It - Mis 106
It - Mis 106
Information
Technology
and
Management
Information System
Block - I
Block Title : Introduction to Computers
Programme Coordinator
Dr. Manjari Agarwal
Assistant Professor
Department of Management Studies
Uttarakhand Open University
Haldwani
Editor(s)
Er. Sumit Prasad Er. Subodh Prasad
Assistant Professor Assistant Professor
Department of Management Studies Department of Information Technology
Uttarakhand Open University College of Technology
Haldwani G.B. Pant University of Agriculture & Technology
Pantnagar
ISBN : 978-93-85740-12-1
Copyright : Uttarakhand Open University
Edition : 2016 (Restricted Circulation)
Published by : Uttarakhand Open University, Haldwani, Nainital - 263 139
Printed at : Laxmi Publications (P) Ltd., New Delhi
DUO-8151-51.92-INFO TECH MGMT INFO B-I
CONTENTS
1. Introduction to Computers 1
2. Components of Computer System and Indian Computing Environment 19
3. Generation of Computer 38
4. Number System and Computer Arithmetic 61
Course Credit: 6
Course Objective: The objective of the course is to familiarize the students with the basics of
computer, its operations, processing and storage and utility of information technology in
managerial applications.
Structure Notes
1.0 Introduction
1.1 Unit Objectives
1.2 Introduction to Computer
1.3 Definition of Computer
1.4 Importance and Characteristics of Computers
1.5 Functions/Operations of a Computer
1.6 Computers in Business
1.7 Elements of Computer System Setup
1.8 Strengths and Weaknesses of Computer
1.9 Difference between Computer, Human Beings and Calculator
1.10 Summary
1.11 Glossary
1.12 Answers to Check Your Progress
1.13 Terminal and Model Questions
1.14 References
1.0 Introduction
Nothing has revolutionized modern life the way, rapid progress of computers, has.
For better or worse, computers have infiltrated every aspect of our society. Today,
computers do much more than simply compute. They make airline or railway
reservation and teach on-line; some super store scanners calculate our grocery bills
while keeping the store inventory; computerized telephone switching has greatly
improved the telephone system and Automatic Teller Machines (ATM) let us conduct
banking transactions from virtually anywhere in the world.
As computers become more widespread in the workplace, new ways to harness their
potential developed. As smaller computers become more powerful, they could be
linked together, or networked, to share memory space, software, and information
and communicate with each other.
Self-Instructional Material 1
IT and Management !! The characteristics of computer
Information System
!! Computer in Business
!! Elements of computers system setup
Notes
Data and
Instruction Computer Information
Definition
A computer is a fast electronic device that processes the input data according to the
instructions given by the programmer/user and provides the desired information as
an output.
The terminology used in the above definition is summarized in Table 1.1.
Table 1.1: Terminology Used in Definition of Computer
Term Meaning
Data A set of basic facts and entities which itself has no meaning
Information Data has some meaning or value
Instruction A statement given to computer to perform a task
Input Data and instructions given to computer
Process Manipulation data
Output Information obtained after processing of data
Computers
After the human brain, a computer is the fastest machine on the earth. Computers Notes
can perform millions of calculations at an unbelievable speed. Computers are not
only fast, they are very accurate and reliable too. For us, the smallest unit of time
is a second but for a computer; a second is not the smallest unit. Rather, it can be
divided into millisecond, microsecond, nanosecond and picosecond. A nanosecond
is equal to one billionth or thousand-millionth of a second.
Computers play a vital role for processing of data in an organization. Those help
in processing the volumes of data efficiently and accurately within a short time.
A computer has the following characteristics which make it so important for an
organization:
1. Fast: A computer is so fast that it can perform the given task (arithmetical or
logical) in few seconds as compared to man who can spend many months for
doing the same task. A computer can process millions of instructions per second.
2. Accurate: While doing calculations, a computer is more accurate than a human.
A human can make mistakes in calculations but a computer does not make
mistakes, if it is provided accurate instructions.
3. Diligence: A computer does not suffer from the human traits of tiredness and
boredom. Man will be tired and bored while doing millions of calculations but
a computer, being a machine, does this job very efficiently and without any
tiredness and boredom.
Self-Instructional Material 5
IT and Management 4. High Memory: A computer has much more memory or storage capacity than
Information System
human being. It can store millions of data and instructions, which can be
retrieved and recalled even after a number of years. This is not possible in case
Notes of human brain.
5. No Intelligence: A computer is a machine and obviously has no intelligence
of its own. Each and every instruction must be given to the computer for doing
a task. Man has an intelligence and it is the man who invented computer and
gives it all the instructions and logic to work. A computer cannot take decisions
on its own and it is the main drawback of it.
Input Function
The input function is the process of entering data and instructions into the computer
system. The computer accepts the data and instructions from the user through various
input devices like keyboard, mouse, scanner, etc.
Output Function
With the help of this function, a computer displays the processed results or output.
The output is communicated to the user through various output devices like monitor,
printer, etc.
Control Function
All the other functions performed by the computer are controlled by this control
function. Control function guides the computer to process and give output in the
right manner and proper sequence.
Storage
The following diagram shows the interaction of the components of the simple
model of a computer. The arrows indicate the flow of control in the form of data
and instructions. An input unit provides the input for the processing to CPU (Central
Processing Unit) which, after processing, directs the processed data to output unit
for display to the user. The storage unit or the memory of computer stores the data.
Self-Instructional Material 7
IT and Management
Information System 1.6 Computers in Business
Computers can process vast quantities of business data at enormous speed with
Notes unfailing consistency and unimaginable flexibility.
These capabilities of computers open new approaches to problem solving and data
processing.
Following six characteristics of computers make them indispensable for use in
business:
1. Speed: Computers speed up data processing by many orders of magnitude as
compared to the manual system.
2. Data Volume: Vast amount of data can be stored and processed very quickly.
3. Repetitiveness: The more repetitive the task, the more profitable it is to
automate it.
4. Complexity: Problems with several interacting variables can be solved quickly
and accurately.
5. Accurate Output: As high accuracy can be obtained as needed; also accuracy
is not affected by boredom and fatigue and is not Subjective.
6. Declining Costs: There has been a steady decline in the cost of per unit of data
processed.
The computers about which we have been discussing come in all shapes and sizes
and can be used for various purposes. But all of them have certain characteristics
in common. Two of the most important constituents of computers are — hardware
and software.
Apart from these two main elements of the computer, i.e., hardware, which represents
the physical parts of the computer, and software that represents the programs
that instruct the computer what is to be done, computers also include processing.
Processing transforms data into information and involves data, people and procedures.
Thus all these together are the five elements of the computing process (as a whole).
These five elements are:
1. Hardware
2. Software
3. Data
Hardware
The term ‘hardware’ refers to the physical parts of the computer or includes anything
in the computer that we can touch. It consists of interconnected electronic devices
that control everything in the computer.
Hardware can be divided into four major categories. They are:
1. Processor
2. Memory
3. Input and Output Devices
4. Storage Devices
Processor
The complex procedure that transforms data into information (useful and meaningful
data) is called processing. This type of transformation mainly includes two
components—the processor and the memory.
The Processor acts like the brain of a computer. It organizes and carries out the
instructions given to the computer by the user or the message passed on by the
software. There are various types of processors available in the market. In PC, we
use microprocessor(s) (a number of microprocessors can also be used in one PC).
Microprocessors are made of silicon or some other material and are etched with many
tiny electronic circuits. The microprocessor is plugged into the circuit board – a hard
rectangular board that contains the total circuitry used to connect the processor to
the rest of the hardware. This circuit board is called ‘motherboard’. The number of
chips and circuit boards (on which the processors are plugged in) is increased when
the computer is to be made more powerful. The term Central Processing Unit (CPU),
in real terms, is the processor of the computer. This is the “brain” of the computer,
without which nothing can be done. It is very small in size and occupies just a few
square inches of space.
Self-Instructional Material 9
IT and Management
Information System
Notes
Fig. 1.3
Memory
The software is loaded into the memory of the computer and runs from there only.
Not only the software or programs, but also all the data are loaded into the memory
for easy access. This memory is called Random Access Memory (RAM). When one
talks about memory one often means RAM only.
The main thing to be kept in mind while working on the computer is that RAM is a
volatile memory and everything disappears if power goes off or is turned off abruptly
in the middle of work. Thus, it is always advisable to frequently save the work on
the storage disk while you are working.
The amount of RAM in a computer tremendously affects the speed and power of the
computer. The more the RAM, the greater is the power and speed of the computer.
The measurement unit of memory is byte. The bigger units of bytes are:
Kilobyte (KB) ~ 1000 bytes [210 bytes = 1024 bytes to be precise]
Megabyte (MB) ~ 1000 KB ~ 10,00,000 bytes
Gigabyte (GB) ~ 1000MB ~ 10 ‘KB ~ 10’ bytes
Nowadays PC’s have 8 to 16 GB of RAM.
ROM
Read Only Memory holds permanent data or instruction that can only be read,
and nothing can be written on it. Information is permanently recorded in it. It is a
nonvolatile memory. ROM contains instructions to get the computer started when
it is switched on. It also holds instructions for the control of the various peripheral
units of the computer, such as graphic display, disk drive, etc. The controls of ROM
are built into it at the time of its manufacturing.
Self-Instructional Material 11
IT and Management Storage Devices
Information System
Although the computer can be said to be complete with input and output devices,
memory and CPU, and can function quite well, but when it comes to the need of
Notes storing data or even programs files for future use, some place is required to store
them. Storage devices are used to store data permanently or semi-permanently.
Storage holds the data and the software brings into the memory (RAM) a particular
program or data required at that point of time. After you have finished with the work,
you again put back the programs and data (new one or processed) into the storage.
Storage can be differentiated from memory thus:
1. Storage is cheaper than memory
2. Storage has more space than RAM
3. Storage is not volatile whereas RAM is, i.e., data remains in the storage even
if the power is switched off unlike RAM
4. Ram is faster than storage.
The most widely used storage medium is the magnetic disk, which is round in shape
and flat. Read and write heads (similar to the heads of cassette players or VCRs)
float above and below the disk near the surface. The disk spins around their center.
The device, which holds the disk, is called ‘disk drive’. There are some drives
which have built-in disks and these disks cannot be detached from them, whereas
some drives are meant for removable/replaceable disks. Almost every PC uses non-
removable disks, but additional removable diskette drives can also be used. The
non-removable drive is the Hard Disk Drive (HDD) and the removable one is the
Floppy Disk Drive (FDD). A computer can have any number of HDDs and FDDs
as per the user’s requirements.
DVD is the digital optical disk storage with 4.7 gigabyte storage capacity on single
sided. DVD are the devises that can read DVD disk on computer. DVDs can be single
or double sided and can have to layers on each side, a double sided, two layered
DVD will hold up to 17 gigabytes of video, audio, or other information.
Pen Drive is a device used to data storage. It is a small portable flash memory card
that plugs into a computer.
HDD can store far more data than a diskette can, so the HDD serves as the computer’s
primary filling cabinet. Diskettes are used to load new programs or data on to the
HDD to transport the data or make the backup copies of the data of the HDD.
The floppy diskette or the removable disks are made of plastic, and, to protect them
from dust and scratches, are kept enclosed in vinyl cases. Initially, floppies measured
8 inches; they were reduced to 5¼ inches and now we use 3½ inches diskettes. The
size of diskettes is decreasing in diameter, but its storage size is increasing. The
capacity of the 8” diskette was 360KB, and that of the 5½ inch was 1.2 MB, whereas
the 3½ inch diskette stores 1.44MB of data. The name floppy was given because the
vinyl cover (on 8” and 5” diskettes) used to be very flimsy or floppy.
Strengths
Following list demonstrates the advantages of computers in today’s arena.
!! High Speed
Computer is a very fast device.
It is capable of performing calculation of very large amount of data.
The computer has units of speed in microsecond, nanosecond, and
even the picosecond.
It can perform millions of calculations in a few seconds as compared
to man who will spend many months for doing the same task.
!! Accuracy
In addition to being very fast, computers are very accurate.
The calculations are 100% error free.
Self-Instructional Material 13
IT and Management Computers perform all jobs with 100% accuracy provided that correct
Information System
input has been given.
!! Storage Capability
Notes Memory is a very important characteristic of computers.
A computer has much more storage capacity than human beings.
It can store large amount of data.
It can store any type of data such as images, videos, text, audio and
many others.
!! Diligence
Unlike human beings, a computer is free from monotony, tiredness
and lack of concentration.
It can work continuously without any error and boredom.
It can do repeated work with same speed and accuracy.
!! Versatility
A computer is a very versatile machine.
A computer is very flexible in performing the jobs to be done
This machine can be used to solve the problems related to various
fields.
At one instance, it may be solving a complex scientific problem and
the very next moment it may be playing a card game.
!! Reliability
A computer is a reliable machine.
Modern electronic components have long lives.
Computers are designed to make maintenance easy.
!! Automation
Computer is an automatic machine.
Automation means ability to perform the given task automatically.
Once a program is given to computer, i.e., stored in computer memory,
the program and instruction can control the program execution without
human interaction.
!! Reduction in Paper Work
The use of computers for data processing in an organization leads to
reduction in paper work and results in speeding up a process.
As data in electronic files can be retrieved as and when required, the
problem of maintenance of large number of paper files gets reduced.
Weaknesses Notes
Computer is, no doubt, a marvellous tool. Yet it has some limitations. Some of the
major limitations of computer are:
1. A computer cannot think on its own. It has to be given instructions to perform
any operation. Research is currently underway to impart artificial intelligence
to computer. Once this becomes possible, computers will be thinking on its
own, then it will be a reasonable replication of human mind.
2. It does not have intuition. It cannot draw a conclusion without going through
all intermediate steps.
3. It can do a task only if it can be expressed in a series of finite steps leading to
the completion of the task.
4. Similarly, it cannot handle a situation where a finite number of steps generate
an impossibly large number of computational operations.
5. It cannot learn from experience. It will commit the same error repeatedly and
cannot learn from experience. But changes are taking place in this area as
research progresses on artificial intelligence.
Self-Instructional Material 15
IT and Management Simply put, calculators can carry only one function at a time. Even when you need
Information System
to solve a small problem, you need to press a number of buttons to arrive at the
solution. On the contrary, a computer is capable of carrying out many operations
at the same instant. Computer programs are a series of instructions that are given
Notes
to computers and it can perform complex calculations with the assistance of those
instructions. So if the necessary program is installed on the computer, you do not
need to tell the computer what to do next as it can perform all the steps required in
getting the answer. It will come with the answer at a lightening fast speed without
you having to press any buttons, or mouse clicks in this instance. On the other hand,
you need to keep on pushing buttons to solve even easy mathematical problems
while using a calculator.
The word ‘computer’ has become very broad in modern times and has come to include
smart devices such as smartphones, MP3 players, desktops and laptops. These devices
all have a basic calculator that can perform simple mathematical operations, but they
are capable of many more operations which are beyond the capacity of a calculator.
Characteristic Human Calculator Computer
Speed Slow Fast Very Fast
Accuracy Possible to do errors Good Very Good
Memory Less internal memory No Large Memory
Operation All operations. But slow Arithmetic Arithmetic and Logical
1.10 Summary
!! A computer is an electronic device that can perform a variety of operations
according to the instructions given by the programmer/user and provides
the desired information as an output. Computers are fast, accurate, diligent,
having high memory, but no intelligence.
!! Computers are classified as general purpose or special purpose computers
according to the purpose of their requirement. According to the technology
used, computers are classified as analogs which are used for scientific and
engineering application, digitals which are considered as general purpose
computers or hybrid computers, which incorporate the technology of both
analog and digital computers. According to their size, computer can be
classified as super computer, mainframe computer, minicomputer and
micro computer.
1.11 Glossary
!! Computer: This is a machine which executes an algorithm stored in its
memory to process data fed to it and produces the required results.
16 Unit 1: Computers – An Introduction
Uttarakhand Open
!! Communication Channel: A medium through which (electric) signals are University
transmitted and received.
!! Disk Memory: A back up or peripheral memory in which information is
stored as magnetized spots on the surface of disks coated with magnetic
Notes
material. In hard disks the disks are not flexible. In floppy disks the disk is
a circular platter made of flexible magnetic coated plastic sheet.
!! Floppy Disk: A circular magnetic disk made of flexible plastic sheet coated
with magnetic material.
!! IC (Integrated Circuit): An electronic circuit fabricated on a single chip
of silicon.
!! Input Unit: A part of a computer used to feed programs and data.
!! Memory: An organized collection of cells used and programs in a computer.
!! Output Unit: A unit of a computer used to print or display computed results.
!! Processor: A unit of a computer which interprets instructions, executes
them using arithmetic and logic circuits and controls the operation of all
the other units of the computer (also known as CPU).
!! RAM (Random Access memory): A memory used as the main memory of
a computer in which the time to retrieve stored information is independent
of the address where it is stored.
!! ROM (Read Only Memory): A memory in which information is permanently
written. The information can be read quickly but cannot be changed.
Self-Instructional Material 17
IT and Management 2. What do you mean by the term ‘diligence’ respect to computers?
Information System
3. What are the characteristics of computer?
4. Name the elements of computer system
Notes
5. List some commonly used input devices.
1.14 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Structure
2.0 Introduction
2.1 Unit Objectives
2.2 Components of a Digital Computer
2.2.1 The Input Unit
2.2.2 The Output Unit
2.2.3 The Central Processing Unit
2.2.4 Memory
2.3 Reduced Instruction Set Computer (RISC)
2.4 Indian Computing Environment
2.5 Role of Computers in Management
2.6 Summary
2.7 Glossary
2.8 Answers to Check Your Progress
2.9 Terminal and Model Questions
2.10 References
2.0 Introduction
Computer components can be broadly divided into two categories – Hardware and
Software. Hardware refers to any physical component of a computer. For example,
CPU, Monitor, Keyboard, Hard Disk, Floppy Disk, etc., are physical components and
thus, are hardware. Software refers to the programs which are required to operate the
computer. For example, DOS (Disk Operating System), BASIC, COBOL, dBASE,
an Accounting Software, etc., are all software. An analogy of hardware can be the
book which you are reading and then software would be the text written on this book.
Another analogy could be – ‘brain’ is a hardware but ‘memory stored in brain’ is a
software.
Both hardware and software are dependent on each other. CPU, Memory Unit, Hard
Disk, etc., are useless until they are provided instructions and data for storage and
processing. Similarly, BASIC or COBOL language has no use until it is stored and
Self-Instructional Material 19
IT and Management processed by hardware components of a computer.
Information System
In today’s computer industry, a wide variety of hardware components are available
for microcomputers. Managers must be aware of the working and uses of different
Notes hardware components, so that they can make good decisions about purchase of
computer systems.
Central
Processing
Input Unit Unit Output Unit
(CPU)
Auxiliary/Memory
A Mouse
A 101 Keys Keyboard
Light Pen
Touch
Screen
Hand
Stylus
Stylus
Function buttons
Function buttons
Function Buttons
Window
Window
Puck
Puck Tablet
Tablet
Self-Instructional Material 21
IT and Management 4. Joy stick
Information System
5. Light pen
6. Scanner
Notes
7. Secondary storage devices such as floppy disks, magnetic tapes, etc.
The data in any form is first digitized, i.e., converted into binary form, by the input
device before being fed to the Central Processing Unit (CPU).
A.L.U.
C.U.
Main
Memory
Arithmetic Calculations
The arithmetic calculations may be addition, subtraction, multiplication, division,
exponentiation, etc.
Logical Calculation
Logical calculations are basically decision making statements, for example, A>B
decides whether A is greater than B or not; If A is greater than B the statement is
true and logical ‘1’ would be generated, otherwise a logical ‘0’ would be generated.
Self-Instructional Material 23
IT and Management Some logical decisions decide the further routing of the program. This will be further
Information System
explained by the figure:
Notes
No If Yes
A>B
RAM
The random access memory is a read write memory, i.e., information can be read as Notes
well as written into this type of memory. It is volatile in nature, i.e., the information
it contains is lost as soon as the system is shut down unless ‘saved’ for further usage
by the users. It is basically used to store programs and data during the computer’s
operation.
ROM
The read only memory, as the name may suggest contains information that can only
be read, i.e., you can’t write on this type of memory. It is non-volatile or permanent
in nature. It is basically used to store permanent programs such as program for the
functioning of the monitor.
The main memory is a fast-memory, i.e., it has small access time. It is because of
its limited capacity that it is fast. The main memory contains the programs that
are currently being worked on. It passes on this information to the control unit as
and when required. In case the CPU wants to access some data that is present in a
secondary storage device, this data is first transferred to the main memory and then
processed.
The main memory is much more costly than the secondary storage devices. Although
the ROM IC’s of various computers do not vary much in their capacities, the RAM
chips are available in wide ranges of storage capacities. In fact, the capacity of the
random access memory is an important specification of a computer.
A larger Ram means larger programs (in terms of memory) can be loaded and
executed. Suppose you want to run a 68-KB program on a machine with 64-KB.
This means that the whole program can not be loaded into the main memory at once
resulting in either the non-execution of the program or a very slow execution.
A 64-K memory means that there are approximately 64000 (65,536 to be precise)
storage locations which can store 1 bit of data each.
Different memories can be classified on the basis of their concepts:
1. Access Mode: It means how easily they are accessible.
2. Access Time: The average time required to reach a storage location and obtain
its content is called access time.
3. Transfer Rate: The transfer rate is the number of characters or words that a
device can transfer per second after it has been positioned at the beginning of
the record.
4. Capacity and Cost: The capacity and cost may depend upon the requirement
and the budget.
Self-Instructional Material 25
IT and Management The main memory has a very low access time and a very high transfer rate. It is
Information System
limited in capacity and costlier than secondary storage devices.
Processor
Cache Memory
Main Memory
The cache memory works according to various algorithms, which decide what
information it has to store. These algorithms work out the probability to decide
which data would be most frequently needed. This probability is worked out on the
basis of past observations.
Register
Notes
A register is a combination of memory storage locations called flip-flops. Each
flip-flop is capable of storing one bit of information. An n-bit register contains ‘n’
flip-flops and is capable of storing ‘n’ bits of information.
1 2 3 n-1 n
1 0 0 1 0
Accumulator
The accumulator is a register that is present within the arithmetic logic-unit. The
accumulator stores data, which is either the result of an operation, or which is to be
processed through arithmetic and logical operations.
A.L.U.
Accumulator
Self-Instructional Material 27
IT and Management 1. Let the first instruction cause the number 13 to be placed in the accumulator.
Information System
When the control unit receives this instruction it decodes it and performs the
controlling and coordination function by sending the number to the accumulator.
Notes A special purpose register that holds the instruction currently being processed
by the control unit is called Current Instruction Register (CIR).
2. The second instruction asks the control unit to send the address of the second
number stored in the main memory to the MAR.
3. The control unit then causes the contents of that specific address of the main
memory to be copied to the MDR.
4. Once the numerical data is passed on to the MDR, the control unit signals the
ALU to perform the SUBTRACT Operation which causes the number in the
MDR to be subtracted from the number in the accumulator.
Fetch Cycle
The control unit fetches the instruction from the memory data register and places it
in the current instruction register.
Execution Cycle
The control unit then decodes this instruction in the current instruction register
and sends the appropriate signal to the concerned device for the execution of the
instruction.
The flowchart in the figure 2.4 describes the functioning of the control unit.
Let us now turn our attention back to the memory devices.
2.2.4 Memory
Memory Hierarchy
The figure 2.5 above is self-explanatory.
Types of Memory
Although various types of memory have been discussed in the previous sections the
block diagram given below acts as a good visual aid for memorizing.
As promised earlier we shall now discuss the random access memory (RAM) and
read only memory (ROM) in detail.
Self-Instructional Material 29
IT and Management the capacitor indicates a ‘1’ bit and no charge indicates a ‘0’ bit. The charge on the
Information System
capacitor leaks away after a few milliseconds. Therefore, a dynamic RAM has to
be refreshed periodically after every two milliseconds. A D-RAM uses its contents
Notes in a very short time even though the power supply is ON. A D-RAM consumes less
power and has higher packing density. It is cheaper than the static RAM.
Static RAM (S-RAM): Static RAM’s are also volatile in nature but they need no
regenerator to retain the data. They retain the data as long as they receive the power.
The static random access memory consumes more power and is more expensive.
The static RAM chips are more complicated and hence require more space. Static
RAM’s are faster than the dynamic RAM’s. Static RAM’s have an access time of
approximately 85 to 90ns while the dynamic RAM’s may take 150 to 200ns to
provide information. Static RAM’s are recommended for medium sized memories
while dynamic RAM’s are recommended for large sized memories.
Types of ROM
!! Programmable Read Only Memory (PROM): A PROM program is used
to record information in the PROM chip. Information once programmed
into the PROM chip is permanent and can not be changed or erased. The
process of entering the information into the PROM chip is known as “burning
the PROM.” PROM chips are seldom used in modern day computers,
but they still find their use in devices where a permanent ROM is
required.
!! Masked Read Only Memory (MROM): In the masked ROM, the information
is permanently recorded by the masking and metallization process. It is
not easy to perform this process as a large infrastructure is required,
and therefore, it is usually the manufacturers who perform this process.
!! Erasable Programmable Read Only Memory (EPROM): An EPROM is
an erasable PROM. An EPROM can be (re) programmed using an EPROM
programmer. Exposing it to high intensity ultraviolet light for 30 minutes
(approximately) can erase the contents of an EPROM chip. An ultra-violet
Self-Instructional Material 31
IT and Management within the CPU without having to use memory as often. This type of computer is
Information System
classified as a Reduced Instruction Set Computer or RISC.
CISC Characteristics
Notes
The design of an instruction set for a computer must take into consideration not
only machine language constraints, but also the requirements imposed on the use
of high-level programming languages. The translation from high-level to machine
language programs is done by means of a compiler program. One reason for the trend
to provide a complex instruction set is the desire to simplify the compilation and
improve the overall computer performance. The task of a compiler is to generate a
sequence of machine instructions for each high-level language statement. The task
is simplified if there are machine instructions that implement the statements directly.
The essential goal of a CISC architecture is to attempt to provide a single machine
instruction for each statement that is written in a high-level language. Examples of
CISC architectures are the Digital Equipment Corporation VAX computer and the
IBM 370 computer.
The major characteristics of CISC architecture are:
1. A large number of instructions-typically from 100 to 250 instructions
2. Some instructions that perform specialized tasks and are used infrequently
3. A large variety of addressing modes-typically from 5 to 20 different modes
4. Variable-length instruction formats
5. Instructions that manipulate operands in memory
RISC Characteristics
The concept of RISC architecture involves an attempt to reduce execution time by
simplifying the instruction set of the computer. The major characteristics of an RISC
processor are:
1. Relatively few instructions
2. Relatively few addressing modes
3. Memory access limited to load and store instructions
4. All operations done within the registers of the CPU
5. Fixed-length, easily decoded instruction format
6. Single-cycle instruction execution
7. Hardwired rather than micro programmed control
A characteristics of RISC processors is their ability to execute one instruction per
clock cycle. This is done by overlapping the fetch, decode and execute phases of
Definition
Office automation is the application of computer and related technologies like
communication and networking to integrate the general office tasks so that the
efficiency of office work is improved.
Office automation does not mean just to install computers and communication devices
in an office, but it is much more than that. We will discuss in later part of this unit,
how an office can be automated in a real sense.
Self-Instructional Material 33
IT and Management !! To provide better service to the customers;
Information System
!! To provide accurate information to the management;
!! To provide best and fastest way of communication.
Notes
The above requirements cannot be achieved without using latest technologies and
therefore, office automation is needed for an organization.
2.6 Summary
!! The main components of computer are input/output units, central processing
unit and memory unit. Input unit is used to enter data and instructions into
a computer. CPU performs all the processing of input data: Memory is used
to store the data, instructions and information before, during and after the
processing by ALU. Output unit makes available output to the users.
!! CPU consists of ALU (Arithmetic Logic Unit) which is responsible for all
arithmetic and logical operations. CU (Control Unit) controls the transfer
of data and instructions among other units of computer registers, which are
used to store data, instructions and memory addresses when ALU performs
arithmetic and logical operations. Buses are used to transfer data between
registers and clock which measures and allocates a fixed time slot for
processing each and every micro operation.
!! Memory is the internal storage area, which holds the data and instructions
during processing. The three types of main memory or Internal memory are
RAM (Random Access Memory), ROM (Read Only Memory) and CMOS
(Complementary Metal Oxide Semiconductor Memory).
Self-Instructional Material 35
IT and Management !! Computers are used in business for data capturing in on-line as well as
Information System
off-line mode, for storage and retrieval of information, for output and
for transmission. Offices are needed to be automated to reduce cost of
administrative overhead and to increase efficiency of office tasks and
Notes
staff. The hardware components of microcomputer can be classified into
motherboard, input devices, output devices, storage devices, cards, ports and
cords and power supply. Various input devices are keyboard, mouse back ball,
light pen, touch screen, Joy stick, digitizer, Scanner, Optical Mark Reader
(OMR), Optical Character Reader (OCR), Bar Code Reader (BCR), Magnetic
Ink Character Recognition (MICR) and voice input devices. Various output
devices include monitor, printer, plotter and computer output micro file.
Storage devices include hard disk, floppy disk, compact disk, Magnetic tape,
video disk, Magneto optical drive, DVD ROM/RAM disk, etc.
2.7 Glossary
!! ALU: Arithmetic Logic Unit of a computer which is used to perform
arithmetic and logic operations.
!! Cache Memory: A small high speed memory which is used to temporarily
store a portion of a program or data from the main memory. The processor
retrieves instructions or data from the cache memory.
!! CPU: Central processing unit of a computer. It consists of circuits to perform
arithmetic and logic and also has circuits to control and co-ordinate the
functioning of the memory and I/O units of a computer.
!! Output Unit: A unit of a computer used to print or display computed results.
!! Printer: An output unit to print the results of computation. Line printers
print one full line at a time using a character, chain or drum. Character
printer print one character at a time serially.
!! Processor: A unit of a computer which interprets instructions, executes
them using arithmetic and logic circuits and controls the operation of all
the other units of the computer (also known as CPU).
!! RAM (Random Access Memory): A memory used as the main memory of
a computer in which the time to retrieve stored information is independent
of the address where it is stored.
!! ROM (Read only Memory): A memory in which information is permanently
written. The information can be read quickly but not change.
2.10 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
Self-Instructional Material 37
IT and Management
Information System
unit 3: Generation of Computer
Notes
Structure
3.0 Introduction
3.1 Unit Objectives
3.2 Generation of Computers
3.2.1 Zeroth Generation Computers
3.2.2 First Generation Computers
3.2.3 Second Generation Computers
3.2.4 Third Generation Computers
3.2.5 Fourth Generation Computers
3.2.6 Fifth Generation Computers
3.3 Classification of Programming Languages
3.3.1 Low Level Languages
3.3.2 High Level Languages
3.3.3 Comparison of Assembly and High Level Languages
3.4 Summary
3.5 Glossary
3.6 Answers to Check Your Progress
3.7 Terminal and Model Questions
3.8 References
3.0 Introduction
A computer is a machine that works with data and information in the form of
numbers. People from the beginning of time, and throughout the years, have invented
and continue to develop things that help them count. Cavemen counted with the
only counting tools they knew, their fingers and toes. These were considered the
first counting tools. A program is a sequence of instructions that tells the hardware
of a computer what operations to perform on data. Programs can be built into the
hardware itself, or they may exist independently in a form known as software. In
some specialized, or dedicated computers the operating instructions are embedded
in their circuitry; common examples are the microcomputers found in calculators,
wristwatches, automobile engines, and microwave ovens.
A general-purpose computer, on the other hand, contains some built-in programs (in
ROM) or instructions (in the processor chip), but it depends on external programs to
Self-Instructional Material 39
IT and Management printed output (output unit). As all basic parts of modern computers were thought
Information System
out by Charles Babbage, he is known as Father of Computers. In later years, Herman
Hollerith invented a machine for doing counting for 1880 US census, which was
Notes
called Tabulating Machine. In 1944, Howard A. Eiken invented first American general
purpose electro-mechanical computer, called Mark I and later on its successor, Mark
II. The Zeroth generation of computers or the era of mechanical computers ended in
1946 when vacuum tubes were invented.
Examples:
!! ENIAC (Electronic Numerical Integrator and Calculator) It was the first
electronic computer using vacuum tubes. – 1946
!! EDSAC (Electronic Delay Storage Automatic Calculator) It was the first
stored-program computer. – 1949
!! EDVAC (Electronic Discrete Variable Automatic Computer) It was a
successor to EDSAC. – 1951
!! IAS machine (Princeton’s Institute of Advanced Studies) It was a new
version of the EDVAC, built by von Neumann. – 1952
The basic design of IAS machine is now known as von Neumann machine, which
had five basic parts, viz., the memory, the arithmetic logic unit, the program control
unit, the input and the output unit.
