You are on page 1of 32

Shri B.L.

Parikh College Of Business Administration BBA106 (Sem 1)

IT Tools & Application (BBA106)


Unit : 1 | Introduction to Information Technology

1.1 Introduction to Computer:

1.1.1 What is Computer?


Computer is an electronic device that operates (works) under the control of programs
stored in its own memory unit.

A computer is an electronic machine that processes raw data to give information as


output.

An electronic device that accepts data as input, and transforms it under the in uence of a
set of special instructions called Programs, to produce the desired output (referred to as
Information).

1.1.2 Icon
An icon is a small graphical representation of a program, feature, or le.

When you click or double-click an icon, the associated le or program opens or an action
is performed.

For example, if you were to double-click My Computer icon, it would open Windows
Explorer.

Icons are a component of GUI operating systems, including Apple macOS X and Microsoft
Windows.

Icons help users quickly identify the type of le represented by the icon.

1.1.3 File
A le is an object on a computer that stores data, information, settings, or commands
used with a computer program.

On a computer there are three types of les, application les, data les, and system les.

In a GUI (graphical user interface), such as Microsoft Windows, les display as icons that
relate to the program that opens the le.

For example, all PDF icons appear the same and open in Adobe Acrobat or the reader
associated with PDF les.

If a program is associated with a program, double-clicking the icon opens it in the default
program.

1.1.4 Folder
A folder, also called a directory, is a space used to store les, other folders, and shortcuts
on a computer.

A folder contained in another folder is called a subfolder.

1.1.5 How to make a New Folder?


Usually there are 2 ways for created a new folder:

1. To create a folder, right-click on your mouse, and then select New>Folder.

2. Also, In Windows 7, there is a New folder button near the top of the window.

Page 1 of 32
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fl
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.1.6 Desktop
A desktop is a term commonly used to describe a desktop computer or system unit.

When referring to an operating system or GUI (graphical user interface), the desktop is a
system of organization of icons on a screen. The Microsoft Windows desktop was rst introduced
with Microsoft Windows 95 and included with every version of Windows since then.

1.1.7 Shortcut
A shortcut is an abbreviated form of a keyboard shortcut.

In Microsoft Windows, a shortcut is a link that points to a computer program. Shortcuts


allow you to create links to programs in any folder, Start bar, Taskbar, desktop or other locations
on the computer.

A shortcut in Windows has a small arrow in the bottom left corner of the icon.

Shortcut les end with a le extension of .lnk.

A shortcut is useful for accessing software programs or les more easily.

Having a shortcut on the Windows desktop eliminates the need for users to look through
the Start menu Programs list to nd a speci c software program.

A shortcut also makes it quicker to open a le and not have to dig through folders on the
computer to ind a le.

1.1.8 How to make a Shortcut?


Steps to create a shortcut are as follow:

1. Locate the program (or le, or folder) that you want to add a desktop icon for.

2. Right-click the le icon, navigate to Send to -> Desktop (create shortcut).

3. A new shortcut will be on your desktop for that program, le or folder.

1.1.9 GUI & CUI


A GUI (graphical user interface) is a system of interactive visual components for computer
software. A GUI displays objects that convey information, and represent actions that can be taken
by the user. The objects change color, size, or visibility when the user interacts with them. A GUI
includes GUI objects like icons, cursors, and buttons. These graphical elements are sometimes
enhanced with sounds, or visual e ects like transparency and drop shadows.

Short for character user interface or command-line user interface, CUI is a way for users to
interact with computer programs. It works by allowing the user (client) to issue commands as one
or more lines of text (referred to as command lines) to a program. Good examples CUIs are MS-
DOS and the Windows Command Prompt. One of the CUI's uses is that it provides an easy way
to implement programming scripts.

1.2 Generations of Computer:


First Generation : The period of rst generation: 1946-1959 (Vacuum tube based)

Second Generation: The period of second generation: 1959-1965 (Transistor based)

Third Generation: The period of third generation: 1965-1971 (Integrated Circuit based)

Fourth Generation: The period of fourth generation: 1971-1980 (VLSI microprocessor based)

Fifth Generation: The period of fth generation: 1980-onwards (ULSI microprocessor based)

1.2.1 First Generation:


The period of rst generation was from 1946-1959.

Vacuum tubes were the basic components for memory and circuitry for CPU (Central
Processing Unit).

Page 2 of 32
fi
fi
fi
fi
fi
fi
fi
fi
fi
ff
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

These tubes, like electric bulbs, produced a lot of heat and the installations used to fuse
frequently. Therefore, they were very expensive and only large organizations were able to a ord it.

Mainly batch processing operating system was used.

Punch cards, paper tape, and magnetic tape was used as input and output devices.

The computers in this generation used machine code as the programming language.

The main features of the rst generation are:

1. Vacuum tube technology

2. Unreliable

3. Supported machine language only

4. Very costly

5. Generated a lot of heat

6. Slow input and output devices

7. Huge size

8. Need of AC

9. Non-portable

10. Consumed a lot of electricity

Some computers of this generation were:

1. ENIAC

2. EDVAC

3. UNIVAC

4. IBM-701

5. IBM-650

1.2.2 Second Generation:


The period of second generation was from 1959-1965.

Transistors were used that were cheaper, consumed less power, more compact in size,
more reliable and faster than the rst generation machines made of vacuum tubes.

Magnetic cores were used as the primary memory and magnetic tape and magnetic disks
as secondary storage devices.

Assembly language and high-level programming languages like FORTRAN, COBOL were
used.

The computers used batch processing and multiprogramming operating system.

The main features of the rst generation are:

1. Use of transistors

2. Reliable in comparison to rst generation computers

3. Smaller size as compared to rst generation computers

4. Generated less heat as compared to rst generation computers

5. Consumed less electricity as compared to rst generation computers

6. Faster than rst generation computers

7. Still very costly

8. AC required

9. Supported machine and assembly languages

Some computers of this generation were:

1. EIBM 1620

2. IBM 7094

3. CDC 1604

4. CDC 3600

5. UNIVAC 1108

1.2.3 Third Generation:


The period of third generation was from 1965-1971.

Integrated Circuits (ICs) were used in place of transistors.

Page 3 of 32
fi
fi
fi
fi
fi
fi
fi
fi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

A single IC has many transistors, resistors, and capacitors along with the associated
circuitry.

The IC was invented by Jack Kilby.

This development made computers smaller in size, reliable, and e cient.

In this generation remote processing, time-sharing, multiprogramming operating system


were used.

High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.)
were used during this generation.

The main features of the rst generation are:

1. IC used

2. More reliable in comparison to previous two generations

3. Smaller size

4. Generated less heat

5. Faster

6. Lesser maintenance

7. Costly

8. AC required

9. Consumed lesser electricity

10. Supported high-level language

Some computers of this generation were:

1. IBM-360 series

2. Honeywell-6000 series

3. PDP (Personal Data Processor)

4. IBM-370/168

5. TDC-316

1.2.4 Fourth Generation:


The period of fourth generation was from 1971-1980. Computers of fourth generation used
Very Large Scale Integrated (VLSI) circuits.

VLSI circuits having about 5000 transistors and other circuit elements with their associated
circuits on a single chip made it possible to have microcomputers of fourth generation.

Fourth generation computers became more powerful, compact, reliable, and a ordable. As
a result, it gave rise to Personal Computer (PC) revolution.

In this generation, time sharing, real time networks, distributed operating system were
used.

All the high-level languages like C, C++, DBASE etc., were used in this generation.

The main features of the rst generation are:

1. VLSI technology used

2. Very cheap

3. Portable and reliable

4. Use of PCs

5. Very small size

6. Pipeline processing

7. No AC required

8. Concept of internet was introduced

9. Great developments in the elds of networks

10. Computers became easily available

Some computers of this generation were:

1. DEC 10

2. STAR 1000

3. PDP 11

4. CRAY-1(Super Computer)

5. CRAY-X-MP(Super Computer)

Page 4 of 32
fi
fi
fi
ffi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.2.5 Fifth Generation:


The period of fth generation is 1980-till date.

In the fth generation, VLSI technology became ULSI (Ultra Large Scale Integration)
technology, resulting in the production of microprocessor chips having ten million electronic
components.

