This action might not be possible to undo. Are you sure you want to continue?
APPLICATIONS OF IT FUNCTIONALITY OF MS-ACCESS COMMUNICATIVE SERVICES IN OUR DAILY LIFE
SUBMITTED TO-; MRS.JUPINDER KAUR LECT.OF IT RIMT-IMCT SUBMITTED BY-; RAJAT VERMA ROLL NO-95072238768 MBA-2/A RIMT-IMCT
Information technology (IT) is the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware, According to the Information Technology Association of America (ITAA), IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. Today, the term information has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. Information technology is starting to spread farther than the conventional personal computer and network technology, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs. When computer and communications technologies are combined, the result is information technology. It is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information.
1). Technology has opened up new markets, new products, new services and efficient delivery channels for the banking industry. Online electronics banking, mobile banking and internet banking are just a few examples. 2). Information Technology has also provided banking industry with the wherewithal to deal with the challenges the new economy poses. Information technology has been the cornerstone of recent financial sector
reforms aimed at increasing the speed and reliability of financial operations and of initiatives to strengthen the banking sector. 3). The IT revolution has set the stage for unprecedented increase in financial activity across the globe. The progress of technology and the development of worldwide networks have significantly reduced the cost of global funds transfer. 4). It is information technology which enables banks in meeting such high expectations of the customers who are more demanding and are also more techno-savvy compared to their counterparts of the yester years. They demand instant, anytime and anywhere banking facilities. 5). IT has been providing solutions to banks to take care of their accounting and back office requirements. This has, however, now given way to large scale usage in services aimed at the customer of the banks. IT also facilitates the introduction of new delivery channels--in the form of Automated Teller Machines, Net Banking, Mobile Banking and the like. Further, IT deployment has assumed such high levels that it is no longer possible for banks to manage their IT implementations on a stand alone basis with IT revolution, banks are increasingly interconnecting their computer systems not only across branches in a city but also to other geographic locations with high-speed network infrastructure, and setting up local area and wide area networks and connecting them to the Internet. As a result, information systems and networks are now exposed to a growing number
there is the danger here that home education via the computer will be divided into the 'haves' and the have-nots 5 .Many parents will buy their child a computer in order to take advantage of the vast range of educational software that is now available. While the price of PCs is getting lower and lower.
Services like this can provide much needed additional resources for those living in remote areas. In either case. 2. 6 . Curiosity. Learning management systems can be used to control and track delivery of online learning for hundreds of thousands of students. b. student projects. information and multicultural literacy and global awareness. technological. or those who are housebound. the courses a student is taking and exam results. creativity and risk taking. Whether they are used as administration tools or as part of learning management systems. It induces scientific. You can then use a desk top application such as Microsoft Word to create documents from material that you download from the Internet. These systems can even be used to set class timetables. 1. Research The Internet can be used to research homework. It promotes inventive thinking which induces the following: a. computers are changing the face of education in the digital age: School and University Administration Systems Administration systems can keep track of student records including personal details. Specialist areas which can be difficult to research using traditional methods are often catered for on the web.Computers are playing an increasingly large role in education. Some of the benefits are-. access to a traditional training centre could be difficult. Distance Learning On the Internet virtual campuses are used to host distance learning programs which often include online tutorials. economic. Adaptability & managing complexity. or for your particular hobby or interest.
g. f. f. b. if we impart education with technology then these are the outcomes:a. It is not time dependent. and high quality results. b. It is instructor driven. 4. EDUCATION WITHOUT TECHNOLOGY VERSUS EDUCATION WITH TECHNOLOGY To measure the benefits of using information technology we are dividing education into two categories:If we impart education without technology then these are the outcomes:a. Not all the students fully participate. c. All students fully participate 7 . it induces personal. It leads to high productivity which given the ability to plan and manage results. e. e. g. It is informal. Moreover. It develops effective communication which leads to teaming. It is Active. High-order thinking and sound reasoning. Grade is given only after final evaluation. d. It is student driven.c. 3. relevant. Content defined by students. c. It is Passive. Individual contribution is measured. It also gives you a sense of using real-world tools with effective. d. social and civic responsibility. Content defined by others. It is formal. Now. collaboration and interpersonal skills. It is time dependent.