Features
1. They used valves or vacuum tubes as their main electronic component.
2. They were large in size, slow in processing and had less storage capacity.
3. They consumed lots of electricity and produced lots of heat.
4. Their computing capabilities were limited.
5. They were not so accurate and reliable.
6. They used machine level language for programming.
7. They were very expensive.
40 Unit 3: Generation of Computer
Uttarakhand Open
3.2.3 Second Generation Computers University
The second generation of computers (1954-64) was marked by the use of transistors
in place of vacuum tubes. Transistors had a number of advantages over the vacuum
tubes. As transistors were made from pieces of silicon, they were more compact than Notes
vacuum tubes. The second generation computers, therefore, were smaller in size and
less heat was generated than first generation computers. Although they were slightly
faster and more reliable than earlier computers, they also had many disadvantages.
They had limited storage capacity, consumed more power and were also relatively
slow in performance. Like first generation computers, they also required regular
maintenance and their components had also to be assembled manually. Manual
assembly of components was very expensive and later many attempts were made to
reduce such manual assembly. It was in 1964, when it was discovered that a number
of transistors could be sealed up into a tiny package, called Integrated Circuit (IC)
or Chip. Second generation computers became outdated after the invention of ICs.
Examples:
!! PDP-l, developed by DEC was the first minicomputer.
!! NCR 304 (National Cash Register), was first all-transistorized computer.
Features
1. Transistors were used instead of Vacuum Tube.
2. Processing speed is faster than First Generation Computers (Micro Second)
3. Smaller in Size (51 square feet)
4. The input and output devices were faster.
Self-Instructional Material 41
IT and Management Examples:
Information System
!! IBM 360, developed by IBM in 1964 was the first product line designed
as a family.
Notes
!! PDP-8, developed by DEC in 1965 was the first mass-market minicomputer.
!! PDP-ll, developed by DEC in 1970 was the first highly successful
minicomputer.
!! CRAY-l, developed by Cray in 1974 was the first supercomputer.
!! VAX, developed by DEC in 1978 was the first super minicomputer.
Features
1. They used Integrated Circuit (IC) chips in place of transistors.
2. Semi conductor memory devices were used.
3. The size was greatly reduced, the speed of processing was high, they were more
accurate and reliable.
4. Large Scale Integration (LSI) and Very Large Scale Integration (VLSI) were
also developed.
5. The mini computers were introduced in this generation.
6. They used high level language for programming.
Examples:
1. IBM PC, developed in 1981 was the first industry standard personal computer,
having Intel 8088 memory chip.
Features:
1. They used Microprocessor (VLSI) as their main switching element.
2. They are also called micro computers or personal computers.
3. Their size varies from desktop to laptop or palmtop.
4. They have very high speed of processing; they are 100% accurate, reliable,
diligent and versatile.
5. They have very large storage capacity.
Example:
!! Yet to develop but ROBOTS have few features of fifth generation computers.
Self-Instructional Material 43
IT and Management Machine Languages
Information System
Unfortunately, the computer’s own binary-based language, or machine language, is
difficult for humans to use. The programmer must input every command and all data
Notes in binary form, and a basic operation such as comparing the contents of a register
to the data in a memory-chip location might look like this: 11001010 00010111
11110101 00101011.
Machine-language programming is such a tedious, time consuming task that the time
saved in running the program rarely justifies the days or weeks needed to write the
program. Therefore, the set of instruction codes, whether in binary or in decimal
notation, which can be directly understood by the computer without the help of a
translating program, is called machine code or machine language program.
Let us understand this: a computer understands information composed of only
zeros and ones. This means that a computer uses binary digits for its operation.
The computer’s instructions are therefore coded and stored in the memory in the
form of 0s and 1s. A program written in the form of 0s and 1s is called a machine
language program. There is a specific binary code for each instruction. For example,
to add the contents of register A and register B, the binary code is 10000000 for
Intel 8085. The binary code (machine code or object code) for a certain operation
differs from computer to another. Each microprocessor has its own instruction set
and corresponding machine codes. Machine code is the fundamental language of a
computer and is normally written as strings of binary 1s and 0s. However, a machine
language program need not necessarily be coded as strings of binary digits (1s and
0s). It can also be written using decimal digits. However, the circuitry of the computer
would be extremely complex and such computers have not been built.
Get 901
Store 99 399
Get 901
Add 99 199
Put 902
Self-Instructional Material 45
IT and Management For writing a program in machine language, the programmer not only has to
Information System
remember the opcodes, but also has to keep a track of the storage locations of data
and instructions. It therefore becomes very difficult for him to concentrate fully on
Notes the logic of the problem. This frequently causes errors in programming.
It is very difficult to correct or modify machine language programs. Checking machine
instructions to locate errors is about as tedious as writing them initially. Similarly,
modifying a machine language program at a later date is so difficult that many
programmers would prefer to code the new logic afresh instead of incorporating the
necessary modifications in the old program. In short, writing a program in machine
language is so difficult and time consuming that it is rarely used nowadays.
Assembly Languages
One method programmers devised to shorten and simplify the process is called
assembly-language programming. By assigning a short (usually three-letter)
mnemonic code to each machine-language command, assembly-language programs
could be written and debugged-cleaned of logic and data errors - in a fraction of
the time needed by machine-language programmers. Unlike the other programming
languages, assembly language is not a single language, but rather a group of
languages. Each processor family (and sometimes individual processors within a
processor family) has its own assembly language.
In assembly language, each mnemonic command and its symbolic operands equal
one machine instruction. An assembler program translates the mnemonic opcodes
(operation codes) and symbolic operands into binary language and executes the
program. Assembly language, however, can be used only with one type of CPU
chip or microprocessor. Programmers who expended much time and effort to learn
how to program one computer had to learn a new programming style each time they
worked on another machine. What was needed was a shorthand method by which
one symbolic statement could represent a sequence of many machine-language
instructions, and a way that would allow the same program to run on several types of
machines. These needs led to the development of the so-called high-level languages.
In contrast to high-level languages, data structures and program structures in
assembly language are created by directly implementing them on the underlying
hardware. So, instead of cataloguing the data structures, the program structures can
be built (in assembly language you can build any structures you so desire, including
new structures nobody else has ever created). Because of the close relationship
between assembly languages and the underlying hardware, we will discuss hardware
implementation as well as software.
Assemblers
Assembly language is the oldest non-machine language, allowing for a more human
readable method of writing programs than writing in binary bit patterns (or even
Cross Assemblers
A less powerful and cheaper computer may not have enough software and hardware
facilities for program development. In such a situation, a faster and more powerful
computer can be used for program development. The programs so developed are
to be run on smaller computers. For such program development, a cross assembler
is required. A cross assembler is an assembler that runs on a computer other than
that for which it produces machine codes. These are further classified as: One-pass
Assemblers and Two-pass Assemblers.
One-Pass Assemblers
It is an assembler which reads the assembly language programs only once. Such an
assembler must be equipped with some means to assign addresses to the labels used
in the assembly language program.
Two-Pass Assemblers
It is an assembler which goes through the assembly language program twice. On the
first pass, the assembler reads the assembly language program and collects all labels.
It assigns addresses to the labels counting their position from the starting address.
On the second pass, the assembler produces the machine code for each instruction
and assigns addresses to each instruction.
Kinds of Processors
Processors can broadly be divided into the categories of: CISC, RISC, hybrid, and
special purpose.
Complex Instruction Set Computers (CISC) have a large instruction set, with
hardware support for a wide variety of operations. In scientific, engineering, and
mathematical operations with hand coded assembly language (and some business
applications with hand coded assembly language), CISC processors usually perform
the most work in the shortest time.
Reduced Instruction Set Computers (RISC) have a small, compact instruction
set. In most business applications and in programs created by compilers from
high level language source, RISC processors usually perform the most work in
the shortest time.
Hybrid processors are some combination of CISC and RISC approaches, attempting
to balance the advantages of each approach.
Special purpose processors are optimized to perform specific functions. Digital
signal processors and various kinds of co-processors are the most common kinds
of special purpose processors.
Self-Instructional Material 49
IT and Management Executable Instructions
Information System
There are four general classes of machine instructions. Some instructions may have
characteristics of more than one major group. The four general classes of machine
Notes instructions are: computation, data transfer, sequencing, and environment control.
Computation: Implements a function from n-tuples of values to m-tuples of values.
The function may affect the state. Example: A divide instruction whose arguments are
a single-length integer divisor and a double-length integer dividend, whose results
are a single-length integer quotient and a single-length integer remainder, and which
may produce a divide check interrupt.
Data Transfer: Copies information, either within one storage class or from one
storage class to another. Examples: A move instruction that copies the contents of
one register to another; a read instruction that copies information from a disc to
main storage.
Sequencing: Alters the normal execution sequence, either conditionally or
unconditionally. Examples: a halt instruction that causes execution to terminate; a
conditional jump instruction that causes the next instruction to be taken from a given
address if a given register contains zero.
Environment Control: Alters the environment in which execution is carried out. The
alteration may involve a transfer of control. Examples: An interrupt disable instruction
that prohibits certain interrupts from occurring; a procedure call instruction that
updates addressing registers, thus changing the program’s addressing environment.
Translation
When a program is written in a high-level it has to be converted into the appropriate
machine language program before it can be executed. The compiler software is used
to compile and create the object codes in machine language. The compiler does not
immediately produce machine language program. Suppose a programmer calls from
main program, a subprogram from library of subprogram files, then he should submit
the source codes for all these together, to the compiler. This will force a compilation
of this subprogram whenever it is used by the program. Instead, if we compile the
main program and subprogram separately and link them up as necessary for producing
the final executable machine program, it will save duplication of compiler effort.
The linking of these library programs, the main program is done by an operating
system program called ‘linker’.
Interpreter
An Interpreter is a translator program for a high-level programming language that
translates and program at the same time. The program is still interpreted in its
original source language, the way the programmer wrote it. The interpreter translates
one program statement into language and then causes the machine language be
executed. It then translates the next line, and so on, until the program is finished.
Interpreted programs run more slowly than their counterparts, because the compiler
translates the entire program all at once before the program is run. However, it is
convenient to write a program using an interpreter. Each single line of code can be
tested interactively, hence the program-test the results of a programming statement
right away. Programs that are interpreted are not one program and must always be
run with the interpreter in the computer. For example, if you run a BASIC source
language program, the version of the BASIC interpreter must be in the computer.
Self-Instructional Material 51
IT and Management Complier vs Linker
Information System
Usually a longer program is divided into a number of smaller subprograms called
modules. It is easier to develop, test and debug smaller programs. A linker is a
Notes program that links (combines) smaller programs to form a single program. While
developing a program, subroutines are frequently used. The subroutines are stored
in a library file. The linker also links subroutines with the main program. Further,
the linker links machine codes of the programs. It accepts the user’s programs after
the editor has edited the program and the compiler has produced the corresponding
machine codes.
Interpreter vs Compiler
An interpreter is a program which translates statements of a high-level language
program into machine codes. It translates one statement of the program at a time.
It reads one statement of a high-level language program, translates it into machine
code and executes it. Then it reads the next statement of the program, again translates
and executes it. In this way it proceeds further till all the statements of the program
are translated and executed. On the other hand, a compiler goes through the entire
high-level language program once or twice and then translates the entire program into
machine codes. A compiler is 5 to 25 times faster than an interpreter. An interpreter is
a small program as compared to a compiler. It occupies less memory space, so it can
be used in a smaller system which has limited memory space. The object program
produced by the compiler is permanently saved for future reference. On the other
hand, the object code of the statement produced by an interpreter is not saved. If an
instruction is used the next time, it must be interpreted once again and translated into
machine code. For example, during the repetitive processing of the steps in a loop,
each instruction in the loop must be reinterpreted as the loop is executed.
Some of the popular high-level languages are briefly explained below:
FORTRAN
The first commercial programmer was probably Grace Hopper (1906-92), an
American. After programming an experimental computer at Harvard University, she
worked on the UNIVAC I and II computers and developed a commercially usable
high-level programming language called FLOWMATIC. To facilitate computer use
in scientific applications, IBM then developed a language that would simplify work
involving complicated mathematical formulas. Begun in 1954 and completed in
1957, FORTRAN (FORmula TRANslator) was the first comprehensive high-level
programming language that was widely used. It is a very useful language for scientific
and engineering computations as it contains many functions for performing complex
mathematical operations. It is a compact programming language. It is not suitable
for processing large business files. It has a number of versions. Earlier, FORTRAN
ALGOL Notes
In 1957, the Association for Computing Machinery set out to develop a universal
language that would correct some of FORTRAN’s perceived faults. A year later
they released ALGOL (ALGOrithmic Language), another scientifically oriented
language. It was suitable for scientific and engineering computations. It was used
in some universities and computer centres, but not in industries. It was widely used
in Europe in the 1960s and 1970s, it has since been superseded by newer languages,
while FORTRAN continues to be used because of the huge investment in existing
programs.
COBOL
It is an abbreviation for Common Business-Oriented Language. COBOL was
developed specially for business data processing. It was introduced by the US
industry/government committee in 1960. COBOL is used for large business and
commercial applications such as handling of ledgers, accounts, payroll files, etc.
It supports simple and limited numeric operations, but it can handle complex non-
numeric operations. It is more suitable for manipulating alphanumeric characters than
FORTRAN. It can be written in a quasi-English form that may employ commonly
used business terms. Its English-like statements can be understood very easily, for
example, SUBTRACT WITHDRAWALS FROM OLD BALANCE GMNG NEW
BALANCE. Its demerit is that it is not a compact language. It is not easy to learn,
and it cannot handle complex mathematical computations as FORTRAN does.
PASCAL
PASCAL, originally designed as a teaching tool, is now one of the most popular
microcomputer languages. It is a high-level language named after Blaise Pascal a
seventeenth century French mathematician; philosopher and inventor. The mechanical
calculator was invented by him. This language was developed by Prof. Nicklaus
Wirth at Switzerland’s Federal Institute of Technology in the early 1970s. It is a
multi-purpose language suitable for both scientific and business applications. Beside
numbers, it can also manipulate vectors, matrices strings of characters, sets, records,
files and lists. As PASCAL is a compact language, its compiler is quite suitable for
a smaller system. Program design debugging is made simpler. It produces a very
efficient machine-code program. The program compiled from PASCAL runs several
times faster than the same program compiled from FORTRAN BASIC. Like ALGOL,
it is block-structured. It is an offspring of ALGOL. It is more versatile than BAS
Self-Instructional Material 53
IT and Management and more modular than FORTRAN. PASCAL is quite similar to C language, but
Information System
it is not used in professional programming as C language is. It became an ANSI
standard language in 1983.
Notes
Basic
BASIC (Beginner’s All-purpose Symbolic Instruction Code) was developed at
Dartmouth College in the early 1960s for use by nonprofessional computer users.
The language came into almost universal use with the microcomputer explosion
of the 1970s and 1980s. Condemned as slow, inefficient, and inelegant by its
detractors, BASIC is nevertheless simple to learn and easy to use. Because many early
microcomputers were sold with BASIC built into the hardware (in ROM memory) the
language rapidly came into widespread use. As a very simple example of a BASIC
program, consider the addition of the numbers 1 and 2, and the display of the result.
This is written as follows (the numerals 10-40 are line numbers):
10 A = 1
20 B = 2
30 C = A + B
40 Print C
BASIC is a widely used language for simple computation and analysis. It is now by
far the most popular high-level language used in personal computers. To translate
BASIC instructions into machine-language codes, interpreters are frequently used in
PC systems. However, BASIC language compilers are also available for these systems.
PL/I
It is an abbreviation of Programming Language/I. PL/I was introduced by IBM
in 1965. It is a multi-purpose language suitable for both scientific and business
applications. It is more powerful than FORTRAN. PL/I is designed to include
the features of both FORTRAN (as a scientific language) and COBOL (type file
processing techniques as a business data processing language). This has made the
language flexible and sophisticated. PL/I became an ANSI standard language in 1976.
C
C, a language Bell Laboratories designed in the 1970s, is widely used in developing
systems programs, such as language translators. It is a general-purpose high-level
language. This language was designed by a group at Bell Telephone Laboratories,
USA in the early 1970s. It has features similar to PASCAL. It permits manipulation
of internal processor registers and hence a programmer can write low-level machine
instructions. C has the features of assembly language programming. It is a small
and concise language. It makes use of a library of functions that are equivalent to
subroutines. C programs can use modular and structured concepts. A problem may be
54 Unit 3: Generation of Computer
Uttarakhand Open
divided into smaller tasks and a function may be used to solve each task. C program University
may represent a grouping of functions that are linked together to produce the solution
of the problem. The advantage of C is that the programs written in it can be shifted
from one machine architecture to another without much difficulty. This language
is used by system programmers to develop complex programs such as an operating Notes
system and application programs. AT and T (Bell Lab’s parent company) produce
the C compiler and UNIX operating system tools as a single software package. It
has many versions which run on PCs and larger machines.
RPG
Report Program Generator (RPG) was developed in 1964, and it was one of the first
program generators designed for business reports. RPG II, introduced in 1970, was
an advanced version that was widely used as a programming language to develop
business applications for small computers. RPG statements are written on pre-printed
format and that provides the fixed columns for writing each of the statement. Programs
like these were the forerunners of today’s fourth-generation languages which allow
users to process data without having to know how to be a programmer.
LOGO
LOGO was developed to introduce children to computers. It is an abbreviation
for Logic Oriented Graphic Oriented. It was developed by Seymour Papert and
Colleagues at MIT in the late 1960s. It is used in serious scientific work in universities.
It has also been popularized as a first educational language that children can use
to achieve intellectual growth and problem-solving skills. LOGO has graphics
capability and children can easily use it to make drawings. They can draw, colour
and animate images. It runs on PCs. It is also used to compose music, manipulate
text, and manage data, etc.
LISP
LISP and PROLOG are widely used in artificial intelligence. This language was
developed by McCarthy in the early 1960s. LISP is suitable for non-numeric
operations involving logical operations. It is used extensively in artificial intelligence
and pattern recognition. It is also used in designing computer games, proving theorems
etc. LISP is capable of searching, handling and sorting long strings or lists of text.
So it has often been used to implement computerized translators. It is used primarily
on larger computers but LISP compilers are also available for PCs.
PROLOG
PROLOG is primarily used for artificial intelligence. It is a suitable language for
developing programs involving complex logical operations. This language was
developed in France. The Japanese have chosen it as a standard language for their
fifth generation computer projects. It is quite suitable for handling large databases
Self-Instructional Material 55
IT and Management and for producing rules-based expert systems applications. PROLOG stands for
Information System
PROgramming in LOGic. It is based on mathematical logic. PROLOG consists of
a set of facts and rules that describe objects and relations between objects in a given
Notes
domain. The statements that are unconditionally true are called facts, while rules
provide properties and relations which are true depending on given conditions.
3.4 Summary
!! There are totally five computer generations known till date. Each generation
has been discussed in detail along with their time period and characteristics.
The first generation computers were developed during 1943-1958. It used
vacuum tubes as the active electronic components and was therefore very
large.
!! The second generation computers were developed during 1959-1965. The
invention of the transistor by three scientists of Bell Telephone Laboratories
in 1947 greatly changed the development of computers. The third generation
computers were developed during 1966-1973. The development of Integrated
Circuit (IC) signalled the beginning of the third generation computers.
!! The fourth generation computers were developed during 1974-1990.
This generation of computer is presently in use. The development of
microprocessor signalled the beginning of the fourth generation of
computers. The computers having artificial intelligence (AI) and high
processing capacity.
Self-Instructional Material 57
IT and Management !! One man communicates with another in a language, which another man
Information System
can understand. Similarly, man communicates with computer in a language,
which machine can understand. This language which consists of a set of
Notes commands, understandable by computer directly or after translating is
known as Computer Programming Language. In early days of computers,
only those languages were used for programming, which could be directly
executed on computer.
!! Low-level languages are used for development of system software. As
they are not used for applications development, managers or application
programmers do not need to learn these languages.
!! Development of applications using low level languages requires a deep
understanding of the hardware. In order to facilitate the programmers to write
programs without knowing the internal details of computer components,
many languages were developed.
3.5 Glossary
Self-Instructional Material 59
IT and Management Long Answer Questions
Information System
1. Describe in detail various generations of computers.
2. Differentiate between second and third generation of computers
Notes
3. What are Assembly Languages? Are they different from Machine Languages?
Explain.
4. What are the advantages and limitations of Machine Languages? Discuss.
5. What are the advantage and limitations of Assembly Languages? Discuss.
6. Compare Assembly Language with High Level Language.
7. What is an Interpreter? Compare Interpreter and Compiler.
8. Name some of the popular high-level languages, and explain each of them
briefly.
9. What are the Generations of Programming Languages? Elaborate.
10. What are Fourth Generation Languages? Why are they called Non-procedural
and Special Purpose Languages? Discuss.
3.8 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Arithmetic
Notes
Structure
4.0 Introduction
4.1 Unit Objectives
4.2 Data and Information
4.2.1 Data
4.3 Representation of Characters in Computers
4.4 Bits and Bytes
4.5 Text Codes
4.5.1 EBCDIC
4.5.2 ASCII
4.5.3 Unicode
4.6 Number System
4.6.1 Representation of Integers or Decimal Numbers
4.7 Binary System
4.7.1 Hexadecimal Representation
4.8 Binary Arithmetic
4.9 Signed Numbers
4.9.1 Sign-magnitude Representation
4.9.2 2’s Complement Notation
4.10 Binary Multiplication
4.11 Binary Division
4.12 Summary
4.13 Glossary
4.14 Answers to Check Your Progress
4.15 Terminal and Model Questions
4.16 References
4.0 Introduction
Even people who have been using computers for a few years still marvel at what they
can do - how at lightning speed and with amazing accuracy they can sort a mailing
list, balance a ledger, typeset a book, or create lifelike models of objects that have
never existed.
Self-Instructional Material 61
IT and Management Just how a computer does all this may seem magical, but in fact it is a process based
Information System
on simple concepts. All the words, numbers and images you put into and get out of
the computer are manipulated in relatively simple ways by the computers’ processing
Notes components.
In this chapter you will learn what data is, how it differs from information, and what
form it takes inside the computer.
4.2.1 Data
We generally talk about data and information. Are they the same terms? And if not,
what is the difference between them? Well, data is the raw material and information
is what we get after processing the data. To be more precise, data is raw facts and
figures and information is a processed data, that is useful and meaningful. Data is
the input to processing, and information is the output.
How is data converted into information is explained in Fig. 4.1.
Fig. 4.1
Self-Instructional Material 63
IT and Management Data can be explained more explicitly by taking an example. The letters G, O and D
Information System
do not indicate anything individually but when combined together they do give you
a word GOD, which has some meaning. Similarly, a few words can be combined
Notes
together to form a sentence that might convey some meaningful message to you and
thus become information to you. The computer converts the data into information
by processing it in some way.
4.5.1 EBCDIC
Binary Coded Decimal (BCD) system was designed by IBM for one of its early
computers. It was one of the first complete systems to represent symbols with bits.
BCD codes consisted of 6-bit codes, which allowed a maximum of 64 possible
symbols. BCD computers could work only on uppercase letters and a very few other
symbols. That was the reason of their not being in use for a long time.
The need for more symbols led IBM to develop EBCDIC system. EBCDIC is
pronounced as “EB-SI-DIC” and stands for Extended Binary Coded Decimal
Self-Instructional Material 65
IT and Management Interchange Code. EBCDIC is an 8-bit code that defines 256 symbols. EBCDIC is
Information System
still used in IBM mainframes and mid-range systems. By the time small computers
started getting developed the ANSI (American National Standards Institute) had
Notes
started developing the standards for computers.
ANSIs’ defined ASCII character set used to represent the symbols, numbers, characters
etc. ASCII stands for American Standard Code for Information Interchange. Today,
the ASCII character set is the most common.
In this scheme of coding characters 0 to 31 are control characters, 32 to 64 are special
characters, 65 to 90 are uppercase alphabets, 97 to 122 are lowercase alphabets and
123 to 127 represent some common symbols. ASCII being a 7–bit code specifies
characters only up to 127. There are variations that specify different character sets
for codes from 128 to 255. The ISO (International Standards Organization) offers
different sets of characters for different language groups.
4.5.3 Unicode
A new standard for data representation, called Unicode Worldwide Character
Standard, provides 2 bytes (16 bits) to represent each symbol. That means the range
could be anything up to 65, 536 different characters or symbols. That means all the
characters and symbols of the world can have the same standard, thus facilitating the
interchanging of the data and programs written in any language without requiring
any special programs.
1 001 1
20 1 211 2048 2K
21 2 212 4096 4K
Contd.../-
Self-Instructional Material 67
IT and Management
Information System 22 4 213 8192 8K
Examples
1. (110101.11)2 = 1 × 25 + 1 × 24 + 0 × 23 + 1 × 22 + 0 × 21 + 1 × 20 + 1 × 2–1 + 1 × 2–2
= 32 + 16 + 0 + 4 + 0 + 1 + ½ + ¼¼
= 53 + ¾
= 53.7510
Counting in the binary system is similar to that in the decimal system. In decimal we
start from 0, add 1, obtain 1 and continue adding 1 successively till we get 9. That
means in base 10 there are symbols from 0 to 9. Now when we add 1 to 9 we get 10.1
gets carried to the tens position in the decimal system. Similarly we count 100 after
reaching 99 and so on. Counting in binary proceeds exactly in the similar fashion:
0, 1, 10, 11, 100, 101, 110, 111, 1000, 1001, …
The table given below shows the binary counting sequence. Observe that we require
3 bits to represent decimal numbers 0, and 7 bits to represent 8 and 9. Thus we can
say on an average there are 3.2 bits (binary digits) required to represent a decimal
digit [(8 × 3 + 2 × 4 )/10 = 3.2]. That means, if we convert a large decimal number
to obtain its binary equivalent, it would be approximately 3.2 times the number of
digits of the corresponding decimal number.
Thus the binary equivalent of a ten digit decimal number would be 32 bits long. Don’t
you think that writing such long strings of 0s and 1s are a very cumbersome and
error prone task? This problem is solved to a great extent by using the hexadecimal
number system, which uses 16 as a base. There are sixteen symbols used by this
system viz fifteen symbols. Where is the 16th symbols? Here the symbols A, B, …,
F are used to represent the numbers 10, 11 12, 13, 14 and 15 respectively. We need
only 4 bits to represent a hexadecimal digit. The table below gives the hexadecimal
system’s symbols, their decimal and binary equivalents.
0000 0 0 1000 8 8
0001 1 1 1001 9 9
0010 2 2 1010 A 10
0011 3 3 1011 B 11
0100 4 4 1100 C 12
0101 5 5 1101 D 13
0110 6 6 1110 E 14
0111 7 7 1111 F 15
Self-Instructional Material 69
IT and Management A binary number can be quickly converted to its hexadecimal equivalent by grouping
Information System
together 4 bits of the binary number, starting with the least significant digit and
replacing each four bits group with its hexadecimal equivalent given in the table.
Notes Examples
1. Binary Number : 1101 1110 0010 1001
Hexadecimal Number : D E 2 9
The binary number (1101111000101001)2 is converted into its hexadecimal
equivalent by first making groups of four bits, starting from the least significant digit
and proceeding towards the most significant digit.
2. Binary Number : 0001 1101 1100 1001 0100
Hexadecimal Number : 1 D C 9 4
The binary number (00111011100.10010100)2 is converted into its hexadecimal
equivalent by the same method as explained above but the groups are formed from
left to right for the fractional part unlike in the integer part. One more thing to be
noted is that, to complete a group of four bits, 0’s are introduced at the left most
position in the left most group in the integer part, and in the right most position in
the right most group in the fractional part.
100000 32
1011 11
101011 43
The binary equivalent of 43 in the decimal system is 101011.
3. Add 101110 and 111101
Binary Decimal
101110 46
111101 61
1101011 107
Binary subtraction
Rules for carrying out binary subtractions are:
1. 0 – 0 = 0
2. 0– 1 = 1 with one borrow
3. 1 – 0 = 1
4. 1 – 1 = 0
Here are a few examples.
1. Subtracting 1011102 from 1111012
Binary Decimal
111101 61
101110 46
001111 15
Thus 001111 in binary system is equivalent to 15 in the decimal system.
2. Subtracting 1011 from 100000
Binary Decimal
100000 32
1011 11
010101 21
The binary equivalent of 21 in the decimal system is 10101.
Self-Instructional Material 71
IT and Management 3. Subtracting 11 from 1001
Information System
Binary Decimal
1001 9
Notes
11 3
0110 6
Example
What is the 8-bit 2’s complement representation of –7 and what is the unsigned result
of adding the representations of +7 and –7?
Solution
8-bit sign-magnitude representation of +7 = 00000111
Hence,
8-bit negation of each bit of +7 = 11111000 ( known as 1’s complement)
Adding 1 + 1
11111001
Self-Instructional Material 73
IT and Management Thus, the 2’s complement representation of +7 is 11111001.
Information System
Now adding +7 and –7
00000111 + 11111001 = 100000000 = 0 with 1 overflow bit.
Notes
Example
Add +5 and –4 with the help of 2’s complement.
Solution
4-bit binary notation of +5 = 0101
4-bit binary notation of -4 = 1100
2’s complement notation of +5 = 1011
2’s complement notation of -4 = 0100
Addition 1111
1111 is 2’s complement notation of –1.
Example
Compute –5 –4 in 4 bit 2’s-complement notation.
Solution
–5 –4 = –5 + (–4).
2’s complement notation of –5 = 0011
2’s complement notation of –4 = 0100
Addition 0111
0111 is 2’s complement notation of –9.
111101xxx 854
1101010110
Multiply 110 by 010
Binary
110
x 010
000
110x
000xx
01100
Example
Divide 100100 by 110
Solution
110 100100 0110
110
0110
110
X
This is the same as the division of the decimal number 36 by 6. Here, the quotient
is 0110 and the remainder is 000.
Example
Divide 110111 by 1011
Self-Instructional Material 75
IT and Management Solution
Information System
1011 110111 101
1011
Notes
1011
1011
X
The quotient is 101 and the remainder is 000.
4.12 Summary
Data is the raw material and information is what we get after processing the data.
To be more precise, data is raw facts and figures and information are processed data
that is useful and meaningful. Data is the input to processing, and information is the
output. Basically, there are four types of number system. They are Binary number
system, Decimal number system, Octal number system and Hexadecimal number
system.
4.13 Glossary
!! Data : It is the raw material and information is what we get after processing
the data.
!! ASCII Codes : ASCII codes represent text in computers, communications
equipment, and other devices that use text.
1. Seven
2. r Notes
3. Internet technologies
4. 11001.001
5. binary
6. UTF-8
Self-Instructional Material 77
IT and Management (iii) 1000101 – 101100
Information System
(iv) 100010110 – 1111010
(v) 101001 × 110
Notes
(vi) 10111 × 11
(vii) 101010 ÷ 110
(viii) 10000111 ÷ 101
4.16 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
5. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
6. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Block - II
Block Title : Hardware and Software
Programme Coordinator
Dr. Manjari Agarwal
Assistant Professor
Department of Management Studies
Uttarakhand Open University
Haldwani
Editor(s)
Er. Sumit Prasad Er. Subodh Prasad
Assistant Professor Assistant Professor
Department of Management Studies Department of Information Technology
Uttarakhand Open University College of Technology
Haldwani G.B. Pant University of Agriculture & Technology
Pantnagar
ISBN : 978-93-85740-12-1
Copyright : Uttarakhand Open University
Edition : 2016 (Restricted Circulation)
Published by : Uttarakhand Open University, Haldwani, Nainital - 263 139
Printed at : Laxmi Publications (P) Ltd., New Delhi
DUO-8152-69.62-INFO TECH MGMT INFO B-II
CONTENTS
5. Types of Computers 79
6. Input/Output Units 96
7. Hardware Troubleshooting 117
8. Operating System Concepts 135
9. Software—Languages and Packages 153
10. Data Files 164
Uttarakhand Open
Structure Notes
5.0 Introduction
5.1 Unit Objectives
5.2 Types of Computers
5.2.1 Desktop Computers
5.2.2 Analog, Digital and Hybrid Computer
5.2.3 Mainframe Computers
5.2.4 Mainframe RAS Features
5.2.5 Supercomputers
5.2.6 Evolution of Supercomputers
5.2.7 Applications of Supercomputers
5.2.8 Supercomputers of the Future
5.2.9 Mini Computer
5.2.10 Microcomputer
5.2.11 Laptop Computer
5.2.12 Tablet PC
5.3 Smartphone
5.3.1 Hand held Computers or Personal Digital Assistant
5.4 Processors used in PCs
5.4.1 Intel Pentium Dual Core Processors
5.5 System Block
5.6 Motherboard
5.7 Summary
5.8 Glossary
5.9 Answers to Check Your Progress
5.10 Terminal and Model Questions
5.11 References
5.0 Introduction
The world of business has changed dramatically since the introduction of the first
modern multipurpose computer over 50 years ago. The ENIAC (Electronic Numerical
Integrator and Computer), designed by Drs. Mauchly and Eckert, two American
engineers, was set up at the University of Pennsylvania in 1946. This 30-ton machine
occupied a thirty-by-thirty room, contained 18,000 vacuum tubes linked by 500
miles of wiring, and could perform 100,000 operations per second. It consumed
Self-Instructional Material 79
IT and Management so much electricity that it dimmed the lights in the section of Philadelphia where
Information System
it was housed. Thanks to the development of the integrated chip, the computer has
evolved into a far smaller, more powerful, and less expensive machine. Today’s
Notes
microcomputer is 3,000 times lighter than the ENIAC, performs 4000 times faster,
and costs several million dollars less. Other innovations have made the computer
easy enough for a child to use and versatile enough for applications ranging from
astrophysics to arcade-style games. As a consequence of their decreasing size and
cost, computers can be found today in virtually every corner of American society,
from research facilities and corporate headquarters, to schools and homes.