This generation is based on parallel processing hardware and AI (Arti cial Intelligence)
software.

AI is an emerging branch in computer science, which interprets the means and method of
making computers think like human beings.

All the high-level languages like C and C++, Java, .Net etc., are used in this generation.

The main features of the rst generation are:

1. ULSI technology

2. Development of true arti cial intelligence

3. Development of Natural language processing

4. Advancement in Parallel Processing

5. Advancement in Superconductor technology

6. More user-friendly interfaces with multimedia features

7. Availability of very powerful and compact computers at cheaper rates

AI Includes:

1. Robotics

2. Neural Networks

3. Game Playing

4. Development of expert systems to make decisions in real-life situations

5. Natural language understanding and generation

Some computers of this generation were:

1. Desktop

2. Laptop

3. NoteBook

4. UltraBook

5. ChromeBook

1.3 Classi cations of Computer:


We usually classify the computer system on 3 parameters i.e. Size, Purpose and Technology.

Page 5 of 32
fi
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.3.1 Super Computer


A Supercomputer is the very fastest and powerful, and expensive type of computer for
processing data. Supercomputers’ size and storage capacity are also huge (can occupy huge
premises) designed to process vast amounts of data in a short time with high productivity.

These are specially made to perform multi-speci c tasks. Therefore, many CPUs work in
parallel order on these supercomputers. This function of a Supercomputer is called
Multiprocessing or Parallel Processing.

A supercomputer’s design is complicated, like it can be heterogeneous, combining


computers of di erent architectures, is signi cantly surpassed most existing personal computers.
This made this machine an ultra-high-performance supercomputer.

Each part of a supercomputer is responsible for its own speci c task, such as structuring
and solving the most complex problems requiring an incredible amount of calculations.

Applications:

• In research and study of energy and nuclear weapons and designing the aircraft, airplanes,
and ight simulators.

• Climate research and Weather Forecasting and Prediction of Natural Disasters.

• Spaceship and Satellite Launching.

• Used in scienti c research laboratories.

• Used in Chemical and Biological research and for highly calculation complex tasks.

Examples: IBM Roadburner, IBM Blue Gene, Intel ASI Red. PARAM-1000, and CRAY-XMP-14.

FACT: World’s rst supercomputer is the Control Data Corporation (CDC) 6600 invented by
Seymour Cray.

1.3.2 Mainframe Computer


Mainframe computers are multi-programming, high-performance computers, and multi-
user, which means they can handle the workload of more than 100 users at a time on the
computer.

The storage capacity of the mainframe is enormous, with a high-speed data process as
well. As well as handling hundreds of input and output devices at a time.

The mainframe is a highly e cient computer capable of simultaneously solving complex


calculations and continuously for a long time. These computers have several microprocessors
that have the ability to function the data at too high performance and speed.

The mainframe is ahead of our conventional modern Personal computers in almost every
metric. The possibility of their “hot” replacement in the mainframe computer ensures continuity of
operation. And the standard amount of processor utilization e ortlessly exceeds 85% of the total
power.

Somehow mainframes can be more powerful than supercomputers because the


mainframe supports many processes simultaneously. On the other hand, supercomputers can run
a single program but faster than a mainframe. In the past, Mainframes requires entire rooms or
even oors of whole buildings for set up.

In today, IBM company is leading the production of mainframe computers.


Mainframe reliability is increased with development in the past 60 years. These computers can x
most of the hardware and software bugs.

Applications:

• Mainframe computers are mainly used by departmental and commercial organizations like
Banks, Companies, Scienti c research centers, and governmental departments like railways.
These computers can work for 24 hours. Hundreds of users can work on these computations
simultaneously.

• Using the mainframe completes the tasks, Such as keeping details of payments, research
centres, advertising, sending bills and notices, paying employees, ticket booking, maintaining
details of purchases by users, keeping detailed tax details, etc.

Examples: IBM Es000 series, ICL39 Series, and CDC 6600.

Page 6 of 32
fl
fl
fi
fi
ff
fi
ffi
fi
fi
ff
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.3.3 Mini Computer


Minicomputer is a digital and multi-user computer system with the connection of more
than one CPU. Thus, many people can work on these computers simultaneously instead of a
single person. Also, it can process with other accessories like a printer, plotter, etc.

Minicomputers are the medium type of computers that have more functionality power and
are expensive than microcomputers. On the other hand, the size, storage, and speed of
minicomputers are large but less than the mainframe and supercomputers.

Minicomputers are made for performing multiple computing tasks at a single point of time,
instead of assigning many microcomputers for a single task, which will be time-consuming and
expensive.

In general, a minicomputer is a multi-threaded system (several processes at a time)


capable of supporting from one to up to 200 users simultaneously: these computers are currently
used to store large databases, multi-user applications, and the automation industry.

Applications:

• The minicomputers are used as real-time applications in Industries, bookings, and Research
Centres. Banks also use minicomputers for preparing payroll for employees’ salaries, records,
tracking of nancial accounts, etc. As well as in the eld of Higher Education and Engineering.

Examples: PDP 11 and IBM (8000 Series).

FACT: PDP-1 was the world’s rst minicomputer, small and interactive, introduced in 1960 by the
Digital Equipment Corporation.

1.3.4 Micro Computer


Today we are using many computers at home is also the most common microcomputer.
With this invention of the microprocessors in the year 1970, it became possible to use computers
for people personally at a low cost and reasonable price known as Digital Personal Computer.

The design of microcomputers is minimal in size and storage capacity. These computers
consist of many parts like Input and Output devices, Software, operating systems, networks, and
Servers all these need to connect to form a complete Personal Digital Computer.

There is not only a PC or laptop are examples of microcomputers. Other examples of the
microcomputer are smartphone, Tablet, PDA, server, palmtop, and workstation.

This can be installed in any work area or even at home for personal use.

The primary purpose of microcomputers is to keep and process the everyday tasks and
needs of the people. Only one person can work on a single PC at a time, but its operating system
is multitasking. The PC can be connected to the Internet to take bene ts and enhance the user
experience.

The development of multimedia, small equipment, optimized energy consumption, and the
LAN made the microcomputers increase in demand for every eld.

The increase in the demand and need for microcomputers between the people leads to
the tremendous development of each part related to the microcomputers.

Applications:

• PC is being widely used in many elds like home, o ce, data collection, business, education,
entertainment, publishing, etc.

• It keeps the details and prepares letters for correspondence in small businesses, creating bills,
accounting, word processing, and operation of the ling systems in a large company.

• Some of the major PC manufacturers are IBM, Lenovo, Apple, HCL, HP, etc.

Examples: Desktops, tablets, smartphones, Laptops, workstations, PDA, Palmtop and etc.

The fast development of microcomputers with technology. As a result, today, microcomputers


coming in the form of a book, a phone, and even a clock in the name of a digital clock.

Page 7 of 32
fi
fi
fi
fi
ffi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.3.5 General Purpose


General computers can do various everyday tasks such as writing a word processing
letter, Document preparation, recording, nancial analysis, Printing documents, creating
databases, and calculations with accuracy and consistency.

The size, storage capacity, and cost of such computers are mainly less. The ability of
these computers is limited in performing specialized tasks. Still, it has versatility and useful for
serving people’s basic needs at home or in the workplace in the environment.

Example: Desktops, laptops, smartphones, and tablets are used on daily basis for general
purposes.

1.3.6 Special Purpose


These computers are designed to perform a particular or specialized task. The size,
storage capacity, and cost of such computers mainly depend on the nature and size of the work.
The function of these computers is consistent with any particular task.

The special computer needs speci c and input and devices as well as a compatible
motherboard with the processor to conduct work e ciently.

These computers are used for special purposes in weather forecasting, space research,


agriculture, engineering, meteorology, satellite operation, tra c control, and research in chemical
sciences.

Example: Automatic teller machines (ATM), Washing machines, Surveillance equipment, Weather-
forecasting simulators, Tra c-control computers, Defense-oriented applications, Oil-exploration
systems, Military planes controlling computers.

1.3.7 Analog Computer


An analog computer performs tasks using continuous data (the physical amount that
changes continuously). Analog computers are used primarily to measure physical units like the
voltage, pressure, electric current, temperature, and convert them into digits.

