to a tape printer while it is doing its computing task.
Advantages
Mostly data represents recordable facts. Data aids in producing information, which is based
on facts. For example, if we have data about marks obtained by all students, we can then
conclude about toppers and average marks.
A database management system stores data in such a way that it becomes easier to retrieve,
manipulate, and produce information.
Characteristics
47 | P a g e
Information Technology And Management By USMS Academic Support Team
Traditionally, data was organized in file formats. DBMS was a new concept then, and all the
research was done to make it overcome the deficiencies in traditional style of data
management. A modern DBMS has the following characteristics −
Real-world entity− A modern DBMS is more realistic and uses real-world entities to design
its architecture. It uses the behavior and attributes too. For example, a school database may
use students as an entity and their age as an attribute.
Relation-based tables− DBMS allows entities and relations among them to form tables. A
user can understand the architecture of a database just by looking at the table names.
Isolation of data and application− A database system is entirely different than its data. A
database is an active entity, whereas data is said to be passive, on which the database works
and organizes. DBMS also stores metadata, which is data about data, to ease its own process.
Less redundancy− DBMS follows the rules of normalization, which splits a relation when
any of its attributes is having redundancy in values. Normalization is a mathematically rich
and scientific process that reduces data redundancy.
Consistency− Consistency is a state where every relation in a database remains consistent.
There exist methods and techniques, which can detect attempt of leaving database in
inconsistent state. A DBMS can provide greater consistency as compared to earlier forms of
data storing applications like file-processing systems.
Query Language− DBMS is equipped with query language, which makes it more efficient to
retrieve and manipulate data. A user can apply as many and as different filtering options as
required to retrieve a set of data. Traditionally it was not possible where file-processing
system was used.
ACID Properties− DBMS follows the concepts of Atomicity, Consistency, Isolation,
and Durability (normally shortened as ACID). These concepts are applied on transactions,
which manipulate data in a database. ACID properties help the database stay healthy in multi-
transactional environments and in case of failure.
Multiuser and Concurrent Access− DBMS supports multi-user environment and allows
them to access and manipulate data in parallel. Though there are restrictions on transactions
when users attempt to handle the same data item, but users are always unaware of them.
Multiple views− DBMS offers multiple views for different users. A user who is in the Sales
department will have a different view of database than a person working in the Production
department. This feature enables the users to have a concentrate view of the database
according to their requirements.
Security− Features like multiple views offer security to some extent where users are unable
to access data of other users and departments. DBMS offers methods to impose constraints
while entering data into the database and retrieving the same at a later stage. DBMS offers
many different levels of security features, which enables multiple users to have different
views with different features. For example, a user in the Sales department cannot see the data
that belongs to the Purchase department. Additionally, it can also be managed how much data
of the Sales department should be displayed to the user. Since a DBMS is not saved on the
disk as traditional file systems, it is very hard for miscreants to break the code.
Users
A typical DBMS has users with different rights and permissions who use it for different
purposes. Some users retrieve data and some back it up. The users of a DBMS can be broadly
categorized as follows −
48 | P a g e
Information Technology And Management By USMS Academic Support Team
Administrators− Administrators maintain the DBMS and are responsible for administrating
the database. They are responsible to look after its usage and by whom it should be used.
They create access profiles for users and apply limitations to maintain isolation and force
security. Administrators also look after DBMS resources like system license, required tools,
and other software and hardware related maintenance.
Designers− Designers are the group of people who actually work on the designing part of the
database. They keep a close watch on what data should be kept and in what format. They
identify and design the whole set of entities, relations, constraints, and views.
End Users− End users are those who actually reap the benefits of having a DBMS. End users
can range from simple viewers who pay attention to the logs or market rates to sophisticated
users such as business analysts.
In 1-tier architecture, the DBMS is the only entity where the user directly sits on the DBMS
and uses it. Any changes done here will directly be done on the DBMS itself. It does not
provide handy tools for end-users. Database designers and programmers normally prefer to
use single-tier architecture.
If the architecture of DBMS is 2-tier, then it must have an application through which the
DBMS can be accessed. Programmers use 2-tier architecture where they access the DBMS by
means of an application. Here the application tier is entirely independent of the database in
terms of operation, design, and programming.
3-tier Architecture
49 | P a g e
Information Technology And Management By USMS Academic Support Team
A 3-tier architecture separates its tiers from each other based on the complexity of the users
and how they use the data present in the database. It is the most widely used architecture to
design a DBMS.
Database (Data) Tier− At this tier, the database resides along with its query processing languages.
We also have the relations that define the data and their constraints at this level.
Application (Middle) Tier− At this tier reside the application server and the programs that access the
database. For a user, this application tier presents an abstracted view of the database. End-users are
unaware of any existence of the database beyond the application. At the other end, the database
tier is not aware of any other user beyond the application tier. Hence, the application layer sits in the
middle and acts as a mediator between the end-user and the database.
User (Presentation) Tier− End-users operate on this tier and they know nothing about any existence
of the database beyond this layer. At this layer, multiple views of the database can be provided by
the application. All views are generated by applications that reside in the application tier.
Multiple-tier database architecture is highly modifiable, as almost all its components are
independent and can be changed independently.
Database Schema
A database schema is the skeleton structure that represents the logical view of the entire
database. It defines how the data is organized and how the relations among them are
associated. It formulates all the constraints that are to be applied on the data.
50 | P a g e
Information Technology And Management By USMS Academic Support Team
A database schema defines its entities and the relationship among them. It contains a
descriptive detail of the database, which can be depicted by means of schema diagrams. It‟s
the database designers who design the schema to help programmers understand the database
and make it useful.
Physical Database Schema− This schema pertains to the actual storage of data and its form of
storage like files, indices, etc. It defines how the data will be stored in a secondary storage.
