Professional Documents
Culture Documents
ON
Submitted by,
GLORIA HARRIS
MBA – Semester 1
(Session 2017-19)
based on my own work carried out during the course of my study under the supervision of Miss.
Ayesha Khan.
I assert that the statements made and conclusions drawn are an outcome of my research
work. I further declare that to the best of my knowledge and belief the report does not contain any
part of any work which has been submitted for the award of MBA degree or any other
_________________
(Signature)
GLORIA HARRIS
Enrolment No:
CERTIFICATE
This is to certify that the work incorporated in the thesis Case Analysis Lab is a work carried out by
GLORIA HARRIS bearing Enrolment no. under my/our guidance and supervision for the part
fulfillment for the award of MBA Degree of Chhattisgarh Swami Vivekanand Technical University,
Bhilai (C.G), India.
iii. Is up to the desired standard both in respect of contents and language for external viva.
Signature
I would like to express my gratitude towards Dr. Manoj Verghese (Head of the Department) and Miss.
Ayesha Khan (Assistant Professor) of Rungta College of Engineering and Technology, Bhilai (C.G)
for their kind cooperation and encouragement which helped me in the completion of this project.
I am highly indebted to Dr. Manoj Verghese and Miss Ayesha Khan for their guidance and constant
supervision as well as for providing necessary information regarding the project and also for their
support in completing the project.
TABLE OF CONTENTS
formatting in HTML.
Languages.
being used. Initially, the generation term was used to distinguish between varying
There are five computer generations known till date. Each generation has been discussed
in detail along with their time period and characteristics. In the following table,
approximate dates against each generation has been mentioned, which are normally
accepted.
First Generation
1
The period of first generation: 1940-1956. Vacuum tube based.
Second Generation
2 The period of second generation: 1956-1963. Transistor based.
Third Generation
3
The period of third generation: 1964-1971. Integrated Circuit based.
Fourth Generation
4
The period of fourth generation: 1971-1980. VLSI microprocessor based.
1
Fifth Generation
5
The period of fifth generation: 1980-onwards. ULSI microprocessor based.
These early computers used vacuum tubes as circuitry and magnetic drums for memory.
As a result they were enormous, literally taking up entire rooms and costing a fortune to
run. These were inefficient materials which generated a lot of heat, sucked huge
electricity and subsequently generated a lot of heat which caused ongoing breakdowns.
These first generation computers relied on „machine language‟ (which is the most basic
limited to solving one problem at a time. Input was based on punched cards and paper
tape. Output came out on print-outs. The two notable machines of this era were the
UNIVAC and ENIAC machines – the UNIVAC is the first every commercial computer
Unreliable
Very costly
Huge size
Need of A.C.
2
Non-portable
ENIAC
EDVAC
UNIVAC
IBM-701
IBM-650
The replacement of vacuum tubes by transistors saw the advent of the second generation
computers until the end of the 1950s. They were a big improvement over the vacuum
tube, despite still subjecting computers to damaging levels of heat. However they were
hugely superior to the vacuum tubes, making computers smaller, faster, cheaper and less
heavy on electricity use. They still relied on punched card for input/printouts.
The language evolved from cryptic binary language to symbolic („assembly‟) languages.
This meant programmers could create instructions in words. About the same time high
level programming languages were being developed (early versions of COBOL and
into their memories – moving from magnetic drum to magnetic core „technology‟. The
early versions of these machines were developed for the atomic energy industry.
3
The main features of second generation are −
Use of transistors
AC required
IBM 1620
IBM 7094
CDC 1604
CDC 3600
UNIVAC 1108
4
Third Generation – Integrated Circuits
By this phase, transistors were now being miniaturised and put on silicon chips (called
machines. These were the first computers where users interacted using keyboards and
monitors which interfaced with an operating system, a significant leap up from the punch
cards and printouts. This enabled these machines to run several applications at once using
As a result of these advances which again made machines cheaper and smaller, a new
IC used
Smaller size
Faster
Lesser maintenance
Costly
AC required
5
Some computers of this generation were −
IBM-360 series
Honeywell-6000 series
IBM-370/168
TDC-316
This revolution can be summed in one word: Intel. The chip-maker developed the Intel
4004 chip in 1971, which positioned all computer components (CPU, memory,
input/output controls) onto a single chip. What filled a room in the 1940s now fit in the
palm of the hand. The Intel chip housed thousands of integrated circuits. The year 1981
saw the first ever computer (IBM) specifically designed for home use and 1984 saw the
The increased power of these small computers meant they could be linked, creating
networks. Which ultimately led to the development, birth and rapid evolution of the
Internet. Other major advances during this period have been the Graphical user interface
(GUI), the mouse and more recently the astounding advances in lap-top capability and
hand-held devices.
