You are on page 1of 100

NETWORKING Q.. Write about Communication channels? What are the important characteristics of a communication channel?

A communication channel is the medium that connects the sender and the receiver in data communications network. Common communication channels include telephone lines, fiber optic cables, microwaves, satellite, etc. Different communication channels possess different characteristics that can affect the networks reliability, cost and security. They are: a. Bandwidth: It refers to a channels information carrying capacity. Technically bandwidth represents the difference between highest and lowest frequencies that can be used to transmit data. It is usually measured in terms of Bits per Second (BPS). A communication channel with greater bandwidth will be more useful, because it can transmit more information in less time. Higher bandwidth is essential for applications like real-time video, audio, etc. b. Transmission Rate: It is the data transmission capacity of a telecommunication channel. It depends on the bandwidth. The greater the bandwidth higher will be the transmission rate. c. Transmission Mode: It is the mode in which data are transmitted over the network. There are 2 modes of data transmission namely synchronous and asynchronous transmission. d. Transmission Direction: It is the direction in which data is transmitted. It is categorized into 3 ways Simplex, Half Duplex and Full Duplex. Q.. Briefly explain various types of communication services used to transmit data. Normally, an organization uses one of the common carrier services to carry messages from one station to another station. Following is a brief description of these services: a. Narrow band service: Usually, this service is used where data volume is relatively low. The transmission rate range from 45 to 300 bits per second. Example of this are telephone companies typewriters exchange service (TWX), Telex service. b. Voice band services: Voice band services use ordinary telephone lines to send data messages. Transmission rates vary from 300 to 9600 bits per second or higher. c. Wide band Services: Wide band services provide data transmission rates from several thousands to several million bits per second (9600 to 256000). These services are limited to high-volume users. Such services generally use coaxial cable or microwave communication. Space satellites are using this service to transmit data from one part of the world to another part of the world. Communication services may be either leased or dialed up. A leased line can be exclusively used by the user. It is used when there are continuing data-transmission needs. The dial-up variety requires the person to dial the computer. This alternative is appropriate when there are periodic data to transmit. Q.. Communication software is an essential requirement of data communication system. Explain the various functions of this data communication software? Communication software is a software that manages the flow of data across a network. Following are the important functions of communication software: a. Access control: Linking and disconnecting different devices; automatically dialing and answering telephones; restricting access to authorized users; establishing parameters such as speed, mode, and direction of transmission. b. Network management: Polling (=checking) devices to see whether they are ready to send or receive data; queuing input and output; determining system priorities; routing messages, logging network activity, use and errors. c. Data and file transmission: Controlling the transfer of data, files and messages among various devices. d. Error detection and control: Ensuring that data sent is actually data received. e. Data security: Protecting data during transmission from unauthorized access. Q.. Communication or Transmission protocols. Communication Protocols: For any network to exist, there must be connections between computers and agreements or what is termed as protocols in communications language. Protocols are software that performs a variety of actions necessary for data transmission between computers. Protocols are a set of rules for inter-computer communication that have been agreed upon and implemented by many vendors, users and standard bodies. Ideally, protocols allow heterogeneous computers to talk to each other. At the most basic level, protocols define the physical aspects of communication, such as how the system components will be interfaced and at what voltage levels data will be transmitted, etc. At higher level, protocols define the way data will be transferred such as the establishment and termination of sessions between computers and the synchronisation of those transmissions. At still higher levels,

protocols can standardise the way data is encoded and compressed for transmission. Aspects defined by protocols: A transmission protocol is a set of conventions or rules that must be followed by both the parties to ensure that the information is correctly exchanged. A protocol defines the following 3 aspects of digital communication. (a) Syntax: The format of data being exchanged, character set used, type of error correction used, type of encoding scheme being used. (b) Semantics: Type and order of messages used to ensure reliable and error free information transfer. (c) Timing: Defines data rate selection and correct timing for various events during data transfer. Layers: Communication protocols are defined in layers. The first layer is the physical layer which defines the manner in which nodes in a network are connected to each other. Subsequent layers describe how messages are packaged for transmission, how messages are routed through the network, security procedures and the manner in which messages are displayed. The number of subsequent layers depends upon the protocol. Examples: Several protocols are in common use. For example, X.12 is the standard for Electronic Data Interchange; X.75 is used for interconnection between networks of different countries; XON/XOFF is the de-facto standard for microcomputer data communication; XMODEM is used for uploading and downloading files. TCP/IP protocol being used in internet.

Q.. Write about Open System Interconnection. Meaning: OSI or the Open System Interconnection has been outlined by International Organization for Standardization (ISO). It facilitates communication of heterogeneous hardware or software platforms with each other. Layers: It is defined with the help of following seven layers of functions with their associated controls: a. Layer 1 or Physical Layer is a hardware layer which specifies mechanical features as well as electromagnetic features. Network topology is a part of this layer. b. Layer 2 or Data Link Layer is also a hardware layer which specifies channel access control method and ensures reliable transfer of data through the transmission medium. c. Layer 3 or Network Layer makes a choice of the physical route of transmission of data. It establishes, maintains, terminates, connections between the nodes and ensures proper routing of data. d. Layer 4 or Transport Layer ensures reliable transfer of data between user processes, assembles and disassembles message packets, provides error recovery and flow control. Multiplexing and encryption are undertaken at this layer level. e. Layer 5 or Session Layer establishes, maintains and terminates sessions between user processes. Identification and authentication are undertaken at this layer level. f. Layer 6 or Presentation Layer controls on screen display of data, transforms data to a standard application interface. Encryption, data compression can also be undertaken at this layer level. g. Layer 7 or Application Layer provides user services by file transfer, file sharing, etc. Database concurrency and deadlock situation controls are undertaken at this layer. Q.. Write short notes on network protocols. Meaning: Network protocols which are essentially software are sets of rules for Communicating, timings, sequencing, formatting, and error checking for data transmission. Providing standards for data communication Where they are stored? These rules are embedded or built into the software which reside either in Computers memory or Memory of transmission device Need for protocols: Different protocols cannot talk to each other. To solve this problem, standard protocols have been developed. Functions of Protocols: a. The entire operation of data transmission over a network is broken down into systematic steps. Each step has its own rules or protocols. For example, in OSI model each of the seven layers use different protocols. Accordingly, steps must be implemented in a consistent order. This order is same for every computer in the network, either receiving or sending data. b. At the sending computer, protocols: Breakdown data into packets, Add destination address to the packet, Prepares data for transmission through Network Interface Card (NIC) c. At the receiving computer, protocols: Take data packets from the cable, Bring packets into computer through Network Interface Card (NIC) Strip the packets off any transmitting information, Copy data from packet to a buffer for reassembly, Pass the reassembled data to the application. Protocol Stack: A protocol stack is a combination of set of protocols. Each layer specifies a different protocol

For handling a function or, As a subsystem of the common process, Each layer has its own set of rules
For example: Application Layer initiates or accepts a request from the user. The Presentation Layer adds formatting, displays and encrypts information to the packet. The Session Layer adds traffic flow information to determine when the packet should be sent or received. Transport Layer adds error handling information. The Network Layer does sequencing and adds address information in the packet. The data Link Layer adds error checking information and prepares the data for going to the destination.

Q.. Write short notes on TCP/IP. Meaning: The protocol used on the Internet is called TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP protocol consists of 2 partsa. TCP deals with exchange of sequential data. b. IP handles packet switching and is used on the Internet. TCI/IP has four layers: a. Application Layer: It directly provides services to the users such as e-mail, b. Transport Layer: It provides end-to-end communication between applications and verifies correct packet arrival. c. Internet Layer: It provides packet routing for error checking, addressing and integrity. d. Network Interface Layer: It provides an interface to the network hardware and device drivers. This is also called as Data Link Layer. Steps in transmission of data: TCP/IP creates a packet-switching network. When a message is to be sent over the Internet, The TCP protocol breaks it up into small packets. A header is given to each packet, which consists of destination address. The packets are then sent individually over the Internet. The IP protocol guides the packets so that they arrive at proper destination. Once the destination is reached, the TCP protocol reassembles the packets into the original message. Q.. Write about Broadband networks (ISDN). 1. Meaning: a. Integrated Services Digital Network (ISDN) is a circuit switched telephone network system, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in better quality and higher speeds. b. ISDN is a set of protocols for establishing and breaking circuit switched connections and for advanced call features for the user. 2. Types of channel: a. Bearer channels (B channels): Data and voice are carried by these channels having a bandwidth of 64 kilobits per second. b. Delta channels (D channels): It carries signals and controls. But it can also be used for carrying data. 3. Types of ISDN services: a. Basic Rate Interface (BRI): It consists of two 64 kbps B channels and one 16 kbps D channel to form a total of 144 kbps. It is suitable for individual users. b. Primary Rate Interface (PRI): It consists of 23 B channels and one 64 kbps D channel to form a total of 1536 kbps. It is suitable for users with higher capacity requirements. 4. Advantages: a. Multiple channel operation in same cable: ISDN allows multiple digital channels to be operated simultaneously through the same regular phone cable which is meant for analog signals. However, this is possible only if the telephone companys switches can support digital connections. b. Combines different digital sources: With ISDN, it is possible to combine several digital data sources and send the information to the proper destination. In a digital line it is easy to reduce noise and interference even after combining these signals. Q.. Write about different types of traditional computing models. 1. Mainframe architecture: In mainframe architecture, all the intelligence lies in the central host computer (processor) Users can interact with the host computer through dumb terminals. These terminals can capture keystrokes and send that data to the host computer. Centralized, host-based computing model allows users to share a single computer application, database and peripherals. Limitations: They do not easily support graphical user interface or They dont support access to multiple databases from geographically dispersed sites.

The cost of these systems will be thousands of times more than PCs. But they dont do thousands of
times more work.

2. Personal Computers & workstations: With the introduction of PC and its operating system, independent computing workstations became
popular. These are stand alone computing models. Advantages: They are not connected to the central computer and hence independent. In this model, the processing load on central computer is removed. Limitations: Disconnected personal computers cant share data and expensive resources like disk drives, printers, modems and other peripheral devices. These problems led to the development of network/file server computing model. It links PCs and workstations together in a Local Area Network. So, they can share data and peripherals.

3. File sharing architecture: The original PC networks were based on file sharing architectures. Here the server downloads files from
the shared location to the desktop. The requested users job is then run in the desktop environment. In other words the data sent by the server is processed into information by the workstation. Limitations: The server will send the entire file over the network even though the workstation only requires a few records in the file. If Graphic User Interface (GUI) is added to this model then it increases network traffic, decreases response time and limits customer service. It is not suitable for multi user applications because of the following reasons: (i) this model does not support data concurrence i.e. simultaneous access to a file by multiple users (ii) when several workstations request and send several files in a LAN, then the overall performance of the network will degrade. It can only satisfy about 12 users simultaneously. With the advent of less expensive but more powerful computer hardware the file server architecture has become outdated.

Q.. Write about Client Server model. (RTP) Meaning: Client server technology is an advancement of the traditional computing models. Client/Server (C/S) refers to a computing technology in which the hardware and the software components (i.e., clients and servers) are distributed across a network. It is a technology in which the server software accepts requests for data from client software and returns the results to the client. The client processes the data and presents the results to the user. Client server technology intelligently divides the processing work between the server and the workstation. The server handles all the global tasks while the workstation handles all the local tasks. The server only sends those records to the workstation that are needed to satisfy the information request. As a result network traffic is significantly reduced. This is a versatile, message based and modular infrastructure. It improves usability, flexibility, interoperability and scalability when compared to centralised, mainframe, time sharing computing. This is very fast, secure, reliable, efficient, inexpensive and easy to use. The use of LANs has made the client/server model even more attractive to organisations. Q.. What is the necessity to shift to client server computing technology? Introduction: Client/server is described as a cost-reduction technology. These technologies include client/server computing, open systems, fourth generation languages and relational databases. Cost reduction is the main reasons for changing to client server technology. These systems also help to improve control, increase data integrity and security, increase performance and better connectivity. Following are the main reasons for the adoption of client server technology. Improving the Flow of Management Information Better Services to End-User Departments. Lowering IT costs The ability to manage IT costs better Direct access to required data High flexibility of information processing Direct control of the operating system Client server technology has been defined as the provision of information that is required by a user, which is easily accessed despite of the physical location of the data within the organisation. Q.. Mention some areas where client server systems are being used? Following are some of the areas where client server technology is currently being used. Online banking application

Internal call centre application Applications for end-users that are stored in the server E-commerce online shopping page. Intranet applications. Financial, Inventory applications based on the client server technology Tele communication based on Internet technologies.
Q.. What are the benefits of Client Server technology? Discuss the impact of Client server technology to the users of mainframe systems. (RTP) Client/server systems bring tremendous benefits to new users, especially the users of mainframe systems. Many businesses are currently in the process of changing or in near future will change from mainframe (or PC) to client / server systems. Following are the benefits of client/server technology: a. People in the field of information systems can use client/server computing to make their jobs easier. b. Reduce the total cost of ownership. c. Increased Productivity i.e. End user productivity & Developer productivity d. Takes less people to maintain a client/server application than a mainframe. e. The expenses of hardware and network in the client/server environment are less than those in mainframe environment. f. Since applications can be easily divided among different users, efficiency will be high. g. Reduce the cost of clients computer. The server stores data for the clients. So, it is not necessary for clients to have large amounts of disk space. Therefore, less expensive network computers can be used. h. Reduce the cost of purchasing, installing, and upgrading software programs and applications on each client computer. Delivery and maintenance will be done from one central point i.e. server. i. The management control over the organisation will be increased. j. It is very easy to implement client/server system than any other systems. k. Leads to new technology and the move to rapid application development such as object oriented technology. l. Long term cost benefits for development and support. m. Easy to add new hardware to support new systems such as document imaging and video conferencing which are not feasible under mainframe environment. Q.. What are the characteristics of Client server technology? There are 10 characteristics that reflect the key features of a client / server system. These ten characteristics are as follows: a. Components: Client/server architecture consists of a client process and a server process that can be distinguished from each other. b. Separate platforms: The client portion and the server portions can operate on separate computer platforms. c. Individual upgradation: Either the client platform or the server platform can be upgraded without upgrading the other platforms. d. Concurrent service: The server is able to service multiple clients concurrently. In some client/server systems, clients can access multiple servers. e. Networking capability: The client/server system includes some sort of networking capability. f. Application logic: A significant portion of the application logic resides at the client end. g. Initiation of action: Action is usually initiated at the client end, not at the server end. h. GUI: A user-friendly Graphical User Interface (GUI) generally resides at the client end. i. SQL: Structured Query Language (SQL) is a common characteristic of majority client/ server systems. j. Security: The database server will provide data protection and security. Q.. Discuss the components of a client server technology? (RTP) Following are the components of C/S technology: 1. Client: (M04 - 1M) Generally clients are the personal computers. They are the users of the services offered by the servers. Basically, there are 3 types of clients. a. Non-Graphical User Interface (GUI) clients: They require minimum amount of human interaction. E.g. ATMs, cell phones, fax machines, robots, etc. b. GUI-Clients: They are human interaction models. They involve object/action models like pull-down menus in Windows. c. Object-Oriented User Interface (OOUI) Clients: They have further expanded visual formats, multiple workplaces and object interaction rather than application interaction. 2. Server: Servers are the systems which provide required data to the clients. Servers receive requests from the client and regulate access to shared resources. Following are different types of servers File servers help to share files across a network by maintaining a shared library of documents, data, and images. Database servers can execute Structured Query Language (SQL) requests from clients. Transaction servers execute a series of SQL commands, Web servers allow clients and servers to communicate with a universal language called HTTP. 3. Middleware: The network system implemented within the client/server technology is known as middleware. Middleware is the software needed to allow clients and servers to interact. Middleware allows for communication, directory services, queuing, distributed file sharing and printing. Generally, middleware

consists of four layers - Service, Back-end Processing, Network Operating System and Transport Stacks. 4. Fat-client or Fat-server: Fat-client and fat-server are popular terms in computer literature. In a fat-client system, most of the processing takes place in the client. E.g. file server or database server. Fat-servers place more emphasis on the server and try to minimize the processing done by clients. Examples of fatservers are transaction, GroupWare, and web servers. Fat-clients are also known as 2-Tier systems and fat-servers are known as 3-Tier systems. 5. Network hardware: The network hardware is the communication cords and the devices that link the server and the clients. The communication and data flow over the network is managed and maintained by network software.

Q.. Write about various types of servers? 1. Database Servers: Database Management Systems (DBMS) can be divided into 3 primary components: development tools, user interface, and database engine. The database engine does all the selecting, sorting and updating. Currently, most DBMS combine the interface and engine on each user's computer. Database servers split these two functions, allowing the user interface software to run on each user's PC (the client), and running the database engine in a separate machine (the database server) shared by all users. This approach can increase database performance as well as overall LAN performance because only selected records are transmitted to the user's PC, not large blocks of files. The database engine must handle multiple requests. So, the database server itself is a bottleneck when a large number of requests are pending. Database servers offer real potential for remote database access and distributed databases. The database server sends only selected database record(s) to the client machine (instead of large blocks of data). So, remote access over relatively slow telephone lines can provide acceptable performance. In addition, a client computer can make requests to multiple servers regardless of physical location. 2. Application Servers: An application server is a server program that resides in the server (computer) and provides the business logic for the application program. The server program is a program that provides its services to the client program. Application servers are mainly used in web-based applications that have 3-tier architecture. First Tier: Front End - Browser (Thin Client) - a GUI interface lying at the client/workstation. Second Tier: Middle Tier - Application Server - set of application programs. Third Tier: Back End - Database Server. The application server is a second/middle tier of the three-tier architecture. In other words, application servers are now an integral part of 3 three-tier architecture. The application server syncs and combines with the web server for processing the request made by the client. If we look at the request-response flow, the client's request first goes to the web server, which then sends the required information to the application server. It then sends the response back to the web server after taking an appropriate action. The web server then sends the processed information back to the client. Web servers use different approaches or technology for forwarding or receiving back processed information. Some of the most common approaches are given below. CGI (Common Gateway Interface): Can be written either in JAVA, C, C++, or Perl. ASP (Active Server Pages): A Microsoft Technology JSP (Java Server Pages): Java Servlets - Sun's Technology Java Script (Server Side): Netscape technology which requires livewire for database connectivity. Features of the Application Servers: a. Component management: It provides tools to managers for handling all the components and runtime services like session management, synchronous/asynchronous client notifications and executing server business logic. b. Fault tolerance: Ability of the application server with no single point of failure, defining policies for recovery and fail-over recovery in case of failure of one object or group of objects. c. Load balancing: Capability to send the request to different servers depending on the load and availability of the server. d. Transaction Management. e. Management Console: Single point graphical management console for remotely monitoring clients and server clusters. f. Security: There are security features for applications security. Types of application servers: a. Web Information Servers: This type of server employs HTML templates and scripts to generate pages incorporating values from the database in them. These types of servers are stateless servers. Such servers include Netscape Server, HAHT, Allaire, Sybase, and Silver Stream. b. Component Servers: The main purpose of these servers is to provide database access and transaction processing services to software components including DLLs, CORBA, and JavaBeans. First, they provide environment for server-side components. Second, they provide access to database and other services to the component. These types of servers are stateless. Examples include MTS

(which provides an interface for DLL), Sybase Jaguar, and IBM Component broker. c. Active Application Server: This type of server supports and provides a rich environment for serverside logic expressed as objects, rules and components. These types of servers are most suitable for dealing with based e-commerce and decision processing. 3. Print Servers: Print servers provide shared access to printers. Most LAN operating systems provide print service. Print service can run on a file server or on one or more separate print server machines. Non-file server print servers can be dedicated to the task of print service. 4. Transaction Servers: MTS or Microsoft Transaction Server is an integral part of Windows NT, and is installed by default as part of the operating system in NT 5. It is part of the system that is available in the background whenever one of our applications requires it. Control and configuration of MTS is via either a snap-in to the Microsoft Management Console, or through the HTML administration pages that are included with MTS. This is very similar to the interface provided for Internet Information Server 4, and gives an integrated management function that is useful when building and setting up distributed applications. 5. Internet Servers : a. File server: It is one of the simplest servers. It manages requests from clients for files stored in the servers local disk. A central file server permits groups and users to share and access data in multiple ways. Central file servers are backed up regularly and administrators may put disk space quotas for each user or group of users. b. Mail server: A mail server is the most efficient way to receive and store electronic mail messages for a group of users. A central mail server can run for 24 hours a day. The mail server can also provide a global e-mail directory for all community and users. E.g.: "Eudora" is a powerful cross-platform email client that receives incoming mail messages from and sends outgoing mail messages to a mail server. c. DNS server: Domain Name Service is an Internet-wide distributed database system that documents and distributes network-specific information, such as the associated IP address for a host name and vice versa. The host that stores this database is a name server. d. Gopher server: Gopher is an Internet application that uses multiple Gopher servers to locate images, applications, and files stored on various servers on the Internet. For example, "Veronica" is a Gopher application that searches databases of the file contents of worldwide Gopher servers which help to locate Gopher resources. e. Web server: The World Wide Web (WWW) is a very popular Internet source of information. Web browsers present information to the user in hypertext format. f. FTP server: File Transfer Protocol (FTP) is an Internet-wide standard for distribution of files from one computer to another. The computer that stores files and makes them available to others is a server. Client software is used to retrieve the files from the server. g. News server: Usenet News is a world wide discussion system consisting of thousands of news groups organized into hierarchies by subject. Users read and post articles to these newsgroups using client software. The "news" is held for distribution and access on the news server. h. Chat server: Some organizations choose to run a server that will allow multiple users to have "real-time" discussions, called "chats" on the Internet. Some chat groups are moderated. However, most of them are unmoderated public discussions. Further, most chat servers allow the creation of "private" chat rooms where participants can "meet" for private discussions. "Chat" is a graphical form of an Internet service called IRC, or Internet Relay Chat. i. Caching server: A caching server is employed when we want to restrict our number of accesses to the Internet. Basically, a caching server sits between the client computer and the server that would normally fulfill a clients request. Once the clients request is sent, it is intercepted by the caching server. The caching server maintains a library of files that have been requested in the recent past by various users on the network. If the requested information is available in it then the caching server will send such information without going to the original Internet source. Storing the frequently used information locally is a good way to reduce overall traffic to and from the Internet. A caching server does not restrict information flow. Instead, it makes a copy of requested information,

so that frequently requested items can be served locally, instead of original Internet source. Caching servers can also be connected in a hierarchy so if the local cache does not have the information, it can pass the request to nearby caching servers that might also contain the desired files. j. Proxy server: A proxy server is designed to restrict access to information on the Internet. If we dont want our users to access certain material then a proxy server can be used to refuse the access to such material. A proxy server operates on a list of rules given to it by a System Administrator. Some proxy software uses list of specific forbidden sites, while other proxy software examines the content of a page before it is served to the requester. If certain keywords are found in the requested page, access to it is denied by the proxy server. Technologically, theres no substantial difference between a caching server and a proxy server. The difference comes in the desired outcome of such servers. If we want to reduce the overall amount of traffic between our network and the Internet then a caching server is the best choice. On the other hand, if we want to restrict or prohibit the flow of certain types of information to our network, a proxy server will serve that purpose.

Q.. Write about Intrusion Detection System (IDS)? Meaning: The goal of intrusion detection system is to monitor the network assets, to detect anomalous behavior and misuse. This concept is there for nearly twenty years. But in recent years there is a dramatic rise in its popularity and it is being incorporated into the overall information security infrastructure. Following are different components of IDS: Components of IDS: 1. Network Intrusion Detection (NID): Network intrusion detection deals with information passing in the wire between hosts. Typically referred to as "packet-sniffers," Network intrusion detection devices intercept packets traveling in different communication channels. Once captured, the packets are analyzed in a number of different ways. Some NID devices will simply compare the packet with a database consisting of known attacks and malicious packet "fingerprints", While others will look for anomalous (= abnormal) packet activity that might indicate malicious behaviour. In either case, network intrusion detection should be treated as a perimeter defense. 2. Host-based Intrusion Detection (HID): Host-based intrusion detection systems are designed to monitor, detect and respond to user and system activity and attacks on a given host. Some more robust tools also offer audit policy management and centralization, supply data forensics, statistical analysis and evidentiary support, and in some cases provide some measure of access control. The difference between host-based and network-based intrusion detection is that NID deals with data transmitted from host to host while HID is concerned with what occurs on the hosts themselves. Host-based intrusion detection is best suited to combat (= fight against) internal threats. Majority of computer threats come from within organization. For example, disgruntled employees, corporate spies, etc. 3. Hybrid Intrusion Detection: Hybrid intrusion detection systems offer management of and alert notification from both network and host-based intrusion detection devices. Hybrid solutions provide the logical complement to NID and HID i.e. Central Intrusion Detection Management. 4. Network-Node Intrusion Detection (NNID): Network-node intrusion detection was developed to work around the inherent flaws in traditional NID. Network-node pulls the packet-intercepting technology from the wire and puts it on the host. With NNID, the "packet-sniffer" is positioned in such a way that it captures packets after they reach their final destination i.e. host. The packet is then analyzed just as if it were traveling along the network through a conventional "packet-sniffer." In this approach, network-node is simply another module that can attach to the HID agent. The major disadvantage is that it only evaluates packets addressed to the host on which it resides. On the other hand, traditional network intrusion detection can monitor packets on an entire subnet. "packet-sniffers" are also incapable of viewing a complete subnet when the network uses high-speed communications, encryption or switches since they are essentially "without a sense of smell". But NNID can defend the specific hosts against packet-based attacks in these complex environments where conventional NID is ineffective. Q.. Write about (a) 2 tier (b) 3 tier (c) N tier architecture. 1. 2-tier architecture: Meaning: a. With the appearance of LAN, PCs are being connected to servers also.

b. Servers are mainly database servers which offer data on the server. c. Thus the application intelligence is implemented on the client. d. Since there are only tiered data-server and client, this is called 2-tier architecture. e. This model is still predominant today, f. This is actually opposite to the terminal based system where the entire intelligence lies on the host system. Suitability: 2-tier architecture is suitable in the following situations a. Tools and middleware implemented in client are Relatively inexpensive and well integrated PC-tools and Good Rapid Application Development (RAD) qualities i.e. simple applications can be produced in a comparatively short time. b. Server side uses relatively expensive tools. Limitations: a. Massive applications implemented on PC are expensive to maintain. b. Windows 3.X and Mac systems have tough resource restrictions. For this reason application programmers should be well trained in systems technology, so that they can optimize scarce resources. c. Since the application logic is executed on the PC, in case of a new software release, all personal computers have to be updated. This is very costly, time consuming, complicated and error prone. d. Once the software reaches users desktop it should be installed and then tested for correct execution. Due to distributed character of such a procedure, there is no guarantee that all clients work on the correct copy of the program. 2. 3-tier architecture: In 3-tier architecture, application logic is transferred from the client back to the server. Tiers: It has the following tiers a. Client tier: It is responsible for the presentation of data, receiving user events and controlling the user interface. The actual business logic is moved to application server. Today, Java applets offer an alternative to traditionally written PC applications. b. Application Server tier: This tier is new, i.e., it is not present in 2-tier architecture. Business objects that implement the business rules live here, and are available to the client-tier. This level is the central key to solve 2-tier problems. It protects the data from direct access by the clients. Furthermore, the term component is also found here. Today the term describes visual components on the client-side. Components on the server-side can be defined as configurable objects, which can be put together to form new application processes. c. Data-server-tier: This tier is responsible for data storage: Besides the widespread relational database systems, existing legacy systems databases are also used here. Advantages: It solves number of problems that are inherent in 2-tier architecture. a. Clear separation of user-interface-control and data presentation from application-logic: With this separation more clients are able to have access to a wide variety of server applications. The two main advantages for client-application are Quicker development Shorter test phase. b. Dynamic load balancing: If bottlenecks occur in terms of performance then the server process can be moved to other servers at runtime. c. Change management: It is easy and faster to exchange components on the server than to provide number of PCs with new program versions. In addition such components require high standard of quality control. 3. Multi tier (n tier) architecture: Meaning: The client program has only UI code. The UI code talks to the middle tier on which the business and database logic sits. In turn the middle tier talks to the database. If necessary the middle tier can be placed on the same machine as the database. In either case the data traffic is highest between database logic and database. So, the network infrastructure that connects the database logic with the database server needs have very high bandwidth i.e. expensive. Advantages of Multi-tier architecture: The advantages of a multi-tier architecture are: Forced separation of UI and business logic. Low bandwidth network. Business logic sits on a small number of centralised machines.

