0% found this document useful (0 votes)
31 views181 pages

Information Technology: M.SC., Geography

The document outlines the course structure for B.Sc Geography, specifically focusing on Information Technology (BGEOSA-41) for Semester IV at Tamil Nadu Open University. It includes details on course design, writers, and coordinators, along with a comprehensive syllabus covering topics such as computer basics, memory units, internet and networking, basic software, and applications. The course aims to provide students with fundamental knowledge of computer systems, their evolution, applications, advantages, and limitations.

Uploaded by

Manoharan K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views181 pages

Information Technology: M.SC., Geography

The document outlines the course structure for B.Sc Geography, specifically focusing on Information Technology (BGEOSA-41) for Semester IV at Tamil Nadu Open University. It includes details on course design, writers, and coordinators, along with a comprehensive syllabus covering topics such as computer basics, memory units, internet and networking, basic software, and applications. The course aims to provide students with fundamental knowledge of computer systems, their evolution, applications, advantages, and limitations.

Uploaded by

Manoharan K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 181

BGEOSA_41

M.Sc., Geography
Semester - IV

INFORMATION
TECHNOLOGY

Department of Geography
School of Sciences
Tamil Nadu Open University
Chennai – 600 015.
BACHELOR OF SCIENCE IN GEOGRAPHY

INFORMATION TECHNOLOGY

BGEOSA-41

SEMESTER-IV

Department of Geography,
School of Science
Tamil Nadu Open University
577, Anna Salai, Saidapet, Chennai - 600 015
www.tnou.ac.in

May 2023
Name of Programme: B.Sc Geography

Course Code: BGEOSA-41

Course Title: Information Technology

Course Design: Dr. K. Katturajan


Assistant Professor,
Department of Geography,
School of Science,
Tamil Nadu Open University, Chennai -600 015

Course Writers: Dr. R. Kalaiarasi


Assistant Professor
School of Computer Science
Tamil Nadu Open University
Saidapet, Chennai - 600 015.

Course Coordinator: Dr. K. Katturajan

May 2023 (First Edition)

ISBN No: 978-93-5753-023-1

© Tamil Nadu Open University, 2023


All rights reserved. No part of this work can be reproduced in any form, by mimeograph or any other
means, without permission in writing from the Tamil Nadu Open University. Course Writer is the sole
responsible person for the contents presented / available in the Course Materials. Further information on
the Tamil Nadu Open University Academic Programmes may be obtained from the University Office at
577, Anna Salai, Saidapet, Chennai-600 015. [or] www.tnou.ac.in

@TNOU, 2023 “Information Technology” is made available under a Creative Commons


Attribution-Share Alike 4.0 License (International)
https://creativecommons.org/licenses/by-sa/4.0/

Printed by:
BGEOSA 41: Information Technology
Syllabus
Block 1: Introduction to Computers

1. Introduction to Computers
2. Generation of Modern Computers
3. Classification of Digital Computer Systems
4. Anatomy of a Digital Computer Input and output Devices

Block 2: Memory Units:


5. RAM, ROM, PROM, EPROM, and EEPROM Auxiliary Storage Devices
6. Programming Languages: Machine Language, Assembly Language,
7. High Level Language, Types of High-Level Language
8. Compiler and Interpreter.

Block 3: Internet and Networking

9. Number Systems
10. Networking
11. Communication Media,
12. Internet and Intranet, email
13. Cloud computing

Block 4: Basic Software


14. Introduction to Software
15. MS-Word
16. MS-Excel and MS Access
17. Power Point

Block 5: Applications

18. Web mapping applications


19. Mobile applications
References

1. Rajaraman, v., 2018. Introduction to Information technology Publisher phi learning pvt.
Ltd publication, ISBN: 9387472302, 9789387472303
2. Alexis Leon and Mathews Leon., 1999. Fundamentals of Information Technology”, Leon
TECH World.
3. Pelin Aksoy, Laura DeNardis., 2007. Information Technology in Theory - Cengage
Learning publishing, ISBN: 1423901401, 9781423901402
4. Peter Norton., 1998. Introduction to Computers, TMH 6th Edition (for Units IV, V Chapters
13,14)
5. Stephen Doyle., 2000. Understanding Information Technology - Nelson Thornes
publication, ISBN: 0748736093, 9780748736096
Web Sources

1. https://www.sciencedirect.com/topics/computer-science/supercomputer

2. https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-interaction/

3. https://tutorialsjoint.com/anatomy-of-digital-computer/

4. https://benchpartner.com/anatomy-of-a-digital-computer

5. http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-MA-Linguistics-4-
HarjitSingh-ComputationalLinguistics-1.pdf
BGEOSA 41: Information Technology

Unit Page
Contents
No Number

Block 1: Introduction to Computers

1 Basics of Computer 02

2 Introductions of Computers 16
Block 2: Memory Units

3 Storage Devices 27

4 High Level Languages 36


Block 3: Internet and Networking

5 Number System and Networking 43

6 Internet and Intranet, Email 64

7 Cloud Computing 82
Block 4: Basic Software

8 Introduction to Basic of Software 100


Block 5: Applications

9 Web mapping applications 136

10 Mobile applications 144


Block 1
Introduction to Computers

Unit - 1 BASICS OF COMPUTER

Unit - 2 INTRODUCTIONS OF COMPUTERS

1
Unit-1
BASICS OF COMPUTER
Overview
Learning objectives
1.1 History - Introduction to Computers

1.1.1 Evolution of Computer


1.2 Generation of Computers
1.3 Applications of Computer

1.4 Advantages of computers


1.4.1 Limitations of a Computer System
1.5 Characteristics of Computer
1.6 Memory Units
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the first unit of our course computer concepts. It will introduce you
to some of the basic concepts of computer in traditional approach.
Through this unit, the history of computer, application, generation,
advantages, characteristics and memory units of computer are
discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the fundamental concepts of Computer.
 Idea about the generation of computer and its History.
 Get the knowledge of its classification, Benefits and limitations.

2
1.1 History-Introduction to Computers

Definition

The term "computer" comes from the Latin word "Computus," which
means "to calculate" or "to compute."
A Computer is anything that transforms process information in a
purposeful way.
In Simple terms

A computer is a device that accepts data and instruction (in the form of
digitalized data) and processes it according to the given instruction and
gives the output.
OR

A computer can be represented as an electronic calculating device that


accepts raw data as input, processes it and produces meaningful
information i.e. output as result.

1.1.1 Evolution of Computer

Ever since Human understood the concept of communication, numbers,


and counting, their primary style to counting and data calculations with
help of sticks or lines on walls of caves. Then they moved towards
counting using ten fingers of their hands, which probably is the basis of
present decimal system.

According to the history the first computing device, which was developed
before 5000 years by China is ABACUS. By which we can calculate

3
simple addition and subtraction. It is still in use in South East Asia, China
and Japan.

The first mechanical calculating machine, which is capable to perform


different arithmetic operations, was developed in early 1642, which was
initiated by French scientist BLAISE PASCAL (1623-1662). This
calculating machine primarily perform only two basic operations i.e.
addition and subtraction. This was named as Pascaling.
In 1822, Charles Babbage designed the early computer called difference
engine. This could produce logarithm tables. He improved this machine
and came out with a new idea of Analytical Engine in 1833, which could
perform the basic arithmetic functions. This machine used punch as input
output devices. He is called as "FATHER OF COMPUTERS".
Mark One was the first electric and mechanical computer discovered by
Howard Aekain in 1939. Who work multiply is 6 sec and division in 12
sec.
The first electronic computer, ENIAC (Electronic Numerical Integrator and
Computer) was designed in 1946. It has capability to perform about 5,000
calculations per second. This was a huge computer which occupied
about 1,500 sq. ft and weighed about 50 tons. This is also considered as
the 1st generation of Computer.

The computer as we recognize it today had its beginning with a 19th


century English mathematics professor name Charles Babbage. He
designed the Analytical Engine and it was this design that the basic
framework of the computers of today are based on. In the present 21st
century we depend on computers to fulfill our requirements at a very
short period of time.

Some of the many purposes where Computers are used are


1. Email service such as Yahoo, Gmail for quick delivery of
messages.

2. In hospitals for the purpose of patient care and hospital billing.


3. Telecommunications in the form of mobile phones.
4. Defense in the form of missile guidance system and other
defense activities.

4
1.2 Generation of Computers

The evolution of computers can be divided into five generations. Each


generation represents technological evolutions over the period of time. In
each generation We are seeing improvements in computers that are
faster, more powerful, and smaller than previous generation. The five
generation of computers with their technological advancements are
discussed below.
 1st Generation: - PERIOD :-( 1946-1959).

 Used Vacuum tubes which radiated a lot of heat.


 Worked on batch processing operating systems
 Input devices used: - Punched Cards, paper tape, magnetic tape.
 Output devices used: - punched cards, paper tape, and magnetic
tape.
 Used machine code as programming language.
 Consumed a lot of electricity
 Slow input and slow output
 Very huge in size and not portable.

Some of the examples of 1st Generation computers are ENIAC, EDVAC,


UNIVAC, IBM-701 and IBM-650
 2nd Generation: - (1959-1965)

 Used transistors which consumed less power.


 More compact in size
 More reliable and faster than the first generation computers

 Used magnetic core as the primary memory and magnetic tape


and magnetic disk as secondary memory.
 Used machine, assembly language and high level programing
languages such as FORTRAN, COBOL.
 Used batch processing and multiprogramming operating systems.
 Needed A/C Some of the examples of 2nd Generation computers
are IBM 1620, IBM 7094, CDC 1604, CDC 3600 and UNIVAC
1108.

5
 3rd Generation (1965-1971)

 Used Integrated Circuits.

 More reliable and faster in comparison to the previous 2


generation computers.
 Less heat and less maintenance.

 Consumed less electricity


 Costly and supported high level languages.
Some of the examples of 3rd Generation computers are: IBM-360 series,
PDP (Personal Data Processor), IBM-370/168, TDC-316, Honeywell-
6000 series.
 4th Generation ((1971-1980)

 Microprocessor Based
 Uses VLSI(Very large scale Integration Circuit) Technology
 Very cheap
 Portable and reliable
 Use the concept of pipeline processing
 No A/C required

 Internet was introduced in these systems


Some computers of this generation were: PDP 11, DEC 10, STAR 1000,
CRAY-X-MP (Super Computer), CRAY-1(Super Computer)
 5th Generation (1980- till date)

 Used Ultra Large Scale Integration circuits


 Use of high level languages such as C,C++,Java, vb.net.c#.net

 Use of web development and web technologies


 High speed portable and reliable
 Used natural language processing

 Used parallel processing


 More friendly user interfaces with multimedia features
 Use of web technologies such as php,JSP,J2EE,SAP

6
 Used super conductor technology
 Very powerful compact computers at cheaper rates

Some of the computers of this generation are


 Desktop

 Laptop
 Notebook

7
1.3 Applications of Computer

Computers are used in areas which need huge amount of data to be


processed at a short period of time to give desired required output.
Where computer is used

Computer is used in many fields and they are


1. Research: Scientific Calculations where a human is prone to error.

2. Large scale data processing which human being cannot do


3. Getting data from dangerous locations where a human being cannot
reach or may lose life.
4. Telecommunication and many more
5. Education: The computer provides various tools in the education
system like Computer Based Education that involves control, delivery,
and evaluation of learning
6. Health care: It is used in hospitals to keep the record of patients and
medicines. It is also used in scanning and diagnosing diverse
diseases. ECG, EEG, ultrasounds and CT scans, etc. are also done
by computerized machines.
7. Entertainment: Audio video editing and pre and post production
activity is being done using computer system.
8. Banking: banking system is completely dependent on Computer
system. Online accounting facility, which includes checking current
balance, making deposits and overdrafts, checking interest charges,
shares, and trustee records.
9. Engineering Design: One of the major areas is Computer Aided
Design that provides creation and modification of images.
10. Defense: Computers are largely used in defense. Modern tanks,
missiles, weapons, etc. Military also employs computerized control
systems.
11. Weather forecasting: Huge capacity computer systems are used in
weather forecasting.

8
1.4 Advantages of Computers

Multitasking

Multitasking is one of the major advantages of computer. Person can


perform multiple tasks, multiple operations, calculate numerical
problems within few seconds. Computer can perform trillion of
instructions per second.
Speed

Now computer is not just a calculating device. Now a day’s computer


has very important role in human life. One of the main advantages of
computer is its incredible speed, which helps human to complete their
task in few seconds. All the operations can be performed very fast just
because of its speed else wise it takes a long time to perform the task.
Cost/ Stores huge amount of data

It is a low cost solution. Person can save huge data within a low budget.
Centralized database of storing information is the major advantage that
can reduce cost.
Accuracy

One of the root advantage of computer is that can perform not only
calculations but also with accuracy.
Data Security

Protecting digital data is known as data security. Computers provide


security from destructive forces and from unwanted action from
unauthorized users like cyber attack or access attack.

There are some main limitations of computer system are given below:-
 Lack of common-sense

 Zero IQ

 No Feeling

 Computers can’t Decide

 Computers can’t Express their Ideas

 Computers can’t Implement

 Computers can’t Think

9
 Depend on the user input.

 An expert user can work on a computer

1.4.1 Limitations of a Computer System:

Although a computer is far better in performance than a human being, it


fails in certain ways as follows:
(i) Computers can’t think:

Computers cannot think and they can’t do any job unless they are first
programmed with specific instructions for same. They work as per stored
instructions. Algorithms are designed by humans to make a computer
perform a special task. This is also called artificial intelligence.
(ii) Computers can’t decide:

Computers are incapable of decision making as they do not possess the


essential elements necessary to take a decision i.e. knowledge,
information, wisdom, intelligence and the ability to judge.
(iii) Computers can’t express their Ideas:

In any type of research ideas plays a vital role. In this context, computers
can’t express their ideas.
(iv) Computers can’t implement:

Though computers are helpful in storage of data and can contain the
contents of encyclopedias even, but only humans can decide and
implement the policies.
Limitations of Computer Systems
Limitations are the drawbacks of the computer system in which humans
outperform them.
Lack of common-sense
This is one of the major limitations of computer systems. No matter how
efficient, fast and reliable computer systems might be but yet do not have
any common sense because no full-proof algorithm has been designed to
programme logic into them. As computers function based on the stored
programme(s), they simply lack common sense.

10
Zero IQ

Another limitations of computer systems is that they have zero Intelligence


Quotient (IQ). They are unable to see and think the actions to perform in a
particular situation unless that situation is already programmed into them.
Computers are programmable to complete each and every task, however
small it may be.
Lack of Decision-making

Decision-making is a complicated process involving


information, knowledge, intelligence, wisdom, and ability to judge. The
computer system does not have the ability to make decisions on their own
because they do not possess all the essentials of decision-making.

They can be programmed to take such decisions, which are purely


procedure-oriented. If a computer has not been programmed for a particular
decision situation, it will not take a decision due to lack of wisdom and
evaluation faculties. Human beings, on the other hand, possess this
great power of decision-making.

1.5 Characteristics of Computer

Computer is the most powerful machine in today's world. It has become


the need in everyone's life. A computer can carry out task very quickly
and accurately. Computer has its own features and characteristics. The
characteristics of computers that have made them so collectively useful
are speed, accuracy, diligence, versatility, storage capacity, power of
remembering, no IQ, no feeling.
Efficiency: The time take to process data by computer is called speed of
computer. Calculations that we take hours to complete computer take
only a few seconds to complete it. The speed of computer is measured in
MIPS (Millions Inch per Seconds).
Speed: - In terms of speed computers can work extremely fast to achieve
the needs of a human within a short span of time.
Accuracy: - In terms of accuracy the computer is 100 % accurate and so
computerized calculation is known importance in the field of science and
other subjects.
Diligence: - Computer can work for hours without any break and creating
error.

11
Versatility: - We can use computer to perform completely different type
of work at the same time.
Storage Capacity: - Computer can store mass storage of data with
appropriate format.
Reliability: The computer is a reliable electronic multipurpose and
multiprocessing machine. It processes data with high accuracy without
any mistakes.
Power of Remembering: - It can remember data for us. One of the
illustrations includes mobile phones which retrieve phone numbers when
the name is selected or the name of the person when the mobile number
is dialed.
No IQ: - Computer does not work without instructions.
No feeling: - Computer does not have emotions, knowledge, experience,
and feeling.
Artificial intelligence: The fifth generation computer which recognizes
voice is based on artificial intelligence. The AI is applied in gaming
software, and robotics from many years, but operating system based on
AI is also in process which can recognize not only voice, but read mood
of users also. It gives suggestion and decision on complex problems.
1.6 Memory Units

Memory unit is the amount of data that can be stored in the storage unit.
That in which storage capacity is expressed in terms of Bytes.

12
Sl. No. Unit Description
1 Bit (Binary Digit) A binary digit is logical 0 and 1 representing
a passive or an active state of a component
in an electric circuit.
2 Nibble A group of 4 bits is called nibble.
3 Byte A group of 8 bits is called byte. A byte is the
smallest unit which can represent a data
item or a character.
5 Kilobyte (KB) 1 KB = 1024 Bytes
6 Megabyte (MB) 1 MB = 1024 KB
7 Giga Byte (GB) 1 GB = 1024 MB
8 Tera Byte (TB 1 TB = 1024 GB
9 Peta Byte (PB) 1 PB = 1024 TB
10 Exa Byte 1 EB = 1024 PB
11 Zetta Byte 1 ZB = 1024 EB
12 Yotta Byte 1 YB = 1024 ZB
13 Bronto Byte 1 BB = 1024 YB
14 Geop Byte 1 GB = 1024 BB

13
Let Us Sum Up

From this unit we have come across the computer definition with its
history and also know about its areas where it is used.we have also
discussed about the types ,benefits and limitation too.

Check Your Progress

1. What is computer?
2. Mention the areas of computer used.
3. ______, ______, ______ are the limitations of computer.

4. What do you mean by multitasking.


5._____________ computer =Analog + Digital
6. Name the classifications of computer with example.
7. _____________ is known as data security .

Glossaries

Diligence : careful
Manipulate : handle or control
Forecasting : predict
Robustness :the quality or condition of being strong and in good
condition

Suggested Readings

 https://www.sciencedirect.com/topics/computer-
science/supercomputer
 https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-
interaction/

 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress

1. The term "computer" is comes from the Latin term


"Computus," which means "to calculate" or "to compute."
2. Computers are used in various areas like research, education,
telecommunication, banking, entertainment, healthcare, Defence.

14
3. The limitations are –
 Lack of common-sense

 Zero IQ
 No Feeling
4. Multitasking is the central theme of modern operating system. it
facilitate loading several jobs into main memory.
5. Hybrid.
6. System Software -Example include Linux, Unix, Windows and
Application Software- Example include MS Word, MS Excel are the
classifications of Computer
7. Protecting digital data.

15
Unit-2
INTRODUTION OF COMPUTER
Overview
Learning objectives
1.1 Introduction to Digital Computers

1.1.1 Digital Computers


1.2 Functional Elements of Digital Computers
1.3 Development of Digital Computers
1.4 Classification of Computers
1.5 Anatomy of a Digital Computer Input and output Devices
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the first unit of our course is computer concepts. It will introduce
you to some of the basic concepts of computer in traditional approach.
Through this unit, the introduction of digital computer, classification, and
anatomy of digital computer are discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Digital Computer.

 Idea about the classification of computer and its History.


 Get the knowledge of its classification, Benefits and limitations and
many types of computers
 .Get to know about the anatomy of input and output devices.

16
1.1 Introduction to Digital Computers

Definition

A computer is an electronic device that accepts raw data and processes


it to produce meaningful information according to some given instructions
by a user.

Any computer should execute the following four functions:


1. Receives data as input.
2. Stores data and instructions in its memory.

3. Processes the data according to given instruction by the user into


useful information.
4. Produces output.

1.1.1 Digital Computer

It operates on data, including magnitudes, letters, and symbols, that are


expressed in binary code—i.e., using only the two digits 0 and 1. By
counting, comparing, and manipulating these digits or their combinations
according to a set of instructions held in its memory, a digital computer
can perform such tasks as to control industrial processes and regulate
the operations of machines; analyze and organize vast amounts of
business data; and simulate the behaviour of dynamic systems (e.g.,
global weather patterns and chemical reactions) in scientific research. In
1822, Charles Babbage designed the early computer called difference
engine. This could produce logarithm tables. He improved this machine
and came out with a new idea of Analytical Engine in 1833, which could
perform the basic arithmetic functions. This machine used punch as input
output devices. He is called as "FATHER OF COMPUTERS".
The first electronic computer, ENIAC (Electronic Numerical Integrator and
Computer) was designed in 1946. It has capability to perform about 5,000
calculations per second. This was a huge computer which occupied
about 1,500 sq. ft and weighed about 50 tons. This is also considered as
the 1st generation of Computer.
The computer as we recognize it today had its beginning with a 19th
century English mathematics professor name Charles Babbage. He
designed the Analytical Engine and it was this design that the basic
framework of the computers of today are based on. In the present 21st

17
century we depend on computers to fulfill our requirements at a very
short period of time.

Some of the many purposes where Computers are used are


 Email service such as Yahoo, Gmail for quick delivery of
messages.

 In hospitals for the purpose of patient care and hospital billing.


 Telecommunications in the form of mobile phones.
 Defense in the form of missile guidance system and other
defense activities.

1.2 Functional elements of Digital Computers

A typical digital computer system has four basic functional elements:


(1) input-output equipment, (2) main memory, (3) control unit, and
(4) arithmetic-logic unit. Any of a number of devices is used to enter data
and program instructions into a computer and to gain access to the
results of the processing operation. Common input devices include
keyboards and optical scanners; output devices include printers and
monitors. The information received by a computer from its input unit is
stored in the main memory or, if not for immediate use, in an auxiliary
storage device. The control unit selects and calls up instructions from the
memory in appropriate sequence and relays the proper commands to the
appropriate unit. It also synchronizes the varied operating speeds of the
input and output devices to that of the arithmetic-logic unit (ALU) so as to
ensure the proper movement of data through the entire computer system.
The ALU performs the arithmetic and logic algorithms selected to process
the incoming data at extremely high speeds—in many cases in
nanoseconds (billionths of a second). The main memory, control unit, and
ALU together make up the central processing unit (CPU) of most digital
computer systems, while the input-output devices and auxiliary storage
units constitute peripheral equipment.

1.3 Development of Digital Computer

Blaise Pascal of France and Gottfried Wilhelm Leibniz of Germany


invented mechanical digital calculating machines during the 17th century.
The English inventor Charles Babbage, however, is generally credited
with having conceived the first automatic digital computer. During the
1830s Babbage devised his so-called Analytical Engine, a mechanical

18
device designed to combine basic arithmetic operations with decisions
based on its own computations. Babbage’s plans embodied most of the
fundamental elements of the modern digital computer. For example, they
called for sequential control—i.e., program control that included
branching, looping, and both arithmetic and storage units with automatic
printout. Babbage’s device, however was never completed and was
forgotten until his writings were rediscovered over a century later.
Of great importance in the evolution of the digital computer was the work
of the English mathematician and logician George Boole. In various
essays written during the mid-1800s, Boole discussed
the analogy between the symbols of algebra and those of logic as used
to represent logical forms and syllogisms. His formalism, operating on
only 0 and 1, became the basis of what is now called Boolean algebra,
on which computer switching theory and procedures are grounded.
John V. Atanasoff, an American mathematician and physicist, is credited
with building the first electronic digital computer, which he constructed
from 1939 to 1942 with the assistance of his graduate student Clifford E.
Berry. Konrad Zuse, a German engineer acting in virtual isolation from
developments elsewhere, completed construction in 1941 of the first
operational program-controlled calculating machine (Z3). In 1944 Howard
Aiken and a group of engineers at International Business Machines (IBM)
Corporation completed work on the Harvard Mark I, a machine whose
data-processing operations were controlled primarily by electric relays
(switching devices).

1.4 Classification of Digital Computers

The digital computers that are available now a days vary in their sizes
and types.These digital computers are broadly classified into four
categories based on their size and type.
 Micro Computer

 Mini Computer
 Mainframe Computer
 Super Computer

19
Micro Computer:

Micro Computer are small low cast and single user digital computers.It is
a device with microprocessor,Input unit ,storage unit and CPU(Central
Processing Unit).
Microcomputer Computer formerly a commonly used term for Personal
Computers particularly any of class of any small digital computers.Its
CPU contained on a single integrated semi conductor chip.
IBM PC based on Pentium microprocessor and Apple Macintosh are
some Examples of microcomputers. Microcomputers include desktop
computers, notebook computers or laptop,tablet compute, handheld
computer,smartphones and notebook.