In other cases the data might be created electronically and automatically stored in computers. and distributing information. Small businesses generally need to purchase software packages.Information technology (IT) refers to the management and use of information using computer-based tools. The term is used broadly in business to refer to anything that ties into the use of computers. In some cases the data must be input to computers using devices such as keyboards and scanners. Most commonly it is a term used to refer to business applications of computer technology. and may need to contract with IT businesses that provide services such as hosting. processing. 8 . Mostly businesses today create data that can be stored and processed on computers. It includes acquiring. storing. rather than scientific applications.
The advances in Information Technology would result in remarkable decline in the costs of synchronization that would lead to new. It enables the business to respond to the new and urgent competitive forces by providing effective management of interdependence. For instance. from the executives to middle management and clerks. Advances in telecommunications. In the near future businesses would be facing a lack and a redundancy of information called information glut. However. routine. 9 . To solve the information-glut companies will need to introduce methods for selective thinning out of information. Improvements in telecommunications will make it easier to control business units dispersed over different parts of the world. businesses working with the federal government are likely to need to comply with requirements relating to making information accessible. concentrated business structures. and otherwise handle IT needs in-house. larger companies can consider having their own IT staffs to develop software. and non-routine. Effective implementation of information technology would decrease liability by reducing the cost of expected failures and increase flexibility by reducing the cost of adjustment. The capabilities and flexibilities of computer-communication systems make them gradually more appropriate to businesses by being able to respond to any specific information Information Technology is having impact on all trade industries and businesses. It is affecting workers at all levels of organizations. Information technology is increasingly becoming a basic factor of all types of technologies such as craft. along with increasing global competition. in service as well as in manufacturing.marketing web sites and maintaining networks. is adding difficulty and hesitation of several orders of scale to the business and trade. engineering. The constant upgrade in information technology. The businesses reaction to the environment remains to be the vital determinant for its effectiveness. would result in increased distance-communication.
Doctor’s visits and medical procedures can be processed more efficiently. This can include details of visits to the Doctor. Medical Information Databases Details of available medication.In Health Care computers can be used in some very interesting ways: Medical Records A patient’s medical history can be stored on a computer system. previous illnesses and any allergies that the patient may have. Patient’s scans and X-rays can also be stored in large computerised databases. together with case histories can also be stored in large databases. 10 . Billing information covering medication. New drugs are being developed all the time and information can be added to these databases on a regular basis to ensure Doctors have up to date information. Databases containing case histories can be analysed to help diagnose certain conditions.
Complex heart operations can now be carried out through a small incision in the patient’s chest. 11 . Geographical information systems can analyse traffic patterns helping to ensure that the ambulance uses the quickest route possible. ultrasound and MRI scans are computerised. for example during corrective eye surgery. Medical Equipment Life support systems such as heart rate analysis and respiration equipment are controlled by computer. They help in the diagnosis of conditions such as stomach ulcers. Keyhole surgery takes this concept one step further. A tiny camera enables the surgeon to see exactly what is going on. Also many diagnostic tools such as blood pressure monitors. Doctors can then decide if surgery is required.Ambulance Control Systems Hospitals can use computerised control systems to allocated and track ambulances. At the scene of an accident paramedics can use a computerised medical database to help them decide on the appropriate treatment for a patient. Specialist Surgical Equipment Gastroscopes use tiny computer controlled cameras to really get a good look at what’s going on inside a patient’s body. Computer controlled lasers can be used to operate with great precision on very delicate areas.
w w w . Also. for providing VPTs facility to 66822 accessible. 2007. 2004.drik. undisputed and undisturbed uncovered villages having population more than 100 as per census 1991. Out of the awarded village. Bharat Sanchar Nigam Ltd (BSNL) has entered into an agreement with Universal Service Obligation Fund (USOF). DOT in November. a scheme is being launched by the government to provide support for the provision of mobile services. to the ICT world in particular." This is the crux of the message that India's new Communications and Information Technology Minister Andimuthu Raja sought convey to the people of the country. 2007. Out of total 607491 villages in the country. BSNL has provided VPT facility to 46969 villages.net To provide the communication facilities to the people at the lowest ebb of the social order" is his prime objective and synchronizing this "his top priority area would be rural telephony. including WLL services. in specified 12 . which are planned to be provided with VPT facility progressively by November. 552824 villages have been provided Village Public Telephone (VPT) facility as on March 31.