Q.. What is a data center and what are the different types of data centers?

Meaning: A data center is a centralized repository (= warehouse) for the storage, management and dissemination
(=distribution)

of data and information.

Data center is a highly secure, fault-resistant facilities, hosting customer equipment that connects to
telecommunications networks. The purpose of a data center is to provide space and bandwidth connectivity for servers in a reliable, secure and scaleable environment. Data centres are often referred to as Internet hotel, server farm, data farm, data warehouse, corporate data center, Internet Service Provide (ISP) or Wireless Application Service Provider (WASP). These facilities can accommodate thousands of servers, switches, routers and racks, storage arrays and other associated telecom equipment. This kind of data center may contain a Network Operations Center (NOC), which is a restricted access area, and contains automated systems which constantly monitor server activity, Web traffic, network performance and report even slight irregularities to engineers Thus engineers can spot potential problem before they happen. The primary 'goal' of a data center is to arrange the required state-of-the-art, redundant infrastructure (= additional, more than the required) and systems so as to maximize availability and prevent or mitigate (= minimize) any potential downtime for customers. Different types of Data centers: Data centers serve variety of needs of different businesses. On this basis, data centers can be classified into following two main categories: a. Private Data Centre: A private data center (also called captive or enterprise data center) is managed by the organization's own IT department, and it provides the applications, storage, web-hosting, and ebusiness functions needed to maintain full operations. If an organisation wants to outsource these IT functions, then it turns in to a public data center. b. Public data centers: A public data center (also called internet data centers) provides services ranging from equipment collocation to managing web-hosting. Generally, clients access their data and applications through internet. Features/Requisites of Data centers: Following are the requisites of data centers. Size, Data Security, Availability of Data, Electrical and power systems,

Q.No.45. Write about different tiers in data centers? a. Typically, data centers can be classified in tiers, ranging from tier I to tier IV. Tier I being the most basic and inexpensive and tier 4 being the most robust (= very tough) and costly. If the application is more 'mission critical' then more redundancy, robustness and security are required for the data center. b. A tier 1 data center: Need not have redundant power and cooling infrastructures. It only needs a lock for security and Can tolerate upto 28.8 hours of downtime per year. c. A tier 4 data center: Must have redundant systems for power and cooling, with multiple distribution paths that are active and fault tolerant. access should be controlled with biometric reader and single person entry ways; gaseous fire suppression is required; the cabling infrastructure should have a redundant backbone; and the facility must permit no more than 0.4 hours of downtime per year. d. Tier 1 or 2 is usually sufficient for enterprise data centers because they serve users within a corporation. e. Financial data centers are typically tier 3 or 4 because they are critical to our economic stability and therefore must meet the higher standards set by the government. Q.No.46. Generally which type of organizations need data centers? Any large volume of data that needs to be centralized, monitored and managed centrally needs a data center. Of course, a data center is not mandatory for all organizations that have IT. Everything depends on the size and criticality of data. Data centers are extremely capital-intensive facilities. Commissioning costs amount to millions of dollars and operational costs involved in maintaining redundant connectivity, hardware and human resources, will also be very high. Only for few companies it is economical to commission and operate an enterprise data center. Majority of small, medium and large enterprises host their online and web-enabled applications with established public data centers because they can use the existing infrastructure services, round-the-clock support and monitoring infrastructure. Certain sectors like defence and banks prefer their own infrastructure i.e. private data centers. Q.. What are the features of data centers? (M06, N06, N08 - 5M) A data center is a centralized repository (= warehouse) for the storage, management and dissemination (=distribution) of data and information. Data center is a highly secure, fault-resistant facilities, hosting customer equipment that connects to telecommunications networks. Following are the features of data centers:

1. Size: The most distinguishing feature of data centers is their size of operations. A financially viable data center could contain several hundreds to several thousands of servers. This would require a minimum area of around 5,000 to 30,000 square meters. Apart from this, the physical structure of the data center should be able to withstand the weight of the servers. Thus, there is a need for high quality construction. 2. Data Security: Another critical issue of data centers is the need to provide maximum data security and 100% availability. Data centers should be protected from intruders through access controls and video surveillance (= observation through CCTV cameras, etc). They should be able to withstand natural disasters and calamities like fire, power failures, etc. Disaster Recovery sites must be well maintained. 3. Availability of Data: The goal of a data center is to maximize the availability of data and to minimize the downtime. To do this, redundancy should be maintained in case of all important infrastructure such as connectivity, electrical supply, security and surveillance, air conditioning, fire suppression, etc. 4. Electrical and power systems: A data center should provide highest power availability with Uninterrupted Power Systems (UPS). 5. Security: Physical security and systems security are critical to operations. Thus, it should provide both types of security measures to ensure the security of equipment and data placed at the data center. a. Physical security: It can be achieved through Security guards Proximity card and PIN for door access Biometrics devices 24 x 365 CCTV surveillance and recording b. Data security: Data security within a data center should be maintained at multiple levels. Perimeter security: This is to manage both internal and external threats. This consists of firewalls, intrusion detection and content inspections, host security, anti-virus, access control, administrative tools, etc. Access management: This is for both applications and operating systems that host these critical applications. 6. System monitoring and support: The data center should provide system monitoring and support so that one can be assured that the servers are being monitored round the clock. a. 24x7x365 hours network monitoring b. Proactive customer notification c. Notification to customers for pre-determined events d. Monitoring of power supply, precision air conditioning system, fire and smoke detection systems, water detection systems, generators and uninterruptible power supply (UPS) systems. A data center will be considered as world-class only if there are no shortcuts in providing facilities. Connectivity, electrical supply and security are the three most important requirements of any data center. 7. Storage: In public data centers, data storage runs into multiple terabytes. As the customer requirements differ, data centers usually have hybrid storage and backup infrastructure. Primarily, data center storage can be differentiated into: Primary storage (SAN, NAS, DAS) Secondary storage (tape libraries) Tertiary storage (offline tape storage, such as DAT drives, and magneto-optical drives) Most data centers today operate in hands-off mode i.e. no individual enters the data center unless there is a genuine need. All the storage is operated and managed from remote consoles, located outside the data centers.

Q.. Explain the various types of services provided by data centers? Some of the value added services that a data center provides are: a. Database monitoring: This is done through a database agent, which enables the high availability of database through comprehensive automated management. b. Web monitoring: The main objective is to assess and monitor website performance, availability, integrity and the responsiveness from the visitor's point of view. It also reports on HTTP, FTP service status, monitors URL availability, response times, verifies web content accuracy and changes. c. Backup and restore: They provide centralized, multi-system management capabilities. They also provide an integrated management solution for enterprise data storage using specialised backup agents for operating system, database, open files and applications. d. Intrusion detection system (IDS): ID stands for Intrusion Detection, which is the art of detecting inappropriate, incorrect, or anomalous (=irregular, strange) activity. The term intrusion is used to describe attacks from the outside. Whereas, misuse is used to describe an attack that originates from the internal network. ID systems that operate on a host computer to detect malicious activity on that computer are called host-based ID systems. ID systems that operate on network data flows are called network-based ID systems. The IDS is scalable. e. Storage on demand: It provides back-end infrastructure as well as expertise, best practices and proven processes to give

robust, easy and cost effective storage strategy. It provides data storage infrastructure that supports access to information at any given moment. It also gives security, reliability and availability needed to meet company demands.

Q.. Constituents of a data center / Summarise the essential components of a data centre required for their smooth operation. To keep equipment running reliably, even under the worst circumstances, the data center is built with the following support infrastructure: Network connectivity with various levels of physical (optical fibre and copper) and service (both last mile and international bandwidth) provider redundancy Dual DG sets and dual UPS HVAC systems for temperature control Fire extinguishing systems Physical security systems - swipe card/ biometric entry systems, CCTV, guards and so on. Raised flooring Network equipment Network management software Multiple optical fiber connectivity Network security - segregating the public and private network, installing firewalls and Intrusion Detection Systems (IDS) Q.. What are the various alternative solutions available for eliminating or mitigating downtime in data centres? Disaster Recovery Plans: Data centers need to be equipped with appropriate disaster recovery systems that minimize downtime for its customers. Downtime can be eliminated by having proper Disaster Recovery (DR) Plans for mission-critical types of organisations. Some of the larger IT organizations, which cannot tolerate too much downtime, will set up their DR site as a hot site. Here, both primary and DR sites are kept in real-time synchronisation. Types of DR sites: Following are the different types of disaster recovery plans a. Cold site: It is an alternative facility which does not consist of any resources or equipment, except air conditioning and raised flooring. Equipment and resources must be installed to duplicate the critical business functions of an organisation. Cold sites may vary depending on the communication facilities. b. Warm site: This is an alternate processing site that is only partially equipped. It can be either shared (sharing servers, equipment) or dedicated (own servers). They are similar to cold sites with minimal equipment and resources which are required to start critical operations of a business. c. Hot site: Hot sites are fully equipped with the required facilities and resources needed to recover business functions that are affected by a disaster. Hot sites may vary in the type of facilities offered (such as data processing, communications or any other critical business functions needing duplication). The location and size of the hot site must be proportional to the equipment and resources needed. Q.. State the challenges faced by organisations in the management of data centres. Following are challenges faced by organisations in the management of data centers: a. Maintaining skilled staff and high infrastructure needed for daily data center operations: A company needs to have staff that is expert in network management, has software and hardware skills. The company has to employ large number of such employees, as they have to work on shift basis. b. Maximising uptime and performance: While establishing sufficient redundancy and maintaining water tight security; data centers should maintain maximum uptime and system performance. c. Technology selection: The other challenges that enterprise data centers face is technology selection, which is very crucial for their operations. Another problem is compensating for obsolescence. d. Resource balancing: The enterprise needs to balance reduced operational budgets, increased demands on existing infrastructure, maximise availability, ensuring round-the-clock monitoring and management, periodic upgrades, etc. That is why even some of the largest enterprises in the world prefer public data centres. Q.. What are disaster events? Disasters are disruptions which make the entire facility inoperative for a long period of time (usually more than a day). There is a potential for significant interruption to normal business processing. All disruptions (=disturbances) are not disasters, In case of disaster there is a potential for significant interruption to normal business processing, Business is associated with natural disasters (=calamity) like earthquake, flood, tornadoes, thunderstorms, fire, etc. On the other hand catastrophes are disruptions resulting from disruption of processing facility. Q.. Write short notes on Business Continuity Plan (BCP)?

BCP: A Business Continuity Plan (BCP) is a documented description of action, resources and procedures to be followed before, during and after an event, vital functions to business operations are recovered, Operational in an acceptable time frame.

Steps in the development of BCP:


Phase 1: Define requirements based on business needs This involves risk analysis in critical, vital, sensitive and non critical areas, determining critical time period, applications to be recovered in critical recovery time period and coverage of insurance. Phase 2: Statements of critical resources needed It involves determination of minimum resources necessary, review of operations between current practices and backup procedures (whether they are adequate to support a business resumption plan). Phase 3: Detailed planning on use of critical resources This involves: Identification of most appropriate recovery solutions including information processing and telecommunication recovery, Hot sites which are fully configured and ready to operate within several hours. Warm sites are partially configured with network connections and selected peripheral equipments but without the main computer. Cold sites are ready to receive equipment but do not offer any equipment at the site in advance. It only provides basic environment to operate an information processing facilities. Duplicate information processing facilities. Reciprocal agreements. Preparing a list of alternatives, Visits and reviews Phase 4: Define responsibilities of trained personnel This involves: Plan preparation Provision for requirement of manual process, Document revised work flow, Plan development, Team building, Developing general plan. Phase 5: Written documentations and procedures to cover all operations This involves testing BCP in various phases like Pre-test, Test, Post-test, Paper test, Preparedness test, Review test, Review test results Phase 6: Commitment to maintain plan as per the changing needs This involves Maintenance by BCP Coordinator who has to arrange for scheduled and unscheduled tests, develop a scheduled training, maintain records of test, training and review, update notification directory.

Q.. What is a security program. What are the steps involved in security program? Meaning: Network security consists of provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network accessible resources from unauthorized access and the effectiveness of these measures together. Need for security: The basic objective of providing network security is two fold: (a) to safeguard assets and (b) to ensure and maintain data integrity. Types of security: There are two types of systems security a) Physical security is implemented to protect the physical assets of an organization like personnel, hardware, facilities, supplies and documentation. b) Logical security is intended to control (i) malicious and non-malicious threats to physical security and (ii) malicious threats to logical security itself. Security program: The task of Security Administration in an organization is to conduct a security program which involves the following eight steps: Step 1: Preparing project plan for enforcing security In a sequence, the components of project plan are outlining the objectives of the review

determining the scope of the review and tasks to be accomplished, assigning tasks to the project team preparing resources budget which will be determined by the volume and complexity of the review and fixing a target / schedule for task completion.
Step 2: Assets identification Assets which need to be safeguarded are identified and subdivided into Personnel, Hardware, Facilities, Documentation, Supplies, Data, Application Software and System Software. Step 3: Assets valuation This is a very difficult job. The valuation can differ depending on age of assets the person doing the valuation, the way in which the asset can be lost the period for which it is lost and how old is the asset. Valuation of assets include valuation of logical assets also. For example, the replacement value of the contents in a hard disk may be several times more than the replacement value of the hard disk itself. Step 4: Threats Identification The source of a threat can be external or internal and the nature of a threat can be non-deliberate (accidental) or deliberate. Examples: non-deliberate external threat - act of God. non-deliberate internal threat pollution. deliberate external threat hackers deliberate internal threat - employees. In other words, the sources of threat are the Nature or acts of God like earthquake, flood, fire, extreme temperatures and electromagnetic radiations followed by other sources like Hardware / Software Suppliers, Competitors, Contractors, Shareholders / Debenture holders, Unions, Governmental Regulations, Environmentalists, Criminals / Hackers, Management, Employees and Unreliable Systems. Step 5: Assessment of probability of occurrence of threats The fifth step is assessment of the probability of occurrence of threats over a given time period. This exercise is not so difficult if prior period statistical data is available. If prior period data is not available, it has to be extracted from the associated stakeholders like end users (providing the data aspect) and the management (providing the control aspect) Step 6: Exposure analysis It is done in the following order identify the controls in the place, assess the reliability of the existing controls, evaluate the probability that a threat can be successful and assess the resulting loss if the threat is successful. For each asset and each threat the expected loss can be estimated as the product of the probability of threat occurrence, probability of control failure and the resulting loss if the threat is successful. Step 7: Controls adjustment The controls should be adjusted in such a way that the cost of control is lower than the reduction in the expected losses. The reduction in the expected losses is the difference between expected losses with the (i) existing set of controls and (ii) improved set of controls. Step 8: Report generation Report generation includes documenting the findings of the review recommending new asset safeguarding techniques recommending the existing assets safeguarding mechanisms that should be eliminated / rectified, and also recommending the levels of security to be followed for individual end users and systems.

Q.. Explain the threats and vulnerabilities involved in system security and state the measures to overcome them? The threats to the security of systems assets can be broadly divided into nine categories. Following table shows the threats and vulnerabilities involved in system security and the measures to be taken to overcome them. 1. Fire, Use of fire detection and fire avoiding equipment like automatic fire extinguishers. 2. Water Well designed water protection system. 3. Energy variations like voltage fluctuations, circuit breakage, etc. Use voltage stabilizers, circuit breakers, etc. 4. Structural damages Insurance. 5. Pollution Use dust proof material at the time of construction of computer room and ensure dust free environment. 6. Intrusion like physical intrusion

and eavesdropping - Physical access controls, - prevention of electromagnetic emission, 7. Viruses and Worms Use preventive, detective and corrective controls. 8. Misuse of software, data & services Prepare employees code of conduct. 9. Hackers Through robust logical access controls and/or Cyber laws of the land. Abuse of software, Data and Services can arise in any of the following ways: a. Without any authority, employees may take away the copies of generalized software and proprietary databases of the organization. They may keep it for their own purposes or they may hand it over to competitors, b. Organizations fail to protect the privacy of individuals whose data is stored in databases, c. Employees use system services for their own personal gains and activities,

Q.. Write about the following threats (a) Virus (b) Worms (c) Hackers Virus: A virus is a malicious program that attaches itself to a legitimate program and penetrates into the operating system. A virus is a program that instructs the operating system to append it to other programs and thus propagates to other programs via files containing macros. A virus can replicate itself over and over and the replicated modules can grow independent of the initial virus. Sometimes a virus can be benevolent and it may cause minor disruptions by printing laughing message and sometimes a virus can be malignant and it may delete files or corrupt other programs. Following are the controls to safeguard against the viruses: a. Preventive controls like: using only clean and licensed copies of software, cutting the use of pubic domain software / shareware, downloading files or software only from reliable websites, implementing read-only access to software. checking new files / software with anti-virus software before installation, imparting education and training programs to end users b. Detective controls like: regularly running antivirus software, file size comparison to observe whether the size of programs has changed, date / time comparisons to detect any unauthorized modifications. c. Corrective controls like: maintaining a clean backup, having a recovery plan from virus infections, regularly running antivirus software (which is useful for both detection & removal of virus) Worms: A computer worm is a self-replicating computer program. Worms are similar to viruses but they exist as separate and independent programs. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, worms do not need to attach itself to an existing program. Worms may cause harm to the network. For e.g. they may consume bandwidth. They exploit security weaknesses / bugs in the operating system to penetrate into other systems. Exposures that arise from worms are more difficult to control than that arise from virus. Generally anti virus / anti spyware software can prevent the attacks from Worms. Hackers: Hackers attempt to gain unauthorized entry into a system by circumventing the access control mechanism of the system. They can do this either with good or bad intention. Some hackers may just trespass and read the files without making any changes to them. Some hackers may cause destruction by deleting critical files, disrupting / suspending operations, stealing sensitive data and / or programs. They can be avoided only through robust logical access controls and / or Cyber Laws of the Land.

INPUT OUTPUT DEVICES:


Input devices enable user to enter information and commands into the computer. The most common input devices are Keyboard and Mouse but many more devices have been added to this list in recent times. Output devices return processed data to the user. Most common output devices are Monitors and Printers. Many more sophisticated output devices are also used in these days. ONLINE ENTRY DEVICES These devices uses technique for data entry that avoid capturing data on paper i.e. allow data capturing directly into computer. Following are the most popular online entry devices. KEYBOARD MOUSE TRACKBALL LIGHT PEN JOY STICK TOUCH SCREEN VOICE INPUT Q1.. Write about Keyboard (most common input device) . Meaning: The keyboard is the basic input device in a computer system. It is used for entering text and numbers. A standard keyboard has 101/102 keys and is also known as QWERTY keyboard, where each character is represented by the first six alphabetic keys of keyboard of the top row. The keyboard has number of keys on it, which can be grouped under different categories: Alphanumeric Keys i.e. all the alphabetic keys A Z and number keys 0-9 . Function Keys such as Tab key, Caps Lock key, Enter keys, Keys F1 - F12 etc. Cursor Movement Keys such as arrow keys, page up/down keys, Home/End keys etc. Numeric Keypad i.e. all the ten digits 0-9 and mathematical operators (+,-,*,/ etc) Special Purpose Keys such as Esc, Del, Pause, Print Screen etc.

Q2.. Write about Mouse as an input device. Meaning: Mouse is generally used in GUI environment. Under GUI, a small graphic is used to identify each function or program, such as store, print, etc. When the cursor is placed on the required graphic, user presses a button on the top of the Mouse and such function is activated. This is an ideal (=perfect) input medium, where keyboard cant be used. Types of mice:

MECHANICAL MOUSE

OPTICAL MOUSE

A mouse may be classified as a mechanical mouse or an optical mouse. A mechanical mouse consists of a small box, and a small ball bearing protrudes (=project out, Hang out) from the bottom of it. When the user rotates the mouse, this ball bearing rotates. The direction of rotation is detected by sensors inside the mouse and the signal is sent to the computer, through a cable. The signal is processed and the cursor moves on the display screen. Microsoft, IBM, Logitech, Samsung are some well known manufacturers of mechanical mice. On the other hand an optical mouse uses light beam to detect movement and it may use specially patterned (=designed) mouse pad. (of course todays optical mice do not need this). Number of buttons: A mouse may have one, two or three buttons. The function of each button is determined by the program that uses the mouse. In most of the cases a mouse will have 2 buttons. Q3.. Write about Trackball. A trackball is a pointing device that works like an upside-down mouse. This is an alternative to mouse.

TRACKBALL The user rests (=places) his thumb directly on the ball and his fingers on the buttons. To move cursor around the screen, the ball is rotated with the thumb. Since the whole device is not moved, a track ball requires less space than a mouse. When space is limited, a track ball is very advantageous. That is why track balls are mostly used in mobile computing devices like notebook computers. 2

Q4.. Write about Joystick. A joystick is a screen pointing input device. It consists of a vertical lever usually placed in a ball socket. It can be moved in any direction to control cursor movements for computer games and for some professional applications

JOYSTICK Q5.. Write about touch screens. Introduction:

TOUCH SCREEN

There are several pointing devices, to help users in selecting one among several options. One such input device is a touch screen. It allows users to select one among several options, by touching the screen, either with finger or with another device (like stylus). Now the touch screen can sense the option being selected by the user. Touch Screen was invented by Hewlett Packard. It is a user friendly device & it is very much preferred by nowise users. Popular Technologies: Two popular technologies exist for touch screens. In one technology, the screen is made sensitive to touch and the exact position is detected. In other technology, the screen is lined with light emitting devices (=light releasing devices) on one side and photodetectors on the other. When the user touches the screen, the light beam is broken and is detected by photo-detectors. Q6.. Write about Light pen as an input device. Meaning: A light pen is a touch input device. It is a pointing device which can be used to select an option by simply pointing at it. It can also be used to draw figures directly on the screen. How it works? A light pen has a photo-detector at its tip. This detector can detect changes in brightness of the screen. When the pen is pointed at a particular point on the screen, it records the instant change in brightness and informs the computer about this. With this, the computer can find out the exact spot that the user is pointing on the screen.

LIGHT PEN

3 Where it is used? a. Pointing device: Light-pens are useful for menu-based applications. Instead of moving the mouse or using a keyboard, user can select an option by pointing at it. b. CAD: It is also useful for drawing graphics in CAD. With the help of light pen, an engineer, architect or a fashion designer can draw directly on the screen. Q7.. Write about Voice Input Devices. These devices can recognize human voice and convert the recognized human voice into text data. This type of input device is still not very successful because different people pronounce the words in different ways and it is very difficult to accept all the words in the correct form and also sometime it is difficult for these devices to differentiate between common pronounce words like too and two. Therefore, these systems based on the voice input devices are not widely prevalent yet. Q8.. Write about display devices. What are the important features of display devices? Meaning: Everyone who uses a computer uses some type of display device also. It consists of a television like viewing screen, to which computer output is sent. The 2 most common types of display devices found today are monitors and terminals. Monitors are the most commonly found display devices in microcomputer systems. A monitor is just a box with a viewing screen. A monitor can show both input and output. Features of display screens: Hundreds of varieties of display devices are now available in market. Following are the important features of various display devices: a. Screen Resolution: One of the most important features is the clarity or resolution of the screen. Most display devices form images from tiny dots - called pixels (also known as picture cells). More number of dots means more sharper the image. Images are formed on monitors screen by a card called display adaptor card. b. Text & Graphics: Many display devices can produce both text and graphics output. Text output entirely consists of alphabetic characters, digits and special characters. Graphics output include images such as drawings, charts, photographs, maps, etc. The most important business-related use of graphics is presentation graphics. Presentation graphics can easily convert the information into bar charts, pie charts, line charts etc. Graphics display devices are also used in engineering and scientific applications. Display devices used for these applications are very sophisticated and expensive. 4 Q9.. What is meant by Video Controller? What are the popular video controllers that are being used in Personal Computers?

Video Controller: A video controller acts as an intermediary device between the CPU and the monitor. It contains video-dedicated memory (Video RAM) & other circuitry necessary to send information to the monitor. Most of the video controllers include at least 2 MB of video RAM or VRAM. (This is in addition to the RAM connected to the CPU.) There will be a microprocessor on the video controller and the speed of the microprocessor determines the quality of picture. It is just a circuit board and is usually called as a card (video card or video controller) and is attached to the computers motherboard. The quality of video controller is determined by refresh rate, resolution & number of colors that can be displayed. Popular display adaptors: a. MGA: MGA or Monochrome Graphics Adapter is one of the first adapters. It is a text-only adapter which generates very clear, easy-to-read characters. It works only with monochrome monitor. b. CGA: CGA or Colour Graphics Adapter can display both text and graphics. It can support both colour and monochrome monitors with various resolutions. A CGA adapter provides following two combinations of resolutions: 640 x 200 pixels with 16 colours or 320 x 200 pixels with 4 palettes. Each of these palettes has 4 different colours. Only one palette can be used at a given time. c. EGA: Enhanced Graphics Adapter combines all the features of MGA & CGA with higher resolutions. It supports upto 16 colours at a time. EGA usually has a high resolution of either 640 x 200 pixels or 640 x 350 pixels. d. VGA: VGA or Video Graphics Adapter is a high quality graphics adapter which provides upto 256 colours and also high resolution. VGA can provide following 2 combinations of resolutions: 640 x 480 pixels with 16 colours. 320 x 200 pixels with 256 colours. e. SVGA (N08-1M): SVGA or Super Video Graphics Adapter is an improvement on VGA. The two combinations of resolutions and colours provided by SVGA are: 640 x 480 pixels with 256 colours. 1024 x 480 pixels with 16 colours.

5 Q10.. Computer Terminals and its types. Computer terminal:

It is also known as Video Display Terminal (VDT) and generally combines input & output functions. It consists of a QWERTY keyboard for entering data into the computer. It also comes with a printer or TV screen for displaying information from the computer. Terminals are generally used to communicate with remote computers through communication lines. For e.g. Airline reservation agents use these terminals. Tellers in banks and cashiers in many retail stores also use terminals to perform their duties.

TERMINALS Types of Terminals: a. Dumb Terminal : It is an input/output (I/O) device that provides for data entry and information exit. It cant process data by itself. Generally it is connected to a central computer, which does the actual processing job. Advantage is that it is very cheap. Disadvantage If the central computer fails, these terminals cant work. b. Intelligent Terminal: It is a type of terminal which consists of some storage space and also a microprocessor. Thus it can process data by itself and does not rely on central computer for processing. This type of terminals can reduce work load on the central CPU. Thus, intelligent terminals can be used on stand-alone basis or can be connected to central computer. It is also user-programmable (i.e. user can change the program inside the terminal). They also provide back up to the main computer because they can handle some processing work. c. Smart Terminal : These terminals also consist of a microprocessor and some internal storage. They have data editing capability and can consolidate input data before sending it to CPU. The major difference between intelligent terminals and smart terminals is that smart terminals are not user programmable (i.e. user cant change the program inside the computer). d. Keyboard printer terminal (Teletypewriter): Keyboard printer terminal or teletypewriter consists of a keyboard and printer. Keyboard is used to input data to the computer and a printer is used to take a copy of the data (input) or information (output). Output is normally typed on a continuous role of paper at the speed of 20 to 50 CPS. 6 If the information is to be retained for subsequent purposes, a paper tape reader/punch is included in the design of the terminal. In place of paper tape reader/punch, some recently designed machines are using magnetic tape cassettes for the same purpose.

e. Remote Job Entry / Terminal: Remote job terminal groups data into blocks for transmission to a computer from a remote site. Some RJE terminals have the capability of receiving back and printing the results of the application program. Such a unit is itself a small computer, which can be used either as job entry terminal or as a stand alone computer. A terminal may be situated at the computer site or at a remote place where data is more readily available. Terminals linked to the computer system by a direct cable are known as hardwired terminals. However, for remote terminals, communication to the main system can be established via telecommunication lines. DIRECT DATA ENTRY Q11.. What is meant by DDE? What are the approaches & devices available for DDE? DDE refers to entry of data directly into computers through machine readable source documents. DDE does not require manual transcription of data from original paper documents. DDE devices can scan source documents magnetically or optically to capture data for direct entry into the computer. Magnetic Ink Character Readers and Optical Character Readers are examples of such devices. Q12.. Write about MICR [Magnetic Ink Character Recognition]. Introduction: This method is useful for direct data entry. Here a machine recognizes magnetically charged characters that are printed on source documents. These systems are typically found in banks (used for processing cheques). MICR readers detect the characters and convert them into digital data.

