Professional Documents
Culture Documents
OF
COMPUTERS
Dr. P. MOHAN
Department of Commerce and Management Studies
University of Calicut,
Kerala - 673635.
~
~
1 tmI
~ GfIimalaya GpublishingGfIouse
MUMBAI NEW DELHI NAG PUR BANGALORE HYDERABAD CHENNAI PUNE LUCKNOW AHMEDABAD ERNAKULAM
Himalaya Publishing House
No part of this book shall be reproduced, reprinted or translated for
any purpose whatsoever without prior permission of the Publisher in
writing
ISBN : 978-93-5024-526-2
Revised Edition 2010
New Delhi "Pooja Apartments", 4-B, Murari Lal Street, Ansari Road,
Darya Ganj, New Delhi - 110 002.
Phones: 23270392, 23278631, 30180302/03/04/05/06,
Fax: 011-23256286
Nagpur Kundanlal Chandak Industrial Estate, Ghat Road,
Nagpur - 440 018. Phones: 2738731, 3296733
Telefax: 0712-2721215
Bangalore No. 16/1 (Old 12/1), 1st Floor, Next to Hotel Highlands,
Madhava Nagar, Race Course Road,
Bangalore - 560 001.
Phones: 22281541, 22385461, Telefajc 080-22286611
Hyderabad No. 2-2-1 167/2H, 1st Floor, Near Railway Bridge,
Tilak Nagar, Main Road, Hyderabad - 500 044.
Phone: 65501745, Telefax: 040-27560041
Chennai No.2, Ramakrishna Street, North Usman Road, T. Nagar,
Chennai - 600 017. Phones: 044-28144004/28144005
Pune First Floor, "Laksha" Apartment, No. 527, Mehunpura,
Shaniwar Peth, (Near Prabhat Theatre),
Pune - 411 030.
Phones: 020-24496323/24496333
Lucknow C-43, Sector - C, Ali Gunj, Lucknow - 226 024.
Phone: 0522-4047594
Ahmedabad 114, "SHIL" 1st Floor, Opp. Madhu Sudan House,
e.G. Road, Navrang Pura, Ahmedabad - 380 009.
Phones: 09327324149,0931467413
Ernakulam 39/104 A, Lakshmi Apartment, Karikkamuri Cross Rd.,
Ernakulam, Cochin - 622011 .
Phones: 0484-2378012, 2378016, Mob- 09344199799
DTP by Sri Siddhi Softtek
Bangalore
Printed by Geetanjali Press Pvt. Ltd.
Nagpur
Contents
DEFINITION OF COMPUTER
Computer can be defined as an electronic device that
performs rapid computations and generates desired output for
users based on input data and programs.
Computer can capture, store, retrieve and process data.
The data may be numbers, characters, audio, video, images
2 Organisation of Computer
CHARACTERISTICS OF COMPUTER
Computer is a versatile device. It can be designed to do
any kind of activity provided all data and instructions are made
available to it in digital form. The important characteristics of
computer are:
1. Speed
Modern computers have incredible speed of processing.
Computer speed is measured in units of millisecond (one
thousandth of a second), microsecond (one millionth of a
second), nanosecond (one billionth of a second), and picosecond
(one trillionth of a second). Advanced computers, including
recent microcomputers called super microcomputers, operate
in nanoseconds and can carry out millions of instructions per
second (MIPS).
2. Accuracy
Computer can ensure consistently very high degree of
accuracy in computations. ~t processes data according to the
sequence of instructions . Hence, if input data and procedures
are correct, the output will be consistently accurate.
3. Huge storage and fast retrieval
Computer has huge storage capability. For a personal
computer, 128 MB RAM is almost a standard toady. The main
memory can be upgraded further by inserting RAM chips that
are available in modules of 64 MB, 128 MB and so on. Cache
memory is also available in Pc. Cache memory is faster access
memory device and hence it improves processor performance.
Computer Fundamentals 3
Secondary or auxiliary storage devices are used for permanent
storage. Modern computers have enormous secondary storage
capacity, e.g., a PC hard disk can store more than 80 GB of
data. Pen drives, DVDs, CD-ROMs, CD-Rs, magnetic tapes etc.
are other secondary storage devices. A CD-ROM can store 650
MB and more of data on a single disk. Huge storage and fast
retrieval capability makes computer a very special tool for data
processing and communications.
3. Versatility
Though computers are basically designed to carry out only
arithmetic operations, yet they are capable of performing almost
any task that has a series of finite logical steps. Computers can
be used for communications, process control, research, weather
forecasting, healthcare, online trading, education, training,
defence applications and so on.
4. Free from fatigue
Computer is free from fatigue. It does not get tired of
work and never loses concentration. It can perform basic
arithmetic operations with the same degree of speed and
accuracy for any extent of time continuously, with the same
amount of efficiency as the first transaction.
5. Programmable
Computer can be programmed to function automatically
and this differentiates it from any other calculation device. It
functions as programmed for any stretch of time until the
condition to terminate is satisfied.
6. Networking capability
Computers can be interconnected into a network. Network
in turn can be connected to other networks. Networks extend
the capability of computers. The networks provide the basic
infrastructure for electronic communications, electronlc
commerce, online trading and information services.
LIMITATIONS OF COMPUTER
Computer is, no doubt, a marvellous tool. Yet it has some
limitations. Some of the major limitations of computer are as
follows.
4 Organisation of Computer
ELEMENTS OF COMPUTER
Charles Babbage provided the basic structure of computers
in the detailed drawings of his Analytical Engine. This engine
had a mill to process data, a control to regulate operations and
a store to hold data and results of processing temporarily. The
anatomy of computers, personal computers to super computers,
is basically the same. Let us see how' these components are
arranged into a computer system.
Computer is designed to carry out instructions for data
processing. It has components to receive inputs, process inputs
and communicate the outputs with users. The system is
organised as follows.
Keyboard
Mouse [--I
I ALU
I I I cu
--I
CRT
Scanners
Voice Recognition
I RAM PRIMARY MEMORY
ROM Cache Registers
I Printers
Audio Response
Systems
Systems
1
Magnetic tape
Magnetic disk
Optical disk
Primary Memory
Random Access Memory Read Only Memory
[Data and Instructions] [Mostly protected
program instructions]
I Register 1 I I Reg~ster
I I Register 3 I ..... I Register n I
Control Unit
--- -~
,
,
,,-- - ---
,
CU ~----------- ... MAIN
SECONDARY
MEMOR
y STORAGE
I ALU I
------------+ CO ntrol
- - - _ . Data
COMPUTER SYSTEM
A computer system is made up of three major components:
hardware, software and humanware. The physical units of a
computer system (excluding the third component), constitute
its hardware. Hardware consists of mechanical, electrical and
electronic parts of the system. Sets of programmed instructions
constitute the software. Humanware is the people element in
the system.
COMPUTER SYSTEM
.. ~
SOFlWARE
HARDWARE
~
PERIPHERALS
SECONDARY
STORAGE
DEVICES
COMPUTER PERIPHERALS
The input/output and storage devices surround the central
processing unit (CPU). Hence, they are called the peripheral
devices. They are usually the electromechanical devices
connected to the CPU that exchange data and programs with
the CPU. The users interact with the CPU through these devices.
Thus, they act as interface between users and the CPU. The
interaction is difficult because of the language barrier. The CPU
uses machine language, which is difficult for most users. The
input- output (1/0) devices help in taking the translated version
of the input to the machine's memory and similarly, to render
the processed symbols into the language of the user.
During the first two decades of commercial use of
computers, 110 operation was performed mostly by punching
holes on cards and paper tape with a special device. More direct
and convenient 1/0 devices have been developed since then.
The peripherals connected directly to the CPU are called online
devices and devices not directly connected are called offline
Computer Fundamentals 9
devices. These peripherals can be further divided into input
devices, output devices and secondary storage devices.
INPUT DEVICES
Input devices allow the user to input data and instructions
to the computer. There are a variety of input devices. Direct
entry of data generally requires a keyboard. It may also use
other devices for direct data entry like a touch sensitive screen,
voice recognition system and scanners. The popular input devices
are discussed in the following section.
Keyboard
Keyboard is the most popular input device for direct entry
of data and instructions into computer. The standard QWERTY
keyboard is used for computer. The enhanced keyboard has 101
keys. In addition to them, the computer keyboard usually has
special keys like PageUp, PageDown, PrintScreen etc. The
computer keyboard is very much like the electronic typewriter
keyboard. But it has additional keys.
Computer keyboard has three types of keys:
Alphanumeric keys for typing character and numeric
data
Punctuation keys like comma, period, colon,
semicolon, question mark etc.
Special keys like function keys, control keys, arrow
keys, caps lock etc.
The keyboard is linked to the CPU and it is also linked to
the computer screen so that the data entered into the memory
can be seen by the user as he types in the data.
Mouse
A mouse is a small hand-held 'point and click' device that
is connected to the CPU through a cable. Douglas Engelbart
invented mouse in 1963at Stanford Research Institute. Xerox
Corporation's Palo Alto Research Center enhanced its capabilities
by adding analogue to digital conversion. In the early 1970's.
With the adoption of Graphical User Interface technology, mouse
became an essential input device for computer later in the
1980's.
10 Organisation of Computer
OUTPUT DEVICES
Output device displays result of the computer processing
for user. The popular output devices are monitor, printer and
speaker (audio response systems). These are discussed in the
section belo'N.
Visual Display Unit or Monitor
Visual display units (VDUs) are television-like screens that
provide the user-interface in the form of display of text, numbers
and images. The VDUs may be monochrome or colour. The
support of monochrome or colour and clarity of display depend
on the type of video monitor and the video adapter installed in
the microcomputer.
The video display terminal (VDT) consists of a monitor or
CRT and a keyboard. The CRT serves as an output device and
the keyboard as an input device. Thus VDT is an input/output
device. If the terminal is provided with some memory and
certain processing capability, it becomes a smart or intelligent
terminal. A terminal without processing power is called a dumb
terminal.
Speaker and Audio Response Systems
Computer can produce verbal output where the output or
response can be standardised as replies to special requests for
information. The unit analyses the input and delivers the verbal
reply by assembling the responses from pre-recorded words and
phrases.
Printers
Printers are purely output devices. They produce hard copy
output. Computer printers vary widely in their technologies and
capabilities. They can be classified in a number of ways. First,
they can be classified into three broad groups: character
printers, line printers and page printers.
14 Organisation of Computer
READ/WRITE HEADS
~ n ~SPINDLE
L DISKS
ASS EMBLE
U
/
RADIAL MOVEMENT OF ARM
floppies. Floppies are cheaper and more rugged than metal disks.
The floppies were introduced in the early 1970s and became
very popular with the arrival of microcomputers. The floppies
are popularly used on microcomputers. They are reliable and
portable. They are available in many sizes like 5 1.4 -inches and
3 Yz -inches and vary in storage capacity from 360 KB to 2.88
MB. The 5 1.4 -inch floppies are not used these days. The 3 Y2-
inch floppies, called microfloppies, are very popular and they
can hold 1.44 MB to 2.88 MB of storage. The current trend is
towards reducing the size and increasing the storage capacity
of the floppies.
Magnetic Tape
Magnetic tape is a serial access storage medium. It can
store large volume of data at low costs. The conventional
magnetic tape is in reels of up to 3600 feet made of mylar
plastic tape; the tape is one half inch in width and is coated
with magnetic material on one side. The reel of tape is loaded
on a magnetic tape drive unit. During any read/write operation,
the tape is moved from one spool to the other in the same way
as in the audiocassette tape recorder.
The conventional tape is replaced by cartridge tape that is
housed in a small box, that is cartridge, which is more convenient
to use. This eliminates the need to manually handle and thread
the tape for any read/write operation. The magnetic tape is
densely packed with magnetic spots in frames across its width.
A frame records one byte and each bit in the frame is read/
written by a read/write head for that bit position. The tape has
nine tracks, out of which eight are used as data tracks and the
ninth one for parity bit meant for error detection.
One track is used only for parity, which will be a bit with a
value of either a 0 or 1 depending on parity convention followed.
In c)C of even ':;<ii';':y, the r,umber of 1s in the frame will be
even. If the ilumber of 1s in the data tracks is odd, the parity
bit will be 1 so that total number of 1s in that frame is even.
For example, if the data tracks carry the bits 00011100, then
the parity bit is 1, that makes the total number of 1s in the
nine bit stream an even number, that is four in the above
example. If the parity is odd, the value of parity bit will be 0 so
that the total number of 1s in the frame is odd.
Tapes. are ideally suited for large storage for serial
processing of data. They are generally used for backing up large
volumes of data required for serial processing. They are low-
cost and reliable storage devices. They can store fairly large
volumes of data and are ideal for batch processing applications,
storing historical data and backing up of important files.
It is also a cheap and effective secondary storage medium
for ensuring security of data by backing up data and keeping it
off-the-site. Besides tape formats are more standardised than
disk formats that facilitates transfer of data between machines.
It can rapidly transfer data to the CPU. The disadvantage is
that it permits only serial access and hence not suitable for
many applications requiring direct access.
Differences between Magnetic Tapes and Magnetic Disks
1. Magnetic tape supports only serial access. Magnetic
disk permits serial and random access.
2. Magnetic tape has much larger storage capacity than
a magnetic disk.
3. Magnetic tape is divided length wise into tracks and
data are recorded in tracks. In case of disk it is divided
into circular tracks and sectors. Data are recorded in
one sector fully before moving into the next.
4. Magnetic tape takes much more processing time than
magnetic disk, as the access is serial.
5. Accessing and updating of on-line disk files are much
faster than tape files.
6. A number of disk files affected by a single transaction
can be updated simultaneously whereas tape files have
to be updated separately.
Computer Fundamentals 21
7. Disk file updating process rewrites the old records,
and data files have to be backed up for security.
Optical storage
Optical storage technology uses light as the medium for
representing data. Laser beams are used to store and retrieve
data. Commonly used optical storage devices include CD-ROM,
CD-R, CD-RW and DVD.
CD-ROM
Compact-disk Read-Only Memory (CD-ROM) is the most
exciting development that has taken place in secondary storage
in recent years. CD-ROM can store huge quantity of data, of
about 650 MB, which is equivalent to 200,000 pages of ordinary
text on a single disk. It is relatively inexpensive and is used in
both small and large computer systems.
This disk is made of synthetic resin that is coated with a
reflective material, usually aluminium. When high intensity laser
beam is focussed on the disk, it forms tiny pits on it. The pit
represents I and the data are read using low intensity laser
beams. The pit reflects less intense light. The reflected light is
sensed to know the bit 0 from 1; the light will be more intense
in the case of the former as there is no pit.
A special feature of CD-ROM is its ability to store different
kinds of data such as text, pictures, animation, sound, video
and graphics. This makes it valuable for certain industries like
travel, entertainment and motion pictures.
The data stored on CD-ROM are read only as the name
indicates, that is, the data on CD-ROM cannot be modified.
Hence, it is well suited for storing relatively static data.
CO-R
This is Compact Disk -Recordable. It can be used to write
data on it once. The data on it can be retrieved as and when
needed.
CO-RW
Compact Disk Re-writable (CD-RW) is an optical disk that
can be rewritten many times. Th~ data store::! on it can be read,
erased and re-written as frequently as needed.
22 Organisation of Computer
DVD
Digital Versatile Disk (earlier known as Digital Video Disk.)
is a large capacity secondary storage device. It stores seven
times CD capacity on a single side. Double-sided or dual layer
DVDs are also available with much larger storage capacity. DVD
uses a 5-inch disc for storage. That is, it is of the same size as
a CD ROM. Single layer, single-sided DVD has a storage capacity
of 4.7 GB. Wtih double-layer, double sided disc, it can store 17
GB of data on a single disk. (Single sided DVDs can store 4.7GB
for single layer and 8.5GB for dual-layer disks. Double sided
DVDs can store 9.40GB for single layer and 17GB for dual-layer
disks). With such huge storage capacity, DVDs are used to store
full-length commercial motion pictures, video albums etc. and
its viewing quality is much better than tape storage. DVD system
delivers a picture with over twice the definition of traditional
storage like VHS.
Pen drive
Pen drive is a compact secondary storage device. It can
b~ carried like a pen. Its capacity ranges from 128 MB upwards.
Computer Output Microfilm and Computer Output Microfiche
These are computer output media that use a film similar
to camera film. Microfilm consists of long filmstrips that are
rolled up. Microfiche is small rectangles of cut films of size 2
by 4 inches to 4 by 6 inches. These are compact and cheap
storage media. Since they can store large amount of data and
are not in human readable form, they are generally used for
archival purpose.
MODEM
The ordinary telephone lines transmit data in analog form.
Computers are digital devices and use digital signals for data
processing. Modems are used to connect digital computers with
telephone lines. Modem at the originating computer modulates
the digital signals and at the receiving computer demodulates
analog signals. It converts digital signals into analog signals for
transmission over telephone lines. At the other end of the
channel, the modem converts the analog signals back into digital
signals.
Computer Fundamentals 23
Digital signals Analog signals
/.
I Comp"'"
F7r Modem Channel
Types of Modem
Internal modem: This is built on a card and the card is
fixed into a slot on the motherboard of a computer.
External modem: It is external to the system and is plugged
into RS 232 or RS 232 C connector for computer communications.
Acoustic coupler modem: This is not direct modem. It
requires telephone handset as intermediary equipment.
Modems come in different speeds like 9.6 kbps, 33.6 kbps
etc. The modem speed should at least be equal to bandwidth of
the communication channel that sets the maximum size of data
that can be sent at a time. If the modem speed is less than the
bandwidth, modem will become a bottleneck in communication
as it slows down the rate of data transfer.
COMPUTER CRIMES
Computer crimes include theft of hardware and software
as well as wilful destruction of data etc. They are illegal acts
against computers or telecommunication facilities using
computers or telecommunications. They include:
Theft of hardware
Theft of software
Misuse of office computer for personal use
Stealing and misusing password to access databases
and sites without right to access them
Intercepting and misusing credit card information
Theft of corporate information
Hacking or cracking systems and sites
Hackers gain unauthorized access to computers and
telecommunication facility for the fun of it like hacking
into the NASA site.
Crackers gain unauthorized access to systems and
cause destruction to them. They may steal
Computer Fundamentals 27
information, destroy data, pirate software or deny
service.
Harmful effects
Computer causes some harmful effects for the individual.
Some of these are mentioned below.
Computers increase efficiency. It increases the leisure time
available for people. It makes people lazy by doing things much
quicker and more efficiently. They depend less and less on their
brainpower. Too much dependence on computer over a long
period may lead to loss of memory and mental skills.
Computer skill has become an essential qualification for
many jobs. Hence every job seeker is forced to acquire computer
skill even though one might have an inherent dislike for it.
Loss of importance at work place is another fallout of the
computerization. As computer steals away the individual roles
at work places, the employees might feel insignificant and
helpless. It will add to their stress and frustration.
The individuals will be exposed to some heath hazards like
radiation etc. Frequent and continuous use of computer exposes
the individual to certain health problems due to radiation and
also due to faulty sitting and working postures.
Computers and organizations
Organizations that use computer are benefited in a number
of ways. It is used in every area of business starting from data
entry to strategic decision-making.
SUMMARY
Computer is a system of electronic components that
performs tasks according to the instructions given to it. The
system consists of central processing unit, input-output devices
and storage devices. The CPU in turn comprises an arithmetic
logic unit, a control unit and main memory.
Computer peripherals are devices that facilitate
communication between the CPU of computer and the users.
Input devices, output devices and storage devices are common
peripheral devices. Keyboard is the most popular input device
and printer the most popular hard copy output deVice. Among
secondary storage devices, magnetic disks are very popular.
Computer is useri in almost all walks of human life. With
the rapid spread of computer literacy and declining cost of
computer, the computer use is expected to grow more rapidly
in the future. The Internet has spawned a new way of computer
use for communication world wide at very low costs. Computer
is expected to reach homes very soon in a big way and it would
usher in a new way of life with computer assistance for shopping,
education, work and what not. Computer, like any other tool,
has both positive and negative effects on individuals, business
34 Organisation of Computer
QUESTIONS
1. Define computer and describe its features.
2. What are the characteristics of computer?
3. What are the limitations of computer?
4. CPU is the brain of the computer'. Explain the components
and functions of CPU.