Types of Micro Computers:


A) Desktop Computer or Personal Computer(PC):-It is the most type
of microcomputer.A desktop computer is a personal computer designed
for regular use at a single location on or near a desk or table due to its
size and power requirements.It is not very expensive and is suited t the
needs of a single user at home,small business units,and organization.
Examples:Apple,Microsoft,Dell,and Lenovo ,Sony,HP,etc are some of the
PC manufactures.
B)Notebook Computers or Laptop:-A laptop is a small,
portable computer and have all the features of a desktop computer. The
advantage of the laptop is that it is small in size, so it can be carried
anywhere. Notebook computers use a variety of techniques, known as
flat-panel technologies, to produce a lightweight and non-bulky display
screen. Laptops Computers are costlier than the desktop computers.
C)Netbook:-These are smaller notebooks optimized for low weight and
low cost, and are designed for accessing web-based
applications.Netbooks deliver the performance needed to enjoy popular
activities like streaming videos ort music,e-mailing,web surfing or instant
messaging.
D)Tablet:- A tablet is a wireless, portable personal computer with
a touchscreen interface. The tablet form factor is typically smaller than a
notebook computer, but larger than a smartphone.
E)Handheld Computer or Personal Digital Assistant(PDA):-It is a
small computer that can be heald on the top of the palm.It is small in

20
size.PDA uses a pen or a stylus for input,instead of the keyboard.They
have a limited memory and are less porful.PDAs can be connected to the
internet via wireless connnection.
F)Smart Phones:A smartphone is a mobile phone with highly advanced
features. A typical smartphone has a high-resolution touch screen
display, WiFi connectivity, Web browsing capabilities, and the ability to
accept sophisticated applications. The majority of these devices run on
any of these popular mobile operating systems: Android, Symbian, iOS,
BlackBerry OS and Windows Mobile.
Mini Computer:

These perform multi-tasking and allow terminals to be connected to their


services.the ability to connect minicomputers to each other and
mainframes has popularized them among larger businesses.This use is
being challenged by the development in the microcomputer range and
the practice of starting resources of microcomputer under a
network.Minicomputer are still recognized as being able to process large
amounts of data.
Types of minicomputer

The types of minicomputer are- tablet PC, Desktop minicomputers, cell


phones, notebooks, high-end mP3 players, etc.
Mainframe Computer:
Main frame computers generally require special attention and are kept in
a controlled atmosphere.They are multi-tasking and generally used in
areas where large database are maintained example as government
agency or airline industry.
Examples:- IBM LinuxONE
Super Computer:

Super Computers operate very fast and have multiple processors. Ther
are very few of these machines in existence due to their cost.

This type of computer has been developed for scientific applications


usually involving complex arithmetic and mathematical operations. One
such use is in weather forecasting.

A supercomputer is a type of computer that has the architecture,


resources and components to achieve massive computing power.

21
Although advances like multi-core processors and GPGPUs (general-
purpose graphics processing units) have enabled powerful machines for
personal use (see: desktop supercomputer, GPU supercomputer), by
definition, a supercomputer is exceptional in terms of performance.
China has owned the fastest supercomputer in the world. “Fast” is
defined by the number of petaflops the computer system can perform.
A petaflop is one thousand teraflops, or one quadrillion floating point
operations per second.

Year Supercomputer Peak speed Location


Sunway
2016 TaihuLight 93.01 PFLOPS Wuxi, China

2013 NUDT Tianhe-2 33.86 PFLOPS Guangzhou, China

2012 Cray Titan 17.59 PFLOPS Oak Ridge, U.S.

2012 IBM Sequoia 17.17 PFLOPS Livermore, U.S.


Fujitsu K
2011 computer 10.51 PFLOPS Kobe, Japan

1.5 Anatomy of a Digital Computer Input and Output Devices

The computer system consists of three main components:


1. Input Device
2. Output Device
3. Central Processing Unit (CPU), and
4. Memory Unit.
The I/O unit consists of the input unit and the output unit. CPU performs
calculations and processing on the input data, to generate the output.
The memory unit is used to store the data, the instructions and the output
information. The following figure illustrates the typical interaction among
the different components of the computer.

22
1. Input Device:

Input devices convert input data and instructions into the binary form for
understand by the computer. There are different types of input devices
like keyboard, Magnetic Ink Character Recognition (MICR), Optical
Character Recognition (OCR), mark sense reader, etc.
2. Output Device:

Output devices are that type of devices that receive information from the
CPU and present this information to the user in the desired form. Output
devices include display screen, printers, loudspeakers, plotters, etc.
3. CPU (Central Processing Unit):
The CPU has two parts that is Control Unit (CU) or Arithmetic Logic Unit
(ALU). CPU is also known as the brain of a computer as it executes the
program instructions.
 Control unit (CU)
 ALU (Arithmetic Logic Unit)
i) Control unit (CU)

The control unit of computer is tells that how the rest of the computer
system carries out a program’s instructions. CU is directs to the
movement of electronic signals between memory –that is temporarily
holds instructions, data or processes information - and the ALU. ALU is
also directs with these control signals between the CPU and the
input/output devices.
ii) ALU (Arithmetic Logic Unit):

ALU does two kinds of operations - arithmetical and logical. Arithmetical


operations of ALU are the fundamental mathematical operations. These
operations consist addition, subtraction, multiplication or division. Logical
operations of ALU consist of comparisons. Logical type operation is two
pieces of data these are use to compare to see whether one is equal to,
less than or greater than the other one.
3. Memory Unit

Computer memory is the working storage part or area in the computer.


There are two types of computer memory: primary memory and
secondary memory.

23
 Main Memory
 Cache Memory

 Register
i) Main Memory

RAM is the primary or main memory. It is volatile in nature and holds the
data for a short period of time only, that is only until the system is
running.
Files and instructions are saved in different secondary storage systems
and they are fetched to the RAM before the execution. This technique is
known as swapping. Memory space available in the main memory
directly affects the speed of the computer.
ii) Cache Memory

It is the smallest and fastest form of memory. The contents that require to
be fetched frequently are stored in the cache memory.
Therefore, the processor before looking for the content in RAM checks
here and goes to RAM only if the content isn’t available here. Cache
memory is always placed between RAM and the processor.
iii) Register

There are special-purpose temporary storage units which are called


registers. They are the form of memory with the highest transfer speed.
These registers are used for holding instructions, data and intermediate
results that are currently being processed. Examples: Program Counter
(PC), Instruction Register, Memory Address Register, Memory Buffer
Register, Memory Data Register, Accumulator, etc.

Let Us Sum Up

From this unit we have come across the computer definition with its
classifications and also know about its anatomy. We have also discussed
about the types Developments with functional areas of Digital computer
too.

Check Your Progress


1. What is computer?
2. Mention the areas of computer used.

24
3. Write the full for of OCR
4. Which device control Cursor?
5._____________ computer =Analog + Digital
6. Name the classifications of Digital computer
7. _____, _____, _____ the three main components of Digital computer .

Glossaries
Diligence : careful
Manipulate : handle or control
Forecasting : predict
Robustness :the quality or condition of being strong and in good
condition
Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress

1. The term "computer" is comes from the Latin term "Computus,"


which means "to calculate" or "to compute."
2. Computers are used in various areas like research, education,
telecommunication, banking, entertainment, healthcare, Defence.

3. Optical Character Recognition.


4. Mouse
5. Hybrid.

6. Micro Computer
Mini Computer
Mainframe Computer
Super Computer
7. Input Processing,Output.

25
BLOCK 2
MEMORY UNITS

Unit-3 STORAGE DEVICES

Unit-4 HIGH LEVEL LANGUAGES

26
Unit-3
MEMORY UNITS
Overview
Learning objectives
3.1 What is computer Memory
3.1.1 How does Memory work
3.2 Main Categories of computer Memory
3.3 Overview of Primary Memory
3.4 Difference between PROM ,EPROM,EEPROM
3.5 Programming Languages: Machine Language, Assembly
Language
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the third unit of our course. It will introduce you to some of the
concepts of computer Memory Units. Through this unit, the Languages of
computer, EPROM, RAM , and its are discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Memory unit of Computer.

 Idea about Languages of computer.


 Get the knowledge of Difference between Primary and Secondary
Memory.

3.1 What is computer Memory

If you’re familiar with the hardware in a computer, you’d definitely know


that computer memory basically stores all the data which makes it
relatively important.

27
When we’re talking about computer memory, there are also two major
categories: Primary Memory and Secondary Memory. But before we
delve deeper into the respective categories, let’s talk about what exactly
is computer memory, to begin with?

3.1.1 How does Memory Work

To understand how computer memory work, take a look at this


hierarchy:

No matter what’s your input sources, be turning on your computer or


typing on your keyboard, it’ll all go to read-only memory (ROM) and
performs a power-on self-test (POST) to ensure all components are
functioning.
Then, the memory controller will check the memory addresses and
perform a quick read/write operation to make sure there are no errors.
From there, a basic input/output system (BIOS) from ROM will be loaded,
the system will also load the operating system (OS) from the hard drive
into the system’s RAM.
So basically, no matter you’re loading or saving a file, it will all go through
RAM first. This is because the random-access memory (RAM) will
process all the temporary data that is requested by the CPU, none of this
data is saved in RAM. And so, once the application is shut down, the
data is lost as well.

28
3.2 Main Categories of computer Memory

After talking about how computer memory is important, we did mention


briefly about RAM and ROM earlier, but do you know there are a lot more
sub-categories of it?
Primary Memory

RAM: SRAM, DRAM


ROM: MROM, PROM, EPROM, EEPROM
Secondary Memory

SDD: SATA, PCIe, M.2, U.2, NVMe


HDD
Flash Drives
NAS
SAN
Cloud Storage (tertiary memory)

3.3 Overview of Primary Memory

The main memory in a computer, also known as internal memory or


internal storage. Accessing data from primary memory is pretty fast and it
is either volatile like RAM or non-volatile like ROM. The capacity of
primary memory is also limited and generally smaller when compared to
secondary memory.
RAM: Random-access memory
RAM is the main memory in a computer system, also known as cache
memory. It is basically a high-speed component that temporarily stores
the device needs, and allow the device to access the data immediately.
With RAM, you won’t have to wait for ages for your CPU to dig through
other storage, which usually takes a lot of time. However, RAM is volatile,
and so the temporary memory that’s stored there will be lost when you
shut down your system.
Even though we generally refer to RAM as RAM, there are 2 primary
forms of RAM:

29
SRAM is a type of semiconductor memory and it uses bistable latching
circuitry to store each bit, this makes it very fast and thus the name cache
memory. However, it is much more expensive than DRAM (we’ll talk
about it later) and takes up a lot more space so there’s lesser memory on
a chip.

It is also most commonly used as cache in a CPU, usually listed in L2 or


L3. But as we mentioned earlier, because it is pretty expensive, so the
values of L2 and L3 are generally 1MB to 16MB only.

DRAM is another type of RAM that stores each bit of data in a separate
capacitor within an integrated circuit. This means that each memory cell
in a DRAM chip holds one bit of data and is composed of a transistor and
a capacitor. Where the memory controller needs to read the data and
then rewrites it, constantly refreshing. Thus, this process makes the
DRAM slower than SRAM.
However, DRAM is cheaper than SRAM and so it is used as the main
memory in a CPU, though slower than SRAM, it is still relatively fast and
is able to connect directly to the CPU bus. Unlike the expensive SRAM,
DRAM is typically 4GB to 16 GB in laptops and 1GB to 2GB in smaller
devices.
ROM: Read Only Memory

ROM is also a primary memory just like RAM, but unlike RAM, ROM is
able to store data permanently which makes it non-volatile. It is a
programmable chip that stores all the most important instructions
required to start the system, this process is also known as bootstrap.
With ROM, the system will stay active and your data will not be
overwritten, deleted or modified even if you shut it down. Thus its name,
Read only memory since the data can only be read and accessed by the
user.
Alike to RAM, there are a few different types of ROM:

MROM is a hand-wired device, one of the first ROMs. It also contains a


software mask that is burned onto the chip during the design phase of the
semiconductor manufacturing process. Moreover, it is the most
inexpensive ROM out of the rest and contains a pre-programmed set of
data.

30
PROM is as its name states, a read only memory chip that only allows
the user to overwrite the data once. What makes it different from regular
ROM is that it is a blank memory chip, while ROM comes pre-
programmed.
Since there are small fuses inside of the chip itself that allows you to
program the PROM, a static electric can cause the fuse to burn out.
Thus, making it relatively fragile and is cheaper than ROMs. However,
the user would require a PROM programmer or PROM burner in order to
write the data.
Using regular ROMs and PROMs could be pretty wasteful even though
they are cheap, but they couldn’t be overwritten and reused. Thus, as
EROM’s name states, you’re able to overwrite the data by exposing it to
ultra-violet light for up to 40 minutes.
In order to erase the data, you’ll have to expose the quartz transparent
window lid to the ultra-violet light. Once you’re done with it, just seal the
lid with a sticker and you can use it again! However, if you own an
EPROM eraser, you can use that as an alternative as well.
A relatively long name, but it works the same way as EPROM! What’s
different is just the way of erasing the data. Instead of exposing it to the
ultra-violet light, you can just expose it to an electrical charge! So, no
transparent window is required.
EEPROM is able to be erased and reprogrammed about 10,000 times,
what’s even better is that you’re able to erase one byte at a time which is
pretty flexible, despite the erasing process being slow.

31
3.4 The Main Difference between PROM, EPROM and EEPROM:

3.4 Programming Languages:

Over the years, computer languages have been evolved from Low-Level
to High-Level Languages. In the earliest days of computers, only Binary
Language was used to write programs. The computer languages are
classified as follows:

32
Machine Language (low level language)

Low-Level language is the only language which can be understood by the


computer. Low-level language is also known as Machine Language. The
machine language contains only two symbols 1 & 0. All the instructions of
machine language are written in the form of binary numbers 1's & 0's. A
computer can directly understand the machine language.
Assembly Language (middle level language)

Middle-level language is a computer language in which the instructions


are created using symbols such as letters, digits and special
characters. Assembly language is an example of middle-level language.
In assembly language, we use predefined words called mnemonics.
Binary code instructions in low-level language are replaced with
mnemonics and operands in middle-level language. But the computer
cannot understand mnemonics, so we use a translator
called Assembler to translate mnemonics into machine language.

Assembler is a translator which takes assembly code as input and


produces machine code as output. That means, the computer cannot
understand middle-level language, so it needs to be translated into a low-
level language to make it understandable by the computer. Assembler is
used to translate middle-level language into low-level language.
High Level Language

High-level language is a computer language which can be understood by


the users. The high-level language is very similar to human languages
and has a set of grammar rules that are used to make instructions more
easily. Every high-level language has a set of predefined words known as
Keywords and a set of rules known as Syntax to create instructions. The
high-level language is easier to understand for the users but the
computer can not understand it. High-level language needs to be
converted into the low-level language to make it understandable by the
computer. We use Compiler or interpreter to convert high-level
language to low-level language.

Languages like FORTRAN,C, C++, JAVA, Python, etc., are examples of


high-level languages. All these programming languages use human-
understandable language like English to write program instructions.
These instructions are converted to low-level language by the compiler or
interperter so that it can be understood by the computer.

33
Let Us Sum Up

From this unit we have come across the computer Primary and
Secondary memory.we have also discussed about their types ,benefits
and limitation tooalong with the Computer Languages.

Check Your Progress

1. What are the Computer Languages?


2. What is DRAM?
3. Main Memory is also called as

4. What are the Main Memory.


5._____________ is Auxiliary Memory
6. Flash is ________.
7. _____________,____________are two types of RAM.

Glossaries

 JEDEC—Joint Electron Device Engineering Council. An organization


that establishes industry standards for memory operation, features, and
specifications.
 LRDIMM—Load-reduced DIMM. A memory technology that enables
more DIMMS per channel and doubles the installed memory capacity of
a module, allowing up to 35% greater memory bandwidth.
 Latency—The amount of time it takes for memory to respond to a
command. Generally, the lower the delay (latency), the faster the
device.
 Megahertz—MHz. A measurement of clock cycles in millions of
cycles per second.

Suggested Readings

 https://www.seeedstudio.com/blog/2020/11/25/types-of-computer-
memory-ram-rom-and-secondary-memory/
 https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-
interaction/

34
 https://www.matterhere.com/2018/06/memory-management-ram-
rom-prom-eprom.html ntent-799042056712-MA-Linguistics-4-
HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress

1..Machine Level Lange Level Language,Assembly Level Language and


High Level Language.
2.DRAM is Dynamic Random Access Memory
3.Primary

4. Main Memory are RAM and ROM


5. External
6. Non Volatile
7.Static and Dynamic

35
Unit-4
HIGH LEVEL LANGUAGES
Overview
Learning objectives
4.1 Introduction to Computer Languages
4.2 High Level Language,
4.3 Types of High-Level Language,
4.3.1 Advantage of High Level Languages
`4.3.2 Disadvantage of High Level Languages
4.3.3 Limitations of High Level Languages
4.4 Some High Level Languages
4.5 Compiler and Interpreter
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the fourth unit of our concepts. It will introduce you to computer
Language Specially to High Level Language. Through this unit, the
concepts about compiler and Interpreter is also discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Computer Languages.

 Idea about the High Level Language.


 Get the knowledge of Compiler and Interpreter.

4.1 Introduction to Computer Languages

The user of a computer must be able to communicate with it. That means,
he must be able to give the computer commands and understand the

36
output that the computer generates. This is possible due to the invention of
computer languages.

Basically, there are two main categories of computer languages, namely


Low Level Language and High Level Language. Let us take a brief look at
both these types of computer languages.

4.2 High Level Languages

When we talk about high level languages, these are programming


languages. Some prominent examples are PASCAL, FORTRAN, C++
etc.The important feature about such high level languages is that they allow
the programmer to write programs for all types of computers and systems.
Every instruction in high level language is converted to machine language
for the computer to comprehend.

4.3 Types of High Level Languages

High-level languages allow programmers to write instructions in a


language that is easier to understand than low-level languages.
Translators are needed to translate programs written in high-level
languages into the machine code that a computer understands. The high-
level language is the programming language such as
BASIC, C, C++, COBOL, FORTRAN, Java, Perl, PHP, Python, Ruby,
Visual Basic, and Pascal, etc. These languages have strong abstraction,
the style and the context which are more comfortable to learn. It never
needs the addressing of hardware constraints when developing a
program.
The program of high-level language must be interpreted before the
execution. The high-level language deal with the variables, arrays,
objects, complex arithmetic or Boolean expression, subroutines and
functions, loops, threads, locks, etc. The high-level languages are closer
to human languages and far from machine languages. It is similar to
human language, and the machine is not able to understand this
language.
High-level languages are coders friendly, easy to code, debug, and
maintain. These languages do not interact directly with the hardware.
These languages are easy to implement. The software of translation
plays an important role in the conversion of a high-level language to
machine level language.

37
These all languages are considered as the high-level language because
they must be processed with the help of a compiler or interpreter before
the code execution. The source code is written in scripting languages like
Perl and PHP can be run by the interpreter. These languages can
convert the high-level code into binary code so that the machine can
understand.
The advantage and disadvantage both exist in a high-level language. The
slow processing time is the disadvantage of high-level language because
the translator converts the program into binary language before the
execution. The high-level language is close to the programmer and far
away from the machine. We are explaining some high-level languages,
which are given below:

4.3.1 Advantages of High Level Languages

 The high-level language is machine-independent.


 It is easier to learn and use.
 Few errors exist during the program development.
 The high-level language provides better documentation.
 It is easier to maintain.

4.3.2 Disadvantage of the high-level language

 The high-level language takes additional time to translate the


source code to machine code.
 The programs of high-level language are comparatively slower
than the programs of a low-level language.

 It cannot communicate directly with the hardware.

4.3.3 Limitations of the high-level language

 Less flexibility to control the computer's CPU, memory, and


registers.

4.4 Some High Level Languages

1) FORTRAN

The name of this language indicates its meaning, which is


"formula translation" because it was designed for the easy translation of
math formulas into code. This language was published in 1957, and it is

38
the first high-level programming language which is used for the scientific
purpose.

The coders were able to write the programs 500% faster in high-level
language as compared to low-level language. The efficiency was reduced
by 20%, and this thing allowed the programmers to focus more on the
problem-solving aspect of the problem.
2) COBOL

The full form of COBOL is "Common Business Oriented Language." It is


developed in 1959 and used for the business and administrative purpose.
When we save some data due to business purpose, and we compute that
data after some time, then we require the COBOL language.

This language still used by the banks and other major companies which
depends heavily on the accuracy and stability of their programs to keep
their companies growing.
The COBOL language is divided into four parts:
1. Identification Division.
2. Environment Division.
3. Data Division.
4. Procedure Division.
3) BASIC

The BASIC language was the first language developed for the non-
professional programmers. There is no need of any prerequisite to learn
the BASIC language. The meaning of BASIC language is “Beginners all-
purpose symbolic instruction code."
4) PASCAL
The PASCAL is the first programming language used for the teaching
tool. It is a procedural programming language. This language supports
structured programming and data structure.
5) SIMULA(OOPL)

The SIMULA was the first object-oriented programming language. It was


developed in the 1960s. The first version of this language was developed
as an extension of ALGOL, and the second version that is Simula67 was

39
developed in 1967. The main purpose of this language is to create
computer simulations.

The high-level languages are machine-independent. The programmers or


coders do not require to know anything about the internal structure of the
computer on which high-level language programs will be executed. Deal
with high-level coders, enabling the programmers to write instructions
using English word and familiar with the mathematical symbols and
expressions.

4.5 Compilers and Interpreter

The compiler is the translator program software. This software can


translate into its equivalent machine language program. The compiler
compiles a set of machine language instructions for every program in a
high-level language.
Linker

The linker is used for the large programs in which we can create some
modules for the different task. When we call the module, the whole job is
to link to that module and program is processed. We can use a linker for
the huge software, storing all the lines of program code in a single source
file.
Interpreter

The interpreter is the high-level language translator. It takes one


statement of the high-level language program and translates it into
machine level language instruction. Interpreter immediately executes the
resulting machine language instruction. The compiler translates the entire
source program into an object program, but the interpreter translates line
by line.

Let Us Sum Up

From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.

Check Your Progress

1. What is High level language?


2. Mention some High level languages.

40
3. The ______ is the translator program software
4. Which is the high-level language translator?

5. The high-level language is _____________


6. What is the full form of COBAL?
7. Which was the first object-oriented programming language.

Glossaries

Assembler:A program that translates assembly languages into machine


code.

Assembly language:A low-level programming language closely related


to machine language. Also called assembly code.
Binary:A number system that contains two symbols, 0 and 1. Also known
as base 2.
Compilation:The process of translating source code into object code all
in one go. The program can then be executed as a whole.
Compiler:A program that translates high-level programming languages
into machine code.

Suggested Readings
 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
Answers to Check Your Progress

1. High-level languages are coders friendly, easy to code, debug, and


maintain. These languages do not interact directly with the
hardware. These languages are easy to implement.

2. BASIC, PASCAL, SIMULA, FORTRAN.


3. The compiler is the translator program software
4. The interpreter is the high-level language translator
5. Machine-independent.

6. The full form of COBOL is "Common Business Oriented Language.


7. The SIMULA was the first object-oriented programming language.

41
BLOCK 3
INTERNET AND NETWORKING

Unit 5- NUMBER SYSTEM AND NETWORKING

Unit 6 - INTERNET AND INTRANET,EMAIL

Unit 7 –CLOUD COMPUTING

42
Unit-5
NUMBER SYSTEM AND NETWORKING
Overview
Learning objectives
5.1 Introduction to Internet
5.1.1 World Wide Web
5.1.2 Difference between Internet and World Wide Web.
5.1.3 Similarities between Internet and Intranet
5.2 Number Systems
5.2.1 Information
5.2.2 Data Processing Cycle
5.3 Introduction to Networking
5.3.1 Characteristics of a Computer Network
5.3.2 Network Card
5.3.3 The Slotted Ring
5.3.4 Token Passing
5.3.5 Token Ring Network
5.3.6 Token –Bus Network
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the fifth unit of our concepts. It will introduce you to Internet and
give the clear picture about World Wide Web. Through this unit, the
concepts about Number system and Networking is also discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Internet and its characteristics.

43
 Idea about the World Wide Web.
 Get the knowledge of Number System.

5.1 Introduction to Computer Languages

Internet is a global communication system that links together


thousands of individual networks. It allows exchange of information
between two or more computers on a network. Thus internet helps in
transfer of messages through mail, chat, video & audio conference,
etc. It has become mandatory for day-to-day activities: bills payment,
online shopping and surfing, tutoring, working, communicating with
peers, etc. Internet was evolved in 1969, under the project called
ARPANET (Advanced Research Projects Agency Network) to
connect computers at different universities and U.S. defence. Soon
after the people from different backgrounds such as engineers,
scientists, students and researchers started using the network for
exchanging information and messages. In 1990s the internet working
of ARPANET, NSFnet and other private networks resulted into
Internet. Therefore, Internet is a global network of computer
networks’. It comprises of millions of computing devices that carry
and transfer volumes of information from one device to the other.
Desktop computers, mainframes, GPS units, cell phones, car alarms,
video game consoles, are connected to the Net.
What Can I Do on the Internet?
 Send and receive email messages.
 Download free software with FTP (File Transfer Protocol).
 Post our opinion to a Usenet newsgroup.
 Surf the World Wide Web.

 And much, much more.


 There is no charge for most services.