Features: It uses a system of printed characters, which can be read by human beings as well as machines. It uses a special printing font (=style of characters) to represent characters. In this font each character is composed of vertical bars. Characters are printed using special ink that consists of magnetisable material. 7 How it reads? In this system, the data to be read is passed through a reading head. Small and big gaps in the character will send different signals to the computer (represented by bit 1 and 0 bit). Where it is used?

This method is primarily used in banking industry and most of the cheques are now processed under MICR approach. Data about bank identification number, customers bank account number are directly printed on the cheque, by a printing press. Cheques are then handed over to the customer. Advantages: High reading accuracy. Even if cheques are smeared, stamped, roughly handled, they can be accurately read. No transcription of data. Cheques can be read both by human beings and machines. Disadvantages: The system is very costly. (That is why only few businesses accepted it and used it.) If the documents are damaged or if the cheques are not encoded with amount etc. then such documents should be processed clerically. Q13.. OCR. Introduction: Optical Character Recognition is a system in which printed characters are recognised by machines.

How it works?: This method employs a set of special characters, understandable to human beings and machines. Reading is done by light scanning techniques in which each character is illuminated (=light up) by a light source and reflected image is analysed. OCR can read the characters printed by computer printers, cash registers, adding machines and typewriters. Some readers can also read hand-written documents. The diagram shows some handwritten characters that can be read by OCR.

8 Where is it used? Very much suitable in the area of large volume billing applications. The customer paying the bill gives the bill, which consists of some OCR data (e.g. customer number, amount of bill, etc.). Thus, the bill (or the part returned by the customer) becomes input for recording cash receipts from the customer. This system can minimise or eliminate the keying process, when cash receipts are in huge size.

Advantages: Eliminates transcription of data through keyboard. No paper work explosion (i.e. reduces paper work). Even less skilled staff can operate the system. Much cheaper than other direct data entry devices. It can also read handwritten data. Limitations of OCR: a. Rigid input requirements: The requirements of font type and size are very specific. In typing there are chances for strike-overs, uneven spacing and erasures. OCR may face difficulty in reading such documents. Form design, ink specifications, paper quality, etc. become critical. Therefore, they should be standardized. b. Not economical: Optical readers are economically feasible (=practicable) only when the daily volume of transactions is high. Q14.. OMR. Where is it used? This technique is commonly used for scoring tests. It is suitable in the areas where the person is required to choose one among different options. The document is marked by the person taking the tests. OMR is used in several applications such as order writing, payroll, inventory control, insurance, questionnaires, etc.

How it works? The document is passed through an optical mark page reader. Now page reader will read the printed marks by absorbing light emitted (=released) on the document. Reflected light is converted into electric impulses and are sent to recognition logic circuit. Then they are compared with previously programmed characters. If it is valid, a signal is sent to the CPU for recording. If suitable comparison is not possible, document is rejected. Speed: OMR can read upto 2,000 documents per hour. Special Requirements: Designing the document for OMR is a very tough task. They should be simple to understand. Otherwise more errors would occur than in traditional methods. Advantages & Disadvantages: Similar to OCR. 9

Q15.. Smart Card Systems. Smart cards resemble (=look like) credit cards in size and shape. However, they contain a microprocessor chip and memory and some may include a keypad also. These were first developed in France and many organization are still experimenting with them.

Where they are used? These are frequently used to make electronic purchases and to transfer funds between accounts electronically. However, the potential (=possible) applications for these systems are very large in number. In many cases, smart cards can provide new or better services to customers. For example, in health care industry smart cards are used to store the holders identity, address, insurance data, relatives details, allergies and even a brief medical history. If the cardholder meets an accident or illness, the card could be immediately used to assist with treatment. Smart cards can also be used for security applications. Q16.. Write about bar code reader. Bar code & Bar code Reader: Bar code is a machine readable code consisting of vertical bars of different widths which are used to represent data. It uses vertical printed lines that can be converted into binary numbers. All such conversion is done by a bar code reader. It is a photoelectric scanner that reads bar codes by means of reflecting light. How it works? Bar cod reader emits a beam of light on the bar code image (generally a laser beam). A lightsensitive detector identifies the reflected bar code image. Now it converts the individual bar codes into numeric digits. The special bars at each end of the image are different. So the reader can easily recognise whether the barcode is correctly read or not. Now the bar code reader directly feeds that number to the computer, just as a number is typed on a keyboard. Thus bar code reader is used to convert bar code into product number or some other useful information. 10

Advantages: Improves the accuracy of data entry.

Better customer service through faster checkout at the point of sale and Greater control and reliability of inventory records. Where it is used? These are commonly found in supermarkets and departmental stores. They are used in industries and organizations that must count and track inventory, such as medical stores, libraries, military and other government organisations, transportation facilities and automobile industry. Q17.. Image Scanners. Meaning: A scanner is a peripheral device that converts a printed image into digital form that can be read by the computer. Thus it is used to digitize a document/image. Need: In some situations it is necessary to input some printed image to a computer. The simplest way is to take a photo of the image, directly from the source and convert it into a form that can be understood by the computer (i.e. 0s and 1s). Now, this image can be saved on disk and then printed i.e. digitizing the document. How it works? A scanner scans an image and transforms (=converts) the image to ASCII codes i.e. the code used by computers to represent characters and images. After scanning, the user can edit, manipulate and print the scanned document. Types of Scanners:

FLAT BED a. Flat bed Scanner: It is similar to a Photocopier machine.

ROLLER FEED

HAND HELD

To use this scanner, one has to place the printed image on a piece of glass, similar to the way a page is placed on a photocopier machine. b. Roller feed Scanner: Here the image is passed over a roller, where it is captured. But this can scan documents only. It cant scan images from books. If it is necessary, we have to separate the pages. c. Hand held Scanners: These are less expensive scanners. To use this scanner, one has to roll the scanner across the image. If the image is wider than scanner, one has to make multiple passes. The only difficulty is that it requires multiple passes over a single page. However, these scanners are portable. Some Manufacturers: HP, UMAX, MICROTEK, MODI XEROX, etc. 11

Q18.. Briefly describe the procedure of document imaging. What are the advantages of document imaging. Meaning: In this system, an image is captured and stored in electronic form so that it can be stored and shared. It can capture anything, including type written documents or handwritten documents (such as invoices or tax returns), flowcharts, drawings, photographs, etc. Many companies that use document imaging are moving towards paperless offices.

Steps in Document imaging: a. Data capture: The most common method of converting paper documents into electronic form is to scan them. A scanner can convert text and pictures into electronic codes. It can range from a simple hand held scanner to a high-end, high-speed scanner which can scan more than 2,500 pages per hour. b. Indexing: Document images must be stored in such a way that it facilitates retrieval (=recover). Therefore important document information such as purchase order numbers or vendor numbers are stored in the form of index. c. Storage: Generally images occupy huge memory space. So, they are usually stored on optical disks. One 5.25 optical disc can store upto 1.4 GB of data or about 25,000 documents. d. Retrieval: If the information stored in the Index is keyed in, the required document can be retrieved. The index can tell the optical disc to be searched and the requested document can be retrieved quickly. e. Output: The requested document is produced on the computers monitor or on paper or can be transmitted to another computer. 12 Advantages: It is estimated that 90% of the work of accountants and others is linked with paper. It is also estimated that the volume of information required by companies doubles in every three or four years. As a result, big corporate companies will be buried by paper. The best solution to this problem is to use document imaging. Following are its advantages:

a. Accessibility: Documents can be accessed and reviewed simultaneously by many people, even from remote locations. b. Accuracy: Accuracy is very high because there is no need to enter data manually. c. Availability: There are no chances of losing or misfiling documents. Even after years, documents will be available for use. d. Capacity: Huge amount of data can be stored in very little space, which significantly reduces storage and office space. e. Cost: When huge amount of data is stored and processed, cost per document will decline. As a result, cost of other functions like input, file, retrieve, refilling of documents also declines. f. Security: Passwords can be allotted at various levels, so as to restrict document access. g. Speed: Data can be retrieved at fantastic speeds. h. Versatility (=flexibility): Handwritten or typed text can also be stored as an image. These documents can also be used in other computer applications. Q19.. Write about different forms of computer output and computer output devices? Meaning: Output is the result of processing of input. There may be different forms of input such as text, graphics, sound etc. So, correspondingly there will be different forms of output. Following table shows the commonly found forms of output and output devices. Form of output Output devices used Soft copy output Visual Display Unit or Monitor Hard copy output Printers, Plotters, COM Sound output Speakers Printer: Printer is the most commonly used output device. It provides a permanent visual record of the output. Different types of printers are available in the market. They can be classified as under: I. Impact Printers: These printers use some form of striking device (=hitting device) to transfer ink from an inked ribbon on to the paper. Characters are formed by any one of the following methods: a. A complete image of each character is printed (Also known as character printers), b. They are formed by dot matrix method, which arrange a series of dots, to get the shape of each character. Impact printers are again sub-divided into - Serial printers (Prints one character at a time) and Line printers (Prints one line at a time). Impact Non-Impact Line printers Dot Matrix Printers Daisy 13 Chain printers Drum printers Thermal Printers Wheel Printers

Inkjet Printers Laser Printers Serial printers II. Non - Impact printers: In this type of printers there will be no direct contact between paper and the print head. These printers form characters by chemical or electronic means (=ways). The most commonly used non impact printers are Thermal Printers, Laser Printers and Ink jet printers. Computer Output Microfilm (COM): It is an output technique that records output from a computer as microscopic images on roll or sheet film. The output is miniaturized (i.e. reduction of size) and stored on microfilm or microfiche (a sheet of photographic film). This entire job is done by a small camera. This technique is used when output is very huge in size and required to be stored for a very long period of time. (May be decades). Voice output: This form of output is becoming most common today. Voice output is produced in two ways. In the first method the computer will play stored words over a speaker. In second method, the voice is created with special computer circuitry and this process is called Speech synthesis (Also known as Voice Synthesizers). This circuitry is designed in such a way that it can produce sounds like human voice. Punched and magnetically encoded output: Most of the early computers used punched cards for output. But nowadays this type of input or output is very rare. They are replaced by much more flexible and faster magnetic media. Under magnetic media, output will be stored in the form of magnetic codes on devices such as floppy disks, magnetic tapes etc. Graph plotter: A graph plotter is a device used to trace out graphs, designs and maps onto paper and even onto plastic or metal plates. They provide high degree of accuracy, even up to one thousandth of an inch. There are two kinds of plotters: Flat bed Plotters and Drum Plotters. Visual Display: The most widely used output device is a screen on which characters are displayed. To display a character, the computer sends an electronic signal to the screen. The signal is decoded to display corresponding character on the screen. The most common type of screen is CRT. CRT consists of a picture tube similar to a television. To overcome the problem of bulk CRT, flat panel screens are being used. These screens are thin and light weight. They are generally used in portable devices. Q20.. Write about Dot Matrix Printers. Introduction: It is a kind of impact, serial printer (i.e. prints one character at a time.) The first Dot Matrix Printer was developed during 1970s. These are small in size but offer very high speed printing. It can print a wide range of outputs like text, images, graphs etc. This is due to their unique method of character generation. 14

Print mechanism: The printing head is a matrix block which consists of rows and columns of holes through which pins (or wire needles) appear. The required character is formed by activating the printing head so that certain pins appear through the holes. Now the printing head is pressed against an inked ribbon and printed on paper. The inked ribbon is similar to traditional typewriter ribbon. The matrix of pins can change from printer to printer, depending on the print quality required. Some printers have a matrix of 11X9 pins and some may have a matrix of 23X18 pins. The greater the number of dots, better will be the quality. For example, following figure shows the formation of characterd. Popular Manufacturers: TVS Electronics, Wipro, IBM, Hewlett Packard, Brother, General Electric, CANON, EPSON, STAR etc. Advantages: Ordinary paper and stationery can be used i.e. no special paper required. Can print carbon copies. High speed of Printing. Less Maintenance cost. This can also print in colour (by changing the ribbon from black to required colour). Can print documents with different font sizes & shapes. Can print text, images, graphs, etc. (Of course the quality is poor) Disadvantages: Makes noise. Useful for printing documents which are retained in the organisation only. Cant provide different colours of printing at a time. Cant print full character (character is formed with matrix of dots.) Useful for printing text only i.e. not suitable for printing high quality images, graphs etc. Suitability: The printing quality of these printers is very poor (Draft quality). They are suitable for printing documents, which are usually retained (=kept) within the organization

15 Q21.. Daisy Wheel Printers. Introduction:

This is just similar to an electronic typewriter. The major difference is that they use a new type of printing element called daisywheel. Daisy wheel is a moulded metal or plastic disc-shaped printing element. It is about 65 mm in diameter and has number of stalks or petals which radiate (=spread out) from the central core. At the end of each stalk, a character is engraved (=imprinted, fixed, carved). (Similar to a typewriter.)

Print Mechanism: It works by rotating the print element until the required character is reached. Now a small hammer hits the back of the stalk. The character is then forced against inked ribbon onto the paper. All this happens at a speed of 10 to 80 cps (faster than a typist). Popular Manufacturers: BROTHER, DATA POINT, FUJITSU, OLYMPIA, etc. Advantages: Ordinary paper stationery can be used i.e. no special paper required. This can also print in colour (by changing the ribbon to required colour). Can print carbon copies. High speed Printing. Low Maintenance cost. Can print full character. Sharp Printing. Disadvantages: Makes noise. Cant print documents with different colours and font sizes. Not suitable for printing graphs, images etc. Useful for printing text only. Useful for Internal Documents only. Suitability: The printing quality of these printers is better than Dot Matrix Printers. But these are not capable of printing documents with different font sizes and colours. So, they are suitable for internal documents only.

16 Q22.. Chain printer. Print Mechanism:

a. Its a kind of impact, line printer. (Prints one line at a time). b. The print element consists of a chain that revolves horizontally at a constant speed. The complete chain consists of a set of 48 numbers, alphabets, special symbols and they will be repeated 5 times over the chain. It consists of as many hammers as the number of print positions (80 / 132 / 160). These hammers are controlled magnetically. c. Paper and ribbon are placed in between chain and hammers. When a required character on the chain faces its print position, the corresponding hammer is activated. The chain revolves so quickly that it appears as if the entire line is printed at a time.

Advantages: Prints at a very high speed (One line at a time). Prints full character (Character Printer). Allows Carbon copies. Low cost of printing and stationery. Sharp printing. Low maintenance cost. Disadvantages: Cant print a document with different colours and font sizes. Makes noise. Useful for printing text only. Useful for Internal documents only. Suitability: The printing quality of these printers is better than Dot Matrix Printers. But these are not capable of printing documents with different font sizes and colours. So, they are suitable for internal documents only.

17 Q23.. Drum printers. Print Mechanism:

It is a kind of impact, line printer. These printers use solid cylinder as drum which rotates at a constant speed. There are as many bands on the drum as the number of print positions. Each band consists of a set of 48 numbers, alphabets & special characters. The printer consists of as many no. of hammers as the number of print positions (80 / 132 / 160). The inked ribbon and stationery are placed in between hammers and drum. In one rotation of drum there would be appropriate strikes by the set of hammers. In the first strike all As are printed in appropriate positions followed by B,C,D and so on.

Advantages & Disadvantages: - Similar to Chain Printers. Suitability: The printing quality of these printers is better than Dot Matrix Printers. But these are not capable of printing documents with different font sizes and colours. So, they are suitable for internal documents only. Q24.. Thermal Printers:

Print Mechanism: Thermal printers use heat to produce an image on special paper. The print mechanism is similar to that of a Dot Matrix Printer. The printing element is similar to that of a Dot Matrix Printer i.e. it consists of a matrix of holes through which pins appear. The printer forms each character on the matrix printing head 18 in the normal way. Now pins are heated by an electric element and then pressed against a special paper (Wax coated paper).

When pins touch the paper, the area heated by pins will change colour (usually to black or brown). Thus the image is burned onto the paper. This technology is widely used in Fax machines. Advantages: Primarily used for graphics and handouts. Can print documents with different colours at a time. Can print documents with different font sizes and shapes. Sharp printing. Disadvantages: Special and expensive paper required. Less sharp or clear. Difficult to copy on office machines. Makes noise. Not suitable if the documents are to be retained for a long period of time. Q25.. Ink Jet Printer. Introduction: They were developed earlier to 1990 but became popular only after 1990. When they first appeared, ink jet printers were very expensive but now varieties of inkjet printers are available in the market at reasonable prices. This is the cheapest way of getting high quality printing. Print Mechanism: Inkjet printers consist of a matrix of nozzles. To print a character, ink is sprayed through these nozzles. The ink so sprayed is controlled through magnets. One can print on regular paper. But better results can be obtained by using special coated paper. Popular Manufactures: Epson, Canon, Lexmark, Modi Xerox, HP, Fujitsu. Types of Inkjet Printers: a. Liquid Inkjets: Liquid inkjet printers use ink cartridges from which they spray ink onto the paper. The print head consists of 50 or more nozzles, each nozzle thinner than human hair. The number of nozzles determines the print quality. A digital signal from the computer tells each nozzle when to spray a drop of ink onto the paper. 19 Colour inkjet printers use three separate tanks of ink, one for each of the primary colours. (Magenta, Yellow, Cyan) b. Solid Inkjets: Solid inkjet printers use solid ink sticks that are melted into a reservoir & sprayed onto paper.

High pressure rollers are used to flatten and fuse (=stick) ink onto paper. This produces an exceptionally high quality image with sharp edges & good colour reproduction. These printers are called phase change printers. As a final step, the paper moves between two rollers to cold fuse the image and improve the quality of output.

SOLID INKJET Advantages: Can print full character. High Speed of printing. No noise (almost nil). Can print documents with different colours and font sizes. Cheapest mode of getting multi colour printing. Sharp printing. (of course with high resolution printers only) Disadvantages:

LIQUID INKJET

Requires special kind of stationery or paper. (For better quality of output.) Printing cost per page is more than that of impact printers. Not useful for printing documents that are required to be stored for a long period of time. Doesnt allow carbon copies. Suitability: This is the cheapest way of getting multi colour printing. Today the technology is so improved that high quality photographs can also be printed from these printers. On the other hand Solid inkjets are best suited in cold regions. Q26.. Laser printer. Introduction: This is one of the most commonly used non impact printer. The technology is similar to that of a xerographic copier machine. A laser printer is a page printer. These printers combine the technologies of Laser Laser is the heart of these printers. A separate CPU is built into the printer to interpret the data and to control the Laser beam. Laser printers can print alphanumeric characters, high quality images, graphs, etc. The quality of output depends upon resolution and it is expressed in Dots Per Inch. The dots in an image are very close to each other and look like full characters. Manufacturers: Laser Jet by HP, Canon, Xerox, Wipro, Lexmark, Samsung etc. 20 Its speed can be anywhere between 4 to 17 PPM (Even faster printers are available in the market).

Advantages: Very high speed printing. Makes very low noise. Low maintenance cost. Very high quality of images can be printed. Can print documents with different colours and different font sizes (of course, it is very costly). Can print full character (Letter quality printing). Long shelf life. Disadvantages: Printing cost per page is more than that of impact printers. Doesnt allow carbon copies. High cost of multi colour printing. Q27.. Write about Microphones and voice recognition. Now, sound has become a very standard part of computers. Microphones are used as audio input devices and speakers are used as audio output devices. Sound is used in multimedia, where the quality of presentation can be improved through animation, music or sound effects. Microphones and speakers are analog devices and computer is a digital device. Sound card acts as a translator between these devices. A sound card can translate analog signals into digital signals and vice versa. Voice Recognition: Today there is a wide demand for systems which can translate spoken words into text. Such capability is called voice recognition (or speech recognition). With the help of this facility one can directly speak to the computer and need not type the data. The user can also control the computer with oral commands, such as shut down, print, Close etc. Major challenge for this software is that certain words can have 2 different meanings (e.g. two versus to). That is why translation is becoming very difficult. Another challenge is to separate meaningful sounds from background noise. Sound Output: Just as microphones are important input devices, speakers are important output devices. Today a multimedia PC comes with a CD-ROM drive, high-quality video card, speakers and a sound card. 21 Sound Card: The most complicated part of the sound output system is sound card. The sound card translates digital sounds into electric current (analog signal) which is sent to the speakers. On the other hand it converts analog signal (from microphone) into digital signal and records it as a number.

When the sound is played back, the sound card reverses this process i.e. translates numbers into electric current. Q28.. Computer Output Microfilm. Introduction: a. It is an output technique that records output from a computer as microscopic images on roll or sheet film. The images stored on COM are similar to images printed on paper. This recording process reduces the size of characters by 24, 42 or 48 times smaller than its original size. The information is then recorded on sheet film called 16 mm/35 mm microfilm or 105 mm microfiche. b. COM devices are mainly used with mainframe computers and are operated by computer professionals.

Print Mechanism: The data to be recorded on microfilm can come directly from the computer. The data is read into recorder, where it is internally displayed on CRT. As it is displayed on CRT, a Camera takes a picture and places it on the film. Then the film is processed, either in recorder or separately. After processing it can be retrieved (=get back, recover) and viewed by the user. Advantages: a. Speed: Data can be recorded on the film at a speed of 30,000 lpm (=Lines Per Minute). b. Less cost: Cost per page of printed material is less than that of regular hard copy output methods. c. Less space:The output is reduced by 20 to 100 times (when compared to hardcopy output). d. How to read: Variety of readers is available in the market that can provide ready reference to data. Micro film Vs. Micro fiche : Both are created on a negative film and one can make as many copies as he likes. However, there are certain basic differences between them as explained below: a. Physical difference: Microfilm is in continuous form while microfiche is cut into pieces. 22 b. Access: Microfilm can provide sequential access whereas microfiche can provide direct access. c. Capacity: A microfilm is 16 mm or 35 mm roll of film. Each roll can hold 2,000 to 5,000 pages of information. On the otsher hand microfiche is 105 mm film cut into 4X6 sheet and each sheet is capable of storing upto 270 pages of information. Q29.. Graph Plotter.

Introduction: A plotter is a specialised output device designed to produce high quality graphics in a variety of colours. Sometimes we need high quality visuals which can not be obtained through printer. A plotter is used for such kind of special purposes. A graph plotter is a device capable of tracing out graphs, designs and maps onto paper and even on plastic or metal plates. High degree of accuracy can be achieved, even upto one thousandth of an inch. A plotter is more software dependent than any other peripheral device and it needs much more instructions than a printer. Where is it used? Used to create presentation visuals, charts, graphs, tables, diagrams - on papers or plastic sheets. These are used in applications like CAD which require high quality graphics & images on paper. Many plotters now available are desktop models that can be used with PCs. Print Mechanism: It is mainly intended for printing graphs and images. So, it requires free movement of printing head which is not possible in any other kinds of printers. It consists of a pen which is fixed in an arm. The arm moves freely across the paper. Types of Plotters: a. Flat bed Plotter: Here the paper is fixed while the arm and pen move over it, to print a document. b. Drum Plotters: Here the paper is fixed on the surface of a drum. The drum rotates and the plotter pens are positioned over the paper. When the paper is rotated to reach the correct point, pens are dropped on to the surface and move from left and right, under the control of a program. When the image is completely printed, pens are raised from the surface. Stationery: To draw clear, high quality diagrams, plotters need high quality pens of different colours.

FLAT BED

DRUM

23

25

SOFTWARES
Q.No.1. Write about different operating systems available in the market? MS/PC-DOS: As IBM was about to finalise the PC, it started to negotiate with other computer companies to get a suitable OS for the product. Initially IBM made negotiations with Digital Research. Digital Research already owned personal computer operating system called CP/M (Control Program for Micro computer) which was, at that time, the market leader in microcomputer OSs. But it failed. In 1980, IBM and Microsoft started negotiations for the production of a suitable PC OS. It purchased 86 DOS from Seattle Computer Products. With joint minimum effort, 86 DOS was totally modified and upgraded and a new 16 bit OS called PC-DOS was released. In 1981, IBM introduced its PC with PC-DOS as its operating system. Microsoft released an almost identical (=similar) version of this OS under the name of MS-DOS. MS-DOS was supplied with PC compatible computers & PC-DOS was supplied with IBM PCs. MS Windows: The first version of Microsoft Windows OS was launched in 1983, but it was not successful. In 1990, it launched windows 3.0 and it became the worlds best selling 16-bit GUI OS. By the end of 1996 Microsoft had sold more than 45 million copies. The main reason for its success is the overall design and GUI. Windows 3.0 enabled true multitasking and also allowed users to use programs written for MS / PCDOS. To work effectively, a PC must have minimum of 4 MB of RAM and a 386 Processor. Window 95: Windows 95, a 32 bit OS was released in August 1995. Microsoft took 3 years to develop it. It was a gigantic task and was estimated to have taken 75 million hours of testing. To run Windows 95 users need a computer with 386DX or higher processor with a minimum of 4 MB of memory (8MB is recommended) along with a hard disk of 50 MB as well as 3.5 inch disk drive or a CDROM drive. Windows 95 was designed to have certain critical features over and above what was already supplied by Windows 3.1. These include: A 32-bit architecture (=design) which provides for multitasking environment. This allows user to run

multiple programs at a time. One click access i.e. the user need not double click the mouse to activate an application. The user can employ long file names. Plug and play technology - enables users to connect various peripheral devices with minimum effort. Windows 95 is also network ready. In other words, the OS is designed for easy access to network resources. In addition Windows 95 is backward compatible. Windows NT: (M04-5M) Unlike Windows 3.0 and Windows 95, Windows New Technology (NT) is a critical OS for network. It is a 32 bit OS. It is very much preferred for Intels more powerful Pentium range of processors. Windows NT 4.0 is very much similar in appearance to Windows 95 (Although not exactly same). Important features include: A stable multitasking environment, Enhanced security features, Increased memory support, Network utilities, Windows NT is more expensive than other Windows OSs and & require lot of processing power. OS/2: In 1987 IBM and Microsoft announced a new PC OS called OS/2 (Operating System Two). Unfortunately, the original OS/2 was not very successful because it was unable to support many existing PC applications. So users faced compatibility problems. The initial failure of OS/2 showed considerable impact on IBM - Microsoft alliance (=group, association). After that IBM and Microsoft began to go in their separate ways. Microsoft left OS/2 to IBM and chose to concentrate on MS-DOS and Windows. Q.No.2. Write about MS-Windows. (M95, M98, M03, M05, N08-5M) Microsoft Windows is a Graphical User Interface software for IBM PC and its clones, introduced by Microsoft Company. The name Windows describes how the software functions it runs one or more applications in windows which are rectangular areas displayed on the screen. It defines a new platform or standard on which other application software packages are written. Features: a. Windows is user friendly: Windows employs a graphical user interface. Thus user need not memorise and enter commands through keyboard. b. Windows enables multiple programming. 1

c. Windows enables user to work with large files: Large Data Bases, Spread Sheet files and Wordprocessing documents can be used with windows. Without Windows, a file containing one or two chapters of a book might not fit into available RAM. d. Windows permits information to be passed between applications: With Windows, text in a wordprocessing document can be transferred in seconds to a data base record. These types of information transfers are cumbersome (=bulky, burdensome) and time consuming with MS-DOS. e. Application software packages created for MS-DOS run under windows also. 2 Q.No.3. What are Interleaving Techniques that are commonly used by operating system for large computer systems? Large centralized systems can support multiple users simultaneously. The users terminals may have limited processing capacity and actual processing may be entirely done by the large computer that is connected to the terminals. Such types of systems require an operating system which can share the central processor. To do this, the operating system combines (interleave) the processing work of multiple users or applications in such a manner that resources are used efficiently. Commonly used interleaving techniques are: Multiprogramming, Foreground/Background processing, Multi-tasking, Virtual memory, and Multi-processing. Q.No.4. What is meant by Multi Programming? (M96, M97, N08-1M) Simultaneous processing of multiple, independent programs by interleaving (=leaving some time gap in between) their execution is called Multi programming. In other words, it is defined as execution of two or more programs at a time, that all reside (=exists) in primary storage. It is a facility available in an operating system. CPU can execute only one instruction at a time i.e. it cannot execute instructions from two or more programs simultaneously. However, it can execute instructions from one program then from second program then from first again and so on. This type of processing is referred to as concurrent execution. In multiprogramming, storage area is allocated for each program and such areas are called partitions. Each partition will have some form of storage protection and priority to ensure that a program in one portion will not accidentally write over and destroy the instructions of another partition. With the help of this facility, all parts of the system, processor, input and output peripherals can be used concurrently. Thus the entire system can be more effectively.