5. What are the elements of a computer system?
6. What is computer peripheral?
7. Explain the functions of I/O devices.
8. Describe the working of any five input devices.
9. Describe the working of any three output devices.
10. Describe any two secondary storage devices.
11. What is MICR? What is it used for?
12. What are the types of printers?
13. What is secondary storage?
14. What is magnetic disk? How are data stored on it?
15. What is magnetic tape? How are data stored on it?
16. What are the differences between magnetic tape and
magnetic disk?
17. What is disk pack? How does it work?
INTRODUCTION
Computer storage can be divided into primary storage and
secondary storage. Primary storage or main memory in the
computer provides fast access storage. The processor can access
it directly for data and instructions. Frequently used files and
programs are stored in the primary memory. Since primary
storage is expensive, only a limited amount can be stored
therein. Cache memory is another memory device. CPU can
access it much faster than main memory. But it is very expensive.
The secondary storage is used for bulk storage of data and
instructions. Large files and databases are stored on secondary
storage devices. These devices include hard disk, optical disks,
magnetic tapes and floppy disks. Data and instructions from
secondary storage devices are transferred to main memory and
cache memory in small measures for the CPU to access them
for processing.
Magnt:t.ic core technology and semiconductor t~(hnology
have been used to make the main memory of a computer system.
But today semiconductor technology is widely used for it. The
main memory is made up of memory cells. Each of them can
store one bit of data. This memory consists 1f electronic
components called semiconductor chips. Each chip contains
several hundred thou.sand transistors; each transistor represents
the binary state of a bit; on or off. Since a bit can store only
one value either l' or 0, the bits are grouped into sets of eight
bits called bytes. One byte can store one character of data.
36 Computer Memory
Memory locations are numbered 0,1,2,3, ... ; the unique number
assigned to each location is called its address . Memory is
measured in terms of kilobytes (KB) (that is, 210 or 1024 bytes,
roughly taken as 1000 bytes) and megabytes (MB) (that is, 220
or roughly 1,000,000 bytes). Gigabytes (GB) and Terrabytes (TB
are the other units of measure of storage. The main memory of
a computer is measured in terms of two characteristics viz.,
capacity and speed of access.
Computer Memory
MAIN MEMORY
The main memory is used to store data and instructions
currently required for processing. Main memory can be divided
into Random Access Memory (RAM) and Read Only Memory (ROM).
These memories are manufactured by using integrated electronic
circuits .. Both RAM and ROM are random access memories and
both can be used for reading purposes. The distinguishing
feature is RAM's ability to alter data stored in it, which is not
possible with ROM. Typically ROM is used to store system
instructions which are relatively permanent in nature. RAM is
volatile; that is, it loses its contents if the device is electrically
disconnected.
RAM descrit.es the way computers store and retrieve dota
and instructions from memory. It means that the processor has
direct access to each memory cell. Once the address of the
location is given the processor can write one character in that
location or read one out from it into memory from that location
without reference to other cells in the memory.
Contents of some memory chips cannot be modified or
rewritten. These memory chips are used to store data and
instructions that are relatively permanent. This memory is called
Computer Fundamentals 37
Read Only Memory and is used to store programs that are
essential for the proper operations of computer system. ROM is
non-volatile. Many computers especially microcomputers come
equipped with ROM chips that contain the operating system and
application programs. Programs stored in ROM chips are often
called firmware; that is, software built into the hardware.
RAM
The word 'random' means that the computer can access
any memory cell without accessing all cells sequentially. That
is, a memory is said to be random access memory if any part of
it can be accessed directly (randomly) for reading or writing
data in the same time irrespective of its location. In other
words, access to this memory is independent of physical storage
location of information on the medium. RAM is volatile as any
interruption in power supply results in loss of data in RAM. The
contents of the memory remain there as long as electrical
current is available to sustain the memory's pattern of positive
and negative charges which represent the two bits 1 and O.lf
power fails, all the contents in the memory will be lost.
Types of RAM
The various types of RAM are DRM, SDRAM, static RAM, Vide/)
RAM and flash RAM.
Dynamic Random Access Memory (DRAM)
It is one of the least expensive RAMs. But it requires
frequent power refreshing to retain memory contents.
SDRAM
SDRAM (Synchronous Dynamic Random Access Memory) is a
generic name for the types of DRAM that are synchronised with
the clock speed of the processor. The speed of SDRAM is
measured in terms of Megahertz. If the speed of the SDRAM and
processor is optimised, the processor can improve its
performance.
Static RAM
Static RAM does not need frequent power refreshing as is
required for DRAM. Hence, it is much faster than DRAM. But, it
is more expensive than DRAM.
38 Computer Memory
Video RAM
It is used to storE: data for the video display monitor. It is
actually a buffer between the processor and the monitor.
Flash RAM
Flash RAM or flash memory is a non-voLatile memory. It can
be erased and reprogrammed. It is used in PC cards of notebook
computers, digital camera, cell phones, embedded controllers
etc.
ROM
This memory uses MetaL Oxide Semiconductor TechnoLogy.
RAM is read-write memory whereas ROM is Read-OnLy-Memory.
This memory is used to store frequently used programs in the
system. ROM can be further divided into PROM, EPROM and
EEPROM.
RAM
ROM
Secondary
CPU Storage
SECONDARY STORAGE
MAIN MEMORY
PROGRAM
SEGMENTS
MEMORY
SUMMARY
Computer requires storage for data and instructions before,
during and after processing of data. Computer memory is divided
into main memory and auxiliary or secondary memory. The main
memory is fast access memory and is used for storing data and
instructions used very frequently. This memory is usually made
of semiconductor chips: RAM, ROM, cache and registers
constitute the primary memory. RAM is volatile. ROM is non-
volatile and read-only memory. ROM has variations like PRJM,
EPROM and EEPROM. Cache is a fast access and expensive
memory. Registers are special memory units for temporary
storage.
QUESTIONS
1. What is computer memory? How is it measured?
2. What is semiconductor memory? How is information held
in it?
3. What is main memory? Can a computer system function
without main memory?
Computer Fundamentals 43
4. What is ROM? What are the types of ROM?
5. What are the differences between RAM and ROM?
6. What is register? What are the types of registers?
7. What is secondary storage? What are the popular secondary
storage media?
8. What is virtual storage? What is the benefit of it?
9. What is cache memory? What function does it perform?
CH ' ER
INTRODUCTION
Computer'is one of the marvellous inventions of the recent
times. Its impact is felt in every walk of human life today. It is
extensively used in communications, commerce, education,
healthcare, weather forecasting, military, research and so on.
Computer literacy is increasingly becoming essential for carrying
out almost any human activity. It all started with a search for
aids in computing. Very humble beginning. It took quite a long
period of time to develop a fully functional computer. Yet, its
diffusion was very quick. Networking, fusion of information and
communications technologies, evolution of the Internet and its
widespread use all over the world are other major developments
in the area of information technology. Information technology
infrastructure has gained strategic importance for organisations
and nations world wide.
Necessity is the mother of invention. Man always wanted
to do some counting or computing. To begin with he used pebbles
to keep a count of the cattle taken out every day for grazing.
Modern man can count or calculate small numbers with ease,
but his requirement for data processing is so enormous that he
needs a machine that can instantly process the data captured
from source and provide real time response. The early devices
such as abacus and slide rule cannot keep pace with his needs.
The progress of man from pebbles to PCs is a great march in
technological history of mankind. Every human activity is
Computer Fundamentals 45
becoming increasingly information intensive. There is a growing
need to collect, process, store, retrieve and exercise control
over huge quantity of data. Computer is the tool that performs
these operations with great speed and efficiency. But computers
took long years to reach the present level of sophistication.
t-\istory of Computers
The history of computers dates back to the age when man
started using tools for computations. The whole history of
computing can be divided into two periods based on the
technology used in computing devices such as mechanical era
and electronic era.
Mechanical Era
Probably the first computing device was the abacus used
by the Chinese in the fifth century Be. This was used for
systematic calculation of arithmetic operations. The abacus is
a manual device that can make extremely rapid calculations. In
the early 17th century AD John Napier invented a calculating
device. This device could be used to multiply numbers by
manipulating the rods in this device. Later in 1643 Blaise Pascal
invented the mechanical adding machine called the Pascaline.
He used geared counter wheels that could be set to any of the
positions zero to nine. The geared tooth was used for carrying
one to the next position when 9 was reached.
G. W. Leibuitz, a German Mathematician, invented a machine
in 1671 that was capable of doing all arithmetic operations. It
could control the amount of adding and was the first multiplying
machine capable of all arithmetic operations. Although there
. were a number of improvements in calculating devices, yet no
conceptual changes were made until the end of the 18th century.
In 1804 Joseph Marie Jacquard, a French inventor, devised
a loom that used punched cards to direct the weaving pattern.
Jacquard's loom is the first known device to use instructions on
cards to "program" the operations of a machine.
Charles Babbage designed several devices which he called
engines. In 1822 he designed Difference Engine to calculate
life tables (Statistics of expectation of life) for insurance
business. This machine could do all arithmetic operations and
perform a sequence of operations automatically. As Babbage
worked, he developed the unique idea of storing instructions
46 Evolution of Computer
INPUT OUTPUT
DEVICE DEVICE
GENERATIONS OF COMPUTER
For simplifying and providing a framework for discussion
of the growth of computer industry, it is customary to break it
into generations of growth. Originally the term 'generation'
was used to distinguish between varying hardware technologies.
But since 1968, both hardware and software advances are
considered in the generations classification. These generations
represent major advances in computing technology.
First Generation (1946 - 1954)
The first electronic computer, ENIAC (Electronic Numerical
Integrator and calculator) was developed in 1947 at the
University of Pennsylvania, USA. This machine had vacuum tubes
as switching devices. Von Neumann introduced the concept of
stored program by around the same time and the first digital
computer using program, EDSAC (Electronic Delay Storage
Automatic Calculator), was announced in 1949. Later Remington
Rand of the USA developed the first commercial computer,
Univer~;).l Automatic Computer (UNIVAC) using this technology.
These vacuum tube-based computers could perform
computations in milliseconds. They were very large in size,
consumed lot of power dnd emitted too much of heat. They
required to be housed in large air-conditioned rooms.
During this period, computer programming was mainly done
in machine language. Assembly language was invented in the
early fifties. The concept of operating system was yet to develop.
The user had to be both an electronics expert and a programmer
to use the computer for any task.
Computer Fundamentals 49
Second Generation (1955 - 1964)
A big revolution in electronics took place in 1946 with the
invention of transistors by Bardeen, Brattain and Shockley. The
transistors were highly reliable and easier to handle and maintain
than the vacuum tubes. They required much less power. These
transistors replaced vacuum tubes in computers during this
period. Transistor based computers of this generation performed
the same function with more accuracy and speed than the first
generation computers. They were less expensive as well. Another
technological breakthrough during this period was the invention
of magnetic cores for storage. The magnetic cores were used to
construct large random access memories. Magnetic disk storage
was also developed during this period. Commercial applications
rapidly developed during this period and dominated computer
use by mid 1960s. Honeywell 400, IBM 7030 and UNIVAC LARC
are examples of computers of this generation.
This period also witnessed development of high level
languages (like FORTRAN, COBOL, ALGOL, and SNOWBOL) and
operating systems.
Third Generation (1965 - 1974)
During this generation, silicon transistors replaced
germanium transistors. Integrated circuits were developed
by interconnecting transistors, resistors and capacitors
grown on a single chip of silicon. Integrated Circuit (IC)
chips were used in computers. ICs were small in size, less power
consuming and less expensive than the previous switching
technology. Small-scale integration, which had components in
the order of 10 on a chip, gave way to medium scale integration
with components in the order of 100 per chip. Advances in
storage technologies resulted in creating large capacity magnetic
,disks and tapes and large magnetic core based random access
memory. IBM 360/370, CDC 6600 etc. are examples of computers
of this period.
On software front, high level languages were improved.
Fortran IV and optimising Fortran compilers were developed.
Standardisation of COBOL (COBOL 68) was another major
development during this period.
Fourth G,eneration (1975 - 1989)
The fourth generation computers were made using very
large scale integration technology. Tens of thousands of
50 Evolution of Computer
TYPES OF COMPUTER
Computers vary widely in terms of their size and purpose
they serve. There are very small computers that can be held
on a palm. There are also large computers that take a whole
room to occupy. They are used by big organisations, public and
private. Organisations use computers for a variety of applications
ranging from scientific to commercial in nature. The most widely
used computers are called personal computers that typically fit
on a desktop.
Computers can be class:ified on several bases as follows.
1. On the basis of electronics or the operaLng principle,
they can be classified into:
Analog computer
Digital computer
Hybrid computer
52 Evolution of Computer
SUMMARY
Though a firm foundation of the basic computing technology
was laid down by Charles Babbage in the first half of the 19th
century, yet the mankind had to wait a century and a half for
its real benefit to reach it. Though computers were developed
in the 1940's it took a few decades for the popularisation of
this wonder machine. The development and availability of
microcomputer usherpd in an era of ubiquitous computing. The
arrival of microcomputer has brought computing power within
the reach of small firms and homes. The introduction of
computers into data processing has revolutionised the whole
concept of data processing with its speed and accuracy of
processing and storage capacity. Over the last few decades,
the cost of computer has dropped drastically and at the same
time the machine's power has gone up many times from
generation to generation of computers.
Computer Fundamentals 57
QUESTIONS
1. What is meant by "generation of computers"?
2. Explain the various generations of computers
3. What are the types of computer?
4. What is personal computer?
5. What are the elements of computer system?
6. What is digital computer?
7. What is an analog computer and how is it different from a
digital computer?
8. What do you mean by general-purpose computer?
9. What is microprocessor?
CH ER
INTRODUCTION
Computer needs to be given instructions to perform any
task. A set of instructions for a specific task is termed a routine
and a complete set of instructions to execute a related set of
tasks is a program. Computer programs or software can be
divided into two major categories: systems software and
applications software. Application programs consist of programs
written for specific applications such as payroll processing and
sales analysis. System software is machine oriented , which
creates an environment for, and facilitates, the execution of
application software.
Software programs vary widely in size. A simple program
may consist of a few hundred lines of instructions in a
programming language, while a large one may consist of tens of
thousands of lines of instructions.
Hardware
System Software
Application Software
Operating System
Operating system establishes a link between application
programs and the computer itself. It also provides an interface
for the user with the machine. It executes application programs
by fully exploiting the available computing power. Today's
operating systems are highly sophisticated and are capable of
executing several programs simultaneously.
Assemblers
Programming in machine language is very difficult and
cumbersome. In their quest for more convenient language for
programming, the programmers began to use certain mnemonics
for each machine instruction and this language came to be called
assembly language. These mnemonics were translated into
machine language later for execution. Programs called
assemblers were written to automate the translation of assembly
language into machine language. The input to the assembler
program is called source program and the output in machine
language is called the object code.
An assembler is a program that accepts as input an assembly
language program-and produces its machine language equivalent
along with information for the loader. Assemblers are similar to
the interpreters except that each assembly language instruction
is translated into one machine instruction. In the interpreter
each instruction is translated into many instructions. The
assembler occupies less space in the memory of a computer
and it will operate faster than interpreters or compilers.
Computer Fundamentals 61
Compiler
The development of high level language made computer
programming a lot easier. But the computer does not understand
instructions in high level language. To overcome this
communication problem, system software was developed to
translate the instructions in high level language into machine
language instructions.
Compiler is a type of system software that translates source
code into object code and thus renders translator's job between
the machine and the user. The compiler is language specific
and each high level language requires a separate compiler for
it. For example a COBOL compiler can translate only source
program in COBOL into equivalent machine code. This software
is called compiler as it compiles a set of machine instructions
corresponding to each instruction in high level language. A
program in high-level language is called source program or source
code and after converting into machine language, it is called
object code or object program. The source program and object
program are basically the same but they differ in the stage of
development. They also differ in terms of the space occupied
in computer memory.
During compilation the compiler analyses each statement
in the source code and generates a sequence of machine
instructions to carry out precisely the same operation specified
by the statement. As the compiler analyses each statement it
uncovers certain types of errors called diagnostic errors such
as the following:
(a) Invalid characters
(b) Illegal combination of characters, and
(c) Wrong sequence of instructions in a source program
When errors are located during compilation, such errors
are displayed or listed by the compiler for the programmer to
modify the source program. Thus, it can locate syntax errors.
Each language has a set of syntax rules, a system of notations
to be used, etc. The compiler can detect only the syntax errors
and cannot detect logical type of errors, which the programmer
has to detect and correct.
Interpreters
Interpreter is another type of system software used to
translate the source code in high level language into machine
62 Computer Software
OPERATING SYSTEM
Initially there was no operating system and early computers
were very large machines run from a console. The programmer
after writing the program in machine language would manually
load it into memory directly from the operator's console. The
programmer would monitor right from the starting to the
completion of execution of the program. If errors were detected,
the programmer would stop execution, check the contents of
memory and debug the program directly from the console. The
output was printed or punched on paper tape or cards. The
important feature of this environment was its interactive nature;
the programmer was also the operator of the computer system.
Later, advances in hardware and software technology led
to the development of card readers, line printers, magnetic
64 Computer Software
disks and tape etc. Assemblers, loader and linkers were designed
to ease the programming task. Libraries of common functions
were created. Common functions could then be copied into a
new program without being written again and again. Routines
that performed input - output operations were written for each
110 device called device driver, which knows how the buffers,
flags, registers, control bits and status bits for a particular device
should be used. Each device driver required careful programming
for the complex device specific operations. Instead of writing
the necessary code every time for each 1/0 device, the device
driver was simply used from the library. Later compilers made
coding much easier for the programmer.
Operating system is an integrated system of programs that
manages the resources of a computer, controls the various
activities of the computer and provides support services to users.
The two major purposes of operating system are to enhance
productivity of computer resources and provide user-friendly
interface. It consists of a set of programs that enables a
computer to manage its resources efficiently. It manages the
computer resources (such as input and output devices, memory
and processor) far more efficiently and effectively than a human
operator.
An operating system is designed as a huge modular program
that manages the overall operations of a computer. It is a master
control program that acts as a manager, housekeeper and traffic
police for the computer system. It allocates resources for running
different application programs, tracks the use of computer
resources and ensures efficient use of resources. Application
programs are run under the supervision of the operating system
in the environment set by it. It loads programs into memory,
performs input/output operations and communicates with the
user as to the state of processing, errors etc.
Operating system ~ets up the computer envirCl:1ment. A
personal computer requires a single-user environment. Many
. operating systems are available for personal computers. They
include MS DOS, 05/2, MAC for Apple Macintosh computers, XENIX
which is the microcomputer version of UNIX from the Microsoft
Corporation and MS Windows. Windows is rapidly growing in
popularity and has replaced disk operating systems such as PC
DOS and MS DOS on personal computers. A multi-user system
environment is provided by operating systems like UNIX, Windows
Computer Fundamentals 65
NT or Linux. A networked computer system requires a network
operating system like Novell NetWare.
Functions of Operating System
An operating system performs the following functions:
1. Resource management
Allocation of computer resources such as memory to various
jobs is done by the operating system. It manages hard disk
storage, the CPU, main memory and other peripheral devices.
2. Data management
Operating system provides data management facilities such
as data organisation and retrieval from secondary storage
devices. Files are created, named, read, deleted and renamed
by the operating system.
3. Job management
In multi-user systems, it selects new jobs for execution
according to the priority fixed.
4. Input/output management
It manages the flow of data and instructions between the
input/output devices and primary storage. It allocates and
manages 110 devices. It provides I/O instructions to start
printing, stop printing etc. If user intervention is required, for
example, when printer is run out of paper, the operating system
sends an appropriate message to the user.
5. Maintaining Security etc.
Maintain security, communication of error and error control
messages to the users, etc. are the other functions of the
operating system.
6. Conflict resolution
When two or more programs call for the same resource
simultaneously, it results in conflict. Conflict resolution is
another major function of the operating system in multi-user
systems. In resolving conflict between applications, the
operating system takes into account factors like criticality of
applications, priority of the user etc. and allocates resources
accordingly. Many operating systems have a set of modules that
can be tailored for the requirements of users.
66 Computer Software
APPLICATION SOFTWARE
Computer is a marvellous tool and its application possibility
is limited only by imagination. It is particularly helpful in carrying
out any repetitive kind of activity. The system software sets an
environment for carrying out tasks. Software is required to tell
the computer to process data or perform any activity. The
software that instructs the computer to perform activities
desired by users is called application software.
