Computer Fundamentals
Computer Fundamentals
Books
1. Pradeep K., Sinha, “Computer Fundamentals: Concepts, Systems & Applications”, BPB
2. Rajaraman V, “Fundamentals of Computers”, PHI
3. RS Salaria, “Computer Fundamentals”, Kanna Publication, 1st Ed., 2017
4. E Balagurusamy, “Fundamentals of Computers”, Mc Graw Hill, 2012
5. Glenn Brookshear, “Computer Science: An Overview”, Pearson, 2012
Unit -I
1.1Introduction of Computer
1.2Characteristics of the Computer
1.3Use of Computer
1.4Block diagram of a Computer/Components of Computer
1.5Generations of Computer
1.6Input Output Devices (Peripheral Devices)
1.6.1 Input Devices
1.6.2 Output Devices
1.7 Classification of Computer
Control Unit
Indicates flow of
instruction and
data
Questions:
1. What is computer?
2. What is the need of the computer?
3. Explain the characteristics of computer.
4. Draw and discuss the block diagram of computer.
5. Discuss the input and output devices in detail.
UNIT-II
Hierarchy of Storage
4. Record
Fields are generally grouped together to form a record. A record is then a
collection of related fields that are treated as a single unit. An employee record would
be a collection of fields of one employee. These fields would include the employee
code, name, phone number etc.
5. File
Records are then grouped to form a file. A file is a collection of number of
related records that are treated as a unit. For example- collection of all employee
records for one company would be an employee file.
6. Database
A database is a collection of integrated and related files.
Number System
Non-Positional Positional
(Older)
Roman Number System Decimal
Binary
Octal
Hexadecimal
(I) Non-Positional:
In early days, human beings counted on fingers. When ten fingers were not
adequate, stones, pebbles, or sticks were used to indicate values. In this system, we
have symbols such as I for 1, II for 2, III for 3, IIII for 4, IIIII for 5 etc.
(II) Positional:
Binary – 2, digits – 0 and 1, Base 2
Decimal – Base 10, Digits – 0-9
Octal – Base 8, Digits – 0-7
Hexadecimal – Base 16, Digits – 0-9, A-F means (0-15)
(a) Decimal Number System
The number system, which we use in our day-to-day life is called the decimal
number system. The base is 10, digits 0-9. The decimal number is 2586.
6 in the unit position
8 in tens position
5 in hundreds position
2 in thousands position
2586
= (2×1000) + (5×100) + (8×10) + (6×1) = 2586
(b) Binary Number System
The binary number system is exactly like the decimal number system, except
that the base is 2, instead of 10. Digits 0 and 1.
Binary number is 10101 or (10101)2 decimal number of binary number is
(10101)2
(1×24) + (0×23) + (1×22) + (0×21) + (1×20) = 16 + 0 + 4 + 0 + 1 =21
(10101)2 = (21)10
(c) Octal Number System
Base is 8 digits – 0-7. The largest single digit is 7 (one less than base).
Octal number is (2057)8
Decimal number of octal number (2057)8 is
(2×83) + (0×82) + (5×81) + (7×80)
= 1024+0+40+7
= 1071
(2057)8 = (1071)10
3 bits (23 = 8) are sufficient to represent any octal number in binary.
(d) Hexadecimal Number System
The Hexadecimal number system is one with a base of 16, having 16 single
character digits.
Base 16
Digits (0-15)
The first 10 digits are the digits of the decimal number system 0,1,2,3,4,5,6,7,8,9.
The remaining six digits are denoted by symbols A, B, C, D, E and F representing the
decimal values 10, 11, 12, 13, 14 and 15 respectively. Hence the largest single digit is
F or15 (one less than base).
Hexadecimal number is 1AF or (1AF)16
Decimal number of Hexadecimal number (1AF)16 is (1×162) + (A×161) + (F×160)
= (1×256) + (10×16) + (15×1)
= 256 + 160 + 15 = 431
(1AF)16 = (431)16
4 bits (24 = 16) are used to represent hexadecimal number.
Types of Conversion
1. Binary to Decimal
2. Octal to Decimal
3. Hexadecimal to Decimal
4. Decimal to Binary
5. Decimal to Octal
6. Decimal to Hexadecimal
7. Binary to Octal
8. Binary to Hexadecimal
9. Octal to Binary
10. Hexadecimal to Binary
11. Octal to Hexadecimal
12. Hexadecimal to Octal
(1) Binary to Decimal
Q.1 (11001)2= ?10
4 3 2 1 0
1 1 0 0 1
= 1×24+1×23+0×22+0×21+1×20
= 16+8+0+0+1
= (25)10
(11001)2 = 2510
Q.2 (110101)2= ?10
5 4 3 2 1 0
1 1 0 1 0 1
= 1×25+1×24+0×23+1×22+0×21+1×20
= 32+16+0+4+0+1
= (53)10
(110101)2 = (53)10
Q.3 (11101)2 = (?)10
4 3 2 1 0
1 1 1 0 1
= 1×24+1×23+1×22+0×21+1×20
= 16+8+4+0+1
= (29)10
(11101)2 = (29)10
=4096+512+48+10×1
=4666
(123A)16 = (4666)10 Ans.
Q.3 (14AC)16 = (?)10
3 2 1 0
1 4 A C
=1×16 +4×16 +A×16 +C×160
3 2 1
=4096+1024+160+12
Where A = 10
C = 12
= 5292
(14AC)16 = (5292)10 Ans.
2 25
2 12 1
2 6 0
2 3 0
2 1 1
0) 1
= (11001)2
(25)10 = (11001)2
Q.2 (42)10 = (?)2
2 42
2 21 0
2 10 1
2 5 0
2 2 1
2 1 0
0) 1
= (101010)
(42)10 = (101010)2
Q.3 (25)10 = (?)2
2 25
2 12 1
2 6 0
2 3 0
2 1 1
0) 1
= (11001)
(25)10 = (11001)2
Q.4 (33)10 = (?)2
2 33
2 16 1
2 8 0
2 4 0
2 2 1
2 1 0
0) 1
(100001)
(33)10 = (100001)2 Ans.
Q.5 (309)10 = (?)2
3 309
2 154 1
2 77 0
2 38 1
2 19 0
2 9 1
2 4 1
2 2 0
2 1 0
0 1
= (100110101)
(309)10 = (100110101)2
Q.6 (538)10 = (?)2
2 538
2 269 0
2 134 1
2 67 0
2 33 1
2 16 1
2 8 0
2 4 0
2 2 0
2 1 0
0) 1
= (1000011010)
(538)10 = (1000011010)2
(101110)2= (56)8
Second Method: (101110)2= ?8
It is easy as compared to first method.
23 = 8
It will take 3 bits 421
Make pairs of 3 digits of binary number.
101110 4 2 1
(11101001101)2=(3515)8 4 2 1
0 1 1 [3]
1 0 1 [5]
0 1 1 [1]
1 0 1 [5]
13 = D 8 4 2 1
(11010011)2=(D3)16 1 1 0 1 [13]
0 0 1 1 [3]
Q.2 (10110101100)2= ?16
010110101100 [Add 0 in front]
10 = A 8 4 2 1
12 = C 0 1 0 1 [5]
1 0 1 0 [10]
1 1 0 0 [12]
(10110101100)2=(5AC)16
Q.3 (110110110111)2= ?16
110110110111
13 = D 8 4 2 1
11 = B 1 1 0 1 [13]
1 0 1 1 [11]
0 1 1 1 [7]
(110110110111)2=(DB7)16
Q.4 (101111011101)2= ?16
101111011101
11 = B 8 4 2 1
13 = D 1 0 1 1 [11]
13 = D 1 1 0 1 [13]
1 1 0 1 [13]
(101111011101)2=(BDD)16
Q.5 (110111011101)2= ?16
110111011101
8 4 2 1
1 1 0 1 [13]
1 1 0 1 [13]
1 1 0 1 [13]
13 = D
(110111011101)2=(DDD)16
Q.6 (101010101010)2= ?16
1010 10101010
10 = A 8 4 2 1
1 0 1 0 [10]
1 0 1 0 [10]
1 0 1 0 [10]
(101010101010)2=(AAA)16
(9) Octal to Binary
Q.1 (76543)8= ?2
One Method: Octal – Decimal
Decimal – Binary
Step I: First convert octal number into decimal number.
(76543)8= ?10
=7×84+6×83+5×82+4×81+3×80
=7×4096+6×512+5×64+4×8+3×1
=28672+3072+320+32+3
=(32099)10
Step II: (32099)10 into (?)2
2 32099
2 16049 1
2 8024 1
2 4012 0
2 2006 0
2 1003 0
2 501 1
2 250 1
2 125 0
2 62 1
2 31 0
2 15 1
2 7 1
2 3 1
2 1 1
0) 1
(76543)8= (111110101100011)2
Second Method: It is easy as compared to first method 23 = 8. It will take 3 bits.
4 2 1
7 1 1 1
6 1 1 0
5 1 0 1
4 1 0 0
3 0 1 1
(76543)8= (111110101100011)2
Q.2 (31256)8 = (?)2
4 2 1
3 0 1 1
1 0 0 1
2 0 1 0
5 1 0 1
6 1 1 0
(31256)8 = (11001010101110)2
Q.3 (562)8= ?2
4 2 1
5 1 0 1
6 1 1 0
2 0 1 0
(562)8= (101110010)2
Q.4 (6751)8= ?2
4 2 1
6 1 1 0
7 1 1 1
8 1 0 1
1 0 0 1
(6751)8= (110111101001)2
=4+2+0+0.5+0+0.125
=6+0.5+0.125
(110.101)2 =(6.625)10
Q.2 Find the decimal equivalent of the hexadecimal number (2B.C4)16
Sol. 1 0. -1 -2
(2 B. C 4)
=2×161+B×160+C×16-1+4×16-2
C 4
= 32 B
16 256
=32+11+0.75+0.015625
(2B.C4)16 = (43.765 652)10
Q.3 Find the decimal equivalent of the octal number (127.54)8
Sol. 2 1 0 –1 -2
(1 2 7. 5 4)
2 1 0 -1 -2
=1×8 +2×8 +7×8 +5×8 +4×8
5 4
= 64 16 7
8 64
=87+0.625+0.0625
(127.54)8 = (87.6875)10
Q.4 (10011.1101)2 = (?)10
Sol. 4 5 2 1 0 – 1 -2 -3 -4
(1 0 0 1 1. 1 1 0 1)
=1×2 +0×2 +0×2 +1×2 +1×2 +1×2 +1×2 +0×2 +1×2-4
4 3 2 1 0 -1 -2 -3
=16+0+0+2+1+1/2+1/4+0+1/16
=19+0.5+0.25+0.0625
(10011.1101)2 = (19.8125)10
Q.5 (1101.011)2 = (?)10
Sol. 3 2 1 0 -1 -2 -3
1 1 0 1. 0 1 1
=1×2 +1×2 +0×2 +1×2 +0×2 +1×2 +1×2-3
3 2 1 0 -1 -2
= 1 1
= 8 4 0 1 0
4 8
=13+0.25+0.125
(1101.011)2 = (13.375)10
Q.6 (1200.011)8 = (?)10
Sol. 3 2 1 0 -1 -2 -3
( 1 2 0 0. 0 1 1)
=1×83+2×82+0×81+0×80+1×8-1+1×8-2+1×8-3
=512+128+0+0+0+0.0156+0.002
=640+0.0176
(1200.011)8 =(640.0176)10
Q.7 (1234.123)8 = (?)10
Sol. 3 2 1 0. 1 -2 -3
1 2 3 4. 1 2 3
=1×83+2×82+3×81+4×80+1×8-1+2×8-2+3×8-3
=512+128+24+4+0.125+0.0313+0.0079
=668+0.1622
(1234.123)8 = (668.1622)10
Q.8 (1A1.12)16 = (?)10
Sol. =1×162+A×161+1×160+1×16-1+2×16-2
=256+160+1+0.0625+0.0078
=417+0.0703
(1A1.12)16 = (417.0703)10
Q.9 (ABC.AB)16 = (?)10
Sol. =A×162+B×161+C×160+A×16-1+B×16-2
=A×256+B×16+C×1+A×1/16+B×1/256
=10×256+11×16+12×1+10×1/16+11×1/256
=2560+176+12+0.625+0.043
=2748+0.668
(ABC.AB)16 = (2748.668)10
Q.10 (251.45)10 = (?)2
Sol. Integer part = 251
Fractional part = 0.45
Integer part is divided by 2, means remainder method is used.
2 251
2 125 1
2 62 1
2 31 0
2 15 1
2 7 1
2 3 1
2 1 1
0) 1
(251)10 = (11111011)2
Fraction part = 0.45
0.45×2=0.9 0
0.9×2 = 1.8 1
0.8×2 = 1.6 1
0.6×2 = 1.2 1
0.2×2 = 0.4 0
0.4×2 = 0.8 0
0.8×2 = 1.6 1
(0.45)10 = (.0111001. ---)2
(1251.45)10 = (11111011.0111001---)2
Q.11 (162.37)10 = (?)2
Sol. Integer part = 162
Fractional part = 0.37
2 162
2 81 0
2 40 1
2 20 0
2 10 0
2 5 0
2 2 1
2 1 0
0) 1
= (10100010)2
Fraction part = 0.37
0.37×2 = 0.74 0
0.74×2 = 1.48 1
0.48×2 = 0.96 0
0.96×2 = 1.92 1
0.92×2 = 1.84 1
0.84×2 = 1.68 1
(0.37)10 = (.010111 ---)2
(162.37)10 = (10100010.010111---)2
Q.12 Convert (1832.62513)10 into Octal
Sol. Integer part = 1832
Fractional part = 0.62513
8 1832
8 229 0
8 28 5
8 3 4
0) 3
(1832)10 = (3450)8
(0.62513)
0.62513×8 = 5.00104 5
.00104×8 = 0.00832 0
0.00832×8 = 0.6656 0
(.62513)10 = (.500…)8
(1832.62513)10 = (3450.50)8
Q.13 Convert (5834.523)10 to Octal
Sol. Integer part = 5834
Fractional part = .523
8 5834
8 729 2
8 91 1
8 11 3
8 01 3
0) 1
(5834)10 = (13312)8
(0.523)10 into Octal
0.523×8 = 4.184 4
0.184×8 = 1.472 1
0.472×8 = 3.776 3
0.776×8 = 6.208 6
0.208×8 = 1.664 1
0.664×8 = 5.312 5
(.523)10 = (.413615)8
(5834.523)10 = (13312.413615)8
Q.14 Convert (56734.75)10 into hexadecimal.
Sol. Integer part = 56734
Fractional part = .75
16 56734
16 3545 E (14=E)
16 221 9
16 13 D (13=D)
0) 13 (13=D)
(56734)10 = (DD9E)16
Fraction part = 0.75
0.75×16 =12.0 (12 = C)
(56734.75)10 = (DD9E.C)16
Q.15 Convert (868386.5275)10 into hexadecimal.
Sol. Integer part = 868386
Fractional part = .5275
16 868386
16 54274 2
16 3392 2
16 212 0
16 13 4
0) 13 (13=D)
(868386)10 = (D4022)16
Fraction part = (.5275)10
0.5275×16 = 8.44 8
0.44×16 = 7.04 7
0.04×16 = 0.64 0
0.64×16 = 10.24 A (10 = A)
0.24×16 = 3.84 3
0.84×16 = 13.44 D (13 = D)
(0.5275)10 = (0.870A3D)16
(868386.5275)10 = (D4022.870A3D)16
Q.3 Add the binary numbers 100111 and 11011 in both decimal and binary forms.
Sol.
Binary Decimal
100111 39
+11011 +27
1000010 66
(III) MULTIPLICATION
Rules for Binary multiplication are similar to decimal multiplication i.e.
0×0 = 0
0×1 = 0
1×0 = 0
1×1 = 1
Q.1 Multiply the binary numbers 1010 and 1001.
Sol.
1010
× 1001
1010
0000×
0000××
1010×××
1011010
=(1011010)2
Q.2 Multiply the binary numbers 1111 and 1110.
Sol.
1111
× 111
1111
1111×
1111××
1101001
=(1101001)2
Q.3 Perform the binary multiplication on the following by using direct addition and
partial products method.
