Computer Applications in Business by Anil Kumar PDF
Computer Applications in Business by Anil Kumar PDF
COMPUTERS: AN INTRODUCTION
1
1.1 INTRODUCTION
Man's continuous search for fast and accurate calculating devices ultimately brings us to
the modern age that can be rightly called as the Computer Age. The computer – a
package of metal, plastic and wires is truly an amazing machine. This machine is creating
sweeping and dramatic changes in all spheres of our present life and working
businesses; we learn; we conduct scientific and engineering probes; we play and entertain
ourselves … It is said that this machine will improve world's culture by allowing people
not only to be more productive but to have more free time to create.
Two major factors that stimulate development in any field are the following:
Prior to the industrial revolution computers were only used for scientific research. Their
potential was first recognized by the US Army during the world war. They were used to
keep track of the movement of arms and ammunition. Following the industrial revolution,
people felt that computers could also be used for commercial purpose. For example, in
the banks to maintain efficient banking system, in industrial and business houses to
maintain their inventory for accounts management, sales and budgeting, production and
planning.
At the same time dramatic development in the Electrical, Electronic and Communication
Engineering together with software expertise has enabled many of these demands to be
met. One such engineering technology is the Information Technology, popularly known
as IT, which brought computers to our homes and offices. This led to a revolution in the
IT industry, keeping in mind the need of the modern era that believed in the speedy
storage and retrieval of information, at any point of time. This resulted in an effective and
efficient working environment. Thus, the modern age is rightly called the 'Computer
Advantages of Computers
for inventing the computer was to create a fast calculating machine. But more than 90%
Hence, to define a computer merely as calculating device is to ignore over 90% of its
work.
More accurately, a computer may be defined as a device that operates upon information
or data. Data can be anything like bio-data of various applicants when the computer is
used for recruiting personnel, or the marks obtained by various students in various
subjects when the computer is used to prepare results, or the details (name, age, sex etc.)
of various passengers when the computer is employed for making airline or railway
reservations, or numbers of different types in case of application of computers for
takes data input from its user, stores, processes data and generates the
The fact that computers process data is so fundamental that many people have started
calling it a data processor. The name data processor is more inclusive because modern
computers not only compute in the usual sense but also perform other functions with the
data that flow to and from them. For example, data processor may
Thus computers not only can add, subtract, multiply and divide numbers but can also do
certain logical operations; can remember (i.e. store and recall information); can
process a large volume of data effortlessly; can interpret massages from remote locations.
Computers undertake repetitive and boring tasks, relieving us for more critical, creative
processing. Computers work at constant efficiency and perform tasks repeatedly without
errors, avoiding the fatigue, that affect human beings. Computers can be used in almost
every field and for almost every purpose. Computers allow society to undertake new
activities in various fields and to function more efficiently. Computers are impartial.
They offer a mean of data processing unaffected by social, religious or cultural bias and
prejudice. Computers offer effective and efficient data storage and retrieval, highest
Computers come in many varieties, including the personal computer, tiny computers built
into appliances and automobiles, and mainframe machines used by many people
simultaneously to run a business. Despite their differences in size and use, all these
computers are part of a system. A complete computer system consists of four parts:
operations. They can be programmed to do complex, tedious and monotonous tasks. All
computers have certain common characteristics irrespective of their type and size. The
following are the important characteristics which took together, enable a computer to
surpass its performance in some tasks in which the human beings cannot perform
efficiently:
1. Speed: A computer is a very fast device capable of data processing at
unbelievable speed. It can perform in a few seconds the amount of work that a
human being may not be able to do in an entire year even if he works day and
night and does nothing else. Computers can process millions of instructions per
second thus carrying out even the complex tasks in fractions of seconds without
any mistake.
While talking about the speed of a computer, we do not talk in terms of seconds
or even milliseconds (10-3). Our units of speed are the microseconds (10-6), the
second.
particular computer depends upon its design. But for a particular computer, each
and every calculation is performed with the same accuracy. Errors can occur in a
computer, but these are mainly due to human rather than technological weakness.
The errors in computer are due to errors in programming and operation by human
wonderful features of the computer in the sense that they are not only capable of
handling complex arithmetical problems, but can do equally well other number of
jobs. They can perform activities ranging from simple calculations to performing
computers and can receive and send data in various forms like text, sound, video,
graphics, etc. We, now, live in a connected world and all this is because of
lack of concentration etc. and hence can work for hours together without creating
any error and without grumbling. Due to this property computers obviously score
over human beings in doing routine type of jobs, which require greater accuracy.
They will perform the tasks that are given to them - irrespective of whether it is
time or the millionth time - with exactly the same accuracy and speed.
5. Storage Capability: Computers have their main memory and auxiliary memory
systems. A computer can store a large amount of data. With more and more
auxiliary storage devices, which are capable of storing huge amounts of data, the
computer storage unique is not that it can store vast amount of data, but the fact
that it can retrieve the information that the user wants in a few seconds. Every
piece of information can be retained as long as desired by the user and can be
recalled as and when required. Even after several years, the information recalled
components have long failure free lives. A microprocessor chip is said to have a
life of 40 years even under adverse conditions and much before it fails, it will
minimal cost.
not a simple calculator where you have to punch in the numbers and press the
equal to sign to get the result. Once a task is initiated, computers can proceed on
its own till its completion. Computers can be programmed to perform a series of
complex tasks involving multiple programs. Computers will perform these things
flawlessly. They will execute the programs in the correct sequence, they will
switch on/off the machines at the appropriate time, they will monitor the
operational parameters, and they will send warning signals or take corrective
actions if the parameters exceed the control level, and so on. Computers are
computer, today, is a very familiar household word. In 1950's computers were special
purpose machines, which only huge institutions such as governments and universities
could afford. In the 1960's modern computer began to revolutionize the business world
and today it has become popular with all kinds of people from business to employees,
from doctors to lawyers and from players to school going children. Today, computers are
directly or indirectly influencing every aspect of our lives. Wherever human intellect and
technology meet, we will find computers. Computers of all sizes and shapes are used for
every purpose imaginable - from selling railway tickets to running washing machines;
from stock market analysis to playing games; from publishing a new letter to designing a
building… They can perform activities ranging from simple calculations to performing
complex CAD modeling and simulations to navigating missiles and satellites. Computers
can communicate with other computers and can receive and send data in various forms
like text, sound, video, graphics, etc. This ability of computer to communicate to one
another has led to the development of computer networks, Internet, WWW and so on.
Today, we can send e-mail to people all around the world. We, now, live in a connected
world and all this is because of computers and other related technologies.
Uses of Computers
During the last four decades, computers have revolutionized almost all disciplines of our
life. Computers have made possible many scientific, industrial and commercial advances
that would have been impossible otherwise. Computers are being used in many areas of
Computers have completely altered the structure of business. They are reshaping the
basics of business. Customer service, operations, product and marketing strategies, and
applications. The computers that support these functions can be found on the desk, on the
shop floor, in the store, even in briefcases. Computers have become an everyday part of
business life.
Figure 1-2 illustrates the fundamental roles of computers in business. Computer systems
Support of Strategic
Competitive Advantage
Support of
Managerial Decision-Making
Support of
Business Operations
Let's take a retail store as an example to illustrate these important roles. As a consumer,
we have to deal regularly with the computer-based information systems that support
business operations at many retail stores where we shop. For example, most retail stores
now use computer-based information systems to help them record customer purchases,
keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends.
Store operations would grind to a halt without the support of such information systems.
attempt to gain a strategic competitive advantage. For example, decisions on what lines
systems. This not only supports the decision making of store managers but also helps
them look for ways to gain an advantage over other retailers in the competition for
customers.
Gaining a strategic advantage over competitors requires innovative use of computers and
information technology. For example, store managers might make a decision to install
computerized touch-screen catalog ordering systems in all of their stores, tied in with
stores because of the ease of ordering provided by such innovative information systems.
Thus, computer-based strategic information systems can help provide strategic products
and services that give a business organization competitive advantage over its competitors.
perform certain tasks better, faster and cheaper. But it cannot substitute man. The words
of John F Kennedy are also 100% true "Man is still the most extraordinary Computers
of all". The Computer, being an electronic device, has certain limitations, which can be
summarized as follow:
1. No IQ: A computer is not a magical device. It can only perform tasks that a
human being can. The difference is that it performs these tasks with unthinkable
speed and accuracy. It possesses no intelligence of its own. Its IQ is zero, at least
till today. Hence, only the user can determine what tasks a computer will perform.
A computer cannot take its own decision in this regard. Unlike the human brain, a
computer cannot think on its own, but has to be given very explicit, step-by-step
instincts because they are machine. Although men have succeeded in building a
memory for the computer, but no computer possesses the equivalent of human
heart and soul. Based on our feelings, taste, knowledge, and experience, we often
make certain judgments in our day-to-day life. But computers cannot make such
judgments on their own. Their judgments are based on the instructions given to
them in the form of programs that are written by us. They are only as good as man
It is said for computers, "Garbage In Garbage Out (GIGO)". Many of the problems with
computers occur because the computer can't tell the difference between doing something
sensible versus something ridiculous. Erasing all its stored data is no different to a
computer from adding two numbers. Computers operate logically, but they are incapable
nonsense.
everything we can of think: from organizing records to directing traffic. The Information
our everyday lives is monumental, though taken for granted. Every time we make a bank
deposit, purchase items on a credit card, pay an insurance premium or rent a video movie,
innumerable computer operations are involved. Making all these operations happen,
behind the scenes, is the work of a vast array of professionals: computer programmers,
sophisticated, the need for highly skilled computer professionals increases accordingly.
The computer technology industry on the whole encompasses many fields of professional
involvement and advancement. In broad terms, here are some of the career options that
address highly theoretical and complex problems associated with making new
businesses, end-user consumers, etc. Included in this group of computer scientists are
People working in this field analyze the informational needs within an organization
and the ways by which various computer systems should properly relate to each other
to enhance the overall operation of the organization. Systems analysts ensure that the
properly with each other. To accomplish this task, systems analysts study and modify
the capabilities of the computer hardware and software to meet the changing demands
of an evolving organization.
3. EDP Auditor Jobs
This is a challenging career option for professionals who have keen interests and
EDP (Electronic Data Processing) auditing is to ensure the accuracy, efficiency, and
integrity of a company's computer system, which is at the heart of all its business
operations. EDP auditors are concerned, in part, with the accuracy of computer input
and output as this accuracy relates to the possibility of financial impropriety, security
and various applications, EDP auditors need a good understanding of business and
financial management. In fact, many EDP auditors hold MBA degrees and/or CA
certification.
4. Consulting Jobs
One who aspires to become computer consultant can follow a number of career paths.
several years of industry experience, they choose the route of freelance consulting,
often as stepping-stones for starting their own companies to carve their niches in the
computer market. Talented young professionals may also consider a career with
One can make career in computer teaching at both under graduate and post graduate
levels.
have basic knowledge of computers and the commonly used applications. It is imperative
that we become a computer savvy professional-a person who can use computers with
ease to perform routine tasks like composing a letter or memo, send and receive e-mail,
surf the Internet, make computer presentations, etc. Because in today's information age-
where computers hold the center stage - computer proficiency is a must for our survival
and success.
The workers and professionals of the world will soon be divided into two
distinct groups: those who will control computers and those who will be
controlled by computers. It would be best for you to be in the former
group.
Lewis D Eigen
1.7 SELF-ASSESSMENT QUESTIONS
programmed instructions, which give the machine a purpose and tell it what to do.
Computers come in many varieties, including the personal computer, tiny computers built
into appliances and automobiles, and mainframe machines used by many people
simultaneously to run a business. Despite their differences in size and use, all these
computers are part of a system and operate on the same fundamental principles. In this
system is vital to the effective use and management of computers. We should be able to
visualize any computer this way, from a microcomputer to a large computer system
all the elements of a system are controlled in such a way that the system goal is
achieved
Since a computer is made up of integrated components (input and output devices, storage,
CPU) that work together to perform the basic system function of:
1. Inputting: The process of entering data and instructions into the computer
system.
2. Storing: Saving data and instructions so that they are available for initial or
5. Controlling: Managing the manner and sequence in which all of the above
All the components of a computer system (to be discussed shortly) are integrated and
interacting. The Input or Output units cannot function until they receive signals from the
CPU. Similarly, the Storage unit or the CPU alone is of no use. So the usefulness of each
unit depends on other units and can be realized only when all units are put together
2.3.1 Hardware
The mechanical devices that make up the computer are called hardware. In other words,
hardware is any part of the computer we can touch. Hardware consists of interconnected
electronic devices that we can use to control the computer's operation, input and output.
Input Devices: The input devices of a computer system include keyboards, touch
form for direct entry or through telecommunication links into a computer system.
Table 2-1
Trend: Towards Direct Input Devices that are more Natural and Easy to use
Output Devices: The output devices of a computer system include video display
units, printers, audio response units, and so on. They convert electronic
presentation to end-users.
Table 2-2 highlights major trends in output devices of a computer system
Table 2-2
Trend: Towards Direct Output Methods that communicate Naturally, Quickly and Clearly
Storage Devices: The storage function of a computer system takes place in the
secondary storage devices such as magnetic disk and tape units. These devices
store data and program instructions needed for processing. Various secondary
storage devices include tape drives, optical drives, removable hard drives, DVDs
floppy disks, and different kinds of compact disks such as CD-ROM, CD-R, CD-
RW.
Central Processing Unit (CPU): The central processing unit (CPU) is the main
CPU's major components, perform the arithmetic and logic functions required in
computer processing.
Table 2-3
Magnetic
Secondary Tape Magnetic Tape Magnetic Tape Magnetic Disk Magnetic Disk Optical
Storage Magnetic Magnetic Disk Magnetic Disk Optical Disk Disk
Drum
2.3.2 Software
programs) that make the computer perform tasks. In other words, software is the non-
tangible component of the computer system that tells the computer what to do. They are
System Software: These programs exist primarily for the computer's use and help
the computer perform and manage its own tasks. System software has its
computer system. DOS, UNIX, Windows 2000 etc. are some examples of system
software.
Application Software: These programs exist primarily for the user and enable
Thus, application software has its orientation more towards performing user tasks.
Payroll System, Airline Reservation System etc. are some examples of application
software.
Table 2-4
2.3.3 People
People are the personnel involved in using and maintaining the computer system. People
are
Trained Professionals: who design, build, program, repair and maintain the
computer system.
2.3.4 Data
Data consists of raw facts, which the computer stores and reads in the form of numbers.
The computer manipulates data according to the instructions contained in the software
and then forwards it for use by people or another computer. Data can consist of letters,
numbers, sounds, or images. No matter what kind of data is entered into a computer,
however, the computer converts it to numbers. Consequently, computerized data is
Within the computer, data is organized into files. A computer file is simply a set of data
or program instructions that has been given a name. A file that the user can open and use
is often called a document. Although many people think of documents simply as text, a
computer document can include many kinds of data. For example, a computer document
can be a text file (such as a letter), a group of numbers (such as a budget), a video clip
(which includes images and sounds), or any combination of these items. Programs are
organized into files as well, but because programs are not considered data, they are not
document files.
model to another. However, the basic organisation remains the same for all computer
systems. A block diagram is shown in Figure 2-2, which displays the five basic building
blocks or functional units, of a digital computer system. These five units correspond to
the five basic operations performed by all computer systems. The function of each of
performed on the supplied data. The input unit that links the external environment with
the computer system performs this task. Data and instructions enter input units in forms
that depend upon the particular device used. For example, data is entered from a
keyboard in a manner similar to typing, and this differs from the way in which data is
entered through a card reader which is another type of input device. However, regardless
of the form in which they receive their inputs, all input devices must provide a computer
with data that are transformed into the binary codes that the primary memory of a
interfaces. Input interfaces are designed to match the unique physical or electrical
It accepts (or reads) the list of instructions and data from the outside world.
It supplies the converted instructions and data to the complete system for further
processing.
information and results of computation to the outside world. Thus, it links the computer
with the external environment. As computers work with binary code, the results produced
are also in the binary form. Hence, before supplying the results to the outside world, it
units call output interfaces. Output interfaces are designed to match the unique physical
It accepts the results produced by the computer, which are in coded form and
have to be stored inside the computer before the actual processing starts. Similarly, the
results produced by the computer after processing must also be kept somewhere inside
the computer system before being passed on to the output units. Moreover, the
intermediate results produced by the computer must also be preserved for ongoing
processing.
The storage unit at the primary/main storage of a computer system is designed to cater
to all these needs. It provides space for storing data and instructions; space for
All the data to be processed and the instructions required for processing (received
Final results of processing before these results are released to an output device.
memory chip: the first kind, called ROM (read only memory), has permanently built into
information and instructions the computer needs to know in order to operate properly; the
second kind of memory, called RAM (random access memory), holds the program and
The RAM is a 'read and write' memory. This means we can store, or 'write', information
into this memory and later recall it, or 'read' it out again. The ROM, on the other hand,
can only be read; we cannot write information into it. This ensures that we do not destroy
er (a string of 0s and 1s). We can put information into the RAM and take information out of it when we need to. The ROM on the other hand is like a lette
loses all the information stored when the power is switched off. ROM, on the other hand,
is 'non-volatile'; its information is not lost when the power is switched off.
The secondary storage medium stores data, instructions and output for archival purpose
so that whenever any data or instructions is required in the future it can be retrieved for
as the Central Processing Unit (CPU). The CPU is the brain of any computer system. In a
human body, the brain takes all major decisions and the other parts of the body function
as directed by the brain. Similarly in a computer system, all major calculations and
comparisons are made inside the CPU and the CPU is also responsible for activating and
execution of the instructions takes place during the processing operation. To be more
precise all calculations are performed and all comparisons (decisions) are made in the
ALU. The data and instructions stored in the primary storage prior to processing, are
transferred as and when needed to the ALU where processing takes place. No processing
is done in the primary storage unit. Intermediate results generated in the ALU are
temporarily transferred back to the primary storage until needed at a later time. Data may,
thus, move from primary storage to ALU and back again to storage many times before
the processing is over. After the completion of processing the final results, which are
The type and number of arithmetic and logic operations that a computer can perform is
determined by the engineering design of the ALU. However almost all ALU's are
designed to perform the four basic arithmetic operations (add, subtract, multiply, divide)
and logic operations or comparisons such as less than, equal to, or greater than.
How does the ALU know what should be done with the data once they are received? And
how is it that only the final results are sent to the output device and not the intermediate
result? All this is possible because of the Control Unit of the computer system. By
selecting, interpreting, and seeing to the execution of the program instructions, the
Control Unit is able to maintain order and direct the operation of the entire system.
Although, it does not perform any actual processing on the data, the Control Unit acts as
a central nervous system for the other components of the computer. It manages and
coordinates the entire computer system. It obtains instructions from the program stored in
main memory, interprets the instructions, and issues signals that cause other units of the
routine clerical task to carry out and are given a willing helper who can follow
Firstly, we would sit our helper at a desk and provide him with an 'in'-tray for material
coming in (the input) and an 'out'-tray for material that had been processed (the output).
If the work involved calculations, we would also provide a desk calculator to help with
the arithmetic, and a pad of paper for working things out. Next, we would put in our
helper's 'in'-tray all the figures and information, such as prices and orders placed, needed
told what to do. He knows nothing about the job and so the instructions we give him will
have to be very detailed and precise. Such a set of instructions is called a program.
He would have to remember our more general instructions, and so memory would play an
important part in the whole process. He would probably note down the program of
detailed instructions on his pad so that he can quickly refer to it should he forget what he
is expected to do. The note-pad, then, is a type of memory, used not only for calculations
We would also give him some reference books, such as a catalogue of prices or a
telephone directory, which might be needed from time to time. These provide a second
kind of memory: they store information, like the note-pad, but the information is
permanent and cannot be changed. The books are 'read only' memories (they can only be
read), while the note-pad is a 'read and write' memory, since information can be written
Finally, he might also need as a 'backing' memory – a secondary storage- a filing cabinet
for those records, such as customer accounts, to which he may have to refer occasionally.
It is now up to our helper to co-ordinate and control the various operations required by
A computer works in much the same way as this and, incorporates the same basic
features
There is in every computer system a section to carry out each of these operations, and the
operations are combined to solve problems in the same way as they were combined to
2. What are the five basic functions performed by any computer system?
Objectives: The main objective of this lesson is to study the history and classification
of computers. After successful completion of the lesson the students will
be able to understand how man’s search for better and faster ways to
count, write and communicate bring us to the modern ‘Computer Age’.
Structure
3.1 Introduction
3.2 Early Computing Devices
3.3 Early Electronic Computers
3.4 Modern Computers
3.5 Classification of Computers
3.6 Self Assessment Questions
3.7 Suggested Readings
3.1 INTRODUCTION
The development of computers is the story of man’s continuous search for better and
faster ways to count, write and communicate. Although modern electronic computers are
only a recent phenomenon, the ideas and devices leading to the advent of computers date
for back in the history. Early man, when started to live a settled life in the stone age, used
pebbles and stone for counting items, and used marking on the walls for storing the
counts. The discovery of zero by Indian mathematician laid the foundation stone of the
number system. We can identify three distinct stages in the evolution of computers from
these simple ideas and devices to the complex and sophisticated devices as they are now:
Modern Computers
Soroban This device permits the user to represent number by the position of beads on a
rack. Simple addition and subtraction can be carried by out rapidly and efficiently by
positioning the beads appropriately. Although, the Abacus was invented around 600 BC,
it is interesting to note that it is still used in the Far East and its users can calculate at
amazing speeds.
Another manual calculating device was Napier's Bones, designed by John Napier, a
Scottish scientist. It used a set of eleven rods called ‘bones’ with numbers carved on
them. It was designed in early 17th century and its upgraded versions were in use even
around 1890. Pascaline, designed by Blaise Pascal in 1642, was the first mechanical
calculating machine. Pascaline used a system of gears, cogwheels and dials for carrying
out repeated additions and subtractions. Later in 1671, Baron Gottfried von Leibitz of
multiplication and divisions. In 1820, a similar key – driven mechanical calculator, called
control calculations. In the early 19th century a Frenchman, Joseph Jacquard invented a
loom that used punched cards to automatically control the manufacturing of patterned
The year 1822 could be considered a golden year in the history of Computer Science. It
equations and was built on the principal of gearing wheels of earlier era. It was also able
Encouraged by success of Difference Engine; Babbage, in 1833, came out with his new
idea of Analytic Engine. It could store 1000 numbers of 50 decimals each. It was to be
capable of performing the basic arithmetic function for any mathematical problem and it
unable to produce a working model of this machine mainly because the precision
engineering required to manufacture the machine was not available during that period.
However, his efforts established a number of principles, which have been shown to be
fundamental to the design of any digital computer. There were many features of the
Engine - punched card instructions, internal memory and an arithmetic unit to perform
calculation – that were incorporated in the early computer, designed a 100 year later. His
disciple, a brilliant mathematician, Lady Ada Lovelace, the daughter of the famous
English poet Lord Byron, developed the binary number system for Bandage's machine.
She is widely considered as the first programmer in the world, and programming
language ADA is named after her. Babbage’s Engines were more closely related to
modern computers than any of their predecessors. Many people today credit Charles
Keyboard machines originated in the United State around 1880 and are extensively used
even today. Around this period only, Herman Hollerith came up with the concept of
punched cards, which are extensively used as input media in modern digital computers.
Business machines and calculators made their appearance in Europe and America
In 1880's the Census Bureau of the United States appointed Harman Hollerith to develop
a technique for speeding up the processing of census data. It was the major breakthrough
of 19th century when the developed a machine which used punched cards to store the
census data. This innovation reduced the time of processing from 8 years to less than 3
years.