Q.No.5. What is meant by Multiprocessing? (M08-1M) Multiprocessing (or parallel processing) refers to the use of two or more central processing units, linked together, to perform the work simultaneously. The available CPUs can execute different instructions of the same program or different instructions of different programs at the same time. Using multiprocessing facility many complex operations can be performed at the same time. Although parallel processing is not yet widespread, it will be the trend in future. 3 Because of the availability of cheaper but more powerful processors, many computer manufacturers are now designing hardware and software systems to do multiprocessing. Since several machines can work as a team and operate in parallel, jobs can be processed much more rapidly than on a single machine. Since a micro processor is very costly, multiprocessing is very expensive. Note: Multi Programming Vs. Multi processing. (M96, M00, M05 5M, RTP) Q.No.6. Foreground Processing / Background processing. Usually, it is possible to logically partition main memory into separate areas. With this 2 different operating systems can work on the same system because each will have its own memory to manage in its own way. Partitioning also allows separate job streams to be set up. A common procedure is to setup a partition for highpriority tasks (called a foreground partition) and one for low-priority tasks (called as background partition). With foreground/background processing, foreground jobs are usually handled first. When no foreground task is waiting for processing, the computer goes to the background partition and starts processing tasks there. When foreground tasks come into the job queue, the computer leaves the background partition and resumes work in the foreground. Q.No.7. Multi Tasking. Multi-tasking refers to the operating systems ability to execute two or more tasks of a single user concurrently. Most of the operating systems used in micro computers were single-user operating systems. These operating systems allow the user to work on one task at a time. For example, in many single-user operating systems, a word-processing user cannot type a document while another document is being printed out on an attached printer. For microcomputers, multi-tasking operating systems provide single users with multiprogramming capabilities. This is often accomplished through foreground/background processing. Multitasking operating systems for microcomputers-such as Windows, OS/2, UNIX, XENIX, and Macintosh System 7 - only

run on powerful microprocessors. Old machines with less powerful microprocessor typically use single-user operating system. Note: Multi Programming Vs. Multi tasking. (M03, M08 4M) Q.No.8. What about Virtual Memory? (M00-5M) Virtual Memory or Paging is a facility provided by Operating System to a computer System. With the help of this facility, large size software can be loaded on small size RAM. Most of todays softwares like WINDOWS, MS Office, etc. require huge amount of RAM. 4 Loading of such a large size software into smaller size RAM is possible by the facility called Virtual Memory / Paging. As a part of this facility the large size software gets divided into small parts modules. Each module will be smaller than RAMs capacity. These modules are prepared in such a way that each module can perform a set of tasks. One by one, the modules are loaded into RAM and perform their task. After one module work is over, the next module is loaded on to RAM overwriting/overlaying the first module. At the end, it looks as if RAM has suddenly expanded to the size of software and allowed loading of such large software. Thus, Virtual Memory is an illusion and not reality. Hence it is called so. The overlaying modules are also called pages. Thus this technique is also known as Paging. Dumping: It is the other aspect of Virtual Memory. When RAM capacity is insufficient to hold data, a small part of the secondary storage disk space is taken up by RAM, to hold some semi-processed data. This is temporarily copied to the disk and is removed from the disk after processing. But user feels that RAM capacity has increased to the requirements of the user. This facility also comes under Virtual Memory. Note: Main memory Vs. virtual memory. (M03-4M, RTP) Q.No.9. Sub Routines. (M05, N05, N07-1M, RTP) A sub-routine is a set of instructions designed to perform a well defined arithmetical or logical operation. Subroutines are particularly useful when it is required to perform the same operation several times in a single program. Detailed instructions are once laid down. Whenever it is needed, a branch instruction will be given. After the subroutine is completed, control is returned to the main program. These programs are also known as application packages. They are ready made solutions to several problems. Subroutine programs may be written by users or may be supplied by manufacturers. By using these subroutines, the work of a programmer is simplified to a great extent. Advantages of sub-routine:

They help in performing routine but tedious work such as preparation of examination results, income tax calculations, editing of data for input and output, etc. Storage space is saved as there is no duplication of instructions. Programming time is reduced because a sub-routine was already tested & proved in another application. They can be employed many times without wastage of programming effort. They can be written by a programmer not involved in the main programs. It is easy to locate faults in programs that are constructed using sub-routines. 5 Q.No.10. What are Utility Programs or Service Programs? / Explain the term utility routine? (M07-1M) Utility programs are programs that perform system support tasks. These programs are provided by computer manufacturers to perform tasks that are common to all data processing installations. Some utility programs may be developed as separate programs and some may be included in application programs. Generally following tasks are performed by utility programs: Sorting the data. Editing the output data. Dumping of data to disc or tape. Tracing the operations of program. Converting data from one recording medium to another, viz., floppy disk to hard disc, tape to printer, etc. Q.No.11. Write about Sort utilities. It is a utility program used to sort data i.e. arranging the data in a particular order, according to a key filed. For example, we have a file of student records. We could declare name as the primary sort key and arrange the file alphabetically on the basis of name field. This is useful to produce student directory. Alternatively we can sort the file by name and then within name, by date-of-birth. Hence, we will declare name as the primary sort key and date-of-birth as the secondary sort key. Examples described here use only one or two sort keys. But many sorting packages can identify 12 or more sort keys and can arrange the records in either ascending or descending order on each declared key. Generally sort utilities are found in mainframe and minicomputer environments. (Now these are available even with Microcomputers).

In case of micro computers, these sort utilities are bundled with application packages. For example, sort routines are commonly found in spreadsheet and database management software. Q.No.12. Write about Spooling software/Spooling. (N96, M00-5M, M03, M05, M07-1M, N08-5M) Meaning: Spooling (Simultaneous Peripheral Operation On Line) is a technique used for dynamic job processing. It allows input and output operations to occur simultaneously with processing operations. It refers to procedures followed by the user in order to minimise the high speed CPUs slowing down and waiting whenever direct inputs and outputs take place to the CPU. These procedures are followed by the user both during input and output. 6 During output: In Spooling during output, whenever output has to be sent from the CPU to the printer, output is redirected and stored in secondary storage devices. Subsequently, the stored output gets printed. During first re-direction, the output is sent from CPU to storage device at a very high speed and immediately the CPU gets released for other jobs. For subsequent printing, CPU is not required. During Input: When data or programs are required to be loaded from tape to RAM, first files are copied or dumped from tapes to Disks and subsequently files are loaded from disk to CPU. This procedure reduces the CPUs waiting time. Thus the main purpose of spooling software is to compensate for the speed differences between the computer & its peripheral devices. Q.No.13. Write about Text editors. Text editor is a form of utility program. Text editors are used to create or modify text data in a file. These utilities are widely used by professional programmers for cutting and pasting programs together, changing data files by eliminating certain data fields, changing the order of certain data fields, adding new data fields and changing the format of data. Although text editors closely resemble word processors, they are not same. Word processors are specifically designed to prepare document materials such as letters and reports. But text editors are designed to prepare non-document instructions in computer programs or data in files. Most word processors contain extensive (=huge number of) capabilities of text formatting and document printing. These capabilities are not found in Text editors. Q.No.14. Some other utility programs being used in a micro computer operating system. Some of the commonly used utilities (other than Sort utilities, text editors, spooling software) for microcomputer operating systems are discussed below:

a. Disk copy programme: This program is used to copy the entire contents of one diskette to another diskette. It is generally used to make a backup or archive copy of some data or application program. b. File copy programme: This program helps to copy just one file or group of files to another diskette. c. Disk formatting programme: Whenever a diskette is purchased it requires to be divided into tracks and sectors. This process is called formatting and such formatting is done by this program. d. File deletion programme: This program helps to delete a particular file on a diskette. e. File viewing programme: It is used to view the contents of a file on the display screen of the microcomputer. 7 f. Directory programme: This program helps to view the names of data and programme files, which are stored on a disk or diskette. It addition, it gives following additional information: memory occupied by different files, day they were last received and amount of unused storage space left on storage devices. Q.No.15. Write short notes on Diagnostic Routines. (N95,N04,M07-1M) These programs are usually written and provided by the computer manufacturers. They assist in program debugging. They usually trace the processing of the program being debugged. They also help to identify the hardware accessories supplied by the manufacturer. They identify the type of processor, BIOS supplied, keyboard attached, type of monitor supplied with the computer manufacturer, etc. Using the program, one can find answer to the following questions: What type of processor does the computer use? Is there a math coprocessor in the computer? Who is the BIOS manufacturer? What is the total amount of conventional memory in the computer? What type of keyboard is attached to the computer? What is the display type? Is there any mouse attached to the computer? What type is it and who made it? Generally diagnostic routines are treated as a category of utility or service programs. Q.No.16. Define the term Language Translator? Write about different types of translators available? (M06-5M, RTP) A language translator or language processor accepts statements in one language and produces equivalent statements in another language. It reads the statements of source language and converts them into statements of other language. Most computer installations have several language translators, one for each programming language. The three most widely used language translators are:

a. Assembler (N07-1M): It translates program written in an assembly language into machine language. To develop a program, assembly languages use mnemonic codes and assembler translates such codes into machine language. b. Interpreter: Interpreter is a translation software that translates, interprets and executes one line at a time. With an interpreter, each statement is translated into machine language just before it is executed. No object module or load module is produced. Generally, program is first developed using interpreter and then using compiler. c. Compiler: Complier is a translation software which translates programs written in high level language to machine level language. A compiler translates the entire program into machine language before the program is executed. Q.No.17. Write about Compilers. (M97, N05, N08-1M) Introduction: Compiler is a translation software which translates the programs written in high level language to machine level language. Compilers are used to translate high-level languages such as COBOL, FORTRAN, and Pascal into machine level language. A compiler translates the entire program into machine language before the program is executed. Q.No.18. Write about Compilers. (M97, N05, N08-1M) Introduction: Compiler is a translation software which translates the programs written in high level language to machine level language. Compilers are used to translate high-level languages such as COBOL, FORTRAN, and Pascal into machine level language. A compiler translates the entire program into machine language before the program is executed. Compilation Procedure: Program is entered into computer system and submitted to the appropriate compiler. For example, a COBOL program is input to a COBOL compiler; a Pascal program to a Pascal compiler. The program submitted for compilation is called source program. The compiler translates the program into machine language, producing an object program. Then, another software program called linkage editor binds the object module of this program to object modules of any sub programs. The resultant program, which is ready for computer execution, is called load program (or load module). Actually the computer executes this load program. Programs can be saved on disk either in source, object or load-module forms. Q.No.19. Write about Interpreters. (N06, M08 1M) 8

Introduction: Interpreter is translation software that translates, interprets and executes one line at a time. With an interpreter, each statement is translated into machine language just before it is executed. No object module or load module is produced. Generally, program is first developed using interpreter and then using compiler. Programs written in simple languages such as BASIC are more likely to be interpreted than compiled because these programs are often developed on microcomputers.

9 Advantages: They are usually easier and faster to use (i.e. the translation speed is high). Generally they provide superior error messages to users. When a program contains an error, the interpreter can exactly identify the error because interpreters stop when errors are encountered (=come across). Thus interpreters help programmers to debug their programs. This increases programmer productivity and reduces program development time. An interpreter requires less storage space in primary memory. Interpreters are less expensive. Disadvantages: Program statements are required to be translated over and over again. Interpreters do not provide safety to programs. Difficult to make changes to programs. Note: Interpreter Vs. Compiler. (N94-6M, M99-5M, M04-4M) Q.No.20. Write short notes on Application Program / Software. An application program is a program used to solve a particular application or problem that is unique to a particular organization. Examples of such programs are payroll, General accounting, sales statistics, inventory control etc. Usually different organizations require different programs for similar application and hence it is difficult to write standardized programs. However, tailor-made application software can be written by software houses on modular design. Note: System software Vs. Application Software. (N94-6M, N96, N99-5M, M04-4M, RTP) Q.No.21. Write short notes on General Purpose Program / Software. a. This software provides the framework for a great number of business, scientific, and personal applications. b. Spreadsheet, database, Computer-Aided Design (CAD), word processing software etc. fall into this category. c. Most general-purpose softwares are sold as a package.

d. The software is accompanied by user-oriented documentation such as reference manuals, keyboard templates, and so on. e. For example, an accountant can use spreadsheet software to create a balance sheet of a company. f. An aeronautical engineer can use CAD software to design an airplane or an airport. A personnel manager can use word processing software to create a letter and so on. g. Number of personal computer-based general-purpose software packages is available in the market. 10 Q.No.22. Define the term Word Processor? (N96, N97) Word Processing: Word Processing means creating, typing and formatting of any kind of document. This document can be anything like letters, memorandum, account related documents, reports, etc. Word Processor: Word processor is different from word processing. A word processor is as application software that helps in the production of such documents. In simple words, it is a text editor that allows us to type, edit and save text. The first word processing software was invented by IBM. The intention was to relieve secretaries from time consuming typing task. However, the present day word processor packages offer far more features than just editing words - they provide spell checking, designing and elaborate formatting features. With a word processor, one can easily change the way a document looks. Thus it is easy to present ideas in a coherent (=good, sound) manner. With a word processor one can: Read and revise a document on screen, Change the formatting to get the desired visual effect, Increase productivity by automating, Improve proof reading, Produce as many copies as needed, Save a document and work on it later. Some of the popular word processing packages are: Save a document and work on it later. MS Word Perfect Writer Word star Professional Writer Word perfect MultiMate Lotus Notes As of 1999, the most popular Word processing programs were Microsoft Word which is based on GUI. Note: Text editor Vs. Word Processor. (M05-3M)

Q.No.23. Define the term electronic spreadsheet? (M96, M97-5M) In day to day life, many transactions take place and it is humanly not possible to remember all of them. Hence we record them in a systematic manner for future reference; To help users, electronic spreadsheets are available. Spreadsheet applications are primarily designed to perform mathematical calculations. The Spreadsheet, as the name suggests, is like a large sheet consisting of several rows and columns. In appearance, it looks like a maths note book. Besides calculations, spreadsheets can be used for working with data [information]. The latest version of spreadsheet program can serve as powerful data management tool. Using a spreadsheet program, 11 one can not only store lot of data in the worksheet but also make use of different functions to arrange and analyse data in any way he likes. Spreadsheet application also comes with powerful Graphic utilities. These utilities help the user to represent the data in a picture format. To achieve this task, these utilities make use of different charts and graphs that will be supplied along with spreadsheet application. Currently the leading spreadsheet applications include - Microsoft Excel, Lotus 1-2-3, Quantro Pro. These programs are written in a combination of an assembler and high level languages, which are accessible to managers, accountants and other computer professionals. Even people with no programming experience can use these programs. MS-Excel is one of the best spreadsheet applications available; possessing several enhanced spreadsheet features. One can use MS-Excel to make quick and easy financial analysis. One can also analyse data and create presentations with charts. MS-Excel allows user to retrieve data from external data sources and use it in the worksheets. MS-Excel can be used to create web pages with ease and also run queries on data available on the web. Q.No.24. What is meant by Decision Support System? What are the characteristics of a DecisionSupport System? What are the components of a Decision Support System? (M06) Introduction: DSSs are information processing systems frequently used by accountants, managers and auditors to assist them for decision-making purposes. The concept of DSS was developed in 1960s, after studying decision making several in organisations. These studies noted that managers require flexible systems which can respond to adhoc questions. Advances in hardware technology, interactive computing design, graphics capabilities and programming languages contributed to this development . Today Decision Support Systems are widely used in accounting and auditing. Characteristic features:

a. DSS supports management decision making: Generally these systems are used by top management for decision making purposes (For example, to decide whether to drop a product line or not, to increase the advertisement expenditure or not). These are also used by operational managers for management planning decisions (For example, to solve scheduling problems). DSS enhances (=increases) the quality of decisions. The system will recommend a particular alternative and the final decision is taken by the user. b. Decision support systems solve unstructured problems: Problems that do not have easy solutions and problems in which some managerial judgment is necessary are called unstructured problems and such problems can be easily solved by DSS. Generally decision support systems use non-routine data as input. 12 It is difficult to collect such data and sometimes it may require estimates. An important characteristic of many decision support systems is that they allow users to ask what-if questions and to examine the results of these questions. c. Friendly computer interface: Generally Decision support systems are operated by managers and other decision makers, who are non programmers. So these systems must be easy to use. With the help of non procedural languages, users can easily communicate with the decision support system. Components of Decision Support Systems: (M04, M06, N07-5M) a. Users: Usually, the user of a DSS is a manager with some unstructured or semi-structured problem. The manager may be at any level of authority in the organisation (e.g. either top level or middle level or bottom level managers). Generally, users do not need computer knowledge to use a decision support system. b. Databases: Decision support systems include one or more databases. These databases contain both routine and non-routine data from both internal and external sources. The data from external sources include data about operating environment - for example, data about economic conditions, market demand for the organisations goods or services and industry competition. DSS users may construct additional databases. Some data may come from internal sources. An organisation generates this type of data in the normal course of operations - for example, data from financial and managerial accounting systems. The database may also capture data from other subsystems such as marketing, production and personnel. External data include assumptions about variables such as interest rates, market prices and level of competition. c. Planning languages: Two types of planning languages that are commonly used in decision support systems are: (1) general purpose planning language and (2) special purpose planning language. d. Model base: The model base is the brain of the decision support system because it processes data with the help of data provided by the user and the database. There are many types of model bases, but most of them are custom developed models that do some type of mathematical functions -

for example, regression analysis, time series analysis, linear programming and financial computations. The analysis provided by model base is the key for users decision.

13

Q.No.25. Write some examples for Decision Support System in the area of Accounting? Decision support systems are widely used as part of an organisations AIS. Many DSSs are developed inhouse,to solve specific problems. Below are some of the illustrations of these systems. a. Cost Accounting system: Cost structure is very complex in health care industry. It is very difficult to divide costs in the areas of supplies, expensive machinery, technology and a variety of personnel. Cost accounting applications help health care organisations to calculate product costs for individual products or services. b. Capital Budgeting System: Companies require new tools to evaluate high-technology investment decisions. Decision makers need to supplement analytical techniques such as NPV and IRR with decision support systems. For example AutoMan is a DSS, designed to support decisions about investments in automated manufacturing technology, which allow decision makers to consider financial, non financial, quantitative and qualitative factors in their decision-making process. Using this DSS, they can evaluate upto 7 investment alternatives at a time. c. Budget Variance Analysis System: Financial institutions rely heavily on their budgeting systems for controlling costs and evaluating managerial performance. For example, an organisation can use

DSS to generate monthly variance reports for each division. With the help of this system one can view, analyse, budget variances. After anlysing the variances, organisation can create one-year and five-year budgets. d. General DSS: DDSs use general purpose planning languages that can analyse different types of problems. In a sense these systems act as tools to decision makers. To use this type of systems the user has to input data and answer questions about a specific problem. An example is a program called Expert Choice. This program supports a variety of problems requiring decisions. For example, the system may ask whether cash inflows are important or initial cash outlay is important. The decision maker also makes judgments about such questions. Expert Choice analyzes these judgments and presents the best alternative to the user. 14 Q.No.26. Define the term Artificial Intelligence? Write some of the applications of AI? (M05-5M, N08-10M, RTP) Meaning: Artificial intelligence (Al) is software that tries to imitate aspects of human behavior, such as reasoning, communicating, seeing, and hearing. AI software can use its accumulated knowledge to reason and in some instances learn from experience and thereby modify its subsequent behaviour. Artificial intelligence is man made and its level of activity depends on the programming capability. It is mechanism that is not subject to human feelings like fatigue, worry, etc. Types of AI: There are several types of AI, including natural language, voice and visual recognition, robotics, neural networks and expert systems. With the help of Natural language, Voice recognition and Visual recognition computers can interact with users, more easily and naturally. On the other hand Robotics can replace human labour. Both neural networks and expert systems aim to improve decision-making. Q.No.27. Write short notes on Expert Systems? (N02) Explain various elements of expert systems. Also write its advantages and limitations? (Or) What is an expert system? Explain the various elements of an expert system. Also write its advantages? (M04 10M, N05, M07-5M) An expert system (ES) is a computerized information system that allows non-experts to make decisions comparable to that of an expert. Expert systems are used for complex or unstructured tasks that require experience and specialised knowledge. Components: Expert systems typically contain the following components: a. Knowledge base: This includes data, knowledge, relationships, rules of thumb (heuristics) and decision rules used by experts to solve a particular type of problem. A knowledge base in a computer is equal to the knowledge of an expert or group of experts developed through years of experience in their field.

b. Inference engine: This program consists of logic and reasoning mechanism that can simulate (=replicate, reproduce) the experts logic process and deliver advice. It uses data obtained from both knowledge base and the user to make associations and inferences, form conclusions and recommend a course of action. c. User interface: This program allows the user to design, create, update, use and communicate with the expert system. d. Explanation facility: With the help of this facility user can know the logic being followed by the expert system to arrive at the conclusion. e. Knowledge acquisition facility: Building a knowledge base, known as knowledge engineering, involves both human expert and a knowledge engineer. The knowledge engineer extracts an individuals expertise and uses the knowledge acquisition facility to enter it into knowledge base. 15 Advantages: They provide a cost-effective alternative to human experts. They can outperform a single expert because their knowledge is gained from several experts. They are faster and more consistent and do not get over worked or stressed out. They produce better-quality and more consistent decisions. Expert systems assist users in identifying problems, which increases the probability of making sound decisions. They can increase productivity (=i.e. production per unit of time). They preserve the expertise of an expert, leaving the organisation.

Limitations: Development can be costly and time-consuming. Some large systems require upto 15 years and millions of dollars to develop. It is difficult to obtain knowledge from experts because it is very difficult to specify exactly how the decision maker has taken decision.

Designers were unable to program human beings common sense into current systems. If the system faces any situation, which is not programmed to handle, then the system may break down. Examples:(For academic interest only): As technology advances, these problems can be overcome and expert systems will play an important role in accounting information systems. Following are examples of companies that have successfully used expert systems: IRS analyzes tax returns to determine the returns to be passed to tax fraud investigators. IBM designs and evaluates internal controls in both new and existing applications. American Express authorizes credit card purchases to minimize fraud and credit losses. Its Expert System has replaced 700 authorization clerks and saved millions of dollars.

16 Q.No.28. Write about Voice Synthesizers and Voice Recognition systems? Voice Synthesizers: (N01) These are also known as voice-output devices or audio-response units or voice synthesizers. They convert data stored in secondary storage devices into sounds that are understandable to human beings. In these systems speed and pitch of voice can be adjusted. This facility is available in many of todays applications such as children education software. Voice output serves as an excellent & important media for communicating information to blind people. In recent years, voice output is becoming very much popular. From the present trend of development of multi-media systems, it seems that voice output will become one of the dominant methods of output. Voice synthesizers can be relatively expensive and can be easily connected to almost every computer. Multimedia systems, which incorporate multi-media presentations and voice output are popular amongst consumers. Voice output is produced in two ways. In the first method the computer will play stored words over a speaker. In the second method, the voice is created with special computer circuitry, a process called Speech synthesis. This circuitry is designed so that it can produce sounds like a human voice.

Voice recognition systems (M08-5M): Voice Recognition Systems (VRS) can provide hands-free interaction between the computer and the user.

In other words, users can discard conventional input devices such as keyboard or mouse and access the computer system by simply talking to it. VRS applications were originally designed for physically handicapped people. But due to the rise in RSI (Repetitive Strain Injury) claims and the desire for non-typists voice dictating applications, the demand for VRS technology is increasing. Simple voice command driven applications have proved to be very effective and are extremely well received by inexperienced users. Although there are numerous applications in the market, the technology is still developing. The problem is that people are irregular in their speech. Human conversation is ungrammatical, repetitive and open- ended. Once the technology is perfected, it will revolutionise the use of computers. 17 Q.No.29. Write about Neural Networks? (For academic interest only) Neural networks are computing systems, developed to imitate the brains learning process. Human brain uses massive, parallel network of interconnected neurons. Similarly Neural Networks use interconnected processors that can perform several operations simultaneously. Neural networks can not handle unexpected events very well. But they are very good at recognizing patterns that humans overlook and at discovering emerging trends. Like humans, neural networks learn by fine-tuning their accumulated knowledge using the facts in each new case. For example, to develop a neural network that can detect fraudulent credit card transactions, it is necessary to give enough examples of both valid and fraudulent transactions until it can reliably differentiate them. Developing a large database of examples is the most difficult and costly part of developing a neural network. Q.No.30. Write short notes on CAD and CAM. (For academic interest only) (M97, N05) CAD: It refers to use of computers in design process. How it helps? Computer Aided Design or Computer Aided Drafting is helpful in design process in the following way. When designing a product with a computer, engineers create electronic model of the product by describing all the three dimensions of the object. If they want to see the object from a different dimension, they just tell the computer to display another view. If they want to make any changes they need not repeat the task from the beginning as in the case of earlier days. They can just tell the computer, the changes to be made and it will automatically make the changes. Under this system some standard shapes will be stored in secondary storage devices and they can be incorporated (=included) in other designs.

This technique is widely used for designing almost anything - Houses, Cars, Buildings, molecules, Space Crafts, etc. CAM : Meaning: Manufacturing with computers and robotics is called CAM. For e.g. factories use computerized robotic arms to do physical work, which is hazardous (=dangerous) or highly repetitive. How it helps? Consider a Power Plant that generates steam for electricity. Here a computer monitors pressure and temperature at hundreds of critical points throughout the plant. If pressure or temperatures in a pipe or tank exceeds specified level, computer can regulate the process.