(a) 1101 by 0011
1101
× 0011
1101
1101×
0000××
0000×××
0100111
=(0100111)2
(b) 01011 by 00100
01011
× 100
0000
00000×
01011××
0101100
=(0101100)2
Exercise
1. Addition:
(10011110)2 and (11101101)2
10011110 158
+ 11101101 + 237
1)10001011 395
2. Addition:
(110011101)2 and (1011101)2
110011101 413
+ 1011101 + 93
111111010 506
3. Addition:
(1110.101)2 and (1000.101)2
1110.101 14.625
+ 1000.101 + 8.625
10111.010 23.250
4. Addition:
(10010.0101)2 and (100.001)2
10010.0101 16.3125
+ 100.0010 + 4.1250
10110.0111 20.4375
5. Addition:
(110101101)2, (111011101)2and (111111)2, (100101101)2, (111111001101)2
and (111110111)2
110101101 429
111011101 477
111111 63
100101101 301
111111001101 4045
+ 111110111 + 503
1011010111010 5818
6. Subtraction:
(100.01)2 from (111.11)2
111.11 7.75
- 100.01 - 4.25
011.10 3.50
7. Subtraction:
(11110.1101)2from (111111.1111)2
111111.1111 63.9375
- 111101101 - 30.8125
100001.0010 33.1250
8. Subtraction:
(10011.10)2from (11111)2
11111.00 31.00
- 10011.10 - 19.50
01011.10 11.50
9. Multiplication:
(100.10)2 by (10.1)2
100.10 4.05
× 10.1 × 2.5
10010 11.25
0000×
10010××
1011.010
10. Division
(010101101)2 / (001001)2
001001 010101101 10011
1001
0001110
1001
0101
100
00 10 Remainder
10011 – Quotient
10 – Remainder
11. Division
01011 01111
0010101101
1011
10101
1011
10101
1011
10100
1011
10011
1011
1000
12. Division
(100011)2 by (111)2
111 100011 0101 Ans.
1000
–111
00011
111
00 Ans.
35 7=5 (101)
13. Division
(11110)2 by (101)2
101 11110 110 Ans.
101
0101
101
×
305 = 6
14. Division
(111111)2 by (111)2Divide
111 111111 1001 Ans.
111
000111
111
×
63 7= 9
2.6 COMPLIMENT ARITHMETIC
(I) One's Complement
(1001)
Subtract it from 1111
1111
1001
0110
It is used for subtracting binary number from a given binary number. One's
complement of a number is arrived by subtracting each number from 1.
Q.1 Find out the one's complement of (1101001101)2
Sol.
1111111111
- 1101001101
0010110010
We just interchange 0 with 1 and 1 with 0 in one's complement.
Q.2 Find one's complement of (101010101)2
Sol.
111111111
- 101010101
(010101010)2
Q.3 Find one's complement of (1110111101)2
Sol.
1111111111
- 1110111101
(0001000010)2
Add 1 to it
213456
+ 1
(213457)10
Add 1 to it
876543
+ 1
(876544)10
Questions:
1. Subtract 5610 from 9210 using complementary method.
2. Subtract 3510 from 1810 using complementary method.
3. Convert (100111101101.11011101)2 into octal.
4. Convert (11101100111.011101101)2 into hexadecimal.
5. Explain bits, bytes and record.
UNIT-III
Type of Software
There are two ways of obtaining software:Purchase on existing Package, or Develop own packages
TYPES OF SOFTWARE
(I) Application Software
(II) System Software
(III) Service or Utility Software
(I) APPLICATION SOFTWARE:
Application software is a set of one or more programs, designed to solve a specific problem, or do a
specific task.
A program written by a scientist to solve his/her particular research problem is also application
software. The programs included in an application software package are called application programs,
and the programmers who prepare application software are referred to as application programmers.
These are literally millions of application software available for a wide range of applications, ranging
from simple application, such as word processing, banking, hospital administration, insurance,
publishing to complex scientific and engineering applications such as weather forecasting design of
computer structures like aircrafts ships bridges etc.
With so many applications available, it is not possible to categorize them all, and to cover them.
Some of the most commonly known applications software is:
(a) Word Processing Software
(b) Spreadsheets
(c) Database Management Software
(d) Graphics Software
(e) Education Software
(f) Entertainment Software
(g) Communication Software
(h) Report Generator
(a) Word Processing Software: These are software, which usually automate the day to day
documentation work of an organization. It helps in creating texts, manipulating, formatting and
printing of the text, so that the drafting, redrafting, typing again and again manually now becomes
easy and less paper wastage as well as the time taken also is reduced a lot. Wordstar, Microsoft word
etc. are some of the available word processors.
The word processing software is considered as a computerized version of a type writer. Most word
processors allow user to make change and correction to the text easily. They also lot user change the
grammar and the spellings in the document. Users can use a word processor to create almost any
kind of the documents.
(b) Spreadsheets: Electronic spreadsheets are like sheets of paper with rows and columns.
Electronic spreadsheets allow numbers, characters, formula and all other types of data which has to
be entered in a tabular form rows or columns.
The areas where columns and rows meet are called cells. User can put text, numbers, or formulas
into cells to create a worksheet. When entries are done into cells, user can change any of them. User
can input different numbers into spreadsheets to generate graphics and charts to illustrate the
relationship more emphatically.
Usage of electronic spreadsheet gives significant advantages and benefits over using paper
spreadsheets. Some of the significant advantages:
(a) It provides flexibility and it is easy to incorporate changes.
(b) Automation of various calculations.
(c) Recalculating automatically on updating.
(d) Various built in functions are provided so that the user finds it conferment to work.
(e) Flexibility to size and resize columns.
(f) Spreadsheet is very vast, so that vast areas can be provided if required. The ease at which
insertions and deletions can be made.
(g) Data can be formatted as per the requirement.
Most commonly available and used spreadsheets are MS-Excel, Super Calc etc.
(c) Database Management Software: Database is an organized collection of data, which is
logically related. Database serves as the source from which desired information can be retrieved;
conclusions can be drawn by processing the data.
The most commonly used database in our day to day life are the telephone directory, where the
telephone numbers along with the name and address are arranged in alphabetical ardor and the
dictionary, where words are arranged alphabetically along with their meanings.
The data has to be managed so that the retrieval of information is effective and easy. Managing data
involves creating, deleting, updating, adding, modifying data in databases.
Database management software or system (DBMS) is a software package that allows a user to
perform above function. It also allows multiple computers to sharing the data files.
(d) Graphics Software: Graphics program are those programs that manipulate the images to any
extent. User can draw illustrations from the scratch, using an electronic pointing device such as
mouse or light pen or pencil or brush. Such programs are referred to as either point or draw
program.
The presentation graphic application is another type of graphic software that helps user to create
professional looking visual aids for the presentation.
As graphical representation of data is much more easy to understand. It is also easier to represent
relationships among data items graphically. Example of graphics generator is MS-Excel.
(e) Education Software: Education software allows a computer system to be used as a teaching
and learning tool. A few examples of such application are those that teach going children to do
Mathematics, Recognize alphabets, Read words and sentences.
(f) Entertainment Software: Entertainment software allows a computer system to be used as an
entertainment tool. A good example of such an application is computer video games.
(g) Communication software: Communication software is used to connect the computers so that
they can share information and resources. They use modems, the hardware devices used for sending
the data across the telephone lines. A user can share information with another user with a modem
and a piece of communication software. The communication software is also called a network
software example of communication software is LINUX.
These can be an electronic data transfer between two different computers in a network. The concept
of E-mail i.e. Electronic Mail has becomes the order of the day, where are can communicate with day
one throughout the world by sending a mail electronically.
(I) Report Generator: There is always a need in day to day operations that timely reports of
various activities have to be used, so as to depict a situation or helping decision making. If these
reports are designed manually, it is very difficult task, therefore some software solutions have been
designed so as to help a user to design his own report, with ease and even the time consumed is
drastically reduced. Some of the commonly available report generating software are oracle reports,
crystal reports etc.
(II) SYSTEM SOFTWARE:
System software is a set of one or more programs, designed to control the operation and extend the
processing capability of a computer system. In general, computer system software performs one or
more of the following functions:
Supports the development of other application software
Supports the execution of other application software.
Monitors the effective use of various hardware resources, such as CPU memory
peripherals etc.
C
ommunicates with and controls the operation of peripheral devices, such as printer, disk tape
etc.
The efficient system software allows application software to be run on the computer with less time
and effort system software makes the operation of a computer system more effective and efficient. It
helps the hardware components work together and provides support for the development and
execution of application software. The programs included in a system software package are called
system software are referred to as system programmers.
Some of the most commonly known system software is as follows:
(a) Operating System: An operating system is software that runs on computer and manages the
computer hardware. All computers must have an operating system used for starting the computer and
to run other programs. It provides an interface between the user of a computer and computer
hardware.
Operating system performs basic tasks, such as recognizing input from keyboard, sending output to
the display screen, keeping tracks of files and controlling perspired devices such as printers. The
operating system is also responsible for security ensuring that users do not access the system.
Functions:
1) It works as an interface between hard ware and software.
2) It manager memory and other storage.
3) Input/output management
4) Processor management assignment of processor to different tasks being performed by the
computer system.
5) File management creation of a new file copying moving a file from one storage location to
another
6) Priority system
7) Establishing data security and integrity.
The operating system can be classified as single user (DOS) and multi user (LINUX) depending on
the number of users working on it at a given point of time.
(b) Language Processors: Language processors also known as language translators. Language
processors are system software, which transform the instructions prepared by programmer in a
programming language, into a form which can be interpreted and executed by a computer system.
Translators are further classified into three categories which are given below:
(1) Compilers
(II) Interpreters
(III) Assembler
(I) Compilers: A computer can execute only machine language programs directly. Hence, a high
level language program must be converted (translated) into its equivalent machine language program
before it can be executed on a computer. This translation is done with the help of a translator
program called compiler.
A compiler is software that will accept the total program code (high level language) as input and then
converts it into machine code (low level language). For every language, usually there is a compiler
which interprets and converts the program in that language into machine understandable code.
Each sector of a disk is assigned a unique no. Before a disk drive can access a piece of data (a
record) stored on a disk, it must specify the record's disk address. The disk address is comprised of
the sector number, track number, and surface number (when double sided disks are used). That is, the
disk address represents the physical location of the record on the disk.
Types of Magnetic Disks: All the magnetic disks are round and are coated with magnetic material.
These disks come in various sizes. They can have varied storage capacities. These magnetic disks
can be divided into the following broad categories.
(a) Floppy disks
(b) Fixed or hard disks
(a) Floppy disks: This is relatively new device used for secondary storage media for micro and
mini computer system. This is small, flexible, faster and cheap alternative to storage using magnetic
tape. This was developed in early 1970s, is one of the popular media for data storage.
It is also known as flexible floppy disk, diskette or floppy. The floppy disk is packed in protective
paper or a plastic envelope.
Advantages:
The data access is very fast.
It can be re-used many times.
No handing of bulky media.
Moving files between computers that are not connected through communications hardware.
Backing up data or programs.
Loading new programs onto a system
Disadvantages:
They are costly as compared to magnetic tapes.
They are to be handled very carefully.
(b) Hard disks: Hard disks are the secondary storage device for most computer systems today.
Unlike floppy disks, which are made of flexible plastic, hard disks are made of rigid metal
(frequently aluminum).
Types of Hard Disks:
Winchester disks: These disks are made up of disk packs containing six or more disks each. The
IBM developed it as a better way of storage and this technology enables greater precision of
alignment, an increase in the number of tracks on the disk surface.
This disk is usually large. Any high capacity storage units which may be of any size if it sealed along
with other devices are called Winchester disks. These disks are usually used in mini and personal
computing (PC) systems.
The main difference between a Winchester disk and a disk pack is that Winchester disks are of fixed
type. That is, the hard disk platters and disk drive are sealed together in a free container and cannot
be separated from each other.
Removable Cartridges or Disk Packs:
Removable cartridges or disk packs refer to storage devices that consist of a collection of magnetic
disk platters housed within a protective cartridge. These were commonly used in older computer
systems and mainframes, before the widespread adoption of smaller and more compact storage
technologies like hard disk drives (HDDs) and solid-state drives (SSDs).
Characteristics of removable cartridges or disk packs:
Physical Structure: A removable cartridge or disk pack typically contains multiple magnetic
disk platters stacked on a spindle inside a protective casing or cartridge. The cartridge is
designed for easy insertion and removal from the disk drive unit.
Capacity: Each disk pack could hold several megabytes to tens or even hundreds of megabytes
of data, depending on the size and number of disk platters. Compared to today's standards,
their capacity was relatively small, but at the time, they offered significant storage
capabilities.
Use in Mainframes: Removable cartridges or disk packs were primarily used in large mainframe
computers and minicomputers. They provided a convenient way to store and transfer large
volumes of data between different systems or for backup purposes.
Interchangeability: One of the advantages of removable disk packs was their interchangeability.
Different systems from the same manufacturer or compatible models could often use the same
type of disk pack, allowing for data interchange and system upgrades without requiring
complete data migration.
Access Speed: Access speeds for data retrieval from removable disk packs were significantly
slower compared to modern HDDs or SSDs. This was due to the mechanical nature of the
disk drives and the technology available at the time.
Advancements and Decline: As technology progressed, the size and capacity of individual hard
disk drives increased, while their physical size decreased. This led to the gradual
obsolescence of removable disk packs as more compact and higher-capacity storage solutions
became available.
Advantages of Magnetic Disks:
1) We can access data both sequentially and randomly.
2) We can update several online disk records by a single input transaction
3) It is re-usable, portable and easy to handle.
4) Accessibility: The magnetic disk provide for easy accessibility to the stored data. The
time taken for the access is very less i.e. few milliseconds.
5) Long life: The disk has longer life than tapes; the data on the disk is less likely to be lost due to
mishandling.
6) Due to its random access property, magnetic disks are often used simultaneously by multiple
users as a shared device. A tape is not suitable for such type of usage, due to its sequential access
property.
7) Data transfer rate for a magnetic disk system is normally higher than a tape system.
Disadvantage of Magnetic Disks:
1) It is bit costlier than magnetic tapes.
2) Data may be lost in case when new records are written on the disk or incase of drive failures.
3) Special backup procedures are to be adopted so that data can be protected.
4) The data is less secure than magnetic tape.
5) They must be stored in a dust free environment.
(II) Magnetic Tapes:
Magnetic tape is the most popular storage medium for large data, which are sequentially accessed
and processed. These tapes are to be accessed serially i.e. we need to turn the tape till we get
required point. It is same as playing an audio cassette in a tape recorder, i.e. whenever we like to hear
a particular part, we need to either forward or rewind the tape. This tape is usually made of a plastic
material known as Mylar. The deck is connected to the CPU permanently and the information stored
into or read from the tape by processor.
Its widespread use is due to its high transfer rate (characters that can be read or written per second),
storage density mass storage capability, and compact size and relatively low cost of operation.
The IBM magnetic tape sub system, for example, has transfer rate of three million characters, or
bytes, per second, this is extremely fast. The magnetic tape medium is a plastic ribbon, which is
usually 1/2 inch or 1/4 inch wide, and 50 to 2400 feet long. Tape reels are used with mini computers
and micro/personal computers.
The magnetic tape used in computer systems can be erased and re-used indefinitely. Old data on a
tape is automatically erased as new data is recorded on the same area. However, the information
stored can be read many times, without affecting the stored data.
These tapes have their own coding formats to store data. Usually magnetic tapes are divided into
seven to nine tracks. The code which is used for 7 tracks tape is known as binary coded decimal
(BCD). The 9 track arrangement is called ―extended binary coded decimal interchange code
(EBCDIC)‖.
Advantages of Magnetic Tape:
1) The tape is very easy and convenient to handle.
2) The tape is very economical i.e. it is reductively very cheap.
3) The tape is re-usable i.e. the tape can be erased and new data stored on it.
4) It is fast and saves time.
5) Large amount of data can be stored onto a small length of magnetic tape i.e. the high density of
the tape allows us to store volumes of data in small areas.
6) The life of magnetic tape is very high, permitting long term storage.
7) Due to this compact size and light weight, magnetic tape reels are easily portable from one
place to another. They are often used for transferring data and programs from are computer to
another, which are not linked together.
Disadvantages of Magnetic Tape:
1) Humans cannot read the data directly as it is recorded as polarized magnetic particles.
2) Access being sequentially, searching becomes difficult.
3) It is sensitive to dust, temperature, moisture and other environmental factors.
4) Variations in density of tapes usually create problems as data cannot be read effectively by
some tape drives.
(III) Optical Disks:
Optical Disks have been used for music videos and audio recording for some time. The optical disk
is different from magnetic disk in the method used to record the data. The recording techniques most
commonly used with optical disk prohibit new data from being recorded over the old.
An optical storage technique performs reading and writing operations by focusing laser became on
the surface of spinning disk. A laser (light implication by stimulated emitted radiations) is a
concentrated, narrow beam of light, focused and directed with lenses, prisms and mirrors. Due to the
laser of laser beam technology, optical disks are also known as laser disks or optical laser disks.