In 1890's many other countries like Canada, Australia, and Russia also used Hollerith
Machine for processing their census data. Later many other large organizations like
which, in 1911, merged with several other firms to form International Business
During the early part of the 20th century there was a flurry of activities in the computing
field. Due to the on set of World War II, there was a great need for devices, which can
produce ballistic tables very quickly. In the period of late 1930’s and early 1940's many
In this period, under the direction of George Stibitz of Bell Telephone Laboratories,
five large-scale computers were developed. These computers were built using
electromechanical relays and were called as Bell Relay Computers. These were capable
Harvard University and produced by IBM in the year 1944. This computer used more
than 3000 relays, was 50 feet long and 8 feet high and was named as Automatic
Sequence Controlled Calculator also called Mark-1. It was a quit fast machine and
could add two numbers in 0.3 seconds and multiple two number in 4.5 seconds. This
computer may be regarded as the first realization of Babbage's Analytical Engine. IBM
inventor’s name and his assistant, Clifford Berry. It used 45 vacuum tubes for internal
logic and capacitors for storage.
3.3.2 ENIAC(1943-46)
The Electronic Numerical Integrator And Calculator (ENIAC) was the first all electronic
Pennsylvania, USA by a design team led by Professors J. Presper Eckert and John
Mauchly.
ENIAC was developed as a result of military need. It took up the wall space in a 20 x 40
square feet room and it used 18,000 vacuum tubes. The addition of two numbers was
Although, much faster in speed as compared to Mark I computer, ENIAC had two major
shortcomings: it could store and manipulate only very limited amount of information, and
its programs were wired on boards. These limitations made it difficult to detect errors and
to change the programs. Hence its use was limited. However, whatever be the
3.3.3 EDVAC(1946-52)
The operation of ENIAC was seriously handicapped by the wiring board. This problem
was later overcome by the new concept of stored program developed by Dr John V
Neumann. The basic idea behind the stored program concept is that a sequence of
instructions as well as data can be stored in the memory of the computer for the purpose
considerably influenced the development of modern digital computers and because of this
feature we often refer to modem digital computers as stored program digital computers.
The Electronic Discrete Variable Automatic Computer (EDVAC) was designed on stored
program concept. Von Neumann has also got a share of the credit for introducing the idea
of storing both instructions and data in the binary form instead of the decimal numbers or
3.3.4 EDSAC(1947-49)
Almost simultaneously with EDVAC of USA, the Britishers developed Electronic Delay
Storage Automatic Calculator (EDSAC). The machine executed its first program in May
1949. In this machine, addition operation was accomplished in 1500 microseconds, and
This computer was a small experimental machine based on the stored program concept. It
A Newman. Its storage capacity was only 32 words, each of 31 binary digits. This was
too limited to store data and instructions. Hence, the Manchester Mark I was hardly of
The Universal Automatic Computer (UNIVAC) was the first digital computer, which was
not "one of a kind". Many UNIVAC machines were produced, the first of which was
installed in the Census Bureau in 1951 and was used continuously for 10 years. The first
In 1952, the International Business Machines (IBM) Corporation introduces the 701
The commercially available digital computers that could be used for business and
scientific applications had arrived. During the period of late 1940's and early 1950’s
many other stored program computers like ILLIAC, JOHNIAC, MANIAC etc. were
engineering purposes. In the early 1950's computers began to be sold commercially. The
development of commercial computer industry was really the beginning of the computer
revolution.
The modern computers era can be divided into four generations distinguished by the
basic electronic component within the computer. Each new logic unit has led to
computers that are faster in speed, smaller in size, more reliable and less expensive than
their predecessors. Modern computers came in a variety of shapes, sizes and costs.
growth of the computer industry. Originally, the term “generation” was used to
distinguish between varying hardware technologies. But nowadays, it has been extended
to include both the hardware and the software together that make up an entire computer
system.
The custom of referring to the computer era in terms of generations came into wide use
only after 1964. There are totally five computer generations known till today. Although
there is a certain amount of overlapping between the generations, the approximate dates
vacuum tubes for their processing and memory circuitry. These large computers
generated enormous amounts of heat; their vacuum tubes had to be replaced frequently.
Thus, they had large electrical power, air conditioning, and maintenance requirements.
First-generation computers had main memories of only a few thousand characters and
millisecond processing speeds. They used magnetic drums or tape for secondary storage.
Examples of some of the popular first generation computers include ENIAC, EDVAC,
devices that were wired to circuit boards in the computers. Transistorized circuits were
much smaller and much more reliable, generated little heat, were less expensive, and
required less power than vacuum tubes. Tiny magnetic cores were used for the com-
memory capacities of less than 100 kilobytes and microsecond processing speeds.
Removable magnetic disk packs were introduced, and magnetic tape emerged as the
major input, output, and secondary storage medium for large computer installations.
circuits, in which thousands of transistors and other circuit elements are etched on tiny
chips of silicon. Main memory capacities increased to several megabytes and processing
capabilities became common. This made it possible for operating system programs to
come into widespread use that automated and supervised the activities of many types of
same time, frequently involving networks of users at remote terminals. Integrated circuit
technology also made possible the development and widespread use of small computers
Fourth-generation computing relies on the use of LSI (large-scale integration) and VLSI
of transistors and other circuit elements on each chip. This enabled the development of
microprocessors, in which all of the circuits of a CPU are contained on a single chip with
chips that replaced magnetic core memories. Microcomputers, which use microprocessor
CPUs and a variety of peripheral devices and easy-to-use software packages to form
small personal computer (PC), systems or client/server networks of linked PCs and
servers, are a hallmark of the fourth generation of computing, which accelerated the
IBM PC/AT.
Computer scientists and engineers are now talking about developing fifth -generation
computers, which can ‘think’. The emphasis is now shifting from developing reliable,
faster and smaller but ‘dumb’ machines to more ‘intelligent’ machines. Fifth-generation
Japan, USA and many other countries are working on systems, which use Artificial
Control of Robots are the processes, which are used in these computers. The speed of the
computers will be billions of instructions per second, and will have unimaginable storage
Main characteristics:
generation
will not be algorithmic
will be knowledge processing and not data processing and architecture will be
decision-making capabilities
Figure 3-3 highlights trends in the characteristics and capabilities of computers. Notice
that computers continue to become smaller, faster, more reliable, less costly to purchase
and maintain, and more interconnected within computer networks. In terms of the
analogy with the automobile industry, if the automobile industry had grown like the
computer industry, the cost of a Rolls Royce would be around Rs 80 and would run a
million miles on a litre of petrol but the size would be that of a match box. Even though
computers in the last 50 years have become very fast, reliable and inexpensive, the basic
logical structure proposed by Von Neumann has not changed. The basic block diagram of
a CPU, memory and I/O is still valid today. With the improvements in integrated circuit
technology, it is now possible to get specialized VLSI chips at a low cost. Thus an
architecture, which makes use of the changes in technology and allows an easier and
In 1965 Gordon E Moore predicted, based on data available at that time that the density
Based on the experience from 1965 to date, it has been found that his prediction has been
surprisingly accurate. In fact the number of transistors per integrated circuit chip has
approximately doubled every 18 months. The observation of Moore has been called
"Moore's Law". In Figure 3-4 we have given two plots. One gives the number of
transistors per chip in Dynamic Random Access Memory along the y-axis and years
along x-axis. Observe that the y-axis is a logarithmic scale and the x-axis a linear scale.
The second plot gives the number of transistors in microprocessor chips. Observe that in
1974 the largest DRAM chip had 16 Kbits whereas in 1998 it has 256 Mbits, an increase
microprocessors has been similar. It is indeed surprising that the growth has sustained
over 30 years. The availability of large memory and fast processors has in turn increased
the size and complexity of systems and applications software. It has been observed that
software developers have always consumed the increased hardware capability faster than
the growth in hardware. This has kept up the demand for hardware.
Another interesting point to be noted is the increase in disk capacity. In 1984 disk
capacity in PCs was around 20 MB whereas it was 20 GB in 2000 - a 1000 fold increase
in about 16 years again doubling every 18 months, which is similar to Moore's law. These
improvements in capacity of computers have come about with hardly any increase in
The implication of Moore's law is that in the foreseeable future we will be getting more
powerful computers at reasonable cost. It will be up to our ingenuity to use this increased
recognition - voice and video user interfaces which require large amount of memory and
from the early stages. But, even today, all the computers are not of the same type.
Computers come in many different sizes and ranges of power, and different types of
representation):
Digital Computers
Analog Computers
Hybrid Computers
A digital computer, as the name suggests, works with digits. In other words, a digital
computer is a counting device. All the expressions are coded into binary digits (0s and 1s)
inside the computers and it maintains and manipulates them at a very fast speed. A digital
computer can perform only one operation i.e. addition. The other operations of
subtraction, multiplication and division are performed with the help of addition
operation. The digital computer circuits are designed and fabricated by the manufacturers
and are quite complicated ones. A digital computer manipulates data according to the
instructions (program) given to it in a certain language. The instructions and data are fed
1. General Purpose Computers: These computers are designed for use in different
types of applications in different areas. They can be used to prepare pay bills,
They are versatile; hence most businesses today use general-purpose computers.
2. Special Purpose Computers: The digital computers, which are made to meet
requirements of a particular task or job, are called special purpose computers. For
example, computers used for weather forecasting or for space applications. They
are also known as dedicated computers. The typical special purpose computers
are:
(a) Word Processor: This computer is most versatile for office automation
purposes and replaces the typewriters. It is widely used for the production of
office documents, letters, contracts, pay bills etc. It is a computer that has to
deal with the bulk of input, in production of bulk of printed output, not
duplicating machine with a very high speed and facilitates seeing through
process or job and as such are installed inside the machine being
automatised. These are digital computers with hybrid applications. LAN and
Automatic washing machines, digital clocks, Hot shot camera use these
computers.
(c) Optical Computers: These are under process of design and development.
Here the concept of application of quadral logic in place of binary logic and
(d) Hand Held and Pocket Computers: These are very small in size with
memory of 4 to 16 Kb. They are used for personal and scientific computing.
bills etc.
Analog computers represent numbers by a physical quantity i.e. they assign numeric
values by physically measuring some actual property, such as the length of an object, or
the amount of voltage passing through a point in an electric circuit. Analog computers
derive all their data from some form of measurement. Though effective for some
The accuracy of the data used in an analog computer is directly related to the precision of
Simulators for training pilots and Wall Clocks are some examples of analog computers
3.5.1.3 Hybrid Computers
Hybrid computers combine the best features of analog and digital computers. They have
the speed of analog computers and accuracy of digital computers. They are usually used
for special problems in which input data derived from measurement is converted into
digits and processed by computer. Hybrid computers for example, control National
Consider the Hybrid computer system in a hospital Intensive Care Unit (ICU). The
analog device may measure a patient heart function, temperature and other signs. These
measurements may, then, be converted into numbers and supplied to a digital device,
which may send as immediate signal to a nurse’s station if any abnormal readings are
detected.
To take another example of Hybrid computer, consider the system used in producing iron
ore pellets for steel making. It controls manufacturing and prepares production data on
inventory and costs. The computer accepts data both from sensors within the production
area and from conventional Input/Output devices. Using the production data, the
computer plans for future manufacturing and distributes existing inventories to activities
that require the computer to act as digital computer. The computer can act like an analog
We can also classify the computer systems into following categories by using the
Supercomputers
Mainframe computers
Minicomputers, or Midrange computers
Workstations
All of these computers can be connected to form networks of computers, but each
individual computer, whether or not it is on a network, falls into one of these five
divided into subcategories, some of which are growing rapidly enough to become major
3.5.2.1 Supercomputers
Supercomputers are the most powerful computers made, and physically they are some of
the largest. These systems are built to process huge amounts of data, and the fastest
supercomputers can perform more than trillion calculations per second. Some
supercomputers such as the Cray T-90 system; can house thousands of processors. This
speed and power make supercomputers ideal for handling large and highly complex
problems that require extreme calculating power such as numerical whether prediction,
Recently the use of supercomputers has expanded beyond scientific calculations. They
are now used to analyse large commercial databases, produce animated movies and play
Super computers can cost tens of million of dollars and consume enough electricity to
power dozens of homes. They are often housed in protective rooms with special cooling
systems, power protection, and other security features. Because of their size and cost,
supercomputers are relatively tare, used only by large corporations, universities, and
government agencies that can afford them. Supercomputing resources are often shared to
Figure 3-5 The IBM RS/6000SP: Super Computer that beat the World Chess
The largest type of computer in common use is the mainframe. Mainframe computers are
used in large organizations like insurance companies and banks where many people need
frequent access to the same data, which is usually organized into one or more huge
databases.
Mainframes are being used more and more as specialized servers on the World Wide
Web, enabling companies to offer secure transactions with customers over the Internet. If
we purchase an air line ticket over the Web, for example, there is a good chance that our
(e-commerce) server.
mouse) wired to the mainframe. There are basically two types of terminals used with
mainframe systems. A dumb terminal does not have its own CPU or storage devices;
these components are housed in the mainframe's system unit and are shared by all users.
Each dumb terminal is simply an input/output (I/O) device that functions as a window
into a computer located somewhere else. An intelligent terminal, on the other hand, has
its own processor and can perform some processing operations. Intelligent terminals,
Many enterprises are now connecting personal computers and personal computer
networks to their mainframe systems. This connection gives users access to mainframe
data and services and also enables them to take advantage of local storage and process-
A mainframe system can house an enormous volume of data, containing literally billions
of records. Large mainframe systems can handle the input and output requirements of
several thousand terminals. The IBM S/390 mainframe, for example, can support 50,000
users simultaneously while executing more than 1,600,000,000 instructions per second.
It used to be common for mainframe computers to occupy entire rooms or even an entire
floor of a high-rise building. Typically, they were placed inside glass offices with special
air conditioning to keep them cool and on raised floors to accommodate all the wiring
needed to connect the system. This setup is not used much anymore. Today, a typical
mainframe computer looks like an unimposing file cabinet-or a row of file cabinets-
First released in the 1960s, minicomputers got their name because of their small size
compared to other computers of the day. The capabilities of minicomputer are between
that of mainframes and personal computers. (For this reason, minicomputers are
handle much more input and output than personal computers can.
Figure 3-8 Midrange Computer Systems: (a) The IBM AS/400 (b) The HP 3000
Although some "minis" are designed for a single user, most are designed to handle
multiple terminals in a network environment that handle the data sharing needs of other
computers on the network. The most powerful minicomputers can serve the input and
3.5.2.4 Workstations
features of a personal computer but with the processing power of a minicomputer. These
powerful machines are popular among scientists, engineers, graphic artists, animators,
modeling, animation, and video editing. Although workstations are often found in single-
user applications, they are more and more used as servers on personal computer networks
Until a few years ago, the term workstation implied certain differences in terms of chip
design and operating system, making it distinct from a personal computer. (The term
minicomputers and high-end workstations are now similar in features and capabilities.
The same is true for low-end workstations and high-end personal computers.
Corporation (DEC), IBM, SUN Microsystems and Hewlett Packard (HP). The standard
Operating System in workstations is UNIX and its derivatives such as AIX (IBM),
The terms microcomputer and personal computer are interchangeable, but PC, which
stands for personal computers- sometimes, has a more specific meaning. In 1981, IBM
called its first microcomputer the IBM–PC. Within a few years, many companies were
copying the IBM design, creating “clones” or “compatibles” that were meant to function
like the original, for the reason, the term PC has come to mean the family of computers
that includes IBMs and IBM compatibles. The vast majority of microcomputers sold
One source of the PC’s popularity is the rate at with improvements is made in its
technology. Microprocessors, memory chips, and storage devices make continual gains in
speed and capacity, while physical size and price remain stable – or in some cases are
reduced. For example, compared to the typical PC of ten years ago, a machine of the
same price today will have about ten times as much RAM, about 100 times more storage
capacity, and a microprocessor at least 100 times as fast. What’s more, many analysts
believe that this pace of change will continue for another 10 or 20 years.
The microcomputer category has grown tremendously in the past decade. There are now
several specific types of microcomputers, each with its own capabilities, features, and
hundreds of unique systems. This range of options makes the microcomputer “the
computer for the masses” and explains why so many systems have appeared in offices,
homes, briefcases, and even pockets over the past few years. Microcomputers include the
following types:
3. Network Computers
1. Desktop Models
The first style of personal computer introduced was the desktop model. In common
usage, the term desktop system means a full size computer that is small enough to be used
at a desk but too big to carry around. Traditionally, a desktop computer’s main case
(called the system unit) is horizontally oriented, meaning it can lie flat on a desk or table.
(a) (b)
A variation of the desktop system is the tower model, where the system unit sits vertically
and has more space for devices. Because of its design, the system unit is often placed on
the floor to preserve desk space, allowing more room to place external components, such
Tower models have become increasingly popular in recent years – so much so that some
Notebook computers are small, easily transportable, lightweight microcomputers that fit
easily into a briefcase. Laptops and notebooks are designed for maximum convenience
and transportability, allowing the users to have access to processing power and data
without being bound to the office environment. The ability of providing Internet access
3. Network Computers
Network computers are major new microprocessor category designed primarily for use
with the Internet and corporate Intranet by clerical workers, operational employees and
computers are low cost, sealed, networked microcomputers with no or minimal disk
storage. Users of network computers depend primarily on Internet and corporate Intranet
servers for their operating system, and web bowers, Java-enabled applications software
and data access and storage. SUN’S JAVA Station, IBM’S Network Station and NCD
Since the mid -1990s, many new types of small personal computing devices have been
introduced, and all fall under the category of handheld personal computers (H/PCs).
they are no larger than a small appointment book, but they are much less powerful than
notebook or desktop computers. PDAs are normally used for special applications, such as
taking notes, displaying telephone numbers and addresses, and keeping track of dates or
---Build in microphone and speaker, enabling the user to record speech digitally
combines analog and digital cell-phone service with e-mail capabilities. Such phones
enable the user to check and send e-mail and faxes over the phone. They offer features
not normally found on a phone, such as personal organizers or access to the Web. Some
family of devices. These systems are larger than PDAs or miniature notebooks, but they
are not quite as larger as typical notebook PCs, with features somewhere between the
two. For example, H/PC Pro systems boast nearly full-size keyboards and color displays.
They can run more types of miniaturized applications than their smaller counterparts, but
those applications still do not provide the features of normal desktop software. H/PC Pro
units offer long battery life and instant on access (features still missing from many laptop
systems), but they do not include disks, Although they will gain speed and storage
capacity quickly, H/PC Pro systems offer very limited RAM and relatively slow
processor speeds.
3. List out the various computer generations along with their basic characteristics.
COMPUTER LANGUAGES
Structure
4.1. Introduction
67
4.1. Introduction
Op code Operand
0010 10011010
The Op code specifies the operations such as add, multiply, etc. and the
operand is the address of the data item that is to be operated upon.
Thus, while using a machine language, we have to remember the code
numbers for the operations and also keep track of the addresses of all the
data items. Hence, machine language is highly complicated and complex
and subject to error. Also, the programs written in machine language are
machine dependent. That means, a program that has been developed for
a particular machine cannot be run on another machine.
It is clearly seen from the above program that coding a program in the
binary form is very tedious. Hence, machine language is often coded in
hexadecimal codes, which are still quite tedious. The programs written in
machine language are also called as Object programs.
Let us assume that the following symbolic operation codes are used (The
meaning of the mnemonics are given in brackets).
The program that has been written using a symbolic language has to be
translated into a machine language and only then it can be executed by
the computer. The software program that will translate the program
written in symbolic language is called as the assembler program or
assembler. The source program acts as an input to the assembler, which
is loaded in the computer memory. Then, the assembler performs the
translation and generates the equivalent machine code, which is called as
the object program or object code.
Once the object program is generated, the computer can execute the
program without the aid of the assembler program. In typical computer
systems, the assembler is stored in a secondary storage device and when
needed loaded into the Random Access Memory (RAM). The source
program is then entered by the user through the visual display unit and
is also stored in RAM. The assembler translates the source program into
object program and stores it in another portion of RAM. The object code
or program can also be stored on some external device in order to execute
it again and again when needed.
IN
STO Q
IN
STO R
LDA R
ADD
Q STO
P LDA
P OUT
The symbolic language is called as low-level language because it is
designed for a particular machine. It cannot be developed without
knowing the size of the main memory and the size of the location word.
In India, the languages which are used widely are : BASIC, FORTRAN
(used mainly in scientific and engineering applications), COBOL (mainly
used in business applications) and PASCAL. We shall consider some of
the features of these four high level languages now.
BASIC has a fairly limited repertoire of statements and unlike any other
high level language, allows only a certain range of identifiers to be used
for the variables in the program. Hence, it is mainly used as an
introductory language. However, after the introduction of micro and
home computers, which use BASIC as the only language, a number of
application programs in different areas have been written in BASIC.
The following program reads 100 positive numbers and outputs the
highest and the sum of these numbers:
10 LET M = 0
20 LET T = 0
30 FOR I = 1 TO 100
40 PRINT “TYPE IN NUMBER”
50 INPUT N
60 IF N< M THEN 80
70 LET M = N
80 LET T = T + N
90 NEXT I
100 PRINT “THE MAXIMUM NO IS” ; M
110 PRINT “THE SUM OF THE NUMBERS =”; T
120 END
4.4.2. FORTRAN
The name FORTRAN stands for formula translation and as the name
suggests it was developed and used as a scientific application language.
FORTRAN is the oldest of the high level languages. It was introduced by
the IBM in 1957 for their IBM-704 computers. Efforts were taken to
standardize this language from 1962 and the first standard was
produced by the American National Standards Institute and is called as
FORTRAN II. In 1966, another version was brought out. This is called as
FORTRAN IV. This version remained in constant use until 1978, when a
new standard was produced called FORTRAN 77 then later on FORTRAN
90. This latest standard showed marked difference from FORTRAN IV
which is, however, still the most commonly used version.
Data types are declared by picture clauses, which define the exact way in
which data is structured. Statements are separated from each other with
a comma or a blank space and particular parts of statement and
paragraphs have to occupy certain positions on the coding line.
IDENTIFICATION DIVISION.
PROGRAM-ID. ADDNOS.
AUTHOR. USER-NAME.
ENVIRONMENT DIVISION.
CONFIGURATION SECTION.
SOURCE-COMPUTER. IBM-PC.
OBJECT-COMPUTER. IBM-PC.
DATA DIVISION.
FILE SECTION.
WORKING-STORAGE SECTION.
77 N PIC 9(10)V9(4).
77 T PIC 9(12).9(4) VALUE ZERO.
77 M PIC 9(10).9(4) VALUE ZERO.
PROCEDURE DIVISION.
START-PARA.
PERFORM SUMMING 100 TIMES.
DISPLAY “THE MAXIMUM NUMBER IS”,
M.
DISPLAY “THE SUMOF THE NUMBERS IS”, T.
STOP RUN.
SUMMING.
DISPLAY “TYPE IN
NUMBER”. ACCEPT N.
IF N > M MOVE N TO M.
ADD N TO T.
4.4.4 PASCAL
4.4.5. C Language
C was first used for system programming. System programs make the
computer capable of performing useful work.
# include <stdio-h>
main ()
{
int i;
float t = 0, m = 0, n;
for (i = 1; i < = 100; i ++)
{
printf (“Type in number:”);
scanf(“%f”,&n);
if (n > m)
{
m = n;
}
t + = n;
}
printf (“\n The Maximum Number is %f”, m);
printf (“\n The sum of Number is % f”, t);
}
4.5.1 Assembler
9. To inform the control unit (after all the errors have been corrected to
execute the program starting from the first instruction of the object
code.
