Download System Flow Diagram - E

Document related concepts
no text concepts found
Transcript
STUDY MATERIAL
Subject
:
Introduction To Information Technology
HARDWARE AND SOFTWARE:
Hardware:
The physical and tangible components which are seen and touched in a
computer such as electrical and electronic units are known as hardware of the
computer. That is input units, Output units, CPU and Backing storage are called
Hardware.
Input devices – Keyboard, Mouse, Joystick, Lightpen etc
Output Devices – Visual Display Unit(VDU), Printer etc
Secondary storage units – Magnetic Disk ,Magnetic Tape, Floppy Disk Drive
etc
Software :
A computer is directed to perform input, arithmetic, logical, output and
storage operations by a series of instructions called a computer program. A
computer program specifies what operations are to be performed and the
sequence in which they are to be performed. The program should be in the main
memory for its execution. Computer programs are commonly referred to as
‘computer software’.
Software activates the hardware. Software is developed by human thinking
whereas the hardware is developed by the technological improvement.
Generally software means all the computer programs associated with a computer
system like compiler, assembler etc..
Computer software can be broadly classified as:
 Application Software
 System Software
The application software refers to a collection of programs meant for a
specified application.
Eg: programs for Payroll, Inventory etc.,
System Software deals with programs concerned with the system
Eg: Assembler, Compiler, Linker etc.,
COMPUTER SYSTEMS:
Definition:
Computer is an electronic data processing (EDP) device, which accept data
from the keyboard, process the data as per instructions given and produces the
output.
Characteristics/Advantages of Computers:
(1) Speed:
A computer is a very fast device that can perform an amount of
work that human being can do in months. Since all operations of the computer
are fast , they can perform large number of operations in a second. The
processing speed of the computer is measured by nano seconds(1 nano sec is 1
billion of a second)
Small computers take a few micro seconds to execute an operation.
Whereas large computer takes only few nano seconds for the same operation.
(2) Accuracy:
The next very important characteristic of a computer is its
accuracy. It is estimated that a human being commits at least one error for
every thousand operations but computers do millions of operations in a second
committing no errors. If the output is not correct then it is not the computer’s
mistake, it is due to the input error, if the data and instructions are given
correctly to the computer it will give accurate information.
(3) Memory Capacity:
It can store large amount of data and information, which is
expressed in terms of Kilobytes. This memory capacity can be increased by
using secondary storage devices such as floppy disk, optical disk etc..
Bit
-> 0,1
1 byte ->8 bits
1 KB ->1024 byte
1 MB ->1024 KB
1 GB ->1024 MB
1 TB ->1024 GB
(4) Automation:
The computers execute the program completely without human
instruction until completion. If we want to repeat the same process for another
set of data there is no need to feed the program once again but we have to give
execution command once again.
(5) Versatile :
Computer is a versatile machine and is capable of solving any
problem and can be applied to all sorts of business and other activities.
Example:
Computers are used in banks, education, preparing electric bills, telephone
bills, reservations etc.
(6) Diligence:
Computer being a machine wont suffer from tiredness and lack
of concentration. The computers can work for hours together but a human
being becomes tired after a certain time.
Disadvantages:
(1) The intelligence of the computer is zero. Computer is an obedient servant
to its master and work according to his command.
(2) The computers will not correct logical errors.
(3) Lacks commonsense
(4) It has to depend upon programmer’s instructions.
DATA AND INFORMATION
Data:
The word data is plural form of DATUM, which means raw fact (ie.)
collection of facts is said to be data. The data is a name given to basic fact such as
names and numbers. Data may be numeric such as date, price, weight, number of
items sold, students marks etc., Data may be non-numeric such as customer
names, student names, addresses, product names etc.,
Information:
The processed data is called INFORMATION (ie.)when data is connected
into meaningful results it becomes information.
1,2
Raw data
1+2
Processed
3
Information
Difference between Data and Information

one.



Data
Information
Raw Fact
Finished meaningful
Unprocessed
Unstructured
What exists
Processed
Structured
What required.
DATA PROCESSING:
Data Processing means conversion of data into meaningful
information ie.Data processing means calculating or manipulating data. The mere
data cannot solve problems so the data is arranged by the computer to produce
meaningful information.
Processor:
Processor is a hardware device, which is used to process the data. There
are different types of processors namely 80286, 80386,80486, Pentium series etc.
Data Processing Cycle:
Source
documents
Input
Storage
Device
Processing
Output
Preparation of source documents.
(1)
Input of data
(2)
Manipulation of data
(3)
Output of information
(4)
Storage of data
Source documents:
The first step is to obtain the relevant facts and figures and to set
these out on source documents. For example , in a population survey, the name ,
address, age, sex, occupation, etc., must be first written down onto a survey
sheet or some other document. These documents may be so designed that
information is recorded in the same structure as the data required by the
computer program.
Input:
Once the data has been extracted from the source document, it must
be supplied to the computer through input devices like keyboard etc.,
Data Manipulation:
This includes all the operation performed on the raw data. It can do
arithmetic operations like addition , subtraction, multiplication and division on
the data. It can compare the data whether it is greater than or less than or equal
to by using relational operator(<,>,=). It can also carry out logical operations by
using(and,or,not).
For example, in the population survey, we may want to classify people by
occupation or age.
Output of Information:
The objective of outputting results is to provide meaningful
information to managers, accountants, population survey analysts etc.
Careful consideration should be given to the presentation of results so that they
can be digested easily and quickly.
Data Storage:
In most cases, the results of processing one set of data are retained
for future use or reference. This means data processing installations require a
great deal of secondary storage space to store all the programs and the different
sets of data.
Types of Data Processing:
 Manual Data Processing
 Mechanical Data Processing
 Electronic Data Processing
Manual Data Processing:
In manual data processing human being converts the data into
information. Mere data is processed using manual operations.
Mechanical Data Processing:
In mechanical data processing , a person uses various machines to
get the work done. Eg: calculators, tabulators etc. This method has both
human interaction and machine operation.
Electronic Data Processing:
In electronic data processing the data is processed by the computer.
DATA STORAGE:
Retaining data for future reference is said to be data storage. The data and
instruction that are entered into the computer system through input units have to
be stored inside the computer before the actual processing starts. The results
produced by the computer after processing must also be kept inside the computer
before passing to the output units. The intermediate results are also stored inside
the
computer. Thus the functions of storage units are to hold
 All the data to be processed.
 Intermediate results.
 Final results after processing.
The data stored in a location called memory referred by its address. There are
two classes of memory called main memory and secondary memory. When the
data is stored outside the processing unit it is called as external storage or
secondary storage or auxillary storage.
Example: hard disk,magnetic tape, magnetic disk, floppy disk etc.
The secondary storage is needed because the size of the main memory is limited.
When the data is stored inside the processing unit , it is called as internal storage
or main memory or primary memory.
Example: RAM
Difference between main memory and secondary memory
Main memory





Data cannot be kept for long time.
time
Memory size is small.
Expensive
An integral part of the computer.
system
Not transportable
Secondary memory
Data can be kept for long
Memory size is large
Not expensive
Not an integral part of the
Transportable
Types of Main Memory:


RAM(Random Access Memory)
ROM(Read Only Memory)
RAM:
Random Access Memory is also called as Read/Write memory. The main
memory of the computer is made up of RAM chip. Data can be written into a
RAM chip and be read. It can also be erased and re-written. When the power is off
any information stored in the memory is lost.
ROM:
Information can be written into ROM chip only once. Once written, it
cannot be altered and no fresh information can be written into the memory. When
the power is off the data stored inside the ROM will not be lost.
ROM can be classified into:


PROM(Programmable Read Only Memory)
EPROM(Erasable Programmable Read Only Memory)
PROM:
The ROM chips are supplied by the computer manufacturer while
purchasing the computer system. It is not possible for a computer user to modify
the program stored inside the ROM chips. But it is possible for the user to store
his own program in PROM chip. Again once it is programmed, recorded
information cannot be changed.
EPROM:
Once the information is stored in ROM and PROM, it cannot be altered or
changed. To remove this problem EPROM was introduced. It is possible to erase
the program inside the chip using ultra-violet rays.
Difference between RAM and ROM:
RAM
ROM

The information is stored and retrieved
by the programmer’s choice
Constructed by the
manufacturer.
Information stored in
this memory cannot
be modified by the
programmer

Volatile memory(ie.Information will
memory.
be lost on power failure)
Non – Volatile

Used to store programs in execution.
like
Permanent functions
Sinx,cosx are stored.

Easiest to change
to
ROM’s are expensive
Change.
DATA RETRIEVAL:
Recovering or getting back stored data is called the data retrieval.
Data retrieving is a process of searching or locating a data item from the storage.
The data can be retrieved from the storage device in sequential mode, indexed
mode, and random mode.
Sequential Storage and Retrieval:
Each record is stored on the tape or disk one after another, and the
data is retrieved in the same sequence as they are stored. For example: the file
having student details, records are stored in sequence by social security
number.The data in the file is retrieved one record after another and processed in
the same sequence as it is stored in the file. In most cases, when sequential
retrieval is used, the data is stored in some defined sequence based upon a value
in record(called a key), such as social security number in this example.
Disadvantage:
Sequential retrieval has a major disadvantage – since records are
retrieved one after another in the same sequence as they are stored, the only way
to retrieve the third record is to read the two preceding records first. Because of
this, sequential retrieval is never used when fast access to a record is required.
Instead, sequential retrieval is used when records are processed one after
another, such as when creating printed reports.
Random or Direct Access Retrieval:
Data stored on magnetic disk can be randomly retrieved, which
means records can be retrieved regardless of the order in which they are
physically stored. Random retrieval can be used when fast access to a record is
required.
In most cases, records are randomly retrieved based upon a value
within the record itself. To illustrate this, sample records containing an account
number, customer name, and the account balance are stored on disk. When a
customer with account number 124 wants to know his balance, the application
requires that the program be able to immediately retrieve the data. Sequential
retrieval would not work here.
A request is made to the system for the balance in account number
124. The record associated with the account number will be directly retrieved
and brought into main memory. From there the program can display the balance
on the CRT screen. This ability to randomly access records based upon a value
in the record is very important. In this example the record is accessed based
upon the account number stored in the world.
Indexed Mode Retrieval:
The indexed mode combines both sequential and random mode of
processing. For example: A file has 2000 records, in that file 1220 to 1250
records have to be retrieved. The computer will locate the record number 1220
randomly and access the records up to 1250 sequentially. The online data
storage and retrieval is very useful for the functioning of modern business. The
online device means those devices that are directly connected to the CPU.
IMPORTANCE OF COMPUTER IN BUSINESS:
In the modern business world, it is not unusual for the computer to be used
by management personnel at all levels to aid in decision making; by office
workers in all departments for automating the tasks of preparing documents,
filling documents, retrieving data, and communicating information to others
throughout the company and by personnel in the manufacturing and production
departments for tasks varying from automated assembly by computerized robots
to controlling shipping and warehouse scheduling. Most jobs in modern
companies require some knowledge and use of computers.
The needs of the computer user fall into three broad categories:
 Information Management
 Management Support
 Function Support
Information Management refers to the task of managing and controlling the data
and information required within an organization for that organization to function.
Management support consists of those activities carried out within a company to
supply management personnel with information on which decisions can be made
and action taken. Systems that provide management support are sometimes known
as Decision Support System.
Function support refers to the use of the computer by people to perform their jobs
faster;more efficiently, and with less cost to the company.
Three ways, in which individuals can meet their information management,
management support and function support are
(1) Uses of Personal Computers
Personal computers are widely used in the business environment by
personnel at all levels. Personal computers are often used in conjunction
with specialized software packages that have gained almost universal
acceptance.
These packages include:





Word Processing S/W – used to write letters, memos and other
documents.
Electronic Spreadsheets S/W-used for calculations using formulas
Computer Graphics S/W-transforms the series of numeric values
into a graphic form
Database and File Management S/W-allows user to access data at
any required form
Electronic main S/W-lets users to communicate with each other via
their personal computer network.
(2) Use of Information Centers
A second major way for users to obtain access to computing power
is
through the use of an information center. An information center is an
area within the information systems department that contains a number
of CRT terminals, hardcopy generators(usually printers), and perhaps a
smaller computer. These devices have direct access to a centralized
computer in the information systems department.
The major reason for an information
center is to give employees a simple,effective way to meet their own
departmental and individual information processing needs. This is
accomplished by providing computing power, training and access to
sophisticated software so users can generate their own reports and
develop their own applications. Thus, the information center provides
more sophisticated hardware and software than personal computers. The
information center’s main goal is to provide extensive computer
processing for computer users.
(3) Use of a Centralized Computer
When processing large volumes of data or when large databases
must be accessed by many users, a centralized computer is used.
Information from a centralized computer is commonly delivered by
printed reports or as output on a CRT terminal.
When a centralized computer is to be used for an application, a
formal process will usually followed to develop the application system.
Management and other personnel who will be using the system will be
involved with the professional staff of the information systems
department in the design and implementations of the system. This
process of design and implementations can be lengthy and difficult.
Once the system is designed, it can be used by all personnel who
are authorized to use it. In some applications, such as airline reservation
systems a centralized computer will be used because the speed and data
access available on a large, powerful computer are required by the
application. For example in a banking application thousands of accounts
must be accessible by hundreds of tellers and other bank employees. A
large computer is the only machine with the processing power to satisfy
the requirements of their applications.
COMPUTER RELATED JOBS IN S/W AND H/W INDUSTRY:
In the computer-related industry, numerous career opportunities in a wide
variety of areas are available. In Information systems departments, opportunities
can range from such diverse jobs as data entry operators to business or scientific
programmers. Those with an entrepreneurial flare will find opportunities in S/W
development, consulting and education . Many opportunities exist in both small
and large companies for those interested in pursuing a career in the information
processing industry.
 Computer Operations Personnel: Computer operations personnel are those
who are responsible for the day-to-day operations.
 Computer Operations Manager:The Computer operations manager is incharge of the entire operations such as ,responsible for hiring and
assigning the other operations personnel, establishing operations center
policies, planning the installation and removel of equipments and generally
doing all other activities to ensure the processed data is efficient.
 Computer Operators:Computer operators are the people running the
equipment in the computer center.Their job includes loading tapes and
disks, monitoring system performance and initiating solutions to
malfunctions.
 Data-Entry operators:Data entry personnel are the people who enter data
into the computer systems.
 System Librarians:System librarians are responsible for data stored offline
such as on tapes and disks , and to back-up copies of important programs
and data for future references.
 System Analyst:Systems analyst is responsible for analyzing, designing
and implementing large computer based information systems. Since they
are the interface among users, upper management and programmers, they
must be skilled in business, computer technology , interpersonal
communications and people.
 Programmers:Computer professionals who specifically write computer
programs are called as programmers. They are classified as application
programmers, maintenance programmers and system programmers.
Application programmers write application programs i.e., S/W that serves
the direct needs of end-users.Maintenance programmers maintain and
update application programs, and keep application programs running for
years after they were written.System Programmers write system S/W that
control the operation of computer H/W and make it possible to run
application programs.