You need only to look around a business office to see evidence of the computer
revolution. In a large office you might find a variety of computers, ranging in size
from a mainframe computer housed in a room of its own, to a palm-sized “personal
assistant” tucked into an executive’s briefcase. A growing number of professions
rely on computers, and accounting is one of them.
5.2.1 Desktop Computers
Desktop computers are designed for use at a desk or table. They are typically larger
and more powerful than other types of personal computers. Desktop computers are
made up of separate components. The main component, called the system unit, is
usually a rectangular case that sits on or underneath a desk. Other components, such
as monitor, mouse, and keyboard, connect to the system unit.
Self-Instructional Material 81
IT and Management
Information System
Notes
Fig. 5.1
Analog Computers
Analog computers are used to process analog data. Analog data is of continuous
nature and which is not discrete or separate. Such type of data includes temperature,
pressure, speed weight, voltage, depth etc. These quantities are continuous and having
an infinite variety of values.
It measures continuous changes in some physical quantity e.g. The Speedometer of
a car measures speed, the change of temperature is measured by a Thermometer,
the weight is measured by Weights machine. These computers are ideal in situations
where data can be accepted directly from measuring instrument without having to
convert it into numbers or codes.
Analog computers are the first computers being developed and provided the basis
for the development of the modern digital computers. Analog computers are widely
used for certain specialized engineering and scientific applications, for calculation
and measurement of analog quantities. They are frequently used to control process
such as those found in oil refinery where flow and temperature measurements are
important. They are used for example in paper making and in chemical industry.
Analog computers do not require any storage capability because they measure and
compare quantities in a single operation. Output from an analog computer is generally
in the form of readings on a series of dial (Speedometer of a car) or a graph on strip
chart.
Digital Computers
A Digital Computer, as its name implies, works with digits to represent numerals,
letters or other special symbols. Digital Computers operate on inputs which are ON-
Hybrid Computers
A hybrid is a combination of digital and analog computers. It combines the best
features of both types of computers, i-e. It has the speed of analog computer and
the memory and accuracy of digital computer. Hybrid computers are used mainly in
specialized applications where both kinds of data need to be processed. Therefore,
they help the user, to process both continuous and discrete data. For example a petrol
pump contains a processor that converts fuel flow measurements into quantity and
price values. In hospital Intensive Care Unit (ICU), an analog device is used which
measures patient’s blood pressure and temperature etc, which are then converted and
displayed in the form of digits. Hybrid computers for example are used for scientific
calculations, in defense and radar systems.
5.2.3 Mainframe Computers
A mainframe computer is a very large computer capable of handling and processing
very large amounts of data quickly. They are used by large institutions, such as
government agencies and large corporations.
The term ‘mainframe computer’ is used to distinguish very large computers used
by institutions to serve multiple users from personal computers used by individuals.
Mainframe computers are capable of handling and processing very large amounts
of data very quickly - much more data than a typical individual needs to work with
on his or her own computer.
Mainframe computers were developed in the 1950s, have continued to evolve and are
still in use today. Mainframe computers are designed to handle very high volumes of
input and output and are optimized for computational speed. The speed of mainframes
is expressed in million instructions per second (MIPS).
Before the development of powerful personal computers, many agencies relied
heavily on mainframes for most of their computing needs. For example, the
Self-Instructional Material 83
IT and Management photograph below shows one of the computer rooms at NASA back in 1962.
Information System
NASA computer room with several mainframe computers (1962) mainframenasa
1962
Notes One of the characteristics of early mainframes is that they did not have the typical
interactive interface we are used to with personal computers. Early mainframes
accepted all kinds of different inputs, and later versions typically had a dedicated
terminal, similar to modern display monitor with a keyboard. Mainframes acquired
their name because of their size, typically as large as a 6-foot-tall closet. They also
required specialized heating, ventilation and cooling as well as a dedicated power
supply. In practice, this meant a separate room had to be dedicated to house the
mainframe computer systems.
Mainframe systems can be used by a large number of users. This means that, in a large
organization, individual employees can sit at their desk using a personal computer,
but they can send requests to the mainframe computer for processing large amounts
of data. A typical mainframe system can support hundreds of users at the same time.
As for the actual hardware components inside a mainframe computer, they are
similar in type to what personal computers use: motherboard, central processing
unit and memory. The individual components are just a lot more powerful and a lot
more expensive.
Notes
5.2.5 Supercomputers
Supercomputers, the world’s largest and fastest computers, are primarily used for
complex scientific calculations. The parts of a supercomputer are comparable to
those of a desktop computer: they both contain hard drives, memory, and processors
(circuits that process instructions within a computer program).
Self-Instructional Material 85
IT and Management Although both desktop computers and supercomputers are equipped with similar
Information System
processors, their speed and memory sizes are significantly different. For instance, a
desktop computer built in the year 2000 normally has a hard disk data capacity of 2
Notes
to 20 gigabytes and one processor with tens of megabytes of random access memory
(RAM)—just enough to perform tasks such as word processing, web browsing, and
video gaming. Meanwhile, a supercomputer of the same time period has thousands of
processors, hundreds of gigabytes of RAM, and hard drives that allow for hundreds,
and sometimes thousands, of gigabytes of storage space.
The supercomputer’s large number of processors, enormous disk storage, and
substantial memory greatly increase the power and speed of the machine. Although
desktop computers can perform millions of floating-point operations per second
(megaflops), supercomputers can perform at speeds of billions of operations per
second (gigaflops) and trillions of operations per second (teraflops).
5.2.6 Evolution of Supercomputers
Many current desktop computers are actually faster than the first supercomputer,
the Cray-1, which was developed by Cray Research in the mid-1970s. The Cray-1
was capable of computing at 167 megaflops by using a form of supercomputing
called vector processing , which consists of rapid execution of instructions in a
pipelined fashion. Contemporary vector processing supercomputers are much faster
than the Cray-1, but an ultimately faster method of supercomputing was introduced
in the mid-1980s: parallel processing . Applications that use parallel processing are
able to solve computational problems by simultaneously using multiple processors.
Using the following scenario as a comparative example, it is easy to see why parallel
processing is becoming the preferred supercomputing method. If you were preparing
ice cream sundaes for yourself and nine friends, you would need ten bowls, ten scoops
of ice cream, ten drizzles of chocolate syrup, and ten cherries. Working alone, you
would take ten bowls from the cupboard and line them up on the counter. Then, you
would place one scoop of ice cream in each bowl, drizzle syrup on each scoop, and
place a cherry on top of each dessert. This method of preparing sundaes would be
comparable to vector processing. To get the job done more quickly, you could have
some friends help you in a parallel processing method. If two people prepared the
sundaes, the process would be twice as fast; with five it would be five times as fast;
and so on.
Conversely, assume that five people will not fit in your small kitchen. Therefore,
it would be easier to use vector processing and prepare all ten sundaes yourself.
This same analogy holds true with supercomputing. Some researchers prefer vector
computing because their calculations cannot be readily distributed among the many
processors on parallel supercomputers. But, if a researcher needs a supercomputer
that calculates trillions of operations per second, parallel processors are preferred—
even though programming for the parallel supercomputer is usually more complex.
Self-Instructional Material 87
IT and Management In addition to new applications, the future of supercomputing includes the assembly
Information System
of the next generation of computational research infrastructure and the introduction
of new supercomputing architectures. Parallel supercomputers have many processors,
Notes
distributed and shared memory, and many communications parts; we have yet to
explore all of the ways in which they can be assembled. Supercomputing applications
and capabilities will continue to develop as institutions around the world share their
discoveries and researchers become more proficient at parallel processing.
5.2.9 Mini Computer
A minicomputer is a type of computer that possesses most of the features and
capabilities of a large computer but is smaller in physical size.
A minicomputer fills the space between mainframe and microcomputer. It is smaller
than the former but larger than the latter. Minicomputers are mainly used as small or
midrange servers operating business and scientific applications. However, the use of
the term ‘minicomputer’ has diminished and has merged with servers.
A minicomputer may also be called a mid-range computer. A minicomputer is a
type of computer that possesses most of the features and capabilities of a large
computer but is smaller in physical size. A minicomputer fills the space between
mainframe and microcomputer. It is smaller than the former but larger than the latter.
Minicomputers are mainly used as small or midrange servers operating business and
scientific applications. However, the use of the term ‘minicomputer’ has diminished
and has merged with servers.
A minicomputer may also be called a mid-range computer.
5.2.10 Microcomputer
A microcomputer is a computer with a central processing unit (CPU) as a
microprocessor. Designed for individual use, a microcomputer is smaller than a
mainframe or a minicomputer.
The term ‘microcomputer’ is not as commonly used as it was during the 1970s-1980s.
We now refer to microcomputers as, simply, computers, or personal computers (PC).
A microcomputer’s CPU includes random access memory (RAM), read-only memory
(ROM), input/output (I/O) ports, interconnecting wires and a motherboard.
In 1970, Hewlett-Packard (HP) manufactured and released a microcomputer as a
calculator with varying levels of programmability, although the Datapoint 2200 by
Computer Terminal Corporation (CTC) is credited as the first microcomputer. Intel’s
x86 processor family can also be traced back to CTC’s release.
5.2.12 Tablet PC
A tablet is a wireless, portable personal computer with a touch screen interface. The
tablet form factor is typically smaller than a notebook computer but larger than a
smartphone.
The idea of tablet computing is generally credited to Alan Kay of Xerox, who sketched
out the idea in 1971. The first widely-sold tablet computer was Apple Computer’s
Newton, which was not a commercial success. Technological advances in battery
life, display resolution, handwriting recognition software, memory, and wireless
Internet access have since made tablets a viable computing option.
Today, the most common type of tablet is the slate style, like Apple’s iPad, Microsoft’s
Surface or Amazon’s Kindle Fire. External keyboards are available for most slate-
style tablets and some keyboards also function as docking stations for the devices.
5.3 Smartphone
A smartphone is a mobile phone with highly advanced features. A typical smartphone
has a high-resolution touch screen display, WiFi connectivity, Web browsing
capabilities, and the ability to accept sophisticated applications. The majority of these
devices run on any of these popular mobile operating systems: Android, Symbian,
iOS, BlackBerry OS and Windows Mobile.
A smartphone is expected to have a more powerful CPU, more storage space, more
RAM, greater connectivity options and larger screen than a regular cell phone.
Self-Instructional Material 89
IT and Management High-end smartphones now run on processors with high processing speeds coupled
Information System
with low power consumptions. That means, they’ll allow you to play 3D games,
browse the Web, update your Facebook account, call, and text much longer than
Notes
you used to.
In addition to the features mentioned earlier, smartphones are also equipped with
innovative sensors like accelerometers or even gyroscopes. Accelerometers are
responsible for displaying screens in portrait and landscape mode, while gyroscopes
make it possible for games to support motion-based navigation.
The earliest touch screen smartphones used resistive touchscreen displays, which
required the use of slender pointing objects known as styli (or stylus in singular
form). Most of the later models however, like the iPhone and most Android phones,
employ capacitive displays, which feature multi-touch finger gestures.
Intel i7 Processors
Intel i7 processors dual or quad core for the most demanding applications with cache
and faster clock speeds. Quad-core processors feature 8-way threading, four cores
will run faster, and more L3 cache, but will consume more power. High-end use,
video and gaming with dedicated video card.
AMD A4: These A4 processors have 2 processor cores and include a Radeon graphics
chip aimed for use with lower end systems.
AMD A6: A6 processors dual core, includes turbo function similar to Intels allows
for the processor to adapt to the task needed. Integrated graphics, on par with Core
i3 range.
AMD A8: 4 processors core is comparable to the i3 and low i5, its graphic part is
faster than Intels version, can handle light gaming with ease.
AMD A10: 4 processors these quad cores are comparable with the Intel i5, and some
i7s should benefit from better battery life.
ASeries processors use the FM2 socket so they will only fit in a Motherboard with
FM2.
2013 AMD Piledrivers are the latest version Piledriver then FX-4, FX-6, FX-8
for either 4-8 cores, they use the AM3+ socket so can only be used in Motherboards
with AM3+
Self-Instructional Material 91
IT and Management
Information System
Notes
Fig. 5.3
Each series of processor usually has a couple of generations per series where
enhancements and tweaks are made. The main thing to check and consider is that the
type of processor is compatible with your motherboard and fits your need and budget.
Expansion Slots
Motherboard
Fig. 5.4: Major Components inside a Computer Case
In this particular example, the motherboard is placed vertically, which is quite
common. One side of the motherboard is accessible from the back of the computer
case - this includes the various connectors for input and output devices as well as
expansion slots for additional peripherals. The motherboard also contains the central
processing unit (CPU), although it can be difficult to see. A large fan is often placed
on top of the CPU to avoid overheating. The motherboard also contains the main
memory of the computer.
5.6 Motherboard
The motherboard serves to connect all of the parts of a computer together. The CPU,
memory, hard drives, optical drives, video card, sound card and other ports and
expansion cards—all connect to the motherboard directly or via cables.
The motherboard is the piece of computer hardware that can be thought of as the
“back bone” of the PC.
The Motherboard is also known as mainboard, mobo (abbreviation), MB
(abbreviation), system board and logic board.
Desktop motherboards, cases and power supplies all come in different sizes called
form factors. All three must be compatible to work properly together.
Motherboards vary greatly in respect to the types of components they support. For
example, each motherboard supports a single type of CPU and a short list of memory
types. Additionally, some video cards, hard drives and other peripherals may not
Self-Instructional Material 93
IT and Management be compatible. The motherboard manufacturer should provide a clear guidance on
Information System
component compatibilities.
In laptops and tablets, and increasingly even in desktops, the motherboard often
Notes incorporates the functions of the video card and sound card. This helps keep these
types of computers small in size.
Motherboard Description
In a desktop, the motherboard is mounted inside the case, opposite the most easily
accessible side. It is securely attached via small screws through pre-drilled holes.
The front of the motherboard contains ports that all of the internal components connect
to. A single socket/slot houses the CPU. Multiple slots allow for one or more memory
modules to be attached. Other ports reside on the motherboard which allow the hard
drive and optical drive (and floppy drive if present) to connect via data cables.
Small wires from the front of the computer case connect to the motherboard to
allow the power, reset and LED lights to function. Power from the power supply is
delivered to the motherboard by use of a specially designed port.
Also on the front of the motherboard are a number of peripheral card slots. These slots
are where most video cards, sound cards and other expansion cards are connected
to the motherboard.
5.7 Summary
!! Computers can be broadly classified by their speed and computing power.
There are various types of computers such as desktop, laptop, mainframe,
super computer, minicomputer, microcomputer, tablet pc, PDA, etc.
!! A system unit is the part of a computer that houses the primary devices that
perform operations and produce results for complex calculations. It includes
the motherboard, CPU, RAM and other components, as well as the case in
which these devices are housed.
!! The motherboard serves to connect all of the parts of a computer together.
The CPU, memory, hard drives, optical drives, video card, sound card and
other ports and expansion cards all connect to the motherboard directly or
via cables.
5.8 Glossary
!! Desktop Computer: A personal or micro-mini computer sufficient to fit on
a desk.
!! Laptop Computer: A portable computer complete with an integrated screen
and keyboard. It is generally smaller in size than a desktop computer and
larger than a notebook computer.
!! Palmtop Computer/Digital Diary/Notebook /PDAs: A hand-sized computer.
Palmtops have no keyboard but the screen serves both as an input and output
device.
!! Super Computer: The fastest and most powerful type of computer.
!! Mainframe Computer: A very large and expensive computer capable of
supporting hundreds, or even thousands, of users simultaneously.
!! Mini Computer: A midsized computer.
!! Motherboard: A motherboard is the physical arrangement in a computer
that contains the computer’s basic circuitry and components.
Self-Instructional Material 95
IT and Management
Information System 5.9 Answers to Check Your Progress
1. Desktop Computer
Notes
2. integrated
3. Palmtops
4. Super Computer
5. Mainframe Computer
6. midsized
7. motherboard
5.11 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Structure Notes
6.0 Introduction
6.1 Unit Objectives
6.2 Input Units
6.2.1 Keyed Input
6.2.2 Pointing Devices
6.2.3 Mouse and Track Ball
6.2.4 Touchpad
6.2.5 Joysticks
6.2.6 Touch–sensitive Screens
6.2.7 Pen–based Systems
6.3 Data Scanning Units
6.3.1 Optical Recognition Systems (ORS)
6.3.2 Bar Code Readers
6.3.3 Optical Mark Readers
6.3.4 Optical Scanners
6.3.5 Voice Recognition Devices
6.4 Output Units
6.4.1 Monitors
6.4.2 Audio Output
6.4.3 Printers
6.4.4 Plotters
6.5 Summary
6.6 Glossary
6.7 Answers to Check Your Progress
6.8 Terminal and Model Questions
6.9 References
6.0 Introduction
A computer system consists of mainly four basic units—input unit, storage unit,
central processing unit and output unit. These devices are used to enter information
and instructions into a computer for storage or processing and to deliver the processed
Self-Instructional Material 97
IT and Management data to a user. Input/Output devices are required for users to communicate with the
Information System
computer. In simple terms, input devices bring information INTO the computer and
output devices bring information OUT of a computer system. These input/output
Notes
devices are also known as peripherals since they surround the CPU and memory of
a computer system.
6.2.1 Keyed Input
Most input data is entered into the computer by using a keyboard. This input method
is similar to typing on a typewriter.
Most typewriters and computer keyboards are QWERTY keyboards. The alphabetic
keys are arranged in a manner so that the upper-left row of letters begins with the
six letters Q W E R T Y. Designers of other keyboards claim that their boards are
easier to learn than the QWERTY keyboard. The Dvorak keyboard is one example.
It is not widely accepted, however, because most people have already learned the
QWERTY keyboard.
In different parts of the world, we find different keyboards. The coding used on the
QWERTY and Dvorak keyboards works with an 8-bit code, which accommodates
256 different characters. Asian languages have many more characters. The Kanji
alphabet, for example, has 50,000 characters. Japanese keyboards have to work with
a 16-bit code to accommodate all the characters.
Computer keyboards also include keys that are designed to perform specific tasks
instead of entering characters only. These special keys include function keys,
directional keys and special-purpose keys such as Alt, Ctrl, Enter, Ins, and Esc. These
keys enable the user to perform complex tasks easily while using the application.
6.2.2 Pointing Devices
Wherever possible many people use pointing devices instead of keyboards . An input
device is used to move the pointer (cursor) on screen. Pointing devices minimize the
Self-Instructional Material 99
IT and Management amount of typing (consequently, the number of errors). Movements of the pointing
Information System
device are echoed on the screen by movements of the mouse pointer and by other
visual changes. The many pointing devices available include the mouse, the trackball,
Notes the light pen, the digitizing tablet, the touch screen and the pen-based systems. Some
of them are shown below.
Fig. 6.1
Major Pointing Devices: Clockwise from the upper left are the mouse, the trackball,
the pointing stick (red tip) and the touchpad.
Notes
Fig. 6.2
Operating a mechanical mouse. 1. Pulling the mouse turns the ball. 2. The X and Y
rollers grip the ball and transfer the movement. 3. The optical encoding disks include
light holes. 4. The infrared LEDs shine through the disks. 5. The sensors then gather
the light pulses to convert to X and Y velocities.
Single Clicking
It is the most common method of distinguishing mouse-based input. On a single-
button mouse this involves using the mouse’s one button. On the multiple-button
mouse, it involves any one of the buttons, and is usually characterized by which
button is pushed (e.g., left-clicking, right-clicking).
Double Clicking
A double-click occurs when the user presses the button twice in quick succession.
This triggers an action separate from that of a single-click. For example, in the
Macintosh Finder, the user single-clicks to select a file, and double-clicks in order to
open that file. Usability studies have found that the double-click can be confusing and
hard to use—for example, users with poor motor skills may not perform the second
click fast enough, with the result that the action is interpreted as two single-clicks
rather than a double-click. Ironically, the double-click was introduced because the
previous solution—separate mouse buttons for separate actions—was also found to
be confusing in user studies. Most multiple-button mice allow setting one button to
emit a double click on a single press.
Triple-click
A triple-click occurs when the user presses the button three times in quick succession.
This also triggers an action separate from that of a single click. It is most commonly
seen in word processors to select a whole paragraph and in web browsers to select
a whole line of text.
Click-and-Drag
A user “drags” a mouse by depressing and continuing to hold down a mouse button
while moving the mouse across the surface.
A track ball is like an upside-down mouse. Used in the same way as the mouse,
the trackball is frequently attached to or built into the keyboard. It is a pointing device
consisting of a ball housed in a socket which contains sensors to detect the rotation
of the ball on two axes—like an upside-down mouse, but with the ball sticking out
more. The user rolls the ball with his thumb, finger, or the palm of his hand to move
the cursor. Trackerballs are common on CAD workstations for ease of use, and
also on modern portable computers, where there may be no desk space on which to
use a mouse. Some trackballs clip onto the side of the keyboard and have integral
buttons, which have the same function as mouse buttons. The main advantage of a
Notes
A mouse is not a practical option for people using a laptop computer in a small space.
Early alternatives, such as trackballs clipped to the side of the keyboard, have not
proved satisfactory either. The Apple PowerBook uses a central trackball. The IBM
ThinkPad replaces the trackball with a red plastic button, called trackpoint, located
in the middle of the keyboard. You move the button with your thumbs. The newest
Apple PowerBooks have a small square of plastic on the front of the keyboard which
moves easily to control the pointer.
6.2.4 Touchpad
The Touch pad is a stationary pointing device that many people find less tiring to
use than a mouse or a track ball. The movement of a finger across a small touch surface
is translated into cursor movement on the computer screen. The touch sensitivity
surface may be just 1.5 – 2 inch square, so the finger does not have to move much.
Its size makes it most suitable for notebooks and laptops.
6.2.5 Joysticks
A joystick is a pointing device often used for playing games. It has a gearshift-like
lever that is used to move the pointer on the screen. On most joysticks, a button on
the top is used to select an option. In industry and manufacturing, joysticks are used
to control robots. Flight simulators and other training simulators also use them. Most
joysticks are two-dimensional, having two axes of movement, just like a mouse, but
three-dimensional joysticks also exist.
Joysticks are often used to control games, and usually have one or more push buttons
whose state can also be read by the computer. Most I/O interface cards for PCs have
a joystick (game control) port. Modern joysticks generally use a USB interface for
connecting to the PC.
An analog one is one that has continuous states, i.e., it returns an angle measure of
the movement in any direction in the plane or the space. On the other hand, a digital
joystick gives only on/off signals for four different directions, and for mechanically
Fig. 6.4
6.2.6 Touch–sensitive Screens
Perhaps the easiest way to enter data is with the touch of a finger. Touch screens
enable the user to select an option by pressing a specific part of the screen. Touch
screens are commonly used in grocery stores, fast-food restaurants and information
kiosks.
6.2.7 Pen-based Systems
Pen-based Systems are especially useful for people who do not like to type or for
those who are frequently on the move. Personal digital assistants (PDA),
such as the Apple Newton, are designed for people on the go. The Newton can link
entries with data on stored files. For example, if you write, “Call Annie and Wish
Happy Birthday”, the Newton adds a line to your “To do” list and links Annie’s
phone number from your telephone directory. If your friend Ken moves, you can
simply change his address and phone number. The Newton serves equally well as a
calendar, a calculator and a notepad.
Pen-based systems are not perfect—they do not always register handwriting correctly.
Pen-based computing is just a beginning to gain widespread acceptance. For example,
many stores no longer ask you sign a carbon form to charge a purchase; instead you
sign on a tablet that automatically records your signature.
Many engineers and architects use a different type of pen called light pen. The
light pen uses a photoelectric (light sensitive) cell to indicate the screen position
to the computer. You operate the pen by touching it to the screen. Light pens are
frequently used for Computer-Aided Design (CAD) applications.
By Light Source
!! LED scanners, also referred to as CCD scanners—even if the CCD is in
fact the photo conductor.
!! Laser scanners, much more expensive than LED scanners, but capable of
scanning barcodes at a distance of up to 25cm (~10″).
By Housing
!! Hand-held scanner with a handle and, typically, a trigger button for
switching on the light source.
!! Pen scanners (or wand scanners), a pen-shaped scanner that is swiped
across a barcode.
!! Stationary scanners, wall or table-mounted, under or beside which the
barcode is passed. These are commonly found at the checkout counters of
supermarkets and other retailers.
6.3.4 Optical Scanners
Optical scanners can scan typed documents, pictures, graphics or even
handwriting into a computer. Photographs scanned into a microcomputer appear
clearly on the screen and can be displayed whenever desired. The copy that the
computer stores never yellows with age. Early scanners could recognize only text
printed in a special optical character recognition (OCR) typeface. A
scanner converts the image that it sees into numeric digits before storing it in the
computer. This conversion process is known as digitizing.
6.4.1 Monitors
When you think about viewing computer output, you probably visualize a monitor.
Monitor output is a soft copy; when you have finished viewing it, you cannot move
it. Monitor displays are the most common form of soft copy.
Sometimes while watching television, you may notice that the picture looks a little
snowy. This condition occurs because the images are not solid but rather created by
configurations of dots. These dots, or picture elements, combine to form the image
you see. The more picture elements, also known as pixels, the better is the resolution
of the image. The better the resolution, the clearer is the picture. Computer monitors
are similar to television screens.
The large monitors that you see connected to desktop computers are Cathode-Ray
Tube (CRT). Monitors that are used on laptops and notebook computers are known
as flat-panel displays. Flat-panel displays weigh less and consume less electricity
than CRTs. Common types of flat-panel displays include Liquid Crystal Displays
(LCDs), Electro Luminescent (EL) displays and Gas Plasma (GP) displays. Flat-
panel display monitors are still more expensive than CRTs, but eventually their prices
are expected to decrease. (PixelVision recently released a 16-inch flat-panel display
that includes a two million-colour palette and sells for $10,000.) Can you imagine
monitor hanging on the wall like a painting? It may be common in a few years.
Most new monitors are SVGA (Super Video Graphics Adapters), with a pixel
configuration of 800 by 600 at low-resolution mode and 1024 by 768 at high-
resolution mode. The first number designates the horizontal pixel count, and the
second is the vertical pixel count. The higher resolution, with more pixels, provides
a clearer, more detailed image. Each pixel displays a single colour at a time. Each
colour is represented by a numeric code. For example, bright red could be 12. If the
monitor displays only 16 colours, the numeric code can be represented with only
four bits. To display 256 colours (each with its own code) requires eight bits.
One monitor may look “sharper” than another, even though they may have
the same pixel configuration. This is due to the dot pitch, which is the distance between
pixels. A .28 dot pitch gives a crisper image than a .30 dot pitch. The .28 dot pitch is
fairly standard. You should consider dot pitch while purchasing a monitor. The dot
pitch is built in by the manufacturer and cannot be changed.
With users increasingly viewing video clips, animated objects and complex graphics,
monitors have taken on a new importance. Users now must decide how large a
Impact Printers
Impact printers can produce a page, a line, or a character at a time. Large computers
use line printers. The main drawback of line printers is that they can produce only
text and no graphics.
Many small computers use character printers. Although only one character can be
produced at a time, many types of character printers can produce graphics as well
as text. The most common character printers create images by using a dot pattern.
These printers are known as dot matrix printers. If you use a magnifying glass to
look at a report created with a dot matrix printer, you can see the small dots
forming each character.
LINE MATRIX is a type of line printer that uses an oscillating row of print hammers.
The hammers form characters and graphics by impacting a ribbon and transferring
dots of ink onto the paper. An impact printer is the one that prints a line at a time.
Printronix pioneered this technology in 1974.
BAND (LINE CHARACTER) is a type of line printer that uses a fixed set of
characters attached to a continuously revolving metal band. A set of hammers (one
for each column) hits the paper, pushing it into the ribbon and against the character
image on the band.
Non-impact Printers
Non-impact printers are increasing in popularity largely because of improvement in
print quality coupled with decreasing cost. Non-impact printers can produce both
text and graphics. Because nothing actually strikes the paper, non-impact printers
are fairly quiet. Some of the most popular non-impact printers are laser printers and
inkjet printers.
Fig. 6.5
The Laser Mechanism: The laser printer uses electrostatic charges to (1) create an
image on the drum, (2) adhere the toner to the image, (3) transfer the toned image
to the paper, and (4) fuse the toner to the paper. The laser creates the image by
“painting” a negative of the page to be printed on the charged drum. Where light
falls, the charge is dissipated, leaving a positive image to be printed.
Inkjet Printers
Inkjet printers are also popular among microcomputer users. Although the resolution
is lower on inkjet printers than on laser printers, it is higher than that of dot
matrix printers. Inkjet printers are significantly less expensive than laser printers.
Electronically charged ink is sprayed through a jet nozzle and passed through an
electronic field, which deflects the ink to form a dot matrix character. Colour inkjet
printers, which use multiple nozzles, are available at very reasonable prices. Canon
6.5 Summary
!! These devices are used to enter information and instructions into a computer
for storage or processing and to deliver the processed data to a user. Input/
output devices are required for users to communicate with the computer. In
simple terms, input devices bring information INTO the computer and output
devices bring information OUT of a computer system. These input/output
devices are also known as peripherals since they surround the CPU and
memory of a computer system. An input device is any device that provides
input to a computer. There are many input devices, but the two most common
ones are a keyboard and mouse. Every key you press on the keyboard
and every movement or click you make with the mouse sends a specific
input signal to the computer. The keyboard is very much like a standard
typewriter keyboard with a few additional keys. The basic QWERTY layout
6.6 Glossary
!! Computer: Computer is an electronic device which is used to store the data,
as per given instructions. It gives results quickly and accurately.
!! Input Unit: This unit is used for entering data and programs into the
computer system by the user for processing.
!! Storage Unit: The storage unit is used for storing data and instructions
before and after processing.
!! Output Unit: The output unit is used for storing the result as output produced
by the computer after processing.
!! Keyboard: The keyboard is very much like a standard typewriter keyboard
with a few additional keys. The basic QWERTY layout of characters is
maintained to make it easy to use the system. The additional keys are
included to perform certain special functions. These are known as function
keys that vary in number from keyboard to keyboard.
!! Mouse: A device that controls the movement of the cursor or pointer on a
display screen. A mouse is a small object you can roll along a hard and flat
6.9 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Structure Notes
7.0 Introduction
7.1 Unit Objectives
7.2 Troubleshooting Keyboards
7.3 Mouse Troubleshooting
7.4 Troubleshooting Printers
7.5 Troubleshooting Monitor (VDU)
7.6 Networking Troubleshooting
7.7 Sound Troubleshooting
7.8 Hard Drive Troubleshooting
7.9 Summary
7.10 Glossary
7.11 Answers to Check Your Progress
7.12 Terminal and Model Questions
7.13 References
7.0 Introduction
In Computer Science, a keyboard is a typewriter keyboard, which uses an arrangement
of buttons or keys, to act as mechanical levers or electronic switches. After punch
cards and paper tape, interaction via teletype-style keyboards became the main input
device for computers.
In spite of the development of other input devices, such as, mouse (computing mouse),
touch sensitive screens, pen devices, character recognition, voice recognition, and
improvements in computer speed and memory size, the keyboard remains the most
commonly used and most versatile device used for direct (human) input into computers.
A keyboard typically has characters imprinted or printed on the keys and each press
of a key typically corresponds to a single written symbol. However, to produce some
symbols requires pressing and holding several keys at the same time or in sequence.
While most keyboard keys produce letters, numbers or signs (characters), other keys
or instantaneous key presses can produce actions or computer commands.
In normal usage, the keyboard is used to type text and numbers into a word processor,
text editor or other program. In a modern computer, the interpretation of key presses
is generally left to the software. A computer keyboard distinguishes each physical key
from others and reports all key presses to the controlling software. Keyboards are also
Key Is Stuck
1. If a key does not work or is stuck in the down position, you may try to remove
it with a CPU.
Self-Instructional Material 119
IT and Management 2. “Chip puller” tool. These simple “L” shaped tools are great at pulling out
Information System
keys. Once you’ve pulled out the stuck key, you can try to stretch the spring
to “reanimate” its action.
Notes Computer Isn’t Taking Inputs from Keyboard
1. Is keyboard connected to computer? Ensure that the keyboard is plugged into
the keyboard jack and not into the mouse jack. If the keyboard was unplugged,
plug it back in and reboot the computer.
2. If the keyboard still doesn’t work on boot-up, power down the computer and
try to borrow a friend’s known-good keyboard for troubleshooting. Plug the
new keyboard up and boot up the computer. If the new keyboard works, the
old keyboard is bad and needs to be replaced.
