Information Technology: M.SC., Geography
Information Technology: M.SC., Geography
M.Sc., Geography
Semester - IV
INFORMATION
TECHNOLOGY
Department of Geography
School of Sciences
Tamil Nadu Open University
Chennai – 600 015.
BACHELOR OF SCIENCE IN GEOGRAPHY
INFORMATION TECHNOLOGY
BGEOSA-41
SEMESTER-IV
Department of Geography,
School of Science
Tamil Nadu Open University
577, Anna Salai, Saidapet, Chennai - 600 015
www.tnou.ac.in
May 2023
Name of Programme: B.Sc Geography
Printed by:
BGEOSA 41: Information Technology
Syllabus
Block 1: Introduction to Computers
1. Introduction to Computers
2. Generation of Modern Computers
3. Classification of Digital Computer Systems
4. Anatomy of a Digital Computer Input and output Devices
9. Number Systems
10. Networking
11. Communication Media,
12. Internet and Intranet, email
13. Cloud computing
Block 5: Applications
1. Rajaraman, v., 2018. Introduction to Information technology Publisher phi learning pvt.
Ltd publication, ISBN: 9387472302, 9789387472303
2. Alexis Leon and Mathews Leon., 1999. Fundamentals of Information Technology”, Leon
TECH World.
3. Pelin Aksoy, Laura DeNardis., 2007. Information Technology in Theory - Cengage
Learning publishing, ISBN: 1423901401, 9781423901402
4. Peter Norton., 1998. Introduction to Computers, TMH 6th Edition (for Units IV, V Chapters
13,14)
5. Stephen Doyle., 2000. Understanding Information Technology - Nelson Thornes
publication, ISBN: 0748736093, 9780748736096
Web Sources
1. https://www.sciencedirect.com/topics/computer-science/supercomputer
2. https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-interaction/
3. https://tutorialsjoint.com/anatomy-of-digital-computer/
4. https://benchpartner.com/anatomy-of-a-digital-computer
5. http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-MA-Linguistics-4-
HarjitSingh-ComputationalLinguistics-1.pdf
BGEOSA 41: Information Technology
Unit Page
Contents
No Number
1 Basics of Computer 02
2 Introductions of Computers 16
Block 2: Memory Units
3 Storage Devices 27
7 Cloud Computing 82
Block 4: Basic Software
1
Unit-1
BASICS OF COMPUTER
Overview
Learning objectives
1.1 History - Introduction to Computers
Overview
This is the first unit of our course computer concepts. It will introduce you
to some of the basic concepts of computer in traditional approach.
Through this unit, the history of computer, application, generation,
advantages, characteristics and memory units of computer are
discussed.
Learning Objectives
2
1.1 History-Introduction to Computers
Definition
The term "computer" comes from the Latin word "Computus," which
means "to calculate" or "to compute."
A Computer is anything that transforms process information in a
purposeful way.
In Simple terms
A computer is a device that accepts data and instruction (in the form of
digitalized data) and processes it according to the given instruction and
gives the output.
OR
According to the history the first computing device, which was developed
before 5000 years by China is ABACUS. By which we can calculate
3
simple addition and subtraction. It is still in use in South East Asia, China
and Japan.
4
1.2 Generation of Computers
5
3rd Generation (1965-1971)
Microprocessor Based
Uses VLSI(Very large scale Integration Circuit) Technology
Very cheap
Portable and reliable
Use the concept of pipeline processing
No A/C required
6
Used super conductor technology
Very powerful compact computers at cheaper rates
Laptop
Notebook
7
1.3 Applications of Computer
8
1.4 Advantages of Computers
Multitasking
It is a low cost solution. Person can save huge data within a low budget.
Centralized database of storing information is the major advantage that
can reduce cost.
Accuracy
One of the root advantage of computer is that can perform not only
calculations but also with accuracy.
Data Security
There are some main limitations of computer system are given below:-
Lack of common-sense
Zero IQ
No Feeling
9
Depend on the user input.
Computers cannot think and they can’t do any job unless they are first
programmed with specific instructions for same. They work as per stored
instructions. Algorithms are designed by humans to make a computer
perform a special task. This is also called artificial intelligence.
(ii) Computers can’t decide:
In any type of research ideas plays a vital role. In this context, computers
can’t express their ideas.
(iv) Computers can’t implement:
Though computers are helpful in storage of data and can contain the
contents of encyclopedias even, but only humans can decide and
implement the policies.
Limitations of Computer Systems
Limitations are the drawbacks of the computer system in which humans
outperform them.
Lack of common-sense
This is one of the major limitations of computer systems. No matter how
efficient, fast and reliable computer systems might be but yet do not have
any common sense because no full-proof algorithm has been designed to
programme logic into them. As computers function based on the stored
programme(s), they simply lack common sense.
10
Zero IQ
11
Versatility: - We can use computer to perform completely different type
of work at the same time.
Storage Capacity: - Computer can store mass storage of data with
appropriate format.
Reliability: The computer is a reliable electronic multipurpose and
multiprocessing machine. It processes data with high accuracy without
any mistakes.
Power of Remembering: - It can remember data for us. One of the
illustrations includes mobile phones which retrieve phone numbers when
the name is selected or the name of the person when the mobile number
is dialed.
No IQ: - Computer does not work without instructions.
No feeling: - Computer does not have emotions, knowledge, experience,
and feeling.
Artificial intelligence: The fifth generation computer which recognizes
voice is based on artificial intelligence. The AI is applied in gaming
software, and robotics from many years, but operating system based on
AI is also in process which can recognize not only voice, but read mood
of users also. It gives suggestion and decision on complex problems.
1.6 Memory Units
Memory unit is the amount of data that can be stored in the storage unit.
That in which storage capacity is expressed in terms of Bytes.
12
Sl. No. Unit Description
1 Bit (Binary Digit) A binary digit is logical 0 and 1 representing
a passive or an active state of a component
in an electric circuit.
2 Nibble A group of 4 bits is called nibble.
3 Byte A group of 8 bits is called byte. A byte is the
smallest unit which can represent a data
item or a character.
5 Kilobyte (KB) 1 KB = 1024 Bytes
6 Megabyte (MB) 1 MB = 1024 KB
7 Giga Byte (GB) 1 GB = 1024 MB
8 Tera Byte (TB 1 TB = 1024 GB
9 Peta Byte (PB) 1 PB = 1024 TB
10 Exa Byte 1 EB = 1024 PB
11 Zetta Byte 1 ZB = 1024 EB
12 Yotta Byte 1 YB = 1024 ZB
13 Bronto Byte 1 BB = 1024 YB
14 Geop Byte 1 GB = 1024 BB
13
Let Us Sum Up
From this unit we have come across the computer definition with its
history and also know about its areas where it is used.we have also
discussed about the types ,benefits and limitation too.
1. What is computer?
2. Mention the areas of computer used.
3. ______, ______, ______ are the limitations of computer.
Glossaries
Diligence : careful
Manipulate : handle or control
Forecasting : predict
Robustness :the quality or condition of being strong and in good
condition
Suggested Readings
https://www.sciencedirect.com/topics/computer-
science/supercomputer
https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-
interaction/
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
14
3. The limitations are –
Lack of common-sense
Zero IQ
No Feeling
4. Multitasking is the central theme of modern operating system. it
facilitate loading several jobs into main memory.
5. Hybrid.
6. System Software -Example include Linux, Unix, Windows and
Application Software- Example include MS Word, MS Excel are the
classifications of Computer
7. Protecting digital data.
15
Unit-2
INTRODUTION OF COMPUTER
Overview
Learning objectives
1.1 Introduction to Digital Computers
Overview
This is the first unit of our course is computer concepts. It will introduce
you to some of the basic concepts of computer in traditional approach.
Through this unit, the introduction of digital computer, classification, and
anatomy of digital computer are discussed.
Learning Objectives
16
1.1 Introduction to Digital Computers
Definition
17
century we depend on computers to fulfill our requirements at a very
short period of time.
18
device designed to combine basic arithmetic operations with decisions
based on its own computations. Babbage’s plans embodied most of the
fundamental elements of the modern digital computer. For example, they
called for sequential control—i.e., program control that included
branching, looping, and both arithmetic and storage units with automatic
printout. Babbage’s device, however was never completed and was
forgotten until his writings were rediscovered over a century later.
Of great importance in the evolution of the digital computer was the work
of the English mathematician and logician George Boole. In various
essays written during the mid-1800s, Boole discussed
the analogy between the symbols of algebra and those of logic as used
to represent logical forms and syllogisms. His formalism, operating on
only 0 and 1, became the basis of what is now called Boolean algebra,
on which computer switching theory and procedures are grounded.
John V. Atanasoff, an American mathematician and physicist, is credited
with building the first electronic digital computer, which he constructed
from 1939 to 1942 with the assistance of his graduate student Clifford E.
Berry. Konrad Zuse, a German engineer acting in virtual isolation from
developments elsewhere, completed construction in 1941 of the first
operational program-controlled calculating machine (Z3). In 1944 Howard
Aiken and a group of engineers at International Business Machines (IBM)
Corporation completed work on the Harvard Mark I, a machine whose
data-processing operations were controlled primarily by electric relays
(switching devices).
The digital computers that are available now a days vary in their sizes
and types.These digital computers are broadly classified into four
categories based on their size and type.
Micro Computer
Mini Computer
Mainframe Computer
Super Computer
19
Micro Computer:
Micro Computer are small low cast and single user digital computers.It is
a device with microprocessor,Input unit ,storage unit and CPU(Central
Processing Unit).
Microcomputer Computer formerly a commonly used term for Personal
Computers particularly any of class of any small digital computers.Its
CPU contained on a single integrated semi conductor chip.
IBM PC based on Pentium microprocessor and Apple Macintosh are
some Examples of microcomputers. Microcomputers include desktop
computers, notebook computers or laptop,tablet compute, handheld
computer,smartphones and notebook.
20
size.PDA uses a pen or a stylus for input,instead of the keyboard.They
have a limited memory and are less porful.PDAs can be connected to the
internet via wireless connnection.
F)Smart Phones:A smartphone is a mobile phone with highly advanced
features. A typical smartphone has a high-resolution touch screen
display, WiFi connectivity, Web browsing capabilities, and the ability to
accept sophisticated applications. The majority of these devices run on
any of these popular mobile operating systems: Android, Symbian, iOS,
BlackBerry OS and Windows Mobile.
Mini Computer:
Super Computers operate very fast and have multiple processors. Ther
are very few of these machines in existence due to their cost.
21
Although advances like multi-core processors and GPGPUs (general-
purpose graphics processing units) have enabled powerful machines for
personal use (see: desktop supercomputer, GPU supercomputer), by
definition, a supercomputer is exceptional in terms of performance.
China has owned the fastest supercomputer in the world. “Fast” is
defined by the number of petaflops the computer system can perform.
A petaflop is one thousand teraflops, or one quadrillion floating point
operations per second.
22
1. Input Device:
Input devices convert input data and instructions into the binary form for
understand by the computer. There are different types of input devices
like keyboard, Magnetic Ink Character Recognition (MICR), Optical
Character Recognition (OCR), mark sense reader, etc.
2. Output Device:
Output devices are that type of devices that receive information from the
CPU and present this information to the user in the desired form. Output
devices include display screen, printers, loudspeakers, plotters, etc.
3. CPU (Central Processing Unit):
The CPU has two parts that is Control Unit (CU) or Arithmetic Logic Unit
(ALU). CPU is also known as the brain of a computer as it executes the
program instructions.
Control unit (CU)
ALU (Arithmetic Logic Unit)
i) Control unit (CU)
The control unit of computer is tells that how the rest of the computer
system carries out a program’s instructions. CU is directs to the
movement of electronic signals between memory –that is temporarily
holds instructions, data or processes information - and the ALU. ALU is
also directs with these control signals between the CPU and the
input/output devices.
ii) ALU (Arithmetic Logic Unit):
23
Main Memory
Cache Memory
Register
i) Main Memory
RAM is the primary or main memory. It is volatile in nature and holds the
data for a short period of time only, that is only until the system is
running.