5.1.1. World Wide Web

The World Wide Web (WWW) or web is an internet based service, which
uses common set of rules known as protocols, to distribute documents
across the Internet in a standard way. World Wide Web, which is also
known as a Web, is a collection of websites or web pages stored in web
servers and connected to local computers through the internet. These

44
websites contain text pages, digital images, audios, videos, etc. Users
can access the content of these sites from any part of the world over the
internet using their devices such as computers, laptops, cell phones, etc.
The WWW, along with internet, enables the retrieval and display of text
and media to your device. The World Wide Web. Or ‘Web’ is a part of the
Internet. The Web is viewed through web browser software such as
Google chrome, Internet Explorer, Mozilla Firefox etc. Using browsers
one can access the digital libraries containing innumerable articles,
journals, e-books, news, tutorials stored in the form of web pages on
computers around the world called web servers-Today thousands of web
pages/websites are added to the WWW every hour. The Web was
invented in 1991 by Tim Berners-Lee, while consulting at CERN
The Web was invented in 1991 by Tim Berners-Lee, while consulting at
CERN (European Organization for Nuclear Research) in Switzerland.
 The Web contains multimedia.
 Information in the Web is connected by hyperlinks.
 The Web is a distributed information system.

5.1.2 Difference between Internet and WWW

The Internet is known as “interconnection of computer networks”. The


Internet is a massive network of networks. It connects millions of
computers together globally, forming a network in which any computer
can communicate with any other computer as long as they are both
connected to the Internet. Information that travels over the Internet does
so via a variety of languages known as protocols. The program of high-
level language must be interpreted before the execution.
The World Wide Web, or “Web” for short, or simply Web, is a massive
collection of digital pages to access information over the Internet. The
Web uses the HTTP protocol, to transmit data and allows applications to
communicate in order to exchange business logic. The Web also uses
browsers, such as Internet Explorer or Firefox. To access web
documents called Web pages that are linked to each other via hyperlinks.
Web documents also contain graphics, sounds, text and video.

5.1.3 Similarities between Internet and Intranet

 Intranet uses the internet protocols such as TCP/IP and FTP.

45
 Intranet sites are accessible via the web browser in a similar way
as websites in the internet. However, only members of Intranet
network can access intranet hosted sites.
 In Intranet, own instant messengers can be used as similar to
yahoo messenger/gtalk over the internet.

5.2 Number System

When we type some letters or words, the computer translates them in


numbers as computers can understand only numbers. A computer can
understand the positional number system where there are only a few
symbols called digits and these symbols represent different values
depending on the position they occupy in the number.

The value of each digit in a number can be determined using −


 The digit
 The position of the digit in the number
 The base of the number system (where the base is defined as the
total number of digits available in the number system)
Decimal Number System

The number system that we use in our day-to-day life is the decimal
number system. Decimal number system has base 10 as it uses 10 digits
from 0 to 9. In decimal number system, the successive positions to the
left of the decimal point represent units, tens, hundreds, thousands, and
so on.
Each position represents a specific power of the base (10). For example,
the decimal number 1234 consists of the digit 4 in the units position, 3 in
the tens position, 2 in the hundreds position, and 1 in the thousands
position. Its value can be written as

(1 x 1000)+ (2 x 100)+ (3 x 10)+ (4 x l)


(1 x 103)+ (2 x 102)+ (3 x 101)+ (4 x l00)
1000 + 200 + 30 + 4

1234
As a computer programmer or an IT professional, you should understand
the following number systems which are frequently used in computers.

46
S.No. Number System and Description

Binary Number System


1
Base 2. Digits used : 0, 1

Octal Number System


2
Base 8. Digits used : 0 to 7

Hexa Decimal Number System


3
Base 16. Digits used: 0 to 9, Letters used : A- F

Binary Number System

Characteristics of the binary number system are as follows −

 Uses two digits, 0 and 1


 Also called as base 2 number system
 Each position in a binary number represents a 0 power of the base
(2). Example 20
 Last position in a binary number represents a x power of the base
(2). Example 2x where x represents the last position - 1.

Example
Binary Number: 101012
Calculating Decimal Equivalent −

Step Binary Decimal Number


Number

Step 1 101012 ((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21)


+ (1 x 20))10

Step 2 101012 (16 + 0 + 4 + 0 + 1)10

Step 3 101012 2110

Note − 101012 is normally written as 10101.

Octal Number System


Characteristics of the octal number system are as follows −
 Uses eight digits, 0,1,2,3,4,5,6,7

 Also called as base 8 number system

47
 Each position in an octal number represents a 0 power of the base
(8). Example 80
 Last position in an octal number represents a x power of the base
(8). Example 8x where x represents the last position - 1

Example

Octal Number: 125708


Calculating Decimal Equivalent −

Step Octal Number Decimal Number

Step 1 125708 ((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) +


(0 x 80))10

Step 2 125708 (4096 + 1024 + 320 + 56 + 0)10

Step 3 125708 549610

Note − 125708 is normally written as 12570.


Hexadecimal Number System
Characteristics of hexadecimal number system are as follows −
 Uses 10 digits and 6 letters, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D,
E, F
 Letters represent the numbers starting from 10. A = 10. B = 11, C
= 12, D = 13, E = 14, F = 15
 Also called as base 16 number system
 Each position in a hexadecimal number represents a 0 power of
the base (16). Example, 160
 Last position in a hexadecimal number represents a x power of
the base (16). Example 16x where x represents the last position -
1
Example

Hexadecimal Number: 19FDE16


Calculating Decimal Equivalent −

48
Step Binary Decimal Number
Number

Step 1 19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) +


(E x 160))10

((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) +


Step 2 19FDE16
(14 x 160))10

Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10

Step 4 19FDE16 10646210

Note − 19FDE16 is normally written as 19FDE.

There are many methods or techniques which can be used to convert


numbers from one base to another. In this chapter, we'll demonstrate the
following −
 Decimal to Other Base System
 Other Base System to Decimal
 Other Base System to Non-Decimal
 Shortcut method - Binary to Octal
 Shortcut method - Octal to Binary
 Shortcut method - Binary to Hexadecimal
 Shortcut method - Hexadecimal to Binary

Decimal to Other Base System


Step 1 − Divide the decimal number to be converted by the value of the
new base.
Step 2 − Get the remainder from Step 1 as the rightmost digit (least
significant digit) of the new base number.
Step 3 − Divide the quotient of the previous divide by the new base.
Step 4 − Record the remainder from Step 3 as the next digit (to the left)
of the new base number.

49
Repeat Steps 3 and 4, getting remainders from right to left, until the
quotient becomes zero in Step 3.

The last remainder thus obtained will be the Most Significant Digit (MSD)
of the new base number.
Example

Decimal Number: 2910


Calculating Binary Equivalent −

Step Operation Result Remainder

Step 1 29 / 2 14 1

Step 2 14 / 2 7 0

Step 3 7/2 3 1

Step 4 3/2 1 1

Step 5 1/2 0 1

As mentioned in Steps 2 and 4, the remainders have to be arranged in


the reverse order so that the first remainder becomes the Least
Significant Digit (LSD) and the last remainder becomes the Most
Significant Digit (MSD).
Decimal Number : 2910 = Binary Number : 111012.
Other Base System to Decimal System
Step 1 − Determine the column (positional) value of each digit (this
depends on the position of the digit and the base of the number system).
Step 2 − Multiply the obtained column values (in Step 1) by the digits in
the corresponding columns.
Step 3 − Sum the products calculated in Step 2. The total is the
equivalent value in decimal.
Example
Binary Number: 111012

Calculating Decimal Equivalent −

50
Step Binary Number Decimal Number

Step 1 111012 ((1 x 24) + (1 x 23) + (1 x 22) + (0 x


21) + (1 x 20))10

Step 2 111012 (16 + 8 + 4 + 0 + 1)10

Step 3 111012 2910

Binary Number : 111012 = Decimal Number : 2910


Other Base System to Non-Decimal System
Step 1 − Convert the original number to a decimal number (base 10).

Step 2 − Convert the decimal number so obtained to the new base


number.
Example
Octal Number : 258
Calculating Binary Equivalent −
Step 1 - Convert to Decimal

Step Octal Number Decimal Number

Step 1 258 ((2 x 81) + (5 x 80))10

Step 2 258 (16 + 5)10

Step 3 258 2110

Octal Number : 258 = Decimal Number : 2110

Step 2 - Convert Decimal to Binary

Step Operation Result Remainder

Step 1 21 / 2 10 1

Step 2 10 / 2 5 0

Step 3 5/2 2 1

51
Step 4 2/2 1 0

Step 5 1/2 0 1

Decimal Number : 2110 = Binary Number : 101012


Octal Number : 258 = Binary Number : 101012
Shortcut Method ─ Binary to Octal
Step 1 − Divide the binary digits into groups of three (starting from the
right).
Step 2 − Convert each group of three binary digits to one octal digit.
Example
Binary Number : 101012
Calculating Octal Equivalent −

Step Binary Number Octal Number

Step 1 101012 010 101

Step 2 101012 28 58

Step 3 101012 258

Binary Number : 101012 = Octal Number : 258

Shortcut Method ─ Octal to Binary


Step 1 − Convert each octal digit to a 3-digit binary number (the octal
digits may be treated as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 3 digits each) into a
single binary number.
Example

Octal Number : 258


Calculating Binary Equivalent −

Step Octal Number Binary Number

Step 1 258 210 510

Step 2 258 0102 1012

52
Step 3 258 0101012

Octal Number : 258 = Binary Number : 101012


Shortcut Method ─ Binary to Hexadecimal
Step 1 − Divide the binary digits into groups of four (starting from the
right).
Step 2 − Convert each group of four binary digits to one hexadecimal
symbol.

Example
Binary Number : 101012
Calculating hexadecimal Equivalent −

Step Binary Number Hexadecimal Number

Step 1 101012 0001 0101

Step 2 101012 110 510

Step 3 101012 1516

Binary Number : 101012 = Hexadecimal Number : 1516


Shortcut Method - Hexadecimal to Binary
Step 1 − Convert each hexadecimal digit to a 4-digit binary number (the
hexadecimal digits may be treated as decimal for this conversion).
Step 2 − Combine all the resulting binary groups (of 4 digits each) into a
single binary number.
Example
Hexadecimal Number : 1516
Calculating Binary Equivalent −

Step Hexadecimal Number Binary Number

Step 1 1516 110 510

Step 2 1516 00012 01012

Step 3 1516 000101012

Hexadecimal Number : 1516 = Binary Number : 101012

53
Data can be defined as a representation of facts, concepts, or
instructions in a formalized manner, which should be suitable for
communication, interpretation, or processing by human or electronic
machine.
Data is represented with the help of characters such as alphabets (A-Z,
a-z), digits (0-9) or special characters (+,-,/,*,<,>,= etc.)

5.2.1 What is Information?

Information is organized or classified data, which has some meaningful


values for the receiver. Information is the processed data on which
decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for
the following characteristics −
 Timely − Information should be available when required.
 Accuracy − Information should be accurate.
 Completeness − Information should be complete.

5.2.2 Data Processing Cycle

Data processing is the re-structuring or re-ordering of data by people or


machine to increase their usefulness and add values for a particular
purpose. Data processing consists of the following basic steps - input,
processing, and output. These three steps constitute the data processing
cycle.
 Input − In this step, the input data is prepared in some convenient
form for processing. The form will depend on the processing
machine. For example, when electronic computers are used, the
input data can be recorded on any one of the several types of
input medium, such as magnetic disks, tapes, and so on.
 Processing − In this step, the input data is changed to produce
data in a more useful form. For example, pay-checks can be
calculated from the time cards, or a summary of sales for the
month can be calculated from the sales orders.
 Output − At this stage, the result of the proceeding processing
step is collected. The particular form of the output data depends
on the use of the data. For example, output data may be pay-
checks for employees.

54
5.3 Introduction to Networking

Networking is referred as connecting computers electronically for the


purpose of sharing information. Resources such as files, applications,
printers and software are common information shared in a networking.
The advantage of networking can be seen clearly in terms of security,
efficiency, manageability and cost effectiveness as it allows collaboration
between users in a wide range. Basically, network consists of hardware
component such as computer, hubs, switches, routers and other devices
which form the network infrastructure. These are the devices that play an
important role in data transfer from one place to another using different
technology such as radio waves and wires. There are many types of
network available in the networking industries and the most common
network are Local Area Network (LAN) and Wide Area Network
(WAN).LAN network is made up of two or more computers connected
together in a short distance usually at home, office buildings or school.
WAN is a network that covers wider area than LAN and usually covers
cities, countries and the whole world. Several major LAN can be connect
together to form a WAN. As several devices are connected to network, it
is important to ensure data collision does not happened when this
devices attempt to use data channel simultaneously. A set of rules called
Carrier Sense Multiple Access / Collision detection are used to detect
and prevent collision in networks. 2.0 WHAT IS CARRIER SENSE
MULTIPLE ACCESS (CSMA) Carrier Sense Multiple Access is one of the
popular ways to transmit information packets across networks. Packets is
referred as data bits which are sent over a network. According to
Wikipedia, Carrier Sense Multiple Access (CSMA) ) is a “probabilistic
Media Access Control (MAC) protocol in which a node verifies the
absence of other traffic before transmitting on a shared transmission
medium, such as an electrical bus, or a band of the electromagnetic
spectrum”. In a simple word, CSMA will check to ensure the line is not
being used before the data is sent, if it is in use, it waits until the line is
idle before proceeding with transmitting. Ethernet networks use this
method to send information packets. One of the important purpose
CSMA was developed is to minimize the chances of collision and
improve the performance by preventing computers from exchanging
information at same time. Collision occurs when computers attempt to
send information to each other at the same time. Thus, the data does not
reach its destination or destroyed. With CSMA, collision can be reduced

55
as it will hold the data and wait until the line is clear before data is
transmitted to the particular computer and user. According to Wikipedia,
"Carrier Sense" describes how transmitter uses feedback from a receiver
to detect existence of encoded signal from any other station before trying
to transmit. The chances of collision can be reduced if the station can
sense the medium before it is used. Station should listen to medium
about ongoing transmission in process before sending its own
information. CSMA is based on the principle "sense before transmit" or
"listen before talk". "Multiple Access" means that more than one device
can listen and waiting to transmit at a time. Multiple stations may share
multiple access medium. This means every data bits transmitted by a
station is generally received by all the stations using that medium. CSMA
actually uses several different methods where they wait for the medium
to become idle, known as the persistence strategy. Persistence strategy
defines the procedures for a station that senses a busy medium. In this
strategy, the station will sense the channel and transmit packets
immediately if the channel is sensed free. If the medium is busy it will
wait until the channel becomes idle. Then it will send the data with
probability of 1.
If the medium is busy, it will wait until the line is free before sending the
packet with probability p. If the station choose to hold back, it will not
transmit with the probability
The strategy are used in WiFi and packet radio systems.
The advantage of this strategy is that, it reduces the chances of collision
since it is out of ordinary for two station to wait for the same period of
time before retrying concurrently.

In CSMA data is transferred by sensing the channel. Possibility for


collision happens is high when the computers try to send information one
to another concurrently. This problem can be reduced if the station can
detect if the data transmission deteriorate a collision during the
transmission. Instead of randomly transmitting data which has collided
with others, the collision can be detected by a station which could
immediately halt the collided transmission to reduce the duration of
collision. The protocol which performs this action is called Carrier Sense
Multiple Access with Collision Detection or CSMA/CD. It is a protocol
used to ensure only one network node are transmitted at one time in the
Ethernet network. This is the technique used to access the 802.3

56
Ethernet network channel. Collision Detection Collision Detection means
that when two devices try to send data simultaneously at the same time,
they are able to detect this error. CSMA/CD operates in the same
manner with CSMA except the moment collision is detected, the
operation of data transmission will be aborted immediately. The collision
that occurs on the shared media are detected when the devices in the
listening mode. When a device is in listening mode, it can detect collision
occurs on the shared media.

The detection of a collision happen when there is increase of amplitude


above the normal level. Once the increase in the signal amplitude
detected all the transmitting devices will transmit to assure devices in
network detect the collision. Jamming Signal and Back off Algorithm
Once the collision is heard the sender will send jamming signal to
announce other devices that the collision had happened and the devices
should stop sending data onto the wire. After the jamming signal is sent,
the sender will wait for a indefinite amount of time. This random time will
ensure the devices which were involved in the collision do not transmit
simultaneously again. This process is called back off algorithm which
make sure traffic from two devices are not transmitted at the same time.
The back off period is decided by collision counter of each node and
usually generate random numbers. The possibility of repeated collision
exist even after the back off when the nodes trying to transmit the data
again. It can be reduces if each nodes back off at different time.
Retransmission Final step in CSMA/CD data transmission process is
retransmitting the frame that is corrupted or terminated because of a
collision. The process of retransmitting is performed after a collision is
detected, and the node backs off for a period of time. If the
retransmission is successful, the node clears its collision counter.
The transmission is successful if there is no collision is detected. In case
of collision is detected, the transmission will be aborted. The jamming
signal will be sent and all the station involved in collision will back off.
A computer network is a system in which multiple computers are
connected to each other to share information and resources.

5.3.1Characteristics of a Computer Network

 Share resources from one computer to another.

57
 Create files and store them in one computer, access those files
from the other computer(s) connected over the network.

 Connect a printer, scanner, or a fax machine to one computer


within the network and let other computers of the network use the
machines available over the network.
Following is the list of hardware's required to set up a computer
network.
 Network Cables
 Distributors
 Routers
 Internal Network Cards
 External Network Cards
Distributors

A computer can be connected to another one via a serial port but if we


need to connect many computers to produce a network, this serial
connection will not work.
The solution is to use a central body to which other computers, printers,
scanners, etc. can be connected and then this body will manage or
distribute network traffic.

Router

A router is a type of device which acts as the central point among


computers and other devices that are a part of the network. It is equipped
with holes called ports. Computers and other devices are connected to a
router using network cables. Now-a-days router comes in wireless modes
using which computers can be connected without any physical cable.

5.3.2 Network Card

Network card is a necessary component of a computer without which a


computer cannot be connected over a network. It is also known as the
network adapter or Network Interface Card (NIC). Most branded
computers have network card pre-installed. Network cards are of two
types: Internal and External Network Cards.

Internal Network Cards

Motherboard has a slot for internal network card where it is to be


inserted. Internal network cards are of two types in which the first type

58
uses Peripheral Component Interconnect (PCI) connection, while the
second type uses Industry Standard Architecture (ISA). Network cables
are required to provide network access.

External Network Cards

External network cards are of two types: Wireless and USB based.
Wireless network card needs to be inserted into the motherboard,
however no network cable is required to connect to the network.

5.3.3 THE SLOTTED RING

Slotted ring is a control strategy used to increase transmission capacity in


a ring networks. Transmission capacity in other ring networks, for
example token ring is wasted since the packets needs to travel on every
link. Slotted ring is possible to increase transmission capacity twice the
capacity or higher throughput because it is based on empty slot principle.
Slotted ring is widely used for wide area network (WAN) when need to
cover a large distance or a high transmission speed is involved.
Development of slotted ring was done in University of Cambridge so it is
also known as Cambridge ring. The slotted ring consists of a number of
fixed length slots which circulate continuously on the ring. The principle of
slotted ring is it should have one or more circulating slot or minipackets
where each slots have a bit that point out which slot is empty or full.
Every slot has an access contol field used for bus access control and
data segment field which used for packet transmitting. In the beginning all
the slots are marked empty. Station which wants to send data must
divide the data into fixed length packets called ‘minipackets’. Empty slots
which arrives will be marked full and minipackets will be inserted to that
slot as the empty slot goes by. The full slot will make a complete round
trip around the ring from the source to destination and back to the source.
During this period the station is not allowed to send another minipacket.
As the slots circulate continuously in the ring from station to station, each
station will controls the data in the slot before it is forwarded to the next
station. The slots have a fixed predefined format where it consists of 40
bits. 16 bits used for data, 8 bits for control purposes, 8 bits for the
transmitter and the balance 8 bits for receiver address. Data is
transmitted if there is an available slots.
Any station wants to transmit data must wait for the available slot. Later it
will sets the full/empty bits, clears the monitor bit and fill the slot with

59
addresses and user data. Besides that, it also sets the response bit
ignored (11) on the condition . The receiving station detects and read the
data sent based on the destination address. If the station able to read the
data, it will sets the bit to answer (01), if the data couldn’t be read it will
sets to rejected (10) and busy mode (0) if the data overloaded. The
ignored state will be remains if the station is not ready (inoperable). The
transmitting station will detects the slot and response if the data was
transferred correctly based on the full/empty bit. Originating station will
set the monitor passed bit to 1 as it transmit the full slot which means this
is a first time pass. It will change the monitor pass to 0 as the slot are
passed on. If the sending station fails to remove the full packet, it will
circulate round to the monitor station for a second time. It will be
identified as lost packet and the monitor will remove it and sends out a
new empty slots. The two control bits at the end of a slot is unimportant
for media access as it is reserved for other protocol layers use.
The advantage of slotted ring operation can be determined as
below:

i. The slotted ring technique ensure the station does not monopolize
the channel and there is fairness among station in sharing the
channel bandwidth.

ii. The monitor stations make sure the slot structure is maintained
even with various ring errors.
iii. The multiple values for the response field in the minipackets allow
the sender to know if the packets is received and provide basic
flow control for ring stations with various speed to work together.

5.3.4 WHAT IS A TOKEN PASSING?

Token passing is a Media Access Control protocol which decides when


and how a stations can transmit data to the network. A special frame
called a token usually generated by station and transmits it to the
network. This electronic token move around the network or electrical ring
on token ring, token bus, and Fiber Distributed Data Interface (FDDI)
networks. The function of token is to grant rights for stations to transmit
data on a shared medium. The node that holding the token can transmit
the data. The node will taking turn to transmit data and the token is
passed from one node to another in a logical ring. Medium that attached
to the shared network can capture the token as it circulates on the ring.

60
The station continuously send data until it is expires. When the token is
captured and when it expires, data sending process will be stopped and
the station send a new token to the network. The new token may
captured by the next station or the station simply repeat the token. The
process continues until the token has made a complete trip around the
ring. Each network only has one token so only one computer able to send
messages at a time. Since only the station which hold the token can
transmit data, computer on a token-based networks do not attempt to
access the network on their own. There are several token passing
protocols used in a local area network which is known as Token Ring
Network and Token Bus Network which will be explained in detail on
coming topics.

5.3.5 TOKEN-RING NETWORK

Token ring was invented by Olof Soderblom in the late 1960s. Token ring
becomes popular in the mid 1980s when IBM released its token ring
architecture based on active multi-station access units (MSAUs or MAUs)
and the IBM Structured Cabling System. It was used and promoted by
IBM in their networking standard and later standardized by The Institute
of Electrical and Electronics Engineers or IEEE as 802.5 standard. In OSI
model, token ring is exist at the data link layer (DLL). It is built in a star
wired ring topology where the token travels unidirectionally around the
ring. Nodes and the device called Multistation Access Unit (MSAU) are
physically connected by wires in token ring network. Originally, token ring
operates in the speeds of 4Mbps before it was upgraded to 1Gbps and
have been standardized by the IEEE 802.5 working group.
Token ring network adopt the whole process of token passing protocol to
transmit data. As explained in the earlier section, the token circulates in a
ring network even without data being transmitted. Each station will
access the data and past to next station. Every stations wait for the token
before attempting to access the network. Each token contains data,
source and destination address. Token frame is converted to data frame
when there involve a data transmission. The node which get the token
will assign the token with these information and send it to next node. The
data frame will travel around the ring until it reaches the destination node.
The destination node will load the data into its buffer and return
acknowledgement to data frame.

61
5.3.6 TOKEN-BUS NETWORK:

Token bus network have a same concept as token token ring network
where token is needed for each station to access the network
transmission medium. It is a Local Area Network for broadband networks
and stations form a logical ring in the network. Topology of bus network
consist of a group of workstations connected by long trunk cables and
branch out in a star configuration where the network has both a bus and
star topology. A token bus network is different from token-ring network
because the ends of the bus do not meet to form a physical ring. In bus
network the physical location of the computers is not important as all the
computers have different sequence addresses which the token and data
have to pass through.
Token that has been released are now available to the next station in the
logical sequence and acquired by the station with the highest number in
the sequence. Since the token does not follow the arrangement of
workstation, stations might be dispersed in a logical ring and location of
stations can be at anywhere in the bus.

Let Us Sum Up

From this unit we have come across the computer Internet and
Networking along with its characteristics and Disadvantages also know
about Networking and Data Processing too along with the Number
System.

Check Your Progress

1. What is internet? Write the characteristics of internet.


2. What is WWW
3. Mention some High level languages.
3. The ______ is the translator program software
4. Which is the high-level language translator?
5. The high-level language is _____________
6. What is the full form of COBAL?
7. Which was the first object-oriented programming language.

Glossaries

 L2TP: Layer 2 Tunneling Protocol


 MAC :Message Authentication Code
 NOC: Network Operations Centre

62
 WLAN :Wireless Local Area Network
 WPAN: Wireless Personal Area Network
 VPN :Virtual Private Network
 ASP: Application Service Provider
Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://www.geeksforgeeks.org/introduction-to-internet/

 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress

1. Internet is a global communication system that links together


thousands of individual networks. It allows exchange of
information between two or more computers on a network.
Send and receive email messages.
Download free software with FTP (File Transfer Protocol).
Post our opinion to a Usenet newsgroup.
Surf the World Wide Web.
There is no charge for most services are the characteristics of
Internet
2. The World Wide Web (WWW) or web is an internet based
service, which uses common set of rules known as protocols, to
distribute documents across the Internet in a standard way. World
Wide Web, which is also known as a Web, is a collection of
websites or web pages stored in web servers and connected to
local computers through the internet.