Source Program
Assembler Program
4.5.2. Compiler
Compilers can serve more purposes than mere translation. Many modern
compilers have diagnostic capabilities that make them excellent quality
assurance tools (quality assurance tools are some aids- in the form of
programs- which will assure the quality of software that is produced).
They are useful at all stages after pre-coding. The job of a compiler
include.
1. The user enters the source program through the terminal i.e. key-
board and stores it in the RAM.
2. The compiler, which is available in RAM is called and asked to
perform the translation. The translation process is repeated again
and again till all the errors in the source program are identified and
corrected.
3. The compiler transforms the source program into an equivalent
object program (in machine language).
4. The object program thus generated is executed in order to get the
desired results.
It has to be noted that compilers are not needed to run the program and are
needed only to translate it. Also, one compiler is capable of translating
source programs written in only one high level language. Thus, a COBOL
compiler cannot be used to translate a FORTRAN source program.
START
YES
RUN THE COMPILER IN ORDER TO GET OBJECT PROGRAM
NO
STOP
Interpreters are convenient and easy to use because they are totally
interactive. The user can sit in front of the terminal and converse with the
computer in order to solve his problems directly through the interpreter.
Whereas if he is using a compiler, he has to generate the object code and if
he wants to change something in the program (to add some new features or
to correct errors), the entire process must be repeated. That is, the program
is corrected, re-compiled, and executed. Whereas using an interpreter,
changes and additions can be made interactively.
START
No
Stop
4.6.Self-test questions
Structure
In the decimal system, the first place is for 1s, 2 nd place is for 10s, and
the 3rd place is for 100. On the other hand, in the binary number system,
the factor is 2 instead of 10. The first place is still for 1s, but the second
is for 2s, the 3rd for 4s, the 4th for 8s and so on.
Examples
= 32+0+8+0+2+1=43 (decimal)
4. 10001011 (binary) = 1 x 27 + 0 x 2 6 + 0 x 2 5 + 0 x 2 4 + 1 x 23 + 0 x
22 + 1 X 21 + 1 X 20
It is seen from the examples above that while converting binary number
into decimal, the following rules have to be adopted:
2. Going right to left, multiply each succeeding bit by twice the factor
used with the previous bit.
16 8 0
8 4 0
4 2 0
2 1 0
1 0 1 Least significant Bit
= 32+0+0+0+0+0 = 32 (decimal)
23 11 1
11 5 1
5 2 1
2 1 0
1 0 1 Least significant Bit
38 19 0
19 9 1
9 4 1
4 2 0
2 1 0
1 0 1 Least significant Bit
13 6 1
6 3 0
3 1 1
1 0 1 Least significant Bit
Binary addition is exactly like decimal addition except that the rules are
much simpler. The binary addition rules are shown in Table 5.1.
Table 5.1. Binary Addition Table
A B A+B
0 0 0
0 1 1
1 0 1
1 1 0 with carry 1
Note that, in the table above a carry is generated only when two ones are
added.
Examples
101010 (42)
+ 111111 (63)
1101001 (105)
Note that there are carries from the 2nd, 3rd, 4th, 5th and 6th bit positions
(counting from the right and staring with the 0 th position).
1 1 1 Carry
1 0 1 0 op 1 (10)
+ 1 1 0 op 2 (6)
1 0 0 0 0 (16)
Here, there are carries from 2nd, 3rd and 4th bit position.
Reserving one bit for the sign reduces the magnitude of the largest
number that can be represented by a word, since one less bit is available.
The representation of the numbers 22 and –22 in an 8 bit per word
computer is shown below-
Most of the computers have fixed number of words for storing integers.
The maximum size of integer number that can be stored in a given
number of bits can be found out easily by remembering that, one of these
is a significant bit.
This is illustrated in Table 5.2 which lists the maximum possible number
both in binary and decimal for different word lengths.
Table 5.2
Word Maximum binary number Equivalent decimal Expressed in
length No. 2n form
(bits)
2 01 1 21-1
3 011 3 22-1
4 0111 7 23-1
8 01111111 127 27-1
16 0111111111111111 32767 216-1
5.3.2. Binary Subtraction
Table 5.3
A B A–B
0 0 0
1 0 1
1 1 0
0 1 1 with borrow 1
Note that, in the last row of the Table 5.3, the subtraction has been
done with a borrow of 1 from the next column. These rules are
illustrated in the following examples:
Examples:
1 0 1 0 1 1 1 1
- 1 1 0 1
1 0 1 0 0 0 1 0
10 10 0 1
10 1 0 1
- 1 1 0 0
1 0 1
In the example above, we borrowed one from the 4 th column because of
the difference 0-1 in the 3rd column.
1 1
0 10 10 10 1
- 1 1 1 1
0 0 1 0
We observe that, in the example above, to subtract one from zero in the
2nd column, we borrowed from the 5 th column. This is exactly similar to
the following situation which occurs in decimal number system.
6 0 0 0 4 3
- 2 5 4 3 1 2
3 4 5 7 3 1
5.3.3 Complements
The method described till now for binary subtraction is not well suited for
the computer. Normally, in a computer, subtraction is transformed in the
form of addition by use of one’s complement scheme or two’s
complements scheme (It is also called as Radix-one complement or
Radix complement scheme). In the well-known decimal system, the
radix complement of a decimal number may be obtained by subtracting
each digit of the number from nine.
For example, the 9’s complement of 512 is 487. The 10’s complement of
an integer is defined to be equal to its 9’s complement plus one. Thus,
the 10’s complement of 512 is 488. It has to be noted that the sum of a
number and its 10’s complement is always equal to 10 n Thus, 512+488 =
1000=103, where n is number of digits of a number.
Decimal subtraction can be accomplished by the addition of the 9’s
complement plus 1, or the addition of 10’s complement as shown below:
1) 386 386
The left most “one” is simply deleted in adding the 10’s complement but
is subjected to “end around carry”: in adding the 9’s complement.
Step 1: Find the 9’s complement of the number to be subtracted, you are
subtracting;
10100 10100
a) Ordinary binary b) Binary Subtraction c) Binary subtraction
subtraction by using 1’s by using 2’s
complement complement
Example
0001110
+ 0110111 (1’s complement of 1001000)
01000101
0 (add 0 as no carry)
100010
Most computers have a one bit flag or condition code that saves the carry
from the most significant bit of an addition or subtraction. This flag (or
carry) can be used to implement carries or borrows between words in
multiple precision arithmetic.
Example :
numbers 1110101110101111
+ 0001001111110010
10101111
+11110010
10100001 and a carry
Step 2 : Add the most significant of the 8 bits of the two numbers plus a
carry from step 1.
11101011
+00010011
+ 1
11111111
It is clear from the above that the addition of 16 bit numbers on an 8 bit
computer requires more than simply two additions, since the second
addition must include the carry.
Many computers also have a twos complement overflow flag. This flag is
set when the result overflows into the bit position used for the sign.
Table 4.4
A B A×B
0 0 0
1 0 0
1 0 0
1 1 1
1011 multiplicand
× 110
0000
1011
1011 partial produce
Table 5.5
A B A/B
0 1 0
1 1 1
111 ÷ 10
5. Bring down the next digit to add to the remainder digits. Proceed as
before in a manner similar to long division.
= 0.875 (decimal)
Table 5.6. Decimal and Corresponding Binary Fractions
Proper fraction Power of 2 Decimal fraction Binary fraction
1 2-1 0.5 0.1
2
1/4 2-2 0.25 0.01
1/8 2-3 0.125 0.001
1/16 2-4 0.0625 0.0001
1/32 2-5 0.03125 0.00001
1/64 2-6 0.015625 0.000001
1/128 2-7 0.0078125 0.0000001
1/256 2-8 0.00390625 0.00000001
1/512 2-9 0.001953125 0.000000001
To convert the decimal fraction to binary fraction, we employ the
following rules:
3. The whole number part of the result gives the second 1 or 0, and
so on.
Examples :
0.375 × 2 = 0.750 € 0
0.750 × 2 = 1.500 €1
0.500 × 2 = 1.000 €1
0.250 × 2 = 0.500 € 0
0.500 × 2 = 1.000 € 1
In octal number, there are only eight possible digits (0 to 7). The position
of a digit to the left of the octal point carries a weightage in ascending
powers of eight. Digits behind the octal points are also used (octal points
are similar to decimal and binary points and are used to separate whole
and fractional parts) and carry weightage of 8 -1. The octal and binary
conversion is given in Table 5.7.
Table 5.7
Octal Binary
0 000
1 001
2 010
3 011
4 100
5 101
6 110
7 111
Example:
⎛1⎞ ⎛1 ⎞
(1.68)8 = 1 × 8 + 6 × ⎜ ⎟ + 8 × ⎜ ⎟ = 1.875
8 64
⎝ ⎠ ⎝ ⎠
= (763)8
With whole and fractional parts we group in threes, starting from the
octal point, moving left for the whole part, and right for the fractional
part.
Examples:
i.e. (25.75)8
Note that a leading zero is assumed in the first segment. Thus the octal
equivalent of 10101.111101 is (25.75) 8.
1 6 6 5 4
Note that zeros have been added in the beginning and at the end
segment.
3. The reverse process– octal to binary- consists simply of writing the
3 bit binary number for each octal digit. Thus, (5673) 8 can be
converted as
011.1012
The letters A to F are used for the hexadecimal digits with values 10
through 15. Thus, their usage may be confusing because numbers in this
way will resemble names or words. Converting a binary number to its
hexadecimal representation requires coding of each 4 bit segments,
starting with the four least significant bits. Table 5.8 shows the
relationship between decimal, hexadecimal and binary numbers.
The binary number 111101011 can be divided into the following three
four bit segments: 0001, 1110, 1011. This can then be converted into
hexadecimal digits using Table 5.8 as 1EB H.
Example:
E = 1110
A = 1010
9 = 1001
PC SOFTWARE PACKAGES
Structure:
6.1 Introduction
6.2 Types of Software Packages
6.3 Summary
6.4 Self-Test questions
6.5 Suggested Readings
6.1 Introduction
Software is a set of programs, documents, procedures and routines associated with the
operation of a computer system for specific application/task. It is the essential
complement to computer hardware. Software usually refers to a set of advanced computer
modules that allow the user to plan efficient surveys, organize and acquire satellite
navigation data, verify and download data, process and analyze measurements, perform
114
network adjustments, and report and archive the final results. These are the written coded
commands that tell a computer what tasks to perform. The term software has acquired
several meanings in computer literature but essentially, it describes the ‘Soft’ portion of
the computer installation, that is the computer programs, which when executed operate
the hardware. For example, Word, PhotoShop, Picture Easy, and Photo Deluxe are
software programs.
Software may also be referred to as the specific set of instructions, programs, procedures,
rules, and any associated documentation pertaining to the operation of a system that tells
the computer hardware precisely what to do. The entire set of programs, procedures, and
related documentation associated with a computer system controls the operation of a
computer and are distinguished from the actual hardware of the computer. Hence, a series
of instructions for the computer that performs a particular task is called software.
For large systems, the operating system has even greater responsibilities and powers. It is
like a traffic cop and makes sure that different programs and users running at the same
time do not interfere with each other. The operating system is also responsible for
security, ensuring that unauthorized users do not access the system.
Operating systems provide a software platform on top of which other programs, called
application programs, can run. The application programs must be written to run on top of
a particular operating system. For PCs, the most popular operating systems are DOS,
OS/2, and Windows, but others are available, such as Linux.
The user normally interacts with the operating system through a set of commands. For
example, the DOS operating system contains commands such as COPY and RENAME
for copying files and changing the names of files, respectively. The commands are
accepted and executed by a part of the operating system called the command processor or
command line interpreter. Graphical user interfaces allow to enter commands by pointing
and clicking at objects that appear on the screen.
Language Translators
Language translators are those program tools which translate the programs written in
other computer languages to machine codes. These are the methods to "translate" source
code into computer understandable language. Because programs written in a high level
language are not directly understood by computers, they need a software tool to convert
these programs into machine level language. The software packages available for this
purpose are like COBOL compiler, C compiler etc. These are mainly of three types:
Interpreter
Compiler
Assembler
Interpreter: Interpreter is the oldest type of computer program that executes instructions
that are written in the form of a program. The trick of an interpreter is that it loads the
source code and translates the instruction into executable machine language line by line.
And it does it over and over again any time that program is run. In order to run a program
first (e.g. "load BASIC") the interpreter has to loaded into the memory of the computer,
then the source code and then type "run to execute the program. An interpreter is unique
for each high level language. It is relatively slow. Another disadvantage is that mostly
these interpreters are expensive. Also to the designer of the program this can be a
disadvantage. He or she will just give away its trade secrets and have no longer control
over his own program, the distribution or avoid unwanted adaptations.
Compiler: Compiler is a computer program that translates source code written in high
level language into machine language. First the source code is read into the computer's
memory and then it is translated in to a kind of object code. A compiler creates a unique
object program i.e. once a source program is compiled there is no need of that source
program because output can be obtained by executing that object program. For each high
level language the machine requires a separate compiler which is personal for that
language. Compilers are somewhat more compact and run, in some extend, faster.
Basically the functions of compilers and interpreters are same, the only difference is that
a compiler provides a separate object program, but the interpreter does not. In case of
interpreter, every time the source code is required for the execution of program whereas
compiler uses the object code developed by compilation of the source code. Another
difference is that interpreter translates the source program line wise i.e. it will not execute
the next line unless the first one has no error but compiler translates the whole program at
a single time and produce an object code for the execution purpose.
Utilities
Utility software (also known as utilities) performs a very specific task, usually related to
managing system resources. Operating systems contain a number of utilities for
managing disk drives, printers, and other devices. Utility software may be considered as
system software which is used quite often in developing, writing, debugging and
documenting programs. It differs from application software mostly in terms of size,
complexity and function. For example, word processors, spreadsheet programs, and
database applications are considered application software because they are large
programs that perform a variety of functions not directly related to managing computer
resources.
In simple words, Utility software supports the operations, management, and users of a
computer system by providing a variety of support services. This software is sometimes
installed as memory-resident program and may include file conversion, data
compression; data transfer utility, text editor, real time clock utility and so on. In real
sense, utility software is developed to perform operations on files containing data and be
used for transferring data from one storage device to another. Utility software can be
divided into two parts: First, file management utilities which are parts of operating
system and help the programmers in copying, printing, deleting and renaming files. And
second, program development utilities to help users in writing and testing programs.
Some of the utility programs are discussed as follows:
Editor: These are the interactive programs which allow programmers to enter, modify
and store a source code.
File Manager: These programs allow programmers to create copy, update or delete files
on the storage device.
Loader: This program loads the machines codes of a program into the memory of the
computer system.
Locator: This program allocates specific memory addresses for each machine code of a
program which is to be loaded into the system memory.
Linker: This program links smaller programs (modules) to form a single program.
Word Processing Software: Of all computer applications, word processing is the most
common. A word processor enables the user to create a document, store it electronically
on a disk, display it on a screen, modify it by entering commands and characters from the
keyboard, and print it on a printer. In contrast to data processing where the focus is
generally on numerically data, in word processing the main concern is with text. The
main productivity improvement comes from the ease and rapidity with which document
can be modified. Word processing is designed to enable the user to create, edit, and print
documents conveniently using a computer instead of using a typewriter. So the great
advantage of word processing over using a typewriter is that the user can make changes
without retyping the entire document. The user can correct the mistakes, delete a
paragraph without leaving a trace, and insert a word, sentence, or paragraph in the middle
of a document. Word processors also make it easy to move sections of text from one
place to another within a document, or between documents. The user can send the file
with all the changes made to a printer to get a hardcopy or can save the file in a storage
device. Mail-merge is also one of the popular features of word processors. Now-a-days
Word Processors for languages other than English are also available e.g. Akshar in Hindi.
Desktop Publishing Software: The line dividing word processors from desktop
publishing systems is constantly shifting. In general, though, desktop publishing
applications support finer control over layout, and more support for full-color documents.
Combining the functions of a traditional typesetter and a layout artist, a desktop
publishing program merges the output of word processor and graphics programs to
produce professional-looking pages that are ready for the printer. Although many word
processors can do this to some extent, desktop publishing programs have many more
sophisticated features. Businesses use them to create advertisements and sales catalogs.
Publishers use them to lay out news papers, bulletins, magazines, books etc. Examples of
some desktop publishing packages are Corel’s Ventura, Adobe’s Page Maker, Quark
Inc.’s Quark XPress, Microsoft Publisher, Akruti Publisher etc.
Spreadsheet Software: A spreadsheet is simply a sheet of paper with rows and columns
in which one can enter data in the form of numbers, formulae and text for analysis. In
spreadsheet software, screen is used in place of paper. Spreadsheet applications
(sometimes referred to simply as spreadsheets) are computer programs that display a
large grid of rows and columns that allow users to quickly create, manipulate and analyze
data organized in these spreadsheets electronically. These are very helpful where large
tabulated computations are used. In a spreadsheet application, a table of values is
arranged in rows and columns and each value can have a predefined relationship to the
other values. Each value sits in a cell. The user can define what type of data is in each
cell and how different cells depend on one another. The relationships between cells are
called formulas, and the names of the cells are called labels. The user can also modify
selected values to see how all the other values change accordingly. This enables the user
to study various what-if scenarios.
Spreadsheet packages are widely used in accounting, sales, inventory control, and a
number of business and non business problems. There are a number of spreadsheet
applications in the market, Lotus 1-2-3 and Excel being among the most famous. The
more powerful spreadsheet applications support graphics features that enable the user to
produce charts and graphs from the data to show the relationships among numbers more
vividly. Most spreadsheet applications are multidimensional, meaning that the user can
link one spreadsheet to another. A three-dimensional spreadsheet, for example, is like a
stack of spreadsheets all connected by formulas. A change made in one spreadsheet
automatically affects other spreadsheets.
Data Base Management Software: This software was developed to handle the problems
of maintaining and integrating large volumes of data on computers. It extends the ability
to organize collections of data stored in computer and provides features that help in
finding subsets of the data selected through specified criteria.
Data Base Management programs are nothing else but a collection of data combined with
a sophisticated management program to retrieve and process all this data to create
information for the users. Data Base Management Software (DBMS) is a collection of
programs that enables the user to store, modify, and extract information from a database.
It is very simple and easy to use. DBMS provides a very high level language interface
which is command oriented. DBMS helps in making queries by arranging or sorting data
in some logical order such as alphabetically by name and generating reports based on the
data files. There are many different types of DBMSs, ranging from small systems that run
on personal computers to huge systems that run on mainframes. Examples of database
applications include computerized library systems, automated teller machines, flight
reservation systems, computerized parts inventory systems and so on.
From a technical standpoint, DBMSs can differ widely. The terms relational, network,
and hierarchical all refer to the way a DBMS organizes information internally. The
internal organization can affect how quickly and flexibly the user can extract information.
Requests for information from a database are made in the form of a query, which is a
stylized question. For example,
SELECT ALL WHERE NAME = "SANJAY" AND AGE > 35
This query requests all records in which the NAME field is SANJAY and the AGE field
is greater than 35. The set of rules for constructing queries is known as a query language.
Different DBMSs support different query languages, although there is a semi-
standardized query language called SQL (structured query language). Sophisticated
languages for managing database systems are called fourth-generation languages, or
4GLs for short.
The information from a database can be presented in a variety of formats. Most DBMSs
include a report writer program that enables the user to output data in the form of a
report. Many DBMSs also include a graphics component that enables the user to output
information in the form of graphs and charts.
Graphics Software: There is a general saying that one picture is worth a thousand words
as graphical or pictorial form is easier to understand than a tabular form of information.
The graphics Software offers the use of computers for manipulating (creating, editing,
viewing, storing, retrieving and printing) images, designs, drawings, pictures, graphs and
anything else that can be drawn in the traditional manner. While spreadsheet and database
packages are very useful in doing analysis, the output of such analysis is generally tables
of numbers. Graphics Software Package is used to convert the data in a graphic form on
the screen as well as on the paper using printers or plotters.
Other data communication software may include fax software for computers to work as a
fax machine and the software distributed by the online service providers, such as
CompuServe, America Online, and Microsoft Network.
Business Application Package: This software is nothing but packages designed for a
specific purpose such as account receivable, billing, inventory control etc. These
packages are written by users generally in high level language to meet their own specific
needs. Some of the Business Application Specific Packages are as follows:
Payroll: This is designed for calculation of wages and salaries. The extended information
like relationship of total wage costs to job in hand, total costs to date, individual jobs
costing etc. make it easier for management to improve its efficiency.
Scientific Application Package: Such a package is specific only for the scientific
purposes. This type of software facilitates the designing and drafting of complex images
and analysis of data. Examples of these packages are Computer Aided Designing and
Computer Aided Manufacturing (CAD/CAM), Statistical Package for Social Science
(SPSS), Statistical Analysis Software (SAS) and so on.
Customized Application Package: When pre-written software packages do not meet the
specific requirements of a user, either partially of fully, it becomes necessary to develop a
customized software package to satisfy the specific requirements. These types of software
are either developed in-house or by placing order to some professional organization. This
trend has geared up with the development of non-procedural 4GLs and will continue to
grow as the development in multimedia, graphics, artificial intelligence, networking
solutions enhance.
6.3 Summary
Software is a program or set of logically arranged electronic instructions that direct the
computer to accomplish certain tasks. When the computer is using a particular program,
it is referred to as running or executing the program. The entire set of programs,
procedures, and related documentation associated with a computer system controls the
operation of a computer and are distinguished from the actual hardware of the computer.
A software package is a special method for the distribution and installation of software on
computer systems. It is a program with its associated files, archived and compressed into
a single file along with any necessary scripts or information to aid in managing the
installation, upgrade, and removal of those files. Software Packages fall in two major
categories: (1) System software Package, and (2) Application software. Package
System software packages are for the own specific requirements such as controlling or
supervision of computer system and may include operating system, language translators
and utilities. The operating system tells the computer how to interact with the user and
how to use the hardware devices attached to the computer. Language translators convert
computer languages other than machine level language to machine codes. They include
compilers/interpreters and assemblers. Compilers/interpreters convert high level language
programs into machine level language and assemblers convert programs written in
assembly language into machine level language. Utilities are the programs that support
the operations, management and users of a computer system by providing a variety of
support services.
Application software packages are developed for the specific requirements of a user or
any organization. Application software packages are mainly of two types: General
purpose software and Specific purpose software. General purpose software includes word
processors, spreadsheets, data base management software, graphics software and data
communication software. This type of software packages are also known as program
productivity tools because without doing any programming and through simple
commands the users can perform the desired tasks. The specific purpose or application
specific software may include business applications like inventory control, billing, MIS
etc., scientific application like SPSS, CAD/CAM etc., online applications like Airline
Reservation Systems, and customized applications are also referred to as application
specific software package.
6.4 Self-Test questions
1. What is a software Package?
2. List out the different types of software.
3. Describe the similarities and dissimilarities between a compiler and an interpreter.
4. What is utility software?
5. Discuss various types of system software.
6. What is customized software?
OPERATING SYSTEMS
Structure:
7.1 Introduction
7.2 Concept and Definitions of Operating System
7.3 Booting or Bootstrapping of Operating System
7.4 Functions of Operating System
7.5 Types of Operating System
7.6 Operating Systems (DOS and Windows) for Personal Computers
7.7 Future Trends in Operating System Design
7.8 Summary
7.9 Self-Test questions
7.10 Suggested Readings
7.1 Introduction
An Operating System is system software which may be viewed as an organized
collection of software consisting of procedures for operating a computer and
providing an environment for execution of programs. It acts as an interface between
user and the hardware of a computer system.