The reading data from on optical disk is relatively simple while writing data again and again is not
possible. A serious shortcoming of currently available optical disk systems is that they are
permanents storage devices. Data once recorded, cannot be erased and hence the disk cannot be
reused.
It is particularly suitable for the archival storage of data such as large business data bases, medical,
legal other professional reference, libraries, music and videos, all reuse tremendous amount of data
that is not normally altered. The storage density of optical disks is enormous the storage cost is
extremely low, and the access time is relatively fast.
There are two types of optical technology:
(a) CD-ROM: CD-ROM stands for Compact Disk Read only Memory. It is a spinoff of music CD
technology, and woks much like the music CDs used in music systems.
The CD-ROM disk is a shiny, silver color metal disk of 12 cm (5 ¼ inch) diameter. It has a storage
capacity of about 650 MB. It is so called, because of its enormous storage capacity on a computer
size disk and because it is a read only storage medium. That is, these disks come pre-recorded, and
the information stored on them cannot be altered.
(b) WORM DISK: It stands for write once, read many. WORM disks allow the users to create
their own CD-ROM disks by using a CD recordable (CD-R) drive, which can be attached to a
computer as a regular peripheral device. WORM disks, which look like standard CD-RAM disks, are
purchased blank and encoded using a CD-R drive.
As the name implies, data can be written only once on a WORM disk, but can be read many times.
Once data has been etched on the surface of a WORM disk, it becomes permanent. Moreover,
writing on a WORM disk, cannot be done in multiple sessions, and all the data to be recorded have
to be written on the disk surface in a single recording session.
Erasable Optical Disk: These are the disks which are erasable and can be re-used. These disks are
bit expensive. We can use CD-writer to write into these CD's.
A new recording technique that combines optical and magnetic technologies has produced an
erasable optical disk. This recording technique utilizes a laser beam to heat a minute spot on the
surface of the disk.
Optical Card: These are similar to credit cards, in size and they have on optical laser encoded strip.
These cards can store about 2 MB of data. These cards are becoming more and more popular with
growing uses like storing credit records, medical histories. These cards can be used to replace all
cash transactions as well as cheque transactions, these by moving towards cashless environment.
This is done by storing all the transactions on cards and updating the financial status for every
transaction.
Some of the users can be tracking medical histories, bank transactions, academic performance, etc.
Optical Tape: This is quite similar to the magnetic tape in looks, the difference being that the date is
stored using optical technology. These tapes come in cassettes, and can store about 8 Giga bytes
(GB). These tapes are read by using optical take drives; these drives are capable of holding about 128
cassettes. These tapes are also read only as other optical storage devices.
Advantages of Optical Disks:
1) The cost per bit of storage for optical disks is very low, because of their low cost and enormous
storage density.
2) Optical disks are more reliable storage medium than magnetic tapes or magnetic disks.
3) Optical disks have a data storage life in excess of 30 years. This makes them a better storage
medium for data archiving as compared to magnetic tapes or magnetic disks.
4) Since data once stored on optical disk becomes permanent, the danger of stored data getting
erased or overwritten is not there with optical disks.
5) Due to their compact size and light weight, optical disks one easy to handle, store and port from
one place to another.
Disadvantages of Optical Disks:
1) The data access speed for optical disks is slower than magnetic disks.
2) It is a read only (permanent) storage medium. Data once recorded, cannot be erased, and hence,
the optical disks cannot be re-used.
3) Optical disks require a more complicated drive mechanism than magnetic disks.
(IV) Modern Storage Devices:
Let us look into some of modern storage devices.
(a) DVDs: DVD was originally used as an abbreviation for "Digital Video Disk" since the DVDs
were first used for storing movies and video. DVDs today are also commonly known as "Digital
Versatile Disk" owing to the fact that a DVD is used today to store just not movies but almost any
data, which has to be stored digitally. The storage capacity of a DVD disk is quite high, which can
store up to 4-7 GB on a single layer disk and 8.5 GB on a dual layer disk.
A DVD is similar in design and appearance to a CD but the differentiating factor is that the DVDs
have a much higher capacity for holding data. DVDs are also available in double sided as well. One
has to have a DVD reader/writer to work with the DVDs.
(b) Pen Drives/Flash Drives: A pen drive or a flash drive is a small and portable storage device,
which does not have any moving parts, like a hard drive. These drives are very flexible and are
usually plug and play devices, which connect to the computer with the help of an built in USB port.
The storage capacity is highly flexible; it ranges from almost 16 MB to as high as 64 GB and more.
These drives can be written and re-written to an almost unlimited number of times. These are used to
quickly transfer audio, video and data files from the hard drive of one computer to another. The size
being quite small which fits into a pocket. These drives are an improvement on both the older floppy
drive disks and the more modern compact disks are often used to copy data and reload the files on.
One can store any type of data, may it be photos, spreadsheets, word documents, movie clips, music
tracks, and any other type of file.
(c) External Hard Disk Drives: An external hard disk drive refers to a hard drive disk which is
outside the computer cabinet. These drives are outside computer and are highly portable and secure
devices since one can store them under lock and key. They are slightly bigger is size than the hard
drive itself.
These external hard drives can be connected to the computer system with the help of single high
speed interface cable, and these devices are like pen drives, which are also plug and play and can be
connected using interface such as USB.
(d) Pocket Hard Drive: These are the handy external hard drives, which are mini external hard
drives, which one can easily carry in his pocket, which gives it the name "Pocket Hard Drive".
Pocket hard drives take the best of the traditional hard disk storage with the convenient sizes and
USB connections.
These devices are a bit larger than the flash drives; they are still convenient for storing and
transferring large amounts of data without much hassle, which makes them one of the popular
storage devices. Pocket hard drives usually have a capacity of many Gigabytes.
Note: Computer based training (CBTs) has become one of the most popular ways of self learning,
where each and every step is given in sequential order, so that one can self learn the concepts easily
using the graphical interface, which simulates the real time learning process. This is usually done
using CDs.
Questions:
1. Discuss computer languages in detail.
2. Compare and contrast the computer languages.
3. What do you mean by language translator? Explain the language translators in detail with
suitable example.
4. What is software? Discuss the types of software with suitable examples.
5. Discuss memory management in detail.
Unit-IV
OPERATING SYSTEM
Batch
Processing
Operating
Real time
System
operating
system
Multiprogr
Types of amming
Operating Operating
System System
Network
operating
system Figure 4.2: Types of Operating System
1. Batch Processing Operating System:In earlier computers, the users did not interact directly with
Time
the system, instead, a user prepared a Realjob,time
which consisted Sharing
of program, data and some control
information about the nature of the job and submit it to the computer
operating operator.
operating
This method of job execution was known system
as manual loading mechanism
system because the jobs had to be
manually loaded one after another by the computer operator in the computer system. In this method,
job to job transition was not automatic.
The manual transition from one job to another caused lot of computer time to be wasted since the
computer remained idle while the operator loaded and unloaded job and prepared the system for a
new job.
In new method, known as a batch processing system, when one job is finished, the system control is
automatically transferred back to the operating system which automatically performs the other jobs
(such as clearing the memory to remove any data remaining from previous job) needed to load and
run the next job.
Jobs in the batch processing operating system executed in the following manner:
i. Programmers would prepare their programs and submitted them to the computer operator at
computer centre.
ii. The operator would periodically collect all the submitted programs and would batch them
together and then load them all into the input devices of the system at one time.
iii. The operator would give a command to the system to start executing the jobs.
iv. The jobs then automatically loaded from the input device and executed by the system one by
one without any operator intervening.
v. Then all the jobs in the submitted batch were processed the operator would separate and keep
the printed output of each job at the reception courts for the programmers to collect them
later.
Advantages:
i. The batch processing mechanism helped in reducing the idle time of a computer system
because transition from one job to another did not require any operator intervening. It avoids
idling the computing resources.
ii. It allows sharing of computer resources among many users and programs.
Disadvantages:
i. While the jobs were collected, the CPU is left idle and wasting its potential.
ii. Once the processing starts, the system processes efficiently without wasting time and user
intervention but till the processing starts jobs has to wait and this effects the turnaround
time as the job has to wait till it is completed.
Batch processing is also known as serial sequential, off-line or stacked job processing.
2. Multiprogramming Operating System:Multi programming operating system is the name given to
the execution of two or more different and independent programs by the same computer. It is an
efficient way to improve the system performance. Multi programming approach permits more than
one job to utilize the CPU time at any moment by applying the scheduling technique like first come
first serve, shortest job first etc. The more the number of programs requesting for system resources,
utilization would be better. The operating system picks up any of the programs as scheduled and starts
execution.
Plug in the Power: Make sure your computer is plugged into a power source. This could be a
wall outlet or a surge protector.
Press the Power Button: Locate the power button on your computer case or laptop. It's
usually located on the front panel of a desktop computer or on the side or back of a laptop.
Press this button to turn on the computer.
Wait for Boot-up: After pressing the power button, your computer will start the boot-up
process. This involves loading the operating system (like Windows, macOS, or Linux) into
memory and initializing hardware components.
Login (if required): Depending on your computer's settings, you may need to enter a
username and password to access the system. This is typical for user accounts with password
protection.
Desktop Interface: Once the boot-up process is complete and you've logged in (if required),
you'll be greeted by the desktop interface of your operating system. From here, you can start
using your computer for various tasks.
Shutdown/Restart: When you're finished using your computer, it's important to shut it down
properly to avoid data loss and to conserve power. You can do this by selecting the shutdown
or restart option from the operating system's menu.
The very first step is to turn on the computer. Make sure all the cables are plugged in correctly. and
locate the power button. Press the power button symbol
Once turned on, your computer takes time before it's ready to use. You may see a few different
displays flash on the screen. This process is called booting up, and it can take anywhere from 15
seconds to several minutes. Once the computer has booted up, it is ready to use.
You interact with a computer mainly by using the keyboard and mouse, or a trackpad on laptops. The
keyboard allows you to type letters, numbers, and words into the computer Whenever you see a
flashing vertical line called the cursor you can start typing. The mouse controls the pointer on the
screen. Whenever you move the mouse across the desk, the pointer will move in a similar manner. A
mouse usually has two buttons, which are referred to as the left button and the right button. You will
often interact with the computer by moving the mouse pointer over something on the computer
screen, then clicking one of the buttons.
Click the Start button, then the Power icon, then click Shut down.
Restarting mode
If your computer has become unresponsive, you can choose Restart to quickly turn it off and on agam.
Sleep mode
You can also choose to put your computer into sleep mode. This turns off most of your computer's
processes, but it remembers which applications and files are open. It allows the computer to start up
more quickly because you won't have to wait for the operating system and applications to load. Note
that your computer may go into Sleep mode automatically if you haven't used it for more than a few
minutes.
To wake the computer from Sleep mode, click the mouse or press any key on the keyboard.
Without these drivers, the hardware and software will not function properly, and in some cases may
not be able to function at all.
Operating system sends some files to hardware component or software application to instruct them on
how to function. These files are known as drivers.
There are two primary types of drivers: device drivers and software drivers.
Device driver: Device drivers are designed to communicate between an operating system and a
device. Some devices which require drivers are: printers, scanners, digital camera, modems, card
readers etc. Without device drivers, the computer could not send and receive data correctly to
hardware devices, such as a printer, scanner etc.
Software driver: Software drivers are designed to communicate between an operating system and
software applications. Software drivers only associated with software applications not hardware
components. The main purpose behind software drivers is to enable or disable access to protected
data.
4.6 TASKBAR
The taskbar is a graphical user interface (GUI) element present in various operating systems,
including Microsoft Windows and some Linux desktop environments. It typically appears as a
horizontal bar located at the bottom of the screen, although its position can be customized in some
systems.
Features of Taskbar:
Program Launching: The taskbar often includes a section for pinning frequently used
applications. Users can click on these icons to quickly launch their favorite programs without
navigating through menus or searching for shortcuts.
Window Management: When multiple applications or windows are open, the taskbar displays
icons or thumbnails representing each open window. Users can click on these icons to switch
between windows or bring a particular window to the foreground.
System Tray: The taskbar usually includes a section known as the system tray or notification
area, located on the far right. This area displays system icons representing active processes,
background services, and system notifications. Users can interact with these icons to adjust
system settings, view notifications, or access running applications.
Start Menu: In Windows operating systems, the taskbar typically incorporates the Start
button, which provides access to the Start menu. The Start menu allows users to search for
files, launch applications, access system settings, and shut down or restart the computer.
Customization: Users can customize the appearance and behavior of the taskbar according to
their preferences. This may include changing its size, position, color, and transparency, as
well as adding or removing specific features such as the system tray or Cortana search bar (in
Windows).
Overall, the taskbar serves as a central hub for launching applications, managing open windows, and
accessing system-related functions, providing users with convenient access to essential features and
enhancing their overall productivity and user experience.
4.7 BOOTING UP
Booting up, also known as booting, is the process of starting or initializing a computer system. When
you turn on a computer or restart it, the boot process begins, during which the computer's hardware
and software components are activated and initialized to prepare the system for use.
During the booting up process, the computer undergoes several steps, including a power-on self-test
(POST), initialization of hardware components, execution of the boot loader program, loading of the
operating system into memory, and finally presenting the user with a login screen or desktop
environment.
In simpler terms, "booting up" refers to the time it takes for a computer to go from being powered off
to being fully functional and ready for the user to interact with it. This term is commonly used in
everyday language to indicate the process of starting a computer. Here's a basic overview of the boot
process:
Power-On Self-Test (POST): When you turn on a computer, the hardware components (such
as the processor, memory, and storage devices) undergo a self-diagnostic test called the
POST. This test checks for hardware errors and ensures that essential components are
functioning correctly. If any issues are detected during the POST, the computer may display
error messages or emit audible alerts.
Boot Loader Execution: After the hardware initialization, the system loads the boot loader
program. The boot loader is responsible for loading the operating system (OS) into memory
from the storage device (typically a hard drive, solid-state drive, or network location). In
systems running Windows, the boot loader is often the Windows Boot Manager or NTLDR
(for older versions). In Linux systems, GRUB (Grand Unified Bootloader) is commonly used.
Operating System Initialization: Once the boot loader loads the operating system into
memory, the OS begins its initialization process. This involves loading essential system files,
initializing device drivers, and configuring system settings. The operating system then
presents the user with a login screen or desktop environment, indicating that the boot process
is complete.
User Interaction: Finally, the user can interact with the computer through the operating
system's user interface, launching applications, accessing files, and performing various tasks.
The booting process may vary slightly depending on the computer's hardware configuration and the
operating system installed. In modern computers, especially those with solid-state drives (SSDs), the
boot process can be very fast, often completing in a matter of seconds.
4.8 DESKTOP
A desktop computer, often simply referred to as a "desktop," is a personal computer designed to be
used at a single location, typically a desk or table. It consists of separate components, including a
central processing unit (CPU), monitor, keyboard, mouse, and often other peripherals such as speakers
and printers. Unlike laptops or tablets, which are portable and compact, desktops are stationary and
offer greater performance and customization options.
The term "desktop" can refer to both the physical hardware and the graphical user interface (GUI)
environment provided by the operating system. In the context of hardware, a desktop computer
typically comprises a tower or chassis housing the CPU, motherboard, RAM, storage drives, and other
internal components. These components are connected to an external monitor, keyboard, and mouse
for user interaction.
Desktop computers are commonly used for a wide range of tasks, including productivity work (such
as word processing, spreadsheet management, and presentations), multimedia consumption (such as
watching videos, listening to music, and viewing photos), gaming, programming, graphic design,
video editing, and more. They are favored by users who prioritize performance, customization, and
expandability over portability.
Once your computer has started, the first thing you'll see is the desktop. Desktop is the main
workspace for your computer. From here, you can view and manage your files, applications access the
Internet, and much more.
Customize desktop background: Image appears behind the icons on the computer's desktop is known
as wallpaper or desktop background. We can change the desktop background by right-clicking the
desktop and selecting personalize.
Select Background. By default, you'll see the images that were included with your computer. When
you find an image you like, just select it and choose view image. Then click and drag the picture to
your desktop. You can now set the image as your desktop background.
4.9 ICONS
An icon in computing refers to a small graphical symbol or image that represents an object, action, or
concept on a computer's graphical user interface (GUI). Icons are used extensively in various software
applications, operating systems, websites, and digital interfaces to visually communicate information
and interact with users.
Here are some key points about icons:
Visual Representation: Icons are visual representations of objects, such as files, folders,
applications, or system functions. They convey meaning through graphical symbols, making
it easier for users to understand and interact with digital content.
