You are on page 1of 18

INTRO-TO

5/18/2019 INFORMATION
TECH
An Insight On

THE UNIVERSITY OF ZAMBIA IN CONJUCTION WITH ZAMBIA


ICT COLLEGE
SUDENT NAME: MEBBERT CHIYANGI
SUDENT NUMBER: 1913556
COURSE: INFORMATION TECHNOLOGY (BIT100)
ASSIGNMENT 1: Question 1. Discuss file system and file concept.
Question 2. Discuss Data Processing and Representation.
Question 3. Discuss cloud computing.
Question 4. Discuss e-Commerce.

LECTURER: MR S.K. MUKUKA

ZICT COLLEGE|
1

Table of Contents
DISCUSS FILE SYSTEM & FILE CONCEPT ....................................................................................................... 4
FILE CONCEPT ............................................................................................................................................... 4
 HOW FILE SYSTEM WORK....................................................................................................... 5
 ROLE OF METADATA IN FILE SYSTEM .............................................................................................. 5
FILE SYSTEM TYPES ....................................................................................................................................... 6
 FAT FILE SYSTEM ............................................................................................................................... 6
a. Naming Convention ...................................................................................................................... 6
b. Security ......................................................................................................................................... 6
c. Quick Access To The Files ............................................................................................................. 6
 FAT32 FILE SYSTEM........................................................................................................................... 7
Features ................................................................................................................................................ 7
Access Speed ........................................................................................................................................ 7
 NTFS FILE SYSTEM............................................................................................................................. 7
 Features ........................................................................................................................................ 7
Naming Conventions ............................................................................................................................ 7
Security ................................................................................................................................................. 7
High Reliability...................................................................................................................................... 7
File Compression .................................................................................................................................. 7
Bad Cluster Mapping ............................................................................................................................ 7
DATA PROCESSING AND DATA REPRESENTATION ...................................................................................... 8
 NUMBERS ......................................................................................................................................... 8
 IMAGE ............................................................................................................................................... 8
 TEXT .................................................................................................................................................. 9
 AUDIO ............................................................................................................................................... 9
 VIDEO ................................................................................................................................................ 9
a. Video Refers To The Recording Or Broadcasting Of Picture Or Movie. Video Can Either Be
Produced ............................................................................................................................................... 9
DATA PROCESSING ....................................................................................................................................... 9
SIX STAGES OF DATA PROCESSING ........................................................................................................ 10
b. Data Collection ........................................................................................................................... 10
c. Data Preparation ........................................................................................................................ 10
d. Data Input ................................................................................................................................... 10

Mebbert Chiyangi | ZICT COLLEGE|


2

e. Processing ................................................................................................................................... 10
f. Data Output/Interpretation....................................................................................................... 10
g. Data Storage ............................................................................................................................... 10
CLOUD COMPUTING ................................................................................................................................... 11
DEFINITION ............................................................................................................................................ 11
BRIEF HISTORY ........................................................................................................................................ 11
ENABLING TECHNOLOGIES ..................................................................................................................... 11
Web technology ................................................................................................................................. 11
Data center technology ...................................................................................................................... 11
Service Technology ............................................................................................................................. 11
What Comprises Cloud Computing? .................................................................................................. 11
Service Models ................................................................................................................................... 12
Deployment Models .......................................................................................................................... 12
Cloud Platform As A Service (Paas) ............................................................................................... 12
Cloud Infrastructure As A Service (Iaas) ....................................................................................... 12
ADVANTAGES OF CLOUD COMPUTING .................................................................................... 12
ADVANTAGES..................................................................................................................................... 12
Cost Savings....................................................................................................................................... 12
Manageability .................................................................................................................................... 12
Reliability ........................................................................................................................................... 12
DISADVANTAGES .................................................................................................................................... 13
Downtime ........................................................................................................................................... 13
Security ............................................................................................................................................... 13
Limited Control ................................................................................................................................... 13
E-COMMERCE ............................................................................................................................................. 14
 CLASSIFICATION OF E-COMMERCE ................................................................................................ 14
 TYPES OF GOODS ............................................................................................................................ 14
 NATURE OF PARTICIPANTS ............................................................................................................ 14
a. Business to consumer (b2c). ...................................................................................................... 15
b. Business to business (b2b). ........................................................................................................ 15
c. Consumer to business (c2b). ...................................................................................................... 15
d. Consumer to consumer (c2c). .................................................................................................... 15