6
The main features of fourth generation are −
Very cheap
Use of PCs
Pipeline processing
No AC required
DEC 10
STAR 1000
PDP 11
CRAY-1(Super Computer)
CRAY-X-MP(Super Computer)
7
Fifth Generation – Artificial Intelligence
The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology
became ULSI (Ultra Large Scale Integration) technology, resulting in the production of
software. AI is an emerging branch in computer science, which interprets the means and
method of making computers think like human beings. All the high-level languages like
Computer devices with artificial intelligence are still in development, but some of these
The essence of fifth generation will be using these technologies to ultimately create
machines which can process and respond to natural language, and have capability to learn
AI includes −
Robotics
Neural Networks
Game Playing
8
The main features of fifth generation are −
ULSI technology
Desktop
Laptop
NoteBook
UltraBook
ChromeBook
9
COMPUTER LANGUAGES
Introduction:
A language is the main medium of communicating between the Computer systems and
the most common are the programming languages. As we know a Computer only
understands binary numbers that is 0 and 1 to perform various operations but the
languages are developed for different types of work on a Computer. A language consists
of all the instructions to make a request to the system for processing a task. From the first
generation and now fourth generation of the Computers there were several programming
languages used to communicate with the Computer. Here we will go in the detail of the
A Computer language includes various languages that are used to communicate with a
Computer machine. Some of the languages like programming language which is a set of
codes or instructions used for communicating the machine. Machine code is also
considered as a computer language that can be used for programming. And also HTML
Similarly there are different types of languages developed for different types of work to
be performed by communicating with the machine. But all the languages that are now
available are categorized into two basic types of languages including Low-level language
10
Low Level Language:
Low level languages are the machine codes in which the instructions are given in
operate and handle all the hardware and instructions set architecture of a Computer. The
main function of the Low level language is to operate, manage and manipulate the
hardware and system components. There are various programs and applications written in
low level languages that are directly executable without any interpretation or translation.
The most famous and the base of all programming languages “C” and “C++” are mostly
used Low level languages till today. Low level language is also divided into two parts are
which is the first generation language developed for communicating with a Computer. It
is written in machine code which represents 0 and 1 binary digits inside the Computer
string which makes it easy to understand and perform the operations. As we know a
Computer system can recognize electric signals so here 0 stands for turning off electric
pulse and 1 stands for turning on electric pulse. It is very easy to understand by the
The main advantage of using Machine language is that there is no need of a translator or
interpreter to translate the code, as the Computer directly can understand. But there are
some disadvantages also like you have to remember the operation codes, memory address
11
every time you write a program and also hard to find errors in a written program. It is a
language that has almost similar structure and set of commands as Machine language.
Instead of using numbers like in Machine languages here we use words or names in
English forms and also symbols. The programs that have been written using words,
names and symbols in assembly language are converted to machine language using an
Assembler. Because a Computer only understands machine code languages that‟s why we
need an Assembler that can convert the Assembly level language to Machine language so
The main disadvantage of this language is that it is written only for a single type of CPU
and does not run on any other CPU. But its speed makes it the most used low level
12
High Level Language:
The high level languages are the most used and also more considered programming
languages that helps a programmer to read, write and maintain. It is also the third
generation language that is used and also running till now by many programmers. They
are less independent to a particular type of Computer and also require a translator that can
convert the high level language to machine language. The translator may be an interpreter
and Compiler that helps to convert into binary code for a Computer to understand. There
is various high level programming languages like C, FORTRAN or Pascal that are less
The Compiler plays an important role on the Computer as it can convert to machine
language and also checks for errors if any before executing. There are several high level
languages that were used earlier and also now like COBOL, FORTRAN, BASIC, C,
C++, PASCAL, LISP, Ada, Algol, Prolog and Java. It is user-friendly as the programs
are written in English using words, symbols, characters, numbers that needs to be
13
2.) Explain about Operating System and its types. Discuss about DOS OS.