Logical Database Schema− This schema defines all the logical constraints that need to be applied on
the data stored. It defines tables, views, and integrity constraints.
Database Instance
It is important that we distinguish these two terms individually. Database schema is the
skeleton of database. It is designed when the database doesn‟t exist at all. Once the database
is operational, it is very difficult to make any changes to it. A database schema does not
contain any data or information.
A database instance is a state of operational database with data at any given time. It contains
a snapshot of the database. Database instances tend to change with time. A DBMS ensures
that its every instance (state) is in a valid state, by diligently following all the validations,
constraints, and conditions that the database designers have imposed.
51 | P a g e
Information Technology And Management By USMS Academic Support Team
If a database system is not multi-layered, then it becomes difficult to make any changes in the
database system. Database systems are designed in multi-layers as we learnt earlier.
Data Independence
A database system normally contains a lot of data in addition to users‟ data. For example, it
stores data about data, known as metadata, to locate and retrieve data easily. It is rather
difficult to modify or update a set of metadata once it is stored in the database. But as a
DBMS expands, it needs to change over time to satisfy the requirements of the users. If the
entire data is dependent, it would become a tedious and highly complex job.
Metadata itself follows a layered architecture, so that when we change data at one layer, it
does not affect the data at another level. This data is independent but mapped to each other.
Logical data is data about database, that is, it stores information about how data is managed
inside. For example, a table (relation) stored in the database and all its constraints, applied on
that relation.
Logical data independence is a kind of mechanism, which liberalizes itself from actual data
stored on the disk. If we do some changes on table format, it should not change the data
residing on the disk.
All the schemas are logical, and the actual data is stored in bit format on the disk. Physical
data independence is the power to change the physical data without impacting the schema or
logical data.
52 | P a g e
Information Technology And Management By USMS Academic Support Team
For example, in case we want to change or upgrade the storage system itself − suppose we
want to replace hard-disks with SSD − it should not have any impact on the logical data or
schemas.
Entity-Relationship Model
Entity-Relationship (ER) Model is based on the notion of real-world entities and relationships
among them. While formulating real-world scenario into the database model, the ER Model
creates entity set, relationship set, general attributes and constraints.
ER Model is based on −
Entitiesand their
Relationshipsamong entities.
53 | P a g e
Information Technology And Management By USMS Academic Support Team
Relationship− The logical association among entities is called relationship. Relationships
are mapped with entities in various ways. Mapping cardinalities define the number of
association between two entities.
Mapping cardinalities −
o one to one
o one to many
o many to one
o many to many
Relational Model
The most popular data model in DBMS is the Relational Model. It is more scientific a model
than others. This model is based on first-order predicate logic and defines a table as an n-ary
relation.
54 | P a g e
Information Technology And Management By USMS Academic Support Team
SQL comprises both data definition and data manipulation languages. Using the data
definition properties of SQL, one can design and modify database schema, whereas data
manipulation properties allows SQL to store and retrieve data from database.
SQL constraints are used to specify rules for the data in a table.
Constraints are used to limit the type of data that can go into a table. This ensures the
accuracy and reliability of the data in the table. If there is any violation between the
constraint and the data action, the action is aborted.
Constraints can be column level or table level. Column level constraints apply to a column,
and table level constraints apply to the whole table.
SQL Queries
SQL uses the following set of commands to define database schema −
CREATE
Creates new databases, tables and views from RDBMS.
For example −
DROP
Drops commands, views, tables, and databases from RDBMS.
55 | P a g e
Information Technology And Management By USMS Academic Support Team
For example−
ALTER
Modifies database schema.
For example−
This command adds an attribute in the relation article with the name subjectof string type.
Data Communications is the transfer of data or information between a source and a receiver.
The source transmits the data and the receiver receives it. The actual generation of the
information is not part of Data Communications nor is the resulting action of the information
at the receiver. Data Communication is interested in the transfer of data, the method of
transfer and the preservation of the data during the transfer process.
The purpose of Data Communications is to provide the rules and regulations that allow
computers with different disk operating systems, languages, cabling and locations to share
resources. The rules and regulations are called protocols and standards in Data
Communications.
56 | P a g e
Information Technology And Management By USMS Academic Support Team
1. Delivery: The System must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user
2. Accuracy: The system must deliver data accurately. Data that have been altered in
transmission and left uncorrected are rustles
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video, audio, and voice data, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without significant delay.
this kind of delivery id called real-time transmission.
Components
2. Sender: The sender will have some kind of meaning she wishes to convey to the receiver.
It might not be conscious knowledge, it might be a sub-conscious wish for communication.
What is desired to be communicated would be some kind of idea, perception, feeling, or
datum. It will be a part of her reality that she wishes to send to somebody else.
3. Receiver:These messages are delivered to another party. No doubt, you have in mind a
desired action or reaction you hope your message prompts from the opposite party. Keep in
mind, the other party also enters into the communication process with ideas and feelings that
will undoubtedly influence their understanding of your message and their response. To be a
successful communicator, you should consider these before delivering your message, then
acting appropriately.
4. Medium: Medium is a means used to exchange / transmit the message. The sender must
choose an appropriate medium for transmitting the message else the message might not be
conveyed to the desired recipients. The choice of appropriate medium of communication is
essential for making the message effective and correctly interpreted by the recipient. This
choice of communication medium varies depending upon the features of communication. For
instance – Written medium is chosen when a message has to be conveyed to a small group of
people, while an oral medium is chosen when spontaneous feedback is required from the
recipient as misunderstandings are cleared then and there.
5. Protocol: A protocol is a formal description of digital message formats and the rules for
exchanging those messages in or between computing systems and in telecommunications.
