You are on page 1of 53

Information Technology

COMPUTER (HARDWARE & SOFTWARE


FUNDAMENTALS)

INTRODUCTION

COMPUTER: A computer is a device that accepts information ( input in the form of digitalized data)
and manipulates it for some result based on a program or sequence of instructions on how the data
is to be processed. This information can then be displayed or stored for future use.

Data: This collection of raw unprocessed facts, figures and symbols. Computer processes data to
create Information hence Information is data that is organized, meaningful and useful.

Hardware: this is the physical components contained in a computer system. For example; printers,
monitor and speaker.

Peripheral Device: any hardware device connected to and controlled by the central processing unit.
Examples of peripherals are modems, disk drives, printers, scanners and keyboard.

Software: also called a program is a series of instructions that tells the hardware how to perform
tasks. Without software most hardware are useless.

Backing Store: Storage external to the computer used for large quantities of data or large programs.
Backing store is also known as secondary store, auxiliary store or external store.

User: a user is someone who communicates with the computer or uses information it generates.

Functions of Computers
A computer performs the following functions −

Receiving Input
Data is fed into computer through various input devices like keyboard, mouse, digital pens, etc.
Input can also be fed through devices like CD-ROM, pen drive, scanner, etc.

Processing the information


Operations on the input data are carried out based on the instructions provided in the programs.

Storing the information


After processing, the information gets stored in the primary or secondary storage area.

Producing output
The processed information and other details are communicated to the outside world through output
devices like monitor, printer, etc.

SR.NO. COMPUTER CONCEPTS & DESCRIPTION


1 History of Computers
The history of the computer dates back to several years. There are five
prominent generations of computers. Each generation has witnessed several
technological advances which change the functionality of the computers.
2 Characteristics of Computer System
Characteristics of Computer System involve Speed, Accuracy, Diligence,
Versatility, Reliability, Automation, Memory.
3 Basic Applications of Computer
Computers play a role in every field of life. They are used in homes,
business, educational institutions, research organizations, medical field,
government offices, entertainment, etc.
4 Components of Computer System
Computer systems consist of three components as shown in below image:
Central Processing Unit, Input devices and Output devices.
5 Input Devices – Keyboard and Mouse
Input devices help to get input or data from user.
6 Other Input Devices
There are few other input devices which help to feed data to the computer.
7 Output Devices
Output devices help to display output to user
8 Computer Memory
Computer memory refers to storage area where data is stored. It is of two
types Primary Memory & Secondary Memory.
9 Concept of Hardware and Software
The term hardware refers to mechanical device that makes up computer.
Software can be categorized into two types - System software & Application
software
10 Programming Languages
The languages that are used to write a program or set of instructions are
called "Programming languages". Programming languages are broadly
categorized into three types - Machine level language, Assembly level
language, High-level language.
11 Representation of Data/Information
Computer does not understand human language. Any data, viz., letters,
symbols, pictures, audio, videos, etc., fed to computer should be converted to
machine language first. Computers represent that data into different forms.
12 Data Processing & Data Processing Stages
Data processing is a process of converting raw facts or data into a
meaningful information.
13 Applications of IECT
IECT stands for Information Electronics and Communication Technology.

Summary
In this chapter, we discussed different components of a computer, and familiarized ourselves with
concept of hardware and software, representation of data/information, concept of data processing,
and applications of IECT.

CONCEPT OF HARDWARE
AND SOFTWARE
The concept of hardware and software is explained in detail below

Hardware
The term hardware refers to mechanical device that makes up computer. Computer hardware
consists of interconnected electronic devices that we can use to control computer’s operation, input
and output. Examples of hardware are CPU, keyboard, mouse, hard disk, etc.

Hardware Components
Computer hardware is a collection of several components working together. Some parts are
essential and others are added advantages. Computer hardware is made up of CPU and peripherals
as shown in image below.
Software
A set of instructions that drives computer to do stipulated tasks is called a program. Software
instructions are programmed in a computer language, translated into machine language, and
executed by computer. Software can be categorized into two types −

1- System software
2- Application software

System Software
System software operates directly on hardware devices of computer. It provides a platform to run an
application. It provides and supports user functionality. Examples of system software include
operating systems such as Windows, Linux, Unix, etc.

Application Software
An application software is designed for benefit of users to perform one or more tasks. Examples of
application software include Microsoft Word, Excel, PowerPoint, Oracle, etc.
Differences between Software and Hardware are sorted out
below−

Sr.No
Software Hardware
.

It is a
collection of
programs to
bring
1 It includes physical components of computer system.
computer
hardware
system into
operation.

It includes
numbers,
alphabets,
alphanumeric It consists of electronic components like ICs, diodes, registers,
2
symbols, crystals, boards, insulators, etc.
identifiers,
keywords,
etc.

3 Software Hardware design is based on architectural decisions to make it


products work over a range of environmental conditions and time.
evolve by
adding new
features to
existing
programs to
support
hardware.

It will vary
as per
computer
and its built-
4 It is mostly constructed for all types of computer systems.
in functions
and
programming
language.

It is designed
and
developed by
The hardware can understand only low-level language or
5 experienced
machine language.
programmers
in high-level
language.

It is The hardware works only on binary codes 1’s and 0’s.


represented
in any high-
level
language
6
such as
BASIC,
COBOL, C,
C++, JAVA,
etc.

The software
is
categorized
as operating
system, The hardware consists of input devices, output devices,
7
utilities, memory, etc.
language
processor,
application
software, etc.
I/O PROCESSING AND DATA STORAGE
Input devices accept incoming data and convert it into binary data that is understandable to a digital
computer. Examples of input devices include the keyboard, mouse, scanner, and touchscreen.
Output devices convert the computer digitized signals into an environment-understandable data
form. Example: Monitor, printer, etc. Input-Output peripherals allow both input and output in the
same. Example: touch screens, network cards, data accusation cards. Based on their interaction with
their surrounding environment, I/O device categories are as follows:

 Human readable devices

o These devices communicate with the computer user.

o Examples include the display monitor, printer, keyboard, and mouse.

 Machine-readable devices

o These devices communicate with special-purpose electronic equipment

o Examples include hard disks, DVDs, USB sticks, sensor devices

 Communication devices

 These devices communicate with other intelligent devices

o Examples include network cards and modems

DEFINITION:
Input hardware

Input hardware exists in many different shapes and sizes, and are tailored specifically for particular
systems. Below is a list of common input devices.

 Keyboards

 Touch screens

 Pointing devices

o Mouse

o Touchpad / trackpad

o Joystick

 Composite devices (capable of multiple abilities such as movement and clicking)

o Game controllers

o Light pen

o Graphics tablet

 Imaging input devices

o Digital cameras
o Webcam

o Image scanner

o Fingerprint scanner

o Barcode reader

 Audio input devices

o Microphone

o MIDI Keyboard

o Drum machine

Processing Hardware

 Processing in a computer system is handled by the Central Processing Unit (CPU)

 Read The Computing Teacher's article on Central Processing Units here

 The motherboard of a computer is essential to this process as it houses the CPU, RAM and
other integral components

 Random access memory (RAM) allows for the data being processed to be stored temporarily

 Data can be processed in a number of ways

 Read The Computing Teacher's article on Processing Types here

Output Hardware

Output devices are continuously changing as technology advances. Various types of display outputs
as well as printers and audio devices continue to evolve daily. These devices are responsible for
transmitting data in to a form that we as humans are able to interpret, e.g. text, images, audio, and
even events we can feel (see: haptic feedback).

 Monitors

 Printers

 Haptic sensors (for example, mobile device vibrations upon touch input)

 Sound cards and speakers

Storage Hardware

Often data that has been processed is stored for later processing or reading. Many devices are
capable of storing such information.

 Hard disk drives (HDDs)

 Solid-state drives (SSDs)


 Optical drives (CDs / BluRay / DVD)

 Flash storage devices (USB storage disks)

 Floppy disk drives (obsolete in today's world)

 Network-attached storage devices (NAS)

 Read The Computing Teacher's article on Primary and Secondary storage here

 Read The Computing Teacher's article on Storage Capacities here

Storage Devices

A storage device is a hardware system that allows data storing and extraction. Storage devices
provide two main interfaces for data storage operation: mass storage and file system. Mass-storage
deals with large amounts of binary data in a machine-readable format. File System Interface utilizes
the concept of a file as an identifiable and specifiable resource of data. Storage devices can be
classified based on the storage structure into the following.

 Magnetic disks

Uses magnetically coated platters to store data

 Solid-state disks

Uses memory-like circuit assemblies to store data persistently

 Optical disks

Uses laser or stamping machine to store data and uses illumination to access the data on optical
data paths.