3. The compiler is the translator program software


4. The interpreter is the high-level language translator
5. Machine-independent.

6. The full form of COBOL is "Common Business Oriented Language.


7. The SIMULA was the first object-oriented programming language.

63
Unit-6
INTERNET AND INTRANET,E-MAIL
Overview
Learning objectives
6.1 Communication Media
6.1.1 Types of Communication Media
6.2 Internet and Intranet
6.2.1 Uses of Internet
6.2.2 Difference between the World Wide Web and the Internet
6.2.3 Security and Internet
6.2.4 Social Impact of Internet
6.2.5 Benefits of Internet
6.2.6 History of Internet
6.3 Email
6.3.1 Overview of Email
6.3.2 How to send and receive Email
6.3.3 Advantages of Email
6.3.4 Difference between Email and Webmail
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the sixth unit of our concepts. It will introduce you to


communication media. Also Internet and Intranet we will be discussing.
Through this unit, the concepts about cloud computing is also discussed.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Communication Media.

64
 Idea about the Internet and Intranet.
 Get the knowledge of Cloud computing.

6.1 Communication Media

The user of a computer must be able to communicate with it. That means,
he must be able to give Communication media is a medium
or channel through which a message or information can be transmitted
from a sender to the receiver.
Different means through which verbal or non-verbal language is
processed are understood as communication media channels that are
used by students, college, university, businesses, marketers, etc to
channelize communications, develop public relations and share
information.
Definition: Communication media is defined as means of delivering or
receiving a message, information, or data. The means through which the
information is passed can be in verbal or non-verbal type. There has to
be a common language known by both the sender or receiver to transfer
information successfully.
For example, the way a professor addresses his or her students, or the
way army majors communicate with their units or the way businesses
communicate with their prospects giving them hands-on experience
of products or services, all use verbal or non-verbal types of
communication media.
Likewise, in telecommunication, when communications take place over a
distance with the help of cable, broadcasting, telegraph, or telephone,
analog and digital forms of communications media channels are used to
send and receive information.

Hence, communication media is regarded as an essential component of


all forms of communication.

6.1.1 Types of Communication Media

Based on the language and methods of communication, the professional


communication media is broadly divided into two types- Verbal Media &
Non-verbal Media.

Both of these types of communication media are used in business,


marketing, advertising, publishing, journalism, science, career, education

65
program or courses, technology, media, production, and many other
sectors around the world. Let us understand these in detail-
1. Verbal Media

When the information is transmitted through words, it is known as verbal


communication. Verbal communication is further divided into two types
that are oral and written communication.
1. Oral Communication

Oral communication is communication through the means of speaking. It


happens when one is engaged in a conversation, talking to someone on
the telephone or through video calls, interviews, presentations, meetings,
debates, etc.
Various forms of oral communication are described below-
Face-to-face conversation-

Oral communication is best effective when it is done face-to-face. This


form of communication ensures that there is no miscommunication or
misunderstanding. There is an immediate response from the listener.
1.1 Telephone

Communication through the telephone is a type of oral communication


that depends entirely on the voice without any physical presence. One
has to have clarity on their voice and speech to ensure passing the
correct information. This type of communication has more chance of
miscommunication due to connection issues. Also, confusion may arise
because of similar-sounding words like ‘I’ and ‘eye.’
1.2 Presentation

A presentation is a formal type of face-to-face oral communication.


Presentation is always based on a particular topic to deliver knowledge or
awareness to the audience for example a film. It is the responsibility of
the one who is presenting to communicate with the audience.
1.3 Public speech

A public speech is oral communication that can be formal or informal. In a


public speech, the speaker has to address the audience. It may be for
entertainment, sharing ideas, inspiring, or encouraging people. Public
speech depends a lot on the public speaking skill of a person.

66
1.4 Interview

An interview is a formal means of oral communication that takes place for


recruitment. In an interview, there could be a panel of people or a single
person interviewing a candidate. It is done to assess the candidate’s
knowledge and personality.
1.5 Meeting

A meeting involves more than two people. There is always a head who
presides over the meeting. It is held for a purpose to address an issue or
pass on some crucial piece of information. It is a type of formal oral
communication that is always backed by a written form of
communication.
2 .Written Communication

Written communication is a type of verbal communication that involves


written words. It involves the passing of messages, information, or data in
a written form.
Generally, if used along with oral communication, it improves the
credibility of the matter discussed. It is easier when people have material
to read at their own expense of time. Given below are some of the forms
of written communication.
1. E-mails

In an organization, e-mail is the most common means of written


communication. Professionals use it to send documents, proposals, or
applications to their superiors, subordinates, or clients. E-mail is the most
effective way of communicating with clients or partners.
2. Proposals
A proposal from a business perspective is a written document drafted for
an upcoming project or a document for a client to obtain a specific job.
For example, before a company starts a campaign, one requires a written
proposal to have a clear idea of the process and outcome.
3. Reports

Reports are a written document that narrates the specific function


or performance of business or employees activities. It is another type of
written form of formal communication. The report is essential because the

67
employees and the stakeholders can have a clear idea about the
business activities through it.
4. Brochures

Brochures are a written document that is an informative paper used as a


template, pamphlet, or leaflet. A brochure is used by the company to help
sell its product or services. It is a promotional written document used to
inform the customer about the company or its product.
Menu, research paper, form, and other related mediums are used to
establish links between send and receiver of a message.
2. Non-verbal media
Non-verbal communication takes place without any exchange of words.
The message is transmitted through a non-verbal platform. Given below
are the types of non-verbal communication.
 Facial expression
 Gestures
 Body Language
 Proximity
 Touch
 Personal appearance
 Silence

A lot can be conveyed through the means of non-verbal communication.


But it can often lead to miscommunication or misunderstanding. Hence it
should always be supported by a relevant form of verbal communication
if possible.
Indeed, expressions can sometimes portray countless emotions. When
one is speaking on a stage, besides speaking skills, a gesture, facial
expression, and body language can also help draw the public’s attention.
When telecommunication is one of the most popular forms of
communication integral to all sorts of business, news, department-based,
and mass media communications, let us also understand the two forms
of media that are alleviating such communications-

68
Two Forms of Communication Media

Different means are used for transmitting data from one source to
another. These two forms of communication media are-
1. Analog

Some of the common examples of analog media are conventional radios,


land-line telephones, VCRs, television transmissions, etc.
2. Digital

Common examples of digital media can be compute networking,


smartphones, computer-mediated communication, e-mail, website,
application, etc.
All in all, such communication mediums act as channels as they help in
linking various sources to pass the information, message, or data. Let us
now go through the types of communication media based upon the
methods of communication
Examples of Popular Communication Media
Given below are some of the types of communication media;

1. Television
Television is a medium of one-way communication where a viewer is
shown information in the form of audiovisual. It can be monochrome or
colored. It is one of the popular sources of spreading information.
2. Radio
Radio is a communication medium where the information is passed on
the audio form. The radio receives signals by modulation of
electromagnetic waves. Its frequencies are said to be below those of
visible light.
3. Print

A print is a hard copy of a picture used in a magazine, books, newspaper,


etc. With the help of print, an audience can connect better with the
content matter.

69
4. Internet
The Internet is the largest and the most popular type of communication
media. Almost everything can be searched on the internet. The internet
has access to all the relevant information sought by the audience.
5. Outdoor Media

Such forms of mass media revolve around signs, placards, billboards, etc
that are used inside or outside of vehicles, shops, commercial buildings,
stadiums, etc.

Conclusion
Now, it is clear a communication media is a medium that is used by a
sender to share or transmit the information or message with a receiver.
With the revolution in technology, a wide range of mediums is
incorporated under verbal and non-verbal media channels with a
common goal to ease down the tasks of sharing messages and
optimizing the impact of the message in getting favourable outcomes
from the target audiences.

6.2 Internet and Intranet

The Internet, sometimes called simply "the Net," is a worldwide system of


computer networks -- a network of networks in which users at any one
computer can, if they have permission, get information from any other
computer (and sometimes talk directly to users at other computers). It
was conceived by the Advanced Research Projects Agency (ARPA) of
the U.S. government in 1969 and was first known as the ARPANET. The
original aim was to create a network that would allow users of a research
computer at one university to "talk to" research computers at other
universities. A side benefit of ARPANet's design was that, because
messages could be routed or rerouted in more than one direction, the
network could continue to function even if parts of it were destroyed in
the event of a military attack or other disaster.

Today, the Internet is a public, cooperative and self-sustaining facility


accessible to hundreds of millions of people worldwide. It is used by
many as the primary source of information consumption, and fueled the
creation and growth of its own social ecosystem through social media
and content sharing. Furthermore, e-commerce, or online shopping, has
become one of the largest uses of the Internet.

70
How the Internet works

Physically, the Internet uses a portion of the total resources of the


currently existing public telecommunication networks. Technically, what
distinguishes the Internet is its use of a set of protocols called
Transmission Control Protocol/Internet Protocol (TCP/IP). Two recent
adaptations of Internet technology, the Intranet and the extranet, also
make use of the TCP/IP protocol.
The Internet can be seen as having two major components: network
protocols and hardware. The protocols, such as the TCP/IP suite, present
sets of rules that devices must follow in order to complete tasks. Without
this common collection of rules, machines would not be able to
communicate.
The protocols are also responsible for translating the alphabetic text of a
message into electronic signals that can be transmitted over the Internet,
and then back again into legible, alphabetic text.
Hardware, the second major component of the Internet, includes
everything from the computer or smartphone that is used to access the
Internet to the cables that carry information from one device to another.
Additional types of hardware include satellites, radios, cell phone
towers, routers and servers.

These various types of hardware are the connections within the network.
Devices such as computers, smart phones and laptops are end points,
or clients, while the machines that store the information are the servers.
The transmission lines that exchange the data can either be wireless
signals from satellites or 4G and cell phone towers, or physical lines,
such as cables and fiber optics.

The process of transferring information from one device to another relies


on packet switching. Each computer connected to the Internet is
assigned a unique IP address that allows the device to be recognized.
When one device attempts to send a message to another device, the
data is sent over the Internet in the form of manageable packets. Each
packet is assigned a port number that will connect it to its endpoint.

A packet that has both a unique IP address and port number can be
translated from alphabetic text into electronic signals by travelling through
the layers of the OSI model from the top application layer to the
bottom physical layer. The message will then be sent over the Internet

71
where it is received by the Internet service provider's (ISP) router. The
router will examine the destination address assigned to each packet and
determine where to send it.
Eventually, the packet reaches the client and travels in reverse from the
bottom physical layer of the OSI model to the top application layer.
During this process, the routing data -- the port number and IP address --
is stripped from the packet, thus allowing the data to be translated back
into alphabetic text and completing the transmission process.

6.2.1 Uses of the internet

In general, the Internet can be used to communicate across large or


small distances, share information from any place in the world and
access information or answers to almost any question in moments.
Some specific examples of how the Internet is used include:
 Social media and content sharing;
 E-mail and other forms of communication, such as Internet Relay
Chat (IRC), Internet telephony, instant messaging, video
conferencing
 education and self-improvement through access to online degree
programs, courses and workshops and
 searching for jobs -- both the employer and applicant use the Internet
to post open positions, apply for jobs and recruit individuals found on
social networking sites like LinkedIn.
Other examples include:

 Online discussion groups and forums


 Online dating
 Online gaming

 Research
 Reading electronic newspapers and magazines
 Online shopping, or e-commerce.

6.2.2 Difference between the World Wide Web and the Internet

The key difference between the Internet and the World Wide Web (WWW
or the Web) is that the Internet is a global connection of networks while

72
the Web is a collection of information that can be accessed using the
Internet. In other words, the Internet is the infrastructure and the Web is a
service on top.
The Web is the most widely used part of the Internet. Its outstanding
feature is hypertext, a method of instant cross-referencing. In most Web
sites, certain words or phrases appear in text of a different colour than
the rest; often this text is also underlined. When a user selects one of
these words or phrases, they will be transferred to the related site or
page. Buttons, images, or portions of images are also used as hyperlinks.
The Web provides access to billions of pages of information. Web
browsing is done through a Web browser, the most popular of which
are Google Chrome, Firefox and Internet Explorer. The appearance of a
particular Web site may vary slightly depending on the browser used.
Later or more updated versions of a particular browser are able to render
more complex features, such as animation, virtual reality, sound and
music files.

6.2.3 Security and the Internet

Large amounts of information, both public and private, are collected


across the Internet, opening users up to the risk of data breaches and
other security threats. Hackers and crackers can break into networks and
systems and steal information such as login information or bank and
credit card account records. Some steps that can be taken to protect
online privacy include:
 Installing antivirus and antimalware
 Creating difficult, varied passwords that are impossible to guess.
 Using a virtual private network (VPN) or, at least, a private browsing
mode, such as Google Chrome's Incognito window.
 Only using HTTPS
 Making all social media accounts private.

 Deactivating autofill.
 Turning off the device's GPS.
 Updating cookies so an alert is sent anytime a cookie is installed.
 Logging out of accounts instead of just closing the tab or window.

73
 Using caution with spam emails and never opening or downloading
content from unknown sources.

 Using caution when accessing public Wi-Fi or hotspots.


Additionally, there is an element of the Internet called the dark web. The
dark web is hidden and inaccessible through standard browsers. Instead,
it uses the Tor and I2P browsers which allow users to remain entirely
anonymous. While this anonymity can be a great way to protect an online
user's security and free speech or for the government to keep classified
data hidden, the dark web also creates an environment that
facilitates cybercrime, the transfer of illegal goods and terrorism.

6.2.4 Social impact of the Internet

The social impact of the Internet can be seen as both positive and
negative. On one side, people argue that the Internet has increased the
risk of isolation, alienation and withdrawal from society, pointing to
increases in an emotional response called FOMO, or the fear of missing
out. On the other side, people believe the Internet to have had the
opposite effect on society, arguing that the Internet increases civic
engagement, sociability and the intensity of relationships.
Whether the impacts are good or bad, the Internet has changed the way
society interacts and connects. One example of change is the increased
focus on personal growth and a decline in a community that is
determined by work, family and space. People are now constructing
social relationships based on individual interests, projects and values.
Communities are being formed by like-minded individuals not only offline
and in person, but through the Internet and the multitude of online
environments which it creates and offers. Social networking sites --
like Facebook and LinkedIn -- have become the preferred platforms for
both businesses and individuals looking to perform all kinds of tasks and
communicate with others.

6.2.5 Benefits of the Internet

 Access to endless information, knowledge and education.


 An increased ability to communicate, connect and share.

 The ability to work from home, collaborate and access a global


workforce.

74
 The chance to sell and make money as a business or individual.
 Access to an unlimited supply of entertainment sources, such as
movies, music, videos and games.
 The ability to amplify the impact of a message, allowing charities and
other organizations to reach a wider audience and increase the total
amount of donations.
 Access to the internet of things (IoT), which allows home appliances
and devices to connect and be controlled from a computer or
smartphone.
 The ability to save data and easily share files with cloud storage.
 The ability to monitor and control personal accounts instantly, such
as bank accounts or credit card bills.

6.2.6 History of the Internet

The ARPANet, the predecessor of the Internet, was first deployed in


1969. In 1983, the ARPANet transitioned into using the TCP/IP open
networking protocol suite and in 1985, the National Science Foundation
Network (NSFN) designed the network to connect university computer
science departments around the country.
Communications over the Internet greatly improved in 1989 when the
hypertext transfer protocol (HTTP) was created, giving different computer
platforms the ability to connect to the same Internet sites. In 1993, the
Mosaic Web browser was created.
The Internet has continued to grow and evolve over the years of its
existence. IPv6, for example, was designed to anticipate enormous future
expansion in the number of available IP addresses. In a related
development, the IoT is the burgeoning environment in which almost any
entity or object can be provided with a unique identifier (UID) and the
ability to transfer data automatically over the Internet.
Examples are PASCAL, FORTRAN, C++ etc.The important feature about
such high level languages is that they allow the programmer to write
programs for all types of computers and systems. Every instruction in high
level language is converted to machine language for the computer to
comprehend.

75
6.3 E-mail

Short for electronic mail, e-mail or email is information stored on a


computer that is exchanged between two users over telecommunications.
More plainly, e-mail is a message that may contain text, files, images, or
other attachments sent through a network to a specified individual or
group of individuals.
The first e-mail was sent by Ray Tomlinson in 1971. Tomlinson sent the
e-mail to himself as a test e-mail message, containing the text
"something like QWERTYUIOP." However, despite sending the e-mail to
himself, the e-mail message was still transmitted through ARPANET.
By 1996, more electronic mail was sent than postal mail.

6.3.1 Overview of Email

 The first portion of all e-mail addresses, the part before


the @ symbol, contains the alias, user, group, or department of a
company. In our above example, "support" is the Technical
Support department at Computer Hope.
 Next, the "@" (at sign) is a divider in the e-mail address; it's
required for all SMTP e-mail addresses since Ray Tomlinson sent
the first message.
 Finally, "computerhope.com" is the domain name of where the
user belongs. The ".com" is the TLD (top-level domain) for our
domain. The domain name is used to route the email to the
correct destination server.

6.3.2 How to send and receive e-mail

E-mail program
To send and receive e-mail messages, you can use an e-mail program,
also known as an e-mail client, such as Microsoft Outlook or Mozilla
Thunderbird. When using an e-mail client, a server that stores and
delivers your messages is used. This server is often hosted by
your ISP but can be another Internet company. An e-mail client needs to

76
connect to a server to download new e-mail, whereas e-mail stored
online is always available to any Internet-connected device. For more
information about cloud e-mail service, see the difference between
webmail and an e-mail client, below.
Online e-mail

An alternative way of sending and receiving e-mail (and the more popular
solution for most people) is an online e-mail service or webmail.
Examples include Hotmail (now Outlook.com), Gmail, and Yahoo Mail.
Many online e-mail services, including the ones we mentioned, are free
or have a free account option.
An e-mail service will not provide you with an Internet connection. You'll
still need to use an ISP to connect to the Internet to use the e-mail
service.
Writing an e-mail

When writing an e-mail message, it should look something like the


example window below. As you can see, several fields are required when
sending an e-mail:
 The To field is where the e-mail address of the person receiving
the e-mail is placed.
 The From field should contain your e-mail address.

 If you are replying to a message, the To: and From: fields are
automatically filled out. If it's a new message, you need to specify
the recipients in the To: field by selecting them from your contact
list or by typing the e-mail addresses. If you enter more than one
recipient (e.g., group e-mail), the addresses should be separated
by a comma and a space or by pressing the Tab
 The Subject should consist of a few words describing the e-mail's
contents. The subject lets the recipient see what the e-mail is
about, without opening and reading the full e-mail. This field is
optional.
 The CC ("Carbon Copy") field lets you specify recipients who are
not direct addressees (listed in the "To" field). For instance, you
can address an e-mail to Jeff and CC Linda and Steven. Although
the e-mail is addressed to Jeff, Linda and Steven also receive a

77
copy and everyone can see who received the e-mail. This field is
optional.

 The BCC ("blind carbon copy") field is similar to CC, except the
recipients are secret. Each BCC recipient receives the e-mail, but
does not see who else received a copy. The addressees (anyone
listed in the "To" field) remain visible to all recipients. This field is
optional.
 Finally, the Message Body is the location you type your main
message. It often contains your signature at the bottom; similar to
a handwritten letter.
What makes a valid e-mail address?

The following rules make an e-mail address valid:


 As mentioned earlier, an e-mail must have a username followed
by @ (the at sign), followed by the domain name with a domain
suffix.
 The username cannot be longer than 64 characters long, and the
domain name cannot be longer than 254 characters.
 There should be only one @ sign in an e-mail address.

 The space and special characters: ( ) , : ; < > \ [ ] are allowed.


Occasionally, a space, backslash, and quotation mark work but
must be preceded with a forward slash. Although valid, some e-
mail providers do not allow these characters.
 The username and e-mail addresses as a whole cannot begin or
end with a period.
 The e-mail must not have two or more consecutive periods.

6.3.3 Advantages of e-mail

There are many advantages of e-mail and the usage of e-mail versus
postal mail. Some of the main advantages are listed below.
 Free delivery - Sending an e-mail is virtually free, outside the
cost of Internet service. There is no need to buy a postage stamp
to send a letter.
 Global delivery - E-mail can be sent to nearly anywhere around
the world, to any country.

78
 Instant delivery - An e-mail can be instantly sent and received by
the recipient over the Internet.
 File attachment - An e-mail can include one or more file
attachments, allowing a person to send documents, pictures, or
other files with an e-mail.
 Long-term storage - E-mails are stored electronically, which
allows for storage and archival over long periods of time.
 Environmentally friendly - Sending an e-mail does not require
paper (paperless), cardboard, or packing tape, conserving paper
resources.

6.3.4 Difference between an e-mail client and webmail?

Both webmail and an e-mail client perform the same function: they allow
the user to send and receive e-mail. However, an e-mail client requires
the user to install software directly onto their computer; if the software is
not installed, e-mail may not be accessed. Also, many e-mail clients cost
money but are generally more secure. Webmail, on the other hand, is a
free service, hosted in the cloud. The cloud service automatically
synchronizes your e-mail to all your devices, including your desktop
computer, tablet, or smartphone.
Some of the popular e-mail clients

There are many e-mail clients (those that are software-based, not online)
available for users today. The following list contains some of the most
popular clients, and some of these are free to use.
 Microsoft Outlook
 Thunderbird
 DreamMail

 Mail for Windows 10


 Mailbird
 eM Client
What can be sent in an e-mail?

In addition to sending text messages, e-mail can also have attachments.


For example, an attachment could be a picture, PDF, word processor
document, movie, program, or any file stored on your computer.

79
However, because of some security issues, it may not be possible to
send certain types of files without additional steps. For example, many
companies block .exe files from being sent over e-mail and would require
you to compress the file into a .zip file. Also, most e-mail providers
have file size restrictions that would prevent any large files or programs
from being sent over e-mail.

Let Us Sum Up

From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.

Check Your Progress

1. MIME stands for ________


2. How can you tell the email that you have read from the email that
you have not read
3. ______ is the exchange of computer stored messages by
telecommunication.
4. Unwanted repetitious messages, such as unsolicited bulk email is
known as _______
5. Junk Mail is called as _______
6. SMTP stands for
7. E-mail address is made up of ______

Glossaries

Assembler: A program that translates assembly languages into machine


code.

Assembly language:A low-level programming language closely related


to machine language. Also called assembly code.
Binary:A number system that contains two symbols, 0 and 1. Also known
as base 2.
Compilation:The process of translating source code into object code all
in one go. The program can then be executed as a whole.
Compiler:A program that translates high-level programming languages
into machine code.

80
Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/

 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress

1.Multipurpose Internet Mail Extension.


2.The unread mail will be bold.

3. Email
4. Spam
5. Spam
6. Simple Main Transfer Protocol.
7. Two

81
Unit-7
CLOUD COMPUTING
Overview
Learning objectives
7.1 Cloud Computing
7.2 Features of a Cloud
7.3 The Seven Step Model of Migration into Cloud
7.4 The Integration Methodologies
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the seventh unit of our concepts. It will introduce you to


communication media. Also Internet and Intranet we will be discussing.
Through this unit, the concepts about cloud computing is also discussed.

Learning Objectives

By the end of this unit, you should be able to

 Understand the Communication Media.


 Idea about the Internet and Intranet.
 Get the knowledge of Cloud computing.

7.1 Cloud Computing

Cloud is a parallel and distributed computing system consisting of a


collection of inter-connected and virtualized computers that are
dynamically provisioned and presented as one or more unified computing
resources based on service-level agreements (SLA) established through
negotiation between the service provider and consumers. Clouds are a
large pool of easily usable and accessible virtualized resources (such as
hardware, development platforms and/or services). These resources can
be dynamically reconfigured to adjust to a variable load (scale), allowing

82
also for an optimum resource utilization. This pool of resources is
typically exploited by a pay-peruse model in which guarantees are
offered by the Infrastructure Provider by means of customized Service
Level Agreements.
Hardware Virtualization Multi-core chips Utility & Grid Computing Cloud
Computing SOA Web Web Services Mashups Autonomic Computing
Data Center Automation Internet Technologies Distributed Computing
This model brings benefits to both consumers and providers of IT
services. Consumers can attain reduction on IT-related costs by choosing
to obtain cheaper services from external providers as opposed to heavily
investing on IT infrastructure and personnel hiring. The on-demand
component of this model allows consumers to adapt their IT usage to
rapidly increasing or unpredictable computing needs. Providers of IT
services achieve better operational costs; hardware and software
infrastructures are built to provide multiple solutions and serve many
users, thus increasing efficiency and ultimately leading to faster return on
investment (ROI) as well as lower total cost of ownership (TCO). The
mainframe era collapsed with the advent of fast and inexpensive
microprocessors and IT data centers moved to collections of commodity
servers. Apart from its clear advantages, this new model inevitably led to
isolation of workload into dedicated servers, mainly due to
incompatibilities These facts reveal the potential of delivering computing
services with the speed and reliability that businesses enjoy with their
local machines.
The benefits of economies of scale and high utilization allow providers to
offer computing services for a fraction of what it costs for a typical
company that generates its own computing power. The purpose of a SOA
is to address requirements of loosely coupled, standards-based, and
protocol independent distributed computing. In a SOA, software
resources are packaged as ―services, which are well defined, self-
contained modules that provide standard business functionality and are
independent of the state or context of other services. Services are
described in a standard definition language and have a published
interface. The maturity of WS has enabled the creation of powerful
services that can be accessed on-demand, in a uniform way. While some
WS are published with the intent of serving end-user applications, their
true power resides in its interface being accessible by other services. An
enterprise application that follows the SOA paradigm is a collection of

83
services that together perform complex business logic. In the consumer
Web, information and services may be programmatically aggregated,
acting as building blocks of complex compositions, called service
mashups. Many service providers, such as Amazon, del.icio.us,
Facebook, and Google, make their service APIs publicly accessible using
standard protocols such as SOAP and REST. In the Software as a
Service (SaaS) domain, cloud applications can be built as compositions
of other services from the same or different providers. Services such user
authentication, e-mail, payroll management, and calendars are examples
of building blocks that can be reused and combined in a business
solution in case a single, readymade system does not provide all those
features. Many building blocks and solutions are now available in public
marketplaces. For example, Programmable Web is a public repository of
service APIs and mashups currently listing thousands of APIs and
mashups. Popular APIs such as Google Maps, Flickr, YouTube, Amazon
eCommerce, and Twitter, when combined, produce a variety of
interesting solutions, from finding video game retailers to weather maps.
Similarly, Salesforce.com‘s offers AppExchange, which enables the
sharing of solutions developed by third-party developers on top of
Salesforce.com components.
Cloud Computing services are divided into three classes:

According to the abstraction level of the capability provided and the


service model of providers, namely:
1. Infrastructure as a Service
2. Platform as a Service and
3. Software as a Service.