Protocols may include signaling, authentication and error detection and correction syntax,
57 | P a g e
Information Technology And Management By USMS Academic Support Team
semantics, and synchronization of communication and may be implemented in hardware or
software, or both.
It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot.
Personal computers and workstations are connected to each other through LANs. We can use
different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
58 | P a g e
Information Technology And Management By USMS Academic Support Team
LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire building.
LAN networks are also widely used to share resources like printers, shared hard-drive etc.
Characteristics of LAN
LAN‟s are private networks, not subject to tariffs or other regulatory controls.
LAN‟s operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
One of the computer in a network can become a server serving all the remaining computers
called clients. Software can be stored on the server and it can be used by the remaining
clients.
Connecting Locally all the workstations in a building to let them communicate with each
other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
Resource Sharing:Computer resources like printers, modems, DVD-ROM drives and hard
disks can be shared with the help of local area networks. This reduces cost and hardware
purchases.
Software Applications Sharing:It is cheaper to use same software over network instead of
purchasing separate licensed software for each client a network.
Easy and Cheap Communication:Data and messages can easily be transferred over
networked computers.
59 | P a g e
Information Technology And Management By USMS Academic Support Team
Centralized Data:The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data.
Because data is not stored on workstations locally.
Data Security:Since, data is stored on server computer centrally, it will be easy to manage
data at only one place and the data will be more secure too.
Internet Sharing:Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing system
keeps the internet expenses cheaper.
Disadvantages of LAN
High Setup Cost:Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
Privacy Violations:The LAN administrator has the rights to check personal data files of each
and every LAN user. Moreover he can check the internet history and computer use history of
the LAN user.
Data Security Threat:Unauthorised users can access important data of an organization if
centralized data repository is not secured properly by the LAN administrator.
LAN Maintenance Job:Local Area Network requires a LAN Administrator because, there
are problems of software installations or hardware failures or cable disturbances in Local
Area Network. A LAN Administrator is needed at this full time job.
Covers Limited Area:Local Area Network covers a small area like one office, one building
or a group of nearby buildings.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and
uses the similar technology as LAN. It is designed to extend over the entire city. It can be
means to connecting a number of LANs into a larger network or it can be a single cable. It is
mainly hold and operated by single private company or a public company.
Characteristics of MAN
60 | P a g e
Information Technology And Management By USMS Academic Support Team
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as fibre
optic cables.
It provides a good back bone for large network and provides greater access to WANs.
The dual bus used in MAN helps the transmission of data in both directions simultaneously.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial espionage(spying)
graphical regions.
It is also called WAN. WAN can be private or it can be public leased network. It is used for
the network that covers large distance such as cover states of a country. It is not easy to
design and maintain. Communication medium used by WAN are PSTN or Satellite links.
WAN operates on low data rates.
Characteristics of WAN
61 | P a g e
Information Technology And Management By USMS Academic Support Team
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages can have
picture, sounds or data included with them(called attachments).
Expensive things(such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
Everyone on the network can use the same data. This avoids problems where some users may
have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the network the
more expensive it is.
Once set up, maintaining a network is a full-time job which requires network supervisors and
technicians to be employed.
Security is a real issue when many different people have the ability to use information from
other computers. Protection against hackers and viruses adds more complexity and expense.
Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to
implement wireless networks. Modern digital wireless systems have better performance, but
the basic idea is the same.
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
In simplest form, system interconnection networks use the master-slave concept. The system
unit is normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with which
it can communicate with other systems. Wireless LANs are becoming increasingly common
62 | P a g e
Information Technology And Management By USMS Academic Support Team
in small offices and homes, where installing Ethernet is considered too much trouble. There
is a standard for wireless LANs called IEEE 802.11, which most systems implement and
which is becoming very widespread.
Wireless WANs
The radio network used for cellular telephones is an example of a low-bandwidth wireless
WAN. This system has already gone through three generations.
Inter Network
Inter Network or Internet is a combination of two or more networks. Inter network can be
formed by joining two or more individual networks by means of various devices such as
routers, gateways and bridges.
63 | P a g e
Information Technology And Management By USMS Academic Support Team
ITM/U3 Topic 3
Communication Media
Magnetic Media
One of the most convenient way to transfer data from one computer to another, even before
the birth of networking, was to save it on some storage media and transfer physical from one
station to another. Though it may seem old-fashion way in today‟s world of high speed
internet, but when the size of data is huge, the magnetic media comes into play.
For example, a bank has to handle and transfer huge data of its customer, which stores a
backup of it at some geographically far-away place for security reasons and to keep it from
uncertain calamities. If the bank needs to store its huge backup data then its,transfer through
64 | P a g e
Information Technology And Management By USMS Academic Support Team
internet is not feasible.The WAN links may not support such high speed.Even if they do; the
cost too high to afford.
In these cases, data backup is stored onto magnetic tapes or magnetic discs, and then shifted
physically at remote places.
STP cables comes with twisted wire pair covered in metal foil. This makes it more indifferent
to noise and crosstalk.
UTP has seven categories, each suitable for specific use. In computer networks, Cat-5, Cat-
5e, and Cat-6 cables are mostly used. UTP cables are connected by RJ45 connectors.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in the center and it is made of solid
conductor.The core is enclosed in an insulating sheath.The second wire is wrapped around
over the sheath and that too in turn encased by insulator sheath.This all is covered by plastic
cover.
Because of its structure,the coax cable is capable of carrying high frequency signals than that
of twisted pair cable.The wrapped structure provides it a good shield against noise and cross
talk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet),
and RG-11 (Thick Ethernet). RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate
the wire at the far ends.
Power Lines
Power Line communication (PLC) is Layer-1 (Physical Layer) technology which uses power
cables to transmit data signals.In PLC, modulated data is sent over the cables. The receiver on
the other end de-modulates and interprets the data.