 Tape drives

Uses magnetic tape to store the data

 Network storage systems

Uses a data storage server to provide storage service over the network

 Cloud-based storage

Provide storage on the cloud

Magnetic disks are the most widely used primary hard disk storage in most existing computer
systems. These devices use a Moving-head-disks mechanism to read/write data on a circular platter
that rotates at 3600 to 15000 rounds per minute (RPM). The performance characteristics of
magnetic disks include access time, data transfer rate, power consumption, system reliability, and
others. Access time (AKA positioning time) is the time it takes to move the head to the correct
position before the drive can transfer data. The positioning time involves moving operations: moving
the disk arm to the desired cylinder (seek time) and rotating the disk platter to bring the desired
sector under the disk head (rotational latency).

In magnetic disks, data address space is a large one-dimensional array of logical blocks (called
frames). A frame is the unit of data transfer in hard disk I/O operations. A magnetic disk is not ready
for use before it is prepared using the low-level format method which creates identifiable logical
blocks on the physical media. The low-level formatting maps logical blocks into the sectors of the
disk sequentially. Sector 0 is located at the first sector of the first track on the outermost cylinder of
the disk platter. The disk cylinders act as a continuous track medium from the outermost to the
innermost cylinder.

Computer systems startup their functions using a booting process: e.g., BIOS-MBR boot method and
UEFI-GPT method. The latter is a new method used in the latest versions of Windows, Linux, and
Mac OS. To understand the boot sequence, we first need to define the following components.

 Basic Input/Output System (BIOS): the lowest software interface by which every higher-
level code (i.e., bootloader and OS kernel) can communicate with the hardware.

 Master Boot Record (MBR): a data sector at the very bigging of the primary portioned hard
disk device. MBR contains the partition table and the bootstrap code.

 Partition table: An index of up to four possible main partitions existing on the disk.

 Bootstrap code: software code that is executed by the system bios and that finds the active
partition in the disk partition table and starts the execution of the bootloader procedure.

 Bootloader procedure: a multi-stage software process completes the booting from the
active partition boot sector.

 Active Partition boot sector: the first sector (512 bytes) of the active partition.

The traditional boot method (BIOS-MBR) involves six steps as follows:

1. BIOS step: when the system is turned on, the bios initializes the boot process

2. MBR: The bios calls a software code (bootstrap) stored in the MBR of disk 0.

3. Active partition: The bootstrap loads the bootloader from the active partition boot sector.

4. Bootloader: the boot sector loads system configuration from files on the active partition.

5. Boot menu: The bootloader displays a list of OSs from a configuration file for selection.

6. Operating system kernel: The bootloader locates and loads the selected OS kernel.

Network Storage Systems

Instead of connecting directly to a computer, network storage provides versatile methods for data
storage over devices connected to and accessed through networks. Network storage systems
include Storage Array, Network Attached Storage (NAS), and Storage Area Networks (SAN).

 Storage Array (aka disk array) is a data storage system that contains multiple drives
managed by a central management system ([Figure 7]). Storage arrays are a critical part of
storage networks that is capable of storing huge amounts of data. By separating the
connection and network transmission from the data storage functions, storage on these
arrays can be provided as a local function to the connected computing devices. Storage
Array controller is a device that manages the physical disk drives and provides storage
features accessed through I/O ports talking to I/O busses to attached host(s).
Figure 8- Network Attached Storage (NAS).

 Network-Attached Storage (NAS) is a storage device made available through a network


connection ([Figure 8]). NAS devices allow data storage in and retrieval from centralized
network locations that can be made available for authorized network users. Thus, they
provide a flexible and scalable solution for additional storage. It also allows storage resource
sharing across computer systems using the same network. Authorized computers can use a
variety of network protocols to access a NAS server, e.g., such as Network File System (NFS)
and Common Internet File System (CiFS) protocols.

Figure 7-Storage Area Network

 A storage Area Network (SAN) is a computer network that allows organization users to
access consolidated data stored on multiple storage arrays ([Figure 9]). SAN provides access
to storage devices in specific disk arrays via logical unit numbers (called LUN mask) for disk
zoning and localization. SAN is a scalable network that allows easy plugging of additional
storage devices and connecting new computer hosts.
Disk scheduling

Figure 8 - Disk scheduling

Hard disk is one of the busiest devices in computers. Access requests from processes incessantly pile
up to form a queue of I/O requests to the secondary storage device. Disk Scheduling provides a
systematic and efficient way to serve the queued disk I/O requests and meet specific performance
criteria. Disk scheduling algorithms vary with each based on their approach to minimize the time
consumed in the mechanical operations in hard disks: seek time and rotational latency. [Figure 9-]
shows the relationship between disk access time and these mechanical operations.

Disk Access Time = Seek Time + Rotational Latency + Transfer Time

There are a number of scheduling algorithms as follows.

 First Comes First Serve (FCFS) addresses requests in the order they arrive in the disk queue.

 Shortest Seek Time First (SSTF) selects the request with the minimum seek time from the
I/O queue based on the current head position.

 SCAN algorithm takes into consideration the direction of disk head motion. Therefore, it
keeps selecting the nearest requests towards one direction and then turns back to other
directions taking the remaining requests based on the shortest seek time.

 C-SCAN algorithm is like SCAN except that it serves the I/O requests as it moves only in one
direction. I.e., it selected the shortest seek time first towards one direction and when it
reaches the end it starts again from the beginning.

Lock and C-Lock algorithms are like SCAN and C-SCAN except for, they don’t have to come exactly to
the end (The first of last cylinder in the disk), instead, they keep moving till the position of the last
I/O request in that direction and then they turn back (as in Lock) or start from the bigging (C-Lock).

Raid Systems

Reliable storage involves the use of multiple software and hardware techniques to assure data
integrity on the storage devices. Some reliable storage mechanisms include the following.

 Redundant Array of Independent Disks (RAID) is a data storage technology that assures
data integrity by using disk arrays with redundancy.

 Backup & Recovery mechanisms use copies of important data to reinstate its integrity in
case of any damage or loss of data.
 Snapshot means a system view backup at a specific point of time before taking some action
or making a critical change to the system.

 Replication is a systematic duplication of data change activities separate data storage sites

Redundant Array of Independent Disks (RAID) is a data storage technology that assures data
integrity by combining multiple physical disk drives into one or more logical drives and creating
redundant copies of data on various structures of disk arrays. We call the disk array structures used
in these system RAID levels. The different RAID levels vary concerning third target quality criteria:
data integrity, access speed, and storage capacity. All RAID system structures maintain the following
design criteria.

 Single drive access: disk arrays are viewed as a single logical drive.

 Data distribution: across multiple disk drives.

 Data recoverability: guaranteed by using some forms of redundancy.

RAID solutions come in seven different levels as follows

 RAID level 0 the data evenly across multiple disks (AKA striping) to allow using them as one
storage unit.

 RAID level 1 maintains a redundant copy of each disk (AKA mirroring)

 RAID level 2 provides an efficient and low-cost model using hamming code redundancy (in
only three disks) instead of a data duplication model.

 RAID level 3 provides high data transfer rates by using the bit-parity redundancy model in
one disk only.

 RAID level 4 provides high I/O request rates by using the block-parity redundancy model.

 RAID level 5 provides interleaved parity model and avoids a Single point of failure.

 RAID level 6 provides a dual interleaved parity model and extremely high system availability.

NETWORKING & INTERNET STANDARDS

Internet Standard

Internet standard is a working document or a proposed specification that gains the status of the
standard after proper validation and is applicable to the worldwide Internet. This Internet standard
is formed under the supervision of the Internet Society (ISOC) which is responsible for the creation
and implementation of Internet standards. In this section, we will discuss the ISOC organization, and
we will also see the step-by-step formation of Internet standards.

Formation of Internet Society

Earlier there were no such organizations or committees that can define the internet standards.
However, people around the world were doing their own thing to establish worldwide
communication. This raises the need for standards that can be accepted across the world.
While working on ARPANET the Department of Defense (DoD) set up an informal committee i.e.,
the Internet Activities Board (IAB) which works to set up a network of the connected computer so
that they can share their findings. This would also reduce and even eliminates the cost of duplication
effort.

The acronym of IAB was modified to Internet Architecture Board (IAB). The IAB consisted of
approximately ten members where each member was assigned a task, which they used to report to
DoD. DoD and NSF used to raise the fund for IAB.

Whenever a new standard was required the members of IAB use it to discuss the requirements and
announce this to the software graduate students to implement it with the help of coding. The
communication between IAB and students was achieved with the help of series of online technical
reports i.e., RFCs (Request For Comments). These comments are organized in serial order online and
can be fetched by anyone who is interested in them.

With the continuous growth of the internet, IAB was reorganized in the year 1989. It was
repopulated to form an organization which was then split into two groups, IRTF (Internet Research
Task Force) and IETF (Internet Engineering Task Force). IRTF is held for conducting long-term
research and IETF is held to handle short-term issues.