It is also used to measure and perform arithmetic calculations of numbers, the length of an
object, or the amount of voltage that passes through a point in an electrical circuit. Analog
computers obtain all their data from some measurement way.

Analog computers are mainly used in the elds of science and engineering. Analog
computers are slow and equipped to measure things rather than countable or check.

The e ciency of this computer increases when we get the result of the data in graphs, etc.
Analog Computers cannot store statistics.

They are used in the elds of technology, science, research, engineering, etc. Because
quantities like voltage, pressure, electric current, temperature are used more in these areas, these
types of computers give only approximate estimates.

Examples:

• An analog computer installed on a petrol pump measures the amount of petrol coming out of
the pump and appears in liters. And calculates its value. These quantities vary continuously
while measuring the amount, such as the temperature of a human body changes consistently.

• A simple clock, the vehicle’s speedometer, Voltmeter, etc. are examples of analog computing.

1.3.8 Digital Computer


As its name suggests, a digital computer represents the digital computer’s letters,
numerical values, or any other special symbols. This computer is the computer that calculates the
number for processing the data.

They run on electronic signs, and the binary numeral method Binary System 0 or 1 is used
for calculation. Their speed is fast.

Page 8 of 32
ffi
ffi
fi
fi
fi
fi
ffi
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

It can perform arithmetic operations such as addition, occurrence, subtraction,


multiplication, or division and all types of logical(mathematical) operations. Today, most of the
computers available in the market are digital computers.

Digital computers are built to bring the solution of equations to an almost unlimited
precision, but in a bit slow manner compared to analog computers. To some extent, they all have
similar components for receiving, processing, sorting, and transmitting data and use a relatively
small number of essential functions to perform their tasks.

Digital computers use discrete electrical signals for operation rather than continuous
electrical signals as analog computers have, making them the most common form of computers
today because of their versatility, speed, and power.

The desktop or Laptop at our home is one the common and best example of a digital
computer.

Examples:

• Personal Desktop Computers,

• Calculators,

• Laptops, Smartphones, and Tablets,

• Chromebooks,

• Digital watch,

• Accounting machines,

• Workstations,

• Digital clock, etc.

1.3.9 Hybrid Computer


A hybrid computer is a combined complex computer unit built using both analog and
digital properties and united by a single control system. The purpose of designing hybrid
computers is to provide functions and features that can be found on both analog and digital
devices.

The aim behind creating a hybrid computer is to create a kind of work unit that o ers the
best of both types of computers. Hybrid computers are extremely fast when driving equations,
even when those calculations are incredibly complex.

As both the properties of a computer consist in the form of a single hybrid computer made
possible to solve too complex calculations or problems, at the same time, these devices are not
only too expensive but also able to solve complex issues a bit fastly.

Incorporating the properties of both(analog and digital) computers into hybrid computers
makes it possible to resolve more di cult equations immediately.

The analog computer systems solve the equation process immediately. But it is not
necessary that those solutions would be completely accurate.

Here, the digital computer system gives 100 % correct solutions, but it takes a bit of time
in the calculation. Therefore, Hybrid computers are made to overcome the aws of both these
analog and digital systems.

Applications:

• Hybrid computers are most commonly used in vast industries, research centres,
organizations, and manufacturing rms (where many equations need to be solved).

• Also, the solutions and uses of hybrid computers have proved to be much more detailed,
accurate, and useful. Hybrid computers are used in scienti c calculations, for nations’ defence
and radar systems as well.

Examples:

Auto Gasoline pump is the example of a hybrid computer, this device is installed on a petrol pump
do not only to measure the amount of petrol but also to calculates its value, in this way It is
capable of both functions i.e hybrid function.

Page 9 of 32
fi
ffi
fi
fl
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.4 Working of Computer


All types of computers follow the same basic logical structure and perform the following
ve basic operations for converting raw input data into information useful to their users.

S.No. Operation Description

The process of entering data and instructions into the computer


1 Take Input
system.

Saving data and instructions so that they are available for processing
2 Store Data
as and when required.

Processing Performing arithmetic, and logical operations on data in order to


3
Data convert them into useful information.

Output The process of producing useful information or results for the user,
4
Information such as a printed report or visual display.

Control the Directs the manner and sequence in which all of the above
5
work ow operations are performed.

Input Unit:
This unit contains devices with the help of which we enter data into the computer. This unit
creates a link between the user and the computer. The input devices translate the information into
a form understandable by the computer.

Central Processing Unit:


CPU is considered as the brain of the computer. CPU performs all types of data
processing operations.

It stores data, intermediate results, and instructions (program). It controls the operation of
all parts of the computer.

CPU itself has the following three components −

ALU (Arithmetic Logic Unit): It is the arithmetic logic unit, which performs arithmetic and
logical functions. Arithmetic functions include addition, subtraction, multiplication division, and
comparisons. Logical functions mainly include selecting, comparing, and merging the data. A
CPU may contain more than one ALU. Furthermore, ALUs can be used for maintaining timers that
help run the computer.

Page 10 of 32
fi
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Memory Unit: It is called Random access memory (RAM). It temporarily stores data,
programs, and intermediate and nal results of processing. So, it acts as a temporary storage
area that holds the data temporarily, which is used to run the computer.

Control Unit: It is the circuitry in the control unit, which makes use of electrical signals to
instruct the computer system for executing already stored instructions. It takes instructions from
memory and then decodes and executes these instructions. So, it controls and coordinates the
functioning of all parts of the computer. The Control Unit's main task is to maintain and regulate
the ow of information across the processor. It does not take part in processing and storing data.

Output Unit:
The output unit consists of devices with the help of which we get the information from the
computer. This unit is a link between the computer and the users. Output devices translate the
computer's output into a form understandable by the users.

1.5 Characteristics of Computer


Speed: A computer works with much higher speed and accuracy compared to humans while
performing mathematical calculations. Computers can process millions (1,000,000) of instructions
per second. The time taken by computers for their operations is microseconds and nanoseconds.

Accuracy: Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.

Diligence: A computer can perform millions of tasks or calculations with the same consistency
and accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also makes it
superior to that of human beings.

Versatility: Versatility refers to the capability of a computer to perform di erent kinds of works
with same accuracy and e ciency.

Reliability: A computer is reliable as it gives consistent result for similar set of data i.e., if we give
same set of input any number of times, we will get the same result.

Automation: Computer performs all the tasks automatically i.e. it performs tasks without manual
intervention.

Memory: A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to
store data.

1.6 Computer Hardware


Hardware represents the physical and tangible components of a computer, i.e. the
components that can be seen and touched.

Examples of Hardware are the following:

• Input devices − keyboard, mouse, etc.

• Output devices − printer, monitor, etc.

• Secondary storage devices − Hard disk, CD, DVD, etc.

• Internal components − CPU, motherboard, RAM, etc.

1.6.1 Input Devices


An input device allows data such as text, images, video or sound to be entered into a
computer system.

Page 11 of 32
fl
ffi
fi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Following are some of the important input devices which are used in a computer −
Keyboard, Mouse, Joy Stick, Light pen, Track Ball, Scanner, Graphic Tablet, Microphone,
Magnetic Ink Card Reader(MICR), Optical Character Reader(OCR), Bar Code Reader, Optical
Mark Reader(OMR).

1.6.2 Output Devices


There are many outputs created by a computer system. These include printed documents,
on-screen data and sound. An output device allows data to be transmitted by the computer in a
human-friendly form, for example, sound being played through a speaker..

Following are some of the important output devices which are used in a computer −
Monitor (Cathode Ray Tube (CRT)Monitor, LCD/LED Monitor), Printer (Impact Printer - Daisy
Wheel, DotMatrix, Non-Impact Printer-InkJet, Thermal, Laser), Speakers, Projectors.

1.7. Computer Software


Software is a set of programs, which is designed to perform a well-de ned function. A
program is a sequence of instructions written to solve a particular problem.

There are two types of software −

• System Software

• Application Software

1.7.1 System Software


The system software is a collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself.

System software is generally prepared by the computer manufacturers.

These software products comprise of programs written in low-level languages, which


interact with the hardware at a very basic level.

System software serves as the interface between the hardware and the end users.

Some examples of system software are Operating System, Compilers, Interpreter, Assemblers,
etc.