In addition to this. was recently posted about the availability of new disruptive wireless broadband technology. such as Wi-MAX. The overall teledensity has increased to 18.02 million at the end of April 2007 as compared to 206.12 lakh villages are likely to be covered under this scheme.20 million now. The targets to be achieved under the broadband initiatives. fibre-home.rural and remote areas.31 in March 2007. Wi-Fi. 13 . In the wireless segment. Since the telecom sector is a growing sector. BSNL will aggressively roll out high speed broadband (like Wi-MAX) services and allow integration of multiple access technology like ADSL 2 +. 80 percent of the exchanges would be broadband by the end of 2007 and roll out of IPTV in major cities. VDSL 2. CDMA & WLL (F)) base is 171.15 million subscribers have been added in April 2007 while 3. the total number of telephone subscribers have reached 212.74 in April 2007 as compared to 18. as part of their action plan. The total wireless subscriber (GSM. 3G. TRAI. where there is no existing fixed or mobile services and is likely to be made operational by June. Wi-MAX. Total Broadband connections in the country have reached 2. broad strategy and action plans prepared by the BSNL and Mahanagar Telephone Nigam Limited (MTNL). According to indian telecom regulatory authority. The total number of existing ISP licencees is 382. India has set a target of providing 9 (nine) mn broadband connections by this year end and 20 mn connections by the end of 2010. that broadband coverage of all secondary and higher secondary schools. BSNL. It is envisaged under the action plan. 2008.53 million subscribers were added in March 2007. About 2.1000 blocks by wireless broadband by December 2007 and the remaining 5000 blocks by wireless broadband with USO support by June 2008 would be provided. 5. public health care centers and Village Panchayats would be provided by the year 2008. The Parliamentary Consultative Committee attached to his Ministry.83 million in March 2007. the minister assured the countrymen immediately after assuming the charge of his new portfolio.43 million by the end of April 2007. have envisaged to add an average of 5 lakh broadband connections per month from January 2008. By September 2007. all efforts required to maintain the growth tempo will continue.
Ministry of Environment and Forest (MoEF) and Government of India (GOI) have created an Environment Information 14 . A lot of techniques are used under IT for development and application of computational tools to acquire. analyze and visualize satellite data which is used for observation. 1 Role of IT in environment: a.CorDECT. Various software have been developed for environment and health care which are user friendly and help in better understanding for the topic. MTNL has envisaged a target of providing one million broadband connections by the end of this year and addition of an average one lakh connections per month from January. Information technology is one of the fastest growing recent technology. b. etc. and protection of environment Due to the development of the internet and information through the satellites a wide database is generated which is the collection of various interrelated articles. store. 2008. Remote Sensing and GIS (Geographic Information System) provides data and knowledge concerning the global environment as it is used for mapping and monitoring various natural resources. The focus will be to provide multi-play instead of triple play. As a part of the strategy. It has also decided to stren Its IPTV services which have been recently rolled out fully in Mumbai and in Delhi.
treatment. epidemic and communicable diseases. IT is used for testing of DNA. nursing and medical education 2. politics or culture. With the help of Remote Sensing and GIS there is identification of several infested areas which are prone to some diseases like malaria etc. diagnosis. 15 . Medical records and finger prints which are used by investigating agencies to identify missing persons and criminal 3. Role of IT in in human health e.IT can be used for audio. collaborate and coordinate.System (ENVIS). economics. d. creating DNA database and genetic information about population. Development of internet facilities. It enables environmental scientists and researchers around the world to communicate. based upon mapping of such areas 4. storage which work towards boosting the relationship between trade and environment c. IT is used for computer based modeling and simulation of environmental scenarios for analysis and prediction. worldwide web. Information technology has tremendous potential in the field of environment education and health as in any other field like business. visual and data communications for medical consultation. IT helps in spreading awareness about endemic. Different ENVIS centers are set up in different organizations for information collection.