Information Center Personnel: Information center is meant to help end
Users choose the decision support resources they need in order to perform
better, training users to use specific S/W package and to set standards for
the growth of personnel computing resources within the firm are some of
the other functions performed by information center personnel.
Management Information Systems Management(MIS):They are
responsible for full range of MIS related activities such as transaction
processing , telecommunications, data administration and ebd-user
support.
In many organizations a ‘data processing director’ is responsible for all
personnel involved with the company’s major transaction processing
applications.
Database Administrator: They are usually responsible for ensuring both
the integrity and security of the data in the database.
Telecommunications Managers and Network Managers are responsible for
meeting the data communication needs of users in the organization.
Hardware Industry
Today the hardware portion of the information processing industry
includes personal computer manufacturers, small business computer
manufacturers, mini computer and mainframe manufacturers, and
manufacturers of peripheral devices including computer terminals, disk
drivers and printers. Data communication equipment ,office automation
equipment, and computer assisted manufacturing hardware are an
important part of the information processing industry .
Additional jobs may be found working for computer manufacturers
,s/w companies , service and supplies companies, and retail computer h/w
and s/w stores etc. These jobs include Sales Representatives after
comprehensive training by the company; call upon the prospective
customers with the intent of selling them the hardware.Systems engineer is
a term used by some companies to describe individuals eho are technical
specialists and serve as consultants to customers.
COMPUTER APPLICATIONS IN BUSINESS