Files and instructions are saved in different secondary storage systems
and they are fetched to the RAM before the execution. This technique is
known as swapping. Memory space available in the main memory
directly affects the speed of the computer.
ii) Cache Memory
It is the smallest and fastest form of memory. The contents that require to
be fetched frequently are stored in the cache memory.
Therefore, the processor before looking for the content in RAM checks
here and goes to RAM only if the content isn’t available here. Cache
memory is always placed between RAM and the processor.
iii) Register
Let Us Sum Up
From this unit we have come across the computer definition with its
classifications and also know about its anatomy. We have also discussed
about the types Developments with functional areas of Digital computer
too.
24
3. Write the full for of OCR
4. Which device control Cursor?
5._____________ computer =Analog + Digital
6. Name the classifications of Digital computer
7. _____, _____, _____ the three main components of Digital computer .
Glossaries
Diligence : careful
Manipulate : handle or control
Forecasting : predict
Robustness :the quality or condition of being strong and in good
condition
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
6. Micro Computer
Mini Computer
Mainframe Computer
Super Computer
7. Input Processing,Output.
25
BLOCK 2
MEMORY UNITS
26
Unit-3
MEMORY UNITS
Overview
Learning objectives
3.1 What is computer Memory
3.1.1 How does Memory work
3.2 Main Categories of computer Memory
3.3 Overview of Primary Memory
3.4 Difference between PROM ,EPROM,EEPROM
3.5 Programming Languages: Machine Language, Assembly
Language
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the third unit of our course. It will introduce you to some of the
concepts of computer Memory Units. Through this unit, the Languages of
computer, EPROM, RAM , and its are discussed.
Learning Objectives
27
When we’re talking about computer memory, there are also two major
categories: Primary Memory and Secondary Memory. But before we
delve deeper into the respective categories, let’s talk about what exactly
is computer memory, to begin with?
28
3.2 Main Categories of computer Memory
29
SRAM is a type of semiconductor memory and it uses bistable latching
circuitry to store each bit, this makes it very fast and thus the name cache
memory. However, it is much more expensive than DRAM (we’ll talk
about it later) and takes up a lot more space so there’s lesser memory on
a chip.
DRAM is another type of RAM that stores each bit of data in a separate
capacitor within an integrated circuit. This means that each memory cell
in a DRAM chip holds one bit of data and is composed of a transistor and
a capacitor. Where the memory controller needs to read the data and
then rewrites it, constantly refreshing. Thus, this process makes the
DRAM slower than SRAM.
However, DRAM is cheaper than SRAM and so it is used as the main
memory in a CPU, though slower than SRAM, it is still relatively fast and
is able to connect directly to the CPU bus. Unlike the expensive SRAM,
DRAM is typically 4GB to 16 GB in laptops and 1GB to 2GB in smaller
devices.
ROM: Read Only Memory
ROM is also a primary memory just like RAM, but unlike RAM, ROM is
able to store data permanently which makes it non-volatile. It is a
programmable chip that stores all the most important instructions
required to start the system, this process is also known as bootstrap.
With ROM, the system will stay active and your data will not be
overwritten, deleted or modified even if you shut it down. Thus its name,
Read only memory since the data can only be read and accessed by the
user.
Alike to RAM, there are a few different types of ROM:
30
PROM is as its name states, a read only memory chip that only allows
the user to overwrite the data once. What makes it different from regular
ROM is that it is a blank memory chip, while ROM comes pre-
programmed.
Since there are small fuses inside of the chip itself that allows you to
program the PROM, a static electric can cause the fuse to burn out.
Thus, making it relatively fragile and is cheaper than ROMs. However,
the user would require a PROM programmer or PROM burner in order to
write the data.
Using regular ROMs and PROMs could be pretty wasteful even though
they are cheap, but they couldn’t be overwritten and reused. Thus, as
EROM’s name states, you’re able to overwrite the data by exposing it to
ultra-violet light for up to 40 minutes.
In order to erase the data, you’ll have to expose the quartz transparent
window lid to the ultra-violet light. Once you’re done with it, just seal the
lid with a sticker and you can use it again! However, if you own an
EPROM eraser, you can use that as an alternative as well.
A relatively long name, but it works the same way as EPROM! What’s
different is just the way of erasing the data. Instead of exposing it to the
ultra-violet light, you can just expose it to an electrical charge! So, no
transparent window is required.
EEPROM is able to be erased and reprogrammed about 10,000 times,
what’s even better is that you’re able to erase one byte at a time which is
pretty flexible, despite the erasing process being slow.
31
3.4 The Main Difference between PROM, EPROM and EEPROM:
Over the years, computer languages have been evolved from Low-Level
to High-Level Languages. In the earliest days of computers, only Binary
Language was used to write programs. The computer languages are
classified as follows:
32
Machine Language (low level language)
33
Let Us Sum Up
From this unit we have come across the computer Primary and
Secondary memory.we have also discussed about their types ,benefits
and limitation tooalong with the Computer Languages.
Glossaries
Suggested Readings
https://www.seeedstudio.com/blog/2020/11/25/types-of-computer-
memory-ram-rom-and-secondary-memory/
https://psu.pb.unizin.org/ist110/chapter/5-2-human-computer-
interaction/
34
https://www.matterhere.com/2018/06/memory-management-ram-
rom-prom-eprom.html ntent-799042056712-MA-Linguistics-4-
HarjitSingh-ComputationalLinguistics-1.pdf
35
Unit-4
HIGH LEVEL LANGUAGES
Overview
Learning objectives
4.1 Introduction to Computer Languages
4.2 High Level Language,
4.3 Types of High-Level Language,
4.3.1 Advantage of High Level Languages
`4.3.2 Disadvantage of High Level Languages
4.3.3 Limitations of High Level Languages
4.4 Some High Level Languages
4.5 Compiler and Interpreter
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the fourth unit of our concepts. It will introduce you to computer
Language Specially to High Level Language. Through this unit, the
concepts about compiler and Interpreter is also discussed.
Learning Objectives
The user of a computer must be able to communicate with it. That means,
he must be able to give the computer commands and understand the
36
output that the computer generates. This is possible due to the invention of
computer languages.
37
These all languages are considered as the high-level language because
they must be processed with the help of a compiler or interpreter before
the code execution. The source code is written in scripting languages like
Perl and PHP can be run by the interpreter. These languages can
convert the high-level code into binary code so that the machine can
understand.
The advantage and disadvantage both exist in a high-level language. The
slow processing time is the disadvantage of high-level language because
the translator converts the program into binary language before the
execution. The high-level language is close to the programmer and far
away from the machine. We are explaining some high-level languages,
which are given below:
1) FORTRAN
38
the first high-level programming language which is used for the scientific
purpose.
The coders were able to write the programs 500% faster in high-level
language as compared to low-level language. The efficiency was reduced
by 20%, and this thing allowed the programmers to focus more on the
problem-solving aspect of the problem.
2) COBOL
This language still used by the banks and other major companies which
depends heavily on the accuracy and stability of their programs to keep
their companies growing.
The COBOL language is divided into four parts:
1. Identification Division.
2. Environment Division.
3. Data Division.
4. Procedure Division.
3) BASIC
The BASIC language was the first language developed for the non-
professional programmers. There is no need of any prerequisite to learn
the BASIC language. The meaning of BASIC language is “Beginners all-
purpose symbolic instruction code."
4) PASCAL
The PASCAL is the first programming language used for the teaching
tool. It is a procedural programming language. This language supports
structured programming and data structure.
5) SIMULA(OOPL)
39
developed in 1967. The main purpose of this language is to create
computer simulations.
The linker is used for the large programs in which we can create some
modules for the different task. When we call the module, the whole job is
to link to that module and program is processed. We can use a linker for
the huge software, storing all the lines of program code in a single source
file.
Interpreter
Let Us Sum Up
From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.
40
3. The ______ is the translator program software
4. Which is the high-level language translator?
Glossaries
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
Answers to Check Your Progress
41
BLOCK 3
INTERNET AND NETWORKING
42
Unit-5
NUMBER SYSTEM AND NETWORKING
Overview
Learning objectives
5.1 Introduction to Internet
5.1.1 World Wide Web
5.1.2 Difference between Internet and World Wide Web.
5.1.3 Similarities between Internet and Intranet
5.2 Number Systems
5.2.1 Information
5.2.2 Data Processing Cycle
5.3 Introduction to Networking
5.3.1 Characteristics of a Computer Network
5.3.2 Network Card
5.3.3 The Slotted Ring
5.3.4 Token Passing
5.3.5 Token Ring Network
5.3.6 Token –Bus Network
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the fifth unit of our concepts. It will introduce you to Internet and
give the clear picture about World Wide Web. Through this unit, the
concepts about Number system and Networking is also discussed.
Learning Objectives
43
Idea about the World Wide Web.
Get the knowledge of Number System.
The World Wide Web (WWW) or web is an internet based service, which
uses common set of rules known as protocols, to distribute documents
across the Internet in a standard way. World Wide Web, which is also
known as a Web, is a collection of websites or web pages stored in web
servers and connected to local computers through the internet. These
44
websites contain text pages, digital images, audios, videos, etc. Users
can access the content of these sites from any part of the world over the
internet using their devices such as computers, laptops, cell phones, etc.
The WWW, along with internet, enables the retrieval and display of text
and media to your device. The World Wide Web. Or ‘Web’ is a part of the
Internet. The Web is viewed through web browser software such as
Google chrome, Internet Explorer, Mozilla Firefox etc. Using browsers
one can access the digital libraries containing innumerable articles,
journals, e-books, news, tutorials stored in the form of web pages on
computers around the world called web servers-Today thousands of web
pages/websites are added to the WWW every hour. The Web was
invented in 1991 by Tim Berners-Lee, while consulting at CERN
The Web was invented in 1991 by Tim Berners-Lee, while consulting at
CERN (European Organization for Nuclear Research) in Switzerland.
The Web contains multimedia.
Information in the Web is connected by hyperlinks.
The Web is a distributed information system.
45
Intranet sites are accessible via the web browser in a similar way
as websites in the internet. However, only members of Intranet
network can access intranet hosted sites.
In Intranet, own instant messengers can be used as similar to
yahoo messenger/gtalk over the internet.
The number system that we use in our day-to-day life is the decimal
number system. Decimal number system has base 10 as it uses 10 digits
from 0 to 9. In decimal number system, the successive positions to the
left of the decimal point represent units, tens, hundreds, thousands, and
so on.
Each position represents a specific power of the base (10). For example,
the decimal number 1234 consists of the digit 4 in the units position, 3 in
the tens position, 2 in the hundreds position, and 1 in the thousands
position. Its value can be written as
1234
As a computer programmer or an IT professional, you should understand
the following number systems which are frequently used in computers.
46
S.No. Number System and Description
Example
Binary Number: 101012
Calculating Decimal Equivalent −
47
Each position in an octal number represents a 0 power of the base
(8). Example 80
Last position in an octal number represents a x power of the base
(8). Example 8x where x represents the last position - 1
Example
48
Step Binary Decimal Number
Number
49
Repeat Steps 3 and 4, getting remainders from right to left, until the
quotient becomes zero in Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD)
of the new base number.
Example
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
50
Step Binary Number Decimal Number
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5/2 2 1
51
Step 4 2/2 1 0
Step 5 1/2 0 1
Step 2 101012 28 58
52
Step 3 258 0101012
Example
Binary Number : 101012
Calculating hexadecimal Equivalent −
53
Data can be defined as a representation of facts, concepts, or
instructions in a formalized manner, which should be suitable for
communication, interpretation, or processing by human or electronic
machine.
Data is represented with the help of characters such as alphabets (A-Z,
a-z), digits (0-9) or special characters (+,-,/,*,<,>,= etc.)