Mebbert Chiyangi | ZICT COLLEGE|


3

e. Business to administration (b2d): administration relates to public administration or


government entities. .......................................................................................................................... 15
f. Consumer to administration (c2a) ............................................................................................. 15
 THE FUTURE OF E-COMMERCE ...................................................................................................... 15
a. Augmented Reality ..................................................................................................................... 15
b. Chabot......................................................................................................................................... 15
References .................................................................................................................................................. 17

Mebbert Chiyangi | ZICT COLLEGE|


4

QUESTION ONE
DISCUSS FILE SYSTEM & FILE CONCEPT
FILE CONCEPT
(padakuu, 2019) padakuu article states A file is a named collection of related information that is
recorded on secondary storage. Data cannot be written on a secondary storage unless they are
within a file, data can be either numeric, alphabet, alphanumeric, or binary. Files can be free
form, such as text files, or may be formatted rigidly. In general, a file is a sequence of bits, bytes,
lines or records. Many difference types of information may be store in a file-source program,
object grams, executable programs, numeric data, payroll etc.
File system is defined as a method of storing and organizing flies and the data they contain to
make it easy to find and access them. Digital file systems and file are named for and modeled
after paper based filling system using logic-based method of retrieving documents.
(Ed, 2019) As can be seen on RESEARCH STORAGE Ed Hannan as while previously referring
to physical, paper files, the term file system was used to refer to digital files in the early 1961s
and by 1964 it was generally used to refer to computerized file system. To date now the term has
evolved to refer to the hardware used for nonvolatile storage, the software application that
controls the hardware an architecture of both hardware and software.
(fisher.T, 2019) According to Fisher.t ” In a computer, file system is the way in which files are
named and where they are placed logically for storage and retrieval. He further goes on and
describes file system as they can be thought of as an index or data base containing the physical
location of every piece of data on the hard drive or another storage device.”
Without a file system stored, stored information wouldn’t be isolated into individual files and
would be difficulty to identify and retrieve. As data capacities increase, the organization and
accessibility of individual files are becoming even more important in data storage. The data is
usually organized in folders called directories, which can contain other folders and files. Any
place that s computer or other electronic device stores data is employing the use of some type of
file system
File systems can differ between operating systems (OS), such as Microsoft Windows, MacOS
and Linux-based systems. Some file systems include distributed file systems disk-based file
systems.

Mebbert Chiyangi | ZICT COLLEGE|


5

 HOW FILE SYSTEM WORK


A file system stores and organizes data, file systems can be thought of as a type an index for all
the data contained in a storage device. These devices can include internal or external hard drives,
optical drives and flash drives memory cards, complex raid systems along with others.
File system specific conversions for naming files, include the maximum number of character in a
name, which characters can be used and, in some system, how long file name suffix can be. In
many file systems, file names are not sensitive.
Along with the file itself, file systems contain information such as the size of the file, as well as
its attributes, location and hierarchy in the directory in the metadata. Metadata can also identify
free blocks of available storage on the drive and how much space is available.
A file system also include a format to specify the path to a file through the structure of
directories. A file is placed in a directory. Or a folder in Windows OS or subdirectory at the
desired place in the tree structure. PC and mobile OSes have file system in which files are placed
somewhere in a hierarchy+ tree structure.
Before the files and directories are created o the storage medium there is need to put partitions in
place. Partition are region of the hard disk or other storage that the OS manages separately. One
file system is contained in the primary partition, some OSes allow multiple partition on one disk.
This saves data in cases where one partition gets corrupted the other partitions remains
uncorrupted.

 ROLE OF METADATA IN FILE SYSTEM


Metadata is information stored in most any type of file. It can include your name, your company
or your organization’s name, the name of your computer, the name of the network server or drive
where you saved the file, personalized comments and the names and times of previous document
authors, revisions or versions. File system use metadata to store and retrieve files. Listed below
are examples of metadata
Date created, Date modified, last dated of access, Last backup, User ID of the creator, Access
permissions
File system metadata is stored separately from the contents of the file, with many file system
storing the names in separate directories entries some metadata may be kept in the directory,
whereas other metadata maybe kept in a structure called an inode.
An Inode is described as a part of disk that ca store metadata unrelated to the file itself. The
inode indexes information by number which can be used to access the location of the file and
then the file itself.
An example of file system that capitalizes on metadata is OS X, the OS used by apple. It allows
for number of optimization features including the file name that can stretch to 255 characters.