Payroll and personnel records
Office Automation
Word processing
Desktop publishing
Electronic office
Stock control and sales
Banking
Insurance and stockbroking
OBJECTIVE QUESTIONS
1. Printed copy of a data is called
(a)Carbon Copy (b)Duplicate copy (c)Hard copy (d)none of the
above
2. Primary storage is
(a)A part of CPU
(b)requires very fast access data
(c)Relatively expensive
(d)None of the above
3. Pick out the most powerful computer
(a) Supercomputer (b)Micro computer (c)Mainframe computer
(d)Mini Computer
4. A collection of eight bits is called
(a) Byte (b)Word (c)record (d)file
(b)
5 ._______________ is the product of data processing
(a) Data (b) Information (c) Software (d) None of the above
6.
In computer technology, information means
(a)Raw data
(b)Data in meaningful form
© Alphanumeric data
(d) Program
7.
A factor which would strongly influence a business person to adopt a
Computer is its
(a)Accuracy (b)reliability (c) Speed (d) all of the above
SHORT ANSWER QUESTIONS:
1.
2.
3.
4.
5.
6.
7.
Define Data and Information.
What is Data Processing?
What are the differences between Data and Information.?
Define ROM,PROM, and EPROM.
What is the difference between main memory and auxillary memory?
What is data retrieval?
Differentiate RAM and ROM?
LONG ANSWER QUESTIONS:
1.
2.
3.
4.
5.
Explain Data processing and its types
Define data retrieval and explain various data retrieval techniques.
Explain data storage
Explain the importance of computers.
Describe various computer related jobs in software and hardware
industry
Components of Computer System:
Input Unit:
Data and the programs are entered into the computer through these
devices. The computer accepts the data to be processed and the instructional
details required for processing. When the data and instructions are entered into the
input unit they are passed to the memory unit of the CPU. Various input devices
are available in this regard. Some of the important input devices are given below:
1. Punched Card Reader.
2. Punched Tape Reader
3. Magnetic Tape
4. Cassette Tape
5. Magnetic Disk
6. Floppy Disk
7. Electronic Key Board
8. Magnetic Ink Character Reader
9. Optical Character Reader
10. Optical Mark Reader
11. Bar Code Reader
12. Visual Display Unit
13. Light Pen
14. Mouse
15. Joystick
16. Touch Screen
17. Microphone (voice input)
Punched Cards:
Punched cards are still in use as medium for recording data and
instructions in the form of punched holes to denote and then they are sequentially
read by the card reader. The card reader sends the data and instructions to the CPU
to process them.
The punched cards used for data processing are made generally of 80
columns and 12 rows. Today 96 columns cards are available. In these cards a hole
is punched to represent the binary 1. The absence of a hole represent binary 0. If a
card is punched wrongly it cannot be corrected, further the punched cards are not
reusable, i.e., cannot be used for any other data. Many numbers of cards are
required for the computer programs. Such a collection of card is called a deck.
Each card has the left top corner cut to identify the arrangement of the cards is
correct or not.
The cards are read by a unit called card reader. The punched cards are
placed in the Reader Hopper after verification. On receiving the command from
the control unit the devices move the cards one by one over two sub-devices. One
of which, senses the punched holes (0s and 1s) and transcribes the pulses to the
CPU. The output is given as per user specification.
Advantages:
1. It is very easy to read data on the cards.
2. The cards are less expensive than other storage media.
3. It is much simple to operate
4. After inserting a card, if an error is detected the whole system stops
functioning.
Disadvantages:
1. Punched cards are bulky when put together, so they require large space to
store
them.
2. The cards are easily damaged and perishable
3. Transfer of data is relatively very slow
4. An on correctly punched card cannot be corrected, it must be replaced.
5. Unit Record machines require manual intervention at every stage.
6. Data is not processed in ordinary language. It has to be translated into
something we can understand.
Paper Tapes:
The punched paper tape is a continuous strip of a paper about one inch
wide and up to 300 meters long. The characters are recorded on tape, which may
be 5 or 8 as per the design of the tape. These punched positions are called as
channels. It is the oldest media, of input and output media. Her also, a hole
represent 1 and its absence represents 0. Data from the tape is read through a Tape
Recorder per second. The tape comes in various forms viz. Oil paper, dry paper,
and metallised paper and laminated paper.
Advantages:
1. Compared to the punched card, it is more compact and economic on
storage.
2. It is less weight and easy for mailing etc.
Disadvantages:
1. Since the roll is so long, correcting or inserting data can be very tedious
process and time consuming.
2. The life of the paper tape is short. This makes it inconvenient for storing
over a long period. It is not durable.
3. Moreover, it is a sequential data processing medium.
Magnetic Tape:
Because of the problems faced in the paper media, magnetic substances
have come first among these was the magnetic tape. This is also a sequential
media for normally between 1.25-2 cms. Wide and up to 900 meters long. It is
made of plastic with a metallic magnetic oxide coating on one side. Generally,
data is recorded on either a 7 parallel-track-tape or on a 9 parallel-track-tape.
Writing on and reading from the tape is done with the assistance of
READ/WRITE head. The number of characters per inch length of tape stored is
called the ‘density’ of the tape. This varies from 550 to 1600 or even 16 k. the 9
Track tapes have the higher densities. Then comparing with the punched card and
punched tape, the magnetic tape has certain advantages and disadvantages.
Advantages:
1. Data are stored very compactly.
2. It is very easy to handle the Magnetic Tape than the Deck of Cards.
3. The Magnetic tape costs less than the cards.
4. It requires less storage space for data and therefore has a large capacity.
5. It is reusable i.e., the old data can be wiped out and fresh information
could be recorded on it.
6. The speed of transferring the data is very high comparing to paper devices.
Disadvantages:
1. In magnetic tapes, the data has to be accessed sequentially. This makes the
retrieval of data slow.
2. The punched cards can be read visually, whereas to read the magnetic tape
a machine is needed.
3. the tape is subject to the usual wear and tear of time.
4. Data will be erased if the tape is exposed or placed nearby any Magnetic
field or high voltage circuits.
Using these devices, the data are entered onto the computer to get
meaningful information. The most commonly used input devices are magnetic
disk, floppy disk, electronic keyboard, visual display unit and mouse.
Magnetic Disk:
It is a yet another step in the evolution of input/output devices. The magnetic disk
has an advantage over the punched cards and magnetic tapes i.e., the data stored
on a disk can be read randomly while in the magnetic tape, the data are read
sequentially. The Random access is that the particular record in a file can be
detected directly and the access time is saves. In magnetic disk the record is
accessed in a fraction of second i.e., less than 0.01 sec. The disks varying in
diameter are generally coated on both sides with magnetic oxide. Each surface of
the disk is divided into a number of sectors, called storage segments. The storage
segments is a specific portion of a specific side of the disk. A segment can store
one or more record of a file, which will vary according to the size of the record.
While searching, a particular record can randomly be selected and directly
accessed, because, each storage segment is uniquely marked by an address with
side number, track, sector number etc.
Advantages:
i) Direct access of data is possible. The data can be retrieved almost instantly.
ii) The disk is more durable than the tape. This reduces the chances of loosing
data.
iii) The storage capacity of the disk is large.
Disadvantages:
i) The disk come in packs and a disk pack is heavy. So, it is difficult to
transport disks.
ii) It requires more sophisticated hardware and operating systems than any of
the earlier mentioned input devices.
Floppy Disks:
In the early 1970’s IBM introduced a new medium for storing data. This
medium consists of a circular piece of thin plastic material, approximately 8
inches in diameter that is coated with an oxide material. The circular piece of
plastic called a disk is enclosed in a square protective jacket with a cut out so that
the magnetic surface is exposed. When inserted in the appropriate hardware
device, the disk is rotated inside the protective jacket, allowing keyed data or data
from main memory to be stored on the rotating disk. Once data is stored on the
disk, it can be read from the disk into main computer. This medium for input and
auxiliary storage called a floppy disk or disk.
Disks are available in a number of different sizes. Although the original disk
was of the size of 8 inches, most personal computers now a days use a disk 51/4
inches in diameter. Even smaller sized disk approximately 31/2 inches in diameter
are also available. Regardless of the size of the disk, the method of storing data is
essentially the same. Each disk is divided into concentric circles called tracks.
Each track is further divided into number of sectors. Data is stored on disk, in
tracks, the number of which varies from computer to computer. The most
commonly found configurations are 40 tracks, 72 tracks and 80 tracks.
To read data stored on disk or to store data on disk it is inserted in a disk drive.
The large center hole fits over a hub mechanism, which positions the disk in the
unit. The disk within the protective covering is rotated at approximately 300 to
600 revolutions per minute. To read or write data, a read/write head in the disk
drive rests on the surface of the rotating disk, sensing or generating electronic
impulses representing bits to be read or recorded. Characters are stored on a disk
as bytes in the same manner as they are stored in main computer memory. To read
data from the different tracks, the read/write head moves from track to track.
Disk drives and the related disks can provide storage capacities that vary from
approximately 1.2MB(1 MB=106) characters per disk. The number of characters
that can be stored on disk by a disk drive is dependent on the following 3 basic
factors.
1.The number of sides of the disk used:
The earlier disks and drives were designed so that data could be recorded
on only side of the disk. These drives were called single-sided drives. Now-adays disk drives are manufactured that can read and write data on both sides of
the disk. Such drives are called double-sided drives. The use of double sided
drives and disks approximately doubles the number of characters that can be
stored on the disk.
2.The recording density of the bits on a track:
The recording density refers to the number of bits that can be recorded on
a disk in 1-inch circumference of the innermost track on the disk. This
measurement is referred to as bits per inch (bpi). For the user, the disks are
identified as being either single density (SD) or double density (DD). A single
density drive can store 2768 bpi on the innermost track. Double density can
store 5876 bpi. With improved technology, it is anticipated that recording
densities in excess of 10000 bpi will be possible.
3.The numbers of tracks on the disk.
The number of tracks o
40 tracks on the surface of the disk. Other drives, however can record 80
tracks on the disk. These drives are sometimes called double track drives.
Depending on the number of sides used and the density, the floppies can
be grouped as follows:
SSSD-Single Sided Single Density
SSDD- Single Sided Double Density
DSSD- Double Sided Single Density
DSDD-Double Sided Double Density
DSHD- Double Sided High Density
Care required in using and storing a disk.
On receiving a new disk, it should be inspected for sign of obvious damage.
The surface of the disk should not be touched with hand or some sharp object.
Write-protect precaution should be observed by peeling off or sticking on (as
applicable) the aluminium square on the notch.
Direct data entry devices.
Direct data entry refers to entry of data directly into the computers through
machine-readable source documents or through use of on-line terminals. Direct
data entry does not require manual transcription of data from original paper
documents. There are two types of direct data entry devices, which is used for
direct data entry. First type of Direct Data Entry devices can scan source
documents magnetically or optically to capture data for direct data entry into the
computer. Magnetic ink character readers and optical character readers are
examples of such devices. The second type of direct data entry devices uses a
keyboard inclusive of terminals connected directly to a computer.
Scanner:
The scanner is an input device that is capable of recognizing text or
graphics on the input document. You can use a scanner to convert a photograph or
drawing into a computer file. After an image has been converted into a file, it can
be printed or used along with some other document. For instance, you can scan the
logo of a company in a graphics file. Later, you can print it at the top of letters.
Through generally not used with PCs, scanners are also used for the following
applications:
1. As barcode readers to identify a product
2. As magnetic –ink character recognizers to sort bank cheques.
3. As a optical mark readers(OMR) or optical character readers(OCR) to
automatically evaluate objectives type answer sheets.
Magnetic Ink Character Recognition (MICR)
An MICR can identify and decode characters printed with special ink that
contains particles of magnetic material. The reading process is called Magnetic
Ink Character Recognition. The major advantage of these characters is that they
are machine-readable, the process is faster and less-error prone when compared to
the previously discussed devices. Since MICR systems can recognize only certain
character styles, the characters have to be accurately formed.
MICR employs a system of printed characters, which are easily
decipherable by human beings as well as a machine reader. There is used special
printing font to represent characters. In this font, each character is basically
composed of vertical bars. The characters are printed in special ink which contains
a magnetizable material.
This method is primarily used in banking industry. And most cheques are
now processed under the MICR approach. The data printed across the bottom of a
blank cheque are recorded in MICR form: the characters represent the bank on
which the cheque is drawn, the customers account number and the amount of
cheque. The cheques themselves are prepared off-line. When they are originally
printed by a printing press, the MICR about the bank identification number, as
well as the data about the customers bank account number are printed
simultaneously. The cheques then are turned over to the proper bank customer for
use. Once the cheques have been cashed or deposited in bank, an operator uses an
off-line enclosing machine to encode, in magnetic ink, the amount on the cheque’s
bottom right side.
MICR data are used for input purposes. Unlike other media(floppy and magnetic
tape) MICR cannot be used for output purposes.
Advantages Of MICR:
i) MICR possesses a very high reading accuracy. Cheques may be smeared,
stamped, roughly handled yet they are accurately read.
ii) Cheques can be handled directly without transcribing them on floppy disk,
magnetic tape etc.
iii) Cheques can be read both by human beings and machines.
Disadvantages of MICR
i) MICR has not found much favour from business.
ii) Damaged documents, cheques not encoded with amount etc.., have still to be
clerically processed.
Optical Character Reader (OCR)
An OCR recognizes or interprets printed or handwritten data directly from
documents. The essence of OCR is pattern recognition, i.e. ability to identify a
recorded symbol as a familiar from. OCR devices are expensive and are used only
where the volume of the data to be fed into the computer is large.
OCR also employs a set of printing characters with standard font that can
be read by both human and machine readers. The machine reading is done by light
scanning techniques in which each character is illuminated by a light source and
the reflected image of the character is analyzed in term of the light-dark pattern
produced. Keyboard devices are used to give the required print quality. OCR has
the potential of reading even handwritten, typed or printed depends upon the type
of OCR being used.
Large volume billing applications (e.g.: bills of utility companies, credit
card organizations, and magazine subscription outfits) increasingly are being
adapted to OCR methods. The customer paying the bill returns the bill, which has
OCR data (e.g.: customer number and amount of the bill) recorded on it, along
with payment? Thus the billing organization’s bill (or the part returned by the
customer) becomes input for recording cash payments received from the
customer. This procedure, sometimes, referred to as the use of “turn-around
documents” has the advantage of minimizing or eliminating the keying process
when cash receipts are received from customers.
Advantages of OCR:
i) OCR eliminates the human effort of transcription.
ii) Paper work explosion can be handled because OCR is economical for a high
rate of input.
iii) Since documents have only to be typed or handwritten, not very skilled staff
(like the keypunch operators) is required.
iv) Furthermore, these input preparation devices (typewriters etc.) are much
cheaper than the keypunch or the key-to-tape devices.
Limitations Of OCR:
i) Rigid input requirements. These are usually specific requirements for type font
and size of characters to be used. In typing there is always the scope for stikeovers, uneven spacing, smudges and erases; and the form design, ink
specifications, paper quality, etc. become critical and have to be standardized.
A transaction is relatively high. However, further developments in OCR are likely
to make optical reader much cheaper.
OCR characters can be sent as input to the CPU. Also, printers can be used to
generate OCR output.
BAR CODE Reader:
Certain data like the product codes of groceries or books etc., can be
recorded or small strips optical reading is done by using printed ‘bar codes’ i.e.,
alternating lines and spaces which represent data in binary form. As the item
having the code is passed over the bar code reader, the reader automatically
decides the strips and passes the data to the computer.
A bar code is a set of parallel printed lines of varying thickness and
separation. These lines are normally alternate lines of black and white. They
represent a number which is sometimes written at the bottom or above the bar
code for the convenience of the human reader. The typical example of the barcode
can be seen on the back cover of books. Normally a barcode has on it number
code for the country of the goods origin, the manufacturer and also the item
number of that particular product.
The bar codes are useful because of the names of products do not have a
repeatedly written down. They are very much useful in places like supermarkets,
at the point of sale, libraries, hospitals, warehouses etc. however, the barcodes
having the disadvantage of being read only by a machine.
Optical Mark Reader (OMR)
Optical marks are commonly used for scoring tests. It is marked by the
person taking the test and can be read by the optical mark page reader. The optical
mark reader when on-line to the computer systems, can read upto 2,000
documents per hour seemingly this rate is slow but the fact that transcription has
been eliminated, the overall time is less than those of the conventional file media.
OMR can also be used for such applications as order writing, payroll,
inventory control, insurance, questionnaires, etc. however, it is to be noted that
designing the documents for OMR is rather a tough task. They should be simple to
understand otherwise errors may result more perhaps than would occur in using
traditional source documents and keypunching form them.
KEYBOARD:
The keyboard is the most commonly used and most versatile of all input devices,
the keyboard layout is similar to that of a typewriters’ with some additional keys.
A keyboard may have 83,84 or 104 keys. Whenever a key is pressed the electrical
contacts and circuits just below the key translate the message from the key into
equivalent binary codes.
The keyboard is divided into three parts-The main keyboard, thefunction
key and the numeric keypad. Function keys perform some special functions such
as loading programs and offering help. These are programmable (i.e., they can be
usually made to perform a different function other than the original).
The numeric keypad is used to enter numeric data or to move the cursor.
(The cursor is the blinking indicator which indicates where on screen the character
that we type will appear). We can switch between these type uses by toggling the
numlock keys. Pressing the same key to choose between two modes is called
toggling.
Keys Functions:
Ctrl:
The Ctrl (Control) key is normally located on the left-bottom corner of the
keyboard. This is also called the super-shift key. It’s function is quite similar to
that of the shift key, i.e. if you press and hold Ctrl key and press another key, your
computer may type a different keystrokes or perform a special function. This key
is used extensively with most programs, including Microsoft word and Excel. The
Ctrl key is usually represented by the ^ symbol. We will follow same convention,
i.e., ^B means-press and hold the Ctrl key, and then press B, and then release both
keys.
Alt:
The Alt key is normally located on the left side of the spacebar key or shift
key. As its name suggests, it is an alternate shift key. This key is used in
combination with other keys to perform a specific function. For instance, Alt can
be used to reset your PC, if you press it in combination with Ctrl and Del Keys.
Alt can also be used to type special symbols, such as ¥© and TM
Tab:
The Tab key found on the keyboard of the PC is similar to the Tab key
used on the ordinary typewriter, and is used for the same purpose. When you press
this key, it moves the cursor in the forward direction to the next tab stop position.
Function Keys:
There are 10 or 12 functions key located on the top or the left side of the
keyboard. These are numbered as F1 through F12. The function keys are different
from the ordinary keys (A, B, 1 etc.). These are programmable keys and each
application(e.g. Word, Excel and FoxPro) can use these keys for a specific
purpose. For instance, the F7 key in one application may spell check the
document, and it may display the contents of the memory variables in another
application.
Caps Lock:
The caps lock key is used to automatically type all the alphabets in upper
case without the pressing the shift key. However, this key has no effects on
numeric keys. Usually, the keyboard provides a visual indication through a light
emitting diode (LED) when you select the Caps lock mode. To cancel the caps
lock mode and to bring the keyboard in the normal mode, press the caps lock key
again, when the caps lock mode is selected, if you type an alphabet with shift key
you will get lower case letters.
Enter:
The Enter Key is analogous to the carriage return lever on the typewriter
keyboard, except that it takes cursor to the next line on video display unit of the
PC. This key is sometimes also called the return key. On some keyboards, this key
is also marked as
Del and Backspace:
The Del and Backspace keys are used to delete keystrokes.
Ins and Esc:
The Ins key is used to select the insert or the overtype modes in the
keyboard. The Esc key is a special key that may have different functions in
different programs.
Numeric Keypad:
The keyboard also has an extra numeric keypad located on the right hand
side. The keypad contains keys to enter numbers. The same keys can also be used
as direction keys to move the cursor. If you want to use this keypad to enter
numbers, press the num lock key to select the num lock mode. To cancel the
numlock mode and to use these keys to move the cursor press the num lock key
again.
Direction Keypad:
The direction keypad is located on the left side of the numeric keypad.
This keypad contains keys to move the cursor in a particular direction, or to the
beginning or end of the page (Screen).
Light Pen and Digitizer Pads:
Pencil sized units that can be used to print inward and menu items or
create drawings on the screens. Light pen operates like a magi wand as one moves
it. In any desired pattern across the screen, it automatically creates a
phosphorescent line, when the light pen is activated; a sensor inside detects the
scanning beam sweeping across the face of the picture tube. A tiny circuit
compares this signal with the scanning process to locate the pen’s position.
Digitizer pads are similar to light pen inputs except that a Digitizer pad is
mounted horizontally so that it provides a much more comfortable way to enter
data into a computer. Its horizontal mounting makes it convenient for tracing
engineering drawings, charts and graphs.
Mouse:
A small hand-held unit that controls the location of a cursor on the screen
when it is slide over the top of a table or other horizontal surface. Its movements
tracked by optical means or by sensing the rotation of a ball protruding form the
bottom of the mouse. The mouse communicates with the computer through its
electrically conducting “Tail”. Buttons on the top of the mouse add an extra
element of control. It enables the user to manipulate a pointer or arrow on the
screen. The movements of the mouse enables the user to
1.
2.
3.
4.
Point to icons (tiny pictures that identify the processing choices)
Click on such icons to run those programs
Choose an item from a list (menus)
Draw lines or pictures on the screen. But they cannot be used where text
has to be entered.
JOY STICKS and TRACKBALLS:
Joysticks provide an alternative method for feeding the computer visually
interesting data. When you move the joystick, a cursor on the screen moves in a
corresponding way. A trackball is a plastic sphere mounted in a socket so that it is
free to rotate in any direction.
TOUCH Screens:
Touch Screens are another favorite “User Friendly” method for feeding
data into computer. Users can command the computer to perform various useful
tasks simply by touching specific sectors of the screen with their forefingers. The
computer senses the location of the finger in various ways.
VIDEO Display Unit:
Video display units are the most common input/output devices used today
in direct –access processing applications. The keyboard is used to enter data into
the computer, and a cathode ray tube (CRT) like a T.V Screen is used to display
the input data as well as the messages and processed output from the computer.
The CRT produces a beam of electrons that makes the picture on the screen.
Within the VDU is the Raster Scan. The Raster scan helps to convert the beam
produced by the CRT unto a picture. It scans the screen back and forth, from the
top left hand corner to the bottom right within VDU is the Raster Scan. The Raster
Scan helps to convert the beam produced by the CRT into a picture. It scans the
screen back and forth from the top left hand corner to the bottom right hand corner
at a rapid speed and while doing this; it is constantly redrawing the picture.
The characters or pictures that are displayed on the screen are built up
using a combination of dots called ‘pixels’ (i.e. picture elements). The generation
of the appropriate number of pixels at the appropriate locations is achieved by
using some hardware circuitry. Such hardware is termed as video Display
Adaptor.
Output Unit:
We have seen that there are several paths by which humans can
communicate with computers. There are also several ways in which the machine
can communicate with man.
At one time all that appeared to matter was obtaining results from the
computing process and no one bothered very much about presentation of the
material. However, it is now becoming increasingly important to present
information in the best possible fashion and the industry is responding by placing
greater emphasis on improving peripheral type devices (display terminals as well
as those providing hard copy output). The provision of quality output is an area of
research and development and recently great improvements have been made.
It is a device through which the data processing results are presented to the
user. Many output devices are available to present the results. They are
1. Card Punching Machine
2. Paper Tape Punching Machine
3. Magnetic Tape
4. Magnetic Disk
5. Visual Display Unit
6. Floppy Disk
7. Electronic Tele-Type Unit
8. Dot-Matrix Printer
9. Daisy Wheel Printer
10. Graph Plotter or X-Y Plotter
11. Magnetic Ink Character Printer
12. Optical Printer
Of these various devices the printer is the most commonly used device,
now-a –days the VDU is also used substantially. The copy on the screen is
called soft copy and the printed copy is called as hard copy.
Printer:
The Printer is an output device that is used to print documents on paper.
Various kinds of printers are used with PCs. The Dot Matrix Printer(DMP) is the
most commonly used printer with PCs because of its low cost and reasonably
good speed. The print head in a DMP contains a few tiny needles. There are 7 or 9
needles in a low quality DMP and up to 24 needles in a high quality DMP. At the
time of printing, as the head moves from one end of the paper to the other, these
needles are fired selectively to print different characters or graphics. Dot matrix
printers usually have a printing speed of 100 to 500 characters per second.
Inkjet/DeskJet printers are also fast becoming a popular choice for use
with PCs. These printers offer good print quality and noiseless operation. These
are non-impact types of printers that print characters and graphics by spraying
very tiny drops of ink directly onto paper. The print quality of these printers is
much better as compared to DMPs. The Typical print quality of these printers is
from 300 dots per inch(DPI) to 720 DPI. These printers can also print in color.
Laser printers are also being commonly used with high-end PCs.
Particularly those used for Desk Top Publishing (DTP). The laser printers provide
very high quality printout, typically in the range of 300 DPI to 2400 DPI. The
typical printing speed of laser printer is between 3 to 12 pages per minute.
Line printers, drum printers and chain printers are some other types of
impact printers. These printers are high-speed printers and chain printers are some
other types of impact printers. These used with mini or main frame computers,
and are not so popular with PCs.
Each Printer has its own style of loading paper and ribbon/ink cartridge in
it. If you face any problem in loading paper or ribbon/ink cartridge, refer to the
printer manual or contact your printer supplier/vendor.
Compact Disk (CD) Drive:
The Compact Disk (CD) used in a PC is similar in shape and size to the
audio CD. The Computer CD can hold about 650 MB of data. The computer CD
is used to lead computer programs and other data in the hard disk of a PC. Most of
the new computer programs are now available only on CDs. Some times programs
are directly run from the CD. Also sometimes the PC may directly read the data
stored on the CD at the time of running a program.
Most of the CDs are read only type. That is, the CPU can read information
stored on a CD, however, it cannot store (write) any information on CDs.
However, wirtable CDs are also available. Therefore, if a PC has a CD drive that
has writing capacity, you can store information on a wirtable CD. So, normally the
CD drives works as an input device, but it can also act as an I/O device.
Zip Drive:
The Zip Drive and I/O device is modified floppy drive. Each zip floppy
disk can hold up to 100 MB of data. The size of the zip floppy disk is same as that
of an ordinary micro floppy disk, through it is slightly thicker. The data transfer
rate between CPU and the zip drive is slightly slower than that between CPU and
hard disk. The zip disk is very useful to backup large amount of hard disk data or
to transfer large amount of data from one computer to another.
Primary memory storage:
Registers:
We have noted that there is movement of information within the CPU as
each instruction is interpreted and executed. To handle this process satisfactorily it
is necessary, at various stages, to retain information on a temporary basis. To do
this, the computer uses a number of special memory units called Registers. They
are not considered part of the main memory and there are several types of
Registers, each designed to perform a specific function, what they have in
common is the ability to receive information, to hold it temporarily, and to pass it
on as directed by the control unit.
STORAGE: A Register that holds information on its way to and from
memory
INSTRUCTION: A Register that holds an instruction whilst it is being
executed
ADDRESS: A Register that holds a storage location address until it is
needed.
ACCUMULATOR: A Register that accumulates results.
Storage Media (Secondary)
It is a Storage that supplements the main memory of the computer. It is
also called as Auxiliary memory. So many secondary storage devices are available
which enhance the processing ability of the computer. Let us see some of them.
(i) Hard Disk: There are one or more platters or disks mounted with a common
spindle. Each platter has two magnetic surfaces, top and bottom which is divided
into sectors and tracks. The head is available between the platters to read/write
data.
(ii) Magnetic Tape: A reel of magnetic tape is accumulated for storage media.
The standard size is ½ inch width and 2400 feet length.
(iii) Cartridge Tape: Another smaller size of the tape is called cartridge tape.
Standard size is ½ inch width and 300 to 600 feet length.
(iv) Floppy Disk: Floppy diskettes are also random access devices like the
magnetic disks. Floppy diskettes store data similar to disk pack or hard disks in
concentric circles, which are called tracks. These tracks are also divided into
sectors. The capacity of the floppy diskette varies based on density. Generally,
floppies are of two types.
(i) Low Density ad (ii) High Density
Systems Software:
Software that controls the computer and enables it to run applications
software, systems software which includes the operating system, allows the
computer to manage its internal resources.
Systems software consists program that start up the computer; load,
execute, store, and retrieve application programs; store and retrieve files; and
perform a series of utility functions. So system software is of three basic types.
They are



