Professional Documents
Culture Documents
BBA106 ITTools&Application Unit1
BBA106 ITTools&Application Unit1
Computer is an electronic device that operates (works) under the control of programs
stored in its own memory unit.
An electronic device that accepts data as input, and transforms it under the in uence of a
set of special instructions called Programs, to produce the desired output (referred to as
Information).
1.1.2 Icon
An icon is a small graphical representation of a program, feature, or le.
When you click or double-click an icon, the associated le or program opens or an action
is performed.
For example, if you were to double-click My Computer icon, it would open Windows
Explorer.
Icons are a component of GUI operating systems, including Apple macOS X and Microsoft
Windows.
Icons help users quickly identify the type of le represented by the icon.
1.1.3 File
A le is an object on a computer that stores data, information, settings, or commands
used with a computer program.
On a computer there are three types of les, application les, data les, and system les.
In a GUI (graphical user interface), such as Microsoft Windows, les display as icons that
relate to the program that opens the le.
For example, all PDF icons appear the same and open in Adobe Acrobat or the reader
associated with PDF les.
If a program is associated with a program, double-clicking the icon opens it in the default
program.
1.1.4 Folder
A folder, also called a directory, is a space used to store les, other folders, and shortcuts
on a computer.
2. Also, In Windows 7, there is a New folder button near the top of the window.
Page 1 of 32
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fl
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
1.1.6 Desktop
A desktop is a term commonly used to describe a desktop computer or system unit.
When referring to an operating system or GUI (graphical user interface), the desktop is a
system of organization of icons on a screen. The Microsoft Windows desktop was rst introduced
with Microsoft Windows 95 and included with every version of Windows since then.
1.1.7 Shortcut
A shortcut is an abbreviated form of a keyboard shortcut.
A shortcut in Windows has a small arrow in the bottom left corner of the icon.
Having a shortcut on the Windows desktop eliminates the need for users to look through
the Start menu Programs list to nd a speci c software program.
A shortcut also makes it quicker to open a le and not have to dig through folders on the
computer to ind a le.
1. Locate the program (or le, or folder) that you want to add a desktop icon for.
Short for character user interface or command-line user interface, CUI is a way for users to
interact with computer programs. It works by allowing the user (client) to issue commands as one
or more lines of text (referred to as command lines) to a program. Good examples CUIs are MS-
DOS and the Windows Command Prompt. One of the CUI's uses is that it provides an easy way
to implement programming scripts.
Third Generation: The period of third generation: 1965-1971 (Integrated Circuit based)
Fourth Generation: The period of fourth generation: 1971-1980 (VLSI microprocessor based)
Fifth Generation: The period of fth generation: 1980-onwards (ULSI microprocessor based)
Vacuum tubes were the basic components for memory and circuitry for CPU (Central
Processing Unit).
Page 2 of 32
fi
fi
fi
fi
fi
fi
fi
fi
fi
ff
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
These tubes, like electric bulbs, produced a lot of heat and the installations used to fuse
frequently. Therefore, they were very expensive and only large organizations were able to a ord it.
Punch cards, paper tape, and magnetic tape was used as input and output devices.
The computers in this generation used machine code as the programming language.
2. Unreliable
4. Very costly
7. Huge size
8. Need of AC
9. Non-portable
1. ENIAC
2. EDVAC
3. UNIVAC
4. IBM-701
5. IBM-650
Transistors were used that were cheaper, consumed less power, more compact in size,
more reliable and faster than the rst generation machines made of vacuum tubes.
Magnetic cores were used as the primary memory and magnetic tape and magnetic disks
as secondary storage devices.
Assembly language and high-level programming languages like FORTRAN, COBOL were
used.
1. Use of transistors
8. AC required
1. EIBM 1620
2. IBM 7094
3. CDC 1604
4. CDC 3600
5. UNIVAC 1108
Page 3 of 32
fi
fi
fi
fi
fi
fi
fi
fi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
A single IC has many transistors, resistors, and capacitors along with the associated
circuitry.
High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.)
were used during this generation.
1. IC used
3. Smaller size
5. Faster
6. Lesser maintenance
7. Costly
8. AC required
1. IBM-360 series
2. Honeywell-6000 series
4. IBM-370/168
5. TDC-316
VLSI circuits having about 5000 transistors and other circuit elements with their associated
circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful, compact, reliable, and a ordable. As
a result, it gave rise to Personal Computer (PC) revolution.
In this generation, time sharing, real time networks, distributed operating system were
used.
All the high-level languages like C, C++, DBASE etc., were used in this generation.