OPERATING SYSTEM
hardware and software resources and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may
For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between programs and the computer hardware, although
the application code is usually executed directly by the hardware and frequently
makes system calls to an OS function or is interrupted by it. Operating systems are found
on many devices that contain a computer – from cellular phones and video game
consoles to web servers and supercomputers. The dominant desktop operating system
is Microsoft Windows with a market share of around 82.74%. mac OS by Apple Inc. is in
second place (13.23%), and the varieties of Linux are collectively in third place (1.57%).
In the mobile (smart phone and tablet combined) sector, use in 2017 is up to 70%
of Google's Android and according to third quarter 2016 data, Android on smart phones
is dominant with 87.5 percent and a growth rate 10.3 percent per year, followed
by Apple's iOS with 12.1 percent and a per year decrease in market share of 5.2 percent,
while other operating systems amount to just 0.3 percent. Linux distributions are
dominant in the server and supercomputing sectors. Other specialized classes of operating
systems, such as embedded and real-time systems, exist for many applications.
14
TYPES OF OPERATING SYSTEM
A single-tasking system can only run one program at a time, while a multi-
tasking operating system allows more than one program to be running in concurrency.
This is achieved by time-sharing, dividing the available processor time between multiple
co-operative types. In preemptive multitasking, the operating system slices the CPU time
multitasking is achieved by relying on each process to provide time to the other processes
Single-user operating systems have no facilities to distinguish users, but may allow
multiple programs to run in tandem. A multi-user operating system extends the basic
concept of multi-tasking with facilities that identify processes and resources, such as disk
space, belonging to multiple users, and the system permits multiple users to interact with
the system at the same time. Time-sharing operating systems schedule tasks for efficient
use of the system and may also include accounting software for cost allocation of
processor time, mass storage, printing, and other resources to multiple users.
15
Distributed
A distributed operating system manages a group of distinct computers and makes them
linked and communicate with each other gave rise to distributed computing. Distributed
computations are carried out on more than one machine. When computers in a group
Templated
single virtual machine image as a guest operating system, then saving it as a tool for
multiple running virtual machines. The technique is used both in virtualization and cloud
Embedded
They are designed to operate on small machines like PDAs with less autonomy. They are
able to operate with a limited number of resources. They are very compact and extremely
efficient by design. Windows CE and Minix 3 are some examples of embedded operating
systems.
16
Real Time operating System
A real-time system is defined as a data processing system in which the time interval
required to process and respond to inputs is so small that it controls the environment.
The time taken by the system to respond to an input and display of required updated
information is termed as the response time. So in this method, the response time is very
Real-time systems are used when there are rigid time requirements on the operation of a
processor or the flow of data and real-time systems can be used as a control device in a
dedicated application. A real-time operating system must have well-defined, fixed time
constraints, otherwise the system will fail. For example, Scientific experiments, medical
imaging systems, industrial control systems, weapon systems, robots, air traffic control
systems, etc.
Hard real-time systems guarantee that critical tasks complete on time. In hard real-time
systems, secondary storage is limited or missing and the data is stored in ROM. In these
17
Soft real-time systems
Soft real-time systems are less restrictive. A critical real-time task gets priority over
other tasks and retains the priority until it completes. Soft real-time systems have limited
utility than hard real-time systems. For example, multimedia, virtual reality, Advanced
Library
A library operating system is one in which the services that a typical operating system
provides, such as networking, are provided in the form of libraries and composed with the
18
Disk Operating System (DOS)
INTRODUCTION
When the computer starts, it starts the operating system that takes the control of the
machine. An Operating System is a set of programs that help in controlling and managing
the Hardware and the Software resources of a computer system. A good operating system
1. Help in the loading of programs and data from external sources into the internal
· Store the output data or programs written on the computer in storage device.
· Communicate the message from the system to the user through the VDU.
rebranded version under the name IBM PC DOSwhich were introduced in 1981, as well
as some later compatible systems from other manufacturers: DR-DOS (1988), ROM-
Dozens of other operating systems also use the acronym "DOS", including the
19
OBJECTIVES
As the name suggests, the operating System is used for operating the system or the
computer. It is a set of computer programs and also known as DOS (Disk Operating
System). The main functions of DOS are to manage disk files, allocate system resources
devices such as Keyboard, Screen, Disk Devices, Printers, Modems and programs.