Operating systems
Language translators
Utility programs
User
Operating
Utility
Language
System
Programs
Translators
Word
Excel
DBMS s/w
Processor
Documents
Operating System:
Worksheets
Database Applications
An OS is the principle piece of systems software in any computing system.
The OS acts as an interface between the user and application programs.
Language Translator:
A language translator is software that translates a program written by a
programmer in a language such as BASIC into machine language, which the
computer can understand.
Utility Programs:
Utility programs are generally used to support enhance or expand existing
programs in a computer system.
Operating Systems Done
Operational systems are available for both personal computers and larger
computers such as mini computers and mainframes. The functions include
Booting: it refers to the process of loading an operating system into a computer’s
main memory from floppy disk or hard disk. This loading is accomplished by a
program called the ‘Bootstrap loader or Boot routine’ that is stored permanently in
the computer’s electronic circuitry, other programs are called ‘diagnostic routine’
also start up and test the main memory, the CPU and other parts of the system to
make sure they are running properly (‘Testing RAM’). Finally, other programs
(indicated on your screen as ‘BIOS’) will be stored in main memory to help the
computer interpret keyboard characters or transmit characters to the display screen
or to a floppy disk.
Housekeeping Tasks
One example of housekeeping task is formatting blank floppy disks.
Formatting or initializing electronically prepares a floppy disk so it can store data
or programs. Other housekeeping tasks are




Copy – or duplicate files and programs from one disk to another
Backup – or make a duplicate copy of, the contents of a disk
Erase-you can erase or remove, from a disk files or programs that are
no longer useful
Rename-you can rename, or give new file names, to the files on a disk
User Interface:
User Interface or shell is the part of the operating system that allows you to
communicate, or interact, with it. There are 3 types of user interfaces, for both
operating systems and applications software

Menu Driven: A menu driven interface allows you to choose a
command from a menu. A software menu offers you options to choose
from – in this case, commands available for manipulating data, such as


Print or Edit. Two types of menus are available: ‘Menu bars’ and ‘Pull
down menu’.
Command Driven: Here we are using commands through our CUI
(character User Interface)
Graphical User Interface: The easiest interface to use, the graphicaluser-interface (GUI), uses images to represent options. Some of these
images take the form of icons. ‘Icons’ are small pictorial figures that
represent tasks, functions, or programs.
External Utility Programs
Utility programs provide services not provided by other systems software.
They include screen savers, data recovery, backup, virus protection, file
fragmentation, data compression, and memory management.
Screen Saver:
It is a utility that supposedly prevents a monitor’s display screen from
being etched by unchanging images.
Virus:
A virus consists of hidden programming instructions that are buried within
other programs, causing adhoc.
Fragmentation:
It is the uneven distribution of data on a hard disk.
Data Compression:
It removes redundant elements, gaps, and unnecessary data from a
computer’s storage space so less space is required to store or transmit data.
Memory Management:
Utilities are programs that determine how to efficiently control and
allocate memory resources.
Application Software
It refers to software which perform application oriented or related function
on a computer. Application software can either be purchased or can be developed
using application development tool.
Two categories of application software can be purchased-

Specialized prewritten application software packages:
Perform
application – specific tasks, which fulfill the needs of the user. For
example, a specialized prewritten application software package could
be purchased to prepare the payroll for a firm. The package would
perform all the tasks required by the user, including writing checks and
preparing government reports.

Generalized prewritten application software packages: Perform
specific tasks, but can be used for many different applications. For
example, a word processing application package can only be used to
perform word processing functions. Thus, using the same word
processing package, letters can be written by the accounting
department to people who are late in their payments, by the marketing
department to prospective customers, and by the president of the
company to the stock holders
Application s/w development tools allow the user or the professional
information processing analyst or programmer to develop the application
software. These application s/w development tools must be purchased. They fall
into one of two categories:
1. Fourth – generation software development tools.
2. Programming languages
Under the first category ‘Electronic spreadsheet s/w’ is a s/w development tool
which allows the user to develop a spreadsheet that contains both data and
formulas.
Second s/w tool that is quite useful is file management s/w. The purpose of
file management systems (sometimes called Database Management Systems) is to
allow users to define files, records, data elements and to provide convenient
method of access, update and create reports form the data.
Programming languages are C, FORTRAN for scientific purposes and
C++, COBOL etc are used for commercial purpose application s/w tools.
Machine Language
It is important to understand the basic features of a computer program. A
‘Computer Program’ contains a series of instructions, which directs the computer
to perform those tasks necessary to process data and produce a desired output.
The language made out of binary digits (bits) 0’s, 1’s is known as machine
language i.e. this is the language which is understood by the computer directly
without using translator. A combination of 8 bits represents a specific alphabet, a
number, a character. The zero’s and one’s are the symbolic representation of
absence and presence of electric pulses. ‘1’ represents the presence of electric
pulse and ‘0’ represents the absence of electric pulse.
Two systems of coding have been used in the machine language.


ASCII code (American Standard Coder for Information
Interchange)
EBCDIC code (Extended Binary Coded Decimal Interchange
Code)
Example : ASCII
For A = 10000001
B = 100000010
C = 10000011
EBCDIC
For A = 11000001
B = 11000010
C = 11000011
An instruction prepared in any machine language has two parts
1. Operation Code
2. Operand (or) address
The first part is operation code. It tells the computer to perform certain
function. The second part is the operand, which tells the computer to process the
data. The programming for the first stored program computers was performed in
machine language. Since machine language programming was a difficult,
burdensome, and error – prone task, programming languages were developed to
facilitate the coding process.
Advantages of Machine Level Language

Efficiency at run time:
The computers can execute programs written in the machine
language very fast because CPU directly understands machine
instructions and no translation is required
Disadvantages:





Machine Dependant: Machine language differs from computer to
computer. The design and construction of ALU, Control Unit and size
of the memory determine it.
Difficult to write the programs: Machine level language programs are
difficult to write because programmer have to memorize all the code
number of the alphabets, numerals, special character and commands.
Error: To write a program in machine language the programmes have
to remember the operation coders and operands. It becomes very
difficult for the programme to concentrate fully on the logic of the
problem. The result is programme errors.
Difficult to modify: It is very difficult to modify or correct the
machine language programs.
Time Consuming: Writing a program in a machine language is a time
consuming one and very tedious.
Assembly Language
The first programming languages were symbolic programming languages,
commonly called ‘assembler languages’. Since writing instructions in a machine
language is difficult, these developed another language during second generation
called as assembly language. The assembly language use’ mnemonic codes’. The
mnemonic codes are the short form of English words.
Example:
ADDITION – the mnemonic code is ADD
SUBTRACTION – SUB
LOAD – LD
MOVE – MVC
EDIT – ED etc.,
An assembler language program consists of a series of individual
statements or instructions, which directs the computer to carry out the processing
that is to occur. An assembler language statement consists of three parts.
1. A Label
2. An operation code
3. One or more operands
As the computer cannot understand any language other than machine
language (0,1) the assembly language have to be translated into machine
language. This is done with the translator program called assembler.
Assembly Level Language
Language
Assembler
Machine Level
Advantages:
 Simple to understand and to use
 Easy to write and modify the programs
 Time consuming
 Easy debugging
Disadvantages:





Machine dependent
Knowledge of hardware is required to write and assembly language
program
More number of statements is required to write a simple program
Programming are difficult and time consuming one when compared to
high level language
Assembly language program cannot be executed directly by the
computer
High Level Language
A programming language in which the program statements are not closely
related to the internal characteristics of the computer is called a high-level
programming language
The high level language is written using an English like words and
mathematical symbols such as COBOL, which is used for business applications. A
high level language allows users to write in a familiar notation, rather than
numbers or abbreviations. Most high-level language is not machine dependent –
they can be used on more than one kind of computer. Examples of familiar
languages of this sort are FORTRAN, COBOL, BASIC, Pascal, C and Ada.
Assembly language requires an assembler as a language translator. The
translator for high-level languages is, depending on the language, either a
‘compiler’ or an ‘interpreter’.
Compiler:
A compiler is a language translator that converts the entire program of a
high-level language into machine language. The high level language is called the
source code. The compiler translates it into machine language, which in this case
is called the ‘object code’. The significance of this distinction is that the object
code can be saved.
Interpreter:
An interpreter is a language translator that converts each high-level
language statement into machine language and executes it immediately, statement
by a system. No object code is saved, as with the compiler.
The third generation, high-level languages are also known as procedural
languages.
Advantages:




To write the program in high level language is very easy
Errors can be easily removed
Software can be developed easily
Commands one similar to natural languages
Disadvantages



The program written in high-level languages takes more time to
execute
More storage space is required
Translators are required to translate high-level languages into machine
level language
Note: Difference between High-level languages, Assembly language, Machine
level languages refer the class notes.
Steps in developing a computer program
Because of the complexity of writing large business or scientific programs,
it is important that the programmer approach writing a program in a systematic
disciplined manner. Toward this end, a “program development cycle” has been
established. The program development cycle consists of five basic steps:
1.
2.
3.
4.
5.
Review of program specification
Program design
Program coding
Program testing
Program documentation
Review of program specifications
The first step in the program development cycle. These specifications
normally contain record and screen formats, printer spacing charts, database
schemes and access requirements, system flowcharts and data flow diagrams, and
a written narrative, which provides a detailed description of the processing that is
to occur.
It is extremely important that the programmer thoroughly understand all of
the various aspects of the problem to be solved. These aspects include the output
to be produced, the input that is available to produce the output, the data in the
database which is to be used in the production of the output, and the processing
that must occur to produce the output.
At the end of the review of the system and program specifications, the
programmer should completely understand the processing is to be performed what
data is to be processed, and how the output is to be derived from the data available
to the program.
Program Design
The design phase of the program development cycle is one of the most
important, for if a program is properly designed, it will be easily implemented in
code in the selected programming language. At the end of the design phase, the
structure and logic of the program should be detailed in such a fashion that the
resulting program code from the design will be efficient, and will always produce
correct output (reliable), will work under all conditions (robust), and will be easily
modified (maintainable).
Program coding
After the program has been designed, it must be coded, tested, and
documented. The programming language used to code a program will normally be
determined by the system analyst or project manager based upon the software
available, the knowledge of the programming staff, and the standards established
with in the information systems department.
Coding begins after the program has been designed. Coding the program
involves the actual writing of the detailed programming statements. Each
programming language has its own ‘syntax’, or coding rules, which must be
followed. The programmer must follow these rules explicitly, or the program will
not compile and execute as intended.
After the program has been coded (or in large programs, as the program is
coded), a walkthrough provides the opportunity for other programmers to review,
on a line for line basis, the coding developed by the original programmer.
Particular attention should be paid to ensuring that the code implements
the design logic as expressed by the flowchart or psuedocode that the program is
well documented, that the coding is free of errors, and that the coding is easy to
read, leading to a program that is easy to modify and maintain.
Once it is agreed that the program code is well written and correctly
implements the design of the program, the source program must be prepared for
processing on the computer.
Program Testing
After the program has been coded, it must be tested to ensure that it
processes data properly and produces the correct output. The basic procedures of
testing a program are:





Test data is created with which to test program. Creating test data with
which to test a program is an important responsibility of a programmer.
The development of adequate test data, together with good program
design and coding, are the most important tasks accomplished by a
computer programmer.
The program is compiled and all diagnostic errors are removed
The program is tested. If an interpreter is used, steps 2 and 3 occur
together.
Any errors, which are found in the program, are corrected, and the
testing continues until the program is certified as error-free.
The program can be used in a system test to ensure that all programs
within a system work properly together
Testing Sequence:
The programmer should develop a test plan which, among other things,
specifies the number of test runs to be executed, the portions of the program that
are to be tested on each run, and the objectives of each test run
Stub Testing:
Testing only a portion of a program to ensure that it works properly is
normally good testing strategy. This strategy, called ‘stub testing’, allows a
program to be partially coded and tested before testing could be started. With stub
testing, testing can begin shortly after coding is begun; with the result that
program testing is spread more evenly across the project time, and management
can review the progress of completed portions of the program.
Program efficiency:
Consists of two elements:
1. The amount of main computer memory required to store the program
when it is processing data
2.
The amount of time required by the program to process data. Program
efficiency is directly affected by a program design and program
coding. A well designed and coded program is not only understandable
and easy to modify and maintain, it is also efficient with respect to the
amount of main computer memory required and the speed with which
it process data.
Program Documentation
The documentation of each program developed in an information systems
department should include the following:
1. An abstract and general description of the purpose of the program
2. Records layouts for report output, terminal output, files on auxiliary
storage, user views of data bases used, and any other data which is
necessary in the execution of the program
3. A system flowchart, illustrating where the particular programs filts within
the system
4. A detailed description of the processing, which occurs within the program.
5. The structure or hierarchy chart of the modules within the program
6. The logic utilized within each module of the program. This logic should be
illustrated either through the use of flowcharts or through the use of
Pseudocode.
7. A listing of the source program
8. A listing of the test data used to test the program and the results of the
testing
9. A console run form which includes the job control statements and any
other information necessary to specify how the program is to be run on the
computer
10. Users guide on how to use the program. This guide may include what data
is used in the system; the way to prepare source documents; and, in
interactive programs, the manner in which to establish contact with the
computer and interact with the program.
Program Maintenance:
Program maintenance can be required to correct errors in a program. It can
also be required to make enhancements to a program, such as adding new features
to a word processing program. These are the steps involved in developing a
program.
Objectives:
1. The term _____ denotes those programs usually supplied by the computer
manufacturer or s/w house that are designed to maximize the overall
efficiency of the computer
2. The entire control system is referred to as a(n) _____
3. The ability of a computer to run more than one program concurrently is
referred to as _____.
4. _____ refers to hardware that has been pre-programmed or wired to
perform specific functions
5. Two popular operating systems for microcomputers are _____ and _____
Short Answer:
1. What is machine language?
2. What is a high level language?
3. What is a assembly level language?
4. What is a flowchart?
5. What are basic input units?
6. What are the basic output units?
7. Write short notes on storage devices?
8. What is system software?
9. What is application software?
10. Write short notes on flowchart symbols
Long Answers:
1.
2.
3.
4.
5.
Explain the system s/w and application s/w.
Explain flow chart designing with examples.
Explain the programming languages in detail.
What are the various steps involved in developing a program
Write short notes on: a. Assembly language b. Machine level
language
6. Write short notes on: a. Operating system b. Utility programs
7. Explain the input/output and storage devices
8. Write short notes on Keyboard keys.
9. Explain one Primary storage device.
10. Explain Register and types of Registers.
Operating System:
Operating System is a collection of programs, which interfaces between
the user or application programs and the computer itself to control and
manage the operation of the computer.
Operational systems are available for both personal computers and larger
computers such as mini computers and mainframes.
FUNCTIONS OF OS:
(1) The functions include Booting: it refers to the process of loading an
operating system into a computer’s main memory from floppy disk or hard
disk. This loading is accomplished by a program called the ‘Bootstrap
loader or Boot routine’ that is stored permanently in the computer’s
electronic circuitry.
(2) Other programs are called ‘diagnostic routine’ which starts up and test
the main memory, the CPU and other parts of the system to make sure they
are running properly (‘Testing RAM’). Finally, other programs (indicated
on your screen as ‘BIOS’) will be stored in main memory to help the
computer interpret keyboard characters or transmit characters to the
display screen or to a floppy disk.
(3) Housekeeping Tasks
One example of housekeeping task is formatting blank floppy disks.
Formatting or initializing electronically prepares a floppy disk so it can store data
or programs. Other housekeeping tasks are




Copy – or duplicate files and programs from one disk to another
Backup – or make a duplicate copy of, the contents of a disk
Erase-you can erase or remove, from a disk files or programs that are
no longer useful
Rename-you can rename, or give new file names, to the files on a disk
(4) User Interface:
User Interface or shell is the part of the operating system that allows you to
communicate, or interact, with it. There are 3 types of user interfaces, for both
operating systems and applications software