Mebbert Chiyangi | ZICT COLLEGE|


6

FILE SYSTEM TYPES


(byte-notes, 2019) As indicated by byte-note in their report types-of-file-system there are a
number of types of file systems all with different logical structures and properties such as speed
and size, also determines the level of accessibility available to the users. The type of file system
can differ by OS and the needs of that OS. The three most common PC operating systems are
Microsoft Windows, MacOS X and Linux. And common Mobile OSes include Apple iOS,
Google Android, BlackBerry OS and Symbian only to mention a few.
The major file system include the following

 FAT FILE SYSTEM


(fisher.T, 2019) According to Fisher.t FAT (File Allocation Table) is supported by the Microsoft
Windows OS.
FAT is considered simple and reliable, and it is modeled after legacy file systems. FAT was
designed in 1977 for floppy disks, but was later adapted for hard disks. While efficient and
compatible with most current OSes, FAT cannot match the performance and scalability of more
modern file systems.
(byte-notes, 2019) The file allocation table is used by the operating system to locate files on a
disk. A file may be divided into many section and scattered around the disk due to fragmentation.
FAT keeps track of all pieces of a file. In Dos systems, Fat is stored after boot sector. The file
system has been used since the advent of PC.
Some important feature of the FAT are

a. Naming Convention
FAT file system used by Micro Soft-DOS provides file name of only 8 characters along.
FAT file system used by Windows 2000 support long file name. The full path of file including
filename can be up to 255 characters long.
File names should begin with the alphanumeric characters
File names can contain spaces and multiple periods the characters after the last period are treated
as file extension
File name can contain any character except “/ [] = , ^ ? a””

b. Security
FAT does not support local and folder security. Security. A user logged on a computer locally
has access to the files folder in FAT partitions of the computer.

c. Quick Access To The Files


FAT provides quick access to files. The speed of the access depends on the file type, file size,
fragmentation and number of files in a folder.

Mebbert Chiyangi | ZICT COLLEGE|


7

 FAT32 FILE SYSTEM


FAT32 is an advanced version of FAT file system. It can be used on drives from 512 MB to 2TB
in size. Both these file system can offer compatibility with operating systems other than
Windows 2000 also

Features FAT32 increases the number of bits used to address cluster. A cluster is a set of
sectors. It reduces the size of each cluster. It supports larger disk up to 2TB are better storage
efficiency.

Access Speed
FAT32 provides good file access in partition sizes less than 500 MB or greater than 2GB. It
provides better disk space utilization.

 NTFS FILE SYSTEM


NTFS stands for “New Technology File System”.
Windows 2000
Professional fully support NTFS.it has the following characteristics.

 Features
Naming Conventions
File names can be up to 255 characters.
File names can contain most characters except “/<>*|:

Security
NTFS provide the file and folder security. Files and folders are safer than FAT. Security is
maintained by assigning NTFS permissions to files and folders. Security id=s maintained at the
local level and the network level. The permission can be assigned to individual files and folders.
Each file or folder in this file system has an access list. It contains the user and group security
(SID) and the privileges granted to them

High Reliability
NTFS is highly reliable because of the recoverable file system and the automated transaction
logs used to update file and folders. The system also has great amount of fault tolerance. This
means that if transaction fails due to power or system failure, the logged transactions are used to
recover the data.

File Compression
NTFS provides file compression of as much as 50%.

Bad Cluster Mapping


NTFS support bad-cluster mapping. It means that file system detects bad clusters or arears of
disk with errors. If there is any data in those clusters, it is retrieved and stored on another area.
The bad clusters are marked to prevent data storage in those areas in future.

Mebbert Chiyangi | ZICT COLLEGE|


8

PARTITION SIZE the NTFS partition file sizes are much bigger than FAT partitions and files.
The maximum size of an NTFS partition or file can be 16 Exabyte. But has a practical limitation
of two terabytes. This size can range from 4GB to 64GB.

QUESTION TWO
DATA PROCESSING AND DATA REPRESENTATION
DATA REPRESENTATION
(weebly, 2017)Data refers to information presented in whatever form is agreed upon by the
parties creating and using the data.
Weebly (2017) describes Data Representation as “methods used to represent information stored
in a computer. Information today comes in different forms such as text, numbers, images, audio,
and video. Computers can’t understand letters (or base 10 numbers) so any letter typed into a
computer need to converted into binary code this is usually done using the ASCII (American
Standard Code for Information Interchange. Below are some data representation categories.
(Forouzan, et al., 2007)

 NUMBERS
Numbers are represented by bit patterns. However, a code such as ASCII is not used to represent
numbers; the number is directly converted to a binary number to simplify mathematical
operations.