2. Very cheap
4. Use of PCs
6. Pipeline processing
7. No AC required
1. DEC 10
2. STAR 1000
3. PDP 11
4. CRAY-1(Super Computer)
5. CRAY-X-MP(Super Computer)
Page 4 of 32
fi
fi
fi
ffi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
In the fth generation, VLSI technology became ULSI (Ultra Large Scale Integration)
technology, resulting in the production of microprocessor chips having ten million electronic
components.
This generation is based on parallel processing hardware and AI (Arti cial Intelligence)
software.
AI is an emerging branch in computer science, which interprets the means and method of
making computers think like human beings.
All the high-level languages like C and C++, Java, .Net etc., are used in this generation.
1. ULSI technology
AI Includes:
1. Robotics
2. Neural Networks
3. Game Playing
1. Desktop
2. Laptop
3. NoteBook
4. UltraBook
5. ChromeBook
Page 5 of 32
fi
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
These are specially made to perform multi-speci c tasks. Therefore, many CPUs work in
parallel order on these supercomputers. This function of a Supercomputer is called
Multiprocessing or Parallel Processing.
Each part of a supercomputer is responsible for its own speci c task, such as structuring
and solving the most complex problems requiring an incredible amount of calculations.
Applications:
• In research and study of energy and nuclear weapons and designing the aircraft, airplanes,
and ight simulators.
• Used in Chemical and Biological research and for highly calculation complex tasks.
Examples: IBM Roadburner, IBM Blue Gene, Intel ASI Red. PARAM-1000, and CRAY-XMP-14.
FACT: World’s rst supercomputer is the Control Data Corporation (CDC) 6600 invented by
Seymour Cray.
The storage capacity of the mainframe is enormous, with a high-speed data process as
well. As well as handling hundreds of input and output devices at a time.
The mainframe is ahead of our conventional modern Personal computers in almost every
metric. The possibility of their “hot” replacement in the mainframe computer ensures continuity of
operation. And the standard amount of processor utilization e ortlessly exceeds 85% of the total
power.
Applications:
• Mainframe computers are mainly used by departmental and commercial organizations like
Banks, Companies, Scienti c research centers, and governmental departments like railways.
These computers can work for 24 hours. Hundreds of users can work on these computations
simultaneously.
• Using the mainframe completes the tasks, Such as keeping details of payments, research
centres, advertising, sending bills and notices, paying employees, ticket booking, maintaining
details of purchases by users, keeping detailed tax details, etc.
Page 6 of 32
fl
fl
fi
fi
ff
fi
ffi
fi
fi
ff
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Minicomputers are the medium type of computers that have more functionality power and
are expensive than microcomputers. On the other hand, the size, storage, and speed of
minicomputers are large but less than the mainframe and supercomputers.
Minicomputers are made for performing multiple computing tasks at a single point of time,
instead of assigning many microcomputers for a single task, which will be time-consuming and
expensive.
Applications:
• The minicomputers are used as real-time applications in Industries, bookings, and Research
Centres. Banks also use minicomputers for preparing payroll for employees’ salaries, records,
tracking of nancial accounts, etc. As well as in the eld of Higher Education and Engineering.
FACT: PDP-1 was the world’s rst minicomputer, small and interactive, introduced in 1960 by the
Digital Equipment Corporation.
The design of microcomputers is minimal in size and storage capacity. These computers
consist of many parts like Input and Output devices, Software, operating systems, networks, and
Servers all these need to connect to form a complete Personal Digital Computer.
There is not only a PC or laptop are examples of microcomputers. Other examples of the
microcomputer are smartphone, Tablet, PDA, server, palmtop, and workstation.
This can be installed in any work area or even at home for personal use.
The primary purpose of microcomputers is to keep and process the everyday tasks and
needs of the people. Only one person can work on a single PC at a time, but its operating system
is multitasking. The PC can be connected to the Internet to take bene ts and enhance the user
experience.
The development of multimedia, small equipment, optimized energy consumption, and the
LAN made the microcomputers increase in demand for every eld.
The increase in the demand and need for microcomputers between the people leads to
the tremendous development of each part related to the microcomputers.
Applications:
• PC is being widely used in many elds like home, o ce, data collection, business, education,
entertainment, publishing, etc.
• It keeps the details and prepares letters for correspondence in small businesses, creating bills,
accounting, word processing, and operation of the ling systems in a large company.
• Some of the major PC manufacturers are IBM, Lenovo, Apple, HCL, HP, etc.
Examples: Desktops, tablets, smartphones, Laptops, workstations, PDA, Palmtop and etc.
Page 7 of 32
fi
fi
fi
fi
ffi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
The size, storage capacity, and cost of such computers are mainly less. The ability of
these computers is limited in performing specialized tasks. Still, it has versatility and useful for
serving people’s basic needs at home or in the workplace in the environment.
Example: Desktops, laptops, smartphones, and tablets are used on daily basis for general
purposes.