65 | P a g e
Information Technology And Management By USMS Academic Support Team
Because power lines are widely deployed, PLC can make all powered devices controlled and
monitored. PLC works in half-duplex.
Narrow band PLC provides lower data rates up to 100s of kbps, as they work at lower
frequencies (3-5000 kHz).They can be spread over several kilometers.
Broadband PLC provides higher data rates up to 100s of Mbps and works at higher
frequencies (1.8 – 250 MHz).They cannot be as much extended as Narrowband PLC.
Fiber Optics
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends to
refracts at 90 degree. This property has been used in fiber optic. The core of fiber optic cable
is made of high quality glass or plastic. From one end of it light is emitted, it travels through
it and at the other end light detector detects light stream and converts it to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode
fiber and second is multimode fiber. Single mode fiber can carry a single ray of light whereas
multimode is capable of carrying multiple beams of light.
Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access
fiber optic special type of connectors are used. These can be Subscriber Channel (SC),
Straight Tip (ST), or MT-RJ.
Radio Transmission
Radio frequency is easier to generate and because of its large wavelength it can penetrate
through walls and structures alike.Radio waves can have wavelength from 1 mm – 100,000
km and have frequency ranging from 3 Hz (Extremely Low Frequency) to 300 GHz
(Extremely High Frequency). Radio frequencies are sub-divided into six bands.
66 | P a g e
Information Technology And Management By USMS Academic Support Team
Radio waves at lower frequencies can travel through walls whereas higher RF can travel in
straight line and bounce back.The power of low frequency waves decreases sharply as they
cover long distance. High frequency radio waves have more power.
Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000
kilometers, over the earth‟s surface.
Radio waves of high frequencies are prone to be absorbed by rain and other obstacles. They
use Ionosphere of earth atmosphere. High frequency radio waves such as HF and VHF bands
are spread upwards. When they reach Ionosphere, they are refracted back to the earth.
Microwave Transmission
Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over them
can be sent by beaming those waves towards one particular station. Because Microwaves
travels in straight lines, both sender and receiver must be aligned to be strictly in line-of-
sight.
Microwaves can have wavelength ranging from 1 mm – 1 meter and frequency ranging from
300 MHz to 300 GHz.
Microwave antennas concentrate the waves making a beam of it. As shown in picture above,
multiple antennas can be aligned to reach farther. Microwaves have higher frequencies and
do not penetrate wall like obstacles.
Microwave transmission depends highly upon the weather conditions and the frequency it is
using.
Infrared Transmission
Infrared wave lies in between visible light spectrum and microwaves. It has wavelength of
700-nm to 1-mm and frequency ranges from 300-GHz to 430-THz.
Infrared wave is used for very short range communication purposes such as television and it‟s
remote. Infrared travels in a straight line hence it is directional by nature. Because of high
frequency range, Infrared cannot cross wall-like obstacles.
Light Transmission
Highest most electromagnetic spectrum which can be used for data transmission is light or
optical signaling. This is achieved by means of LASER.
Because of frequency light uses, it tends to travel strictly in straight line.Hence the sender and
receiver must be in the line-of-sight. Because laser transmission is unidirectional, at both
ends of communication the laser and the photo-detector needs to be installed. Laser beam is
generally 1mm wide hence it is a work of precision to align two far receptors each pointing to
lasers source.
67 | P a g e
Information Technology And Management By USMS Academic Support Team
Laser works as Tx (transmitter) and photo-detectors works as Rx (receiver).
Lasers cannot penetrate obstacles such as walls, rain, and thick fog. Additionally, laser beam
is distorted by wind, atmosphere temperature, or variation in temperature in the path.
Laser is safe for data transmission as it is very difficult to tap 1mm wide laser without
interrupting the communication channel.
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices,. Ranging not more
than few meters.
It may be spanned across a whole building, including intermediate devices to connect all
floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in some fashion. By
connectedness we mean either logically , physically , or both ways.
Every single device can be connected to every other device on network, making the network
mesh.
All devices can be connected to a single medium but geographically disconnected, created
bus like structure.
Each device is connected to its left and right peers only, creating linear structure.
68 | P a g e
Information Technology And Management By USMS Academic Support Team
All devices connected together with a single device, creating star like structure.
All devices connected arbitrarily using all previous ways to connect each other, resulting in a
hybrid structure.
Administration
From an administrator‟s point of view, a network can be private network which belongs a
single autonomous system and cannot be accessed outside its physical or logical domain.A
network can be public which is accessed by all.
Network Architecture
Computer networks can be discriminated into various types such as Client-Server,peer-to-
peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server. Other being Client, requests the Server to
serve requests.Server takes and processes request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-back fashion. They both reside at
the same level and called peers.
There can be hybrid network which involves network architecture of both the above types.
Network Applications
Computer systems and peripherals are connected to form a network.They provide numerous
advantages:
69 | P a g e
Information Technology And Management By USMS Academic Support Team
Reliability− Network should be designed in such a way that it has minimum down time.
Failure of one node or a segment of cabling should not render the whole network
useless.
Scalability− Network topology should be scalable, i.e. it can accommodate load of new
devices and nodes without perceptible drop in performance.
Ease of installation− Network should be easy to install in terms of hardware, software
and technical personnel requirements.
Ease of maintenance− Troubleshooting and maintenance of network should be easy.
Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial, to
which many network devices and workstations are attached along the
length. Server is at one end of the bus. When a workstation has to send data, it
transmits packets with destination address in its header along the bus.
The data travels in both the directions along the bus. When the destination terminal sees
the data, it copies it to the local disk.
70 | P a g e
Information Technology And Management By USMS Academic Support Team
Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the network a
circular shape. Data travels in only one pre-determined direction.