18

Internet & Emerging Technologies


History and Background: The history of the Internet is closely tied to the U.S. Department of Defense. In 1970s, Advanced Research Projects Agency (ARPA) developed a network that has evolved into todays Internet. The network was named as ARPANET. ARPANET Objectives: The network should continue to function even if one or many of the computers or connections in the network failed. The network should be usable in different hardware and software platforms. The network should be able to reroute its traffic around non-functioning parts of the network. The network should be a network of networks rather than a network of computers. Q.No.1. Define the following terms. 1. Internet: (M97, M99, RTP- 5M) a. It is very difficult to define the term Internet. Internet is a network of computers that offer access to information and people. b. In some ways, it is like an information service, because it offers e-mail, bulletin boards, etc. through which one can access files and databases around the world. c. However, Internet is different from an information service because there is no central computer system. There is only a web of connections between thousands of independent systems connected to each other through telephone lines. d. The internet is not a single network. It is a vast, global network of networks. No single person, group or organisation runs the Internet. These networks communicate with each other on the basis of certain protocols such as TCP/IP. There are tens of thousands of such networks. e. Many to many, one to many, many to one as well as few to few types of networking is possible. f. Using telephone network, these computers can communicate with each other. These connections can use the regular dial up telephone lines or dedicated lines to connect to the nearest Internet Service Provider (ISP). g. A recent but revolutionary development on the Internet is World Wide Web (WWW). 2. WWW: (N06 - 4M) a. World Wide Web or Web is a component of the Internet that provides access to large amount of information located in different servers. WWW provides many of the services that ate available on the Internet.

b. The fundamental unit of the Web is the Web page. Web page is a document that contains links to other Web pages, graphics, audio files and other Internet services such as E-mail. c. Web pages reside in servers. These servers run special software that allows users to access web pages and other Internet services. Millions of Web servers are currently connected to the Internet. A user can directly access any Web page on one of these servers and then follow the links to other pages. This process creates a web of links around the world. That is why it is called WWW. d. Web pages are created by using Hypertext Markup Language (HTML). e. HTML allows the creator of a Web page to specify how text will be displayed and how to link to other web pages, files and Internet services. f. These links are formally known as hypertext links, because they are activated when a user clicks on specific text or image within a web page. 3. Web Browser (N03, N06, M07,N08 1M) a. To view a web page, the user must use special client software known as Web browser. b. The first browser capable of displaying graphics within a web page was Mosaic. c. Some of the popular web pages are Netscape Navigator, Internet Explorer, Fire fox, Opera, etc. How web browser displays a web page? Web browser reads a specified web page using HTML commands written in the web page and displays the information. Text positioning, fonts, colors and size are specified through HTML. 1 The browser software interprets (=understand) the HTML commands and displays the information on the users monitor. It is important to note that different browsers can interpret an HTML command differently and display text differently. For example a web page may contain HTML code stating that text should be emphasized. One browser may emphasize (=highlighting) text by bolding the text and another browser may use Italics. 4. Search Engine: a. Internet is a set of computer networks made up of number of smaller networks, using different networking protocols. There is no centralized management who is maintaining internet. Instead, it is a collection of thousands of individual networks and organisations, each of which is run independently. b. There is so much of information on the Internet. But such data is very poorly organised. Thus, it is almost impossible to find the required information or documents. c. One of the popular solutions to such problem is to use search engines. They are also called search tools or web crawlers or spiders. d. Search engines contain massive database of various web sites. e. They do not provide the entire information. But one has to search through them by typing the keywords that describe the required information. f. Some popular search engines: Google (http://www.google.com) Hot Bot (http://hotbot.com/) Yahoo (http://www.yahoo.com/) Altavista (http://www.altavista..com) All for One (http://www.all4one.com) 5. URL: (M03, M07, M08, RTP 1M) a. World Wide Web or Web is a component of Internet that provides access to large amount of information located in different servers. b. Information is stored in servers in the form of web pages. Each web page and server must have a unique address so that computer can locate and retrieve the required information. c. The unique identifier for a host computer is called IP address and the unique identifier for a web page is called URL or Uniform Resource Locator. URL is similar to that of postal address. d. A typical URL looks like this: Http:// WWW.ICAI.ORG/students/results.html e. The meaning of this URL is Go to the host computer called ICAI, in a directory called Students and retrieve a hypertext document with the file name Results.Html. The first part of URL indicates the transfer protocol being used to retrieve specific document. The second part indicates the host computer on which the document resides. This part of the

address is also called domain name. The third part of the URL indicates the directory on the host computer that consists of specific web site or multiple web sites. Similarly several other subdirectories can also be indicated. The last par of the URL indicates the specific web page requested by the user. 6. Web casting or Push Technology: (M04 5M, N06 4M, N07 1M) a. Generally Internet runs in pull environment where a user opens a browser application and searches for information. b. There are millions of web pages. So the user should find the required web page and pull the required information. c. The web pages are dormant (=lying behind) until they are located and opened by the user. But this process is frustrating and time consuming. d. Another web - based technology is push technology or web casting. It is different from traditional uses of Internet and it eliminates this frustration. e. This technology allows users to receive broadcast information rather than search the web for information. f. The user has to choose from a menu of sources, specifying what kind of information they want to receive. Once selected, the information is automatically forwarded to the user. g. For example, Internet news services deliver the days activities to the users desktop. h. Cost of push technology is also cheap because news is delivered along with advertisements. 2 Q.No.2. What are the uses or benefits of Internet? (Or) Explain chief uses of internet? (N04, N085M) a. As a network: Organisations can use the Internet to link their offices and employees. Thus Internet can be used as a virtual private network. b. E-mail: It is an electronic mail system in Internet. Each user will be given a unique address. With this user can communicate with any person in the world. There are different web sites providing this service such as Hotmail.com, Rocketmail.com, P.O.box.com., e-mail.com, yahoo.com, Rediffmail.com, gmail.com, etc. c. Knowledge base: Internet is a library where companies and establishments provide information about their products and services. d. Chat rooms: Using Internet Chat SW, user can log on to certain website and communicate with other users. This is an interactive software that allows users to type comment in one window and receive reply in another. Such websites are called Chat rooms. e. Universities on the web: Various universities have their own websites where they provide information about university, research, papers published by students and professors, etc. They also provide the facility of video conferencing. f. E-Commerce: E-Commerce refers to the use of internet for business-to-business and business-to consumer transactions. It is the process of doing business electronically. Visitor to the site can sell or buy any product or service on line. g. Data Publishing: Data publishing is a new opportunity being provided by Internet. Information can be either forwarded to a specified address or stored in a particular place. Q.No.3. Explain different applications of internet? (N04 5M) Internets applications are many and depend on the innovation of the user. The common applications of the Internet can be classified into three primary types namely: Communication, Data retrieval and Data publishing. Communication: Communication on the Internet can be online or offline. When some users connect to a single server at the same time, they can communicate in an online chat. This can be truly many to many communication. Alternatively, users can send e-mail to each other which can be read by the receiver whenever he/she finds the time. This is off-line communication. Users can come together electronically with the help of usenet groups. Users can post messages to be read and answered by others at their convenience. Data Retrieval: A large number of databases exist on the Internet. These databases have been compiled from various sources and put together in a usable form.

This job can be done by commercially run data providers as well as individuals or groups with special interest in particular areas. To retrieve such data, it is sufficient for any user to search several Internet servers. This is similar to a search process in a large library. Search engines help the users for searching the requisite information. Latest information on products, markets, strategies, etc. can be found in a convenient way. Data publishing: Data publishing is a new opportunity available on Internet. Latest information can be published in a special site or can be posted in a Usenet site or can be forwarded to specific addresses. Of course, Internet discourages sending of unsolicited E-mails. Q.No.4. State some of the intrinsic benefits of using Internet for business? (RTP) Today, Internet is the most advanced and sophisticated means of communication available to mankind. Till now Internet is being used for research and education purposes. But it can also be used for business purposes. Following are some of intrinsic benefits of using internet for business: Information on businesses and services is arranged in a proper manner at a common location and is open to any person. Access to this information is provided at reasonable costs. Immediate feedback can be obtained from consumers or business partners, 3 The cost of information delivery to internal and external sources is reduced, Employee can easily access required information even from distant locations, Latest and updated information can be provided to customers and internal staff in an efficient manner. Customized information can be delivered to consumers. These are only a small sample of number of intrinsic benefits of using internet for business purposes. Q.No.5. Write about E-mail? (N95 2M), (M97, M99 5M) What are the advantages of E-mail? E-Mail: It is an increasingly utilized technology, which has become the primary means of communication for many organizations and individuals. Electronic mail provides quick, cost-effective transfer of messages to other Email users, worldwide. This is probably one of the fastest and most convenient ways of communication. At present, all Internet subscribers get free E-mail facility. In addition there are many private E-mail service providers. Advantages: With each E-mail address, the subscriber gets certain amount of disk space on the Server. This disk space serves as the post box of respective subscriber. E-mail can be received even if the receivers computer is switched off. Lot of time, energy and money can be saved by creating a Mailing List of all clients and using it to send common letters/notices/circulars. By creating Address book in the computer, one need not remember E-mail addresses. The chance of delivering the message to a wrong person is very less. The message is instantly transferred to the receiver. One can also send files as attachments with E-mail messages. Q.No.6. Explain various features offered by an E-mail software? (N03, N05 5M) E-mail software supplied with Internet connection consists of some important and useful features, which are stated below: a. Composing messages: With this one can compose messages in an attractive way, using various fonts. It is also possible to spell check the message. b. Replying to the mail received: It is possible to reply to any mail by using the Reply facility available. This facility can save lost of time in remembering addresses. c. Address Book: This is an electronic form of Address Book where the following details can be saved: Name, full name, e-mail address, name of the organisation to which the person belongs, the designation of such person, etc. d. Printing of messages: It is possible to print messages received as well as sent. e. Offline Editing / Composing / Reading: To read/edit/compose messages it is not necessary to connect to Internet.

f. Forwarding of messages: It is possible to forward any message received from, say, Mr. A to Mr.B without retyping the message. g. Transfer of data files: An important use of E-mail is the ability to send / receive data files to/from a client. This would result in considerable saving of time, energy and money. h. Greeting cards: On the Internet, there are several sites which offer free greeting cards for thousands of occasions. Q.No.7. Write about Intranets? What are its features, objectives and benefits? (N00 5M) Meaning: (N00 1M) Intranet is a type of information system that facilitates communication within the organisation, among widely dispersed departments, divisions and regional locations. It may consist of many inter-linked LANs and also use leased lines in the wide area networks. Intranet includes connection through one or more gateway computers to the outside internet. On Internet, the users can send e-mail, post documents, update material & chat with other users. The main purpose of intranet is to share company information and computing resources among employees. Intranet can also be used to facilitate working groups, video conferencing and continuous updating of company database. The big difference is that an intranet is faster and more secure than internet. Intranet uses TCP/IP, HTTP and other internet protocols and in general looks like a private version of internet. 4 However intranet uses passwords, restricting access to certain areas of the network. Intranets is the main means of intra-office communication. Advantages: Reduced costs - printing, paper, software distribution, mailing, order processing, telephone Reduced information searching time Easier, faster access to information Easier, faster access to remote locations Sharing and reuse of tools and information Reduced set up and update time Latest, up-to-date information, Easier access to customers and partners Collaborative, group working is possible. Reduced support costs Reduced redundant page creation and maintenance Faster & cheaper creation Features: 1. Similar to Internet: Intranet uses TCP / IP, Hypertext Transfer Protocol, and other Internet protocols and it looks like a private version of the Internet. 2. Use of Public Network: Companies can send private message through public networks, using special encryption / decryption and other security safeguards. 3. User Access Control: Intranet usually has a system of access privileges controlled by passwords, restricting access to certain areas of the network. For example, access to the files such as payroll, sales projections, product development notes and client memos can be restricted to a limited number of people. 4. Access to Information: With Intranet, access to all information, applications and data can be made available through the same browser. Q.No.8. Define the term Intranet. State some areas where intranets are being used? (or) Applications of Intranet? (N07 5M) Following are some of the areas where intranet is successfully used: a. Helps in Intra office communication: A companys Intranet is the main means of intra-office communication. Updates to business policies and procedures, information on health insurance & other benefits, profiles of various employees, companys organisational structure can be published b. Electronic directory: Intranets can provide electronic directory service, so that employees can easily find someones telephone number and location. c. Electronic chating: Intranet can also provide the facility of white board, an electronic chat space, where employees can talk to each other by posting text messages.

d. Employees can have own web pages: Some employees can have their own home pages on their companys Intranet. Personal web pages allow employees to know each other. e. Helps in group decision making: Intranet helps group decision making through Group Ware i.e. software used in group Decision Support System. f. Universities and Colleges: Many universities and colleges have their own Intranets for students, faculty and other users. Q.No.9. Write about Extranet? (M03, N05 5M, RTP) Definition: a. Extranet is a private network that uses Internet protocol and public telecommunication systems to securely share part of a businesss information or operations with suppliers, vendors, partners, customers or other businesses. b. It is part of companys intranet that is extended to users outside the company. c. Simply put, it is the Companys website for its customers and vendors. Requirements: It requires security and privacy which can be provided through a. Firewall server management; b. Issuance and use of digital signature certificate or similar means of user authentication; c. Encryption of messages; d. Use of virtual private networks that pass through the public network. Uses/Applications: Companies can use Extranet to: a. Exchange large volumes of data using EDI. b. Share product catalogues exclusively with wholesaler or those in the trade. 5 c. Collaborate with other companies on joint development efforts. d. Jointly develop and use training programs with other companies. e. One company can provide access to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks. f. Share news of common interest exclusively with partner companies. Q.No.10. Write about Internet protocol suite. a. It is a set of communication protocols that implement the protocol stack on which the Internet and most commercial networks run. b. Sometimes it is called TCP/IP protocol suite. c. The two most important protocols in it are: Transmission Control Protocol (TCP) and Internet Protocol (IP) d. Like any other protocol suite internet protocol suite consists of a set of layers. e. Each layer solves a set of problems involving the transmission of data. f. It provides a well defined service to the upper layer protocols based on services from lower layers. g. Upper layers are logically closer to the user and deal with more abstract data. h. The OSI model describes a fixed, 7 layer stack for networking protocols. But TCP/IP consists of only 4 layers. Q.No.11. Write a short notes on E-Commerce? (N02 5M, RTP) Introduction: Electronic commerce and its related technologies are the current leading - edge business and finance delivery systems for the 21st century. It is the process of doing business electronically. It involves automation of a variety of business-tobusiness and business-to-customer transactions through reliable and secure connections. It strengthens relationships with buyers, makes it easier to attract new customers, improves customer responsiveness and opens new markets on a global scale. EC is the application of various communication technologies to provide automatic exchange of business information with internal and external customers, suppliers and financial institutions. It helps to cut costs while improving the quality of goods & services and increase the speed of service. EC is associated with buying and selling of information, products & services via computer networks. Definition: It is not possible to give all inclusive definition for E-Commerce. Following are some of the

important definitions of E-Commerce: Electronic Commerce is a composite of technologies, processes and business strategies that foster the instant exchange of information within and between organizations. Electronic Commerce is the application of various communication technologies to provide the automatic exchange of business information with internal and external customers, suppliers and financial institutions. Examples of these technologies are Electronic Data Interchange (EDI), bar coding, scanning, E-mail, fax, etc. Electronic Commerce, simply put, is the automation of the business process between buyers and sellers. - IBM Corporation. Electronic business transactions, without paper documents, using computer and telecommunication networks. Thus, it is clear that there is no single, globally accepted definition of EC. These technologies and services can include - Electronic Data Interchange (EDI), E-mail, Electronic Funds Transfer (EFT), Bulletin Boards (BBs), WWW, Electronic Banking (EB), Push technologies, Internet Telephony, Barcoding, 2D - Imaging, Electronic Forms, Voice Recognition, security services such as firewalls, encryption, gateway managers and many more. Q.No.12. State the impact of E-Commerce on business activities? E- Commerce is the process of doing business electronically. It involves automation of a variety of business-to business and business-to-consumer transactions through reliable and secure connections. E-Commerce shows impact on large number of business activities such as: Marketing, sales and sales promotion, 6 Financing and insurance, Commercial transactions: ordering, delivery, payment. Product service and maintenance, Distributed co-operative working, Business administration, (permissions, tax, customs, etc) Transport and logistics, Public procurement, Automatic trading of digital goods, Accounting. Q.No.13. What are the benefits of E-Commerce application implementation? (N02,N06,M085M, RTP) E-Commerce is the process of doing business electronically. It involves automation of a variety of business-to business and business-to-consumer transactions through reliable and secure connections. EC presents many benefits to individual organizations, consumers and society as a whole. They are: Buyers can get the required goods at less cost because more suppliers will compete in an electronically open market. It is not necessary to re-enter data. Thus information processing errors, time and overhead costs can be reduced. Sellers can participate in on-line bidding. Thus selling costs can be reduced. Reduced time to complete business transactions, from delivery to payment. Creation of new markets as it is easy and cheap to reach potential customers. Easy entry into new markets, especially geographically remote markets, for companies of all sizes and locations. Better quality and improved variety of goods can be acquired by consumers because of increase in competition and expanded markets. Reduced inventories and reduction of risk of obsolete inventories because the demand for goods and services is electronically linked through just-in-time inventory and integrated manufacturing techniques. Reduced overhead costs through uniformity, automation and large scale integration of management processes. Reduced delivery cost, especially for goods that can also be delivered electronically. Equal access to markets (i.e. for small-to-medium enterprises and big corporations).

Reduced use of ecologically damaging materials. Ability to undertake more global programs. Reduced advertising costs. Equal access to new markets. Easy access to new markets. Q.No.14. State some reasons for increasing impact of Internet on E- Commerce? (N08-5M) E-Commerce is the process of doing business electronically. It involves automation of a variety of business-to business and business-to-consumer transactions through reliable and secure connections. Internet has shown dramatic impact on E-Commerce. Following are some reasons for such dramatic impact of internet on ECommerce: a. Universality: Using internet any business can easily interact with any other business. This was not possible in earlier networking technologies. In those technologies, businesses can interact with only those computers that are connected to the same network. b. Reach: Internet is every where - large cities, small towns and through out the modern and developing world. c. Performance: Unlike many other public networks, Internet can handle visual images, audio, and other large electronic objects. It provides different kinds of functions, in addition to handling everyday networking tasks such as electronic mail. d. Reliability: The design concepts for the Internet came out of U.S. Department of Defense. Hence, Internet technology is highly robust and reliable. e. Cost: Compared to alternative networking technologies, Internet costs are surprisingly low. 7 f. Readymade: Tens of millions of individuals are already connected to the Internet and business can readily use it. Because of the above reasons internet is showing dramatic impact on E-Commerce. Q.No.15. Write about different types of E-Commerce (or) Different classes of E-Commerce? E-Commerce can be used in the following 3 distinct areas. Customer-to-Business Intra-organisational (within a business) Inter-organisational (business-to-business) Q.No.16. Define the term B2B with reference to E-Commerce. (Or) State the Role of ECommerce in Inter organisation applications? Meaning: B2B is a short form of business-to-business exchange of services, information and/or products from one business to another business. B2B electronic commerce (B2B) typically takes the form of automated processes between trading partners and is performed in much higher volumes than B2C applications. For example, a company that manufactures tyres can sell them to an automobile manufacturer rather than directly to the consumers. This is a B to B transaction. EDI and Intranet are good examples of inter-organisation information systems. B2B applications: Inter-organisation e-commerce applications include: a. Supplier management: EC applications help companies to negotiate and transact with suppliers at reduced costs. This helps to reduce purchase order processing costs and cycle times and increase the number of orders processed during a period of time. b. Inventory management: Electronic applications shorten the order-ship-bill cycle. If majority of business partners are electronically linked, information once sent by fax or mail can now be instantly transmitted. Business can also track their documents. This also helps to reduce inventory levels, improve inventory turnover and eliminate out-of-stock occurrences. c. Distribution management: Electronic applications facilitate the transmission of documents such as bill of lading, purchase orders and ensures that documents contain more accurate data. d. Channel partners management: EC applications quickly distribute information about changing operational conditions to trading partners. B2B standards: UN/EDIFACT is one of the most well-known and established B2B standards. ANSI ASC X.12 is also a popular standard in the States. Rosetta Net is an XML based, emerging B2B standard in the heavy technology industry.

Q.No.17. Define the term Wallet. (RTP) Definition: 1. Wallet is an encryption software which holds users payment information, a digital certificate to identify the user, and shipping information to speed transactions. 2. Wallet is a software program and data that is used for on-line purchase transactions. 3. It allows several methods of payments (like use of different credit cards) that are defined within the wallet. 4. It generally resides on the user's Personal Computer. Benefits: 1. Consumer: The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input shipping information at the merchant's site and will give the consumer the option of paying by digital cash or check. 2. Seller / Merchants: Merchants benefit by receiving protection against fraud. Operation: 1. When the user (or the consumer) orders for purchase of something, the order is sent to the vendor's server. 2. The vendor's server sends back an invoice requesting the consumer to launch the wallet in his computer. 3. The user then selects "pay" option in the cyber cash software of vendor's server which sends a message back to the consumers PC that activates the "wallet" software. 4. The consumer selects one of the cards defined in the wallet and clicks. 5. The transaction includes real-time credit card authorization. 8 Q.No.18. What do you mean by B2C in E-Commerce? (Or) Write about E-Commerce applications in the area of B2C. Meaning: B2C is a short form of business-to-consumer and involves exchange of services, information and/or products from a business to a consumer, as opposed to between one business and another. It is a form of electronic commerce in which products or services are sold from a firm directly to the consumer. Classification of B2C E-Commerce: 1. Direct Sellers: Companies that provide products or services directly to customers are called direct sellers. Following are the 2 types of direct sellers. a. E-tailers: On the basis of order received, the E-tailer ships products directly to the consumer or to a wholesaler or manufacturer for delivery. b. Manufacturers: A manufacturer can sell directly to consumers via Internet. The target is to remove intermediaries, through a process called dis-intermediation and to establish a direct relationship with customers. This is not a new idea because several companies have been utilizing this method for years. 2. Online Intermediaries: Online intermediaries are companies that facilitate transactions between buyers and sellers and receive some percentage. Following are the 2 types of online intermediaries. a. Brokers: A broker is a company that facilitates transactions between buyers and sellers. There are various types of Brokers: i) Buy/Sell Fulfillment: A corporation that helps consumers place buy and sell orders. ii) Virtual Mall: A company that helps consumers to buy from a variety of stores. iii) Metamediary: A firm that offers customers access to a variety of stores and provides them with transaction services, such as financial services. iv) Bounty: An intermediary that offers a fee to locate a person, place, or idea. v) Search Agent: A company that helps consumers to compare different stores. vi) Shopping Facilitator: A company that helps consumers in using online shops easier by providing facilities such as currency conversion, language translation, payment and delivery solutions, etc. b. Infomediaries: i) Advertising based models: In this system, businesses sites have ad inventory, which they sell to interested parties. Advertisers take a high-traffic approach when attempting to reach a larger audience. These advertisers will be willing to pay a premium for a site that can deliver high numbers, for example advertisements on any web site.

When advertisers are trying to reach a smaller group of buyers, they take a niche approach. These buyers are well-defined, clearly identified, and desirable. This approach focuses on quality, not quantity. For example, cusomsed advertisements in some websites, targeting a particular class of people. ii) Community based models: In a community based system, companies allow users worldwide to interact with each other on the basis of similar areas of interest. These firms make money by accumulating loyal users and targeting them with advertising. iii) Fee-Based Models: In a fee-based system, a firm charges a subscription fee to view its content. Advantages of B2C: The B2C model can save time and money by doing business electronically. This minimizes internal costs created by inefficient and ineffective supply chains and creates reduced end prices for customers. Shopping can be faster and more convenient. Offerings and prices can change instantaneously. Call centers can be integrated with the website. Broadband telecommunications will enhance buying experience. Payment Options for B2C E-commerce businesses: Following are different types of online payment options that could be used in B2C E-commerce. a. Financial cyber mediary: An internet based company that facilitates payment between two individuals, online, usually by credit card. b. Electronic Cheque: Transferring money from ones checking account to another over the internet. 9 c. Electronic Bill Presentment And Payment (EBPP): A Computer system that generates electronic bills and sends them to customers over the internet. d. Smart Card: Debit cards that contain information about how much money you have and deduct purchases from that total. These are provided by all banks. Merchandise that is best suite for B2C: B2C can be used for all products in online. Following are the types of merchandise that can be easily sold online by a B2C E-commerce business: a. Convenience Goods: Low priced products which are bought frequently. b. Specialty Goods: High priced merchandise that is ordered rarely and usually requires customization. c. Commodity-like Goods: Products that are same where ever they are bought and are highly substituted. d. Digital Goods: Products that can be created and sent electronically. For example, music, images, videos, etc. Challenges Faced by B2C E-Commerce: a. The two main challenges faced by B2C e-commerce are: building traffic and sustaining customer loyalty. b. Due to winner-take-all nature of B2C structure, many smaller firms find it difficult to enter a market and remain competitive. c. In addition, online shoppers are very price-sensitive and are easily lured away. So, it is very difficult to acquire and keep new customers. Q.No.19. Define the term CRM? Write short notes on implementation of CRM? Meaning: Customer Relationship Management (CRM) includes the methodologies, technology and capabilities that help an enterprise to manage customer relationships. The general purpose of CRM is to help organizations in managing their customers in a better way through the introduction of reliable systems, processes and procedures. Implementation of CRM: a. CRM is a corporate level strategy which focuses on creating and maintaining long lasting relationships with its customers. b. CRM is not technology itself. It is a holistic change in the organizations philosophy which places emphasis on the customer.