The special computer needs speci c and input and devices as well as a compatible
motherboard with the processor to conduct work e ciently.
Example: Automatic teller machines (ATM), Washing machines, Surveillance equipment, Weather-
forecasting simulators, Tra c-control computers, Defense-oriented applications, Oil-exploration
systems, Military planes controlling computers.
It is also used to measure and perform arithmetic calculations of numbers, the length of an
object, or the amount of voltage that passes through a point in an electrical circuit. Analog
computers obtain all their data from some measurement way.
Analog computers are mainly used in the elds of science and engineering. Analog
computers are slow and equipped to measure things rather than countable or check.
The e ciency of this computer increases when we get the result of the data in graphs, etc.
Analog Computers cannot store statistics.
They are used in the elds of technology, science, research, engineering, etc. Because
quantities like voltage, pressure, electric current, temperature are used more in these areas, these
types of computers give only approximate estimates.
Examples:
• An analog computer installed on a petrol pump measures the amount of petrol coming out of
the pump and appears in liters. And calculates its value. These quantities vary continuously
while measuring the amount, such as the temperature of a human body changes consistently.
• A simple clock, the vehicle’s speedometer, Voltmeter, etc. are examples of analog computing.
They run on electronic signs, and the binary numeral method Binary System 0 or 1 is used
for calculation. Their speed is fast.
Page 8 of 32
ffi
ffi
fi
fi
fi
fi
ffi
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Digital computers are built to bring the solution of equations to an almost unlimited
precision, but in a bit slow manner compared to analog computers. To some extent, they all have
similar components for receiving, processing, sorting, and transmitting data and use a relatively
small number of essential functions to perform their tasks.
Digital computers use discrete electrical signals for operation rather than continuous
electrical signals as analog computers have, making them the most common form of computers
today because of their versatility, speed, and power.
The desktop or Laptop at our home is one the common and best example of a digital
computer.
Examples:
• Calculators,
• Chromebooks,
• Digital watch,
• Accounting machines,
• Workstations,
The aim behind creating a hybrid computer is to create a kind of work unit that o ers the
best of both types of computers. Hybrid computers are extremely fast when driving equations,
even when those calculations are incredibly complex.
As both the properties of a computer consist in the form of a single hybrid computer made
possible to solve too complex calculations or problems, at the same time, these devices are not
only too expensive but also able to solve complex issues a bit fastly.
Incorporating the properties of both(analog and digital) computers into hybrid computers
makes it possible to resolve more di cult equations immediately.
The analog computer systems solve the equation process immediately. But it is not
necessary that those solutions would be completely accurate.
Here, the digital computer system gives 100 % correct solutions, but it takes a bit of time
in the calculation. Therefore, Hybrid computers are made to overcome the aws of both these
analog and digital systems.
Applications:
• Hybrid computers are most commonly used in vast industries, research centres,
organizations, and manufacturing rms (where many equations need to be solved).
• Also, the solutions and uses of hybrid computers have proved to be much more detailed,
accurate, and useful. Hybrid computers are used in scienti c calculations, for nations’ defence
and radar systems as well.
Examples:
Auto Gasoline pump is the example of a hybrid computer, this device is installed on a petrol pump
do not only to measure the amount of petrol but also to calculates its value, in this way It is
capable of both functions i.e hybrid function.
Page 9 of 32
fi
ffi
fi
fl
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Saving data and instructions so that they are available for processing
2 Store Data
as and when required.
Output The process of producing useful information or results for the user,
4
Information such as a printed report or visual display.
Control the Directs the manner and sequence in which all of the above
5
work ow operations are performed.
Input Unit:
This unit contains devices with the help of which we enter data into the computer. This unit
creates a link between the user and the computer. The input devices translate the information into
a form understandable by the computer.
It stores data, intermediate results, and instructions (program). It controls the operation of
all parts of the computer.
ALU (Arithmetic Logic Unit): It is the arithmetic logic unit, which performs arithmetic and
logical functions. Arithmetic functions include addition, subtraction, multiplication division, and
comparisons. Logical functions mainly include selecting, comparing, and merging the data. A
CPU may contain more than one ALU. Furthermore, ALUs can be used for maintaining timers that
help run the computer.
Page 10 of 32
fi
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Memory Unit: It is called Random access memory (RAM). It temporarily stores data,
programs, and intermediate and nal results of processing. So, it acts as a temporary storage
area that holds the data temporarily, which is used to run the computer.
Control Unit: It is the circuitry in the control unit, which makes use of electrical signals to
instruct the computer system for executing already stored instructions. It takes instructions from
memory and then decodes and executes these instructions. So, it controls and coordinates the
functioning of all parts of the computer. The Control Unit's main task is to maintain and regulate
the ow of information across the processor. It does not take part in processing and storing data.