 IMAGE
Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends
on the resolution. For example, an image can be divided into 1000 pixels or 10,000 pixels. In the

Mebbert Chiyangi | ZICT COLLEGE|


9

second case, there is a better representation of the image (better resolution), but more memory is
needed to store the image. After an image is divided into pixels, each pixel is assigned a bit
pattern. The size and the value of the pattern depend on the image. For an image made of only
black and-white dots (e.g., a chessboard), a 1-bit pattern is enough to represent a pixel. If an
image is not made of pure white and pure black pixels, you can increase the size of the bit pattern
to include gray scale. For example, to show four levels of gray scale, you can use 2-bit patterns.
A black pixel can be represented by 00, a dark gray pixel by 01, a light gray pixel by 10, and a
white pixel by 11. There are several methods to represent color images. One method is called
RGB, so called because each color is made of a combination of three primary colors: red, green,
and blue. The intensity of each color is measured, and a bit pattern is assigned to it. Another
method is called YCM, in which a color is made of a combination of three other primary colors:
yellow, cyan, and magenta.

 TEXT
In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s).
Different sets of bit patterns have been designed to represent text symbols. Each set is called a
code, and the process of representing symbols is called coding. Today, the prevalent coding
system is called Unicode, which uses 32 bits to represent a symbol or character used in any
language in the world. The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes the first 127 characters in
Unicode and is also referred to as Basic Latin. Appendix A includes part of the Unicode.

 AUDIO
Audio refers to the recording or broadcasting of sound or music. Audio is by nature different
from text, numbers, or images. It is continuous, not discrete. Even when we use a microphone to
change voice or music to an electric signal, we create a continuous signal. In Chapters 4 and 5,
we learn how to change sound or music to a digital or an analog signal.

 VIDEO
a. Video Refers To The Recording Or Broadcasting Of Picture Or Movie. Video
Can Either Be Produced as a continuous entity (e.g., by a TV camera), or it can be a
combination of images, each a discrete entity, arranged to convey the idea of motion.
Again we can change video to a digital or an analog signal,

DATA PROCESSING
(Talend, 2017) This is the collecting and translating of data into usable
information. Data processing should be handled carefully in order not to negatively
affect the end product or data output.

Mebbert Chiyangi | ZICT COLLEGE|


10

SIX STAGES OF DATA PROCESSING


b. Data Collection
This is the first step in data processing, here data is pulled from available sources which
are trustworthy a well-built so that data collected is of the highest possible quality.

c. Data Preparation
After the data is collected, it is enters the data preparation stage often referred as “pre-
processing” in this stage raw data is cleaned and organized for the following
stage. This raw data is diligently checked for any errors. This step ensures bad
data (redundant, incomplete, or incorrect data) is eliminated then begins to create
high-quality data for the best business intelligence.

d. Data Input
The clean data is enter into its destination and translated into a language than it can
understand data input is the first stage in which raw data begins to take form of usable
information

e. Processing
Data inputted into the computer is actually processed for interpretation. Processing is
done using machine learning algorithms.

f. Data Output/Interpretation
At this stage data is finally usable. It is translated, ridable and often in form of video,
images, text etc.

g. Data Storage
At this final stage, data is stored for future use, while some information may be out to use
immediately. It is important to store data properly as this enables quick and easy
accessibility when need later in future.

Mebbert Chiyangi | ZICT COLLEGE|


11

QUESTION THREE
CLOUD COMPUTING
DEFINITION
(E.Thomas, 2003)
(Cloud computing by Thomas Erl) 2003. defines cloud computing as “a type of computing in
which scalable and elastic IT-enable capabilities are delivered as service to external customer
using internet.”
Thomas Erl goes on to define cloud computing as “a specialized form of distributed computing
that introduces utilization models for remotely provisions scalable and measured resources.”

BRIEF HISTORY
(Cloud computing by Thomas Erl) 2003. “the idea of cloud computing traces back to the origin
of utility computing, a concept that the computer scientist McCarthy publicly proposed in 1961.
“If the computer of their kind I have advocate become the computer of the future, then
computing may someday be organized as a public utility just as telephone system is a public
utility…”
As the general public taking advantage of Internet-based computer utilities since the mid-1990s
through various incarnation search engines (Google, Yahoo!), email services (Hot mail, Gmail)
and so on. These services popularized and validates core concepts that form the basis of modern-
day cloud computing.