54
5.3 Introduction to Networking
55
as it will hold the data and wait until the line is clear before data is
transmitted to the particular computer and user. According to Wikipedia,
"Carrier Sense" describes how transmitter uses feedback from a receiver
to detect existence of encoded signal from any other station before trying
to transmit. The chances of collision can be reduced if the station can
sense the medium before it is used. Station should listen to medium
about ongoing transmission in process before sending its own
information. CSMA is based on the principle "sense before transmit" or
"listen before talk". "Multiple Access" means that more than one device
can listen and waiting to transmit at a time. Multiple stations may share
multiple access medium. This means every data bits transmitted by a
station is generally received by all the stations using that medium. CSMA
actually uses several different methods where they wait for the medium
to become idle, known as the persistence strategy. Persistence strategy
defines the procedures for a station that senses a busy medium. In this
strategy, the station will sense the channel and transmit packets
immediately if the channel is sensed free. If the medium is busy it will
wait until the channel becomes idle. Then it will send the data with
probability of 1.
If the medium is busy, it will wait until the line is free before sending the
packet with probability p. If the station choose to hold back, it will not
transmit with the probability
The strategy are used in WiFi and packet radio systems.
The advantage of this strategy is that, it reduces the chances of collision
since it is out of ordinary for two station to wait for the same period of
time before retrying concurrently.
56
Ethernet network channel. Collision Detection Collision Detection means
that when two devices try to send data simultaneously at the same time,
they are able to detect this error. CSMA/CD operates in the same
manner with CSMA except the moment collision is detected, the
operation of data transmission will be aborted immediately. The collision
that occurs on the shared media are detected when the devices in the
listening mode. When a device is in listening mode, it can detect collision
occurs on the shared media.
57
Create files and store them in one computer, access those files
from the other computer(s) connected over the network.
Router
58
uses Peripheral Component Interconnect (PCI) connection, while the
second type uses Industry Standard Architecture (ISA). Network cables
are required to provide network access.
External network cards are of two types: Wireless and USB based.
Wireless network card needs to be inserted into the motherboard,
however no network cable is required to connect to the network.
59
addresses and user data. Besides that, it also sets the response bit
ignored (11) on the condition . The receiving station detects and read the
data sent based on the destination address. If the station able to read the
data, it will sets the bit to answer (01), if the data couldn’t be read it will
sets to rejected (10) and busy mode (0) if the data overloaded. The
ignored state will be remains if the station is not ready (inoperable). The
transmitting station will detects the slot and response if the data was
transferred correctly based on the full/empty bit. Originating station will
set the monitor passed bit to 1 as it transmit the full slot which means this
is a first time pass. It will change the monitor pass to 0 as the slot are
passed on. If the sending station fails to remove the full packet, it will
circulate round to the monitor station for a second time. It will be
identified as lost packet and the monitor will remove it and sends out a
new empty slots. The two control bits at the end of a slot is unimportant
for media access as it is reserved for other protocol layers use.
The advantage of slotted ring operation can be determined as
below:
i. The slotted ring technique ensure the station does not monopolize
the channel and there is fairness among station in sharing the
channel bandwidth.
ii. The monitor stations make sure the slot structure is maintained
even with various ring errors.
iii. The multiple values for the response field in the minipackets allow
the sender to know if the packets is received and provide basic
flow control for ring stations with various speed to work together.
60
The station continuously send data until it is expires. When the token is
captured and when it expires, data sending process will be stopped and
the station send a new token to the network. The new token may
captured by the next station or the station simply repeat the token. The
process continues until the token has made a complete trip around the
ring. Each network only has one token so only one computer able to send
messages at a time. Since only the station which hold the token can
transmit data, computer on a token-based networks do not attempt to
access the network on their own. There are several token passing
protocols used in a local area network which is known as Token Ring
Network and Token Bus Network which will be explained in detail on
coming topics.
Token ring was invented by Olof Soderblom in the late 1960s. Token ring
becomes popular in the mid 1980s when IBM released its token ring
architecture based on active multi-station access units (MSAUs or MAUs)
and the IBM Structured Cabling System. It was used and promoted by
IBM in their networking standard and later standardized by The Institute
of Electrical and Electronics Engineers or IEEE as 802.5 standard. In OSI
model, token ring is exist at the data link layer (DLL). It is built in a star
wired ring topology where the token travels unidirectionally around the
ring. Nodes and the device called Multistation Access Unit (MSAU) are
physically connected by wires in token ring network. Originally, token ring
operates in the speeds of 4Mbps before it was upgraded to 1Gbps and
have been standardized by the IEEE 802.5 working group.
Token ring network adopt the whole process of token passing protocol to
transmit data. As explained in the earlier section, the token circulates in a
ring network even without data being transmitted. Each station will
access the data and past to next station. Every stations wait for the token
before attempting to access the network. Each token contains data,
source and destination address. Token frame is converted to data frame
when there involve a data transmission. The node which get the token
will assign the token with these information and send it to next node. The
data frame will travel around the ring until it reaches the destination node.
The destination node will load the data into its buffer and return
acknowledgement to data frame.
61
5.3.6 TOKEN-BUS NETWORK:
Token bus network have a same concept as token token ring network
where token is needed for each station to access the network
transmission medium. It is a Local Area Network for broadband networks
and stations form a logical ring in the network. Topology of bus network
consist of a group of workstations connected by long trunk cables and
branch out in a star configuration where the network has both a bus and
star topology. A token bus network is different from token-ring network
because the ends of the bus do not meet to form a physical ring. In bus
network the physical location of the computers is not important as all the
computers have different sequence addresses which the token and data
have to pass through.
Token that has been released are now available to the next station in the
logical sequence and acquired by the station with the highest number in
the sequence. Since the token does not follow the arrangement of
workstation, stations might be dispersed in a logical ring and location of
stations can be at anywhere in the bus.
Let Us Sum Up
From this unit we have come across the computer Internet and
Networking along with its characteristics and Disadvantages also know
about Networking and Data Processing too along with the Number
System.
Glossaries
62
WLAN :Wireless Local Area Network
WPAN: Wireless Personal Area Network
VPN :Virtual Private Network
ASP: Application Service Provider
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://www.geeksforgeeks.org/introduction-to-internet/
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
63
Unit-6
INTERNET AND INTRANET,E-MAIL
Overview
Learning objectives
6.1 Communication Media
6.1.1 Types of Communication Media
6.2 Internet and Intranet
6.2.1 Uses of Internet
6.2.2 Difference between the World Wide Web and the Internet
6.2.3 Security and Internet
6.2.4 Social Impact of Internet
6.2.5 Benefits of Internet
6.2.6 History of Internet
6.3 Email
6.3.1 Overview of Email
6.3.2 How to send and receive Email
6.3.3 Advantages of Email
6.3.4 Difference between Email and Webmail
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
Learning Objectives
64
Idea about the Internet and Intranet.
Get the knowledge of Cloud computing.
The user of a computer must be able to communicate with it. That means,
he must be able to give Communication media is a medium
or channel through which a message or information can be transmitted
from a sender to the receiver.
Different means through which verbal or non-verbal language is
processed are understood as communication media channels that are
used by students, college, university, businesses, marketers, etc to
channelize communications, develop public relations and share
information.
Definition: Communication media is defined as means of delivering or
receiving a message, information, or data. The means through which the
information is passed can be in verbal or non-verbal type. There has to
be a common language known by both the sender or receiver to transfer
information successfully.
For example, the way a professor addresses his or her students, or the
way army majors communicate with their units or the way businesses
communicate with their prospects giving them hands-on experience
of products or services, all use verbal or non-verbal types of
communication media.
Likewise, in telecommunication, when communications take place over a
distance with the help of cable, broadcasting, telegraph, or telephone,
analog and digital forms of communications media channels are used to
send and receive information.
65
program or courses, technology, media, production, and many other
sectors around the world. Let us understand these in detail-
1. Verbal Media
66
1.4 Interview
A meeting involves more than two people. There is always a head who
presides over the meeting. It is held for a purpose to address an issue or
pass on some crucial piece of information. It is a type of formal oral
communication that is always backed by a written form of
communication.
2 .Written Communication
67
employees and the stakeholders can have a clear idea about the
business activities through it.
4. Brochures
68
Two Forms of Communication Media
Different means are used for transmitting data from one source to
another. These two forms of communication media are-
1. Analog
1. Television
Television is a medium of one-way communication where a viewer is
shown information in the form of audiovisual. It can be monochrome or
colored. It is one of the popular sources of spreading information.
2. Radio
Radio is a communication medium where the information is passed on
the audio form. The radio receives signals by modulation of
electromagnetic waves. Its frequencies are said to be below those of
visible light.
3. Print
69
4. Internet
The Internet is the largest and the most popular type of communication
media. Almost everything can be searched on the internet. The internet
has access to all the relevant information sought by the audience.
5. Outdoor Media
Such forms of mass media revolve around signs, placards, billboards, etc
that are used inside or outside of vehicles, shops, commercial buildings,
stadiums, etc.
Conclusion
Now, it is clear a communication media is a medium that is used by a
sender to share or transmit the information or message with a receiver.
With the revolution in technology, a wide range of mediums is
incorporated under verbal and non-verbal media channels with a
common goal to ease down the tasks of sharing messages and
optimizing the impact of the message in getting favourable outcomes
from the target audiences.
70
How the Internet works
These various types of hardware are the connections within the network.
Devices such as computers, smart phones and laptops are end points,
or clients, while the machines that store the information are the servers.
The transmission lines that exchange the data can either be wireless
signals from satellites or 4G and cell phone towers, or physical lines,
such as cables and fiber optics.
A packet that has both a unique IP address and port number can be
translated from alphabetic text into electronic signals by travelling through
the layers of the OSI model from the top application layer to the
bottom physical layer. The message will then be sent over the Internet
71
where it is received by the Internet service provider's (ISP) router. The
router will examine the destination address assigned to each packet and
determine where to send it.
Eventually, the packet reaches the client and travels in reverse from the
bottom physical layer of the OSI model to the top application layer.
During this process, the routing data -- the port number and IP address --
is stripped from the packet, thus allowing the data to be translated back
into alphabetic text and completing the transmission process.
Research
Reading electronic newspapers and magazines
Online shopping, or e-commerce.
6.2.2 Difference between the World Wide Web and the Internet
The key difference between the Internet and the World Wide Web (WWW
or the Web) is that the Internet is a global connection of networks while
72
the Web is a collection of information that can be accessed using the
Internet. In other words, the Internet is the infrastructure and the Web is a
service on top.
The Web is the most widely used part of the Internet. Its outstanding
feature is hypertext, a method of instant cross-referencing. In most Web
sites, certain words or phrases appear in text of a different colour than
the rest; often this text is also underlined. When a user selects one of
these words or phrases, they will be transferred to the related site or
page. Buttons, images, or portions of images are also used as hyperlinks.
The Web provides access to billions of pages of information. Web
browsing is done through a Web browser, the most popular of which
are Google Chrome, Firefox and Internet Explorer. The appearance of a
particular Web site may vary slightly depending on the browser used.
Later or more updated versions of a particular browser are able to render
more complex features, such as animation, virtual reality, sound and
music files.
Deactivating autofill.
Turning off the device's GPS.
Updating cookies so an alert is sent anytime a cookie is installed.
Logging out of accounts instead of just closing the tab or window.
73
Using caution with spam emails and never opening or downloading
content from unknown sources.
The social impact of the Internet can be seen as both positive and
negative. On one side, people argue that the Internet has increased the
risk of isolation, alienation and withdrawal from society, pointing to
increases in an emotional response called FOMO, or the fear of missing
out. On the other side, people believe the Internet to have had the
opposite effect on society, arguing that the Internet increases civic
engagement, sociability and the intensity of relationships.
Whether the impacts are good or bad, the Internet has changed the way
society interacts and connects. One example of change is the increased
focus on personal growth and a decline in a community that is
determined by work, family and space. People are now constructing
social relationships based on individual interests, projects and values.
Communities are being formed by like-minded individuals not only offline
and in person, but through the Internet and the multitude of online
environments which it creates and offers. Social networking sites --
like Facebook and LinkedIn -- have become the preferred platforms for
both businesses and individuals looking to perform all kinds of tasks and
communicate with others.