Application software can be developed in-house by
computer personnel or by hired staff (custom-built) or it can be
acquired from software vendors (off-the-shelf). Off-the-shelf
packages are available for general processing needs like
accounting, inventory management etc.
A software package is an integrated suite of programs
developed to carry out certain specified tasks. An application
system generally consists of a set of program~ and related
procedures to accomplish information processing. The cost of
developing a large application, that is custom-built package,
Computer Fundamentals 79
SECURITY ISSUES
The security threat may be either due to natural disasters
like flood, earthquake etc. or due to human error. The human
error may be malicious or inadvertent. Either way the
consequence can be disastrous. Particularly serious is the
malicious action that often causes security problems. The
security issues include loss of data, corruption of data, alteration
or mutilation of data etc. It may concern the integrity of data,
secrecy and security of data. The security aspect covers the
accidental or deliberate actions leading to loss of data.
Physical security
The measures to be taken to ensure physical security of
the system include:
Control access to systems and deny access to
unauthorized people.
Maintain systems under dust free environment under
controlled temperature.
Ensure continuous power supply by Installing UPS and
back up facilities.
Have facilities to prevent fire and fight it if it happens.
Prevent rodents, pests etc. from entering the rooms,
86 Computer Software
Data security
The steps to be taken to improve data security include:
Ensure fool proof transaction acceptance for online
or interactive transaction processing systems
Prevent loss, tapping etc. during data transmission
Keep the relevant old master file and transaction file
so that it is possible to reconstruct the current master
file anytime if it is tampered or destroyed by fire,
flood, earth quake etc.
Take proper care of archived data. Some times, data
are kept archived for months without reading the tapes
etc. Later, they may become unreadable or
irretrievable. It is a good practice to read the data
from tapes etc. once every few months.
Conduct proper audit of hardware every year
Keep track of software changes so that there will not
be software version conflict etc.
Never use pirated software, particularly application
software, that is most vulnerable to attacks.
Have planned monitoring of access to systems to
detect unauthorised access and prevent them.
SECURITY MEASURES
Organisations need to put in place certain safeguards for
protecting their computer and information resources against
unauthorized access, disasters and system failure.
Firewall
Firewall is a combination of software and hardware that
prevents hackers and others from infiltrating a computer or
internal network from an outside network. It is simply a barrier
between two networks. One of the networks is internal that is
trusted and the other is external to the organisation. The
external network is not trusted. Firewalls are designed to
protect an organisation's network, its data and systems. Fire
walls check incoming and outgoing packets of data and block or
let them flow in according to a set of rules defined by the
administrator.
computer Fundamentals 87
Firewalls are particularly important in the Internet
environment. The firewall in the following illustration may
automatically allow or deny access to the web server based on
the set of rules coded into it.
RDBMS
Password
Password, as the name indicates, is a set of characters
that form a string of certain length. Each user of a system or
network is given a login name and a password for identifying
him or her to the system. The password is used in controlling
access to information resources.
Each user is identified by the login name and password.
When the user turns on the machine, the system asks for typing
in his or her login name and password. If the login and password
are right, the system permits access to the information resources
that the user is authorized to access. If the login or password or
both are wrong, the user is denied access to it. Thus the
password-based access control protects information resources
by preventing unauthorised access.
Encryption
It is the altering of data so that it is not usable unless the
changes are undone, that is, de-encrypted. It is particularly
useful when sensitive data are transmitted over a public
network. Encryption is used to prevent unauthorized access to
any message sent over telecommunication networks. It involves
scrambling of data at the sender's end, transmitting scrambled
data over the communication line and unscrambling the data at
the recipient's end. A pair of keys (public key and private key)
is used to encrypt and decrypt the message. The sender encrypts
the message with the public key of the recipient. Only the
recipient's private key can decrypt the encrypted message.
88 Computer Sr ., j re
Sender Recipient
Digital Signature
A digital signature is the equivalent of an ink signature for
physical documents. It is used to verify authenticity of the sender
of the message. Electronic messages may be intercepted and
tampered. With digital signature, it is possible to know whether
the message has been tampered or not. The sender of the
message uses his private key to generate the 5lgnature. The
signature is attached to the message that is sent to a recipient.
Digital signature is an electronic identifier that uses
cryptography technology to ensure its reliability. It uses a digest
function to summarise the content of an electronic message.
The digest function reduces the message into more manageable
chunk of data. This data chunk is decrypted using the public
key of the recipient. The recipient uses his private key to decrypt
electronic message. The recipient can then use the same digest
function to decrypt data chunk received using the public keY'of
the sender. If the two digest results match, then the message
has been certified as signed. Thus it ensures security of data
sent over public communication networks and also authenticates
the source of the message.
Digital Certificate
Digital certificate is used to validate the identity of the
message sender to the recipient. It is used to protect the identity
of the users and to provide security for electronic transactions.
A trusted third party, called certifying authority, provides the
authentication. The certifying authority verifies the identity of
the digital certificate user and provides information about the
identity of the user and the public key allotted to that user.
The message recipient can use the public key in decrypting the
message received. The recipient can also send encrypted
message using the information from the certifying authority to
the sender of the message.
Computer Fundamentals 89
Disaster recovery plans
These are methods of restoring information processing
operations that were disrupted or ha i ted by destruction or
accident. It is required to restart operations quickly after any
disruption in its normal operations.
SUMMARY
Computer needs to be instructed to do tasks. The sets of
instructions to computer for carrying out tasks are called
program or software. Computer software is of two types: system
software and application software. The 5ystem software makes
the computer manage its resources optimally and offer a user-
friendly interface. The development of system software during
the second generation of computers was a great event in the
computer history. By enabling non-expert users to use the
computer with ease, it helped in spreading the computer use to
all walks of human activity. The system software aims at efficient
management of the system resources and greater convenience
to users. The system software is usually purchased along with
the computer. The application software is specific to the tasks
to be performed. It generates the information output required
by the user. Hence, development of application software starts
with the identification of user needs. Very often application
programs are developed using in-house resources. But the
growing trend in PC software is to move away from custom-
built packages to off-the-shelf packages, which are less
expensive and user-friendlier than the former.
QUESTIONS
1. What is operating system? What are the functions of
operating system?
2. What is multiprocessing?
3. What is multiprogramming?
4. How js multiprocessing different from multiprogramming?
5. What are the advantages and limitations of multiprocessing?
6. What is time-sharing?
7. What are the advantages and limitations of time-sharing?
8. What is DOS? What are the hardware requirements for DOS?
90 Computer Software
WINDOWS SERIES
Windows series includes the following operating system
packages.
Windows 3.1
Windows 3.1 expands on the DOS operating system. Windows
3.1 uses DOS operating system. It employs graphic user interface
(GUI) technology. Users can activate programs from windows
using icons or symbols. An icon is a picture on the screen that
represents an action or application that the computer can
implement. It requires a mouse to run. Multiple windows open
multiple applications that are invoked.
Windows 95
Windows 95 is a powerful operating system that enhances
the speed and performance of microcomputers. It uses about
92 Microsoft Windows
Document Area
Scro ll Bar
Sta tus Bar
WINDOWS ACCESSORIES
Microsoft Windows is a highly user-friendly PC operating
system. It has a large number of feature-rich applications.
Windows accessories are a set of utilities tucked away under
programs. These accessories can be used to perform various
98 Microsoft Windows
6. To save the new file, click File menu, click Save As,
and then type a name in File name.
WordPad saves the file as .doc file. It can be opened in
WordPad or in MS Word.
Clipboard
Clipboard is a temporary storage that Windows uses for storing
all kinds of data. When user cuts or copies any text, image or
data, Windows moves the object or text etc. to the clipboard. The
user can paste it to any file or location from the clipboard.
Clipboard content changes with every copy or cut operation of the
user. The contents disappear whenever the user quits Windows or
shuts down the computer. The contents from the clipboard can
also be saved to the disk using file menu of clipboard viewer.
To move anything to the clipboard, select the object or text
etc., then choose cut or copy from the Editmenu. The keyboard
short cuts (Ctrl+C for copy and Ctrl+X for cutting) can also be
used. It copies the content copied to the clipboard. The clipboard
content can be moved to other files by clicking paste on Edit menu
(or Ctrl + V). The user can use Clipboard Viewer to view the contents
of the Windows clipboard. To start Clipboard Viewer:
102 Microsoft Windows
Click Start,
Point to Programs,
Point to Accessories,
Point to System Tools, and then,
Click Clipboard Viewer.
The content on clipboard can be deleted by displaying it
with clipboard viewer and pressing Del key.
System Tools
The system tools in accessories contain a few useful tools.
These tools include disk defragmenter, maintenance wizard,
scandisk etc.
Disk Defragmenter
Disk Defragmenter optimizes the speed with which the
computer loads and runs programs. With quick startup and
shutdown, the user can work, play games, and explore the
Internet faster and more efficiently.
Using Disk Defragmenter to speed up access to your hard disk
The user can use the Disk Defragmenter to rearrange files
and unused space on the hard disk so that programs run faster.
Disk Defragmenter can be started by clicking Start, pointing to
Programs, pointing to Accessories, pointing to System Tools, and
then clicking Disk Defragmenter.
Maintenance Wizard
Maintenance wizard helps in getting the best performance
from the computer system. Maintenance wizard makes programs
to run faster, checks hard disk for problems, and frees hard
disk space. By scheduling these utilities to run on a regular
basis, it can be ensured that the computer is performing at its
best. For example, by leaving a computer on overnight, it can
be scheduled to run them at a specified time each night, once
a week, or other intervals of user's choice.
Starting the Maintenance wizard.
Maintenance wizard can be started by clicking Start,
painting to Programs, pointing to Accessories, pointing
to System Tools, and then clicking Maintenance wizard.
The computer must be on during scheduled
maintenance tasks.
Computer Fundamentals 103
Windows 98 will attempt to wake up some computers
to run the scheduled Maintenance task. If the computer
supports Advanced Power Management (APM) 1.2 or
Advanced Configuration and Power Interface (ACPI)
the tasks will attempt to run when the computer is in
suspend mode.
Scandisk
This is another useful system tool to cneck floppy disk and
hard disk for problems. It checks the total disk space, errors on
the disk and reports to the user after completion of the scanning
of the disk for errors.
Entertainment
The entertainment applications include CD player, sound
recorder, Interactive CD Sampler and Windows media player.
The entertainment applications can be activated as follows:
Click start
Point to Programs
Point to Accessories
Point to Entertainment, and,
Click on the application to activate it
Internet Tools
These tools are Internet connection Wizard, NetMeeting,
Personal Web Server and Web Publishing Wizard.
Communications
The communications facilities include Dialup Networking
and Phone Dialer.
Drive Converter
Drive Converter (FAT32) is an improved version of the File
Allocation Table (FAT) that allows hard drives over two gigabytes
to be formatted as a single drive. Drive Converter uses smaller
clusters than FAT drives, resulting in more efficient space use.
Windows 98 includes a graphical Drive Converter conversion
utility, which quickly and safely converts a hard drive from the
original FAT to FAT32.
Introduction to Task Scheduler
By using Task Scheduler, a user can schedule tasks (such as
Disk Defragmenter) to .run at a time that is most convenient for
104 Microsoft Windows
SUMMARY
MS Windows is a user friendly operating system software.
It is the most popular PC operating system software in the world.
Windows accessories are a bundle of utility programs. These
utilities are grouped under accessories in programs menu. These
accessories include Notepad, WordPad, Disk Defragmenter, Paint,
Calculator, Communications tools, Internet tools, Scandisk,
Entertainment tools CD player, sound recorder, etc.
QUESTIONS
1. What is Windows? Explain its features.
2. How do you install Windows operating system?
3. Explain the various Windows accessory utilities.
4. What is the use of Notepad in Windows?
5. Explain the process of creating and formatting a document
in WordPad.
6. What is 'Paint' in Windows? Explain its use.
7. Explain the working of clipboard? What are its uses in
information management?
8. What is the use of task scheduler?
REFERENCE
1. Microsoft Windows 98 SE online help.
CH
INTRODUCTION
Computer based problem solving requires coding of a
sequence of operations leading to a solution. The problem is to
be analysed to develop the logic for solving it. The program
design is represented by means of flowcharts, pseudo code,
structured English etc. and checked before being coded in a
programming language. Presentation to and discussion of the
program logic with other programmers lead to detection and
correction of logical errors.
When code is written up, it is checked for errors
(independent inspection). Usually the program is written in a
high level language and the language compiler detects syntax
errors. The program is modified and compiled again and again
until it is free from syntax errors. When the source code is
free of syntax errors, it is .due for test runs (called dry runs).
These test runs help in detecting logical errors.
Algorithm
Computer-based problem solving should proceed
systematically. There should be a step-by-step progression
towards a solution. The small steps or operations to be
performed are arranged in their natural order or sequence. This
sequence of instructions for solving a problem is called
algorithm. That is, algorithm represents the logic of processing.
Thus, algorithm is a sequence of precise and unambiguous
Computer Fundamentals 107
instructions for solving a problem in a finite number of
operations. If these operations are sequentially carried out, it
results in the desired output.
Developing an algorithm requires a high degree of
ingenuity. It specifies a sequence of operations in order to
achieve a goal. The sequence of instructions to be called
algorithm should possess the following characteristics:
i. Each and every instruction should be precise and
unambiguous.
ii. Each operation must be capable of being performed
in a finite time.
iii. No operation shall be repeated infinitely that prevents
termination of the algorithm.
iv. The algorithm should lead to the solution of the
problem.
The following is an example of algorithm to find the total
number of male and female employees in an organisation.
Step 1 Initialise the Total-males and Total-Females as zero
Step 2 Open the Employee file for input
Step 3 Start at the first record
Step 4 Read the record
Step 5 Check the sex field whether it is 'M' or 'F'
Step 6 If the sex is 'M' add 1 to Total-Males
Step 7 If the sex is 'F' add 1 to Total-Females
Step 8 IF file-end is not reached, go to Step 4
Step 9 Print Total-Males and Total -Females
Step 10 Stop
Techniques for Program Development
Program development is a laborious task requiring a great
lot of brain and skill. A lot of tools and techniques have been
developed to aid designing and programming work. Some of the
techniques employed for greater efficiency in program
development are:
Modular programming,
Structured programming, and,
Top down and bottom up design.
108 Program Development
Modular Programming
An effective approach to program development is to break
down a large problem into a series of smaller and more
understandable tasks. Modular programming employs systems
approach to programming. Large problem is divided into less
complex sub problems. The sub-problem is further divided into
small manageable problems. This refinement process is carried
out until the original problem, which is too complex, can be
directly solved. Thus when all the modules or sub-programs
written to solve sub-problems are integrated, it gives a master
program that solves the original problem.
The concept of modular programming is that all programs
should consist of a number of modules with little interaction
between them. Each module is made up of a group of
instructions. Each module should be performing one identifiable
function largely independent of other modules so that
modification can be done easily without affecting other modules.
Complex programs are difficult to design, code, test and
debug. To simplify the entire program development work,
modular programming divides a large program into a number of
small and simple modules. Since the modules are so designed
that they are independent of other modules, they can be coded,
tested and debugged by small groups of programmers separately.
Initially, general modules are designed, coded and tested. These
modules are than used by other modules. Modular programming
facilitates easy coding, testing and debugging of large and
complex program. It also helps in allotting program development
work among a number of programmers.
Thus the programmer may first develop a main program
that is used to outline the major segments that are needed to
solve a problem. The main program specifies the order in which
each subordinate module in the program will be processed. The
programming analysis stage continues until every module has
been reduced to the point that the programmer is confident
that a solution can be worked out at that level. All the modules
required for the main problem is integrated wfth the main or
control program and as and when required each module is
invoked to perform the task it is designed to carry out. An
instruction in the control program, such as CALL PROCEDURE
Computer Fundamentals 109
Loop Properties
1. Do ... while -Loop exit is pre-tested
-Loop exit when loop condition
evaluates false
While condition -loop "may be skipped
do
statements
enddo.
2. Repeat. ... until
Repeat ... -loop exit is post tested
-loop exit when loop condition
evaluates true
-must be executed at least once.
Until condition.
3. For... next
for i in range 1 to N -loop exit after a specific number
of iterations
do -loop exit when loop counter
exceeds the end-value
statements
enddo. -loop is pre-tested
-loop may be skipped
Example:
For i in range 1 to 5
accept name;
display name;
enddo.
These three iteration constructs or loop constructs execute
the statements given within the loop until certain condition is
satisfied. Loop represents a reversal in the program flow.
Loop Components
A loop has four components, such as:
i. loop initialisation. It is the preparation required
before entering a loop: setting accumulators and
counters.
computer Fundamentals 113
STUDENT I
Fee Payment
1.0
I Record
Receipt payment
2.0
'to
l Deposit
Fee data money
Update Fee data
Student into bank
yBANK
Master
l ! ~1 STUDENT
Dues data
L __ MASTER
I Depo5it data
I
Fig. 6.1: Data Flow Diagram
Data Dictionary
Any computerised system will have a large number of data
types and large volume of data to be stored and accessed. Details
about these data types, data store etc. are stored in a data
dictionary for reference. A single data item may be referred to
by different names. Each data type must have a unique name
and other users should know aliases if they are used. For
example, inventory code may be labelled as I-code, inv-code,
invent-code, inventory-code etc. The data dictionary helps in
avoiding redundancy in data storage. It provides a complete
documentation of all elements of DFD namely data items, data
flows and data stores.
Data Type: data item/ data store/ data flow.
Data Name: name of data item/data store/data flow.
Data aliases: alternate names used for convenience by
multiple users.
Data Description: a short description of data, explained in
simple terms.
Data Characteristics: characteristics of each data type such .
as numeric or alphanumeric, and width.
A data store is characterised by its composition (set of
data terms) organisation sequential, indexed, random), etc. A
data flow is characterised by its origin, destination, etc.
Computer Fundamentals 115
Decision Table
A decision table is similar to a flowchart in construction
and use. It shows conditions and actions in a simplified and
orderly manner. By presenting logical alternatives under various
operating conditions, it enables a decision-maker to think
through a problem and present its solution in compact notation.
It permits a computer problem to be divided into logical
segments that provide multilevel structure in the problem
analysis. At the highest level, decision tables can be used for
an overall system by referring to lower level tables, resulting in
a modular approach. The purpose of a decision table is to
assemble and present complex decision logic in such a way as
to facilitate easy understanding of its meaning. This can be
used independently of, or as complementary to, the flowcharts.
Example: A company classifies its customers into class I,
class II, class III categories based on the amount due and duration
for which the amount was due. Class I if the period is less than
one month, class II if a customer owes Rs 25,000 or more for a
period not less than two months and if he owes less than Rs.
25,000 for more than three months, other customers are
categorised as class III.
Amount Less than Rs.25000 Y Y Y Y N N N N
Prionty treatment
No Priority treatment
Priority treatment
No
No Priority treatment
Legend
1. Customer for 10 years or more?
2. Transaction value more than Rs.100,000?
3. Transaction value more than Rs.500,000?
Pseudo code
Pseudo code is another analysis tool that helps in developing
and checking program logic. 'Pseudo' means false or imita.tion
and 'code' means program instructions. It describes the program
logic using English language and certain programming language
control words such as if ... then. It is in fact a description of
logic independent of any programming language. It lists in plain
English language the sequence of operations necessary to solve
a problem. Sentences are generally written line by line, each
line for one sentence, with proper indentation. For Pseudo
code rules of syntax are not strict. The purpose is to allow easy
Computer Fundamentals 117
readability and proper documentation. Pseudo code is not
language oriented and uses plain English for detailing the
sequence. The lines are properly intended for ease in reading
and understanding the sequence of operations. Iteration
constructs (repeat ... until and Do while ... Enddo statements), and
selection constructs (if .. then .. else and if .. else if .. statements)
are also used in detailing the processing.
Differences between Pseudo Code and Flowcharts
Pseudo code is self-explanatory since it is in plain English.
It does not require separate documentation. It uses a structure
similar to that of basic program. Whereas flowcharts tend to
extend in all directions and their paths of instructions do not
conform to the final basic code.
Advantages of Pseudo code over Flowchart
Less cumbersome and time consuming,
Easier to modify,
Easier to code directly from Pseudo code, and
Easily readable and understandable due to the use of
proper indentation and program structures.