The operating system (OS) is the first thing loaded onto the computer. The most
important program that runs on a computer and without the operating system, a
computer is useless. Every general-purpose computer must have an operating system
to run other programs. Operating systems perform basic tasks, such as recognizing
input from the keyboard, sending output to the display screen, keeping track of files
and directories on the disk, and controlling peripheral devices such as disk drives and
printers. Any desktop or laptop PC that you buy normally comes pre-loaded with
130
Windows OS. Macintosh computers come pre-loaded with OS X. Many corporate
servers use the Linux or UNIX operating systems.
Understanding the operations and functions of operating system used in computers for
a user is quite important as per the following reasons:
User interacts with the computer through operating system in order to
accomplish his task since it is his primary interface with a computer.
The purpose of an operating system is to organize and control hardware and software
so that the device it lives in behaves in a flexible but predictable way. In this lesson,
we will learn what a piece of software must do to be called an operating system, and
to know how the operating system in our desktop computer works and how many
types of operating systems are around.
For large systems, the operating system has even greater responsibilities and powers.
It makes sure that different programs and users running at the same time do not
interfere with each other. The operating system is also responsible for security,
ensuring that unauthorized users do not access the system.
OS provides the instructions to display the on screen elements with which the
user interact. Collectively, these elements are known as the user interface.
OS loads programs such as word processing and spreadsheet programs into the
computer’s memory to be used by the users.
When the power is turned on of a computer, the first program that runs is usually a set
of instructions kept in the computer's read-only memory. This code examines the
system hardware to make sure everything is functioning properly. This power-on self
test (POST) checks the central processing unit, memory, and basic input-output
systems (BIOS) for errors and stores the result in a special memory location. Once the
power-on self test (POST) has successfully completed, the software loaded in read-
only memory (sometimes called the BIOS or firmware) will begin to activate the
computer's disk drives. In most modern computers, when the computer activates the
hard disk drive, it finds the first piece of the operating system: the bootstrap loader.
Bootstrap Loader is a very simple program sufficient only to direct the CPU to look
for specific file on the disk memory, and executes the instructions stored in the file.
The file contains machine codes to direct the CPU to continue loading the rest of the
operating system into the memory. When the operating system is fully loaded into the
memory, the computer is ready to accept user’s commands.
In the most basic form, the bootstrap loader sets up the small driver programs that
interface with and control the various hardware subsystems of the computer. It sets up
the divisions of memory that hold the operating system, user information and
applications. It establishes the data structures that will hold the myriad signals, flags
and semaphores that are used to communicate within and between the subsystems and
applications of the computer. Then it turns control of the computer over to the
operating system.
There are some difficulties with a batch operating system from the point of view of
programmer or user. Firstly, batch operating systems provide a non interactive
environment i.e. allow little or no interaction between user and executing programs.
Secondly, due to turnaround delays and offline debugging, batch processing is not
very convenient for program development. Therefore, only the programs that do not
require interaction and programs with long execution times may be served well by a
batch operating system.
Multi-tasking operating system: Allows more than one program to run concurrently.
Multi-process operating system: Supports running a program on more than one CPU.
Multi-threading operating system: Allows different parts of a single program to run
concurrently.
Multi-user operating system: Permits hundreds or even thousands of concurrent users to
run programs.
This is the type of operating system most people use on their desktop and laptop
computers today. Microsoft's Windows and Apple's Mac OS platforms are both
examples of operating systems that will let a user have several programs in operation
at the same time. For example, it's entirely possible for a Windows user to be writing
a note in a word processor while downloading a file from the Internet while printing
the text of an e-mail message.
There are two basic types of multitasking: preemptive and cooperative. In preemptive
multitasking, the operating system parcels out CPU time slices to each program. In
cooperative multitasking, each program can control the CPU for as long as it needs it.
If a program is not using the CPU, however, it can allow another program to use it
temporarily. OS/2, Windows 95, Windows NT, the Amiga operating system and
UNIX use preemptive multitasking, whereas Microsoft Windows 3.x and the
MultiFinder (for Macintosh computers) use cooperative multitasking. The terms
multitasking and multiprocessing are often used interchangeably, although
multiprocessing implies that more than one CPU is involved.
Multi-processing operating system: These OS have the ability to support more than
one process at the same time i.e. allowing more than one programs to run concurrently
on the multiple CPUs in a single computer system. Multiprocessing systems are much
more complicated than single-process systems because the operating system must
allocate resources to competing processes in a reasonable manner. This type of
operating system differs from multi-user operating system in the way that these refer
to utilization of multiple CPUs. This is also called parallel processing. The examples
of this type of operating system are OS/2 for high-end PCs, UNIX, MVS etc.
These OS refer to computer systems that support two or more simultaneous users and
allow simultaneous access to a computer system through two or more terminals.
Although frequently associated with multiprogramming, multi-user operating system
does not imply multi-programming or multi-tasking. A dedicated transaction
processing system such as railway reservation system that supports hundreds of
terminals under control of a single program is an example of multi-user operating
system. All mainframes and minicomputers are multi-user systems, but most personal
computers and workstations are not. Another term for multi-user is time sharing.
The term multiprogramming refers to the situation in which a single CPU divides its
time between more than one jobs. The term multitasking is described as any system
that runs or appears to run more than one application program at one time. Whereas in
multiprocessing, multiple CPUs perform more than one job at one time. Time-sharing
is a special case of multiprogramming, where a single CPU serves a number of users
at interactive terminals.
Time-sharing operating system: These operating systems allow two or more users
to run their respective programs at the same time by making these programs resident
in the memory of computer. The concept of allowing more than one programs in the
memory of computer is called multiprogramming. Therefore this OS is a form of
multiprogramming operating system which operates in an interactive mode with a
quick response time. All time-sharing systems need to be multi-programmed but not
necessarily all the multi-programmed systems to be time shared.
In this type of OS, the user types a request to the computer through a keyboard. The
computer processes it and a response is displayed on the user’s terminal. A time
sharing system allows the many users to simultaneously share the computer resources.
Since each action or command in a time-shared system take a very fraction of time,
only a little CPU time is needed for each user. As the CPU switches rapidly from one
user to another user, each user is given impression that he has his own computer,
while it is actually one computer shared among many users.
Time-slice scheduling of CPU approach is used for time sharing processing in which
programs are executed with rotating priority that increases during waiting and drops
after the service is granted. In order to prevent a program from monopolizing the
processor, a program executing longer than the system defined time-slice is
interrupted by the operating system and placed at the end of the queue of waiting
program. The examples of this type of operating system are VMS (on DEC
Mainframes), UNIX, XENIX, MVS etc.
These OS are used in environments where a large number of events mostly external to
computer systems, must be accepted and processed in a short time or within certain
deadlines. The primary objective of real-time operating systems is to provide quick
response time and thus meet the scheduling deadlines. User convenience and resource
utilization are of secondary concern to real-time system. Real time can also refer to
events simulated by a computer at the same speed that they would occur in real life. In
graphics animation, for example, a real-time program would display objects moving
across the screen at the same speed that they would actually move. The major positive
features of this type of operating system are fast response time, feedback mechanism
and reliability.
Real-time operating systems respond to input immediately. They are used for such
tasks as navigation, in which the computer must react to a steady flow of new
information without interruption. Most general-purpose operating systems are not
real-time because they can take a few seconds, or even minutes, to react. Examples of
such applications are flight control, Industrial Control, Telephone Switching
Equipments, Real-time Simulations etc. Real time systems are also frequently used in
military application. In case of real-time systems, memory management and file
management are of least importance as compared to processor and I/O management
therefore real-time operating systems are different from traditional operating systems
like MS-DOS and UNIX or XENIX. Some of the examples of real-time operating
systems are:
Operating System for IBM System/3: Communication Control Program (CCP),
Operating System: Duplex Multiple Environment Real-time (DMERT) etc.
The main advantage of distributed operating systems is that there is a little fault-
tolerance and are considered to be more reliable than uniprocessor based systems.
They perform even if certain part of the hardware is malfunctioning. On the other
side, the disadvantage is that unless one is careful, it is easy for the communication
protocol overhead to become a major source of inefficiency.
With the different types of operating systems in mind, it is time to look at the basic
functions provided by an operating system.
(a) Essential Functions: The essential functions of an operating system are concerned
with effective utilization of computer resources. Storage management and processes
management are two important essential functions of an operating system. Storage
management is concerned with allocation and reclamation of storage when a program
is initiated and terminated. Processor management is concerned with scheduling of
programs in a time sharing system.
(b) Monitoring Functions: These functions are concerned with collection of resource
utilization and system performance information. CPU and IO devices form the
resources whose utilizations are collected and monitored by device management
functions of operating system.
(c) Service Functions: These functions of operating system enhance facilities provided
to the users. They include mainly automatic procedures for recovery due to hardware
errors, file editing facilities and file organization and access methods.
These functions of operating system, in the most general sense, can be classified into
six categories:
Processor management
Memory and Storage management
File management
Device Management
Security
Command Interpretation
While there are some who argue that an operating system should do more than these
six tasks, and some operating-system vendors do build many more utility programs
and auxiliary functions into their operating systems, these six tasks define the core of
nearly all operating systems. Let's look at the tools the operating system uses to
perform each of these functions.
High-speed cache - This is fast, relatively small amounts of memory that are available
to the CPU through the fastest connections.
Main memory - This is the RAM that you see measured in megabytes when you buy a
computer.
Secondary memory - This is most often some sort of rotating magnetic storage that
keeps applications and data available to be used, and serves as virtual RAM under the
control of the operating system.
The operating system must balance the needs of the various processes with the
availability of the different types of memory, moving data in blocks between available
memories as the schedule of processes dictates.
File Management: The file management module of an operating system takes care of
file related activities such as organization, storing, retrieval, naming, sharing, and
protection of files. The important concepts used for file management are as follows:
File Access Methods: To use the information stored in a file, it must be accessed and
read into computer memory. The two commonly supported file access methods at
operating system level are sequential and random access.
File Operations: An operating system provides a set of operations to deal with files
and their contents. File operations like creating, renaming, copying, deleting, opening,
closing, reading, writing, seeking the files or setting the attributes of the files are some
of the operations provided by operating system.
File Naming: When a file is created, it is given a name, which can be later used to
access the file. The rules for naming files vary from one operating system to another.
External Security: It deals with securing the computer system against external factors
such as fires, floods, leaking out of stored information by a person who has access to
the information and so on.
Internal Security: It mainly deals with User authentication (user identification must be
checked), Access Control (prohibit the user from accessing those information for
which not authorized to access) and cryptography (a method to ensure access control).
MS-DOS:
MS-DOS stands for Microsoft Disk Operating System and is a single user operating
system developed by Microsoft. Microsoft is a software company in Redmount,
Washington, U.S.A. It was introduced in 1981 jointly by Microsoft and IBM and was
the most popular operating system for personal computers in 1980s. Some of the disk
and file maintenance commands of MS-DOS are as follows:
DIR To list the directory
TREE To list all disk subdirectories and their subdirectories
TYPE To see the contents of a file on the screen
REN To rename a disk file
DEL To erase files from a disk
COPY To copy files from one location of disk to another
DISKCOPY To copy the entire diskette
FORMAT To realign the tracks and sectors of the diskette
CHKDSK To check the disk space and get information of the diskette
VER To see the version of the operating system being used
DOS was adequate for the IBM-compatible PCs of the early 1980s, but it has certain
limitations that became noticeable as PCs became more powerful. The limitations of
this OS are:
1. Under DOS, only a single program can be loaded into memory at a time.
2. DOS was not designed to handle the large amounts of RAM that today’s PCs
typically use.
3. DOS was designed for 16-bit CPUs and can not take advantage of the 32-bit
architecture of the 486, Pentium, and later chips.
4. DOS filenames are limited to eight characters, plus a three character
“extension” following a period sign.
5. DOS command-line interface is more difficult to learn than a well designed
GUI.
Microsoft Windows:
Microsoft Windows operating system was developed by Microsoft to overcome the
limitations of its own MS-DOS operating system. The first successful version of this
operating system was Windows 3.0, which was released in 1990. The subsequently
released versions were Windows 95, Windows 98, Windows 2000, and Windows XP.
The main features of Microsoft Windows are as follows:
1. Its command-line interface is GUI. Hence, it is easier for a new user to learn
and use the system.
2. Microsoft Windows was designed to be not just an operating system, but also
a complete operating environment. For example, Microsoft word processor
works similarly the way a Microsoft spreadsheet works. This means that the
experience gained by learning one Windows program is useful while using
any other Microsoft windows program.
3. It is a single user, multi-tasking operating system. It means that a user may run
more than one program at a time.
Microcode will support all the functions of operating system integrated into it,
currently performed by software, therefore, the execution time will be faster.
Use of distributed operating system will increase because the new trends are
towards distributed control among the localized processors in place of
centralized system.
The concurrency is becoming an important feature of programming language.
Hardware and operating systems are being designed to execute concurrent
programs more efficiently.
Lots of developments are taking place in computer networking. The data
transmission rate is also increasing. Therefore, the use of networking operating
system will also increase.
More recently, operating systems have started to pop up in smaller computers as well.
If you like to tinker with electronic devices, you are probably pleased that operating
systems can now be found on many of the devices we use every day, from cell phones
to wireless access points. The computers used in these little devices have gotten so
powerful that they can now actually run an operating system and applications. The
computer in a typical modern cell phone is now more powerful than a desktop
computer from 20 years ago, so this progression makes sense and is a natural
development. In any device that has an operating system, there is usually a way to
make changes to how the device works. This is far from a happy accident; one of the
reasons operating systems are made out of portable code rather than permanent
physical circuits is so that they can be changed or modified without having to scrap
the whole device.
For desktop systems, access to a LAN or the Internet has become such an expected
feature that in many ways it is hard to discuss an operating system without making
reference to its connections to other computers and servers. Operating system
developers have made the Internet the standard method for delivering crucial
operating system updates and bug fixes. Although it is possible to receive these
updates via CD, it is becoming increasingly less common. In fact, some entire
operating systems themselves are only available through distribution over the Internet.
Further, NetBooting allows the operating system for one computer to be served over a
network connection, by a remote computer connected anywhere in the network. One
NetBoot server can serve operating systems to several dozen client computers
simultaneously, and to the user sitting in front of each client computer the experience
is just like they are using their familiar desktop operating system like Windows or
Mac OS.
7.8 Summary
An Operating System is system software which may be viewed as an organized
collection of software consisting of procedures for operating a computer and
providing an environment for execution of programs. It acts as an interface between
user and the hardware of a computer system. All the hardware functioning are
performed under the supervision of this operating system. It is always desired by the
user that the operating system should be small in size and easily maintainable so that
operations can be performed in an efficient manner with more reliability. The
Operating System mainly consists of two types of programs: the Control Programs
and the Processing Programs.
The process of loading the operating system into memory is known as booting. When
a computer is turned on the operating system must be brought into the memory of
computer from the hard-disk storage. The process is normally started by a small
program called bootstrap loader.
Operating system provides a number of services. At the lowest level, there are system
calls, which allow a running program to make a request from operating system
directly. At a higher level, there is a command interpreter, which supports a
mechanism for a user to issue a request without writing a program.
Although a number of companies have offered operating systems over the years, one
company, Microsoft Corporation, has dominated the market for microcomputer
operating systems. In practice, their products have evolved from one to another in a
reasonably sequential fashion.
Structure:
8.1 Introduction
8.2 Concept of Word Processing Software
8.3 Getting Started with Microsoft Word
8.4 Structure of Microsoft Word Window
8.5 Working with Word Document - File Related Operations
8.6 Some Important Editing Functions
8.7 Mail Merge
8.8 Summary
8.9 Self-Test questions
8.10 Suggested Readings
8.1 Introduction
Word processing software is one of the miracles of the modern age. It evolved from
the needs of writers as word processing software gives users an extensive set of tools
for working with text. It is used to create all kinds of documents, from simple notes
and memos, to brochures, resumes, and long reports.
A word processor is a computer program used to create and print text documents that
might otherwise be prepared on a typewriter. The key advantage of a word processor
is its ability to make changes easily, such as correcting spelling, adding, deleting, and
relocating text. Once created, the document can be printed quickly and accurately and
saved for later modifications.
152
The most recent word processors are practically powerful editing devices that only a
few years ago would have been the envy of professional printers. But it is not only a
matter of graphical arrangement and page layout, the effects of writing through this
medium are far reaching on a number of more profound levels.
A number of softwares are available for word processing like Microsoft Word, Lotus
WordPro or WordPerfect etc. Although these are expensive and sophisticated
products, many of the facilities of word processing are also to be found in free
software, like Microsoft WordPad, which comes as part of the Microsoft Windows
standard installation. If one cannot afford to purchase a word processing application,
then there are many powerful programs free, either as downloads from the Web or on
cover disks with magazines. A word processing program is a good introductory
program to learn for two important reasons:
Word processors are good examples of competing programs that all run and
work in essentially the same way. Learning one program allows us to use
almost all of the competing programs.
Skills such as saving, copying, pasting, formatting, printing, and using old
files as templates for new work are easy to understand within word processors.
Many of the skills utilized in word processing programs are used in other
popular applications such as spreadsheets, web browsers and e-mail programs.
A word processor is software that enables us to write, edit, format, and print text. As
we type on a keyboard, the words appear on the screen to see. Mistakes can be
corrected easily before printing the text on paper. Words, sentences, and even entire
paragraphs can be moved by special commands. Nothing is printed until we are
satisfied with the results. Word processor and the hardware simply provide a
convenient way to display, store, edit, and recall the work done.
Moves to the top or bottom of the current screen Ctrl + Page up or Ctrl + Page Down
Moves to the start or end of the document Ctrl + Home or Ctrl + End
Open a New File: To open a new file, Click on the File menu. Then Click on the new
option or you can directly press the Ctrl+N from the keyboard. Select the Blank
document from the General Tab from the following dialog box and then press OK
button.
Save a Document: For saving a document, Click on the File►Save option. OR Press
Ctrl+S OR Press the Save tool from standard toolbar.
If you are saving the file for the first time the Save as window will appear. Choose the
appropriate folder from Save in combo box. Write the proper file name in the File
name text box. And then press the Save button
Save and Save As options do the same work of saving a document but the difference
between both options is that the Save As command every time gives you the Save As
dialog box and you can save the file with different names also. But the Save option
will gives you the Save As dialog box when you are saving the document for very
first time. Other times it will save the document with the previous name without
giving any dialog box.
Opening of an Existing Document: To open an existing document, Select the Open
option from the File menu OR Press Ctrl+O OR Click on the Open tool from the
standard toolbar. Then the open dialog box will appear. Select the appropriate folder
from Look in combo box. Select the required file from the file window Or Write the
required file’s name in the File name window. Click on open button on the right hand
side.
A Page Setup window will appear. From the Page setup option one can setup the
page layout according to the job. You can adjust the different margins or apply
different options from the margin tab where:
i) In top margin enter the distance you want between the top of the page and the
top of the first line on the page.
ii) In Bottom margin enter the distance you want between the bottom of the page
and the bottom of the last line on the page.
iii) In Left option enters the distance you want between the left edge of the page
and the left edge of unindented lines.
iv) In Right option enter the distance you want between the right edge of the page
and the right end of a line with no right indent.
v) In Gutter option enter the amount of extra space you want to add to the margin
for binding. Word adds the extra space to the left margin of all pages if you
clear the Mirror margins check box, or to the inside margin of all pages if you
select the Mirror margins check box.
vi) In Header option under From edge frame enter the distance you want from the
top edge of the paper to the top edge of the header. If the Header setting is
larger than the Top setting, Word prints the body text below the header.
vii) In Footer option under From edge frame, enter the distance you want from the
bottom edge of the paper to the bottom edge of the footer. If the Footer setting
is larger than the Bottom setting, Word stops printing the body text above the
footer.
viii) Check Mirror margin check box to Adjusts left and right margins so that when
you print on both sides of the page the inside margins of facing pages are the
same width and the outside margins are the same width.
ix) Check the 2 pages per sheet checkbox to Print the second page of a document
on the first page. This check box is used when the printed page is folded in
half with the two pages on the inside. The outer margins (gutter) of the page
will be the same width, and the inner margins will be the same width.
x) In the Apply to list box, Click the portion of the document you want to apply
the current settings to in the Page Setup dialog box. And the options of this list
box are Whole document, This point forward etc can be changed according to
the situation.
Sometimes we create documents that do not fit on a standard piece of paper in its
normal standing up position. If you are creating something by hand then you can
simply turn the page so it is lying on its side. With MS Word you can change the
orientation of your page anytime you want while you are creating your document.
Print Option: For taking the printout you have to select the print option of the file
menu. To print your MS Word document:
i) Click ►File ►Print from the menu bar and a Print window will come up on
the screen
ii) Click ►OK for it to start printing OR
iii) Change some of the automatic settings first, such as which pages or how many
copies will be printed
iv) Click ►OK to start printing
You can set various options before taking the printout.
i) From the Name combo box you can select the printer if more than one printer is
installed.
ii) You can select the range of pages i.e. all pages or current page or number of
pages you require from Page range frame.
iii) From the print what option you can choose which part of a document you want
to print i.e. the whole document or comments or anything else.
iv) From print option the types of pages can be selected to print i.e. all pages or
even pages or odd pages.
v) You can choose number of copies from Number of copies option under Copies
frame.
vi) From Pages per sheet option under Zoom frame you can Select the number of
pages in the document that you want to print on each sheet of paper.
vii) From scale to paper size option you can select the paper size on which you want
to print the document. For example, you can specify that a B4-size document
prints on A4-size paper by decreasing the size of the font and the graphics. This
feature is similar to the reduce/enlarge feature on a photocopy machine.
The collate check box can print the copies of the document in proper binding order.
If you want to check what your document will look like before you print:
i) Click ►File ►Print Preview from the menu bar at the top or Click on the
Closing MS Word: Be sure to leave yourself enough time to save or print your work
before the end of your session. When you are finished, Click ►File ►Exit from the
menu bar OR Click on the X in the top right corner of the computer screen
The cursor (called a 'flashing i-beam') will blink on an off, indicating the text insertion
point. Anything typed will appear at the insertion point. By clicking the mouse within
the typed text, you can reposition the cursor. Additional text can then by typed, or text
can be deleted:
Cut, Copy, Paste and Copy Format:
To copy words, portions of text, images, or just about whatever you have in your
document, you can click on the COPY icon or hit Ctrl+C; this will memorize what
you have copied in the clipboard and you can paste it any place you want by clicking
on the PASTE icon or hitting the keys Ctrl+V. However, if you wish to delete
something in order to copy it somewhere else, use the CUT command (the scissors
icon) or hit Ctrl+X.
Finally, clicking on COPY FORMAT (the brush icon) you can format text as you
wish: to do so, position your pointer on the word whose format you want to copy;
click on COPY FORMAT icon; move pointer to word or text you want to modify and
highlight it with your mouse, and finally release the mouse button. The text will show
the new format (font, character size and colour).
Reverse Commands:
To reverse changes while editing, undo command is used. To perform undo you
can Click on the Undo option under Edit menu Or Click on the Undo button on
Standard toolbar Or Press Ctrl+Z.
The Find what box, enter the text that you want to search for. In the Replace with box,
enter the replacement text. Select any other options that you want. Click Find Next,
Replace, or Replace All. To cancel a search in progress, press ESC.