74
The chance to sell and make money as a business or individual.
Access to an unlimited supply of entertainment sources, such as
movies, music, videos and games.
The ability to amplify the impact of a message, allowing charities and
other organizations to reach a wider audience and increase the total
amount of donations.
Access to the internet of things (IoT), which allows home appliances
and devices to connect and be controlled from a computer or
smartphone.
The ability to save data and easily share files with cloud storage.
The ability to monitor and control personal accounts instantly, such
as bank accounts or credit card bills.
75
6.3 E-mail
E-mail program
To send and receive e-mail messages, you can use an e-mail program,
also known as an e-mail client, such as Microsoft Outlook or Mozilla
Thunderbird. When using an e-mail client, a server that stores and
delivers your messages is used. This server is often hosted by
your ISP but can be another Internet company. An e-mail client needs to
76
connect to a server to download new e-mail, whereas e-mail stored
online is always available to any Internet-connected device. For more
information about cloud e-mail service, see the difference between
webmail and an e-mail client, below.
Online e-mail
An alternative way of sending and receiving e-mail (and the more popular
solution for most people) is an online e-mail service or webmail.
Examples include Hotmail (now Outlook.com), Gmail, and Yahoo Mail.
Many online e-mail services, including the ones we mentioned, are free
or have a free account option.
An e-mail service will not provide you with an Internet connection. You'll
still need to use an ISP to connect to the Internet to use the e-mail
service.
Writing an e-mail
If you are replying to a message, the To: and From: fields are
automatically filled out. If it's a new message, you need to specify
the recipients in the To: field by selecting them from your contact
list or by typing the e-mail addresses. If you enter more than one
recipient (e.g., group e-mail), the addresses should be separated
by a comma and a space or by pressing the Tab
The Subject should consist of a few words describing the e-mail's
contents. The subject lets the recipient see what the e-mail is
about, without opening and reading the full e-mail. This field is
optional.
The CC ("Carbon Copy") field lets you specify recipients who are
not direct addressees (listed in the "To" field). For instance, you
can address an e-mail to Jeff and CC Linda and Steven. Although
the e-mail is addressed to Jeff, Linda and Steven also receive a
77
copy and everyone can see who received the e-mail. This field is
optional.
The BCC ("blind carbon copy") field is similar to CC, except the
recipients are secret. Each BCC recipient receives the e-mail, but
does not see who else received a copy. The addressees (anyone
listed in the "To" field) remain visible to all recipients. This field is
optional.
Finally, the Message Body is the location you type your main
message. It often contains your signature at the bottom; similar to
a handwritten letter.
What makes a valid e-mail address?
There are many advantages of e-mail and the usage of e-mail versus
postal mail. Some of the main advantages are listed below.
Free delivery - Sending an e-mail is virtually free, outside the
cost of Internet service. There is no need to buy a postage stamp
to send a letter.
Global delivery - E-mail can be sent to nearly anywhere around
the world, to any country.
78
Instant delivery - An e-mail can be instantly sent and received by
the recipient over the Internet.
File attachment - An e-mail can include one or more file
attachments, allowing a person to send documents, pictures, or
other files with an e-mail.
Long-term storage - E-mails are stored electronically, which
allows for storage and archival over long periods of time.
Environmentally friendly - Sending an e-mail does not require
paper (paperless), cardboard, or packing tape, conserving paper
resources.
Both webmail and an e-mail client perform the same function: they allow
the user to send and receive e-mail. However, an e-mail client requires
the user to install software directly onto their computer; if the software is
not installed, e-mail may not be accessed. Also, many e-mail clients cost
money but are generally more secure. Webmail, on the other hand, is a
free service, hosted in the cloud. The cloud service automatically
synchronizes your e-mail to all your devices, including your desktop
computer, tablet, or smartphone.
Some of the popular e-mail clients
There are many e-mail clients (those that are software-based, not online)
available for users today. The following list contains some of the most
popular clients, and some of these are free to use.
Microsoft Outlook
Thunderbird
DreamMail
79
However, because of some security issues, it may not be possible to
send certain types of files without additional steps. For example, many
companies block .exe files from being sent over e-mail and would require
you to compress the file into a .zip file. Also, most e-mail providers
have file size restrictions that would prevent any large files or programs
from being sent over e-mail.
Let Us Sum Up
From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.
Glossaries
80
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
3. Email
4. Spam
5. Spam
6. Simple Main Transfer Protocol.
7. Two
81
Unit-7
CLOUD COMPUTING
Overview
Learning objectives
7.1 Cloud Computing
7.2 Features of a Cloud
7.3 The Seven Step Model of Migration into Cloud
7.4 The Integration Methodologies
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
Learning Objectives
82
also for an optimum resource utilization. This pool of resources is
typically exploited by a pay-peruse model in which guarantees are
offered by the Infrastructure Provider by means of customized Service
Level Agreements.
Hardware Virtualization Multi-core chips Utility & Grid Computing Cloud
Computing SOA Web Web Services Mashups Autonomic Computing
Data Center Automation Internet Technologies Distributed Computing
This model brings benefits to both consumers and providers of IT
services. Consumers can attain reduction on IT-related costs by choosing
to obtain cheaper services from external providers as opposed to heavily
investing on IT infrastructure and personnel hiring. The on-demand
component of this model allows consumers to adapt their IT usage to
rapidly increasing or unpredictable computing needs. Providers of IT
services achieve better operational costs; hardware and software
infrastructures are built to provide multiple solutions and serve many
users, thus increasing efficiency and ultimately leading to faster return on
investment (ROI) as well as lower total cost of ownership (TCO). The
mainframe era collapsed with the advent of fast and inexpensive
microprocessors and IT data centers moved to collections of commodity
servers. Apart from its clear advantages, this new model inevitably led to
isolation of workload into dedicated servers, mainly due to
incompatibilities These facts reveal the potential of delivering computing
services with the speed and reliability that businesses enjoy with their
local machines.
The benefits of economies of scale and high utilization allow providers to
offer computing services for a fraction of what it costs for a typical
company that generates its own computing power. The purpose of a SOA
is to address requirements of loosely coupled, standards-based, and
protocol independent distributed computing. In a SOA, software
resources are packaged as ―services, which are well defined, self-
contained modules that provide standard business functionality and are
independent of the state or context of other services. Services are
described in a standard definition language and have a published
interface. The maturity of WS has enabled the creation of powerful
services that can be accessed on-demand, in a uniform way. While some
WS are published with the intent of serving end-user applications, their
true power resides in its interface being accessible by other services. An
enterprise application that follows the SOA paradigm is a collection of
83
services that together perform complex business logic. In the consumer
Web, information and services may be programmatically aggregated,
acting as building blocks of complex compositions, called service
mashups. Many service providers, such as Amazon, del.icio.us,
Facebook, and Google, make their service APIs publicly accessible using
standard protocols such as SOAP and REST. In the Software as a
Service (SaaS) domain, cloud applications can be built as compositions
of other services from the same or different providers. Services such user
authentication, e-mail, payroll management, and calendars are examples
of building blocks that can be reused and combined in a business
solution in case a single, readymade system does not provide all those
features. Many building blocks and solutions are now available in public
marketplaces. For example, Programmable Web is a public repository of
service APIs and mashups currently listing thousands of APIs and
mashups. Popular APIs such as Google Maps, Flickr, YouTube, Amazon
eCommerce, and Twitter, when combined, produce a variety of
interesting solutions, from finding video game retailers to weather maps.
Similarly, Salesforce.com‘s offers AppExchange, which enables the
sharing of solutions developed by third-party developers on top of
Salesforce.com components.
Cloud Computing services are divided into three classes:
84
business, Web, and scientific applications. Once deployed in the cloud,
these applications can be consumed by end users. Infrastructure as a
Service Offering virtualized resources on demand is known as
Infrastructure as a Service (IaaS). A cloud infrastructure enables on-
demand provisioning of servers running several choices of operating
systems and a customized software stack. Infrastructure services are
considered to be the bottom layer of cloud computing systems. Amazon
Web Services mainly offers IaaS, which in the case of its EC2 service
means offering VMs with a software stack that can be customized similar
to how an ordinary physical server would be customized. Users are
given privileges to perform numerous activities to the server, such as:
starting and stopping it, customizing it Service Class Main Access &
Management Tool Service content Cloud Applications Web Browser
SaaS Social networks, Office suites, CRM, Video processing Cloud
Platform PaaS Cloud Development Environment Programming
languages, Frameworks,,Mashups editors, Structured data Cloud
Infrastructure IaaS Virtual Infrastructure Manager Compute Servers, Data
Storage, Firewall, Load Balancer by installing software packages,
attaching virtual disks to it, and configuring access permissions and
firewalls rules.
Platform as a Service In addition to infrastructure-oriented clouds that
provide raw computing and storage services, another approach is to offer
a higher level of abstraction to make a cloud easily programmable,
known as Platform as a Service (PaaS). A cloud platform offers an
environment on which developers create and deploy applications and do
not necessarily need to know how many processors or how much
memory that applications will be using. In addition, multiple programming
models and specialized services (e.g., data access, authentication, and
payments) are offered as building blocks to new applications. Google
App Engine, an example of Platform as a Service, offers a scalable
environment for developing and hosting Web applications, which should
be written in specific programming languages such as Python or Java,
and use the services‘ own proprietary structured object data store.
Building blocks include an in-memory object cache (memcache), mail
service, instant messaging service (XMPP), an image manipulation
service, and integration with Google Accounts authentication service.
Software as a Service Applications reside on the top of the cloud stack.
Services provided by this layer can be accessed by end users through
85
Web portals. Therefore, consumers are increasingly shifting from locally
installed computer programs to on-line software services that offer the
same functionally. Traditional desktop applica-tions such as word
processing establishing a private cloud means restructuring an existing
infrastructure by adding virtualization and cloud-like interfaces. This
allows users to interact with the local data center while experiencing the
same advantages of public clouds, most notably self-service interface,
privileged access to virtual servers, and per-usage metering and billing.
A community cloud is ―shared by several organizations and a specific
community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations) . A hybrid cloud
takes shape when a private cloud is supplemented with computing
capacity from public clouds. The approach of temporarily renting capacity
to handle spikes in load is known as cloud-bursting.
86
ELASTICITY
87
managers, which usually provide pluggable drivers to interact with
multiple hypervisors.
STORAGE VIRTUALIZATION: Vitalizing storage means abstracting
logical storage from physical storage. By consolidating all available
storage devices in a data center, it allows creating virtual disks
independent from device and location. Storage devices are commonly
organized in a storage area network (SAN) and attached to servers via
protocols such as Fibre Channel, iSCSI, and NFS; a storage controller
provides the layer of abstraction between virtual and physical storage. In
the management sphere, storage virtualization support is often
restricted to commercial products of 29 companies such as VMW are and
Citrix. Other products feature ways of pooling and managing storage
devices, but administrators are still aware of each individual device.
Interface to Public Clouds. Researcher have perceived that extending the
capacity of a local in-house computing infrastructure by borrowing
resources from public clouds is advantageous. In this fashion, institutions
can make good use of their available resources and, in case of spikes in
demand, extra load can be offloaded to rented resources.
A manager can be used in a hybrid cloud setup if it offers a driver to
manage the life cycle of virtualized resources obtained from external
cloud providers. To the applications, the use of leased resources must
ideally be transparent. Virtual Networking. Virtual networks allow creating
an isolated network on top of a physical infrastructure independently from
physical topology and locations. A virtual LAN (VLAN) allows isolating
traffic that shares a switched network, allowing VMs to be grouped into
the same broadcast domain. Additionally, a VLAN can be configured to
block traffic originated from VMs from other networks. Similarly, the VPN
(virtual private network) concept is used to describe a secure and private
overlay network on top of a public network (most commonly the public
Internet).
DYNAMIC RESOURCE ALLOCATION: In cloud infrastructures, where
applications have variable and dynamic needs, capacity management
and demand prediction are especially complicated. This fact triggers the
need for dynamic resource allocation aiming at obtaining a timely match
of supply and demand. A number of managers include a dynamic
resource allocation feature that continuously monitors utilization 30
88
across resource pools and reallocates available resources among VMs
according to application needs.