Basically, DOS is the medium through which the user and external devices attached to
the system communicate with the system. DOS translate the command issued by the user
in the format that is understandable by the computer and instruct computer to work
accordingly. It also translates the result and any error message in the format for the user
to understand.
20
(a) Loading of DOS
The BOOT Record into the computer memory loads DOS. BOOT Record in turn is
The system start-up routine of ROM runs a reliability test called Power On Self Test
(POST) which initializes the chips and the standard equipment attached to the PC, and
check whether peripherals connected to the computer are working or not. Then it tests
the RAM memory. Once this process is over, the ROM bootstrap loader attempts to read
the Boot record and if successful, passes the control on to it. The instructions/programs
in the boot record then load the rest of the program. After the ROM boot strap
loader turns the control over to boot record, the boot tries to load the DOS into the
memory by reading the two hidden files IBMBIO.COM and IBMDOS.COM. If these
two are found, they are loaded along with the DOS command interpreter
through the keyboard in the DOS command mode. By comparing the input with the list
21
COMPUTER FILES IN DOS
A file may contain a program or any other kind of information. Generally, a file must
be given a name that can be used to identify it. DOS permits the user to assign a name
consisting of two parts to a file – primary and secondary names. Primary name can be
Hyphen), and the Secondary name should consist of three characters, which is optional.
The primary name and the secondary (or extension) name, if any, are to be separated by
a dot (.).
Primary name can be linked to proper name, whereas extensions are like surnames of
people. Using an extension with the file name is preferable, though optional. However,
once the extension is specified, using the complete name (primary name and extension,
with the period separating them can only refer the file). Using extensions can be an
Examples:
Employee Employee
22
DOS has a way of showing which disk drive is currently active. The floppy disk drives
are assigned alphabets A and B, whereas the hard disk drive is assigned the alphabet C.
If your PC has a single floppy drive, the drive would be A and if it has two, they would
be termed as A and B. If your PC includes a hard disk, besides a FDD (Floppy Disk
Drive), the drive names would be A and C. If the prompt is A, then it implies that the
first floppy disk drive is active. Where as the DOS prompt would be C, if the hard disk
The files in the computer come from various sources. Some files come with DOS, while
other come with publications such as a word processor. These files contain codes and
Before long, there will be hundreds or even thousands of files in the computer, which
The names of all the files created in a disk are stored in its directory. Directory is just
like a file folder, which contain all the logically related files. DOS files are organized in
cabinet containing a number of drawers, which in turn may contain folders. The content
The file cabinet here is the ROOT DIRECTORY, the drawer is INDIVIDUAL
23
Otherwise, the large number of files that get created for various purposes in a disk can
make the directory huge and difficult to view and manage. Therefore, DOS enables the
user to organize the files in a disk into directories and sub-directories in a hierarchical
structure. Directories can contain other directories. A directory within another directory
is called a sub-directory.
Of course, there may be sub-directories of sub-directories, but a file name is the furthest
you may descend down the (inverted) tree of directories and files. Thus, a file name
corresponds to a tree leaf, a sub-directory to a branch, the directory to the trunk, and
the root directory to the root of the tree, hence the name ROOT DIRECTORY.
ROOT
24
DIRECTORY COMMAND
The content of each of the sub-directory cannot be viewed unless it is made active, or a
sub-directory is specified as part of the DIR command. Doing either of these requires
by displaying the directory‟s name in the command prompt. For example, the following
command prompt indicate that you are in the DOS directory: C:\DOS>. Knowing which
directory is current helps you find files, and to move from one directory to another
more easily. Typically, the ROOT DIRECTORY (\) is the initial working directory.
The entire specification of directory from root is called a PATH. By itself, the DIR
directories at adjacent levels are separated by backslash (\), while specifying the path to
A path is the route that leads from the root directory of a drive to the file you want to
use.