When a terminal has to send data, it transmits it to the neighboring node which transmits
it to the next one. Before further transmission data may be amplified. In this way, data
raverses the network and reaches the destination node, which removes it from the
network. If the data reaches the sender, it removes the data and resends it later.
Star Topology
In star topology, server is connected to each node individually. Server is also called the
central node. Any exchange of data between two nodes must take place through the
71 | P a g e
Information Technology And Management By USMS Academic Support Team
server. It is the most popular topology for information and voice networks as central
node can process data received from source node before sending it to the destination
node.
Tree Topology
Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called
hierarchical topology.
72 | P a g e
Information Technology And Management By USMS Academic Support Team
73 | P a g e
Information Technology And Management By USMS Academic Support Team
communication system. For example, the Physical layer defines all the components of
physical nature, i.e. wires, frequencies, pulse codes, voltage transmission etc. of a
communication system.
The OSI Model has the following seven layers:
Application Layer (Layer-7): This is where the user application sits that needs to transfer
data between or among hosts. For example: HTTP, file transfer application (FTP) and
electronic mail etc.
Presentation Layer (Layer-6): This layer helps to understand data representation in one
form on a host to other host in their native representation. Data from the sender is converted
to on-the-wire data (general standard format) and at the receiver‟s end it is converted to the
native representation of the receiver.
Session Layer (Layer-5): This layer provides session management capabilities between
hosts. For example, if some host needs a password verification for access and if credentials
are provided then for that session password verification does not happen again. This layer can
assist in synchronization, dialog control and critical operation management (e.g., an online
bank transaction).
Transport Layer (Layer-4): This layer provides end to end data delivery among hosts. This
layer takes data from the above layer and breaks it into smaller units called Segments and
then gives it to the Network layer for transmission.
Network Layer (Layer-3): This layer helps to uniquely identify hosts beyond the subnets
and defines the path which the packets will follow or be routed to reach the destination.
Data Link Layer (Layer-2): This layer takes the raw transmission data (signal, pulses etc.)
from the Physical Layer and makes Data Frames, and sends that to the upper layer and vice
versa. This layer also checks any transmission errors and sorts it out accordingly.
Physical Layer (Layer-1): This layer deals with hardware technology and actual
communication mechanism such as signaling, voltage, cable type and length, etc.
Network Layer
The network layer is responsible for carrying data from one host to another. It provides
means to allocate logical addresses to hosts, and identify them uniquely using the same.
Network layer takes data units from Transport Layer and cuts them in to smaller unit called
Data Packet.
Network layer defines the data path, the packets should follow to reach the destination.
Routers work on this layer and provides mechanism to route data to its destination.
Inter-Networking Devices
Hardware devices that are used to connect computers, printers, fax machines and other
electronic devices to a network are called network devices. These devices transfer data in a
fast, secure and correct way over same or different networks. Network devices may be inter-
network or intra-network. Some devices are installed on the device, like NIC card or RJ45
connector, whereas some are part of the network, like router, switch, etc. Let us explore some
of these devices in greater detail.
Modem
74 | P a g e
Information Technology And Management By USMS Academic Support Team
Modem is a device that enables a computer to send or receive data over telephone or cable
lines. The data stored on the computer is digital whereas a telephone line or cable wire can
transmit only analog data.
The main function of the modem is to convert digital signal into analog and vice versa.
Modem is a combination of two devices − modulator and demodulator.
The modulator converts digital data into analog data when the data is being sent by the
computer. The demodulator converts analog data signals into digital data when it is being
received by the computer.
Types of Modem
Modem can be categorized in several ways like direction in which it can transmit data, type
of connection to the transmission line, transmission mode, etc.
Simplex− A simplex modem can transfer data in only one direction, from digital device to
network (modulator) or network to digital device (demodulator).
Half duplex− A half-duplex modem has the capacity to transfer data in both the directions
but only one at a time.
Full duplex− A full duplex modem can transmit data in both the directions simultaneously.
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by
devices to physically connect to Ethernet based local area networks (LANs). Ethernet is a
technology that defines protocols for establishing a LAN. The cable used for Ethernet LANs
are twisted pair ones and have RJ45 connector pins at both ends. These pins go into the
corresponding socket on devices and connect the device to the network.
Ethernet Card
Ethernet card, also known as network interface card (NIC), is a hardware component used
by computers to connect to Ethernet LAN and communicate with other devices on the LAN.
The earliest Ethernet cards were external to the system and needed to be installed manually.
In modern computer systems, it is an internal hardware component. The NIC has RJ45
socketwhere network cable is physically plugged in.
Ethernet card speeds may vary depending upon the protocols it supports. Old Ethernet cards
had maximum speed of 10 Mbps. However, modern cards support fast Ethernets up to a
speed of 100 Mbps. Some cards even have capacity of 1 Gbps.
Router
A router is a network layer hardware device that transmits data from one LAN to another if
both networks support the same set of protocols. So a router is typically connected to at least
two LANs and the internet service provider (ISP). It receives its data in the form
75 | P a g e
Information Technology And Management By USMS Academic Support Team
of packets, which are data frames with their destination address added. Router also
strengthens the signals before transmitting them. That is why it is also called repeater.
Routing Table
A router reads its routing table to decide the best available route the packet can take to reach
its destination quickly and accurately. The routing table may be of these two types
Static− In a static routing table the routes are fed manually. So it is suitable only for very
small networks that have maximum two to three routers.
Dynamic− In a dynamic routing table, the router communicates with other routers through
protocols to determine which routes are free. This is suited for larger networks where manual
feeding may not be feasible due to large number of routers.
Switch
Switch is a network device that connects other devices to Ethernet networks through twisted
pair cables. It uses packet switching technique to receive, store and forward data
packets on the network. The switch maintains a list of network addresses of all the devices
connected to it.