Go to: To go to on a particular location or particular item use Go to option under the
Edit menu click on the Go to option under the Edit menu or Ctrl+G. Then the
following window will appear on the screen.
Select according to what you want to navigate in the document from Go to what
combo box. Enter the parameter as page number or name of the bookmark. Click on
the previous or next depending upon the direction you want to go.
Formatting a Document:
Once the text of a document has been typed, it is required to be formatted. MS-Word
provides Format menu to give a meaningful format of your document, so that a user
can read and understand the document in an easy manner. Following are the options
available in the Format menu.
Text Formatting: Format of font i.e. the font type, font size, font style, font Color,
character spacing etc. can be changed by going in the option Font of Format menu.
Changing of Fonts: The word font means the way of writing characters. To change
the font-using Font dialog box gives you the opportunity to see the result within the
dialog box before applying it on the text. Other benefit of using the font dialog box is
that you can apply several effects within the same dialog box like font color, bold or
font size etc. Select the desired text to change the font. Select the Font option from
Format menu. A window will appear on the screen. Scroll through the Font list and
click the font that you want. Select the font color, underline style and Effects of your
choice. Select the font style according to the text. Click on Ok button
Paragraphs Formatting:
Alignment of the Paragraph: Alignment refers to the way the right and left edges of
a paragraph line up along the right and left margins of your document. Word gives
you four alignment choices - left, centered, right and justified.
Center Ali gned
Left Aligned
Justified
Working with Columns: You can use columns to create documents such as
newsletters or book pages. The column option controls the width and number of
columns. Narrower column widths make your text easier to read. Often, creating
columns enables you to fit more text on a single page. Columns work particularly well
where you have several shorter topics making up a larger document, as with a
newspaper. To create a column selects the text which you want to convert in column
Click on the column button in the Standard toolbar. A drop-down list appears with
four columns across it. Click on the first column in the drop-down list and drag across
to highlight desired number of columns.
Zoom In and Out of Text:
It is worth mentioning here that the zoom function that is on the standard tool bar of
WORD can be used to zoom in and out the text, this way even if you decide for a very
small font size you don't have to kill your eyes to read what you are writing. Simply
select a higher value on the pull down menu or directly type in a value in the box.
Spelling Checker:
Another important feature is the Spelling Checker and vocabulary, whereas the
Grammar Checker is highly unreliable yet and therefore not so useful. Normally most
modern WORD versions have this feature of English in-built vocabulary that may be
an invaluable helping tool for synonyms and antonyms. To activate this function,
position the pointer on the word you want to check and hit F7 key, or alternatively
right-click on your mouse and work through the pop-up menu.
Microsoft Word automatically underlines any words that it does not recognize in red,
assuming that they are not spelled right. Right-click the red underlined word and click
on either one of the corrections suggested or Ignore, to make no changes or add, to
make no changes but to add the word to Microsoft Word’s list of words that it thinks
are spelled correctly. This is especially useful for names of people or places that you
type often, so that Word will not think it is wrong the next time it sees it.
Green underlines mean that Microsoft Word thinks there is something wrong with the
way the sentence is written. Right-click the underlined words and either click on the
corrections suggested or click Ignore.
Insert
You take a document (such as a form letter) and a set of information (such as the
names and addresses of all your clients) and merge them. When you merge the form
letter and the list of names, you can generate a mass mailing. Each copy of the
document you print will be personalized with a different name and address. Typing
the letter once, combining it with your client list, and printing it can therefore
accomplish a mailing to hundreds of clients.
Before you start learning mail merge process, you need to understand the two
documents that make up a mail merge:
1. Main Document: In a mail-merge operation, the document containing the text and
graphics stays the same for each version of the merged document. For example, the
return address and the body of a form letter.
2. Data Source: A file that contains the text and graphics that varies with each version
of a mail-merge document. For example, a list of names and addresses for a form
letter you want to send to a list of client’s or in any report in which you want to use
information from a database.
If you have an existing letter that you want to use for your form letter, open it, and
modify it according to your need or if you want to start a letter from scratch, start a
new blank document. Save the document. Choose tools, Mail Merge to display the
Mail Merge Helper Dialog box. Click the Create button. Select Form Letter from the
drop-down list. A dialog box will appears with two choices: to create a form letter
within the active window or in new window. Click the Active window Button. Click
on edit button if you haven’t written the letter body.
o take part in our prize draw to win Rs. 10,000. A cheque to <<TITLE>> <<SURNAME>> could be on its way to <<ADDRESS 1>> if you fill out the reply slip below and post within 7 days. In return we will enter you i
A standard letter is written and mail merge markers are placed in it to show where the
data from the database will be inserted into the letter to personalize it.
Building Data Source
In this second phase, you tell Word which document you want to use as your data
source. You can either create a new one or open an existing one.
A data source is a file that contains the data that varies in each copy of a merged
document. For example, a data source can include the name and address of each
recipient of a form letter.
In the Field names in header row box, specify the data fields (A category of
information in a data source. A data field corresponds to one column of information in
the data source. The name of each data field is listed in the first row (header row) of
the data source. "PostalCode" and "LastName" are examples of data field names.) that
you want to include in the data source. To delete a data field, click the field name in
the Field names in header row box, and then click Remove Field Name. To add a data
field, type a new field name in the Field name box, and then click Add Field Name.
To change the order of the data fields, click a field name in the Field names in header
row box, and then click one of the arrow buttons. When you finish specifying the data
fields, click OK. Locate the folder that you want to save the data source in, type a file
name, and then click Save.
Click Edit Data Source.
In the Data Form dialog box, fill in the information for each data record (A complete
set of related information in a data source. A data record corresponds to one row of
information in the data source. All information about one client in a client mailing list
is an example of a data record. To fill in a record, type information for a data field,
and then press ENTER to move to the next field. If you don't want to include
information for a particular field, press ENTER to skip the field. Don't type spaces in
the box. To start a new data record, click Add New.
To return to the main document, click Mail Merge Main Document on the Database
toolbar.
Mail Mer ge Main
Now the main document displays out with the new toolbar of Mail Merge
Inserting the Merge Fields
It’s time to enter merge fields in the form letter you typed. The merge fields in the
letter will correspond to the fields in your database. Place your cursor halfway
between the date and salutation. Choose the Insert Merge field’s button on the Mail
Merge toolbar.
Word inserts the merge field surrounded by chevron brackets. Insert the remaining
merge fields in the address block, pressing Enter and adding spaces and commas
where necessary. If you have a salutation field, add it after Dear, and follow it with a
colon or comma. Save the main document.
Choose Merge button. The merge dialog box appears. Open the Merge to drop-down
list. Select the option from Printer, New Document, Electronic mail for the destination
of the mail merge. Select the New Document option and click on the Merge button.
Then you will get a new document named as Form Letters 1 with a copy of letter with
different names and address on different pages.
8.8 Summary
The word processor is the modern version of paper, pen, typewriter, eraser, dictionary
and thesaurus… all in one. It is used to create all kinds of documents, from simple
notes and memos, to brochures, resumes, and long reports. The key advantage of a
word processor is its ability to make changes easily, such as correcting spelling,
adding, deleting, and relocating text. Once created, the document can be printed
quickly and accurately and saved for later modifications.
In a word-processing program, a window appears for entering text, with a ruler above
to indicate the paper width and lots of little buttons with pictures on them. The buttons
are shortcuts to certain popular commands. If mouse is hovered over these buttons
(without clicking) a little tag will appear telling you what the button does.
Word processing software has various facilities like Mail merge. Mail merge allows
standard letters to be 'personalized' by merging it with data from a database. The
result is a batch of letters which contain virtually the same information with the
exception of names, addresses and any other information stored in a database.
At last, a word processing program is not a typewriter, although it may seem so. In
order to avoid problems with printing or formatting your document, you should keep
in mind the following:
Do not use the Enter key to change the line, except at the end of a paragraph.
Do not use the Tab key or Spacebar to indent your text, since the lines will be
hard to set right if you need to rewrite something.
Do not hyphenate your document manually.
Do not enter page numbers manually.
Do not create footnotes manually.
Do not create a table of contents manually.
Do not create tables manually.
Marquis, Annette and Courter, Gini, “Microsoft Office 2000”, 1 st Ed., BPB
Publications.
Structure:
9.1 Introduction
9.2 Concept and Definitions of Spreadsheet Software
9.3 Structure of Worksheet
9.4 Creation of Spreadsheet
9.5 Creating Range, Formulas and Functions
9.6 Graphics on Spreadsheet
9.7 Some future trends for spreadsheets
9.8 Summary
9.9 Self-Test questions
9.10 Suggested Readings
9.1 Introduction
Though most business computations can be handled by general accounting software,
more complex calculations often are needed in order to help businesses make wise
investment decisions. A computer aids the business person in performing these
complex mathematical tasks. Perhaps the most common use of the computer is in
financial analysis that involves the electronic spreadsheet use for designing solutions
for complex calculations.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets make
it easy to display information, and one can insert formulas to work with the data. We
use spreadsheet programs to learn about different kinds of things, and to make
decisions. Spreadsheets are based on different varieties of subjects. Although
electronic spreadsheets are useful in many areas of business, nowhere they are more
helpful than in financial analysis, or forecasting, which determines profit margins,
sales, and long term strategies. The reason for the great impact of the electronic
spreadsheet in this area is its ability to answer “What if?” type queries on available
data, as with the help of formula and function facility one can intelligently setup
complex relationships between individual items in a table. A spreadsheet program
uses the memory capability of computer to solve mathematically oriented problems.
With a spreadsheet program, columns of numbers can be setup to keep track of money
or objects. These items are stored in a place known as cells. The user may setup
relationships and see the affect of varying independent quantities. With the high speed
computing power of the digital computer, complex problems can be modeled on the
computer and various options can be tried. For example, there is a particular icon that
has a formula to sum up numbers that are given. This icon is called auto sum.
Information can also be sorted and filtered.
This chapter will present an overview of the spreadsheet software and highlight the
use of spreadsheets through its applications.
Spreadsheet History
1961 - Professor Richard Mattessich was the first to develop a computerized
spreadsheet.
1978 - Robert Frankston and Dan Bricklin invented VisiCalc, the first
spreadsheet. It came out with the Apple II computer. VisiCalc did very well
in its first year because it could run. On personal computers, could perform
simple math formulas, and gave immediate results.
1980 - DIF formats were invented. Data was more portable and could be
shared with other programs.
1980-83 - New versions of DIF, SuperCalc, and some other programs came
out to the public.
1983 - Lotus 123 was introduced. It allowed people to chart information and
identify cells. For example cell A1.
1985 - Lotus 123 number 2.
1987 - New spreadsheet programs such as Excel and Corel Quattro Pro were
introduced. This allowed people to add graphics. They are different because
they include graphic capabilities.
2001 - Spreadsheet programs in use today are Excel, Appleworks, Filemaker,
and Corel Quattro Pro.
We can define spreadsheet in the following manner:
A spreadsheet is a software tool for entering, calculating, manipulating, and
analyzing sets of numbers.
We have seen from historical evolution many of the spreadsheet software, from
learning point of view we shall consider only Microsoft Excel.
Structure of Worksheet:
Start with Microsoft Excel:
To start Excel, follow the following steps:
1. Click on the Start button at windows taskbar.
2. Select Program option.
3. Select Microsoft Excel option.
4. Selecting this option will open up Microsoft Excel and the main screen will appear.
Creation of Spreadsheet:
Open a New Workbook
To open a new workbook, follow the steps:
1. Click on the File Menu.
2. Select Option New.
3. Click the OK Button. Now you will get a fresh new workbook to work on.
Save a Workbook
For saving a document, following are the steps:
Click Save option on the File OR Press Ctrl+S OR Press the Save Button from
standard toolbar. If you are saving the file for the first time, the Save As… window
will appear. Choose the appropriate folder from Save in combo box. Write the proper
file name in the File name text box. And then press the Save button
Opening of an Existing Workbook
To open an existing workbook, the following steps are required:
1. Select the Open option from the File menu OR Press Ctrl+O OR Click on the
Open tool from the standard toolbar. Then the open dialog box will appear.
2. Select the appropriate folder from Look in combo box.
3. Select the required file from the file window OR write the required file’s name
in the File name window
4. Click on open button on the right hand side OR Press Enter
Closing of Workbook
To close an already opened workbook just choose the Close option from file menu but
keep it in your mind that only the current window or workbook will close because
Microsoft Excel works in MDI (Multi document interface) environment unlike
notepad which works in SDI(Single document interface).
Page Setup
From the Page setup option, one can setup the page layout according to his work. For
using the Page setup option, you have to perform the following steps:
1. Click on the Page setup option from the file menu. Then a window will
appear.
2. Select the page Orientation from Portrait or Landscape.
3. Setting the Adjust to setting will Reduces or enlarges the printed worksheet.
4. Select the Adjust to check box, and then enter a percentage number in the %
normal size box. You can reduce the worksheet to 10 percent of normal size or
enlarge it to 400 percent of normal size.
Give the value to ‘Fit to’. Setting to ‘Fit To’ reduces the worksheet or selection when
you print so that it fits on the specified number of pages. Select the ‘Fit to’ check box,
enter a number in the page(s) wide by box, and enter a number in the tall box. To fill
the paper width and use as many pages as necessary, type 1 in the pages(s) wide by
box and leave the tall box blank.
Select the Paper size
Print Option
For taking the printout you have to select the print option of the file menu. After
selecting the print option from file menu the window given below will appear.
You can set various options before taking printout.
1. From the Name combo box, you can select the printer if more than one printer
is installed.
2. You can select the range of pages i.e. all pages or current page or number of
pages you require from Print range frame.
3. From the print what option you can choose that which part of a worksheet you
want to print i.e. some selection or Entire workbook or active sheet only.
4. You can choose number of copies from Number of copies option under Copies
frame.
Here as shown in the window the specified area is from B3 to I18 which is selected
with the help of mouse.
Perform the following steps to select a range of cells:
1. Point your mouse to cell address B3.
2. By pressing the left button of the mouse drag upto cell address I18.
3. Release the button.
The range is created for performing any operation on the worksheet.
Creating Formulas:
After entering the data into the worksheet, calculations are performed with that data.
This is done using formulas, the true power of a spreadsheet program. For creating the
formula, syntax is required which describe the sequence of character used in a
formula.
The syntax of a formula begins with an equal sign (=) in Excel and is followed by a
combination of values, operators and cell references.
Operators: Operators specify the type of operation that has to be performed on the
parts of a formula. Basically we use three types of operators.
1. Arithmetic Operators: To perform mathematical operation on numeric values
and thereby produces numeric results.
2. Comparison Operators: To compare the values or labels in two cells. The
result of this formula is either TRUE or FALSE.
3. Text Operators: To join one or more text values into a single combined text
value. The ampersand (&) (which is the only text operator) is used to join one
or more labels into a single combined label. For example,
=D2& “ “&F3
This formula combines the labels in cells D2 and F3.
Creating Functions:
Spreadsheets come with many built formulas, called functions that perform
specialized calculations automatically. We can include these functions in our own
formulas. Some functions are quite simple, such as the COUNT function (to count the
number of values in a range of cells). Many functions, however are very complex.
i. AND: The logical functions are used to see whether a condition is true or
false or to check for multiple conditions.
Syntax: AND(Logical1, Logical2, ….)
Argument Type: Logical all
Return Type: Logical
Example: =AND(c2:c6)
MS-EXCEL returns TRUE
ii. OR: Returns TRUE if any argument is TRUE; returns FALSE if all arguments
are FALSE.
Syntax: OR(Logical1, Logical2, ….)
Argument Type: Logical all
Return Type: Logical
Example: =OR(c2:c6)
MS-EXCEL returns TRUE
Type: =OR(b2:b6)
MS-EXCEL returns #VALUE
iii. NOT: Reverses the value of its expression that can be evaluated to TRUE or
FALSE.
Syntax: NOT(logical)
Argument Type: Logical
Return Type: Logical
Example: =NOT(FALSE)
MS-EXCEL returns TRUE
Type: =NOT(1+4=5)
MS-EXCEL returns FALSE
4. Math Functions
i. ABS: Returns the absolute value of a number.
Syntax: ABS(Number)
Argument Type: Number
Return Type: Number
Example: =ABS(5)
MS-EXCEL returns 5
Type: =ABS(-5)
MS-EXCEL returns 5
ii. EXP: Returns e raised to the power of a number e.g. e^x. The constant
e=2.71828182845904, the base of the natural logarithm.
Syntax: EXP(number)
Argument Type: Number
Return Type: Number
Example: =EXP(1)
MS-EXCEL returns 2.718281828
Example: =EXP(2)
MS-EXCEL returns 7.389056099
iii. INT: Rounds a number down to a nearest integer.
Syntax: INT(number)
Argument Type: Number
Return Type: Number
Example: =INT(8.9)
MS-EXCEL returns 8
Example: =INT(-8.9)
MS-EXCEL returns -9
iv. LOG: Returns the logarithm of a number to the base we specify.
Syntax: LOG(Number, base)
Argument Type: Number, Number
Return Type: Number
Example: =LOG(10)
MS-EXCEL returns 1
Example: =LOG(8,2)
MS-EXCEL returns 3
v. MOD: Returns the remainder after number is divided by divisor. The result
has the same sign as the divisor.
Syntax: MOD(Number, divisor)
Argument Type: Number, Number
Return Type: Number
Example: =MOD(3,2)
MS-EXCEL returns 1
Example: =MOD(3,-2)
MS-EXCEL returns -1
vi. ROUND: Returns a number to a specified number of digits
Syntax: ROUND(number, num_digits)
Argument Type: Number
Return Type: Number
Example: =ROUND(2.15,1)
MS-EXCEL returns 2.2
Example: =ROUND(2.149,1)
MS-EXCEL returns 2.1
vii. SQRT: Returns a positive square root.
Syntax: SQRT(number)
Argument Type: Number
Return Type: Number
Example: =SQRT(16)
MS-EXCEL returns 4
Example: =SQRT(-16)
MS-EXCEL returns #NUM
viii. SUM: Adds all the numbers in a range of cells.
Syntax: SUM(number1, number2, ….)
Argument Type: Number
Return Type: Number
Example: =SUM(3,2)
MS-EXCEL returns 5
Example: =SUM(a2, b2, 2)
MS-EXCEL returns 2
ix. TRUNC: Truncates a number to an integer by removing the fractional part of
the number.
Syntax: TRUNC(number, num_digits)
Argument Type: All number
Return Type: Number
Example: =TRUN(8.9)
MS-EXCEL returns 8
Example: =TRUN(-8.9)
MS-EXCEL returns -8
5. Statistical Functions
Examples based on the following table:
R. No. Name Marks Grade
2001 Anil 96 A+
2002 Sanjay 43 F
2003 Jagdeep 66 A
2004 Rajneesh 55 B
2005 Renu 80 A+
Sorting of Data
To sort the data you have to perform the following steps.
1. Select the columns which you want to sort.
2. Choose Sort option from Data menu. You will find out the following dialog
box on the screen.
3. Choose the Column on which you want to do the sorting. You can select more
than one column.
4. Select the Ascending or descending option.
5. Select the Header row if there is any header row in the table.
6. Click on the OK button.
Filtering List
Sometimes the user wants to locate some information from an extensive list. To find
the information quickly, Microsoft Excel provides Filter list option. This option
enables the user to display the information regarding the selected options. Microsoft
Excel provides two commands for filtering lists:
AutoFilter, which includes filter by selection, for simple criteria
Advanced Filter, for more complex criteria
Using Auto Filter
You can apply filters to only one list on a worksheet at a time.
1. Click a cell in the list you want to filter.
2. On the Data menu, point to Filter, and then click AutoFilter.
3. To display only the rows that contain a specific value, click the arrow in the
column that contains the data you want to display.
4. Click the value.
5. To apply an additional condition based on a value in another column, repeat
steps 3 and 4 in the other column.
Filter a List by using Advanced Criteria
Your worksheet should have at least three blank rows above the list that can be used
as a criteria range. The list must have column labels.
1. Select the column labels from the list for the columns that contain the values
you want to filter, and click Copy.
2. Select the first blank row of the criteria range, and click Paste .
3. In the rows below the criteria labels, type the criteria you want to match. Make
sure there is at least one blank row between the criteria values and the list.
4. Click a cell in the list.
5. On the Data menu, point to Filter, and then click Advanced Filter.
6. To filter the list by hiding rows that don't match your criteria, click Filter the
list, in-place.
To filter the list by copying rows that match your criteria to another area of the
worksheet, click Copy to another location, click in the Copy to box, and then click the
Criteria
upper-left corner of the area where you want to paste the rows.
7. In the Criteria range box, enter the reference for the criteria range, including
the criteria labels.
To move the Advanced Filter dialog box out of the way temporarily while you select
the criteria range, click Collapse Dialog.
Graphics on Spreadsheet:
Inserting Images, Auto shapes and Word Art
Inserting Images from Clip Gallery
To insert an image from Clip Gallery you have to follow these steps:
1. Move the cursor on the cell where you want to insert the image.
2. Select Clip art option from Insert->Picture menu.
3. Click the picture category from which you want to insert the picture.
4. If you know what type of image you are looking for, type a descriptive word
or two in the Search for Clips text box, and press Enter. Excel displays the
images that most closely match your keywords.
5. When you find out the image that you want to use, click it.
6. Clicking on image will display a small toolbar, from that toolbar click the
insert button.
This will insert a clipart in your worksheet.
WordArt
WordArt lets you add flair to your text itself. It provides a different look to your text
as well worksheet. It is perfect for creating flashy headings and titles. To insert a word
art in your worksheet do the following steps.
1. Click the place on the worksheet where you want the WordArt image to be
placed.
Insert Chart
Pictures are more understandable than words. Charts are visually appealing and make
it easy for users to see comparisons, patterns, and trends in data. For instance, rather
than having to analyze several columns of worksheet numbers, you can see at a
glance whether sales are falling or rising over quarterly periods, or how the actual
sales compare to the projected sales.
You can create a chart on its own sheet or as an embedded object on a worksheet. You
can also publish a chart on a Web page. To create a chart, you must first enter the data
for the chart on the worksheet. Then select that data and use the Chart Wizard to step
through the process of choosing the chart type and the various chart options.
Using chart wizard
One of the easiest ways to generate a chart from data you enter in a worksheet is by
using Chart wizard. Chart wizard is a simple process of making selections to produce
a finished chart.
1. Select the range of data on which you want to make a chart.
2. Select the option chart from insert menu following dialog box will appear.
5. If the given charts are not of your choice then click on the Custom Type tab.
6. Select the graph type and Click on the Next button.
7. If you have forgotten to select the data range or you want to change the data
range then you can select the data range from here by clicking the button next
to Data range combo box.
8. Click on the Series tab. Following dialog box will appear.
9. You can add or remove the series (Columns) from the series list box by
clicking add or remove button.
10. Click on the Next button the option dialog box will appear on the screen.
11. Fill up the entries as Heading of the chart, (x) axis category heading, (Z) axis
values heading.
12. Click on the Legend tab
13. Legend dialog box will be displayed on the screen
14. Check mark the Show legend check box to show the legends
15. Select the Placement position.
16. Click on the Data Labels Tab.
17. Choose the type of labels you want to see in your graph.
18. Click on the Next button.
19. Select the destination of the Chart on new sheet or in the current sheet.
20. Select New Sheet and click on the Finish button.
For the future, one can expect spreadsheets to offer more special features for the
advanced user while simplifying frequently used tasks for beginning and advanced
users alike.
Summary
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets make
it easy to display information, and people can insert formulas to work with the data.