• Design custom queries to display data. It was previously known as Microsoft Access. • Import and export data between Excel and Access. is a pseudo relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. sort data. • Enter and edit records in a table. • Define fields and field properties constructing table structures. 16 . It is a member of the Microsoft Office suite of applications. yet easy to learn.Introduction to Microsoft Access 2003 Introduction and Objectives Microsoft Access 2003 is a powerful. included in the Professional and higher editions or sold separately. emphasis will be on basic and frequently-used features. • Find. such as the creation of tables and queries. In late 2009. This tutorial is designed for users who are new or only have little experience using Access 2003. or importing spreadsheet into Access. The current versions are Microsoft Office Access 2007 for Windows. This tutorial does not cover all of the features and functions of Microsoft Access 2003. Microsoft released the beta version of Microsoft Access 2010. It introduces fundamental database concepts and operations and illustrates how they are performed in Microsoft Access 2003. relational database application for Microsoft Windows. Objectives By using Access 2003 following can be done: • Launch Access and identify the parts of the screen.
stored procedures. forms and reports. It can perform heterogeneous joins between data sets stored across different platforms. or transaction logging. editing. Access is often used by people downloading data from enterprise level databases for manipulation. data is stored in tables made up of one or more fields (Access calls a column a field). analysis. and reporting locally. Relational Database: in relational databases such as Access. and connect them together with macros. querying. This allows the existing data to change and the Access platform to always use the latest data. queries. It also has the ability to link to data in its existing location and use it for viewing. Microsoft Access does not implement database triggers. and reporting.Features: Users can create tables. The data stored in each 17 . Microsoft Access is a file server-based database. Unlike client–server relational database management systems (RDBMS). Definitions These words are used often in Access so you will want to become familiar with them before using the program and this tutorial.
Although either type of program can do many. the foundation of all relational databases function both independently and interdependently with other tables to allow the 18 . The areas within the worksheet where the rows and columns intersect are called cells. Tables.column must be of a single data type such as Character. employee names. Record: a record in a row in a table and is a set of values defined by fields. For example. a mailing list table might include fields for first name. Access vs. edit. Different tables can have the same column in common. Excel spreadsheets store data in rows and columns called worksheets. address. Datasheet View: it allows you to update. calculations. Number or Date. have evolved to have similar functions. it is made up of one of more fields. Values appearing in column A in one table are shared with another table Table: tables are the main units of data storage in a database. Access stores data in tables that look similar to worksheets but function quite differently. there are some things which are easier in one program than the other. state. This feature is used to explicitly specify a relationship between two tables. A table is a collection of data about a specific topic. of the things that the other one does. Number or Date. etc. Primary Key: a primary key is a value that can be used to identify a unique record in a table. but not all. A field only has one data type. Excel Access databases and Excel spreadsheets although originally very different. Design View: it provides the tools for creating fields in a table. and telephone number. and delete in formation from a table. such as Character. Data type: data types are the properties of each field. Excel is not database management systems. last name. each record would contain the data for one person as specified by the intersecting fields. Field: a field is a column in a table and defines a data type for a set of values in a table. financial data. A collection of values from each column of a table is called a record or a row in the table. city. zip code. The most common use of spreadsheets is to manage basic information such as telephone numbers. In a mailing list table.
After opening Access. you will be presented with the window shown in Figure 1. you can either go to File—Open. 3. Click on the START button on your computer and position your cursor over the PROGRAMS menu to view a list of installed programs. position the cursor over Microsoft Office and then click on Microsoft Access. or move your cursor to the lower right-hand side to click on Open. Starting Access and Opening a Database 1. 2.database user to combine data from multiple sources and analyze and/or report information in almost limitless ways The Access Interface This section introduces the Access interface and discusses how to use menus and tools bars. 19 . If you want to edit an existing database. create databases and switch between database components. Once you see the list.
or move your cursor to the lower right-hand side to click on Create a new file.4. and Power Point presentations. In the New Database dialog box.If you are creating a new database. You will be presented with five options on the right side mens as shown in Fig2 5. type in a name for the database and a location and click on Create as shown in Figure 3. Unlike Word documents. you must save an Access database before you start working on it. you will first be prompted to specify a location and name for the database. you can also either go to File— New. After selecting "Blank database". Excel spreadsheets. 20 .
B)Queries Queries are basically questions about the data in a database.Now a new data shown in fig-4 7. Each component listed is called an object. rather than a table. A query consists of specifications indicating which fields.6. This tutorial will focus on the first two objects: tables and queries. Listed below are the names and descriptions of the different objects you can use in Access. records. A)Tables Tables are where the actual data is defined and entered. People generally prefer to enter data into a well-designed form.Database Components An Access database consists of several different components. you can create a data entry form that looks exactly like a paper form. C)Forms Forms are designed to ease the data entry process. For example. 21 . and summaries you want to see from a database. Queries allow you to extract data based on the criteria you define. Tables consist of records (rows) and fields (columns).