Output Unit:
The output unit consists of devices with the help of which we get the information from the
computer. This unit is a link between the computer and the users. Output devices translate the
computer's output into a form understandable by the users.
Accuracy: Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.
Diligence: A computer can perform millions of tasks or calculations with the same consistency
and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also makes it
superior to that of human beings.
Versatility: Versatility refers to the capability of a computer to perform di erent kinds of works
with same accuracy and e ciency.
Reliability: A computer is reliable as it gives consistent result for similar set of data i.e., if we give
same set of input any number of times, we will get the same result.
Automation: Computer performs all the tasks automatically i.e. it performs tasks without manual
intervention.
Memory: A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to
store data.
Page 11 of 32
fl
ffi
fi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Following are some of the important input devices which are used in a computer −
Keyboard, Mouse, Joy Stick, Light pen, Track Ball, Scanner, Graphic Tablet, Microphone,
Magnetic Ink Card Reader(MICR), Optical Character Reader(OCR), Bar Code Reader, Optical
Mark Reader(OMR).
Following are some of the important output devices which are used in a computer −
Monitor (Cathode Ray Tube (CRT)Monitor, LCD/LED Monitor), Printer (Impact Printer - Daisy
Wheel, DotMatrix, Non-Impact Printer-InkJet, Thermal, Laser), Speakers, Projectors.
• System Software
• Application Software
System software serves as the interface between the hardware and the end users.
Some examples of system software are Operating System, Compilers, Interpreter, Assemblers,
etc.
• Fast in speed
• Di cult to design
• Di cult to understand
• Less interactive
• Smaller in size
• Di cult to manipulate
All software applications prepared in the computer lab can come under the category of
Application software.
Application software may consist of a single program, such as Microsoft's notepad for
writing and editing a simple text.
It may also consist of a collection of programs, often called a software package, which
work together to accomplish a task, such as a spreadsheet package.
Page 12 of 32
ffi
ffi
ffi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Examples of Application software are the following − Payroll Software, Student Record Software,
Inventory Management Software, Income Tax Software, Railways Reservation Software, Microsoft
O ce Suite Software, Microsoft Word, Microsoft Excel, Microsoft PowerPoint
• Easy to design
• More interactive
• Slow in speed
• Easy to understand
Page 13 of 32
ffi
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Page 14 of 32
ff
ff
ff
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Memory Management:
Memory management refers to management of Primary Memory or Main Memory. Main
memory is a large array of words or bytes where each word or byte has its own address.
Main memory provides a fast storage that can be accessed directly by the CPU. For a
program to be executed, it must in the main memory.
• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in
use.
• In multiprogramming, the OS decides which process will get memory when and how much.
• De-allocates the memory when a process no longer needs it or has been terminated.
Processor Management:
In multiprogramming environment, the OS decides which process gets the processor
when and for how much time. This function is called process scheduling.
• Keeps tracks of processor and status of process. The program responsible for this task is
known as tra c controller.
Page 15 of 32
fi
ffi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Device Management:
An Operating System manages device communication via their respective drivers. It does the
following activities for device management −
• Keeps tracks of all devices. Program responsible for this task is known as the I/O controller.
• Decides which process gets the device when and for how much time.
• De-allocates devices.
File Management:
A le system is normally organized into directories for easy navigation and usage. These
directories may contain les and other directions.
• Keeps track of information, location, uses, status etc. The collective facilities are often known
as le system.
Security:
By means of password and similar other techniques, it prevents unauthorized access to
programs and data.
Job accounting:
Keeping track of time and resources used by various jobs and users.
1.7.5 Booting
Booting is basically the process of starting the computer. When the CPU is rst switched on it
has nothing inside the Memory. In order to start the Computer, load the Operating System into the
Main Memory and then Computer is ready to take commands from the User.
BIOS: BIOS stands for Basic Input/Output System. It helps in the functioning of all the input/
output devices. Further, it also helps to start and initiate the working of all devices during the boot
process.
Boot Devices: Booting can be done either through hardware (pressing the start button) or by
giving software commands. Therefore, a boot device is a device that loads the operating system.
Moreover, it contains the instructions and les which start the computer. Examples are the hard
drive, oppy disk drive, CD drive, etc. Among them, the hard drive is the most used one.
Why do we need booting?: We perform this so that the operating system along with the initial
les and instructions load into the main memory. And as a result, the computer starts.
Page 16 of 32
fi
fi
fl
fi
fi
ffi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
• Cold Booting: A cold boot is also called a hard boot. It is the process when we rst start the
computer. In other words, when the computer is started from its initial state by pressing the
power button it is called cold boot. The instructions are read from the ROM and the operating
system is loaded in the main memory.