On receiving a packet, it checks the destination address and transmits the packet to the correct
port. Before forwarding, the packets are checked for collision and other network errors. The
data is transmitted in full duplex mode
Data transmission speed in switches can be double that of other network devices like hubs
used for networking. This is because switch shares its maximum speed with all the devices
connected to it. This helps in maintaining network speed even during high traffic. In fact,
higher data speeds are achieved on networks through use of multiple switches.
Gateway
Gateway is a network device used to connect two or more dissimilar networks. In
networking parlance, networks that use different protocols are dissimilar networks. A
gateway usually is a computer with multiple NICs connected to different networks. A
gateway can also be configured completely using software. As networks connect to a
different network through gateways, these gateways are usually hosts or end points of the
network.
Gateway uses packet switching technique to transmit data from one network to another. In
this way it is similar to a router, the only difference being router can transmit data only over
networks that use same protocols.
Wi-Fi Card
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a card used to connect any device to the local
network wirelessly. The physical area of the network which provides internet access through
76 | P a g e
Information Technology And Management By USMS Academic Support Team
Wi-Fi is called Wi-Fi hotspot. Hotspots can be set up at home, office or any public space.
Hotspots themselves are connected to the network through wires.
A Wi-Fi card is used to add capabilities like teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern devices come with their in-built wireless
network adapter.
Internet
Though used on a daily basis by people all around the world, a thorough understanding of
what the internet is lacking for most of its users. The internet can best be seen as a
community of computers that are allowed to connect to each other, and any computer on the
internet can connect any other computer at any time it wishes. Through infrastructure that
spans the globe, there is one single, unified internet that all computers connect to, allowing
anyone connected to share and access all the information that they choose to. While humans
are often using computers in the traditional sense (with a mouse, keyboard, and monitor),
many of the other „computers‟ we connect to are most often servers, which act as holding
stations that store all the data that is being accessed.
The Internet functions via several major hubs throughout the world, where they connect and
are able to connect to other major hubs. Primarily ordered and managed by the United States,
a person sitting in California that is connected to the internet can access servers anywhere
else around the world that are also connected. Because servers are physically located
throughout the world, this is why some websites are able to return information faster than
others – a server in a nearby city does not have to send data as far as a server thousands of
miles away.
Intranet
Intranet is a restricted version of the internet, that typically does not allow access to anyone
outside of its network. An intranet is typically a local only network, meaning only people
who are directly wired to the intranet can access the information stored on its servers.
Intranets may be used for organizations or networks that do not want their information to be
77 | P a g e
Information Technology And Management By USMS Academic Support Team
able to be accessed by outside sources, and is especially important for organizations that
require a high amount of secrecy – such as a server that holds military secrets or a database
for the CIA. Intranets are basically mini versions of the internet that connect just a few
servers, instead of the countless number of servers that the internet holds and connects with
one another.
Extranet
Internet and an intranet are not always separate and clear cut, and anything that is a blend of
the two is considered an extranet. An extranet is a private intranet (or local network) that is
connected to the Internet, but only allows access to certain information or access by certain
groups of people. The extranet is a blend of the secrecy and control allowed to an intranet,
but also the convenience and sheer amount of information enjoyed by using the internet.
Extranets, however, are not perfect, and almost any network connected to the internet can be
accessed inappropriately given enough time, motivation, and resources by an interested party.
If a hacker with the right skill set decides to access an extranet, the question is more a matter
of when they will be able to get past security measures and access it, rather than if they will
be able to.
Internet is defined as an Information super Highway, to access information over the web.
However, It can be defined in many ways as follows:
Evolution
The concept of Internet was originated in 1969 and has undergone several technological &
Infrastructural changes as discussed below:
The origin of Internet devised from the concept of Advanced Research Project Agency Network
(ARPANET).
78 | P a g e
Information Technology And Management By USMS Academic Support Team
ARPANETwas developed by United States Department of Defense.
Basic purpose of ARPANET was to provide communication among the various bodies of government.
Initially, there were only four nodes, formally called
In 1972, the ARPANETspread over the globe with 23 nodes located at different countries and thus
became known as
By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW, browsers,
scripting languages etc.,Internet provided a medium to publish and access information over the web.
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss some of
the advantages of Internet:
Internet allows us to communicate with the people sitting at remote locations. There are various
apps available on the wed that uses Internet as a medium for communication. One can find various
social networking sites such as:
o Facebook
o Twitter
o Yahoo
o Google+
o Flickr
o Orkut
One can surf for any kind of information over the internet. Information regarding various topics such
as Technology, Health & Science, Social Studies, Geographical Information, Information Technology,
Products etc can be surfed with help of a search engine.
Apart from communication and source of information, internet also serves a medium for
entertainment. Following are the various modes for entertainment over internet.
o Online Television
o Online Games
o Songs
o Videos
o Social Networking Apps
Internet allows us to use many services like:
o Internet Banking
o Matrimonial Services
o Online Shopping
o Online Ticket Booking
o Online Bill Payment
o Data Sharing
o E-mail
Internet provides concept of electronic commerce, that allows the business deals to be conducted
on electronic systems
Disadvantages
However, Internet has prooved to be a powerful source of information in almost every field,
yet there exists many disadvanatges discussed below:
79 | P a g e
Information Technology And Management By USMS Academic Support Team
There are always chances to loose personal information such as name, address, credit card number.
Therefore, one should be very careful while sharing such information. One should use credit cards
only through authenticated sites.
Another disadvantage is the Spamming.Spamming corresponds to the unwanted e-mails in bulk.
These e-mails serve no purpose and lead to obstruction of entire system.
Viruscan easily be spread to the computers connected to internet. Such virus attacks may cause your
system to crash or your important data may get deleted.