Simplification: Icons simplify complex concepts or commands by using graphical symbols
instead of text-based descriptions. This simplification enhances usability and makes interfaces
more intuitive, especially for users who may not be familiar with technical terminology.
User Interaction: Icons are interactive elements that users can click, tap, or interact with to
perform actions. For example, clicking on an application icon launches the corresponding
program, while clicking on a file icon opens the file in the associated application.
Consistency: Icons often follow design standards and conventions to ensure consistency
across different applications and platforms. Standardized iconography helps users recognize
familiar symbols and understand their meaning, even when using different software or
operating systems.
Customization: Users can often customize icons by changing their appearance, arrangement,
or functionality to suit their preferences. For example, users can rearrange icons on a desktop,
change icon sizes or styles, or create custom icons for specific applications or tasks.
Accessibility: Icons play a crucial role in making digital interfaces accessible to users with
disabilities. They can be designed with contrasting colors, distinct shapes, and descriptive
labels to improve visibility and usability for users with visual impairments or cognitive
disabilities.
Icons are used to represent the different files, applications, and commands on your computer. An icon
is a small image which gives you an idea about what file represents. Double-clicking an icon on the
desktop will open that file or application.
Icons help users to quickly identify the type of file. For example: the recycle bin is represented by the
image of a small trash bin.
Steps for Changing the Icon: Right-click on a program icon, select Properties, go to the shortcut tab,
and click the "change icon" button. Some programs include a number predefined icons you can
choose from, or you can select any other icon you have stored on your computer. Click the icon that
you want to use, click OK, and then click OK.
Overall, icons are fundamental elements of graphical user interfaces, enhancing usability,
accessibility, and user engagement in computing environments. They provide a visual language that
helps users navigate, understand, and interact with digital content more effectively.
4. 10 FILES
A file is an object on a computer that stores data, information, settings, or commands used with a
computer program.
Computer files are stored on a drive (eg.. the hard drive), dise (e.g., DVD), and a diskette (e.g., floppy
disk) and may be in a folder (directory) on that medium.
Application files: An application file is used to describe a file that a program puts on a computer after
it gets installed. They're more often called program files and might use the EXE file extension.
Data files: A data file is any file containing information, but not code; it is only meant to be read or
viewed and not executed. For example: text file, letter written in a word processor
System files: A file critical to the proper function of an operating system which, if deleted or
modified, may cause it to no longer work. Often these files are hidden and cannot be deleted because
they are in use by the operating system.
File Extension: A file extension or file name extension is the ending of a file that helps to identify the
type of file. File extension is often followed by three characters. For example, the file name
"myfile.txt" has a file extension of ".txt," which is a file name extension associated with text files.
There are thousands of file extensions associated with one or more applications.
File type
Text
File extension
Image
Sound
Video
Program
bat.com.exe
Compressed
Web page
.htm, .html
You can convert a file in one format into a different format. For example, an MP3 audio file can be
converted to M4R so that an iPhone will recognize it as a ringtone file.
File Path: A file path is the location of a file based on a computer's file system. There are two types of
file path: First one is absolute file path which contains the root directory and include the volume,
directory, and file name. Second one is relative file path which list only part of the entire file path.
PDF File: Portable document format file is one of the most used file types today. Whenever you see a
file that ends with .pdf that means it's a PDF file.
We can open, edit, and convert PDFs in Adobe Acrobat Reader and other PDF readers. Manuals,
eBooks, and other documents come in this format, which holds images, text, and other elements.
Word documents are meant to be edited, there's a chance that some of the formatting and text in your
document may be shifted around. But PDF files are primarily meant for viewing, not editing. One
reason they're so popular is that PDFs can preserve document formatting, which makes them more
shareable and helps them to look the same on any device.
Creating PDF Files: There are several ways to create PDF files, but the method will largely depend on
the device
you're using. We can go to the Print dialog box, and then select PDF from the list of printers at
The simplest method is to use software that supports a PDF export, such as Microsoft Office or
Google Chrome.
4.11 FOLDERS
A folder helps in organizing files. We can put files inside a folder.
Basically, a folder or directory is a collection of files. Files that contain text are often called
documents.
A directory (folder) is an area on the computer containing other directories and files and helps keep
the computer organized. A folder holds
one or more files, and a folder can be empty until it is filled. A folder can also contain other folders,
and there can be many levels of folders within folders. Folders are created on the hard drive or solid
state drive when the operating system and applications are installed. Files are always stored in folders.
In fact, even the computer's desktop is a special kind of folder that displays its contents across the
screen
To open File Explorer, click the File Explorer icon on the taskbar, or double-click any folder on your
desktop. A new File Explorer window will appear. Now we can start work with your files and folders.
After double-click on a folder, we can see all of the files stored in that folder.
We can also see the location of a folder in the address bar near the top of the window.
To open a file:
OR
We can go to the File menu at the top of the window and select Open.
To move a file:
2. Release the mouse. The file will appear in the new location.
1. Right-click where we want the folder to appear, then select New Folder.
2 The new folder will appear. Type the desired name for the folder and press Enter.
1. Right-click on the file or folder, then select delete from the menu that appears. File w
delete. When you delete a file, it is moved to the Recycle Bin. If you change your min you can move
the file from the Recycle Bin back to its original location.
2. To permanently delete the file, right-click the Recycle Bin icon and select Empty Recycс Bin. All
files in the Recycle Bin will be permanently deleted.
If you want to select all files in a folder at the same time, press Ctrl+A. All of the files in the folder
will be selected.
Start menu is the important feature in the Windows. Start menu is used to open apps and commonly
used folders. We can customize the Start menu according to our needs.
1. Click Start
2. Click All Programs, and slide your mouse pointer until you've selected the program you want to
open.
4. To close a program, click the X button located at the top-right of the window.
1. Click Start.
4. Scroll until you see the Control Panel icon in the left pane.
5. After viewing the contents, close the Windows Explorer window.
4.15 MY COMPUTER
My Computer icon on the desktop is another tool used to manage files on the computer. We can
create, rename, and move folders and copy, print, move, delete, and rename files with this tool. We
can also access to other system tools such as printers.
To open My Computer:
2. A list of the folder's content appears: your local drives, printers, and Control Panel folders
4.16 WINDOW
Windows makes it possible to complete all types of everyday tasks on your computer. The rectangular
work area for an application, folder, file, or other task is called a window.
When you open an application or folder, it is displayed in its own window. Whenever you open a file,
folder, or application, it will appear in a new window. A window has its own menus specific to that
program. We can rearrange multiple windows at the same time on the desktop and switch between
them. We are using window all the time. It is important to know how to switch between open
windows, how to move and resize windows, and how to close windows after using them.
There are three buttons in the upper-right corner of almost every window. These buttons allow us to
perform several functions, including these below.
Minimize Button: Click the Minimize button to hide the window. The window will be minimized to
the taskbar. You can then click the icon for that window on the taskbar to
make it reappear. Maximize Button: Click the Maximize button to make the window fill the entire
screen.
Restore Button: If the screen is maximized, the Maximize button will be temporarily replaced by the
Restore button. Just click it to return the window to its original size.
When we delete any file, it does not remove permanently from the system. The deleted file goes to
Recycle Bin. The files cannot be used directly while they are in the Recycle Bin. We have to recover
files first to use them. We can restore that deleted file from Recycle Bin if necessary. The files in the
Recycle Bin are restored to their original location. If a file is deleted from the
Recycle Bin, it is permanently deleted and cannot be recovered. If we want to prevent to go files in
the Recycle Bin and delete files permanently, and then use a shortcut key Shift + delete the key from
the keyboard.
2. When the pop-up menu appears. Choose Delete option. Click Yes. OR
1. Double-click on the Recycle Bin. Right click on the File or Folder which you
OR
Double-click on the Recycle Bin, and drag the file or folder onto the desktop.
To permanently delete one or few files or folders from the Recycle Bin:
1. Double-click on the Recycle Bin. Right click on the File or Folder which you want to permanently
delete.
2. Press ok.
Undo is a function performed to reverse the action of an earlier action. It erases the last change done
to the document, reverting it to an older state. We can undo many times but depends on the program
we are using.
We can click Undo on the Quick Access Toolbar also. Press Undo repeatedly if want to undo multiple
steps.
Note: If you make changes and then close the document or program, any changes that were made
earlier cannot be undone.
REDO:
The opposite of undo is redo. The redo command reverses the undo or advances the buffer to a more
recent state.
Redo function will undo your last undo. If we have used Undo but then realize we didn't want to Undo
the most recent change, then use Redo, Redo will restore it.
For example: we undo but after sometimes we realize there was no requirement of undo and you want
previous changes then you use redo. Redo reverses the undo.
4.19 SHORTCUTS
If you have a file or folder you use frequently, you can save time by creating a shortcut on the
desktop. Instead of navigating to the file or folder cach time you want to use it, you can simply
double-click the shortcut to open it. A shortcut will have a small arrow in the lower-left corner of the
icon Note that creating a shortcut does not create a duplicate copy of the folder, it's simply a way to
access the folder more quickly. If you delete a shortcut, it will not delete the actual folder or the files
it contains.
To create a shortcut:
In the right pane of Windows Explorer, click the file, program, or folder for which you want to make
a shortcut. The item darkens when you select it.
The mouse pointer over the shortcut icon, holds down the left mouse button, and drags the shortcut
onto desktop (in the left pane).
The word Desktop will darken when you drag the icon over it. Release the left mouse button, and a
shortcut is moved to the desktop.
1. Locate and right-click the desired folder, then select Send to Desktop (create shortcut)
A shortcut to the folder will appear on the desktop. Notice the arrow in the lower-left
comer of the icon. 2. You can also hold the Alt key on your keyboard, then click and drag the folder
to the desktop to create a shortcut.
1. Printers: A printer is used to print documents, photos, and anything else that appears on your
screen. There are many types of printers, including inkjet, laser, and photo printers. There are even
all-in-one printers, which can also scan and copy documents.
2. Scanners: A scanner allows you to copy a physical image or document and save it to your computer
as a digital (computer-readable) image. Many scanners are included as part of an all-in-one printer,
although you can also buy a separate flatbed or handheld scanner.
3. Speakers/headphones: Speakers and headphones are output devices, which means they send
information from the computer to the user in this case, they allow you to hear
sound and music. Depending on the model, they may connect to the audio port or the USB port. Some
monitors also have built-in speakers.
4. Microphones: A microphone is a type of input device, or a device that receives information from a
user. You can connect a microphone to record sound or talk with someone else over the Internet.
Many laptop computers come with built-in microphones. 5. Web cameras: A web camera or webcam
is a type of input device that can
record videos and take pictures. It can also transmit video over the Internet in real time,
which allows for video chat or video conferencing with someone else. Many webcams
also include a microphone for this reason. 6. Game controllers and joysticks: A game controller is
used to control computer games. There are many other types of controllers you can use, including
joysticks, although you can also use your mouse and keyboard to control most games.
7. Digital cameras: A digital camera lets you capture pictures and videos in a digital format. By
connecting the camera to your computer's USB port, you can transfer the images from the camera to
the computer.
8. Mobile phones, MP3 players, tablet computers, and other devices: Whenever you buy an electronic
device, such as a mobile phone or MP3 player, check to see if it comes with a USB cable. If it does,
this means you can most likely connect it to your computer.
4.20 STORAGE
When you're working on a document or other computer file, you can always save it to your computer's
hard drive.
I. HARD DRIVE
The hard drive is where your software, documents, and other files are stored. The hard drive is long-
term storage, which means the data is still saved even if you tum the computer off or unplug it.
When you run a program or open a file, the computer copies some of the data from the hard drive onto
the RAM. When you save a file, the data is copied back to the hard drive. The faster the hard drive,
the faster your computer can start up and load programs.
One of the easiest ways to back up your files is to copy them to an extemal hard drive. External hard
drive is not a part of computer. We need to purchase an extemal drive to get started.
Keep in mind that an extemal hard drive have same risks as the computer, including fire, theft, and
accidental damage. It is important to keep the external hard drive in a secure location when not in use.
We can use a small fireproof safe for greater protection of external hard drive.
USB drive: USB drive or flash drives are small, removable hard drives that plug into
the USB ports on your computer. They are relatively inexpensive (usually less than $20) and
Cloud storage: Cloud storage means you save your files on servers on the Internet using an account
with a cloud service. With cloud storage, you can access your files from any computer with Internet
access without having to keep track of a physical device.
Google Drive
Google Drive is a cloud storage service from Google, offering 15GB of free storage. From Drive, you
can also access Google Docs, which allows you to create, share, and collaborate on documents,
spreadsheets, presentations, and more. Visit our Google Drive and Docs tutorial to learn more.
OneDrive
OneDrive (previously called SkyDrive) is a cloud-based storage service from Microsoft, offering 5GB
of free storage. You'll also have access to Office Online, a free online version of Microsoft Office that
includes Word, Excel, PowerPoint, and OneNote. Visit our OneDrive and Office Online tutorial to
learn more.
Writing (Burning): Some CD/DVD drives are capable of writing data onto blank discs. This process is
known as burning, and it allows users to create their own CDs or DVDs by copying files, creating
music CDs, or backing up data.
Floppy Drive: A floppy drive is the hardware component installed in a computer that reads
and writes data to floppy disks. It consists of a motorized mechanism to spin the disk and a
read/write head that magnetically reads and writes data on the disk's surface.
A floppy drive is a hardware device used in older computers to read and write data to floppy disks,
which were once a common form of portable data storage before being largely replaced by more
advanced technologies.
V. FLASH DRIVE
A flash drive is a small, removable hard drive that plugs into a USB port on your computer. You can
purchase a flash drive for less than $20 at just about any retail store with an electronics department,
and even at some grocery stores and pharmacies. Flash drives are a convenient way to bring your files
with you and open them on a different computer. You could also use a flash drive to back up
important documents and other files. In this lesson, we'll show you how to use a flash drive with your
computer.
Insert the flash drive into a USB port on your computer. You should find a USB port on the front,
back, or side of your computer (the location may vary depending on whether you have a desktop or a
laptop).
Depending on how your computer is set up, a dialog box may appear. If it does, select Open folder to
view files.
If a dialog box does not appear, open Windows Explorer and locate and select the flash drive on the
left side of the window. Note that the name of the flash drive may vary.
When you're done using a flash drive, don't remove it from the USB port just yet! You'll need to make
sure to disconnect it properly to avoid damaging files on the drive. Right-click the flash drive, then
select Disconnect (or Eject).
You can now safely remove the flash drive from the USB port.
For example, we might want to change your desktop background or modify the Internet settings. We
can change these settings and more from the Control Panel.
2. Type Control Panel in the search box and select Control Panel in the results.
There are eight main areas on the Control Panel, containing different tools designed to optimize your
computer.
System and Security - A section to check your computer's status, backup and restore, and
Hardware and Sound - View which devices are on your computer and add devices.
Appearance and Personalization - Change desktop options, like fonts and screen readers.
Your computer faces many potential threats, including viruses, malware, and hard drive failure. This
is why it's important to do everything you can to protect your computer and your files.
Malware is any type of software that is designed to damage your computer or gain unauthorized
access to your personal information. It includes viruses, worms, Trojan horses, and spyware. Most
malware is distributed over the Internet and is often bundled with other software.
It's also important to stay smart when you're browsing the Web or using email. If a website or email
attachment looks suspicious, trust your instincts. Keep in mind that your antivirus program may not
catch everything, so it's best to avoid downloading anything that might malware,
4.23 VIRUS
A computer virus is a type of malicious software, or malware, that spreads between computers and
causes damage to data and software.
Malware is any type of software that is designed to damage your computer or gain unauthorized
access to your personal information. It includes viruses, worms, Trojan horses, and spyware. Most
malware is distributed over the Internet and is often bundled with other software.
These computer viruses are present in various types and each of them can infect a device in a different
manner. A computer virus is a program which can harm our device and files and infect them for
no further use. When a virus program is executed, it replicates itself by modifying other computer
programs and instead enters its own coding. This code infects a file or program and if it spreads
massively, it may ultimately result in crashing of the device.
The following are certain indications which can help to analyse that a device is virus-hit:
Speed of the System - In case a virus is completely executed into your device, the time taken to open
applications may become longer and the entire system processing may start working slowly
Pop-up Windows-One may start getting too many pop up windows on their screen which may be
virus affected and harm the device even more
Self Execution of Programs Files or applications may start opening in the background. of the system
by themselves and you may not even know about them
Log out from Accounts In case of a virus attack, the probability of accounts getting hacked increase
and password protected sites may also get hacked and you might get logged out from all of them
* Crashing of the Device - In most cases, if the virus spreads in maximum files and programs, there
are chances that the entire device may crash and stop working
Computer viruses can be dangerous and should be taken seriously, The best way to guard against
virus is to install antivirus software, Bitdefender, Norton, or Kaspersky.