VIRTUAL CLUSTERS: Several managers can holistically manage
groups of VMs. This feature is useful for provisioning computing virtual
clusters on demand, and interconnected VMs for multi-tier Internet
applications.
RESERVATION AND NEGOTIATION MECHANISM: When users
request computational resources to available at a specific time, requests
are termed advance reservations (AR), in contrast to best-effort requests,
when users request resources whenever available. HIGH AVAILABILITY
AND DATA RECOVERY: The high availability (HA) feature of VI
managers aims at minimizing application downtime and preventing
business disruption. INFRASTRUCTURE AS A SERVICE PROVIDERS
Public Infrastructure as a Service providers commonly offer virtual
servers containing one or more CPUs, running several choices of
operating systems and a customized software stack.
FEATURES The most relevant features are:
89
service (WS) APIs. GUIs are preferred by end users who need to
launch, customize, and monitor a few virtual servers and do not
necessary need to repeat the process several times.
ADVANCE RESERVATION OF CAPACITY: Advance reservations
allow users to request for an IaaS provider to reserve resources for a
specific time frame in the future, thus ensuring that cloud resources will
be available at that time. Amazon Reserved Instances is a form of
advance reservation of capacity, allowing users to pay a fixed amount of
money in advance to guarantee resource availability at anytime during
an agreed period and then paying a discounted hourly rate when
resources are in use.
AUTOMATIC SCALING AND LOAD BALANCING: It allow users to set
conditions for when they want their applications to scale up and down,
based on application specific metrics such as transactions per second,
number of simultaneous users, request latency, and so forth. When the
number of virtual servers is increased by automatic scaling, incoming
traffic must be automatically distributed among the available servers.
This activity enables applications to promptly respond to traffic increase
while also achieving greater fault tolerance.
SERVICE-LEVEL AGREEMENT: Service-level agreements (SLAs) are
offered by IaaS providers to express their commitment to delivery of a
certain QoS. To customers it serves as a warranty. An SLA usually
include availability and performance guarantees.
HYPERVISOR AND OPERATING SYSTEM CHOICE: IaaS offerings
have been based on heavily customized open-source Xen deployments.
IaaS providers needed expertise in Linux, networking, virtualization,
metering, resource management, and many other low-level aspects to
successfully deploy and maintain their cloud offerings.
PLATFORM AS A SERVICE PROVIDERS Public Platform as a Service
providers commonly offer a development and deployment environment
that allow users to create and run their applications with little or no
concern to low-level details of the platform.
FEATURES Programming Models, Languages, and Frameworks.
Programming models made available by IaaS providers define how
users can express their applications using higher levels of abstraction
and efficiently run them on the cloud platform Persistence Options. A
90
persistence layer is essential to allow applications to record their state
and recover it in case of crashes, as well as to store user data.
Security and privacy affect the entire cloud computing stack, since there
is a massive use of third-party services and infrastructures that are used
to host important data or to perform critical operations. In this scenario,
the trust toward providers is fundamental to ensure the desired level of
privacy for applications hosted in the cloud. When data are moved into
the Cloud, providers may choose to locate them anywhere on the planet.
The physical location of data centers determines the set of laws that can
be applied to the management of data.
DATA LOCK-IN AND STANDARDIZATION The Cloud Computing
Interoperability Forum (CCIF) was formed by organizations such as Intel,
Sun, and Cisco in order to ―enable a global cloud computing ecosystem
whereby organizations are able to seamlessly work together for the
purposes for wider industry adoption of cloud computing technology.‖
The development of the Unified Cloud Interface (UCI) by CCIF aims at
creating a standard programmatic point of access to an entire cloud
infrastructure. In the hardware virtualization sphere, the Open Virtual
Format (OVF) aims at facilitating packing and distribution of software to
be run on VMs so that virtual appliances can be made portable
AVAILABILITY, FAULT-TOLERANCE, AND DISASTER RECOVERY
It is expected that users will have certain expectations about the service
level to be provided once their applications are moved to the cloud.
These expectations include availability of the service, its overall
performance, and what measures are to be taken when something goes
wrong in the system or its components. In summary, users seek for a
warranty before they can comfortably move their business to the cloud.
SLAs, which include QoS requirements, must be ideally set up between
customers and cloud computing providers to act as warranty. An SLA
specifies the details of the service to be provided, including availability
and performance guarantees. Additionally, metrics must be agreed upon
by all parties, and penalties for violating the expectations must also be
approved.
RESOURCE MANAGEMENT AND ENERGY-EFFICIENCY The multi-
dimensional nature of virtual machines complicates the activity of finding
a good mapping of VMs onto available physical hosts while maximizing
user utility. Dimensions to be considered include: number of
91
CPUs,amount of memory, size of virtual disks, and network bandwidth.
Dynamic VM mapping policies may leverage the ability to suspend,
migrate, and resume VMs as an easy way of preempting low-priority
allocations in favor of higher-priority ones. Migration of VMs also brings
additional challenges such as detecting when to initiate a migration,
which VM to migrate, and where to migrate. In addition, policies may
take advantage of live migration of virtual machines to relocate data
center load without significantly disrupting running services.
MIGRATING INTO A CLOUD The promise of cloud computing has
raised the expectations of small and medium enterprises beyond
measure. Large companies are deeply debating it. Cloud computing is a
disruptive model of IT whose innovation is part technology and part
business model in short a disruptive techno-commercial model‖ of IT.
THE CLOUD SERVICE OFFERINGS AND DEPLOYMENT MODELS
Cloud computing has been an attractive proposition both for the CFO
and the CTO of an enterprise primarily due its ease of usage. This has
been achieved by large data center service vendors or now better known
as cloud service vendors again primarily due to their scale of operations.
The cloud computing service offering and deployment models. IaaS IT
Folks
BROAD APPROACHES TO MIGRATING INTO THE CLOUD
Cloud Economics deals with the economic rationale for leveraging the
cloud and is central to the success of cloud-based enterprise usage.
Decision-makers, IT managers, and software architects are faced with
several dilemmas when planning for new Enterprise IT initiatives.
92
5. Leverage Cloud Functionalities & Features
6. Test the Migration
As with any new technology, SaaS and cloud concepts too suffer a
number of limitations. These technologies are being diligently examined
for specific situations and scenarios. The prickling and tricky issues in
different layers and levels are being looked into. The overall views are
listed out below. Loss or lack of the following features deters the massive
adoption of clouds
93
1. Controllability
2. Visibility & flexibility
94
7.4 THE INTEGRATION METHODOLOGIES:
95
both the source and target systems using available native interfaces. This
means leveraging the interface that each provides, which could vary from
standards-based interfaces, such as Web services, to older and
proprietary interfaces. Systems that are getting connected are very much
responsible for the externalization of the correct information and the
internalization of information once processed by the integration engine.
Semantic Mediation refers to the ability to account for the differences
between application semantics between two or more systems. Semantics
means how information gets understood, interpreted and represented
within information systems. When two different and distributed systems
are linked, the differences between their own yet distinct semantics have
to be covered. Data Mediation converts data from a source data format
into destination data format. Coupled with semantic mediation, data
mediation or data transformation is the process of converting data from
one native format on the source system, to another data format for the
target system. Data Migration is the process of transferring data between
storage types, formats, or systems. Data migration means that the data in
the old system is mapped to the new systems, typically leveraging data
extraction and data loading technologies. Data Security means the ability
to insure that information extracted from the source systems has to
securely be placed into target systems. The integration method must
leverage the native security systems of the source and target systems,
mediate the differences, and provide the ability to transport the
information safely between the connected systems. Data Integrity means
data is complete and consistent. Thus, integrity has to be guaranteed
when data is getting mapped and maintained during integration
operations, such as data synchronization between on-premise and SaaS-
based systems. Governance refers to the processes and technologies
that surround a system or systems, which control how those systems are
accessed and leveraged. Within the integration perspective, governance
is about managing changes to core information resources, including data
semantics, structure, and interfaces.
THE ENTERPRISE CLOUD COMPUTING PARADIGM: Relevant
Deployment Models for Enterprise Cloud Computing There are some
general cloud deployment models that are accepted by the majority of
cloud stakeholders today:
96
1)Public clouds are provided by a designated service provider for general
public under a utility based pay-per-use consumption model. The cloud
resources are hosted generally on the service provider‘s premises.
2)Private clouds are built, operated, and managed by an organization for
its internal use only to support its business operations exclusively. Public,
private, and government organizations worldwide are adopting this model
to exploit the cloud benefits like flexibility, cost reduction, agility and so
on.
Let Us Sum Up
From this unit we have come across the computer high level languages
with its advantages and Disadvantages also know about Compiler and
Interpreter too.
97
2. The email ID of a person contains _______ parts.
3. In email communication, BCC stands for _______.
Glossaries
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
98
BLOCK 4
BASIC SOFTWARE
99
Unit-8
INTRODUCTION TO BASIC OF SOFTWARE
Overview
Learning objectives
8.1 Introduction to Software
8.1.1 Examples and Types of Software
8.2 How does Software works?
8.3 Ms.Word
8.4 Ms.Excel and Ms.Access
8.4.1 Microsoft Access
8.4.2 Differences between Access and Excel
8.5 Ms.Power Point
8.5.1 Features Of Ms.Power Point
8.5.2 Uses Of Power Point
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the Eight of our concepts. It will introduce you to Ms.Office . Also
software we will be discussing.
Learning Objectives
100
which describes the physical aspects of a computer. Software is a
generic term used to refer to applications, scripts and programs that run
on a device. It can be thought of as the variable part of a computer, while
hardware is the invariable part.
The two main categories of software are application software and system
software. An application is software that fulfils a specific need or performs
tasks. System software is designed to run a computer's hardware and
provides a platform for applications to run on top of.
101
software include the firmware, computer language translators and
system utilities.
Driver software. Also known as device drivers, this software is often
considered a type of system software. Device drivers control the
devices and peripherals connected to a computer, enabling them to
perform their specific tasks. Every device that is connected to a
computer needs at least one device driver to function. Examples
include software that comes with any nonstandard hardware,
including special game controllers, as well as the software that
enables standard hardware, such as USB storage devices,
keyboards, headphones and printers.
Middleware. The term middleware describes software that mediates
between application and system software or between two different
kinds of application software. For example, middleware enables
Microsoft Windows to talk to Excel and Word. It is also used to send
a remote work request from an application in a computer that has one
kind of OS, to an application in a computer with a different OS. It also
enables newer applications to work with legacy ones.
Programming software. Computer programmers use programming
software to write code. Programming software and programming
tools enable developers to develop, write, test and debug other
software programs. Examples of programming software include
assemblers, compilers, debuggers and interpreters.
All software provides the directions and data computers need to work and
meet users' needs. However, the two different types -- application
software and system software -- work in distinctly different ways.
Application software
Application software consists of many programs that perform specific
functions for end users, such as writing reports and navigating websites.
Applications can also perform tasks for other applications. Applications
on a computer cannot run on their own; they require a computer's OS,
along with other supporting system software programs, to work.
These desktop applications are installed on a user's computer and use
the computer memory to carry out tasks. They take up space on the
102
computer's hard drive and do not need an internet connection to work.
However, desktop applications must adhere to the requirements of the
hardware devices they run on.
Web applications, on the other hand, only require internet access to
work; they do not rely on the hardware and system software to run.
Consequently, users can launch web applications from devices that have
a web browser. Since the components responsible for the application
functionality are on the server, users can launch the app from Windows,
Mac, Linux or any other OS.
System software
System software sits between the computer hardware and the application
software. Users do not interact directly with system software as it runs in
the background, handling the basic functions of the computer. This
software coordinates a system's hardware and software so users can run
high-level application software to perform specific actions. System
software executes when a computer system boots up and continues
running as long as the system is on.