People use spreadsheet programs to learn about different kinds of things, and to make
decisions. It is basically an end user application package. It works very well with
numbers and their complex calculations. Spreadsheet helps to prepare data in an
organized, orderly and meaningful fashion. Spreadsheet finds its major contribution in
creating reports, using formulas and performing calculations. It is best suited for
scientific and statistical analysis. Spreadsheet can also be used to prepare Profit and
Loss accounts, Balance sheet and other Tax statements.
After entering the data into the worksheet, calculations are performed with that data.
This is done using formulas and functions, the true power of a spreadsheet program.
Spreadsheets come with many built formulas, called functions that perform
specialized calculations automatically. We can include these functions in our own
formulas. Some functions are quite simple however, many functions are very
complex.
Spreadsheets can also be applicable in presenting the graphics and managing the
database. For the future, one can expect spreadsheets to offer more special features for
the advanced user while simplifying frequently used tasks for beginners and advanced
users alike.
Self-test Questions
1. What are the uses of electronic spreadsheet?
2. Describe the structure of MS-EXCEL spreadsheet.
3. Write a short note on inserting a chart.
4. Differentiate between a formula and a function.
5. Write the syntaxes of logical functions and explain giving examples.
6. What is the use of giving name to cells?
7. How data is imported in MS-EXCEL?
Suggested Readings
Marquis, Annette and Courter, Gini, “Microsoft Office 2000”, 1 st Ed., BPB
Publications.
Norton, Peter, “Introduction to Computers”, 2nd Ed., Tata McGraw Hill.
COURSE: COMPUTER APPLICATIONS IN BUSINESS
Course Code: MC-107 Author: Dr. Pardeep Ahlawat
Lesson No.: 10 Vetter: Dr Karam Pal
Objectives: The motive of this lesson is to present an introduction of Data Files and
within that framework the key file concepts, types and organizations of Data
Files are discussed.
Structure:
10.1 Introduction to Files
10.2 Data File Types
10.3 Master and Transaction Files
10.4 File Organization
10.5 Serial Files
10.6 Sequential and Indexed Sequential Files
10.7 Direct or Relative Files
10.8 Summary
10.9 Self-Test questions
10.10 Suggested Readings
206
The information in a file is defined by its creator. Many different types of information
may be stored in a file: source programs, object programs, numeric data, text, payroll
records, and so on. A file has a certain defined structure according to its use. A text file is
a sequence of characters organized into lines (and possibly pages); a source file is a
sequence of subroutines and functions, each of which is further organized as declarations
followed by executable statement; an object file is a sequence of words organized into
loader record blocks.
All files are identified by their extension, the ".xxx" that follows any file name. For
example, Microsoft Word documents end with the file extension ".doc". Microsoft Word
creates word files; FrontPage creates HTML files. Listed below are some common file
extension and the programs that create them.
.html or .htm- Hypertext Markup Language, the code for most web pages
.pdf- Portable Document Format. Allows for universal printing without format changes
.exe- An executable program file
.jpg- JPEG (Joint Photographic Experts Group) A graphic file
.gif- Graphics Interchange Format; another graphic file
.mp3- MPEG Layer III compressed audio. This file can be played with QuickTime
Player, Real Player, and some other sound players.
.wav- Sound file
.mov- QuickTime movie. This file can be viewed with QuickTime Player.
.avi- AVI movie format
.zip- Compressed or "zipped" file; can be opened with WinZip
A file is an abstract data type. To define a data file properly, we need to consider the
operations which can be performed on files. To understand these files, let us look at
various types of data files and their operations in more detail.
Some records of master file need to be updated periodically. For Example, Balances,
Stock Balances, Reservation, Records of files, Financial year, Opening balance,
Credit/Debit of Banks etc. A master file presents a static view of some aspect of an
organization’s business at a point of time. For Example, A manufacturing organization
may have payroll file, a customer file, a personnel file, an inventory file, a material
requirement as master file.
This file is also called movement or activity file. For example, for an organization it may
contain daily sales-records, daily production entries etc. This file after insertion of
records is used to update master file. The life of this type of file is very short. The file is
in-processing most of time. Changes which are applied to a master file are collected on a
transaction file. A transaction file may contain data to add a new record or to remove or
modify an existing record. The data normally stored in journals in a traditional
accounting system are examples of transaction files. They contain the activity data used
to update the running balance listed in the subsidiary and general ledger master files.
Batches of source documents are also examples of transaction files.
3. Output Files: The output produced by one program is used as input to another
program in many of the applications using multiple programs for data processing. This
output is stored in file known as output file, which is later on used by the latter program.
5. Backup files: These files are duplicate copies of a file for security reasons and created
as a safety precaution against loss of data, which may be caused due to corruption or
inadvertent deletion of the original file. It is very important to create backup files
regularly.
6. Scratch files: These are very temporary files and are used to collect data for file
update or file sort temporary backup.
7. Reference files or table files: It is a type of master file containing referential data.
Reference file contains data that are necessary to support data processing i.e. price lists,
dictionary files, present value schedules, amortization tables, table of inventory codes or
categories, lookup tables etc.
8. Suspense files or error files: These files include transactions which are not able to be
fully processed due to the presence of erroneous data. These transactions are
suspended
from further processing and may be classified as incomplete or erroneous, needing
correction and reentry for processing.
9. Open files: These files are used to record incomplete transactions. They have
characteristics of both master and transaction files and is also known as hybrid files. An
example would be the open sales order file, open purchase order file, or open invoice file.
Open files are waiting for an event to occur to resume processing. These files are not
error files. Closing the record usually amounts to setting a flag alerting computer
software to the changed status. Later, the closed records will be purged from the file, and
perhaps written to a history file. Open files usually remain open indefinitely. Only
individual records are purged as the transactions are completed.
10. History files: This type of files provide a permanent record of transactions processed
during certain time period. The examples would be bank records, court documentation
and records, previous years’ financial statements. They could also contain data to
support those statements, such as sales history file, purchase order history file, etc. They
are accessed or read infrequently and contain inactive past or historical data.
11. Archive Files: An archive file is a file of data in long-term storage usually for legal
reasons. Archive files contain all information about the past dealings of the business and
would normally be stored on a different site in case of fire etc.
Needless to say, these requirements are in contrast with each other for all but it is the
designer job to find a good compromise among them, yielding adequate solution to the
problem. There are four commonly used file organization techniques that help in
computer data processing for business applications which are as follows:
1. Serial Files
2. Sequential Files
3. Indexed Sequential Files
4. Direct or Relative Files
Choosing a file organization is a design decision, hence it must be done having in mind
the achievement of good performance with respect to the most likely usage of the file.
The selection of a particular file organization depends upon the factors like, the type of
application, the method of processing for updating files, size of files etc. The best
organization to use in a given application is the one that meets the application’s data
access and processing requirements in the most effective and economical manner. Hence,
an application designer must evaluate the strengths and weaknesses of each file
organization, before making a choice of the type of organization to be used for the
application. Data in files is organized in the following common ways according to user's
needs:
10.5 Serial Files
Serial
Records on a serial file are not in any particular order sequence so the serial file is
equivalent to an unordered sequence. The data are collected in the file in the order in
which they arrive. Each record is written after the last record in the current file. This type
of organization would not be used for a master file as there would be no way to find a
particular record except by reading through the whole file, starting at the beginning until
the right record was located. The order of records in the serial file is according to the time
when the data was generated. Serial files are used as temporary files to store transaction
data. Memory dumps, archival files, records of events are the examples of this type of file
organization.
Location of a record in a file can be done by sequentially searching the records till the
desired value of the key attribute is reached. New records are always at the end of the
file. Changes and deletions of records in a serial file stored on random access media can
be done by locating the record and changing its contents and flagging the record to
indicate that the record has been invalidated. The file may be reorganized periodically to
remove the holes created by deleting of records. However, updating of the serial file on
sequential access media can be done only by creating a new file.
Sequential
As with serial organization, records are stored one after another, but in a sequential file
the records are sorted into key sequence i.e. according to some identifying characteristic
called a key and the records are accessible only in the order stored, (in key order). This
means that records are stored in ascending or descending order or chronological order of
a key field in a sequential file organization. For example, the records of the employee file
may be organized sequentially by employee code sequence. Files that are stored on
storage media (magnetic tape, cartridge tape etc.) are always either serial or sequential, as
it is impossible to write records onto a tape in anyway except one after the other. From
the computer's point of view, there is essentially no difference between a serial and
sequential file. In both cases, in order to find a particular record, each record must be
read, starting from the beginning of the file, until the required record is located. This kind
of file organization works well for tasks which need to access nearly every record in a
file, e.g. payroll. Hence, sequential files are not suitable for applications that process only
one or a few records at a time however, when the whole file has to be processed,
sequential file is fast and efficient.
The updating and processing of records of a sequential file stored on a sequential access
media is carried out in a batch mode. The updating involves the reading of records from
both transaction and the master file and matching the two for the key attribute. The
additions, deletions, and changes are then carried out in the records of the master file and
the updated records are written on the new updated master file.
Indexed sequential
Indexed Sequential files are organized like a large dictionary, i.e., records are stored in
order by key and an index is kept which also permits a type of direct access.
In sequential files search for a given record on average requires access to half the records
in the file which is an inefficient and time consuming operation in case of large files. An
index file can be used to effectively overcome this problem, and to speed up the key
search as well. A sequential file (records sorted on primary keys) that is indexed and
stored on a direct access device such as magnetic disk from where data can be accessed
either in random or sequential fashion is called an indexed sequential file. In fact, this
type of file organization includes two files for every data file. The data file containing the
records stored in the file and an index file containing the key and disk address of each
record stored in the data file. The records may be stored randomly but the index table is
in the sorted sequence on the key value. With this type of arrangement file can be
processed randomly as well as sequentially. The index provides for random access to
records, while the sequential nature of the file provides easy access to the subsequent
records as well as sequential processing. This technique is referred to as Indexed
Sequential Access Method (ISAM).
For direct access, the file is viewed as a numbered sequence of blocks or records. A direct
access file allows arbitrary blocks to be read or written. Thus we may read block 14, then
read block 53, and then write block 7. There are no restrictions on the order of reading or
writing for direct access files and need to be stored on a direct access storage device
(DASD) such as magnetic/optical disk to enable direct access of records.
If a record has to be accessed from a number of records stored in the file in which the
records are organized physically in a manner to directly access, a record is stored by its
key field value. The direct file organization uses an address generating function to
convert the record key value into a storage address on the disk on which the file is stored.
Each record in the file is stored at the location to which the address generating function
maps the record’s key field value. The procedure used for mapping the key field value to
the locations is called hashing algorithm. To search a record, given its key value, the
computer applies this hashing algorithm on the given key to generate its corresponding
address.
Direct access files are of great use for immediate access to large amounts of information.
They are often used in accessing large data bases. When a query concerning a particular
subject arrives, the user computes which block contains the answer and then read that
block directly to provide the desired information.
Not all operating systems support both sequential and direct access for files. Some
systems allow only that a file is defined as sequential or direct when it is created; such a
file can only be accessed in a manner consistent with its declaration.
10.8 Summary
A file consists of a number of records. Each record is made up of a number of fields and
each field consists of a number of characters. The files when created will have key field
which helps in accessing a particular record within a file. The records can be recognized
accordingly by that particular key. The records are read into memory one at a time in
sequence. The files are stored normally on backing storage media, as they are too big to
fit into the main storage all at once. Some files are processed at regular intervals to
provide information. Others are processed at irregular intervals. There are various types
of files and a variety of file accessing methods.
In a traditional file environment, data records are organized using either a sequential file
organization or a direct or random file organization. Records in a file can be accessed
sequentially or they can be accessed directly if the sequential file is on disk and uses an
indexed sequential access method. Records on a file with direct file organization can be
accessed directly without an index. By allowing different functional areas and groups in
the organization to maintain their own files independently, the traditional file
environment creates problems such as data redundancy and inconsistency, programs data
independence, inflexibility, poor security and lack of data sharing and availability.
Some of the basic methods of file organization are:
(i) Serial File
(ii) Sequential File
(iii) Indexed Sequential File
(v) Direct File
Serial File contains a set of records in no particular order but the records are stored as
they arrive. They do not follow any particular sequence of attribute values. This method
of storing records is adopted when it is not possible to arrange the records in any logical
order, when the files of the record are not well defined, and the exact use of the file
cannot be anticipated. Files are created in this mode by punching the documents in the
order of arrival. Then, it is organized into another mode.
File on sequential access media are generally organized in the sequential mode.
Sequential files may also be maintained on the random access media. The records are
arranged in the ascending or descending order of the values of a key attribute in the
record. The sequence of records in the file can be changed from one key attribute to
another key attribute by sorting the file. The key for sequencing the records may also
consist of a group of attributes.
Search in a long sequential file can be very time consuming with unnecessary delays in
the location of the record and unavoidable. Computer time is being spent in the search
routine. Search can be made faster if an index to the file is provided. Such a file
organization is called indexed sequential file.
Direct files are not maintained in any particular sequence. Instead, the value of the key
attribute is converted into the sector address by a predetermined relationship. This
converts the value of the key attribute to sector address for the storage and retrieval of the
record. This method is generally used where the range of the key attribute values is large
as compared to the number of records.
Direct and Random access has the same concept. An element of data (byte or record) or
instructions can be directly stored and retrieved by selecting and using any of the
locations on the storage media. It also means each storage position has a unique address
and can be accessed in approximately the same length of time without searching other
storage positions.
10.10Suggested Readings
Desai, C. Bipin, An Introduction to Database Systems, Sp. Ed., Galgotia Publications Pvt.
Ltd.
Sinha, Pradeep K. and Sinha, Priti, Computer Fundamentals, Third Ed., BPB
Publications.
COURSE: COMPUTER APPLICATIONS IN BUSINESS
PAPER CODE : MC-107 Author : Dr. Pradeep Bhatia
LESSON NO. :11 Vetter : Dr. Dharminder Kumar
INTRODUCTION TO DBMS
LESSON STRUCTURE:
11.1 Introduction
11.2 Characteristics of Data in Data Base
11.3 Data Base Management System
11.4 File Processing v/s Database Processing
11.5 Data Model
11.6 Types of Data Models
11.7 Data Independence
11.8 Schema and Subschema
11.9 Self – Test questions
11.1 INTRODUCTION
A database is an organized collection of facts. In other words we can
say that it is collection of information arranged and presented to serve
an assigned purpose.
222
An example of a database is a dictionary, where words are arranged
alphabetically. Another example is telephone directory, where subscriber
names are listed in an alphabetically. Similarly, when you think of a box of
cards with names and addresses written as a mailing list, then the box and its
contents form a mailing database. Figure 1.1 contains cards with mailing
addresses. All these cards are placed in alphabetic order of names and the
collection of these cards would be called a database.
Fig. 1.1
2.1 Field
The smallest piece of meaningful information in a file called a data item or field.
Figure 1.2 displays four data items(fields) in a record. NAME, LOCALITY,
CITY, STATE, are all known as data items or fields.
2.3 File
File is the collection of all related records. In Figure 1.2 the file contains the list
of addresses of six friends.
2.4 Database
Database is a collection of related file. Figure 1.3 shows Employees database
having related files containing records of employees.
File-1
File-2
Data Base Manageme nt System (DBMS)
Faculty
Data File
Class scheduling System Reports
Class
Data File
But, suppose someone wants to know the salary paid to instructor who teaches
a class scheduled by the class scheduling system. To obtain this information a
new program must be written to extract data from both the faculty data file and
the class data file. Unfortunately, there is no guarantee that these two files
are compatible.
5.1 Entity
An entity is a class of persons, places objects, events or concepts about
which the information is recorded.
Persons: Employees, Customer, Students, Suppliers etc.
Places: Branch Office, Building, Room etc.
Objects: Book, Machine, Vehicle etc.
Events: Sale, Reservation Registration Order etc.
Concepts: Qualifications, Account, Course, Stocks etc.
In a banking environment examples of entities are CUSTOMERS, BANK
ACCOUNTS, TRANSACTIONS.
In a warehouse the entities are SUPPLIERS, PARTS, SHIPMENTS.
5.2 Attributes (Data Elements)
Every entity has some basic 'attributes' that characterize it. An attribute
may be elementary or logically grouped in to super attributes called compound
attribute.
In a banking environment entity 'CUSTOMER' may be described by such
attributes NAME, ADDRESS, Identification No. SEX, AGE.(fig. 1.7) and
compound attribute 'NAME' is described in fig 1.8.
CUSTOMER
NAME ADDRESS Identification No SEX AGE
CUSTOMER
NAME ADDRESS Identification SEX AGE
First Middle Last
ACCOUNT
ACCOUNT ACCOUNT ACCOUNT
NUMBER TYPE BALANCE
Figure 1.9 Elementary Attributes of Entity ACCOUNT
An attribute is often called a data element, data field, a field, a date item or
elementary item.
5.3 Data value
A data value is the actual data or information contained in each data
element.
BED STUDENT
PATIENT CLASS
1.9a 1.9b
ROOM COURSE
BED TEACHER
1.10a
1.10b
Fig. 1.10 One-to-many(1:M) RELATIONSHIP
Patient TEACHER
Surgeon Student
1.11 a 1.11 b
Conceptual Model
Logical Model Physical Model
External/conceptual mapping
CONCEPTUAL SCHEMA
CONCEPTUAL
LEVEL
Stored Database
Level 2
Level 3
G
B E
C D F H K L
I J
Every node consists of one or more attributes describing the entity at
that node.
Except that, every node has one node related to it at a higher level, and
this is called its parent. No element can have more than one parent.
Each element can have one or more elements related to it at a lower
level. These are called children.
Every node except, of course, the root has to be accessed through its
parent node. Therefore the access path to every node with a hierarchical
data model is unique.
Every occurrence of root node began a logical data base record i.e. a
hierarchical database made up of a number tree. In hierarchical data model,
the node at level 1 is called the parent of the nodes at level 2.
Example
Teacher Student
A Teacher Student
B Teacher Student
Level 2
Child
Student Roll Student Class Section Age
No. Name
The entity TEACHER is the root node; every teacher has a root node
occurrence. A hierarchical data base record occurrence for the hierarchical
data model Teacher. The data base record is for the teacher S.Kumar
One
Teacher Student
Many
Level 1
(Root /Parent)
Roll No. Student Name Class
242
Level 2
Child
Dept No. Teacher Name Subject Address
Entity STUDENT is root node, every student has root node occurrence.
Data Base record for Student AAAA
1111 AAAA MCA V
The hierarchical data models A and B are different; these data models are of
the same university. The difference is the result of the two ways of linking of the
entity relationships.
7.3 Advantages of a Hierarchical Data Model
The Major advantage of the hierarchical data model is existence of
proven data base management systems that use hierarchical data
model as the basic structure.
There is a reduction of data dependency. When the two hierarchical data
models from fig c are used.
The relative simplicity and ease of use of the hierarchical data model
and the familiarity of data processing users with a hierarchy are major
advantages.
243
know that redundancy at logical level is not necessarily bad on
the contrary. It promotes simplicity redundancy at the physical
level, however is undesirable.
As a result of the strict hierarchical ordering, the operations of
insertion and deletion become unduly complex.
Deletion of parent results in the deletion of children. As a result,
users have to be careful in performing a DELETE operation.
Root is the dominant node type. Any child node is accessible only
through its parent node.
7.3 Network Data Model
7.3.1 Network Data Structure
Any item in a network structure can be linked to any other item. In this structure
a child can has more than one parent, in other words a node at lower level can
be linked to more than one nodes at a level higher to it.
1 2 1 2
3 4 3 4 5
I II
Family tree is a tree structure only because it does not include woman
and if they were both shown in the diagram, it would be a network(plex)
structure.
Any network structure can be reduced to a tree structure by introducing
redundancy. In some cases the redundancy involved in doing so is small and
might be tolerated. In other cases it is excessive.
Patient
Surgeon
OBJECT
DATA
OPERATIONS
Class : Furniture
Cost
Dimensions
Colour
Buy
Sell
Move
Cost Cost
Dimensions Dimensions
Colour Colour
Buy Buy
Sell Sell
Move Move
In fact objects are variable of type class. A class is thus a collection of objects of
similar type. For example, mango, apple, and orange are members of class fruit.
Each object essentially consists of some data that is private to the object and
set of functions (Operations or Methods) that operate on those data.
m7 m8
m1 m5
Data
m2 m6
m3 m4
7.4.3 Abstraction
It is the selective examination of the certain aspects of a problem while
ignoring the other aspects of the problem. In other sense we can say that
abstraction is to consider only those aspects of the problem that are useful for a
certain purpose and to hide all other aspects that are not relevant for the given
purpose, does the abstraction mechanism helps us to represent a problem in a
simple way.
Many different abstractions of a same problem are possible depending
upon the requirements.
It is a powerful tool of object oriented technique for reducing complexity
of software. Abstraction can be a way of increasing productivity of a software.
7.4.4. Inheritance
Library Members
247
This feature helps us to define a new class helps us a new class or
modifying extending or modifying and existing class. The original Class is
called base class or super class and the new class obtained through
inheritance is called derived class or sub class. Fig Library member is a
based class for the derived classes Faculty, Students and Staff.
An important advantage of inheritance mechanism is code reuse.
7.4.5 Message
Objects communicate with one another by sending and receiving information
much like same way the people messages to one another.
Methods are the only means available to other objects for accessing a
manipulated the data for private the data. The methods of an object are
invoked by sending massages to it. A set of valid massages to an object
constitutes its protocol.
7.4.6 Polymorphism
It means poly (many) morphism(forms) i.e. ability to take more tan one
form. With the help of a polymorphism a programmer can send a generalized
massage to a set of objects, which may be of different types.
The main advantage of polymorphism is code reuse and maintenance
7.4.7 Object-Oriented Data Models(OODM)
Object-Oriented Data Models (OODM) are dependent on the object- oriented
programming paradigm. It enables us to create classes, organize objects,
structure an inheritance hierarchy and call methods of other classes. Besides
these, it also provides the facilities associated with standard database systems.
However, object oriented database systems have not yet replaced the RDBMS
in commercial business applications.
Following are the two different approaches for designing an object-
oriented data model:
(a) Designed to store, retrieve and manage objects created by programs
written in some object oriented language (OOL) such as C++ or Java.
(b) Designed to provide object-oriented facilities to users of non object-
248
oriented programming languages (OOPLs) such as C or Pascal.
The user will create classes, objects, inheritance hierarchy, and so on
and the database system will store and manage these objects and classes.
This second approach, thus, turns non-OOPLs into OOPLs. A translation layer
is required to map the objects created by user into objects of the database
system.
Application 1
Conceptual Requirement
Application 2
Conceptual Requirement
Conceptual Model Logical Model
Internal Model
Application 3
Conceptual One Stage of Data Independence One Stage of Data Independence
Requirement
(Logical Independence) (Physical Independence)
Application
4
Conceptual
Requirement
9.1 Schema
The overall logical database description is referred to as a schema. The
term logical means the data as it would be presented to a human. In fact, the
data may be shared on the file in a completely different form.
Schema is sometimes also referred as an overall model of data, a
conceptual model or conceptual schema.
A schema is a chart of the types of data that are used. It gives the
names of entities and attributes and specifies the relations between them. It is
a framework into which the values of the data items can be fitted.
Employee# Employee Date of Sex Designation Salary
Name Joining
Like the display at an airport giving arrival and departure information. The
schema will remain the same while the values fitted into it change from instant
to instant.
When the schema framework is fitted in with data item values, it is
referred to as an instance of the schema.
9.2 Subschema
The subschema defines a subset of schema to be seen by a application
programme or uses. It is the application programmer's view of the data he or
she uses.