For example, to access the NOS.LET file in the LETTER subdirectory of NOS directory,
DOS must go from the ROOT (\) directory through the NOS directory to the LETTER
25
C:\
NOS
ACCOUNT
SALARY
LETTER
NOS.LET
PROJECT
To specify the same path at the command prompt, you would type it as shown in the
following illustration:
C:\NOS\LETTER\NOS.LET
This is the path or route to the file NOS.LET. The first letter and the colon (C:) represent
the drive the file is on. The first back slash (\) represents the root directory. The second
backslash separates the NOS directory from the LETTER sub-directory. The third
backslash separates the LETTER sub-directories from the file name, NOS.LET.
26
DIR COMMAND
The DIR command gives the list of is there on the disk that is mounted on the active
drive.
Example
A:\> DIR
Directory of A:\
A:\>
As can be seen, on typing DIR followed by key at DOS prompt, five columns of data
followed by the number of files and bytes that are free in the disk are displayed. The
first column contains the primary name of each file resident on the disk. However, most
files are named with an extension, which appear in the second column. Whereas, the
third column contains the size of the file in bytes, and the fourth and fifth columns show
the date and time on which the files was created or last modified. The last line displays
the number of file(s) and remaining disk space free in bytes. It is important to note that
the DIR command only displays the names of the files and not their contents.
27
CHANGING A DIRECTORY
besides them are directories. You can see the list of files in another directory by
changing to that directory and then using the DIR command again.The Change
Directory (CHDIR) or CD command enables the user to travel around the directories in
Syntax:
# 1. A:\>CD \NOS
This command makes the NOS sub-directory under the root directory (\) active.
# 2. A:\>CD \NOS\LETTERS
The backslash indicates the root, and LETTERS, which is a sub-directory under the NOS
# 3. A:\> CD \
The root directory becomes the working directory; i.e. you will change back to the
root or main directory. The slash typed in this command is a backslash (\). No matter
which directory you are in, this command always returns you to the root directory of a
drive. The root directory does not have a name, it is simply referred to by a backslash
(\).
28
MAKING OR CREATING DIRECTORY
files.
Syntax:
The MD or MKDIR command creates a new empty directory whose name is the last
item specified in the pathname, in the specified drive. If active, the drive need not be
the active drive, typing MD {directory name} at the DOS prompt or command prompt is
sufficient.
Examples:
# 1. A:\> MD \ACCT\SALARY
29
DELETING A DIRECTORY
You may want to delete or remove a directory to simplify your directory structure.
Example:
# 1. A:\> RD \ACCT\SALARY
NOTE: You cannot delete a directory if you are in it. Before you can delete a directory,
you must type cd.. at the command prompt. At the same point of time, the directory to
COPYING FILES
To copy a file, DOS provides `COPY‟ command. When you use `copy‟ command, you
must use the following two parameters; the location and the name of the file you want
to copy, or the source; and the location and the file name to which you want to copy
the file or the target (destination). You separate the source and the destination or target
i.e. the first set of drive, path and filename refers to the source file, and the second
30
(a) Copying Single File
To copy the DEBUG.EXE file from the DOS directory to the NOS
directory
1. Return to the root directory by typing the following command prompt: CD\
2. Change to the DOS directory by typing the following commands at the DOS prompt:
CD DOS
3. To copy the file DEBUG.EXE file from the DOS directory to the
Examples:
makes a copy of the office.doc file in the current or working directory with a new
name office.bak
copy the file office.doc from the root directory to the sub-directory LETTER under root
If the target drive is not specified, the copied file will reside in the disk mounted on the
active drive.
31
USE OF WILDCARD CHARACTERS
If you want to carry out a task for a group of files whose names have something in
common, you can use wildcard characters to specify groups of files. DOS recognize
two wildcard characters: asterisk (*) represents one or more characters that a group of
files has in common; and the question mark (?) represents a single character that a
group of files has in common. You can use wildcards to replace all or part of a file‟s
LETTER.TXT
extension REPORT.LET
REPORT.WRI
# 1. A:\>COPY \letters\*.COB B:
32
It means, copy all files with extension *.COB from the directory LETTERS under the
The command is to copy all files with primary name OPEL (irrespective extension) in
the directory COMPANY under ROOT of the drive `B‟ into the current working
directory of the disk mounted in `A‟ drive. Incase of one drive, the system will ask for
target drive.