These abstraction levels can also be viewed as a layered architecture


where services of a higher layer can be composed from services of the
underlying layer. The reference model explains the role of each layer in
an integrated architecture. A core middleware manages physical
resources and the VMs deployed on top of them; in addition, it provides
the required features (e.g., accounting and billing) to offer multi-tenant
pay-as-you-go services. Cloud development environments are built on
top of infrastructure services to offer application development and
deployment capabilities; in this level, various programming models,
libraries, APIs, and mashup editors enable the creation of a range of

84
business, Web, and scientific applications. Once deployed in the cloud,
these applications can be consumed by end users. Infrastructure as a
Service Offering virtualized resources on demand is known as
Infrastructure as a Service (IaaS). A cloud infrastructure enables on-
demand provisioning of servers running several choices of operating
systems and a customized software stack. Infrastructure services are
considered to be the bottom layer of cloud computing systems. Amazon
Web Services mainly offers IaaS, which in the case of its EC2 service
means offering VMs with a software stack that can be customized similar
to how an ordinary physical server would be customized. Users are
given privileges to perform numerous activities to the server, such as:
starting and stopping it, customizing it Service Class Main Access &
Management Tool Service content Cloud Applications Web Browser
SaaS Social networks, Office suites, CRM, Video processing Cloud
Platform PaaS Cloud Development Environment Programming
languages, Frameworks,,Mashups editors, Structured data Cloud
Infrastructure IaaS Virtual Infrastructure Manager Compute Servers, Data
Storage, Firewall, Load Balancer by installing software packages,
attaching virtual disks to it, and configuring access permissions and
firewalls rules.
Platform as a Service In addition to infrastructure-oriented clouds that
provide raw computing and storage services, another approach is to offer
a higher level of abstraction to make a cloud easily programmable,
known as Platform as a Service (PaaS). A cloud platform offers an
environment on which developers create and deploy applications and do
not necessarily need to know how many processors or how much
memory that applications will be using. In addition, multiple programming
models and specialized services (e.g., data access, authentication, and
payments) are offered as building blocks to new applications. Google
App Engine, an example of Platform as a Service, offers a scalable
environment for developing and hosting Web applications, which should
be written in specific programming languages such as Python or Java,
and use the services‘ own proprietary structured object data store.
Building blocks include an in-memory object cache (memcache), mail
service, instant messaging service (XMPP), an image manipulation
service, and integration with Google Accounts authentication service.
Software as a Service Applications reside on the top of the cloud stack.
Services provided by this layer can be accessed by end users through

85
Web portals. Therefore, consumers are increasingly shifting from locally
installed computer programs to on-line software services that offer the
same functionally. Traditional desktop applica-tions such as word
processing establishing a private cloud means restructuring an existing
infrastructure by adding virtualization and cloud-like interfaces. This
allows users to interact with the local data center while experiencing the
same advantages of public clouds, most notably self-service interface,
privileged access to virtual servers, and per-usage metering and billing.
A community cloud is ―shared by several organizations and a specific
community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations) . A hybrid cloud
takes shape when a private cloud is supplemented with computing
capacity from public clouds. The approach of temporarily renting capacity
to handle spikes in load is known as cloud-bursting.

7.2 Features of a Cloud:


i. Self-service
ii. Per-usage metered and billed
iii. Elastic
iv. Customizable SELF-SERVICE

Consumers of cloud computing services expect on-demand, nearly


instant access to resources.
To support this expectation, clouds must allow self-service access so that
customers can request, customize, pay, and use services without
intervention of human operators.
USAGE METERING AND BILLING :

Cloud computing eliminates up-front commitment by users, allowing them


to request and use only the necessary amount. Services must be priced
on a short- term basis (e.g., by the hour), allowing users to release (and
not pay for) resources as soon as they are not needed. For these
reasons, clouds must implement features to allow efficient trading of
service such as pricing, accounting, and billing. Metering should be done
accordingly for different types of service (e.g., storage, processing, and
bandwidth) and usage promptly reported, thus providing greater
transparency.

86
ELASTICITY

Cloud computing gives the illusion of infinite computing resources


available on demand. Therefore users expect clouds to rapidly provide
resources in any Quantity at any time. In particular, it is expected that the
additional resources can be

(i) Provisioned, possibly automatically, when an application load


increases and
(ii) ii. Released when load decreases (scale up and down).
CUSTOMIZATION

In a multi-tenant cloud a great disparity between user needs is often the


case. Thus, resources rented from the cloud must be highly
customizable.
FEATURES AVAILABLE IN VIMS VIRTUALIZATION SUPPORT:

The multi-tenancy aspect of clouds requires multiple customers with


disparate requirements to be served by a single hardware infrastructure.
Virtualized resources (CPUs, memory, etc.) can be sized and resized
with certain flexibility. These features make hardware virtualization, the
ideal technology to create a virtual infrastructure that partitions a data
center among multiple tenants.
SELF-SERVICE, ON-DEMAND RESOURCE, PROVISIONING:

Self-service access to resources has been perceived as one the most


attractive features of clouds. This feature enables users to directly obtain
services from clouds, such as spawning the creation of a server and
tailoring its software, configurations, and security policies, without
interacting with a human system administrator. This cap- ability
―eliminates the need for more time consuming, labor-intensive, human-
driven procurement processes familiar to many in IT‖. Therefore,
exposing a self-service interface, through which users can easily interact
with the system, is a highly desirable feature of a VI manager.
MULTIPLE BACKEND HYPERVISORS:

Different virtualization models and tools offer different benefits,


drawbacks, and limitations. Thus, some managers provide a uniform
management layer regardless of the virtualization technology used. This
characteristic is more visible in open-source

87
managers, which usually provide pluggable drivers to interact with
multiple hypervisors.
STORAGE VIRTUALIZATION: Vitalizing storage means abstracting
logical storage from physical storage. By consolidating all available
storage devices in a data center, it allows creating virtual disks
independent from device and location. Storage devices are commonly
organized in a storage area network (SAN) and attached to servers via
protocols such as Fibre Channel, iSCSI, and NFS; a storage controller
provides the layer of abstraction between virtual and physical storage. In
the management sphere, storage virtualization support is often
restricted to commercial products of 29 companies such as VMW are and
Citrix. Other products feature ways of pooling and managing storage
devices, but administrators are still aware of each individual device.
Interface to Public Clouds. Researcher have perceived that extending the
capacity of a local in-house computing infrastructure by borrowing
resources from public clouds is advantageous. In this fashion, institutions
can make good use of their available resources and, in case of spikes in
demand, extra load can be offloaded to rented resources.
A manager can be used in a hybrid cloud setup if it offers a driver to
manage the life cycle of virtualized resources obtained from external
cloud providers. To the applications, the use of leased resources must
ideally be transparent. Virtual Networking. Virtual networks allow creating
an isolated network on top of a physical infrastructure independently from
physical topology and locations. A virtual LAN (VLAN) allows isolating
traffic that shares a switched network, allowing VMs to be grouped into
the same broadcast domain. Additionally, a VLAN can be configured to
block traffic originated from VMs from other networks. Similarly, the VPN
(virtual private network) concept is used to describe a secure and private
overlay network on top of a public network (most commonly the public
Internet).
DYNAMIC RESOURCE ALLOCATION: In cloud infrastructures, where
applications have variable and dynamic needs, capacity management
and demand prediction are especially complicated. This fact triggers the
need for dynamic resource allocation aiming at obtaining a timely match
of supply and demand. A number of managers include a dynamic
resource allocation feature that continuously monitors utilization 30

88
across resource pools and reallocates available resources among VMs
according to application needs.
VIRTUAL CLUSTERS: Several managers can holistically manage
groups of VMs. This feature is useful for provisioning computing virtual
clusters on demand, and interconnected VMs for multi-tier Internet
applications.
RESERVATION AND NEGOTIATION MECHANISM: When users
request computational resources to available at a specific time, requests
are termed advance reservations (AR), in contrast to best-effort requests,
when users request resources whenever available. HIGH AVAILABILITY
AND DATA RECOVERY: The high availability (HA) feature of VI
managers aims at minimizing application downtime and preventing
business disruption. INFRASTRUCTURE AS A SERVICE PROVIDERS
Public Infrastructure as a Service providers commonly offer virtual
servers containing one or more CPUs, running several choices of
operating systems and a customized software stack.
FEATURES The most relevant features are:

i. Geographic distribution of data centers;


ii. Variety of user interfaces and APIs to access the system;
iii. Specialized components and services that aid particular
applications (e.g., load- balancers,firewalls);
iv. Choice of virtualization platform and operating systems; and
v. Different billing methods and period (e.g., prepaid vs. postpaid,
hourly vs. monthly).
GEOGRAPHIC PRESENCE: Availability zones are ―distinct locations
that are engineered to be insulated from failures in other availability
zones and provide inexpensive, low-latency network connectivity to other
availability zones in the same region.Regions, in turn, ―are
geographically dispersed and will be in separate geographic areas or
countries.
USER INTERFACES AND ACCESS TO SERVERS: A public IaaS
provider must provide multiple access means to its cloud, thus catering
for various users and their preferences. Different types of user interfaces
(UI) provide different levels of abstraction, the most common being
graphical user interfaces (GUI), command-line tools (CLI), and Web

89
service (WS) APIs. GUIs are preferred by end users who need to
launch, customize, and monitor a few virtual servers and do not
necessary need to repeat the process several times.
ADVANCE RESERVATION OF CAPACITY: Advance reservations
allow users to request for an IaaS provider to reserve resources for a
specific time frame in the future, thus ensuring that cloud resources will
be available at that time. Amazon Reserved Instances is a form of
advance reservation of capacity, allowing users to pay a fixed amount of
money in advance to guarantee resource availability at anytime during
an agreed period and then paying a discounted hourly rate when
resources are in use.
AUTOMATIC SCALING AND LOAD BALANCING: It allow users to set
conditions for when they want their applications to scale up and down,
based on application specific metrics such as transactions per second,
number of simultaneous users, request latency, and so forth. When the
number of virtual servers is increased by automatic scaling, incoming
traffic must be automatically distributed among the available servers.
This activity enables applications to promptly respond to traffic increase
while also achieving greater fault tolerance.
SERVICE-LEVEL AGREEMENT: Service-level agreements (SLAs) are
offered by IaaS providers to express their commitment to delivery of a
certain QoS. To customers it serves as a warranty. An SLA usually
include availability and performance guarantees.
HYPERVISOR AND OPERATING SYSTEM CHOICE: IaaS offerings
have been based on heavily customized open-source Xen deployments.
IaaS providers needed expertise in Linux, networking, virtualization,
metering, resource management, and many other low-level aspects to
successfully deploy and maintain their cloud offerings.
PLATFORM AS A SERVICE PROVIDERS Public Platform as a Service
providers commonly offer a development and deployment environment
that allow users to create and run their applications with little or no
concern to low-level details of the platform.
FEATURES Programming Models, Languages, and Frameworks.
Programming models made available by IaaS providers define how
users can express their applications using higher levels of abstraction
and efficiently run them on the cloud platform Persistence Options. A

90
persistence layer is essential to allow applications to record their state
and recover it in case of crashes, as well as to store user data.

Security and privacy affect the entire cloud computing stack, since there
is a massive use of third-party services and infrastructures that are used
to host important data or to perform critical operations. In this scenario,
the trust toward providers is fundamental to ensure the desired level of
privacy for applications hosted in the cloud. When data are moved into
the Cloud, providers may choose to locate them anywhere on the planet.
The physical location of data centers determines the set of laws that can
be applied to the management of data.
DATA LOCK-IN AND STANDARDIZATION The Cloud Computing
Interoperability Forum (CCIF) was formed by organizations such as Intel,
Sun, and Cisco in order to ―enable a global cloud computing ecosystem
whereby organizations are able to seamlessly work together for the
purposes for wider industry adoption of cloud computing technology.‖
The development of the Unified Cloud Interface (UCI) by CCIF aims at
creating a standard programmatic point of access to an entire cloud
infrastructure. In the hardware virtualization sphere, the Open Virtual
Format (OVF) aims at facilitating packing and distribution of software to
be run on VMs so that virtual appliances can be made portable
AVAILABILITY, FAULT-TOLERANCE, AND DISASTER RECOVERY
It is expected that users will have certain expectations about the service
level to be provided once their applications are moved to the cloud.
These expectations include availability of the service, its overall
performance, and what measures are to be taken when something goes
wrong in the system or its components. In summary, users seek for a
warranty before they can comfortably move their business to the cloud.
SLAs, which include QoS requirements, must be ideally set up between
customers and cloud computing providers to act as warranty. An SLA
specifies the details of the service to be provided, including availability
and performance guarantees. Additionally, metrics must be agreed upon
by all parties, and penalties for violating the expectations must also be
approved.
RESOURCE MANAGEMENT AND ENERGY-EFFICIENCY The multi-
dimensional nature of virtual machines complicates the activity of finding
a good mapping of VMs onto available physical hosts while maximizing
user utility. Dimensions to be considered include: number of

91
CPUs,amount of memory, size of virtual disks, and network bandwidth.
Dynamic VM mapping policies may leverage the ability to suspend,
migrate, and resume VMs as an easy way of preempting low-priority
allocations in favor of higher-priority ones. Migration of VMs also brings
additional challenges such as detecting when to initiate a migration,
which VM to migrate, and where to migrate. In addition, policies may
take advantage of live migration of virtual machines to relocate data
center load without significantly disrupting running services.
MIGRATING INTO A CLOUD The promise of cloud computing has
raised the expectations of small and medium enterprises beyond
measure. Large companies are deeply debating it. Cloud computing is a
disruptive model of IT whose innovation is part technology and part
business model in short a disruptive techno-commercial model‖ of IT.
THE CLOUD SERVICE OFFERINGS AND DEPLOYMENT MODELS

Cloud computing has been an attractive proposition both for the CFO
and the CTO of an enterprise primarily due its ease of usage. This has
been achieved by large data center service vendors or now better known
as cloud service vendors again primarily due to their scale of operations.
The cloud computing service offering and deployment models. IaaS IT
Folks
BROAD APPROACHES TO MIGRATING INTO THE CLOUD
Cloud Economics deals with the economic rationale for leveraging the
cloud and is central to the success of cloud-based enterprise usage.
Decision-makers, IT managers, and software architects are faced with
several dilemmas when planning for new Enterprise IT initiatives.

7.3 The Seven Step Model of Migration into Cloud :

Typically migration initiatives into the cloud are implemented in phases or


in stages. A structured and process-oriented approach to migration into a
cloud has several advantages of capturing within itself the best practices
of many migration projects.
1. Conduct Cloud Migration Assessments
2. Isolate the Dependencies Distributed System

3. Map the Messaging & Environment


4. Re-architect & Implement the lost Functionalities

92
5. Leverage Cloud Functionalities & Features
6. Test the Migration

7. Iterate and Optimize


Integration as a service (IaaS) is the budding and distinctive capability
of clouds in fulfilling the business integration requirements. Increasingly
business applications are deployed in clouds to reap the business and
technical benefits. On the other hand, there are still innumerable
applications and data sources locally stationed and sustained primarily
due to the security reason. The question here is how to create a
seamless connectivity between those hosted and on-premise
applications to empower them to work together. IaaS over- comes these
challenges by smartly utilizing the time-tested business-to-business
(B2B) integration technology as the value-added bridge between SaaS
solutions and in-house business applications.
1. The Web is the largest digital information superhighway
2. The Web is the largest repository of all kinds of resources such as web
pages, applications comprising enterprise components, business
services, beans, POJOs, blogs, corporate data, etc.
3. The Web is turning out to be the open, cost-effective and generic
business execution platform (E-commerce, business, auction, etc.
happen in the web for global users) comprising a wider variety of
containers, adaptors, drivers, connectors, etc.
4. The Web is the global-scale communication infrastructure (VoIP, Video
conferencing, IP TV etc,)
5. The Web is the next-generation discovery, Connectivity, and
integration middleware Thus the unprecedented absorption and adoption
of the Internet is the key driver for the continued success of the cloud
computing.
THE CHALLENGES OF SaaS PARADIGM:

As with any new technology, SaaS and cloud concepts too suffer a
number of limitations. These technologies are being diligently examined
for specific situations and scenarios. The prickling and tricky issues in
different layers and levels are being looked into. The overall views are
listed out below. Loss or lack of the following features deters the massive
adoption of clouds

93
1. Controllability
2. Visibility & flexibility

3. Security and Privacy


4. High Performance and Availability
5. Integration and Composition

6. Standards A number of approaches are being investigated for


resolving the identified issues and flaws. Private cloud, hybrid and the
latest community cloud are being prescribed as the solution for most of
these inefficiencies and deficiencies. As rightly pointed out by someone
in his weblogs, still there are miles to go. There are several companies
focusing on this issue. 42 Integration Conundrum. While SaaS
applications offer outstanding value in terms of features and
functionalities relative to cost, they have introduced several challenges
specific to integration. The first issue is that the majority of SaaS
applications are point solutions and service one line of business. APIs
are Insufficient: Many SaaS providers have responded to the integration
challenge by developing application programming interfaces (APIs).
Unfortunately, accessing and managing data via an API requires a
significant amount of coding as well as maintenance due to frequent API
modifications and updates.

Data Transmission Security: SaaS providers go to great length to ensure


that customer data is secure within the hosted environment. However,
the need to transfer data from on-premise systems or applications behind
the firewall with SaaS applications hosted outside of the client‘s data
center poses new challenges that need to be addressed by the
integration solution of choice. The Impacts of Cloud:. On the
infrastructural front, in the recent past, the clouds have arrived onto the
scene powerfully and have extended the horizon and the boundary of
business applications, events and data. That is, business applications,
development platforms etc. are getting moved to elastic, online and on-
demand cloud infrastructures. Precisely speaking, increasingly for
business, technical, financial and green reasons, applications and
services are being readied and relocated to highly scalable and available
clouds.

94
7.4 THE INTEGRATION METHODOLOGIES:

There are three types for cloud integration

1. Traditional Enterprise Integration Tools can be empowered with


special connectors to access Cloud-located Applications—This is the
most likely approach for organizations, which have already invested a lot
in integration suite for their application integration needs.
2. Traditional Enterprise Integration Tools are hosted in the Cloud—This
approach is similar to the first option except that the integration software
suite is now hosted in any third-party cloud infrastructures so that the
enterprise does not worry about procuring and managing the hardware or
installing the integration software. This is a good fit for IT organizations
that outsource the integration projects to IT service organizations and
systems integrators, who have the skills and resources to create and
deliver integrated systems. Integration-as-a-Service (IaaS) or On-
Demand Integration Offerings— These are SaaS applications that are
designed to deliver the integration service securely over the Internet and
are able to integrate cloud applications with the on-premise systems,
cloud-to-cloud applications. SaaS administrator or business analyst as
the primary resource for managing and maintaining their integration work.
A good example is Informatics On-Demand Integration Services. In the
integration requirements can be realized using any one of the following
methods and middleware products.
1. Hosted and extended ESB (Internet service bus / cloud integration
bus)
2. Online Message Queues, Brokers and Hubs
3. Wizard and configuration-based integration platforms

4. Integration Service Portfolio Approach


5. Appliance-based Integration
CHARACTERISTICS OF INTEGRATION SOLUTIONS AND
PRODUCTS.

The key attributes of integration platforms and backbones gleaned and


gained from integration projects experience are connectivity, semantic
mediation, Data mediation, integrity, security, governance etc
Connectivity refers to the ability of the integration engine to engage with

95
both the source and target systems using available native interfaces. This
means leveraging the interface that each provides, which could vary from
standards-based interfaces, such as Web services, to older and
proprietary interfaces. Systems that are getting connected are very much
responsible for the externalization of the correct information and the
internalization of information once processed by the integration engine.
Semantic Mediation refers to the ability to account for the differences
between application semantics between two or more systems. Semantics
means how information gets understood, interpreted and represented
within information systems. When two different and distributed systems
are linked, the differences between their own yet distinct semantics have
to be covered. Data Mediation converts data from a source data format
into destination data format. Coupled with semantic mediation, data
mediation or data transformation is the process of converting data from
one native format on the source system, to another data format for the
target system. Data Migration is the process of transferring data between
storage types, formats, or systems. Data migration means that the data in
the old system is mapped to the new systems, typically leveraging data
extraction and data loading technologies. Data Security means the ability
to insure that information extracted from the source systems has to
securely be placed into target systems. The integration method must
leverage the native security systems of the source and target systems,
mediate the differences, and provide the ability to transport the
information safely between the connected systems. Data Integrity means
data is complete and consistent. Thus, integrity has to be guaranteed
when data is getting mapped and maintained during integration
operations, such as data synchronization between on-premise and SaaS-
based systems. Governance refers to the processes and technologies
that surround a system or systems, which control how those systems are
accessed and leveraged. Within the integration perspective, governance
is about managing changes to core information resources, including data
semantics, structure, and interfaces.
THE ENTERPRISE CLOUD COMPUTING PARADIGM: Relevant
Deployment Models for Enterprise Cloud Computing There are some
general cloud deployment models that are accepted by the majority of
cloud stakeholders today:

96
1)Public clouds are provided by a designated service provider for general
public under a utility based pay-per-use consumption model. The cloud
resources are hosted generally on the service provider‘s premises.
2)Private clouds are built, operated, and managed by an organization for
its internal use only to support its business operations exclusively. Public,
private, and government organizations worldwide are adopting this model
to exploit the cloud benefits like flexibility, cost reduction, agility and so
on.

3) Virtual private clouds are a derivative of the private cloud deployment


model but are further characterized by an isolated and secure segment of
resources, created as an overlay on top of public cloud infrastructure
using advanced network virtualization capabilities. Some of the public
cloud vendors that offer this capability include Amazon Virtual Private
Cloud , Open Source Cloud , and Sky tap Virtual Lab.
4) Community clouds are shared by several organizations and support a
specific community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). They may be
managed by the organizations or a third party and may exist on premise
or off premise. One example of this is Open Cirrus formed by HP ,Intel,
Yahoo, and others.

5) Managed clouds arise when the physical infrastructure is owned by


and/or physically located in the organization‘s data centers with an
extension of management and security control plane controlled by the
managed service provider.
6) Hybrid clouds are a composition of two or more clouds (private,
community ,or public) that remain unique entities but are bound together
by standardized or proprietary technology that enables data and
application.

Let Us Sum Up

From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.

Check Your Progress

1. Each user of a email communication should possess _______

97
2. The email ID of a person contains _______ parts.
3. In email communication, BCC stands for _______.

4. The email ID of the anonymous recipient of email is entered in


______ field.
5. The file attached to an email is called the _______

6. Unsolicited emails may be filtered and separated into ______


7. All emails sent by the user may be saved in _______ .

Glossaries

 Bcc - Blind Carbon Copy.


 Bulk Mail - Large scale email marketing sends in which the same
content goes to a large group of people.
 Honey Pot - A planted email address by organizations trying to
combat spam that, when a spammer harvests and emails, identifies
that sender as a spammer.
 HTML Email - Sending HTML email makes it possible to get creative
with the design of your emails.
 Whitelist - Instead of listing IP addresses to block, a whitelist
includes IP addresses that have been approved to deliver email to a
recipient.
 SPF - Short for 'Sender Policy Framework', it's a DNS record that
says on whose behalf an IP or domain sends email.
Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

Answers to Check Your Progress


1. A unique identifier, called email ID
2. Two
3. CC
4. BCC
5. Attachment
6. Spam
7. Sent mails

98
BLOCK 4
BASIC SOFTWARE

Unit 8- INTRODUCTION TO BASIC OF


SOFTWARE

99
Unit-8
INTRODUCTION TO BASIC OF SOFTWARE
Overview
Learning objectives
8.1 Introduction to Software
8.1.1 Examples and Types of Software
8.2 How does Software works?
8.3 Ms.Word
8.4 Ms.Excel and Ms.Access
8.4.1 Microsoft Access
8.4.2 Differences between Access and Excel
8.5 Ms.Power Point
8.5.1 Features Of Ms.Power Point
8.5.2 Uses Of Power Point
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the Eight of our concepts. It will introduce you to Ms.Office . Also
software we will be discussing.