It is also known as external view.
Many different subschema can be derived from one schema.
The application programmer in terminal uses does not need to know about the
entire database schema. The programmer or terminal user is concerned with
his particular applications and the records, which they require. That is to say it
gives to a users a window through which he can view only that port of the
database, which is of interest to him/her.
Schema Subschema
MAN
MAN
M A R RI E D MARRIE
E N G A G EDDI V O R C E D WOMAN D
WOMAN
NETWORK FUNDAMENTALS
Structure:
12.1 Introduction to Computer Networks
12.2 Defining Computer Networks
12.3 Why Computer Networks?
12.4 Uses of Computer Networks
12.5 Benefits and Limitations of Computer Networks
12.6 Types of Computer Networks
12.7 Some Other Computer Networks
12.8 Summary
12.9 Self-Test questions
12.10 Suggested Readings
257
fully the technical details, it is necessary to understand in full the meaning of
computer networks and what precise purpose the introduction of a computer network
into an organization serves.
Thirdly, the organizations have a tendency to limit their resources but have a desire to
share these resources so as it may result in cost reduction.
Another need may be scalability i.e. the ability to increase system performance
gradually as the workload grows just by adding new processors.
A network also enables to combine the power and capabilities of diverse equipment
and to provide a collaborative medium to combine the skills of different people
regardless of physical location. Computer networking enables people to share
information and ideas easily, so they can work more efficiently and productively.
Networks also improve commercial activities such as purchasing, selling, and
customer service. Networks are making traditional business processes more efficient,
more manageable, and less expensive. The key benefits of computer networks for
business organizations can be summarized in the following manner:
Topology
The geometric arrangement of positioning computer systems is known as a network
topology. Common topologies include a bus, star, and ring.
Architecture
Network Architecture basically means how computer networks should be made and
can be broadly classified as using either a peer-to-peer or client/server architecture.
Computers on a network are sometimes called nodes. Computers and devices that
allocate resources for a network are called servers.
Peer-to-Peer: Sometimes called P2P, these networks are the simplest and least
expensive networks to set up but provide less performance under heavy loads. In this
type of architecture, each computer (workstation or node) has equal capability and
responsibility i.e. none of the node is superior over other nodes.
P2P networks are simple in the sense that the computers are connected directly to
each other and share the same level of access on the network, hence the name.
Computer ‘X’ will connect directly to Computer ‘Y’ and will share all files with the
appropriate security or sharing rights. If many computers are connected a hub may be
used to connect all these computers and/or devices. One can opt for Peer-to-Peer
when:
have five or fewer PC’s.
want to share files and printers.
want easy installation.
want users to manage their own computers.
do not frequently share large files such as CAD or graphic files.
there is a tight budget.
Client/Server: They consist of the server which stores the files or runs applications
and the client machines, which are the computers used by workers. Here, server is
having a superiority over other nodes and will serve the client nodes. Hence, server is
more powerful and clients have to completely rely on server.
Using a client/server setup can be helpful in many ways. It can free up disk space by
providing a central location for all the files to be stored. It also ensures the most
recent copy of that file is available to all. A server can also act as a mail server which
collects and sends all the e-mail or a print server which takes all the print jobs and
sends them to the printer, thus freeing computing power on the client machine to
continue working.
The client/server network is the most widely-used type of networking because of its
efficiency. Whereas the computers in a peer-to-peer network can perform multiple
operations, including running applications, displaying documents onscreen, and
printing, computers in a client/server network are more specialized. One can opt for
client/server when:
have six or more computers.
need strong central security and reliable back up.
need the additional speed and performance.
Protocol
The rules and encoding specifications for sending data are known as protocols. The
protocols also determine whether the network uses a peer-to-peer or client/server
architecture.
The main benefits of this type of network are resource sharing and cost reduction as
several computers and users can share the same peripheral devices and programs. The
error rate on a LAN is considerably better than other types of networks due to its
small size. On the other hand, security and privacy are two major concerns for data
transmission. Only authorized users may gain access to the data and transmission of
data should be ensured in correct form at its destination on a LAN.
LANs are very common in offices but can also connect several offices together. There
is no limit as to how many computers are networked for the network to be classified
as LAN. Even a simple network of one computer connected to one printer can be
considered a LAN. A local area network may serve as few as two or three users for
example, in a home network or as many as thousands of users for example, in an
FDDI network.
Most LANs connect workstations and personal computers. Each node (individual
computer) in a LAN has its own CPU with which it executes programs, but it is also
able to access data and devices anywhere on the LAN. Usually, the server has
applications and data storage that are shared in common by multiple computer users.
This means that many users can share expensive devices, such as laser printers, as
well as data. Users can also use the LAN to communicate with each other, by sending
e-mail or engaging in chat sessions.
There are many different types of LANs Ethernets being the most common for PCs.
Most Apple Macintosh networks are based on Apple's AppleTalk network system,
which is built into Macintosh computers. LANs have become commonplace in many
organizations for providing telecommunications network capabilities that link end
users in offices, departments, and other work groups.
Protocols: The rules and encoding specifications for sending data. The protocols also
determine whether the network uses a peer-to-peer or client/server architecture.
LAN Hardware
The basic hardware devices for establishing a LAN are:
1. Data Transmission Channel: Four types of communication channels are
generally used in a LAN. These may be Coaxial Cable, Twisted Pair Cable,
Fibre Optic Cable, Infrared or Radio Waves.
2. Network Interface Circuitry (NIC): This unit in the individual personal
computers may be part of the system motherboard or it may be on a separate
plug-in card and is connected to the network. It contains the rules and logic to
access the LAN. The function of this circuitry depends on the type of topology
used in LAN.
3. Server and Workstations: The server provides all of the services and
information and handles printing requests, for example. The server generally
controls all the resources and puts them at the client's disposal. Networks may
also consist of more than one server. Each of these servers has a different and
more specialized job. A print server handles the print jobs of its workstations
and servers. A file server stores or sends files. An application server runs
applications and sends the results. A modem server is used to connect other
network simply using a telephone wire to share expensive resources by all
connected workstations in a network ring.
The workstations are the computer users interact with. If the workstation needs
something it doesn't have, it can send its request to the server.
LAN Software
Local Area Networks use special operating systems and other system software to
manage the network, its resources and its users. Network Operating Systems should
be very secure and robust to provide reliable network services. Examples of some of
the popular LAN Operating System Software are:
Windows 2000 Server
Novell NetWare
Ethernet
ArcNet
Corvus
Major Local Area Network technologies are:
(1) Ethernet
(2) Token Ring
(3) FDDI
WANs are used for many different purposes. Some are designed as a communications
backbone for a large distributed organization. Other WANs focus on particular
transaction packages. Many WANs are used to transfer and consolidate corporate
data, such as daily transaction summaries from branches.
LANs and WANs in general are similar in the sense that both are collections of
computers. However, there are huge differences between the LAN and a WAN. Due
to the small coverage of areas, LANs are capable of transmitting data at a very high
speed with a lower error rate and at low cost as compared to WANs. In case of LAN
there is complete control of the owner whereas WAN requires involvement of
external authority like telecom department.
WAN Hardware
In a large geographically dispersed area, to establish links between computers, it
requires four basic network devices: Repeaters, Bridges, Routers, and Gateways.
Router: A router is used to route data packets between two networks that may not be
similar. It reads the information in each packet to tell where it is going. If it is
destined for an immediate network it has access to, it will strip the outer packet,
readdress the packet to the proper ethernet address, and transmit it on that network. If
it is destined for another network and must be sent to another router, it will re-package
the outer packet to be received by the next router and send it to the next router.
Routing occurs at the network layer of the OSI model. They can connect networks
with different architectures such as Token Ring and Ethernet. Although they can
transform information at the data link level, routers cannot transform information
from one data format such as TCP/IP to another such as IPX/SPX. Routers do not
send broadcast packets or corrupted packets. If the routing table does not indicate the
proper address of a packet, the packet is discarded.
WAN Connections
Wide Area Networks (WAN) refers to the technologies used to connect organizations
at remote locations. The size of a network is limited due to size and distance
constraints. However networks may be connected over a high speed communication
links and are usually:
Dial up connection
Dedicated connection: It is a permanent full time connection. When a
dedicated connection is used, the cable is leased rather than a part of the cable
bandwidth and the user has exclusive use.
Switched network: Several users share the same line or the bandwidth of the
line.
Public Networks: These are the networks installed and run by telecom authorities
and can be accessed through subscription.
Private Networks: These are the networks installed and run to link the locations
privately. There is a complete control of the owner and is free to use the network.
Private networks can carry large volume of data at a higher data transmission speed.
It is also used to mean the interconnection of several local area networks by bridging
them with backbone lines. Metropolitan Area Networks are usually characterized by
very high-speed connections using fiber optical cable or other digital media (wireless
infrastructure).
Distributed Queue Dual Bus (DQDB), is the Metropolitan Area Network standard for
data communication. Using DQDB, networks can be up to 30 miles long and operate
at speeds of 34 to 155 Mbit/s. Some technologies used for this purpose are ATM,
FDDI and SMDS. These older technologies are in the process of being displaced by
Ethernet-based MANs (e.g. Metro Ethernet) in most areas. MAN links between LANs
have been built without cables using either microwave, radio, or infrared free space
optical communication links.
This concept was very popular in the early 1990s when various cities envisaged
establishing such networks. In practice these networks are very rare, and today only
the concept survives. This is mainly due to the increasingly private providers that
develop networks as opposed to cities and councils taking the development of such
networks into their own hands.
VAN can send data between computers in different cities or even different countries.
They are often used in electronic data interchange (EDI) systems because they reduce
the complexity of connecting to the disparate EDI systems of various trading partners.
In this application they collect forms in an electronic mailbox, translate and forward
them to recipients, and guarantee they will reach their destinations intact. Other
common VAN services include electronic mail, access to stock market data and other
public databases, and access to electronic banking and other transaction processing
services.
VAN is used for a number of reasons. They usually service a given industry and
provide value-added services such as data transformation. They can be considered as
a way of transmitting computerized data, offering a service similar to what the
telephone networks do for telephone calls. At one end a VAN hosts only business-to-
business (B2B) application integration services, hosting general-purpose integration
services for any process or industry. At the other end a VAN also hosts industry-
specific pre-defined integration capabilities and applications (e.g., supply chain order
visibility). Traditionally, most VANs primarily only supported general-purpose B2B
integration capabilities focused on EDI but these service providers are quickly
evolving to become more industry-specific over time, particularly in industries such
as retail and hi-tech manufacturing.
Internet
The Internet is a global network of networks that use a specific set of protocols. The
Internet exploded into the public consciousness in the mid-1990s with the World
Wide Web, a hyper-linking of documents located in computers around the world. The
documents, described in an easy-to-write language called HTML, can include text,
graphics, video clips, audio and links to other documents. Users navigate in this
worldwide collection of documents by simple mouse clicks on links or locate them by
using a search engine. The World Wide Web with its popular interfaces Netscape
Navigator and Microsoft Explorer, breaks down distances, integrates multimedia,
enables users to find information, and, equally importantly makes every user a
potential publisher. The Web merges computers and communication and transforms
every personal computer into a personal communication device.
Intranet
An intranet is a private network. It is an implementation of Internet technologies such
as TCP/IP and HTTP servers for use within an enterprise and not for connection with
the Internet. It may consist of many interlinked local area networks (LAN) and also
use leased lines in the wide area network (WAN). Typically, an intranet includes
connections through one or more gateway computers to the outside Internet. The main
purpose of an intranet is to share company information and computing resources
among employees. An intranet can also be used to facilitate working in groups and for
teleconferences.
Extranet
An extranet is an intranet with a wider range than one organization. It is a private
network that uses the Internet protocols and the public telecommunication system to
securely share part of a business's information or operations with suppliers, vendors,
partners, customers, or other businesses. An extranet can be viewed as part of a
company's intranet that is extended to users outside the company.
12.8 Summary
Business organizations currently benefit from the use of personal computers.
However, many businesses have not taken the next step to increase productivity and
reduce office equipment costs by installing a computer network.
A network consists of two or more computers, printers, faxes and other electronic
devices linked together with cables enabling all of the "pieces" to communicate
together to share data and resources. The simple idea behind computer networking is
to allow users to access more information and give them access to devices not directly
attached to their “local” system, such as printers or storage devices. Three of the main
types of computer networks are:
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
After LAN, WAN and MAN, many other types of network designs also most
commonly encounter the network technologies. Some of them are Value Added
Network (established to add value to the data resources), Internet (Network of
networks to share world wide data resources), Intranet (Network within an
organization to share its data resources by the own company’s employees) and
Extranet (Network, shared even outside the organization, is an intranet with a wider
range than one organization to share part of a business's information with customers,
or other businesses).
Structure:
13.1 Introduction to Data Hierarchy
13.2 Concept of File and its Types
13.3 File Structure
13.4 Basic Terminology to Understand File Structure
13.5 Different File Structures
13.6 Summary
13.7 Self-Test questions
13.8 Suggested Readings
Programming languages often provide types or objects which can create data
hierarchies of arbitrary complexity, thus allowing software system designers to model
language structures described by the linguist to greater or lesser degree.
The distinction between the natural form of data and the facilities provided by the
machine may be obscure, because users force their needs into the molds provided, and
programmers change machine designs. As an example, the natural data type
"character" and the machine type "byte" are often used interchangeably, because the
latter has evolved to meet the need of representing the former.
In simple words, Data Hierarchy refers to the systematic organization of data, often in
a hierarchical form. Data organization involves bit, character, fields, records, files and
database and can be shown at the following six levels:
Database: Files are integrated into a database. This is done using a Database
Management System. If there are other facets of employee data that we wish
to capture, then other files such as Employee Training History file and
Employee Work History file could be created as well. In a database, the data
from multiple files are integrated in a manner that data redundancy is
minimized and made available to all applications. The above structure can be
seen in the Hierarchical Model, which is one way to organize data in a
database.
The above is a view of data seen by a computer user. In terms of data storage, data
fields are made of bytes and these in turn are made up of bits.
The structure of a data file defines how records, or rows of data, are related to fields,
or columns of data. The most common data structures are:
Rectangular or Logical Record
Card Image or Multiple Record
Hierarchical
Relational
Card Image or Multiple Record File: In a card image file, all of the data for a
particular case are contained on more than one physical record or line of data. This
format is a remnant of the time when data were input on punch cards that were
physically limited to 80 characters per card. Therefore, if a line of data was longer
than 80 characters, it had to be entered on multiple cards. Each card, or "deck," was
numbered and stored in numerical sequence. With this format multiple records have
to be read to build a complete case.
Relational File: A relational file contains multiple units of analysis that are related to
one another based on a predefined structure or variable, but not necessarily a
hierarchy. For example, a data collection could have different record types for
households, families, persons, wages, and general income, but these record types are
not related to each other by a hierarchy of membership.
The Ki 's are keywords functioning as attributes and the value xi can be thought of as a
numerical weight. Frequently documents are simply characterized by the absence or
presence of keywords, in which case
R = {Kt1, Kt2, . . . , Kti}
where Kti is present if xti = 1 and is absent otherwise.
Records are collected into logical units called Files. They enable one to refer to a set
of records by name, the file name. The records within a file are often organized
according to relationships between the records. This logical organization has become
a file structure (or data structure).
It is difficult in describing file structures to keep the logical features separate from the
physical ones. The latter are characteristics forced upon by the recording media (e.g.
tape, disk). Some features can be defined abstractly (with little gain) but are more
easily understood when illustrated concretely. One such feature is a field. In any
implementation of a record, the attribute values are usually positional, that is the
identity of an attribute is given by the position of its attribute value within the record.
Therefore the data within a record is registered sequentially and has a definite
beginning and end. The record is said to be divided into fields and the nth field carries
the nth attribute value. Pictorially an example of a record with associated fields in
Figure 13.1 is given below.
Figure 13.1: An example of a record with associated field
The fields are not necessarily constant in length. To find the value of the attribute K4,
first find the address of the record R (which is actually the address of the start of the
record) and read the data in the 4th field.
In the same picture it has also been shown some fields labeled P i. They are addresses
of other records, and are commonly called pointers. Now it has extended the
definition of a record to a set of attribute-value pairs and pointers. Each pointer is
usually associated with a particular attribute-value pair. For example, (see Figure
13.2) pointers could be used to link all records for which the value x1 (of attribute K 1)
is a, similarly for x2 equal to b, etc.
To indicate that a record is the last record pointed to in a list of records use the null
pointer [[logical end]]. The pointer associated with attribute K in record R will be
called a K-pointer. An attribute (keyword) that is used in this way to organize a file is
called a key.
To unify the discussion of file structures some further concepts are needed. Define a
list L of records with respect to a keyword K, or more briefly a K-list as a set of
records containing K such that:
1) the K-pointers are distinct;
2) each non-null K-pointer in L gives the address of a record within L;
3) there is a unique record in L not pointed to by any record containing K; it is
called the beginning of the list; and
4) there is a unique record in L containing the null K-pointer; it is the end of the
list.
Finally, the definition of a directory of a file is needed. Let F be a file whose records
contain just m different keywords K1, K2, . . . , Km. Let ni be the number of records
containing the keyword Ki, and hi be the number of Ki-lists in F. Furthermore, denote
aij the beginning address of the jth Ki-list. Then the directory is the set of sequences
(Ki, ni, hi, ai1, ai2, . . . aihi) i = 1, 2, . . . m
Inverted list
An inverted list is a file structure in which every list contains only one record.
Remember that a list is defined with respect to a keyword K, so every K-list contains
only one record. This implies that the directory will be such that n i = hi for all i, that
is, the number of records containing Ki will equal the number of Ki-lists. So the
directory will have an address for each record containing K i. For document retrieval
this means that given a keyword one can immediately locate the addresses of all the
documents containing that keyword. For the previous example let us assume that a
non-black entry in the field corresponding to an attribute indicates the presence of a
keyword and a black entry its absence. Then the directory will point to the file in the
way shown in Figure 13.3. The definition of an inverted file does not require that the
addresses in the directory are in any order. However, to facilitate operations such as
conjunction ('and') and disjunction ('or') on any two inverted lists, the addresses are
normally kept in record number order. This means that 'and' and 'or' operations can be
performed with one pass through both lists. The penalty we pay is of course that the
inverted file becomes slower to update.
Figure 13.3: An inverted file
Index-sequential files
An index-sequential file is an inverted file in which for every keyword K i, ni = hi = 1
and a11 < a21 . . . < am1. This situation can only arise if each record has just one unique
keyword, or one unique attribute-value. In practice therefore, this set of records may
be ordered sequentially by a key. Each key value appears in the directory with the
associated address of its record. An obvious interpretation of a key of this kind would
be the record number. In this example none of the attributes would do the job except
the record number. Diagrammatically the index-sequential file would therefore appear
as shown in Figure 13.4. It has deliberately been written Ri instead of Ki to emphasize
the nature of the key.
Figure 13.4: index sequential life
No mention has been made of the possibility of overflow during an updating process.
Normally provision is made in the directory to administer an overflow area. This of
course increases the number of bookkeeping entries in each entry of the index.
So could any blank pointer field, so long as no ambiguity arises as to which pointer
belongs to which keyword. One way of ensuring this, particularly if the data values
(attribute-values) are fixed format, is to have the pointer not pointing to the beginning
of the record but pointing to the location of the next pointer in the chain.
The multi-list is designed to overcome the difficulties of updating an inverted file.
The addresses in the directory of an inverted file are normally kept in record-number
order. But, when the time comes to add a new record to the file, this sequence must be
maintained, and inserting the new address can be expensive. No such problem arises
with the multi-list, one updates the appropriate K-lists by simply chaining in the new
record. The penalty one pay for this is of course the increase in search time. This is in
fact typical of many of the file structures. Inherent in their design is a trade-off
between search time and update time.
Cellular multi-lists
A further modification of the multi-list is inspired by the fact that many storage media
are divided into pages, which can be retrieved one at a time. A K-list may cross
several page boundaries, which means that several pages may have to be accessed to
retrieve one record. A modified multi-list structure which avoids this is called a
cellular multi-list. The K-lists are limited so that they will not cross the page (cell)
boundaries.
At this point the full power of the notation introduced before comes into play. The
directory for a cellular multi-list will be the set of sequences
Where the hi have been picked to ensure that a K i-list does not cross a page boundary.
In an implementation, just as in the implementation of an index-sequential file, further
information will be stored with each address to enable the right page to be located for
each key value.
Ring structures
A ring is simply a linear list that closes upon itself. In terms of the definition of a K-
list, the beginning and end of the list are the same record. This data-structure is
particularly useful to show classification of data.
Figure 13.7: A dendrogram
The dendrogram for this structure would be that given in Figure 13.7. To represent
this in storage by means of ring structures is now a simple matter (see Figure 13.8).
Were we to group documents according to the keywords they shared, then for each
keyword we would have a group of documents, namely, those which had that
keyword in common. Ci would then be the field containing the keyword uniting that
particular group. The rings would of course overlap (Figure 19.9), as in this example:
D1 = {K1, K2}
D2 = {K2, K3}
D3 = {K1, K4}
13.6 Summary
The structure of a data file defines how records, or rows of data, are related to fields,
or columns of data. The most common data structures are:
Rectangular or Logical Record
Card Image or Multiple Record
Hierarchical
Relational
Records are collected into logical units called Files. They enable one to refer to a set
of records by name, the file name. The records within a file are often organized
according to relationships between the records. This logical organization has become
a file structure.
A sequential file is the most primitive of all file structures. It has no directory and
no linking pointers. The records are generally organized in lexicographic order on the
value of some key. An inverted list is a file structure in which every list contains only
one record. An index-sequential file is an inverted file in which for every keyword K i,
ni = hi = 1 and a11 < a21 . . . < am1. This situation can only arise if each record has just
one unique keyword, or one unique attribute-value.
A multi-list is really only a slightly modified inverted file. There is one list per
keyword, i.e. hi = 1. The records containing a particular keyword Ki are chained
together to form the Ki-list and the start of the Ki-list are given in the directory. A
further modification of the multi-list is inspired by the fact that many storage media
are divided into pages, which can be retrieved one at a time.
A ring is simply a linear list that closes upon itself. In terms of the definition of a K-
list, the beginning and end of the list are the same record. This data-structure is
particularly useful to show classification of data.
Structure:
14.1 Introduction to Network Topology
14.2 Defining Network Topology
14.3 Physical Topologies
14.4 Logical Topologies
14.5 Network Protocols
14.6 Applications of Computer Networks
14.7 Summary
14.8 Self-Test questions
14.9 Suggested Readings
294
A network topology describes the configuration of a network i.e. how the network
components are connected together. Topology also refers to the way in which the
network of computers is connected. Each topology is suited to specific tasks and has its
own advantages and disadvantages.
The physical topology of a network is the layout or actual appearance of the cabling
scheme used on a network whereas logical topology of a network describes how the data
flows through the physical topology. Similar looking networks can have quite different
logical topologies. The physical topologies of networks are the actual geometric layout of
workstations. The choice of topology is dependent upon:
type and number of equipment being used
planned applications and rate of data transfers
required response times
cost
Bus Topology
The bus topology (not to be confused with the system bus of a computer) connects a
number of workstations using a common backbone to connect all devices. A single cable,
the backbone functions as a shared communication medium, attaches or taps into with an
interface connector with the devices. The medium has a physical beginning and end. All
buses are implemented using electrical cable, usually coaxial, and the ends of the cable
must be terminated with a terminating resistor that matches the impedance of the cable.
The terminating resistor prevents data reflections from coming across as data corruption.