c. A successful CRM strategy cant be implemented by simply installing and integrating a software package and will not happen over night. d. Changes must occur at all levels including policies and procedures, front office customer service, employee training, marketing, systems and information management, etc. e. All the aspects of business must be reshaped to be customer driven. f. When setting up a CRM, the company has to first identify the key areas relevant to its business. They are: What information it needs to serve its consumers, Customers past financial history, Effects of the CRM segment, What information is not useful, g. Eliminating unwanted information can be the large aspect of implementing CRM system. h. While designing a CRM structure, a company may keep more extensive information of their primary customers and less extensive details of their low-margin clients. Requisites of a good CRM Program: To be effective, the CRM process needs to be integrated across marketing, sales and customer service. A good CRM program needs to: a. Identify customer success factors, b. Create a customer-based culture, c. Adopt customer-based measures, d. Develop an end-to-end process to serve customers, e. Recommend the questions to be asked to help a customer to solve a problem, f. Recommend what to tell a customer with some complaint, g. Track all aspects of selling to customers. 10 Architecture of CRM: There are 3 parts of application architecture of CRM a. Operational: automation is provided to basic business processes like marketing,sales,service, etc. b. Analytical:helps to analyze customer behavior, implements business intelligence like technology, etc. c. Collaborative: ensures contact with customers like phone,email,fax,web,SMS,post,in person,etc. Q.No.20. Write about Operational CRM. Meaning: Operational CRM means supporting the front office business processes, which include customer contact like sales, marketing and service, Tasks resulting from these processes are forwarded to the employees responsible for them, The necessary information for carrying out the tasks is also provided, Information to back end applications is provided, and activities with customers is documented for further reference. Advantages: It provides the following benefits Delivers personalized and efficient marketing, sales, and service, Enables a reverse view of the customer while the organization is interacting with them. Sales people and service engineers can access complete history of all customer interaction with the company. Areas of business: The operational part of CRM typically involves 3 general areas of business a. Sales Force Automation (SFA): SFA automates some of the company's critical sales and sales force management functions. For example, lead/account management, contact management, quote management, forecasting, sales administration, keeping track of customer preferences, buying habits, and demographics, as well as performance management. SFA tools are designed to improve field sales productivity. b. Customer Service and Support (CSS): CSS automates some service requests, complaints, product returns and information requests. Traditional internal help desk and traditional inbound callcenter support for customer enquiries are now developed as "Customer Interaction Center" (CIC) using multiple channels (Web, phone/fax, face-to-face, kiosk, etc). c. Enterprise Marketing Automation (EMA): EMA provides information about the business environment, including competitors, industry trends and macro environmental variables. It is the execution side of campaign lead management. The intention of EMA application is to improve marketing campaign efficiencies. Many call centers use CRM software to store all of their customer's details. When a customer calls, the system can be used to retrieve and store information relevant to

the customer. By serving the customer quickly and efficiently, and also keeping all information of a customer in one place, a company aims to make cost savings, and also encourage new customers. Q.No.21. Write about Analytical CRM. Meaning: In analytical CRM, data gathered within operational CRM and/or other sources are analyzed to segment customers or to identify potential customers to enhance client relationship. Examples of campaigns directed towards customers are: a. Acquisition: Cross-sell, up-sell b. Retention: Retaining customers who leave due to maturity or attrition. c. Information: Providing timely and regular information to customers. d. Modification: Altering details of transactional nature of the customers' relationship. Coverage: Analysis is not limited to decision support. But it generally covers the following: a. Dashboards, reporting, metrics, performance etc. b. Predictive modeling of customer attributes. c. Strategy and research. Analysis of customer data: Analysis of customer data may relate to one or more of the following areas: Campaign management and analysis Contact channel optimization Contact Optimization Customer Acquisition / Reactivation / Retention Customer Segmentation Customer Satisfaction Measurement / Increase Sales Coverage Optimization 11 Fraud Detection and analysis Financial Forecasts Pricing Optimization Product Development Program Evaluation Risk Assessment & Management Data warehouse: Data collection and analysis is viewed as a continuous process, Generally business decisions are refined over a period of time, based on the feedback from earlier analysis and decisions, Therefore, most successful analytical CRM projects take the advantage of a data warehouse to provide suitable data. Q.No.22. Write about Collaborative CRM. Meaning: Collaborative CRM facilitates interactions with customers through all channels like personal, letter, fax, phone, web, E-mail and supports co-ordination of employee teams and channels. It is a solution that brings people, processes and data together. So, companies can better serve and retain their customers. The data/activities can be structured, unstructured, conversational, and/or transactional in nature. Objective: The objectives of collaborative CRM can be broad, including cost reduction and service improvements. Benefits: Collaborative CRM provides the following benefits Enables efficient productive customer interactions across all communication channels. Enables web collaboration to reduce customer service costs. Integrates call centers enabling multi-channel personal customer interaction. Integrates view of the customer while interacting at the transaction level. Q.No.23. In what way a CRM software can improve customer service? A good CRM program will allow a business to acquire customers, service the customer, increase the value of the customer to the company, retain good customers, and determine which customers can be retained or given a higher level of service. A good CRM program can improve customer service by facilitating communication in several ways:

a. Product information: It can provide product information, product use information and technical assistance on web sites that are accessible round the clock. b. Quality: Identify how each individual customer defines quality and then design a service strategy for each customer based on these individual requirements and expectations. c. Sales follow up: Provides a fast mechanism for managing and scheduling follow-up sales calls to assess post-purchase cognitive dissonance, repurchase probabilities, repurchase times and repurchase frequencies. d. Tracking points of contact: Provides a mechanism to track all points of contact between a customer and the company and do it in an integrated way. e. Identify potential problems: Helps to identify potential problems quickly, before they occur. f. Registering complaints: Provides a user-friendly mechanism for registering customer complaints. The complaints that are not registered with the company cant be resolved and are a major source of customer dissatisfaction. g. Handling problems & complaints: Provides a fast mechanism for handling problems and complaints (complaints that are resolved quickly can increase customer satisfaction) h. Correcting service deficiencies: Provides a fast mechanism for correcting service deficiencies. Helps to correct the problem before other customers experience the same dissatisfaction. i. Track customer interests: Uses internet cookies to track customer interests and personalize the product accordingly. j. Scheduling maintenance: Provide a fast mechanism for managing and scheduling maintenance, repair, and on-going support. This improves efficiency and effectiveness. k. Integration: The CRM can be integrated into other cross-functional systems and thereby provide accounting and production information to customers when they want it. 12 Technical functionality: A CRM solution is characterized by the following functionality: a. Scalability: the ability to be used on a large scale and can be reliably expanded to the necessary scale. b. Multiple communication channels: The ability to interface with users via several devices (phone, WAP, internet, etc.) c. Workflow: the ability to trigger a process in the back office system, e. g. Email Response, etc. d. Assignment: the ability to assign requests (Service Requests, Sales Opportunities) to a person or group. e. Database: the centralized storage (in a data warehouse) of all information relevant to customer interaction. f. Customer privacy considerations: the data encryption and the destruction of records to ensure that they are not stolen or abused. Q.No.24. Define Supply Chain Management and Supply Chain Event Management? Supply Chain Management: Supply Chain Management (SCM) is the process of planning, implementing and controlling the operations of the supply chain with the purpose to satisfy customer requirements in an efficient way. Supply chain management covers all movements and storage of raw materials, work-in-process, and finished goods from point-of-origin to point-of-consumption. According to the Council of Supply Chain Management Professionals (CSCMP) Supply Chain Management encompasses the planning and management of all activities involved in sourcing procurement, conversion and all logistics management activities. Importantly, it also includes coordination and collaboration with channel partners, which can be suppliers, intermediaries, thirdparty service providers, and customers. In essence, Supply Chain Management integrates supply and demand management within and across companies. Supply Chain Event Management (SCEM): Supply Chain Event Management is a consideration of all possible occurring events and factors that can cause a disruption in a supply chain. With SCEM, possible scenarios can be created and solutions can be planned. Some experts distinguish supply chain management and logistics management, while others consider the terms to be interchangeable.

Q.No.25. Write down the opportunities that are enabled by Supply Chain Management? Proper implementation of SCM helps to use the following strategic and competitive areas to their full advantage. a. Fulfillment: It ensures that right quantity of parts for production or products for sale arrive at the right time and it is achieved through efficient communication. It also allows a company to constantly monitor the inventory and ensure that the right quantities are ordered to replace stock. b. Logistics: Keeping the transportation cost of materials as low as possible along with safe and reliable delivery. Here the SCM enables a company to have constant contact with its distribution team, which could consist of trucks, trains, or any other mode of transportation. c. Production: SCM ensures smooth functioning of production lines because necessary spare parts and components will be available as and when necessary. As logistics are correctly implemented, production can run smoothly. d. Revenue & profit: When supply chain is properly managed companies can react to the unforeseen changes in demand and supply in a flexible way. Because of this, a company can produce goods at lower prices and distribute them in a quicker way, thus increasing the overall profit. e. Costs: Keeping the cost of purchased parts and products at acceptable levels. SCM reduces costs by increasing inventory turnover on the shop floor and in the warehouse, controlling the quality of goods and thus reducing internal and external failure costs. f. Cooperation: Co-operation among supply chain partners ensures 'mutual success'. Collaborative Planning, Forecasting and Replenishment (CPFR) is a longer-term commitment, joint work on quality and support by the suppliers. This relationship allows a company to have access to current, reliable information, obtain lower inventory levels, cut lead times, enhance product quality, improve forecasting accuracy and ultimately improve customer service and overall profits. 13 Q.No.26. What are the problems faced by Supply Chain Management? (N07 5M) Supply chain management must address the following problems: a. Distribution Network configuration: Number and location of suppliers, production facilities, distribution centers, warehouses and customers. b. Distribution Strategy: Centralized versus decentralized, direct shipment, cross docking, pull or push strategies, third party logistics. c. Information: Integrated systems and processes through the supply chain to share valuable information, including demand signals, forecasts, inventory and transportation. d. Inventory Management: Quantity and location of inventory including raw materials, work-inprocess and finished goods. Q.No.27. State the activities or functions of SCM. a. SCM is a cross functional approach to manage the movement of raw materials into an organisation and movement of finished goods out of the organisation towards the end consumer. b. Due to outsourcing of several operations: the number of companies involved in satisfying consumer demand have increased, while reducing management control of daily logistics operations. c. Less control and more supply chain partners led to the creation of supply chain management concepts. d. Several models have been proposed for understanding the activities required to manage material movements across organizational and functional boundaries. e. SCOR is a supply chain management model proposed by the Supply-Chain Council. f. Another model is the SCM Model proposed by the Global Supply Chain Forum (GSCF). Q.No.28. Write about different levels of activities involved in SCM (Or) What are the different ways in which supply chain activities can be grouped? Supply chain activities can be grouped into strategic, tactical and operational levels of activities. Strategic level: a. Strategic network optimization, including the number, location and size of warehouses, distribution centers and facilities.

b. Strategic partnership with suppliers, distributors, and customers, creating communication channels for critical information & operational improvements such as cross docking, direct shipping and thirdparty logistics. c. Product design coordination, so that new and existing products can be optimally integrated into the supply chain. d. Information Technology infrastructure, to support supply chain operations. e. Where to make, what to make and make or buy decisions. Tactical level: a. Sourcing contracts and other purchasing decisions. b. Production decisions, including contracting, locations, scheduling, and planning process definition. c. Inventory decisions, including quantity, location and quality of inventory. d. Transportation strategy including frequency, routes and contracting. e. Benchmarking of all operations against competitors and implementation of best practices throughout the enterprise. f. Milestone Payments. Operational level: a. Daily production and distribution planning, including all nodes in the supply chain. b. Production scheduling for each manufacturing facility in the supply chain (minute by minute) c. Demand planning and forecasting, coordinating the demand forecast of all customers and sharing the forecast with all suppliers. d. Sourcing planning, including current inventory and forecast demand, in collaboration with all suppliers. e. Inbound operations, including transportation from suppliers and receiving inventory. f. Production operations, including the consumption of materials and flow of finished goods. g. Outbound operations, including all fulfillment activities and transportation to customers. h. Order promising, accounting for all constraints in the supply chain, including all suppliers, manufacturing facilities, distribution centers, and other customers. 14 i. Performance tracking of all activities. Q.No.29. Write about Bullwhip effect in SCM. (M08 5M) Meaning: The Bullwhip Effect or Whiplash Effect is an observed phenomenon in forecast driven distribution channels. Forecasting demand: a. Customer demand is very unstable. So, organisation must forecast demand in order to arrange for inventory and other resources. b. Forecasts are based on statistics, and they are rarely perfectly accurate. So, Companies generally maintain additional inventory called safety stock. Safety stock: c. Moving up the supply chain from end consumer to raw materials supplier, each supply chain participant has greater observed variation in demand and thus greater is the need for safety stock. d. During the periods of rising demand, down-stream participants will increase their orders. e. During the periods of falling demand, orders will fall or stop in order to reduce inventory. f. Due to this the variations in demand are further amplified. Forecast driven Vs. demand driven supply chain: Supply chain experts have recognized that the Bullwhip Effect is a problem in forecast driven supply chains. g. The alternative is to establish a demand driven supply chain which reacts to customer orders. h. The result is near-perfect visibility of customer demand and inventory movement throughout the supply chain. i. Better information leads to better inventory positioning and lower costs throughout the supply chain. j. Barriers to implement a demand driven supply chain include - investments in information technology and creating a corporate culture of flexibility and focus on customer demand. Factors contributing to the Bullwhip Effect: Forecast Errors Lead Time Variability Batch Ordering Price Fluctuations Product Promotions Inflated Orders

Methods intended to reduce uncertainty, variability, and lead time: Vendor Managed Inventory (VMI) Just In Time replenishment (JIT) Strategic partnership (SP) Q.No.30. Define the term EDI? (N975M) What are the advantages of EDI (M95,M03,N03,M06,M075M) Meaning: In traditional paper-based flow of information, data is entered manually. In addition, manual reconciliation, comparison of purchase order, receiving notice and invoice is also required. Therefore cost of transaction processing will be high. These two manual processes are eliminated in EDI. EDI is computer-to-computer communication using a standard data format to exchange business information electronically between independent organisations. The data transfer can be direct, between two companies using an agreed upon protocol, or it can be performed by a third party service vendor. Users can transmit business documents such as purchase orders, price quotes, shipping notices and even payment orders electronically to customers and suppliers. Companies that handle large volume of repetitive transactions can get significant benefits by converting to EDI. Companies that face strong competition, companies operating in a time sensitive environment can also get benefits from EDI. EDI improves the operations by providing electronic information exchange between trading partners. Definition: The term EDI has many definitions. American National Standards Institute (ANS) has defined it as: Electronic Data Interchange is the transmission, in a standard syntax, of unambiguous information of business or strategic significance between computers of independent organisations. The users of EDI do not have to change their internal database. However, users must translate 15 this information to or from their own computer system formats, but this translation software has to be prepared only one Advantages of EDI: (N08-5M) Issue and receive orders faster, Make sales more easily, Get paid Sooner, Minimise capital tied up in inventory, Reduced letters and memos, Easy to update catalogues and part listings, Best suited for a selective group of trading partners. Q.No.31. Define the term EDI? Briefly explain how EDI works? (M05, N07 5M) EDI is the electronic exchange of business documents such as invoices, purchase orders and shipping notices in a standard, machine-processable data format. EDI automates the transfer of data between dissimilar computer systems. This is a 3-step process. Data from sending computers application is translated into standard format. Then, it is transmitted over communication lines to your trading partner. Finally, it is re-translated by your trading partners application program. If the trading partner wants to send data, the process is reversed Requirements: To make EDI work, one needs communications software, translation software and access to standards. a. Communications software: It moves data from one point to another, flags the start and end of an EDI transmission and determines how acknowledgements are transmitted and reconciled. b. Translation software: It helps the user to build a map and shows him how the data fields from his application corresponds to the elements of an EDI standard. c. Uses of map: Later, it uses this map to convert data back and forth between the application format and the EDI format. Q.No.32. Explain the problems that are addressed by EDI in relation to paper based information system?

1. Labour costs: In a paper based system, manual processing is required for data keying, document storage and retrieval, document matching, envelope stuffing, etc. 2. Errors: Since the same information is keyed in for number of times, paper based systems are error-prone. 3. Inventory: Delays and uncertainties are common in paper processing. So, inventory may be higher than they need to be. 4. Uncertainty: Uncertainty exists in the following three areas Areas Reason 1. Timing Transportation and keying delays. 2. Communication Sender does not know whether the matter dispatched was received at all. 3. Payment Difficult to tell when the bank will disburse the cheque. Q.No.33. Define the Electronic Funds Transfer. State some examples of EFT systems in operation? Electronic Funds Transfer (EFT): (RTP) EFT stands for "Electronic Funds Transfer". It represents the ways the business can receive direct deposit of all payments from financial institutions to the companys bank account. Once the user signs up, money comes to him directly and sooner than ever before. EFT is fast and safe. It means the money will come to the users bank account quicker than if he had to wait for the mail, deposit the cheque and wait for the funds to become available. The payment mechanism moves money between accounts in a fast, paperless way. Some common examples of EFT are Automatic Teller Machine, Point-of-Sale Transactions, Preauthorised Transfers and Telephone Transfers. Automatic Teller Machines (ATMs): ATMs are specialised form of Point of Sale Terminals that are designed for unattended use by a customer of a financial institution. 16 These ATMs are kept in a public place and are connected to the network of financial institution. With the help of these machines consumers can do their banking without the assistance of a teller. These machines are activated by inserting a card (ATM/Debit/Credit) which contains users account number and PIN on a magnetic strip. The card holder has to enter the PIN into the ATM which is transmitted to the server in an encrypted form. The ATM calls up the server, verifies the customers account balance, dispenses the cash and generates a transaction slip. Even bank personnel will not be able to see the customers PIN number as it is stored in encrypted form. ATM cards can be used to get cash, or to make deposits, pay bills, or transfer funds from one account to another account electronically. Point-of-Sale (POS) Transactions: Some Debit or EFT cards (sometimes referred to as check cards) can be used for shopping that allow the transfer of funds from the consumers account to the merchants account. To pay for a purchase, the consumer presents an EFT card instead of check or cash. Money is taken out of the consumers account and put into the merchants account electronically. Preauthorized Transfers: This is a method of automatically depositing to or withdrawing funds from an individuals account, when the account holder authorizes the bank or a third party (such as employer) to do so. For example, consumers can authorize direct electronic deposit of wages, social security, or dividend payments to their accounts. They can also authorise financial institutions to make regular, ongoing payments of insurance, mortgage, utility or other bills. Telephone Transfers: Consumers can transfer funds from one account to another, for example from savings to current account, or They can order payment of specific bills by phone. Q.No.34. Write about credit card? What are the steps involved in credit card transaction?

Credit Card: It is a system of payment in which a small plastic card is issued to the users of the system. Those persons who are interested to obtain a credit card must apply to some bank or financial institution. A credit card will be issued after verifying the credit worthiness of the applicant. A credit limit is sanctioned to each applicant and the applicant can make purchases or draw funds within such credit limit. For this service the bank or financial institution collects some service charge. Manual Credit Card transaction: In a credit card transaction, the consumer presents preliminary proof of his ability to pay by presenting his credit card number to the merchant. The merchant verifies this with the bank and creates a purchase slip which is endorsed by the consumer. The merchant then uses this purchase slip to collect funds form the bank, and On the next billing cycle, the consumer receives a statement form the bank with a record of the transaction. Credit card transaction through internet: a. The same procedure is followed to make purchases over the internet. b. But on the Internet, additional steps must be taken to provide more security to the transactions and for authentication of both buyer and seller. c. Variety of systems are developed for using credit cards over the Internet. d. 2 main distinguishing features of these systems are: the level of security they provide for transactions, and the software required on both the customer and business sides of the transaction. e. Credit cards can be handled on line in two different ways: Sending unencrypted credit card numbers over the Internet, Encrypting credit card details before any transaction is transmitted. 17 Unencrypted credit card information: A customer browsing the web might enter a credit card number in an order form and click a submit button to transmit the information to the merchants web server. Since the data is raw, anyone can intercept the transmission. So, there is no security for this type of transaction. On the other hand an unscrupulous merchant (or someone posing as a merchant) can use such unencrypted numbers for illegal charges. Encrypting credit card details: Encrypting credit card transactions can also be subdivided according to what is encrypted. If the entire transmission between buyer and merchant is encrypted, the merchant has to decrypt at least the order details to complete the purchase. But sensitive information like credit card numbers will be visible to merchant and he/his employees may misuse such information. To protect against this, a trusted third party can be used to separately handle credit card and order data with a wallet as helper application. Such third party decrypts the credit card information for authorisation of the purchase. Q.No.35. Explain the emerging trends for simpler interoperability of electronic wallet and credit card transactions? Transaction Using Third Party Verification: The market for handling credit card purchases on the Internet is yet to develop as a single way of doing things, or a single standard that allows the software from different vendors to work together. Due to lack of interoperability it is likely to slow down both consumer and business acceptance of using credit cards for making purchases on the Internet. However, there are 2 significant standards that will make the interoperability of electronic wallet and credit card transactions simpler, both for consumers and businesses. Secured Electronic Transaction (SET): Secured Electronic Transaction Protocol (SET) was first developed by a consortium led by MasterCard & Visa.

It is a combination of protocols designed for use by other applications (such as Web browsers) and a standard for handling credit card transactions over the Internet. It is designed for cardholders, merchants, banks and other card processors. SET uses digital certificates to identify all parties involved in a purchase. SET also encrypts credit card and purchase information before transmission on the Internet. Joint Electronic Transaction: The second standard is Joint Electronic Payments, led by World Wide Web Consortium and Commerce Net. JEPI is an attempt to standardize payment negotiations. On the buyers side, it serves as an interface that enables a Web browser and wallets to use a variety of payment protocols. On the merchants side, it acts between the network and transport layers to pass off the incoming transactions to the proper transport protocol (for e.g. e-mail vs. HTTP) and proper payment protocol (such as SET) Multiple protocols will be around for payment, transport and wallets. JEPI makes it easier for the buyer to use a single application and a single interface, in a variety of commercial situations. Q.No.36. Write about electronic cheques (or) Explain the systems developed to pay web merchants directly? Electronic Cheques: An electronic cheque has all the features as a paper cheque. It acts as a message to the senders bank to transfer funds. Like a paper cheque, the message is first given to the receiver who, in turn, endorses the cheque and presents it to the bank to obtain funds. The electronic cheque can prove to be superior to the paper cheque in one significant aspect. The sender can protect himself against fraud by encoding the account number with the banks public key. Thus it is not necessary to reveal the account number to the merchant. 18 Similar to SET protocol, digital certificates can be used to authenticate the payer, the payers bank, and the bank account. Credit card payments will undoubtedly be popular for commerce on the Internet. However, following 2 systems have been developed to use electronic cheques to pay Web merchants directly. 1. FSTC: The FSTC is a consortium of banks and clearing houses that has designed an electronic cheque. Designed in the lines of traditional paper cheque, this new cheque is initiated electronically. It uses digital signature for signing and endorsing. 2. Cyber Cash: This is an extension of wallet for credit cards, and it can be used in the same way to make payments with participating vendors. CyberCash will not serve as an intermediate party for processing the cheque. That function will be handled directly by banks. Extending electronic checks to existing payment systems: Electronic cheque can be delivered either by direct transmission over a network or by e-mail. In either case, existing banking channels can clear payments over their networks. This has lead to a convenient integration of the existing banking infrastructure and the Internet. Q.No.37. Define smart cards. Write about different types of smart cards available? Smart Cards: Smart cards have an embedded microchip instead of magnetic strip. The chip contains all the information a magnetic strip contains but offers the possibility of manipulating the data and executing applications on the card. Types of smart cards: Three types of smart cards have established themselves. a. Contact Cards: Smart cards that need to insert into a reader in order to work, such as a smart card reader or automatic teller machines.

b. Contactless Cards Contactless smart cards dont need to be inserted into a reader. Just waving them near a reader is just sufficient for the card to exchange data. This type of cards is used for opening doors. c. Combi Cards Combi cards contain both technologies and allow a wider range of applications. Q.No.38. Write about Electronic purses? Electronic purse is yet another way to make payments over the internet. It is very similar to a pre paid card. For E.g. Bank issues a stored value cards to its customers. Customer can then transfer value from their accounts to the cards at an ATM, a personal computer, or a specially equipped telephone. The electronic purse card can be used as an ATM card as well as a credit card. While making purchases, customers pass their cards through a vendor's point of sale terminal. No credit check or signature is needed. Validation is done through a Personal Identification Number (PIN Number) Once the transaction is complete, funds are deducted directly from the card and transferred to the vendor's terminal. Merchants can transfer the value of accumulated transactions to their bank accounts by telephone, as frequently as they choose. When the value on a card is spent, consumers can load additional funds from their accounts to the card. Q.No.39. What are the risks and security considerations of internets use by business houses for electronic commerce? What would be the general management concern? Introduction: From years together computer security is not a big problem. Many companies did not concentrate much on such security aspects. But now computers are accessible even from distant locations. On the other hand there is an increasing trend in the number of hackers. In this scenario, the concept of computer security has become an important consideration. Challenges in E-Commerce: Before all businesses accept this technology, several challenges should be accepted. 19 a. Reliability: For conducting e-commerce the company has to depend upon services of several other organisations. So the company should consider the reliability of such organisations. b. Scalability: How can the Internet and individual services be scaled to meet the needs and expectations of all businesses? c. Ease of use: The methods developed should be easy to access for all trading partners and customers. We should also consider, whether small businesses are at a disadvantage due to lack of technical sophistication and resources? d. Payment methods: What will be an appropriate, safe and reliable payment method for electronic commerce? Other considerations include the threat of computer viruses and the existence of unprofessional employees. Companies or consumers pass information through e-mail. If it is captured by a third party, great loss occurs to both the parties. Some businesses connect to the internet and they also store important information in the same location. Such businesses are subjected to tampering and their information may be accessed by third parties and may be damaged. For e.g. financial information such as credit card numbers may be stolen and used by unauthorized parties to make illegal purchases, resulting in damage to customers and business. General Management Concerns: (M07 5M) a. Loss of paper audit trail: Paper is the prime source of audit trial that can be certified. The electronic certification may not be as reliable as ordinary certification. b. Business continuity: As the dependence on electronic means of doing business increases, business continuity becomes an important consideration. If EC system fails to work properly, even ordinary business activities cant be continued effectively. c. Exposure of data to third parties: As data is shared and organizations are connected to outside world, the possibility of data exposure to vendors, service providers and trading partners is significantly increased. d. Potential legal liability: The inability to complete transactions or meet deadlines or the risk of exposing information of trading partners creates significant legal risks.

e. Record safeguarding: Electronic information has the same legal and statutory requirements as paper information. Organizations are responsible for safe storage, retention & retrieval of such information. f. Segregation of duties: In an electronic environment, the potential for occurrence of fraudulent transactions increases. Therefore, duties of people involved in EC must be appropriately segregated and reviewed. Q.No.40. What tools are available to protect the information in network against intrusion or misuse? (N02 5M, RTP) In spite of several risks, internet is the most advanced infrastructure for anywhere, anytime electronic communication between businesses, customers, suppliers. Several tools are now available to protect information and systems unauthorised intrusion or misuse: a. Firewalls: (N03, M05, M07, M081M) They control the flow of traffic between the Internet and the firms internal LANs and systems. They are setup to implement the security policies desired by the organisation. A firewall is a proved, effective means of protecting the firms internal resources from unwanted intrusion. b. Encryption: This allows information to transit the Internet while being protected from interception. There are two basic approaches to encryption: Hardware encryption devices are available at a reasonable cost and can support high-speed traffic. If Internet is used to exchange information among branch offices or development collaborators, use of such devices can ensure that all traffic between these offices is secured. Software encryption is typically employed in specific applications. For example, certain electronic mail packages provide encryption and decryption for message security. c. Message authentication: It makes sure that a message is really from whom it is supposed to be and that it has not been tampered. Regardless of a companys individual needs, Internet security policies and procedures should always be clearly defined. d. Site blocking: It is a software-based approach that prohibits access to certain web sites that are deemed to be inappropriate by management. For example, sites that contain objectionable material can be blocked to prevent employees from accessing these sites. Companies can also log activities and determine the amount of time spent on the Internet and identify the sites visited. 20 Q.No.41. Write about the possible legal issues in E-Commerce? Introduction: a. Electronic transactions are used by businesses to issue instructions and to make commitments with external organizations, and many of these transactions are used to form legally binding contracts. b. For example, a contract is entered into when a buyer electronically issues a purchase order for goods at some fixed price and a seller electronically acknowledges the order. c. In legal terms, electronic order means offer, and the electronic acknowledgment means acceptance, forming a contract. Legal issues: 1. Jurisdictional disputes: E-commerce throws up several new challenges. The most important issue is that of taxation. For taxation purposes, the first question to be asked is where did the sale take place? In case of E-Commerce there is no physical place of business. So, it is very difficult to determine the country/state/city from where the sale was concluded. Similarly jurisdictional disputes arise in case of indirect taxes. 2. Tax evasion: Since there is no paper work and all the interaction between the buyer and the seller is done electronically, there is a possibility that the entire transaction is kept out of books of accounts. So, the transaction may all together escape from the tax net. 3. Fraud detection: E-commerce comes to us along with the in-built dangers of cyber crimes and frauds. Detection and Prevention of such frauds is very difficult. 4. Potential legal liability: As electronic commerce grows, number of new legal issues may arise. Organisations must be prepared to protect themselves from potential legal liabilities and ensure that their legal rights are protected. 5. Internet security:

Internet usage can be as secure as a company requires. It is important to use some appropriate tools and procedures to protect information assets. But we should not overreact and incur unnecessary costs and difficulties. Organizations should take proactive role in monitoring electronic transactions and protecting assets. Q.No.42. Write about Mobile Commerce. (RTP) Meaning: Mobile Commerce or M-Commerce is about applications and services that are accessible from Internetenabled mobile devices. M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular phones, Personal Digital Assistants (PDAs), etc. It is also known as next generation e-commerce. Features: It involves new technologies, services and business models. It is quite different from traditional E-Commerce. This technology is based on Wireless Application Protocol (WAP). Facilities: M-commerce enables users to access the Internet without any wired connection. Using Bluetooth technology, smart phones are able to offer fax, e-mail, and phone capabilities all in one. Due to this, M-Commerce is being accepted by large number of mobile workforce. The content delivery over wireless devices is faster, more secure, and scalable. So, there is a speculation that m-commerce will surpass wire line e-commerce. Industries affected by M-Commerce: Following are the industries that are affected by MCommerce. a. Financial services: Financial services, which include mobile banking (when customers use their handheld devices to access their accounts and pay their bills) as well as brokerage services, in which stock quotes can be displayed and trading can be done from the same handheld device. b. Telecommunications: Service charges, bill payment and account reviews in telecommunications, can all be conducted from a handheld device. c. Service/retail: Consumers can place orders and pay for them on the move. d. Information services: They include the delivery of financial news, sports updates and traffic updates to individual mobile devices. 21 Future expectation: In order to exploit the potential market in m-commerce, handset manufacturers such as Nokia, Ericsson, Motorola, and Qualcomm are working with carriers such as AT&T Wireless and Sprint to develop WAPenabled smart phones. Mobile phones or PDAs have some constraints when compared to desktop computers. But they also open the door to a wide range of new applications and services. Companies like IBM are experimenting with speech recognition software as a way to ensure security for MCommerce transactions. Q.No.43. Write about Bluetooth. (M07 5M, RTP) Introduction: Bluetooth is a telecommunications industry specification that describes how mobile phones, computers and Personal Digital Assistants (PDAs) can be easily interconnected using a short range wireless connection. Usage: Using this technology, users can easily exchange files between computers, cellular phones, pagers, and Personal Digital Assistants over short distances. Users can easily synchronize the information in their portable devices with a desktop or notebook computer. User can also send or receive a fax, initiate a print-out and in general, have all mobile and fixed computer devices be totally coordinated. Technical details: To get Bluetooth facility, it is required to include a low cost transceiver chip in each device. Actually this transceiver transmits and receives data. The transceiver uses a frequency band of 2.45 GHz that is available globally.