Here is a list of some of the most prominent features of a system software:

• Close to the system

• Fast in speed

• Di cult to design

• Di cult to understand

• Less interactive

• Smaller in size

• Di cult to manipulate

• Generally written in low-level language

1.7.2 Application Software


Application software products are designed to satisfy a particular need of a particular
environment.

All software applications prepared in the computer lab can come under the category of
Application software.

Application software may consist of a single program, such as Microsoft's notepad for
writing and editing a simple text.

It may also consist of a collection of programs, often called a software package, which
work together to accomplish a task, such as a spreadsheet package.

Page 12 of 32
ffi
ffi
ffi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Examples of Application software are the following − Payroll Software, Student Record Software,
Inventory Management Software, Income Tax Software, Railways Reservation Software, Microsoft
O ce Suite Software, Microsoft Word, Microsoft Excel, Microsoft PowerPoint

Features of application software are as follows:

• Close to the user

• Easy to design

• More interactive

• Slow in speed

• Generally written in high-level language

• Easy to understand

• Easy to manipulate and use

• Bigger in size and requires large storage space

1.7.3 Classi cation of Software


We are able to classify computer software into three main types i.e. system software,
application software and programming languages.

System Software Application Software Programming Software


The programming language is
the third category of computer
The system software is a type
The other category of software software which is used by the
of computer software that is
is application software that is programmers to write their
designed for running the
designed for the users to programs, scripts, and
computer hardware parts and
perform some speci c tasks instructions which can be
the application programs. It is
like writing a letter, listening to executed by a computer. The
the platform provided to the
music or seeing any video. For other name of the
computer system where other
all these requirements there programming language is a
computer programs can
required a speci c software computer language that can
execute. The system software
for each type and that speci c be used to create some
act as a middle layer between
software that is designed for common standards. The
the user applications and
some speci c purpose is programming language can be
hardware. The operating
known as application considered as a brick which
system is the type of system
software. The operating can be used to construct
software. The operating
software runs the application computer programs and
system is used to manage all
software in the computer operating system. The
other programs installed on
system. examples of programming
the computer.
languages are JAVA, C, C++,
and other languages.

Page 13 of 32
ffi
fi
fi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

The di erence between


There is always some
system software and
The other purpose of system similarity between the
application software is the
software is to translate inputs programming languages the
di erence in the user
received from other sources only di erence is the syntax of
interface. In system software,
and convert them into programming language which
there is no user interface
language so that the machine makes them di erent. The
present whereas in application
can understand. The BIOS programmer uses the syntax
software the user interface is
(basic input/output system) is and rules of programming
present for each software so
another type of system language to write their
that users can easily use the
software that works when the programs. Once the source
software. The user cannot see
computer system starts and is code is written by a
the system software like an
used to manage the data programmer in the IDE
operating system and cannot
between the hardware devices (Integrated Development
work in system software but in
(video adapter, mouse, Environment) the programmer
an application, software users
keyboard and printer) and the then compiles that code in
can see the application
operating system. The system machine language which can
software using a graphical
software provides the be understood by the
user interface and can also
functionality for the user to computer. The use of
work in the application
use the hardware directly programming language is in
software. The user also has an
using the device drivers developing websites,
option to create its user-
program. applications, and many other
written software and use the
programs.
software for its personal use.
The templates are present
which can be used by the user
to create user-written The programming language
programs. The application can be broadly divided into
software can be bundled two major elements syntax
The boot is the system
together and that bundle is and semantics. The
software program that loads
known as an application suite. programming language
the operating system in the
An example of an application follows some sequence of
main memory of the computer
suite is Microsoft O ce. The operations so that the desired
or can load in random access
word processor software is output can be achieved. The
memory (RAM). The other
designed by combining programming language is also
example of system software is
various small program to known as high-level language
assembler which has a
make one single program as the programs written by a
functionality to take computer
which can be used for writing programmer are easy to read
instructions as input and then
text, creating a spreadsheet or and easy to understand. The
convert it into bits so that the
creating presentations. The JAVA, C, C++ programming
processor can read that bit
other type of application languages are considered as
and perform computer
software is Mozilla Firefox, high-level language. The other
operations.
internet explorer. These kinds category of a programming
of application software can be language is a low-level
used for searching any article, language.
text on the web and interact
with the outside world.

Page 14 of 32
ff
ff
ff
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

The other example of system


The low level of language
software is a device driver
includes machine language
which is used to control some
and assembly language. The
speci c device which is
assembly language contains a
connected to computer
list of instructions that are not
systems like mouse or
easy to read and understand.
keyboard. The device driver
The machine language
software is used to convert
contains binary codes that can
input/ output instructions of
be read by CPU directly and
OS to messages so that the
not present in a human-
device can read and
readable form. The low level of
understand. The system
language can be directly
software can be run in the
understood by computer
background or can be
hardware.
executed directly by the user.

1.7.4 Operating System


An Operating System (OS) is a program that acts as
an interface between the user and the computer hardware
and controls the execution of all kinds of programs.

An operating system is a software which performs all


the basic tasks like le management, memory management,
process management, handling input and output, and
controlling peripheral devices such as disk drives and
printers.

Some popular Operating Systems include Linux


Operating System, Windows Operating System, MacOS,
VMS, OS/400, AIX, z/OS, etc.

1.7.4.1 Functions or Responsibilities


Operating System has certain function or responsibilities which are, Memory Management,
Processor Management, Device Management, File Management, Security, Control over system
performance, Job accounting, Error detecting aids, Coordination between other software and
users.

Memory Management:
Memory management refers to management of Primary Memory or Main Memory. Main
memory is a large array of words or bytes where each word or byte has its own address.

Main memory provides a fast storage that can be accessed directly by the CPU. For a
program to be executed, it must in the main memory.

An Operating System does the following activities for memory management −

• Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in
use.

• In multiprogramming, the OS decides which process will get memory when and how much.

• Allocates the memory when a process requests it to do so.

• De-allocates the memory when a process no longer needs it or has been terminated.

Processor Management:
In multiprogramming environment, the OS decides which process gets the processor
when and for how much time. This function is called process scheduling.

An Operating System does the following activities for processor management −

• Keeps tracks of processor and status of process. The program responsible for this task is
known as tra c controller.

• Allocates the processor (CPU) to a process.

• De-allocates processor when a process is no longer required.

Page 15 of 32
fi
ffi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Device Management:
An Operating System manages device communication via their respective drivers. It does the
following activities for device management −

• Keeps tracks of all devices. Program responsible for this task is known as the I/O controller.

• Decides which process gets the device when and for how much time.

• Allocates the device in the e cient way.

• De-allocates devices.

File Management:
A le system is normally organized into directories for easy navigation and usage. These
directories may contain les and other directions.

An Operating System does the following activities for le management −

• Keeps track of information, location, uses, status etc. The collective facilities are often known
as le system.

• Decides who gets the resources.

• Allocates the resources.

• De-allocates the resources.

Security:
By means of password and similar other techniques, it prevents unauthorized access to
programs and data.

Control over system performance:


Recording delays between request for a service and response from the system.

Job accounting:
Keeping track of time and resources used by various jobs and users.

Error detecting aids:


Production of dumps, traces, error messages, and other debugging and error detecting
aids.

Coordination between other software and users:


Coordination and assignment of compilers, interpreters, assemblers and other software to
the various users of the computer systems.

1.7.5 Booting
Booting is basically the process of starting the computer. When the CPU is rst switched on it
has nothing inside the Memory. In order to start the Computer, load the Operating System into the
Main Memory and then Computer is ready to take commands from the User.

BIOS: BIOS stands for Basic Input/Output System. It helps in the functioning of all the input/
output devices. Further, it also helps to start and initiate the working of all devices during the boot
process.

Boot Devices: Booting can be done either through hardware (pressing the start button) or by
giving software commands. Therefore, a boot device is a device that loads the operating system.
Moreover, it contains the instructions and les which start the computer. Examples are the hard
drive, oppy disk drive, CD drive, etc. Among them, the hard drive is the most used one.

Why do we need booting?: We perform this so that the operating system along with the initial
les and instructions load into the main memory. And as a result, the computer starts.