Menu Driven: A menu driven interface allows you to choose a
command from a menu. A software menu offers you options to choose
from – in this case, commands available for manipulating data, such as
Print or Edit. Two types of menus are available: ‘Menu bars’ and ‘Pull
down menu’.
Command Driven: Here we are using commands through our CUI
(character User Interface)
Graphical User Interface: The easiest interface to use, the graphicaluser-interface (GUI), uses images to represent options. Some of these
images take the form of icons. ‘Icons’ are small pictorial figures that
represent tasks, functions, or programs.
(5)Resource Management:
The OS also manages computer resources such as memory, printer
etc .and allows the user to share the resources.
(6)Memory Management:
The OS manages the allocation of memory to programs using
several methods like Contiguous Memory allocation, page memory etc.It also
swaps programs from main memory to Secondary storage and vice versa.
(7)Process Management
The OS performs process scheduling i.e allocation of the processor
for the execution of the programs. It uses algorithms like FIFO .
There are two types of operating system
1. Single User OS:
In a single operating system only one person can use the computer at a
time. Example: DOS
2. Multi User OS:
A multi user OS manages the allocation of computer resources among
many users and are allowed to use the computer at the same time. CPU is
shared by many users in multi-user operating system.
Example: Unix, Windows NT, Windows 98 etc.,
UNIX:
UNIX is a multi-user, time-sharing operating system. Ritchie and
Thompson originally wrote it at the Bell Telephone labs in 1973 for a small PDP
11 Computer. They used a high-level language C to write UNIX. It is very popular
as it was written in C and thus portable.
Shell
Kernel
H/W
Architecture of UNIX:
The UNIX OS can be bought of as a layered system. Unix Kernel controls
the resources of the computer and allocate it among users. It controls peripheral
devices such as disks, printers etc., connected to the computer. It provides user
with file systems to store data and programs. It lets users run their programs by
proper memory allocation and management.
In the next level of UNIX provides a command interpreter called ‘Shell’.
There are large no. of very useful commands provided by shell. Users can create a
series of shell commands and store it in a file. This file can be made as executable
file and when invoked will act like a new shell command.
Unix also provides a very interesting idea called a pipe. A pipe is a way to
send the output of one program as the input of another program without storing
the output of the first program in a temporary file. A pipeline is a connection of
two or more programs through pipes. There are large families of UNIX shell
programs that read an input, perform a single transformation, and write an O/P.
For example:
Grep Command - which searches a file for lines that match a given pattern and
O/P’s
them.
Sort Command - Sorts the file as per some specifications.
Such commands are called filters.
A part from filters provided by the system, user could create his own filter by
combining shell commands.
The outermost layer of UNIX has language compliers for C, FORTRAN 77 etc.
Advantages:
1. A unique feature of the language compilers in UNIX is that it provides a
common
Object code format, which allows easy mixing of high-level languages.
2. UNIX has some good text processing programs. Many additional utilities
such as calendar, games, graphics etc are available.
3. Multi-User built in networking capabilities, the ability to run multiple tasks
at one time, and versions that can run on all kinds of computers.
Other Unix based OS are Next step from Next Inc. Solaris by Sun Microsystems
etc.
DOS-Disk Operating System:
DOS runs primarily on IBM and IBM compatible microcomputers, such as
Compaq, zenith computers, Dell Computers and Gateway.
In earlier stage there are three kinds of DOS
1. MS-DOS: it is from Microsoft Corp. The latest version of this is 6.22.
2. PC-DOS: it is from IBM. The latest version of this 6.1.
3. DR-DOS (or) Novell’s DOS-for network software from Novell Inc
acquired with DR(Digital Research) upgraded it and renamed it Novell
DOS 7.
The Most recent versions are all backward compatible. Backward
compatible means that users can run the same applications on the later
versions of the OS that could run on earlier versions.
Recent versions of DOS have explained the range of the operating system.
For example, version 4.0 changed MS-DOS from a command driven interface
to a menu driven interface, version 5.0 added graphics-based interfaces.
Version 6.0 added features that tools advantage of a computer’s main memory.
It also used data compression to double the amount of information that could
be stored on a hard disk drive.
The DOS built a limitation up to one-MB memory. To exceed this limit we
need special memory system called EMS(Extended Memory System).
Disadvantages:
1. Command driven OS.
2. Single user programmable OS.
In Dos we have 2 types of commands.
External Commands:
External commands require certain special DOS files or being executed.
Example: Auto.exe, COMMAND.com, FORMAT, PRINT, TREE, SYS,
etc.,
Internal Command:
Internal Commands are already present in Dos and brought into the memory as
soon as the computer is switched on.
Example: COPY, DEL, DIR, TYPE, MKDIR, CD, RD, DATE, TIME
etc.,
Windows 98:
Microsoft’s desktop operating system dominance is mainly due to one
operating system-windows. Windows was a 16-bit operating system (windows
3.x) till the introduction of Windows 95. Now the latest version of windowswindows 98- has been released with lot of more features and integration with the
Internet.
Windows 98 makes your computer easier to use, with new and enhanced
features:
1. WEB INTEGRATION:
Windows 98 is easier to use with true web integration and
workflow enhancement such as icon highlights, forward and backward
buttons and an easy-to-customize START menu.
2. MULTIPLE DISK SUPPORT:
Multiple disk support makes it possible for you to use several
monitors simultaneously to increase the size of your desktop, run different
programs on separate monitors, work with various resolutions and run
programs or play games with multiple views.
3. POWER MANAGEMENT:
“On Now” makes your computer more responsive by improving
startup time. Using power management techniques, on now can start your
computer in just a few seconds and restore all your programs where you
left them. In addition, it allows your computer to continue working even
though it appears to be turned off. You can leave all of your programs
running, download your favorite web pages, send and receive e-mails,
backup your hard disk, or tune-up your operating system without being at
your computer.
4. UNIVERSAL SERIAL BUS:
The Universal, serial bus (USB) makes your computer easier to use
with advanced plug-and-play capabilities. Using a new, universally
standard connector, you can add device to your computer easily without
having to restart.
5. ACCESSIBILITY WIZARDS:
The accessibility wizard makes it easier for people with disabilities
to operate a computer without installing special software. Accessibility
option-such as sticky keys, show sound, and MouseKeys-are designed to
help user with specific disabilities make full use of computer.
6. HELP:
Windows 98 includes a new help system that makes your computer
easier to use. With help, you can find answer to your questions quickly and
easily. You can also get up-to-date technical support from World Wide
Web.
Widows 98 import your computer reliability by introducing new wizards,
utilities, and resources that help keep your computer system running smoothly.
1. WINDOWS UPDATE:
Windows update, Microsoft’s new web-based resource site,
automates driver and system file updates, and provides up-to-date
technical support.
2. SCAN DISK:
Scandisk runs automatically in the event the operating system is
shutdown improperly. Scandisk detects corruption when they are
most likely to occur and then corrects them.
Windows 98 includes a suite of programs like Maintenance
wizard, Drive, Converter, Disk Defragmenter, etc. Designed to
optimize your computer’s efficiency, especially when used together.
Windows 98 includes a mail icon that launches your default e-mail
programs. Outlook express provides you with secure and personalized features for
e-mail and newsgroups communication. With net meeting you can hold the digital
conversation with family, friends and business associates around the world
without spending a fortune. Net meeting also makes it possible for you to work
with a group of people from within any windows-based program by drawing on a
shared white board, sending text messages, and transferring files. Windows 98
includes front-page express, a web-page editor that give you full access to the
power of in a familiar, easy-to-use desktop interface.
Windows NT:
The Windows NT (New Technology) is one of the most powerful
operating system for business computing. The Windows NT combines the ease of
use of Windows 95 with the power and reliability of Windows NT.
Features of Windows NT:
1. Easy of use, Productivity and Compatibility:
Windows NT workstation has the Windows 98 easy to use interface, which
helps you, work easier and faster. Windows NT ensure high performance
for 32 bit programs and have the preemptive multitasking capabilities of
Windows NT and can run in separate address space for better
responsiveness and reliability.
2. System Reliability and Data Protection:
Window NT Workstation meets the reliability, a standard required by MIS
Professionals and other users to run critical line-of-business programs.
Windows NT workstation protects application programs from one another.
3. Workgroup and Networking support:
Built-in file sharing and print-sharing capabilities make it easy to use for
workgroup computing. Windows NT has an open networking system
interface that is compatible with banyan VINES, Netware Novell, UNIX
etc.
4. Object Linking and Embedding:
In Windows NT you can combine information from several application
into one compound document using the special object linking and
embedding (OLE) capabilities.
Internet:
The Internet is a computer network made up of thousands of networks
worldwide no one knows exactly how many computers are connected to the
Internet. It is certain, however, that these number in the millions and are
increasing at a rapid rate.
No one is in charge of the Internet. There are organizations, which develop
technical aspects of this network and set standards for creating applications on it,
but no governing body is in control. The Internet backbone, through which
Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the
transmission control protocol/Internet protocol suite, abbreviated to
TCP/IP.Computers on the Internet use a client/server architecture. This means
that the remote server machine provides files and services to the user’s local client
machine. Software can be installed on a client computer to take advantage of the
latest access technology.
An Internet user has access to a wide variety of services: Electronic mail,
File Transfer, Vast information resources, Interest group membership, Interactive
collaboration, multimedia displays, Real – Time broadcasting, Shopping
opportunities, breaking news and much more.
The Internet consists primarily of a variety of access protocols. Many of
these protocols feature programs that allow users to search for and retrieve
material made available by the protocol.
Levels of Internet Connectivity:
Three Levels of Connectivity:
Gateway Connectivity: Imagine a small network or BBS (Bulletin
Board Service) that has nothing to do with Internet as such. But one of
the computers on the network is hooked up to it. Thus this interaction
point computer provides a gateway to Internet access for the rest of the
network.
Advantages:
 Low cost of access as the cost is shared by the whole network.
 Even the existing non-IP (Internet Packet) based networks can be
easily connected.
Disadvantages:
 The network depends on the facility provided by the gateway.
AOL (American Online), Prodigy, VSNL-GIAS are the examples of
gateway connectivity. Currently in India, VSNL gateway in providing E-Mail,
FTP, Telnet, Chat & UNIX Prompt facilities to its subscribers.
Remote Access Connectivity:
This type of connectivity is achieved through a dial-up terminal
connection. The mainframe on the Internet acts as a host using a dial-up
connection. The host carries out commands typed at terminal. This is most widely
used type of Internet connectivity.
Disadvantage:
 The problem associated with this level is that only the programs
present at the host can be executed.
 Loading a new program or client does not provide the ability to
execute it.
 Downloading a file from any site becomes a two-step process:
1. Downloading a file from any site.
2. To transfer host to local terminal.
Direct Connectivity:
This is most expensive type of connectivity is achieved by high-speed
lines to go line on the Internet. Internet is available round the clock. It is usually
opted with heavy load and number of users using mainframe computers. This type
of connection provided on demand by the service providers based on Point-toPoint protocol (PPP) or SLIP (Serial Line Internet Protocol).
Components of the Internet:
1.World Wide Web:
The World Wide Web (abbreviated as the Web or WWW) is a system of
internet servers that supports hypertext to access several internet protocols on a
single interface Almost every protocol type available on the internet is accessible
on the web. This includes e-mail, FTP, Telnet and Usenet News. In addition to
these, the World Wide Web has its own protocol: Hyper Text Transfer Protocol,
or HTTP.
The World Wide Web provides a single interface for accessing all these
protocols. This creates a convenient and user-friendly environment. It is
no longer necessary to be conversant in these protocols within separate,
command-level environments. The web gathers together these protocols
into a single system. Because of this feature, and because of the web’s
ability to work with multimedia and advanced programming languages,
the World Wide Web is the fastest-growing component internet.
The operation of the web relies primarily on hypertext as its means of
information retrieval. Hypertext is a document containing words that
connect to other documents. These words are called links and are
selectable by the user. A single hypertext document can contain links to
many documents. In the context of the web, words or graphics may
retrieve as links to other documents, image, video and sound. Links
may or may not follow a logical path, as each connection is
programmed by the creator of the source document. Overall, the WWW
contains a complex virtual web connections among a vast number of
documents, graphics, videos, and sounds.
Producing hypertext for the web is accomplished by creating
documents with a language called Hypertext Markup language, or
HTML with HTML, tags are placed within the text to accomplish
document formatting, visual features such as font size, italics and bold,
and the creation of hypertext links. Graphics may also be incorporated
in to an HTML document. HTML is an evolving language, with new
tags being added as each upgrade of the language is developed and
released. The World Wide Web consortium, led by web founder Tim
Burners-Lee, coordinates the efforts of standardizing HTML.
The World Wide Web consists of files, called pages or home pages,
containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia
presentations, real-time collaboration, interactive pages, radio and
television broadcasts, and the automatic “push” of information to a
client computer. Programming languages such as java, java script and
visual basic are extending the capabilities of the web. An increasing
amount of information on the Web is served dynamically from content
stored in databases. The web is therefore not fixed entity, but one that is
in a constant state of flux.
2.E-Mail:
Electronic mail, or e-mail allows computer users locally and worldwide to
exchange messages. Each user of email has a mailbox address to which messages
are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a
person’s e-mail address. Non –ASCII files, known as binary files, may be attached
to e-mail messages. These files are referred to as MIME attachments. MIME
stands for multimedia Internet mail extension, and was developed to help e-mail
software handle a variety of file types. For example, a document created in
Microsoft word can be attached to an email message and retrieved by the recipient
with the appropriate e-mail program. Many email programs, including Eudora,
Netscape Messenger, and Microsoft Outlook Express, offer the ability to read files
written in HTML, which is it a MIME type.
3.TELNET:
Telnet is a program that allows you to log into computers on the Internet
and use online databases, library catalogs, chatservices, and more. To telnet to a
computer, you must know its address. This can consist of word (locis.loc.gov) or
numbers (140.147.254.3). Some services require you to connect to a specific port
on the remote computer. In this case type the port number after the Internet
address.
Example: Telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most
common web based telnet is available through telnet are library
catalogs. A link to a telnet resource may look like any other link, but it
will launch a Telnet session to make the connection. A telnet program
must be installed on your local computer and configured to your web
browser in order to work.
4.FTP:
FTP stands for File Transfer Protocol. This is both a program and the
method used to transfer files between computers. Anonymous FTP is an option
that allows users to transfer files from thousands of host computers on the Internet
to their personal computer account. FTP sites contain books, software, games,
sounds, multimedia, Course work, articles, images, datasets, and more.
If your computer is directly connected to the Internet via an Ethernet cable,
you can use one of several PC software programs, such as WS_FTP for windows,
to conduct a file transfer.
FTP transfer can be performed on the World Wide Web without the need
for special software. In this case, the web browser will suffice. Whenever you
download software from a web site to your local machine, you are using FTP.
5.E-MAIL DISCUSSION GROUPS:
One of the benefits of the Internet is the opportunity it offers to people
worldwide to communicate via e-mail. The Internet is the home to a
large community of individuals who carry active discussions organized
around topic-oriented forums distributed by e-mail. These are
administered by software programs. Probably the most common
program is the Listserv.
List servers cover a great variety of topics , many of them are academic
in nature. When you subscribe to listserv, message from one subscriber
is automatically sent to your electronic mailbox. You subscribe to a
listserv by sending an email message to a computer program called a
list server. List servers are located on computer networks throughout
the world. This program handles subscription information and
distributes messages to and from subscribers. You must have a e-mail
account to participate in a listserv discussion group.
6.USENET NEWS:
Usenet News is a global electronic bulletin board system in which millions
of computer users exchange information on a vast range of topics. The major
difference between Usenet News and e-mail discussion groups is the fact that
Usenet messages are stored on central computers, and users must connect to these
computers to read or download the messages posted to these groups. This is
distinct from e-mail distribution; in which message arrive in the electronic
mailboxes of each list member.
Usenet itself is set of machines that exchanges messages, or articles from
Usenet discussion forums, called newsgroups. Usenet administrators control their
own sites, and decide which (if any) newsgroups to sponsor and which remote
newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are
academic in nature, numerous newsgroups are organized around recreational
topics. Much serious computer-related work takes place in Usenet discussions. A
smaller number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet news feed can be read by a variety of newsreader software
programs. For example, the Netscape communicator site comes with a newsreader
program called messenger. Newsreaders are also available as standalone products
7.CHAT and INSTANT MESSENGING:
Chat programs allow users on the Internet to communicate with each other
by typing in real time. They are sometimes included as a feature of a web site,
where users can log into the “chat rooms” to exchange comments and information
about the topics addressed on the site. Chat may take other, more wide ranging
forms. For example, America online is well known for sponsoring a number of
topics chat rooms.
Internet Relay Chat (IRC) is a service through which participants can
communicate to each other on hundreds of channels. These channels are usually
based on specific topics. While many topics are frivolous, substantive
conversations are also taking place. To access IRC, you must use an IRC software
program.
A variation of chat is the phenomenon of instant messaging. With
instant messaging, a user on the web can contact another user currently
logged in and type a conversation. Most famous is America Online’s
instant massagers. ICQ is another commonly used chat program.
Intranet:
System administrator will be there within the organization. All the
people will be given an Identity No. If any mail comes top the person
that will be given to him. Control is with the system administer,
personal department can access only personal department and not
production department control, system administer will control the
system.
Advantages:
1.Putting company related information on Net.
2.Can be accessed by all employees of the organization in the office or via dial up
access.
3.Applications used are company procedure or manuals, corporate databases.
4.It is the usage Internet Technologies within the organization to achieve better
results that the conventional means of access and transfer.
5.It should be noted that Intranet technologies could be used only if the network is
within a single campus.
Extranet is connected with outside suppliers, customers. All suppliers will
know when to supply and customers will know when they are produce goods.
It is the use of Internet technologies outside the organization boundaries to
achieve better results than the conventional means of access and transfer.
Extranet technologies are common where companies experimented their
boundaries to include their suppliers into their network.
E-mail Procedure
Step 1:The user types the document into the computer or selects the files that are
to be mailed.
Step 2:The computer files are converted into a form that is suitable or
transmission over the telephone lines using a modem.
Step 3:The files are transferred using the telephone connection to the local node
of the E-mail service Provider.(ESP).
Step 4:The reverse process of step2 occurs and the analogy signals are converted
back to digital form suitable for computer at the other end.
Step 5:As the files reach the local node of E-mail service provider, the computer
sorts the files to be transmitted to different location.
Step 6: The ESP transmits the files using the microwave link(VSAT-very small
Aperture Terminal) or some other means to the nearest node to destination.
Step 7: The ESP node nearest to the destination receives the files.
Step 8: The ESP node then resolves the address and prepares the file to be
dispatched.
Step 9: the node computer of the ESP user the same device (modem) to connect
the received signals back to analogs signals as a preparation to transmit them to
the destination. Computer over telephone lines. Thus as can be seen, modem is a
very important device not only in the case of E-Mail but the whole cycle of
Electronic information exchange.
Step 10: The files are transferred over the telephone line to the destination
computer.
Step 11: the modem then finally converts these into digital signals for the
destination computer.
Step 12: the files reach destination and the user can read them. And reply forward
or store them.
E-Commerce:
Electronic Commerce is one of the most important aspects of the
Internet to emerge. It allows people to exchange goods and services
immediately and with no barriers of time or distance. Any time of the
day or night you can go online and buy almost anything you want. This
is how e-commerce works.
The consumer moves through the Internet to the merchant’s web site.
From there. He decides that he wants to purchase something, so he is
moved to the online transaction server, where all of the information he
gives is encrypted. Once he has placed his order, the information moves
through a private gateway to a processing network, where the issuing
and acquiring banks complete or deny the transaction. This generally
takes place in no more than 5-7 seconds.
There are many different payment systems available to accommodate
the varied processing needs of merchants, from those who have a few
orders a day to those who process thousands of transactions daily. With
the addition of secure socket layer technology, e-commerce is also a
very safe way to complete transactions.
//Give Application how to do online purchasing
Mobile Computers:






Fixed point-to-point telephony is given way to global cellular mobile
communication system. Such a system provides anytime, anywhere
connectivity.
GSM-global system for mobile communication is a widely used mobile
communication system.
GSM standard is optimized for short message service (SMS) that allows
GSM mobile users to send and receive, short concise and abbreviated text
message to other mgs.
SMS length of a single message is restricted.
SMS message can be sending and received simultaneously with voice data
and fax calls.
SMS message low bit rate signaling channel for message transmission.
SMS Features:




GSM is most popular mobile cellular network.
It supports two way paging communication.
It supports store-forward capability.
Point to point short text message and cell broadcasting.
Radio Paging:
‘Paging service network’ provides for one way(receive only) message
service. This means the mobile user cannot send a message. Such a service is also
know as mobile terminated messaging.
Limitations:
1. One-way service.
2. Paging is restricted to particular city only, and does not provide to
global messaging features provided by SMS.
MOBITEX:
Is the popular and widely deployed cellular wireless data network in US.
1.It specifies both packet and circuit switched transmission facilities.
2.MOBITEX system offers store and forward capabilities. Each registered user
has a mailbox in MOBITEX system. If a packet is undelivered, then at the
sender’s discretion it can store in recipient mailbox.
M-Commerce:
E-commerce over mobile phones. It is a WAP application. WAP is a
protocol by which the mobile phone accesses specific sites on the Internet, and
handsets need specific micro-browser s/w installed to search for WAP-enabled
sites.
There are two forms of HTML programming.
HTML for normal browsing and WML (Wireless MarkUp Language) for WAP
application.
Limitations.
Reduced or to disappear with increasing data rates delivered to the hand
set (first from GPRS-General Packet Radio System and then UMTSUniversal Mobile Telephone System) and considerably improved
displays.
Japan’s I-mode handset to handle a compressed version of normal HTML
pages rather than special WML pages.
Flow Charts:
One of the most widely used devices for designing programs is the
flowchart, which graphically represents the logic needed to solve programming
problem.
A program flowchart represents the detailed sequence of steps, needed to
solve the problem. Program flowcharts are frequently used to visualize the logic
and steps in processing.
There are only few standard flowchart symbols necessary to solve almost
any programming problem.
Symbol
or
The Input /output symbol is used to represent any input
Output operation. It may represent the point in a
program
where the data (input) is required or where the
information
(Output) is to be displayed.
The process symbol represents some type of data
manipulation or arithmetic operation.
The decision symbol represents a logical comparison
operation. Based on the comparison operation. Based on
the
Comparison, one of the two paths will be taken.
The connector symbol is used when several symbols
displayed at one point might cause confusion and
reduce
understanding. The Symbol directs the reader’s attention
to
another area of the Flowchart where the programs flow
continues.
The predefined process symbol is often used to represent
a
process that is used several times in the same program.
This
process is defined only once and reference by this block
thereafter.
The annotation flag symbol is used to identify clarifying
comments to other symbols. They do not represent a
logical
step or calculations in the program. They are used only
for
documentation purpose.
The terminal symbol represents the start or end of a
program.
It is also used to indicate a program interruption point
where
information can enter or leave.
The direction of flow symbols indicates the next step in the
program.
The flow charts shown in figure shows how the employee’s salary is calculated
and paychecks are printed. The explanation of the flowchart is given below.
1. This opens the employees’ personnel file.
2. This reads the employee’s last name, first name, week ending data, hourly
pay rate etc.
3. This is the “Last record” decision point. If the answer is “yes” the program
proceeds to calculations.
4. This multiplies hours worked with pay rate to get gross pay.
5. This asks if the employee worked overtime.
6. If the answer is “yes” overtime pay is calculated and added to gross pay.
7. This asks if the gross pay for the week is above Rs 300.
8. If the answer is “Yes” a tax rate of 15 % is calculated.
9. If the answer is “No” a tax rate of 10% is calculated.
10. This calculates the subtracts deductions, such as union dues and other
taxes and computes net pay.
11. This prints out the employee’s paycheck.
12. This reads the employee file for the next employee-name, week ending
data, hourly pay rate, etc.
13. When all the employee files have been read and the answer to the “Last
record” decision is “NO”, the program begins to terminate.
14. This closes all the employees personnel file.
15. This stops the program.
Flowchart to print Paychecks(Payroll Application)
A
8
7
Tax rate is
15%
Is Gross
Pay
>300
Start
Yes
s
No
Open data file
for input
Tax rate is
10%
1
Read data
for an
Employee
2
9
Calculate
deductions & Net
Pay
10
B
Print
Paycheck
3
Close data
file
Is
there
data?
11
Stop
Read Data for
an employee
No
Ye
s
Calculate Gross
Pay
4
B
6
5
Is there
overtim
e
Calculate
overtime pay
12
2
System Flowcharts:
In this text, most of our designs have dealt with isolated program, but in
reality most programs are designed and used as part of a broad interrelated system
of programs in which the output from one program may be the input to another
program. As designers we must consider not just the specifications for the
particular program segment on which we are working but also the specifications
for the entire system in order to be sure that our segment fits in to the system as
needed. A system flow chart shows how the programs fit together.
The system flowcharts looks at first very much like a program flowchart
but there are two major differences first the program flowchart shows the detailed
steps in a program and the system flow chart shows the same program as one
process box without showing any details. Second the program flowchart uses the
same symbol for all types of input and output with a system flowchart, we need to
show more information the particular input/output hardware device must be
shown to issue compatibility within the system. So the system flow chart utilizes
a wide variety of input/output symbols to identify the medium (Disk, Tape,
Keyboard) used.
The main symbols used in a system flow chart are shown below.
Input Edit
Program
Program Box
Communication Link Flow line to Remote Device
Flow Line
Manual Operation
Corrects
Errors
Employee
File
Employee
File
Magnetic Tape (I/O)
Magnetic Disk (I/O)
Error
Report
Menu
Display
Document (Output)
Video Display (Output)
Used Input
Keyboard (Input)
Most of us are accustomed to the grocery checkout scan system that reads
the UPC from product packaging and display the price on the cash register. That
system is checking some form of on-line storage for the price and as the same
time modifying the inventory count to indicate that one item has been sold. The
inventory file can also be sued as input for a product ordering program that will
produce printed recorder forms. A typical system flow chart might look something
like the one on the next page.
Notice that we have shown the particular hardware used for input and
output. This system is a simplification of a true point of sale inventory system. But
you can see how the system flow chart clarifies the relation between programs.
You can see in the above chart for e.g. that both the cash register program and the
recorder program use the inventory disk file the system flow chart does not
replace a program design. It is a supplements that shows another new which is not
available from a program flowchart or pseudocode to see that details happening
within one of the programs we would record to have a program design.
System Flow Diagram
Code Input
Price
File
Cash Register
Program
Short Answer:
1. List out the types of operating systems.
2. What is single user operating system?
3. What is multi user operating system?
4. List out the different kinds of DOS.
5. What are the types of Command in DOS?
6. What is OLE?
7. What are the levels of Internet Connectivity?
8. Abbreviate WWW.
9. FTP stands for what?
10. HTTP stands for what?
11. E-Mail stands for what?
12. What is TELNET?
13. Define USENET NEWS.
14. What is Internet?
15. What is Intranet?
16. What is Extranet?
17. What is E-Commerce?
18. What is Mobile Computer?
19. What is Radio Paging?
20. What is M-Commerce?
21. What is HTML stands for?
Long Answer
1.
2.
3.
4.
5.
6.
What are the types of Operating System?
Explain the components of Internet.
Explain the levels of Internet Connectivity.
Explain FTP and its features.
Explain Telnet and its features.
Explain M-Commerce in detail.
Register
Receipt
7. Explain E-Commerce in detail.
8. Explain a) UNIX b) WINDOWS 98 c) DOS in detail.
9. Explain Unix OS in detail.
10. Explain Mobile Computers in detail
11. Write Short notes on FTP, HTTP.
12. Write Short notes on Internal Commands and External Commands of
DOS.
13. Explain Kernel and Pipeline technique of UNIX Operating System.
14. Explain Single User Operating System in detail.
15. Explain Multi User Operating System in detail.
16. Write Short Notes. a) Internet b) Extranet c) Intranet.
17. Write Short Notes. a) Radio Paging b) MOBITEX
18. Explain steps involved in E-MAIL.
19. Write Short Notes on Email Discussion Groups.
20. Write Short Notes on Char and Instant Messaging.
21. Write Short Notes on Usenet News.
22. Write Short Notes on Windows NT.
23. Write Short Notes on E-Mail.
24. List out the difference between Single User OS and Multi User OS.
25. List out the difference between Windows 98 and Windows NT.
26. Write short notes on different types of DOS.
27.Explain Mobile Computers in detail.
System: A System is a network of related procedure designed to perform some
activity.
Procedures: Procedures are logical steps by repetitive action are initiated, carried
forward, controlled, and finalized.
Systems, which are implemented using a computer, fall into 3 broad
classifications.



Operational System.
Management Information System.
Decision Support System.
Operational System:
Operational System is designed to process the data that is generated by the
day-to-day business transaction of companies. This SAD follows a well-defined
scientific problem solving approach. The approach can be broken down into a
series of phases:
Phases 1- Initiation of the system project & preliminary Investigation.
Phases 2- detailed system investigation & analysis.
Phases 3- System design.
Phases 4- System development.
Phases 5- System implementation and evaluation.
Phases 6- System maintenance.
Initiation of the System Project & Preliminary Investigation:
A system project can originate in several ways, but a common way is that
the manager of a user department contacts the systems analysis and design group
in the information systems department with a request for assistance.
The purpose of the ‘preliminary investigation’ is to determine if the
request for assistance, which has been communicated, to the system department
warrants further detailed investigation and analysis. The most important aspect of
the preliminary investigation is to identify if there is a problem and, if so, to
uncover the true nature of the problem. The primary method of conducing the
preliminary investigation is through the ‘personal interview’. The interviews are
conduced with managerial and supervisory personnel who may have knowledge of
the problem and system under study.
At the conclusion of the investigation, the analyst will present the findings
to management and recommend the next course of action. If it is recommended to
continue the project through a detailed investigation, the analyst will provide
management with an estimate of the cost for the next phase in terms of man-hours,
and elapsed time.
Detailed System investigation and analysis
If approval to proceed is obtained from management the analyst will begin
the ‘detailed investigation and analysis’. This phase of the system study is divided
into two parts: 1) A detailed investigation in which the emphasis is on WHAT is
taking place in the current system: 2) An analysis of what is taking place with an
emphasis on WHY the procedures found are occurring, and what the user sees as
the requiem ends for a new system.
The basic fact-gathering techniques used during the detailed system
investigation are: 1) The interview: 2) Questionnaires; 3) Gathering the current
system documentation and operating forms; 4) Personal observation of current
procedures.
Specific steps undertaken at this time to gather the facts include: 1) review
the organizational chart of the structure of the company to determine who are the
workers, supervisors, and management personnel associated with he system under
study; 2) Conduct interviews with selected personnel to determine what is actually
taking place in the current system, rather than what is supposed to take place
according to the written rules of the company; 3) Obtain actual copies of operating
documents; 4) Document and record all of the data flow within the currently
existing system and the actual procedures, which are followed.
Once of the more effective is the data flow diagram. This DFD illustrates
graphically the flow of data and the procedures used for an auto parts order entry
system. Since the present system is being reviewed in detail, there obviously were
some problems in the system. After the current system has been documented and
analyzed, the analyst must assist the user to identify the requirements of the new
system. This analyst will include understanding the problems in the current
system, planning for growth and change in the user department, understanding the
personnel requirements and capabilities in the department and a number of other
factors as well.
At the conclusion of this activity the analyst should prepare a written and
oral presentation of the findings, which can be presented to both the user and to
other management.
System Design:
Upon approval to proceed, the analyst must determine the best method for
implementing a new system. The choice usually are: 1) Personnel in the
information systems department design and implement the application: 2) The
user, through the use of fourth generation applicatio9n development tools or
through the facilities offered by the information centre, designs and implements
the application: 3) A prewritten applications software package is purchased which,
with little or no modification, will perform the tasks required of the new system:
4) The systems department designs the system and then contracts with an outside
organization to have the system programmed and implemented: 5) the entire
project is contracted out to an outside organization that designs and implements
the system.
As the design phase begins, develop a prototype of the new system. A
‘prototype’ is a series of small programs that allows a few of the transactions, with
will be processed on the real system to be processed. Because of the prototype
system, the user will have an exact idea or how the system will behave when it is
implemented, and the analysts are ensured that when the system is developed and
implemented, the user will be satisfied
When designing the ‘system output’ specific steps must be undertaken,
including o/p requirements of new system types of output etc., The analyst must
also, during the project maintain some data which will be stored by the system.
This is called ‘Data dictionary,. An important aspect of the establishment only
valid data is accepted and processed.
System Development:
After the design phase of the project, the project enters the “system
development” phase. The major tasks common to all system projects during the
system development phase are: 1) Establish a project development and
implementation plan; 2) Develop detailed programming specifications; 3)
Program and test the system; 4) Prepare final documentation of the system.
One of the first steps in the system in the system development phase is to
develop a detailed schedule of each of the activities that is to be performed. The
time schedule of the project is produced by a method often used to document the
schedule is the bar or “Gantt chart”. (flg. Refer your notebook).
Programmer’s jobs are 1) review the program 2) design the program 3)
coding the program 4) testing the program.
Program design entails the development of the structure of the program
and than the development of the logic to solve the problem presented by the
program.
After the programs in the system have been tested individually (commonly
called ‘unit tests’) the entire system of programs must be tested as a whole. This
process is called “System Testing”.
Implementation And Evaluation:
After testing has been complete and the documentation prepared, the
system is ready to be implemented on the computer and run in a production
environment. “Conversion” refers to the process of making the change from the
old system to the new system. Two methods are direct conversion and parallel
conversion.
With direct conversion, at a given date the old system ceases to be
operational and the new system is placed into use. Direct conversion, howere, can
be risky, in spite of the great care, which may have been taken in designing the
system.
Parallel Conversion consists of processing data on both the old and new
systems simultaneously and comparing the results. Regardless of the method of
implementation used. It is important to conduct a formal post implementation
evaluation of the system. The evaluation consists the designing, operating costs.
System Maintenance:
An ongoing process after the system has been implemented is ‘system
maintenance’. Maintenance consists of two major activities: 1) Changes to correct
errors in the system: 2) Changes to give the system additional capabilities or to
conform to government or company regulations.
Maintenance activities require a great deal of time for many programmers
and analysts. Systems, which are well documented and contain well-designed
programs, are much easier to maintain than those, which do not follow good
documentation and coding standards.
Computer Based Information Systems:
Transaction Processing:
In most organizations, particularly business organizations, most of what
goes on takes the form of transactions. A ‘transaction” is a recorded event having
to do with routine business activities. This includes everything concerning the
product or service in which the organization is engaged: Production, distribution,
sales, orders. It also includes materials purchased, employers hired, taxes paid,
and so on. Today in most organization the bulk of such transactions are recorded
in a computer-based information system.
A transaction processing system (TPS) is a computer based information
system that keeps track of the transactions needed to conduct business. The
transaction processing system is also sometimes called an electronic data
processing (EDP) system.
Some features of a TPS are as follows:

Input and Output: The inputs to the system are transaction data: bills,
orders, inventory levels, and the like, the output consists of processed
transactions: bills, paychecks, and so on.

For lower managers: Because the TPS deals with day-to-day matters, it is
principally of use to supervisory managers. That is, the TPS helps in making
tactical decisions. Such systems are not usually helpful to middle or top
managers.

Produces detail reports: A lower-level manager typically will receive
information in the form of detail reports. A detail report contains specific
information about routine activities. An example might be the information
needed to decide whether to restock inventory.