4.24 ANTIVIRUS
Antivirus software helps to prevent malware from being installed, and it can also remove malware
from your computer.
It's also important to stay smart when you're browsing the Web or using email. If a website or email
attachment looks suspicious, trust your instincts.
Once you've verified that your antivirus program is running, begin a scan.
Some programs offer several types of scans, and you may want to run the most thorough type, usually
called a full system scan. This may take several hours.
Either during the course of the scan or when it's complete, the antivirus program will notify you of
discovered threats and recommend various courses of action. Usually, the recommended
action for each threat is the best choice. If no viruses or malware are found but you are still
experiencing problems with your computer,
try your computer assessed by a support professional. Keep in mind that your antivirus program may
not catch everything, so it's best to avoid downloading anything that might contain malware. But keep
in mind that it may still be necessary to hire a technical support professional to completely remove the
virus and repair your computer.
4.25 BACKING UP YOUR COMPUTER
Imagine what would happen if your computer suddenly stopped working. Would you lose any
important documents, photos, or other files? It may be possible to repair your computer, but your files
may be lost forever. Luckily, you can prevent this by creating backup copies of all of your files (or
just the important ones) on an external hard drive or an online backup service. External hard drives:
You can purchase an external hard drive and copy the contents of your computer to it. Follow-up
backups should be conducted on a regular basis. One drawback is that an external hard drive can be
lost, damaged, or stolen-just as your computer might be. This is why it's important to keep your drive
in a secure location when not in use.
Online backup services:Backup your data on cloud, which means you'll be able to recover them from
any computer with an Internet connection. The amount of storage provided by these sites varies, and
you will probably need to pay a fee for adequate storage space.
Questions:
1. What is the primary function of an operating system?
2. Define an operating system and explain its significance in computer systems.
3. How would you describe the role of an operating system in managing computer hardware and
software resources?
4. Discuss the core purpose of an operating system in the context of modern computing.
5. List and explain three fundamental features of an operating system.
6. Describe the role of process management as a feature of operating systems.
7. How does memory management contribute to the efficiency of an operating system?
8. Discuss the significance of file system management in operating systems.
9. Explain the importance of device management as a feature of operating systems.
10. What distinguishes real-time operating systems from other types of operating systems?
11. Provide examples and describe the characteristics of batch processing operating systems.
12. Explain the key differences between single-user and multi-user operating systems.
13. Compare and contrast embedded operating systems with general-purpose operating systems.
14. Discuss the advantages and applications of network operating systems in modern computing
environments.
15. How do time-sharing operating systems enable multiple users to interact with a computer
system simultaneously?
16. What are the main characteristics of multiprocessing operating systems, and how do they
differ from single-processor systems?
Unit-V
Data
Protocols Protocols
These modes of communication are fundamental in designing and implementing data communication
systems, allowing for efficient and reliable transfer of information between devices or systems. The
choice of mode depends on factors such as the requirements of the application, the capabilities of the
devices involved, and the characteristics of the communication medium.
These standards and organizations play a crucial role in shaping the development and adoption of
networking technologies, ensuring compatibility, interoperability, and the seamless functioning of
computer networks on a global scale.
Networks can be classified based on various criteria, including their size, topology, technology, and
geographical scope. Here are some common classifications of networks:
LANs typically cover a small area, such as a single building or a group of buildings in close
proximity.
High Data Transfer Rates: LANs are designed for high-speed data transfer, allowing devices
within the network to communicate with each other quickly and efficiently.
Private Ownership and Control: LANs are privately owned and controlled by the organization
or individual that sets them up. This provides greater control over network security and access
permissions.
Use of Ethernet or Wi-Fi: LANs commonly use Ethernet cables or wireless technologies
(such as Wi-Fi) to connect devices to the network infrastructure.
Common Protocols: LANs typically use standard networking protocols, such as TCP/IP
(Transmission Control Protocol/Internet Protocol), for communication between devices.
Shared Resources: Devices connected to a LAN can share resources, such as files, printers,
and internet connections, making it easier for users to collaborate and access information.
Scalability: LANs can be easily scaled to accommodate additional devices or expanded
coverage by adding more network infrastructure components, such as switches, routers, and
access points.
Advantages of LAN:
Resource Sharing: LANs allow devices connected to the network to share resources such as
printers, scanners, storage devices, and internet connections. This facilitates collaboration and
improves efficiency by reducing the need for duplicate equipment.
Data Transfer Speed: LANs provide high-speed data transfer rates compared to wide-area
networks (WANs) or the internet. This enables fast communication and access to shared
resources within the local network.
Cost-Effectiveness: LANs are cost-effective solutions for connecting devices within a
relatively small geographic area, such as a home, office, or campus. They require less
infrastructure and maintenance compared to larger networks like WANs.
Centralized Management: LANs allow for centralized management of network resources,
including user accounts, permissions, and security settings. This simplifies network
administration and ensures consistent access control across all connected devices.
Improved Communication: LANs facilitate real-time communication between users through
features like instant messaging, video conferencing, and VoIP (Voice over Internet Protocol).
This enhances collaboration and productivity among individuals and teams.
Enhanced Security: LANs offer greater control over network security compared to public
networks like the internet. Network administrators can implement security measures such as
firewalls, encryption, access control, and intrusion detection systems to protect sensitive data
and prevent unauthorized access.
Scalability: LANs can be easily scaled to accommodate additional devices or expanded
coverage by adding more network infrastructure components, such as switches, routers, and
access points. This flexibility allows organizations to adapt to changing business needs and
growth requirements.
High Reliability: LANs are typically more reliable than internet-based connections because
they operate within a controlled environment with fewer external factors that can affect
network performance. Redundant components and backup systems can be implemented to
minimize downtime and ensure continuous operation.
Support for Multimedia Applications: LANs support multimedia applications such as video
streaming, online gaming, and multimedia content sharing with minimal latency and high-
quality performance. This makes them ideal for environments where multimedia
communication and entertainment are important.
Local Control: LANs provide local control over network infrastructure and services, allowing
organizations to customize their network environment to meet specific requirements and
preferences without relying on external service providers.
Disadvantages of LAN:
Limited Coverage: LANs are designed for small-scale networking within a limited geographic
area, such as a single building or campus. They are not suitable for connecting devices over
long distances, which may require the use of wide-area network (WAN) technologies.
High Initial Setup Cost: Setting up a LAN infrastructure, including networking equipment
such as switches, routers, cables, and servers, can involve significant upfront costs. This
initial investment may be prohibitive for small businesses or individuals with limited budgets.
Maintenance and Management Complexity: LANs require ongoing maintenance and
management to ensure optimal performance and security. Network administrators must
configure and monitor network devices, troubleshoot issues, apply software updates, and
implement security measures, which can be time-consuming and resource-intensive.
Security Risks: LANs are vulnerable to security threats such as unauthorized access, data
breaches, malware infections, and insider attacks. Without proper security measures in place,
sensitive information stored on LAN-connected devices may be at risk of compromise.
Single Point of Failure: LANs rely on a centralized infrastructure, which can become a single
point of failure if critical components, such as switches or servers, experience downtime or
malfunction. Redundancy and backup systems can mitigate this risk but may add complexity
and cost to the network.
Limited Mobility: Devices connected to a LAN are typically stationary and must be
physically connected to the network infrastructure via cables or wireless access points. This
limits the mobility of users and devices within the local area covered by the network.
Bandwidth Limitations: LANs may experience bandwidth limitations, especially in shared
network environments where multiple devices compete for network resources. This can lead
to congestion and decreased performance, particularly during peak usage periods.
Dependency on Physical Infrastructure: LANs rely on physical infrastructure such as cables,
switches, and routers to transmit data between devices. Any damage to this infrastructure,
such as cable cuts or equipment failure, can disrupt network connectivity and require timely
repairs.
Compatibility Issues: Different devices and operating systems may have compatibility issues
when connected to the same LAN, leading to interoperability challenges and potential
performance issues. Network administrators must ensure compatibility and consistency across
all networked devices.
Scalability Constraints: While LANs can be scaled to accommodate additional devices or
expanded coverage, there are practical limitations to their scalability. Adding too many
devices or extending the network beyond its intended capacity may result in performance
degradation and increased complexity.
MAN (Metropolitan Area Network):
A Metropolitan Area Network (MAN) is a type of network that spans a larger geographic area
than a Local Area Network (LAN) but is smaller than a Wide Area Network (WAN). MANs
typically cover a metropolitan area such as a city or a large campus, connecting multiple
LANs and other network devices over a wide geographical area.
MANs often connect multiple LANs and provide high-speed connectivity over longer distances
than LANs.
Features of PAN:
Proximity: PANs typically cover a small area, usually within a range of a few meters.
Devices in a PAN are typically located within the immediate vicinity of the user.
Wireless Connectivity: PANs often use wireless technologies such as Bluetooth,
Zigbee, Wi-Fi Direct, or Near Field Communication (NFC) to enable communication
between devices without the need for physical cables.
Device Interconnection: The primary purpose of a PAN is to facilitate communication
and data sharing between personal devices, allowing users to synchronize data, share
files, stream media, and control devices seamlessly.
Applications: PANs support a wide range of applications, including wireless file
sharing, audio streaming, gaming, wireless printing, remote control of smart home
devices, and wearable health monitoring.
Advantages of PAN:
Convenience: PANs offer convenience and flexibility by allowing users to connect
and interact with their personal devices wirelessly, without the constraints of physical
cables. This enables seamless integration and communication between devices,
enhancing user experience and productivity.
Mobility: PANs support mobility, allowing users to move freely within the coverage
area while maintaining connectivity with their personal devices. This mobility is
especially beneficial for users who frequently switch between different devices or
work on the go.
Versatility: PANs support a wide range of devices and applications, making them
versatile and adaptable to various user needs and preferences. Users can easily
connect and interoperate different types of devices, such as smartphones, tablets,
laptops, wearables, and smart home devices.
Ease of Setup: Setting up a PAN is typically straightforward and requires minimal
configuration, especially for wireless PANs using technologies like Bluetooth or Wi-
Fi Direct. Users can quickly establish connections between devices without the need
for complex network configurations.
Disadvantages of PAN:
Limited Range: PANs have a limited coverage range, typically extending only a few
meters from the user. This limited range restricts the distance over which devices can
communicate and may require users to remain close to their devices for effective
connectivity.
Interference: Wireless PANs may experience interference from other nearby wireless
devices operating on the same frequency band. Interference can degrade signal
quality, reduce data transfer speeds, and cause connectivity issues, impacting the
reliability and performance of the PAN.
Security Risks: Wireless PANs are susceptible to security risks such as unauthorized
access, data interception, and device hijacking. Without adequate security measures
such as encryption, authentication, and access control, sensitive information
transmitted over a PAN may be vulnerable to exploitation by attackers.
Dependency on Battery Power: Many devices in a PAN, such as smartphones, tablets,
and wearables, rely on battery power for operation. The dependency on battery power
means that devices may need to be recharged regularly to maintain connectivity,
especially during prolonged use.
II. Based on Ownership:
Private Network:
In network classification, a private network refers to a network infrastructure that is restricted in
access and usage, typically limited to a specific organization, group of users, or a closed
community. Owned and operated by a single organization for its internal use. Examples
include corporate networks, educational institution networks, and government networks.
Key points of Private Network:
Access Restrictions: Private networks enforce access restrictions to control who can connect
to the network and access its resources. Access is usually limited to authorized users or
devices within the organization or community.
Security: Private networks prioritize security to protect sensitive information and resources
from unauthorized access, interception, and tampering. Security measures may include
encryption, authentication, access controls, firewalls, intrusion detection/prevention systems,
and virtual private networks (VPNs).
Ownership and Control: Private networks are owned, operated, and controlled by the
organization or entity that establishes them. This ownership allows for customization,
configuration, and management according to the specific needs and policies of the
organization.
Dedicated Infrastructure: Private networks often use dedicated infrastructure, including
physical cables, routers, switches, servers, and other networking equipment. This dedicated
infrastructure provides greater control over network performance, reliability, and security
compared to shared or public networks.
Performance: Private networks typically offer better performance and reliability compared to
public networks, as they are not subject to the congestion and variability associated with
shared infrastructure. Organizations can prioritize and optimize network traffic to meet their
performance requirements.
Privacy: Private networks afford greater privacy for communication and data exchange
compared to public networks. Users can communicate securely within the private network
without the risk of interception or monitoring by external parties.
Costs: Establishing and maintaining a private network can be costly due to the need for
dedicated infrastructure, equipment, maintenance, and operational expenses. However, the
investment may be justified by the increased security, control, and performance benefits
offered by a private network.
Use Cases: Private networks are commonly used in business environments, government
agencies, educational institutions, healthcare facilities, and other organizations that require
secure, reliable, and controlled communication and data exchange. They support internal
communication, file sharing, application access, and collaboration among employees or
members.
Public Network:
In network classification, a public network refers to a network infrastructure that is openly
accessible to a wide range of users, typically without access restrictions or membership
requirements.
Owned and operated by service providers and made available to the general public for a fee. The
Internet is the most prominent example of a public network.
Key Points of Public Network:
Open Access: Public networks are accessible to anyone with the necessary equipment and
connection capabilities, such as computers, smartphones, or other internet-enabled devices.
Users do not need to be members of a specific organization or community to access the
network.
Shared Infrastructure: Public networks often rely on shared infrastructure, including
telecommunications networks, internet service provider (ISP) networks, and wireless
communication technologies. Multiple users and organizations share the same network
resources, such as bandwidth and network infrastructure.
Security Considerations: Public networks pose security risks due to their open access nature.
Users may be vulnerable to threats such as eavesdropping, data interception, malware attacks,
and unauthorized access to sensitive information. Security measures such as encryption,
authentication, and secure communication protocols are essential for protecting users' data
and privacy on public networks.
Internet: The internet is the most prominent example of a public network. It consists of
interconnected networks operated by ISPs, telecommunications companies, governments, and
other organizations. The internet provides a global platform for communication, information
exchange, and access to online services and resources.
Global Connectivity: Public networks enable global connectivity, allowing users to
communicate and exchange data with individuals, organizations, and resources worldwide.
The internet's interconnected nature facilitates international collaboration, commerce,
education, entertainment, and social interaction.
Service Availability: Public networks offer a wide range of services and resources accessible
to users, including websites, email services, social media platforms, online shopping,
streaming media, and cloud-based applications. Users can access these services from
anywhere with internet connectivity.
Performance Variability: Performance on public networks can vary based on factors such as
network congestion, bandwidth limitations, geographic distance, and the quality of network
infrastructure. Users may experience fluctuations in network speed, latency, and reliability,
particularly during peak usage periods or in areas with limited connectivity.
Costs: Access to public networks may incur costs, such as subscription fees for internet
service, data usage charges, and fees for premium services or content. However, many public
networks offer free or subsidized access to basic internet services in public spaces, libraries,
and community centers.
Regulatory Oversight: Public networks are subject to regulatory oversight and governance by
governments, regulatory agencies, and international bodies. Regulations may address issues
such as network neutrality, privacy protection, data security, and consumer rights related to
internet access and usage.
Use Cases: Public networks are widely used for a variety of purposes, including
communication, information dissemination, entertainment, education, e-commerce,
telecommuting, and remote access to resources. They serve as a vital infrastructure for
modern society, supporting economic, social, and cultural activities on a global scale.
III. Based on Connectivity:
Point-to-Point Network: A network topology where devices are connected directly to each
other. Each connection links only two devices. A point-to-point network refers to a network
architecture where each node (or device) in the network is connected directly to another node,
forming a direct link between them. Point-to-point networks are often used in various
applications, including telecommunications, computer networking, and transportation
systems.
Advantages of Point to Point Network:
Efficiency: Point-to-point connections can provide efficient data transfer because there are no
intermediate devices or nodes between the sender and the receiver.
Scalability: These networks are often scalable since adding more nodes typically involves
establishing additional point-to-point connections rather than reconfiguring the entire
network.
Reliability: Point-to-point connections can offer greater reliability since failures or disruptions
in one connection typically do not affect others.
Dedicated Bandwidth: Each point-to-point connection can offer dedicated bandwidth between
the connected nodes, which can be beneficial for applications requiring high-speed data
transfer.
Security: Point-to-point connections can be more secure since data is transmitted directly
between the communicating nodes without passing through intermediate devices where it
could be intercepted.
Disadvantages of Point to Point Network:
Potentially higher infrastructure costs due to the need for multiple direct connections and
potential scalability challenges in extremely large networks.