Each device has a unique 48-bit address from the IEEE 802 standard. In addition to data, up to 3 voice channels are available. Connections can be point-to-point or multipoint. The maximum range is 10 meters. Data can be exchanged at the rate of 1 Mbps (up to 2 Mbps in the second generation of the technology) With frequency hop (=jump) scheme, devices can communicate even in the areas of electromagnetic interference. Built-in encryption and verification is provided. This technology got its name in honour of Harald Bluetooth, king of Denmark in the mid-tenth century. Q.No.44. Write about Wi-Fi. Introduction: Wi-Fi stands for Wireless Fidelity. Wifi (also WiFi, Wi-fi or wifi) is a brand originally licensed by the Wi-Fi Alliance and it is used to describe the underlying technology of Wireless Local Area Networks (WLAN) and it is based on IEEE 802.11 specifications. This technology is designed for mobile computing devices such as laptops in LANs. But now it is used for variety of other applications, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions and DVD players. Several other standards are in development that allow Wi-Fi to be used by cars in highways in support of an Intelligent Transportation System. It can be used to increase safety, gather statistics and enable mobile commerce. How it works? A person with a Wi-Fi device, such as a computer, telephone, or Personal Digital Assistant (PDA) can connect to the Internet when it is near to access point. The region covered by one or several access points is called a hotspot. Hotspots can range from a single room to many square miles of overlapping hotspots. Wi-Fi Certification: WI-FI certification means that it is compatible with other WI-FI CERTIFIED products. In other words the WI-FI CERTIFIED logo means its a safe buy. Areas where it is used? Wireless technology gives complete freedom to a user to be connected anywhere if the computer is configured with a Wi-Fi CERTIFIED device. 22 Wi-Fi also allows connectivity in peer-to-peer mode which enables devices to connect directly with each other. This is very much useful in consumer electronics and gaming applications. Wi-Fi can be used to create a Wireless mesh network. Many corporations also provide wireless networks to their off-site and telecommuting workers to use at home or in remote locations. Large companies and campuses often use Wi-Fi to connect buildings. Wi-Fi networks are also found in busy public places like coffee shops, hotels, airport lounges and other locations where large crowds gather. This may be the fastest-growing segment of Wi-Fi service. Soon, WI-FI networks will be found in urban areas providing coverage throughout the central city or even highways. Limitation: When the technology was first commercialized users faced many compatibility problems. The Wi-Fi Alliance began as a community to solve this issue. The Alliance created another brand "WiFi CERTIFIED" to indicate that the products are interoperable with other products displaying the "WiFi CERTIFIED" logo.

23

Introduction to Computers
Q.No.1. Write about different generations of computers (Or) Historical Development of computers. Introduction: The modern computer, which we are using today, is not the invention of a single individual. It is the result of countless inventions, ideas and developments made by many people throughout the last several decades. The history of automatic data processing begins with Charles Babbages attempt to build a mechanical calculator at Cambridge, England, in 1830. By the end of 1930, punched cards were in wide use in many businesses. In 1937, Howard Aiken, at Harvard, proposed to IBM that a machine could be constructed which would automatically sequence the operations and perform calculations. That was the origin for the development of automatic computers. First Generation Computers: (1946 to 1959) UNIVAC (Universal Automatic Computer) was the first general purpose electrical computer. These computers employed vacuum tubes. These computers were large in size and required air conditioning (as they produce huge heat). The input and output units were punched cards. The input and output devices were very slow when compared to the speed of CPU. They were very expensive. The medium of internal storage was magnetic drum. Language used was Machine level language. Processors speed used to be measured in milliseconds.

IBM-650 was the most popular first generation computer and was introduced in 1950 with magnetic drum memory and punched cards for input and output respectively. It was intended (=designed) for both business and scientific applications. Second Generation Computers: (1959 to 1965) These computers employed transistors and other similar devices. Their circuits were smaller than vacuum tubes and generated less heat. Hence they required less power, were faster and more reliable. There were two separate categories of second generation computers - for business & scientific applications. IBM 1401 was the most popular second-generation computer. They employed magnetic tape as input/output media. Main medium of internal storage was magnetic core memory. Language used was Assembly language. Processor speed started to be measured in microseconds.

Third Generation Computers: (1965 to 1970) They employed integrated circuits, in which all the elements of an electronic circuit are integrated (=included) on a tiny silicon wafer. They were much cheaper and more reliable than second-generation computers. Their speed is high and can support variety of peripherals. They are based on the principles of standardization and compatibility. The secondary storage of a particular computer can be easily expanded. They can be used for both scientific and business applications. 1 They permit multi-programming, time-sharing, virtual memory and remote terminals. They also support high level languages such as FORTRAN and COBOL. Mainframes, Mini computers are also one of the developments in third generation computers. Limited communication facilities were also available. Processors speed started to be measured in nanoseconds. Fourth Generation Computers: (From 1970) They appeared in 1970s. They utilised still newer electronic technology and made the computer still smaller and faster than third generation computers. Many new types of terminals were also developed at this time. One of the major inventions was the large scale Integrated Circuit (LSI). It is a small chip consisting of thousands of small electronic components, which function as a complete system. With this technology the entire CPU can be built onto a single chip of size less than 1/3 inch square. This technology helped to reduce cost and increase speed. The speed of microprocessors, the size of main memory and hard disk increased tremendously. Many of the features of mainframe CPUs were introduced in these computers. In 1995 the most popular CPU was Pentium. These computers are being used in various areas like visualization, Parallel computing, virtual reality, Multimedia etc. Object oriented languages were introduced such as C++, VB, etc. Microcomputers and supercomputers are introduced at this time.

Fifth Generation Computers: It is very difficult to define the fifth generation computers because it is still under development. Introducing Artificial Intelligence to computers is the major development in this generation. Artificial Intelligence is a software that tries to imitate (=copy) human characters such as reasoning, communicating, seeing and hearing etc. This software can use its accumulated knowledge for decision making. In some cases, these systems can learn from past experiences and can modify its subsequent actions. This artificial intelligence is being used in several areas such as: - Natural languages, - Imitating human voice, - Voice recognition, - Visual recognition, - Translating from one language to another language, - Robotics, - Neural networks, - Expert systems. At first all these applications seemed to be (=looked to be) very simple. When programmers started working, they realised the difficulty. It will take several years for the development of such systems. Note: Third generation vs. Fourth generation computers. (M97-5M) Q.No.2. Write about different types of computers. (For academic interest only) On the basis of signals Analog Computers: (N95) They represent numbers by a physical quantity i.e. they assign numbers by physically measuring some physical property such as length of an object, angle created by two lines, voltage, temperature, pressure, etc. (Simply saying analog computers measure). Analog computers get input through some measurement. The accuracy of analog computers is directly related with the accuracy of its measurement. Data such as voltage, resistance, temperature, pressure etc. are represented in a computer as a continuous unbroken flow of information. These are very useful in engineering and scientific applications. But they are less accurate and the storage capacity is also limited. Hence they are not suitable for business data processing. 2 Digital Computers: Digital computers represent data as numbers. Counting on fingers is the simplest form of digital computer. Adding machines and pocket calculators are common examples of digital computers. They accept input from various input devices, convert them into numbers and perform arithmetic or logical operations on such numbers. It is also capable of storing data, performing logical operations, editing, deleting, printing output etc. The accuracy is also high. Hence suitable for business data processing applications. Cost is comparatively higher than analog computers. Programming is complex in nature. Hybrid computers: Hybrid computers combine the best features of analog and digital computers. They have the speed of analog computers and the accuracy of digital computers. They are used in areas where data from analog devices is converted into digits & processed by computer. For e.g. Analog devices measure patients vital signs like temperature, heart function etc. These are then converted into numbers and supplied to digital components of the system. Now digital components of the computer will process such data. On the basis of function Special Purpose Computers: These computers are designed to perform a special task [restricted class of problems]. Therefore, instructions are inbuilt into the computer circuitry by the manufacturers.

Thus a given task is performed quickly and efficiently. They are generally used for applications such as air line reservation system or for solving navigational problems etc. However, these computers are not versatile i.e. it cannot be used for any other purpose. General Purpose Computers: They can be used for many purposes such as business, scientific, educational, social and other applications. Everything depends on the program it uses. At the same time, they can store different programme instructions. Wide variety of jobs can be handled by these computers i.e. it is completely versatile. On the other hand old programmes can be amended or dropped. Scientific & Business Computers: Scientific problems involve huge amount of complex computations but involves small amount of input and output. Since input / output volume is low, the speed of input / output peripherals is not so important. But processing speed is very important because some problems may take several man months or even years for computation. Reverse is the case with business applications. Volume of input / output is very high. Arithmetic computations are neither voluminous nor complex. Therefore they need fast peripheral devices. Another difference is the storage requirement. Scientific systems have lengthy programmes but handle very small amount of input data. Therefore storage requirements are less when compared to business applications. On the basis of capacity Super computer, (1980) Main Frames, (1964) Mini Computer and (1968) Micro computer. (1974) Q.No.3. Write about Super Computers. Meaning: Super Computers are the largest and fastest computers available. Generally, they are not used for commercial data processing. Super Computers have huge amount of memory and high processing speed. They can process up to one billion instructions per second. Super Computers can process 64 bits or more at a time. Their processing speed ranges from 10,000 million instructions per second (MIPS) to 1.2 billion instructions per second. They can support up to 10,000 terminals at a time. Super Computers can recover automatically from failures (fault tolerance). 3 Conventional computers have single processor which can process one instruction at a time. But super computers have multiple processors (or CPUs) that process multiple instructions at a time. This is called parallel processing. In olden days high clock rate was considered as the main difference between ordinary computers and super computers. Now the distinguishing feature of super computers is their high degree or parallelism i.e. supercomputers consist of several processors, which can process simultaneously. Milestones: The first super computer was the ILLIAC IV made by Burroughs. Other suppliers of super computers are CRAY, CDAC [PARAM 2000 FROM INDIA], Fujitsu, Intel Corporation, Thinking Machine Corporation, Hitachi, IBM and Sun Microsystems, etc. Where they are used? These computers are used in specialized areas such as Defence, aircraft design, computer generated movies, weather research etc. In medical field, super computers are used to study the structure of viruses, impact of various drugs on human beings etc. Designing an aircraft involves simulating (=to create) and analyzing the airflow around the aircraft. This again requires a super computer. Q.No.4. Write about Mainframe Computers. Mainframes are less powerful and cheaper than Super computers. However, they are big generalpurpose computers and they can handle all kind of scientific and business applications.

Mainframes can process several million instructions per second. Mainframes can be used for a variety of applications. A typical application of these computers is airline reservation or railway reservation system. It can support many powerful devices. (E.g. a main frame can support more than 1,000 remote terminals.) Mainframes have large secondary storage capacity. Variety of peripheral devices like magnetic tape drives, hard disks, visual display units, plotters, printers and telecommunication devices can be connected to main-frame computers. They have high-speed cache memory which helps to process data at a faster rate than mini or microcomputers. They also offer the facility of multiprogramming. Prices of Mainframe computer ranges from 1 crore to 5 crores depending upon the configuration. Major suppliers of mainframe computers are IBM, HP, Sun Microsystems, Honey well, Burroughs, NCR, CDAC and Sperry etc. Large mainframes can have hundreds of MBs of main memory and hundreds of GBs of secondary storage. Note: Super computers Vs. Mainframe computers. (M00-5M, RTP) Q.No.5. Write about Mini Computer. (N93) It is a relatively fast, small and inexpensive computer. The input/output capabilities are some what limited. Data processing is similar to that of mainframe but on a small scale. The cost of minis is low. Usually data is input by means of a keyboard. As the name implies, a minicomputer is small, compared to a mainframe. It is also called as scaled-down mainframe. The processor and the peripherals are physically smaller. Minicomputers cost from Rs.5 lacs to Rs.50 lacs. The most popular minicomputers or minis are Data General Nova, IBM series/1. These computers can support multiple number of users. Small to medium sized organizations use minicomputers for their data processing activities. Primary storage capacity starts at about 640KB and can go up to few MBs. Programming languages include BASIC, PASCAL, COBOL, C and FORTRAN. Minicomputer systems can support most of the input/output (I/O) devices and secondary storage devices that large mainframe systems can handle. They are also used to develop distributed data processing systems. Instead of having large mainframe computer, a company may install mini-computer at each remote location and connect them to each other through telecommunications. 4 Q.No.6. Write about Micro Computer. (N93) Micro Computer: A microcomputer is a full-fledged computer system that uses a microprocessor as its CPU. Microprocessor is a small chip which may vary from fingernail size to postage-stamp size. Microcomputers were first available in 1970s. The first microcomputer designed for personal use was Altair. PC Vs. Micro Computer: The term PC has a more specific meaning. In 1981, IBM named its first microcomputer as IBM PC. Within few years, many companies copied the IBM design, which can function like IBM PCs and are called IBM clones or IBM compatible computers. Thus the term PC includes IBM PC and its compatibles. On the other hand Apple Macintosh computer is neither an IBM PC nor its compatible. It belongs to another family of microcomputers made by Apple computers. Manufacturers: Currently IBM & Apple are the 2 most popular manufacturers of microcomputers. Elements of Micro Computers: A microcomputer may consist of the following elements: 8, 16, or 32 bit processor, Internal memory 256 MB expandable to 512 MB and more; Backing storage-cassette, floppy disc, microfloppy discs, micro-drive, silicon disc or hard disc, CDROMS, DVDs, pen drives etc.; Keyboard and screen (input and output);

Interface (for the connection of peripherals); Bus (communication and control channels); Printer and/or plotter (multicolour text and graphics); Pulse generator (clock); Light pens, mouse, paddles/joysticks, Multimedia (graphics and games); Software (programs) Usage: Microcomputers are useful even to the smallest businesses. However their primary market is the personal home computer market. Q.No.7. With reference to computers, explain briefly what is workstation? (N01-3M, M97-1M) Meaning: Between minicomputer and microcomputers - in terms of processing power there is a class of computers known as WORKSTATIONS. A workstation looks like a personal computer and is typically used by one person. Workstations are still more powerful than PC. There are 2 major differences between a workstation and a PC. Internally, workstations are constructed differently than microcomputers. They are based on different architecture of CPU called Reduced Instruction Set Computing (RISC), which results in faster processing of instructions. On the other hand most microcomputers can run any of the four major operating systems - DOS, Unix, OS/2 and Microsoft Windows NT. But workstations run on Unix operating system. A disk less workstation does not have floppy disk drive. Data storage is provided by centralized hard disc. This provides control over data storage because it reduces the possibilities of data theft. Manufacturers: The biggest manufacturer of workstations is Sun Microsystems. Other manufacturers include IBM, DEC, Hewlett Packard, Silicon Graphics, DELL etc. Conclusion: Many people use the term workstation to refer to any computer or terminal that is connected to another computer. But this is an outdated term. These days, a workstation is powerful RISC based computer and is generally used by scientists and engineers. Note: Micro computer Vs. Workstation. (N03-4M) Q.No.8. Write about Server. (N07-1M) A server is a computer system that provides services to other computers in a network, called clients or workstations. Servers occupy a place, similar to that of mini computers. But today servers have largely replaced minicomputers. A typical server is a computer system that operates continuously in a network and serves the requests of other computers in the network. Servers may be broadly classified as dedicated and non-dedicated. 5 A dedicated server is completely reserved for the purpose of serving other computers and no other activity can be performed on such servers. These types of servers are preferred when there are large number of nodes on the network. CA/CWA, MEC/CEC, B.Com & B.Sc. Master Minds On the other hand a non dedicated server is not completely reserved for this purpose i.e. it can also be used simultaneously for other purposes. This kind of servers are generally preferred by small organisations For e.g., in a small office, a large desktop computer may act as both workstation and as a server. Today, Servers are physically similar to most other general-purpose computers. But their hardware configuration is optimized to meet the requirements. In many cases the hardware will be similar to that of a standard desktop PC. However, servers run software that is very much different from that used on desktop computers and workstations. Generally servers are used to host (= to provide or to share) hardware resources on a controlled and shared basis to client computers such as printers (print servers) and file systems (file servers). This sharing permits better access control (and thus better security) and can reduce costs by reducing hardware duplication. Servers should not be confused with mainframes. Mainframes are very large computers that centralize certain information processing activities in large organizations. They may or may not act as servers in addition to their other activities.

Many large organizations have both mainframes and servers. Usually, servers are smaller and much more numerous and decentralized than mainframes. Q.No.9. Define the term Computer? State its advantages & disadvantages. (RTP) Computer: The term computer is used to represent a calculating machine. It is an electronic data processing device capable of receiving input, storing instructions for solving problems and generating output with high speed and accuracy. Computers consist of switches, wires, motors, transistors and integrated circuits, etc. These components are wired together into a network called computing system or simply computer. Advantages of Computer System: a. Speed: The smallest unit of time that a human being can experience is second. But Computer operations are measured in milliseconds, microseconds, nanoseconds and picoseconds. Today computers can perform more than 2500 MIPS. They can handle very complex tasks in seconds. b. Accuracy: Errors occur in computers also but only few errors can be attributed (=credited) to a computer. In most of the cases errors occur due to program logic error, procedural error or erroneous data. Really speaking, these are human errors. c. Reliability: Computers can perform repetitive tasks very well. They dont take sick days and coffee breaks and they rarely make any complaints. Even the error rate of 0.1% is unacceptable. d. Memory capability: Computer systems can instantly recall the data and their storage capacity is almost unlimited. Today, even ordinary personal computers are coming with 10 to 40 GB of memory. High end computers can support still more memory. e. Flexibility: Modern digital computers can be used for a variety of purposes and everything depends on the program inside the computer. f. Choice of configuration: A wide range of optional peripherals are available in the market. A business organisation can select those peripherals which are most suitable for its processing requirements. Limitations of computer system: Computer is one of the most powerful tools ever developed. But it doesnt mean to say that computers will never fail. Computer failures happen because people fail to consider some basic limitations of computer. They are: a. Program must be reliable: A computer can do what it is programmed to do and nothing else. But a program that has operated flawlessly (=Without any error) for months can suddenly produce non sense. To avoid such problem, the program must be acquired or developed from a reliable source. b. Application logic must be understood: Computer can only process jobs which can be expressed in a finite (=limited) number of steps. Each step must be clearly defined. That is why a computer cant perform a job, where subjective (=personal i.e. changes from person to person) decisions are important. For example, it may not tell whether a new product will be successful or not. 6 c. Installing a computer requires a difficult and expensive task of system analysis and design. To do this there is a scarcity of computer professionals. d. The initial investment is very high. e. The lead time of installing is high and the hardware technology is rapidly advancing. Some peripherals / components may become obsolete even before installation. f. Standby facilities should be arranged in the event of breakdown of any part of the computer. g. Although manual systems are slow, they are very flexible when compared to computerised systems. For example, if the format of a report has to be changed, it can be readily done by communicating the necessary instructions to the concerned staff. But in a computerised system, this may take several months. Q.No.10. Write about the basic components of a computer system? (RTP, N00-5M) A computer is a group of integrated parts (sub systems). Following are the four basic operations performed by a computer: Input devices: A computer must receive both program statements (=instructions) and data to solve problems. Input devices are used for this purpose. Some of the most commonly used input devices are keyboard, mouse, mike, etc. These input devices are instruments of interpretation and communication between people and the computer. CPU: The heart of any computer is the central processing unit (CPU). This central processor makes

comparisons, performs calculations, reads, interprets (=understands) and controls the execution of instructions. It consists of two separate sub units control unit and Arithmetic/Logic unit. Control unit supervises the operations of the entire computer. On the other hand ALU performs the actual processing operations. Memory: Following are the 2 types of memory used in a computer. Primary Memory: Primary memory acts as volatile memory (=temporary memory) and is used to store information which will be used during computations. As the computer processes data, RAM holds both intermediate and final results. Commonly used primary storage device is RAM chips. Primary memory is very fast and expensive and limited in capacity (few MBs). Secondary Memory: Primary memory storage capacity is limited, expensive and volatile. Hence, it is necessary to have secondary or permanent or auxiliary storage for holding data and programs permanently. Some of the commonly used secondary storage devices are magnetic tape drives, magnetic disk drives (Hard disks, floppy disks, etc.), optical disk drives (CDs, DVDs, etc.) Output Devices: Output devices are instruments of communication between people and machines. They are used to present the results of processing to outside world. Most commonly used output devices are printers, graph-plotters, speakers etc. Q.No.11. what is meant by Central Processing Unit? What are the components of CPU? Meaning: Central Processing Unit (CPU) - also known as processor - is the heart, soul and brain of the computer. In a microcomputer, the entire CPU is contained on a tiny chip called microprocessor. The processor computes and processes data and delivers the results. Every CPU has at least two basic parts, Control Unit (CU) and Arithmetic Logic Unit (ALU). Control Unit (N00): All the resources of computer are managed by control unit. The CPUs instructions (for carrying out commands) are built into the control unit. The instructions or instruction set, lists out all operations that a CPU can perform. Each instruction in the instruction set is expressed in the form of microcodes. Every command must be broken down into instructions that correspond to the instructions in the CPUs instruction set. Now each instruction is executed. Although the process is complex, computer can perform it at an incredible (=unbelievable) speed i.e. millions of instructions every second (MIPS). 7 Arithmetic Logic Unit: Computer can perform only two types of operations: Arithmetic and Logical operations. Arithmetic operations include addition, subtraction, multiplication, division, etc. Logical operations include comparisons. (E.g. Determining whether one number is equal to, greater than or less than another number.) ALU consists of temporary storage locations, called storage registers. They store numbers, used in calculations and for storing the results of calculations. Number of registers in ALU depends on the type of microprocessor used and may range from 1 to 32. Q.No.12. Describe briefly the functions of the Control Unit of a computer system. Also state its four components. (N 00) Control Unit: Control unit is the most important component of CPU. It supervises the operations of the entire computer. It selects the program statement from the storage unit, interprets the statement and sends the appropriate electronic impulses to the arithmetic/logic unit and storage unit, for the purpose of actual processing. Thus, the control unit does not perform the actual processing operations on the data. Its function is to maintain the order and direct the flow of operations and data within the computer.

It also instructs input devices, when to start and stop transferring date to storage unit. It tells the storage unit when to start and stop transferring data to output devices. Hence, it acts as a central nervous system for the computer. Components of a Control Unit: Control unit comprises the following four components: Instruction register Decoder Address register Instruction counter. The instruction register receives instructions, one by one, to be executed in the required sequence. The operation code (OP code) of the instruction in the instruction register is transferred to the decoder. The decoder decodes the operation code (e.g. whether it is addition or subtraction or multiplication or division etc.) and activates the appropriate circuits of the arithmetic/logic unit to perform that operation. Now the address register transfers data to a specific accumulator for arithmetic/logic unit. Q.No.13. Write about various features of CPU. Over a period of time, the processor has developed from slow 286s or 386s running at very low speeds of 20 MHz to present day Pentium III and IV running at a speed of 3 GHz (3000 MHz.). Following are some of the important features of a CPU: Clock Speed: (M08-1M) Clock speed is the speed at which processor can execute (=carry out) instructions. Clock speed is measured in megahertz (MHz) - which indicates millions of cycles per second. Therefore, a 450 MHz processor can perform 450 Million instructions per second. Higher the clock speed, faster the processor, better the system performance. Cache Memory: (M03, N04, M06, M07, N08-1M, RTP) RAM stores data and instructions during processing. The instructions and data are one by one called by CPU, for processing. The processed data is sent back to RAM. During processing there is a constant movement of data and instructions between RAM & CPU. RAM is slower and CPU works at a very high speed. Therefore CPU should slow down to the speed of RAM which reduces the processing speed. To minimise this, Cache memory is provided between RAM and CPU. This is a temporary, high speed memory and can boost processing power significantly. In addition to this, modern processors are coming with inbuilt cache memory. The cache memory that comes along with the processor is called Level One (L1) cache. This cache runs at the processors clock speed. So, it is very fast. Generally, more the LI cache, faster the processor. PCs also include slower, secondary or Level Two (L2) cache. This cache memory resides on the motherboard. When compared to L1 cache, L2 cache slower performance. 8 Slot: Different processors use different sockets or slots to fit onto the motherboard. There are two main types of slots for connecting to the motherboard - Socket 7 and Slot 1. Socket 7 is a 321-pin socket used for Pentium class CPUs like - Pentium MMX, K5, K6 - ranging from 75 MHz to 200 MHz processors. However, Pentium II/III CPUs use Slot 1 for connecting to the motherboard. Slot 1 CPUs fit onto the motherboard as a daughter card, which allows faster communication. Density: A CPU is made up of millions of small transistors. By synchronising these transistors, CPU performs all calculations. If the distance between two transistors is low, we can integrate more number of transistors. In old CPUs this distance used to be 1 micron. But, new CPUs are being developed with a distance of 0.35 micron, delivering faster performance. MMX: MMX stands for Multimedia Extensions - a set of instructions built in to the CPU. These instructions are specifically meant for improving the performance of multimedia or graphic applications. Cooling CPU: While processing, CPU generates lot of heat. If the CPU is not cooled properly, it may lead to different types of errors including system crashes. Therefore, CPU is covered by a heat sink and a small cooling fan to dissipate (=disperse) the heat generated by the processor.