Procedure for computer based problem solving
Computer-based problem solving proceeds systematically
from problem to solution. The steps in computer-based problem
solving can be identified as follows:
i. Define the problem and understand it thoroughly.
ii. Draw up a list of variables that are needed to solve
the problem.
iii. Design the layout of output format.
iv. Select the programming technique that is able to solve
the problem.
v. Code, test and debug the program.
vi. Use data validation procedure to guard against
processing of wrong data.
Example 1. Write a pseudo code for accepting two numbers
as input and to display the larger number.
DISPLAY "ENTER ANY TWO NUMBERS";
ACCEPT NUM-1, NUM-2;
118 Program Development
IF NUM-1 > NUM-2 .
THEN
DISPLAY" THE LARGER NUMBER IS", NUM-1;
ELSE
DISPLAY" THE LARGER NUMBER IS", NUM-2;
ENDIF.
Example 2. Write a pseudo code to find the sum of first N
natural numbers and display the sum after accepting N from
the user.
DISPLAY" ENTER A NUMBER TO FIND SUM OF N NUMBERS";
ACCEPT N;
SUM = 0;
FOR I IN RANGE 1 TO N
DO
SUM <- SUM + I;
ENDDO;
DISPLAY" THE SUM OF", N, "NUMBERS IS", SUM.
Example3: Write a pseudo code for the following. A
wholesaler offers a trade discount of 3% on orders up to 5000
units and 5% on orders exceeding 5,000 units. Accept product
code, quantity and rate as input and display product code,
quantity, gross amount, trade discount and net amount as output.
DISPLAY "ENTER PRODUCT-CODE, QUANTITY, RATE";
ACCEPT PROD-CODE, PROD-QTY, PROD-RATE;
IF PROD-QTY <= 5000
THEN
DISCOUNT-RATE <- 0.03;
ELSE
DISCOUNT-RATE <- 0.05;
GROSS-AMOUNT <-PROD-QTY * PROD-RATE;
TRADE-DISCOUNT <- GROSS-AMOUNT * DISCOUNT-RATE;
NET-AMOUNT <- GROSS-AMOUNT- TRADE-DISCOUNT;
DISPLAY PROD-CODE, PROD-QTY, GROSS-AMOUNT,
TRADE-DISCOUNT, NET-AMOUNT.
computer Fundamentals 119
Characteristics of a good programmer
A good programmer should have the following
characteristics.
(a) Technical skills. He should have adequate knowledge
of programming languages and practices.
(b) Communication skills. He should have good
communication skills as he has to interact with
analysts, designers and users.
(c) Patience and self-discipline. Program logic
development follows a step-by-step approach to
solution. The programmer should thoroughly check the
program logic several times to find better ways of
solving it.
(d) Balanced personality. A good programmer should
acknowledge his weaknesses and deficiencies and
should welcome constructive criticism from other
analysts, designers, programmers and users.
Characteristics of a good program
A good computer program should have the following
characteristics.
1. It should be correct. It should give the correct result
in terms of the algorithm being exercised.
2. It should be reliable. That is it should function properly
for a long time.
3. It should not break down when running, that is, it
should be robust.
4. It should be efficient in development.
5. It should be efficient in execution.
6. It should be easy to use.
7. It should be maintainable.
8. It should be testable.
9. It should be portable.
10. It should be unique. That is, in any situation it should
give one and only one result.
120 Program Development
FLOWCHARTING
Program flowchart is a tool that aids program
development. Before writing a program, it is usual to draw
program flowchart to arrive at the correct program logic. A
flowchart is a diagrammatic representation of program logic.
Program logic refers to the order in which the computer executes
the statements in a program. It illustrates the sequence of
operations to be performed to arrive at a solution. The
operations are placed in boxes and arrows connect the boxes in
the order of execution. A structured flowchart is thus a diagram
that depicts an algorithm. Flowcharting is the process of
representing system's processes and sequences of operations
through charts.
The flowcharts simplify the reasoning process and present
the sequence of steps to the solution. Construction of flowchart
is a valuable exercise in arriving at the right logical solution of
a problem. Flowcharts are widely used to facilitate better
understanding of methods, processes or systems. The
construction of flowcharts is in conformity with human tendency
to read from left to right and top to bottom. A deviation from
this natural flow is allowed if it improves the presentation.
Kinds of Flowcharts
There are several types of flowcharts. The flowcharts most
often used in structured programming are (a) System flowchart
and (b) Program flowchart.
(a) System Flowchart
The system flowchart defines the broad processing in an
organisation showing origin of data, file structure, processing
to be performed, output to be generated and necessity of any
off-line operation. System analysts use it to describe the data
flow and operations for a data processing cycle. It depicts the
flow of data through all parts of a sy~tem with a minimum of
detail. Generally it shows the entry of input into the system,
how the input is processed and how it is passed out in the form
of output.
(b) Program Flowchart.
Programmers normally use it to represent pictorially the
sequence of operations to solve a problem. It is used to check
the program logic and perfect it. It plans the program structure
and serves the purpose of documentation of a program.
computer Fundamentals 121
Advantages of Flowcharts
They are mostly used to help the programmers in developing
the program logic and also to serve as documentation for a
completed prograf!l. It also has several other advantages.
1. It is a convenient method of communication
2. It indicates very clearly just what is being done.
3. It is a key to correct programming
4. It is an important tool in planning and designing a
new system
5. It avoids many inconveniences that may arise in future
and serves the purpose of documentation for a system
6. It provides an overview of the system and also indicates
the relationship between the various steps.
7. It facilitates trouble shooting.
8. It promotes logical accuracy.
9. It makes sure that no logical path is left incomplete
without any action being taken.
Program Flowchart Symbols
a) Terminal symbol: This is used to indicate the beginning
or ending of a program.
b) Input I Output .Symbol: 1/0 symbol is used to denote
inputs into, or output from, the process.
c) Process symbol: This represents some processing of
data. There is one entry into the process box and one
exit out of it.
d) Decision symbol: This shows a decision situation.
There is one entry into the box and two or three exits
out of it. But good programming restricts exits to two.
e) Sub-routine Symbol: This denotes that a separate
module is designed to handle a task. It helps in
simplifying a complex program by giving an overall
idea of the program logic.
f) Flow line symbol: This shows the direction of flow of
program. This symbol connects all other symbols.
g) Connector symbol: This is used to avoid loops criss-
crossing each other on a program chart.
122 Program Development
Input/Output
L--/___7
Process
0 Decision
Sub-routine
II
04
~
" Flow line
Connector
0
F;g.6.4: Flowchart symbols
Flowcharting: Examples
1. Draw a flowchart to find and print the largest of the
three distinct numbers X, Y and Z.
( START)
+
No
START
~
~
Fig.6.6: Flowchart. to print each two-digit even number
and its square.
,.
Program Development
INPUTN
FACT=l
C=2
FACT=FACT xC
C=C+l
PRINT FACT
STOP
( START)
INPUTN
SUM=Q
A=l
SUM=SUM+(A x A)
A=A+l
PRINT SUM
STOP
LPRINTSUM 7
Fjg.6.8: Flowchart to add and djsplay N terms of the
series s= 1+4+9 ....
COMPILING
Programming is done in a high level language. Computer
dOs not understand high level language. Therefore, the high
level program (source code) must be converted into machine
126 Program Development
DEBUGGING
Debugging is the process of removing errors from a program.
The program may have various types of errors. If a program has
any error, it cannot produce the desired output. Hence, all errors
must be detected and removed. A program may have three types
of errors.
TYPES OF ERRORS
Syntax errors
Each programming language has a character set and certain
rules for programming. For example, each language has certain
rules for combining characters into words, for variable types
and names etc. If these rules are violated, they result in syntax
errors. Syntax errors can be detected at the time of compiling.
Logical errors
This type of errors occurs due to error in processing data.
For example, to find the value of a purchase by a customer, the
program must find the product of the unit price and the number
of units purchased by the CJstomer. If the program finds the
sum of these two numbers, it results in logical error.
Run-time errors
These errors occur only when the program is executed. So,
they are called run-time errors. For example, a program may try
to open a file which is not created. Since it needs that file for
input or output operation, the program cannot complete its
execution.
Computer Fundamentals 127
PROGRAM TESTING
Program may have errors. Testing is the process of checking
the program for errors. Testing starts once the programmers
finish coding work. The test is done in three stages: unit testing,
integration testing and system testing. These will be followed
by acceptance testing.
Unit Testing
Large programs are divided into a number of modules for fast
coding and testing. A module is part of a large program. Many such
parts make up a single program. Each module is then assigned to a
programmer or a group of programmers. So, many teams of
programmers work on different modules of the program. Once a
module is fully coded by a team, it starts testing the module.
Module level testing is called unit testing. Each module is tested
for errors according to a pre-decided test plan. The errors in each
module are detected and corrected at the unit test stage.
Integration testing
This test is done step by step by integrating one module
with another module. It starts with a root module. It is combined
with its subordinate module and tested for accuracy. Then, more
modules are added one by one and tested. Each time any error
detected is corrected. This process is continued until all modules
are connected together and all errors are removed. This kind of
testing helps in localising errors and correcting them quickly.
System Testing
The procedure of integration testing is followed in system
testing. Here modules and programs are tested a number of
times for errors. At this stage, instead of modules, programs
are integrated into system. Errors are located and corrected as
integration progresses. This process is continued till the software
system does not throw up any error s.
Acceptance Testing
Acceptance testing is the last stage of testing. It is done
with real transaction data at the user's site. This may be done
in two stages- alpha and beta. Alpha testing is done with
simulated data. Beta testing is done by the user with live data.
Acceptance testing means whether the user is satisfied with
the software. If the software meets his needs, he accepts it by
128 Program Development
signing off on the system. The sign off is the end of software
development and installation.
SUMMARY
Program development requires a thorough understanding of the
problem to be solved. For better understanding and development of
sound program logic, a number of aids have been developed.
Flowcharts, pseudo code, decision table, decision tree and data flow
diagrams facilitate the problem solving and program design. Flowcharts
are aids to human understanding of complex phenomena and they
are frequently used by information systems people as aids in systems
design. Structured programming helps in improving programmer
productivity and quicker development of applications.
QUESTIONS
1. What is structured programming? What are the programming
constructs used in structured programming?
2. Explain any two iteration constructs.
3. What is DFD?
4. What is DD? What is its role in systems development?
5. What is decision tree?
6. What is pseudo code? How is it different from program
flowchart?
7. What are the characteristics of a good programmer?
8. What are the characteristics of good program?
9. What is flo'.Nchart? What are the kinds of flowchart?
10. What is system flowchart?
11. What is program flowchart?
12. What are the symbols used in program flowchart?
13. What are the advantages of flowchart?
14. Draw up a flowcharl to accept any twa numbers and display
their product.
15. Draw a flowchart to find and display the largest of any
three numbers.
16. Draw a flow chart to find and print the sum of the series
1,5,9, ... ,n.
17. "Flowcharting is a programming aid". Justify the statement.
CH
INTRODUCTION
Word processing is one of the most popular applications of
computer. It is used for creating and manipulating text
documents. Word processing on computer significantly reduced
the labour involved in document creation, communication and
. management. Basically, a word processor does all that a
typewriter does. But the similarity ends there. With a word
processor, documents are electronically produced, stored or
communicated. If a hard copy output of the document is needed,
the printer connected to the computer generates it.
Word processing means the process of manipulation of text
using computers. It includes entering, editing, formatting and
manipulation of text on a computer screen and printing of the
processed text. The text is saved on the computer as a file for
future use. It avoids retyping to correct an error or omission.
The document can be modified easily without retyping the whole
text. Document templates can be designed and stored for future
use. It saves lot of labour. Documents can be combined, and
blocks of text can be moved back and forth. Automatic spelling
check, grammar check, insertion of images from other files etc.
are some other useful features of word processors.
Features of Word Processing
Word processing software makes document generation and
management veryfficient. The currently available word processing
software has a large number of features that take the drudgery
130 Word Processing
A line of text Move the pointer to the left of the line until it
changes to a right-pointing arrow, and then click.
Multiple lines of text Move the pointer to the left of the lines until it
changes to a right-pointing arrow, and then drag up
or down.
Multiple paragraphs Move the pointer to the left of the paragraphs until
it changes to a right-pointing arrow, and then
double-click and drag up or down_
A large block of text Click at the start of the selection, scroll to the end
of the selection, and then hold down SHIFT and click.
An entire document Move the pointer to the left of any document text
until it changes to a right-pointing arrow, and then
triple-click.
FORMATTING TEXT
There are several ways of formatting text in Word. They
include toolbars, menus and keyboard short cuts.
Aligning Text
The first align button from the left, aligns text left. The
second button centres text, the third button aligns text right
and the last one makes the selected text fully justified.
Underlining, Boldfacing and Italicizing Text
To format with toolbar, select the text and then point and
click on the appropriate icon on formatting toolbar. Word will
change the style of the text depending upon the icon clicked. If
B is clicked, it makes the selected text boldfaced. If I is clicked,
it italicises the selected text. If U is clicked, it underlines the
selected text. For example, to print ttle word" Microsoft" in
bold face and italicised, choose the text "Microsoft' and then
click on B and I in the formatting toolbar.
Automatic Bullets and Numbering
Text can be easily bulleted and numbered by clicking
'Bullets and Numbering' on Format menu. To add bullets and
numbering, the procedure is as follows:
Select the items to add bullets or numbers.
On the formatting toolbar, click bullets to add bullets or
click 'numbering' to add numbers.
To create a bulleted or numbered list automatically as the
user types, type 1. or * (asterisk), press SPACEBAR or TAB, and
then type any text. When the user presses Enter key to add the
next list item, Word automatically inserts the next number or
bullet. To finish the list, press Enter key twice. It can also be
done by pressing BACKSPACE to delete the last bullet or number
in the list.
Copying and Moving - Using Cut, copy, and Paste
Text or objects can be copied or moved from one place in
the document to another easily by cutting and copying the text
or object and pasting it to the appropriate place or places in
the document. Steps for cutting and pasting text in a document
are:
Computer Fundamentals 1 39
1. Select the text
2. Click 'cut' on ' Edit' menu or use cut butfon on the
toolbar. It can also be done by the keyboard shortcut Ctr+X.
3. Move the cursor to the place where the text is to be
moved or copied.
4. Paste the text by choosing Paste from Edit menu or
clicking Paste button . It can also be done by the keyboard
shortcut Ctrl+V.
cuning cq>ying the text or object to the clipboard and posting from the clipboard to
appropriate place or places in the document. Step; for cutting and pasting text m a documel11:
1. "rmtttJtt;'
Choose cutfrmn Edit meoo or use cll! button on the toolbar. It can also be done by the uy,oanl
shortcll! Ctr+X. MS Word moves the selected text to the clipboanl.
2 Move the CUISor to the place where the text is to be moved or copied.
3. Paste the text bychoosing Poste from EdJ! morru or clicking on Paste bu!ton It can also be
do"" by the keyboard shortcll! Ctrl+V .
,:1 ''
~--------------------------- - -------
".V,)HJj X--:~}~:;.n>
. --
.>~,>\\"';
- -- ----------------- :
Header and Footer
.._.. _.._-----_.-
_-_._ .. _.
-_....
--- _._- _
___ '1_'_.
... __..._-
...
_ _ _ _ _ _ _ _ _ _ . . . .l J _
........
_ _ _ ' - 11 _ _ _ _ _ _ _
--_..- ---_.._._.
::---::=-.:--=::.:.:.:.~:-.::=
....... _ .. _a __ _
MI _ _ _ _ _ _ _ _ _ . _
.. ._.'.1..._____ ...I_..
==-.:'':'~:=.'=:l:-=:::=--:.!~
:::-.:::...=:.:=Wf-:..~--
.'._
.... _-_ .. _
..._..............-.....
..
~_.n_._._.I_._
-_
1_ _ _ 1 _ _ _ _ _ _
--._--_- ...._._-_
__._-
. ....
::==!.-:.-:':--:.-:=,!!:~:~:
.-
:~'=~":':'=.'==.::a=-=:~-:,=:
::.:::: ............
==:~=~-::=
_
..:::.::.-:.-::
1_. ___...-
_ . _ _ _ 11 _ _ _ _ _
--______
_1 ____ -.'_'--'_
_'''__'''l1li_'_----_.
_ _ ...... _ 1_
~=..:.==.:a=---.--.
:-.:::===.:-
!==--=
Background Printing
Word allows the user to work on document and print a
document in the background. Word uses Windows background
printing facility for it. The computer may get a little slower
when background printing is on. The user can turn off the
background printing, if needed. The steps to turn off this feature
are:
Click 'Option' on the 'Tools' menu
Click on print tab
Click the box for background printing again to clear the
box
To restore this feature, repeat the above ste~s.
Merge Printing
Merge printing is a facility in Word to print personalized
form letters. This can be used to print personalized letters when
the text of the letter to be sent to many persons is more or less
148 Word Processing
Dear
You have been short listed for personal i nterview for the post mentioned above .
You are therefore requested to report at 9 am in our office at the above address
on July 15 , 2006 . You will be paid second-class train fare from your city to
Mumbai and back. Please confirm your attending the interview by email or a
letter before July 10, 2006.
Thank you .
Yours faithfully,
For Dotcom Solutions Limited
Umesh Rao,
Senior Manager, HR .
Dear Ajay,
Sub: Interview for the post of Asst.Manager.
Ref: Your application for the post.
You have been short listed for personal interview for the post mentioned above.
You are therefore requested to report at 9 am in our office at the above address
on July 15, 2006. You will be paid secondclass train fare from your city to
Mumbai and back. Please confirm your attending the interview by email or a
letter before July 10, 2006.
Thank you.
Yours faithfully,
For Dotcom Solutions Limited
Umesh Rao,
Senior Manager, HR.
Graphics
There are two basic types of graphics available in Microsoft
Word for enriching documents: drawing objects and pictures.
Drawing objects include AutoShapes, curves, lines, and WordArt
drawing objects. These objects are part of Word document. Use
the Drawing toolbar to change and enhance these objects with
colors, patterns, borders, and other effects.
Pictures are graphics that were created from another file.
They include bitmaps, scanned pictures and photographs, and
clip art. The user can change and enhance pictures by using the
options on the Picture toolbar and a limited number of options
on the Drawing tool bar.
152 Word Processing
it is not on your computer, the installer loads it, and then Word
creates the document.
If you click Customize instead of Install Now when you
first run the Setup program, additional templates and wizards
are available for you to select and install.
To make all Word templates and wizards available on your
computer, run the Setup program again and select More
Templates and Macros (expand Microsoft Word, and then
expand Wizards and Templates).
Mailing labels
You can use the Envelopes and Labels command to print
the same address on a single label, or on an entire sheet of
labels. You can also use this feature to create other types of
labels and cards, such as file folder labels, name badges,
business cards, rotary cards, and postcards. After you create
the labels, you can print them right away. Or you can save the
labels in a new document for later editing and printing.
Using Table in Word
A table is made up of rows and columns of cells that you
can fill with text and graphics. Tables are often used to organize
and present information, but they have a variety of other uses
as well. You can use tables to align numbers in columns, and
then sort and perform calculations on them. You can also use
tables to create interesting page layouts and arrange text and
graphics.
Creating new tables
You_can quickly create a simple table by using the Insert
Table command, or you can use the Draw Table tool to quickly
create a more complex table - for example, one that contains
cells of different heights or a varying number of columns per
row. Using Draw Table is similar to drawing a rectangle on graph
paper - first, draw a line from one corner of the table to the
corner diagonally opposite in order to define the boundary of
the entire table, and then draw the column and row lines inside.
Format painter
Format painter helps in copying a format from a paragraph
to another in a document or in any other document. To copy
character formatting, select the text that has the formatting
Computer Fundamentals 155
you want to copy. On the Standard toolbar, click Format Painter,
and then select the paragraph or text you want to apply the
formatting.
SUMMARY
Word processing is one of the most popular applications of
personal computer. Computer-based word processing
significantly improves efficiency of office workers involved in
document creation, communication and management. With a
word processor, documents are electronically produced and
stored. It minimizes the wastage in creating error-free
documents as the document is generated only after all
corrections and modifications are done on the screen.
MS Word is the most popular word processing software
available today. It has enormous features for creating, editing,
format~ing and printing documents. Any kind of document
management work starting from simple documents to desk top
publishing work can be done in MS Word.