Managing and maintaining numerous individual connections can become complex as the
network grows.
Broadcast Network: A broadcast network is a type of network architecture where data
transmitted by one node is received by all other nodes in the network. This broadcasting of
data allows for efficient communication and dissemination of information to multiple
recipients simultaneously.
A network topology where multiple devices are connected to a shared communication medium,
and data sent by one device is received by all other devices on the network. Ethernet LANs
are an example of a broadcast network.
Advantages of Broadcast Network:
Efficient Data Distribution: One of the primary advantages of broadcast networks is their
ability to efficiently distribute data to multiple recipients simultaneously. Instead of sending
individual messages to each recipient, a single broadcast message can reach all nodes
connected to the network.
Simplicity: Broadcast networks often have a simpler architecture compared to point-to-point
networks because they do not require establishing and maintaining individual connections
between every pair of nodes. This simplicity can lead to easier network management and
reduced overhead in terms of configuration and maintenance.
Scalability: Broadcast networks can be highly scalable, allowing for the addition of new
nodes without significant changes to the network infrastructure. As long as the network
medium can support the increased traffic load, new nodes can easily join the network and
participate in data broadcasts.
Resource Sharing: In broadcast networks, resources such as printers, servers, or shared
storage devices can be easily accessed by multiple nodes. This facilitates resource sharing and
collaboration among network users without the need for complex point-to-point connections
or dedicated access mechanisms.
Real-time Communication: Broadcast networks can support real-time communication
applications where timely dissemination of information to multiple recipients is crucial. For
example, in multimedia streaming or live broadcasting scenarios, a broadcast network can
efficiently deliver data to all viewers simultaneously.
Redundancy and Fault Tolerance: The broadcast nature of the network can provide inherent
redundancy and fault tolerance. If one node fails or becomes unreachable, other nodes can
still receive broadcast messages from alternative paths or neighboring nodes, reducing the
impact of single-point failures.
Broadcast-based Protocols: Certain network protocols and services are designed specifically
for broadcast networks, leveraging the broadcast nature to enhance efficiency or provide
unique functionalities. For example, Address Resolution Protocol (ARP) in Ethernet networks
uses broadcast messages to resolve IP addresses to MAC addresses.
Cost-effectiveness: In some cases, broadcast networks can be more cost-effective than point-
to-point networks, especially in scenarios where the infrastructure costs of establishing
individual connections between every pair of nodes are prohibitive. The shared medium in
broadcast networks can allow for cost savings in cabling and network equipment.
Disadvantages of Broadcast Network:
Broadcast Storms: One of the major drawbacks of broadcast networks is the potential for
broadcast storms. A broadcast storm occurs when a large volume of broadcast traffic
overwhelms the network, causing congestion and performance degradation. This can happen
if multiple nodes continuously rebroadcast broadcast messages, leading to a vicious cycle of
increased traffic.
Bandwidth Consumption: Broadcast messages consume bandwidth on the network medium,
and since these messages are received by all nodes, they can lead to inefficient use of
available bandwidth. In scenarios where broadcast traffic is excessive, it can monopolize
network resources and adversely affect the performance of other network communication.
Security Risks: Broadcast networks can pose security risks due to the inherent openness of the
broadcast medium. Since broadcast messages are accessible to all nodes on the network,
sensitive information transmitted in broadcast packets can be intercepted by unauthorized
users. Without proper encryption or access control mechanisms, confidential data may be
compromised.
Limited Privacy: In broadcast networks, data transmitted by one node is visible to all other
nodes on the network. This lack of privacy can be a concern in environments where data
confidentiality is important. For example, in shared LAN environments, users may
inadvertently access or intercept data intended for other users.
Collision Domain: In shared media networks like Ethernet, all nodes connected to the same
segment share the same collision domain. When multiple nodes attempt to transmit data
simultaneously, collisions can occur, leading to retransmissions and degraded network
performance. Broadcast networks may experience higher collision rates compared to point-to-
point networks, especially in densely populated or heavily utilized networks.
Difficulty in Network Troubleshooting: Due to the broadcast nature of the network,
diagnosing and troubleshooting network issues can be more challenging compared to point-
to-point networks. Identifying the source of excessive broadcast traffic or pinpointing specific
network problems may require more sophisticated monitoring and analysis tools.
Scalability Challenges: While broadcast networks can be scalable to a certain extent, there are
limitations to the number of nodes that can efficiently share the broadcast medium. As the
network grows larger or becomes more congested, scalability challenges may arise,
necessitating network segmentation or other scalability solutions.
Management Overhead: Managing broadcast networks, especially in large-scale deployments,
can involve significant overhead. Administrators may need to implement traffic management
policies, monitor network performance, and optimize broadcast traffic to ensure efficient
operation and mitigate potential issues.
IV. Based on Architecture:
Client-Server Network: A client-server network is a common architectural model where
individual devices, called clients, request services or resources from centralized servers.
Servers provide resources such as files, applications, or databases to clients upon request. This
architecture is prevalent in various computing environments, from small-scale setups like
home networks to large-scale infrastructures such as enterprise networks and the internet.
Components of Client Server Network:
Client: A client is typically a device or application that initiates communication with a server
to request services or data. Examples of clients include personal computers, smartphones,
tablets, and IoT devices. Clients are often end-users or end-user devices.
Server: A server is a centralized computing system or application that provides services or
resources to clients upon request. Servers are designed to handle multiple client requests
simultaneously, making them capable of serving numerous clients concurrently. Examples of
servers include web servers, email servers, file servers, and database servers.
Communication: Communication in a client-server network typically follows a request-
response model. Clients send requests to servers, specifying the desired service or resource,
and servers process these requests and respond accordingly. This communication is often
facilitated through network protocols such as HTTP, FTP, SMTP, and TCP/IP.
Centralized Control: In a client-server network, servers act as centralized points of control for
managing resources and providing services. This centralized control facilitates administration,
security enforcement, and resource management within the network.
Scalability: Client-server architectures are inherently scalable, allowing organizations to
accommodate growing numbers of clients and increasing demands for services by adding
additional servers or upgrading existing server hardware.
Reliability and Redundancy: Client-server networks can be designed with redundancy and
fault tolerance mechanisms to ensure high availability and reliability. This may include
deploying redundant servers, implementing load balancing techniques, and employing backup
and recovery strategies.
Security: Security is a critical consideration in client-server networks, as they often involve
transmitting sensitive data between clients and servers. Security measures such as encryption,
authentication, access control, and firewalls are commonly employed to protect data
confidentiality, integrity, and availability.
Advantages of Client-Server Network
Centralized Management: In client server network, network resources and services are
centrally managed on servers. This centralized management simplifies administration tasks
such as software updates, security configurations, and user access control. Administrators can
efficiently monitor and control the network from a central location, enhancing overall
network management.
Scalability: Client-server networks are highly scalable, allowing organizations to
accommodate growing numbers of clients and increasing demands for services. Additional
servers can be added to the network infrastructure to distribute the workload and handle
additional client requests effectively. This scalability ensures that the network can adapt to
changing business requirements and support future growth without significant disruptions.
Resource Sharing: In a client-server network, resources such as files, printers, and databases
are shared centrally through servers. This enables efficient resource utilization and facilitates
collaboration among users. Clients can access shared resources as needed, enhancing
productivity and streamlining workflows within the organization.
Improved Performance: Client-server architectures often result in improved network
performance compared to peer-to-peer networks. Servers are typically equipped with high-
performance hardware and optimized software to handle client requests efficiently.
Additionally, centralized management and resource allocation strategies help minimize
network congestion and latency, resulting in faster response times for client applications.
Enhanced Security: Client-server networks offer enhanced security features compared to
peer-to-peer networks. Security mechanisms such as authentication, access control,
encryption, and firewall protection can be implemented at the server level to safeguard
sensitive data and prevent unauthorized access. Centralized security management allows
administrators to enforce consistent security policies across the network, reducing the risk of
security breaches and data loss.
Reliability and Fault Tolerance: Client-server architectures can be designed with redundancy
and fault tolerance mechanisms to ensure high availability and reliability. Multiple servers
can be deployed in a redundant configuration, allowing for failover and load balancing to
distribute traffic evenly across servers. This redundancy minimizes the impact of server
failures and helps maintain continuous access to network resources and services.
Support for Specialized Services: Client-server networks support a wide range of specialized
services and applications tailored to specific business needs. Servers can be dedicated to
hosting specialized software applications such as web servers, email servers, database servers,
and file servers. This enables organizations to deploy custom-tailored solutions that meet their
unique requirements and optimize performance for specific tasks.
Disadvantages of Client-Server Network
Dependency on Server: Client-server networks rely heavily on servers to provide services and
resources to clients. If the server experiences downtime or malfunctions, clients may be
unable to access essential resources, resulting in disruptions to productivity and workflow.
Single Point of Failure: Since client-server networks centralize resources and services on
servers, these servers become single points of failure. If a server fails or becomes
inaccessible, it can affect multiple clients simultaneously, leading to widespread service
interruptions and downtime.
Cost of Implementation and Maintenance: Setting up and maintaining a client-server network
can be costly, particularly for small businesses or organizations with limited budgets. The
initial investment in server hardware, software licenses, and infrastructure components, as
well as ongoing maintenance and support costs, can be significant.
Complexity: Client-server networks tend to be more complex than peer-to-peer networks,
especially in large-scale deployments. Managing multiple servers, configuring network
services, and ensuring compatibility between client and server components require specialized
knowledge and expertise. This complexity can pose challenges for network administrators
and increase the risk of configuration errors or security vulnerabilities.
Network Bottlenecks: In client-server architectures, network traffic must pass through the
network infrastructure to reach the server and back to the client. This centralized
communication pattern can create bottlenecks, particularly in networks with high client-server
interaction or limited bandwidth. Network congestion and latency can degrade performance
and responsiveness, impacting user experience.
Security Vulnerabilities: While client-server networks offer enhanced security features, they
are also susceptible to security vulnerabilities and attacks. Servers represent lucrative targets
for hackers seeking to exploit vulnerabilities in server software or gain unauthorized access to
sensitive data. Additionally, centralizing resources on servers increases the potential impact of
security breaches, as a successful attack can compromise multiple clients' data and systems.
Scalability Challenges: While client-server networks are generally scalable, scaling them
efficiently can be challenging, particularly as the network grows in size or complexity.
Adding additional servers and expanding infrastructure to accommodate growing numbers of
clients requires careful planning and coordination to maintain performance, reliability, and
security.
Peer-to-Peer (P2P) Network: A decentralized network architecture where all devices are
considered equal peers and can act as both clients and servers. Peers share resources directly
with each other without the need for centralized servers.
Components of Peer to Peer Network:
Peers: Peers are individual devices (such as computers, smartphones, or IoT devices)
connected to the network. Each peer has equal status and can initiate requests for resources or
services as well as respond to requests from other peers. Peers in a P2P network communicate
with one another directly, without relying on centralized servers.
Resource Sharing: One of the primary features of peer-to-peer networks is resource sharing.
Peers can share various types of resources, including files, storage space, processing power,
and internet connections. This distributed sharing allows peers to leverage each other's
resources and collaborate without relying on centralized servers.
Decentralization: Peer-to-peer networks are decentralized, meaning there is no central
authority or single point of control. Instead, control and decision-making are distributed
among the network's peers. This decentralization promotes resilience and fault tolerance, as
the network can continue to function even if some peers are unavailable or disconnected.
Dynamic Topology: Peer-to-peer networks often have dynamic topologies, with peers joining
and leaving the network dynamically. Peers can connect to or disconnect from the network at
any time, and the network topology adjusts accordingly. This dynamic nature enables flexible
scalability and adaptability to changing network conditions.
Self-Organization: Peer-to-peer networks typically rely on self-organization mechanisms to
facilitate resource discovery, routing, and communication among peers. Peers may use
protocols such as Distributed Hash Tables (DHTs) or gossip protocols to maintain network
connectivity and locate resources efficiently without central coordination.
Scalability: Peer-to-peer networks are inherently scalable, as the addition of new peers does
not impose a significant burden on the network infrastructure. The distributed nature of
resource sharing and communication allows peer-to-peer networks to scale organically as
more peers join the network.
Security and Privacy Challenges: Peer-to-peer networks face unique security and privacy
challenges due to their decentralized and distributed nature. Ensuring data confidentiality,
integrity, and authenticity can be challenging, as peers may not fully trust each other.
Additionally, malicious peers may attempt to exploit vulnerabilities or launch attacks, such as
Distributed Denial of Service (DDoS) attacks or Sybil attacks, to disrupt the network or
compromise its integrity.
Performance Considerations: While peer-to-peer networks offer benefits such as resource
sharing and decentralization, they may also face performance limitations, particularly in
large-scale deployments or networks with high churn rates. Ensuring efficient resource
discovery, routing, and communication while minimizing latency and network overhead
requires careful design and optimization.
Advantages of Peer to Peer Network:
Table: 5.2 List of advantages of Peer to Peer Network
Decentralization: P2P networks operate without a central server or authority, distributing
control and decision-making among network peers. This
decentralization promotes resilience and fault tolerance, as the
network can continue to function even if individual peers fail or leave
the network.
Scalability: P2P networks are inherently scalable, as the addition of new peers does
not impose a significant burden on the network infrastructure. The
distributed nature of resource sharing and communication allows P2P
networks to scale organically as more peers join the network.
Resource Sharing: One of the primary advantages of P2P networks is resource sharing. Peers
can share various types of resources, including files, storage space,
processing power, and internet connections, directly with one another.
This distributed sharing allows peers to leverage each other's
resources and collaborate without relying on centralized servers.
Reduced Infrastructure
Since P2P networks do not require centralized servers, they can
Costs: significantly reduce infrastructure costs compared to client-server
architectures. Peers in a P2P network contribute their resources, such
as storage space and bandwidth, to the network without the need for
costly server hardware and maintenance.
Flexibility and
P2P networks offer flexibility and adaptability to changing network
Adaptability: conditions. Peers can join or leave the network dynamically, and the
network topology adjusts accordingly. This dynamic nature enables
P2P networks to accommodate
Each network topology has its advantages and disadvantages, and the choice of topology depends on
factors such as the size and requirements of the network, budget constraints, and the need for
scalability and fault tolerance.
5.7 Network Types
Computer networks can be classified into various types based on their size, purpose, and geographical
coverage. Here are some common types of computer networks:
These are some of the primary types of computer networks, each serving specific purposes and
catering to different networking needs.
Each type of transmission medium has its advantages and disadvantages, and the choice depends on
factors such as data transfer requirements, distance, cost, environmental conditions, and network
architecture.
Network protocols are sets of rules that define communication between devices in a network. These
protocols define the format, timing, sequencing, and error control of data exchange, ensuring that
devices can communicate effectively and reliably. Each protocol has its own strengths and
weaknesses, and the choice of protocol depends on factors such as the specific requirements of the
application, security concerns, and network conditions.
Data Formatting: Protocols define how data is formatted before transmission, including the
structure of headers, data fields, and trailers. This formatting ensures that devices can
understand and interpret the data correctly.
Addressing: Protocols specify how devices are addressed within a network, allowing data to
be sent to specific destinations. This includes the format of network addresses (such as IP
addresses) and the rules for routing data to the correct destination.
Handshaking: Protocols often include mechanisms for establishing and terminating
communication sessions between devices. Handshaking protocols define how devices
negotiate parameters, synchronize their communication, and acknowledge the receipt of data.
Error Detection and Correction: Many protocols include mechanisms for detecting and
correcting errors that may occur during data transmission. This can involve adding checksums
or error-correcting codes to transmitted data and requesting retransmission of corrupted or
lost data.
Flow Control: Protocols may include flow control mechanisms to regulate the flow of data
between devices, preventing one device from overwhelming another with data. Flow control
can involve techniques such as buffering, sliding window protocols, and congestion control.
Multiplexing and Demultiplexing: In networks where multiple devices share a
communication channel, protocols define how data from different sources is multiplexed for
transmission and demultiplexed upon reception. This allows multiple communication streams
to be carried over the same channel.
Security: Some protocols include provisions for securing data transmission and protecting
network resources from unauthorized access or attacks. This can involve encryption,
authentication, access control, and other security measures.
Internet Protocol (IP): A network-layer protocol responsible for addressing and routing
packets across interconnected networks.
IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite. Together, IP
sends packets to their destinations, and TCP arranges the packets in the correct order, as IP
sometimes sends packets out of order to ensure the packets travel the fastest ways.
IP functions similarly to a postal service. When users send and receive data from their device,
the data gets spliced into packets. Packets are like letters with two IP addresses: one for the
sender and one for the recipient. After the packet leaves the sender, it goes to a gateway, like
a post office, that directs it in the proper direction. Packets continue to travel through
gateways until they reach their destinations.