3. If the known-good keyboard doesn’t work, check your BIOS to make sure it sees
the keyboard. It should say, “Installed.” If the BIOS recognize the keyboard,
then you probably have a bad keyboard port.
Keyboard
isn’t working
Contact the
no Helpdesk to log
a trouble ticket
no
Symptom
The mouse is acting erratic.
Diagnosis
!! Clean the mouse.
!! Shut down your machine and unplug your mouse from the computer. Open
the underside of the mouse and remove the ball. If the ball is a rubber ball,
do not clean it with alcohol. Clean it with a soft cloth. There should be no
lubricant placed on a mouse ball. Clean the roller in the body of the mouse
with a cotton swab that is slightly damp with alcohol. Replace the ball when
the rollers are dry and replace the bottom portion.
Blank Page
Make sure you completely removed that little sticker from the ink cartridge before
installing it. If it is removed, run the clean print head function on your printer to
make sure all air bubbles are removed. Just whatever you do, do’ not remove the
cartridge once it is been installed!
Microsoft Windows 98, 2000, ME, XP, 2003, and Vista users
1. Click Start, Settings, and open Control Panel.
2. Double-click the Printers or Printers and Fax icon.
3. Right-click on the Printer you wish to test and click Properties. If you do not
see your printer listed your printer is not installed.
4. In the Printers Properties window click the Print Test Page button.
5. If the printer is able to print a test page, your printer is installed and setup
properly. However, if you are unable to print in other programs, it is possible
that the program you are attempting to print from has issues.
Printer Drivers
If your printer does not have any flashing lights and is connected properly it is
possible you may be encountering a driver related issue. We suggest visiting our
printer driver listing, which links to all major printer manufacturer driver pages and
downloading the latest printer drivers for your printer.
Basic Troubleshooting
1. Determine the scope of the problem - i.e., what we can eliminate as OK - where
we can narrow down the problem to.
For example: Does the monitor work on another PC? – does another monitor
work on this PC? – This will demonstrate if the problem lies with the PC - or
the monitor.
2. Is the problem intermittent?
What seems to cause the problem to occur? – can the problem be made to move
by connecting the suspect item elsewhere?
With intermittent faults, to show where the problem is, you have to be able to
move it in order to demonstrate which part is actually faulty. If the fault just
goes away - it might well come back. If the fault can be seen to be moved (for
example a display fault occurs on two PCs - but the same monitor) - then it is
reasonable to think the monitor is faulty.
3. Is it a Combinational Problem?
More complex are combinational problems - e.g., monitor 1 works on PC1 - but
not PC2, while Monitor 2 works on BOTH PCs. Is monitor 1 faulty? - Probably
not. There is most likely a different configuration on the PCs causing the different
behaviour. Since PC2 works with the other monitor, it is likely that the problem
can be resolved by re-configuring the PC.
In each case above, we are determining the scope of the problem by eliminating
what we know is working and OK. With the exception of the combinational
problem, most issues can be quickly resolved. Below mentioned table enlists
some of the Issues, Causes and suggested solutions:
126 Unit 7: Hardware Troubleshooting
Uttarakhand Open
Issue Possible Causes Solution University
First line of display not on the Arrangement problem Use the V-shift control to
top line of the screen adjust the display
Display not covering the whole Configuration problem Use the H-shift control to Notes
screen but is compressed in the adjust the display
centre of the screen
Display not stable Power supply fluctuations Change power supply point
Interference from other Shut off these devices or
devices, such as an electric shift the computer to a
heater, vacuum cleaner, etc. different location
Display suddenly vanishes and Loose contact in VDU socket Check and replace if
reappears necessary
Bad connections within the Call engineer
system
No display Bad cable Change cable
Brightness maladjustment Adjust brightness to
maximum
Bad monitor or system Call engineer
problem
Bad or no colour Monitor maladjustment Adjust monitor controls
Color signals are not proper Call Engineer
Video/Screen Troubleshooting
If the Monitor is Black, diagnosis is given in the flow chart.
Plug
power cord into If the monitor
Electrical outlet. Turn still does not have
no video, call the
on monitor to see if
you have a Helpdesk to log a
display trouble ticket
Notes Symptom
My PC is not working on the Network.
Diagnosis
Programs that require network drives to run or operate properly: SIS, HR, FRS,
PROD – ALPHA, Network Shares, and some school applications. You would also
need a network connection to print to the network laser or colour laser printers
within CCRI.
Symptom
Message “No Domain Server Available” or there are no Network drives (like the S
drive).
Diagnosis
PC’ won’t Plug blue cable In this does not fix
Is blue into network the trouble call the
log onto no
cable plugged into card in back of Helpdesk to log a
Campus
wall jack? PC, Restart PC trouble ticket.
Domain
yes
In blue Plug the cable
cable plugged no into the wall Jack.
into back Restart the PC+
of PC?
yes
Is the
light on were the If this does not fix the
blue cable plugs no trouble call the Helpdesk
into back of to log a trouble ticket
PC?
yes
Does the
Call the
logon screen have
no Helpdesk to log
3 lines: Username,
a trouble ticket.
password and
Domain?
yes
Does the network
account work on
yes mother PC?
yes
Delete your user When you
name and retype Did you Verify your email
double click on and other network
it. Re-type your get an error yes
no MY COMPUTER applications to
password. Re-type message when
do you see your verify that they are
“CAMPUS” on the trying to log
S: drive? working properly.
Domain line in?
Symptom
The computer has no sound. Notes
Diagnosis
PC has no
sound
Are
speakers Plug
plugged into no speaker connector
the back of the into green jack on
PC? Sound card
yes
If Plug in speaker
required is power cord to wall
outlet. Also make no
speaker power no
cord plugged sure speaker power
in? cord is plugged into
back of speaker.
yes
Are
speakers Turn
turned no speakers
“ON”? “ON”?
yes
Symptom
No sound is heard from audio (music) CDs.
!! Place the mouse arrow on the “slider” button and slide the arrow up to
increase or down to decrease the volume.
!! If “Mute all” check box is checked, there will be no sound. To enable the
sound again, uncheck the box.
!! Ensure the speakers are properly connected to the audio card’s output
connector and turned on.
Symptom
There is no volume icon in the lower right corner.
Diagnosis
To place the volume icon in the system tray in the lower right of the desktop:
!! Place the mouse arrow on the Start button in the lower left corner.
!! Left mouse-click on Settings.
!! Left mouse-click on the Control Panel
!! Place the mouse arrow on the Multimedia icon .
(In Windows XP, look for the Sounds and Audio Devices icon .)
!! Double-left mouse click.
Startup Troubleshooting
If your computer is making noise or attempting to start up, but there is no video or
no display on the monitor.
Symptom
No power lights on the monitor/computer.
Diagnosis
PC will
not boot or
start up
yes yes
Symptom
The cursor is stuck on the hourglass.
Diagnosis
Symptom
You have run out of disk space on your computer. Music files, movies, digital pictures, Notes
and other big data files can fill up your hard drive.
Diagnosis
7.9 Summary
!! In Computer Science, a keyboard is a typewriter keyboard, which uses an
arrangement of buttons or keys, to act as mechanical levers or electronic
switches. As in the case of all mechanical/electronic devices, one should
aware of their troubleshooting tips and techniques. We have covered the same
for Keyboards. Then we have moved to Printers and there evolution with
respect to computer science. We have enlisted various printer interfaces and
explained Parallel and USB interfaces in depth. Further, we have elaborated
Laser and DeskJet technology and working and in the process to understand
Printer technology in detail, puts printer troubleshooting exercises. Finally,
we have come to Computer monitor segment and have covered – Cathode
Ray Tube, Liquid Crystal Display and Thin film transformers with their
workings and suitable working diagrams.
7.10 Glossary
!! Monitor: A monitor or display (visual display unit) is an electronic visual
display for computers
!! Troubleshooting: It is a form of problem solving, often applied to repair
failed products or processes. It is a logical, systematic search for the
source of a problem in order to solve it, and make the product or process
operational again
Self-Instructional Material 133
IT and Management
Information System 7.11 answers to check your progress
1. keyboard
Notes 2. computer
3. printer error
4. display (visual display unit)
5. electronic switches
7.13 References
1. Tripathi Gangwar, Microprocessor and Its Applications, Acme Learning
2. Bhuwanesh Jha, Computer Core Hardware, Khanna Publications, Nai Sarak, New
Delhi
3. Larry L. Wear, James R. Pinkert (Contributor) and William G. Lane (Contributor),
Computers: An Introduction to Hardware and Software Design, McGraw-Hill Higher
Education; February, 1991
4. XP Support – Home Page WinXP © Copyright Kelly Theriot MS-MVP(DTS), 2005
Structure Notes
8.0 Introduction
8.1 Unit Objectives
8.2 Defining Operating System
8.3 History of Operating Systems
8.4 Functions of an Operating System
8.5 Structure of Operating System
8.6 Network and Distributed Operating Systems
8.7 Measuring Performance of a Computer System
8.8 Types of Operating Systems
8.9 Batch Processing Operating Systems
8.10 Summary
8.11 Glossary
8.12 Terminal and Model Questions
8.13 References
8.0 Introduction
An Operating System (OS) to a computer is just like mind to human body. Without
thinking and thoughts, a human body will be treated as dead, hence without an
operating system, we can state that a computer system is also not operational. An
operating system is an integrated set of programs that is used to manage various and
overall operations of the computer system. It is designed to support the activities
of computer installations. Its prime objective is to improve the performance and
efficiency of a computer system and increase facilities. An operating system is
responsible for the smoother and efficient operation of the entire computer system.
Moreover, it makes the interaction between user and computer easier.
Process Management
A process is a program in execution. During execution, a process needs certain
resources such as CPU time, memory space, files, and I/O devices. At a particular
instance of time, a computer system normally consists of a collection of processes.
The process management module of an operating system takes care of the creation
and deletion of processes, scheduling of various system resources to the different
processes requesting them, and providing mechanism for synchronization and
communication among processes.
Memory Management
To execute a program, it must be loaded, together with the data it accesses, in the
main memory. To improve CPU utilization and to provide better response time to
its user, a compute system normally keeps several programs in main memory. The
memory management module of an operating system takes care of the allocation
and deal location of memory space to the various programs in need of this resource.
File Management
All computer systems are used for storage, retrieval and sharing of information.
A computer normally stores such information in units called files. Processes can
read information from files and can create new files for storing newly generated
information. Information stored in files is made persistent by storing them on a
secondary storage media such as a magnetic disk. Files provide a natural and easy
means of information sharing. That is, a file can be created by one application and
then shared with different applications at a later time. The file management module of
an operating system takes care of file-related activities such as organization, storing,
retrieval, naming, sharing and protection of files. It allows programs to use a set of
operations that allocates and layouts the secondary storage devices.
Device Management
A computer system normally consists of several I/O devices such as terminal, printer,
disk, and tape. The device management module of an operating system takes care of
controlling all the computer’s I/O devices. It keeps track of I/O request from process,
issue commands to the I/O devices, and ensures correct data transmission to/from
and I/O devices. It also provides an interface between the devices and the rest of the
Security
Notes
Computer systems often store large amount of information, some of which is highly
sensitive and valuable to their users. Users can trust the system and rely on it only
if the various resources and information of a computer system are protected against
destruction and unauthorized access. The security module of an operating system
ensures this. This module also ensures that when several disjoint processes are being
executed simultaneously, one process does not interfere with the others, or with the
operating system itself.
Command Interpretation
A user communicates with the operating system, for using the various systems
resources, via a set of command provided by the operating system. The operating
system also provides a simple language, known as command language (CL) or job
control language (JCL), using which a user can put several commands together from
the command set to describe the resource requirements of the job. The command
interpretation module of an operating system takes care of interpreting user command,
supplied individually or in the form of command language, and directing the system
resources to handle the request. With this mode of interaction with system, the user
is usually not too concerned with the hardware details of the system, or with how
the operating system will direct the hardware to handle certain request.
In addition to the above listed major functions, operating system performs few other
functions such as keeping an account of which users (or processes) use how much
and what kinds of computer resources, maintenance of log of system usage by all
users, and maintenance of internal time clock.
Command-Line Interface
This is the textual user interface in which the user gives instruction to the computer
by typing command. That is, to enter a command, the user uses the keyboard to
type words and symbols. For example, in Unix, the user has to type “delreport.
txt” to delete the file named report.txt. If the user types a command incorrectly, the
command interpreter will respond with a message indicating that it did not understand
the command. When this happens the user has to just retype the command correctly.
There is no problem in typing simple commands as illustrated in the example above.
However, users often need to give detailed instructions to the computer about their
jobs when they submit them for execution. For example, while submitting a job for
execution, a user may need to supply the following information:
!! His/her identification for security and accounting purpose.
!! The software and hardware resource requirements of the job.
!! The I/O device requirements of the job.
!! The directories in which the data files to be used by the job are stored.
!! The action, which the system should take in exceptional conditions, such
as when the input data is missing or incorrect, or when an I/O device
malfunctions.
To facilitate this, the system, which supports command-line interface, also supports
some type of command language (CL) or job-control language (JCL). Users can
write codes in the JCL to give instructions to the systems. These coded statements
tell the operating system such things as the name of the job, the user’s name and
Shell
The command interpreter of an operating system that serves as its user interface is
often referred to as the shell because it forms the outer layer of an operating system
covering the other modules of the operating system. The shell can be a command-
line interface or GUI. It is also possible to have many different shells for the same
operating system. For example, an operating system can have a command-line shell as
well as a GUI shell allowing the users to switch from one shell to another. Beginners
often find it convenient to work with GUI shell, whereas advanced users find it more
convenient to work with command-line shell. Some operating systems also support
multiple command-line shells. It is like supporting multiple JCLs and allowing the
user to use a language that he/she is most comfortable with. For example, many Unix
operating systems support three command-line shells known as C shell, Bourne shell
and Korn shell. Real-time Operating Systems: for many applications, successful
processing means that the application produces correct results when its processing
is completed. However, in real life, we often come across situation in which it is
not only sufficient to obtain correct results, but the results must be produced within
some specified time frame (deadline) to be useful.
System Image
The most important feature used to differentiate between the two types of operating
system is the image of the distributed computing system from the point of view of its
users. In case of a network operating system, the users view the distributed computing
system as a collection of distinct machines connected by a communication subsystem.
That is, the users are aware of the fact that multiple computers are being used. On
the other hand, a distributed operating system hides the multiple computers are
being used. On the other hand, a distributed operating system hides the existence of
multiple computers and provides a single-system image to its users. That is, it makes
a collection of networked machines appear to its user as a virtual uniprocessor by
providing similar type of user interface as provided by centralized operating systems.
Autonomy
In a network operating system, each computer of the distributed computing system
has its own local operating system (the operating system of different computers
may be the same or different), and there is essentially no coordination at all among
the computers except for the rule that when two processes of different computers
communicate with each other, they must use a mutually agreed on communication
protocol. Each computer functions independently of other computers in the sense that
each one makes independent decisions about the creation and termination of their
own processes and management of local resources. Notice that due to the possibility
of difference in local operating system, the system calls for different computers of
the same distributed computing system may be different in this case. On the other
hand, with a distributed operating system, there is a single system-wide operating
system and each computer of the distributed computing system runs a part of this
global operating system. The distributed operating system tightly interweaves all the
computers of the distributed computing system in the sense that they work in close
cooperation with each other for the efficient and effective utilization of the various
resources of the system. That is, processes and several resources are managed globally
(some resources are managed locally). Moreover, there is a single set of globally
valid system calls available on all computers of the distributed computing system.
Notes
8.7 Measuring Performance of a Computer
System
The efficiency of an operating system and the overall performance of a computer
system is usually measured in terms of the following:
Throughput
Throughput is the amount of work that the system is able to do per unit time. It is
measured as the number of process that are completed by the system per unit time.
For example, if n processes are completed in an interval of t seconds, the throughput
is taken as n/t processes per second during that interval. Throughput is normally
measured in processes/hour. Note that the value of throughput does not depend
only on the capability of a system, but also on the nature of jobs being processed by
the system. For long processes, throughput may be one process/hour; and for short
processed, throughput may be 100 processes/hour.
Turnaround Time
From the point of view of an individual user, an..... important criterion is how long
it takes the system to complete a job submitted by him/her. Turnaround time is the
interval from the time of submission of a job to the system for processing to the time
of completion of the job. Although higher throughput is desirable from the point of
view of overall system performance, individual users are more interested in better
turnaround time for their jobs.
Response Time
Turnaround time is usually not a suitable measure for an interactive system, because
in an interactive system a process can produce some output fairly early during its
execution and can continue executing, while previous results are being output to the
user. Thus another measure used in case of interactive systems is response time, which
is the interval from the time of submission of a job to the system for processing to the
time the first response for the job is produced by the system. In any computer system,
it is desirable to maximize throughput and to minimize turnaround time and response.
CUI vs GUI
Now we know that an operating system is that important system software which helps
in running the computer system. It is an integrated set of specialized programs. The
hardware cannot work without the operating system. In fact, an operating system
Self-Instructional Material 149
IT and Management provides an interface between the hardware and the user. It acts as a translator that
Information System
conveys information between you and your computer system. An operating system
performs all the functions of storage management and I/O (Input/Output) device
management. The user is saved the effort and time of knowing hardware just because
Notes
of the presence of an operating system.
Now let us look at more technical aspects of operating systems, i.e., Command User
Interface and Graphical User Interface.
8.10 Summary
!! Operating system (OS) is a program or set of programs, which acts as an
interface between a user of the computer & the computer hardware. The
main purpose of an OS is to provide an environment in which we can execute
programs. The main goals of the OS are (i) To make the computer system
convenient to use, (ii) To make the use of computer hardware in efficient
way. Operating System is a system software, which may be viewed as
collection of software consisting of procedures for operating the computer
and providing an environment for execution of programs. It is an interface
between user and computer. So an OS makes everything in the computer
to work together smoothly and efficiently.
8.11 Glossary
!! Memory Management: The memory manager in an OS coordinates the
memories by tracking which one is available, which is to be allocated or deal
located and how to swap between main memory and secondary memories.
!! Operating System: (An operating system (OS) is a set of computer program
that manages the hardware and software resources of a computer.
!! Processor Management: In a multiprogramming environment, OS decides
which process gets the processor when and how much time. This function
is called process scheduling.
!! CPU Utilization: Ideally the CPU would be busy 100% of the time, so as
to waste 0 CPU cycles. On a real system CPU usage should range from
40% (lightly loaded) to 90% (heavily loaded.)
8.14 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
Packages
Notes
Structure
9.0 Introduction
9.1 Unit Objectives
9.2 Computer Software Concept
9.2.1 System Software
9.2.2 Application Software
9.3 Software Packages
9.4 Word Processor
9.5 Database Management Packages
9.6 Summary
9.7 Glossary
9.8 Answers to Check Your Progress
9.9 Terminal and Model Questions
9.10 References
9.0 Introduction
In this unit, we are discussing all the important software concepts and providing
you the latest knowledge of all the software available in the market. Many types of
software are available for various applications. The software development field is
so advanced that day by day existing types software are becoming outdated and new
types are coming in the market. So we must get aware of the latest developments in
the software industry.
Here, we will discuss software packages which are required for general and special
purpose.
After going through this unit, you will be able to know about:
!! Software packages
!! Word processor
!! Database management package
Language Translator
A language translator is a system software which translates a computer program
written by a user into a machine understandable form.
Operating System
An operating system (OS) is the most important system software and is a must to
operate a computer system. An operating system manages a computer’s resources
very effectively, takes care of scheduling multiple jobs for execution and manages the
flow of data and instructions between the input/output units and the main memory.
Advances in the field of computer hardware have also helped in the development of
more efficient operating systems.
Utilities
Utility programs are those which are very often requested by many application
programs. A few examples are: SORT/MERGE utilities, which are used for sorting
large volumes of data and merging them into a single sorted list, formatting, etc.
Accounting Package
The accounting packages are one of the most important packages for an office. Some
of the features, which you may be looking on an accounting, may be:
!! tax planner facility
!! facility for producing charts and graphs
!! finding accounts payable
156 Unit 9: Software – Languages and Packages
Uttarakhand Open
!! simple inventory control facility
University
!! payroll functions
!! on-line connection to stock quotes
!! creation of invoices easily Notes
Communication Package
The communication software includes software for fax. The fax-software market
is growing up. Important fax software is Delrina’s WinFax PRO 4.0. Some of the
features such as Remote Retrieval and Fax Mailbox should be looked into fax
software. These features ensure that irrespective of your location you will receive
the fax message.
Another important feature is fax Broadcast. This allows you to send out huge numbers
of faxes without tying up your fax machine all day.
If you have to transfer files from your notebook computer to a desktop computer
constantly, then you need a software program that coordinates and updates documents.
One such software is Laplink for Windows. This software offers very convenient
to use features. For example, by simply dragging and dropping a file enables file
transfer. This software can work if a serial cable or a Novell network or a modem
connects you.
Information Providers
One of the very interesting information providers which will become popular in
India also is Automap road atlas by Microsoft. This package may provide city-to-city
driving instructions and maps. You may also get the best route, calculate the time it
will take. Many information providers are the Internet access programs. Today, the
Internet access packages come as a part of operating system, however, many other
packages can be used for accessing information on the World Wide Web. One very
simple to use popular tool of browsing Internet is Netscape Navigator.
Suites
Suites are a set of packages sold as a group package mainly for the business user.
The suite package includes programs for Word-processing, Electronic Spreadsheet,
Databases, and Presentation Graphics software and may be a mail software.
For example, Microsoft Office Professional for Windows includes programs as
Microsoft Word, Microsoft, Excel and Microsoft Access, and a license for Microsoft
Mail, etc. The word-processing, spreadsheet, and presentation-graphics software
interfaces in a suite are well-integrated allowing easy data transfer among these
applications. Today there is a growing family of Office-compatible products, which
will be included in suites.
In the fast developing software era the list discussed above cannot be complete.
Please refer to latest PC journals for most recent software trends.
Business processes are always associated with a huge amount of data. To store,
manipulate and processes such data, some software packages are needed, which are
collectively known as Database Management Packages/Software/Systems (DBMS).
DBMS is defined as a software that organizes and maintains the data in a database
for providing the information.
Microsoft Access is a Windows based Relational Database Management System
(RDBMS). It has received huge acceptance by users because of its versatility and easy
to use interface. MS-Access is best suited for maintaining any type of information.
What is a Database
A database is a collection of related information. An example of a typical database
is a private telephone directory. It contains related information about each person
like his name, address and telephone number. Other examples of a database include
list of customers and suppliers, maintenance of stock in warehouses, collection of
tapes in libraries, maintenance of members in a country club, etc.
Components of a Database
All the information stored in an Access database is kept in tables as illustrated in
Table 9.1.
Table: A table is a collection of some specific kind of data. It is the basic element of
the database. Data put in a table is organized in rows and columns.
Record: Each row is called ‘record’ and it contains the complete information about
one particular item, e.g., in a telephone directory all the essential details about a
single person like his name, address and city form one record.
Column: Each column is called ‘field’. It holds information about a certain type for
all records. A field could be a name, address, telephone number, etc.
Table 9.1: An Example of a Typical Table
RECORD Field
In the example shown in Table 9.1, the table contains five records and five fields.
Thus, each record contains a complete and wholesome information about one item.
Each column contains the same type of information for all the records like S.No.,
9.6 Summary
1. System software
2. Language translator
3. Computer software
4. Computer
5. Application software
6. Utility software
Notes
9.10 References
1. Sanjeev Gupta and Shameena Gupta, Computer Aided Management (Using MS-Office
2003 Tools), Excel Books
2. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
3. Joseph W. Habraken, Microsoft Office 2003 All-In-One, Que Publishing
4. Jennifer Ackerman Kettell, Guy Hart-Davis and Curt Simmons, Microsoft Office 2003:
The Complete Reference, McGraw-Hill Professional
5. Laurie Ann Ulrich, How to Do Everything with Microsoft Office 2003, McGraw-Hill
Professional
10.0 Introduction
Files and database have become an essential component of everyday life in modern
society. In the course of a day, most of us encounter several activities that involve
some interaction with a database, like in banks to deposit and withdraw funds; if we
make a hotel or airline reservation; if we access computerized library catalog; or if
we order a magazine subscription from a publisher, chances are that our activities
will involve someone accessing a database.
To understand the basics of database, we must start with files and its various types
and organization which together form the database.
Data Files
1. A data file is used to store the data records. These data files are well defined
data structures that contain related data organized in convenient groupings
(records) of data items.
2. Each data file has two additional types of records: Header record, and types
record.
3. Header records contain file identification information and keep apart different
groups of records in a file.
4. Trailer records contain codes to mark the end of a set of data records. These
also record file usage information.
Program Files
Program files are used to store programs in different languages provided by different
software vendors. These files have different extensions depending on the language
used to write a program.
E.g.: 1. A program file written in ‘C’ language has extension. C.
2. A program file written in C++ language has extension. CPP.
Executable Files
These files store ready to execute programs. They may have extension.EXE.COM
or .BAT. These programs can be directly executed from the command prompt.
10.2.1 Data Structure
Data may be organized in various ways; the logical or mathematical model of a
particular situation using data is called a ‘data structure’.
Data Type
e.g., Integer, boolean e.g., strings, array, e.g., Stack, Queue, Linked list,
character, etc. records, etc. Binary search tree, graphs, etc.
10.2.2 Data Hierarchy
Listed below are the components of the data hierarchy in the ascending order of
complexity:
Simple Bit
Byte
Field or item
Record
File
Most Complex Database
This is called ‘data hierarchy’ because databases are composed of files, files are
composed of records, and so on.
Bit
The term ‘bit’ is short for binary digit. It can assume either of the two states,
representing numeric value 0 or 1.
Record
A record is a collection of fields relating to a specific entity.
File
A file is a collection of related records.
The concept of a computer file is very similar to the manual file in a filing cabinet.
Database
A database consists of all the files of an organization, structured and integrated to
facilitate updation of files and retrieval of information from them.
Database
0 1 1 0 1 1 0 0
10.2.3 Format of a Record
1. Fixed length record format
2. Variable length record format
Fixed Length
!! Fixed length record format contains the records of the same length (fixed
format). So the information does not expand with time or use.
Record Layout
!! Arrangement of data fields in a record.
!! Normally contains two types of data fields:
Key field
Non-key field
Key field is a field which contains a unique identifier for the entity about which data
is being stored in the record.
Non-key fields store values of various attributes of the entity identified by the key
field value.
Data Codes
Data about entities can be recorded in two formats.
1. Clear form
2. Coded form
Using clear or natural format, attributes of the entity are described or narrated using
normal language.
Many attributes can be described more concisely and uniquely using different types
of codes.
e.g.: Suppose an item is made of steel and one of the attributes of the item being
recorded is material.
In the clear format value of attributes material will be recorded as “Steel”.
In the coded format, suppose steel is assigned material code “1”. Then the value of
attribute material in the data record will be recorded as “1”.
Coding can be done in different ways as described below.
Numeric Code
Numeric code contains digits and are widely used primarily for their convenience
of showing the classification of hierarchy or related data items.
e.g.: Pincode used in postal service.
Alphanumeric Code
Alphanumeric code contains both numeric and alphabetic characters. Alphanumeric
codes allow a large number of codes using fewer positions.
e.g.: Vehicle licence number.
Advantages
1. Easy to organize, maintain, and understand.
2. There is no overhead in address generation locating a particular record requiring
only the specification of the key field.
3. Relatively inexpensive I/O media and devices can be used.
4. It is the most economical and efficient file organization where the activity ratio
(the ratio of the total number of records in transaction file and the total number
of records in master file) is very high. That is why this file organization is most
suitable for transaction files.
Disadvantages
1. It proves to be very inefficient and uneconomical for applications in which the
activity ratio is very low.
2. Since an entire sequential file may need be read to retrieve and update few
records, accumulation of transactions into batches is required.
3. Transactions must be stored and placed in sequence prior to processing.
4. Timeliness of data in the file deteriorates while batches are being accumulated.
5. Data redundancy is typically high since the same data maybe stored in several
files, sequenced on different keys.
6. Random enquiries are virtually impossible to handle.
Advantages
1. The access to and retrieval of a record is quick and direct (within a fraction of
a second).
2. Transactions need not be sorted and placed in sequence prior to processing.
3. Accumulation of transactions into batches is not required before processing
them. They maybe processed as and when generated.
4. It can also provide up-to-the minute information in response to enquiries from
simultaneously usable on-line stations.
5. If required, it is also possible to process direct file records sequentially in a
record key sequence.
6. A direct file organization is most suitable for interactive on-line applications.
Disadvantages
1. These files must be stored on a direct access storage device. Hence, relatively
expensive hardware and software resources are required.
2. File updation (addition and deletion of records) is more difficult as compared
to sequential files.
3. Address generation overhead is involved for accessing each record due to
hashing function.
Applications
A direct file organization is most suitable for interactive on-line applications such as:
1. Airline/Railway reservation systems.
2. Teller facility in banking applications.
Advantages
1. Permits the efficient and economical use of sequential processing techniques
when the activity ratio is high.
2. Permits direct access processing of records in a relatively efficient way when
the activity ratio is low.
Disadvantages
1. These files must be stored on a direct access storage device. Hence, relatively
expensive hardware and software resources are required.
2. Less efficient in the use of storage space than some other alternatives.
Printed Reports
Printed reports vary in size, although analysts often use these standard sizes:
!! 91/2 by 11 inches
!! 11 by 14.7/8 inches
!! 8 by 14.7/8 inches
These sizes are for continuous forms (sometimes called pin-fed or fan-fold forms)–
connected sheets of papers that feed into the printer one after the other.
Self-Instructional Material 175
IT and Management All the features of printed output are available in microfilm and microfiche, the two
Information System
film output methods. Film output reduces output cost by approximately one-third.
After developing in the microfiche machine, film can be stored and retrieved when
Notes
needed. For reference data used only sporadically, such as private saving account
balance that changes infrequently and can have interest pasted every three months,
microfilm could be a useful output option.
A page of output takes so little space when stored on microfilm. One square inch
of a film can store as much information as several pages of paper report. A 3.5 inch
card stores the equivalent of hundreds of pages.
The time taken to locate the film reel or card containing the information wanted
the user must maintain an index and to load the film into a microfilm or microfiche
reader for viewing is a real disadvantage.
Special Forms
Reports could be printed on a simple paper. But usually, when an organization sends
a report to its customer, the logo and the name of the organization are also printed
on it. Sometimes, the report is printed on a paper which is “pre-printed”. Recall your
high school marksheets. The name of the board, the year and the logo of the board
as well as the name of examination passed were printed on the paper. The marks,
name, school name, date of birth, etc., were printed afterwards. Another example is
your electricity bill. The titles of various labels are preprinted. The values against
them are printed by the information system.
!! All pages should have a title and page number and show the date on which
the output was produced.
!! All columns must be labelled.
!! Abbreviations must be avoided.
Some organizations specify standards that guide design practices in addition to the
above guidelines. A sample report format is shown in Figure 10.1.
Report Generation
Commercial outputs need formatted output. These formatted outputs are known as
reports. A formatted report may have the following:
1. Report heading
2. Page heading
3. Page numbering
4. Footers
5. Some remarks
6. Date, month, and year of printing
Report Heading
It represents the title of the report and appears, only on the first page of the report.
Page Heading
It is printed on the top of each page.
Page Footer
It is printed at the bottom of each page. It is generally the total number of records
on the page, sum of the numeric data, etc.
Report Detail
This constitutes the main body of report. The output details or the information of
the main consequence is listed in this group.
Fig. 10.2
Label Generation
Creating labels means to generate address slip in computer. Creating mailing labels
is a two-step process:
1. Designing Label Form
2. Production of Labels
Production of Labels
When you have designed the label form you want, you can print the labels at any
time. At this time, label is ready to use.
Communication Integrated
Central Administration
Application Application
Application
Fig. 10.3
Database
Management System
Database
Manager
Operating
System
Computer
Hardware
Fig. 10.4
3. Security Enforcement: By defining security checks and constraints, the
database manager ensures that the database is safe. The database manager is
endowed with the power of letting the users use the database and also deny it.
It is the sole responsible person to provide access rights to a user like - read
only, read-write, etc.
4. Backup and recovery: Database is such a valuable asset that the database
manager must ensure that it is not damaged or lost. Therefore, it regularly
takes backup of the database. In case of any failure it initiates suitable recovery
procedure to resurrect the database. It must also do it in the least amount of time.
10.11 Glossary
!! File: A collection of related records.
!! Data File: Well defined data structures that contain related data organized
in convenient groupings of records.
!! Program Files: Files used to store programs.
!! Executable Files: Files which store ready to execute programs.
!! Direct File: A file which consists of records that can be directly located
without having to search through any other records.
!! Index Sequential Access Method (ISAM): The technique where the records
of the file can be stored in random sequence but the index table is in sorted
sequence on the key value.
!! Master Files: Files which include some information of permanent nature
and are updated by recent transactions.