The command,
#3.A:\>COPY C:\*.*
copies all files of the ROOT directory of the „C‟ drive into the working directory of the
„A‟ drive.
copies all files with primary name consisting of 6 characters in total and LETTE as the
copies all files having a primary name of one character with an extension .DOC from
33
RENAMING FILES
To rename a file, DOS provides REN command. The REN command stands for
“Rename”. When you use the REN command, you must include two parameters. The
first is the file you want to rename, and the second is the new name for the file. You
separate the two names with a space. The REN command follows this pattern:
DELETING FILES
This section explains how to delete or remove a file that is no longer required in the
Example:
# 1. DEL \DOS\EDIT.HLP
delete the EDIT.HLP from the DOS directory under ROOT directory.
PRINTING A FILE
The `PRINT‟ command of DOS works more or less like `TYPE‟ com
mand, but at the same time, it enables the content of a text file
to be printed on a paper.
Syntax:
34
A:\> PRINT [drive:] {path} {filename}
Example:
35
3.) What is MS-OFFICE? Discuss about MS-WORD, POWER POINT& MS-
by Microsoft. It was first announced by Bill Gates on 1 August 1988, at COMDEX in Las
Vegas. Initially a marketing term for a bundled set of applications, the first version of
Office contained Microsoft Word,Microsoft Excel, and Microsoft PowerPoint. Over the
years, Office applications have grown substantially closer with shared features such as a
common spell checker, OLE data integration and Visual Basic for Applications scripting
2012, Softpedia reported that Office is used by over a billion people worldwide.
the desktop version, available for PCs running the Windows and mac OS operating
systems. The most current desktop version is Office 2016 for Windows and mac OS,
More recently, Microsoft developed Office Mobile, which are free-to-use versions of
Office applications for mobile devices. Microsoft also produces and runs Office Online,
account.
36
Microsoft Word: a word processor included in Microsoft Office and some editions
of the now-discontinued Microsoft Works. The first version of Word, released in the
autumn of 1983, was for the MS-DOS operating system and had the distinction of
introducing the mouse to a broad population. Word 1.0 could be purchased with a
closer WYSIWYGfeatures into its package. Word for Mac was released in 1985.
Word for Mac was the first graphical version of Microsoft Word. Initially, it
implemented the proprietary doc format as its primary format. Word 2007, however,
deprecated this format in favor of Office Open XML, which was later standardized
Format (PDF) and OpenDocument (ODF) was first introduced in Word for Windows
Microsoft Excel: a spreadsheet that originally competed with the dominant Lotus 1-
2-3, and eventually outsold it. Microsoft released the first version of Excel for the
Mac OS in 1985, and the first Windows version (numbered 2.05 to line up with the
of text, graphics, and other objects, which can be displayed on-screen and shown by
the relational Microsoft Jet Database Engine with a graphical user interface and
software development tools. Microsoft Access stores data in its own format based on
37
the Access Jet Database Engine. It can also import or link directly to data stored in
replaces Windows Messaging, Microsoft Mail, and Schedule+ starting in Office 97, it
includes an e-mail client, calendar, task manager and address book. On the Mac OS,
Microsoft offered several versions of Outlook in the late 1990s, but only for use
drawings, screen clippings and audio commentaries. Notes can be shared with other
OneNote users over the Internet or a network. OneNote was initially introduced as a
standalone app that was not included in any of Microsoft Office 2003 editions.
the release of Microsoft Office 2013, OneNote was included in all Microsoft Office
a freemium Windows desktop app, a mobile app for Windows Phone, iOS, Android,
Microsoft Publisher: a desktop publishing app for Windows mostly used for
38
4.) How to create HTML document. Also discuss basic formatting in HTML.
An HTML document contains two distinct parts, the head and the body.
The head contains information about the document that is not displayed on the screen.
<html>
<head>
</head>
<body>
: :
: :
: :
</body>
</html>
Enclose all HTML work within an <html>....</html> tag. Note that your web pages will
display fine on most computers without any of these tags. However by using them, your
web pages will be fully compliant with International HTML standards and ensure
Here are the steps for creating your first HTML file. Are you ready?
39
1. Go to the text editor window.
2. Enter the following text (you do not have to press RETURN at the end of each
3. <html>
4. <head>
5. <title>Volcanoes!</title>
6. </head>
7.