Internet Protocol (IP) is the principal communications protocol used for relaying datagrams
across network boundaries. It's essentially the backbone protocol of the Internet.
Key Points of Internet Protocol
Version: There are two main versions of IP in use today: IPv4 (Internet Protocol
version 4) and IPv6 (Internet Protocol version 6). IPv4 is the older version and is still
widely used, while IPv6 is gradually being adopted to address the limitations of IPv4.
Addressing: IP addresses are used to uniquely identify devices on a network. In IPv4,
addresses are 32 bits long, represented in dotted-decimal notation (e.g., 192.168.1.1).
In IPv6, addresses are 128 bits long, represented in hexadecimal notation.
Routing: IP enables routers to forward packets between networks based on the
destination IP address. Routers use routing tables to determine the best path for
packet delivery.
Connectionless Protocol: IP is a connectionless protocol, meaning it does not
establish a direct connection between sender and receiver before sending data. Each
packet is treated independently and can take different paths to reach its destination.
Best Effort Delivery: IP provides best-effort delivery, meaning it does not guarantee
delivery or provide mechanisms for error recovery. It relies on higher-layer protocols
(e.g., TCP) to ensure reliable data transmission if needed.
Advantages of Internet Protocol
Global Connectivity: IP enables communication between devices across the globe,
forming the basis of the Internet's interconnected network.
Scalability: IP's hierarchical addressing scheme allows for the scalability of the
Internet, accommodating the addition of new devices and networks without major
infrastructure changes.
Flexibility: IP supports various types of network topologies and technologies,
including wired and wireless networks, making it adaptable to diverse networking
environments.
Interoperability: IP facilitates interoperability between different types of networks
and devices, regardless of their underlying hardware or software platforms.
Decentralization: IP's distributed nature decentralizes control over the Internet,
promoting resilience and robustness against failures or attacks.
Disadvantages of Internet Protocol
Security Concerns: IP itself does not provide inherent security mechanisms, leaving
data vulnerable to interception or tampering. Additional protocols such as IPsec are
often required for secure communication.
Quality of Service (QoS) Challenges: IP's best-effort delivery model does not
guarantee timely or reliable delivery of packets, which can be problematic for real-
time applications like voice and video streaming.
Complexity in Network Management: Managing large IP-based networks can be
complex, requiring skilled administrators and sophisticated network management
tools.
Fragmentation Overhead: Packet fragmentation may occur when data packets are too
large to be transmitted over a network without being divided into smaller packets.
This can introduce additional overhead and decrease network performance.
User Datagram Protocol (UDP):
UDP is a connectionless protocol that provides simple unreliable datagram delivery service but
fast communication. Advantages are low overhead, suitable for real-time applications like
video streaming or online gaming. Disadvantages are no error checking or retransmission of
lost packets, less reliable than TCP for critical data transmission.
Key Points of User Datagram Protocol
Connectionless Communication: UDP provides a connectionless communication
service, meaning it does not establish a connection before sending data and does not
guarantee delivery or order of packets.
Minimal Overhead: UDP has minimal overhead compared to connection-oriented
protocols like TCP (Transmission Control Protocol), making it lightweight and
efficient for certain types of applications.
Unreliable Delivery: UDP does not provide mechanisms for error detection,
correction, or acknowledgment, so it does not guarantee delivery of packets.
Simple Header Format: UDP headers are smaller and simpler compared to TCP
headers, consisting of only source and destination port numbers and a length field.
Low Latency: Because UDP does not perform extensive error checking or ensure
delivery, it can offer lower latency compared to TCP, making it suitable for real-time
applications like video streaming and online gaming.
Advantages of User Datagram Protocol
Low Overhead: UDP has minimal overhead because it does not require establishing
and maintaining a connection, making it efficient for transmitting small packets of
data.
Suitable for Real-Time Applications: UDP's connectionless nature and low latency
make it suitable for real-time applications where maintaining a continuous flow of
data is more important than ensuring every packet is delivered, such as VoIP (Voice
over Internet Protocol) and online gaming.
Broadcast and Multicast Support: UDP supports broadcasting and multicasting,
allowing a single packet to be sent to multiple recipients simultaneously.
Simplicity: UDP is simpler than TCP, making it easier to implement and requiring
fewer system resources.
Disadvantages of User Datagram Protocol
Unreliable Delivery: UDP does not guarantee delivery or order of packets, making it
unsuitable for applications that require reliable data transmission, such as file transfer
or email.
No Flow Control or Congestion Avoidance: UDP does not provide flow control or
congestion avoidance mechanisms, so it can potentially overwhelm network
resources in situations of high traffic.
No Error Detection or Correction: UDP does not include mechanisms for error
detection or correction, so corrupted or lost packets are not automatically
retransmitted.
Limited Support for Large Data Transfers: UDP's maximum packet size is limited,
which can pose challenges for applications that require large data transfers, such as
file downloads or database queries.
HTTP (Hypertext Transfer Protocol): A protocol for transmitting hypermedia documents,
such as web pages and files, over the Internet.
HTTP is used for transmitting web pages, while HTTPS encrypts data for secure
communication. It is simple and widely supported, allows for efficient retrieval of web
resources. Issues are lack of security in HTTP, HTTPS can introduce additional overhead
due to encryption.
Key Points of Hypertext Transfer Protocol
Client-Server Protocol: HTTP follows a client-server model, where a client (such as a
web browser) sends requests to a server (such as a web server) and receives responses
containing web content.
Stateless Protocol: HTTP is stateless, meaning each request-response cycle is
independent of previous ones. The server does not retain information about past
requests from the same client.
Text-Based Protocol: HTTP messages are text-based, making them human-readable
and easy to interpret. HTTP requests and responses consist of headers and, optionally,
a message body.
Standardized Protocol: HTTP is standardized by the Internet Engineering Task Force
(IETF) and defined in RFC 7230.
Supports Secure Version (HTTPS): HTTPS (HTTP Secure) is a secure version of
HTTP that encrypts data exchanged between the client and server using SSL/TLS
protocols, providing confidentiality and integrity.
Advantages of Hypertext Transfer Protocol
Universal Compatibility: HTTP is widely supported by various platforms, devices,
and web browsers, making it accessible for users across different environments.
Simple and Lightweight: HTTP is a simple and lightweight protocol, making it
efficient for transmitting web pages and other hypermedia content over the Internet.
Caching Support: HTTP supports caching, allowing web browsers and proxy servers
to store copies of previously accessed web content, which can improve performance
and reduce bandwidth usage.
Flexible: HTTP supports various methods (such as GET, POST, PUT, DELETE) for
interacting with web resources, providing flexibility for different types of web
applications.
Easy to Debug: HTTP messages are human-readable, making it easier for developers
to debug and troubleshoot issues with web applications using tools like browser
developer consoles or network sniffers.
Disadvantages of Hypertext Transfer Protocol
Security Concerns: Traditional HTTP is not encrypted, so data transmitted over
HTTP is vulnerable to interception and tampering by malicious actors. This lack of
security can compromise the confidentiality and integrity of sensitive information.
Limited Performance: HTTP is not optimized for high-performance applications that
require low latency and high throughput, as it may introduce overhead due to its text-
based nature and stateless design.
No Built-in Authentication: HTTP does not provide built-in mechanisms for user
authentication or access control, requiring developers to implement additional
security measures, such as session tokens or OAuth.
No Support for Binary Data: HTTP is primarily designed for transmitting text-based
data, so handling binary data efficiently may require additional encoding or
encapsulation techniques.
Potential for Content Spoofing: Without proper security measures, HTTP responses
can be manipulated by attackers to inject malicious content or perform content
spoofing attacks, leading to phishing or malware distribution.
Simple Mail Transfer Protocol (SMTP): SMTP is used for sending emails between servers.
A protocol used for sending and receiving email messages over the internet. It is simple and
efficient for sending emails. Issues are lack of encryption by default, susceptible to spam and
phishing attacks.
File Transfer Protocol (FTP): A protocol used for transferring files between a client and a
server on a computer network.
FTP is efficient for large file transfers, supports various authentication methods. Issues are lacks
encryption, prone to security risks such as data interception or unauthorized access.
Workforce Education
and
Employment
Healthcare
Healthcare
industry:
Figure 6.3 Applications of Information Technology in Business and Industry
Enterprise Resource Planning (ERP) Systems: ERP systems integrate core business processes
such as finance, human resources, supply chain management, and customer relationship
management into a single unified platform. They streamline operations, enhance
collaboration, and provide real-time insights for decision-making.
Customer Relationship Management (CRM) Systems: CRM systems help businesses manage
interactions with customers and prospects throughout the customer lifecycle. They store
customer data, track sales leads, automate marketing campaigns, and improve customer
service and retention.
Supply Chain Management (SCM) Systems: SCM systems optimize the flow of goods,
information, and finances across the supply chain, from procurement and production to
distribution and logistics. They improve visibility, coordination, and efficiency while
reducing costs and risks.
Business Intelligence (BI) and Analytics: BI and analytics tools enable businesses to analyze
and interpret data to gain actionable insights and make informed decisions. They support data
visualization, predictive analytics, and performance monitoring across various business
functions.
E-Commerce and Online Retail: E-commerce platforms enable businesses to sell products
and services online, reaching a global audience and expanding their market reach. They
provide features such as online storefronts, payment processing, inventory management, and
order fulfillment.
Digital Marketing: Digital marketing encompasses various online strategies and channels,
including search engine optimization (SEO), social media marketing, email marketing,
content marketing, and online advertising. IT enables businesses to reach target audiences,
engage customers, and drive sales through digital channels.
Cloud Computing: Cloud computing provides on-demand access to computing resources such
as storage, processing power, and software over the internet. It offers scalability, flexibility,
and cost savings for businesses by eliminating the need for on-premises infrastructure and
enabling remote access to applications and data.
Collaboration and Communication Tools: Collaboration and communication tools such as
email, instant messaging, video conferencing, and project management platforms facilitate
teamwork, knowledge sharing, and communication among employees, partners, and
stakeholders.
Mobile Applications: Mobile applications enable businesses to deliver products, services, and
information to customers and employees through smartphones and tablets. They enhance
mobility, accessibility, and user experience while supporting features such as mobile
commerce, mobile banking, and enterprise mobility solutions.
Cyber Security Solutions: Cybersecurity solutions protect businesses from cyber threats such
as malware, ransomware, phishing, and data breaches. They include antivirus software,
firewalls, encryption tools, intrusion detection systems (IDS), and security training programs
to safeguard digital assets and sensitive information.
6.2.2 Applications of Information Technology in Railway
Information technology (IT) has significantly transformed the railway industry, enhancing safety,
efficiency, and customer experience. As technology continues to evolve, railways will continue to
leverage IT solutions to address emerging challenges and opportunities in the industry.Here are some
key applications of information technology in railways:
Train Management Systems: IT systems manage various aspects of train operations, including
scheduling, routing, and tracking. Train management systems optimize train movements,
reduce delays, and improve operational efficiency by monitoring train positions, speeds, and
schedules in real-time.
Figure 6.4 Applications of Information Technology in Railway
Signaling and Control Systems: IT-based signaling and control systems ensure safe and
efficient train operations by managing track occupancy, signaling, and interlocking. These
systems use advanced technologies such as computer-based interlocking (CBI), automatic
train control (ATC), and positive train control (PTC) to prevent collisions, derailments, and
other accidents.
Ticketing and Reservation Systems: IT enables electronic ticketing and reservation systems
that allow passengers to book tickets, check seat availability, and make payments online or
through mobile apps. These systems streamline ticketing processes, reduce queues, and
improve passenger convenience and satisfaction.
Passenger Information Systems: IT-based passenger information systems provide real-time
information to passengers about train schedules, routes, delays, and service updates. These
systems use digital displays, announcements, mobile apps, and website portals to keep
passengers informed and help them plan their journeys more effectively.
Maintenance and Asset Management: IT systems support maintenance and asset management
activities by monitoring the condition of railway infrastructure, rolling stock, and equipment.
Predictive maintenance algorithms analyze data from sensors, onboard diagnostics, and
maintenance records to identify potential failures and schedule maintenance proactively,
minimizing downtime and optimizing asset performance.
Traffic Management and Control Centers: IT-based traffic management and control centers
monitor and control railway operations across entire networks. These centers use centralized
control systems, traffic management software, and communication networks to coordinate
train movements, manage emergencies, and ensure operational efficiency and safety.
Communication Systems: IT enables communication systems that support voice, data, and
video communication between train operators, control centers, maintenance teams, and other
railway personnel. These systems use technologies such as radio, GSM-R (Global System for
Mobile Communications - Railway), and Wi-Fi to facilitate real-time communication and
collaboration.
Passenger Experience Enhancement: IT enhances the passenger experience by providing
onboard amenities such as Wi-Fi connectivity, entertainment systems, and passenger
information displays. These amenities improve comfort, convenience, and satisfaction for
passengers during their journeys.
Fare Collection Systems: IT enables automated fare collection systems that use smart cards,
contactless payment methods, and mobile ticketing apps to streamline fare collection
processes and reduce revenue leakage. These systems improve fare collection accuracy,
efficiency, and security for railway operators.
Big Data Analytics: IT-based big data analytics platforms analyze large volumes of data
generated by railway operations, including train movements, passenger flows, maintenance
records, and ticketing transactions. These analytics provide valuable insights for optimizing
operations, improving service quality, and making data-driven decisions to enhance overall
railway performance.
Information technology (IT) has revolutionized the banking industry, transforming how financial
services are delivered, accessed, and managed. Here are some key applications of information
technology in banking:
Online Banking: IT enables online banking platforms that allow customers to access their
bank accounts, check balances, view transaction history, transfer funds, pay bills, and perform
other banking transactions over the internet. Online banking provides convenience,
accessibility, and 24/7 availability to customers, reducing the need for physical branch visits.
Mobile Banking: IT supports mobile banking applications that enable customers to access
banking services through smartphones and tablets. Mobile banking apps offer similar
functionalities to online banking platforms, allowing users to manage their finances on the go,
receive alerts, deposit checks remotely, and use mobile payment services such as Apple Pay
and Google Pay.
ATM (Automated Teller Machine) Networks: IT powers ATM networks that provide self-
service banking functionalities such as cash withdrawals, deposits, balance inquiries, and fund
transfers. ATMs use technologies such as card readers, PIN pads, and cash dispensers to
automate banking transactions and provide convenient access to cash and banking services.
Electronic Funds Transfer (EFT): IT facilitates electronic funds transfer systems that enable
the electronic exchange of money between bank accounts, businesses, and individuals. EFT
services include direct deposit, wire transfers, Automated Clearing House (ACH)
transactions, and electronic bill payments, enabling fast, secure, and cost-effective money
transfers.
Online Payment Systems: IT enables online payment systems that facilitate e-commerce
transactions and digital payments. Payment gateways, such as PayPal, Stripe, and Square,
process online payments securely, allowing businesses to accept credit card payments, digital
wallets, and other payment methods from customers around the world.
Core Banking Systems: IT supports core banking systems that manage essential banking
functions such as account management, transaction processing, loan origination, and risk
management. Core banking platforms integrate with various banking channels and services to
provide a seamless and unified banking experience for customers and employees.
Fraud Detection and Security: IT provides fraud detection and security solutions that protect
banks and customers from fraudulent activities, identity theft, and cyber attacks. These
solutions use advanced technologies such as artificial intelligence (AI), machine learning,
biometrics, and behavioral analytics to detect suspicious transactions, authenticate users, and
prevent unauthorized access to accounts and sensitive information.
Customer Relationship Management (CRM): IT enables CRM systems that help banks
manage customer interactions, preferences, and relationships. CRM platforms track customer
data, analyze customer behavior, and personalize marketing campaigns and services to
enhance customer satisfaction, loyalty, and retention.
Data Analytics and Business Intelligence: IT-based data analytics and business intelligence
tools analyze banking data to gain insights into customer behavior, market trends, and
business performance. These insights inform strategic decision-making, product development,
risk management, and marketing initiatives, enabling banks to optimize operations and drive
growth.
Regulatory Compliance and Reporting: IT supports regulatory compliance and reporting
requirements by automating compliance processes, maintaining audit trails, and generating
regulatory reports. Compliance management systems ensure that banks adhere to regulatory
standards, such as KYC (Know Your Customer), AML (Anti-Money Laundering), and GDPR
(General Data Protection Regulation), to mitigate risks and maintain regulatory compliance.
These applications demonstrate how information technology has transformed the banking industry,
offering innovative solutions to improve customer experience, streamline operations, enhance
security, and drive business growth. As technology continues to evolve, banks will continue to
leverage IT solutions to adapt to changing market dynamics, customer expectations, and regulatory
requirements.