10.14 References
1. Sanjeev Gupta and Shameena Gupta, Computer Aided Management (Using MS-Office
2003 Tools), Excel Books
2. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
3. Gio Wiederhold, File Organization for Database Design, McGraw-Hill
4. Alan L. Tharp, File Organization and Processing, J. Hiley & Sons
5. Yahiko Kambayashi, Sakti P. Ghosh and Jr Witold Lipski, Data Base File Organization:
Theory and Applications, Academic Press
Block - III
Block Title : Software Packages
Programme Coordinator
Dr. Manjari Agarwal
Assistant Professor
Department of Management Studies
Uttarakhand Open University
Haldwani
Editor(s)
Er. Sumit Prasad Er. Subodh Prasad
Assistant Professor Assistant Professor
Department of Management Studies Department of Information Technology
Uttarakhand Open University College of Technology
Haldwani G.B. Pant University of Agriculture & Technology
Pantnagar
ISBN : 978-93-85740-12-1
Copyright : Uttarakhand Open University
Edition : 2016 (Restricted Circulation)
Published by : Uttarakhand Open University, Haldwani, Nainital - 263 139
Printed at : Laxmi Publications (P) Ltd., New Delhi
DUO-8153-68.44-INFO TECH MGMT INFO B-III
CONTENTS
11.0 Introduction
There are many software packages to do the job of word processing. Some of them
work in DOS environment such as WordStar, Word Perfect, and Professional Write
etc. Today, working in Windows has become very popular and MS Word is the most
popular word processing software these days, which runs under Windows operating
system. This Unit provides an overview of MS Office and MS Word and in the
subsequent Units the elements of MS Office are dealt in detail.
Functions of MS Office
1. A Common User Interface: While learning one application of the suite you
get to learn the operational basics of the other applications while maintaining
some uniqueness in the applications. Consistency in MS Office applications
is in the form of:
(i) Tool Bars
(ii) Menus
(iii) Dialog Boxes
(iv) Customizable features and operational features which are similar too.
2. Quick Access: The MS-Office provides the Microsoft Office Short-cut Bar
which is used for the following:
(i) Create a new file based on templates and wizards.
Components of MS Office
The components of MS Office are MS Word, MS Excel, MS PowerPoint and MS
Access.
MS Word
MS Word is a powerful word processor that allows you to create Memos, Fax
coversheets, Web pages, Reports, Mailing labels, Brochures, Tables and many other
professional and business applications. MS Word provides easy graphics handling,
calculation of the data tables, ability to create a mailing list, list sorting and efficient
file management.
MS Excel
MS Excel is a spreadsheet package. When you start Excel, a blank workbook appears
in the document window. The workbook is the main document using excel for storing
and manipulating the data. A workbook has individual worksheets each consisting
of data. Each worksheet is made up of 256 columns and 65,536 rows.
Microsoft Access
MS Access is the relational database application in the Microsoft Office Professional.
With Access, you can organize data into manageable related units, Enter, modify
and locate data, Extract subsets of data based on the specific criteria, Create custom
forms and reports, Automate common database tasks, and Graph data relationships.
Key Tips
Word 2010 provides shortcuts for the ribbon, called KeyTips, so you can quickly
perform tasks without using your mouse.
To make KeyTips appear on the ribbon, press the ALT key. Next, to switch to a tab
on the ribbon using your keyboard, press the key of the letter displayed under that
tab. In the example shown above, you would press N to open the Insert tab, P to open
the Page Layout tab, S to open the References tab, and so on. Once you’ve switched
to a ribbon tab in this way, all available KeyTips for that tab appear on the screen.
You can then finish the sequence by pressing the final key for the command you
want to use. To go back one level while in a sequence, press the ESC key. Doing so
multiple times in a row cancels KeyTips mode.
Mini Toolbar
In Microsoft Word, Excel, PowerPoint and Outlook, the mini toolbar is a smaller
version of the full toolbar found near the top of the application window. The mini
toolbar appears when you highlight text and either move your mouse cursor over
the highlighted text or right-click on the highlighted text.
The mini toolbar features some of the most commonly used text editing functions,
which include Font type, Font size, Increase font size, Decrease font size, Increase
indent of text, Decrease indent of text, Bold, Italics, Underline, Center text
(alignment), Highlight text, Font Color, and Format Painter.
Live Preview
One of the nice features introduced with Office 2007 and 2010 is that of Live Preview.
Now with Live Preview you can see the effects of your changes before they happen.
Notes
Closing an Document
When you finish working with a document, you would like to close it. Closing a
document removes it from your computer screen and if you had other documents
Notes
5. You can now start typing to create text inside the text box.
From the drop-down menu, you can also select one of the built-in text boxes that
have predefined colors, fonts, positions, and sizes. If you choose this option, the
text box will appear automatically, so you will not need to click and drag to draw it.
To move a text box:
1. Click the text box.
2. Hover the mouse over one of the edges of the text box. The mouse pointer
becomes a cross with arrows on each end .
3. Click and drag the text box to the desired location on the page.
To resize a text box:
1. Click the text box.
2. Click and drag one of the sizing handles on the corners or sides of the text box
until it is the desired size.
If you drag the sizing handles on any of the four corners, you will be able to change
the height and width at the same time. The sizing handles on the top or bottom of
the text box will only allow you to resize vertically, while the handles on the left
and right sides will resize the text box horizontally.
To change the text box shape:
1. Select the text box. A new Format tab appears with Drawing Tools.
2. Go to the Format tab.
3. Click the Edit Shape command.
4. Click Change Shape to display a drop-down list.
5. Select the desired shape from the list.
To choose a shape style: Choosing a shape style allows you to apply a preset fill
and outline color, and in some cases other effects such as beveling and shadow.
You don’t have to pick a style for your text box, but it can help you save time or
experiment with different appearances.
1. Select the text box. The Format tab appears.
2. Select the Format tab.
3. Click the More drop-down arrow in the Shape Styles group to display more
style options.
11.6.2 Clipboard
The Clipboard is a temporary storage area. When copied, text is duplicated to the
Clipboard. When cut, it is moved to the Clipboard. When pasted, text is placed at
the insertion point whether in the same document or a different one. Clipboard items
may be pasted as needed.
Find
The find command searches quickly for a particular word, phrase, or formatting
within your document. Use Find to easily and efficiently search for references to Notes
specific items. For example, if you needed to find the location in a document where
a survey was addressed, search for the word survey to find each location of the word.
When you click the find command, a Navigation pane opens to the left of the work
area. At the top of the pane, in the text field, type the word or phrase you want to
find. All matches found will display in the Navigation pane. In the document, each
match will be highlighted. Click a specific match in the Navigation pane to move
directly to that location in the document. Scroll each match to see its page number
in a screen tip.
1. Home Tab > Editing group > Find.
The Navigation pane displays on the left.
2. Click the text field where it says Search Document.
3. Type the word or phrase you wish to find.
4. Click the magnifying glass search icon .
5. Click any result in the Navigation pane to go to that location.
Replace
The replace command gives you an additional option while finding items. You can
find a particular word, phrase, or formatting and immediately replace it with another
word, phrase, or formatting. You would want to use this feature when a particular
word or phrase is outdated or would better be expressed differently. For example, if
a document was created using the acronym MCC instead of Maricopa Community
Colleges, use the Find and Replace to search for each instance of MCC and replace
it with MCCCD.
Alignment
Alignment or justification refers to the way in which the lines of a paragraph
are aligned. There are four types of alignment, and the type of alignment of the
paragraph where your cursor is located is indicated by the highlighted button in
the Paragraph group on the Home tab.
!! With left alignment ( ) (the default), the left-hand ends of all the lines in
the paragraph are aligned along the left-hand margin of the text area.
!! With center alignment ( ), the mid-points (centers) of all the lines in the
paragraph are aligned along the same imaginary vertical line at the center
of the text area between the margins.
!! With right alignment ( ), the right-hand ends of all the lines in the
paragraph are aligned along the right-hand margin of the text area.
!! With justified alignment or full justification ( ), all the lines in the
paragraph, except the last line, are extended so that the left-hand end of
each line is aligned along the left-hand margin of the text area, the right-
hand end of each line is aligned along the right-hand margin of the text
area, and the lines are all of the same length. This is achieved by inserting
additional space between words.
You can change the type of alignment of the paragraph where your cursor is
located or of a group of selected paragraphs by clicking the applicable button in
the Paragraph group on the Home tab. There are also shortcut keys for setting the
type of alignment.
Keyboard Shortcuts
The keyboard shortcuts (or shortcut keys or shortcut key combinations) that you can
use to quickly apply paragraph formatting are listed in the following table.
Spreads the current paragraph across the entire width between the
Ctrl+Shift+J
margins.
In Word 2010 and Word 2007, opens the Apply Styles task pane
for applying, creating, or modifying styles and formatting (use
Alt+Ctrl+Shift+S to modify a style without applying it to the
Ctrl+Shift+S
selection). In Word 2003, selects the Styles drop-down list on the
Formatting toolbar, if the Formatting toolbar is displayed, or opens
the Style dialog box.
Alt+Ctrl+Shift+S Opens the Styles pane (Word 2010 and Word 2007).
Note: When you apply justified alignment to a paragraph, the last line does not
extend across the full width of the text area. You can make all the lines in a paragraph
extended across the full width of the text area by placing your cursor within the
paragraph and pressing Ctrl+Shift+J, but it should be mentioned that in this case
Word also adds space between letters within words to extend the lines.
Self-Instructional Material 209
IT and Management Indents
Information System
The indent before text refers to the width of the additional empty space that is inserted
between the margin and the text on the left-hand side of a paragraph of left-to-right
Notes text, and the indent after text refers to the width of the additional empty space that is
inserted between the text and the margin on the right-hand side of a paragraph of left-
to-right text. You can quickly increase the indent before text to the next tab stop by
clicking the Increase Indent button ( ) in the Paragraph group on the Home tab,
and you can quickly decrease the indent before text to the preceding tab stop by
clicking the Decrease Indent button ( ) in the Paragraph group on the Home tab.
You can set the indent before text (the left indent for left-to-right text) to values that
do not correspond to tab stops, and you can also set the indent after text (the right
indent for left-to-right text) in the Paragraph group on the Page Layout tab.
Paragraph Spacing
The spacing between your paragraphs is determined by the spacing before it and
the spacing after it that are set for each paragraph. You can modify the spacing before
a paragraph and the spacing after it by changing the values in the applicable boxes
in the Paragraph group on the Page Layout tab.
Note: When the first of two consecutive paragraphs has non-zero spacing after it
and the second paragraph has non-zero spacing before it, only the larger of the two
spaces will be inserted between the paragraphs.
Borders
If you want to add borders around the paragraph where your cursor is located, click
the Borders button( ) to add the current default borders (the original default or the
last border style that you selected). If you want to select a border style that differs
from the current default border style, click the small arrow on the Borders button,
and select one of the border styles displayed or click Borders and Shading to define
your own custom borders. If you want to add borders around multiple paragraphs,
select the applicable paragraphs before you click the Borders button or the small
arrow on it.
Write an Equation
To write an equation, you can use Unicode character codes and Math AutoCorrect
entries to replace text with symbols.
When you type an equation, Word automatically converts the equation into a
professionally formatted equation.
1. On the Insert tab, in the Symbols group, click the arrow next to Equation.
2. Click the equation that you want, or click Insert New Equation to type an
equation.
Insert a frequently used or preformatted equation
(i) On the Insert tab, in the Symbols group, click the arrow next to Equation,
and then click the equation that you want.
(ii) Add an equation to the list of frequently used equations
(iii) In the document, select the equation that you want to add.
(iv) Under Equation Tools, on the Design tab, in the Tools group,
click Equation, and then click Save Selection to Equation Gallery.
(v) In the Create New Building Block dialog box, type a name for the
equation.
(vi) In the Gallery list, click Equations.
(vii) Select any other options that you want.
Convert your document to the Word 2010 and Word 2007 format
If you convert your document and save it as a .docx file, you will not be able to use
previous versions of Word to change any equations in the document.
1. Click the File tab.
2. Click Info, and then click Convert.
3. Click the File tab.
4. Click Save As.
In the Save as type list, click Word Document to save your document as a .docx file.
Optional hyphen ^-
Nonbreaking space ^s
Contd.../-
Self-Instructional Material 219
IT and Management
Information System Section mark (§) ^%
The above table lists the special characters and the corresponding codes.
11.7 Summary
!! Microsoft Word 2010 is a word-processing program, designed to help
you create professional-quality documents. With the finest document
formatting tools, Word helps you organize and write your documents more
efficiently. Word also includes powerful editing and revising tools so that
you can collaborate with others easily. We have learnt how to create our own
documents, open existing documents and finally save them before closing.
The standard toolbar and the formatting toolbar offer a variety of buttons
which offer a quick service to the user.
!! Text can also be justified between the margins. Proper line spacing can
be given in between the printed lines. Text entries separated by commas
can be put in the bulleted or numbered form. This makes the major heads
clearly readable and long remembered. The ‘Find and Replace’ feature of
11.8 Glossary
1. True
Notes
2. True
3. True
4. True
5. True
6. True
11.11 References
2. Sanjeev Gupta and Shameena Gupta, Computer Aided Management (Using MS-Office
2003 Tools), Excel Books
12.0 Introduction
MS-EXCEL is a very powerful and easy-to-use spreadsheet package; perhaps
the most commonly used these days. It is a member-application included in MS
Office suite. It works very well with numbers and their complex calculations.
Excel helps prepare your data in an organized, orderly and meaningful fashion.
Excel finds its major application in creating reports, using formulas and performing
12.2 MS EXCEL
Spreadsheets were originally developed for book keeping; however, they are also
useful for scientific calculations, data manipulation and for producing graphs.
Microsoft Excel includes some statistical functions, but for serious research work
a specialized package should be used. Excel can also sort and select data; however,
for large amounts of data or more complex tasks, a database program should be
used instead.
Starting Excel
To start up the program:
1. Open the Windows Start menu
2. Choose All Programs then Microsoft Office followed by Microsoft Office
Excel 2010
You can create a shortcut to this software by dragging Microsoft Excel from this
menu onto the Desktop using the right mouse button - select Create Shortcut(s) Here
from the popup menu.
Notes
File Tab
The File tab replaces the Office button from Excel 2007. You can click it to
check Backstage view, which is the place to come when you need to open or save
files, create new sheets, print a sheet, and do other file-related operations.
Ribbon
Zoom Control
Zoom control lets you zoom in for a closer look at your text. The zoom control
consists of a slider that you can slide left or right to zoom in or out, . and + buttons
you can click to increase or decrease the zoom factor.
View Buttons
The group of three buttons located to the left of the Zoom control, near the bottom
of the screen, lets you switch among excel’s various sheet views.
!! Normal Layout view: This displays page in normal view.
!! Page Layout view: This displays pages exactly as they will appear when
printed. This gives a full screen look of the document.
!! Page Break view: This shows a preview of where pages will break when
printed.
Sheet Area
The area where you enter data. The flashing vertical bar is called the insertion
point and it represents the location where text will appear when you type.
Row Bar
Rows are numbered from 1 onwards and keep on increasing as you keep entering
data. Maximum limit is 1,048,576 rows.
Column Bar
Columns are numbered from A onwards and keep on increasing as you keep entering
data. After Z, it will start series of AA, AB and so on. Maximum limit is 16,384
columns.
Status Bar:
This displays sheet information as well as the insertion point location. From left to
right, this bar can contain the total number of pages and words in the document,
language, etc.
You can configure the status bar by right-clicking anywhere on it and by selecting
or deselecting options from the provided list.
Self-Instructional Material 227
IT and Management Dialog Box Launcher
Information System
This appears as very small arrow in the lower-right corner of many groups on the
Ribbon. Clicking this button opens a dialog box or task pane that provides more
Notes options about the group.
Sheet Information
When you click Info option available in the first column, it displays the following
information in the second column of the backstage view:
Sheet Properties
When you click Info option available in the first column, it displays various properties
in the third column of the backstage view. These properties include sheet size, title,
tags, categories, etc.
You can also edit various properties. Just try to click on the property value and if
property is editable, it will display a text box where you can add your text like title,
tags, comments, Author.
Inserting Data
For inserting data in MS Excel just activate the cell type text or number and press
enter or Navigation key.
Inserting Formula
For inserting formula in MS Excel go to formula bar, enter the formula and then
press enter or navigation key. See the screen-shot below to understand it.
Notes
Setting Font
You can assign any of the fonts that is installed for your printer to cells in a worksheet.
You can set the font of the selected text from Home » Font group » select the font.
Setting font from format cell dialogue
!! Right click on cell » Format cells » Font Tab
!! Press Control + 1 or Shift + Control + F
Text-Formatting
Various options available in Home tab of the ribbon as below:
!! Bold: It makes text highlighted by choosing Home » Font Group » Click
B or Press Control + B
!! Italic: It makes text italic by choosing Home » Font Group » Click I or
Press Control + B
!! Underline: It makes text to be underlined by choosing Home » Font Group
» Click U or Press Control + B
!! Double Underline: It makes text highlighted by choosing Home » Font
Group » Click arrow near U » Select Double Underline
!! Strike-through: It makes strikes the text in the centre vertically.
Change Alignment
Notes
You can change Horizontal and Vertical alignment of the cell. By default, Excel
aligns numbers to the right and text to the left. Click on the available option in the
Alignment group in Home tab to change alignment. Right click on cell and choose
format cell. In format cells dialogue choose Alignment Tab. Select the available
options from the Vertical alignment and Horizontal alignment options. 1. Horizontal
Alignment : You can set horizontal alignment to Left, Centre, Right, etc.
!! Left: Aligns the cell contents to the left side of the cell.
!! Center: Centers the cell contents in the cell.
!! Right : Aligns the cell contents to the right side of the cell.
!! Fill : Repeats the contents of the cell until the cell’s width is filled.
!! Justify: Justifies the text to the left and right of the cell. This option is
applicable only if the cell is formatted as wrapped text and uses more than
one line.
Vertical Alignment
You can set Vertical alignment to top, middle, bottom, etc.
!! Top: Aligns the cell contents to the top of the cell.
!! Center: Centers the cell contents vertically in the cell.
!! Bottom: Aligns the cell contents to the bottom of the cell.
!! Justify: Justifies the text vertically in the cell; this option is applicable only
if the cell is formatted as wrapped text and uses more than one line.
Merge Cells
MS Excel enables you to merge two or more cells. When you merge cells, you don’t
combine the contents of cells. Rather, you combine a group of cells into a single
cell that occupies the same space. Choose Merge & Center control on the Ribbon
is simpler.To merge cells, select the cells that you want to merge and then click the
Merge & Center button. Choose Alignment tab of the Format Cells dialogue box to
merge cells. The Home » Alignment group » Merge & Center control contains a
drop-down list with these additional options:
!! Merge Across: When a multi-row range is selected, this command creates
multiple merged cells—one for each row.
!! Merge Cells: Merges the selected cells without applying the Center attribute.
!! Unmerge Cells: Unmerges the selected cells.
Modifying Comment
!! You can modify the comment you entered before as below.
!! Select the cell on which comment appears.
!! Right-click the cell and choose Edit Comment from available options.
!! Modify the comment.
Redo Changes
You can again reverse the action done with undo in Excel by using the Redo command.
We can redo changes in 2 ways.
!! From the Quick access tool-bar » Click Redo
!! Press Control + Y
12.15 Functions
Notes A B C D E F
1. Profit and Loss
2. 2005 2006 2007 2008 Totals
3. Income 25,000 30,000 33,000 34,650 122,650
4. Costs 15,000 18,000 19,800 20,790 73,590
5. Pre-Tax Profit 10,000 12,000 13,200 13,860 49,060
6. Tax 3,000 3,600 3,960 4,158 14,718
7. After-Tax Profit 7,000 8,4000 9,240 9,702 34,342
8.
The IF Function
Another, slightly different function is IF, which lets you test whether something is
true or not and take different action as appropriate. This next example shows you
how it works.
238 Unit 12: MS Excel
Uttarakhand Open
What would happen if, in 2008, there was an exceptional Costs bill of ` 35,000 (for
University
new equipment or premises, for example). Income is only ` 34,650 so the business
would make a small loss.
1. Type a new Costs figure of 35000 into cell E4 and press <Enter>
Notes
ote that the Pre-Tax Profit is correctly shown as negative. However, the Tax
N
figure is also negative - as if the tax collector was giving the business money
for making a loss. This does not usually happen! To make the model behave
correctly, you need to alter the formula in the 2008 Tax cell E6:
2. Move to E6
3. Type =IF(E5>0,E5*taxrate,0) and press <Enter>
This means that if the contents of E5 (the Pre-Tax Profit) are more than (>)
zero, the tax paid is equal to 30% of Pre-Tax Profit, otherwise, the tax is zero.
This produces a zero tax figure when the Pre-Tax Profit is in fact a loss. This
example should teach you that spreadsheet models, even if they behave correctly
in most circumstances, may break down under special conditions.
4. Copy the new formula from E6 into D6 to B6 by dragging the cell handle
backwards
5. Reset the original formula in E4 - move to E3 then drag the cell handle down
to E4.
Chart Chart
Wizard:
Wizard:
While plotting a graph, it is easy to first select the data to be plotted. It is important
to include the column and row headings (if there are any) as these are used for the
category (x) and value (y) names.
To select non-adjacent areas, you first drag through one area and then use control
select (hold down <Ctrl> as you drag through further areas).
1. Select the required data area - cells A2 to E7 (i.e., missing out the Totals and
main heading)
2. Click on the Chart Wizard button
The Chart Wizard takes you through four steps before it draws the graph. These
allow you to change the default settings if you want. The stages are:
(i) Step 1 - Chart Type
There are 14 different standard types (plus a further 20 built-in custom
types) to choose from. The default is for a column chart, of which there
are 7 sub-types. To preview a particular chart, a Press and Hold to View
Sample button is provided.
3. Click on [Next>] to select the default Column graph
(i) Step 2 - Chart Source Data
4. If you did not previously select the data, type A2:E7 as the Data range:
The sample chart shows Income, Costs, etc., along the x-axis, with the various
years shown by different coloured bars. To graph by Year:
5. Change Series in: from Columns to Rows - press <Enter> or click on [Next>]
(i) Step 3 - Chart Options
This allows you to change many different options on your chart. Use the Titles
tab to add titles to your graph:
6. Click in the Chart title: box, then type Financial Statistics 2005/08 - press <Tab>
7. In the Category (X) axis: box type Year - press <Enter> or click on [Next>]
(i) Step 4 - Chart Location
The final step of the wizard asks whether the chart is to be placed on a separate
chart sheet or as an object on the current worksheet. Often it is better to separate
out charts from the rest of your work but, here, accept the default:
8. Press <Enter> or click on [Finish]
240 Unit 12: MS Excel
Uttarakhand Open
Your graph should now appear in the centre of the screen, as below:
University
Notes
Chart
Chart Type:
Type:
There are over a hundred different styles of graph which Excel can produce. To
change the type, use the list arrow attached to the [Chart Type] button on the Chart
Toolbar. This appears automatically when a chart is active (on a chart sheet or when
clicked on a worksheet). If the toolbar is not displayed, it can be switched on via
the View menu - choose Toolbars and then Chart. Using the mouse, select some of
the different chart types shown, to see what is available.
3-D Rotation
Excel allows you to rotate a 3-D graph to whatever angle and pitch you require,
which can be very useful when some data values are hidden behind others. The
procedure is as follows:
1. Change the chart to a 3D-Area Column (the middle graph in the third row)
Sadly, the Profit figures are hidden by the Income and Costs. To rectify this:
Apply Borders
MS Excel enables you to apply borders to the cells. For applying border select the
range of cells Right Click » Format cells » Border Tab » Select the Border Style.
Then you can apply border by Home Tab » Font group »Apply Borders.
Apply Shading
You can add shading to the cell from the Home tab » Font Group » Select the Color.
If you want to print a copy of a worksheet with no layout adjustment, use the Quick
Print option. There are two ways in which we can use this option.
Notes
!! Choose File » Print(which displays the Print pane), and then click the Print
button.
!! Press Ctrl+P and then click the Print button (or press Enter).
12.20 Summary
!! MS-EXCEL is a very powerful and easy-to-use spreadsheet package; perhaps
the most commonly used these days. It is a member-application included
in MS Office suite. It works very well with numbers and their complex
calculations.
!! Spreadsheets were originally developed for book keeping; however, they are
also useful for scientific calculations, data manipulation and for producing
graphs. Microsoft Excel includes some statistical functions, but for serious
research work a specialized package should be used. Excel can also sort
and select data; however, for large amounts of data or more complex tasks,
a database program should be used instead.
12.21 Glossary
!! Cell: A Cell is a box at the intersection of a row and a column in a worksheet
where data is stored.
!! Column: Columns are combination of all the vertical cells joined together
in a single vertical line.
!! Row: Rows are combination of all the horizontal cells joined together in a
single horizontal line.
!! Workbook: It is a group of worksheets, which can be stored as a unit. A
workbook is stored on the disk in the form of a file with extension .xls.
!! Worksheet: It is the working area of MS-Excel. Each worksheet of a single
244 Unit 12: MS Excel
Uttarakhand Open
workbook has its own identity and is separate from other worksheets.
University
!! Workspace: It is the working area of MS-Excel where workbooks,
worksheets and other related objects may be opened and manipulated.
Notes
12.22 Answers to Check Your Progress
1. Microsoft Excel
2. Spreadsheet
3. Cell
4. Columns
5. horizontal line
6. Workbook
7. worksheet
8. MailMerge
9. Autosum
10. Excel
11. Active
12. Tools
13. cell
14. Edit
15. Tools
12.24 References
1. J. K. Shahjahan, MS Office 2000, Excel Books
2. Sanjeev Gupta and Shameena Gupta, Computer Aided Management (Using MS-Office
2003 Tools), Excel Books
3. Joseph W. Habraken, Microsoft Office 2003 All-In-One, Que Publishing
4. Jennifer Ackerman Kettell, Guy Hart-Davis and Curt Simmons, Microsoft Office 2003:
The Complete Reference, McGraw-Hill Professional
5. Laurie Ann Ulrich, How to Do Everything with Microsoft Office 2003, McGraw-Hill
Professional
Structure Notes
13.0 Introduction
13.1 Unit Objectives
13.2 MS PowerPoint
13.3 Creating a New Presentation
13.4 Saving a Presentation
13.5 Changing the Bullet Point Character
13.6 Changing the Layout to Include a Picture
13.7 Adding Drawings and Pictures
13.8 Applying a Slide Design
13.9 PowerPoint Views
13.10 Moving through the Slides
13.11 Deleting Slides
13.12 Changing the Order of Slides
13.13 Creating Notes Pages
13.14 Running the Presentation
13.15 Animating your Presentation
13.16 MS Access
13.17 Find and Apply a Template
13.18 Create a Database from Scratch
13.19 Open an Existing Access Database
13.20 Get Started Using Your New Database
13.20.1 Add a Table
13.20.2 Paste Data from Another Source into an Access Table
13.20.3 Import or Link to Data from Another Source
13.21 Import Data from a Spreadsheet or Other Program
13.22 Use an Earlier-version Database in Several Versions of Access
13.23 Summary
13.24 Glossary
13.25 Answers to Check Your Progress
13.26 Terminal and Model Questions
13.27 References
13.2 MS PowerPoint
Microsoft PowerPoint is widely used for making professional quality presentations
in a variety of formats, including on-screen computer slide shows, black-and-white
or colour overheads, and 35mm slides. You can also use it for notes and class
presentations. In addition, PowerPoint can be used as a drawing package for preparing
pictures, forms, posters and leaflets.
Starting PowerPoint
To load PowerPoint:
1. Open the Start menu, select All Programs then Microsoft Office and finally
Microsoft Office PowerPoint.
Drag the PowerPoint icon from this menu onto the Desktop to give yourself a direct
link next time you want to run the software.
Notes
Fig. 13.1:
!! File Tab: This tab opens the Backstage view which basically allows you to
manage the file and settings in PowerPoint. You can save presentations, open
existing ones and create new presentations based on blank or predefined
templates. There are other file related operations that can be executed from
this view too.
!! Ribbon : The ribbon contains three components:
Tabs: They appear across the top of the Ribbon and contain groups
of related commands. Home, Insert, Page Layout are example of
ribbon tabs.
Groups: They organize related commands; each group name appears
below the group on the Ribbon. For example group of commands
related to fonts or group of commands related to alignment, etc.
Commands: Commands appear within each group as mentioned above.
!! Title Bar: This is the top section of the window. It shows the name of the
file followed by the name of the program which in this case is Microsoft
PowerPoint.
!! Slide Area: This is the area where the actual slide is created and edited. You
PowerPoint offers a host to tools that will aid you in creating a presentation. These
tools are organized logically into various ribbons in PowerPoint. The table below
describes the various commands you can access from different menus
Besides these depending on the objects selected in the slide, there are other menu
tabs that get enabled.
Title Box
This is typically found on slides with title layout and in all the slides that have a title
Subtitle Box
Notes This is found only in slides with Title layout. This is indicated by “Click to add
subtitle”.
Content Box
This is found in most of the slides that have a placeholder for adding content. This
is indicated by “Click to add text”. As you can see, this box allows you to add text
as well as non-text content. To add text to such a box, click anywhere on the box,
except on one of the content icons in the center and start typing.
A slide design template can make your presentation look more professional. The
default design uses black text on a white background. This is somewhat boring and
simple, but good for accessibility. One of the best aspects about PowerPoint is that
you can create slide masters and then save them as templates to be reused later. There
are different aspects of a design which can be created and saved to ensure you can
reuse the hard work you spent on creating the first copy. Given below are the steps
to save design templates.
Step (1): Create a new design template from the Slide Master view. Depending
on your needs, this template could have different colors, images, logos or symbols
included in the master slide and the layout templates.
Step (2): Go to Edit Theme group under the Slide Master ribbon.
Step (3): Navigate to Edit Themes > Themes > Save Current Theme
Step (4): In the Save Current Theme dialog, enter the Theme name and click Save.
Step (5): This template is now saved and available on your PowerPoint design
template view to be applied to any presentation.
Fig. 13.2:
From the View menu, there are also the following options:
!! Slide Show runs the presentation, similar to the button, but from the first slide.
!! Notes Page gives a view with more space for speaker’s notes under the
slide. Here, you can type up exactly what you plan to say for each slide.
The notes can then be printed out so you have them to consult while giving
an actual presentation.
!! Zoom... changes the magnification—Fit displays the whole slide in the
available space.
If you are preparing a presentation and have trouble seeing the text, use the Zoom...
Feature here (or the [Zoom] button) to increase the slide magnification.
Slide Transitions
Instead of simply moving abruptly from one slide to another during a presentation,
slide transitions allow slides to dissolve into each other, using a variety of different
special effects. These can make your on-screen presentation look even better and
more professional, but do not get too carried away!
1. Check you are in Normal view and that the first slide is selected.
2. Open the Slide Show menu and choose Slide Transition.
3. Under Apply to selected slides:, choose Blinds Horizontal.
As you select a transition, PowerPoint quickly shows you what it will look like
on the miniature version of the slide. Try out some of the other transitions, if you
like. Note that a small star symbol appears on the left of each miniature—this
indicates that a transition has been setup on this slide. Next, explore the other
useful options in the Slide Transition window:
4. Under Modify transition, change the Speed: of the transition effect (e.g., choose
Medium or Slow to see the effect clearly) and set up a Sound.
5. If you do not want to click on the mouse every time to move on, under Advance
slide, set the next slide to appear Automatically after a set number of seconds.
6. Move to the next slide and repeat steps 3 to 5, choosing different effects.
7. Finally save your presentation (press <Ctrl s>) then run it (<F5>) to see the
effects—press <Esc> when you’ve seen enough.
The [Apply to All Slides] button applies the same transition throughout your
presentation. Using a standard transition is good for accessibility; only choose
something different for effect.
Animation Schemes
PowerPoint offers animation supports which can be used effectively to add some
motion in a monotonous presentation and make it more interesting. Animation can
be applied to any object on the slide and the motions can the automated, timed or
triggered.
Given below are the steps to add and preview animations in the slide.
Step (1): Go to the Animation ribbon and click on Animation Pane to display the
animation sidebar.
13.16 MS Access
Microsoft Access is a database software package. A database is an organized
collection of records. Telephone and address books are examples of paper databases.
With Access, you can create a computerized database. Access 2010 is a database
application design and deployment tool that you can use to keep track of important
information. You can keep your data on your computer, or you can publish to the
Web — so others can use your database with a web browser. Many people start using
Access when the program that they are using to keep track of something gradually
becomes less fit for the task. For example, suppose you are an event planner, and you
want to keep track of all the details that you need to manage to make your events
successful. If you use a word processor or spreadsheet program to do this, you can
easily run into trouble with duplicate and inconsistent data. You can use calendaring
software, but tracking financial information in a calendar is not a good fit.
Start MS Access
When you start Access 2010, you see the Microsoft Office Backstage view, where
you can get information about the current database, create a new database, open an
existing database, and view featured content from Office.com.