Learning Objectives

By the end of this unit, you should be able to


 Understand the Software and its types
 Idea about the Ms.Word
 Get the knowledge of Ms.Power Point.

8.1 Introduction to Software

Software is a set of instructions, data or programs used to operate


computers and execute specific tasks. It is the opposite of hardware,

100
which describes the physical aspects of a computer. Software is a
generic term used to refer to applications, scripts and programs that run
on a device. It can be thought of as the variable part of a computer, while
hardware is the invariable part.
The two main categories of software are application software and system
software. An application is software that fulfils a specific need or performs
tasks. System software is designed to run a computer's hardware and
provides a platform for applications to run on top of.

Other types of software include programming software, which provides


the programming tools software developers need; middleware, which sits
between system software and applications; and driver software, which
operates computer devices and peripherals.
Early software was written for specific computers and sold with the
hardware it ran on. In the 1980s, software began to be sold on floppy
disks, and later on CDs and DVDs. Today, most software is purchased
and directly downloaded over the internet. Software can be found on
vendor websites or application service provider websites.

8.1.1 Examples and types of software

Among the various categories of software, the most common types


include the following:
 Application software. The most common type of software,
application software is a computer software package that performs a
specific function for a user, or in some cases, for another application.
An application can be self-contained, or it can be a group of
programs that run the application for the user. Examples of modern
applications include office suites, graphics software, databases and
database management programs, web browsers, word processors,
software development tools, image editors and communication
platforms.
 System software. These software programs are designed to run a
computer's application programs and hardware. System software
coordinates the activities and functions of the hardware and software.
In addition, it controls the operations of the computer hardware and
provides an environment or platform for all the other types of software
to work in. The OS is the best example of system software; it
manages all the other computer programs. Other examples of system

101
software include the firmware, computer language translators and
system utilities.
 Driver software. Also known as device drivers, this software is often
considered a type of system software. Device drivers control the
devices and peripherals connected to a computer, enabling them to
perform their specific tasks. Every device that is connected to a
computer needs at least one device driver to function. Examples
include software that comes with any nonstandard hardware,
including special game controllers, as well as the software that
enables standard hardware, such as USB storage devices,
keyboards, headphones and printers.
 Middleware. The term middleware describes software that mediates
between application and system software or between two different
kinds of application software. For example, middleware enables
Microsoft Windows to talk to Excel and Word. It is also used to send
a remote work request from an application in a computer that has one
kind of OS, to an application in a computer with a different OS. It also
enables newer applications to work with legacy ones.
 Programming software. Computer programmers use programming
software to write code. Programming software and programming
tools enable developers to develop, write, test and debug other
software programs. Examples of programming software include
assemblers, compilers, debuggers and interpreters.

8.2 How does software work?

All software provides the directions and data computers need to work and
meet users' needs. However, the two different types -- application
software and system software -- work in distinctly different ways.
Application software
Application software consists of many programs that perform specific
functions for end users, such as writing reports and navigating websites.
Applications can also perform tasks for other applications. Applications
on a computer cannot run on their own; they require a computer's OS,
along with other supporting system software programs, to work.
These desktop applications are installed on a user's computer and use
the computer memory to carry out tasks. They take up space on the

102
computer's hard drive and do not need an internet connection to work.
However, desktop applications must adhere to the requirements of the
hardware devices they run on.
Web applications, on the other hand, only require internet access to
work; they do not rely on the hardware and system software to run.
Consequently, users can launch web applications from devices that have
a web browser. Since the components responsible for the application
functionality are on the server, users can launch the app from Windows,
Mac, Linux or any other OS.
System software

System software sits between the computer hardware and the application
software. Users do not interact directly with system software as it runs in
the background, handling the basic functions of the computer. This
software coordinates a system's hardware and software so users can run
high-level application software to perform specific actions. System
software executes when a computer system boots up and continues
running as long as the system is on.
Design and implementation

The software development lifecycle is a framework that project managers


use to describe the stages and tasks associated with designing software.
The first steps in the design lifecycle are planning the effort and then
analyzing the needs of the individuals who will use the software and
creating detailed requirements. After the initial requirements analysis, the
design phase aims to specify how to fulfill those user requirements.
The next is step is implementation, where development work is
completed, and then software testing happens. The maintenance phase
involves any tasks required to keep the system running.
The software design includes a description of the structure of the
software that will be implemented, data models, interfaces between
system components and potentially the algorithms the software engineer
will use.
The software design process transforms user requirements into a form
that computer programmers can use to do the software coding and
implementation. The software engineers develop the software design

103
iteratively, adding detail and correcting the design as they develop it. The
different types of software design include the following:
 Architectural design. This is the foundational design, which
identifies the overall structure of the system, its main components
and their relationships with one another using architectural design
tools.
 High-level design. This is the second layer of design that focuses on
how the system, along with all its components, can be implemented
in forms of modules supported by a software stack. A high-level
design describes the relationships between data flow and the various
modules and functions of the system.
 Detailed design. This third layer of design focuses on all the
implementation details necessary for the specified architecture.

8.3 Ms-Word

 Word Processing is perhaps the most common and comparatively


easier application to work on any computer. A word processor lets
you to change words or phrases, to move whole sections of text from
one place to another, store blocks of text, and align margins all in few
seconds. Use of word processors has changed the look of official
correspondence, reports, and proposals etc. to a great extent. MS
Word is an advanced word processing product by Microsoft
company. The powerful features of Word will allow you to create even
graphic based multicolumn publications such as Fliers, News letters
and Internet web pages.
PARTS OF WORD WINDOW: Title bar This tells you which
application package is currently running and which document is
currently open. Menu bar This is the traditional windows style drop-
down menu. When you point to any menu title and click once with the
mouse, the menu will open displaying all the commands available
under this menu. Clicking on the desired command would tell Word to
execute that command. Some commands have ellipses (…) in front
of them. These commands have further sub commands. Commands
appearing in dim mode cannot be executed unless the prerequisite
functions required by that command have been performed, e.g. you
cannot use the Copy or Cut command from the Edit menu unless you
have selected a piece of text first. Many commands also have a

104
keyboard shortcuts specified against their names. Standard toolbar
Toolbars contain buttons, drop-down menus and other controls that
help you to quickly alter the appearance and arrangement of
documents by executing a variety of word commands.
Toolbars are very helpful and convenient in quickly executing MS
WORD Page 3 of 40 commands without having to go through menus.
The standard toolbar contains icons for basic functions like opening
files, saving files, printing files, cut, copy, paste etc. Formatting
toolbar This contains icons for changing the look of your text (called
“formatting” in computer jargon); for example, there are icons for
changing fonts, styles, font sizes, text alignment etc. Ruler The Ruler
lets you make changes to margins and indents, and helps you create
document as per dimensions required. Scroll tools These helps you
travel within your document. You can go anywhere, up and down,
right and left in your document mainly by two ways: Using the
horizontal and vertical scroll bars with the help of the mouse; Or
using the keyboard to press PgUp, PgDn, Home, End and arrow
keys. Status bar Also called the Status Area, this is the normally the
last line on your screen.
This gives the following information about your work—

• Current Page
• Section Number
• Current/Total pages in the document
• Current Cursor Position (where the cursor is presently located)
• Current Line Number
• Current Column Number

• Record Macro-whether macro recording is On or not


• Track Revision-whether revisions have been made or not
• Extend Selection

• Over type mode-whether you are in Insert mode or overwrite mode


Cursor Also called the Insertion Pointer, this denotes the place where
text, graphics or any other item would be placed when you type,
overwrite or insert them. This looks like a tall, skinny toothpick and
keeps blinking so that you can locate it easily. Mouse pointer When

105
your mouse pointer looks like an I-beam you should be able to move
it freely on the screen. This is used for either placing the cursor at the
desired place (take the mouse pointer there and click) or choosing
any command either from the menu or from toolbars. The mouse
pointer changes shape when in the process of doing certain tasks
and the cursor disappears
File management
Creating a New Document

Click on File Menu


Select and click New option
Otherwise click button on the standard toolbar
Opening an Existing Document:
Click File Menu
Select and click Open option
Otherwise click button on the Standard toolbar.
Double click on the file from the open window Saving a Document
Click File Menu

Select and click Save button.


Otherwise click button o on the Standard toolbar.
Moving through the document
Open any word document.
You can move the cursor to any location on the screen by using the
arrow keys on the keyboard.

Right arrow key is used to move one position to the right of the cursor
Left arrow key is used to move one position to the left of the cursor.
Up arrow key is used to move one position to the top of the cursor.

Down arrow key is used to move one position to the down of the
cursor.
Page Up key is used to move down the screen at a time
Page down key is used to move up the screen at a time

106
Hold down Ctrl key and press Home to move to beginning of the
document.

Hold down Ctrl key and press End to move to end of the document.
You can move to any position on the screen by moving the cursor
with the mouse.

You can use scroll bars to scroll the text upward and down ward.
Closing a Document Click File menu Select and click Close button.
Otherwise click butt on menu bar Editing Word document Cut , Copy
and Paste options These options will allow you to Cut or Copy a
piece of text from one location and to paste at a new location. To do
these functions, Place the cursor at the begining of the text to be
selected. Drag the mouse pointer over the text. Click Edit menu and
then click on Cut option (or) click icon on the Standard Toolbar. Move
the cursor to the place where you want the text to be pasted. Click
Edit menu and then click Paste option (or) click icon on the Standard
Toolbar. For copying the text from one location to other location the
same procedure is to be followed. The difference between Cut and
Copy is that while using the Cut option the text will be removed from
its original location and pasted at a new location, where as when
using Copy option a copy of the selected text is pasted at new
location without disturbing the original text.
Open any document. Click Edit menu and then click Find option.
You will get a screen as shown below. In Find What text box type the
word you want to find and then click Find Next button. Continue
clicking Find Next button until you get the screen shown below. Click
OK button and then click X to close Find and Replace dialog box.
Replacing text Open any word document. Click Edit menu and then
click Replace option. You will get the dialog box as shown below and
type the word with which you want to replace. Click ReplaceAll
button once. You get the below dialog box. Click OK button and then
click X to close Find and Replace dialog box. Moving the cursor to a
specific page If your word document contains more than one page,
you can directly go to specified page by clicking Edit menu and then
clicking Go To option. You will get the dialog box . In the Enter page
number text box, type the required page number
Click Go To button. Cursor will immediately jump to page 4. Click
Close button to close Find and Replace dialog box. Formatting

107
documents Bold, Underline and Italicize the selected text Open a
word document. Block the text by first clicking at the start of the text
and holding the left mouse button and drag to the desired position
and then release the left mouse button. The selected area will be
highlighted. Move the mouse pointer to the button on the Standard
Toolbar and click once. Move the mouse pointer outside your text
and click to release the highlighting. Your text will now appear in
BOLD FACE.

Left aligning, centering , right aligning and justifying text Left Centre
Right Justify Open a word document. Block the text by first clicking
at the start of the text and holding the left mouse button and drag to
the desired position and then release the left mouse button. The
selected area will be highlighted. Move the mouse pointer to Align
Left button on the toolbar and click once. Your selected text will be
left aligned. Move the mouse pointer to Align right button on the
toolbar and click once. Your selected text will be right aligned. Move
the mouse pointer to Center button on the toolbar and click once.
Your selected text will be centered. Move the mouse pointer to
Justify button on the toolbar and click once. Your selected text will be
justified. Creating Bulleted and Numbered list If a list of items are to
be numbered automatically it can be done using Numbered List
option Ex: Microsoft Office consists of MS-Word MS-Excel MS-
PowerPoint MS-Access MS-Outlook The above text is to be selected
with mouse. Click on the Numbered List button on the toolbar Move
out of the text and click to release the highlighting.
Changing case of text You can change the selected text into either
UPPERCASE, lowercase, Title case or tOGGLE cASE Highlight the
text. Select the Format menu option Choose Change Case option.
You will get the dialog box shown below. From the list of options
select UPPERCASE to convert lower case into uppercase Type your
name and address as you would at the head of a letter, but aligned
with the left margin e.g. K.Manohar H.No 10-334/3, V.P. Nagar,
Malakpet, Hyderabad. Move the cursor to the start of each line and
press the Tab key. Just as with the right indent button, your text will
move right. How much it moves will depend on the tab settings, which
you can change in the Format, Tabs menu as shown below. Font
Controlling To get different character styles we can change Font type
Click on Format menu Select Font option.

108
You can set Font type, Font Style and Font size and Color of the
selected text. Click OK button. Note: The above options are also
available on the Formatting Toolbar Font style Font Type Font size
Color Creating column wise documents Open any word document
file. Click Format menu and click Columns option.

In the Presets tab, select Two option to get below screen. Click OK
button. Your document will be converted to two-column document.
Spelling and Grammar Checking of word document Open any word
document. Click Tools menu and then click Spelling and Grammar
option. You will get the below dialog box. Note all words that appear
red color in First box are spelling mistakes. If you want to accept the
suggested word, in the second box click on Change. If not, click
Ignore button. You can also add a word to the dictionary by clicking
on the Add button. Continue this process until you get the dialog box,
shown below: Click OK button. Save your work when the spell-
check is complete, so that the corrections are saved
Printing document Set Page Setup options Click File menu Select
and click Page Setup option. You will get the following screen. Here
you can set margins (top, bottom, right and left), paper size, paper
source and layout. Click OK button. Creating Header and footer You
can create header and footer that include text or graphics. For
example, page numbers, the date, a company logo, the document’s
title or file name, the author’s name, and so on. You can use the
same header and footer throughout a document or change the
header and footer for part of the document. For example, use a
unique header or footer on the first page, or leave the header or
footer off the first page. You can also use different headers and
footers on odd and even pages or for part of a document. The
Header and Footer tool bar is To Create header or footer Creating
different footers or headers for even and odd pages Preview
document Open any word document. Click File menu and then click
Print Preview option.

Creating Tables Tables are preferred when compared to using


spacebar or tab for alignment to give a table format, but Word has
another excellent feature for alignment called "Tables". This feature is
used to create financial reports, catalogues, accounts etc. Tables
consist of rows and columns. The text can be typed in the cells. The

109
size, shape and appearance of a cell are controllable features. You
can also convert a text to a table and a table back to text. It also
supports importing and exporting data onto a spreadsheet. To create
a table using Insert Tables Button Move the cursor to the place
where you want to insert the table Choose tables button from the
Standard Toolbar Drag the mouse to highlight the desired number of
rows and columns in the tables menu. An empty table is inserted. To
create a table using table menu Choose Insert table from Table
Menu . You will find a dialog box as shown below: Now type the
Number of Columns and rows as you require and set column width
Auto. So that the Column with will be equal to the width of the text.
Now click OK. An empty table is inserted in the document. Now
inserting rows, columns, Deleting rows and widening the columns is
very easy. Insert Rows: Place the cursor in the table, where rows are
to be inserted Choose Table and click Insert Rows option to insert
rows in the table Delete Rows: Select the Row which is to be deleted
Click Table and click Delete cells option. In the same way you can do
with columns also
Using Formulae in the table Tables can be used to prepare financial
statements. Different functions can be used to calculate Column
totals, Row totals, Average , Count, Minimum and maximum of given
values etc. To use a formula in the table Keep the mouse cursor at
the place where the value has to come Click Table menu and then
click Formula option. You can see the following dialog box. Then
click OK button If you don’t want the above function, then choose
another from Paste function drop down list. Sort the Table We can
arrange the data in the table in some order i.e. By name, By ID no,
By basic etc. To sort the table Select the table by using menu Table -
> Select table Sort the table by using menu Table -> Sort options
You will find the following dialog box: Now select the sort by field and
click OK Numbering Pages Open any word document. Click Insert
menu and then click Page Numbers option. You will get the screen
as shown below: By default the page number is placed at bottom
right corner within the page. You can change the position of the page
numbers by selecting other options like "top of the page, center" from
the Drop down List boxes. Choose the Format button to review the
other page numbering options or choose OK button to set the
changes made in the Page Numbering dialog box. Auto correct

110
AutoCorrect stores a list of common typographical errors and their
spellings. When you make an error, Word detects it and inserts the
correctly spelled version of the word. You can add words to the
AutoCorrect list, based on the mistakes you make. Look at the
AutoCorrect dialog box

Creating a Mail Merge document Following are steps involved in


creating a Mail Merge document. Create a new data source and
enter information Create the main document Insert fields into the
main document. Merge data source and main document. Creating a
new data source This file is created basically to store the information
like addresses which is to be used to merge with the main document.
Open a New word document Create a Table with following
information : First Name Last Name Add1 Add2 Add3 Bhaskar
Rambha Banjara Hills Road No.3 Hyderabad Ashok Reddy
Kukatpally Main Road Hyderabad Ravi Kumar Gandhi Nagar RTC X
Roads Hyderabad Save the file as address.doc and close. Creating
the Main Document From the Tools menu Letters and MailingMail
Merge. In the Main Document area of Mail Merge Helper window
click the Create button. Clicking on the down arrow opens the pull
down menu. Select Letters. and under Step 1 of 6, Click on Next :
Starting document as shown in the above window (step 1).
You will get 3 options to select from the following window
• Use the Current Document
• Start from a template.
• Start from Existing Document. Select the first option : Use the
current document Type the letter leaving sufficient space to place
addresses later
Now click on Write Your letter link (step 3) Then you will get following
window.

Now Select an Existing Data Source i.e. the file address.doc and
Click on Open Button.
• To add recipient information to your letter Click on More items and
insert the fields wherever required.
Large amounts of information, both public and private, are collected
across the Internet, opening users up to the risk of data breaches and

111
other security threats. Hackers and crackers can break into networks
and systems and steal information such as login information or bank
and credit card account records. Some steps that can be taken to
protect online privacy include:
 Installing antivirus and antimalware

 Creating difficult, varied passwords that are impossible to guess.


 Using a virtual private network (VPN) or, at least, a private browsing
mode, such as Google Chrome's Incognito window.

 Only using HTTPS


 Making all social media accounts private.
 Deactivating autofill.
 Turning off the device's GPS.
 Updating cookies so an alert is sent anytime a cookie is installed.
 Logging out of accounts instead of just closing the tab or window.
 Using caution with spam emails and never opening or downloading
content from unknown sources.
 Using caution when accessing public Wi-Fi or hotspots.

8.4 Ms-Excel and Ms-Access

Microsoft Excel is a spreadsheet program used to record and analyze


numerical and statistical data. Microsoft Excel provides multiple features
to perform various operations like calculations, pivot tables, graph tools,
macro programming, etc. It is compatible with multiple OS like Windows,
macOS, Android and iOS.

A Excel spreadsheet can be understood as a collection of columns and


rows that form a table. Alphabetical letters are usually assigned to
columns, and numbers are usually assigned to rows. The point where a
column and a row meet is called a cell. The address of a cell is given by
the letter representing the column and the number representing a row.
Why Should I Learn Microsoft Excel?

We all deal with numbers in one way or the other. We all have daily
expenses which we pay for from the monthly income that we earn. For
one to spend wisely, they will need to know their income vs. expenditure.

112
Microsoft Excel comes in handy when we want to record, analyze and
store such numeric data. Let’s illustrate this using the following image.

Where can I get Microsoft Excel?


There are number of ways in which you can get Microsoft Excel. You can
buy it from a hardware computer shop that also sells software. Microsoft
Excel is part of the Microsoft Office suite of programs. Alternatively, you
can download it from the Microsoft website but you will have to buy the
license key.
How to Open Microsoft Excel?
Running Excel is not different from running any other Windows program.
If you are running Windows with a GUI like (Windows XP, Vista, and 7)
follow the following steps.
 Click on start menu
 Point to all programs

 Point to Microsoft Excel


 Click on Microsoft Excel
Alternatively, you can also open it from the start menu if it has been
added there. You can also open it from the desktop shortcut if you have
created one.

113
For this tutorial, we will be working with Windows 8.1 and Microsoft Excel
2013. Follow the following steps to run Excel on Windows 8.1

 Click on start menu


 Search for Excel N.B. even before you even typing, all programs
starting with what you have typed will be listed.

 Click on Microsoft Excel


The following image shows you how to do this

Understanding the Ribbon


The ribbon provides shortcuts to commands in Excel. A command is an
action that the user performs. An example of a command is creating a
new document, printing a documenting, etc. The image below shows the
ribbon used in Excel 2013.

114
Ribbon components explained
Ribbon start button – it is used to access commands i.e. creating new
documents, saving existing work, printing, accessing the options for
customizing Excel, etc.
Ribbon tabs – the tabs are used to group similar commands together.
The home tab is used for basic commands such as formatting the data to
make it more presentable, sorting and finding specific data within the
spreadsheet.
Ribbon bar – the bars are used to group similar commands together. As
an example, the Alignment ribbon bar is used to group all the commands
that are used to align data together.
Understanding the worksheet (Rows and Columns, Sheets,
Workbooks)
A worksheet is a collection of rows and columns. When a row and a
column meet, they form a cell. Cells are used to record data. Each cell is
uniquely identified using a cell address. Columns are usually labelled with
letters while rows are usually numbers.
A workbook is a collection of worksheets. By default, a workbook has
three cells in Excel. You can delete or add more sheets to suit your
requirements. By default, the sheets are named Sheet1, Sheet2 and so
on and so forth. You can rename the sheet names to more meaningful
names i.e. Daily Expenses, Monthly Budget, etc.

Customization Microsoft Excel Environment

Personally I like the black colour, so my excel theme looks blackish. Your
favourite colour could be blue, and you too can make your theme colour
look blue-like. If you are not a programmer, you may not want to include
ribbon tabs i.e. developer. All this is made possible via customizations. In
this sub-section, we are going to look at;

115
 Customization the ribbon
 Setting the colour theme

 Settings for formulas


 Proofing settings
 Save settings
Customization of ribbon

The above image shows the default ribbon in Excel 2013. Let’s start with
customization the ribbon, suppose you do not wish to see some of the
tabs on the ribbon, or you would like to add some tabs that are missing
such as the developer tab. You can use the options window to achieve
this.
 Click on the ribbon start button
 Select options from the drop down menu. You should be able to
see an Excel Options dialog window
 Select the customize ribbon option from the left-hand side panel
as shown below

116
 On your right-hand side, remove the check marks from the tabs
that you do not wish to see on the ribbon. For this example, we
have removed Page Layout, Review, and View tab.
 Click on the “OK” button when you are done.
Your ribbon will look as follows

Adding custom tabs to the ribbon

You can also add your own tab, give it a custom name and assign
commands to it. Let’s add a tab to the ribbon with the text Guru99

117
1. Right click on the ribbon and select Customize the Ribbon. The
dialogue window shown above will appear
2. Click on new tab button as illustrated in the animated image
below
3. Select the newly created tab
4. Click on Rename button

5. Give it a name of Guru99


6. Select the New Group (Custom) under Guru99 tab as shown in
the image below

7. Click on Rename button and give it a name of My Commands


8. Let’s now add commands to my ribbon bar
9. The commands are listed on the middle panel

10. Select All chart types command and click on Add button
11. Click on OK

118
Your ribbon will look as follows

Setting the colour theme

To set the color-theme for your Excel sheet you have to go to Excel
ribbon, and click on à File àOption command. It will open a window where
you have to follow the following steps.

119
1. The general tab on the left-hand panel will be selected by default.
2. Look for colour scheme under General options for working with
Excel
3. Click on the colour scheme drop-down list and select the desired
colour

4. Click on OK button
Settings for formulas
This option allows you to define how Excel behaves when you are
working with formulas. You can use it to set options i.e. autocomplete
when entering formulas, change the cell referencing style and use
numbers for both columns and rows and other options.

If you want to activate an option, click on its check box. If you want to
deactivate an option, remove the mark from the checkbox. You can this

120
option from the Options dialogue window under formulas tab from the
left-hand side panel
Proofing settings

This option manipulates the entered text entered into excel. It allows
setting options such as the dictionary language that should be used when
checking for wrong spellings, suggestions from the dictionary, etc. You
can this option from the options dialogue window under the proofing tab
from the left-hand side panel

121
Save settings

This option allows you to define the default file format when saving
files, enable auto recovery in case your computer goes off before
you could save your work, etc. You can use this option from the
Options dialogue window under save tab from the left-hand side panel
Important Excel shortcuts

used to open the print dialogue


Ctrl + P
window
Ctrl + N creates a new workbook
Ctrl + S saves the current workbook
Ctrl + C copy contents of current select
Ctrl + V paste data from the clipboard
displays the function insert dialog
SHIFT + F3
window
SHIFT + F11 Creates a new worksheet
Check formula and cell range
F2
covered

122
Best Practices when working with Microsoft Excel

1. Save workbooks with backward compatibility in mind. If you are


not using the latest features in higher versions of Excel, you
should save your files in 2003 *.xls format for backwards
compatibility
2. Use description names for columns and worksheets in a
workbook
3. Avoid working with complex formulas with many variables.
Try to break them down into small managed results that you can
use to build on
4. Use built-in functions whenever you can instead of writing
your own formulas

Thus Ms.Excel is
 Introduction of MS Excel : Microsoft Excel is a powerful
spreadsheet program used to record, manipulate, store numeric
data and it can be customized to match your preferences
 The ribbon is used to access various commands in Excel
 The options dialogue window allows you to customize a number
of items i.e. the ribbon, formulas, proofing, save, etc.