8. <body>
12. </body>
13. </html>
screen. What does it do? The <title> tag is used to uniquely identify
each document and is also displayed in the title bar of the browser
window.
40
Basic formatting in HTML
Text processing systems, in HTML you have to type formats such as italics and bold.
This applies also to making paragraphs and lists. HTML ignores blank lines, you have to
use the tags instead. Every paragraph should be enclosed between <P> and the
<P>This is the text of the paragraph One</P> This is the text of the paragraph One
<P>There is a blank line between the first and the There is a blank line between the
Many linebreaks
<P>Many linebreaks<BR>within<BR>a
within
paragraph</P>
a paragraph
<H2>Smaller</H2> Smaller
Bullet lists are enclosed between <UL> and </UL>, while number lists
need <OL> and </OL>. In both cases, each list entry is enclosed by <LI> and </LI>.
Example
41
First entry
<UL><LI>First entry</LI>
<LI>Second entry</LI></UL>
Second entry
In general, all HTML tags come in pairs, an opening tag and the corresponding closing
You can use simple HTML commands such as <B> and <I> to set your text bold and
italics. Simply preceed the passage with a <B> or <I> and close it afterwards with a
HREF=http://www.google.com>google</A> to google
42
How to add an image?
Use the img tag. As with links, you can us either absolute or relative URLs. Example
This is
image
43
5.Write about application of computer in business?
Business application is any software or set of computer programs used by business users
to perform various business functions. These business applications are used to increase
By and large, business software is likely to be developed to meet the needs of a specific
unless its nature and operation is identical. Due to the unique requirements of each
depending on the business in question, and thorough research is always required before
Some business applications are interactive, i.e., they have a graphical user interface or
user interface and users can query/modify/input data and view results instantaneously.
They can also run reports instantaneously. Some business applications run in batch mode:
they are set up to run based on a predetermined event/time and a business user does not
Many kinds of users are found within the business environment, and can be categorized
The medium size, or small and medium-sized enterprise (SME), has a broader range
44
management, human resource management systems, outsourcing relationship
The last segment covers enterprise level software applications, such as those in the
management. These applications are extensive in scope, and often come with
modules that either add native functions, or incorporate the functionality of third-
APPLICATION SUPPORT
Business applications are built based on the requirements from the business users. Also,
these business applications are built to use certain kind of Business transactions or data
items. These business applications run flawlessly until there are no new business
applications run flawlessly if there are no issues with computer hardware, computer
Business applications can fail when an unexpected error occurs. This error could occur
due to a data error (an unexpected data input or a wrong data input), an environment error
(an in frastructure related error), a programming error, a human error or a work flow
error. When a business application fails one needs to fix the business application error as
45
soon as possible so that the business users can resume their work. This work of resolving
Reporting errors
The Business User calls the business application support team phone number or sends an
e-mail to the business application support team. The business application support team
gets all the details of the error from the business user on the phone or from the e-mail.
These details are then entered in a tracking software. The tracking software creates a
request number and this request number is given to the business user. This request
number is used to track the progress on the support issue. The request is assigned to a
Notification of errors
application not working correctly), an e-mail is sent to the entire organization or impacted
teams so that they are aware of the issue. They are also provided with an estimated time
The business application support team member collects all the necessary information
about the business software error. This information is then recorded in the support
request. All of the data used by the business user is also used in the investigation. The
Error resolution
If any similar business application errors occurred in the past then the issue resolution
steps are retrieved from the support knowledge base and the error is resolved using those
46
steps. If it is a new support error, then new issue resolution steps are created and the error
is resolved. The new support error resolution steps are recorded in the knowledge base
for future use. For major business application errors (critical infrastructure or application
failures), a phone conference call is initiated and all required support persons/teams join
the call and they all work together to resolve the error.
Code correction
If the business application error occurred due to programming errors, then a request is
created for the application development team to correct programming errors. If the
business user needs new features or functions in the business application, then the
If the business application error occurred due to a work flow issue or human errors during
data input, then the business users are notified. Business users then review their work
flow and revise it if necessary. They also modify the user guide or user instructions to
If the business application error occurred due to infrastructure issues, then the specific
infrastructure team is notified. The infrastructure team then implements permanent fixes
for the issue and monitors the infrastructure to avoid the re-occurrence of the same error.
47