Fig. 13.3:
Backstage view also contains many other commands that you can use to adjust,
maintain, or share your databases. Commands in Backstage view generally apply
to entire databases, not to objects inside of a database.
Access provides you with a wide variety of templates that you can use to speed up
your database creation process. A template is a ready-to-use database that contains Notes
all of the tables, queries, forms, and reports needed for performing a specific task.
For example, there are templates that can be used to track issues, manage contacts,
or keep a record of expenses. Some templates contain a few sample records to help
demonstrate their use. Template databases can be used as is, or you can customize
them to better fit your needs. To find and apply a template to your database, do the
following:
1. On the File tab, click New.
2. Under Available Templates, do one of the following:
(i) To reuse a template that you’ve recently used, click Recent Templates,
and then select the template that you want.
(ii) To use a template that you already have installed, click My Templates,
and then select the template that you want.
(iii) To find a template on Office.com, under Office.com Templates,
click a template category, select the template that you want, and then
click Download to download the template from Office .com to your
computer.
ou can also search for templates on Office.com from within Access. In
Y
the Search Office.com for templates box, type one or more search terms, and
then click the arrow button to search.
3. Optionally, click the folder icon next to the File Name box to browse to a
location where you want to create the database. If you don’t indicate a specific
location, Access creates the database in the default location that is displayed
below the File Name box.
4. Click Create. Access creates the database and opens it for use.
Start Access
1. On the New tab in backstage view, click Blank Database or Blank Web
Database.
13.20.1 Add a Table
You can add a new table to an existing database by using the tools in the Tables group
on the Create tab.
Fig. 13.4:
In a web database, only the Table command is available in the Tables group.
Regardless of which view you start in, you can always switch to the other view by
using the view buttons on the status bar of the Access window.
Create a blank table in Datasheet view: In Datasheet view, you can enter data
immediately, and let Access build the table structure behind the scenes. Field names
are assigned numerically (Field1, Field2, and so on), and Access sets the field data
type, based on the type of data that you enter.
1. On the Create tab, in the Tables group, click Table .
2. Access creates the table, and then places the cursor in the first empty cell in
the Click to Add column.
Next Steps
The rest of the design process varies based on your goals, but you probably want to
consider creating queries, forms, reports, and macros. This article does not provide
information about creating additional database objects.
13.23 Summary
!! Microsoft PowerPoint is widely used for making professional quality
presentations in a variety of formats, including on-screen computer slide
13.24 Glossary
!! Title Bar: This is the top section of the window. It shows the name of the
file followed by the name of the program which in this case is Microsoft
PowerPoint.
!! Slide Area: This is the area where the actual slide is created and edited. You
can add, edit and delete text, images, shapes and multimedia in this section.
!! Normal Layout View: This displays page in normal view with the slide on
the right and a list of thumbnails to the left. This view allows you to edit
individual slides and also rearrange them.
!! Slide Sorter View: This displays all the slides as a matrix. This view only
allows you to rearrange the slides but not edit contents of each slide.
!! Notes Section: This section allows you to add notes for the presentation.
These notes will not be displayed on the screen during the presentation;
these are just quick reference for the presenter.
!! Quick Access Toolbar: The Quick Access Toolbar is located just under the
ribbon. This toolbar offers a convenient place to group the most commonly
used commands in PowerPoint. You can customize this toolbar to suit your
needs.
!! Slide Tab: This section is available only in the Normal view. It displays all the
slides in sequence. You can add, delete and reorder slides from this section.
!! Microsoft Access: It is a database software package.
1. PowerPoint
Notes
2. slide design
3. Notes Page
4. Presentations
5. Transitions
6. Automated, timed, trigger
7. database software package
8. database application
9. ppt
10. save
11. MS Access
12. justify
13. Currency
14. Power Point
15. graphic
16. Insert
13.27 References
1. J. K. Shahjahan, MS Office 2000, Excel Books
2. Sanjeev Gupta and Shameena Gupta, Computer Aided Management (Using MS-Office
2003 Tools), Excel Books
3. Joseph W. Habraken, Microsoft Office 2003, All-In-One, Que Publishing
4. Jennifer Ackerman Kettell, Guy Hart-Davis and Curt Simmons, Microsoft Office 2003:
The Complete Reference, McGraw-Hill Professional
5. Laurie Ann Ulrich, How to Do Everything with Microsoft Office 2003, McGraw-Hill
Professional
Structure
14.0 Introduction
14.1 Unit Objectives
14.2 Modes of Data Processing
14.3 Basic Functions of Data Processing
14.4 Application Portfolio Development
14.5 Management of Data Processing Systems in Business Organizations
14.6 Data Processing Cycle
14.7 Data Processing Flowcharting Symbols
14.8 Characteristics of EDP Systems
14.9 Limitations of EDP Systems
14.10 Summary
14.11 Glossary
14.12 Answers to Check Your Progress
14.13 Terminal and Model Questions
14.14 References
14.0 Introduction
The computer processes the data to give information. Processing of data is done by
the CPU in various ways. In this unit we will discuss various types of data processing
techniques, their functions, data hierarchy, data processing cycle and structure.
After going through this unit, you will be able to know about:
!! Various modes of data processing
!! Basic functions carried out in data processing
!! Data hierarchy and data structure
!! Application portfolio of business organization
Organizations generally follow the following types of data processing systems with
the aim of optimizing efficiency. The systems are: Notes
Batch Processing
Also referred to as serial or off-line or sequential processing.
This type of processing requires the data to be initially grouped (as a batch) before
it is processed serially, and the results obtained periodically.
The batch might be a group of sales orders or purchase orders, etc., collected off-line.
The batch is processed at a definite period of time in a stipulated frequency, and each
transaction in batch is processed in a serial order.
The method of batch processing reduces the idle time of a computer system because
transition from one job to another does not require operator intervention.
It is the most appropriate method of processing for many types of applications, such
as payroll or preparation of customer statements, where it is not necessary to update
information (records) on daily basis.
Batch processing suffers from several disadvantages which are as follows:
!! Reduces timeliness in some cases.
!! It makes each job wait in line at each step and often increases its turnaround
time.
!! It is difficult to provide the desired priority scheduling.
On-line Processing
On-line processing is that type of processing where the result of data processing
transaction is available immediately.
It permits transaction data to be fed under CPU control directly into secondary on-
line storage devices from the point of origin without sorting it first.
It also permits users to enter into a conversation with the computer to send and receive
messages, within a fraction of a second after the enquiry message is transmitted.
This conversation permits the user to process transactions one after another with
greater assurance that the actions taken by the computer are correct. This type of
processing also provides a satisfaction to the users that they are able to command the
machine. However, this type of processing can not be used in all circumstances as
otherwise the processing time will increase. Examples of online applications include:
Banking, stock exchanges, stock control, work progress control in plants, inventory
status, etc.
Origination
The first function involved in the processing of data is the origination of the data to
be processed.
Specifically, the nature, type and origin of the source documents must be determined,
such as sales orders, purchase orders, etc.
Data Capture
Data must be recorded or captured in some form or the other before they can be
processed. What data are important and should be collected for input and processing
depends upon the organization and the system.
Data may be captured in paper forms using source documents and in paperless forms
through:
!! Keyboards
!! Automated teller machines
!! Other direct input devices that accept input data in machine readable form
Sorting
Normally, it is easier to work with data if they are arranged in a logical sequence,
e.g., first to last time sequence.
Biggest to smallest.
Oldest to newest, etc.
Arranging classified data in such a sequence is called “sorting”.
Merging
This function allows multiple files to be put together in a sequence, provided the
files are already in a sorted order.
E.g.: A file of a new customer could be merged into an existing customer master file
that is stored on a magnetic disk in customer number sequence.
Calculating
The arithmetic manipulation of data to create meaningful results is known as
calculating, and is a common data processing task.
This process is usually the most significant part of the manipulation operation because
the results are generally provided as part of the output.
Self-Instructional Material 281
IT and Management Summarizing
Information System
Reducing masses of data to a more concise and usable form is called summarizing.
Generally, the data is summarized into the form desired for output.
Notes E.g.: Pie charts
Bar charts
Other graphs
These are the few of the many of computer generated graphics that are used to view
data at a glance.
Output
After the various operations on the data are completed, the delivery or communication
of the information or results must be carried out by:
1. Reporting, which is the format presentation and distribution of processed data.
2. Issuance of documents, such as cheques, invoices, and reports.
3. Retrieval, which is the fetching of a specific item or items of stored information
at the request of a user.
4. Analysis, which encompasses all of the ways in which the receivers utilize
output, i.e., use the information provided by the system.
5. Communicating and reproducing (transmission).
Transferring data from one location or operation to another, for use or further
processing, is data transmission, a process that continues until information in a
usable form reaches the final user. Sometimes, of course, it is necessary to copy or
duplicate output documents.
Storage
Finally, the results of the processing of data must be retained for future use of
reference. This function is called storage.
Business Organizations
In a typical business organization the data processing system maybe fairly complex. Notes
Managing the system is the key factor that determines the success of the organization
as a whole. The structure of the management depends on the size and complexity of
the system. There may be systems simple enough to be managed by a single manager,
while in some cases an entire department maybe involved. In a typical scenario the
organization of the data processing system consists of:
1. EDP (Electronic Data Processing) Manager
2. System Programmers
3. Application Programmers
4. Auditors
5. Maintenance Engineers
6. Database Administrators, etc.
In general, following are the responsibilities of the data processing manager:
1. Identifying the need of acquisition of new technology including hardware and
software.
2. Evaluating the same.
3. Procuring the approved technology.
4. Providing the EDP services to all the users in the organization according to
their needs.
5. Adding new features of processing and removing obsolete ones.
6. Incorporating new business rules and providing required interfaces to the users.
7. Accounting for the usage of the resources.
8. Ensuring the availability of the system by scrutinising and by taking corrective
measures in case of any breakdown.
Notes
Data
DataAcquisition
Acquisition
Data Input
Data Input
Validation
Validation
Data/Information
Data / Information
Storage
Storage
Data
DataManipulation
Manipulation
Retrieval
Retrieval
Disposal
Disposal
Output
Output
Communication
Communication
Archive
Archive
Process
Process
End
End
Fig. 14.1
Data Acquisition: Data processing (Electronic or otherwise) begins with the act of
data acquisition. The manner which data is acquired depends on the nature of data
source. The data source could be as simple as a printed paper or a computer magnetic
disk and as complex as a thermal photograph or recorded voice.
Data Input: The data thus received is not always ready in the form suitable to store
and/or process further. Therefore, the acquired data is put into a recognizable format,
such as a document, spreadsheet, database or slideshow electronically or manually.
Validation: Whenever data is acquired there is a possibility of errors entering into
the data. An incorrect data can never generate correct result. Therefore, data should
be checked to see that it is correct. Moreover, it is also important to ensure that the
Fig. 14.2
A practical example of data processing cycle is presented below. This data processing
Notes
2 4
1
3 5
7 N
6
8 9
10
Fig. 14.3
1. Application forms – both hard copies and e-mails.
2. Manual collection of hard copy of applications.
3. Automatic collection through web-site forms.
4. Manual validation to ensure that the applicants have filled in all the required
fields correctly.
5. Automatic validation for the input.
6. The condition “VALID?”
7. If the printed application form is invalid dispose it off manually/electronically.
8. Automatic data entry into storage.
9. Manual data entry.
10. The storage.
14.11 Glossary
!! Batch Processing: Processing that requires the data to be initially grouped
(as a batch) before it is processed serially, and the results obtained
periodically.
!! Online Processing: Processing where the result of data processing
transaction is available immediately.
!! Real Time Processing: Data processing system in which the time interval
required to process and respond to input is so small that the response itself
is useful for controlling the physical activity of a process.
!! Distributed Data Processing: Data processing which involves a computer
system linked by a communication network where processing is performed
by separate computers.
!! Sorting: Arranging the data in a local sequence.
!! Bit: Representing numeric value 0 to 1.
!! Byte: Basic unit of information, generally stored by using 8 bits.
292 Unit 14: Management of Data Processing Systems in Business Organization
Uttarakhand Open
!! Field: One or more bytes that contain data about attributes of an entity.
University
!! Record: A collection of fields relating to a specific entity.
!! File: A collection of related records.
!! Database: Collection of all files of an organization. Notes
!! Data Structure: A class of data that can be characterized by its organization
and the operations that are defined on it.
!! Application Portfolio: A compilation of information about the organization’s
investment in its IT- based application infrastructure.
14.14 References
1. Ramesh Bangia, Business Systems, Laxmi Publications
2. Robert J Thierauf, Data Processing for Business and Management, John Wiley & Sons
3. Elias M. Awad, Business Data Processing, Prentice-Hall
4. Gershon J. Wheeler, Donlan F. Jones, Business Data Processing: An Introduction,
Addison-Wesley Publishing. Co.
5. Barbara J. Burian and Stuart S. Fink, Business Data Processing, Prentice-Hall
Block - IV
Block Title : Networking
Programme Coordinator
Dr. Manjari Agarwal
Assistant Professor
Department of Management Studies
Uttarakhand Open University
Haldwani
Editor(s)
Er. Sumit Prasad Er. Subodh Prasad
Assistant Professor Assistant Professor
Department of Management Studies Department of Information Technology
Uttarakhand Open University College of Technology
Haldwani G.B. Pant University of Agriculture & Technology
Pantnagar
ISBN : 978-93-85740-12-1
Copyright : Uttarakhand Open University
Edition : 2016 (Restricted Circulation)
Published by : Uttarakhand Open University, Haldwani, Nainital - 263 139
Printed at : Laxmi Publications (P) Ltd., New Delhi
DUO-8154-50.74-INFO TECH MGMT INFO B-IV
CONTENTS
Structure Notes
15.0 Introduction
15.1 Unit Objectives
15.2 Local Area Networks (LAN)
15.3 Metropolitan Area Networks (MAN)
15.4 Wide Area Networks (WAN)
15.5 Routing
15.5.1 Gateways or Routers
15.5.2 Repeater
15.5.3 Bridges
15.5.4 Routing Techniques
15.6 Network Topology
15.6.1 Star Topology
15.6.2 Ring Topology
15.6.3 Bus Topology
15.6.4 Mesh Topology
15.6.5 Tree Topology
15.7 Transmission Technology
15.8 Protocols
15.9 Summary
15.10 Glossary
15.11 Answers to Check Your Progress
15.12 Terminal and Model Questions
15.13 References
15.0 Introduction
A network can be defined as the interconnection of two or more systems.
The minimum number of systems required to make a network is two.
Computer systems connected in a network can exchange information between
themselves and share the use of hardware devices connected such as the printer, etc.
A system with one main controlling unit known as the master and many slave
terminals is not a network.
Notes
15.3 Metropolitan Area Networks (MAN)
A metropolitan area network uses the distributed queue dual bus. The metropolitan
area network is larger than a LAN and it may cover areas as large as a city. The
distributed queue dual bus system consists of two buses connected to all the
computers.
The Figure below depicts the two buses connecting three nodes.
The dual bus helps the transmission of data in both directions simultaneously. Data
going up uses Bus A and data going down uses Bus B.
Suppose information has to be passed from terminal 3 to 1, it will use Bus A and if
a reply has to be sent back ( from 1 to 3) it will use Bus B.
A wide area network connects computers which are very remotely placed. It may
connect across the countries or continents or the entire globe. Wide Area Networks
are also referred to as Long Haul Networks (LHNs).
Wide area networks can either be point to point type or broadcast type. In a point
to point type network, the source and the destination machines are connected to
each other via several intermediate routers. A point to point type network may be
Subnet Host N
Host 1
Transmission
lines
Routers Host 2
15.5 Routing
15.5.1 Gateways or Routers
Gateway is one of several types of communication servers. The function of a gateway
Notes
is to allow two or more dissimilar networks to communicate as a single logical
entity. The two machines that have to transfer data between themselves may have
different operating systems (OS) or their transport protocols may be different. It is
then the job of the gateway to connect such machines. Gateways, in general, are
also called routers. It may be possible that exist several routers between the source
and the destination machine. When a packet of data is transmitted from one router
to another it is stored in the intermediate router until the communication channel is
free and then it is forwarded.
15.5.2 Repeater
A repeater receives the incoming signal, repeats it or amplifies it and retransmits the
transformed signal. After certain distances the signal experiences a loss of power
hence a repeater is required to boost the power of the signal. By using repeaters
the network can be extended but only finite extension is possible due to physical
constraints such as noise. As the signal travels a certain distance some form of
disturbance (referred to as noise) is added to it. When the repeater amplifies the
signal the noise also gets amplified, hence over a large distance it may be possible
that the signal becomes unrecognizable.
15.5.3 Bridges
A bridge is a device that is used to connect two networks so that they are able to
perform as one. A bridge can also be used to connect two networks that use the same
technology, such as the Ethernet network and the Token Ring network. One of the
main functions of the bridge is to partition one large network into two networks
which subsequently increases the performance of the network.
We shall try to explain the functioning of a bridge with the help of the following
example.
Nodes 1, 2 and 3 are connected to LAN 1 and nodes 4,5,6 and 7 are connected to
LAN 2
Suppose node 1 on LAN 1 wishes to communicate with node 6 on LAN 2. The data
packet transmitted from node 1 on LAN 1 contains the address of node 6 on LAN 2.
When the data packet is received by the bridge node it is checked for its address. If
node 6 was connected to LAN 1 the bridge would not have broadcast the message to
the other side, i.e., LAN 2, and would have left the message alone. But, in this case,
the bridge transmits the message to LAN 2 from where node 6 collects it.
Thus, as it is evident from the example, the bridge has partitioned the network into
two and it is acting like a traffic policeman controlling the flow of traffic across an
intersection.
Circuit Switching
Circuit switching is analogous to a simple telephone call. A physical circuit is
established between the two machines. Once the connection is established, the data
transfer takes place and then the connection is released. Now, another location can
be dialled and a new circuit can be established. The transfer of data using this type
of switching technique is very fast but it is error prone. It is the responsibility of the
user to check for errors and the integrity of the data.
Packet Switching
A Packet switching network divides the data to be transmitted into packets which
are of a fixed size and carry error checking information with them. Each packet of
data contains the address of its final destination when it is transmitted. As the packet
moves through intermediate machines, it is inspected for its address and is accordingly
routed to another intermediate machine. Messages being transmitted through this
type of network are less error prone than those transferred through circuit switching
networks. In case a particular packet is found corrupt on arrival, the destination
machine can request the source machine for its retransmission.
Message Switching
In a Message switching network, the message as a whole is transmitted, i.e., it is
not divided into packets. Each message contains the address of its final destination
and it is upto the intermediate machines as to what path they want the message to
go through. The message switching network is a store and forward network. Once
the message arrives at an intermediate machine it is stored in the machine until the
output line is free, and then transmitted. In case of heavy traffic on the transmission
line, the messages are queued up and accordingly dispatched when their turn comes.
One very important advantage of this type of network topology is that in case any
one node is faulty or is having problems, it can be isolated from the network without
affecting any other terminal.
The star topology is the most commonly used network topology in data communication
today. The performance of the system is good for moderate load. However, when
traffic is high, the system may have some problems.
A disadvantage of star topology is that two terminals can’t interact directly, i.e., they
have to go via the central computer. This leads to no privacy in the network.
Another disadvantage is the network’s dependence on the main (central) computer.
If the central computer breaks down the entire network stops functioning.
Node 7 Node 3
There is no concept of a central computer in this case. The data is divided into packets
when transmitted and each packet contains the address of the node that it is destined
for. Unlike the star topology, this type of network requires lesser amount of cable
and there are not much of installation problems either.
The biggest disadvantage of this type of topology is that the failure of one node may
lead to the failure of the entire network. Since data from the source node passes
through a series of nodes before reaching the destined node, the failure of even
one node may lead to the network failure. However, the use of a bidirectional ring
(data transfer in both directions is possible) can temporarily solve this problem by
choosing a path that does not contain the faulty node. Unlike the star topology, it is
relatively difficult to diagnose the faulty node in the ring network.
If the star topology provides less privacy, the ring topology provides zero privacy.
However, the ring topology provides a better performance under heavy traffic as well.
It is also easy to add or remove terminals in a ring network which is not as easy in
the case of a star network as only a certain specified terminal can be inserted into
the central computer.
BUS
Each node is given a unique address. Information containing the address of the
destined node is available at all the nodes but only the node with the specific address
responds. The bus can transmit data in both directions.
If one node of the network goes faulty, the network can still remain working. However,
the fault diagnosis of such a system is very difficult as each and every node has to
be tested to find the faulty one. Once the fault is found, the computer node having
the fault is usually not disconnected from the network, but repaired on the spot.
The bus network topology is easy to extend as only new nodes have to be added along
the bus. However, for a larger network, signal amplifiers known as repeaters may be
used to strengthen the signal. The cable length and the installation do not pose much
of a problem as the cable length required is short as compared to other topologies.
Notes
Node 3 Node 2
Node 4
To save on the cost of interconnections and to reduce the complexity of the system,
we can make use of the hybrid mesh network. In this type of network, some of the
main or more frequently used networks are connected to each other like a mesh
network. The computer terminals are attached to these main terminals.
Node 1 Node 2
Main 1
Main 2 Main 3
Node 4
Node 6 Node 3
Node 5
Node 4
15.6.5 Tree Topology
The tree topology requires the computers to be linked in a hierarchical way. Data
transmission in this topology is relatively slow. The packets carrying the addresses
of the destination nodes should have the complete address, i.e., all the nodes above
it in hierarchy also have to be mentioned.
MAIN
Node 6 Node 1
Node A
Node E Node F
Node G
Broadcast Networks
In this type of network, a single communication channel is shared by all the machines
in the network. A packet of data to be transmitted contains the address of the
destination machine. A broadcast network is very similar to a railway announcement
Self-Instructional Material 305
IT and Management system. When a particular train departure is announced, everyone present at the
Information System
station hears it, but only those who have to board the train respond to it. The Bus
and the Ring Topology are examples of Broadcast Networks.
Notes
Point to Point Networks
As the name suggests, the machines are connected point to point. Data is routed
from the source machine to the target machine via intermediate machines or directly.
Node
Node33 Node
Node 11 Node 22
Node
LAN
LAN
Router
Router
Router
Router WAN
WA N Router
Router
LAN
LAN
Node 44
Node
Node 66
Node Node 55
Node
15.8 Protocols
A protocol is a set of rules according to which the communicating computers
communicate. If I wish to communicate with you, I can do so with the help of a
commonly understood language, let’s say English. However, if I can speak only
French and you can understand only English then communication between us is going
to be very difficult unless a third person volunteers to step in and act as a translator.
Similarly, for computers to communicate, a common set of rules or protocols must be
defined. The most common protocol used in networking is the TCP/IP (Transmission
control protocol/Internet protocol). The Internet is predominantly based on TCP/IP.
Layers
The networks are organized as a series of layers. Each layer has a specific function
depending upon the protocol being followed.
Each layer provides certain services to the higher layers. How the offered services
are being implemented is not known to the higher layer.
Shown below in the figure is a 3-layer network. The layer ‘n’ on one machine is
called a ‘peer’ of layer ‘n’ on the other machine. In other words, the corresponding
layers on the two communicating machines are called peers. It may seem from the
figure that data transmission takes place between corresponding layers between the
two machines, but it is not so. The actual data transmission takes place through the
physical medium.
The layers on the transmitting machines add some control information to the data that
is to be transmitted and pass it down to the lower layer. The lower layer again adds
some more control information (e.g., it attaches a header to identify the sequence of
the data packet) and passes it down to the next lower layer. At the receiving end, these
headers are stripped off by the corresponding layers and the data packet is passed
on until it reaches the final layer. Each layer receives and decodes the information
sent by its peer.
File Transfer
To perform a file transfer between two systems, the fundamental requirement is a
common protocol. In this section we shall discuss about file transfer protocol (FTP). The
file transfer protocol (FTP) is an application of the TCP/IP. The file transfer protocol
gives the user an access to a remote machine file system. The user once given access
can browse, upload or download files. The user needs an FTP client application and the
remote host should have an FTP server component. The FTP client application enables
the user to send commands to the FTP host. The FTP server component processes these
commands and performs the necessary action. The FTP is also an Internet tool, since
the Internet uses the TCP/IP. Thus, the file transfer protocol can also be used to copy
files from an Internet site or for uploading a file to a remote net server.
Electronic Mail
Electronic mail is a fast and efficient method to exchange messages and other data.
To interact through the electronic mail one needs to have an e-mail account. Once
the account is created the user is assigned an electronic mail box. The user can send
messages to other users through his mail account and can receive incoming messages in
his mailbox. The messages are instantly delivered and it is not necessary for the recipient
to be present while the mail is delivered to his mailbox; he/she can scan the mail later.
The electronic mail system allows a very easy merging of a particular message.
Just typing the e-mail user names of all the recipients would deliver the message to
each of them. Moreover, the user can put a restriction to the delivery of messages.
It is also at the user’s discretion as to which sender’s message he wants to receive
in his mail box.
POP Mail
POP mail services store your incoming messages on a server and you download
the messages using an e-mail software package (Eudora, Netscape messenger,
Outlook express, etc.). Once they are downloaded, the messages are stored
on your PC. POP mail services are similar to the e-mail service offered by most ISP’s.
Advantages
1. You can work offline, compose or read messages, and just connect to send mail
or download new messages.
2. The mail program used by your browser (Outlook express for Internet explorer,
Netscape messenger for Netscape) can be configured to receive and send all
your e-mail automatically. This is very useful when you are browsing the net
and find a link to an e-mail address where you want to send any mail. With the
mail program properly configured, you can send the mail immediately without
going to your web based e-mail service providers’ site.
3. Since all messages are stored on your computer after you download them, you
can refer to them at any time without connecting to the Internet and easily cut
and paste the information into other applications.
4. Once downloaded, the messages can be automatically deleted from the server.
Thus, only new messages would be available each time you connect to receive
your mail.
5. You can also use powerful and intelligent e-mail software, which may
include spelling check options, clever filtering options and all kinds of other features.
Disadvantages
1. The biggest disadvantage of POP mail is that you can not access your e-mail
while “on the road”, i.e., on another computer since you need the e-mail software
configured for it.
2. If you sign up with a free POP mail service, you can generally expect to receive
unwanted advertisements or spam mails in your mailbox.
3. The signing up and setting up procedure is not as easy as a web based e-mail
but once configured you will find it easy to download and send mail.
Advantages
1. You can easily log in and collect your e-mail from any web browser.
2. There’s no need to configure any program in order to access e-mail.
3. It is easier to register and no setup is required.
Disadvantages
1. It is time consuming, i.e., you got to go to the e-mail providers’ site, log in,
wait for all your messages to show up; then read each message individually
and stay connected on the net while you do so. All this requires a lot of your
time and consequently money on the connection.
2. Many web-based services take advantage of advanced functions such as Java in
order to provide an attractive interface. You will therefore, need to have latest
web browsers in order to keep your range of options open (generally you need
Netscape 3.x or better or IE 3.x or better).
3. Most web-based services cannot match the functionality of a good
e-mail package. Some common problems are server down, high traffic, etc.
(making access slow and reading and sending mail difficult & time consuming).
4. Advertising banners rotate as you read your e-mail. This can increase your
access time.
Advantages
1. E-mail forwarding services let you continue use your existing e-mail account
given to you by your ISP. If you change the ISP at any time, just change
the e-mail address your e-mail is forwarded to, and it will automatically be
redirected to your new address.
Disadvantages
Notes
1. With an e-mail forwarding service, you are putting another layer between the
sender and your email account. This means that you are twice as exposed to
network problems; if either the forwarding service or your e-mail account is
down, the e-mail will not get through.
2. Generally, mail forwarding services make money by gluing a small advertisement
at the top or bottom of each e-mail message they forward (or sometimes both).
List of free e-mail service providers.
POP Mail
1. Amex Mail (www.amexmail.com)
This service is provided by USA.NET
2. Crosswinds (http://home.crosswinds.net)
Free POP mail address and free web space (unlimited for personal sites, 25MB
for business sites). You cannot use your free e-mail address to run a mailing
list. Not very reliable and server remains down at times.
3. Newmail (www.newmail.net)
Newmail offers web-based and POP mail services, plus 5MB of space for storing
messages and address books, filters, etc. Does not offer SMTP.
4. PeachWorld Network(www.peachworld.com)
You can send/receive messages up to 1.5MB here.
5. POPAccount(www.popaccount.com)
Free web-based and POP mail service with no advertisements attached to POP
mail messages.
6. SoftHome(www.softhome.net)
I am personally using this service for the last 6 months and have had no problems
whatsoever. Also till date their has been no spam mail in my inbox.
7. ForFree(www.forfree.at)
Very fast-loading site; provides free POP3/SMTP e-mail, as well as free site
hosting (5MB) and free mailing list services.
8. Freemail(www.freemail.everperfect.com)
Does not display advertising in messages.
9. Friendly E-mail (www.mypad.com)
Also offers free web-based e-mail and a choice of over 3 dozen different domain
names.
Self-Instructional Material 315
IT and Management 10. HotPop(www.hotpop.com)
Information System
Free POP mail. MIME format supported. There are no ads in the messages;
instead HotPop will send you separate advertisement from selected advertisers.
Notes You can also forward e-mail to an existing account. HotPop comes with a choice
of domain names. HotPop filters spam before it hits your mailbox.
Web-based E-mail
Most of you maybe using this service and may know lot of free e-mail providers
but here is my own list:
1. MrPost (www.mrpost.com)
Special service enables you to add web-based e-mail to your own site FREE
of charge. Also offers web-based instant messaging and chat.
2. MyOwnE-mail (www.myownemail.com)
Over 200 domain names to choose from. Free web-based mail, plus mail
forwarding services at $11.95 per year.
3. MuslimE-mail (www.muslimemail.com)
This free e-mail service also offers free web hosting for muslims and many
other services. Other domain names are available at a premium.
4. GhanaMail (www.ghanamail.com/emurl)
A no-questions-asked web-based e-mail service. All you need to do to sign up
and choose a user name and password.
5. gurlmail (www.gurlmail.com)
Another Who-Where-powered free e-mail service. Gives 4MB storage for
e-mail messages.
6. HotMail (www.hotmail.com)
The largest web-based free e-mail service, now a part of the Microsoft
family. Most of you must be having a HotMail account. If you decide to go for
POP mail after reading this article and do not want to change from Hotmail then
there is a good news for you. Hotmail can support POP-mail-like functionality
through a free third-party utility called CwebMail (available at www.cwebmail.
com).
7. Eudora Web-Mail(www.eudoramail.com)
Free e-mail service
8. Fastermail.com(www.fastermail.com)
Free e-mail service.
15.13 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
8. Manoj Kumar and M. Shamir Bhudookan, Information Technology for ‘O’ Level,
Editions De L’Ocean Indien
16.0 Introduction
The World Wide Web and the Internet have impacted the world including business,
social and political life in the last few years. It is expected that this trend will certainly
continue well into the future too. You must be very much familiar with the term World
Wide Web, which is also known as web or WWW or W3 and has established itself
as the most popular part of the Internet by far. The upper three layers, viz., session,
presentation and application layers are considered as user or application layers of
the OSI models. They are implemented in software. In most of the protocols, the
functions of these layers are converged into a single layer called ‘application layer’.
TCP is one of the examples of such types of protocols. The application layer, the
highest layer of OSI model interacts with software applications which enable source
16.3 Advantages
Many companies have understood the advantages of having a presence on the World
Wide Web and have successfully addressed their corporate objectives by integrating
their website as part of their business strategy. We are aware that a website can
generate awareness of the products and services of the company and provide a global
storefront for the company 24 hours a day with automating many business procedures.
It is relatively inexpensive and versatile for establishing and maintaining a website.
Its interactive feature makes it superior to other advertising media. Below are some
advantages offered by the WWW:
!! Presence on the Web: It enables businesses to be in touch with several million
people who have access to the World Wide Web with more and more added
324 Unit 16: Internet and Intranet
Uttarakhand Open
every day. No business can afford to ignore this many potential customers.
University
!! Networking: It helps in developing lines of communication to enhance
contact with potential clients and organizations. It helps in speedy and
reliable communication and advertisement.
Notes
!! Provide Business Information: It facilitates the websites to publish business
services, hours, location, phone and e-mail for the public to view like any
printed form of advertising. Unlike the conventional advertisement, the
website provides instant communication with information about the business
that may change regularly.
!! Service to Customers: A website provides access to business information
and services to their customers online that may not be available any other
way. The customers can be from anywhere in the world and shop in online
stores like never before and from the comfort of their homes. They can
easily and quickly search the database to locate the exact item that they
were looking for and purchase it online.
!! Conduct Business: A website may provide means of doing business.
!! Provide Files to Download: Details and information of products and
services in the form of pamphlets, brochures, advertisements, and even a
demonstration video can be downloaded from the company’s website.
!! Remote Office Access: It facilitates offices and employees to be in touch
with one another from remote places to accomplish their tasks effectively.
Some of the popular web browsers are Internet Explorer, Mozilla Firefox, Safari,
AOL Explorer, etc. Web browsers belong to HTTP user agent category. Browsers
also provide in accessing information provided by web servers in private networks
or content in file systems.