8.4.1 Microsoft Access

Microsoft Access is a Database Management System offered by


Microsoft. It uses the Microsoft Jet Database Engine and comes as a part
of the Microsoft Office suite of application.

Microsoft Access offers the functionality of a database and the


programming capabilities to create easy to navigate screens (forms). It
helps you analyze large amounts of information, and manage data
efficiently.
Important Terms and Basic Objects

Now in this Microsoft Access tutorial, we will learn about some important
terms and basic objects in MS Access:
Database File:

It is a file which stores the entire database. The database file is saved to
your hard drive or other storage devices.

123
Datatypes:

Datatypes are the properties of each field. Every field has one datatype
like text, number, date, etc.
Table

 A Table is an object which stores data in Row & Column format to


store data.
 A Table is usually related to other tables in the database file.
 Each column must have Unique name

 We can also define Primary Key in a table.


Query

 Queries answer a question by selecting and sorting and filtering


data based on search criteria.
 Queries show a selection of data based on criteria (limitations)
you provide.
 Queries can pull from one or more related Tables and other
Queries.
 Types of Query can be SELECT, INSERT, UPDATE, DELETE.
Form
 A form is a database object that you can use to create a user
interface for a database application.
 Forms help you to display live data from the table. It mainly used
to ease the process of data entry or editing.
Report

 A report is an object in desktop databases primarily used for


formatting, calculating, printing, and summarizing selected data.
 You can even customize the report’s look and feel.
Macros

Macros are mini computer programming constructs. They allow you to set
up commands and processes in your forms, like, searching, moving to
another record, or running a formula.

124
Modules:

Modules are procedures(functions) which you can write using Visual


Basic for Applications (VBA).
Microsoft Access Data Types

MS Access common data types are listed below:


Type of
Description Size
Data
Text, including numbers which does not
Up to 255
Short Text need calculation. (e.g., Mobile
characters.
numbers).
This data type is used for lengthy text or Maximum 63, 999
Long Text
alphanumeric data. characters.
Numeric data type used for storing 1, 2, 4, 8, and 16
Number
mathematical calculations. bytes.
Store Date/time for the years 100
Date/Time 8 bytes.
through 9999.
It allows you to store currency values
Currency and numeric data with one to four 8 bytes.
decimal places.
Assign a unique number or assigned by
Four bytes (16 bytes
Auto Microsoft Access when any new record
if it is set as a
Number is created. Usually used as the primary
Replication ID).
key
Yes/No It only stores logical values Yes and No. 1 bit
It stores files, such as digital photos. Up to 2
Attachment Multiple files can be attached per GB Data can be
record. stored.
Up to 2
OLE OLE objects can store audio, video,
GB data can be
objects other Binary Large Objects.
stored.
Each part of a
Text or combinations of text and Hyperlink data type
Hyperlink numbers stored. That text is used as allows you to store a
hyperlink address. maximum 2048
characters.
You can create an
Helps you to create an expression that expression which
Calculated
uses data from one or more fields. uses data from one
or more fields.

125
Access Excel
Deals with text, numbers, files and Microsoft Excel generally deals
all kinds of data with numerical data
Lots of worksheets or documents
All the data is stored one time, in
are a store with similar, repeated
one place.
data.
Helps you to build highly functional
Only the primary data entry screen
data entry forms and report
is available.
templates.
Users will be able to enter the data Data accuracy and speed is not
more efficiently and accurately. much because of the format.

8.4.2 Differences between Access and Excel

Advantages of MS Access

Now in this MS Access Tutorial, we will learn the pros/benefits for using
MS Access application:
 Access offers a fully functional, relational database management
system in minutes.
 Easy to import data from multiple sources into Access
 You can easily customize Access according to personal and
company needs
 Microsoft Access online works well with many of the development
languages that work on Windows OS

 It is robust and flexible, and it can perform any challenging office


or industrial database tasks.
 MS-Access allows you to link to data in its existing location and
use it for viewing, updating, querying, and reporting.
 Allows you to create tables, queries, forms, and reports, and
connect with the help of Macros

 Macros in Access is a simple programming construct with which


you can use to add functionality to your database.

126
 Microsoft Access online can perform heterogeneous joins
between various data sets stored across different platforms
Disadvantages of MS Access

Here, are the cons for using MS Access


 Microsoft Access database is useful for small-to-medium business
sectors. However, it is not useful for large-sized organizations
 Lacks robustness compared to dbms systems like MS SQL
Server or Oracle

 All the information from your database is saved into one file. This
can slow down reports, queries, and forms
 Technical limit is 255 concurrent users. However, the real-world
limit is only 10 to 80 (depending on the type of application which
you are using)
 It requires a lot more learning and training compares with other
Microsoft programs
How to Start Microsoft Access

Note: We assume you have the latest Microsoft Access installed which
comes bundled with Microsoft Office 365 package.
There are two ways to Start MS Access.
1. From Windows, ‘Start’ button.
2. From Desktop, Right Click> ‘New’ option.
Now in this Microsoft Access tutorial, let’s have a look of starting MS
Access using both the ways:
Option 1) From Windows, Start button.
Step 1) Click on the ‘Windows’ icon.
You will find the list of installed programs.
Step 2) Find Access icon.
Check and click on Access Icon.
Step 3) Check the window.
MS Access Application window will appear.
Steps 4) Press ‘Esc’.

127
Result: This will open the MS Access windows application.
How to Create a Database

Before we create a Database, lets quickly understand the holistic picture


of what Database is, with particular reference to MS Access.
Let’s, start with a few real-life Microsoft Access databases example:

 We have Bookcase where Books resides,


 We have i-pods where we have a collection of music & cases are
countless.

Similarly, we have MS Access Database is a kind of home for all your


Tables, Queries, Forms, Reports, etc. in MS Access which are
interlinked.
Technically, Database store the data in a well-organized manner for easy
access and retrieval.
There are two ways to create Database in SQL Access:
1. Create Database from Template
2. Create a Blank Database
Let’s go into the detail of each:
Create Database from Template
 There are many situations where we need to start with some
readymade database template for given requirements.
 MS Access provides many ready to use templates for such types
of databases requirements where the data structure is already
defined.

 You can keep customizing the template structure further as per


our requirement.
 MS Access Databases example includes Contacts, Student, Time
tracking, etc.
Steps to create Database from Template
Step 1) With MS Access application open, Click on File.
Result: The below window will appear. All the Database templates are
displayed below.

128
Datasheet View:

Displays in the view, which allows you to enter raw data into your
database table.
Design view:

Displays the view, which allows you to enter fields, data types, and
descriptions into your database table.
Forms in MS Access

 A form is a database object that you can use to create a user


interface for a database application.
 It mainly used to ease the process of data entry or editing.
 Data in a form can be selected from one or more tables.
 Forms can also be used to control access to data, like which
fields or rows of data are visible to which users.
 Forms have a Form View.
 Help you to display live data with easy creation of new data.
To understand form lets first create two new Record in Contact Table
(from the prebuilt Contact Database discussed here)
Step 1) Select the ‘Contact’ table from Left Navigation.
Step 2) Create two rows by entering some relevant data in two rows.
create Form, and then we will see how forms can be leverage for easy
display, editing, and creation of new data.
How to Create a form
There are four primary ways to create the form as mentioned below:

 Form Wizard
 Form
 Multiple Item

 Split Form
Let’s have a look at each option to create the form, one by one:

129
1. Create using Form Wizard

This option allows the user to create the form with the wizard and select
the column from the available list of column form in legacy Select window
format.
Step 1) Click on ‘Form Wizard.’

Step 2) System will display below the screen.


Step 3) Select the columns which you want to be there in final form.
Step 4) Keep selecting all required column as explained in Step 3 above
and then click ‘Next.’
Step 5) Layout selection box will appear which allows the user to select
the different type of form layout. Click ‘NEXT’
 Microsoft Access is a Database Management System offered by
Microsoft.
 Allows you to create tables, queries, forms, and reports, and
connect with the help of Macros
 MS-Access will enable you to link to data in its existing location
and use it for viewing, updating, querying, and reporting.
 Access consists of four main database objects: Tables,
Queries, Forms, and Reports.
 There are two ways to create Database in SQL Access:

 Create Database from Template


 Create a Blank Database
 There are two ways to create Database in MS Access
 Create a Table from Design View
 Create a Table from Datasheet View
 You can switch between the datasheet and the design view by
just clicking the ‘View’ button in the top-left hand corner of the
Access program.
 A form can be created using Form Wizard, Form, Multiple Item,
Split Form

130
 Macro in MS Access database is a time-saving feature that allows
you to add functionality or automate simple tasks.

 A report is an object in MS Access that is designed for formatting,


calculating and printing selected data in an organized way.
 A Module is a collection of user-defined functions, declarations,
statements, and procedures that are stored together as a unit.

8.5 An introduction to Ms-Power Point

 The program was created in a software company named


Forethought, Inc. by Robert Gaskins and Dennis Austin.
 It was released on April 20, 1987, and after 3 months of its
creation, it was acquired by Microsoft.
 The first version of this program, when introduced by Microsoft
was MS PowerPoint 2.0 (1990).
 It is a presentation-based program that uses graphics, videos, etc.
to make a presentation more interactive and interesting.
 The file extension of a saved Powerpoint presentation is “.ppt”.
 A PowerPoint presentation comprising slides and other features is
also known as PPT.

8.5.1 Features of MS PowerPoint

There are multiple features that are available in MS PowerPoint which


can customise and optimise a presentation. The same have been
discussed below.
 Slide Layout

Multiple options and layouts are available based on which a presentation


can be created. This option is available under the “Home” section and
one can select from the multiple layout options provided.

The image below shows the different slide layout options which are
available for use:
 Insert – Clipart, Video, Audio, etc.

Under the “Insert” category, multiple options are available where one can
choose what feature they want to insert in their presentation. This may
include images, audio, video, header, footer, symbols, shapes, etc.

131
 Slide Design

MS PowerPoint has various themes using which background colour and


designs or textures can be added to a slide. This makes the presentation
more colourful and attracts the attention of the people looking at it.
This feature can be added using the “Design” category mentioned on the
homepage of MS PowerPoint. Although there are existing design
templates available, in case someone wants to add some new texture or
colour, the option to customise the design is also available.
 Animations

During the slide show, the slides appear on the screen one after the
other. In case, one wants to add some animations to the way in which a
slide presents itself, they can refer to the “Animations” category.
There are different animation styles available on PowerPoint
Font size, font style, font colour, word art, date and time, etc. can also be
added to a PPT.

8.5.2 Uses of PowerPoint Presentation

PowerPoint presentations are useful for both personal and professional


usage. Given below are a few of the major fields where PPT is extremely
useful:
 Education – With e-learning and smart classes being chosen as
a common mode of education today, PowerPoint presentations
can help in making education more interactive and attract
students towards the modified version of studying
 Marketing – In the field of marketing, PowerPoint presentations
can be extremely important. Using graphs and charts, numbers
can be shown more evidently and clearly which may be ignored
by the viewer if being read
 Business – To invite investors or to show the increase or
decrease in profits, MS PowerPoint can be used
 Creating Resumes – Digital resumes can be formed using MS
PowerPoint. Different patterns, photograph, etc. can be added to
the resume

132
 Depicting Growth – Since both graphics and text can be added
in a presentation, depicting the growth of a company, business,
student’s marks, etc. is easier using PPT

Let Us Sum Up

From this unit we have come across the computer software and also
with its advantages and Disadvantages about the Ms.Power Point,
Ms.access ,Ms.Excel and Ms.Word.

Check Your Progress

1. Can we set the Page border in Ms.Excel?


2. We can move the sheet from one workbook into new book by
3. _______ is the shortcut key is used to replace a data with another in
sheet.
4. The size of yes/no field is always ________
5. The columns in a microsoft access table are also called _______.
6. ______ is the extension of Ms.Access
7. ______field type will you select if you need to enter long text in that
field

8. What is a PowerPoint presentation or PPT?

Glossaries

 Accelerator key: Any combination of keys that are pressed


simultaneously to run a command.
 Word Wrap: the movement of text to the next line when typing
goes beyond the right margin.
 Section Break: a section of the document that can be formatted
differently to other parts of the document
 File allocation table (FAT): A data structure that the operating
system creates when a volume is formatted by using FAT
 OLE object: An object that supports the Object Linking and
Embedding (OLE) protocol.

133
 Web Layout view: A view of a document as it might appear in a
web browser. For example, the document appears as only one
page, without page breaks.

Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/

 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

 https://www.geeksforgeeks.org

Answers to Check Your Progress

1. No
2. From Edit menu choose Move or Copy then select (new book)
from To Book list and click OK
3. Ctrl + H is the shortcut key is usedto replace a data with another
in sheet.
4. Bit
5. Fields

6. .mdb
7. Memo
8. A combination of various slides depicting a graphical and visual
interpretation of data, to present information in a more creative
and interactive manner is called a PowerPoint presentation or
PPT.

134
BLOCK 5
APPLICATIONS

Unit-9 WEB MAPPING

Unit-10 MOBILE APPLICATIONS

135
Unit-9
WEB MAPPING
Overview
Learning objectives
9.1 Introduction to Web Mapping
9.1.1 Types of Web Mapping
9.1.2 Web GIS Cloud
 9.1.3 Evolving paper cartography
9.2 Technologies
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the Ninth unit of our concepts. It will introduce you to Web
Mapping Applications.

Learning Objectives

By the end of this unit, you should be able to


 Understand the web Mapping and its types
 Idea about the Technologies
 Get the knowledge of GIS in cloud

9.1 Introduction to Web Mapping

Web mapping or an online mapping is the process of using


the maps delivered by geographic information systems (GIS) on
the Internet, more specifically in the World Wide Web (WWW). A web
map or an online map is both served and consumed, thus web mapping
is more than just web cartography, it is a service by which consumers
may choose what the map will show.[1] Web GIS
emphasizes geodata processing aspects more involved with design
aspects such as data acquisition and server software architecture such

136
as data storage and algorithms, than it does the end-user reports
themselves.

The terms web GIS and web mapping remain somewhat synonymous.
Web GIS uses web maps, and end users who are web mapping are
gaining analytical capabilities. The term location-based services refers
to web mapping consumer goods and services.[3] Web mapping usually
involves a web browser or other user agent capable of client-server
interactions. Questions of quality, usability, social benefits, and legal
constraints are driving its evolution.
The advent of web mapping can be regarded as a major new trend in
cartography. Until recently cartography was restricted to a
few companies, institutes and mapping agencies, requiring relatively
expensive and complex hardware and software as well as skilled
cartographers and geomatics engineers.
Web mapping has brought many geographical datasets, including free
ones generated by OpenStreetMap and proprietary datasets owned
by HERE, Huawei, Google, Tencent, TomTom, and others. A range
of free software to generate maps has also been conceived and
implemented alongside proprietary tools like ArcGIS. As a result,
the barrier to entry for serving maps on the web has been lowered.

9.1.1 Types of Web Mapping

A first classification of web maps has been made by Kraak in 2001. He


distinguished static and dynamic web maps and further
distinguished interactive and view only web maps. Today there an
increased number of dynamic web maps types, and static web map
sources.
Analytical web maps

Analytical web maps offer GIS analysis. The geodata can be a static
provision, or need updates. The borderline between analytical web maps
and web GIS is fuzzy. Parts of the analysis can be carried out by the GIS
geodata server. As web clients gain capabilities processing is distributed.
Animated and realtime

Realtime maps show the situation of a phenomenon in close


to realtime (only a few seconds or minutes delay). They are usually

137
animated. Data is collected by sensors and the maps are generated or
updated at regular intervals or on demand.

Animated maps show changes in the map over time by animating one of
the graphical or temporal variables. Technologies enabling client-side
display of animated web maps include scalable vector graphics (SVG),
Adobe Flash, Java, QuickTime, and others. Web maps with real-time
animation include weather maps, traffic congestion maps and vehicle
monitoring systems.

CartoDB launched an open source library, Torque, which enables the


creation of dynamic animated maps with millions of records. Twitter uses
this technology to create maps to reflect how users reacted to news and
events worldwide.
Collaborative web maps

Collaborative maps are a developing potential.[10] In proprietary or open


source collaborative software, users collaborate to create and improve
the web mapping experience. Some collaborative web mapping projects
are:
 Google Map Maker
 Here Map Creator
 OpenStreetMap
 WikiMapia
 meta:Maps - a survey of Wikimedia movement web mapping
proposals
Online atlases

The traditional atlas goes through a remarkably large transition when


hosted on the web. Atlases can cease their printed editions or offer
printing on demand. Some atlases also offer raw data downloads of the
underlying geospatial data sources.
Static web maps

Static web pages are view only without animation or interactivity. These
files are created once, often manually, and infrequently updated.
Typical graphics formats for static web maps are PNG, JPEG, GIF,
or TIFF (e.g., drg) for raster files, SVG, PDF or SWF for vector files.
These include scanned paper maps not designed as screen maps. Paper

138
maps have a much higher resolution and information density than
typical computer displays of the same physical size, and might be
unreadable when displayed on screens at the wrong resolution.

9.1.2 Web GIS Cloud

All software provides the directions and data computers need to


work and meet users' needs. Web GIS in the cloud.

Various companies now offer web mapping as a cloud based software as


a service. These service providers allow users to create and share maps
by uploading data to their servers (cloud storage). The maps are created
either by using an in browser editor or writing scripts that leverage the
service providers API's.

9.1.3 Evolving paper cartography

Compared to traditional techniques, mapping software has many


advantages. The disadvantages are also stated.
 Web maps can easily deliver up to date information. If maps are
generated automatically from databases, they can display information
in almost realtime. They don't need to be printed, mastered and
distributed. Examples:
o A map displaying election results, as soon as the election results
become available.
o A traffic congestion map using traffic data collected by sensor
networks.
o A map showing the current locations of mass transit vehicles
such as buses or trains, allowing patrons to minimize their waiting
time at stops or stations, or be aware of delays in service.
o Weather maps, such as NEXRAD.

 Software and hardware infrastructure for web maps is cheap. Web


server hardware is cheaply available and many open source tools
exist for producing web maps. Geodata, on the other hand, is not;
satellites and fleets of automobiles use expensive equipment to
collect the information on an ongoing basis. Perhaps owing to this,
many people are still reluctant to publish geodata, especially in
places where geodata are expensive. They fear copyright

139
infringements by other people using their data without proper
requests for permission.

 Product updates can easily be distributed. Because web maps


distribute both logic and data with each request or loading, product
updates can happen every time the web user reloads the application.
In traditional cartography, when dealing with printed maps or
interactive maps distributed on offline media (CD, DVD, etc.), a map
update takes serious efforts, triggering a reprint or remastering as
well as a redistribution of the media. With web maps, data and
product updates are easier, cheaper, and faster, and occur more
often. Perhaps owing to this, many web maps are of poor quality,
both in symbolization, content and data accuracy.
 Web maps can combine distributed data sources. Using open
standards and documented APIs one can integrate (mash up)
different data sources, if the projection system, map scale and data
quality match. The use of centralized data sources removes the
burden for individual organizations to maintain copies of the same
data sets. The downside is that one has to rely on and trust the
external data sources. In addition, with detailed information available
and the combination of distributed data sources, it is possible to find
out and combine a lot of private and personal information of
individual persons. Properties and estates of individuals are now
accessible through high resolution aerial and satellite images
throughout the world to anyone.
 Web maps allow for personalization. By using user profiles, personal
filters and personal styling and symbolization, users can configure
and design their own maps, if the web mapping systems supports
personalization. Accessibility issues can be treated in the same way.
If users can store their favourite colors and patterns they can avoid
color combinations they can't easily distinguish (e.g. due to color
blindness). Despite this, as with paper, web maps have the problem
of limited screen space, but more so. This is in particular a problem
for mobile web maps; the equipment carried usually has a very small
screen, making it less likely that there is room for personalisation.
 Web maps enable collaborative mapping similar to web mapping
technologies such as DHTML/Ajax, SVG, Java, Adobe Flash, etc.
enable distributed data acquisition and collaborative efforts.

140
Examples for such projects are the OpenStreetMap project or
the Google Earth community. As with other open projects, quality
assurance is very important, however, and the reliability of the
internet and web server infrastructure is not yet good enough.
Especially if a web map relies on external, distributed data sources,
the original author often cannot guarantee the availability of the
information.
 Web maps support hyperlinking to other information on the web. Just
like any other web page or a wiki, web maps can act like an index to
other information on the web. Any sensitive area in a map, a label
text, etc. can provide hyperlinks to additional information. As an
example a map showing public transport options can directly link to
the corresponding section in the online train time table. However,
development of web maps is complicated enough as it is: Despite the
increasing availability of free and commercial tools to create web
mapping and web GIS applications, it is still a more complex task to
create interactive web maps than to typeset and print images. Many
technologies, modules, services and data sources have to be
mastered and integrated The development and debugging
environments of a conglomerate of different web technologies is still
awkward and uncomfortable.

9.2 Technologies

Web mapping technologies require both server-side and client-side


applications. The following is a list of technologies utilized in web
mapping.
 Spatial databases are usually object relational databases enhanced
with geographic data types, methods and properties. They are
necessary whenever a web mapping application has to deal with
dynamic data (that changes frequently) or with huge amount of
geographic data. Spatial databases allow spatial queries, sub
selects, reprojections, and geometry manipulations and offer various
import and export formats. PostGIS is a prominent example; it is
open source. MySQL also implements some spatial features. Oracle
Spatial, Microsoft SQL Server (with the spatial extensions), and IBM
DB2 are the commercial alternatives. The Open Geospacial
Consortium's (OGC) specification "Simple Features" is a standard

141
geometry data model and operator set for spatial databases. Part 2
of the specification defines an implementation using SQL.

 Tiled web maps display rendered maps made up of raster image


"tiles".
 Vector tiles are also becoming more popular—Google and Apple
have both transitioned to vector tiles. Mapbox.com also offers vector
tiles. This new style of web mapping is resolution independent, and
also has the advantage of dynamically showing and hiding features
depending on the interaction.
 WMS servers generate maps using parameters for user options
such as the order of the layers, the styling and symbolization, the
extent of the data, the data format, the projection, etc. The OGC
standardized these options. Another WMS server standard is the Tile
Map Service. Standard image formats include PNG, JPEG, GIF
and SVG.

Let Us Sum Up

From this unit we have come across the technologies in Web Mapping
and its Types with its advantages and Disadvantages .

Check Your Progress


1. Why were cookies designed?
2. The latest HTML standard is______.
3. _______ variables are used in Java script Programs
4.________ attribute is used for merging two or more adjacent columns.
5. Simple network management protocol uses _______ port number
6. ______ can read and render HTML web pages
7. ______is used to transmit inform

Glossaries

 Accelerator key: Any combination of keys that are pressed


simultaneously to run a command.
 Word Wrap: the movement of text to the next line when typing
goes beyond the right margin.
 Section Break: a section of the document that can be formatted
differently to other parts of the document

142
 File allocation table (FAT): A data structure that the operating
system creates when a volume is formatted by using FAT
 OLE object: An object that supports the Object Linking and
Embedding (OLE) protocol.
 Web Layout view: A view of a document as it might appear in a
web browser. For example, the document appears as only one
page, without page breaks.

Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://benchpartner.com/anatomy-of-a-digital-computer
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
 https://www.geeksforgeeks.org

Answers to Check Your Progress

1.For Server side Programming


2.HTML 5.0
3.Storing Numbers,dates,other Values

4. COLSPAN
5. 161
6. Web Browser
7. HTTP

143
Unit-10
Mobile Applications
Overview
Learning objectives
10.1 Introduction to Mobile
10.1.1 Types
10.1.2 Android Application
10.1.3 Android Development Tools
10.2 Installing Virtual Machine for Android Jelly bean
10.3 User Interface Architecture
10.3.1 Design of User Interface
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress

Overview

This is the Tenth unit of our concepts. It will introduce you to Mobile
Applications.

Learning Objectives

By the end of this unit, you should be able to

 Understand the Mobile Application and


 Idea about the Technologies like Android with its tools
 Get the knowledge of virtual Machine.

10.1 Introduction to Mobile

A mobile application, most commonly referred to as an app, is a type of


application software designed to run on a mobile device, such as a
smartphone or tablet computer. Mobile applications frequently serve to
provide users with similar services to those accessed on PCs. Apps are
generally small, individual software units with limited function. This use of

144
app software was originally popularized by Apple Inc. and its App Store,
which offers thousands of applications for the iPhone, iPad and iPod
Touch.
A mobile application also may be known as an app, web app, online app,
iPhone app or smartphone app.