Building Database Tables This section describes how to construct data tables. This is the most common way of creating a table and is explained in detail below. This data is stored in a Microsoft Access database or a Microsoft SQL Server database. • Create table by using wizard will step you through the creation of a table. you can run a macro that prints a report when a user clicks a command button. Access even has a wizard to help produce mailing labels. enter and edit data.D) Reports When you want to print records from your database. • Create Table in Design view will allow you to create the fields of the table. you will find Access provides three ways to create a table for which there are icons in the Database window. and find records that meet certain conditions. E)Pages A data access page is a special type of Web page designed for viewing and working with data from the Internet or an intranet. 22 . F)Macros A macro is a set of one or more actions that each performs a particular operation. It allows you to define the fields in the table before adding any data to the datasheet. Macros can help you automate common tasks. For example. G)Modules A module is a collection of Visual Basic for Applications declarations and procedures that are stored together as a unit. design a report. sort records. such as opening a form or printing a report. A)Creating Tables in Design View 1. By clicking the Table tab on the left hand side. • Create table by entering data will give you a blank datasheet with unlabelled columns that looks much like an Excel worksheet.
specify the name of the field. 23 . Double clicking on Create table in Design view displays the Table Design screen where you define fields for your table. and any description needed to determine what data the field contains.2. the type of data. data type. Every table consists of fields. For each field. and an option description of the field and a bottom pane for specifying field properties. 3. You can select the data type from the drop-down list in the Data Type column as shown in Figure 6. The screen is divided into two parts: a top pane for entering the field name. Pressing the Tab key moves the cursor from one column to the next in the Table Design screen.
Notice that the new Book_Info table appears below the Table tab 24 . This will close the Design View for the table and display the Access main screen. Switch back to the Access main screen by pulling down the File menu and choosing Close.4At this point. the new table has been created and saved.
A black triangle will appear to indicate the field is selected. You can also move fields in the table design. queries or reports. If you need to delete a field. Cautions to Modifying your Table Design Structure • Backup your table before you make any modifications to it. • Deleting a field will delete the records in the field. select the row containing the field and choose ―Delete Row‖ from the Edit menu. drag the field to the new location. • Renaming a field will have the same effect on a table as deleting the field. Select the field you want to move by clicking on its row. select the row you want to insert above and choose ―Row‖ from the Insert menu.If you delete a field and that field is used in any of your forms. • Resizing a field (making it smaller) may truncate the data in your forms or reports. 25 .Adding and Deleting Fields to Tables Even the best planned database will sometimes require you to add or delete a field in the Design View. you must also delete that field from these other documents. Then. •. To add a new field.
After you have defined fields in the table. simply click the mouse in the field you want to enter and type a value. To enter data. you can enter data. 26 .Entering and Editing Data 1. choose Open from the database window menu bar. This displays a grid with field names across the top and a row for each record of the database as shown in Fig 2. Press the Tab key to move from field to field. pressing the Tab key automatically creates a new record for you. When you are in the last field of a record. Highlight the table.
Type the search string in the Find What box and click Find First. Use the Datasheet View to add. The table in Figure 12 is shown in Datasheet View. pull down the File menu and choose Save. Fortunately. and move records 4.3. Sorting and Finding Records Two of the most common database tasks are sorting records and searching for records that meet a particular condition. From the Records menu select Quick Sort then choose either Ascending or Descending order. 27 . select the field you want to sort. both of these operations are easy to perform while viewing the table datasheet.delete.To save the new data. Finding Records If you want to locate a record that contains a certain name or date use the Find command on the Edit menu. Access will highlight the first record that contains the search string. Access quickly sorts the records by the selected field. Sorting Records To sort records by a particular field.
you can use the Count function in the query design grid. In Access.Functions of MS Access:A)Count Function In Access. Count(Item) AS Quantity FROM Antiques GROUP BY SellerID 28 . It is used in conjunction with the Group By clause. the Count function calculates the number of records in a select query. SELECT SellerID. in an SQL statement in SQL view of the Query window. or in an SQL statement within Visual Basic code.