Web browsers talk with web servers using HTTP (hypertext transfer protocol) to
retrieve web pages. HTTP enables web browsers to provide information to web
servers to retrieve web pages from them. Different web pages have a URL address
starting with http:// for HTTP access. There may be different other URL types and
their corresponding protocols and most of the browsers support them. FTP (file
transfer protocol) is one of the examples of such types. Other examples are rtsp:
for RTSP (real-time streaming protocol) and https: for HTTPS (an SSL encrypted
version of HTTP).
The file format for a Web page is normally HTML (hyper-text markup language) and
is identified in the HTTP protocol with a MIME content type. Most of the browsers
support different formats such as the JPEG, PNG and GIF image formats including
HTML. The combination of HTTP content type and URL protocol specification
enables designers to embed images, animations, video, sound and streaming media
into a web page or to make them accessible through the web page.
Root
Root
Server
Server
google
google
hotmail
yahoo
Mil Military
Biz Business
Country code For example, in for India, us for the USA, au for Australia, jp for
Japan and so on
What is My IP Address?
To view your IP address you can use the ipconfig (IPCONFIG) command line tool.
Ipconfig displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings.
To launch the command prompt from a Windows-based computer click: Start > All
Programs > Accessories > Command Prompt. Type ipconfig and press the Enter key.
You can also use Google search to find your IP address. Type “what is my IP address”
as a search query and Google will show the IP address of the computer from which
the query was received as the top search result.
16.10 Intranet
An intranet is a private computer network built inside Organization Company or a
university. Intranet uses internet protocols with some times wired and sometimes
wireless medium network connectivity to securely share part of an organization’s
information or operations with its employees and students respectively. Intranet
can also be described as the organizations own private inter accessible website that
holds all the information on running matters of the organization. The same concepts
and technologies of the Internet such as clients and servers running on the Internet
protocol suite like Hyper Text Transfer Protocol (HTTP) and File Transfer Protocol
(FTP) are used to build an intranet.
The use of intranet is increasing in the corporate sector day by day for the sharing
of information and applications, collaboration between various companies to solve a
common problem, teleconferencing, sharing the sophisticated corporate directories,
sales and customer relationship management tools like MS project manager etc., to
advance productivity.
The File Transfer protocol is among the oldest protocols still used in the Internet.
FTP is widely available on almost all browsers indicating that all computing Notes
platforms, including DOS, OS/2, UNIX, and up to the mainframe level have this
service available. You can very well understand from its name that it facilitates the
majority of file transfers across the Internet. In other word, FTP is a file server access
protocol that enables a user to transfer files between two hosts across the network or
Internet using TCP. You may see the versatility of this application layer protocol, it
accomplishes its job even intended hosts at separate locations could potentially be
running different operating systems, using different file storage systems, and using
different character sets. Accessing FTP sites over the Internet requires that the user
must have the knowledge of the location and the name of the desired files.
Unlike Telnet, FTP does not require any familiarity with the remote operating system.
The user is still required, however, to be familiar with the FTP command set built
into the protocol itself so that he or she can productively manage the session.
Modern FTP servers known as ftpd support two different TCP connections, viz.,
control and data connections. First control connection is invoked for the entire
duration of transfer of file or FTP session. It facilitates the exchange of commands
issued by the client, and replies originating from server. Data connection is established
as and when it is required. Its main function is to facilitate transfer of files and
directory listings to and from the client at the client’s request.
Whenever you wish to do FTP, you need to invoke a few commands. These commands
basically are related to transfer a file from remote computer to your computer or from
your computer to the remote computer. There are anonymous as well as authorized
privileges with regard to transfer of a file from a server. In case of anonymous FTP
servers, you can do FTP without authorization. You need to login with a username,
which is anonymous, and a password that is your e-mail address. Apart from this,
there are authorized servers for which you need to register before you are permitted
to do FTP. After registration, you will get a password.
Mail Exchange
The SMTP design is based on the model of communication illustrated in Fig. 16.2.
After the client machine mail request, the sender-SMTP sets a two-way connection
with a receiver-SMTP. The receiver-SMTP may be the destination machine or an
intermediate machine (mail gateway). The sender-SMTP will initiate commands
which are replied to by the receiver-SMTP.
SMTP
User Commannds/Mail User
Senders Receivers
SMTP
SMTP
File Replies File
System System
1. The client machine SMTP sets a TCP connection with the destination machine
SMTP and then waits for the server to send a service ready message or a service
not available message.
2. HELO (HELO is an abbreviation for hello) is sent and the receiver machine
will identify itself by sending back its domain name. The client machine SMTP
uses this to verify if it reached the right destination SMTP. If the client machine
SMTP supports SMTP Service Extensions, it substitutes an EHLO command
in place of the HELO command. A destination machine SMTP which does
not support service extensions responds with a 500 Syntax error, command
unrecognized message. The client machine SMTP then retries with HELO, or
if it cannot transmit the message without one or more service extensions, it
Applications of Internet
Notes
The internet is treated as one of the biggest inventions. It has a large number of uses.
1. Communication: It is used for sending and receiving message from one and
other through internet by using electronic mail. Some of the websites providing
this service are yahoomail.com Hotmail.com rediffmail.com etc.
2. Job searches: Getting information regarding availability of job in different
sectors and areas. You can publish your resume is online for prospective job.
Some of the websites providing this service are naukri.com, monster.com,
summerjob.com, recuritmentindia.com, etc.
3. Finding books and study material: Books and other study material stored
around the world can be easily located through internet. Latest encyclopaedias
are available online.
4. Health and medicine: Internet provides information and knowledge about
field of health medicine people can have information about various disease
and can receive help .patient can be taken to virtual check room where they
can meet doctors.
5. Travel: One can use internet to gather information about various tourist places.
It can be used for booking Holiday tours , hotels, train and flights. Some of
the web sites providing this service areindiatravelog.com, rajtravel.com,
makemytrip.com.
6. Entertainment: One can download jokes, songs movies, latest sports, update
through internet. Some of the web sites providing this service are cricinfo.com,
movies.com espn.com
7. Shopping: Internet is also used for online shopping. By just giving accounts
details you can perform the transaction. You can even pay your bills and perform
bank related transaction.
8. Stock market updates: You can sell or buy shares while sitting on computer
through internet. Several websites like ndtvprofit.com, moneypore.com, provide
information regarding investment.
9. Research: A large number of people are using internet for research purposes.
you can download any kind information by using internet.
10. Business use of internet: Different ways by which intenet can be used for
business are:
(i) Information about the product can be provided online to the customer .
(ii) It provides market information to the business.
!! The World Wide Web that has become a de facto standard for any professional
belonging to any discipline finds its extensive use and utility in providing Notes
information stored in a computer system attached to the Internet or www.
Different web designing techniques are used to make the information in a
presentable form to the users. Some of the web designing techniques such
as HTML has become a standard for web pages. In addition to the above, In
HTML webpage design, the limited use of colors often makes the appearance
of the colors more powerful. It is also possible to add an image or a plain
color as background with the help of its specifications in the <body> tag.
Form also gives navigability to a website. Forms are objects that enable
to enter information in the form of text boxes, drop-down menus or radio
buttons. Front Page provided by Microsoft, however, provides an excellent
tool for designing WebPages with very minimal knowledge of HTML has
been replaced by more advanced tools. FrontPage enables to work in a
!! The uppermost layer of OSI models provides a number of services to the
users using the TCP/IP protocol. Domain Name System (DNS) provides
the quick translation of text of the IP addresses within fractions of seconds
from a directory of billions of such addresses. This could be made possible
by using Domain concepts, which uses hierarchical arrangements of text
addresses translation. The servers maintaining addresses are distributed
and have locations throughout the world. Electronic mail is one of the most
popular network services and uses user agent and message transfer agent to
transport messages created by a user to destination mailboxes possibly on
remote machines. Multimedia applications have enthused life in webpages
making them interactive. The convergence of different media such as text,
pictures, video and sound into a single media has contributed enormously
for the growth of Internet and www. Applications of multimedia packages
are found in all walks of life. With the advancement and innovation in
presentation tools of multimedia, the multimedia applications have been
giving impressions of virtual reality to its end users.
!! Protocols working with TCP/IP like File Transfer Protocol (FTP) and Trivial
File Transfer Protocol (TFTP) are file server access protocol that enable a
user to transfer files between two hosts across the network or Internet using
TCP. Simple Mail Transfer Protocol (SMTP) that is used to transfer mails
from one computer system to another computer system attached to the
same network or different networks uses end-to-end delivery in which an
SMTP client machine contacts the destination host’s SMTP server directly
to deliver the mail. Telnet is an Internet standard remote login protocol to
16.17 Glossary
!! Frames: It is for displaying more than one HTML document in the same
browser window or to divide the screen into separate windows.
!! Home Page: It provides a point of entry to a Website with help. It also
contains all relevant links of that particular website.
!! HTML: Hypertext Markup Language defines the rules for formatting a web
page so that a web browser displays the page properly.
!! World Wide Web (WWW): It is defined as a client-server information system
using the Internet to access computers containing millions of hypertext
documents.
!! Hypertext: It defines the documents containing embedded links (hyperlinks)
to other documents or other parts of the same document.
!! Hyper Text Transport Protocol (HTTP): Hypertext Transfer Protocols are
the rules that enable the transmission of web documents from one computer
to another via the Internet.
!! Search Engines: They are software that enables searching of the content
available on Internet.
!! URL: It denotes Uniform Resource Locator. It is the address of a document
on the World Wide Web.
!! Web Browser: It is the client software used to explore and display web
pages from a website.
!! Web Client: It refers to the computer and software used to access a website
and web pages.
!! Web Page: It is a single hypertext document written in Hypertext Markup
Language (HTML) and described in HTML basics. This normally contains
the basic information and links to navigate in the websites to which it
belongs.
!! Website: It is written in HTML and is a collection of linked Web pages on a
Web server. Web server is the machine where a website is located or hosted.
It may be organization owned or Internet Service Provider (ISP) owned.
!! Electronic Mail: It refers to the electronic version of the postal mail that
uses user agent and message transfer agent to transport the message at the
destination mail boxes.
1. client-server
2. Hypertext
3. web documents
4. web pages
5. Electronic Mail
6. server access protocol
7. Search Engines
8. URL
9. Web Client
10. Web Page
11. Website
Notes
Short Answer Questions
1. What is the correct HTML tag to make a text bold?
2. How an image can be inserted in HTML?
3. How a HTML document can be created from normal word document?
4. How MIDI file and wave file are differentiated?
5. Define the role of frames in html?
6. Provide a link of another site and define links to send an email to different
people. Take relevant example.
16.20 References
1. Computer Networks and Internet by Rajneesh Agrawal and Bhata Bhushan Tiwari,
published by Vikas Publication
2. Remote Access for Cisco Networks, by Burton, Bill, published by McGraw-Hill Osborne
Media
3. Data Communications and Networking by Behrouz A. Forouzan and Sophia Chung
Fegan published by McGraw-Hill Companies
4. Computer Networks by Andrew S. Tanenbaum, published by Prentice Hall
5. Web Tutorials on HTML and Front Page
Structure Notes
17.0 Introduction
17.1 Unit Objectives
17.2 Network Security
17.3 Levels of Security
17.4 Data Security
17.5 Security Threats
17.6 Firewalls
17.7 Data Encryption
17.8 Authentication
17.9 Summary
17.10 Glossary
17.11 Answers to Check Your Progress
17.12 Terminal and Model Questions
17.13 References
17.0 Introduction
Over the past several years, the world has become interconnected in ways not
previously imaginable. Small and large companies have presence on WWW and
their offices spread across the globes have inter-office collaboration on a daily
basis. Hence, all of these interconnections rely in large part on our ability to protect
the networks that create those connections. Network security is a broad topic with
multi-layered approach. It can be addressed at the data link layer, network layer
and application layer. The issues concerned are: packet intrusion and encryption, IP
packets and routing tables with their update version, and host-level bugs occurred
at data link layer, network layer and application respectively.
The TCP/IP protocols are being used globally irrespective of the nature of the
organizations whether it belongs to general category of organizations or security
specific sensitive organizations. The news or information about hacking of some
website or portal by some undesired people is very common nowadays. This shows
that TCP/IP protocols are susceptible to intercept. This generated a need to ensure all
round security for the network in an organization. The task of network administrator
had to widen to include the overall security of the network. He has to ensure that all
parts of this network are adequately protected and adequate measures of security
have been implemented within a TCP/IP network. He should be aware of an effective
Trojan Horses
This malware attack disguises itself as something innocent like a computer game or
a search results page. Once installed on a computer, the Trojan horse may download
Spam
Spam constitutes 70 to 84 per cent of daily emails sent throughout the world that
demands an ever increasing need for IT resources to filter out this irritating and
potentially malicious menace. Spam email comprises unsolicited emails promoting
products and coordinated spam attacks to consume so much bandwidth on a network
so as to cause it to crash. Spam may use techniques “news service” spam, which uses
legitimate news headlines to trick recipients into opening spam emails. Good email
filters are used to filter the spams. And much of what slips through can be avoided
by staying away not to trick with the emails. There should be check for signing of
any online service or freebie. The naming system for creating email accounts should
not be easily guessable because spammers are increasingly going through common
name lists in order to harvest emails to spam.
Phishing
Emails with titles such as, “URGENT: Update Account Status” are all attempts by
a spammer to “phish” the account details. The Phishing refers to spam emails to
trick recipients into clicking on a link to an insecure website and provide details
considering the website as genuine one. Typically, phishing attempts are carried out
to steal account information for e-commerce sites such as banks, eBay or regular
financial institutions’ websites. A phishing email tricks the user to click a link, which
will take the user to a page where the user is asked to re-enter all his or her account
details including credit card number(s) and/or passwords. These websites are not
actual site, even though they look like it. To protect the network, users should be
cautious and detest themselves to open and provide vital details requested by any
financial institutions. They should confirm the integrity before supplying such details.
Financial institution should also educate their employees about the most common
ways in which hackers try to phish the account information.
Packet Sniffers
Packet sniffers are the technique used to capture data streams over a network to
obtain sensitive data like usernames, passwords, credit card numbers, etc. Thus,
packet sniffers are more malicious forms of threats to the network security. Packet
Maliciously-Coded Websites
Maliciously coded websites create chartable websites enabling a user to make
donations and thus stealing the vital personal information. Maliciously coded websites
are also used to enter networks for installing keylogger. Information regarding some
charitable institution should be obtained from security certified sites.
Password Attacks
A ‘Password Attack’ includes a number of techniques used by the hackers to steal
passwords. Some of them are listed below:
Brute-force: It is a method in which a hacker tries to guess a password by repeatedly
entering in new combinations of words and phrases compiled from a dictionary to
steal the password. Developing difficult to guess usernames and passwords can
prevent it.
Packet sniffers: It has been discussed above.
IP-spoofing: Like honeypots, IP spoofing involves the interception of data packets
by a computer successfully pretending to be a trusted server/ resource.
Encryption
Encryption
Authentication
Authenticati
on
Function
functi Included
on incl
uded
R Use
Use
F
R
i R
r
e
w R
a
l
l
Use
Use
Hack
Hack Use
Hack
Internal Clients
R
Internet o Firewall DMZ
u Switch Switch
t
System
e
r
Internal Workstation
Proxy LAN
Internet Firewal Hub
Firewall Architectures
The OSI layers play major role in designing the different types of firewall architectures.
Figure 17.4 describes the architecture.
Application
on lLayer
Applicati ayer
Presentation
Presentati
on
Session
Session
Transport
Transport
Internet
Internet Network
Netw ork
Data Link
Data Link
Physical
Physica
l
External
External Internet
Internal
NNetwork
etw ork N etw ork
Network
A packet filter does not bother to know the difference between real and forged
information. It offers the IP Spoofing, not knowing packet payload, etc., security
threats to the network. Advantages of this firewall are that it offers low impact on
network performance and has low cost. Its disadvantages are that it operates only at
network layer, therefore it only examines IP and TCP headers. It remains unaware of
packet payload, therefore offers low level of security. Static packet filter firewall lacks
state awareness that may require numerous ports be left open to facilitate services
that use dynamically allocated ports. It is susceptible to IP spoofing and difficult to
create rules (order of precedence).
354 Unit 17: Basics of Information Security
Dynamic Packet Filter Uttarakhand Open
University
A dynamic packet filter firewall is capable of monitoring the state of active connections
and decides which network packets should be allowed through the firewall. Dynamic
packet filter records session information such as IP address and port numbers and
Notes
combines the application level gateways with packet filters to make it secure and
fast. Its advantage over static packet filter is to know about the state of the packet
and is quite useful in case of UDP. Like static packet filter, it also operates through
the network layer of OSI layer 3 to Session layer as shown in Fig. 17.6.
Application
Applicati Layer
on l
ayer
Presentation
Prese
ntati
on
Session
Session
Transport
Transport
Internet
Internet Network
Netw ork
Physical
Physical
External
External Internet
Internal
N etw ork
Network N etw ork
Network
The dynamic packet filter firewall examines the packet’s IP and protocol headers to
determine either to accept or deny a packet. It keeps track of the new and established
connections. Details of the established connections are entered into a table in RAM.
The details of the incoming packets are compared to the packets in this table. If
the packet is an existing connection, it is permitted to pass without any further
examination. Thus, the dynamic packet filter provides a measurable performance
increase over a static packet filter. The advantages offered are low cost, measurable
performance due to state awareness, scalability and extensibility. The disadvantages
are that it operates only at network layer, therefore it only examines IP and TCP
headers. It also does not examine the packet payload, therefore offers low level of
security. Like static packet filter, the dynamic packet filter is also susceptible to IP
spoofing.
Presentation
Presentati
on
Session
Session
Notes
Transport
Transport
Internet Network
Netw ork
Int ernet
Data Link
DataLink
Physical
Physica
l
External
External Internet
Internal
N etw ork
Network N etw ork
Network
The circuit level gateway validates connection based on source IP address and /or
port, destination IP address and/or port, application, password, handshaking and
sequence numbers before allowing data to be exchanged. Like packet filter, the
circuit level gateway examines the IP header and TCP header and compares them
with details available in table that contains the rules to determine for allowing or
discarding the packets to pass. It is considered an improvement over packet filter
in the level of security it provides. Moreover, it provides little impact on network
performance as it operates at session layer of the OSI model. It does not examine
the payloads the packets it relays between two networks and therefore provides an
opportunity to pass undesirable packets through itself to a server behind the firewall.
The advantages offered are low to moderate impact on network performance, blocking
of direct connection to server behind firewall, higher level of security than a static
or dynamic packet filter and facilitating services for a wide range of protocols. It
also offers a number of disadvantages of the packet filters by providing any data to
simply pass through the connection and low to moderate level of security.
Proxy Firewall
Application
onLayer
Applicati layer
Presentation
Presentati
on
Session
Session
Transport
Transport
Internet
Int ernet Network
Netw ork
Data
DataLink
Link
Physical
Physica
l
External
External IInternet
nternal
N etw ork
Network N etw ork
Network
The application level gateway performs on the packets that are generated by
applications by either copying or forwarding or filtering them. An HTTP proxy
copies, forwards and filters HTTP traffic and blocks all other services or applications.
Briefly, an application specific proxy examines each packet that passes through the
gateway, verifying the payloads of the packet. Some of the advantages of application
level proxy are better handling of traffic, its awareness of services, breaking of direct
connection to server behind firewall eliminating the risk of an entire class of covert
channel attacks, highest level of security, etc. Its weaknesses are to provide a poor
implementation that tends to allow limited connections and complex setup that needs
more and detailed attentions to the applications that use the gateway.
Asymmetric Encryption
Two mathematically related keys, viz., public key and private key are generated to
encrypt and decrypt the message. Asymmetric encryption is considered more secure
Symmetric Encryption
Symmetric encryption, also referred to as conventional or single-key encryption is
based on a secret key, which is shared by both communicating parties. The sending
party encrypts the plain text to cipher text message using the secret key. The receiving
party on receipt of the cipher text message uses the same secret key to decrypt it to
plain text. Examples of symmetric encryption are the RSA algorithm. Symmetric
encryption method has the following five major parts:
1. Plaintext: It is the text message to be transmitted on which an algorithm is
applied.
2. Encryption Algorithm: It enables mathematical operations to conduct
substitutions and transformations to the plaintext.
3. Secret Key: They constitute a part of algorithm for encryption and decryption
of the message.
4. Ciphertext : This is the encrypted message generated by applying the algorithm
to the plaintext message using the secret key.
Digital Signature
Computer-based information systems have been finding an increasingly important
role in business transaction encompassing all the areas of human life, such as
education, economics, social, political, health, telecommunication, trade, etc. The
continued growth and acceptance of business transaction largely depends upon the
security of data transmissions. Hence, the need for establishing a framework for the
authentication of these computer-based information systems arises. Conventionally,
a signature on a document indicates that the statements mentioned in the document
bind the person who has signed the document and the document will not be changed
once the parties to the transaction have signed it. Likewise, digital signature may be
considered as the replica of the above-mentioned procedure as electronic code for
the document validity.
Cryptography is widely used to create digital signatures. Digital signature technology
aims to promote use of digital signatures on computer-based documents such as
electronic mail messages, their attachments and to facilitate electronic commerce.
It also calls for a legal environment. Therefore, it becomes necessary to build an
institutional infrastructure to make digital signatures work effectively and enable us
to conduct legally binding paperless communication. Advantages offered by digital
signatures are numerous. They are harder to forge than a penned signature, the parties
can verify to whom they are dealing with and they can verify that a message was
not altered in transit. Companies like VeriSign, RSA, Baltimore Adobe Systems
and Entrust, etc., are actively involved in the development of digital signature
technologies and its widespread use.
The digital signature technology is supported by an infrastructure containing
certification authorities (CA), online databases called repositories and public-key
encryption technology so that electronic documents could be signed in a legally
binding fashion. Consequently, a well-functioning Public Key Infrastructure (PKI)
has been established to facilitate the communicating parties.
Signing
Plain text Signed message
Private key
Verification
Signed message Plain text
Private key
The message digest, which represents the message and can be used to detect changes
in the message, is then encrypted with the sender’s private key, which results in a
digital signature. The message digest and the message itself are then routed to the
appropriate recipient. The recipient uses the sender’s public key to decrypt the digital
signature and see the message digest. Next, the recipient applies to the message the
same hash function the sender used, and the hash function is then compared with the
decrypted message digest. The signature is verified if both are the same.
17.8 Authentication
A user is required to be first authenticated before accessing the network or Intranet of
an organization. The authentication procedures are built into the firewall implemented
to the network or Intranet for the security measures. However, the network security
authentications aim to secure the network. A number of different ways are available
to secure remote access to a system. Some of them encrypt all the data being
transferred across the network while others protect only the authentication. If the
data is sensitive or directly related to business, it is advised to encrypt all the data
and not just the authentication. Some of the procedures for validating user’s login
or access are given below:
Using one time password for authentication: The above two procedures have some
loose ends, which need to be properly tightened. In case of password authentication,
the password remains unencrypted and is therefore susceptible to be hacked. Access
to a network by some undesirable person may be prevented when the password
is validated only once to login to remote network. There are different passwords
Notes
17.9 Summary
!! The Internet, which was initially conceived for academic point of view,
has spanned into every aspect of life. This has even entered so deeply and
intimately in day to day affairs of individual that people have started desiring
to be on network from anywhere at any time. The tremendous growth of
the Internet also vitiated the problem of security and undesirable elements
have entered into the fray. Network security in all its varieties is a huge and
growing problem for network security managers and business owners. As
we all become more interconnected and access more and more personal
information through networks, they become more and more vulnerable to
attack. The basic advantage of any network is in its capability of sharing
the permitted resources among users who have authorization to access the
network either locally or remotely. Hence, this becomes necessary to keep
away the unauthorized person to get access into the network. This will
largely depend upon the level of security needed by the network. Remote
access security is largely dependent upon authentication by UNIX password,
IP address and one-time password. Among these, one time password may
be considered as a full proof security measure for remote access.
17.10 Glossary
!! Access Control: It restricts access to resources and allow only privileged
entities to access. Basically, types of access control include mandatory access
control and discretionary access control among many others.
!! Application Level Gateway: Application level gateway, as its name
indicates, is a firewall that filters information at the application level and
blocks all IP traffic between the private network and the Internet.
!! Asymmetric Cryptosystem: It is the core of digital signature technology.
It is also referred to as public key cryptosystem. It generates a secure key
pair that consists of a pair of key as private key and public key.
!! Asymmetric Encryption: Two mathematically related keys, viz., public key
and private key are generated to encrypt and decrypt the message.
!! Authentication: It is a process used to ascertain the identity of a person or
the integrity of specific information. For a message, authentication involves
ascertaining its source and that it has not been modified or replaced in transit.
1. Data Security
2. Authentication
3. encryption algorithm
4. mathematical operations
5. software and hardware
6. Symmetric encryption
17.13 References
1. Burton, Bill , Remote Access for Cisco Networks, published by McGraw-Hill Osborne
Media
2. Behrouz A. Forouzan, and Sophia Chung Fegan, Data Communications and Networking
3. Andrew S. Tanenbaum, Computer Networks, Prentice Hall
4. Web Tutorials on HTML and Front Page
5. Gary Halleen and Greg Kellogg, Security Monitoring with Cisco Security MARS, Cisco
Press, Jul. 6, 2007
6. Security Threat Mitigation and Response: Understanding CS-MARS, Dale Tesch/Greg
Abelar, Cisco Press, Sept. 26, 2006
Block - V
Block Title : Management Information System
Programme Coordinator
Dr. Manjari Agarwal
Assistant Professor
Department of Management Studies
Uttarakhand Open University
Haldwani
Editor(s)
Er. Sumit Prasad Er. Subodh Prasad
Assistant Professor Assistant Professor
Department of Management Studies Department of Information Technology
Uttarakhand Open University College of Technology
Haldwani G.B. Pant University of Agriculture & Technology
Pantnagar
ISBN : 978-93-85740-12-1
Copyright : Uttarakhand Open University
Edition : 2016 (Restricted Circulation)
Published by : Uttarakhand Open University, Haldwani, Nainital - 263 139
Printed at : Laxmi Publications (P) Ltd., New Delhi
DUO-8155-74.34-INFO TECH MGMT INFO B-V
CONTENTS
18.0 Introduction
Management Information System is an old management tool, which has been long
used by people for better management and scientific decision making.
Management Information System is mainly dependent upon information, which is
a vital ingredient of any Management Information System. Information is the most
critical resource of Management Information System. We all know that information
is a vital factor for our existence. Just as our body needs air, water and clothes, we are
as much dependent upon information. To make life more interesting and to achieve
the feeling of being a part of the social system, we want to know our surroundings
and for that we need information. Information is an important input for achieving
our goals, such as learning to help each other and to become integral part of society.
Actually, information system is not a new concept; it is as old as the hills. From
Management
We can define management in many ways, like:
“Manage Man Tactfully” or Management is an art of getting things done by others.
Information Notes
Information simply means processed data or in the layman’s language, data which
can be converted into meaningful and useful form for a specific user.
System
1. System can be defined as a set of elements joined together for a common
objective.
2. A group of interrelated or interacting elements forming a unified whole, e.g.,
business organization as system.
3. A group of interrelated components working together towards a common goal
by accepting input and producing output in an organized transformation process.
Management Information System: There are a number of definitions of Management
Information System given by different authors. Some of them are:
1. According to Jerome or J. Kanter “Management Information System is a system
that aids management in making, carrying out and controlling decisions”.
Here Management Information System is a system that aids management in
performing its job.
2. According to G. B. Davis, Management Information System is “an integrated
man/machine system for providing information to support the operations,
management and decision making functions in an organization.” Here the system
utilizes hardware and software, manual procedures, management decision
model and database.
3. After the introduction of computer, some people define Management Information
System as computer based information system.
4. As a system based on the database of the organization evolved for the purpose
of providing information to the people in the organization.
In simple terms Management Information System is an information system that
provides information to support managerial decision making.
A more comprehensive definition is that Management Information System consists
of people, equipment and procedures to gather, sort, analyze, evaluate and distribute,
timely and accurate information to the decision maker.
Notes
MIS for
Mis
strategic
Strategic
and
and policy
Policy
planning
Planning
and
and Decision
decision
Making
making
Management information
Management Information for
for
Tactical Planningand
tactical planning anddecision
Decision
Making
making
Management
Management Information
information for
for Operational
operational
Planning
planning decision making and control
Decision Making Control
Transaction
transactionProcessing
Processing
Inquiry
inquiryResponse
response
Technical Approach
Technical approach Management Information System emphasizes mathematically
based or systematic models to study Management Information System as well as
the hardware aspect of it. The major role player of technical approach is computer
science which provides ways of computation as well as how to store large volume
of data and its retrieval. Management science gives the concept of decision support
and the models for management practices. Operations Research comprises how to
optimize the resources of the management.
Behavioural Approach
But, due to high expectation of human beings, now Management Information System
field is concerned with behavioural problems also.
The behavioural problems can not be handled by the mathematical model used in
technical approach. The major role player of this approach is sociology that focuses
on the impact of Management Information System on groups, organizations and
society as a whole. Psychology is concerned with how each stake holder in an
organization responses to the information system and cognitive models of human
reasonings. Political science is concerned with what is the political scene/scenario
in the country, what is the manifesto of ruling party, etc.
So Management Information System combines the theoretical work of computer
science, management science and O.R. with a practical orientation towards building
Central Database
A central database is the mortar that holds the functional systems together. Each
system requires access to the master file of data covering inventory, personnel,
vendors, customers, etc. If the data is stored efficiently and with common usage in
mind, one master file can provide the data needed by any of the functional systems.
It seems logical to gather data once, to properly validate it and to place it on a central
storage medium that can be accessed by any other sub-system.
MIS has been introduced as a broad concept referring to a federation of sub-
systems. Two approaches to define the sub-systems of an MIS are according to the
organizational functions which they support and according to managerial activities
for which they are used.
Note that these activities sub-systems correspond to the levels of the pyramid structure
that defines MIS.
Environment
Environment
Management
Management
Goal
Goal setting
setting
Planning
Planning Organizing
Organising Staffing
Staffing Directing
Directing Controlling
Controlling
Information
Information
Support
support
MIS
MIS
Data Models
The underlying data model plays an important role in database design. The physical
or logical structure of a database is spelt out by the data model. A data model is
386 Unit 18: Introduction to MIS
Uttarakhand Open
a collection of conceptual tools used for describing data, data relationships, data
University
semantics and data constraints. Evolution of different data models is still in progress,
as the primary objective is to evolve a high level data model. The model should
enable the designer to incorporate a major portion of semantics of the database in the
Notes
schema. Numerous data models have been proposed which can be broadly classified
into following categories:
1. Object based data models
2. Record based data models
3. Physical data models
1. Object Based Data Models: These models are used in describing data and data
relationships in accordance with concept. In general, the object based data
models are gaining wide acceptance for their flexible structuring capabilities.
Various data integrity constraints can be specified explicitly by using the object-
based models.
The Entity relationship model which is an object based model is widely used
in practice as an appropriate database design tool.
2. Record Based Data Models: These models are used to specify the overall logic
structure of the database. With some models a higher level description of the
implementation of the structure of the database can also be specified explicitly.
The data integrity constraints cannot be specified explicitly with these models.
The three widely accepted record based data models are Relational model,
Network model and Hierarchical model.
3. Physical Data Models: These models are used to have higher level description
of the storage structure of the database and their access mechanism. With the
physical model it is possible to implement the database at the system level. A
very few physical data models have been proposed so far. Two of these well
known models are the unifying model and the frame memory model.
Models are generally most effective when the manager can use interactive dialog to
build a plan or to iterate through several decision choices under different conditions.
Determination
of information
need
Dissemination Storage
Information use
Notes Hardware
Business
strategy,
rules, Software Database
procedure Interdependence
Telecommunication
Information system
18.10 Summary
!! Management Information System is not a new term to us. It is an old
concept. Actually every civilization has its own way to acquire, sort, use
and manage information.
!! Management Information System concept is of dynamic nature and the
modified model of Management Information System meets all the needs
of organization.
!! Management Information System can be defined as consisting of people,
equipment and procedures to gather, sort, analyze, evaluate and distribute
timely and accurate information to the decision makers.
!! An effective Management Information System has these characteristics
– management oriented, management directed, Integrated, common data
flows, heavy planning element, subsystem concept, common database,
user-friendly – information as a resource and last but not the least should
be computerized.
!! There are certain misconceptions regarding Management Information
System like the study of Management Information System is about the use
of computers, more data in report means more information for managers,
accuracy in reporting is of vital importance, etc.
18.11 Glossary
!! Management Information System Concept: It is of dynamic nature and the
modified model of Management Information System meets all the needs
of organization.
!! Physical Data Models: These models are used to have higher-level
description of the storage structure of the database and their access
mechanism.
!! System: A series of functions or activities within an organization that work
together for the aim of the organization.