ENABLING TECHNOLOGIES
Some areas of technologies that have greatly contributed to the modern-day cloud based
platforms can be seen in chapter 5 of the same book. Are

Web technology
Data center technology
Service Technology
Only to mention a few of these clouding-enabling technology existed in some form prior to the
formal advent of cloud computing.

What Comprises Cloud Computing?


According to the definition of cloud computing by the U.S. National Institute of Standards and
Technology (NIST) which mentioned in chapter 3 page27 of the same book by Thomas Erl.
Cloud computing promotes availability and is comprised by five essential characteristics, three
cloud service models, and four cloud deployment models.
Essential Characteristics

Mebbert Chiyangi | ZICT COLLEGE|


12

Service Models
Deployment Models
The service models comprise; cloud software as a service (SaaS), cloud platform as a service
(PaaS) and cloud infrastructure as a service (IaaS).

Cloud Platform As A Service (Paas)


The users are capable of deploying onto the cloud infrastructure consumer-created or acquired
applications created by using programming languages and tools which are supported by the
providers. Like (SaaS) the users don not manage or control the underlying cloud infrastructure
including storage, operating systems and network but they have control on deployed applications
and possibly are able to configure the applications.

Cloud Infrastructure As A Service (Iaas)


The users are provided with the capability of provision processing, storage, and networks and
able to deploy and run arbitrary software including operating systems and applications. Like the
other two services that mentioned above, the users do not manage the underlying cloud
infrastructure but has control over deployed applications, storage and operating systems.
(National Institute of Standards and Technology, 2009)

ADVANTAGES OF CLOUD COMPUTING


An article published on Level Cloud (2019) stated that “there is no doughty that business can
reap huge benefits cloud computing. However there also disadvantages of cloud computing.”
These are listed below.

ADVANTAGES
Cost Savings
Being the most significant benefit of cloud computing. Business of all sizes exists to earn money
while keeping capital and operational expenses to a minimum. With cloud computing you can
save huge cost with zero in-house server storage and application requirements. This lack of
premises infrastructure removes many operation cost such as power, air conditioning and
administration cost. You pay for what is used an disengage whenever you like it also comes with
capital requirements this makes it extremely affordable even for smaller businesses

Manageability
It provides enhanced and administration management and maintenance capability through
centralized administration

Reliability
Cloud computing is much reliable than in-house infrastructure if servers fails, hosted
applications and services can easily be transited to any available servers as a business benefit
from massive pool of redundant resources.

Mebbert Chiyangi | ZICT COLLEGE|


13

DISADVANTAGES
Downtime
As cloud services providers take care of a number of clients each day, they can become
overwhelmed and may even come up against technical outages which lead to business being
temporally suspended. In addition if your internet connection is offline you will not be able to
access any of your application, servers or data from cloud.
Security
Regardless of providers implementing the best security standards and industry certifications, this
serves an open risk as important data and files are stored on external service providers, Hence no
confidentiality your business resources. For instance, in a multi-tenant cloud architecture where
multiple user are hosted o the same server, a hacker might try to break into the data of the other
users hosted and stored on the same server.
Limited Control
Since the cloud infrastructure is entirely owned, managed and monitored by the service provider,
it transfers minimum control over to the customer. The customer can only control and manage
the applications, data and services operated on top of that on the infrastructure itself.

Mebbert Chiyangi | ZICT COLLEGE|


14

QUESTION FOUR
E-COMMERCE
Rolf T. Wigand of university of Arkansas at Little Rock published in the articles (The
information Society) March 1997 writes about Electronic commerce and says “Electronic
Commerce refers to any economic activities that are conducted through electronic connections”
The first E-Commerce can be traced back in 1969 when the internet was first installed which
involved a network of four computers and was called the ARPANET in U.S.
In today’s world we look at E-Commerce revenue income making transaction made
electronically, an example of some of the companies that are specialized in E-Commerce are
Amazon(www.amazon.com) ,eBay (www.ebay.com), cisco (www.cisco.com) only to mention a
few.

 CLASSIFICATION OF E-COMMERCE
Khurana. A (2019). Understanding the Different Type of e-Commerce Businesses.
[Online].2017. Available from: www.thebalancesmb.com/ecommerce [Accessed on
17/05/2019].

Khurana. A 2019 this classification can be done by parameters on the types of Goods being sold
and the nature of the participants.