Design and implementation
103
iteratively, adding detail and correcting the design as they develop it. The
different types of software design include the following:
Architectural design. This is the foundational design, which
identifies the overall structure of the system, its main components
and their relationships with one another using architectural design
tools.
High-level design. This is the second layer of design that focuses on
how the system, along with all its components, can be implemented
in forms of modules supported by a software stack. A high-level
design describes the relationships between data flow and the various
modules and functions of the system.
Detailed design. This third layer of design focuses on all the
implementation details necessary for the specified architecture.
8.3 Ms-Word
104
keyboard shortcuts specified against their names. Standard toolbar
Toolbars contain buttons, drop-down menus and other controls that
help you to quickly alter the appearance and arrangement of
documents by executing a variety of word commands.
Toolbars are very helpful and convenient in quickly executing MS
WORD Page 3 of 40 commands without having to go through menus.
The standard toolbar contains icons for basic functions like opening
files, saving files, printing files, cut, copy, paste etc. Formatting
toolbar This contains icons for changing the look of your text (called
“formatting” in computer jargon); for example, there are icons for
changing fonts, styles, font sizes, text alignment etc. Ruler The Ruler
lets you make changes to margins and indents, and helps you create
document as per dimensions required. Scroll tools These helps you
travel within your document. You can go anywhere, up and down,
right and left in your document mainly by two ways: Using the
horizontal and vertical scroll bars with the help of the mouse; Or
using the keyboard to press PgUp, PgDn, Home, End and arrow
keys. Status bar Also called the Status Area, this is the normally the
last line on your screen.
This gives the following information about your work—
• Current Page
• Section Number
• Current/Total pages in the document
• Current Cursor Position (where the cursor is presently located)
• Current Line Number
• Current Column Number
105
your mouse pointer looks like an I-beam you should be able to move
it freely on the screen. This is used for either placing the cursor at the
desired place (take the mouse pointer there and click) or choosing
any command either from the menu or from toolbars. The mouse
pointer changes shape when in the process of doing certain tasks
and the cursor disappears
File management
Creating a New Document
Right arrow key is used to move one position to the right of the cursor
Left arrow key is used to move one position to the left of the cursor.
Up arrow key is used to move one position to the top of the cursor.
Down arrow key is used to move one position to the down of the
cursor.
Page Up key is used to move down the screen at a time
Page down key is used to move up the screen at a time
106
Hold down Ctrl key and press Home to move to beginning of the
document.
Hold down Ctrl key and press End to move to end of the document.
You can move to any position on the screen by moving the cursor
with the mouse.
You can use scroll bars to scroll the text upward and down ward.
Closing a Document Click File menu Select and click Close button.
Otherwise click butt on menu bar Editing Word document Cut , Copy
and Paste options These options will allow you to Cut or Copy a
piece of text from one location and to paste at a new location. To do
these functions, Place the cursor at the begining of the text to be
selected. Drag the mouse pointer over the text. Click Edit menu and
then click on Cut option (or) click icon on the Standard Toolbar. Move
the cursor to the place where you want the text to be pasted. Click
Edit menu and then click Paste option (or) click icon on the Standard
Toolbar. For copying the text from one location to other location the
same procedure is to be followed. The difference between Cut and
Copy is that while using the Cut option the text will be removed from
its original location and pasted at a new location, where as when
using Copy option a copy of the selected text is pasted at new
location without disturbing the original text.
Open any document. Click Edit menu and then click Find option.
You will get a screen as shown below. In Find What text box type the
word you want to find and then click Find Next button. Continue
clicking Find Next button until you get the screen shown below. Click
OK button and then click X to close Find and Replace dialog box.
Replacing text Open any word document. Click Edit menu and then
click Replace option. You will get the dialog box as shown below and
type the word with which you want to replace. Click ReplaceAll
button once. You get the below dialog box. Click OK button and then
click X to close Find and Replace dialog box. Moving the cursor to a
specific page If your word document contains more than one page,
you can directly go to specified page by clicking Edit menu and then
clicking Go To option. You will get the dialog box . In the Enter page
number text box, type the required page number
Click Go To button. Cursor will immediately jump to page 4. Click
Close button to close Find and Replace dialog box. Formatting
107
documents Bold, Underline and Italicize the selected text Open a
word document. Block the text by first clicking at the start of the text
and holding the left mouse button and drag to the desired position
and then release the left mouse button. The selected area will be
highlighted. Move the mouse pointer to the button on the Standard
Toolbar and click once. Move the mouse pointer outside your text
and click to release the highlighting. Your text will now appear in
BOLD FACE.
Left aligning, centering , right aligning and justifying text Left Centre
Right Justify Open a word document. Block the text by first clicking
at the start of the text and holding the left mouse button and drag to
the desired position and then release the left mouse button. The
selected area will be highlighted. Move the mouse pointer to Align
Left button on the toolbar and click once. Your selected text will be
left aligned. Move the mouse pointer to Align right button on the
toolbar and click once. Your selected text will be right aligned. Move
the mouse pointer to Center button on the toolbar and click once.
Your selected text will be centered. Move the mouse pointer to
Justify button on the toolbar and click once. Your selected text will be
justified. Creating Bulleted and Numbered list If a list of items are to
be numbered automatically it can be done using Numbered List
option Ex: Microsoft Office consists of MS-Word MS-Excel MS-
PowerPoint MS-Access MS-Outlook The above text is to be selected
with mouse. Click on the Numbered List button on the toolbar Move
out of the text and click to release the highlighting.
Changing case of text You can change the selected text into either
UPPERCASE, lowercase, Title case or tOGGLE cASE Highlight the
text. Select the Format menu option Choose Change Case option.
You will get the dialog box shown below. From the list of options
select UPPERCASE to convert lower case into uppercase Type your
name and address as you would at the head of a letter, but aligned
with the left margin e.g. K.Manohar H.No 10-334/3, V.P. Nagar,
Malakpet, Hyderabad. Move the cursor to the start of each line and
press the Tab key. Just as with the right indent button, your text will
move right. How much it moves will depend on the tab settings, which
you can change in the Format, Tabs menu as shown below. Font
Controlling To get different character styles we can change Font type
Click on Format menu Select Font option.
108
You can set Font type, Font Style and Font size and Color of the
selected text. Click OK button. Note: The above options are also
available on the Formatting Toolbar Font style Font Type Font size
Color Creating column wise documents Open any word document
file. Click Format menu and click Columns option.
In the Presets tab, select Two option to get below screen. Click OK
button. Your document will be converted to two-column document.
Spelling and Grammar Checking of word document Open any word
document. Click Tools menu and then click Spelling and Grammar
option. You will get the below dialog box. Note all words that appear
red color in First box are spelling mistakes. If you want to accept the
suggested word, in the second box click on Change. If not, click
Ignore button. You can also add a word to the dictionary by clicking
on the Add button. Continue this process until you get the dialog box,
shown below: Click OK button. Save your work when the spell-
check is complete, so that the corrections are saved
Printing document Set Page Setup options Click File menu Select
and click Page Setup option. You will get the following screen. Here
you can set margins (top, bottom, right and left), paper size, paper
source and layout. Click OK button. Creating Header and footer You
can create header and footer that include text or graphics. For
example, page numbers, the date, a company logo, the document’s
title or file name, the author’s name, and so on. You can use the
same header and footer throughout a document or change the
header and footer for part of the document. For example, use a
unique header or footer on the first page, or leave the header or
footer off the first page. You can also use different headers and
footers on odd and even pages or for part of a document. The
Header and Footer tool bar is To Create header or footer Creating
different footers or headers for even and odd pages Preview
document Open any word document. Click File menu and then click
Print Preview option.
109
size, shape and appearance of a cell are controllable features. You
can also convert a text to a table and a table back to text. It also
supports importing and exporting data onto a spreadsheet. To create
a table using Insert Tables Button Move the cursor to the place
where you want to insert the table Choose tables button from the
Standard Toolbar Drag the mouse to highlight the desired number of
rows and columns in the tables menu. An empty table is inserted. To
create a table using table menu Choose Insert table from Table
Menu . You will find a dialog box as shown below: Now type the
Number of Columns and rows as you require and set column width
Auto. So that the Column with will be equal to the width of the text.
Now click OK. An empty table is inserted in the document. Now
inserting rows, columns, Deleting rows and widening the columns is
very easy. Insert Rows: Place the cursor in the table, where rows are
to be inserted Choose Table and click Insert Rows option to insert
rows in the table Delete Rows: Select the Row which is to be deleted
Click Table and click Delete cells option. In the same way you can do
with columns also
Using Formulae in the table Tables can be used to prepare financial
statements. Different functions can be used to calculate Column
totals, Row totals, Average , Count, Minimum and maximum of given
values etc. To use a formula in the table Keep the mouse cursor at
the place where the value has to come Click Table menu and then
click Formula option. You can see the following dialog box. Then
click OK button If you don’t want the above function, then choose
another from Paste function drop down list. Sort the Table We can
arrange the data in the table in some order i.e. By name, By ID no,
By basic etc. To sort the table Select the table by using menu Table -
> Select table Sort the table by using menu Table -> Sort options
You will find the following dialog box: Now select the sort by field and
click OK Numbering Pages Open any word document. Click Insert
menu and then click Page Numbers option. You will get the screen
as shown below: By default the page number is placed at bottom
right corner within the page. You can change the position of the page
numbers by selecting other options like "top of the page, center" from
the Drop down List boxes. Choose the Format button to review the
other page numbering options or choose OK button to set the
changes made in the Page Numbering dialog box. Auto correct
110
AutoCorrect stores a list of common typographical errors and their
spellings. When you make an error, Word detects it and inserts the
correctly spelled version of the word. You can add words to the
AutoCorrect list, based on the mistakes you make. Look at the
AutoCorrect dialog box
Now Select an Existing Data Source i.e. the file address.doc and
Click on Open Button.
• To add recipient information to your letter Click on More items and
insert the fields wherever required.
Large amounts of information, both public and private, are collected
across the Internet, opening users up to the risk of data breaches and
111
other security threats. Hackers and crackers can break into networks
and systems and steal information such as login information or bank
and credit card account records. Some steps that can be taken to
protect online privacy include:
Installing antivirus and antimalware
We all deal with numbers in one way or the other. We all have daily
expenses which we pay for from the monthly income that we earn. For
one to spend wisely, they will need to know their income vs. expenditure.
112
Microsoft Excel comes in handy when we want to record, analyze and
store such numeric data. Let’s illustrate this using the following image.
113
For this tutorial, we will be working with Windows 8.1 and Microsoft Excel
2013. Follow the following steps to run Excel on Windows 8.1
114
Ribbon components explained
Ribbon start button – it is used to access commands i.e. creating new
documents, saving existing work, printing, accessing the options for
customizing Excel, etc.
Ribbon tabs – the tabs are used to group similar commands together.
The home tab is used for basic commands such as formatting the data to
make it more presentable, sorting and finding specific data within the
spreadsheet.
Ribbon bar – the bars are used to group similar commands together. As
an example, the Alignment ribbon bar is used to group all the commands
that are used to align data together.
Understanding the worksheet (Rows and Columns, Sheets,
Workbooks)
A worksheet is a collection of rows and columns. When a row and a
column meet, they form a cell. Cells are used to record data. Each cell is
uniquely identified using a cell address. Columns are usually labelled with
letters while rows are usually numbers.
A workbook is a collection of worksheets. By default, a workbook has
three cells in Excel. You can delete or add more sheets to suit your
requirements. By default, the sheets are named Sheet1, Sheet2 and so
on and so forth. You can rename the sheet names to more meaningful
names i.e. Daily Expenses, Monthly Budget, etc.
Personally I like the black colour, so my excel theme looks blackish. Your
favourite colour could be blue, and you too can make your theme colour
look blue-like. If you are not a programmer, you may not want to include
ribbon tabs i.e. developer. All this is made possible via customizations. In
this sub-section, we are going to look at;
115
Customization the ribbon
Setting the colour theme
The above image shows the default ribbon in Excel 2013. Let’s start with
customization the ribbon, suppose you do not wish to see some of the
tabs on the ribbon, or you would like to add some tabs that are missing
such as the developer tab. You can use the options window to achieve
this.