Page 16 of 32
fi
fi
fl
fi
fi
ffi
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.7.5.1 Types of Booting


Normally there are 2 types of booting types and they are as follow:

• Cold Booting: A cold boot is also called a hard boot. It is the process when we rst start the
computer. In other words, when the computer is started from its initial state by pressing the
power button it is called cold boot. The instructions are read from the ROM and the operating
system is loaded in the main memory.

• Warm Booting: Warm Boot is also called soft boot. It refers to when we restart the computer.
Here, the computer does not start from the initial state. When the system gets stuck
sometimes it is required to restart it while it is ON. Therefore, in this condition the warm boot
takes place. Restart button or CTRL+ALT+DELETE keys are used for warm boot.

1.7.5.2 Steps of Booting


Commonly the booting process include 6 major steps and they are as follow:

1. The Startup: It is the rst step that involves switching the power ON. It supplies electricity to
the main components like BIOS and processor.

2. BIOS: Power On Self Test: It is an initial test performed by the BIOS. Further, this test
performs an initial check on the input/output devices, computer’s main memory, disk drives,
etc. Moreover, if any error occurs, the system produces a beep sound.

3. Loading of OS: In this step, the operating system is loaded into the main memory. The
operating system starts working and executes all the initial les and instructions.

4. System Con guration: In this step, the drivers are loaded into the main memory. Drivers are
programs that help in the functioning of the peripheral devices.

5. Loading System Utilities: System utilities are basic functioning programs, for example,
volume control, antivirus, etc. In this step, system utilities are loaded into the memory.

6. User Authentication: If any password has been set up in the computer system, the system
checks for user authentication. Once the user enters the login Id and password correctly the
system nally starts.

1.8 Computer Memory


A memory is just like a human brain.

It is used to store data and instructions.

Computer memory is the storage space in


the computer, where data is to be processed and
instructions required for processing are stored.

The memory is divided into large number


of small parts called cells.

Each location or cell has a unique


address, which varies from zero to memory size
minus one.

For example, if the computer has 64k


words, then this memory unit has 64 * 1024 =
65536 memory locations. The address of these
locations varies from 0 to 65535.

1.8.1 Cache Memory


Cache memory is a very high speed semiconductor memory which can speed up the CPU.

It acts as a bu er between the CPU and the main memory.

It is used to hold those parts of data and program which are most frequently used by the
CPU.

Page 17 of 32
fi
fi
ff
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

The parts of data and programs are transferred from the disk to cache memory by the
operating system, from where the CPU can access them. 

Advantages:

• Cache memory is faster than main memory.

• It consumes less access time as compared to main memory.

• It stores the program that can be executed within a short period of time.

• It stores data for temporary use.

Disadvantages:

• Cache memory has limited capacity.

• It is very expensive. 

1.8.2 Primary/Main Memory


Primary memory holds only those data and instructions on which the computer is currently
working.

It has a limited capacity and data is lost when power is switched o .

It is generally made up of semiconductor device.

These memories are not as fast as registers.

The data and instruction required to be processed resides in the main memory.

It is divided into two subcategories RAM and ROM. 

Characteristics of Main Memory:

• These are semiconductor memories.

• It is known as the main memory.

• Usually volatile memory.

• Data is lost in case power is switched o .

• It is the working memory of the computer.

• Faster than secondary memories.

• A computer cannot run without the primary memory.

1.8.2.1 Random Access Memory (RAM)


RAM (Random Access Memory) is the internal memory of the CPU for storing data,
program, and program result. It is a read/write memory which stores data until the machine is
working. As soon as the machine is switched o , data is erased. 

Access time in RAM is independent of the address, that is, each storage location inside
the memory is as easy to reach as other locations and takes the same amount of time. Data in the
RAM can be accessed randomly but it is very expensive.

RAM is volatile, i.e. data stored in it is lost when we switch o the computer or if there is a
power failure. Hence, a backup Uninterruptible Power System (UPS) is often used with
computers. RAM is small, both in terms of its physical size and in the amount of data it can hold.

RAM is of two types −

• Static RAM (SRAM)

• Dynamic RAM (DRAM)

Static RAM (SRAM):


The word static indicates that the memory retains its contents as long as power is being
supplied. However, data is lost when the power gets down due to volatile nature.

SRAM chips use a matrix of 6-transistors and no capacitors. Transistors do not require
power to prevent leakage, so SRAM need not be refreshed on a regular basis.

There is extra space in the matrix, hence SRAM uses more chips than DRAM for the same
amount of storage space, making the manufacturing costs higher.

SRAM is thus used as cache memory and has very fast access.

Page 18 of 32
ff
ff
ff
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Characteristics of Static RAM:

• Long life

• No need to refresh

• Faster

• Used as cache memory

• Large size

• Expensive

• High power consumption

Dynamic RAM (DRAM):


DRAM, unlike SRAM, must be continually refreshed in order to maintain the data.

This is done by placing the memory on a refresh circuit that rewrites the data several
hundred times per second.

DRAM is used for most system memory as it is cheap and small.

All DRAMs are made up of memory cells, which are composed of one capacitor and one
transistor.

Characteristics of Static RAM:

• Short data lifetime

• Needs to be refreshed continuously

• Slower as compared to SRAM

• Used as RAM

• Smaller in size

• Less expensive

• Less power consumption

1.8.2.2 Read Only Memory (ROM)


ROM stands for Read Only Memory. The memory from which we can only read but
cannot write on it.

This type of memory is non-volatile.

The information is stored permanently in such memories during manufacture.

A ROM stores such instructions that are required to start a computer.

This operation is referred to as bootstrap.

ROM chips are not only used in the computer but also in other electronic items like
washing machine and microwave oven.

Di erent types of ROM are as follow:

• MROM (Masked ROM):


The very rst ROMs were hard-wired devices that contained a pre-programmed set of data
or instructions. These kind of ROMs are known as masked ROMs, which are inexpensive.

• PROM (Programmable Read Only Memory):


PROM is read-only memory that can be modi ed only once by a user. The user buys a
blank PROM and enters the desired contents using a PROM program. Inside the PROM chip,
there are small fuses which are burnt open during programming. It can be programmed only once
and is not erasable.

• EPROM (Erasable and Programmable Read Only Memory):


EPROM can be erased by exposing it to ultra-violet light for a duration of up to 40
minutes. Usually, an EPROM eraser achieves this function. During programming, an electrical
charge is trapped in an insulated gate region. The charge is retained for more than 10 years
because the charge has no leakage path. For erasing this charge, ultra-violet light is passed
through a quartz crystal window (lid). This exposure to ultra-violet light dissipates the charge.
During normal use, the quartz lid is sealed with a sticker.

Page 19 of 32
ff
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

• EEPROM (Electrically Erasable and Programmable Read Only Memory):


EEPROM is programmed and erased electrically. It can be erased and reprogrammed
about ten thousand times. Both erasing and programming take about 4 to 10 ms (millisecond). In
EEPROM, any location can be selectively erased and programmed. EEPROMs can be erased one
byte at a time, rather than erasing the entire chip. Hence, the process of reprogramming is exible
but slow.

Advantages of ROM:

• Non-volatile in nature

• Cannot be accidentally changed

• Cheaper than RAMs

• Easy to test

• More reliable than RAMs

• Static and do not require refreshing

• Contents are always known and can be veri ed

1.8.3 Secondary Memory


This type of memory is also known as external memory or non-volatile.

It is slower than the main memory.

These are used for storing data/information permanently.

CPU directly does not access these memories, instead they are accessed via input-output
routines.

The contents of secondary memories are rst transferred to the main memory, and then
the CPU can access it.

For example, disk, CD-ROM, DVD, Hard-disk, SSD, pen drive, SD Card etc. 

Characteristics of Secondary Memory:

• These are magnetic and optical memories.

• It is known as the backup memory.

• It is a non-volatile memory.

• Data is permanently stored even if power is switched o .

• It is used for storage of data in a computer.

• Computer may run without the secondary memory.

• Slower than primary memories.

1.8.3.1 Hard Disk


It is a rigid magnetic disc that is used to store data. It permanently stores data and is
located within a drive unit.

The hard disk is also known as a hard drive.

It is a rigid magnetic disc that stores data permanently, as it is a non-volatile storage


device.

The hard disk is located within a drive unit on the computer's motherboard and comprises
one or more platters packed in an air-sealed casing.

The data is written on the platters by moving a magnetic head over the platters as they
spin.