B)Max Function In Access. This query would return the maximum UnitsInStock for each ProductName 29 . SQL/Queries You can use the Max function in a query by clicking on the Totals button in the toolbar (This is the button with the summation symbol). The Max function is used in conjunction with the Group By clause. It can be a field or a formula that evaluates to a numeric expression. the Max function returns the maximum value in a set of numeric values in a select query. The syntax for the Max function is: Max( expression )expression is a numeric value.
Min Function In Access. 30 . the Min function returns the minimum value in a set of numeric values in a select query. It can be a field or a formula that evaluates to a numeric expression. The Min function is used in conjunction with the Group By clause. SQL/Queries You can use the Min function in a query by clicking on the Totals button in the toolbar (This is the button with the summation symbol). The syntax for the Min function is: Min ( expression ) expression is a numeric value.
Avg Function In Access. SQL/Queries You can use the Avg function in a query by clicking on the Totals button in the toolbar (This is the button with the summation symbol). the Avg function returns the average (arithmetic mean) of a set of numeric values in a select query. It can be a field or a formula that evaluates to a numeric expression. This query would return the average UnitPrice by ProductName 31 . The Avg function is used in conjunction with the Group By clause. The syntax for the Avg function is: Avg ( expression ) expression is a numeric value.
the Sum function returns the sum of a set of numeric values in a select query. All these are the main functions of MS Access .It can be a field or a formula that evaluates to a numeric express SQL/Queries You can use the Sum function in a query by clicking on the Totals button in the toolbar (This is the button with the summation symbol).Sum Function In Access. The syntax for the Sum function is: Sum ( expression ) expression is a numeric value. These can generally be used in either VBA code & SQL/Queries 32 . The Sum function is used in conjunction with the Group By clauseion This query would return the sum of all UnitsInStock by ProductName.
The concept was supported 33 . ads. One to One also referred to the business movement during Web 1. publicly. which may be considered a part of a many-to-many communication system).. this can be done by e-mail but the most typical one-to-one communication in the Internet is instant messaging as it does not consider many-to-many communication such as a chat room as an essential part of its scope (however.0 which leveraged database technology for targeting products.0 and (for large-business applications) Enterprise 2. as well as respond to messages from others. service-oriented design and the ability to upload data and media. Often there is a steady stream of people entering and leaving. In Internet terms. Some the main information services are as under :Internet chats Internet Relay Chat (IRC) and other online chat technologies allow users to join chat rooms and communicate with many people at once. you may type messages that everyone else in the room can read. you are generally free to invite others online to join you in that room. Users may join a pre-existing chat room or create a new one about any topic. Instant messaging facilitates both one-to-one (communication) and many-to-many interaction. One-to-one in communication is the act of an individual communicating with another. media sites like Flickr and YouTube as well as commercial sites like Amazon. and services to specific users with particular profile attributes. this may be disputed as instant messaging includes announcing presence information. Many of these applications share characteristics like open APIs. The terms Web 2. Whether you are in another person's chat room or one you've created yourself.0 are also used to describe this style of software. This computer-mediated communication has become very popular with social sites like MySpace and Facebook.com and eBay. Once inside. Communication services encompasses a range of software systems that allow users to interact and share data.
One-to-many (also known as "to-many") relationships are often used when managing databases. 34 . blogs. A one-to-many relationship occurs when one entity is related to many occurrences in another entity. a new set of Internet applications enable:people to both contribute and receive information. and the definition of "many" will go well beyond people to include entities such as organizations.by technologies such as BroadVision. For example. FTP. they will be able to connect and communicate dynamically within a flexibly formed scope. This kind of Internet application shows the beginning of the "many-to-many" paradigm.It is the third of three major Internet computing paradigms. Amazon is a classic example of a company that performs "One to One Marketing" by offering users targeted offers and related products. events. Wiki. The early Internet applications of e-mail. one club has many members. ATG. products. With the evolution to the full "many-to-many" computing paradigm. one can display information on a website that is accessible by many others. and tagging. information elements can be interlinked across different websites. and BEA. and Telnet are characterized as "one-to-one" because they are primarily communication means from one individual (or computer) to another. With developments such as file sharing. With the advent of the World Wide Web. people can input and receive information to and from the Internet. concepts and so on. Many-to-many is a term that describes a communication paradigm and an associated media form. processes. there will be no artificial boundary between information and communication tools. Thus we have the second paradigm one-to-many. one-to-many is the act of publishing or broadcasting from one sender to many receivers. One-to-many In communication.