The bus is considered a multipoint system because all devices tap into the same backbone
cable.
An important characteristic to remember in bus topologies is that all data signals are
broadcast throughout the bus structure. A device wanting to communicate with another
device on the network sends a broadcast message onto the wire that all other devices see,
but only the intended recipient actually accepts and processes the message. In simple
words, the bus cable carries the transmitted message along the cable. As the message
arrives at each workstation, the workstation computer checks the destination address
contained in the message to see if it matches it's own. If the address does not match, the
workstation does nothing more. If the address of the workstation matches that contained
in the message, the workstation processes the message. The message is transmitted along
the cable and is visible to all computers connected to that cable.
Computers on a bus network send their data packets to all the computers, even if the data
packet is for a specific computer only. Data Packets addressed to one particular computer
are received by that computer; all other computers delete the packet upon reception. In
the following diagram, if second node sends a signal to the last node, the signal
propagates for the length of the cable and is seen by all the nodes as well. It is necessary
to have an addressing mechanism so that each node understands which messages it is to
receive and which to ignore.
In this topology network messages are sent to each terminal on the network so if one of
the terminals breaks then the others are not affected. The cabling cost of bus systems is
the least of all the different topologies. The common implementation of this topology is
Ethernet. A message transmitted by one workstation is heard by all the other
workstations.
Ring Topology
The ring topology is a physical, closed loop configuration consisting of point-to-point
links. It is a topology of computer networks where each user is connected to two other
users, so as to create a ring. Ring network systems use 4 pair cables (separate
send/receive). A failure in any cable breaks the loop and can take down the entire
network. In a ring network, every device has exactly two workstations for communication
purposes. Adjacent pairs of workstations are directly connected.
All messages travel through a ring in the same direction effectively either "clockwise" or
"counterclockwise", each node passing on the data to the next node till it reaches its
destination. However, a ring may be unidirectional or bi-directional. In case of
unidirectional ring network, data moves only in one direction and if any node breaks
down, specialized software is required for the proper functioning of the network.
Whereas data moves in both the direction in bi-directional ring networks, but only one
direction at a single time and if any node breaks down, a message can usually be sent in
the opposite direction still allowing the node to communicate with the other workstations
of the active network.
Information travels around the ring from one workstation to the next. Each packet of data
sent on the ring is prefixed by the address of the station to which it is being sent to. When
a data packet arrives, the workstation checks to see if the packet address is the same as its
own. If it is, it grabs the data in the packet. If the packet does not belong to it, it sends the
packet to the next workstation in the ring.
Faulty workstations can be isolated from the ring. When the workstation is powered on, it
connects itself into the ring. When power is off, it disconnects itself from the ring and
allows the information to bypass the workstation. The ring topology may prove optimum
when system requirements are modest and workstations are at scattered points. Rings are
found in some office buildings or school campuses.
Star Topology
Star network is one of the most common computer network topologies. In its simplest
form, star network consists of one central point (a special junction box) called a "hub" or
hub computer which acts as a router to transmit messages and through which all
components are connected. In a computer network, the central hub is the host computer,
and at the end of each connection is a terminal. The star network topology works well
when workstations are at scattered points. It is easy to add or remove workstations. This
type of topology is frequently used to connect terminals to a large time-sharing host
computer. One of the examples may be banks typically using this type of topology to
control and coordinate several of its other branch offices.
A star network uses a significant amount of cable (each terminal is wired back to the
central hub, even if two terminals are side by side several hundred meters away from the
host). All routing decisions are made by the central hub, and all other workstations can be
simple.
In a star network, a cable failure will isolate the workstation that it links to the central
computer, but only that workstation will be isolated. All the other workstations will
continue to function normally, except that they will not be able to communicate with the
isolated workstation. If any workstation goes down, none of the other workstations will
be affected. But if the central computer goes down, the entire network will suffer
degraded performance or complete failure.
Examples of Star topology
The following types of networks are examples of star topologies:
ARCnet
10Base-T, 100Base-TX
StarLAN
A mesh network is a networking technique which allows inexpensive peer network nodes
to supply back haul services to other nodes in the same network. A mesh network
effectively extends a network by sharing access to higher cost network infrastructure. The
cable requirements are high, but there are redundant paths built in. Any failure of one
computer allows all others to continue, as they have alternative paths to other computers.
The mesh network topology employs either of two schemes, called full mesh topology or
partial mesh topology. In the full mesh topology, each node (workstation or other device)
is connected directly to each of the others. In the partial mesh topology, some nodes are
connected to all the others, but some of the nodes are connected only to those other nodes
with which they exchange the most data.
The illustration shows a full mesh network with five nodes. Each node is shown as a
sphere, and connections are shown as straight lines. The connections can be wired or
wireless.
Hybrid Topology
Different network configurations have their own merits and demerits. In real sense, one
pure network topology is rarely used in organizations. Instead, an organization may use a
combination of two or more different topologies like a star-bus hybrid, star-ring network
with connections between various computers on the network. This scheme of combining
multiple topologies (star, bus and/or ring) into one large topology is known as hybrid
topology. The hybrid network is common in large wide-area networks. Because each
topology has its own strengths and weaknesses, several different types can be combined
for maximum effectiveness.
Ethernet
Token Ring
ARCnet
FDDI
Ethernet
An older, common wiring system for Ethernet (10Base2) and (10Base5) uses coaxial
cable in a linear bus topology. In the most common type of Ethernet, each node connects
to the coax through a T-connector (BNC) that taps into the signals on the coaxial cable.
The nodes both transmit and receive through the same connector. Therefore, 10Base2
Ethernet is a logical as well as a physical bus.
A newer variation of Ethernet, 10Base-T and 100Base-TX, are cabled using wiring hubs
(concentrators). Each station is connected to the hub via an individual UTP twisted pair
cable. Within the hub, however, the individual signals are combined into a bus. Therefore
10Base-T and 100Base-TX are physical stars, but logical buses.
Token Ring
By examining the wiring of a Token Ring, it can be seen that it meets all the
specifications of a star. Token Ring uses central wiring hubs, and each node is wired to
the hub with an individual run of cable.
Starting at the hub, the signal travels through a pair of wires to the receive circuit on the
node's network interface. The receive circuit passes the signal to the transmit circuit,
which repeats the signal on a separate pair of wires and sends the signal back to the hub.
If follow the signal around the entire network, one can see that it completes a circuitous
path, proving that Token Ring has a ring logical topology.
Token Ring is wired in a physical star to obtain the advantages of a central wiring hub.
All stations can be connected and disconnected at a central point, and the wiring hub can
be equipped with hub management and diagnostic systems. Therefore Token Ring
sometimes is referred to as a star-wired-ring.
ARCnet
ARCnet is wired in a star using coaxial cable. That ARCnet is a logical bus also can be
determined by examining the network cards. They both receive and transmit through the
same coax connector.
ARCnet is wired as a physical star, and has some of the advantages of a star network.
However, ARCnet functions as a logical bus. Because of its signaling characteristics,
ARCnet is also called a token-passing-bus.
FDDI
Fiber Distributed Data Interface (FDDI) can be configured as both a physical and a
logical ring. FDDI is commonly used to connect widely dispersed areas with a high-speed
fiber network. When doing so, a physical ring is the most cost-effective cabling plan.
FDDI uses the same signaling mechanism as Token Ring; each node repeats the
incoming signal and transmits it to the next node in the ring.
Token Ring
This protocol is widely used in ring networks for controlling workstation access to the
ring. A short message called a token is circulated around the ring, being passed from one
node to another node which is originated from a controller or master station which inserts
it onto the ring.
Polling
This protocol uses a central node to monitor other nodes in the network. It is used
predominantly in star networks. The master station sends a message to each slave station
in turn. If the slave station has information to send, it passes it to the master station. The
master station then sends the information to the desired slave station, or keeps it if the
information is for itself. Slave stations are very simple and have limited functionality. It
is appropriate for industrial and process control situations
Central Data Back-Up and Security: Computer Networks allow an easy central data
back-up to protect important files and security for important data. In this way, one can
secure access to authorized users only and insure that important files cannot be
accidentally deleted, moved or changed. By implementing fault tolerance on network,
one can minimize network down time in the event of a hardware failure.
File sharing: File and print sharing is the biggest advantage of having a network. Instead
of "walking" files back-and-forth between computers, employees can share files without
leaving their desks. This will increase communication and make everyone in office more
productive.
Printer and peripheral sharing: Networks allow sharing expensive peripherals such as
printers, plotters and scanners. Instead of purchasing a printer for each computer, one
printer can be shared among several users. Other devices can be shared as well including
CD-ROM’s and fax modems.
Fax sharing: A network allows everyone in office to share one or more fax modems. The
ability to send documents via a fax machine instead of by mail or courier reduces
operating costs by saving money on stamps, paper etc. Fax modems also save time.
Wide Area Networks: A WAN can be setup between office and its other branch or
main offices. This enables remote offices to synchronize data, transfer and back-up
important files, exchange E-mail, etc. Many different WAN technologies are available
dependent on the companies bandwidth needs.
E-Mail and Internet Access: The Internet has become the largest information database
in the world. E-mail is also a facility that provides a quick and easy way for persons to
communicate with each other. This information and knowledge gained through internet
access can keep the companies informed and competitive in today’s marketplace.
Creating an Intranet or Internet Website: The difference between an Intranet and an
Internet Website is that an intranet is located on a privately owned network and is usually
only accessed by local network users whereas an Internet Website is a public site that can
be accessed by anyone with access to the Internet.
Intranets provide company with an "on-line bulletin board". Employees can easily post
information that can be accessed with a Browser. An Internet Website allows providing
products and services to the customers. A simple Website can be "on-line brochure"
allowing reaching a large number of customers at a very low advertising rate. The
company becomes "virtually available" to customers 24 hours a day.
Summary
Topology, the geometric arrangement of positioning the computers, remains an important
part of network design theory. One can probably build a small network without
understanding the difference between a bus design, a star design or a ring design, but
understanding the concepts behind these gives a deeper understanding of important
aspects like fast data transmission, cost effectiveness, reliability, optimum solution for
transferring data etc.
The physical topology may be classified in to a number of types. The bus topology
connects a number of workstations using a common backbone to connect all devices. The
ring topology is a physical, closed loop configuration consisting of point-to-point links. It
is a topology of computer networks where each user is onnected to two other users, so as
to create a ring. All messages travel through a ring in the same direction effectively either
"clockwise" or "counterclockwise", each node passing on the data to the next node till it
reaches its destination. Star network consists of one central point called a "hub" which
acts as a router to transmit messages and through which all components are connected. In
Tree network topology all the nodes are connected in a hierarchical fashion where each
branch with multiple nodes, demands a flow of information. A mesh network is a
networking technique which allows inexpensive peer network nodes to supply back haul
services to other nodes in the same network. It allows for continuous connections and
reconfiguration around blocked paths by "hopping" from node to node until a connection
can be established. The scheme of combining multiple topologies into one large topology
is known as hybrid topology. The hybrid network is common in large wide-area
networks.
Logical topologies have the same names as physical topologies, but the logical topologies
describe the network from the viewpoint of the data traveling on the network. The
following four common types of networks can have different logical topologies:
Ethernet
Token Ring
ARCnet
FDDI
Protocols define the rules for sending data from one point to another and are used in
different network topologies. Some of them are the following:
Structure:
15.1 Introduction to Web Browser
15.2 Defining Internet Explorer
15.3 Features of Internet Explorer
15.4 Internet Explorer Environment
15.5 Working with Internet Explorer
15.6 Downloading, Emailing, and Printing Web Documents for Later Use
15.7 Customizing Internet Explorer Options
15.8 Summary
15.9 Self-Test questions
15.10 Suggested Readings
Modern Web browsers are capable of browsing WWW, Gopher sites, FTP sites and also
provide facilities for e-mail, etc. Initially NCSA's web browser Mosaic hit the market,
which actually made the browsing popular. Now Web browsers from Netscape and from
Microsoft are the user's choice. User can get hold of any such browser and start browsing
the Net. A commercial version of the original browser, Mosaic, is in use. Many of the
user interface features in Mosaic, however, went into the first widely-used browser,
Netscape Navigator. Microsoft followed with its Microsoft Internet Explorer.
Today, these two browsers are the only two browsers that the vast majority of Internet
users are aware of. Although the online services, such as America Online, originally had
their own browsers, virtually all now offer the Netscape or Microsoft browser. Lynx is a
text-only browser for UNIX shell and VMS users. Another recently offered and well-
regarded browser is Opera.
In simple words, a Web browser is a program that navigates through the World Wide
Web and displays pages. The Web browser requests a page from a server based on its
internet address. It retrieves the document from the server and displays the contents. A
web-browser can be graphical or text-oriented and can make the Internet more easy to
use. A text-oriented browser shows the user only the textual matter. A graphical browser
allows the user to see more of what WWW has to offer such as graphics, photographs,
and multimedia. Some of the examples are:
Microsoft’s Internet Explorer
Netscape Communication’s Netscape Navigator
Opera
Amaya
HotJava
Lynx (text oriented)
NCSA Mosaic
Netcom’s Web Cruiser
Intercon’s netshark
Web browsers are very versatile and allow performing the following activities:
Chat with other users on-line
Play games with others on-line
Access on-line multimedia including radio and video broadcasts
Visit web-sites
Contributing articles
On-line shopping
Send and receive E-mail
Read and send articles in newsgroup
Using Reminder Service of E-mail
Searching person’s details
Sending gifts and flowers
Download files at machine
Search for information on the Internet
Subscription to electronic newsletters, journals, etc.
Participating in contests
Posting of resumes
Creating own web-site, and so on.
Microsoft Internet Explorer is a graphical Web browser, which enables a user to fully
experience the hypertext, photographs, sound, video etc. that are available on the world
wide Web. Internet Explorer utilizes “point-and-click” technology to select hyperlinks
and uses drop-down menu and toolbar buttons to navigate and access resources on the
Internet.
The major differences between Internet Explorer and Navigator are: Internet Explorer
supports ActiveX and VBScript, while Navigator does not. Internet Explorer runs only
under Windows and on Macintoshes whereas Navigator runs on these platforms as well
as UNIX. Otherwise, the two browsers are very similar. Both support Java and
JavaScript. Internet Explorer also supports ActiveX.
Handles requests for HTML files, interprets links, and deals with embedded
images, audio, and video elements.
Keeps the history of websites visited.
Save a collection of documents or pages for later retrieval.
Provides convenient browsing through a row of buttons at the top of browser
window.
Supports web standards currently in use such as HTML, HTTP, Javascript, and
Unicode.
2. Main Menu Bar: Directly under the "Title Bar" is the "Main Menu Bar". This
bar has many different sub-menus which control all options, functions, and
commands for the entire Internet Explorer program. Some of the browsing
controls can also be found in these sub-menus.
User can display his/her Favorites list, History list, channels, or Search by
clicking the toolbar. In addition, user can gain access to these items by clicking
the View menu, and then pointing to Explorer bar.
4. Address Bar: Under the toolbar is the "Address Bar". This will tell the exact
HTTP/URL location of the page user is currently viewing. User can also type a
Web address directly into this bar and then press enter to go to that site.
An Address bar is a space to type and display the address for a Web page. User
does not even need to type the entire Web site address to go to that page. Just start
typing, and the AutoComplete feature suggests a match based on Web sites
visited previously.
5. Link Bar: Below the "Address Bar" is the "Link Bar". These buttons will take
user to pages at Microsoft's Main home site where they have applications and
information specifically designed for their easy use.
The Link bar is a row of icons linked to Web pages. It is the most convenient,
easiest-to-access place to put links to Web sites that user visits regularly.
6. Main Browser Window: Underneath the "Link Bar" is the "Main Browser
Window". This window will display all of the information that is located at the
Web site user is currently located at. Any text, images, movies, animation, links,
or any other application files will be shown in this window. The scroll bars
located on the right side and on the bottom of this window allow user to continue
viewing the page user is located at even when the page is too large to fit in the
screen.
This is the window where Web page will be displayed. The only way to hide this
window is to minimize the entire Internet Explorer window, since the main point
of running a browser is to view pages.
7. Status Bar: The very bottom of the page is the "Status Bar", placed at the bottom
of the Internet Explorer window. It displays a variety of useful information. This
bar tells what the progress of the browser is while it downloads files to the page,
where links go to when user move over them, whether or not a document is
secure, and any other information that the program feels is necessary for user to
know.
For example, when the cursor passes over a link in the viewing window, the URL
of the link appears in the status bar. The progress of downloading a Web page is
also displayed on this bar.
1. Back Button: Pressing this button immediately takes user back one document. If
user has browsed into a multi-page document, pressing it repeatedly will continue
to back user up one page at a time. Once user reaches starting location, it will be
unavailable.
2. Forward Button: This button will take user forward to the next document if user
has previously browsed multiple documents and had then backed-up to the page
user is currently viewing.
3. Stop Button: The stop button stops ANY current operations by Internet Explorer.
It will stop any type of file from loading. It can also be used to stop animations
from continuing once a page is loaded.
4. Refresh Button: This button will reload the current document that user is
viewing. If user is loading a document and the transfer was interrupted, user can
reload the full document again by clicking here.
5. Home Button: This button will return user to the page selected as the default
start-up page for Internet Explorer. It will not take user back to the beginning of
web browsing, it will just return user to home location from where user is.
6. Search Button: This button will take user to the page selected as the default Web
search page for Internet Explorer.
7. Favorites Button: This button will open up the Favorites menu. User can choose
a favorite that he/she wishes to go to from the list, add a favorite to the list, or
organize favorites from this menu.
8. Print Button: The print button will bring up a Print dialog box. In the box user
can decide to print the contents of the viewing page, how many pages to print, and
also how many copies to print.
9. Font Button: Pressing this button causes Internet Explorer to cycle through the
available font sizes. This button is useful if the text is too small to read, or too
large to fit comfortably in the window.
10. Mail Button: This button will open into a drop down menu from which, user can
select to read or send E-Mail. User can also open up newsgroups from this menu.
11. Edit Button: This button will ONLY be on a user toolbar if he/she has a
Windows system Web editor (such as Microsoft Frontpage or Microsoft Word)
installed on his/her computer. If user presses this button, it will launch that editor
and open the document user is currently viewing in it.
words or images which change the shape of the mouse pointer from an arrow to a
hand and display a URL on the bottom of the screen when the mouse pointer is
placed over it
the blue words on the display screen
the purple words on the display screen (the purple color indicates that the resource
has been recently accessed on the terminal)
Nowadays, Web page creators are coloring their links in all sorts of ways. The best way
to figure out which text represents a link is to position mouse over the words and see if
the pointer shape changes from an arrow to a hand. The hand represents a link. If user
wants to use pre-installed links, Internet Explorer offers a collection of Web sites in its
Favorites collection. Click on Favorites on either the text bar or the tool bar at the top of
the screen to access these resources.
File/New/Window: User can open up a second copy of Internet Explorer by using this
feature. This allows user to visit more than one Web page at a time.
File/Edit with...: User can edit the current Web page using the editor of his/her choice.
Select the editor by going back to the Menu Bar and choosing Tools/Internet
Options/Programs. User choices will be determined by software installed on computer.
Edit/Find (on This Page): Internet Explorer allows user to do a text search of the
document on the screen.
Tools/Show Related Links: Internet Explorer will display pages that are related in
content to the current page. The Tools menu offers user many ways to customize Internet
Explorer.
E-Mailing
Click on File/Send option.
User may send the current page as an email message, or may insert the link to the current
page within an email message. Once User makes the selection, email software will open.
User can change the default software by going to the Menu Bar and choosing
Tools/Internet Options/Programs. User choices will be determined by software installed
on the computer.
Printing
To print the entire document, click on the Print icon on the Tool Bar
Click on OK
To print selected pages
Click on File/Print Preview.
Click through the pages using the navigation arrows and make a note of which pages
User want to print
Click on Print.
Click on OK.
15.7 Customizing Internet Explorer Options
Internet Explorer offers a number of customization options. Some of the useful features
available under Tools/Internet Options on the Menu Bar can be divided into six tabs.
Each one is explained below.
1. General
Home Page: Specify the URL of the page user want to appear whenever Internet
Explorer is opened, or whenever user clicks on the Home icon.
Temporary Internet Files: This option allows user to view the files in the browser's
cache. The cache holds viewed Web pages for subsequent quick viewing. Retrieving a
file from the cache is much faster than repeated trips to the remote Web server where the
file originated.
History: This option customizes access to pages user has visited with the History
function. Here User can set the number of days to keep pages in history.
Colors: Choose colors for links, visited links, and link hovers (the color appearing when
mouse is over a link). User can also set a default text and background color.
Fonts: Select the language script, the font displayed in Web pages, and the font displayed
as plain text.
Languages: Select the language that will display Web pages accessed with Internet
Explorer.
Accessibility: Choose to ignore colors, font sizes and font styles on Web pages. User can
also set a style sheet as the display template for all Web pages viewed with Internet
Explorer.
2. Security
Here User can set levels of security for individual Web pages.
3. Content
Content Advisor: User can enable ratings of objectionable content to control the pages
that may be viewed with this browser.
Certificates: This feature allows user to manage the identification certificates User may
have.
AutoComplete: It will store entered Web address, information entered into forms, and
usernames and passwords needed to access sites users have visited. When User is using
browser, previous entries will come up as choices so that user don't have to retype the
information. This can make work go much faster. User can customize these options, and
delete settings.
My Profile: It offers a template for entering personal information. If a Web site requests
this information, user can give permission for it to be used.
4. Connections
Here User can store the information about Internet Service Provider, configure LAN
settings, or send browser requests through a proxy server.
5. Programs
Here user can set the programs user want the browser to use for HTML editing, email,
Usenet news, collaboration ("Internet Call"), calendar and contact list.
6. Advanced
This screen offers a number of options in the categories of accessibility, browsing, HTTP
settings, Microsoft VM (Virtual Machine), multimedia access, printing, searching and
security. User can set these options if is comfortable with them.
15.8 Summary
A Web browser is client software that uses the Hypertext Transfer Protocol (HTTP) to
make requests of Web servers throughout the Internet on behalf of the browser user.
These Client software (user machine is a client to ISP's server) have various graphics
capabilities to access the information from the Internet. Modern Web browsers are
capable of browsing WWW, Gopher sites, FTP sites and also provide facilities for e-mail,
etc. Web browsers from Netscape and from Microsoft are the user's choice. User can get
hold of any such browser and start browsing the Net. Both are state-of-the-art browsers and
the competition between them is fierce.
The major differences between Internet Explorer and Navigator are: Internet Explorer
supports ActiveX and VBScript, while Navigator does not. Internet Explorer runs only
under Windows and on Macintoshes whereas Navigator runs on these platforms as well
as UNIX. Otherwise, the two browsers are very similar. Both support Java and
JavaScript. Internet Explorer also supports ActiveX.
Internet Explorer has some built-in features which help user to make it easier to browse
the web. When beginning browsing the web firstly, a user must know the Web address of
a site to visit. Go up to the "Address Bar" near the top of the page, and click on it. Now
user can type in the Web address of the site, and then may press enter. Internet Explorer
will go to this site directly from whatever document user was currently viewing. The
Internet Explorer helps in information downloading, printing, emailing etc. There are also
a number of options available with internet explorer for accessing the information in a
faster and efficient manner from the web.
15.9 Self-Test questions
1. What is a web browser?
2. How can we surf the net through browser?
3. What are the main features of internet explorer?
4. Describe the internet explorer environment.
5. How does the Internet explorer help when user type a wrong web page address?
6. Explain the basic browsing options of Internet Explorer.
7. How can we download information from the web through internet explorer?