QUESTIONS
1. What is word processing? What are the advantages of
computer -based word processing?
2. What are the features of word processing software?
3. Explain the advantages of word processing software.
4. Describe the process of creating a document in MS Word.
5. What is scrolling? How do you use it in MS Word?
6. What are the text formatting facilities available in Word?
7. How do you insert a table into a Word document?
8. How do you insert header and footer in a word document?
9. Explain the use of AutoFormat feature of Word?
10. Explain the parts of a Word window
11. Explain how a document is printed in Word.
12. What is merge printing? Explain how it is done in MS Word?
CH ER
INTRODUCTION
Electronic spreadsheet stores information in the memory
of computer, performs data manipulation and displays results
quickly. Spreadsheet software can be saved, moved or printed.
The spreadsheet serves the needs of a wide range of computer
users. Spreadsheet applications include preparation of reports,
payrolls, bills, income statements, budgets, loan analysis,
investment analysis, inventory control and production analysis.
There are many spreadsl1eet packages, and of them Microsoft
Excel is the most popular one.
Microsoft Excel 2000 comes in a software suite called
Microsoft Office 2000. MS Office contains five most popular and
powerful windows applications. They are Access, Word, Excel,
PowerPoint and Outlook. Access is a relational database
application, Word is a word processor, Excel is electronic
spreadsheet, PowerPoint is presentation application and Mail is
electronic communication software. Microsoft Office permits
data in one of the applications to be copied, inserted or imported
to any of. the other applications in the package.
Advantages of Spreadsheet
calculation can be done easily and quickly
it produces accurate results
data in a worksheet can be displayed and manipulated.
Computer Fundamentals 157
data can be converted into graph
the entire worksheet or part of it can be printed.
facilitates carrying out 'what if' analysis
the data in a worksheet can be transferred to other
programs easily.
Microsoft Excel 2000
Microsoft Excel is a powerful spreadsheet application. It is
very easy to learn and use just like any other Windows-based
application from Microsoft Corporation. The spreadsheet has
integrated three components: worksheet, graph and database
into it. It is possible to enter data into the worksheet, perform
calculations and generate graphs and charts. Excel also permits
creation and management of database.
Microsoft Excel is a Windows product and uses almost the
same Windows features as Microsoft Word. The menus and tool
bars are almost the same. They also permit transfer of files
between applications.
Excel's basic file format is a workbook. Each workbook can
hold many worksheets. Excel workbook contains three blank
worksheets by default. An index tab at the bottom of the
worksheet identifies each worksheet as sheet 1, sheet 2 etc.
Excel worksheet data, charts and graphs can be easily
transferred to MS PowerPoint and MS Word.
Worksheets are made up of cells arrayed in columns and
rows. The rows are identified by numbers 1,2, ... and the columns
by letters like A, B, ... Each cell has a unique address made up
of the column and row labels like A1, B5 etc.
Parts of a Worksheet
Microsoft Excel follows most of the Windows conventions.
The Windows 'look and feel' is seen in Excel as well. Excel
worksheet contains toolbars, menu bar, status area, formatting
toolbar and control boxes.
Rows and Columns
The worksheet is made up of rows and columns. By default
Excel displays nine columns and eighteen rows. Each worksheet
contains 256 columns and 65 .536 rows. Each column is labeled
as A, B, C and so on. Each row is numbered 1, 2, 3 and so on.
158 Microsoft Excel
Scenario manager
The Scenario Manager helps in performing 'what if' analysis
in Excel. For example, if the finance manager wants to know
the effect of price changes on profitability of products, he can
use Scenario Manager and provide the data to it to generate
the information.
Presentation features
Excel's slide show feature can be used for presentations.
The slide show can contain worksheets, charts, graphics and
sound.
Macros
A macro is a series of commands and functions that are
stored in a Visual Basic module and can be run anytime the user
wants to perform that task. When a macro is created, Excel
stores information about each step done to perform a series of
commands. The macro can be run to repeat the tasks whenever
needed, For instance, if a macro is developed to format text
,entered in a format, then that macro can be run to format- text
entered in any other cell. Macros save a lot of time and effort.
162 Microsoft Excel
'Click' Open
In the 'Look in' box, click the drive or folder that contains
the workbook to be moved.
In the folder list, double-click folders until the folder that
contains the workbook opens. If the workbook is not found, it
can be found by the 'search' feature.
If the workbook is not found in the folder list, the user can
search for it.
Right-click the workbook to be moved, and then click 'Cut'
on the shortcut menu.
In the 'Look in' box, click the drive or folder to which the
workbook is to be moved.
In the folder list, double-click folder to open it, into which
the workbook is to be moved.
Right-click in the folder list (make sure a workbook is not
selected), and then click 'Paste' on the shortcut menu. The
'Paste' command is not available if a workbook is selected in
the foldef iist.
Renaming a workbook
A workbcok can be renamed by the following procedure.
Click 'Open' on File menu
In the 'Look in' box, click the drive or folder that contains
the workbook to be renamed.
In the folder list, double-click the folder that contains the
workbook to be renamed. The folder is open now and displays
the workbooks.
Right-click the workbook to be renamed, and then click
'Rename' on the shortcut menu.
Type the new name, and then press ENTER.
An open workbook cannot be renamed. To rename it, close
it first and do the above steps.
Entering numbers, text, a date, or a time in the worksheet
Click the cell where the data date is to be entered. Type
the date and press ENTER or TAB. Use a slash or a hyphen to
separate the parts of a date; for example, type 1/5/2006 or 5-
January-2006.
computer Fundamentals 165
move to A1. Type 'Sales' and press enter key (Down arrow can
also be used to move down by one row). The cell pointer moves
into A2. Type 'Variable cost' and press Enter key. Again the cell
pointer moves down by one cell into A3. Type 'Fixed Expenses'
and press Enter key.
Now, click cell 'B1', type '3000000' into the cell and press
Enter key. The cell pointer moves down into B2. Type '1800000'
in B2 and press Enter key again. The cell pointer moves into B3
now. Type '700000' and press Enter key. The data is on the
worksheet now.
key.
-
Click in cell B8, type the formula =B5-B3 and press Enter
1000000
....: 25
2800000 .
300000
1200000 .
The user can select the type of chart from the Chart Wizard,
(by default the column type is selected), and click 'Next'. Chart
Wizard displays the data range selected and the chart formed.
Click 'Next' if the data selected is right (otherwise, select the
data area including labels by mouse click). Now, Chart Wizard
asks the user to specify the location for creating it: either as an
object in the same worksheet or as a new sheet. If the user
wants it in the same sheet, he can click 'Finish'. Now the chart
created can be formatted. For instance, the legend can be
placed on the right top corner of the chart area, the data labels
can be formatted to accommodate long data labels etc. The
chart created is displayed in Fig. 8.10.
FUNCTIONS IN EXCEL
A function is a predefined formula in Excel. It performs
calculation by using specific values, called arguments, in a
particular order, or structure. For example, the SUM function
Computer Fundamentals 177
Type is the number or 1 and indicates when payment is
due. If payment is made at the beginning of the period , type 1.
If payment is made at the end of the period, then type
omit this entry. Let us take an example. A customer approaches
or
a Bank for a car loan of Rs. 200000. The bank charges @12%
interest per annum on car loan. The customer is willing to repay
the loan @ RsAOOO at the end of each month. NPER(0.01/12, -
4000,200000,0,0) returns 69 .66. That is, approximately 70
months.
PMT Function
This function calculates the payment for a loan based on
constant payments and a constant interest rate.
Syntax
PMT(rate,nper, pv, fv, type)
Rate is the interest rate for the loan.
Nper is the total number of payments for the loan.
Pv is the present value, or the total amount that a series
of future payments is worth now; also known as the principal.
Computer Fundamentals 181
NPV Function
The NPV function calculates the net present value of an
investment by using a discount rate and a series of future
payments (negative values) and income (positive values).
Syntax
NPV(rate, value1, value2, ... )
Rate is the rate of discount over the length of one period.
It is 12 % in the example given below.
ValLie1, value2, ... are 1 to 29 arguments representing
the payments and income.
Value1, value2, ... must be equally spaced in time and 0ccur
at the end of each period.
NPV uses the order of value1, value2, ... to interpret the
order of cash flows. Be sure to enter the payment and income
values in the correct sequence.
Arguments that are numbers, empty cells, logical values,
or text representations of numbers are counted; arguments that
are error values or text that cannot be translated into numbers
are ignored.
Computer Fundamentals 183
If an argument is an array or reference, only numbers in
that array or reference are counted. Empty cells, logical values,
text , or error values in the array or reference are ignored.
In the example given below, we have taken investment of
Rs.500,000 for Project 1and Rs.800 ,000 for Project 2. These
investments are cash outflows and hence they are shown as
negative numbers. The investment is assumed to be made in
Year 0 and the income to be received in the next ten years.
Statistical Functions
There are a number of statistical functions in Excel. The
use of some of these is explained below.
AVERAGE
This function calculates average (arithmetic mean) of the
numbers. To use the function , click the cell where Excel should
display the computed value and click Function Wizard. Click
'Statistical' in the Paste Function' box and AVERAGE in the
Function name box. In the dialogue box either enter the numbers
or specify the range of numbers. Excel calculates the arithmetic
average and displays the value in the cell chosen.
Syntax
AVERAGE(number1,number2, ... )
Number1, number2, ... are 1 to 30 numeric arguments
for which the average is to be computed.
STDEV
Estimates standard deviation based on a sample. The
standard deviation is a measure of how widely values are
dispersed from the average value (the mean).
Syntax
STDEV(number1 ,number2, ... )
Number1, number2,... are 1 to 30 number arguments
corresponding to a sample of a population. Instead of typing
numbers, it is also possible to specify a range of numbers by
selecting them by mouse.
VAR
This function estimates variance based on a sample. For
finding variance, follow the steps as in average and click VAR
instead of AVERAGE. Specify the range of numbers in Value 1
box and click OK. Excel inserts the calculated value of variance
of the range of numbers in the cell from where the function
was invoked.
Syntax
VAR(number1 ,number2, ; .. )
Number1 ,number2,... are 1 to 30 number arguments
corresponding to a sample of a population.
Computer Fundamentals 185
CORREl
The CORREL function returns the correlation coefficient
of the array1 and array2 cell ranges. Use the correlation
coefficient to determine the relationship between two
properties. Syntax
CORREL(array1,array2)
Array1 is a cell range of values.
Array2 is a second cell range of values.
Excel also has a number of statistical tools for testing of
inference such as Z t,est, F test and T test.
ZTEST
Returns the two-tailed P-value of a z-test. The z-test
generates a standard score for x with respect to the data set ,
array, and returns the two-tailed probability for the normal
distribution. This function can be used to assess the likelihood
that a particular observation is drawn from a particular
population.
186 Microsoft Excel
Syntax
ZTEST(array,x,sigma)
Array is the array or range of data against which to test
x.
X is the value to test.
Sigma is the population (known) standard deviation. If
omitted, the sample standard deviation is used.
FTEST
This function returns the result of an F-test. An F-test
returns the one-tailed probability that the variances in array1
and array2 are not significantly different. This test can be used
to determine whether two samples have different variances.
Syntax
FTEST(array1,array2)
Array1 is the first array or range of data.
Array2 is the second "array or range of data.
DATABASE IN WORKSHEET
Database is a collection of related data organized in a
meaningful way. Data is stored in tables in a database. A table
is a collection of related records. Each record contains a number
of fields. For example, in case of an inventory file the fields
can be Inventory code (Inv-code), Inventory Description (Desc),
Inventory Quantity (Qty) and Rate.
Only flat databases can be created in Excel. The database
in Excel can at best be described as a list. In a flat database,
column represents fields and row repr~sents record.
Creating a Database in Excel
A database can be created anywhere in a worksheet. But,
it must be separate from other data in the worksheet. This is
necessary for the worksheet to recognize the database. A number
of database functions are available in Excel like DMAX, DMIN,
DAVERAGE and DCOUNT.
The following rules may be observed in creating a database
in Excel.
Computer Fundamentals 187
The first row of the database must be used for field
names (that is, the column headings)
The field names must be unique.
Records must be entered without leaving any empty
row between field names and the first record in the
database.
Each row must contain one full record.
Let us now create an inventory database in Excel as follows.
Goal Seek
Goal seek helps in getting a target value, say a profit of
Rs.5 per unit by varying input values of some cells (say cost or
sales price). For example, if you take a car loan of Rs.200,000
at 12 %interest per annum for five years, the monthly installment
can be calculated as follows.
Using the PMT function, the amount to be paid monthly is
calculated as Rs.4448.89. Suppose one wants to find out the
rate of interest at which he or she should borrow so that the
monthly payment is only Rs.4000. For this we can use Goal Seek.
Move to the result cell B8. Click Tools and select Goal Seek
from the pull down menu. Set cell is automatically selected as
B8. Enter 4000 in the box against 'To value' , click the next box
against 'By changing cell' and choose B5. Click OK or press Enter
key, EXCEL calculates the rate of interest as 0.074201. That is,
if the borrower gets the loan of Rs.200000 at 7.4201 % interest
per annum for five years, the monthly installment will be
Rs.4000.
Computer Fundamentals 189
-200000
0.12
60
-200000
0 .074201 ;
<.<-- -- ........"".
60 ;
Fig. 8.20: Using Goal Seek to find the new interest rate.
190 Microsoft Excel
Solver
Solver is another EXCEL tool that can be used to
determine the maximum, or minimum value of one cell by
changing other cells - for example, the maximum profit you
can generate by changing advertising expenditures. The cells
you select must be related through formulae on the
worksheet. If not related, changing one cell will not change
the other.
Some times the Solver may not be displayed on tools
menu. In that case it must be installed by clicking 'Solver
add-in'. Let us now see how the solver tool can be used to
define and solve a problem.
1. On the Tools menu, click Solver.
2. In the Set Target Cell box, enter a cell reference
or name for the target cell. The target cell must contain a
formula.
3. To have the value of the target cell be as large as
possible, click Max.
To have the value of the target cell be as small as
possible, click Min.
To have the target cell be a certain value, click Value
of, and then type the value in the box.
4. In the By Changing Cells box, enter a name or
reference for each adjustable cell, separating nonadjacent
references with commas. The adjustable cells must be related
directly or indirectly to the target cell. You can specify up
to 200 adjustable cells.
To have Solver automatically propose the adjustable cells
based on the target cell, click Guess.
5. In the Subject to the Constraints box, enter any
you want to apply.
6. Click Solve.
7. To keep the solution values on the worksheet, click
Keep Solver Solution in the Solver Results dialog box.
To restore . the original data, click Restore Original
Values.
Computer Fundamentals 191
Applications in accounting
EXCEL can be used for routine accounting tasks. EXCEL
can be used for accounting in most small firms that do not
keep elaborate records. The transactions can be entered into
a worksheet. Preparation of ledgers and final accounts
involves the following steps:
Complete journal entries in the first worksheet, let us
call it Journal worksheet.
Save the worksheet in a different name. This leaves the
original journal worksheet intact.
Sort the new journal worksheet on ascending or
descending order after selecting all the entries
Now all the transactions with the same account heads
appear together.
Insert a line at the end of each such collection of same
account heads like salaries, wages etc.
Find the total of such account heads
Click next worksheet, (let us call it Trial Balance work
sheet) enter account heads there such as salaries, wages
etc.
Click the amount column against salary in the Trial
Balance worksheet, type '=' and click the cell where total
of the salary account is put in the journal worksheet.
Now the total of salaries paid during the period appears
in the cell against salary in the Trial Balance worksheet.
Continue this way for all the account heads.
When the Trial Balance preparation is completed, open
another worksheet for Trading, Profit and loss Account.
Enter the account heads of all expenses and incomes in
the Trading and pal worksheet.
In the next column click the cell and enter '=" in that
cell in the Trading, Profit and loss worksheet against all
expenses, and click the amount against each corresponding
item in the Trial Balance worksheet.
Similarly, against each income head of account, click
the cell and type '=' and then click the corresponding cell in
Trial Balance worksheet.
192 Microsoft Excel
SUMMARY
Spreadsheet serves the needs of a wide range of
computer users. There are many spreadsheet packages and
of them Microsoft Excel is the most popular.
Microsoft Excel 2000 is a spreadsheet software. It is part
of the MS Office suite from the legendary Microsoft
Corporation, USA. The spreadsheet can be used for any kind
of computing tasks ranging from simple calculations to
complex statistical analysis for research purposes. Excel
organizes worksheets into workbooks. Each workbook can
contain several worksheets. Every worksheet is made of 256
columns and 65,536 rows, and it can hold huge quantity of
data.
Excel has simple charting techniques like the
ChartWizard that takes the user through four steps to make
a neatly drawn chart. It has many chart types to choose from.
Excel also has a number of mathematical, statistical and
finance functions for data analysis.
QUESTIONS
1. What is spreadsheet? What are the features of a
spreadsheet?
2. What are the advantages of spreadsheet?
3. What is MS Excel? How is a workbook opened in Excel?
4. What are the parts of a worksheet?
5. How do you print a worksheet in Excel?
6. Explain the use of AutoFormat in Excel.
7. Explain the use of Excel's Function Wizard.
8. How do you format a worksheet in Excel?
9. What is Print Preview? How do you use it in Excel?
10. How do you create a chart in Excel?
11. Explain some of the mathematical functions in Excel.
194 Microsoft Excel
INTRODUCTION
The primary memory of a computer is limited and hence
programs and data are deleted from primary memory once their
use is over. These programs and data are organised into files for
permanent storage on secondary storage device for reuse. These
files are structured in a particular way depending upon the type
of access required and the media on which they are stored. If
the data requires quick access, it is stored on disks and if it
requires only serial processing the data is usually stored on tape.
The file is made up of a number of records. The records
are a group of fields and each field is made up of some bits of
data. Each file is given a name for its identify. The name
generally consists of two parts: the first is a single-word name
and the second, a three-letter extension name to indicate the
type of file. For instance .COB, . PRG etc. for program files and
.OBF, .OAT etc. for data files. For example, in stock.dat, stock
is the first part of the file name and .dat is the extension.
A file holds records of logically similar data. Each record
consists of a set of fields for data. Each field holds. data of
defined nature like date field holds only dates, name field holds
only names, etc. The computer files are organised on physical
storage devices like magnetic tape, disk and CD-ROM.
196 Database System
Roll no, name, sex and address are the field names. Each
field reserves some spaces for storage of respective data. For
example, Roll No has a 7 byte storage space, Name has 30 bytes
storage and so on. Roll No field holds data items 9501101,
9501105 and 9501112 as roll numbers of students. ARUN GOKUL,
RAJESH KUMAR etc. are data items in the name field. Each line
of fields relates to an entity: student. Attributes of the student-
entity such as roll no, sex and address become the field names.
Data fields hold the basic elements of data in them. All
attributes of an entity taken together form a record. When
such related records are put together, that collection is called
a file. Record d,esign can be logical or physical. Logical design
represents the logical relationship among the data items in the
field. The physical record design means the way data items are
physically stored on some media like disk and tape,
198 Database System
File Organisation
The file organisation means the way the records are written
up in a file and depends on:
(i) File activity,
(ii) Volatility of information, and
(iii) Storage device
File activity means the properties of records processed in
one run. If only a few records are accessed in a single run,
activity is low. If the file activity is low, it can be stored on disk
device for efficient file processing. On the other hand, if a
good number of records are accessed in any given time, the file
activity is high and such files can be stored on tapes so that
processing is more efficient and less costly.
File volatility means the proportion of record changes. If
records are changed very frequently, the volatility is very high.
For high volatility files such as seat reservation files in a
transport firm, disk medium is more efficient and offers a finite
access. If only.magnetic tapes are available, then files are
organised in sequential organisation. On the other hand
magnetic disks offer more flexibility as they support both
sequential access and direct access.
Other considerations in file organisation are:
(i) Response time; direct access for quick response
(ii) Cost of storage medium
(iii) Volume of storage, and,
(iv) Security of data
Methods of File Organisation
1) Serial file organisation
2) Sequential organisation
3) Indexed sequential organisation
4) Direct file organisation
1. Serial file Organisation
The records in a serial file are stored randomly and are
generally appended at the end of a file as the data originate.