Also a biggest threat on internet is pornography. There are many pornographic sites that can be
found, letting your children to use internet which indirectly affects the children healthy mental life.
There are various websites that do not provide the authenticated information. This leads to
misconception among many people.
Internet Services allows us to access huge amount of information such as text, graphics,
sound and software over the internet. Following diagram shows the four different categories
of Internet Services.
Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups. The following table gives a brief introduction to these services:
Electronic Mail
1
Used to send electronic message over the internet.
Telnet
2
Used to log on to a remote computer that is attached to internet.
Newsgroup
3
Offers a forum for people to discuss topics of common interests.
Mailing Lists
5
Used to organize group of internet users to share common information through e-mail.
6
Internet Telephony (VoIP)
80 | P a g e
Information Technology And Management By USMS Academic Support Team
Allows the internet users to talk across internet to any PC equipped to receive the call.
Instant Messaging
7 Offers real time chat between individuals and group of people. Eg. Yahoo messenger, MSN
messenger.
Archie
2 It’s updated database of public FTP sites and their content. It helps to search a file by its
name.
Gopher
3
Used to search, retrieve, and display documents on remote sites.
Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other.
81 | P a g e
Information Technology And Management By USMS Academic Support Team
Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating by two-way
video and audio transmission with help of telecommunication technologies.
MULTI-POINT
This mode of conferencing connects more than two locations through Multi-point Control
Unit (MCU).
Before developing a web site once should keep several aspects in mind like:
82 | P a g e
Information Technology And Management By USMS Academic Support Team
How to make it interactive?
How to code it?
How to create search engine friendly web site?
How to secure the source code frequently?
Will the web site design display well in different browsers?
Will the navigation menus be easy to use?
Will the web site loads quickly?
How easily will the site pages print?
How easily will visitors find important details specific to the web site?
How effectively the style sheets be used on your web sites?
Web development process includes all the steps that are good to take to build an
attractive, effective and responsive website. These steps are shown in the following
diagram:
83 | P a g e
Information Technology And Management By USMS Academic Support Team
Web development tools helps the developer to test and debug the web sites. Now a
days the web development tooll come with the web browsers as add-ons. All web
browsers have built in tools for this purpose.
84 | P a g e
Information Technology And Management By USMS Academic Support Team
Thsese tools allow the web developer to use HTML, CSS and JavaScript etc.. These are
accessed by hovering over an item on a web page and selecting the “Inspect Element”
from the context menu.
Featues
Following are the common featuers that every web development tool exhibits:
HTML and DOM viewer allows you to see the DOM as it was rendered. It also allows to
make changes to HTML and DOM and see the changes reflected in the page after the
change is made.
Web development tools also helps to inspect the resources that are loaded and
available on the web page.
Profiling refers to get information about the performance of a web page or web
application and Auditing provides developers suggestions, after analyzing a page, for
optimizations to decerease page load time and increase responsiveness.
Skills Required
For being a successful web developer, one should possess the following skills:
85 | P a g e
Information Technology And Management By USMS Academic Support Team
In everyday language we use knowledge all the time. Sometimes we mean know-how, while
other times we are talking about wisdom. On many occasions we even use it to refer to
information. Part of the difficulty of defining knowledge arises from its relationship to two
other concepts, namely data and information. These two terms are often regarded as lower
denominations of knowledge, but the exact relationship varies greatly from one example to
another.
This kind of simplistic view of knowledge was particularly widespread during the 90s when
information technology became increasingly more common. However even today, some KM
systems are little more than information management systems using knowledge as a virtual
synonym for information.
To illustrate, Theirauf (1999) defines the three components as follows: data is the lowest
point, an unstructured collection of facts and figures; information is the next level, and it is
regarded as structured data; finally knowledge is defined as “information about information”.
However, increasingly one sees definitions that treat knowledge as a more complex and
personal concept that incorporate more than just information. The Longman online dictionary
has one definition that begins to approach the way that knowledge is usually regarded within
KM. It states “the information, skills, and understanding that you have gained through
learning or experience.” Although still closely associated with information, concepts like
skills, understanding, and experience begin to surface.
Below, I have included the definitions that will be used throughout this site.
Data: Facts and figures which relay something specific, but which are not organized in any
way and which provide no further information regarding patterns, context, etc. I will use the
definition for data presented by Thierauf (1999): “unstructured facts and figures that have the
least impact on the typical manager.”
86 | P a g e
Information Technology And Management By USMS Academic Support Team
information is found “in answers to questions that begin with such words as who, what,
where, when, and how many” (Ackoff 1999).
IT is usually invaluable in the capacity of turning data into information, particularly in larger
firms that generate large amounts of data across multiple departments and functions. The
human brain is mainly needed to assist in contextualization.
Knowledge: Knowledge is closely linked to doing and implies know-how and understanding.
The knowledge possessed by each individual is a product of his experience, and encompasses
the norms by which he evaluates new inputs from his surroundings (Davenport & Prusak
2000). I will use the definition presented by Gamble and Blackwell (2001), based closely on
a previous definition by Davenport & Prusak:
In order for KM to succeed, one needs a deep understanding of what constitutes knowledge.
Now that we have set clear boundaries between knowledge, information, and data, it is
possible to go one step further and look at the forms in which knowledge exists and the
different ways that it can be accessed, shared, and combined. I will discuss this in the section
titled “The Different Kinds of Knowledge”.
Programmed decisions are basically automated processes, general routine work, where:
87 | P a g e
Information Technology And Management By USMS Academic Support Team
These decisions follow some guidelines or rules.
Decision support systems generally involve non-programmed decisions. Therefore, there will
be no exact report, content, or format for these systems. Reports are generated on the fly.