The data stored on a computer's hard drive generally includes the operating system,
installed software, and the user's les and programs, including pictures, music, videos, text
documents, etc.

1.8.3.2 Solid State Drive (SSD)


SSD (Solid State Drive) is also a non-volatile storage medium that is used to hold and
access data.

Unlike a hard drive, it does not have moving components, so it o ers many advantages
over SSD, such as faster access time, noiseless operation, less power consumption, and more.

Page 20 of 32
fi
fi
fi
ff
ff
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

As the cost of SSD has come down, it has become an ideal replacement for a standard
hard drive in desktop and laptop computers.

It is also suitable for notebooks, and tablets that don't require lots of storage.

1.8.3.3 Pen Drive


Pen drive is a compact secondary storage device.

It is also known as a USB ash drive, thumb drive or a jump drive.

It connects to a computer via a USB port. It is commonly used to store and transfer data
between computers.

For example, you can write a report using a computer and then copy or transfer it in the
pen drive. Later, you can connect this pen drive to a computer to see or edit your report.

You can also store your important documents and pictures, music, videos in the pen drive
and keep it at a safe place.

Pen drive does not have movable parts; it comprises an integrated circuit memory chip
that stores the data. This chip is housed inside a plastic or aluminium casing.

The data storage capacity of the pen drive generally ranges from 2 GB to 128 GB.

Furthermore, it is a plug and play device as you don't need additional drives, software, or
hardware to use it.

1.8.3.4 SD Card
SD Card stands for Secure Digital Card.

It is most often used in portable and mobile devices such as smartphones and digital
cameras.

You can remove it from your device and see the things stored in it using a computer with a
card reader.

There are many memory chips inside the SD card that store the data; it does not have
moving parts.

SD cards are not created equal, so they may di er from each other in terms of speed,
physical sizes, and capacity.

For example, standard SD cards, mini SD cards, and micro SD cards.

1.8.3.5 Compact Disk (CD)


Compact Disk is a portable secondary storage device in the shape of a round medium
disk.

It is made of polycarbonate plastic with 5 inches in diameter and 0.05 inches in thickness.

The concept of CD was co-developed by Philips and Sony in 1982.

The rst CD was created on 17 August 1982 at the workshop of Philips in Germany.

In the beginning, it was used for storing and playing sound recordings, later it was used for
various purposes such as for storing documents, audio les, videos, and other data like software
programs in a CD.

1.8.3.6 Digital Versatile/Video Disk (DVD)


DVD is short for digital versatile disc or digital video disc.

It is a type of optical media used for storing optical data.

Although it has the same size as a CD, its storage capacity is much more than a CD.

So, it is widely used for storing and viewing movies and to distribute software programs as
they are too large to t on a CD.

DVD was co-developed by Sony, Panasonic, Philips, and Toshiba in 1995.

Types of DVDs:

1. DVD-ROM (Read-Only): These types of DVDs come with media already recorded on
them, such as movie dvd’s. As the name suggests, data on these discs cannot be erased
or added, so these discs are known as a read-only or non-writable DVD.

Page 21 of 32
fi
fi
fl
ff
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

2. DVD-R (Writable): It allows you to record or write information to the DVD. However, you
can write information only once as it becomes a read-only DVD once it is full.

3. DVD-RW (Rewritable or Erasable): This type of discs can be erased, written, or recorded
multiple times.

1.8.4 Memory Unit


Memory units are used to measure and represent data. Some of the commonly used
memory units are:

• Bit: The computer memory units start from bit. A bit is the smallest memory unit to measure
data stored in main memory and storage devices. A bit can have only one binary value out of
0 and 1.

• Nibble: A group of 4 bits is called nibble.

• Byte: It is the fundamental unit to measure data. It contains 8 bits or is equal to 8 bits. Thus a
byte can represent 2*8 or 256 values.

• Word: A computer word, like a byte, is a group of xed number of bits processed as a unit,
which varies from computer to computer but is xed for each computer. The length of a
computer word is called word-size or word length. It may be as small as 8 bits or may be as
long as 96 bits. A computer stores the information in the form of computer words.

• Kilobyte: A kilobyte contains 1024 bytes. (1 KB = 1024 Bytes)

• Megabyte: A megabyte contains 1024 kilobytes. (1 MB = 1024 KB)

• Gigabyte: A gigabyte contains 1024 megabyte. (1 GB = 1024 MB)

• Terabyte: A terabyte contains 1024 gigabytes. (1 TB = 1024 GB)

• Petabyte: A petabyte contains 1024 terabytes. (1 PB = 1024 TB)

1.9 Computer Networking


A network set up by connecting two or more computers and other supporting hardware
devices through communication channels is called a computer network. It enables computers to
communicate with each other and to share commands, data, etc., including the hardware and
software resources.

Uses of Computer Network:

• It allows you to share resources such as printers, scanners, etc.

• You can share expensive software and database among network users.

• It facilitates communications from one computer to another computer.

• It allows the exchange of data and information among users through a network.

Popular Computer Networks:

1. Local Area Network (LAN)

2. Metropolitan Area Network (MAN)

3. Wide Area Network (WAN)

1.9.1 Local Area Network (LAN)


As the name suggests, the local area network is a computer network that operates in a
small area, i.e., it connects computers in a small geographical area like within an o ce, company,
school, or any other organization.

So, it exists within a speci c area, e.g. home network, o ce network, school network, etc.

A local area network may be a wired or wireless network or a combination of both.

The devices in a LAN are generally connected using an Ethernet cable, which o ers an
interface to connect multiple devices like router, switches, and computers.

For example, using a single router, few Ethernet cables, and computers, you can create a
LAN at your home, o ce, etc.

In this network, one computer may act as a server and other computers, which are part of
the network, may serve as clients.

Page 22 of 32
ffi
fi
fi
fi
ffi
ffi
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Bene ts of LAN:

• It o ers a higher operating speed than WAN and MAN.

• It is less expensive and easy to install and maintain.

• It perfectly ful lls the requirement of a speci c organization, such as an o ce, school, etc.

• It can be wired or wireless or a combination of both.

• It is more secure than other networks as it is a small set up that can be easily taken care of.

Primary Functions of LAN:

• Sharing of les: It allows you to share or transfer les from one computer to another computer
within the LAN. For example, in a bank, it can be used to send a le with the details of
transactions of a customer from the server to clients.

• Sharing of printers: It also allows shared access to a printer, le servers, etc. For example, ten
computers that are connected through LAN can use a single printer, le server, fax machine,
etc.

• Sharing of Computational capabilities: It allows the clients to access to the computational


power of a server, e.g., an application server as some applications which run on clients in a
LAN may require higher computational capabilities.

• Mail and message related services: It allows sending and receiving mails between computers
of a LAN. You are required to have a mail server for this.

• Database services: It also allows storing and retrieving data with the help of a database server.

1.9.2 Metropolitan Area Network (MAN)


MAN is a high-speed network that spreads over a large geographical area such as a metro
city or town. It is set up by connecting the local area networks using routers and local telephone
exchange lines.

It can be operated by a private company, or it may be a service provided by a company


such as a local telephone company.

MAN is ideal for the people of a relatively large area who want to share data or information.

It provides fast communication via high-speed carriers or transmission media such as copper,
ber optics, and microwaves.

The commonly used protocols for MAN are X.25, Frame Relay, Asynchronous Transfer
Mode (ATM), xDSL (Digital Subscriber Line), ISDN (Integrated Services Digital Network), ADSL
(Asymmetrical Digital Subscriber Line), and more.

The area covered by MAN is larger than the LAN but smaller than a WAN. Its network
ranges from 5 to 50 km.

Furthermore, it also provides uplinks for connecting LANs to WANs and the internet.

An organization can use a MAN to connect all of its LANs located at its di erent o ces
across the city.

Examples of MAN:

• Cable TV Network

• Telephone service provides that provide high-speed DSL lines

• IEEE 802.16 or WiMAX

• Connected re stations in a city

• Connected branches of a school in a city

Advantages of MAN:

• Less Expensive: It is less expensive to set up a MAN and to connect it to a WAN.

• High Speed: The speed of data transfer is more than WAN.

• Local Emails: It can send local emails fast.