A year later an Internet society was for and populated with the people who were interested in the
internet. The Internet Society emerges as an organization that was capable of creating standards for
the internet. The trustees of the Internet Society then were responsible to appoint the members of
IAB.

This is how the Internet Society (ISOC) was formed which thoroughly test and approved the
proposed internet standards.

Internet Administrations

Just now we have seen the formation of ISOC (Internet Society). Well under ISOC there are various
groups that coordinate to create and maintain the internet standards. In the figure below you can
see the organization of all the groups under the ISOC.

Internet Society (ISOC)


The ISOC is an international organization that thoroughly test the proposed specifications before it is
realized into the standard. Several administrative bodies such as IEFT, IA, etc. work cooperatively
under the ISOC which is responsible to address all the issues that decide the future of the Internet.
ISOC encourages scholarly activities and research in the field of the Internet.

IAB (Internet Architecture Board)

IAB issues technical advice to the Internet Society in order to ensure continuous growth of the
Internet. IAB oversees the evolution of the Internet so that it becomes a global platform for
communication.

IAB supervises two task forces namely IRTF (Internet Research Task Force) and IETF (Internet
Engineering Task Force). IAB edits and manages the RFCs. IAB makes a connection between the
Internet and other organizations that operate in the same direction.

Internet Research Task Force (IRTF)

IRTF conducts long-term researches related to the Internet. The research topic is related to Internet
protocols, Internet applications, about their architecture. All the research groups involved in the
research must have long-term membership. The research group (RG) or the working group under the
IRTF is managed by the IRSG (Internet Research Steering Group).

Internet Engineering Task Force (IEFT)

IETF tackles short-term engineering problems subjected to the Internet. The working groups under
IEFT are managed by the IESG (Internet Engineering Steering Group). The IEFT identifies the
problems on the Internet and proposes a solution to resolve the problem.

IETF also reviews the proposed specifications which are capable of becoming the Internet Standards.
Each working group is assigned a specific topic. The context of the assigned topic can be divided into
nine categories such as application, Internet protocols, user services, Internet operation, routing,
network management, transport, Internet protocol next generation, and security.

Studying the organization of Internet administration lets us study the process which every proposed
specification must undergo before declared as an Internet standard.

Internet Standardization Process

Internet standards are those proposed specifications that are thoroughly tested for their successful
implementation before they gain the status of Internet standard. Let us see the step-by-step
procedure of the formation of Internet standards.

In the figure below we can observe level by level maturity of Internet standard.
A specification or statement or a working document is considered as an Internet draft that has no
official status and has a lifetime of only six months. Upon approval by some Internet authorities, the
Internet draft is published as Request for Comment (RFC). The RFCs are assigned a specific number
and are available online for people interested in the Internet.

Every RFC before gaining the status of standard falls at least into one of the maturity levels below.

Maturity Level

1. Experimental

The published RFC is classified as experimental if it is applicable only in an experimental situation.

2. Informational

The published RFC is classified as informational if it is consists of any kind of information regarding
the Internet. Usually, they put forth by non-Internet organizations such as vendors.

3. Proposed Standard

The RFC specification is classified as a proposed standard if it is well defined and has the work which
seems to be of the Internet community’s interest. The specification here is examined and
implemented by the different groups.

4. Draft Standard

Two successful implementations independent of each other and still interoperable promotes the
proposed standard promote it to draft standard.

5. Internet Standard

Validation of successful implementation of a draft standard elevates it to Internet standard.

6. Historic

The Historic RFC are the specifications that are replaced by the newer specifications or those
specifications that never reached the maturity levels that are required to gain the status of Internet
standard.
The RFC itself can be of five different kinds on the basis of requirement.

Requirement Level

1. Required

The RFC is considered as required if it is mandatory to implement on all Internet systems to check
whether it meets the specified standard. For example, ICMP an IP

2. Recommended

The RFC is considered as recommended if it is useful but is not mandatory to implement it on all
Internet systems to check whether it meets the specified standard. For example, FTP and TELNET

3. Elective

The RFC is considered an elective if it can be used by an Internet system only for its own benefit.

4. Limited Use

The RFC is considered limited if can be used only in a limited situation. The RFC that are classified as
experimental in maturity level is limited RFCs.

5. Not Recommended

The RFC is not meant for general use is not recommended RFC. Historical RFCs fall in this category.

----------------------------------------------------------------

APPLICATION AND BUSINESS SOFTWARE


What is Application Software?
Application software (App) is a kind of software that performs specific functions for the end
user by interacting directly with it. The sole purpose of application software is to aid the user
in doing specified tasks.

Web browsers like Firefox, and Google Chrome, as well as Microsoft Word and Excel, are
examples of application software that is used on a personal computer or laptop. It also
includes smartphone apps such as WhatsApp and Telegram, as well as games such as Candy
Crush Saga and Ludo. There are also app versions of popular services that people rely on
every day, such as weather or transportation information, as well as apps that connect end
users with their businesses.

Functions of Application Software


Application software programs are generally designed and developed to help with a wide
range of tasks. Here are a few examples:

 Software for healthcare applications for seamless connectivity and quick response

 Managing information and data in an organization

 Managing and checking documents across

 Software for educational purposes such as Learning Management Systems and e-


learning systems

 Development of visuals and video for presentation purposes

 Emails, text messaging, audio and video conferencing involved in presentation

 Management of accounting, finance, and payroll helping the HR department and


other businesses

 Enterprise Resource Planning (ERP)

 Customer Relationship Management (CRM)

 Management of any small or large scale project

 Management of smooth and efficient business processes

Examples of Application Software

A variety of explicit application software programs are available to help you manage your
tasks, jot down notes, do online research, set alarms, keep an account log, and even play
games. Application software packages are designed to do certain tasks, ease workflows, and
improve team communication.

The most frequent applications used by millions of people on a daily basis are listed below.

 A collection of Microsoft software including MS Office, PowerPoint, Word,


Excel, and Outlook.

 Common Internet browsers like Google Chrome, Safari, Firefox, etc.


 Graphics and designing software such as Canva, Adobe Photoshop, CorelDraw,
and AutoCAD.

 Real-time online communication tools like Skype, Hangouts, Google Meet, Zoom,
and Whatsapp for video, and audio calls and messages.

 Multimedia and music streaming software such as Wynk, Gaana, MX Player, VLC
Media Player, Spotify, Pandora, etc. are used for entertainment purposes.

 Project management software like Teams, Asana, Zoho, Slack, Forecast, etc for
official purposes.

What to Look For in an Application Software?

Whether you are looking to purchase a new tool or replace an existing one, here are 7 things
to consider. Use these suggestions to assist guide the software purchasing process if you want
your team to feel confident when deciding what software to add to your IT stack.

 How Much Does It Cost and What Is the Value?

Though pricing is vital to any business decision, it shouldn’t be the only element you
consider. If you decide to purchase software only because of its price it might not guarantee
your business the best value. Remember, a software's cost is not always associated with its
value.

 Will You Need Assisted Implementation?

Software models that are highly complex and require a great deal of time to learn and master
will negatively affect the adoption rates. Spend precious time investigating viable software
alternatives so you can make the most effective and useful option for your organization and
team that will save your team and project time and energy.

 Is the Software Firm Willing to Fix Bugs?


Whenever you purchase any new software for your company, you should be well aware of
the software company's regular procedures for fixing bugs. Double-check with the company
whether your company’s issue with the software will be solved whenever it occurs.

 How Often Do They Push Updates?

Make sure to discuss with your software agents how often their product is updated and how
those updates are conveyed to you.

 Is the System Adaptable Enough to Satisfy Your Requirements?

Software that is highly customizable could also be complicated and cumbersome to


implement and also the cost might also rise the more and more you try to customize it
according to your requirements.

 What kind of support do they offer?

Before purchasing, make a note of the support hours for every software agents you are
considering, as the question of support hours should encompass not only the timeframes
during which you can get support, but also how swiftly they can accomplish them. You
should be able to check whether you can get just phone support, or if everything is done by
email or the ticketing system.

 What Level of Security Does the Software Offer?

Always take a careful view of the privacy policy provided by any software you are
considering purchasing. This should therefore summarize everything you need to know
concerning data collection, storage, and usage.

NEED FOR APPLICATION SOFTWARE

End-users can use application software to perform any type of single or many tasks.
Following are a few reasons you would definitely need application software (App) on
your computer:
 Helps the user in completing specific tasks: Any application software should, in
general, be created with the end user in mind. They will primarily benefit the end-
user by assisting them in doing specialized activities in a range of industries,
including education, business, and entertainment. Microsoft Word, for example, is
a commonly used application software that allows users to create, edit, delete, and
perform other actions on word documents.

 Manages and manipulates data: Application software is used in businesses to


manage and alter employee, customer, and other databases. An enterprise resource
management system or a customer relationship management system are two
common examples of application software.