 TYPES OF GOODS
This type of classification is important because it gives the analyst an insight into the business
model and the financial model of the enterprise. In case of airline tickets, issues such as
availability, the location of seats, meal preference and refundable purveyors of digital goods can
only operate online. While those who sale physical goods can take online orders and process
online transactions but they must have a physical delivery system in place to transfer their
products to the buyers. These are closely related to the mail-order business of old.

 NATURE OF PARTICIPANTS
Three most common participants are Business, Administration, and customer. The six primary
types are:

Mebbert Chiyangi | ZICT COLLEGE|


15

a. Business to consumer (b2c).


b. Business to business (b2b).
c. Consumer to business (c2b).
d. Consumer to consumer (c2c).
e. Business to administration (b2d): administration relates to public
administration or government entities.
f. Consumer to administration (c2a)
 THE FUTURE OF E-COMMERCE
Troy Anctil MAY 15 2018 in the Trellis Blog writes “with the frustration that comes to queuing
in backs, shopping mall tills also finding a packing slot. More and more people now prefer e-
commerce, with the number of users now growing each yeah with number of user smartphones
user expect in 2019 to be 5 billion. “A report from ComScore shows that ecommerce growth
over three times the growth of PC ecommerce” Rishabh Software, 2017. Mobile will be the new
Normal.
Better customer focus, AI will make it smarter. Artificial Intelligence will focus on personalized
shopping for e-Commerce buyers Brands are starting to highlight customers-based engagement
in all the facets of their business online, such as their social media platforms. Customers will see
personalized ads relevant to their shopping habits and be more compelled to buy the product
(Vatsala, 2017) Furthermore Vatsala Kothari, (2017) in the article did an estimate which showed
that by 2020, 55% of the online transactions will be cashless made possible by M-Commerce
(mobile commerce) such PayPal, mtn mobile money etc.

a. Augmented Reality augmented reality has power to transform shopping experience


though the touch-and-feel concept. There will be an undeniable demand for AR
compatible product catalogue to be displayed on e-commerce sites.

b. Chabot
This will be the future of customer service and will aid task automation. Chabot’s will be
powered by AI and designated for specific task such as voice-enabled orders. This will further
reduce the possibility to errors and give the consumer a satisfying shopping experience.
Above all there come disadvantages and advantages of E-Commerce.
(Gareth.R.T.White, 2017) From the Research gate.

ADVANTAGES DISADVANTAGES
It aids business development in Internal perception of security and reliability
developing countries
It helps reduce cost of business operation External and internal data integrity and protection

Mebbert Chiyangi | ZICT COLLEGE|


16

Minimizes issues associated with logistics External infrastructure: power supply security, internet,
funding
Reduces the cost of production
Easy online comparisons
Support economic development

Mebbert Chiyangi | ZICT COLLEGE|


17

References
byte-notes, 2019. byte-notes. [Online]
Available at: https://byte-notes.notes.com/types-of-file-systems/
[Accessed 16 05 2019].

E.Thomas, 2003. Cloud Computing. 4th ed. new york: s.n.

Ed, H., 2019. searchstorage. [Online]


Available at: http://Searchstorage.techtacget.com/definition/file-system
[Accessed 15 05 2019].

fisher.T, 2019. lifewire. [Online]


Available at: https://www.lifewire.com
[Accessed 16th 05 2019].

Forouzan, B. A., College, D. & Fegan, S. C., 2007. data processing. In: R. Olson, ed. Data Communication
And Networking 4th Ed.. Forouzan. B (2007). Data processing and data representation . 4th Ed. Data
Com. And Networking chapter 1.1 Page 5 ed. new york: McGraw-Hill, p. 5.

Gareth.R.T.White, 2017. researchgate. [Online]


Available at: (2019). Disadvantages and advantages of e-
Commerwww.researchgate.net/figure/advantages-and-disadvantages-of-e-commerce/
[Accessed 17 may 2019].

padakuu, 2019. padakuu. [Online]


Available at: http://www.Padakuu.com/article/75-file-concept/amp
[Accessed 15 05 2019].

Talend, 2017. talend. [Online]


Available at: www.talend.com/resources/what-is-data-processing/
[Accessed 16th 05 2019].

Vatsala, K., 2017. bussinesaworld. [Online]


Available at: www.bwdisrupt.businessworld.in
[Accessed 17 may 2019].

weebly, 2017. digital technologies-nz curriculum. [Online]


Available at: https://nzdigitalcurriculum.weebly.com/data-representain.html
[Accessed 14 05 2019].

Mebbert Chiyangi | ZICT COLLEGE|

You might also like