The logical order of records with respect to a key field does not
bear any relation to the order of physical storage of such records
in the file. It is also referred to as non-keyed sequential file.
computer Fundamentals 199
2. Sequential file organisation
This file can be created on a magnetic tape or disk. Each
record is written up on the tape or disk one by one logically
ordered on one or more key fields. For example, ordering can
be in the ascending order of roll no in case of a student file.
The records are stored on a sorted order. If new records are
added or existing records are deleted, the file has to be re-
sorted in case of disk file. If the file is stored on a magnetic
tape, another new file has to be created to update the existing
file with the changes to be effected since creation or last update
of the file. This is done to maintain the proper sequence of the
records in the file. The advantages of sequential file are simple
organisation and ease in accessing records sequentially.
To minimise the cost of update, the new records are
bunched in a transaction file and the master file (that is the
original file which is relatively permanent) is updated in a single
run leading to the creation of a new master file. This file update
is called grand father-father-son update, as there will be three
files any time.
3. Indexed-sequential file organisation
An index is a combination of key and storage address of
records. This file organisation creates an index file in addition
to the data file created. The index file holds pairs of key and
storage address of records in the data file. The index file helps
in randomly locating records in the data file as the physical
storage location of the record is obtained from the index file.
This file organisation supports both sequential access ard random
access of records in the file.
4. Direct File Organisation
These files are created on disks or CD-ROMs. In direct file
organisation a hashing technique is used to generate storage
address of records in the file. There are quite a number of ways
of converting a key (such as roll no for a student file, and
product-code for an inventory file) to a numeric value. The keys
may be numeric, alphabetic or alphanumeric. In the case of
alphabetic and alphanumeric keys, numeric key value has to be
generated. Direct mapping is done by performing some
arithmetic manipulation of the key value, called hashing. The
hashing function, h (k), generates a value for each key, WhlCh is
200 Database System
SUMMARY
The information in the computer is held in files, which are
made up of logically related records. The files are organised in
any of the four modes: serial, sequential, indexed-sequential
or direct. Only the last two can support direct access and are
stored on direct access media such as magnetic disk. File
updating is the process of making files current by incorporating
changes into the files and the modes of file update are direct
update and grandfather-father-son update.
Database technol~gy is one 01 the fastest growing
information technologies. The database system stores huge
quantity of data and facilitates quick retrieval of data. The
database permits concurrent sharing of data resources to
multiple users. It avoids duplication in storage and data
inconsistency. In short, it facilitates managing information as
an organisational resource.
210 Database System
QUESTIONS
1. What is file?" How is it organised?
2. What are the methods of file organisation?
3. What is file updating? How is it done?
4. Describe how direct file updating is done.
5. What is sequential access?
6. What is direct access? Compare direct access and sequential
access.
7. What is master file? How is it updated?
8. What is database? What are the advantages of database
system?
9. Why should an organisation have a database system?
10. What is DBMS? What are the components of DBMS?
11. Why should an organisation have a database administrator?
12. What is database structure? What are the basiC database
structures?
13. What is data mining?
REFERENCE
1. Date, c.J., An Introduction to Database Systems Vol.1.,
Narosa Publishing House, New Delhi 1996, pp11-12.
c
INTRODUCTION
Microsoft Access is part of Microsoft Office suite. It is a
relational database application. Large quantity of data can be
stored and managed with Access. The data can be easily
retrieved for business applications. Access contains facilities
to create queries and generate reports for meeting managerial
and operational needs for information in an organisation.
Table is a basic unit of storing data in Access. Each row in
the table represents a record made up of a number of fields.
Queries are designed to extract a set of data from a database
for use. For example, if a Bank Manager wants to know the list
of customers with overdue loan accounts on a particular date,
a query can be designed for it. On running the query, Access
will generate the list of customers with overdue accounts and
display it for user on the screen. Report is another useful facility
in Access. Report presents information based on data drawn
from multiple tables. Report can be designed easily with the
Report Wizard in a few steps. If the user wants, report design
view can be used to design flexible reports.
Data Types in MS Access
Data type is a detailed coding scheme recognized by system
software, such as a DBMS, for representing organizational data.
Each database system will specify the choices of data type
available for users. Data types in MS Access are: Text, Memo,
212 MS Access
CREATING A TABLE
Microsoft Access provides two ways to create a table. You
can create a blank (empty) table for entering your own data, or
you can create a table using existing data from another source.
Database can be created with Database Wizard or without using
Database Wizard.
Computer Fundamentals 215
Creating a database using the Database Wizard
1. When Microsoft Access first starts up, a dialog box is
automatically displayed with options to create a new database
or open an existing one. If this dialog box is displayed, click
Database Wizard, and then click OK.
If you have already opened a database or closed the dialog
box that displays when Microsoft Access starts up, click New
Database on the toolbar.
2. On the Databases tab, double-click the icon for the
kind of database you want to create.
3. Specify a name and location for the database.
4. Click Create to start defining your new database.
Creating a database without using a wizard
1. When Microsoft Access first starts up, a dialog box is
automatically displayed with options to create a new database
or open an existing one. If this dialog box is displayed, click
Blank Database, and then click OK.
If you have already opened a database or closed the dialog
box that displays when Microsoft Access starts up, click New
Database on the toolbar, and then double-click the Blank
Database icon on the General tab.
2. Specify a name and location for the database and click
Create.
After you create a blank database, you must perform
additional steps to define the objects that will make up your
database.
The difference between importing and linking
Microsoft Access provides two choices for using data from
an external data source. .
Import data into a new Microsoft Access table, which
is a way to convert data from a different format and
copy them into Microsoft Access. It is also possible to
import database objects into the current Microsoft
Access database or Microsoft Access project.
Link the data, which is a way to connect to data from
another application without importing them so that
the data in both the original application and in an
Access database can be viewed and edited.
216 MS Access
Entering Records
The table 'Inventory Master' can be used to store data about
the inventory items. Let us now enter the data about our
inventory items as shown in Fig. 10.4.
Inventory Master table is now having some data. We can
use the data for running queries, report generation etc.
Defining Relationships
After you have set up different tables for each subject in
your Microsoft Access database, you need a way of telling
Microsoft Access how to bring that information back together
again. The first step in this process is to define relationships
between your tables. After you have done that , you can create
queries , forms, and reports to display information from several
tables at once .
Display the Relationships window
1. If you have not already done so, switch to the Database
window. You can press F11 to switch to the Database window
from any other window.
220 MS Access
INV~O : INID1
. .. If
f>
I
INV-OESCRIP TI 1!2'SCREWS
UNIT: NUMBER
EOO. 19)0
".
LEI'!) TIMErOAY 1S
tif!
INV~O : 1N1D3
SUMMARY
MS Access is a relational database from the Microsoft
Corpo ration. Access permits creation and manipulation of
databases . Query design and report design facilities have rich
features to view and manipulate data from databases. Query is
a conveni ent tool in Access for accessing status information. It
is quite user fri endly as it does not require the user to be
proficient in computing . Reports present summarised
information. Access permits creation of reports with
autoformat , Report Wizard and Design Window. Users can design
customised reports to suit their information requirements using
Design Window. The reports can be pri nted and presented to
decision makers. MS Access is ideal for small organisations that
have small number of transactions and need only low levels of
database security.
232 MS Access
QUESTIONS
1. What is MS Access? What is its use?
2. How do you create a table in MS Access with Database
Wizard?
3. How do you create a table in MS Access without using
Database Wizard?
4. What is relationship in Access and how referential integrity
is maintained?
5. Describe the various types of queries that can be created
in Access.
6. Describe the steps in creating a simple query in MS Access.
7. Explain how database is created and data entered in MS
Access.
8. Explain the steps in creating an update query using query
builder.
9. How do you run a query in MS Access?
10. How do you design a report in MS Access?
11. Describe the steps in report design in Access.
12. Describe the steps in designing a report in Access using
Report Wizard.
13. Explain how you design a report in Access in Design Window.
R
INTRODUCTION
Multimedia computing and communications are attracting
a lot of interest these days. It is a term generally used to mean
any application or technology that is used to manipulate text,
audio, video, images and graphics. It can provide certain amount
of interactivity to users. It is used extensively in education,
business advertising, publishing, website design, entertainment
and video games. The increasing popularity of multimedia opens
up large number of career opportunities for the youth like video
editor, Visual effects designer, Animator, Cartoon Animator,
Software editor, Software mixer, Audio and Video Specialist,
Visual effects Professional, Author, Script Writer, Set Designer,
Audio Editor, 3D Animator, Character Animator, and Special
Effects Manager.
Meaning of Multimedia
The tem 'multimedia' means use of multiple media for
communicating information. The common media used include
text, graphics, animation, audio and video. Use of two or more
of these media for presenting information is, therefore, called
multimedia presentation. Multimedia software can handle
different types of data and hence it enhances the effectiveness
of communication.
In addition to different media mentioned above, the term
'media' can also be understood in terms of data representation
234 Multimedia
MULTIMEDIA COMPONENTS
The multimedia. components include text, graphics,
animation, audio and video. Two or more of these components
are combined into presentations or creations for desired effects
with the target audience.
Text
Text contains d.ata in alphanumeric form. Hardware
required for text precessing requires keyboard, optical scanners,
display screens and printers. The software required for text
processing includes word processors for editing and formatting
text with different fonts, hypertext features etc.
Animation
Computer animation is the use of graphic tools to create
visual effects. The visual effects can be in the form of changes
in shape, colour, lighting, position etc. Computer animation gives
movement to objects. Graphic software is used to create such
objects. Computer animation is used in cartoon films, electronic
advertisements, video games and virtual reality applications.
Indian mythological characters like Hanuman, Ram and Lakshman
are being recreated in cartoon films with animation. Animation
application areas include movies, television production, product
promotions, computer based training and education, graphics
in publishing, web design, virtual reality for simulations,
engineering, advertising and fashion design.
Audio
Audio is an important component of multimedia. Audio or
sound is produced by vibration of matter. As the matter vibrates,
variations in air pressure around it is propagated in a wave like
motion. Audio techniques deal with processing of these sound
waves. Audio component deals with synthesizing, recording and
play back of audio. It is extensively used in education and
training software. Musical Instrument Digital Interface (MIDI) is
another technology that helps in enhancing audio special effects.
Computer Fundamentals 235
Video
It is a sequence of moving images of a real life situation.
Properties of human eye and neuronal processing are critical
factors in video systems. With 30 frames per second, video
motion appears smooth and continuous.
Images
Image is a spatial representation of an object. Images are
represented in computer with a matrix of numeric values to
manipulate pixels. That is, digital images are stored as two-
dimensional array of values. Each value represents the data
associated with a pixel.
Graphics
Computer graphics deal with the generation and
manipulation of digital objects. The objects may be drawn with
graphic software or scanned-in with digital scanners. The objects
can be animated by controlling speed, portion of the total scene
in view etc.
APPLICATIONS OF MULTIMEDIA
The flexibility of using different types of data for
communication makes multimedia especially suitable for some
applications like education, training, entertainment,
advertisement, cartoon movies, video games etc.
Multimedia in education
Multimedia is particularly suitable for developing digital
content for education and presenting it attractively. The
students can view text in a text box which can be scrawled up
and down. Simultaneously, they can listen to audio that reads
out the text. Drawings and animation are used to make objects
appear real life with movements.
Multimedia in Training
Another important use of multimedia is in training. Voice,
text, images, movies and animation are used in developing
training material. The trainees can interact with the software.
Multimedia makes the presentation visually attractive and
stimulates thinking.
236 Multimedia
Special effects in movies
Multimedia technology is used in movies for special effects.
Movies with multimedia effects are much in demand. Jurassic
park, Spiderman, Harry Potter and Titanic are examples where
multimedia helps in creating special effects.
Multimedia on the web
With multimedia, emails, instant messaging and websites
can be made much more attractive and lively. It can be used to
enrich the content and provide interactivity for the users. It
can attract more visitors to the site. The Web has become the
standard medium for global communications.
Multimedia in Printing and Publishing
Multimedia is used in printing and publishing to improve
quality of print and layouts. With a variety of font designs,
colours, graphics etc. multimedia can be used to enhance quality
of printing and publishing.
Multimedia in Designing
Computer graphics and 3-D object modeling help designing
in creating designs of objects with ease. A range of colours,
forms, textures and tones enable them to experiment with
designs. Multimedia, thus, enables designers to give shape to
their imagination virtually.
SUMMARY
Multimedia software can handle different types of data
simultaneously and this capability makes it extremely useful
for attractive presentation of information. It makes any
presentation rich with audio, video and animation. Its use is
growing very rapidly and it opens up large number of career
opportunities for creative IT professionals. the multimedia
professionals are in short supply worldwide.
QUESTIONS
1. What is multimedia? Describe it.
2. What are the applications of multimedia?
3. Describe the components of multimedia.
Computer Fundamentals 237
4. How does multimedia presentation make education and
training more effective?
5. Describe the reasons for the popularity of multimedia.
c
INTRODUCTION
Microsoft PowerPoint is a presentation software. It is part
of Microsoft Office suite of products. It helps in quickly creating
effective slide show presentations. Each presentation can consist
of as many slides as the user wants. Each slide can carry text,
graphics and sound. The slides can be animated to make them
more attractive. It is highly user-friendly and it helps in creating
presentations with multimedia effects.
PowerPoint lets users create and edit individual pages called
slides. There can be a large number of such slides in a
presentation. PowerPoint provides ready-to-use templates for
slides. PowerPoint can be used to create:
Video slide show on the computer screen
Colour transparencies for overhead projector
Black and white transparencies for overhead projector
Speaker notes. Speaker notes are printed on paper
and can contain exact speech or reminder notes, back
up information or combinations of them.
35 mm slides for slide projector
Printed handouts. These are printed copies of all or
some of the slides to be given to the audience at a
presentation. The can be one slide per page or up to
six that can fit in a paper.
Computer Fundamentals 239
Presentation files. The presentation file includes all
the slides of a particular PowerPoint project. These
files have the file extension' . ppt' , e. g., Strategy. ppt.
Parts of a Slide
A fully designed slide will have six parts:
The title that appe~rs at the top of the slide
Body text that is the main part of the slide.
Graphics. Some slides may have pictures or video clips
Date and time. If they appear, they are displayed at
lower left corner of the slide.
Footer. The footer usually appears at the bottom of
the slide.
Slide number. The slide number is usually displayed
at the lower right corner of the slide.
Parts of a Slide
Title
Body text
Graphics
Oata and time
Slide r-urrber
Body text
Graphics
Data and time
Slide Number
ARU"II S. ARATJ
2 El ~MlJRMATICJ'\I TED-NlLOGV
COtrp.J1&t'" har"dwaw-8
COI"l'1JUIBr software
.~
Telecomr1"ll.nlCations
Networ1cng
The Internet
Computer so.ftware
Database
Telecommunications
Networking
The Internet
CREATING A PRESENTATION
Creation of a presentation involves choosing slides, entering
content, formatting text and images of slides, animating slides,
inserting audios and videos etc. A PowerPoint presentation can
be made in several ways.
The AutoContent Wizard is one method. It suggests contents
and design for the presentation.
Creation of presentation can also start with an existing
presentation and user can change it to suit his or her needs.
Another way to start creating a presentation is by selecting
design template that determines presentC\.tion's design and not
the content.
Yet another way to create a presentation is to start with .
an outline that can be imported from another application or
with a blank presentation that has neither suggested content
nor design.
It is also possible to create a presentation in PowerPoint
from scratch. .
Click 'New' on File menu to create a presentation.
PowerPoint displays a dialogue box as follows with four options
such as AutoContent Wizard, Design Templates, Blank
Presentation, and Open an Existing Presentation .
Create a presentation based on a design template
1. On the File menu, click New, and then click the Design
Templates tab.
2. Scroll to see all the design templates , click the one
you want, and then click OK.
3. Scroll to see the slide layouts, and then select a layout
for your title slide.
4. Type the title and any other content you want on the
title slide.
244 Powerpoint
You can add text in either the slide pane or the outline
pane.
3. Click Common Tasks on the Formatting toolbar, and
then click New Slide. Scroll to see more layouts, and then select
a layout for the next slide.
4. Add the content you want.
5. Repeat steps 3 and 4 for each new slide.
6. Change the presentation to suit your needs .
7. When you finish, click Save on the File menu.
8. Name your presentation, and then click Save.
-==- ~~M
I I~Jilld l illi:@J ll f~llG;nii'~l l
~~uD
Click the slide layout desired and click ' OK'. Now, the user
can-start entering content of the slide.
Computer Fundamentals 247
Click the title area and enter the titl e of the presentation.
Next click the box below to add sUbtitle and other relevant
details of the presentation like name of speaker etc. For
example, let us create a pres~ntation on 'I nformation
Technology'. Let us enter' Information Technology for Business'
in the title area and speaker details 'By Arun and Arati' in the
subtitle area.
TEDWOlOOV FOR
BUSINESS
BY
ARU'-l S. AAATI
INFORMATION TECHNOLOGY
FOR BUSINESS
BY
ARUN &ARATI
Now, the title slide is created. The user can format the
text in edit mode.
The presentation can be formatted adding colour to it by
clicking 'Slide colour scheme' on Format menu. To add another
slide to the presentation, click 'New slide' on Insert menu. Click
the title box of the new slide and enter 'Information Technology'.
Next, click the text box below and type as follows.
Computer Hardware
Computer Software
Database
Telecommunications
Networking
The Internet
It would look better if we add bullets to the points typed
in. Select the text just typed in and click on 'Bullets and
Numbering' in format menu.
change to only the current slide or to all the slides and the
slide master.
Formatting Slides with Colour Scheme
INFORMATION TECHNOLOGY
FOR BUSINESS
BY
ARUN &ARATI
INFORMATION TECHNOLOGY
Computer hardware
Computer software
Database
Telecommunications
Networking
The Internet
N TECHNOLOGY
The Internet
Telecommunications
Networking
The Internet
Now, run the presentation to see the slide after the picture
is inserted.
INFORMATION TECHNOLOGY
Computer hardware
Computer software
Database
Telecommunications
Networking
The Internet
POWERPOINT
PRESENTATIONS
Parts of a Slide
Title
Body text
Gmphics
Data and time
Slide Nwnber
Colour Scheme
Color schemes are sets of eight balanced colors designed
for use as the main colors of a slide presentation -for text,
background, fill, accents, and so on. Each color in the scheme
is used automatically for a different element on the slide. You
can pick a color scheme for an individual slide or for an entire
presentation . When you apply a design template to a
presentation, you can choose from a set of pre-designed color
schemes made to go with that design template . This makes it
easy to change color schemes for a slide or an entire presentation
and know that the new color scheme will harmonize with the
rest of the slides in your presentation.
Slide layouts
When you create a new slide , you can select from 24 pre-
designed slide layouts: for example, there is a layout that has
placeholders for a title, text, and a chart; and there is another
with placeholders for a title and clip art. The title and text
placeholders follow the formatting of the slide master for your
presentation. You can move, resize, or reformat the placeholders
so that they vary from the slide master. You can also change the
layout of a slide after you create it. When you apply a new
layout, all text and objects remain on the slide , but you might
need to rearrange them to fit the new layout.
Record a voice narration
To do this procedure, you need a microphone.
1. On the Slide Show menu, click Record Narration.
A dialog box appears showing the amount of free disk space
and the number of minutes you can record.
2. If this is the first time you are recording, do the
following:
Click Set Microphone Level, and follow the directions to
set your microphone level.
3. Do one of the following:
To insert the narration on your slides as an embedded object
and to begin recording, click OK.
To insert" the narration as a linked object, select the Link
narrations in check box, and then click OK to begin recording.
Computer Fundamentals 257
4. Advance th rough the slide show, and add narration as
you go.
At the end of the show, a message appears.
5. To save the timings along with the narration, click
Yes. To save only the narration, click No.
Insert music or sound on a slide
1. Display the slide you want to add music or sound to.
2. On the Insert menu, point to Movies and Sounds.
3. Do one of the following:
To insert a sound from the Clip Gallery, click Sound from
Gallery, and then locate and insert the sound you want.
To insert a sound from another location, click Sound from
File, locate the folder that contains the sound, and then double-
click the sound you want. .
A sound icon appears on the slide.
4. A message is displayed. If you want the sound to play
automatically when you go to the slide, click Yes; if you want
the sound to play only when you click the sound icon during a
slide show, click No.
5. To preview the sound in normal view, double-click the
sound icon.