is a wireless telecommunications technology. providing multiple paths from a single location to multiple locations. Video conferencing It is an other communication service used in daily life 35 . Multichannel Multipoint Distribution Business Radio Service (BRS) formerly known as Multichannel Multipoint Distribution Service (MMDS). Point-to-multipoint telecommunications is most typically (2003) used in wireless Internet and IP Telephony via gigahertz radio frequencies. A central antenna or antenna array broadcasts to several receiving antennas and the system uses a form of Time-division Multiplexing to allow for the backchannel traffic. P2MP systems have been designed both as single and bi-directional systems. used for general-purpose broadband networking. also known as Wireless Cable.Point-to-multipoint communication is a term that is used in the telecommunications field which refers to communication which is accomplished via a specific and distinct type of multipoint connection.
The company provides sales. TANDBERG designs. 36 .323.From screen-based video communication systems to products that transform and enhance your existing communication environments. TANDBERG offers the broadest product range in the industry. Our video solutions are built to connect easily and seamlessly. you'll find a solution to meet your needs. video systems and network infrastructure . Our supporting infrastructure is designed around the need for integration. not the device TANDBERG It is a leading global provider of telepresence.Video Conferencing Systems . voice and data. you can reach the person. you can communicate face-to-face and increase your productivity with video desktop appliances and PC video conferencing systems. Video Communication Server The bridges the gap between SIP and H. With innovative video call forwarding capabilities. high-definition video conferencing and mobile video products and services with dual headquarters in New York and Norway. plus a suite of services to allow for easy execution.Because one size does not fit all. Desktop Video Conferencing Without leaving your chair. support and value-added services in more than 90 countries worldwide. Total Telepresence The TANDBERG Total Telepresence solution incorporates innovative technology for crystal clear video and sound. Interoperability When you choose open standards you are ensuring a scalable solution and protecting your video investment for the future. develops and markets systems and software for video. Telepresence solutions. integration capability.
Mobile Voice Conference The mobile phone has introduced many people to speech technology in a ―friendly‖ opt-in environment. These assume the capabilities provided by Voxeo's freely-licensed Prophecy server.g. See the notes below. If you're using Voxeo's Prophecy. which is released in two parts: the "vcm-prophecy" package and the "push2web" package. A web page shows the current status of the calls. Some of the capabilities are a bit old at this point. you'll want to download and use these packages. a "clerk" dials a telephone number. free directory assistance and voice control 38 . After the clerk is done — and the clerk may hang up at this point — the VCM calls each person who's supposed to participate in the call and adds them to the call. e. This branch can also be used on any system that provides similar capabilities (PHP is required. which is released on the download page as the plain "vcm" package. and if you want web-based monitoring. The other branch of VCM is the Prophecy branch. which provides a complete SIP/CCXML/VoiceXML/TTS solution. you'll also need Java servlets as provided by Jetty or Tomcat). It's a gzip'd tar file. Choice of Two Packages VCM has two different branches. the Prophecy Branch page and the push2web documentation. Voice Conference Manager uses speech recognition and text-to-speech to ask the clerk the names or phone numbers of people to place into the conference..How to Use Voice Conference Manager To start a conference call. and while it can monitor phone calls it cannot control them. The main branch. is for any VoiceXML/CCXML system.
Mobile phones are not small PCs.Advertising can finance some innovative applications and contact center upgrades.This paradigm shift in familiarity is creating new acceptance and confidence in user interface innovation that opens the door for more applications . with expectations of similarly friendly speech interaction—will contact centers become multipurpose ―voice sites‖? . as advertisers realize that speech applications are more natural to the mobile phone than web surfing (and voice applications work on every phone) . and others—add to the increasing impact speech technology will have on users. speaker authentication. 39 . Their small size and need for a hands-free option mandates a speech option.Contact centers will get more traffic from mobile phones.Variations on speech technology—audio search.of the phone .Speech recognition and other speech technologies demonstrably have crossed new thresholds of usability—technology is no longer the barrier. . .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.