Click on the ribbon start button
Select options from the drop down menu. You should be able to
see an Excel Options dialog window
Select the customize ribbon option from the left-hand side panel
as shown below
116
On your right-hand side, remove the check marks from the tabs
that you do not wish to see on the ribbon. For this example, we
have removed Page Layout, Review, and View tab.
Click on the “OK” button when you are done.
Your ribbon will look as follows
You can also add your own tab, give it a custom name and assign
commands to it. Let’s add a tab to the ribbon with the text Guru99
117
1. Right click on the ribbon and select Customize the Ribbon. The
dialogue window shown above will appear
2. Click on new tab button as illustrated in the animated image
below
3. Select the newly created tab
4. Click on Rename button
10. Select All chart types command and click on Add button
11. Click on OK
118
Your ribbon will look as follows
To set the color-theme for your Excel sheet you have to go to Excel
ribbon, and click on à File àOption command. It will open a window where
you have to follow the following steps.
119
1. The general tab on the left-hand panel will be selected by default.
2. Look for colour scheme under General options for working with
Excel
3. Click on the colour scheme drop-down list and select the desired
colour
4. Click on OK button
Settings for formulas
This option allows you to define how Excel behaves when you are
working with formulas. You can use it to set options i.e. autocomplete
when entering formulas, change the cell referencing style and use
numbers for both columns and rows and other options.
If you want to activate an option, click on its check box. If you want to
deactivate an option, remove the mark from the checkbox. You can this
120
option from the Options dialogue window under formulas tab from the
left-hand side panel
Proofing settings
This option manipulates the entered text entered into excel. It allows
setting options such as the dictionary language that should be used when
checking for wrong spellings, suggestions from the dictionary, etc. You
can this option from the options dialogue window under the proofing tab
from the left-hand side panel
121
Save settings
This option allows you to define the default file format when saving
files, enable auto recovery in case your computer goes off before
you could save your work, etc. You can use this option from the
Options dialogue window under save tab from the left-hand side panel
Important Excel shortcuts
122
Best Practices when working with Microsoft Excel
Thus Ms.Excel is
Introduction of MS Excel : Microsoft Excel is a powerful
spreadsheet program used to record, manipulate, store numeric
data and it can be customized to match your preferences
The ribbon is used to access various commands in Excel
The options dialogue window allows you to customize a number
of items i.e. the ribbon, formulas, proofing, save, etc.
Now in this Microsoft Access tutorial, we will learn about some important
terms and basic objects in MS Access:
Database File:
It is a file which stores the entire database. The database file is saved to
your hard drive or other storage devices.
123
Datatypes:
Datatypes are the properties of each field. Every field has one datatype
like text, number, date, etc.
Table
Macros are mini computer programming constructs. They allow you to set
up commands and processes in your forms, like, searching, moving to
another record, or running a formula.
124
Modules:
125
Access Excel
Deals with text, numbers, files and Microsoft Excel generally deals
all kinds of data with numerical data
Lots of worksheets or documents
All the data is stored one time, in
are a store with similar, repeated
one place.
data.
Helps you to build highly functional
Only the primary data entry screen
data entry forms and report
is available.
templates.
Users will be able to enter the data Data accuracy and speed is not
more efficiently and accurately. much because of the format.
Advantages of MS Access
Now in this MS Access Tutorial, we will learn the pros/benefits for using
MS Access application:
Access offers a fully functional, relational database management
system in minutes.
Easy to import data from multiple sources into Access
You can easily customize Access according to personal and
company needs
Microsoft Access online works well with many of the development
languages that work on Windows OS
126
Microsoft Access online can perform heterogeneous joins
between various data sets stored across different platforms
Disadvantages of MS Access
All the information from your database is saved into one file. This
can slow down reports, queries, and forms
Technical limit is 255 concurrent users. However, the real-world
limit is only 10 to 80 (depending on the type of application which
you are using)
It requires a lot more learning and training compares with other
Microsoft programs
How to Start Microsoft Access
Note: We assume you have the latest Microsoft Access installed which
comes bundled with Microsoft Office 365 package.
There are two ways to Start MS Access.
1. From Windows, ‘Start’ button.
2. From Desktop, Right Click> ‘New’ option.
Now in this Microsoft Access tutorial, let’s have a look of starting MS
Access using both the ways:
Option 1) From Windows, Start button.
Step 1) Click on the ‘Windows’ icon.
You will find the list of installed programs.
Step 2) Find Access icon.
Check and click on Access Icon.
Step 3) Check the window.
MS Access Application window will appear.
Steps 4) Press ‘Esc’.
127
Result: This will open the MS Access windows application.
How to Create a Database
128
Datasheet View:
Displays in the view, which allows you to enter raw data into your
database table.
Design view:
Displays the view, which allows you to enter fields, data types, and
descriptions into your database table.
Forms in MS Access
Form Wizard
Form
Multiple Item
Split Form
Let’s have a look at each option to create the form, one by one:
129
1. Create using Form Wizard
This option allows the user to create the form with the wizard and select
the column from the available list of column form in legacy Select window
format.
Step 1) Click on ‘Form Wizard.’
130
Macro in MS Access database is a time-saving feature that allows
you to add functionality or automate simple tasks.
The image below shows the different slide layout options which are
available for use:
Insert – Clipart, Video, Audio, etc.
Under the “Insert” category, multiple options are available where one can
choose what feature they want to insert in their presentation. This may
include images, audio, video, header, footer, symbols, shapes, etc.
131
Slide Design
During the slide show, the slides appear on the screen one after the
other. In case, one wants to add some animations to the way in which a
slide presents itself, they can refer to the “Animations” category.
There are different animation styles available on PowerPoint
Font size, font style, font colour, word art, date and time, etc. can also be
added to a PPT.
132
Depicting Growth – Since both graphics and text can be added
in a presentation, depicting the growth of a company, business,
student’s marks, etc. is easier using PPT
Let Us Sum Up
From this unit we have come across the computer software and also
with its advantages and Disadvantages about the Ms.Power Point,
Ms.access ,Ms.Excel and Ms.Word.
Glossaries
133
Web Layout view: A view of a document as it might appear in a
web browser. For example, the document appears as only one
page, without page breaks.
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
https://www.geeksforgeeks.org
1. No
2. From Edit menu choose Move or Copy then select (new book)
from To Book list and click OK
3. Ctrl + H is the shortcut key is usedto replace a data with another
in sheet.
4. Bit
5. Fields
6. .mdb
7. Memo
8. A combination of various slides depicting a graphical and visual
interpretation of data, to present information in a more creative
and interactive manner is called a PowerPoint presentation or
PPT.
134
BLOCK 5
APPLICATIONS
135
Unit-9
WEB MAPPING
Overview
Learning objectives
9.1 Introduction to Web Mapping
9.1.1 Types of Web Mapping
9.1.2 Web GIS Cloud
9.1.3 Evolving paper cartography
9.2 Technologies
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the Ninth unit of our concepts. It will introduce you to Web
Mapping Applications.
Learning Objectives
136
as data storage and algorithms, than it does the end-user reports
themselves.
The terms web GIS and web mapping remain somewhat synonymous.
Web GIS uses web maps, and end users who are web mapping are
gaining analytical capabilities. The term location-based services refers
to web mapping consumer goods and services.[3] Web mapping usually
involves a web browser or other user agent capable of client-server
interactions. Questions of quality, usability, social benefits, and legal
constraints are driving its evolution.
The advent of web mapping can be regarded as a major new trend in
cartography. Until recently cartography was restricted to a
few companies, institutes and mapping agencies, requiring relatively
expensive and complex hardware and software as well as skilled
cartographers and geomatics engineers.
Web mapping has brought many geographical datasets, including free
ones generated by OpenStreetMap and proprietary datasets owned
by HERE, Huawei, Google, Tencent, TomTom, and others. A range
of free software to generate maps has also been conceived and
implemented alongside proprietary tools like ArcGIS. As a result,
the barrier to entry for serving maps on the web has been lowered.
Analytical web maps offer GIS analysis. The geodata can be a static
provision, or need updates. The borderline between analytical web maps
and web GIS is fuzzy. Parts of the analysis can be carried out by the GIS
geodata server. As web clients gain capabilities processing is distributed.
Animated and realtime
137
animated. Data is collected by sensors and the maps are generated or
updated at regular intervals or on demand.
Animated maps show changes in the map over time by animating one of
the graphical or temporal variables. Technologies enabling client-side
display of animated web maps include scalable vector graphics (SVG),
Adobe Flash, Java, QuickTime, and others. Web maps with real-time
animation include weather maps, traffic congestion maps and vehicle
monitoring systems.
Static web pages are view only without animation or interactivity. These
files are created once, often manually, and infrequently updated.
Typical graphics formats for static web maps are PNG, JPEG, GIF,
or TIFF (e.g., drg) for raster files, SVG, PDF or SWF for vector files.
These include scanned paper maps not designed as screen maps. Paper
138
maps have a much higher resolution and information density than
typical computer displays of the same physical size, and might be
unreadable when displayed on screens at the wrong resolution.
139
infringements by other people using their data without proper
requests for permission.
140
Examples for such projects are the OpenStreetMap project or
the Google Earth community. As with other open projects, quality
assurance is very important, however, and the reliability of the
internet and web server infrastructure is not yet good enough.
Especially if a web map relies on external, distributed data sources,
the original author often cannot guarantee the availability of the
information.
Web maps support hyperlinking to other information on the web. Just
like any other web page or a wiki, web maps can act like an index to
other information on the web. Any sensitive area in a map, a label
text, etc. can provide hyperlinks to additional information. As an
example a map showing public transport options can directly link to
the corresponding section in the online train time table. However,
development of web maps is complicated enough as it is: Despite the
increasing availability of free and commercial tools to create web
mapping and web GIS applications, it is still a more complex task to
create interactive web maps than to typeset and print images. Many
technologies, modules, services and data sources have to be
mastered and integrated The development and debugging
environments of a conglomerate of different web technologies is still
awkward and uncomfortable.
9.2 Technologies
141
geometry data model and operator set for spatial databases. Part 2
of the specification defines an implementation using SQL.
Let Us Sum Up
From this unit we have come across the technologies in Web Mapping
and its Types with its advantages and Disadvantages .
Glossaries
142
File allocation table (FAT): A data structure that the operating
system creates when a volume is formatted by using FAT
OLE object: An object that supports the Object Linking and
Embedding (OLE) protocol.
Web Layout view: A view of a document as it might appear in a
web browser. For example, the document appears as only one
page, without page breaks.
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
https://www.geeksforgeeks.org
4. COLSPAN
5. 161
6. Web Browser
7. HTTP
143
Unit-10
Mobile Applications
Overview
Learning objectives
10.1 Introduction to Mobile
10.1.1 Types
10.1.2 Android Application
10.1.3 Android Development Tools
10.2 Installing Virtual Machine for Android Jelly bean
10.3 User Interface Architecture
10.3.1 Design of User Interface
Let Us Sum Up
Check Your Progress
Glossaries
Suggested Readings
Answers to Check Your Progress
Overview
This is the Tenth unit of our concepts. It will introduce you to Mobile
Applications.
Learning Objectives
144
app software was originally popularized by Apple Inc. and its App Store,
which offers thousands of applications for the iPhone, iPad and iPod
Touch.
A mobile application also may be known as an app, web app, online app,
iPhone app or smartphone app.
145
Productivity apps: These focus on improving business efficiency
by easing various tasks such as sending emails, tracking work
progress, booking hotels, and much more.
Lifestyle and entertainment apps: Increasingly popular, these
encompass many aspects of personal lifestyle and socialization
such as dating, communicating on social media, as well as
sharing (and watching) videos. Some of the most widely known
apps such as Netflix, Facebook or TikTok fall into this category.