• Warm Booting: Warm Boot is also called soft boot. It refers to when we restart the computer.
Here, the computer does not start from the initial state. When the system gets stuck
sometimes it is required to restart it while it is ON. Therefore, in this condition the warm boot
takes place. Restart button or CTRL+ALT+DELETE keys are used for warm boot.
1. The Startup: It is the rst step that involves switching the power ON. It supplies electricity to
the main components like BIOS and processor.
2. BIOS: Power On Self Test: It is an initial test performed by the BIOS. Further, this test
performs an initial check on the input/output devices, computer’s main memory, disk drives,
etc. Moreover, if any error occurs, the system produces a beep sound.
3. Loading of OS: In this step, the operating system is loaded into the main memory. The
operating system starts working and executes all the initial les and instructions.
4. System Con guration: In this step, the drivers are loaded into the main memory. Drivers are
programs that help in the functioning of the peripheral devices.
5. Loading System Utilities: System utilities are basic functioning programs, for example,
volume control, antivirus, etc. In this step, system utilities are loaded into the memory.
6. User Authentication: If any password has been set up in the computer system, the system
checks for user authentication. Once the user enters the login Id and password correctly the
system nally starts.
It is used to hold those parts of data and program which are most frequently used by the
CPU.
Page 17 of 32
fi
fi
ff
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
The parts of data and programs are transferred from the disk to cache memory by the
operating system, from where the CPU can access them.
Advantages:
• It stores the program that can be executed within a short period of time.
Disadvantages:
• It is very expensive.
The data and instruction required to be processed resides in the main memory.
Access time in RAM is independent of the address, that is, each storage location inside
the memory is as easy to reach as other locations and takes the same amount of time. Data in the
RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch o the computer or if there is a
power failure. Hence, a backup Uninterruptible Power System (UPS) is often used with
computers. RAM is small, both in terms of its physical size and in the amount of data it can hold.
SRAM chips use a matrix of 6-transistors and no capacitors. Transistors do not require
power to prevent leakage, so SRAM need not be refreshed on a regular basis.
There is extra space in the matrix, hence SRAM uses more chips than DRAM for the same
amount of storage space, making the manufacturing costs higher.
SRAM is thus used as cache memory and has very fast access.
Page 18 of 32
ff
ff
ff
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
• Long life
• No need to refresh
• Faster
• Large size
• Expensive
This is done by placing the memory on a refresh circuit that rewrites the data several
hundred times per second.
All DRAMs are made up of memory cells, which are composed of one capacitor and one
transistor.
• Used as RAM
• Smaller in size
• Less expensive
ROM chips are not only used in the computer but also in other electronic items like
washing machine and microwave oven.
Page 19 of 32
ff
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Advantages of ROM:
• Non-volatile in nature
• Easy to test
CPU directly does not access these memories, instead they are accessed via input-output
routines.
The contents of secondary memories are rst transferred to the main memory, and then
the CPU can access it.
For example, disk, CD-ROM, DVD, Hard-disk, SSD, pen drive, SD Card etc.
• It is a non-volatile memory.
The hard disk is located within a drive unit on the computer's motherboard and comprises
one or more platters packed in an air-sealed casing.
The data is written on the platters by moving a magnetic head over the platters as they
spin.
The data stored on a computer's hard drive generally includes the operating system,
installed software, and the user's les and programs, including pictures, music, videos, text
documents, etc.
Unlike a hard drive, it does not have moving components, so it o ers many advantages
over SSD, such as faster access time, noiseless operation, less power consumption, and more.
Page 20 of 32
fi
fi
fi
ff
ff
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
As the cost of SSD has come down, it has become an ideal replacement for a standard
hard drive in desktop and laptop computers.
It is also suitable for notebooks, and tablets that don't require lots of storage.
It connects to a computer via a USB port. It is commonly used to store and transfer data
between computers.
For example, you can write a report using a computer and then copy or transfer it in the
pen drive. Later, you can connect this pen drive to a computer to see or edit your report.
You can also store your important documents and pictures, music, videos in the pen drive
and keep it at a safe place.
Pen drive does not have movable parts; it comprises an integrated circuit memory chip
that stores the data. This chip is housed inside a plastic or aluminium casing.
The data storage capacity of the pen drive generally ranges from 2 GB to 128 GB.
Furthermore, it is a plug and play device as you don't need additional drives, software, or
hardware to use it.
1.8.3.4 SD Card
SD Card stands for Secure Digital Card.
It is most often used in portable and mobile devices such as smartphones and digital
cameras.
You can remove it from your device and see the things stored in it using a computer with a
card reader.
There are many memory chips inside the SD card that store the data; it does not have
moving parts.
SD cards are not created equal, so they may di er from each other in terms of speed,
physical sizes, and capacity.