 Allows users to effectively organize information: Data can be created and handled
efficiently by individual users using application software. For example, Microsoft
Excel is a very popular application software amongst companies that allows users
to manage datasheets.

Types of Application Software

Application software can also be classified depending on how much it costs and how easily it
can be accessed. Here are some examples of application software:

1. Word Processing Software

Word Processing refers to the act of using a personal computer (PC) or laptop to create, edit,
save and print documents which can be performed only with specialized software known as a
Word Processor. One example of a Word Processor is Microsoft Word which is widely used
by all professionals.

2. Spreadsheet Software

Spreadsheet software is a type of computer program that enables a user to perform numerical
functions and explore numbers through an automated version of an accounting worksheet.
Best example of spreadsheet software is Microsoft Excel.
3. Presentation Software

Presentation software also commonly known as presentation graphics is a particular category


of application program used to construct sequences of words and a series of pictures that tell
a story or help support a speech or public presentation of any type of information or a launch
of new products or services.

4. Multimedia Software

Multimedia software can be described as the combination of text, audio, images, animation,
or video to produce a wide scope of interactive content for both professional and personal
use. You can easily learn about media players, file formats, and how to operate audio and
video software on the whole.

5. Web Browsers

A web browser can take you all over the internet. It retrieves data from other parts of the web
and shows it on your desktop or mobile device for your viewing. The data is transmitted
using the Hypertext Transfer Protocol, which describes how text, images, and video are
shared on the World Wide Web.

6. Educational Software

Educational software refers to any computer software designed solely for educational
reasons. It includes a wide range of software, including language learning software,
classroom management software (CMS), and reference software for students and other
professionals.

7. Graphics Software

Graphics software can rework with bitmap and/or vector graphics and can be utilized to
create label templates. Graphics software generally includes Canva, Adobe Illustrator,
Photoshop, InDesign, CorelDraw, Inkscape, Microsoft Paint, and Paint.Net.

8. Freeware
Freeware is typically marketed for profit but might be allocated specifically for a business or
commercial purpose with the aim to expand the market share of any newly launched premium
product. Some of the widespread examples of closed-source freeware include Adobe Reader,
Free Studio, and Skype.

9. Shareware

Shareware is software that is supplied for free on a trial basis in order for the user to test or
use the programme for a specific amount of days with the understanding that the user may
need or want to pay for it later if they are satisfied with the product usage. Some software
manufacturers provide a shareware edition of their product with an expiration date built in,
such that after 30 days, the user or customer will no longer be able to access the application
for further use.

10. Simulation Software

Simulation software authorizes engineers to evaluate, optimize, and compare product designs
with other similar software by modeling real-world events in a computer-generated
environment.

11. Open Source

Open source software is a specific code designed to be publicly accessible so that anyone can
see, modify, and distribute the code as they see which fits the purpose. It is designed in a
decentralized and coordinated way, depending on peer assessment and community
production.

12. Closed Source

Closed source software is where the source code is not freely accessible. It is developed and
delivered to the customer as a fully compiled, executable set of files. The developer often
provides aid to users after purchase and ensures that the software works as foreseen by the
creator.
Advantages of Application Software

 It meets every client’s particular requirements and needs. The client usually
recognizes that they must utilize only one explicit program to finish the task
because it is designed explicitly for one reason.

 Businesses that are related to specific applications can restrict access and think
about strategies to monitor their activities.

 Standard updates from engineers for Licensed application programming can be


obtained using general logic of health.

Disadvantages of Application Software

 Developing and evolving any application software to achieve specific goals can be
quite pricey for developers but this can have a strong impact on their financial plan
and income stream, particularly if an unreasonable high amount of time is spent on
a product that is not normally worthy.

 Application software that is widely used by many of us and then disseminated on


the internet is inherently vulnerable to infection by a bug or other malicious
initiatives.

Difference Between System Software and Application


Software

The Windows operating system is an excellent example of system software, whereas


Microsoft Office, Photoshop, and CorelDraw are well-known examples of application
software.
System Software Application Software

 The main purpose of this software


is to manage the resources
 Application software designed to achieve a
available in the system. It serves
certain set of tasks.
as an effective forum for the
execution of application software

 System software is documented


 Application software is composed in a
in a low-level programming
high-level language like Java, C++,.Net,
language like machine code or
or PHP.
assembly language.

 Usually, when the computer is


switched on, system software  When a user requests, application software
begins to run and stops when the runs according to the task it is assigned.
computer is switched off.

 Without system software, a


 User-specific application software is
computer system cannot even
definitely not required to run the system.
activate.

 The system software has a wide  The objective of the application software is
scope of capabilities. to achieve or perform a certain task.
 System software comprises
 Payroll software, accounting software, MS
language processors (interpreters,
Office, and so on are perfect examples of
compilers, and assemblers),
an application software.
operating systems, and so on.

WHAT IS BUSINESS APPLICATION SOFTWARE?


Companies employ business application software because it helps in making business decisions,
improves collaboration among stakeholders, and fosters overall business health. So in this article, we
shall discuss the significance of said software in dealing with day-to-day business operations. We will
also cite certain examples for each software type.

Business application software is designed to automate and streamline business processes, while also
enhancing work efficiency and productivity. Also, to ensure system security, developers utilize various
security measures.
COMMON EXAMPLES OF BUSINESS SOFTWARE
INCLUDE:
 PROJECT MANAGEMENT SOFTWARE;
 TIME MANAGEMENT SOFTWARE;
 HUMAN RESOURCE MANAGEMENT;
 COMMUNICATION TOOLS; AND
 CUSTOMER RELATIONSHIP MANAGEMENT TOOLS.
RESPONSE TO USER CONCERNS ON BUSINESS
APPLICATION SOFTWARE
BUSINESS APPLICATION SOFTWARE DEALS WITH
BUSINESS RECORDS AND CUSTOMER INFORMATION.
THUS, SOME MAY BE CONCERNED ABOUT CERTAIN
CYBERSECURITY THREATS FROM MALICIOUS
ATTACKERS.
AS A RESULT, SOFTWARE DEVELOPERS WORK HARD
TO ENSURE THEIR SYSTEMS AND PROGRAMS’
SECURITY. SO, THEY EMPLOY CERTAIN SECURITY
MEASURES SUCH AS THE FOLLOWING:
 DATA ENCRYPTION;
 IMPLEMENTATION OF USER ACCESS LEVELS; AND
 USER LOGIN NOTIFICATIONS.
ADDITIONALLY, SOME USERS TEND TO SHY AWAY
FROM IMPLEMENTING SOFTWARE INTO THEIR WORK
OPERATIONS BECAUSE OF THE FEAR THAT THESE
WILL TAKE AWAY THEIR JOBS. HOWEVER,
IMPLEMENTING THESE TYPES OF SOFTWARE WILL
NOT ELIMINATE THEIR EMPLOYMENT.
INSTEAD, IT’LL PUT USERS ON A HIGHER LEVEL
WHERE THEY WILL BE ACCOMPLISHING HIGHER-
LEVEL DELIVERABLES. ALSO, IT ALLOWS THEM TO
MAXIMIZE THEIR TIME AND FOCUS ON MORE
COMPLEX TASKS.

WHAT ARE COMMON EXAMPLES OF BUSINESS


APPLICATION SOFTWARE?
THERE ARE MANY BUSINESS APPLICATIONS
COMMONLY USED BY INDIVIDUALS, COMPANIES, AND
ORGANIZATIONS IN THE WORLD TODAY. AS A RESULT,
THESE BUSINESS APPS CATER TO VARIOUS
INDUSTRIES AND THEIR NEEDS. FOR INSTANCE,
CERTAIN INDUSTRIES OR BUSINESSES HAVE UNIQUE
OR PARTICULAR WORKFLOWS OR REQUIREMENTS,
MEANING THAT SOME APPLICATIONS SHOULD BE
TAILORED TO THOSE NEEDS.
AFTER ALL, EVERY APPLICATION HAS A DISTINCT
PURPOSE AND AIDS IN MAKING BUSINESSES RUN
MORE EFFICIENTLY AND EFFECTIVELY. SO, HERE ARE
SOME TYPES OF BUSINESS APPS THAT ARE CRUCIAL
TO COMPANIES OR BUSINESSES:
PROJECT MANAGEMENT SOFTWARE
THIS BUSINESS APPLICATION SOFTWARE HELPS IN
THE PLANNING AND IMPLEMENTATION OF PROJECTS.
ALSO, YOU CAN USE THIS TYPE OF SOFTWARE TO
MANAGE RESOURCES FOR SAID PROJECTS.
ADDITIONALLY, THEY HELP SCHEDULE AND ASSIGN
TASKS, MANAGE BUDGETS AND COSTS, DOCUMENT
PROGRESS, AND REPORT RESULTS.
SMALL TEAMS AND LARGE ENTERPRISES USE THIS
TOOL TO ENHANCE PROJECT EFFICIENCY AND
SUCCESS. BECAUSE IT SIMPLIFIES PLANNING,
ORGANIZING, AND MANAGING PROJECTS, IT OFFERS
THE FOLLOWING FEATURES:
 TASK MANAGEMENT;
 GANTT CHARTS;
 RESOURCE ALLOCATION;
 COLLABORATION;
 TIME TRACKING;
 BUDGETING AND COST MANAGEMENT;
 DOCUMENT SHARING;
 RISK MANAGEMENT;
 REPORTING OR ANALYTICS; AND
 INTEGRATIONS.
EXAMPLES OF SUCH SOFTWARE INCLUDE BASECAMP,
ASANA, AND SLACK.
BUSINESS PROCESS MANAGEMENT SOFTWARE
BUSINESS PROCESS MANAGEMENT APPLICATIONS
(USUALLY OPTIMIZED FOR MOBILE DEVICES) THAT
FACILITATE RAPID DEVELOPMENT, AUTOMATION,
AND STREAMLINING OF STRATEGIC BUSINESS
PROCESSES. ADDITIONALLY, THIS TYPE OF APP OR
SOFTWARE CAN MONITOR PROGRESS AND IDENTIFY
AREAS FOR IMPROVEMENT.

ALSO, IT OFFERS TOTAL VISIBILITY INTO A


COMPANY’S OPERATIONS AND HELPS MANAGE AND
ANALYZE COMPLEX BUSINESS DATA, CONTENT, AND
PROCESSES. THUS, IT HELPS BUSINESSES INCREASE
PRODUCTIVITY AND ENHANCE CUSTOMER
SATISFACTION BY MAKING DATA-DRIVEN DECISIONS
AND OPTIMIZING OPERATIONS.
AS A RESULT, THIS TYPE OF SOFTWARE STREAMLINES
BUSINESS PROCESSES THROUGH THE FOLLOWING
ASPECTS:
 BUSINESS PROCESS MODELING AND DESIGN;
 PROCESS AUTOMATION;
 PROCESS SIMULATION;
 MONITORING AND CONTROL;
 PROCESS OPTIMIZATION;
 INTEGRATION AND COLLABORATION;
 REPORTING OR ANALYTICS;
 WORKFLOW MANAGEMENT;
 FLEXIBILITY;
 SCALABILITY; AND
 COMPLIANCE.
FOR INSTANCE, WE HAVE BUSINESS PROCESS
MANAGEMENT TOOLS LIKE MONDAY, SAAS BPM, AND
WRIKE.
COMMUNICATIONS SOFTWARE
COMMUNICATIONS SOFTWARE ENABLES DIGITAL
COMMUNICATION AND COLLABORATION THROUGH
TOOLS LIKE THE FOLLOWING:
 INSTANT MESSAGING OR IM APPLICATIONS;
 MOBILE MESSAGING APPS;
 VOICE AND VIDEO CALLING APPS;
 VOIP OR VOICE OVER INTERNET PROTOCOL
SOFTWARE OR APPS;
 UNIFIED COMMUNICATIONS OR UC SYSTEMS;
 WEB CONFERENCING APPLICATIONS OR TOOLS;
 EMAIL CLIENTS;
 REMOTE COLLABORATION PLATFORMS OR
SOFTWARE; AND
 SOCIAL MEDIA PLATFORMS.

THIS SOFTWARE TYPE AIDS COMPANIES AND


ORGANIZATIONS TO GROW VIA ITS TOOLS PROTOCOLS
FOR INTERNAL AND EXTERNAL
COMMUNICATION. FOR INSTANCE, COMMUNICATION
APPS THAT CONNECT PEOPLE AND BUSINESSES
BEYOND PHYSICAL BOUNDARIES ARE ZOOM,
HOOTSUITE, BUFFER, ETC.
ENTERPRISE RESOURCE PLANNING SOFTWARE
ENTERPRISE RESOURCE PLANNING OR ERP
SOFTWARE INTEGRATES VARIOUS BUSINESS
PROCESSES INTO A UNIFIED PLATFORM. SO, THESE
ARE BUSINESS APPLICATIONS THAT SOLICIT, REVIEW,
AND ANALYZE DATA FROM VARIOUS WORK
OPERATIONS.
AS A RESULT, IMPLEMENTING AN ENTERPRISE
RESOURCE PLANNING SYSTEM OFFERS NUMEROUS
BENEFITS, INCLUDING IMPROVED EFFICIENCY, DATA
VISIBILITY, COLLABORATION, AND AGILITY. THE APP
IS CHARACTERIZED BY THE FOLLOWING:
 BUSINESS PROCESS INTEGRATION;
 A CENTRALIZED DATABASE;
 REAL-TIME ACCESS TO INFORMATION;
 AUTOMATION;
 STANDARDIZED PROCESSES;
 CUSTOMIZATION;
 SCALABILITY;
 REPORTING OR ANALYTICS;
 SUPPLY CHAIN MANAGEMENT;
 FINANCES MANAGEMENT;
 HUMAN RESOURCES MANAGEMENT; AND
 CUSTOMER RELATIONSHIP MANAGEMENT.
LASTLY, WE HAVE ORACLE, ACUMATICA, AND
BIZAUTOMATION AS EXAMPLES OF THIS APPLICATION
TYPE.
RESOURCE MANAGEMENT SOFTWARE
THIS SOFTWARE TYPE HELPS APPROPRIATELY
FACILITATE PROJECT RESOURCE MANAGEMENT IN
REAL TIME. IN PARTICULAR, RESOURCE
MANAGEMENT SOFTWARE IS DESIGNED TO HELP
BUSINESSES PLAN, ALLOCATE, AND UTILIZE THEIR
RESOURCES.
HERE ARE ITS KEY ASPECTS:
 RESOURCE USAGE PLANNING;
 RESOURCE OPTIMIZATION;
 ALLOCATION;
 SCHEDULING;
 CAPACITY PLANNING;
 TEAM COLLABORATION;
 TRACKING AND MONITORING;
 PROJECT MANAGEMENT INTEGRATION;
 FINANCIAL INSIGHTS; AND
 REPORTING OR ANALYTICS.
THUS, THIS SOFTWARE IS VALUABLE FOR BUSINESSES
OF ALL SIZES AND INDUSTRIES, LEADING TO
INCREASED PRODUCTIVITY, REDUCED COSTS, AND
IMPROVED PROJECT OUTCOMES. ONLINE INVENTORY
SYSTEMS ARE AN EXCELLENT EXAMPLE OF RESOURCE
MANAGEMENT SOFTWARE.
USE THE FIFO INVENTORY SYSTEM TO TRACK YOUR
RESOURCES TODAY!
PRODUCTIVITY SOFTWARE
PRODUCTIVITY SOFTWARE CAN HELP SIMPLIFY TASKS
AND INCREASE EFFICIENCY, ESPECIALLY IN
PROFESSIONAL SETTINGS. SO THIS TYPE OF BUSINESS
APPLICATION SOFTWARE INCLUDES TOOLS FOR
CREATING, MANAGING, AND COLLABORATING ON
VARIOUS TYPES OF CONTENT. YOU’LL OFTEN SEE
THE FOLLOWING:
 WORD PROCESSING SOFTWARE;
 SPREADSHEET APPLICATIONS;
 NOTE-TAKING SOFTWARE OR APPS;
 NOTEBOOK AND ORGANIZER SOFTWARE;
 FILE OR DOCUMENT MANAGEMENT SOFTWARE;
 PRESENTATION SOFTWARE OR TOOLS;
 TASK AND PROJECT MANAGEMENT TOOLS;
 COLLABORATION PLATFORMS;
 PASSWORD MANAGERS;
 EMAIL CLIENTS;
 CALENDAR AND TIME MANAGEMENT APPS; AND
 MIND MAPPING SOFTWARE OR TOOLS.

OVERALL, THIS SOFTWARE ASSISTS WITH THE


CREATION OF DOCUMENTS, MANAGEMENT OF
DATABASES, COLLABORATION, AND ACCOUNTING. SO
COMMON EXAMPLES OF THIS SOFTWARE TYPE
INCLUDE TRELLO, FLOCK, AND MEISTERTASK.
SALES AND MARKETING SOFTWARE
SALES AND MARKETING SOFTWARE HELPS
BUSINESSES MANAGE CUSTOMER RELATIONSHIPS,
AUTOMATE MARKETING CAMPAIGNS, AND ANALYZE
PERFORMANCE. AFTER ALL, EFFICIENCY AND
PROFITABILITY IN SALES AND MARKETING ARE VITAL
FOR BUSINESS ORGANIZATIONS.
IN PARTICULAR, IT SIGNIFICANTLY BENEFITS DIGITAL
MARKETERS WITH THEIR WORK. AS A RESULT, SALES
AND MARKETING SOFTWARE STREAMLINE PROCESSES
AND ENHANCE SALES EFFORTS, IMPROVING
CUSTOMER ENGAGEMENT AND DRIVING BUSINESS
GROWTH.
NEED EXPERT SOCIAL MEDIA MARKETING SERVICES?
CONTACT US NOW!
SO, HERE ARE COMMON APPS THAT FALL UNDER
SALES AND MARKETING SOFTWARE:
 CRM SOFTWARE;
 SALES AUTOMATION SOFTWARE OR TOOLS;
 MARKETING AUTOMATION SOFTWARE;
 EMAIL MARKETING SOFTWARE;
 SOCIAL MEDIA MANAGEMENT TOOLS;
 CONTENT MANAGEMENT SYSTEMS OR CMS;
 MARKETING ANALYTICS AND REPORTING
SOFTWARE;
 LEAD GENERATION SOFTWARE;
 SALES ENABLEMENT SOFTWARE; AND
 CUSTOMER SUPPORT AND HELPDESK SOFTWARE,
CONSEQUENTLY, THE FOLLOWING SALES AND
MARKETING SOFTWARE CAN HELP BUSINESSES:
SALESFORCE CRM, MARKETO, GOOGLE ANALYTICS,
HUBSPOT CRM, ETC.
HUMAN RESOURCE SOFTWARE
HUMAN RESOURCE SOFTWARE STREAMLINES AND
OPTIMIZES HR-RELATED PROCESSES. AS A RESULT,
THIS BUSINESS APPLICATION SOFTWARE HELPS
MANAGE EMPLOYEES. ALSO, IT HELPS BUSINESSES
MAINTAIN A HAPPY AND PRODUCTIVE WORKFORCE.
AFTER ALL, HR SOFTWARE REDUCES ERRORS,
IMPROVES EFFICIENCY, AND ENHANCES EMPLOYEE
EXPERIENCE. MEANWHILE, HR PROFESSIONALS CAN
FOCUS ON STRATEGIC INITIATIVES AND TALENT
MANAGEMENT. HUMAN RESOURCE SOFTWARE IS
WIDELY USED ACROSS BUSINESSES OF ALL SIZES TO
MANAGE THEIR WORKFORCE EFFECTIVELY.
THUS, IT PROVIDES A CENTRALIZED PLATFORM TO
MANAGE HR FUNCTIONS, AUTOMATE TASKS, AND
ENHANCE WORKFORCE MANAGEMENT. HERE ARE
SOME KEY TYPES OF HUMAN RESOURCE SOFTWARE:
 EMPLOYEE INFORMATION DATABASE;
 RECRUITMENT AND APPLICANT TRACKING
TOOLS;
 TIME AND ATTENDANCE MANAGEMENT
SOFTWARE;
 PERFORMANCE MANAGEMENT SOFTWARE;
 PAYROLL MANAGEMENT SYSTEM;
 BENEFITS MANAGEMENT SYSTEM; AND
 EMPLOYEE SELF-SERVICE OR ESS APPLICATION.
LASTLY, STANDARD HR SOFTWARE INCLUDES HUMAN
RESOURCE INFORMATION SYSTEMS (HRIS),
BAMBOOHR, AND GUSTO HR.
TIME MANAGEMENT SOFTWARE
TIME MANAGEMENT SOFTWARE HELPS INDIVIDUALS
AND TEAMS MANAGE THEIR TIME EFFICIENTLY BY
ORGANIZING TASKS, SETTING PRIORITIES, AND
TRACKING PROGRESS. SO, THIS TYPE OF SOFTWARE
ALLOWS THE EASY TRACKING OF AN INDIVIDUAL’S
USE OF DIGITAL SYSTEMS. IN ADDITION, IT KEEPS
TABS ON HOW MUCH TIME THEY SPEND WORKING ON
PARTICULAR APPLICATIONS.

SOURCE: FINANCESONLINE.
THIS SOFTWARE IMPROVES PERSONAL PRODUCTIVITY
AND ENHANCES OVERALL EFFICIENCY FOR TEAMS
AND BUSINESSES. FOR EXAMPLE, HERE ARE SOME
KEY EXAMPLES OF TIME MANAGEMENT SOFTWARE:
 TASK AND PROJECT MANAGEMENT TOOLS;
 TO-DO LISTS AND REMINDERS TOOLS;
 TIME TRACKING OR MANAGEMENT SOFTWARE;
 CALENDAR INTEGRATIONS;
 GOAL SETTING AND PROGRESS TRACKING
SOFTWARE;
 DISTRACTION-BLOCKING OR MANAGEMENT
TOOLS;
 TIME ANALYSIS AND REPORTS SOFTWARE;
 COLLABORATION AND SHARING TOOLS; AND
 MOBILE APPS.
SOFTWARE SUCH AS TICK, TIMELY, AND TOGGL HELP
OPTIMIZE USERS’ TIME, INCREASING PRODUCTIVITY.
CUSTOMER RELATIONSHIP MANAGEMENT
CRM SOFTWARE CAN HELP BUSINESSES MANAGE
CUSTOMER INTERACTIONS AND RELATIONSHIPS
MORE EFFECTIVELY. AFTER ALL, THROUGH THIS
TYPE OF BUSINESS APPLICATION SOFTWARE, YOU
CAN MANAGE YOUR CLIENTS’ QUERIES, REQUESTS,
AND ISSUES REPORTED. YOU CAN ALSO ANALYZE
CUSTOMER DATA WHILE MANAGING CUSTOMER
INTERACTION AND FACILITATING SALES AND
PARTNER RELATIONSHIPS.
SO BY ORGANIZING AND CENTRALIZING CUSTOMER
DATA, TRACKING INTERACTIONS, AND IMPROVING
ENGAGEMENT, CRM ENHANCES CUSTOMER
SATISFACTION, LOYALTY, AND RETENTION. LASTLY,
PRIORITIZING CRM CAN LEAD TO PERSONALIZED
INTERACTIONS, EXCEPTIONAL EXPERIENCES, AND
BUSINESS GROWTH.
HERE’S WHAT YOU CAN FIND UNDER THE CRM
SOFTWARE TYPE:
 CENTRALIZED CUSTOMER DATABASE;
 CUSTOMER INTERACTION TRACKING SYSTEMS;
 LEAD AND OPPORTUNITY MANAGEMENT TOOLS;
 SALES AUTOMATION FEATURES;
 MARKETING AUTOMATION FEATURES;
 CUSTOMER SUPPORT AND SERVICE
MANAGEMENT SYSTEMS;
 CUSTOMER ANALYTICS AND INSIGHTS SYSTEMS;
AND
 WORKFLOW AUTOMATION FEATURES.
FINALLY, EXAMPLES OF THIS TYPE OF SOFTWARE
INCLUDE INTERCOM, MAILCHIMP, ACTIVE CAMPAIGN,
AND THE LIKE.
ACHIEVE MAXIMUM WORK EFFICIENCY WITH THE
IDEAL APPS!
TO CONCLUDE, THE ULTIMATE GOAL OF BUSINESS
APPLICATION SOFTWARE IS TO HELP INDIVIDUALS,
COMPANIES, AND ORGANIZATIONS AUTOMATE AND
STREAMLINE BUSINESS PROCESSES.

THIS SOFTWARE CAN HELP MAKE CALCULATED AND


EVIDENCE-BASED DECISIONS AND ENHANCE
COLLABORATIVE WORK. MOST IMPORTANTLY, IT CAN
FOSTER OVERALL BUSINESS HEALTH BY ACHIEVING
MAXIMUM WORK EFFICIENCY AND PRODUCTIVITY.

SOCIAL MEDIA WEBSITES

What Is Social Media?

Social media refers to a variety of technologies that facilitate the sharing of ideas and information
among their users. From Facebook and Instagram to X platform (formerly Twitter) and YouTube,
more than 4.7 billion people use social media, equal to roughly 60% of the world's population.1 In
early 2023, 94.8% of users accessed chat and messaging apps and websites, followed closely by
social platforms, with 94.6% of users.2

How Social Media Originated and Evolved

Social media started out as a way for people to interact with friends and family but soon expanded
to serve many different purposes. In 2004, MySpace was the first network to reach 1 million monthly
active users.3

Social media participation exploded in the years that followed with the entry of Facebook and
Twitter (now X platform). Businesses gravitated toward these platforms in order to reach an
audience instantly on a global scale.

According to Global Web Index, 46% of internet users worldwide get their news through social
media. That compares to 40% of users who view news on news websites. Gen Z and Millennials were
most likely to view news on social sites versus other generations.2

Social media plays a key role in many businesses' marketing strategies, not surprising given the sheer
number of hours people spend each day on social websites and apps. At the same time, social media
is an ever-changing field, with relatively recent apps such as TikTok, Signal, and Clubhouse joining
the ranks of established social networks like Facebook, YouTube, X platform, and Instagram.

What Social Media Is Used for Today

Social media platforms are often divided into six categories: social networking, social bookmarking,
social news, media sharing, microblogging, and online forums.

These diverse platforms serve a vast range of purposes and user interests. Some appeal to hobbyists,
others to people in their work lives. People use them to find others across the globe who share their
political or other views. Entertainers use social media to engage with fans, politicians with voters,
charities with donors. Governments often turn to social media to convey vital information during
emergencies.

For businesses, social media has become a key marketing tool. Companies use it to find and engage
with customers, drive sales through advertising and promotion, identify fast-moving consumer
trends, provide customer service or support, and collect data on users, sometimes surreptitiously.

94.6%

Percentage of internet users age 16 to 64 who visited a social networking site in the past month.1

Pros and Cons of Social Media

Social media platforms allow people to access information in real time, to connect with others, and
to find niche communities. At its best, it makes the world more interconnected.

On the other hand, social media is also very good at spreading disinformation, creating polarization,
and even causing harmful psychological effects.

Still, according to a 2019 survey by Pew Research Center, people's use of social media is correlated
with having more friends and more diverse personal networks, especially within emerging
economies.4 Some 80% of teenagers say social media allows them to feel more connected to their
peers, according to a 2022 Pew Research Center survey of U.S. teens ages 13 to 17. Overall, one in
three said that social media has had a mostly positive effect on them, while 59% said it had neither a
positive nor a negative effect.5

At the same time, many teens' use, and overuse, of social media has raised questions about its effect
on their physical and mental health by "distracting them, disrupting their sleep, and exposing them
to bullying, rumor spreading, unrealistic views of other people's lives, and peer pressure," as the
Mayo Clinic notes.6

Businesses, meanwhile, have found social media to be an often effective and relatively inexpensive
way to reach consumers and build an image for their brands. According to Facebook, more than 200
million small businesses use its service for various purposes.7 Separately, close to 90% of marketers
say they use Facebook for promotion.8

In 2022, social media and search advertising spending made up roughly 55% of overall ad spending
globally. It is also the fastest-growing category across advertising channels.9

The Top 10 Social Media Platforms Worldwide

These were the most widely used social media providers as of January 2023, according to
DataReportal:

1. Facebook (2.96 billion users)

2. YouTube (2.51 billion users)

3. WhatsApp (2 billion users)

4. Instagram (2 billion users)

5. WeChat (1.31 billion users)

6. TikTok (1.05 billion users)

7. Facebook Messenger (931 million users)

8. Douyin (715 million users)

9. Telegram (700 million users)

10. Snapchat (635 million users)

Interestingly, two that are especially well-known in the U.S.—X platform and Pinterest—didn't make
the top 10 list globally. X platform was 14th, with 556 million users worldwide, while Pinterest was
15th with 445 million.

INFORMATION SYSTEMS

What is information systems?

Information systems encompasses the tools that organizations use to collect, manage, and analyze
data. This data guides decision-making to improve efficiency and profitability.
Every decision an organization makes should be data-driven, so the uses of information systems are
practically limitless—human resource management, financial account management, customer
outreach and advertising, competitive landscape analysis, you name it.

Information systems examples

Information systems can improve nearly any business operation, but here are a few valuable ways
you can put them to work.

 Expert systems: AI is becoming more advanced every day, and it's leveraged in information
systems to simulate human problem-solving (think Siri!). Expert systems use knowledge that
would otherwise need to be provided by a subject matter expert to tackle problems and
make decisions. In a business context, it can solve accounting problems or identify malware.

 Office automation systems: Automation saves countless hours that would otherwise be
spent doing simple tasks. Office automation systems combine computer and communication
technology with human resources to enact more efficient procedures. For example, a COO
may schedule monthly company-wide email updates that include AI-generated reports on
the company's status.

 Process control systems: If you're looking for a way to apply information systems to product
manufacturing, process control systems are your solution. They rely on inputs from sensors
to generate specific outputs and are frequently used to ensure a product meets specific
criteria. A simple example is a thermostat—when the temperature dips below a certain
level, the heat turns on. If you produce a physical product that's regularly criticized by
customers, you may want to tweak your process controls.

5 components of information systems


So what goes into information systems? Nearly everything you need for a functional modern office:
hardware, software, data, communication, and people. Virtually every information system includes
these components in some capacity.

Hardware

Computers are the physical hardware that make up information systems. Nowadays, this doesn't just
mean your cubicle's desktop or laptop computer—we have computers at our fingertips much of the
time we aren't typing away at our keyboards. Smartphones, tablets, and even smart watches all have
the power to collect, store, access, and manage huge amounts of data.

You can break hardware down by its components as well: hard drives for storage, microprocessors
for processing power, graphics cards for generating graphics, monitors for displaying them, and so
on.

Software

Computers are just shiny black mirrors without the programs running behind the scenes telling the
hardware what to do. Software can be broken down into two types:

 System software, which allows you to manage the computer's files and overall interface
(think operating systems like Windows 10).

 Application software, the programs that take care of specific tasks (think Google Sheets and
Microsoft Outlook). System software creates a starting point from which application
software can build.

Software can either be open-source or closed-source. Open-source software invites collaboration—


users can modify its code to change how it operates. Closed-source software is proprietary, meaning
the owner restricts the user's ability to modify it.

Data sources

Data puts the "information" in information systems. Databases and data warehouses store the
qualitative and quantitative information (data) that users and software then retrieve, analyze, and
manipulate.

Databases hold the information that the user regularly retrieves to complete essential operations,
like saving a file's contents and accessing them. Data warehouses, on the other hand, store data
collected from multiple sources over time to be analyzed and used to inform decisions. For example,
a data warehouse could include customer data consolidated from your point-of-sale system, mailing
list, and cookies.

Telecommunications

Telecommunications is how computers share information with each other. The first thing that may
come to mind is the internet, and you're correct. But telecommunications can be broken down
further.

Some connections are physical: coaxial and fiber-optic cables are physical wires used by telephone,
internet, and cable providers to carry data. Others are wireless: think networks like local area
networks (LANs) and wide area networks (WANs). Microwaves and radio waves are also invisible
channels that transmit data across devices.
Telecommunications makes it possible to access data via the cloud—without these systems in place,
all data would have to be stored on one device.

Human resources

Automation is replacing a lot of tedious tasks with robots, but we haven't quite reached a
Westworld-esque android takeover. Human experts capable of understanding and manipulating
data are essential to any information systems strategy.

For example, business analysts use data to develop strategies for improving a business's operations
—think efficiency and resource allocation. Likewise, information security analysts look out for
security vulnerabilities to reduce the likelihood of cyberattacks.

Of course, analysts don't have to do all of this work by hand—they can rely on
other technologies like business intelligence to assist with the process of using data to make
concrete strategic decisions.

How to build an information system strategy

Curating a cohesive information system strategy can't be done with the click of a mouse—it takes
time and effort.

1. Determine your business's objectives and information needs

You should build your strategy around your goals. When in doubt, turn to your KPIs. Which
benchmarks are you failing to hit? For example, maybe you actively market yourself as a customer-
friendly solution, but a survey shows customer satisfaction falling 20% below your benchmark.

Once you identify an objective like this, evaluate what information you need. Have you been
collecting customer data in a database or data warehouse? If so, do you have enough to develop
a customer retention and satisfaction strategy? If not, it's time to start from scratch and begin
actively collecting customer data.

2. Plan how you'll improve your existing system

There's a good chance you already have some information systems infrastructure in place—you just
need to refine it. For example, you may have plenty of customer data in a data warehouse but lack
customer relationship management (CRM) software.

This presents an opportunity to select and customize CRM software based on existing data. When
deciding how to improve your system, remember to always keep budget and other resources in
mind. Not all plans are affordable.

3. Design and implement your new system

During this phase, you'll create a list of specifications and requirements that your system will have to
meet, which will vary depending on your company's needs. For example, you may consider the
following questions:

 How will you collect, consolidate, and access data?

 What software do you need, and how will you customize it?

 Should hardware be updated to accommodate new software?

 How will your applications integrate?


 What parts of your system will be automated vs. managed by human resources?

 Who will head your information systems? The CIO, CTO, or another role?

Your team should then build the functions that will bring your system to life. Once you've designed
everything, it's time to purchase and install your new mechanisms. This process can be expensive
and time-consuming—after all, you're supplanting your entire organization's status quo. Be sure to
test that the system is functioning as planned before rolling it out across your organization.

As you implement your updated system, remember to document every change and keep these
records secure. Your developers should also spend plenty of time learning about the needs of the
users who will be using the system most. Otherwise, their time may be wasted creating functions
that aren't helpful.

Why your organization needs information systems

Information systems is the backbone of data-driven decision-making. It allows organizations to make


sense of huge quantities of data and use that information to identify and correct procedural issues.
Without it, your organization would remain trapped in the same old inefficiencies that hold it back.

For example, by improving its information systems strategy, an organization can centralize its
information resources, minimizing confusion and turning a scattered office into a well-oiled machine.
This makes both your employees and your customers happier.

FUNDAMENTALS OF ARTIFICIAL INTELLIGENCE.

The fundamentals of artificial intelligence (AI) encompass various key concepts and principles. Here
are some fundamental aspects of AI:

1. Machine Learning: Machine learning is a subset of AI that focuses on enabling machines to learn
from data and improve their performance without being explicitly programmed. It involves
algorithms that allow systems to automatically learn and make predictions or decisions based on
patterns and examples.

2. Neural Networks: Neural networks are computational models inspired by the human brain's
structure and function. They consist of interconnected nodes (neurons) that process and transmit
information. Neural networks are widely used in deep learning, a subfield of machine learning, to
solve complex problems such as image recognition and natural language processing.

3. Natural Language Processing (NLP): NLP is a branch of AI that deals with the interaction between
computers and human language. It involves tasks such as speech recognition, language translation,
sentiment analysis, and text generation. NLP enables machines to understand, interpret, and
generate human language.
4. Computer Vision: Computer vision focuses on enabling machines to understand and interpret
visual information from images or videos. It involves tasks such as object recognition, image
classification, and image segmentation. Computer vision algorithms use techniques like feature
extraction, pattern recognition, and deep learning to analyze visual data.

5. Robotics: Robotics combines AI with mechanical engineering to create intelligent machines


capable of performing physical tasks. AI-powered robots can perceive their environment, make
decisions, and interact with humans or other objects. Robotics involves areas such as autonomous
vehicles, industrial automation, and social robots.

6. Ethics and Bias: As AI becomes more prevalent, ethical considerations are crucial. It is important
to ensure that AI systems are developed and used responsibly, addressing issues like privacy,
fairness, transparency, and accountability. Efforts are being made to mitigate biases in AI algorithms
to avoid perpetuating discrimination or unfairness.

These are just a few fundamental aspects of AI, and the field continues to evolve rapidly with
ongoing research and advancements.

TELECOMMUNICATIONS:
What is telecommunications (telecom)?

Telecommunications, also known as telecom, is the exchange of information over significant


distances by electronic means and refers to all types of voice, data and video transmission. This is a
broad term that includes a wide range of information-transmitting technologies and communications
infrastructures. Examples include wired phones, cellphones, microwave communications, fiber
optics, satellites, radio and television broadcasting, the internet and telegraphs.

A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station might be combined into a
single device called a transceiver. The medium of signal transmission can be via electrical wire or
cable -- also known as copper -- optical fiber, electromagnetic fields or light. The free space
transmission and reception of data by means of electromagnetic fields is
called wireless communications.

Types of telecommunications networks

The simplest form of telecommunications takes place between two stations, but it is common for
multiple transmitting and receiving stations to exchange data among themselves. Such an
arrangement is called a telecom network. The internet is the largest example of a
telecommunications network. On a smaller scale, examples include the following:

 Corporate and academic wide area networks (WANs).

 Telephone networks.
 Cellular networks.

 Police and fire communications systems.

 Taxi dispatch networks.

 Groups of amateur (ham) radio operators.

 Broadcast networks.

Data is transmitted in a telecommunications circuit by means of an electrical signal called


the carrier or the carrier wave. In order for a carrier to convey information, some form
of modulation is required. The mode of modulation can be categorized broadly as analog or digital.

In analog modulation, some aspect of the carrier is varied in a continuous fashion. The oldest form of
analog modulation is amplitude modulation (AM), which is still used in radio broadcasting at some
frequencies. Digital modulation predates AM; the earliest form was Morse code. Modern
telecommunications use internet protocols to carry data across underlying physical transmissions.

Telecommunications industry and service providers

Telecommunications systems are generally run by telecommunications service providers, also known
as communications service providers. These providers historically offered telephone and related
services and now offer a variety of internet and WAN services, as well as metropolitan area
network and global services.

In many countries, telecom service providers were primarily government-owned and -operated. That
is no longer the case, and many have been privatized. The International Telecommunication Union is
the United Nations agency that administers telecommunications and broadcasting regulations,
although most countries also have their own government agencies to set and enforce
telecommunications guidelines. In the U.S., the Federal Communications Commission is the primary
regulatory agency.

A large umbrella of companies provide different types of telecommunications services,


including internet service providers, telecom equipment providers, wireless service providers, radio
and television broadcasters, cable companies, satellite television providers and managed service
providers.

The three main segments within the telecom industry are manufacturers of telecom equipment,
telecom services and wireless communications. Within these sectors, telecom equipment is the
largest. It includes customer equipment, such as routers and modems; transmission equipment, such
as transmission lines and wireless semiconductors; and analog or digital public switching equipment.
Wireless communications is the smallest sector.

Large global service providers include the following:

 AT&T.

 Verizon.

 Nippon Telegraph and Telephone.

 China Mobile Limited.

 Deutsche Telekom AG.


 SoftBank Group.

 China Telecom.

 Telefónica SA.

 Vodafone.

 Qualcomm.

 América Móvil.

Recently, service providers have been focusing on growing services, such as data and video, as
opposed to voice communication services.

Use of smartphones, such as the iPhone, was widespread by 2012.

History of telecommunications

The word telecommunications comes from the Greek prefix tele-, which means "distant," combined
with the Latin word communicare, which means "to share."

Important telecommunication technologies include the telegraph, telephone, radio, television,


videotelephony, satellites, closed computer networks and the public internet.

 1876. The first telephone was invented by Alexander Graham Bell. This early model required
an interpreter, or telegrapher, at both ends. These first telephones were intercom systems,
where two phones were connected directly.

 1877. The invention of the switchboard exchange telephone system enabled any
combination of two phone lines to connect and talk with each other.

 1891. Dial telephones were invented, which bypassed the need for an operator on each call.
This made it much quicker and easier to make calls via telephone.

 1947. The transistor was invented, which led to the development of modern electronics,
such as computers and calculators.

 1948. Microwaves began to be used to transmit phone signals, in places where phone wires
did not exist.

 1960. Phones began to transition from mechanical switching to electronic switching, which
enabled features such as voice messaging, speed dialing and caller ID.

 1984. The Bell System, which provided AT&T with a near-monopoly over
telecommunications services in the U.S., was broken up, opening space for competition for
other providers.

 1984. Cellular and personal communications service phone use, which offered mobile
communications beyond two-way radio use, was introduced.

 1990s. Use of the modern internet became widespread.

 2000s and beyond. The first decade of the 2000s saw mobile phones grow increasingly
sophisticated. By 2012, smartphone usage was widespread.
BASICS OF WIRELESS COMMUNICATION
(MOBILE, SATELLITE, SURVEILLANCE AND GPS
AND FIBER OPTIC ETC

Certainly! Here are the basics of various wireless communication technologies:

1. Mobile Communication: Mobile communication refers to the wireless transmission of voice and
data between mobile devices, such as smartphones, tablets, and wearable devices. It relies on
cellular networks, which consist of a network of base stations that communicate with mobile devices
using radio waves. Mobile communication enables voice calls, text messaging, internet access, and
various mobile applications.

2. Satellite Communication: Satellite communication involves the use of artificial satellites to


transmit and receive signals over long distances. Satellites orbiting the Earth act as relay stations,
facilitating communication between two or more ground-based stations. This technology is used for
various applications, including television broadcasting, global positioning systems (GPS), weather
monitoring, and long-distance communication in remote areas.

3. Surveillance Communication: Surveillance communication refers to the use of wireless


technologies for monitoring and surveillance purposes. It involves the transmission of audio, video,
or data signals from surveillance cameras, sensors, or other monitoring devices to a central control
station. Wireless surveillance systems can operate over various frequencies, such as Wi-Fi, cellular
networks, or dedicated wireless networks.

4. GPS (Global Positioning System): GPS is a satellite-based navigation system that provides location
and timing information anywhere on Earth. It consists of a network of satellites orbiting the Earth,
ground-based control stations, and GPS receivers in devices like smartphones, cars, and navigation
systems. GPS receivers receive signals from multiple satellites to determine the user's precise
location, speed, and direction.

5. Fiber Optic Communication: Fiber optic communication involves the transmission of data through
thin strands of glass or plastic fibers using light signals. It offers high-speed and long-distance
communication with minimal signal loss. Fiber optic cables are used for various applications,
including internet connectivity, telecommunication networks, and high-definition video
transmission. They provide faster data transfer rates and higher bandwidth compared to traditional
copper-based communication systems.
These are some of the basic concepts of wireless communication technologies. Each technology has
its own unique characteristics and applications, contributing to the seamless exchange of
information in various domains.

You might also like