PRESENTING ANIMATION
MAnON TECHNOLOGY
Telecommunications
Networking
The Internet
1 ItIe
Body tellt
Q"aphiCs
Data ard tllnEI
Slide I\l.Irrber
SUMMARY
Microsoft PowerPoint is a presentation software. It comes
bundled together in Microsoft Office with other office applications
like MS Word, MS Excel, MS Access etc. It helps in quickly creating
presentation slides, speaker notes, handouts etc. with considerable
ease. The PowerPoint software has a large number of features,
like animation, adding narration etc., which make the slide show
a very attractive way of presenting information. It is an easy way
to create multimedia presentation as well.
QUESTIONS
1. Describe the different views in Microsoft PowerPoint.
2. Explain the steps in creating a presentation in PowerPoint.
3. Explain the use of AutoContent Wizard in PowerPoint.
4. Describe the various parts of slide.
5. How do you create a blank presentation in PowerPoint?
6. How do you create presentation with design template in
PowerPoint?
7. How do you run a presentation in PowerPoint?
..
8. Describe the steps in adding voice narration to a slide .
9. Describe how you will insert hypertext in a slide.
10. Describe how you will insert date and time in a slide.
11. How do you insert slide number in a slide?
1'.
.~ .. ..
CH" '<.k,R
INTRODUCTION
Computers are to be directed to do any task and these
directions are called instructions. A set of instructions to carry
out a task is called a program. The program instructions to
computers are in the form of strings of binary digits. These
instructions are to comp l,' with some notation system called
language. Over the past several decades, three types of
languages have been developed. They are machine language,
assembly language, and high-level language.
Of the above languages computer directly understands only
machine language, which is the natural dialect of the machine.
The machine instructions are in binary codes of 0 and 1. But
writing machine language instructions is laborious, as it requires
thorough understanding of the machine configuration and
programming as well. Later assembly language was developed
to facilitate programming. This language employed mnemonics
such as READ, LOAD, etc. in place of operation codes. But still
there was lot of difficulty in programming. High-level languages
were later developed to make programming easy. The
instructions in high-level languages resemble ordinary English
statements and are easy to learn and use. High-level languages
(HLL) require a translator to convert high-level langua'ge
instructions into machine language instructions. This translation
program is called a compiler and each HLL requires a compiler.
264 Programming Languages
Machine Language
A sequence of machine instructions in binary systems to
the machine to perform a task is a machine language program.
The machine instruction has two parts: an operation code and
an operand address. The operation code specifies the op.e ration
to be carried out and the operand address specifies the address
in memory where the operand or instruction is stored or to be
stored. Both the operation code and the operand address are
represented in the form of a string of binary digits.
Some of the first programmers wrote their programs in
binary system. Later the programmers preferred the more
familiar decimal system to write the program leaving the input
device to convert these inputs into binary. A set of machine
instructions written in binary or decimal system in accordance
with the specific design of the computer is called machine code
or language. The program design is determined by some features
of the machine such as the type of registers , word length of
registers and memory, etc. Because of the computer
architecture's influence on programming, the language is called
machine dependent language .
Machine language is a set of instruction codes , which can
be directly recognised by the CPU without the help of a translator
program. The program instructions in machine language are thus
directly converted into electrical signals to execute them.
Advantages
i. Machine language requires less memory space than
other languages.
ii. Programs in machine language can be executed
directly.
iii. It does not require any translating program.
Disadvantages
i. The programs in machine language are not portable
across machines unless the processors are the same
as the language is machine dependent.
ii. Programming in machine language is laborious and
tedious as it requires keeping track of memory
locations, operation codes, state of execution of
commands , intermediate results, etc.
Computer Fundamentals 265
iii. Programming in machine language is error prone as it
taxes programmer's memory so much and limits his
ability to think logically through the coding.
iv. It is very difficult to locate and debug errors in machine
language. The machine language programmer has to
remember all the operation codes, what each code
does and how it affects various registers of the
processor.
v. Besides he has to keep track of all the operands and
know exactly where they are stored in memory.
vi. It requires deep knowledge of the internal structure
of the computer and hence only computer experts can
program a computer in machine language.
Assembly Language
To overcome the problems of programming in machine code
mnemonics were introduced. These mnemonics are just memory
aids as these abbreviated words are easy to remember than a
series of digits. Thus the first step in the evolution of
programming language was the development of assembly
language. In this language, mnemonics, which are usually two
to four letter words, are used in place of operation codes in
machine language and strings of characters to indicate addresses
of location. This language is designed to replace each machine
instruction with a human understandable mnemonics (such as
MUL for multiply, DIY for divide and SUB for subtract, etc. and
each address with an alphanumeric string. The coding should
be matched with specific design of a computer processor
structure. Therefore a programmer requires a thorough
knowledge of programming techniques as well details of the
internal logical structure of the machine. The symbolic code in
assembly language should be translated into its machine code
equivalent. The mnemonic operation codes should be translated
into absolute numeric operation codes. The symbolic address
of operands should also be translated into absolute numeric
addresses. This translation requires a special program called
assembler, usually supplied by the manufacturer along with the
machine. It is called assembler because it assembles the codes
after translation into machine codes in the memory ready for
execution.
266 Programming Languages
Mnemonics Function
ADD to add one byte or word to another byte or word
INC to increment one byte of word by one
SUB to subtract
DEC to decrement by one
MOV to copy a byte or word from a given source to
specified destination
XCHG to exchange bytes or words
CALL to call a procedure
RET to return from a procedure to calling program
The computers can be programmed to recognise certain
combinations of letters or numbers and substitute them with
the equivalent numeric codes. For example, every time MUL
appears in a program, the machine can be programmed to
substitute it with its corresponding numeric code. Similarly, the
machine can be trained to translate a symbolic code into
machine. The language which substitutes letters and symbols
for the letters and symbols in the machine language is called
assembly language and the system software that does the
translation is called assembler.
The source code is developed first using the instruction
set in a text editor. Assembler converts the source code into
object code and a linker program links the object code into a
directly executable program.
Advantages of Assembly Language
Both the machine and assembly languages, being oriented
towards the internal structure of the machine, are referred to
as low-level languages. Yet assembly language has a number of
advantages over the machine language.
i. Assembly language is easier to understand and use than
_machine language as it employs easy to understand
symbols in place of numeric codes .
. ii. It is easier to locate and correct errors in assembly
language. Fewer errors occur while coding and these
errors can be more easily removed.
iii. The program in assembly language can be more easily
modified which is very difficult in machine language.
Computer Fundamentals 267
5. Compactness
The user should be able to concisely code applications
without being too verbose.
6. Extensibility
A good programming language should allow extension
through simple and natural mechanisms.
7. Suitability to Environment
The programming language should be suitable for the
environment for which it is designed. For example, a language
designed for developing real-time applications should be"
interactive. A real-time application system developed in a
language designed to support batch processing cannot be
efficient and robust.
SUMMARY
Over the past few decades, three computer languages have
been developed such as the machine language, the assembly
language and the high level language. The machine language is
the natural dialect of the computer and it processes instructions
in machine language with maximum efficiency. Assembly
language was a step towards making computer a popular data
processing tool. It uses mnemonics as memory aids for the
programmers and made programming easier. Assemblers were
developed to translate programs in assembly language into
machine langu?ge. The high level language is more like the
natural human language. Interpreters and compilers are
developed to translate high-level language programs into
machine language.
QUESTIONS
1. What is computer language?
2. What are the types of computer language?
3. What is machine language? What are the advantages of
machine language?
4. What is High Level Language? What are the advantages of
high-level language?
Computer Fundamentals 275
5. Briefly explain any two high level languages.
6. What are the characteristics of a high level language?
7. What is procedural language?
8. What are the characteristics of a good programmin.g
language?
9. What is fourth generation language?
II
CH _PTER
INTRODUCTION
Computer networking is the process of inter connecting
two or more computers so that the users can communicate with
each other, share resources and overcome other limitations of
stand-alone systems. The network can be established with a
variety of combinations of computers such as a network of only
microcomputers, microcomputers and one or more
minicomputers, and a set of microcomputers connected to a
mainframe computer. The computers in a typical network are
autonomous in the sense that they have processing capability
independent of the network.
With standardised hardware and software, the
microcomputer provides a user-friendly environment. It meets
the computing requirements of most users. But, the need for
interaction with other computer users and with other computer
systems for exchange of data etc. has increased over the years.
Networks are increasingly meeting this need.
It is also possible for computers to communicate between
them. Electronic data interchange (EDI) facilitates the kind of
application to application communication between computers
both having network connectivity.
Advantages of Networking
Networking has become an essential requirement for data
communications. It may be done through wired connections or
Computer Fundamentals 277
wireless connections. It is a critical information technology
infrastructure for any business firm. Once an organisation
connects the computers into a network, it acquires a capability
to communicate innovatively and economically with employees,
distributors, customers and suppliers. The main advantages of
networking are:
i. Resource sharing: Network enables sharing of
expensive resources such as processo~ storage space and
peripherals like modem, fax, and laser printer.
ii. Sharing of Data files: The network permits concurrent
access to the same datafile by many users in the network. Thus
corporate databases are shared by users in many areas like sales
department, production centre, inventory department etc.
iii. Sharing of Software: Any user in a network can load
and use the software installed on any of the computer or
fileserver in the network.
iv. Communication: The Network enables people in an
organisation to communicate among them. It is also possible to
communicate with trading partners and customers outside the
organisation with a connectivity to the Internet. E-mail, voice
mail, instant messaging, video conferencing etc are some of
the communication facilities that can be used for communication
among users on a network.
v. Decentralised Data Processing: In a network, the data
processing can be decentralised by enabling local offices to
capture and store data, and generate information to meet most
of their requirements at local level itself.
vi. Centralised data processing: It is possible to
centralise all data processing activities through a network.
Online trading in securities like that on National Stock Exchange
uses the network to centralise all transaction processing.
vii. Implementation of uniform security measures: With
centralised control over a network, policies concerning data
security can be implemented uniformly.
viii. Electronic commerce: With Internet connectivity
between manufacturing and marketing organisations, it is
possible to do electronic commerce between them and also with
customers.
ix. Implementation of enterprise application systems:
Enterprise application systems like Enterprise Resource Planning
278 Networking and Communications
(ERP) requires a network as essential infrastructure for
implementing them.
TYPES OF NETWORK
The networks can be classified into three: local area
network (LAN), metropolitan area network (MAN) and wide area
network (WAN). They are explained in the following sections.
Wide Area Network (WAN)
WAN is made up of a number of autonomous computers
distributed over a wide geographical area. WANs were originally
developed in the late 1960s to enable communication between
computer centres and sharing of hardware, software and other
communication facilities. WAN can be implemented using private
or public networks. In a private network, an organisation takes
on lease telephone lines to connect such sites into a network.
It is also possible to connect computers in different locations
using microwave or satellite transmission. Public networks are
installed by the Government owned telecommunication
agencies. WAN spans large geographic distances. It is also called
long-haul network. WAN is usually operated at lower speeds than
MAN and involves delay.
Most organisations use private networks for communication.
Society for Worldwide Interbank Financial Transactions (SWIFT),
a non-profit organisation of banks, owns a private network. The
network exchanges financial transactions between the
participating financial institutions, about 3000 in number in over
60 countries. The terminals of these participating banks are
hooked with SWIFT's access centres. The network offer.s data
communication service 24 hours a day, 7 days a week.
NICNET, SBINET and WELCOMENET are some of the private
networks in India. NICNET is a network of National Informatics
Centre that connects all the district headquarters in the country.
SBINET is a private network of State Bank of India and connects
its branches across the country. WELCOMNET connects the hotels
of the Welcome Group.
Public Networks
Public networks came up first in the 1970s to facilitate
data communication and to provide value-added services to
users. The US AT&T's Advanced Communication Services, British
computer Fundamentals 279
Post Office's Prestel, the US Telenet, DATAPAC of Bell Canada,
TRANSPAC of France etc. are some examples.of Public Networks.
They are run by both private corporations and
Telecommunication Departments of the state.
Metropolitan area network
Metropolitan area network covers a wider area than a local
area network. Usually MAN covers a large metropolitan city and
is a scaled down version of wide area network. It operates at
high speeds over distances sufficient for a metropolitan area.
Work~tation
Workstation
Workstation
RING
WorkstatIOn
Workstation
Bus Topology
A bus network configures computers to a single non-looping
channel. The computers connected to the network share the
same bus or communications channel. Bus wiring is easy and
needs much less wiring for small segments.
DISTRIBUTED SYSTEM
A distributed system interconnects computer locations with
facilities to capture and process data, stores data and sends
information to other computer locations called nodes. Large
organisations interconnect their computer systems at different
offices and plants into network. With Internet technology,
connecting offices across the globe into a single network is
possible at very low costs.
The data processing in such a network can be distributed.
This allows offices, plants etc. to collect, store and process
data as they occur and use the information locally. The
information relevant to other offices and head office is
transferred to the computer location at the headquarters. The
computer facility at the head office can be easily accessed from
multiple nodes on the network. Thus the local offices are able
to capture and process operating data in their own way and at
the same time head office receives all information it needs
from such local offices.
By permitting data transfer and proceSSing at other sites,
the distributed system permits load sharing between nodes. It
also permits sharing of software. It is possible to run software
on re'mote location and the results can be downloaded at the
accessing node.
Computer Fundamentals 287
The distributed system lowers data communication costs
by storing data close to the users. But the system is likely to
have inconsistent data if the same is kept are multiple locations.
Client/Server Computing
A client/server system is a distributed system with a server
and one or more clients. The server is a powerful computer,
usually a mainframe or a minicomputer. The clients are usually
small computers: PCs or workstations. The server and the clients
are interconnected using a network, normally a LAN. The server
and the clients share tasks and processes. The server stores
common programs and data used by several user systems. The
clients request the server for data and programs. The server
processes the requests' and makes available the requested data
and programs.
In addition to the hardware, the client/server (CIS)
computing requires special software at front-end (client side)
and back-end (server side). The friend-end sOftware provides
user interface, facilitates data manipulation and handles
communication with server. The back-end software takes care
of data acquisition and integrity, transaction management and
data recovery in the event of system failure.
Client/server environment is different from a LAN
environment. In a LAN environment the host transfers, on
request, the entire program file or data file to the workstation
for processing. This requires lot of data traffic between the
server and the workstations. In CIS environment the server
processes the request and transfers the data or program
requested by the client; it does not transfer the entire file.
This reduces the data traffic on the network.
SUMMARY
Networks are an essential part of modern information
systems and their importance is fast growing. Communication
networks link computer f acil ities across offices and plants. This
makes possible quicker and more economic forms of
communication, sharing of processing tasks, sharing of expensive
hardware and software resources etc. They also open up new
dimensions for business competition. Internet, Intranets and
extranets have opened up great opportunities for all forms of
communication.
288 Networking and Communications
QUESTIONS
1. What is LAN? What are the components of LAN?
2. What in network topology? Explain the popular network
topologies.
3. Explain the meaning and purpose of communication
protocols.
4. What is distributed system?
5. What is client/server computing?
THE INTERNET
'"
INTRODUCTION
The Internet is a giant global network. It is in fact an
amorphous collection of networks and millions of computers
across the globe. It all started with the Advanced Research
Project Network (ARPANET) set up by the Defence Department
of the United States. It wanted to create a large computer
network for military communication with no controlling centre .
ARPANET was used primarily by res'earch institutions until the
mid-1980s when its use was widened. By 1990 the network came
to be known as Internet and since then its growth has been
phenomenal.
The Internet has changed the entire c0m munication and
business paradigm. Though its growth was limited in t h, +;rst
two decades from the early seventies, it grew astronomically in
the 1990s. It is sweeping the entire world by its sheer reach
and ease of use. Millions of host comp i.J ters and users form the
global Internet community that is now opening opportunities
on a scale unheard of before. The Internet technology has
changed the way people communicate, the way companies do
business, the way they distribute products, the way they collect
payments, the way they serve customers, etc. The Internet has,
indeed, caused a paradigm shift and is going to have long-term
impact on society in general and the business in particular. The
business has taken note of the potential of the Net, though
290 The Internet
belatedly, and most business firms are trying to integrate this
technology into their overall business strategy.
The Internet is made up of three kinds of networks'.
High speed backbone networks such as the
supercomputers at San Diego, Cornell, Pittsburgh and
Illinois
mid level networks such as those at universities and
companies, and,
small networks connected to the Internet such as
individual LANs, and computers at companies
The computers, whether networked or not, having Internet
connectivity vary widely in hardware and software resources.
The interconnection of these networks and computers resulted
into a gigantic network, which uses a common communication
protocol: Transmission Control Protocol/Internet Protocol (TCP /
IP). The TCP breaks message into small packets and each packet
carries source and destination addresses and sequence number.
The packet stream is assembled at the other end in the order.of
the sequence number to recreate the full message. The IP is
the physical address of the computer on the Net. Every computer
forming the network has a unique IP address and it helps in
routing the message on its way to its destination.
History of the Internet
In the aftermath of the launch of Sputnik by the USSR, the
US Defence Department set up Advanced Research Projects
Agency (ARPA), ~a ter: renamed as Defence Advanced Research
Projects Agency (DARPA), to establish superiority in military
technology. ARPA sponsored a study on computer networking
for communication that cannot be disrupted by the destruction
of a few installations in enemy action. The first ARPANET was
formed by networking four computers at universities of California
Los Angeles, Stanford Research Institute, University of Utah and
University of California, Santa Barbara in 1969.
One of the goals of the ARPANET was research on distributed
computer systems as the US military wanted to develop a failure
tolerant computer network for communication. The purpose was
to have a communication infrastructure without a central syste,"
so that even if a part of the system 'breaks down or is destroyed
by enemy action, rest of the communication system should not
Computer Fundamentals 291
be disturbed. A large number of universities and research
institutions joined the network by connecting their computers
to ARPANET in the early 1970s.
The Tep liP protocols were developed in the mid 1970s by
Vinton Cerf of Stan"ford University and Robert Kahn of BBN
(between 1973 and 1978) and since 1983 they became the
standard protocols for network communication. In the same year
the US government spun off MILNET from ARPANET. By 1984 over
1000 hosts formed part of the Internet.
Meanwhile the Xerox Corporation developed Ethernet
technology for networking computers and around this time TCP I
IP protocols were built into the UNIX operating systems. TCP liP
over Ethernet became a common way for workstations to connect
to one another2 PCs with add-on Ethernet cards and TCP/IP
software made them to talk to UNIX systems. By the middle of
1980s~ TCP liP protocols were used for LANs and WANs and this
period marked the beginning of a period of explosive growth of
the Internet.
Internet Protocols
There are a large number of Internet related protocols.
Some of the important Internet protocols are:
TCP/IP. The Transmission Control Protocol I Internet Protocol
and related protocols are the basic Internet technology which
has paved the way for fast growth in Internet use. This set of
protocols permits any comput~r to communicate with any other
computer regardless of the platform.
HTML The Hyper Text Markup Language defines how text,
images and sound are delivered to users.
HTTP The Hyper Text Transport Protocol decides how HTML
documents are to be served via the Internet.
SMTP Simple Mail Transfer Protocol enables the bac;ic text
based message communication between users.
Other support protocols include Telnet, File Transfer
Protocol, Common Gateway Interface etc.
Administration of the Internet
Internet is not controlled by anybody. National Science
Foundation, being instrumental for the creation of Internet has
greater influence on Internet's use. It is responsible for
292 The Internet
SETTING UP A WEBSITE
World Wide Web is the fastest growing service on the
Internet. It is truly global in its reach since the Internet has an
easy to access globQl network. The web is basically a bunch of
resources held together by hypertext pointers that allow users
to quickly move from document to document on the World Wide
Web. The Web pages are built using hypertext mark up language
(HTML). This language contains commands that tell the web
browser how to display text, graphics and multimedia content.
The website may have three types of pages such as home
page, intermediate page, and content page. The home page is
the first page a visitor sees. The intermediate pages are one
Computer Fundamentals 301
level down. They can be accessed from the home page. Each
intermediate page usually has a link back to the home page.
The content pages hold details and are usually accessible from
intermediate pages. The content page may also include link
back to the home page and to other relevant resources. Web
publishing as the name indicates is the publishing of anything
on the Web. A web publication consists of a home page and
many other pages linked to the home page.
Steps in setting up a website
1. Identifying a domain name
Before registering a name, it must be ensured that others
do not use the same name. This is to avoid any legal issues
"later. The names are allotted on a first-come-first-served basis.