One TPS for each department: Each department or functional area of an
organization-Research & Development, Production, Marketing, and
Accountings Accounting & Finance – usually has its own TPS. For example,
the Accounting & Finance accounts payable, and payroll.

Basis for MIS and DSS: The database of transactions stored in a TPS is used
to support a management information system and a decision support system.
Management Information System (MIS)
A ‘management information system (MIS)’ is a computer-based
information system that derives data from all on organization’s departments and
produces routine reports of the organization’s performance. To perform it’s major
functions of planning organizing, staffing, directing, and controlling.
Concept of MIS
Planning
Planning means to set the goals and objectives for the company:
management should know and understand the nature of the company. Its
competition, its market place etc., before planning. Establishing policies,
procedures, programs of a company are one of the important steps of planning.
Fig. Concept of MIS
Organizing
To organize means to develop and maintain the resources and structure of
a company. Managers must be assigned their duties; workers must be given their
work to meet the desired goal.
Staffing
Staffing is a continuous process of recruiting and training the employees.
Directing
To co-ordinate the activities of the company and to delegates the authority
for causing out the activities and to attain the Objectives directing is necessary.
Directing includes Co-ordination, Communicating, motivating the employees to
do their jobs to attain the goals.
Controlling
To control means to evaluate by comparing actual with the goal: Any
deviation actions are taken to correct the deficiencies. Sometimes the necessary
action requires written to the planning functions to revise the goals..
MIS can be divided into various level of management.
Operational Level
Operational manager is responsible for day-to-day operations: The
functions are employing the people, training to the employees, maintaining the
stick level, maintaining the customer relationship-supervising the employees, and
verifying the cash register.
Tactical Level:
Responsibility is given to the manager not for a single unit but for several
units. MIS functions are to rectify the consumer complaints, to achieve the
individual unit goals, to analyze and find the reason for decrease in sales and
production.
Top Level or Strategic Level:
Responsibilities given to the manager for the whole organization for long
range planning. It includes fixing the organization for long range planning. It
includes fixing the objectives, scheduling the program to prepare the budgeting.
Decision Support Systems (DSS)
A decision support system (DSS) is a computer-based information system
that provides a flexible tool for analysis and helps managers with non-routine
decision-making tasks.
Some features of a DSS are as follows:
Input and Output: Inputs consist of some summarized reports, some processed
transaction data, and other internal data. They also include data that is external to
that produced by the organization. This external data may be processed by trade
associations, marketing research firms and other government agencies. The
outputs are flexible, on-demand reports with which a top manager can make
decisions, about unstructured problems.
Mainly for Top Managers: A DSS is intended principally to assist top managers,
although it is now being used by middle managers, too. Its purpose is to help hem
make strategic decisions – decisions about unstructured problems, often
unexpected and nonrecurring. These problems may involve the effect of events
and trends outside the organization. Examples are raising interest rates or a
possible strike in an important materials-supplying industry.
Produces Analytical Models: The key attribute of a DSS is that it uses models.
A ‘model’ is a mathematical representation of a real system. The models use a
DSS database, which draws on the TPS (Transaction Processing System) and MIS
(Management Information System) files, as well as outside data. The system is
accessed through DSS software.
The model allows the manager can simulation-play a “what if”
game-to Reach decisions. Thus, the manager can simulate an aspect of the
organization’s environment in order to know how to react to a change in
conditions affecting it. By changing the hypothetical inputs to the modelnumber of workers available, distance to markets, ir whatever-the manager can
see how the model’s outputs are affected.
Group Decision Support Systems
As communications becomes a more important of an information
system, so does a kind of an information system, so does a kind of DSS called
group decision support systems. A ‘group decision support system’ (GDSS)
enables teams of coworkers to use networks of microcomputers to share
information and cooperate on projects. A group decision support system is also
called workgroup computing. By sharing ideas, workers can build consensus
and arrive are decision collaboratively. GDSSs are being found in fields
‘ranging from banking and insurance to architectural design and newspaper
publishing.
Executive Information Systems
An Executive information system (EIS) is a DSS made especially for top
managers and specifically supports strategic decision-making. An ESI is also
called an Executive Support System (ESS). It draws on data not only from
systems internal to the organization but also from those outside, such as news
services or market-research databases. An EIS might allow senior executives to
call up predefined reports from their personal computers, whether desktops or
laptops. They might, for instance call up sales figures in many forms – by region,
by week, by fiscal year, by projected increases. The EIS includes capabilities for
analyzing data and doing “what-if” scenarios.
Expert Systems
Artificial Intelligence (AI):AI is a group of related technologies that attempt to
develop machines to emulate human-like qualities, such as learning, reasoning,
communicating, seeing and hearing.
Artificial Intelligence is a research and applications discipline that includes five
areas:
o Robotics – is concerned with developing machines that can
perform work like
o Humans.
o Perception systems – are sensing devices that emulate the human
senses.
o Expert systems – are interactive programs that help people solve
problems
o Otherwise requiring a human expert.
o Natural language processing (including fuzz logic) – studies
ways computers can understand human language, and fuzzy logic
deals with problems of uncertainty.
o Neural networks – mimic human brain nerve cells. We also
consider an area known as artificial life, which involves computer
instructions that act like living organisms.
Expert Systems
An expert system is an interactive computer program that can apply rules
to input in such a way as a generate conclusions. The program helps users solve
problems that would otherwise require the assistance of a human expert.
Note: Draw the diagram.
An expert system consists of three components.
Knowledge base:
A “Knowledge bas’ is an expert system’s database of knowledge about a
particular subject. This includes relevant facts, information beliefs, assumptions,
and procedures for solving problems. The basic unit of knowledge is expressed as
an IF-THEN-ELSE rule. Programs can have as many as 10,000 rules. A system
called ExperTAX, for example, which helps accountants figure out a client’s tax
options, consists of over 2000 rules.
Inference engine:
The ‘inference engine, is the software that controls the search of the
export system’s knowledge base and produces conclusions. It takes the problem
posed by the user of the system and fits it into the rules in the knowledge base. It
then derives a conclusion from the fact and rules contained in the knowledge base.
Reasoning may be by a forward chain or backward chain. In the forward
chain of reasoning, the inference engine begins with a statement of the problem
form the user. If then proceeds to apply any rule that the problem. In the
backward chain of reasoning, the system works backward from a question to
produce an answer.
User Interface:
The user interface is the display screen that the user interacts with. If
gives the user the ability to ask questions and get answers. It also explains the
reasoning behind the answer.
Applications:
Expert systems exist in many areas.
 MYCIN helps diagnose infections diseases.
 PROSPECTOR assesses geological data to locate mineral deposits.
 DENDRAL identifies chemical compounds.
 Home-Safe-Home evaluates the residential environment of an elderly
 Person.
 Business Insight helps businesses find the best strategies for marketing a
 Product
 REBES (Residential Burglary Expert System) helps dectives investigate
 Crime scenes.
 CARES (Computer Assisted Risk Evaluation System) help social workers
 Assess families for risks of child abuse.
 Muckraker assists journalists with investigate reporting.
Flow Charts:
One of the most widely used devices for designing programs is the
flowchart, which graphically represents the logic needed to solve programming
problem.
A program flowchart represents the detailed sequence of steps, needed to
solve the problem. Program flowcharts are frequently used to visualize the logic
and steps in processing.
There are only few standard flowchart symbols necessary to solve almost
any programming problem.
Symbol
or
The Input /output symbol is used to represent any input
Output operation. It may represent the point in a
program
where the data (input) is required or where the
information
(Output) is to be displayed.
The process symbol represents some type of data
manipulation or arithmetic operation.
The decision symbol represents a logical comparison
operation. Based on the comparison operation. Based on
the
Comparison, one of the two paths will be taken.
The connector symbol is used when several symbols
displayed at one point might cause confusion and
reduce
understanding. The Symbol directs the reader’s attention
to
another area of the Flowchart where the programs flow
continues.
The predefined process symbol is often used to represent
a
process that is used several times in the same program.
This
process is defined only once and reference by this block
thereafter.
The annotation flag symbol is used to identify clarifying
comments to other symbols. They do not represent a
logical
step or calculations in the program. They are used only
for
documentation purpose.
The terminal symbol represents the start or end of a
program.
It is also used to indicate a program interruption point
where
information can enter or leave.
The direction of flow symbols indicates the next step in the
program.
The flow charts shown in figure shows how the employee’s salary is calculated
and paychecks are printed. The explanation of the flowchart is given below.
16. This opens the employees’ personnel file.
17. This reads the employee’s last name, first name, week ending data, hourly
pay rate etc.
18. This is the “Last record” decision point. If the answer is “yes” the program
proceeds to calculations.
19. This multiplies hours worked with pay rate to get gross pay.
20. This asks if the employee worked overtime.
21. If the answer is “yes” overtime pay is calculated and added to gross pay.
22. This asks if the gross pay for the week is above Rs 300.
23. If the answer is “Yes” a tax rate of 15 % is calculated.
24. If the answer is “No” a tax rate of 10% is calculated.
25. This calculates the subtracts deductions, such as union dues and other
taxes and computes net pay.
26. This prints out the employee’s paycheck.
27. This reads the employee file for the next employee-name, week ending
data, hourly pay rate, etc.
28. When all the employee files have been read and the answer to the “Last
record” decision is “NO”, the program begins to terminate.
29. This closes all the employees personnel file.
30. This stops the program.
System Flowcharts:
In this text, most of our designs have dealt with isolated program, but in
reality most programs are designed and used as part of a broad interrelated system
of programs in which the output from one program may be the input to another
program. As designers we must consider not just the specifications for the
particular program segment on which we are working but also the specifications
for the entire system in order to be sure that our segment fits in to the system as
needed. A system flow chart shows how the programs fit together.
The system flowcharts looks at first very much like a program flowchart
but there are two major differences first the program flowchart shows the detailed
steps in a program and the system flow chart shows the same program as one
process box without showing any details. Second the program flowchart uses the
same symbol for all types of input and output with a system flowchart, we need to
show more information the particular input/output hardware device must be
shown to issue compatibility within the system. So the system flow chart utilizes
a wide variety of input/output symbols to identify the medium (Disk, Tape,
Keyboard) used.
The main symbols used in a system flow chart are shown below.
Input Edit
Program
Program Box
Communication Link Flow line to Remote Device
Flow Line
Manual Operation
Corrects
Errors
Employee
File
Employee
File
Magnetic Tape (I/O)
Magnetic Disk (I/O)
Error
Report
Menu
Display
Document (Output)
Video Display (Output)
Used Input
Keyboard (Input)
Most of us are accustomed to the grocery checkout scan system that reads
the UPC from product packaging and display the price on the cash register. That
system is checking some form of on-line storage for the price and as the same
time modifying the inventory count to indicate that one item has been sold. The
inventory file can also be sued as input for a product ordering program that will
produce printed recorder forms. A typical system flow chart might look something
like the one on the next page.
Notice that we have shown the particular hardware used for input and
output. This system is a simplification of a true point of sale inventory system. But
you can see how the system flow chart clarifies the relation between programs.
You can see in the above chart for e.g. that both the cash register program and the
recorder program use the inventory disk file the system flow chart does not
replace a program design. It is a supplements that shows another new which is not
available from a program flowchart or pseudocode to see that details happening
within one of the programs we would record to have a program design.
System Flow Diagram
Code Input
Price
File
Cash Register
Program
Price
Display
Inventory
File
Register
Receipt
Recorder
Program
Recorder
Forms
Objectives:
1. The _______ must work closely with user when creating a new systems
design.
2. Middle management makes _______ decisions.
3. ______ Tools are software packages that provide computer-automated
means of designing and changing systems.
4. A (n) _______ enables teams of co-workers to use networks of
microcomputers to share information and cooperate on projects.
5. A (n) ________ is a schematic diawing that shows the hierarchy of formal
relationships among an organization’s employees.
6. A __________ provides descriptive information about the data items stored
in the database.
7. The computer professional responsible for maintaining the database is
called a ________.
Short Answers:
1. Define MIS
2. Define Decision Support System.
3. What is mean by transaction processing?
4. What is the three-management support level in MIS?
5. Define Expert System. Give any two-application tools.
6. What are the basic computers based information systems?
7. Define SAD.
8. What are the various phases in System Analysis Design?
9. What is inference engine?
10. Define EIS.
11. Define GDSS.
12. Write short notes on Office Automation.
13. Write short notes on program implementation.
14. What is meant by program maintenance?
15. What is a Prototype?
16. What is a DED?
17. What is a flowchart?
18. What is Program Design?
19. What are the processes involved in Detailed Investigation?
20. Mention any two program designed tool.
21. What is mean by a structured programming?
22. What is a testing?
23. Write short Notes on: a) System Analyst b) Programmer.
24. What is an operating system?
25. What are the basic operating systems we are using?
26. Write short notes on operating systems and its types.
27. Give examples of single user OS.
28. Define kernel.
29. Define shell.
30. What is a pipe?
31. Write short Notes. A) External Commands B) Internal Commands.
32. What is Internet?
33. What is Internet?
34. What is WWW?
35. What is Extranet?
36. Write short notes on FTP.HTTP.
37. What is E-commerce?
38. What is M-commerce?
Long Answers:
1. Explain the various phases in System Analysis and Design.
2. Discuss the Management Information System in detail.
3. Explain: 1) Decision Support System. 2) Expert Systems.
4. What are the various features of DSS?
5. What are the various features of Expert Systems?
6. Discuss the Computer based Information Systems.
7. Explain the Transaction Processing System (TPS) in detail.
8. Explain the various operating systems in detail.
9. Explain: a) UNIX b) WINDIWS 98 c) DOS
10. Explain the terms; a) Intranet b) TELNET
11. Explain WWW in detail.
12. Explain UNIX OS in detail.
13. Explain Mobile Computers in detail.