It is made of polycarbonate plastic with 5 inches in diameter and 0.05 inches in thickness.
The rst CD was created on 17 August 1982 at the workshop of Philips in Germany.
In the beginning, it was used for storing and playing sound recordings, later it was used for
various purposes such as for storing documents, audio les, videos, and other data like software
programs in a CD.
Although it has the same size as a CD, its storage capacity is much more than a CD.
So, it is widely used for storing and viewing movies and to distribute software programs as
they are too large to t on a CD.
Types of DVDs:
1. DVD-ROM (Read-Only): These types of DVDs come with media already recorded on
them, such as movie dvd’s. As the name suggests, data on these discs cannot be erased
or added, so these discs are known as a read-only or non-writable DVD.
Page 21 of 32
fi
fi
fl
ff
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
2. DVD-R (Writable): It allows you to record or write information to the DVD. However, you
can write information only once as it becomes a read-only DVD once it is full.
3. DVD-RW (Rewritable or Erasable): This type of discs can be erased, written, or recorded
multiple times.
• Bit: The computer memory units start from bit. A bit is the smallest memory unit to measure
data stored in main memory and storage devices. A bit can have only one binary value out of
0 and 1.
• Byte: It is the fundamental unit to measure data. It contains 8 bits or is equal to 8 bits. Thus a
byte can represent 2*8 or 256 values.
• Word: A computer word, like a byte, is a group of xed number of bits processed as a unit,
which varies from computer to computer but is xed for each computer. The length of a
computer word is called word-size or word length. It may be as small as 8 bits or may be as
long as 96 bits. A computer stores the information in the form of computer words.
• You can share expensive software and database among network users.
• It allows the exchange of data and information among users through a network.
So, it exists within a speci c area, e.g. home network, o ce network, school network, etc.
The devices in a LAN are generally connected using an Ethernet cable, which o ers an
interface to connect multiple devices like router, switches, and computers.
For example, using a single router, few Ethernet cables, and computers, you can create a
LAN at your home, o ce, etc.
In this network, one computer may act as a server and other computers, which are part of
the network, may serve as clients.
Page 22 of 32
ffi
fi
fi
fi
ffi
ffi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Bene ts of LAN:
• It perfectly ful lls the requirement of a speci c organization, such as an o ce, school, etc.
• It is more secure than other networks as it is a small set up that can be easily taken care of.
• Sharing of les: It allows you to share or transfer les from one computer to another computer
within the LAN. For example, in a bank, it can be used to send a le with the details of
transactions of a customer from the server to clients.
• Sharing of printers: It also allows shared access to a printer, le servers, etc. For example, ten
computers that are connected through LAN can use a single printer, le server, fax machine,
etc.
• Mail and message related services: It allows sending and receiving mails between computers
of a LAN. You are required to have a mail server for this.
• Database services: It also allows storing and retrieving data with the help of a database server.
MAN is ideal for the people of a relatively large area who want to share data or information.
It provides fast communication via high-speed carriers or transmission media such as copper,
ber optics, and microwaves.
The commonly used protocols for MAN are X.25, Frame Relay, Asynchronous Transfer
Mode (ATM), xDSL (Digital Subscriber Line), ISDN (Integrated Services Digital Network), ADSL
(Asymmetrical Digital Subscriber Line), and more.
The area covered by MAN is larger than the LAN but smaller than a WAN. Its network
ranges from 5 to 50 km.
Furthermore, it also provides uplinks for connecting LANs to WANs and the internet.
An organization can use a MAN to connect all of its LANs located at its di erent o ces
across the city.
Examples of MAN:
• Cable TV Network
Advantages of MAN:
• Access to the Internet: It allows you to share your internet connection, and thus multiple users
can have access to high-speed internet.
• Easy to set up: You can easily set up a MAN by connecting multiple LANs.
Page 23 of 32
fi
ff
fi
fi
fi
fi
fi
fi
fi
fi
fi
ffi
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Although it is structurally similar to MAN, it is di erent from MAN in terms of its range, e.g.,
MAN covers up to 50 Kms, whereas WAM covers distances larger than 50 Km, e.g., 1000km or
more.
A WAN works by using TCP/IP protocol in combination with networking devices such as
switches, routers, rewalls, and modems.
It does not connect individual computers; rather, they are designed to link small networks
like LANs and MANs to create a large network.
The internet is considered the largest WAN in the world as it connects various LANs and
MANs through ISPs.
The computers are connected to the wide area network through public networks, such as
telephone systems, leased lines or satellites.
The users of a WAN do not own the network as it is a large setup connecting the remote
computer systems. However, they are required to subscribe to a service provided by a
telecommunication provider to use this network.