• Access to the Internet: It allows you to share your internet connection, and thus multiple users
can have access to high-speed internet.

• Easy to set up: You can easily set up a MAN by connecting multiple LANs.

• High Security: It is more secure than WAN.

Page 23 of 32
fi
ff
fi
fi
fi
fi
fi
fi
fi
fi
fi
ffi
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.9.3 Wide Area Network (WAN)


WAN extends over a large geographical area. It is not con ned within an o ce, school,
city, or town and is mainly set up by telephone lines, ber optic, or satellite links.

It is mostly used by big organizations like banks and multinational companies to


communicate with their branches and customers across the world.

Although it is structurally similar to MAN, it is di erent from MAN in terms of its range, e.g.,
MAN covers up to 50 Kms, whereas WAM covers distances larger than 50 Km, e.g., 1000km or
more.

A WAN works by using TCP/IP protocol in combination with networking devices such as
switches, routers, rewalls, and modems.

It does not connect individual computers; rather, they are designed to link small networks
like LANs and MANs to create a large network.

The internet is considered the largest WAN in the world as it connects various LANs and
MANs through ISPs.

The computers are connected to the wide area network through public networks, such as
telephone systems, leased lines or satellites.

The users of a WAN do not own the network as it is a large setup connecting the remote
computer systems. However, they are required to subscribe to a service provided by a
telecommunication provider to use this network.

Examples of WAN:

• Internet

• Defense department

• Stock exchanges network

• Railway reservation system

• Big Banks' cash dispensers' network

• Satellite systems

Advantages of WAN:

• Large Network Range: It spans a large geographical area of 2000 km or more, e.g., from one
country to another countries.

• Centralized data: It allows your di erent o ce branches to use your head o ce server for
retrieving and sharing data. Thus, you don’t need to buy email servers, les server and back
up servers, etc.

• Get updated les and data: It provides an ideal platform for companies who need a live server
for their employees to exchange updated les within seconds.

• High bandwidth: It o ers high bandwidth than a normal broadband connection. Thus, it can
increase the productivity of your company by o ering uninterrupted data transfer and
communication.

• Workload Distribution: It helps distribute your workload to other locations. You can hire
employees in di erent countries and assign them to work from your o ce.

1.9.4 Internet, Intranet and Extranet


Internet: The network formed by the co-operative interconnection of millions of computers, linked
together is called Internet. Internet comprises of :

• People : People use and develop the network. 

• Resources : A collection of resources that can be reached from those networks. 

• A setup for collaboration : It includes the member of the research and educational
committees worldwide. 

Intranet: It is an internal private network built within an organization using Internet and World
Wide Web standards and products that allows employees of an organization to gain access to
corporate information. 

Extranet: It is the type of network that allows users from outside to access the Intranet of an
organization. 

Page 24 of 32
fi
ff
fi
ff
ff
ffi
fi
ff
fi
ff
fi
ffi
fi
ffi
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Point of Internet Intranet Extranet


difference

Accessibility Public Private Private


of network

Availability Global system. Speci c to an To share information with


organization. suppliers and vendors it
makes the use of public
network.

Coverage All over the world. Restricted area upto Restricted area upto an
an organization. organization and some of
its stakeholders or so.

Accessibility It is accessible to It is accessible only to Accessible only to the


of content everyone the members of members of organization
connected. organization. and external members
with logins.

No. of It is largest in The minimal number The connected devices


computers number of of devices are are comparable with
connected connected connected. Intranet.
devices.

Owner No one. Single organization. Single/ Multiple


organization.

Purpose of It’s purpose is to It’s purpose is to It’s purpose is to share


the network share information share information information between
throughout the throughout the members and external,
world. organization. members.

Security It is dependent on It is enforced via It is enforced via rewall


the user of the rewall. that separates internet
device connected and extranet.
to network.

Users General public. Employees of the Employees of the


organization. organization which are
connected.

Page 25 of 32
fi
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Policies There is no hard Policies of the Policies of the


behind setup and fast rule for organization are organization are
policies. imposed. imposed.

Maintenance It is maintained by It is maintained by It is maintained by CIO.


ISP. CIO. HR or HR or communication
communication department of an
department of an organization.
organization.

Economical It is more It is less economical. It is also less economical.


economical to
use.

Relation It is the network of It is derived from It is derived from Intranet.


networks. Internet.

Example What we are WIPRO using internal DELL and Intel using
normally using is network for its network for its business
internet. business operations. operations.

1.9.5 World Wide Web (WWW)


Information is normally dispersed over many computers connected to the internet. If a user
wants to obtain information from any of the these computers they must be logically linked. The
information stored in computers is not only text but also graphics (images), sound and video. This
is called multimedia information.

Each document can be indexed using a number of keywords which can be used to link it
through pointers to related multimedia items. For example, if there is a document describing Taj
Mahal it can be linked to a picture of Shah Jehan stored in an image le. The designer of a
document can choose the keywords and provide links to similar keywords and items related to
the keywords. Such a document annotated using key words along with links (or pointers) linking it
to other related documents is called a hypertext.

A special notation is used to mark the key words and links in hypertext. This notation is
known as hypertext mark up language, abbreviated html. A computer connected to internet can
store multimedia information indexed using html. This is called a web page. A computer located
at an internet address can store many web pages. Such a computer is called a web site. The
collection of all web sites linked together by hypertext links is known as the world wide web.
Every web page has a unique address called Universal Resource Locator (URL). In order to
transfer les on the web a special set of rules called hypertext transfer protocol (http) is used. All
web pages are thus addressed starting with http. For example, the web address of the
Supercomputer Education and Research Centre at the Indian Institute of Science containing web
pages describing SERC is

http://www.serc.iisc.ernet.in

To obtain information from the web a software called a browser is used which normally has
a good graphical user interface (GUI) pronounced Gooyee. Some popular browsers are Netscape,
Mosaic and Internet Explorer. Browsers provide a very powerful method of accessing web pages
which may be located anywhere in the world. Thus most organizations and even individuals
maintain a web page (called a home page) containing information about themselves. Millions of
web sites are maintained today and their number is increasing rapidly. A web site besides textual
material may also contain programs which could be executed. Several sites provide software
known as search engines to retrieve information trom web pages. The information is retrieved by
Page 26 of 32
fi
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

using keywords for search provided by a user. Currently a popular search engine is developed by
a company called Google.

1.9.6 Networking Components


Client: In computing, a client is a piece of computer hardware or software that accesses a service
made available by a server as part of the client–server model of computer networks.

Server: A server is a computer or system that provides resources, data, services, or programs to
other computers, known as clients, over a network.

Router: A router is a switching device for networks, which is able to route network packets,
based on their addresses, to other networks or devices. Among other things, they are used for
Internet access, for coupling networks or for connecting branch o ces to a central o ce via VPN
(Virtual Private Network).

Switch: A switch is a device in a computer network that connects other devices together.
Multiple data cables are plugged into a switch to enable communication between di erent
networked devices.

Bridge: A network bridge is a computer networking device that creates a single, aggregate
network from multiple communication networks or network segments.

Fibre-Optics Cable: A ber-optic cable contains anywhere from a few to hundreds of optical
bers within a plastic casing. Also known as optic cables or optical ber cables, they transfer
data signals in the form of light and travel hundreds of miles signi cantly faster than those used
in traditional electrical cables.

Coaxial Cable: A coaxial cable is a type of shielded and insulated copper cable that is used in
computer networks and to deliver cable TV services to end users.

Wireless: A wireless network refers to a computer network that makes use of Radio Frequency
(RF) connections between nodes in the network. Wireless networks are a popular solution for
homes, businesses, and telecommunications networks.

1.9.7 Network Topology & Types


A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may de ne both physical and logical aspect of the
network. Both logical and physical topologies could be same or di erent in a same network.

Various types of topology are, Point-to-Point, Bus Topology, Star Topology, Ring Topology,
Mesh Topology, Tree Topology, Daisy Topology, Hybrid Topology.

1.9.7.1 Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of one
host is connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they are
connected directly.

Page 27 of 32
fi
fi
fi
ffi
ff
fi
fi
ff
ffi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.9.7.2 Bus Topology


In case of Bus topology, all devices share
single communication line or cable.Bus topology may
have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus
Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does
not a ect the other devices. But failure of the shared
communication line can make all other devices stop
functioning.