Attributes of a DSS
Characteristics of a DSS
Benefits of DSS
88 | P a g e
Information Technology And Management By USMS Academic Support Team
Since it is mostly used in non-programmed decisions, it reveals new approaches and sets up
new evidences for an unusual decision.
Helps automate managerial processes.
Components of a DSS
Database Management System (DBMS): To solve a problem the necessary data may come
from internal or external database. In an organization, internal data are generated by a system
such as TPS and MIS. External data come from a variety of sources such as newspapers,
online data services, databases (financial, marketing, human resources).
Model Management System: It stores and accesses models that managers use to make
decisions. Such models are used for designing manufacturing facility, analyzing the financial
health of an organization, forecasting demand of a product or service, etc.
Support Tools: Support tools like online help; pulls down menus, user interfaces, graphical
analysis, error correction mechanism, facilitates the user interactions with the system.
Classification of DSS
There are several ways to classify DSS. Hoi Apple and Whinstone classifies DSS as follows:
Text Oriented DSS:It contains textually represented information that could have a bearing
on decision. It allows documents to be electronically created, revised and viewed as needed.
Database Oriented DSS:Database plays a major role here; it contains organized and highly
structured data.
Spreadsheet Oriented DSS:It contains information in spread sheets that allows create, view,
modify procedural knowledge and also instructs the system to execute self-contained
instructions. The most popular tool is Excel and Lotus 1-2-3.
Solver Oriented DSS:It is based on a solver, which is an algorithm or procedure written for
performing certain calculations and particular program type.
Rules Oriented DSS:It follows certain procedures adopted as rules.
Rules Oriented DSS:Procedures are adopted in rules oriented DSS. Export system is the
example.
Compound DSS:It is built by using two or more of the five structures explained above.
Types of DSS
Status Inquiry System:It helps in taking operational, management level, or middle level
management decisions, for example daily schedules of jobs to machines or machines to
operators.
Data Analysis System:It needs comparative analysis and makes use of formula or an
algorithm, for example cash flow analysis, inventory analysis etc.
Information Analysis System:In this system data is analyzed and the information report is
generated. For example, sales analysis, accounts receivable systems, market analysis etc.
89 | P a g e
Information Technology And Management By USMS Academic Support Team
Accounting System:It keeps track of accounting and finance related information, for
example, final account, accounts receivables, accounts payables, etc. that keep track of the
major aspects of the business.
Model Based System:Simulation models or optimization models used for decision-making
are used infrequently and creates general guidelines for operation or management.
Hardware consists of input/output device, processor, operating system and media devices.
Software consists of various programs and procedures. Database consists of data organized in
the required structure. Network consists of hubs, communication media and network devices.
People consist of device operators, network administrators and system specialist.
Information processing consists of input; data process, data storage, output and control.
During input stage data instructions are fed to the systems which during process stage are
worked upon by software programs and other queries. During output stage, data is presented
in structured format and reports.
In any given organization information system can be classified based on the usage of the
information. Therefore, an information system in an organization can be divided into
operations support system and management support system.
In an organization, data input is done by the end user which is processed to generate
information products i.e. reports, which are utilized by internal and or external users. Such a
system is called operation support system.
The purpose of the operation support system is to facilitate business transaction, control
production, support internal as well as external communication and update organization
central database. The operation support system is further divided into a transaction-
processing system, processing control system and enterprise collaboration system.
90 | P a g e
Information Technology And Management By USMS Academic Support Team
Transaction Processing System (TPS)
These transactions can be categorized into batch transaction processing, single transaction
processing and real time transaction processing.
In recent times, there is more stress on team effort or collaboration across different functional
teams. A system which enables collaborative effort by improving communication and sharing
of data is referred to as an enterprise collaboration system.
Further Classification
An information system can be categorized based upon activity into strategic planning system,
tactical information system and operational information system.
91 | P a g e
Information Technology And Management By USMS Academic Support Team
Information technology has served as a big change agent in different aspect of business and
society. It has proven game changer in resolving economic and social issues.
Advancement and application of information technology are ever changing. Some of the
trends in the information technology are as follows:
1. Cloud Computing
One of the most talked about concept in information technology is the cloud computing.
Clouding computing is defined as utilization of computing services, i.e. software as well as
hardware as a service over a network. Typically, this network is the internet.
Cloud computing offers 3 types of broad services mainly Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS).
Some issues concerning cloud computing are privacy, compliance, security, legal, abuse, IT
governance, etc.
2. Mobile Application
Mobile application or mobile app has become a success since its introduction. They are
designed to run on Smartphone, tablets and other mobile devices. They are available as a
download from various mobile operating systems like Apple, Blackberry, Nokia, etc. Some
of the mobile app are available free where as some involve download cost. The revenue
collected is shared between app distributor and app developer.
92 | P a g e
Information Technology And Management By USMS Academic Support Team
3. User Interfaces
User interface has undergone a revolution since introduction of touch screen. The touch
screen capability has revolutionized way end users interact with application. Touch screen
enables the user to directly interact with what is displayed and also removes any intermediate
hand-held device like the mouse.
Touch screen capability is utilized in smart phones, tablet, information kiosks and other
information appliances.
4. Analytics
The field of analytics has grown many folds in recent years. Analytics is a process which
helps in discovering the informational patterns with data. The field of analytics is a
combination of statistics, computer programming and operations research.
The field of analytics has shown growth in the field of data analytics, predictive analytics and
social analytics.
Data analytics is tool used to support decision-making process. It converts raw data into
meaningful information.
Predictive analytics is tool used to predict future events based on current and historical
information.
Social media analytics is tool used by companies to understand and accommodate customer
needs.
The every changing field of information technology has seen great advancement and changes
in the last decade. And from the emerging trend, it can be concluded that its influence on
business is ever growing, and it will help companies to serve customers better.
93 | P a g e