Notes
Short Answer Questions
1. Define MIS and write about to importance.
2. What is the need for a database?
3. Explain the utilization models of MIS.
18.14 References
1. Peter C. Jurs, Computer Software Applications in Chemistry, Wiley-IEEE
2. William S. Davis, Computer Fundamentals, Addison-Wesley Longman, 1992
3. Margaret Stephens, Rebecca Treays, Jane Chisholm, Philippa Wingate, Colin Mier
and Sean Wilkinson, Computer for Beginners, EDC Publishing, 1995
4. Marlin D. Ouverson, Computer Anatomy for Beginners, Reston Pub. Co, 1982
5. Dan Gookin and Andy Rathbone, PCs for Dummies, IDG Books Worldwide, 1992
6. V. Rajaraman and Dharma Rajaraman, Computer Primer, Prentice Hall of India, 2006
7. V. Rajaraman, Fundamentals of Computers, Prentice Hall of India, 2003
Structure Notes
19.0 Introduction
19.1 Unit Objectives
19.2 Hierarchy of Management Activity
19.2.1 Information Systems for Operational Control
19.2.2 Information System for Management Control
19.2.3 Strategic Planning
19.3 MIS Structure Based on Organizational Function
19.3.1 Sales and Marketing Sub-systems
19.3.2 Production Sub-system
19.3.3 Logistics Sub-system
19.3.4 Personnel Sub-system
19.3.5 Finance and Accounting Sub-system
19.3.6 Information Processing Sub-system
19.3.7 Top Management Sub-system
19.4 Synthesis of MIS Structure
19.4.1 Conceptual Structure
19.4.2 Physical Structure
19.4.3 Some Issues of MIS Structure
19.5 Summary
19.6 Glossary
19.7 Answers to Check Your Progress
19.8 Terminal and Model Questions
19.9 References
19.0 Introduction
Management information system supports management activity. This means that
the structure of an information system can be classified in terms of a hierarchy of
management planning and control activities.
Notes
19.2 Hierarchy of Management Activity
The following categories of management planning and control were defined by
Anthony:
Level Comments
Operational planning and Effective and efficient use of existing facilities and resources
control to carry out activities within budget constraints.
Shipping Actual quantity shipped Freight Shipping document Invoice register Sales
invoicing cost journal Back-order register
Note that a large number of documents and reports are prepared from the initial entry
of the order plus later entry of actual quantity shipped, freight, amounts received
on account, and returns and allowances. The assumption is made that the customer
name, address, and credit status, plus price of each item, are contained in customer
files and billing files. The documents and reports from order entry are not associated
and finance functions.
Modularity is the design of an information system as a number of small sets of
processing instructions called modules. Some modules are used only once in a single
application; others are used in a large number of applications. The use of modules
even in cases where each has a single purpose is desirable because it improves control
over system development and modification. The modules can be written and tested
separately, allowing more efficient maintenance by identification of the boundaries
of the module being changed. The use of modules is thus an application of system
principles.
The physical structure of an information system is affected by the use of common
modules for many processing operations. For example, a common input data
validation routine may be used for all applications. If an application consists of major
modules for input, input validation and error control, processing, and output, the use
of a common module of input validation and error control means that no application
is complete without using this module.
19.6 Glossary
!! Operational Control: The process of ensuring that operational activities
are carried out effectively and efficiently.
!! Conceptual Structure of MIS: A federation of functional sub-systems.
!! Logistics Function: Activities such as purchasing, receiving, inventory
control, and distribution.
19.9 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson education,
2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn, ICFAI, 2002
3. Gordon B. Davis and Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and Development, 2nd Edition, Tata McGraw Hill
International Book Company, 2000
4. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer and
Williams C. Perkins, Management Information Technology, 3rd Edition, Prentice Hall
International Edition, 1999
5. Harold Koontz and Heinz Weihrich, Essentials of Management, 5th Edition, Tata
McGraw Hill, 1999
Structure
20.0 Introduction
20.1 Unit Objectives
20.2 MIS Master Plan- Contents and Description
20.3 Nolan Stage Model
20.4 Three-Stage Model of Planning Process
20.5 Summary
20.6 Glossary
20.7 Answers to Check Your Progress
20.8 Terminal and Model Questions
20.9 References
20.0 Introduction
We all know the law of nature, that everything either man, animal or an event has a
definite starting or beginning and it also has a definite ending or termination. Likewise,
the computer based information system or Management Information System has its
starting or beginning and after passing through so many activities it has a completion
stage. As life is a continuous process, management information system development
also follows the same principle, means development of management information
system is also a continuous process, because after utilizing some of the information,
the need for next information arrives.
Using the system approach to develop information system involves a multistep
process called the information system development cycle, also known as system
development life cycle or phases/stages of Management Information System. The
steps taken to develop Management Information System are designing of Management
Information System, so that they all are analogues to each other. Reader need not get
confused when he or she comes across any of these terms regarding development of
Management Information System or information system.
Before going into details of development process of Management Information
System, one should go for planning as well as see the motivation or opportunities
behind development of Management Information System and certain principles to
be followed while designing the Management Information System. In the subsequent
sections of this chapter we will discuss each of these aspects in detail.
410 Unit 20: MIS Master Plan – Content and Description
Uttarakhand Open
20.1 Unit Objectives University
Current Capabilities
It includes such items as the following:
1. Inventory of:
(i) Hardware
Information system planning is focused on determining the information needs and also
ensuring that information system planning aligns with the overall business planning. Notes
For information system planning R.Nolan has given a model known as Nolan stage
model. It initially had four stages of growth and later on it was reviewed, and as
a result there is an addition of two intermediate growth stages. The Nolan model
basically describes in which stage organization’s information system exists. This
will provide a base for planning to proceed to next stage of the growth. We can see
the contribution of this model for MIS planning after going through each stage of
Nolan’s model.
The Nolan stage model explains the evolution of information system within an
organization by considering the various stages of growth. This model was developed
in the mid of seventies. Expenditure on information technology increases as the
information system passes through various stages. Various stages of Nolan’s stage
model is shown in Fig. 20.1.
Level of information
1 2 3 4 5 6
Initiation
Initiation Contagion
Contagion Control
Control Integration
Integration Data
Data Maturity
Maturity
administration
administration
Stages
Stage 1: Initiation
This is the first stage of Nolan’s model. This stage depicts that computer system is
used for transaction-processing which is basically the bottomline of the organization
hierarchy. At transaction processing level typically, high volume of data processing
is done in terms of accounting the business transactions, billing and payroll, etc.
So very little planning of information system is required. The users are mostly
unaware of the technology. So new applications are the development with the help
Notes
Stage 2: Contagion
This is the second stage of Nolan’s growth model, also known as expansion stage. It
is related to unplanned and uncontrolled growth. Actually at this moment the users
have developed their interest to know the possibilities of it but still, they do not know
much about its pros and cons. The growth of large number of IT applications with
minimum check on whether they are required or not, are the key features of this
stage. Technical problems with the development of programs appears. There was
very little control of the development of information system as well as expenditure
associated with IT.
Stage 3: Control
This is the third stage of Nolan’s stage model. Because of the unplanned growth,
of a large number of IT applications as well as projects, a need arose to manage the
information system and also the reorganization of data processing department. The
data processing manager becomes more accountable or responsible to justify the
expenditure on information system development. The growth of projects is controlled
by imposing changes on user department for information system development project
and the use of computer services. Users are witnesses of progress in the development
of information systems. Pent-up repressed demand and frustration occur in user
departments. Organizations are unable to apply cost-effectiveness criteria.
Stage 4: Integration
This is the fourth stage of Nolan’s model, known as integration stage. At this stage data
processing has a new direction. Information systems are more information oriented,
i.e., they lay importance on information product. Because of this concept and to
facilitate it, there is an introduction of interactive terminals in the user department,
the development of database and the introduction of data communication technology
has taken place. The controlled user departments are now in a position to satisfy
the repressed demand for information support. So there is a tremendous growing
demand for IT applications. As a consequence of this, there is a hike in expenditure
also. A new problem has emerged, i.e., redundancy of data.
Stage 6: Maturity
Notes
This is the sixth stage. This was added to the enhanced model. This stage indicates
towards a mature organization, which took information system as an integral part of
the organization functioning. It indicates that the application portfolio is complete
and a representative of an organization’s activity. Actually, application portfolio
matches with the overall objectives of the organization. Planning of the information
system was coordinated and comprehensive because top management realized that
information was an important resource. Manager of information system is on the
same footing as other managers of the organization. Thus, planning of development
of information system in the organization is built into the organization’s overall
development.
There is a summarized view of Nolan’s stages and growth process at each stage in
Table 20.1.
Table 20.1: Stage of Nolan’s Model along with Growth Processes
Low High
Operating Application
Low
Support
Turnaround
Strategic
Factory
High
Fig. 20.3:
Goals, objectives, and strategies for information systems should fit with the culture
in order to avoid high resistance and high risk of failure. Clues of culture can be
obtained from the following sources:
!! Stories
!! Meetings
!! Top management behaviour
!! Physical layout
!! Ritual
!! Documents
20.5 Summary
!! The master plan typically has two components - (a) a long-range plan for
three to five years (or more) and (b) a short-range plan for one year.
!! The plan provides a basis for resource allocation and control. The long-
range portion provides general guidelines for direction and the short-range
Self-Instructional Material 421
IT and Management portion provides a basis for specific accountability as to operational and
Information System
financial performance.
!! The master development plan establishes a framework for all detailed
Notes
information system planning.
!! Information system planning is focused on determining the information
needs and also ensures that information system planning aligns with the
overall business planning.
!! For information system planning R.Nolan has given a model known as
Nolan stage model which initially had four stages of growth and later on it
was reviewed. As a result there is an addition of two intermediate growth
stages. The Nolan model basically describes in which stage organizations
information system exists. This will provide a base for planning to proceed
to next stage of the growth. We can see the contribution of this model for
MIS planning after going through each stage of Nolan’s model.
!! A number of techniques have been proposed for information system
planning. A problem is to evaluate the place of a technique in the flow of
activities for developing a long-range information plan and long-range
information architecture. The three-stage model of information system
planning developed by Bowman, Davis and Wetherbe (1983) clarifies the
basic planning activities, the order of activities and alternative techniques
and methodologies that apply.
20.6 Glossary
!! Master Development Plan: The master development plan establishes a
framework for all detailed information system planning.
!! Information System Planning: Information system planning is focused on
determining the information needs and also ensures that information system
planning aligns with the overall business planning.
!! Nolan Stage Model: The Nolan stage model explains the evolution of
information system within an organization by considering the various
stages of growth.
!! Subculture: Each organization has its own culture and subunits within the
organization possess their own culture which may be called subculture.
!! Strategic Planning: Strategic planning needs to be in line with organization
culture.
20.9 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson education,
2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn, ICFAI, 2002
3. Gordon B. Davis and Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and Development , 2nd Edition, Tata McGraw Hill
International Book Company, 2000
4. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer Williams C.
Perkins, Management Information Technology, 3rd Edition, Prentice Hall International
Edition, 1999
5. Harold Koontz and Heinz Weihrich, Essentials of Management, 5th Edition, Tata
McGraw Hill, 1999
Structure
21.0 Introduction
21.1 Unit Objectives
21.2 Organizational Information Systems Analysis (Requirement Analysis)
21.3 Information System Requirements
21.4 Resource Allocation
21.5 Summary
21.6 Glossary
21.7 Answers to Check Your Progress
21.8 Terminal and Model Questions
21.9 References
21.0 Introduction
In MIS, the information is recognized as a major resource like capital and time.
If this resource has to be managed well, it calls upon the management to plan for
it and control it, so that the information becomes a vital resource for the system.
A wide variety of techniques is applied for IS planning. However, organizations
select these techniques based on the persuasive power of IS developers rather than
on a sound logic. The main reason of selecting wrong techniques is attributed to
the non-identification of the stage the information system of the organization is in.
This model describes the four generic planning activities, viz., strategic planning,
requirement analysis, resource allocation and project planning.
424 Unit 21: Organizational Information Requirement Analysis and Resource Allocation Stage
Uttarakhand Open
21.2 Organizational information Systems University
Structured Analysis
Structured analysis is a development method for analysis of existing system. It is
a set of techniques that allow the analyst to design the proposed system. The main
purpose of structured analysis is to completely understand the current system.
ls e
et ye
D plo
ai
Em
2
Monthly
Accounts Advanced Salary
Calculation Salary
Department Salary of Net Details Registers
Vouchers Salary
3 Salary Details
Preparation
Pay slips of Pay slip
Employee & Advance Employee Details
Salary
ce Statement
d van ry
A ala nt
S me
te
Sta yal
Accounts Pa
Department
Fig. 21.1
426 Unit 21: Organizational Information Requirement Analysis and Resource Allocation Stage
Uttarakhand Open
the outputs. At first it identifies the outputs or services provided by the University
business processes. Then it describes the factors that make these outputs
effective for the user. Finally it selects the information needed to evaluate
the effectiveness of outputs
Notes
Define under Laying Organizational Sub-system
This is Done to Sub Divide the Major Activities
Fig. 21.2
System Operation
Before the system is in operation, the following issues should be taken care of:
!! Data security, backup and recovery;
!! Systems control;
!! Testing of the system to ensure that it works bug-free in all expected business
situations;
!! The hardware and software used should be able to deliver the expected
processing;
!! The system capacity and expected response time should be maintained;
!! The system should be well documented including;
A user guide for inexperienced users
A user reference or operations manual for advanced users
A system reference manual describing system structures and
architecture.
Once the system is fully operational, it should be maintained throughout its working
life to resolve any glitches or difficulties faced in operation and minor modifications
might be made to overcome such situations.
428 Unit 21: Organizational Information Requirement Analysis and Resource Allocation Stage
Uttarakhand Open
!! It should be easy to use and navigate with high response time. University
!! The implementation process should follow a definite goal and time.
!! All the users including the top management should be given proper training,
so that they have a good knowledge of the content and function of the system, Notes
and can use it fully for various managerial activities such as reporting,
budgeting, controlling, planning, monitoring, etc.
!! It must produce useful outputs to be used by all managers.
!! The system should be well integrated into the management processes of
planning, decision-making, and monitoring.
21.6 Glossary
430 Unit 21: Organizational Information Requirement Analysis and Resource Allocation Stage
Uttarakhand Open
21.7 Answers to Check Your Progress University
1. Requirements Analysis
2. Software Requirement Specification (SRS) document
Notes
3. Structured analysis
4. structured analysis
5. Business Systems Planning (BSP)
6. John Rockart of MIT
7. End/Means (E/M) analysis
8. Resource allocation
21.9 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson Education, 2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn , ICFAI, 2002
3. Gordon B. Davis Margrethe H. Olson, Management Information Systems: Conceptual
foundations, Structure and Development , 2nd Edition, Tata McGraw Hill International
Book Company, 2000
4. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer and
Williams C. Perkins, Management Information Technology, 3rd Edition, Prentice Hall
International Edition, 1999
5. Harold Koontz and Heinz Weihrich, Essentials of Management, 5th Edition, Tata
McGraw Hill, 1999
22.0 Introduction
All of you know that an Information System is a system that gathers data and
disseminates information with the sole purpose of providing information to its users.
The main objective of an information system is to provide information to its users.
Information systems vary according to the type of users who use the system. A
Management Information System is an information system that evaluates, analyzes,
and processes an organization’s data to produce meaningful and useful information
based on which the management can take right decisions to ensure future growth
of the organization.
22.5 Glossary
!! Information System: An Information System is a system that gathers data
and disseminates information with the sole purpose of providing information
to its users.
!! Management Information System: A Management Information System
is an information system that evaluates, analyzes, and processes an
organization’s data to produce meaningful and useful information based
on which the management can take right decisions to ensure future growth
of the organization.
22.8 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson Education, 2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn, ICFAI, 2002
3. Gordon B. Davis and Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and Development, 2nd Edition, Tata McGraw Hill
International Book Company, 2000
4. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer and
Williams C. Perkins, Management Information Technology, 3rd Edition, Prentice Hall
International Edition, 1999
5. Harold Koontz and Heinz Weihrich, Essentials of Management, 5th Edition, Tata
McGraw Hill, 1999
Implementation of MIS
Notes
Structure
23.0 Introduction
23.1 Computer Software Systems
23.3 MIS Development Process
23.1.1 Waterfall Model
23.1.2 Prototype Model
23.1.3 RAD Model
23.4 Implementations of Management Information System
23.5 Methods of Implementing Management Information System
23.6 Implementation Steps of Management Information System
23.7 Evaluation of Management Information System
23.8 Structure for Evaluation of Management Information System
23.9 Maintenance
23.10 Problems Related to the Maintenance of Management Information System
23.11 Measures to Overcome these Problems
23.12 Summary
23.13 Glossary
23.14 Answers to Check Your Progress
23.15 Terminal and Model Questions
23.16 References
23.0 Introduction
Computer software has become a driving force. It is the engine that drives business
decision making. It is a key factor that differentiates modern products and services.
Software is virtually inescapable in a modern world.
The software development process has been the focus of considerable attention over
the last decade. It is a frame work for the tasks that are required to blind high-quality
software.
Feasibility
Study
Maintenance Phase I
System
Analysis
Phase VII Phase II
SDLC
Testing Development
[Coding]
2. Systems Analysis: When the systems analyst decides that the requested system
is feasible and the management agrees to continue the development process,
the next phase of SDLC is determination of systems requirements. This phase
includes studying of existing system in details and collecting data in order to
find out the requirements of the users.
3. Systems Design: After collecting and studying user’s requirements, the system
is designed. This phase involves identification of inputs data, output reports
and the procedures to process the data.
4. Development of Software: When the design (properly documented) is accepted
by the requested department, the programmers start designing of data structures
and writing of program. The programmers test their individual programs and
integrate them into a single system.
5. Systems Testing: Testing is the most vital phase of SDLC. In this phase, the
system as a whole is tested with different techniques to ensure that the software
is bug free.
6. Implementation: The tested system is installed at the user’s place and
implemented. This is generally considered the last phase of SDLC. However,
Examples of SDLC
The phases of System Development Life Cycle are often sequenced in many different
ways so as to achieve different objectives. These variations give rise to different
Development Models. Each model aims at achieving its specific goals by arranging the
SDLC phases in appropriate ways. Some of the popular SDLC are described below.
23.1.1 Waterfall Model
This model of system development is the simplest in the sense that it follows all
the development phases in discrete steps one followed by the other. A phase does
not begin unless the previous phase has concluded as shown on the next page. The
development phases do not overlap and are mutually exclusive.
Existing
(Manual
System)
Problem Identification
Feasibility Study
Systems Vestigation
Systems Analysis
Systems Design
Implementation
New
Computerized
System)
Fig. 23.2
440 Unit 23: Development and Implementation of MIS
Uttarakhand Open
The name – waterfall – signifies that once a phase is over it is not the development University
does not enter it again much the same as water does not flow upwards in a waterfall.
User Interaction
Prototyping
Yes Modification
Needed
No
Final System
Fig. 23.3
Disadvantages of Prototyping
!! Increased project duration because of increased user interaction.
!! The approach needs special Software such as fourth generation languages.
!! Cost and duration of the development is not easy to estimate in advance.
23.1.3 RAD Model
Rapid Application Development or RAD is a software system development process
that involves use of Computer Aided Software Engineering tools (CASE). It was
developed by James Martin in the 1980s as a variant to prototype model.
CASE tools are employed to generate a system prototype to reflect the users’ primary
needs. The prototype thus produced is iteratively modified to incorporate the new
and additional needs of the user. In the process Visual Basic and Delphi can be used
as RAD tool. RAD model aims at reducing development time, though sometimes at
the expense of generating efficient executable code.
Notes
Parallel
When new and old systems run in parallel for a trial period and a comparison of both
is done. If the proposed system gives a satisfactory solution to information need, it
is accepted and old one becomes obsolete.
Pilot
In this the new system is introduced at one location or site only for trial. If its
performance is according to the need it is introduced in whole of the company or
organization.
Phased
Introduce the system in phases, i.e., the new system is introduced at one site at a
time. This method is useful when upgrading of an old system is being done.
Plunge
It is also known as immediate cut over or change-over. Introduce the new system as
and when it is ready to work and remove the old one directly.
Except for the timing and for obvious variations, the implementation steps for all
four methods may be covered together.
It should be pointed out that occasionally, design and implementation are carried
on simultaneously. Such a process provides operational testing of the design on
a continuous basis, but it limits consideration of major design alternatives. It is a
trial-and-error process. Completion of conceptual and analytical design in advance
of equipment installation offers many advantages besides cost.
So above are the four basic methods of implementing Management Information
System in an organization after the completion of the design.
Generating Files
Designing Forms
23.9 Maintenance
In the maintenance of Management Information System of organization, control and
maintenance of the system are the responsibilities of the managers. Control of the
system means the operation of the system as it was designed to operate. Sometimes
operators will develop their own private procedures or will short-circuit procedures
designed to provide checks. Often people make unauthorized changes to improve
the system, changes that are not approved or documented. Managers themselves
may not be factoring into decisions information supplied by the system, such as
sales forecast or inventory information, and may be relying on intuition. It is upto
management at each level in the organization to provide periodic spot-check of the
system for control purpose.
Maintenance is closely related to control. Maintenance is the ongoing activity that
keeps the Management Information System at the highest levels of effectiveness and
efficiency within cost constraints. In other words, maintenance of the Management
Information System is directed towards reducing errors due to design, environment
23.12 Summary
!! For development of a large software for any business application, many
people are involved and many months or even years are spent. Whether a
system is small or large, software development revolves around a life cycle
that with the recognition of user’s needs and understanding their problem.
The various phases involved include feasibility study, system analysis,
system design, and development of software, system testing, implementation
and maintenance. If the candidate system fails due to any major mistake
occurred in any of the development phase, any or all of the phases are
needed to be reviewed again, so that the system is completely accepted by
the requested department. Implementation is a next stage to design stage
which relates to introduce a new system in place of old system. Actually
23.13 Glossary
!! System Analysis: Study of existing system in detail and collecting data in
order to find out the requirements of the users.
!! System Design: Identification of input, output and procedures to process
the data.
!! System Testing: Testing of the whole system with different techniques to
ensure that the software is bug free.
23.16 References
1. N.D.Birrell and M.A.Ould, A Practical Handbook for Software Development,
Cambridge University Press
2. Pankaj Jalote, An Integrated Approach to Software Engineering, Springer
3. Roger S. Pressman, Software Engineering: A Practitioner’s Approach, McGraw-Hill
Professional
4. Peter J. L. Wallis, The Software Development Process, Pergamon Infotech
5. Scott E. Donaldson and Stanley G. Siegel, Successful Software Development, Prentice
Hall
24.0 Introduction
Decision support systems (DSS) are interactive software-based systems intended
to help managers in decision-making by accessing large volumes of information
generated from various related information systems involved in organizational
business processes such as office automation system, transaction processing system,
etc.
DSS uses the summary information, exceptions, patterns, and trends using the
analytical models. A decision support system helps in decision-making but does not
necessarily give a decision itself. The decision makers compile useful information
from raw data, documents, personal knowledge, and/or business models to identify
and solve problems and make decisions.
24.7 Objectives
There are three decision to be achieved by the decision support system, namely:
1. Increase the effectiveness of the manager’s decision-making process.
2. Supports the manager in the decision-making process but does not replace it.
3. Improve the directors’ effectiveness of decision making.
Comparison between Computer Systems and Decision Support Systems: Computer
systems are Management Information Systems that are programmed using the
computer, to help departments in their daily work and solve recurring problems
with the extraction of the required reports and statistics on a regular basis. While
decision support systems offer different alternatives to solve new and non-repeated
problems ( semi-programmed) clarifying the advantages and disadvantages and the
financial cost of each alternative, this is done by building separate data warehouses.
24.8 Components
The basic components of DSS are not predefined and therefore cannot be pre-
formatted because needs for types of information required for an unstructured problem
cannot be exactly determined and are always subject to change. The property of well
designed DSS is that it is flexible. To generate an effective computerized DSS, the
DSS generator, the model management system, the database management system and
the dialogue management system are used. The DSS generator is the software used
to develop DSS and coordinate its processing tasks. The model management system
enables the creation, maintenance and application of quantitative and statistical
prototypes or models to manipulate the DSS data as per the needs of the decision
maker. The database management system enables the decision maker to create,
Decisions Support
System
Components
Database
Management System
System Model
Management System
DSS Generator
Statistical Tools
Enable
!! Data handling tasks such as sorting and distributing data on the criterion
used by a decision maker;
!! Automated regression analysis used to discern trends for relevant predictions;
!! Automated correlation analysis used to determine strength of association
among number of variables;
!! Analysis of variance (ANOVA) used to show whether the groupings of
observations are statistically significant;
!! Non-parametric statistics used for samples of data where underline
probability distribution is not determinable ;
!! Cluster analysis used for classification of observations into groups such that
similarities within groups are minimized;
!! Factor analysis used to reduce a large number of variables into smaller
number of factors retaining the crux of information;
!! Forecasting prediction for future derived from the statistical inferences from
most of the analysis techniques defined above.
Database Management
Important optimizing tools have already been discussed under the purview of
operational research systems. These recommend certain choices to the decision maker
and generate an assortment of predictive information and optimizing techniques.
24.10 Summary
!! Decision support systems (DSS) are interactive software-based systems
intended to help managers in decision-making by accessing large volumes
24.11 Glossary
!! Decision Support System: Provides solutions to the unstructured problems
using simulation techniques and system models.
!! Unstructured Decisions: Decisions which are not well-defined and have no
pre-specified procedure.
!! Intelligence Stage: An information system may provide information about
internal as well as external environments.
Notes
24.13 Terminal and Model Questions
24.14 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson Education,
2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn, ICFAI, 2002
3. Gordon B. Davis, Margrethe H. Olson, Management Information Systems: Conceptual
Foundations, Structure and Development, 2nd Edition, Tata McGraw Hill International
Book Company, 2000
4. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer,
Williams C. Perkins, Management Information Technology, 3rd Edition, Prentice Hall
International Edition, 1999
5. Harold Koontz, Heinz Weihrich, Essentials of Management, 5th Edition, Tata McGraw
Hill, 1998
Structure
25.0 Introduction
25.1 Unit Objectives
25.2 Problem in Developing MIS
25.3 Problems and Solutions in Implementing Management Information
System
25.4 Inference
25.5 Role of MIS
25.6 Components of a Good MIS Solution
25.7 Functionality and Expandability
25.8 Flexibility
25.9 Usability
25.10 Reports
25.11 Standards and Compliance
25.12 Administration and Support
25.13 Technical Specifications and Correctness
25.14 Cost
25.15 Summary
25.16 Glossary
25.18 Answers to Check Your Progress
25.19 Terminal and Model Questions
25.20 References
25.0 Introduction
Management Information System (MIS) can be defined as collecting and processing
of raw data into useful information and its dissemination to the user in the required
format. It consists of information, which impacts managements to feel the pulse of
the organization and take decisions accordingly. In fact a full MIS consists of all the
systems that the institution uses too generate the information that guide management’s
decisions and actions.
25.4 Inference
All these wide variations complicate the development of software that can be
picked off the shelf and implemented in most of the MFIs. It creates great burden
on software companies creating quality application that is affordable and meets
all the requirements of the MFIs. In fact this is the major problem faced by those
responsible for providing automation in the industry.
The need of technology cannot be overstated but the complexity and diversity forces
one to take a hand look at the following:
1. What is the role of MIS in improving the sustainability of MFIs?
2. What are the basic components of sound microfinance packages for MFIs?
3. Why are there so few solutions available?
25.5.1 Sustainability
Let us look at what does the MIS do for the sustainability of MFIs?
The answer is Nothing., MIS will not do much for the sustainability of microfinance
if institutions ignore good business practices. The following are some of the widely
stipulated best business practices :
1. Focus on profitability
2. Quality loans
3. Provision for loan loss reserve
25.5.2 Uses of MIS
1. Since it can be programmed to follow business rules uniformly, MIS reinforces
discipline in accounting and portfolio tracking.
2. Computers can link all data pertaining to a customer or customer group hence
MIS can provide a consolidated view of each customer or group.
3. MIS allow for single entry of data that can then be used by many people. Data
once entered can be accessed, manipulated and used by all users. Thus MIS
reduces duplication of effort and increases speed of work.
4. MIS integrates information and process.
5. MIS supports workflow and procedures for users.
6. MIS can be ported to remote areas via laptop or palm technology.
7. MIS application can be customized or enhanced to support new products and
institutional growth.
The MIS solution for the MFIs should have some sort of functional completeness
and integration. The areas that must be covered by the solution should be:
1. Accounting packages: The solution should have an accounting component
wherein the data can be captured regarding the financial transactions of the MFI.
2. Portfolio tracking: The solution should have a module for entering the details
of the various products of the MFI and its linking individual borrower-wise
in order to enable the organization to track its loan portfolio and product mix.
3. Deposit Monitoring: The solution should have the data about the depositors of
the MFIs wherein tracking could be done individually unit wise depending on
the practice being followed by the MFI. In case it is accepting deposits from the
individuals then it should be capable of handling data individual borrower-wise
or in case it is accepting deposits from the groups then it should be capable of
handling data groupwise.
4. Customer Information Systems: The software should be capable of capturing
non- financial data about the customer also. e.g. The software should be able
to capture the details like name, address, family history and other demographic
information which is needed to maintain proper records and identifying the
customer.
The software should be capable of handling large volumes of data so that it is to
handle the growing needs of the organization. In fact the software should be capable
of growing with the organization. This is critical as MFIs can grow very fast.
25.9 Usability
The success of the software depends, more than anything else, on its deployment
and adaptability at the user’s end. Since most of the MFIs do not have a specialized
MIS department or computer professionals, the MIS software should be user friendly.
To begin with the software one should have a familiar and friendly user interface.
The software should be window based as that is the most popular operating system
in today’s world.
The display on the screen should be logical. there should be consistency in terms of
language format and functions. The data entry should be easy and straightforward
for the user to understand.
The software vendor should provide some amount of training while implementing
the software. User documentation and on-line help should be provided in order to
enable the MFIs to maintain continuity at its level in case of employee turnover or
25.10 Reports
The reports required by any MFIs can be classified into 4 categories, viz.
1. General Reports: By general reports we mean reports like the performance
on the budgetary front like comparative report on actual expenses vis-à-vis
the budgeted expense or say report on consolidated performance of the MFI.
2. Management Reports: These are the types of reports that are generally for the
usage of management for decision making and monitoring the performance of
the MFIs, e.g., report providing the statistical summary about the MFI, statement
of cash flows, delinquencies, etc.
3. Financial Reports: These are the standard reports about the financial
transactions by the MFIs, e.g., trial balance, daily transactions, audit reports, etc.
4. Customer Reports: These are customer specific reports, e.g., account statement,
balance inquiries, etc..
The software should have the capabilities for generation and linking of these reports
automatically. Most software’s do contain a host of predefined reports.
Depending on the nature of work and the organizational structure, different MFIs
have different modes and timings for generation of reports. Hence, the system should
be capable of generating the reports online or in batch mode on real time or set
schedule basis. The software should have the flexibility of generating ad hoc, i.e.,
user defined reports in addition to the predefined reports. To facilitate meaningful
inquiry into the database the software should also provide for some tool based report
generation capability.
25.14 Cost
The price and cost of software can be argued from the point of view of value to
the institution. The price of the software should be commensurate to the level of
complexity or functionality. The price should be such that the MFI gets a high return
on investment. The cost of the software may be worked out in terms of the cost per
25.15 Summary
!! A Management Information System is an information system that evaluates,
analyzes data and also ease the operation of organization.
!! Accounting packages solution should have an accounting component
wherein the data can be captured regarding the financial transactions of
the MFI.
!! The solution should have a module for entering the details of the various
products of the MFI and its linking individual borrowerwise in order to
enable the organization to track its loan portfolio and product mix.
!! The solution should have the data about the depositors of the MFIs wherein
tracking could be done individual unit wise depending of the practice being
followed by the MFI. In case it is accepting deposits from the individuals
then it should be capable of handling data individual borrower – wise or in
case it is accepting deposits from the groups then it should be capable of
handling data groupwise.
!! Customer Information Systems software should be capable of capturing
non- financial data about the customer also. e.g. The software should be
25.16 Glossary
!! Strategies: A strategy is a general direction in which an objective is to be
sought.
!! Management Information System: A Management information system, or
MIS, broadly refers to a computer-based system that provides managers
with the tools to organize, evaluate and efficiently manage departments
within an organization.
25.19 References
1. Amrit Tiwana, The Essential Guide to Knowledge Management, Pearson Education, 2001
2. Ratnaja Gogula, Knowledge Management – A New Dawn, ICFAI, 2002
3. Gordon B. Davis and Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and Development, 2nd Edition, Tata McGraw Hill
International Book Company, 2000
4. John Cann., Microfinance Institutions issues in Sustainability: Chapter on Management
Information System: Issues and Challenges
5. Ramesh Arunachalam, Design and Implementation of MIS in MFIs
6. E. Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer and
Williams C. Perkins, Management Information Technology, 3rd Edition, Prentice Hall
International Edition, 1999
7. Harold Koontz and Heinz Weihrich, Essentials of Management, 5th Edition, Tata
McGraw Hill, 1999