Both ends of the shared channel have line


terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.

1.9.7.3 Star Topology


All hosts in Star topology are connected to a
central device, known as hub device, using a point-to-
point connection. That is, there exists a point to point
connection between hosts and hub. The hub device
can be any of the following:

• Layer-1 device such as hub or repeater

• Layer-2 device such as switch or bridge

• Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of


failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts, takes
place through only the hub.Star topology is not
expensive as to connect one more host, only one cable
is required and con guration is simple.

1.9.7.4 Ring Topology


In ring topology, each host machine connects to
exactly two other machines, creating a circular network
structure. When one host tries to communicate or send
message to a host which is not adjacent to it, the data
travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator
may need only one more extra cable.

Failure of any host results in failure of the whole


ring.Thus, every connection in the ring is a point of
failure. There are methods which employ one more
backup ring.

1.9.7.5 Mesh Topology


In this type of topology, a host is connected to one
or multiple hosts.This topology has hosts in point-to-point
connection with every other host or may also have hosts
which are in point-to-point connection to few hosts only.

Hosts in Mesh topology also work as relay for other


hosts which do not have direct point-to-point links. Mesh
technology comes into two types:

• Full Mesh: All hosts have a point-to-point connection to


Page 28 of 32
ff
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

every other host in the network. Thus for every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all network topologies.

• Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.

1.9.7.6 Tree Topology


Also known as Hierarchical Topology, this is the most
common form of network topology in use presently.This
topology imitates as extended Star topology and inherits
properties of bus topology.

This topology divides the network in to multiple levels/


layers of network. Mainly in LANs, a network is bifurcated into
three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as
distribution layer, which works as mediator between upper
layer and lower layer. The highest layer is known as core layer, and is central point of the network,
i.e. root of the tree from which all nodes fork.

All neighbouring hosts have point-to-point connection between them.Similar to the Bus
topology, if the root goes down, then the entire network su ers even.though it is not the single
point of failure. Every connection serves as point of failure, failing of which divides the network
into unreachable segment.

1.9.7.7 Daisy Topology


This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts
are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are
connected then it represents Ring topology.

Each link in daisy chain topology represents single point of failure. Every link failure splits
the network into two segments.Every intermediate host works as relay for its immediate hosts.

1.9.7.8 Hybrid Topology


A network structure whose design contains more
than one topology is said to be hybrid topology. Hybrid
topology inherits merits and demerits of all the
incorporating topologies.

The above picture represents an arbitrarily hybrid


topology. The combining topologies may contain attributes
of Star, Ring, Bus, and Daisy-chain topologies. Most
WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid
topology.

Page 29 of 32
ff
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.10 Applications of Computer


Computers play a role in every eld of life. They are used in homes, business, educational
institutions, research organizations, medical eld, government o ces, entertainment, etc

Home: Computers are used at homes for several purposes like online bill payment, watching
movies or shows at home, home tutoring, social media access, playing games, internet access,
etc. They provide communication through electronic mail. They help to avail work from home
facility for corporate employees. Computers help the student community to avail online
educational support

Medical Field: Computers are used in hospitals to maintain a database of patients’ history,
diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical
devices to perform delicate operations, and conduct surgeries remotely. Virtual reality
technologies are also used for training purposes. It also helps to monitor the fetus inside the
mother’s womb.

Entertainment: Computers help to watch movies online, play games online; act as a virtual
entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the
entertainment industry in recording music with arti cial instruments. Videos can be fed from
computers to full screen televisions. Photo editors are available with fabulous features.

Industry: Computers are used to perform several tasks in industries like managing inventory,
designing purpose, creating virtual sample products, interior designing, video conferencing, etc.
Online marketing has seen a great revolution in its ability to sell various products to inaccessible
corners like interior or rural areas. Stock markets have seen phenomenal participation from
di erent levels of people through the use of computers.

Education: Computers are used in education sector through online classes, online examinations,
referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the
education eld.

Government: In government sectors, computers are used in data processing, maintaining a


database of citizens and supporting a paperless environment. The country’s defense
organizations have greatly bene tted from computers in their use for missile development,
satellites, rocket launches, etc.

Banking: In the banking sector, computers are used to store details of customers and conduct
transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced
manual errors and expenses to a great extent through extensive use of computers.

Business: Nowadays, computers are totally integrated into business. The main objective of
business is transaction processing, which involves transactions with suppliers, employees or
customers. Computers can make these transactions easy and accurate. People can analyze
investments, sales, expenses, markets and other aspects of business using computers.

Training: Many organizations use computer-based training to train their employees, to save
money and improve performance. Video conferencing through computers allows saving of time
and travelling costs by being able to connect people in various locations.

Arts: Computers are extensively used in dance, photography, arts and culture. The uid
movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering: Computers with high performance are used to stimulate dynamic
process in Science and Engineering. Supercomputers have numerous applications in area of
Research and Development (R&D). Topographic images can be created through computers.
Scientists use computers to plot and analyze data to have a better understanding of earthquakes.

Page 30 of 32
ff
fi
fi
fi
fi
fi
ffi
fl
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

1.11 Advantages of Computer


Speed: When data, instructions, and information ow along electronic circuits in a computer, they
travel at incredibly fast speeds. Many computers process billions or trillions of operations in a
single second. Processing involves computing (e.g., adding, subtracting), sorting (e.g.,
alphabetizing), organizing, displaying images, recording audio, playing music, and showing a
movie or video.

Reliability: The electronic components in modern computers are dependable and reliable
because they rarely break or fail.

Consistency: Given the same input and processes, a computer will produce the same results —
consistently. A computing phrase — known as garbage in, garbage out — points out that the
accuracy of a computer’s output depends on the accuracy of the input. For example, if you do not
use the ash on a digital camera when indoors, the resulting pictures that are displayed on the
computer screen may be unusable because they are too dark.

Storage: A computer can transfer data quickly from storage to memory, process it, and then store
it again for future use. Many computers store enormous amounts of data and make this data
available for processing anytime it is needed.

Communications: Most computers today can communicate with other computers, often
wirelessly. Computers with this capability can share any of the four information processing cycle
operations — input, process, output, and storage — with another computer or a user.

1.12 Disadvantages of Computer


Health Risks: Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, neck, and back. Computer users can protect themselves from these health
risks through proper workplace design, good posture while at the computer, and appropriately
spaced work breaks. Two behavioral health risks are computer addiction and technology
overload. Computer addiction occurs when someone becomes obsessed with using a computer.
Individuals su ering from technology overload feel distressed when deprived of computers and
mobile devices. Once recognized, both computer addiction and technology overload are treatable
disorders.

Violation of Privacy: Nearly every life event is stored in a computer somewhere . . . in medical
records, credit reports, tax records, etc. In many instances, where personal and con dential
records were not protected properly, individuals have found their privacy violated and identities
stolen.

Public Safety: Adults, teens, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these
unsuspecting, innocent computer users have fallen victim to crimes committed by dangerous
strangers. Protect yourself and your dependents from these criminals by being cautious in e-mail
messages and on Web sites. For example, do not share information that would allow others to
identify or locate you and do not disclose identi cation numbers, passwords, or other personal
security details.

Impact on Labor Force: Although computers have improved productivity in many ways and
created an entire industry with hundreds of thousands of new jobs, the skills of millions of
employees have been replaced by computers. Thus, it is crucial that workers keep their education
up-to-date. A separate impact on the labor force is that some companies are outsourcing jobs to
foreign countries instead of keeping their homeland labor force employed.

Page 31 of 32
fl
ff
fi
fl
fi
Shri B.L. Parikh College Of Business Administration BBA106 (Sem 1)

Impact on Environment: Computer manufacturing processes and computer waste are depleting
natural resources and polluting the environment. When computers are discarded in land lls, they
can release toxic materials and potentially dangerous levels of lead, mercury, and ame
retardants.

Green computing involves reducing the electricity consumed and environmental waste generated
when using a computer. Strategies that support green computing include recycling, regulating
manufacturing processes, extending the life of computers, and immediately donating or properly
disposing of replaced computers. When you purchase a new computer, some retailers o er to
dispose of your old computer properly.

Page 32 of 32
fl
fi
ff

You might also like