Checking the proposed name at search engines is a sure way of
ensuring that others do not use the same name. The name is to
be registered with the appropriate authorities. A fee has to be
paid for this. The domain name has to be renewed every year
by paying renewal fee. The major domains are .com, .org, .edu
etc. If it is a commercial firm, it must use .com domain as part
of its Uniform Resource Locator (URL). Thus, National Stock
Exchange of India Limited is allotted the URL www.nse-
india. com. It advertises the URL to attract people to the site.
Customers just type the URL to access the NSE's site.
2. Registration of the name
If the proposed name is not in use, the next step is to
register the name. For registering the name, the proposed name,
server address etc. must be submitted with the registration fee.
3. Website Design
There are many web page design tools. Web pages are
designed using any of the web design software packages like
Microsoft FrontPage, Dreamweaver from Macromedia and Fusion
from netobjects.
4. Hiring server space
Internet Service Providers provide hosting services. The ISP
allocates storage space on its server for the website. The storage
space required depends on the content the site should have.
The storage space can be hired on a rental basis. The server
performance and bandwidth, cost of hosting etc. are some of
the core considerations in choosing the service.
302 The Internet
5. Uploading of web pages
The web pages and associated files are to be stored in a
directory on the web server. If the server is remote, FTP package
is used to copy web page files onto the remote server.
6. Promotion of website
The organisation should promote the website. The URL
should be part of letter head of the organisation, every
advertisement it releases to the press and it may give banner
advertisements at popular websites.
7. Maintenance of website
Now the site is up and running. The URL allotted can be
used to access the site. Web site administrator can use the
login and password to update content as and when needed. The
site should contain rich content and it should be updated
frequently to attract more user traffic to the site.
INTRANET
The intranet is basically a communications environment
created within an organisation using Internet technology. It is
an internal Web site that utilises the Internet technology such
as protocols for efficient internal communication. Internal
corporate communication in the form of multiple copies of
documents of all important internal communication costs a quite
a bit of money. With Intranet, such documents can be created,
saved, retrieved and distributed at very low cost. Such
documents can be created on any device and displayed on client
PCs using the Internet technology. Creating such an Intranet
requires a host computer or server (with hardware platform
and operating system such as Unix or Windows NT, etc.) and
Web browser software.
Intranet is a local area network that uses Internet
technologies for communication within an organisation. It is not
accessible for outsiders. Internet Protocol suit such as TCP liP,
SMTP, WWW, FTP and remote login are used for communications
within an organisation. The internal applications are integrated
with email.FTP.Webserver.Mail server etc. It requires a local
area network to be set up and then the network resources are
integrated with the Internet technologies. Users browse the
network with a web browser to access information within an
Computer Fundamentals 303
organisation. The web browser becomes a simple user interface
for sharing data. The Intranet need not be connected to the
Internet. Intranet is implemented within organisations.
Intranet uses TCP liP and network technologies besides
Internet resources such as WWW, e-mail, telnet and FTP. But
the network is not open to people outside the organisation. The
intranet is separated from the Internet using a firewall that
prohibits access to the intranet from outside the organisation.
Intranet allows electronic collaboration between people
in the organisation. Groupware technologies are employed to
support online brainstorming, group meetings and other
collaborative work. It also facilitates videoconferencing
between people in various parts of the country or world.
Intranet improves internal communication. One of its most
important advantage is the quick access it provides to published
documents. It is very useful when large amount of constantly
changing information has to be communicated simultaneously
to a large number of people within an organisation.
Intranet requires:
Network
TCP/IP on servers and clients
Browsers
Hardware for hosting Internet services
Software for hosting web services
Advantages of Intranet
Easy availability of information
Fast access to information
Low cost of communication
Organisation wide access to critical information
Facilitates collaboration among employees in an
organisation
Extranet
When an organisation allows its intranet resources to be
accessed by its business partners, like suppliers and customers,
the intranet becomes an extranet. External organisations are
provided access to information relevant for them.
304 The Internet
Extranets are presently being used ass:
Project management tools for companies and
collaborating third parties.
Sharing proprietary ideas with a select group.
Online training for resellers
A way of using high volumes of data using Electronic
Data Interchange (EDI)
Sharing product catalogs and inventory levels
exclusively between trading partners
Collaborating with other companies on joint
development efforts
Providing services offered by one organisation to a
group of other companies, such as an online banking
application managed by one organisation on behalf of
affiliated banks
Share news of common interest exclusively with
partner companies
SEARCHING
The Internet is often described as a massive jungle where
it is almost impossible without search tools to find the
information one is searching for. Navigation tools were developed
to help a user to access the required information on the Net.
The navigation tools enable burrowing through the disorganised
and fast growing Web for information. The Net has grown too
large and lacks centralised control. With rapid growth in the
number of hosts and services offered, it became a necessity to
have some tools to locate the hosts and the services.
Navigational tools have been developed in the 1990s to help
the surfers in locating the services on the Internet. The
navigational tools developed early include Archie, Veronica,
Netlink, Wide Area Information Servers (WAIS) etc.
BROWSING
The Internet is a huge jungle of information. The user neec's
to search for information. Browsing is the process of seeking
information on the Web with the help of browser software. The
Web is a huge collection of hypertext documents. The hypertext
Computer Fundamental s 305
facilitates moving from documents to documents quickly. When
user clicks on a hypertext in a document, the browser opens up
another window and displays the new document retrieved from
the same computer or a different computer usually far away.
Web Browsers
A Web browser is a program that allows a user to easily
retrieve relevant information available on the Internet. The
browser follows the link in the document that was made possible
by the HTML. It does not require a user to login from remote
location to get information from a web server. By following the
Uniform Resource Locator of sites , browser enables users to
visit the sites and access information.
Mosaic
The first Web browser, named Mosaic, was developed by
Marc Andreessen at the National Centre for Supercomputing
Applications, University of Illinois. It was released in June 1993 .
Soon a number of other browsers became available for browsing
the Web. Mosaic could perform searches across many Internet
services. Mosaic versions became available for various platforms
such as MS Windows, Macintosh and X window system under
UNIX. Mosaic allowed images and videos to be downloaded and
viewed. The mosaic and WWW server enable delivery of
multimedia documents. With the arrival of Netscape and Internet
Explorer as more user-friendly browsers , Mosaic is little used
now.
Netscape
One Web browser that became hugely popular in the 1990s
is the Netscape Navigator. This was again developed by Marc
Andreessen, the founder of Netscape Communications Corp. It
not only allowed browsing through hyperlinked documents but
also supported use of other services available on the Net such
as ftp, telnet and Gopher. Later versions of Netscape Navigator
(Version 2.0) also supported Sun Microsystems Inc.'s Java
programming language. In addition to English, the Netscape
browser is available in German, Japanese and French languages.
Netscape Communicator is the latest suite of client-side
software tools for the Internet on the Web from the Netscape
Communications Corp. The suite contains email, groupware and
browser programs. It provides a complete set of tools needed
306 The Internet
for communicating, sharing and accessing data on the Internet
and I ntranets.
The Netscape Communicator consists of the Navigator 4.0
(browser), an email application (Messenger), a groupware
application (Collabra), a scheduling program (Calendar), an HTML
editor (Composer) and a program that facilitates audio and data
conferencing (Conference).
Internet Explorer
Internet Explorer (IE) is one of the most popular Web
browsers today. It is available only on Windows platform. The IE
is bundled with MS Windows 95 and later integrated with
Windows 98. Microsoft dominates the web browser market now
with its Internet Explorer installed on most of the PCs.
SEARCH ENGINES
The Web contains tens of thousands of w-:bsites with
content on vastly different topics. Users need search tools to
get to the information they look for easily. Search engines,
directories, indexes etc. help the users in their search. Search
308 The Internet
engines use key words and phrases to search the Internet. Some
of the most popular search engines are as follows:
Alta Vistahttp://www.altavista.com
Excite http://www.excite.com
HotBot http://hotbot.lycos.com
Go http://www.go.com
Google http://www.google.com
Lycos http://www.lycos.com
Northern Light http://www.northernlight.com
Web Crawler http://www.webcrawler.com
Meta Search Engines
These are search engines that search other search engines.
Often they also search smaller, less well known search engines
and specialized sites. Meta search engines frequently include
indexes and other search tools. Examples of meta search engines
are 10
RedeSearch http:/ /www.RedeSearch.com
BigHub http:/ /www. thebighub.com
C4 http:/ /www.C4.com
InfoZoid http:/ /www.infozoid.com
Brightgate http:/ /www.brightgate.com
Ask Jeeves http:/ /www.askjeeves.com
Dogpile http:/ /www.dogpile.com
MetaCrawler http:/ /www.metacrawler.com
All40ne http:/ /www.all4one.com
Subject Directories
Examples for subject directories are:
About.com http://www.about.com
Big Hub http://www.thebighub.com
Invisible Web http://www.invisibleweb.com
Links2Go http://www.links2go.com
Open Directory Project http:/ / dmoz.org
Qango http://www.qango.com
Yahoo http://www.yahoo.com
Computer Fundamentals 309
In addition to metasearch engines, search engines, and
indexes, the Internet contains a wealth of topic specific search
tools and resources. A number of specialized browsers as for
the blind etc. are available for using the Web resources.
Routers
The Internet is a collection of large number of networks.
Network users may have to communicate across networks. This
requires data packet movements from one network to another.
Each packet is addressed to a destination computer. The Internet
protocol (IP) address is used by the router for routing. Router is
the physical device that joins multiple wired or wireless networks
together
Thus router is a networking device that forwards data
packets from one network to another. It uses routing protocols
for communicating with other routers. It stores the best routing
paths to the destinations in a table called routing table.
Gateways
Each network is different in configuration from others. Its
operating system, hardware, software etc. may differ from
others. Hence, communication with another network requires
special equipment. A gateway makes it possible. A gateway is a
computer that transfers data from a workstation in a network
to an external network. These days, routers are used in place
of gateways.
Bandwidth
Bandwidth is the data rate when communicating over
certain media or devices. Communication requires connectivity-
wired or wireless. In either case, data have to be sent and
received between communicating devices. The rate at which
data are transferred between devices is called the bandwidth.
Usually, it is measured in kilobits per second (KBPS) or megabits
per second (MBPS). 64 KBPS or above is said to be broadbanG
Most critical data communications require broadband
connectivity.
SUMMARY
The Internet is a medium of cor:munication using networked
computers. From a small network in the US in the 1970s for
310 The Internet
military communication, the Internet has now grown into a
transcontinental network and carries all sorts of data such as
business, educational, scientific and personal. The growth of
the Internet in the 1990s has been phenomenal and the trend is
still continuing. The Web and the Web browser software have
made the Net hugely popular. The business was late to take
note of the potential of the Net. In the early 1990s a large
number of firms took to the Internet in a big way for commerce
and communications.
QUESTIONS
1. Trace the history of the Net and explain what factors
contributed to its fast growth in the 1990s.
2. What are the core features of the Internet?
3. What do you mean by protocols?
4. What are the popular Internet services?
5. What is WWW? Explain how it works?
6. What is intranet?
7. What is searching?
8. What is search engine?
REFERENCES
1. Perry, P.J., "World Wide Web Secrets", Comdex Publishing,
New Delhi, 1996, P 30.
2. Wiggins, R. W., "The Internet For Every One", McGraw Hill
Inc., New York, 1994, p9.
3. Wiggins, R.W. "The Internet For EveryOne", McGraw Hill
Inc., New York, 1994, p291.
4. Ghosh, Shikhar, "Making Business Sense of the Internet",
Harvard Business Review, March- April, 1998 p127.
5. Shroud, Dick, "The Internet Strategies, A Corporate Guide
to Exploiting the Internet", Macmillan Press Ltd., London,
1998, p54-55.
6. http://www.actinic.com
7. Mougayar, W., Opening Digital Markets, Mc-Graw-Hill, New
York,1998, p8.
Computer Fundamentals 311
8. Online Market Research: Possibilities and Realities of Virtual
Marketplace, March 1997.
9. Microsoft Internal Explorer, online help.
10. www.search.com/.
INTRODUCTION
Technology has revolutionised communications in the recent
times . Satellite infrastructure opened up new opportunities for
communication in the 1960s. Information technology has
significantly altered the ways of communications in the recent
past. The Internet was a path breaking invention that changed
commerce and communications beyond recogniti on . Wi reless
technology is now making waves by taking communications to
remote and inaccessible locations. Thus , introduction of
satellites, computers, mobile phones and blue tooth technology
into communications represent some of the landmark events in
the evolution of communications in the last few decades. .
Satellite Communication
1960s marked the beginning of the space and satellite
communications era. In 1962, the American telecommunications
company, AT&T, launched the world's first commercial satellite ,
Telstar. Since then a large number of satellites were sent into
space to facilitate telecommunications.
The satellite communication system consists of two main
components: the satellite (the space segment) and the receiving
stations (earth segment). The satellite consists of fuel system,
the satellite and telemetry controls and the transponder. The
transponder consists of a receiving antenna, broad-band receiver
and a frequency converter. The antenna picks up signals from
Computer Fundamentals 313
the ground station. The broadband receiver is an input
multiplexer and the frequency multiplexer is used to reroute
the received signals through a high-powered amplifier for
downlink. The ground station sends to, and receives signals
from, the satellite segment.
The satellite reflects signals sent to it from earth stations.
In case of a telecommunications satellite, the primary function
is to receive signals sent from an earth station and send them
down to another earth station that is located at a consideraple
distance from the first earth station.
Satellite data transmission systems use microwave systems.
The microwave station broadcasts signals to the satellite, which
retransmits the signals to another microwave station on earth.
It is also possible for one satellite to receive the signals and
retransmit them to another satellite to be sent to another
microwave station on earth, beyond the range of the first
satellite. Satellite data transmission is most economical and is
particularly useful when microwave stations are separated by
long distance or by ocean etc. The use of satellite systems today
includes traditional telephone communications, television
broadcast services, cellular communications, marine
communications, global positioning services and defence
observation.
E-MAIL
Electronic mail (E-mail) is a communication facility to send
documents over a network to the intended recipient(s). E-mail
is the most commonly available service on any network. It is
also one of the least expensive communication network services.
This communication system requires the sender and the receiver
of the message to have access to a network for communication.
This can be done in three ways. The first is to set up a private
network linking the workstations involved in communication.
The second is to subscribe to an e-mail service provider who
maintains the network. The third is to have the Internet
connectivity.
The e-mail communication is incredibly simple. A person,
with a PC and a modem to connect to the network, can
communicate with others so connected to the network. The
message can be prepared and sent instantly. The other person
finds the e-mail when he checks his mailbox and may reply to
the message in the same way. The message sent is private and
other unintended persons cannot read it.
Each user of e-mail service has a user ID serving as e-mail
address and a password to access his email box. First thing to
do is to get online using modem and communication software.
The user needs to have access to an email service provider. It
may be an Internet Service Provider. But most non-business users
register with a web based email service like Yahoo or Hotmail.
On registering with such email service each user is allotted a
pair of email-id and password and a mailbox to store email
messages. The email system requires the user to log in every
time with the email-id and the password allotted to him or her
to access the mailbox.
The mailbox is simply a file into which the e-mail system
stores electronic documents. All incoming email messages are
stored in the mailbox of the particular user. The user can check
his or her mailbox for messages any time convenient to him or
her. If the mailbox, usually the inbox, has a message from his
contacts, the user opens it and reads it. He can also reply to it
by typing his message and clicking 'Send' button. The user can
also prepare his message in the form of a document using a
word processor and save it on the disk. The saved document
can be attached to the email sent to a contact. Sending fresh
computer Fundamentals 315
message to any contact requires to type in his or her e-mail
address (email-idsuchasmohan22@hotmail.com) of the
recipient and the subject (such as 'Contract renewal') before
clicking 'Send' button.
Through e-mail, documents are prepared and sent
electronically. The recipient need not be present at the other
end to send the message. The message gets stored in the
electronic mailbox of the addressee. The recipient can open
the mailbox whenever he is free and he can read or print the
message. It also permits typing and sending a reply to the
message received.
...
L. ,
.,
F.oI.to.....
~ Inho x (~)
C..d>J td ,q
In tho NRW~: :':Jlh.Qo.l
ti~:i ':"'..I.QQ
C, TiMESJOBS.COM
i H'dO] ; If you ha\olc ;n rcason, we hav(!' the job.
S.~
Fig.16.1: MaHbox.
Advantages of E-mail
i. Messages can be prepared and sent any time
convenient for the sender.
fi. Message can be received at the convenience of the
recipient. .
iii. The transmission takes place instantly and the message
gets stored in the mailbox of the recipient.
iv. The system can confirm delivery of message.
v. Copies of message can be sent to mUltiple recipients,
and,
vi. It reduces paper work.
Computer Fundamentals 317
vii. User can be alerted through SMS (short messaging
service) over mobile phone about the arrival of an
email message from a contact.
Disadvantages
i. All email users must subscribe to e-mail service. They
must also have access to the Internet through their
own computer, modem and telephone or through an
Internet cafe.
ii. Poor telecommunication affects the quality of message
transmitted.
iii. Spamming is an irritant to e-mail users. Spamming is
unsolicited commercial e-mail. It is sent without the
recipient's consent. The mail box of users may get
filled with spams and messages from his or her usual
contacts may not be stored for want of storage space.
iv. If there is disruption in telecommunications or failure
of computer hardware or software, the user may not
be able to access his mailbox.
v. Most individual users are not regular in checking their
mailboxes. Hence, important messages may not reach
them in time.
Despite all the disadvantages, e-mail is a cheap and quick
form of information transmission. Web-based e-mail services
are the most popular ones today. Hotmail, Yahoo mail, Gmail,
Rediffmail etc. are very popular among Indian internet users.
These web based e-mail services normally do not charge for e-
mail service. They can be used from any location where Internet
is accessible.
Voice Mail
E-mail exchanges text data. Voice mail transmits digitised
voice messages. The sender dials up the vuicemail service
organisation and is usually required to type in his identification
code. After identity is checked, the user can send this message
in voice form. The voice message is stored on the magnetic disk
of the voice mail computer system. The recipient can open his
voice mailbox whenever he is free and hear the stored voice
message and send a reply to it. Voice mail requires microphone
and speakers in addition to the requirements for email.
318 Modern Communications
Teleconferencing
Teleconferencing is a facility that permits people in
different places to communicate electronically with each other
without being physically present at one place. The people in
communication can be in different offices in the same building,
in the same country or anywhere on the globe. The people at
different locations are connected with a television link that
enables them to see and hear each other. More advanced systems
use computer network with the facility to transmit audio and
motion video for teleconferencing.
Video conferencing
Video conferencing is a facility to interact with people
without all of them being physically present at one place. Each
participant in the conference may be in different places but
electronically they interact with each other. This requires real
time transmission of communications between the places where
the participants are stationed. Companies engage in video
conferencing to monitor progress of projects, review of major
assignments etc. This avoids travel and saves a lot of time for
each executive involved in the video conferencing. But, video
conferencing requires specially equipped studios for each
participant to join in the conference. Alternatively, video
conferencing can be done with a PC, video camera and
broadband Internet connectivity.
GROUPWARE
GroupWare is commonly understood as any application that
is networked and allows users to share data. It is defined as
specialised computer aids that are designed for the use of
320 Modern Communications
MOBILE COMMUNICATION
It is a new form of communication. But it is growing rapidly.
Fixed line telecommunication is challenged everywhere by
mobile communication. Blue tooth and Wireless Application
Protocol (WAP) technologies enable small handheld devices to
be used for voice communication, sharing of documents, email,
online securities trading, mobile commerce and messaging in
addition to playing video games and music.
SUMMARY
Modern communication tools include mobile devices, email,
teleconferencing, video conferencing, instant messaging,
Internet based document sharing etc. These modes of
communications are not only cost effective, they are rich and
highly convenient. The use of multimedia in communications
makes it more attractive and lively. Today, with the Internet
spanning across the globe, it is a connected world we are living
in. The current communications technologies enable people to
stay connected anywhere, anytime.
QUESTIONS
1. What is e-mail? What are the advantages of e-mail?
2. What is J;eleconferencing?
3. What is electronic communication? What are the types of
electronic communication?
4. Describe the process of sending and receiving e-mail
communication.
5. What is collaboration? What are the tools for collaboration?