Apps that are not preinstalled are usually available through distribution
platforms called app stores. These may operated by the owner of the
device's mobile operating system, such as the App Store (iOS) or Google
Play Store; by the device manufacturers, such as the Galaxy
Store and Huawei AppGallery; or by third parties, such as the Amazon
Appstore and F-Droid.
Usually, they are downloaded from the platform to a target device, but
sometimes they can be downloaded to laptops or desktop computers.
Apps can also be installed manually, for example by running an Android
application package on Android devices.
Some apps are freeware, while others have a price, which can be upfront
or a subscription. Some apps also include micro transactions
and/or advertising. In any case, the revenue is usually split between the
application's creator and the app store.[3] The same app can, therefore,
cost a different price depending on the mobile platform.
146
Mobile apps were originally offered for general productivity and
information retrieval, including email, calendar, contacts, the stock market
and weather information. However, public demand and the availability of
developer tools drove rapid expansion into other categories, such as
those handled by desktop application software packages. As with other
software, the explosion in number and variety of apps made discovery a
challenge, which in turn led to the creation of a wide range of review,
recommendation, and curation sources, including blogs, magazines, and
dedicated online app-discovery services. In 2014 government regulatory
agencies began trying to regulate and curate apps, particularly medical
apps.[4] Some companies offer apps as an alternative method to
deliver content with certain advantages over an official website.
10.1.1 Types
All apps targeted toward a particular mobile platform are known as native
apps. Therefore, an app intended for Apple device does not run
in Android devices. As a result, most businesses develop apps for
multiple platforms.
While developing native apps, professionals incorporate best-in-class
user interface modules. This accounts for better performance,
consistency and good user experience. Users also benefit from wider
access to application programming interfaces and make limitless use of
all apps from the particular device. Further, they also switch over from
one app to another effortlessly.
The main purpose for creating such apps is to ensure best performance
for a specific mobile operating system.
Web-based app
147
The performance of these apps is similar to a web application running in
a browser, which can be noticeably slower than the equivalent native
app. It also may not have the same level of features as the native app.
Hybrid app
The concept of the hybrid app is a mix of native and web-based apps.
Apps developed using Apache Cordova, Flutter, Xamarin, React
Native, Sencha Touch, and other frameworks fall into this category.
These are made to support web and native technologies across multiple
platforms. Moreover, these apps are easier and faster to develop. It
involves use of single codebase which works in multiple mobile operating
systems.
148
and multiple activities are used together to provide a complete user
interaction.
149
Android applications consist of combinations of these component type
instances. The invocation of components is managed through a system-
wide broadcast mechanism based on intents.
10.1.3
150
inside into what your code looks like. It’s great for actually seeing the
work you’ve done and making any adjustments as needed.
4. Eclipse
Next up on the list we have Eclipse. Before Android Studio came around,
Eclipse was the main tool for Android development. As of right now,
Google doesn’t support this software but some developers still use it to
build Android apps as well as other apps. Eclipse is still a pretty useful
tool, especially for developing cross-platform applications, and it supports
a variety of programming languages.
5. Fabric
Up next we have Fabric. Many big companies have used it while
developing their mobile apps, for example Twitter, Uber and Spotify. That
in of itself is a big test for a tool like this. Google actually purchased
Fabric from Twitter in January 2017. The platform offers several kits for
developers to use during testing as well as kits for marketing and
advertising. Those components make it really easy to ensure your
application is user-friendly and fits into the target market.
6. FlowUp
Genymotion is an emulator that lets you view more than 3000 different
device scenarios so that you can test your app in many different
151
environments. Besides Android and Java, this tool also supports other
programming languages and operating systems.
9. Instabug
The next tool on the list is a great testing and bug reporting system.
Companies like Yahoo, BuzzFeed, Lyft and PayPal use it in their
development process. It enables each developer to document bugs, add
screen shots and share this with other developers on the team to keep a
log of all the bugs.
10. Visual Studio With Xamarin
To end this list we have another classic tool, already known to most
people. Visual Studio is Microsoft’s original development environment.
You can use almost any programming language with it and use it to make
native Android, iOS and Windows apps when you combine it with
Xamarin.
152
Step 2: Click on new and enter a name and the operating system
details for the virtual machine . Select type as Linux and version
as other and click next .
Step 3: Enter the amount of ram you would like to allot for the
virtual machine and click next . Android 4.3 requires at least 1Gb
of ram but its not necessary .
153
Step 4: In the next window select “ Create a virtual hard disk “
and then select VDI .
154
Step 5: In the next window , According to your space requirement
you can either select dynamically allocated or fixed size for your
storage space . i selected fixed size because i want to allocate
only 8Gb of storage space to android . in the next dialog box set
the storage space for android according to your requirement .
155
Step 6: Your virtual machine is now set . all you need to do is add
the location of the Android 4.3 image file . Click on the settings
button in virtualbox . Under the settings navigate to storage ,
below the storage tree select empty and click on the disk image
and select “ choose a virtual CD/DVD disk file “ and select the
android 4.3 image . Check the Live CD/DVD box and click ok .
156
Step 7: Double click on your virtual machine to start it and click
OK for all the dialog boxes . Select Install Android-X86 to hard
disk and click OK for all the dialog boxes .
157
Step 8: in the next window you have to create a partition for
installing Android . The new partition will not mess up anything
with your windows computer . From now onwards you have to use
your up , down , left and right keys on your keyboard to Select
“create/modify partitions “ and click OK .
158
Step 9: In the next windows select new > primary and then
specify the size of the new partition .
Step 10: Your new partition has been created . Select write and
press enter and type “yes “ and press enter again when prompted
. In the next window select quit and press enter .
159
Step 11 : In the next window select the Sda1 and press enter .
select the et3 file system and press enter . When prompted to
install grub loader select yes . Select now when prompted to
make your system directory as read-write .
160
161
Step 12: Now android 4.3 is successfully installed on your virtual
machine . select Run Android 4.3 and press enter . click OK for
any other dialog boxes that appear . You will now see the android
loading screen .
Step 13: Select your language and enter , now fill in the Gmail
details and all the details that are asked .
162
Step 14: Now We have successfully installed Android 4.3 on your
windows computer .
163
164
10.3 User Interface Architecture
User interface is the first impression of a software system from the user’s
point of view. Therefore any software system must satisfy the
requirement of user. UI mainly performs two functions −
Accepting the user’s input
165
Icons − A picture or symbol which is used to represent a software
application or hardware device.
Menus − A list of options from which the user can choose what
they require.
Pointers − A symbol such as an arrow which moves around the
screen as user moves the mouse. It helps user to select objects.
It starts with task analysis which understands the user’s primary tasks
and problem domain. It should be designed in terms of User’s
terminology and outset of user’s job rather than programmer’s.
To perform user interface analysis, the practitioner needs to study
and understand four elements −
o The users who will interact with the system through the
interface
o The tasks that end users must perform to do their work
o The content that is presented as part of the interface
o The work environment in which these tasks will be
conducted
Proper or good UI design works from the user’s capabilities and
limitations not the machines. While designing the UI, knowledge of
the nature of the user's work and environment is also critical.
The task to be performed can then be divided which are assigned
to the user or machine, based on knowledge of the capabilities
and limitations of each. The design of a user interface is often
divided into four different levels −
o The conceptual level − It describes the basic entities
considering the user's view of the system and the actions
possible upon them.
o The semantic level − It describes the functions performed
by the system i.e. description of the functional requirements
of the system, but does not address how the user will
invoke the functions.
166
o The syntactic level − It describes the sequences of inputs
and outputs required to invoke the functions described.
o The lexical level − It determines how the inputs and
outputs are actually formed from primitive hardware
operations.
167
User Interface Models
168
Design Considerations of User Interface
User centered
169
Consistency
UI maintains the consistency within and across product, keep interaction
results the same, UI commands and menus should have the same
format, command punctuations should be similar and parameters should
be passed to all commands in the same way. UI should not have
behavior’s that can surprise the users and should include the
mechanisms that allows users to recover from their mistakes.
Integration
Component Oriented
UI design must be modular and incorporate component oriented
architecture so that the design of UI will have the same requirements as
the design of the main body of the software system. The modules can
easily be modified and replaced without affecting of other parts of the
system.
Customizable
The architecture of whole software system incorporates plug-in modules,
which allow many different people independently extend the software. It
allows individual users to select from various available forms in order to
suit personal preferences and needs.
Reduce Users’ Memory Load
Do not force users to have to remember and repeat what the computer
should be doing for them. For example, when filling in online forms,
customer names, addresses, and telephone numbers should be
remembered by the system once a user has entered them, or once a
customer record has been opened.
User interfaces support long-term memory retrieval by providing users
with items for them to recognize rather than having to recall information.
Separation
UI must be separated from the logic of the system through its
implementation for increasing reusability and maintainability.
170
Let Us Sum Up
Glossaries
Suggested Readings
https://tutorialsjoint.com/anatomy-of-digital-computer/
https://benchpartner.com/anatomy-of-a-digital-computer
171
http://www.igntu.ac.in/eContent/IGNTU-eContent-799042056712-
MA-Linguistics-4-HarjitSingh-ComputationalLinguistics-1.pdf
https://www.geeksforgeeks.org
172
Document Information
Submitted by
Similarity 3%
URL: https://www.pakunipapers.com/wp-content/uploads/2021/12/Computer-Knowledge.pdf
1
Fetched: 10/5/2022 1:11:10 PM
URL: https://www.teachmint.com/tfile/studymaterial/iti/tradetheory/computerpdf/39617c25-5cfc-
4262-9... 2
Fetched: 10/5/2022 1:11:04 PM
URL: https://pathuriyakub.blogspot.com/2020/07/basics-of-computers.html
2
Fetched: 9/18/2021 2:00:32 PM
URL: https://tutorialsjoint.com/anatomy-of-digital-computer/
3
Fetched: 5/13/2023 6:49:00 AM
URL: https://openarchive.nure.ua/bitstream/document/12787/3/Posybnyk_informatics.docx
2
Fetched: 11/25/2021 5:17:52 AM
URL: https://benchpartner.com/anatomy-of-a-digital-computer
1
Fetched: 5/13/2023 6:49:00 AM
URL: https://ebin.pub/objective-computer-awareness-bank-po-and-clerk-examinations-like-ibps-
po-amp-... 3
Fetched: 11/12/2021 10:56:58 AM
URL: https://www.tutorialspoint.com/computer_logical_organization/hexadecimal_arithmetic.htm
1
Fetched: 3/8/2020 7:24:49 PM
About Tamil Nadu Open University
Tamil Nadu Open University (TNOU), with its
Headquarters at Chennai was established in 2000 by an
Act of Tamil Nadu Legislature at the State level for the
introduction and promotion of Open University and
Distance Education in the educational and for the co-
ordination and determination of standards in such system.
The salient features of TNOU are , relaxed entry rules,
maintenance of standards, individualized study, flexible in
term of place, duration of the study, use of latest
information and communication technology, well-knit
student support services network, cost effective
programmes, collaboration and resource sharing with
other Universities.
School of Sciences
School of Sciences, established in 2004, has been offering the B.Sc. and M.Sc. programmes in
Mathematics since 2005 and B.Sc., Mathematics with Computer Application since 2007. In 2017, B.Sc.
programmes in Physics, Chemistry, Botany, and Zoology were introduced, while M.Sc. programmes
in Physics, Chemistry, Botany, and Zoology were launched in 2018. As per the academic restructured,
the Department of Geography and Apparel & Fashion Design were merged in the School of Science in
2020 and these departments are offering B.Sc., and M.Sc., Programmes.
The main objective is to excite the brains and hearts of rural students through constant inquiry
and active participation in Science. The School of study has blazed a trail of information transmission
and generation, graduating over 25000 Science students across the Nation. It has built a niche for itself
in the core areas of teaching, research, consultation, administration, and community services over the
last 17 years.
The School of study consists of the Departments of Physics, Chemistry, Mathematics, Botany,
Zoology, Geography and Apparel & Fashion Design. Moreover, all the above said. Departments offer
various academic Programmes from Certificate to Research degree level (M.Phil., & Ph.D.) in their
concerned disciplines.