Mobile applications are a move away from the integrated software


systems generally found on PCs. Instead, each app provides limited and
isolated functionality such as a game, calculator or mobile web browsing.
Although applications may have avoided multitasking because of the
limited hardware resources of the early mobile devices, their specificity is
now part of their desirability because they allow consumers to hand-pick
what their devices are able to do.
The simplest mobile apps take PC-based applications and port them to a
mobile device. As mobile apps become more robust, this technique is
somewhat lacking. A more sophisticated approach involves developing
specifically for the mobile environment, taking advantage of both its
limitations and advantages. For example, apps that use location-based
features are inherently built from the ground up with an eye to mobile
given that the user is not tied to a location, as on PC.
Apps are divided into two broad categories: native apps and web apps.
Native apps are built for a specific mobile operating system, usually iOS
or Android. Native apps enjoy better performance and a more finely-
tuned user interface (UI), and usually need to pass a much stricter
development and quality assurance process before they are released.
Web apps are used in HTML5 or CSS and require minimum device
memory since they’re run through a browser. The user is redirected on a
specific web page, and all information is saved on a server-based
database. Web apps require a stable connection to be used.
There are several types of apps currently available.
 Gaming apps: The equivalent of computer video games, they are
among the most popular types of apps. They account for one-third
of all app downloads and three-fourths of all consumer spending.

145
 Productivity apps: These focus on improving business efficiency
by easing various tasks such as sending emails, tracking work
progress, booking hotels, and much more.
 Lifestyle and entertainment apps: Increasingly popular, these
encompass many aspects of personal lifestyle and socialization
such as dating, communicating on social media, as well as
sharing (and watching) videos. Some of the most widely known
apps such as Netflix, Facebook or TikTok fall into this category.

Other app types include mobile commerce (M-commerce) apps used to


purchase goods online such as Amazon or eBay, travel apps that help a
traveler in many ways (booking tours and tickets, finding their way
through maps and geolocation, travel diaries, etc.), and utility apps such
as health apps and barcode scanners.
Most mobile devices are sold with several apps bundled as pre-installed
software, such as a web browser, email client, calendar, mapping
program, and an app for buying music, other media, or more apps. Some
pre-installed apps can be removed by an ordinary uninstall process, thus
leaving more storage space for desired ones. Where the software does
not allow this, some devices can be rooted to eliminate the undesired
apps.

Apps that are not preinstalled are usually available through distribution
platforms called app stores. These may operated by the owner of the
device's mobile operating system, such as the App Store (iOS) or Google
Play Store; by the device manufacturers, such as the Galaxy
Store and Huawei AppGallery; or by third parties, such as the Amazon
Appstore and F-Droid.

Usually, they are downloaded from the platform to a target device, but
sometimes they can be downloaded to laptops or desktop computers.
Apps can also be installed manually, for example by running an Android
application package on Android devices.
Some apps are freeware, while others have a price, which can be upfront
or a subscription. Some apps also include micro transactions
and/or advertising. In any case, the revenue is usually split between the
application's creator and the app store.[3] The same app can, therefore,
cost a different price depending on the mobile platform.

146
Mobile apps were originally offered for general productivity and
information retrieval, including email, calendar, contacts, the stock market
and weather information. However, public demand and the availability of
developer tools drove rapid expansion into other categories, such as
those handled by desktop application software packages. As with other
software, the explosion in number and variety of apps made discovery a
challenge, which in turn led to the creation of a wide range of review,
recommendation, and curation sources, including blogs, magazines, and
dedicated online app-discovery services. In 2014 government regulatory
agencies began trying to regulate and curate apps, particularly medical
apps.[4] Some companies offer apps as an alternative method to
deliver content with certain advantages over an official website.

10.1.1 Types

Mobile applications may be classified by numerous methods. A common


scheme is to distinguish native, web-based, and hybrid apps.
Native app

All apps targeted toward a particular mobile platform are known as native
apps. Therefore, an app intended for Apple device does not run
in Android devices. As a result, most businesses develop apps for
multiple platforms.
While developing native apps, professionals incorporate best-in-class
user interface modules. This accounts for better performance,
consistency and good user experience. Users also benefit from wider
access to application programming interfaces and make limitless use of
all apps from the particular device. Further, they also switch over from
one app to another effortlessly.
The main purpose for creating such apps is to ensure best performance
for a specific mobile operating system.
Web-based app

A web-based app is implemented with the standard web technologies


of HTML, CSS, and JavaScript. Internet access is typically required for
proper behavior or being able to use all features compared
to offline usage. Most, if not all, user data is stored in the cloud.

147
The performance of these apps is similar to a web application running in
a browser, which can be noticeably slower than the equivalent native
app. It also may not have the same level of features as the native app.
Hybrid app

The concept of the hybrid app is a mix of native and web-based apps.
Apps developed using Apache Cordova, Flutter, Xamarin, React
Native, Sencha Touch, and other frameworks fall into this category.
These are made to support web and native technologies across multiple
platforms. Moreover, these apps are easier and faster to develop. It
involves use of single codebase which works in multiple mobile operating
systems.

Despite such advantages, hybrid apps exhibit lower performance. Often,


apps fail to bear the same look-and-feel in different mobile operating
systems.

10.1.2 Android Application

Android applications are organized as a collection of components. There


are four types of components, and applications can be composed of one
or more of each type. A dynamic instance of a component corresponds to
an application subset that can be executed independently of the others.
So, in many ways, an Android application can be thought of as a
collection of interacting components.
Android application components come in four flavors:
 Activities. User-facing components that implement display
and input capture.
 Services. Background components that operate independent
of any user-visible activity.
 Broadcast receivers. A component that listens for and
responds to system-wide broadcast announcements.
 Content providers. Components that make application data
accessible to external applications and system components.

We elaborate on each of these below.


Activities. An activity component implements interactions with the user.
Activities are typically designed to manage a single type of user acion,

148
and multiple activities are used together to provide a complete user
interaction.

For example, a mapping application may consist of two activities: one


that presents to the user a list of locations to map, and one to display a
map graphic that includes the chosen location. An activity includes a
default window for drawing visual elements. An activity will use one or
more view objects, which are organized hierarchically, to draw or capture
user input. Views can be thought of as widgets, or user-interface objects,
such as check boxes, images, and lists that are common to all types of
GUI-based development environments. The Android SDK includes a
number of views for developer use.
Services. Long-running or background components that do not directly
interact with the user are expressed as service components. For
example, I/O operations that are initiated by an activity may not complete
before the user-facing activity disappears. In this instance, a service
component can be used to carry out the I/O task, independent of the
lifetime of the UI elements that initiated it. Services define and expose
their own interfaces, which other components bind to in order to make
use of the service. As is common with UI elements in GUI environments,
services typically launch their own threads in order to allow the main
application process thread to make progress and schedule threads
associated with other components.
Broadcast receivers. As previously discussed, system-wide broadcast
events can be generated by the system software or by applications.
Components that listen to these broadcasts on behalf of applications
are broadcast receivers. An application can include multiple broadcast
receivers listening for announcements. In response, a broadcast receiver
can initiate another component, such as an activity, to interact with the
user or use the system-wide notification manager.
Content providers. Components that provide access to an application’s
data are content providers. Base classes are provided in the Android
SDK for both the content provider (that is, the content provider
component must extend the base class) and the component seeking
access. The content provider is free to store the data in whatever back-
end representation it chooses, be it the file system, the SQLite service, or
some application-specific representation (including those implemented
via remote web services).

149
Android applications consist of combinations of these component type
instances. The invocation of components is managed through a system-
wide broadcast mechanism based on intents.

10.1.3

All software provides the directions and data computers need to


work and meet users' needs. Web GIS in the cloud.

Various companies now offer web mapping as a cloud based software as


a service. These service providers allow users to create and share maps
by uploading data to their servers (cloud storage). The maps are created
either by using an in browser editor or writing scripts that leverage the
service providers API's.

10.1.3 Android Development Tools

Android continues to be the most used operating system worldwide. And


that means Android apps are extremely popular. Most companies who
build mobile apps, create apps for multiple devices – both Android
devices and iOS devices. To build an excellent Android app you need to
use the best tools. Here’s out top picks when it comes to Android
development tools:
1. Android Studio

There’s no talking about android app development without the Android


Studio. It’s the most basic tool for Android developers. Created by
Google in 2013, it has pretty much become the standard software for
Android Developers. It’s a great tool because it has the support of Google
as well as a large community of developers.
2. Android Debug Bridge (ADB)
Android Debug Bridge is included in Android Studio and it’s basically a
line of communication between Android devices and other computers that
developers use for QA and testing purposes. Android Developers can
connect their Android device to their computer and make necessary
changes to both devices at the same time.
3. Android Virtual Device (AVD) Manager

Another great feature of Android Studio is the AVD. This is an emulator


that will run your Android app on your computer so that you have a better

150
inside into what your code looks like. It’s great for actually seeing the
work you’ve done and making any adjustments as needed.
4. Eclipse

Next up on the list we have Eclipse. Before Android Studio came around,
Eclipse was the main tool for Android development. As of right now,
Google doesn’t support this software but some developers still use it to
build Android apps as well as other apps. Eclipse is still a pretty useful
tool, especially for developing cross-platform applications, and it supports
a variety of programming languages.
5. Fabric
Up next we have Fabric. Many big companies have used it while
developing their mobile apps, for example Twitter, Uber and Spotify. That
in of itself is a big test for a tool like this. Google actually purchased
Fabric from Twitter in January 2017. The platform offers several kits for
developers to use during testing as well as kits for marketing and
advertising. Those components make it really easy to ensure your
application is user-friendly and fits into the target market.
6. FlowUp

When working on any web or mobile project, performance is always key.


And FlowUp is a perfect tool for developers to check the performance of
their Android app or any other app as well. It’s a SaaS (Software as a
Service) solution that you can use based on a monthly subscription. The
system shows you a nice, organized dashboard of all the key metrics for
your application like CPU, bandwidth, disk usage etc.
7. GameMaker: Studio
GameMaker: Studio is a great option for people coding their first Android
game. If you’re just starting out with Java and Android and want to learn
how to create a game, this is the perfect option. The platform provides
you with everything you need to create a 2D game with very little
programming and code. It also has a drag-and-drop interface that makes
it very easy for beginner developers to start their Android development
journey.
8. Genymotion

Genymotion is an emulator that lets you view more than 3000 different
device scenarios so that you can test your app in many different

151
environments. Besides Android and Java, this tool also supports other
programming languages and operating systems.
9. Instabug

The next tool on the list is a great testing and bug reporting system.
Companies like Yahoo, BuzzFeed, Lyft and PayPal use it in their
development process. It enables each developer to document bugs, add
screen shots and share this with other developers on the team to keep a
log of all the bugs.
10. Visual Studio With Xamarin

To end this list we have another classic tool, already known to most
people. Visual Studio is Microsoft’s original development environment.
You can use almost any programming language with it and use it to make
native Android, iOS and Windows apps when you combine it with
Xamarin.

10.2 Installing Virtual Machine for Android Jelly bean

 Step 1: Install and open Virtualbox .

152
 Step 2: Click on new and enter a name and the operating system
details for the virtual machine . Select type as Linux and version
as other and click next .

 Step 3: Enter the amount of ram you would like to allot for the
virtual machine and click next . Android 4.3 requires at least 1Gb
of ram but its not necessary .

153
 Step 4: In the next window select “ Create a virtual hard disk “
and then select VDI .

154
 Step 5: In the next window , According to your space requirement
you can either select dynamically allocated or fixed size for your
storage space . i selected fixed size because i want to allocate
only 8Gb of storage space to android . in the next dialog box set
the storage space for android according to your requirement .

155
 Step 6: Your virtual machine is now set . all you need to do is add
the location of the Android 4.3 image file . Click on the settings
button in virtualbox . Under the settings navigate to storage ,
below the storage tree select empty and click on the disk image
and select “ choose a virtual CD/DVD disk file “ and select the
android 4.3 image . Check the Live CD/DVD box and click ok .

156
 Step 7: Double click on your virtual machine to start it and click
OK for all the dialog boxes . Select Install Android-X86 to hard
disk and click OK for all the dialog boxes .

157
 Step 8: in the next window you have to create a partition for
installing Android . The new partition will not mess up anything
with your windows computer . From now onwards you have to use
your up , down , left and right keys on your keyboard to Select
“create/modify partitions “ and click OK .

158
 Step 9: In the next windows select new > primary and then
specify the size of the new partition .

 Step 10: Your new partition has been created . Select write and
press enter and type “yes “ and press enter again when prompted
. In the next window select quit and press enter .

159
 Step 11 : In the next window select the Sda1 and press enter .
select the et3 file system and press enter . When prompted to
install grub loader select yes . Select now when prompted to
make your system directory as read-write .

160
161
 Step 12: Now android 4.3 is successfully installed on your virtual
machine . select Run Android 4.3 and press enter . click OK for
any other dialog boxes that appear . You will now see the android
loading screen .

 Step 13: Select your language and enter , now fill in the Gmail
details and all the details that are asked .

162
 Step 14: Now We have successfully installed Android 4.3 on your
windows computer .

163
164
10.3 User Interface Architecture

User interface is the first impression of a software system from the user’s
point of view. Therefore any software system must satisfy the
requirement of user. UI mainly performs two functions −
 Accepting the user’s input

 Displaying the output


User interface plays a crucial role in any software system. It is possibly
the only visible aspect of a software system as −

 Users will initially see the architecture of software system’s


external user interface without considering its internal architecture.
 A good user interface must attract the user to use the software
system without mistakes. It should help the user to understand the
software system easily without misleading information. A bad UI
may cause market failure against the competition of software
system.
 UI has its syntax and semantics. The syntax comprises
component types such as textual, icon, button etc. and usability
summarizes the semantics of UI. The quality of UI is characterized
by its look and feel (syntax) and its usability (semantics).
 There are basically two major kinds of user interface − a) Textual
b) Graphical.
 Software in different domains may require different style of its user
interface for e.g. calculator need only a small area for displaying
numeric numbers, but a big area for commands, A web page
needs forms, links, tabs, etc.
Graphical User Interface

A graphical user interface is the most common type of user interface


available today. It is a very user friendly because it makes use of
pictures, graphics, and icons - hence why it is called 'graphical'.
It is also known as a WIMP interface because it makes use of −
 Windows − A rectangular area on the screen where the
commonly used applications run.

165
 Icons − A picture or symbol which is used to represent a software
application or hardware device.
 Menus − A list of options from which the user can choose what
they require.
 Pointers − A symbol such as an arrow which moves around the
screen as user moves the mouse. It helps user to select objects.

10.3.1 Design of User Interface

It starts with task analysis which understands the user’s primary tasks
and problem domain. It should be designed in terms of User’s
terminology and outset of user’s job rather than programmer’s.
 To perform user interface analysis, the practitioner needs to study
and understand four elements −
o The users who will interact with the system through the
interface
o The tasks that end users must perform to do their work
o The content that is presented as part of the interface
o The work environment in which these tasks will be
conducted
 Proper or good UI design works from the user’s capabilities and
limitations not the machines. While designing the UI, knowledge of
the nature of the user's work and environment is also critical.
 The task to be performed can then be divided which are assigned
to the user or machine, based on knowledge of the capabilities
and limitations of each. The design of a user interface is often
divided into four different levels −
o The conceptual level − It describes the basic entities
considering the user's view of the system and the actions
possible upon them.
o The semantic level − It describes the functions performed
by the system i.e. description of the functional requirements
of the system, but does not address how the user will
invoke the functions.

166
o The syntactic level − It describes the sequences of inputs
and outputs required to invoke the functions described.
o The lexical level − It determines how the inputs and
outputs are actually formed from primitive hardware
operations.

 User interface design is an iterative process, where all the iteration


explains and refines the information developed in the preceding
steps. General steps for user interface design

o Defines user interface objects and actions (operations).


o Defines events (user actions) that will cause the state of
the user interface to change.
o Indicates how the user interprets the state of the system
from information provided through the interface.
o Describe each interface state as it will actually look to the
end user.
User Interface Development Process
Interface analysis

It concentrates or focuses on users, tasks, content, and work


environment who will interact with the system. Defines the human - and
computer-oriented tasks that are required to achieve system function.
Interface design
It defines a set of interface objects, actions, and their screen
representations that enable a user to perform all defined tasks in a
manner that meets every usability objective defined for the system.
Interface construction
It starts with a prototype that enables usage scenarios to be evaluated
and continues with development tools to complete the construction.
Interface validation
It focuses on the ability of the interface to implement every user task
correctly, accommodate all task variations, to achieve all general user
requirements, and the degree to which the interface is easy to use and
easy to learn.

167
User Interface Models

When a user interface is analyzed and designed following four models


are used −
User profile model

 Created by a user or software engineer, which establishes the


profile of the end-users of the system based on age, gender,
physical abilities, education, motivation, goals, and personality.
 Considers syntactic and semantic knowledge of the user and
classifies users as novices, knowledgeable intermittent, and
knowledgeable frequent users.
Design model

 Created by a software engineer which incorporates data,


architectural, interface, and procedural representations of the
software.
 Derived from the analysis model of the requirements and
controlled by the information in the requirements specification
which helps in defining the user of the system.
Implementation model

 Created by the software implementers who work on look and feel


of the interface combined with all supporting information (books,
videos, help files) that describes system syntax and semantics.
 Serves as a translation of the design model and attempts to agree
with the user's mental model so that users then feel comfortable
with the software and use it effectively.
User's mental model
 Created by the user when interacting with the application. It
contains the image of the system that users carry in their heads.
 Often called the user's system perception and correctness of the
description depends upon the user’s profile and overall familiarity
with the software in the application domain.

168
Design Considerations of User Interface
User centered

A user interface must be a user-centered product which involves users


throughout a product’s development lifecycle. The prototype of a user
interface should be available to users and feedback from users, should
be incorporated into the final product.
Simple and Intuitive
UI provides simplicity and intuitiveness so that it can be used quickly and
effectively without instructions. GUI are better than textual UI, as GUI
consists of menus, windows, and buttons and is operated by simply using
mouse.
Place Users in Control
Do not force users to complete predefined sequences. Give them
options—to cancel or to save and return to where they left off. Use terms
throughout the interface that users can understand, rather than system or
developer terms.
Provide users with some indication that an action has been performed,
either by showing them the results of the action, or acknowledging that
the action has taken place successfully.
Transparency
UI must be transparent that helps users to feel like they are reaching right
through computer and directly manipulating the objects they are working
with. The interface can be made transparent by giving users work objects
rather than system objects. For example, users should understand that
their system password must be at least 6 characters, not how many bytes
of storage a password must be.

Use progressive disclosure


Always provide easy access to common features and frequently used
actions. Hide less common features and actions and allow users to
navigate them. Do not try to put every piece of information in one main
window. Use secondary window for information that is not key
information.

169
Consistency
UI maintains the consistency within and across product, keep interaction
results the same, UI commands and menus should have the same
format, command punctuations should be similar and parameters should
be passed to all commands in the same way. UI should not have
behavior’s that can surprise the users and should include the
mechanisms that allows users to recover from their mistakes.
Integration

The software system should integrate smoothly with other applications


such as MS notepad and MS-Office. It can use Clipboard commands
directly to perform data interchange.

Component Oriented
UI design must be modular and incorporate component oriented
architecture so that the design of UI will have the same requirements as
the design of the main body of the software system. The modules can
easily be modified and replaced without affecting of other parts of the
system.
Customizable
The architecture of whole software system incorporates plug-in modules,
which allow many different people independently extend the software. It
allows individual users to select from various available forms in order to
suit personal preferences and needs.
Reduce Users’ Memory Load
Do not force users to have to remember and repeat what the computer
should be doing for them. For example, when filling in online forms,
customer names, addresses, and telephone numbers should be
remembered by the system once a user has entered them, or once a
customer record has been opened.
User interfaces support long-term memory retrieval by providing users
with items for them to recognize rather than having to recall information.
Separation
UI must be separated from the logic of the system through its
implementation for increasing reusability and maintainability.

170
Let Us Sum Up

From this unit we have come across the technologies in mobile


application and its Types with its android Example.

Check Your Progress

1. In User Interface Design, tools are used to,

2. As per the "Theo Mandel", the golden rules of User Interface


Design are
3. Android is –

4. Under which of the following Android is licensed


5. Android is based on which language
6. APK stands for
7. All layout classes are the subclasses of

Glossaries

 Accelerator key: Any combination of keys that are pressed


simultaneously to run a command.
 Word Wrap: the movement of text to the next line when typing
goes beyond the right margin.
 Section Break: a section of the document that can be formatted
differently to other parts of the document
 File allocation table (FAT): A data structure that the operating
system creates when a volume is formatted by using FAT
 OLE object: An object that supports the Object Linking and
Embedding (OLE) protocol.

 Web Layout view: A view of a document as it might appear in a


web browser. For example, the document appears as only one
page, without page breaks.

Suggested Readings

 https://tutorialsjoint.com/anatomy-of-digital-computer/
 https://benchpartner.com/anatomy-of-a-digital-computer

171
 http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf

 https://www.geeksforgeeks.org

Answers to Check Your Progress

1.In User Interface Design, tools are used to,

To make prototype and implement the design model


To get qualitative results
2. As per the "Theo Mandel", the golden rules of User Interface Design
are, Reduce the user's memory load
3.an operating system
4. Apache/MIT
5. java
6. Android Package Kit
7. android.view.ViewGroup.

172
Document Information

Analyzed document Information Technology Book.pdf (D166818864)

Submitted 5/13/2023 6:49:00 AM

Submitted by

Submitter email kumarnano@gmail.com

Similarity 3%

Analysis address kumarnano.tnou@analysis.urkund.com

Sources included in the report

URL: https://www.pakunipapers.com/wp-content/uploads/2021/12/Computer-Knowledge.pdf
1
Fetched: 10/5/2022 1:11:10 PM

URL: https://www.teachmint.com/tfile/studymaterial/iti/tradetheory/computerpdf/39617c25-5cfc-
4262-9... 2
Fetched: 10/5/2022 1:11:04 PM

Computer Fundamentals and PC Software (Block 1).pdf


1
Document Computer Fundamentals and PC Software (Block 1).pdf (D148967917)

URL: https://pathuriyakub.blogspot.com/2020/07/basics-of-computers.html
2
Fetched: 9/18/2021 2:00:32 PM

57e1041c903d8_Concepts in Information Technology_Version_1.doc


2
Document 57e1041c903d8_Concepts in Information Technology_Version_1.doc (D21888244)

57e1041c89501_Concepts in Information Technology_Version_1.doc


1
Document 57e1041c89501_Concepts in Information Technology_Version_1.doc (D21888243)

URL: https://tutorialsjoint.com/anatomy-of-digital-computer/
3
Fetched: 5/13/2023 6:49:00 AM

URL: https://openarchive.nure.ua/bitstream/document/12787/3/Posybnyk_informatics.docx
2
Fetched: 11/25/2021 5:17:52 AM

URL: https://benchpartner.com/anatomy-of-a-digital-computer
1
Fetched: 5/13/2023 6:49:00 AM

URL: https://ebin.pub/objective-computer-awareness-bank-po-and-clerk-examinations-like-ibps-
po-amp-... 3
Fetched: 11/12/2021 10:56:58 AM

URL: https://www.tutorialspoint.com/computer_logical_organization/hexadecimal_arithmetic.htm
1
Fetched: 3/8/2020 7:24:49 PM
About Tamil Nadu Open University
Tamil Nadu Open University (TNOU), with its
Headquarters at Chennai was established in 2000 by an
Act of Tamil Nadu Legislature at the State level for the
introduction and promotion of Open University and
Distance Education in the educational and for the co-
ordination and determination of standards in such system.
The salient features of TNOU are , relaxed entry rules,
maintenance of standards, individualized study, flexible in
term of place, duration of the study, use of latest
information and communication technology, well-knit
student support services network, cost effective
programmes, collaboration and resource sharing with
other Universities.

School of Sciences
School of Sciences, established in 2004, has been offering the B.Sc. and M.Sc. programmes in
Mathematics since 2005 and B.Sc., Mathematics with Computer Application since 2007. In 2017, B.Sc.
programmes in Physics, Chemistry, Botany, and Zoology were introduced, while M.Sc. programmes
in Physics, Chemistry, Botany, and Zoology were launched in 2018. As per the academic restructured,
the Department of Geography and Apparel & Fashion Design were merged in the School of Science in
2020 and these departments are offering B.Sc., and M.Sc., Programmes.

The main objective is to excite the brains and hearts of rural students through constant inquiry
and active participation in Science. The School of study has blazed a trail of information transmission
and generation, graduating over 25000 Science students across the Nation. It has built a niche for itself
in the core areas of teaching, research, consultation, administration, and community services over the
last 17 years.

The School of study consists of the Departments of Physics, Chemistry, Mathematics, Botany,
Zoology, Geography and Apparel & Fashion Design. Moreover, all the above said. Departments offer
various academic Programmes from Certificate to Research degree level (M.Phil., & Ph.D.) in their
concerned disciplines.

The Department of Geography offers the following Programmes

• B.Sc., Geography (Semester - Both Tamil & English Medium)


• M.Sc., Geography (Semester)
• M.Phil., Geography (Full Time & Part-Time)
• Ph.D., Geography (Full Time & Part-Time)

For details contact:


Phone : 044 - 24306641
E-Mail : geotnou@gmail.com / sostnou@gmail.com

Tamil Nadu Open University


Chennai – 600 015.
www.tnou.ac.in

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy