Professional Documents
Culture Documents
INTRODUCTION
COMPUTER: A computer is a device that accepts information ( input in the form of digitalized data)
and manipulates it for some result based on a program or sequence of instructions on how the data
is to be processed. This information can then be displayed or stored for future use.
Data: This collection of raw unprocessed facts, figures and symbols. Computer processes data to
create Information hence Information is data that is organized, meaningful and useful.
Hardware: this is the physical components contained in a computer system. For example; printers,
monitor and speaker.
Peripheral Device: any hardware device connected to and controlled by the central processing unit.
Examples of peripherals are modems, disk drives, printers, scanners and keyboard.
Software: also called a program is a series of instructions that tells the hardware how to perform
tasks. Without software most hardware are useless.
Backing Store: Storage external to the computer used for large quantities of data or large programs.
Backing store is also known as secondary store, auxiliary store or external store.
User: a user is someone who communicates with the computer or uses information it generates.
Functions of Computers
A computer performs the following functions −
Receiving Input
Data is fed into computer through various input devices like keyboard, mouse, digital pens, etc.
Input can also be fed through devices like CD-ROM, pen drive, scanner, etc.
Producing output
The processed information and other details are communicated to the outside world through output
devices like monitor, printer, etc.
Summary
In this chapter, we discussed different components of a computer, and familiarized ourselves with
concept of hardware and software, representation of data/information, concept of data processing,
and applications of IECT.
CONCEPT OF HARDWARE
AND SOFTWARE
The concept of hardware and software is explained in detail below
Hardware
The term hardware refers to mechanical device that makes up computer. Computer hardware
consists of interconnected electronic devices that we can use to control computer’s operation, input
and output. Examples of hardware are CPU, keyboard, mouse, hard disk, etc.
Hardware Components
Computer hardware is a collection of several components working together. Some parts are
essential and others are added advantages. Computer hardware is made up of CPU and peripherals
as shown in image below.
Software
A set of instructions that drives computer to do stipulated tasks is called a program. Software
instructions are programmed in a computer language, translated into machine language, and
executed by computer. Software can be categorized into two types −
1- System software
2- Application software
System Software
System software operates directly on hardware devices of computer. It provides a platform to run an
application. It provides and supports user functionality. Examples of system software include
operating systems such as Windows, Linux, Unix, etc.
Application Software
An application software is designed for benefit of users to perform one or more tasks. Examples of
application software include Microsoft Word, Excel, PowerPoint, Oracle, etc.
Differences between Software and Hardware are sorted out
below−
Sr.No
Software Hardware
.
It is a
collection of
programs to
bring
1 It includes physical components of computer system.
computer
hardware
system into
operation.
It includes
numbers,
alphabets,
alphanumeric It consists of electronic components like ICs, diodes, registers,
2
symbols, crystals, boards, insulators, etc.
identifiers,
keywords,
etc.
It will vary
as per
computer
and its built-
4 It is mostly constructed for all types of computer systems.
in functions
and
programming
language.
It is designed
and
developed by
The hardware can understand only low-level language or
5 experienced
machine language.
programmers
in high-level
language.
The software
is
categorized
as operating
system, The hardware consists of input devices, output devices,
7
utilities, memory, etc.
language
processor,
application
software, etc.
I/O PROCESSING AND DATA STORAGE
Input devices accept incoming data and convert it into binary data that is understandable to a digital
computer. Examples of input devices include the keyboard, mouse, scanner, and touchscreen.
Output devices convert the computer digitized signals into an environment-understandable data
form. Example: Monitor, printer, etc. Input-Output peripherals allow both input and output in the
same. Example: touch screens, network cards, data accusation cards. Based on their interaction with
their surrounding environment, I/O device categories are as follows:
Machine-readable devices
Communication devices
DEFINITION:
Input hardware
Input hardware exists in many different shapes and sizes, and are tailored specifically for particular
systems. Below is a list of common input devices.
Keyboards
Touch screens
Pointing devices
o Mouse
o Touchpad / trackpad
o Joystick
o Game controllers
o Light pen
o Graphics tablet
o Digital cameras
o Webcam
o Image scanner
o Fingerprint scanner
o Barcode reader
o Microphone
o MIDI Keyboard
o Drum machine
Processing Hardware
The motherboard of a computer is essential to this process as it houses the CPU, RAM and
other integral components
Random access memory (RAM) allows for the data being processed to be stored temporarily
Output Hardware
Output devices are continuously changing as technology advances. Various types of display outputs
as well as printers and audio devices continue to evolve daily. These devices are responsible for
transmitting data in to a form that we as humans are able to interpret, e.g. text, images, audio, and
even events we can feel (see: haptic feedback).
Monitors
Printers
Haptic sensors (for example, mobile device vibrations upon touch input)
Storage Hardware
Often data that has been processed is stored for later processing or reading. Many devices are
capable of storing such information.
Read The Computing Teacher's article on Primary and Secondary storage here
Storage Devices
A storage device is a hardware system that allows data storing and extraction. Storage devices
provide two main interfaces for data storage operation: mass storage and file system. Mass-storage
deals with large amounts of binary data in a machine-readable format. File System Interface utilizes
the concept of a file as an identifiable and specifiable resource of data. Storage devices can be
classified based on the storage structure into the following.
Magnetic disks
Solid-state disks
Optical disks
Uses laser or stamping machine to store data and uses illumination to access the data on optical
data paths.
Tape drives
Uses a data storage server to provide storage service over the network
Cloud-based storage
Magnetic disks are the most widely used primary hard disk storage in most existing computer
systems. These devices use a Moving-head-disks mechanism to read/write data on a circular platter
that rotates at 3600 to 15000 rounds per minute (RPM). The performance characteristics of
magnetic disks include access time, data transfer rate, power consumption, system reliability, and
others. Access time (AKA positioning time) is the time it takes to move the head to the correct
position before the drive can transfer data. The positioning time involves moving operations: moving
the disk arm to the desired cylinder (seek time) and rotating the disk platter to bring the desired
sector under the disk head (rotational latency).
In magnetic disks, data address space is a large one-dimensional array of logical blocks (called
frames). A frame is the unit of data transfer in hard disk I/O operations. A magnetic disk is not ready
for use before it is prepared using the low-level format method which creates identifiable logical
blocks on the physical media. The low-level formatting maps logical blocks into the sectors of the
disk sequentially. Sector 0 is located at the first sector of the first track on the outermost cylinder of
the disk platter. The disk cylinders act as a continuous track medium from the outermost to the
innermost cylinder.
Computer systems startup their functions using a booting process: e.g., BIOS-MBR boot method and
UEFI-GPT method. The latter is a new method used in the latest versions of Windows, Linux, and
Mac OS. To understand the boot sequence, we first need to define the following components.
Basic Input/Output System (BIOS): the lowest software interface by which every higher-
level code (i.e., bootloader and OS kernel) can communicate with the hardware.
Master Boot Record (MBR): a data sector at the very bigging of the primary portioned hard
disk device. MBR contains the partition table and the bootstrap code.
Partition table: An index of up to four possible main partitions existing on the disk.
Bootstrap code: software code that is executed by the system bios and that finds the active
partition in the disk partition table and starts the execution of the bootloader procedure.
Bootloader procedure: a multi-stage software process completes the booting from the
active partition boot sector.
Active Partition boot sector: the first sector (512 bytes) of the active partition.
1. BIOS step: when the system is turned on, the bios initializes the boot process
2. MBR: The bios calls a software code (bootstrap) stored in the MBR of disk 0.
3. Active partition: The bootstrap loads the bootloader from the active partition boot sector.
4. Bootloader: the boot sector loads system configuration from files on the active partition.
5. Boot menu: The bootloader displays a list of OSs from a configuration file for selection.
6. Operating system kernel: The bootloader locates and loads the selected OS kernel.
Instead of connecting directly to a computer, network storage provides versatile methods for data
storage over devices connected to and accessed through networks. Network storage systems
include Storage Array, Network Attached Storage (NAS), and Storage Area Networks (SAN).
Storage Array (aka disk array) is a data storage system that contains multiple drives
managed by a central management system ([Figure 7]). Storage arrays are a critical part of
storage networks that is capable of storing huge amounts of data. By separating the
connection and network transmission from the data storage functions, storage on these
arrays can be provided as a local function to the connected computing devices. Storage
Array controller is a device that manages the physical disk drives and provides storage
features accessed through I/O ports talking to I/O busses to attached host(s).
Figure 8- Network Attached Storage (NAS).
A storage Area Network (SAN) is a computer network that allows organization users to
access consolidated data stored on multiple storage arrays ([Figure 9]). SAN provides access
to storage devices in specific disk arrays via logical unit numbers (called LUN mask) for disk
zoning and localization. SAN is a scalable network that allows easy plugging of additional
storage devices and connecting new computer hosts.
Disk scheduling
Hard disk is one of the busiest devices in computers. Access requests from processes incessantly pile
up to form a queue of I/O requests to the secondary storage device. Disk Scheduling provides a
systematic and efficient way to serve the queued disk I/O requests and meet specific performance
criteria. Disk scheduling algorithms vary with each based on their approach to minimize the time
consumed in the mechanical operations in hard disks: seek time and rotational latency. [Figure 9-]
shows the relationship between disk access time and these mechanical operations.
First Comes First Serve (FCFS) addresses requests in the order they arrive in the disk queue.
Shortest Seek Time First (SSTF) selects the request with the minimum seek time from the
I/O queue based on the current head position.
SCAN algorithm takes into consideration the direction of disk head motion. Therefore, it
keeps selecting the nearest requests towards one direction and then turns back to other
directions taking the remaining requests based on the shortest seek time.
C-SCAN algorithm is like SCAN except that it serves the I/O requests as it moves only in one
direction. I.e., it selected the shortest seek time first towards one direction and when it
reaches the end it starts again from the beginning.
Lock and C-Lock algorithms are like SCAN and C-SCAN except for, they don’t have to come exactly to
the end (The first of last cylinder in the disk), instead, they keep moving till the position of the last
I/O request in that direction and then they turn back (as in Lock) or start from the bigging (C-Lock).
Raid Systems
Reliable storage involves the use of multiple software and hardware techniques to assure data
integrity on the storage devices. Some reliable storage mechanisms include the following.
Redundant Array of Independent Disks (RAID) is a data storage technology that assures
data integrity by using disk arrays with redundancy.
Backup & Recovery mechanisms use copies of important data to reinstate its integrity in
case of any damage or loss of data.
Snapshot means a system view backup at a specific point of time before taking some action
or making a critical change to the system.
Replication is a systematic duplication of data change activities separate data storage sites
Redundant Array of Independent Disks (RAID) is a data storage technology that assures data
integrity by combining multiple physical disk drives into one or more logical drives and creating
redundant copies of data on various structures of disk arrays. We call the disk array structures used
in these system RAID levels. The different RAID levels vary concerning third target quality criteria:
data integrity, access speed, and storage capacity. All RAID system structures maintain the following
design criteria.
Single drive access: disk arrays are viewed as a single logical drive.
RAID level 0 the data evenly across multiple disks (AKA striping) to allow using them as one
storage unit.
RAID level 2 provides an efficient and low-cost model using hamming code redundancy (in
only three disks) instead of a data duplication model.
RAID level 3 provides high data transfer rates by using the bit-parity redundancy model in
one disk only.
RAID level 4 provides high I/O request rates by using the block-parity redundancy model.
RAID level 5 provides interleaved parity model and avoids a Single point of failure.
RAID level 6 provides a dual interleaved parity model and extremely high system availability.
Internet Standard
Internet standard is a working document or a proposed specification that gains the status of the
standard after proper validation and is applicable to the worldwide Internet. This Internet standard
is formed under the supervision of the Internet Society (ISOC) which is responsible for the creation
and implementation of Internet standards. In this section, we will discuss the ISOC organization, and
we will also see the step-by-step formation of Internet standards.
Earlier there were no such organizations or committees that can define the internet standards.
However, people around the world were doing their own thing to establish worldwide
communication. This raises the need for standards that can be accepted across the world.
While working on ARPANET the Department of Defense (DoD) set up an informal committee i.e.,
the Internet Activities Board (IAB) which works to set up a network of the connected computer so
that they can share their findings. This would also reduce and even eliminates the cost of duplication
effort.
The acronym of IAB was modified to Internet Architecture Board (IAB). The IAB consisted of
approximately ten members where each member was assigned a task, which they used to report to
DoD. DoD and NSF used to raise the fund for IAB.
Whenever a new standard was required the members of IAB use it to discuss the requirements and
announce this to the software graduate students to implement it with the help of coding. The
communication between IAB and students was achieved with the help of series of online technical
reports i.e., RFCs (Request For Comments). These comments are organized in serial order online and
can be fetched by anyone who is interested in them.
With the continuous growth of the internet, IAB was reorganized in the year 1989. It was
repopulated to form an organization which was then split into two groups, IRTF (Internet Research
Task Force) and IETF (Internet Engineering Task Force). IRTF is held for conducting long-term
research and IETF is held to handle short-term issues.
A year later an Internet society was for and populated with the people who were interested in the
internet. The Internet Society emerges as an organization that was capable of creating standards for
the internet. The trustees of the Internet Society then were responsible to appoint the members of
IAB.
This is how the Internet Society (ISOC) was formed which thoroughly test and approved the
proposed internet standards.
Internet Administrations
Just now we have seen the formation of ISOC (Internet Society). Well under ISOC there are various
groups that coordinate to create and maintain the internet standards. In the figure below you can
see the organization of all the groups under the ISOC.
IAB issues technical advice to the Internet Society in order to ensure continuous growth of the
Internet. IAB oversees the evolution of the Internet so that it becomes a global platform for
communication.
IAB supervises two task forces namely IRTF (Internet Research Task Force) and IETF (Internet
Engineering Task Force). IAB edits and manages the RFCs. IAB makes a connection between the
Internet and other organizations that operate in the same direction.
IRTF conducts long-term researches related to the Internet. The research topic is related to Internet
protocols, Internet applications, about their architecture. All the research groups involved in the
research must have long-term membership. The research group (RG) or the working group under the
IRTF is managed by the IRSG (Internet Research Steering Group).
IETF tackles short-term engineering problems subjected to the Internet. The working groups under
IEFT are managed by the IESG (Internet Engineering Steering Group). The IEFT identifies the
problems on the Internet and proposes a solution to resolve the problem.
IETF also reviews the proposed specifications which are capable of becoming the Internet Standards.
Each working group is assigned a specific topic. The context of the assigned topic can be divided into
nine categories such as application, Internet protocols, user services, Internet operation, routing,
network management, transport, Internet protocol next generation, and security.
Studying the organization of Internet administration lets us study the process which every proposed
specification must undergo before declared as an Internet standard.
Internet standards are those proposed specifications that are thoroughly tested for their successful
implementation before they gain the status of Internet standard. Let us see the step-by-step
procedure of the formation of Internet standards.
In the figure below we can observe level by level maturity of Internet standard.
A specification or statement or a working document is considered as an Internet draft that has no
official status and has a lifetime of only six months. Upon approval by some Internet authorities, the
Internet draft is published as Request for Comment (RFC). The RFCs are assigned a specific number
and are available online for people interested in the Internet.
Every RFC before gaining the status of standard falls at least into one of the maturity levels below.
Maturity Level
1. Experimental
2. Informational
The published RFC is classified as informational if it is consists of any kind of information regarding
the Internet. Usually, they put forth by non-Internet organizations such as vendors.
3. Proposed Standard
The RFC specification is classified as a proposed standard if it is well defined and has the work which
seems to be of the Internet community’s interest. The specification here is examined and
implemented by the different groups.
4. Draft Standard
Two successful implementations independent of each other and still interoperable promotes the
proposed standard promote it to draft standard.
5. Internet Standard
6. Historic
The Historic RFC are the specifications that are replaced by the newer specifications or those
specifications that never reached the maturity levels that are required to gain the status of Internet
standard.
The RFC itself can be of five different kinds on the basis of requirement.
Requirement Level
1. Required
The RFC is considered as required if it is mandatory to implement on all Internet systems to check
whether it meets the specified standard. For example, ICMP an IP
2. Recommended
The RFC is considered as recommended if it is useful but is not mandatory to implement it on all
Internet systems to check whether it meets the specified standard. For example, FTP and TELNET
3. Elective
The RFC is considered an elective if it can be used by an Internet system only for its own benefit.
4. Limited Use
The RFC is considered limited if can be used only in a limited situation. The RFC that are classified as
experimental in maturity level is limited RFCs.
5. Not Recommended
The RFC is not meant for general use is not recommended RFC. Historical RFCs fall in this category.
----------------------------------------------------------------
Web browsers like Firefox, and Google Chrome, as well as Microsoft Word and Excel, are
examples of application software that is used on a personal computer or laptop. It also
includes smartphone apps such as WhatsApp and Telegram, as well as games such as Candy
Crush Saga and Ludo. There are also app versions of popular services that people rely on
every day, such as weather or transportation information, as well as apps that connect end
users with their businesses.
Software for healthcare applications for seamless connectivity and quick response
A variety of explicit application software programs are available to help you manage your
tasks, jot down notes, do online research, set alarms, keep an account log, and even play
games. Application software packages are designed to do certain tasks, ease workflows, and
improve team communication.
The most frequent applications used by millions of people on a daily basis are listed below.
Real-time online communication tools like Skype, Hangouts, Google Meet, Zoom,
and Whatsapp for video, and audio calls and messages.
Multimedia and music streaming software such as Wynk, Gaana, MX Player, VLC
Media Player, Spotify, Pandora, etc. are used for entertainment purposes.
Project management software like Teams, Asana, Zoho, Slack, Forecast, etc for
official purposes.
Whether you are looking to purchase a new tool or replace an existing one, here are 7 things
to consider. Use these suggestions to assist guide the software purchasing process if you want
your team to feel confident when deciding what software to add to your IT stack.
Though pricing is vital to any business decision, it shouldn’t be the only element you
consider. If you decide to purchase software only because of its price it might not guarantee
your business the best value. Remember, a software's cost is not always associated with its
value.
Software models that are highly complex and require a great deal of time to learn and master
will negatively affect the adoption rates. Spend precious time investigating viable software
alternatives so you can make the most effective and useful option for your organization and
team that will save your team and project time and energy.
Make sure to discuss with your software agents how often their product is updated and how
those updates are conveyed to you.
Before purchasing, make a note of the support hours for every software agents you are
considering, as the question of support hours should encompass not only the timeframes
during which you can get support, but also how swiftly they can accomplish them. You
should be able to check whether you can get just phone support, or if everything is done by
email or the ticketing system.
Always take a careful view of the privacy policy provided by any software you are
considering purchasing. This should therefore summarize everything you need to know
concerning data collection, storage, and usage.
End-users can use application software to perform any type of single or many tasks.
Following are a few reasons you would definitely need application software (App) on
your computer:
Helps the user in completing specific tasks: Any application software should, in
general, be created with the end user in mind. They will primarily benefit the end-
user by assisting them in doing specialized activities in a range of industries,
including education, business, and entertainment. Microsoft Word, for example, is
a commonly used application software that allows users to create, edit, delete, and
perform other actions on word documents.
Allows users to effectively organize information: Data can be created and handled
efficiently by individual users using application software. For example, Microsoft
Excel is a very popular application software amongst companies that allows users
to manage datasheets.
Application software can also be classified depending on how much it costs and how easily it
can be accessed. Here are some examples of application software:
Word Processing refers to the act of using a personal computer (PC) or laptop to create, edit,
save and print documents which can be performed only with specialized software known as a
Word Processor. One example of a Word Processor is Microsoft Word which is widely used
by all professionals.
2. Spreadsheet Software
Spreadsheet software is a type of computer program that enables a user to perform numerical
functions and explore numbers through an automated version of an accounting worksheet.
Best example of spreadsheet software is Microsoft Excel.
3. Presentation Software
4. Multimedia Software
Multimedia software can be described as the combination of text, audio, images, animation,
or video to produce a wide scope of interactive content for both professional and personal
use. You can easily learn about media players, file formats, and how to operate audio and
video software on the whole.
5. Web Browsers
A web browser can take you all over the internet. It retrieves data from other parts of the web
and shows it on your desktop or mobile device for your viewing. The data is transmitted
using the Hypertext Transfer Protocol, which describes how text, images, and video are
shared on the World Wide Web.
6. Educational Software
Educational software refers to any computer software designed solely for educational
reasons. It includes a wide range of software, including language learning software,
classroom management software (CMS), and reference software for students and other
professionals.
7. Graphics Software
Graphics software can rework with bitmap and/or vector graphics and can be utilized to
create label templates. Graphics software generally includes Canva, Adobe Illustrator,
Photoshop, InDesign, CorelDraw, Inkscape, Microsoft Paint, and Paint.Net.
8. Freeware
Freeware is typically marketed for profit but might be allocated specifically for a business or
commercial purpose with the aim to expand the market share of any newly launched premium
product. Some of the widespread examples of closed-source freeware include Adobe Reader,
Free Studio, and Skype.
9. Shareware
Shareware is software that is supplied for free on a trial basis in order for the user to test or
use the programme for a specific amount of days with the understanding that the user may
need or want to pay for it later if they are satisfied with the product usage. Some software
manufacturers provide a shareware edition of their product with an expiration date built in,
such that after 30 days, the user or customer will no longer be able to access the application
for further use.
Simulation software authorizes engineers to evaluate, optimize, and compare product designs
with other similar software by modeling real-world events in a computer-generated
environment.
Open source software is a specific code designed to be publicly accessible so that anyone can
see, modify, and distribute the code as they see which fits the purpose. It is designed in a
decentralized and coordinated way, depending on peer assessment and community
production.
Closed source software is where the source code is not freely accessible. It is developed and
delivered to the customer as a fully compiled, executable set of files. The developer often
provides aid to users after purchase and ensures that the software works as foreseen by the
creator.
Advantages of Application Software
It meets every client’s particular requirements and needs. The client usually
recognizes that they must utilize only one explicit program to finish the task
because it is designed explicitly for one reason.
Businesses that are related to specific applications can restrict access and think
about strategies to monitor their activities.
Developing and evolving any application software to achieve specific goals can be
quite pricey for developers but this can have a strong impact on their financial plan
and income stream, particularly if an unreasonable high amount of time is spent on
a product that is not normally worthy.
The system software has a wide The objective of the application software is
scope of capabilities. to achieve or perform a certain task.
System software comprises
Payroll software, accounting software, MS
language processors (interpreters,
Office, and so on are perfect examples of
compilers, and assemblers),
an application software.
operating systems, and so on.
Business application software is designed to automate and streamline business processes, while also
enhancing work efficiency and productivity. Also, to ensure system security, developers utilize various
security measures.
COMMON EXAMPLES OF BUSINESS SOFTWARE
INCLUDE:
PROJECT MANAGEMENT SOFTWARE;
TIME MANAGEMENT SOFTWARE;
HUMAN RESOURCE MANAGEMENT;
COMMUNICATION TOOLS; AND
CUSTOMER RELATIONSHIP MANAGEMENT TOOLS.
RESPONSE TO USER CONCERNS ON BUSINESS
APPLICATION SOFTWARE
BUSINESS APPLICATION SOFTWARE DEALS WITH
BUSINESS RECORDS AND CUSTOMER INFORMATION.
THUS, SOME MAY BE CONCERNED ABOUT CERTAIN
CYBERSECURITY THREATS FROM MALICIOUS
ATTACKERS.
AS A RESULT, SOFTWARE DEVELOPERS WORK HARD
TO ENSURE THEIR SYSTEMS AND PROGRAMS’
SECURITY. SO, THEY EMPLOY CERTAIN SECURITY
MEASURES SUCH AS THE FOLLOWING:
DATA ENCRYPTION;
IMPLEMENTATION OF USER ACCESS LEVELS; AND
USER LOGIN NOTIFICATIONS.
ADDITIONALLY, SOME USERS TEND TO SHY AWAY
FROM IMPLEMENTING SOFTWARE INTO THEIR WORK
OPERATIONS BECAUSE OF THE FEAR THAT THESE
WILL TAKE AWAY THEIR JOBS. HOWEVER,
IMPLEMENTING THESE TYPES OF SOFTWARE WILL
NOT ELIMINATE THEIR EMPLOYMENT.
INSTEAD, IT’LL PUT USERS ON A HIGHER LEVEL
WHERE THEY WILL BE ACCOMPLISHING HIGHER-
LEVEL DELIVERABLES. ALSO, IT ALLOWS THEM TO
MAXIMIZE THEIR TIME AND FOCUS ON MORE
COMPLEX TASKS.
SOURCE: FINANCESONLINE.
THIS SOFTWARE IMPROVES PERSONAL PRODUCTIVITY
AND ENHANCES OVERALL EFFICIENCY FOR TEAMS
AND BUSINESSES. FOR EXAMPLE, HERE ARE SOME
KEY EXAMPLES OF TIME MANAGEMENT SOFTWARE:
TASK AND PROJECT MANAGEMENT TOOLS;
TO-DO LISTS AND REMINDERS TOOLS;
TIME TRACKING OR MANAGEMENT SOFTWARE;
CALENDAR INTEGRATIONS;
GOAL SETTING AND PROGRESS TRACKING
SOFTWARE;
DISTRACTION-BLOCKING OR MANAGEMENT
TOOLS;
TIME ANALYSIS AND REPORTS SOFTWARE;
COLLABORATION AND SHARING TOOLS; AND
MOBILE APPS.
SOFTWARE SUCH AS TICK, TIMELY, AND TOGGL HELP
OPTIMIZE USERS’ TIME, INCREASING PRODUCTIVITY.
CUSTOMER RELATIONSHIP MANAGEMENT
CRM SOFTWARE CAN HELP BUSINESSES MANAGE
CUSTOMER INTERACTIONS AND RELATIONSHIPS
MORE EFFECTIVELY. AFTER ALL, THROUGH THIS
TYPE OF BUSINESS APPLICATION SOFTWARE, YOU
CAN MANAGE YOUR CLIENTS’ QUERIES, REQUESTS,
AND ISSUES REPORTED. YOU CAN ALSO ANALYZE
CUSTOMER DATA WHILE MANAGING CUSTOMER
INTERACTION AND FACILITATING SALES AND
PARTNER RELATIONSHIPS.
SO BY ORGANIZING AND CENTRALIZING CUSTOMER
DATA, TRACKING INTERACTIONS, AND IMPROVING
ENGAGEMENT, CRM ENHANCES CUSTOMER
SATISFACTION, LOYALTY, AND RETENTION. LASTLY,
PRIORITIZING CRM CAN LEAD TO PERSONALIZED
INTERACTIONS, EXCEPTIONAL EXPERIENCES, AND
BUSINESS GROWTH.
HERE’S WHAT YOU CAN FIND UNDER THE CRM
SOFTWARE TYPE:
CENTRALIZED CUSTOMER DATABASE;
CUSTOMER INTERACTION TRACKING SYSTEMS;
LEAD AND OPPORTUNITY MANAGEMENT TOOLS;
SALES AUTOMATION FEATURES;
MARKETING AUTOMATION FEATURES;
CUSTOMER SUPPORT AND SERVICE
MANAGEMENT SYSTEMS;
CUSTOMER ANALYTICS AND INSIGHTS SYSTEMS;
AND
WORKFLOW AUTOMATION FEATURES.
FINALLY, EXAMPLES OF THIS TYPE OF SOFTWARE
INCLUDE INTERCOM, MAILCHIMP, ACTIVE CAMPAIGN,
AND THE LIKE.
ACHIEVE MAXIMUM WORK EFFICIENCY WITH THE
IDEAL APPS!
TO CONCLUDE, THE ULTIMATE GOAL OF BUSINESS
APPLICATION SOFTWARE IS TO HELP INDIVIDUALS,
COMPANIES, AND ORGANIZATIONS AUTOMATE AND
STREAMLINE BUSINESS PROCESSES.
Social media refers to a variety of technologies that facilitate the sharing of ideas and information
among their users. From Facebook and Instagram to X platform (formerly Twitter) and YouTube,
more than 4.7 billion people use social media, equal to roughly 60% of the world's population.1 In
early 2023, 94.8% of users accessed chat and messaging apps and websites, followed closely by
social platforms, with 94.6% of users.2
Social media started out as a way for people to interact with friends and family but soon expanded
to serve many different purposes. In 2004, MySpace was the first network to reach 1 million monthly
active users.3
Social media participation exploded in the years that followed with the entry of Facebook and
Twitter (now X platform). Businesses gravitated toward these platforms in order to reach an
audience instantly on a global scale.
According to Global Web Index, 46% of internet users worldwide get their news through social
media. That compares to 40% of users who view news on news websites. Gen Z and Millennials were
most likely to view news on social sites versus other generations.2
Social media plays a key role in many businesses' marketing strategies, not surprising given the sheer
number of hours people spend each day on social websites and apps. At the same time, social media
is an ever-changing field, with relatively recent apps such as TikTok, Signal, and Clubhouse joining
the ranks of established social networks like Facebook, YouTube, X platform, and Instagram.
Social media platforms are often divided into six categories: social networking, social bookmarking,
social news, media sharing, microblogging, and online forums.
These diverse platforms serve a vast range of purposes and user interests. Some appeal to hobbyists,
others to people in their work lives. People use them to find others across the globe who share their
political or other views. Entertainers use social media to engage with fans, politicians with voters,
charities with donors. Governments often turn to social media to convey vital information during
emergencies.
For businesses, social media has become a key marketing tool. Companies use it to find and engage
with customers, drive sales through advertising and promotion, identify fast-moving consumer
trends, provide customer service or support, and collect data on users, sometimes surreptitiously.
94.6%
Percentage of internet users age 16 to 64 who visited a social networking site in the past month.1
Social media platforms allow people to access information in real time, to connect with others, and
to find niche communities. At its best, it makes the world more interconnected.
On the other hand, social media is also very good at spreading disinformation, creating polarization,
and even causing harmful psychological effects.
Still, according to a 2019 survey by Pew Research Center, people's use of social media is correlated
with having more friends and more diverse personal networks, especially within emerging
economies.4 Some 80% of teenagers say social media allows them to feel more connected to their
peers, according to a 2022 Pew Research Center survey of U.S. teens ages 13 to 17. Overall, one in
three said that social media has had a mostly positive effect on them, while 59% said it had neither a
positive nor a negative effect.5
At the same time, many teens' use, and overuse, of social media has raised questions about its effect
on their physical and mental health by "distracting them, disrupting their sleep, and exposing them
to bullying, rumor spreading, unrealistic views of other people's lives, and peer pressure," as the
Mayo Clinic notes.6
Businesses, meanwhile, have found social media to be an often effective and relatively inexpensive
way to reach consumers and build an image for their brands. According to Facebook, more than 200
million small businesses use its service for various purposes.7 Separately, close to 90% of marketers
say they use Facebook for promotion.8
In 2022, social media and search advertising spending made up roughly 55% of overall ad spending
globally. It is also the fastest-growing category across advertising channels.9
These were the most widely used social media providers as of January 2023, according to
DataReportal:
Interestingly, two that are especially well-known in the U.S.—X platform and Pinterest—didn't make
the top 10 list globally. X platform was 14th, with 556 million users worldwide, while Pinterest was
15th with 445 million.
INFORMATION SYSTEMS
Information systems encompasses the tools that organizations use to collect, manage, and analyze
data. This data guides decision-making to improve efficiency and profitability.
Every decision an organization makes should be data-driven, so the uses of information systems are
practically limitless—human resource management, financial account management, customer
outreach and advertising, competitive landscape analysis, you name it.
Information systems can improve nearly any business operation, but here are a few valuable ways
you can put them to work.
Expert systems: AI is becoming more advanced every day, and it's leveraged in information
systems to simulate human problem-solving (think Siri!). Expert systems use knowledge that
would otherwise need to be provided by a subject matter expert to tackle problems and
make decisions. In a business context, it can solve accounting problems or identify malware.
Office automation systems: Automation saves countless hours that would otherwise be
spent doing simple tasks. Office automation systems combine computer and communication
technology with human resources to enact more efficient procedures. For example, a COO
may schedule monthly company-wide email updates that include AI-generated reports on
the company's status.
Process control systems: If you're looking for a way to apply information systems to product
manufacturing, process control systems are your solution. They rely on inputs from sensors
to generate specific outputs and are frequently used to ensure a product meets specific
criteria. A simple example is a thermostat—when the temperature dips below a certain
level, the heat turns on. If you produce a physical product that's regularly criticized by
customers, you may want to tweak your process controls.
Hardware
Computers are the physical hardware that make up information systems. Nowadays, this doesn't just
mean your cubicle's desktop or laptop computer—we have computers at our fingertips much of the
time we aren't typing away at our keyboards. Smartphones, tablets, and even smart watches all have
the power to collect, store, access, and manage huge amounts of data.
You can break hardware down by its components as well: hard drives for storage, microprocessors
for processing power, graphics cards for generating graphics, monitors for displaying them, and so
on.
Software
Computers are just shiny black mirrors without the programs running behind the scenes telling the
hardware what to do. Software can be broken down into two types:
System software, which allows you to manage the computer's files and overall interface
(think operating systems like Windows 10).
Application software, the programs that take care of specific tasks (think Google Sheets and
Microsoft Outlook). System software creates a starting point from which application
software can build.
Data sources
Data puts the "information" in information systems. Databases and data warehouses store the
qualitative and quantitative information (data) that users and software then retrieve, analyze, and
manipulate.
Databases hold the information that the user regularly retrieves to complete essential operations,
like saving a file's contents and accessing them. Data warehouses, on the other hand, store data
collected from multiple sources over time to be analyzed and used to inform decisions. For example,
a data warehouse could include customer data consolidated from your point-of-sale system, mailing
list, and cookies.
Telecommunications
Telecommunications is how computers share information with each other. The first thing that may
come to mind is the internet, and you're correct. But telecommunications can be broken down
further.
Some connections are physical: coaxial and fiber-optic cables are physical wires used by telephone,
internet, and cable providers to carry data. Others are wireless: think networks like local area
networks (LANs) and wide area networks (WANs). Microwaves and radio waves are also invisible
channels that transmit data across devices.
Telecommunications makes it possible to access data via the cloud—without these systems in place,
all data would have to be stored on one device.
Human resources
Automation is replacing a lot of tedious tasks with robots, but we haven't quite reached a
Westworld-esque android takeover. Human experts capable of understanding and manipulating
data are essential to any information systems strategy.
For example, business analysts use data to develop strategies for improving a business's operations
—think efficiency and resource allocation. Likewise, information security analysts look out for
security vulnerabilities to reduce the likelihood of cyberattacks.
Of course, analysts don't have to do all of this work by hand—they can rely on
other technologies like business intelligence to assist with the process of using data to make
concrete strategic decisions.
Curating a cohesive information system strategy can't be done with the click of a mouse—it takes
time and effort.
You should build your strategy around your goals. When in doubt, turn to your KPIs. Which
benchmarks are you failing to hit? For example, maybe you actively market yourself as a customer-
friendly solution, but a survey shows customer satisfaction falling 20% below your benchmark.
Once you identify an objective like this, evaluate what information you need. Have you been
collecting customer data in a database or data warehouse? If so, do you have enough to develop
a customer retention and satisfaction strategy? If not, it's time to start from scratch and begin
actively collecting customer data.
There's a good chance you already have some information systems infrastructure in place—you just
need to refine it. For example, you may have plenty of customer data in a data warehouse but lack
customer relationship management (CRM) software.
This presents an opportunity to select and customize CRM software based on existing data. When
deciding how to improve your system, remember to always keep budget and other resources in
mind. Not all plans are affordable.
During this phase, you'll create a list of specifications and requirements that your system will have to
meet, which will vary depending on your company's needs. For example, you may consider the
following questions:
What software do you need, and how will you customize it?
Who will head your information systems? The CIO, CTO, or another role?
Your team should then build the functions that will bring your system to life. Once you've designed
everything, it's time to purchase and install your new mechanisms. This process can be expensive
and time-consuming—after all, you're supplanting your entire organization's status quo. Be sure to
test that the system is functioning as planned before rolling it out across your organization.
As you implement your updated system, remember to document every change and keep these
records secure. Your developers should also spend plenty of time learning about the needs of the
users who will be using the system most. Otherwise, their time may be wasted creating functions
that aren't helpful.
For example, by improving its information systems strategy, an organization can centralize its
information resources, minimizing confusion and turning a scattered office into a well-oiled machine.
This makes both your employees and your customers happier.
The fundamentals of artificial intelligence (AI) encompass various key concepts and principles. Here
are some fundamental aspects of AI:
1. Machine Learning: Machine learning is a subset of AI that focuses on enabling machines to learn
from data and improve their performance without being explicitly programmed. It involves
algorithms that allow systems to automatically learn and make predictions or decisions based on
patterns and examples.
2. Neural Networks: Neural networks are computational models inspired by the human brain's
structure and function. They consist of interconnected nodes (neurons) that process and transmit
information. Neural networks are widely used in deep learning, a subfield of machine learning, to
solve complex problems such as image recognition and natural language processing.
3. Natural Language Processing (NLP): NLP is a branch of AI that deals with the interaction between
computers and human language. It involves tasks such as speech recognition, language translation,
sentiment analysis, and text generation. NLP enables machines to understand, interpret, and
generate human language.
4. Computer Vision: Computer vision focuses on enabling machines to understand and interpret
visual information from images or videos. It involves tasks such as object recognition, image
classification, and image segmentation. Computer vision algorithms use techniques like feature
extraction, pattern recognition, and deep learning to analyze visual data.
6. Ethics and Bias: As AI becomes more prevalent, ethical considerations are crucial. It is important
to ensure that AI systems are developed and used responsibly, addressing issues like privacy,
fairness, transparency, and accountability. Efforts are being made to mitigate biases in AI algorithms
to avoid perpetuating discrimination or unfairness.
These are just a few fundamental aspects of AI, and the field continues to evolve rapidly with
ongoing research and advancements.
TELECOMMUNICATIONS:
What is telecommunications (telecom)?
A complete, single telecommunications circuit consists of two stations, each equipped with a
transmitter and a receiver. The transmitter and receiver at any station might be combined into a
single device called a transceiver. The medium of signal transmission can be via electrical wire or
cable -- also known as copper -- optical fiber, electromagnetic fields or light. The free space
transmission and reception of data by means of electromagnetic fields is
called wireless communications.
The simplest form of telecommunications takes place between two stations, but it is common for
multiple transmitting and receiving stations to exchange data among themselves. Such an
arrangement is called a telecom network. The internet is the largest example of a
telecommunications network. On a smaller scale, examples include the following:
Telephone networks.
Cellular networks.
Broadcast networks.
In analog modulation, some aspect of the carrier is varied in a continuous fashion. The oldest form of
analog modulation is amplitude modulation (AM), which is still used in radio broadcasting at some
frequencies. Digital modulation predates AM; the earliest form was Morse code. Modern
telecommunications use internet protocols to carry data across underlying physical transmissions.
Telecommunications systems are generally run by telecommunications service providers, also known
as communications service providers. These providers historically offered telephone and related
services and now offer a variety of internet and WAN services, as well as metropolitan area
network and global services.
In many countries, telecom service providers were primarily government-owned and -operated. That
is no longer the case, and many have been privatized. The International Telecommunication Union is
the United Nations agency that administers telecommunications and broadcasting regulations,
although most countries also have their own government agencies to set and enforce
telecommunications guidelines. In the U.S., the Federal Communications Commission is the primary
regulatory agency.
The three main segments within the telecom industry are manufacturers of telecom equipment,
telecom services and wireless communications. Within these sectors, telecom equipment is the
largest. It includes customer equipment, such as routers and modems; transmission equipment, such
as transmission lines and wireless semiconductors; and analog or digital public switching equipment.
Wireless communications is the smallest sector.
AT&T.
Verizon.
China Telecom.
Telefónica SA.
Vodafone.
Qualcomm.
América Móvil.
Recently, service providers have been focusing on growing services, such as data and video, as
opposed to voice communication services.
History of telecommunications
The word telecommunications comes from the Greek prefix tele-, which means "distant," combined
with the Latin word communicare, which means "to share."
1876. The first telephone was invented by Alexander Graham Bell. This early model required
an interpreter, or telegrapher, at both ends. These first telephones were intercom systems,
where two phones were connected directly.
1877. The invention of the switchboard exchange telephone system enabled any
combination of two phone lines to connect and talk with each other.
1891. Dial telephones were invented, which bypassed the need for an operator on each call.
This made it much quicker and easier to make calls via telephone.
1947. The transistor was invented, which led to the development of modern electronics,
such as computers and calculators.
1948. Microwaves began to be used to transmit phone signals, in places where phone wires
did not exist.
1960. Phones began to transition from mechanical switching to electronic switching, which
enabled features such as voice messaging, speed dialing and caller ID.
1984. The Bell System, which provided AT&T with a near-monopoly over
telecommunications services in the U.S., was broken up, opening space for competition for
other providers.
1984. Cellular and personal communications service phone use, which offered mobile
communications beyond two-way radio use, was introduced.
2000s and beyond. The first decade of the 2000s saw mobile phones grow increasingly
sophisticated. By 2012, smartphone usage was widespread.
BASICS OF WIRELESS COMMUNICATION
(MOBILE, SATELLITE, SURVEILLANCE AND GPS
AND FIBER OPTIC ETC
1. Mobile Communication: Mobile communication refers to the wireless transmission of voice and
data between mobile devices, such as smartphones, tablets, and wearable devices. It relies on
cellular networks, which consist of a network of base stations that communicate with mobile devices
using radio waves. Mobile communication enables voice calls, text messaging, internet access, and
various mobile applications.
4. GPS (Global Positioning System): GPS is a satellite-based navigation system that provides location
and timing information anywhere on Earth. It consists of a network of satellites orbiting the Earth,
ground-based control stations, and GPS receivers in devices like smartphones, cars, and navigation
systems. GPS receivers receive signals from multiple satellites to determine the user's precise
location, speed, and direction.
5. Fiber Optic Communication: Fiber optic communication involves the transmission of data through
thin strands of glass or plastic fibers using light signals. It offers high-speed and long-distance
communication with minimal signal loss. Fiber optic cables are used for various applications,
including internet connectivity, telecommunication networks, and high-definition video
transmission. They provide faster data transfer rates and higher bandwidth compared to traditional
copper-based communication systems.
These are some of the basic concepts of wireless communication technologies. Each technology has
its own unique characteristics and applications, contributing to the seamless exchange of
information in various domains.