5 Fraud Detection and IT provides fraud detection and prevention solutions that help
Prevention insurance companies identify and mitigate fraudulent
activities. These solutions use data analytics, predictive
modeling, and anomaly detection algorithms to detect
suspicious patterns, anomalies, and fraud indicators in
insurance claims, applications, and transactions.
6 Customer Relationship IT enables CRM systems that help insurance companies
Management (CRM) manage customer interactions, inquiries, and relationships.
CRM platforms track customer data, communication history,
and preferences, allowing insurers to personalize marketing
campaigns, improve customer service, and enhance customer
retention and loyalty.
7 Telematics and Usage-based IT supports telematics and usage-based insurance programs
Insurance (UBI) that use data from connected devices and sensors to monitor
policyholders' driving behavior, vehicle usage, and risk
exposures. Insurers use telematics data to offer personalized
insurance rates, incentives for safe driving, and risk mitigation
advice to policyholders.
8 Regulatory Compliance and IT assists insurance companies in meeting regulatory
Reporting compliance requirements by automating compliance processes,
generating regulatory reports, and maintaining audit trails.
Compliance management systems ensure that insurers adhere
to regulatory standards such as Solvency II, GDPR, HIPAA,
and state insurance regulations to mitigate risks and maintain
regulatory compliance.
These applications demonstrate how information technology has transformed the insurance industry,
enabling insurers to innovate, improve operational efficiency, enhance customer experience, and
manage risk effectively in a dynamic and competitive market environment. As technology continues
to evolve, insurance companies will continue to leverage IT solutions to adapt to changing market
dynamics, customer expectations, and regulatory requirements.
These applications illustrate how information technology elevates inventory control processes,
enhances accuracy, slashes costs, and fine-tunes supply chain performance for businesses spanning
various sectors. With ongoing technological advancements, businesses will persist in harnessing IT
solutions to innovate and refine their inventory management strategies, adapting to shifting market
dynamics and customer preferences.
6.2.8 Applications of Information Technology in Hotel Management
Information technology (IT) has become essential in hotel management, transforming various aspects
of hotel operations, guest services, and administration. Here are some key applications of information
technology in hotel management:
Property Management Systems (PMS): Property management systems are comprehensive IT
platforms that automate various hotel operations, including reservations, check-ins, check-
outs, billing, room assignments, housekeeping, and guest communications. PMS software
streamlines front desk operations, improves guest service, and enhances overall efficiency.
Online Booking and Reservation Systems: IT enables online booking and reservation systems
that allow guests to book hotel rooms, amenities, and services through hotel websites, online
travel agencies (OTAs), and mobile apps. These systems provide real-time availability,
pricing information, and booking confirmation, enhancing convenience and accessibility for
guests.
Figure 6.6: Applications of IT inHotel Management
E-Learning Platforms: IT enables e-learning platforms that provide online courses, lectures,
tutorials, and educational resources to learners of all ages and backgrounds. E-learning
platforms such as Coursera, edX, Udemy, and Khan Academy offer a wide range of subjects,
allowing learners to study at their own pace and convenience.
Learning Management Systems (LMS): Learning management systems are IT platforms that
facilitate the administration, delivery, and management of educational courses and training
programs. LMS software provides features such as course creation, content management,
student enrollment, assessment, and grading, enabling educators and trainers to deliver
engaging and interactive learning experiences.
Virtual Classrooms and Webinars: IT supports virtual classrooms and web conferencing
platforms that enable synchronous online learning and collaboration. Virtual classroom
software such as Zoom, Microsoft Teams, and Google Meet allows educators to conduct live
lectures, discussions, and interactive sessions with students remotely, fostering engagement
and interaction among participants.
Figure6.7: Applications of IT in Education and Training
Mobile Learning Apps: IT enables mobile learning apps that deliver educational content and
learning experiences to mobile devices such as smartphones and tablets. Mobile learning apps
provide flexibility and accessibility for learners, allowing them to access educational
resources, study materials, and interactive lessons anytime, anywhere.
Interactive Multimedia Content: IT facilitates the creation of interactive multimedia content
such as videos, animations, simulations, and virtual reality (VR) experiences for educational
purposes. Multimedia content engages learners, enhances comprehension, and facilitates
experiential learning across various subjects and disciplines.
Adaptive Learning Technologies: IT supports adaptive learning technologies that personalize
learning experiences based on individual learner preferences, abilities, and progress. Adaptive
learning platforms use algorithms, data analytics, and machine learning to assess learner
performance, provide personalized recommendations, and adjust learning content and pace to
optimize learning outcomes.
Online Assessment and Feedback Systems: IT enables online assessment and feedback
systems that automate the creation, administration, and grading of assessments, quizzes, and
exams. Online assessment platforms provide immediate feedback to learners, track their
progress, and generate detailed performance reports for educators and trainers.
Gamification and Serious Games: IT supports gamification and serious games that
incorporate game elements and mechanics into educational activities to enhance engagement
and motivation. Gamified learning platforms and educational games leverage principles of
game design to make learning more interactive, immersive, and enjoyable for learners of all
ages.
Educational Data Analytics: IT-based educational data analytics tools analyze student data,
learning outcomes, and engagement metrics to gain insights into educational performance and
effectiveness. Data analytics dashboards, reports, and visualizations help educators and
administrators make data-driven decisions, identify areas for improvement, and optimize
instructional strategies.
Professional Development and Training: IT supports professional development and training
initiatives for educators, trainers, and professionals in various industries. Online training
platforms, webinars, and virtual workshops provide opportunities for continuous learning,
skill development, and certification in areas such as teaching methodologies, technology
integration, and professional competencies.
These applications demonstrate how information technology is transforming education and training,
making learning more accessible, interactive, and personalized for learners worldwide. As technology
continues to evolve, education and training institutions will continue to leverage IT solutions to
innovate and adapt to changing learner needs, pedagogical approaches, and technological
advancements.
6.2.10 Applications of Information Technology in Mobile Phones
Information technology (IT) has revolutionized mobile phones in numerous ways, enhancing their
capabilities and transforming them into powerful devices beyond just communication. Here are some
key applications of information technology in mobile phones:
Communication: Mobile phones are primarily communication devices, and IT has vastly
improved this aspect with features like voice calls, text messaging (SMS), multimedia
messaging (MMS), and internet-based communication apps like WhatsApp, Skype, and
Zoom.
Internet Access: IT enables mobile phones to connect to the internet, providing access to a
vast repository of information, online services, social media platforms, and entertainment
content.
1. Computer Games: Computer games are a major source of entertainment for the children
these days. They can install the games on the computer or they can they can play it online also
with other users sitting in some part of the world.
2. Animated Movies: Animated films are another entertainment source these days. Animation
helps the children to learn the subjects by seeing the pictures on the screen which is more
enjoyable rather than reaching the books.
3. Movie Production:Movie production involves multiple elements such as screenwriting,
script-breakdown, location scouting, storyboarding, generating shot-lists, budgeting,
scheduling, recording, and editing. These tasks are carried out by collaborating with many
film industry professionals. Hence, movie production is a complicated and time-consuming
process. The advent of AI will help automate certain production procedures. It can offer a
platform that can automate tasks such as breaking down scripts, storyboarding, generating
shot-lists, creating schedules, and managing movie budgets.
4. Automated Subtitles:Creating and synchronizing subtitles with lip movements in videos and
movies can be a complex assignment. Even a slight delay in displaying the subtitles can result
in audio and subtitles being out-of-sync. Also, in the case of big-budget films, subtitles have
to be created in multiple languages for a global audience. By leveraging AI, filmmakers can
simplify the entire process and reduce the odds of mistakes and de-sync between audio, video
and sub-titles. AI can generate automated subtitles with the help of natural language
processing.
5. Video Games:AI is commonly used in games to control non-player characters (NPCs). NPCs
react to a player’s movement and actions. In modern games, the involvement of AI has
become even more crucial. AI can analyse a player’s actions to predict their future moves.
This makes playing video games a more immersive, interesting and challenging experience.
6. Sports Broadcast:Selecting entertaining shots and angles for sports activities during live
broadcast can be challenging but rewarding as well. Visuals included in the live broadcast
should help build an engaging narrative in a match. Hence, sports broadcasters need to
carefully select which scenes and actions can be shown to deliver an interesting sports
experience for the fans.AI systems can be trained to identify objects and actions in sports
events. It can also use footage captured by drones to deliver broadcast that offers engaging
content as well as deeper sports insights.
7. Social Media: Information technology is also increasing social interaction among the people
through various social networking websites like Twitter, Facebook etc.
8. Television: Television has also introduced the use of information technology in its various
fields like in the news channels we can read the headlines as well can listen to the news. The
sports channel are able to display every type of data like records, achievements of each player
in just a minute only because of records stored in the databases.
2. Networking: Networking helps to connect various branches with each other. It also helps to
connect banking services with customers. With the help of computers money can be
transferred from one account to the other without visiting to the bank by the customer. This
type of transfer of money is known as electronic transfer. Customers can check their
accounts on-line with the help to networking.
3. Cybersecurity & Fraud Detection: AI along with machine learning is capable of easily
identifying fraudulent activities and alerting customers and banks. AI can be a game-changer
in the finance sector to stop cyberattacks.
4. AI Chatbots:By combining chatbots with banking apps, the banks will be available for the
customers round the clock 24*7. Chatbots’ capability to comprehend customer behavior helps
in offering personalized customer support and recommending the right financial services and
products accordingly.
5. Loan & Credit Decisions: An AI-based loan and credit system can examine the behavior
and patterns of consumers with little credit history to decide their creditworthiness, and in
case of unusual behavior, the system sends a warning lowering the chances of default.
6. Tracking & Market Trends:With AI, banks can process big volumes of data and foresee
the latest market trends, currencies, and stocks. Based on this AI can fasten the decision-
making process for clients as well as banks and also can suggest investment options.
7. Data Collection & Analysis:The data generated by banks every day is so huge that it
becomes a tedious and very challenging task for employees to structure it. AI-enabled
solutions can assist in systematic data collecting and analysis in such circumstances. This can
be further utilized in fraud detection or deciding creditworthiness.
8.AI Enhances Customer Experience: AI solution eliminates the time taken by customers to
complete tasks such as completing the Know Your Customer (KYC) process, applying for
loans and credit by automating them.
1. Customers Record: Computers are used to keep the record of customers (insurer),
customer’s policy and terms and conditions of the policy. Insurance companies use
information technology to send the reminder or notice to insurers regarding their due
premiums.
2. Online Insurance: Insurer can access the website of a company and can get information
about different policies and their items and conditions. Insurers use computer for on-line
insurance and can also pay their premium to the insurance company on line with the help of
computer and internet. They can check the status of their policies on-line with the help of
computer and internet and also get the advice of insurance officer or agent online with the
help of computer and internet even without visiting the office.
3. Fraud Detection & Credit Analysis: The General Insurance Association of Singapore
estimates that around one in five claims the industry receives are either false or
inflated, costing the industry around S$140 million (US$101 million) a year. To combat
fraud, insurers are using AI-driven predictive analytics software to process thousands of
claims each month. By analyzing the claims in milliseconds based on set rules and indicators.
4. Customer Profiling & Segmentation: By automating and applying cognitive
learning to their data collection processes, forward-thinking insurance companies,
automate their customer profiling capabilities. Equipped with the power to unify and
derive insights from their internal and external customer data, insurers are able to
build a more comprehensive picture of their customers, such as their insurance needs,
interests and life stages, for more effective targeting.
5. Product & Policy Design: Another area insurance companies are using AI is to
inform their product and policy design, By streamlining and speeding up the
collection and analysis of massive data from owned channels, third-party sources and
agents, insurers can use machine learning to discover customer trends and interests in
real time. These insights are then being used to develop and improve product and
policy design.
6. Underwriting & Claims Assessment: The process of underwriting is often viewed as
an art based on personal judgment, but AI technologies have also worked their way
into this area of insurance, making the process increasingly scientific.
1. Financial Planning
Nowadays almost all the organizations use computers to create and manage their accounts.
Computers are used by various organizations for financial planning. Companies use
computers to create and maintain its capital budgeting. Computers are used to keep the
record of various transactions accruing in any organization. Computers are also used for
financial forecasting in different organizations computers are used to make some
calculations for the future. The organizations make different plans based on these
calculations.
2. Maintaining Ledgers
Computers are used to maintain ledgers. A ledger is a book having rows and columns that
accountants use for keeping a record of financial transactions and for preparing financial
statements. Computers are used to calculate the profit and loss of anorganization.
3. Online Transactions
With the use of internet and computers, documents and funds can be transferred from one
organization to the other organization.Financial data can be easily transferred with
information technology. Instead of using checks and checking accounts, information
technology can clear a transaction instantly. A debit or credit card purchase is rapidly
compared with the user's account balance, allowing a bank to decide whether to allow a
transaction.
1. Keeping Record
Computers are used to keep the records of stocks available in the shopping malls or stores by the
store peeper.Computers automatically updates the record of stock i.e. it increments the stock
record if an item is added in the stock and decrements the stock record automatically when
item is removed from the stock.BCR (bar code readers) also enables the shop keeper to keep
the records of stock available in the shop.
2. Online Order: Computers are used to send the purchase order on-line to the company from
which items are to be purchased and also the customers receive the bill on-line. With the help
of internet managing committee can get the stock information on-line.
3. Comparing Prices: Computers are used to prepare comparative statements i.e. computers are
used to calculate the minimums prize of the items if the same item is manufactured by
different companies.
4. Smart Shelves: In large departmental stores smart shelves are used which automatically tells
the manager about the item sold. These shelves also keep the record of available stock on the
periodic basis monthly, weekly, daily or annually.
5. Real-time data management: Data is updated in real-time throughout every computing
system connected to the network. This process provides greater clarity on actual inventory
levels and customer sales order history.
The education sector has fully embraced the abundant resources offered by technology.
Information technology is no longer merely an option but a fundamental aspect of effective
learning. Education stakeholders have adeptly woven the use of information technology into
everyday learning processes to enhance educational outcomes.
Figure 6.13: Applications of IT in Education
In the dynamic landscape of hospitality, the integration of Information Technology (IT) has
revolutionized the way hotels operate and deliver services. From streamlining administrative
tasks to enhancing guest experiences, the applications of IT in hotel management are
manifold and transformative. By leveraging innovative digital solutions, hotels can optimize
operations, personalize guest interactions, and gain valuable insights for strategic decision-
making. This introduction sets the stage for exploring the myriad ways IT is reshaping the
hospitality industry, driving efficiency, and elevating guest satisfaction to new heights.
1. Maintaining Database: All the hotels are computerized nowadays. Database of hotels is
maintained and prepared in such a way that it holds the record of each and every facility
available in the hotel. In hotels, managers use computers to keep the record of costumers and
employees.
Figure 6.14: Applications of IT in Hotel Management
2. Online Booking: Customers can access the hotel website and can get information about the
hotel’s location, availability of rooms in the hotel, rent of a room and about the good available
in the hotel. Customers can also book rooms on-line.
3. Managing Hotel Accounts: In hotels, computers are used in finance department as well.
Computers are used to keep the track of the fills of the customers. Accounts of hotels are
maintained by computers. Computers automatically update these accounts.The monthly or
annual report of the hotel is prepared by using computers. This report shows the profit or loss
and thus helps the management in decision making.
4. Computers used at reception Area: Front office manager uses the computers to receive the
complaints and suggestions. This computer is also used to keep record of customers Check in
and check out. Rooms availability, payments and all other services.
QUESTIONS:
1. What are the key components of Information Technology?
2. How has Information Technology evolved over the years?
3. What are some examples of Information Technology tools and systems?
4. How does Information Technology impact society?
5. What are the benefits and challenges of integrating Information Technology into various
aspects of life?
6. How can Information Technology be utilized to address societal issues and improve quality of
life?
7. Applications of Information Technology in Business and Industry
8. How does Information Technology enhance efficiency in business operations?
53. What are some Information Technology tools and models used in weather prediction?
54. Can you discuss the role of data analytics in improving weather forecasting through
Information Technology?
55. Applications of Information Technology in Scientific Application
56. How does Information Technology support scientific research and experimentation?
57. What are some examples of Information Technology applications in scientific data analysis?
58. How has Information Technology advanced scientific simulations and modeling?
59. Applications of Information Technology in Healthcare
60. What are the main Information Technology applications in healthcare management?
61. How does electronic health records utilize Information Technology to store and manage
patient information?
62. Can you discuss examples of Information Technology improving patient care and medical
diagnosis?