Examples of WAN:
• Internet
• Defense department
• Satellite systems
Advantages of WAN:
• Large Network Range: It spans a large geographical area of 2000 km or more, e.g., from one
country to another countries.
• Centralized data: It allows your di erent o ce branches to use your head o ce server for
retrieving and sharing data. Thus, you don’t need to buy email servers, les server and back
up servers, etc.
• Get updated les and data: It provides an ideal platform for companies who need a live server
for their employees to exchange updated les within seconds.
• High bandwidth: It o ers high bandwidth than a normal broadband connection. Thus, it can
increase the productivity of your company by o ering uninterrupted data transfer and
communication.
• Workload Distribution: It helps distribute your workload to other locations. You can hire
employees in di erent countries and assign them to work from your o ce.
• A setup for collaboration : It includes the member of the research and educational
committees worldwide.
Intranet: It is an internal private network built within an organization using Internet and World
Wide Web standards and products that allows employees of an organization to gain access to
corporate information.
Extranet: It is the type of network that allows users from outside to access the Intranet of an
organization.
Page 24 of 32
fi
ff
fi
ff
ff
ffi
fi
ff
fi
ff
fi
ffi
fi
ffi
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Coverage All over the world. Restricted area upto Restricted area upto an
an organization. organization and some of
its stakeholders or so.
Page 25 of 32
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Example What we are WIPRO using internal DELL and Intel using
normally using is network for its network for its business
internet. business operations. operations.
Each document can be indexed using a number of keywords which can be used to link it
through pointers to related multimedia items. For example, if there is a document describing Taj
Mahal it can be linked to a picture of Shah Jehan stored in an image le. The designer of a
document can choose the keywords and provide links to similar keywords and items related to
the keywords. Such a document annotated using key words along with links (or pointers) linking it
to other related documents is called a hypertext.
A special notation is used to mark the key words and links in hypertext. This notation is
known as hypertext mark up language, abbreviated html. A computer connected to internet can
store multimedia information indexed using html. This is called a web page. A computer located
at an internet address can store many web pages. Such a computer is called a web site. The
collection of all web sites linked together by hypertext links is known as the world wide web.
Every web page has a unique address called Universal Resource Locator (URL). In order to
transfer les on the web a special set of rules called hypertext transfer protocol (http) is used. All
web pages are thus addressed starting with http. For example, the web address of the
Supercomputer Education and Research Centre at the Indian Institute of Science containing web
pages describing SERC is
http://www.serc.iisc.ernet.in
To obtain information from the web a software called a browser is used which normally has
a good graphical user interface (GUI) pronounced Gooyee. Some popular browsers are Netscape,
Mosaic and Internet Explorer. Browsers provide a very powerful method of accessing web pages
which may be located anywhere in the world. Thus most organizations and even individuals
maintain a web page (called a home page) containing information about themselves. Millions of
web sites are maintained today and their number is increasing rapidly. A web site besides textual
material may also contain programs which could be executed. Several sites provide software
known as search engines to retrieve information trom web pages. The information is retrieved by
Page 26 of 32
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
using keywords for search provided by a user. Currently a popular search engine is developed by
a company called Google.
Server: A server is a computer or system that provides resources, data, services, or programs to
other computers, known as clients, over a network.
Router: A router is a switching device for networks, which is able to route network packets,
based on their addresses, to other networks or devices. Among other things, they are used for
Internet access, for coupling networks or for connecting branch o ces to a central o ce via VPN
(Virtual Private Network).
Switch: A switch is a device in a computer network that connects other devices together.
Multiple data cables are plugged into a switch to enable communication between di erent
networked devices.
Bridge: A network bridge is a computer networking device that creates a single, aggregate
network from multiple communication networks or network segments.
Fibre-Optics Cable: A ber-optic cable contains anywhere from a few to hundreds of optical
bers within a plastic casing. Also known as optic cables or optical ber cables, they transfer
data signals in the form of light and travel hundreds of miles signi cantly faster than those used
in traditional electrical cables.
Coaxial Cable: A coaxial cable is a type of shielded and insulated copper cable that is used in
computer networks and to deliver cable TV services to end users.
Wireless: A wireless network refers to a computer network that makes use of Radio Frequency
(RF) connections between nodes in the network. Wireless networks are a popular solution for
homes, businesses, and telecommunications networks.
Various types of topology are, Point-to-Point, Bus Topology, Star Topology, Ring Topology,
Mesh Topology, Tree Topology, Daisy Topology, Hybrid Topology.
1.9.7.1 Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of one
host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they are
connected directly.
Page 27 of 32
fi
fi
fi
ffi
ff
fi
fi
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
every other host in the network. Thus for every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all network topologies.
• Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
All neighbouring hosts have point-to-point connection between them.Similar to the Bus
topology, if the root goes down, then the entire network su ers even.though it is not the single
point of failure. Every connection serves as point of failure, failing of which divides the network
into unreachable segment.
Each link in daisy chain topology represents single point of failure. Every link failure splits
the network into two segments.Every intermediate host works as relay for its immediate hosts.
Page 29 of 32
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Home: Computers are used at homes for several purposes like online bill payment, watching
movies or shows at home, home tutoring, social media access, playing games, internet access,
etc. They provide communication through electronic mail. They help to avail work from home
facility for corporate employees. Computers help the student community to avail online
educational support
Medical Field: Computers are used in hospitals to maintain a database of patients’ history,
diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical
devices to perform delicate operations, and conduct surgeries remotely. Virtual reality
technologies are also used for training purposes. It also helps to monitor the fetus inside the
mother’s womb.
Entertainment: Computers help to watch movies online, play games online; act as a virtual
entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the
entertainment industry in recording music with arti cial instruments. Videos can be fed from
computers to full screen televisions. Photo editors are available with fabulous features.
Industry: Computers are used to perform several tasks in industries like managing inventory,
designing purpose, creating virtual sample products, interior designing, video conferencing, etc.
Online marketing has seen a great revolution in its ability to sell various products to inaccessible
corners like interior or rural areas. Stock markets have seen phenomenal participation from
di erent levels of people through the use of computers.
Education: Computers are used in education sector through online classes, online examinations,
referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the
education eld.
Banking: In the banking sector, computers are used to store details of customers and conduct
transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced
manual errors and expenses to a great extent through extensive use of computers.
Business: Nowadays, computers are totally integrated into business. The main objective of
business is transaction processing, which involves transactions with suppliers, employees or
customers. Computers can make these transactions easy and accurate. People can analyze
investments, sales, expenses, markets and other aspects of business using computers.
Training: Many organizations use computer-based training to train their employees, to save
money and improve performance. Video conferencing through computers allows saving of time
and travelling costs by being able to connect people in various locations.
Arts: Computers are extensively used in dance, photography, arts and culture. The uid
movement of dance can be shown live via animation. Photos can be digitized using computers.
Science and Engineering: Computers with high performance are used to stimulate dynamic
process in Science and Engineering. Supercomputers have numerous applications in area of
Research and Development (R&D). Topographic images can be created through computers.
Scientists use computers to plot and analyze data to have a better understanding of earthquakes.
Page 30 of 32
ff
fi
fi
fi
fi
fi
ffi
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Reliability: The electronic components in modern computers are dependable and reliable
because they rarely break or fail.
Consistency: Given the same input and processes, a computer will produce the same results —
consistently. A computing phrase — known as garbage in, garbage out — points out that the
accuracy of a computer’s output depends on the accuracy of the input. For example, if you do not
use the ash on a digital camera when indoors, the resulting pictures that are displayed on the
computer screen may be unusable because they are too dark.
Storage: A computer can transfer data quickly from storage to memory, process it, and then store
it again for future use. Many computers store enormous amounts of data and make this data
available for processing anytime it is needed.
Communications: Most computers today can communicate with other computers, often
wirelessly. Computers with this capability can share any of the four information processing cycle
operations — input, process, output, and storage — with another computer or a user.
Violation of Privacy: Nearly every life event is stored in a computer somewhere . . . in medical
records, credit reports, tax records, etc. In many instances, where personal and con dential
records were not protected properly, individuals have found their privacy violated and identities
stolen.
Public Safety: Adults, teens, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these
unsuspecting, innocent computer users have fallen victim to crimes committed by dangerous
strangers. Protect yourself and your dependents from these criminals by being cautious in e-mail
messages and on Web sites. For example, do not share information that would allow others to
identify or locate you and do not disclose identi cation numbers, passwords, or other personal
security details.
Impact on Labor Force: Although computers have improved productivity in many ways and
created an entire industry with hundreds of thousands of new jobs, the skills of millions of
employees have been replaced by computers. Thus, it is crucial that workers keep their education
up-to-date. A separate impact on the labor force is that some companies are outsourcing jobs to
foreign countries instead of keeping their homeland labor force employed.
Page 31 of 32
fl
ff
fi
fl
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)
Impact on Environment: Computer manufacturing processes and computer waste are depleting
natural resources and polluting the environment. When computers are discarded in land lls, they
can release toxic materials and potentially dangerous levels of lead, mercury, and ame
retardants.
Green computing involves reducing the electricity consumed and environmental waste generated
when using a computer. Strategies that support green computing include recycling, regulating
manufacturing processes, extending the life of computers, and immediately donating or properly
disposing of replaced computers. When you purchase a new computer, some retailers o er to
dispose of your old computer properly.
Page 32 of 32
fl
fi
ff