Manufacturers: Microprocessors are not made by the manufacturers of micro computers but by companies such as Motorola, Intel, AMD etc. All Apple Macintosh micro computers use Motorola chips: (E.g., Motorola 68000 used in earlier models, Motorola 68020 used in Macintosh II & Motorola 68030 being used in recent models). On the other hand IBM PCs & its compatibles use Intel Processors. Q.No.14. What is meant by Mother Board? What are the major components of a motherboard? (RTP) Meaning: Motherboard or system board is the main circuit board on the computer. It acts as a mediator between several components of the computer. For each type of micro processor, there will be corresponding motherboard. Following are some of the important components of motherboard. CA/CWA, MEC/CEC, B.Com & B.Sc. Master Minds 1. Processor slot: Based on the type of processor used,there are 2 types of slots -Socket-7 & Slot-1. 2. BIOS: BIOS stands for Basic Input Output System. It is a small chip on the motherboard that loads the hardware settings of various devices like keyboards, monitors or disk drives. Today most PCs are coming with Flash BIOS. This type of BIOS can be upgraded, to support new devices. 3. CMOS: PC uses CMOS memory to store date, time and system setup parameters. These parameters are loaded every time the computer is started. A small Lithium Ion battery located on the motherboard supplies power to CMOS as well as BIOS. 4. Power supply connectors: Power supply connectors allow user to connect the power supply unit to the motherboard. It provides power to various components that fit on to the motherboard. 5. Expansion Slots: (RTP) PCs are designed in such a way that users can configure (=construct) the machine as per their own particular needs. Expansion slots provide such modularity to PCs. Expansion slots are used for any of the following purposes: It acts as a mediator between Controller cards and computers built in devices such as hard disks, diskette drives etc. To provide I/O ports on the back of the computer so as to connect external devices such as monitors, external modems, printers, etc. To connect special purpose devices to the computer. Most commonly found expansion slots are given below: a. SIMM / DIMM slots: SIMM stands for Single Inline Memory Modules, while DIMM stands for Dual Inline Memory Module. SIMM/DIMM slots are used to house (=insert) RAM modules. b. PCI Slots (N05-1M): PCI (Peripheral Component Interface) slots are used for connecting PCIbased devices like graphics accelerator cards, sound cards, internal modems, etc. c. AGP Slot: This is a dedicated slot meant to provide faster access to AGP based graphic accelerator cards. It improves the visual experience of the user. d. SCSI card: It is a device interface, used to solve the problem of insufficient number of expansion slots. It is called small computer system interface (SCSI pronounced scuzzy,). SCSI is like an extension cord for computer bus. IBM developed SCSI in 1970s. The current standard is SCSI-3. 9 With this upto 7 devices can be connected as chain, on a single SCSI port. Now-a-days many devices support the SCSI interface. Generally, high speed hard disk drives have SCSI interface. Similarly scanners, tape drives and optical storage devices are coming with this technology. 6. Ports and connectors: Ports & connectors are used to connect external devices like printers, keyboards, scanners etc. to a PC. They are located on the back of the PC, but they are directly or indirectly connected to the motherboard. Following are some of the commonly used ports: a. Parallel ports (N03, N04, M06, N06, N08-1M, RTP): Parallel ports are used to connect parallel devices like scanners or printers. Parallel ports facilitate parallel transmission of data, usually one byte (8 bits) at a time. Parallel ports use 25 pin RS-232C connector. b. COM / Serial ports: They are used for connecting communication devices like modems or other serial devices like mice. There are two varieties of Com ports - 9 pin ports and 25 pin ports. Serial Ports facilitate serial transmission of data i.e. one bit at a time. c. IDE drive connector: IDE devices like CD-ROM drives, hard disk drives or Floppy drives are connected to the motherboard through IDE connector. d. USB ports (M04, M07-1M): USB stands for Universal Serial Bus. With the help of these ports data can be transferred at a very high speed. Different USB devices are available in the market like keyboards, mice, scanners or digital cameras. e. PS/2 Connectors: PS/2 stands for Personal System/2. PS/2 connectors are used to connect PS/2

based input devices like PS/2 keyboards or mice. New motherboards are coming with integrated graphics cards & sound cards i.e., there is no need to install a separate card. Note: Interface Vs. Port (N00-5M) Q.No.15. Define the term BUS? What are the components of bus? Meaning: A bus is a collection of wires through which data is transmitted between various components of a PC. If we closely look at the motherboard, we can notice a network of golden electric paths etched on both sides of the motherboard. They form the bus of the PC. A bus acts as the systems expressway - it transmits data between various components on the motherboard. Logically bus consists of two parts - an address bus and a data bus. Data Bus: (N07, N08-1M) a. Data Bus is an electrical path that connects the CPU, memory & other hardware devices on the motherboard. b. Bus is a group of parallel wires. The number of wires in the bus can affect the speed at which data can travel between hardware components. c. Each wire can transfer one bit at a time. Therefore, an eight-wire bus can move eight bits at a time. A 16-bit bus can transfer two bytes and a 32-bit bus can transfer four bytes at a time. d. PC buses are designed to match the capabilities of devices attached to it. For e.g. a 32 micro processor must support 32 bit data bus. e. Following are different types of data bus used in PCs. MCA bus Micro Channel Architecture, EISA bus Extended Industry Standard Architecture, ISA bus Industry Standards Architecture, PCI bus Peripheral Component Interconnect. Address Bus: Address bus is also a set of wires, similar to the data bus. But it is used to connect CPU and RAM. Data bus always carries data but address bus carries memory addresses. Each byte in RAM is associated with a number, which is the memory address. To request data from RAM, CPU sends the required address. The number of wires in address bus determines the maximum number of memory addresses. For example, one byte of data is enough to represent 256 different values. If the address bus could carry only eight bits at a time, the CPU could address only 256 bytes of RAM. Actually, most of the early PCs had 20-bit address buses, so the CPU could address 1 MB of data. Today, most CPUs have 32bit address buses that can address 4 GB of RAM. Note: Address bus vs. Data bus (N03-4M) 10 Q.No.16. Write about different types of storage devices. (For academic interest only) Storage Devices: CPU contains basic instructions needed to operate the computer. But it cant store programs and data. Just like the human brain, Computers also need some blocks of space to store programs and data. This space is called memory or storage. Types of storage: Various forms of storage have been invented. Till now there is no universal storage medium. Every form of storage has some drawbacks. Therefore, a computer system may contain several kinds of storage, each for a particular purpose. 1. Primary storage: Primary storage is directly connected to the central processing unit of the computer. For biological bodies lungs must be present (for oxygen storage) for the heart to function (to pump and oxygenate the blood). Similarly, memory must be present for the CPU to function properly. Primary storage typically consists of 3 kinds of storage: a. Processor registers: These are internal to the CPU. Registers contain information that is necessary for ALU to carry out the current instruction. Technically they are the fastest of all forms of computer storage. It consists of switching transistors integrated on the CPU's silicon chip and operates as electronic "flip-flops". b. Main memory: It contains some programs and data that are currently being run. The arithmetic and logic unit can quickly transfer information between processor register and main memory. It is also

known as "memory addresses". In modern computers, electronic solid-state Random Access Memory is used for main memory and is directly connected to the CPU through "memory bus" and "data bus". The memory bus is also known as address bus or Front Side Bus. Both busses are high-speed digital "superhighways". Access methods and speed are the two fundamental, technical differences between memory and mass storage devices. c. Cache memory: Already discussed. 2. Secondary, tertiary and off-line storage: Secondary storage requires the computer to use its input/output channels to access the information, and is used for permanent storage of information. On the other hand most of the operating systems also use secondary storage devices as virtual memory (to artificially increase the amount of main memory). Secondary storage is also known as "mass storage". Generally the capacity of Secondary or mass storage is much greater than primary memory (main memory). But it is very much slow when compared to primary memory. In modern computers, hard disks are usually used for mass storage. The time taken to access a given byte of information on a hard disk is few thousandths of a second (or milliseconds). But the time taken to access a given byte of information in RAM is measured in thousand-millionths of a second (or nanoseconds). This illustrates the speed difference between RAM and hard disc. Generally Hard disks are million times slower than memory. Rotating optical storage devices (such as CD and DVD drives) are still slower than hard disks. That is why the use of virtual memory significantly degrades the performance of any computer. 3. Tertiary storage: It is a system where a robotic arm will "mount" (connect) or "dismount" (disconnect) offline mass storage devices according to the demand of computer operating system. Tertiary storage is used in the areas of enterprise storage and scientific computing on large computer systems and business computer networks. 4. Off-line storage: It is a system where the storage medium can be easily removed from the storage device. Off-line storage is used for data transfer and archival purposes. In modern computers, floppy discs, optical discs and flash memory devices including "USB drives" are commonly used for off-line mass storage purposes. "Hot-pluggable" USB hard disks are also available. Off-line storage devices used in the past include magnetic tapes, removable Winchester disks/drums. 5. Network storage: Network storage is any type of computer storage that involves accessing information over a computer network. Network storage allows to centralize the information management in an organization. It helps to reduce the duplication of information. Network storage includes: a. Network Attached Storage (M06, N08-5M): It is secondary or tertiary storage attached to a computer which another computer can access over a local-area network or a private wide-area network or in the case of online file storage over the Internet. b. Network computers: These computers do not contain any internal secondary storage devices. Instead, documents and other data are stored on a Network Attached Storage. 11 Q.No.17. Write about different characteristics of storage devices. (For academic interest only) The division of primary, secondary, tertiary and off-line storage is based on memory hierarchy or distance from the CPU. There are also other ways to characterize various types of storage. 1. On the basis of volatility of information: a. Volatile memory: It requires constant power to maintain the stored information. Volatile memory is typically used only for primary storage. The best example is RAM. b. Non-volatile memory: It can retain data even if the power supply is switched off. It is suitable for long-term or permanent storage of information. That is why it is used for secondary, tertiary and offline storage. c. Dynamic memory: It is also a volatile memory. It is dynamic because each memory cell quickly loses its charge. So, it must be refreshed for hundreds of times each second. 2. On the basis of ability to access non-contiguous information: a. Random access: It means that data in any storage location can be accessed in the same amount of time (generally very small amount of time). That is why random access memory is very much suited for primary storage. b. Sequential access: It means that data in different storage locations cant be accessed in the same

time. The access time varies from one file to another file. In these cases access time consists of seek time (e.g. to position the read/write head correctly) and rotational delay (e.g. time taken to rotate the medium in such a way that the required file appears below the read/write head). 3. On the basis of ability to change information: a. Read/write storage, or mutable storage: In this case information can be erased and fresh information can be rewritten for any number of times. Every computer must have at least some amount of storage of this kind. b. Read only storage: In this type of memory, data is recorded at the manufacturing and it is stored permanently. The information from the memory can be read but fresh information cannot be written. This is a write once storage (WORM). These are also called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM. c. Slow write, fast read storage: In this type of memory data can be overwritten for multiple times. But the write operation will be much slower than read operation. Examples include CD-RW. 4. On the basis of addressability of information: a. Location addressable storage: In this storage each memory location will have a unique address and data can be accessed by its numerical memory address. In modern computers, this method is followed in case of primary memory. This method is very efficient but very burdensome for human beings. b. File system storage: In this case information is divided into files of variable length, and a particular file is selected from human readable directory and file name. The operating system of a computer will provide the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage uses this file system. c. Content addressable storage: In this case each individually accessible unit of information is selected with a hash value or a short identifier. Here, there is no significance of memory address in which information is stored. Content addressable storage can be implemented either using software or hardware. Hardware is faster but more expensive. 5. On the basis of capacity and performance: a. Storage capacity: It is the total amount of information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes ) b. Storage density: It refers to the compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square centimeter) c. Latency: It is the time taken to access a particular location in storage. It is generally 1 nanosecond for primary storage, 1 millisecond for secondary storage and 1 second for tertiary storage. We can also differentiate as read latency and write latency. d. Throughput: It is the rate at which information can be read from or written to the storage. In computer storage, throughput is usually expressed in terms of megabytes per second or MB/second. 12 Q.No.18. Write about Semi Conductor memories or Integrated circuits (N98-1M, M00-5M) This type of storage devices are based on the principles of storage chips. These are very thin silicon chips, consisting of number of small storage cells that can hold data. These units are constructed as integrated circuits, meaning that number of transistors are integrated or combined together on a thin silicon wafer. Faster and more expensive bipolar semi conductor chips are often used in ALU and high speed buffer storage sections of CPU. Slower and less expensive chips that employ metal-oxide semi-conductor (MOS) technology are used in main memory section. These are again divided into - permanent (Non Volatile) & non permanent (Volatile). Non volatile chips can retain the data permanently i.e. they hold data even when the computer is switched off. (E.g.- ROM BIOS) On the other hand Volatile chips lose their contents when the computers power is switched off i.e. these chips provide volatile storage. RAM is the best example for this type of memory.

Q.No.19. Define the term RAM. Write about various kinds of it? (N94, M01) Meaning: The memory system constructed with metal oxide semi conductor storage elements that can be changed is called Random Access Memory. It is used to hold intermediary data in the computer. The contents of this memory chips are temporary and can be easily changed. It is the workspace for the computers processor. When people talk about computer memory, they usually mean volatile memory. Why is it called so? It is called random access memory because access time in RAM is independent of the address of the data. Each storage location (address) inside the memory is as easy to reach as any other location and takes the same amount of time. One can reach into the memory at random and insert or remove numbers in any location at anytime. Types of RAM: a. Dynamic RAM: It is the most common type of main memory. It is dynamic because each memory cell quickly loses its charge. So it must be refreshed for hundreds of times each second. In olden days refreshing was done by Microprocessor. Due to this, lot of processing power was wasted. But todays dynamic RAM is coming with built in refresh circuits. This saves lot of processing power. b. Static RAM: Static RAM (SRAM) is like DRAM but it is faster, larger and more expensive. It is static because it is not required to refresh the contents of RAM continuously. Because of its speed, SRAM is mainly used in special area of memory called cache memory. c. Static RAM Vs Dynamic RAM: Static RAM can retain the stored data as long as power remains in. Whereas in dynamic RAM, the stored information disappears after every few milliseconds. Therefore, data must be refreshed before it disappears. The power consumption of dynamic RAM is less than that of static RAM. Q.No.20. Write about ROM? What are the various kinds of it? (N94) Another type of computer memory is Read-Only-Memory (ROM). It is used for storing micro programs, not available to normal programmers. The information is permanently stored during manufacturing. The information from the memory can be read but fresh information cannot be written. Generally ROM is used to store instructions that are frequently needed, for executing small, extremely basic operations, which will not be available in the computers circuitry. For e.g. ROM may be used for code converter, function generator (e.g. sine, cosine, tangent etc.) and character generators (e.g. characters displayed in dot matrix form). Different kinds of ROM: a. PROM (N03, N07-1M): Programmable Read Only Memory is a non-volatile memory which allows the user to program the chip with a PROM writer. User can record any data or instructions. The only problem with PROM chips is that once data is recorded on them, it cannot be changed. 13 b. EPROM: EPROM stands for Erasable Programmable Read Only Memory. EPROM chips can be electrically programmed. Unlike ROM and PROM chips, EPROM chips can be erased and reprogrammed. With the help of ultraviolet light, the data or instructions on an EPROM chip can be erased and new data can be recorded in its place. c. EEPROM: It stands for Electrically Erasable Programmable Read Only Memory. This is the latest addition to the ROM family of chips. For the purpose of reprogramming, they need not be removed from the machine. Changes can be made electrically, under the control of a software. Note: RAM Vs. ROM (N04, N96, M05-5M, RTP) Q.No.21. Write about Bubble Memory. (N98-5M, RTP) Bubble memory consists of small magnetic domains (bubbles) formed on a thin single-crystal film of synthetic garnet. These bubbles are actually magnetically charged cylinders, and can be moved

across the garnet film by using electric charge. The presence or absence of a bubble can be used to indicate whether a bit is on or off. Features of bubble memory: a. It is small in size, lightweight and does not use much power. b. It provides non-volatile memory i.e. data stored in bubble memory is retained even when the power is switched off. c. It allows direct access to data. d. Low production cost. e. Data density of bubble memory is very high. f. It is very much suitable for auxiliary storage in portable computers. Bubble chips are also being used in machine tools, robots and military computers. Q.No.22. Write about Flash memory? (M08-1M) Flash memory chips are one of the latest storage devices. It is other name given to EEPROM Chips. These chips are a form of Static RAM (SRAM) chips, and they store data similar to that of computers primary memory. However,data stays recorded even when the power is turned off. Thus flash memory is non-volatile. Flash memory devices have no moving parts. So, they are very fast. If the technology is still improved, they can replace slower, mechanical hard disk drives. These memory chips are very small in size and consume very less power. Currently these chips are being used in portable devices. Q.No.23. Explain the concept of Basic Input Output System (BIOS) (M03, N06-1M, RTP) Meaning: Basic Input Output System is a small chip on the motherboard which loads the hardware settings of various devices such as keyboards, monitors, etc. When a computer is switched on, micro computer uses this software to start the system. Features: BIOS is a program that is made accessible to the microprocessor on an EPROM chip. Theoretically, it is the intermediary between the microprocessor and I/O devices. In some cases, it can transfer data directly from different devices to memory. A small lithium Ion battery provides power to BIOS. When the details of a device change, BIOS needs to be changed. It controls the routine functions like clock, input/output devices and manages data flow between the computers operating system and attached devices such as hard disk, video adapter, keyboard, mouse, printer, etc. When the computer is switched on, BIOS checks whether all devices are attached or not and are operational or not. Q.No.24. Write about CMOS (N04, M08, N08-1M) CMOS stands for Complimentary Metal Oxide Semiconductor. It is a small memory chip that stores date, time and system setup parameters which are loaded every time the computer is started. 14 The data in the CMOS is maintained with electric power from a small Lithium Ion Battery located on the Motherboard. It is a medium for storage of information which is instantly made available to the BIOS programs during the start up. CMOS should be updated when different or additional hardware components are installed. Q.No.25. Short notes on Floppy disks as a secondary storage device. (M07-5M, M97,N99-1M) Introduction: It is the most widely used auxiliary storage device in the world. It is used for a variety of purposes like taking a back up copy of important files, to transfer documents from one computer to another computer, etc. They were invented and introduced by IBM. What does it contain?

It consists of a circular piece of thin plastic material, approximately eight inches in diameter and it coated with metal oxide material. The circular piece of plastic is enclosed in a square protective jacket with a cut out so that the read / write head can access the disk. This is called a floppy disk or diskette. How it works? The surface of diskette is coated with millions of tiny iron particles so that the data can be stored on them. The drive consists of a motor that can rotate the disk. It also consists of Read/Write heads that can move to any spot on the disks surface. This allows the heads to access data directly, rather than sequentially. The R/W heads of a diskette drive consists of electromagnets, which generate magnetic field on the iron particles of the diskette. Floppy diskettes spin at around 300 revolutions per minute. Therefore, the longest time required to reach a point on the diskette is nothing but the amount of time required for one revolution i.e. about 0.2 second. The heads can move from the center to the outside edge in less than 0.17 second. Since both operations (rotating the disk and moving the heads) take place simultaneously, the maximum access time is 0.2 second. How Data is organised on a disk? (Format M06-1M) New diskettes must be formatted before they can be used. When the disk is formatted, a set of magnetic concentric circles will be formed, known as tracks. (Most diskettes have 80 tracks). Each track on a disk is also split into smaller segments called sectors. All the sectors on the disk are numbered. Thus each small area on the disk will get a unique number. On most diskettes, each sector can store upto 512 bytes/ 0.5 KB of data. Q.No.26. What are the various factors which determine the storage capacity of a magnetic disk. (M04- 5M) (Or) What are the factors to be considered to ascertain the number of characters that can be stored on a diskette? The storage capacity of a diskette depends upon the following factors: a. The number of sides of the diskette used: The earlier diskettes and drives were designed to record data on one side of the diskette only. These drives were called single-sided drives. Now-adays diskette can use both the sides and are called double-sided drives. b. The recording density: Recording density refers to number of bits that can be recorded on one inch of disk space. This measurement is referred to as bits per inch (bpi). On this basis diskettes may be classified as single density disc (SD) or double density disc (DD). A single density drive can store 2,768 bits per inch on the innermost track. Double density drive can store 5,876 bits per inch. With improved technology, it is anticipated that in future it may exceed 10,000 bpi. c. Number of tracks on the diskette: The number of tracks depends upon the drive being used. Many drives record 40 tracks on the surface of the diskette. On the other hand, double track drives can record 80 tracks on the diskette.

15 Q.No.27. How Operating System finds Data on a disk? A computers operating system is able to locate data on a disk (diskette or hard drive) because each track and sector is labeled and the location of all data is kept in a special log on the disk. The labeling of tracks and sectors is called format. A commonly used format, performed by DOS or Windows, creates these four disk areas: 1. The boot record (N03, M07, M08-1M, RTP): It is a small program that runs when the computer is started. This program determines whether the disk has the basic components of DOS or Windows that are necessary to run the operating system successfully. If it determines that the required files are present and the disk has valid format, it transfers control to the operating system. This process is called booting because the boot program makes the computer pull itself up by its bootstraps.

2. The File Allocation Table (FAT) (M03, M04-1M, RTP) It is a log that records the location of each file and the status of each sector. When a file is stored on a disk, the operating system checks the FAT for an open area, stores the file and then identifies the file and its location in the FAT. 3. Root folder / Directory: A folder, also called a directory, is a tool for organizing files on a disk. Folders can contain files or other folders. Thus it is possible to set up a hierarchical system of folders on the computer, just as there are folders within other folders in a filing cabinet. The top folder on any disk is known as root. 4. Data area: The part of the disk that remains free after the boot sector, FAT, and root folder have been created is called the data area because that is where the data files (or program files) are actually stored. Q.No.28. What is the care required to be taken in using and storing diskettes. Following points focus on the care required to be taken in using and storing diskettes: On receiving a new diskette, it should be inspected for obvious damage. The Surface of the diskette should not be touched with hand or some sharp object. Write-protection tab should be properly observed. Correct insertion of disk in the disk drive is essential, otherwise some data stored on the disk is likely to be destroyed or the disk itself may be damaged. The diskette should be inserted slowly in the disk drive when power to the entire computer system is on. It should be removed prior to turning the system off. As a defensive measure, it is advisable to maintain a back-up copy of information stored on each diskette separately at a safe location. The diskette should be properly labeled. While storing a diskette, both physical and environmental factors should be considered. Diskette should not be stored in such a way that may sag, slump or compress it. The main enemies of a diskette are temperature, direct sunlight, dust, liquids and vapors and electromagnetic interference. Diskette should be protected form them. To remove dust regularly, the disk drive head should be carefully cleaned. Q.No.29. Write about magnetic disk as a secondary storage device? Meaning: Magnetic discs (or hard disks) are the most popular direct access medium. A hard disk is a stack (=heap) of one or more metal platters that spin on one spindle. Each platter is coated with iron oxide and the entire unit is encased (=enclosed) in a sealed chamber. Floppy diskettes and drives are different from each other. But hard disk and drive is a single unit. In both speed and capacity, they are better than diskettes. To achieve best performance, the read/write head must be extremely close to the surface of the disk. It is so close that even a small dust particle or human hair or even a fingerprint can fill up the gap between head and the disk, causing the head to crash. This may destroy the data stored in the area of crash and can destroy read/write head also. Q.No.30. How data is stored in magnetic discs? Introduction: Hard discs can store data very closely and they can also store more data, because it uses number of platters. These platters are arranged one on the top of another. In hard disks, the number of read/write heads can indicate the number of sides that the disk uses. For example, a particular hard disk may have six disk platters (that is 12 sides). 16 But bottom side of the last platter and top side of the first platter are unusable. Therefore, there will be only ten read/write heads. Read/write heads move in and out simultaneously. Even though, a record on the first side of the disk is to be accessed, all the ten read/write heads move together. If read/write heads are once moved, all the ten tracks vertically above and below each other should be read or written first. Thus the concept of cylinders developed. Any ten tracks vertically above and below each other will form one hollow cylinder. If there are 200 tracks on each side there will be 200 cylinders in the entire disk pack. Since read/write heads move simultaneously, reading or writing is performed cylinder wise (but not track wise). File Updation:

Only one hard disk is connected to the CPU and can store both input and output. Thus, if a record is picked up from a sector and updated in the CPU, it is deposited back in the same place in that sector. This way of storing updated data is known as overlaying i.e. original data is automatically erased when new updated data is deposited in its place. The major advantage is that a single disc is sufficient for both input and output. The major disadvantage is that it is difficult to trace any errors because it is not possible to reconstruct the latest file from the previous version. Access time (N04-1M): Access time consists of following 3 components: a. Seek time: This is the time required to position a movable read-write head over the required track. If the read-write head is fixed, this time will be zero. (through this movement one can reach the required track) b. Rotational time: This is the time taken to rotate the storage medium underneath the read-write head. Through this movement one can reach the required sector. c. Data transfer time: This is the time taken to activate the read/write head, read the requested data and transmit them to primary memory, for processing. The total of these 3 components is known as access time and ranges from 8 to 12 milliseconds. Q.No.31. Advantages & Disadvantages of Magnetic Disc. Advantages: a. Magnetic disk is a direct access storage medium. Therefore, individual records can be received without searching through the entire file. b. The cost of disks is steadily decreasing. c. For real-time systems, where direct access is required, disks are the only practical means of file storage. Other new types of storage, such as bubble storage, are not being used widely. d. Records can be readily updated by writing new information over old information. e. With removable disk packs, a single disk drive can store large quantities of data. f. All interrelated files can be processed simultaneously against a single transaction. Disadvantage: When a master file is updated, it destroys the old version of the file. Therefore, disk does not provide an automatic audit trail. When disk is used, old master file records must be copied to another medium, prior to updation (for the purpose of back-up and audit trail.) Q.No.32. Describe various factors which determine the storage capacity of a magnetic disc? (M04) Diskette Storage capacity depends upon the following factors: - Refer to Q.No.26. In case of hard disk the storage capacity depends on: the number of platters that are stacked on the top of one another, the number of tracks per platter and the number of sectors per track. Hard disks generally have 6 platters i.e. 12 faces, out of which eleven faces can be used. Each side may have 200 or more tracks, each track having 54, 63 or even more sectors per track and hard disk generally stores 512 bytes of data in a sector. Data on magnetic disc is stored in cylinders where nth track of each face vertically above and below each other is called nth cylinder. Thus, the storage capacity of hard disk is calculated as = No. of cylinders x no. of usable sides x No. of tracks X No. of sectors per track x no. of bytes per sector. 17 Q.No.33. Write about Removable hard discs. Removable hard disks and drives combine the speed and capacity of a hard disk with the portability of a diskette. Several types of devices are available in the market, which fall under this category. While choosing a removable hard disk, one has to consider the needs of speed, storage capacity, compatibility, price, etc. Q.No.34. Write about Hot swappable hard discs. These are used in high end computers, like servers, that require high end performance.

These are sometimes used on high-end workstations that require huge storage capacity. They allow the user to remove (swap out) a hard disk and insert (swap in) another hard disk, while the computer is still on (hot). Hot-swappable hard disks are like removable versions of normal hard disks. The removable box includes disk, drive and read/write heads in a sealed container. Q.No.35. Write about CD ROM discs. CD-ROM is similar to audio CD technology and it stands for Compact-Disk-Read-Only Memory. An optical disk is a round platter on which small holes are used to store data. Each hole represents the binary digit 1 and the absence of hole represents binary digit 0. CD-ROM disks are used for mastering facility. Most of the commercially produced CD-ROM disks contain some reference material. The master copy is duplicated or copied at the factory and copies are distributed. Once it is inserted into CD-ROM disk drive, text, video images and so on can be read into primary storage or can be displayed on screen. However, the data on the disk is fixed and cant be altered. The capacity of a single CD-ROM is over 650 MB which is equivalent to 2,50,000 pages of text or 1500 floppy disks. These CD-ROMs are tremendously used in multimedia applications, which require huge amount of storage space. CD-ROM provides direct access to any image or data on the disk. CDs can store any type of data i.e. text, images, audio, video, etc. Note: Floppy disc Vs. CD-ROM disc. (M02-5M) Q.No.36. Write about CD Rewritables. This is the third generation in CD technology. The first technology was CD ROM. Later on CDRecordable (CD-R) technology was introduced which was write once medium only. But CD-RW technology is better than CD-R technology because it can be written, erased or even rewritten. This technology was introduced by Hewlett Packard. This technology has got the features of both floppies (rewriting capabilities) and CDs (huge storage capacity). The drive is very simple to use and universally accepted by all. It allows users to store, transport, retrieve, share and modify large files. It also enables sharing of large files. For example, movies, multimedia presentations, etc. CD Rewritable drive can be connected either internally or externally. Internal drive can be connected to IDE connector and an adapter card is not needed. On the other hand external drive can be connected through PCs parallel port. For example, HP Surestore CD-Writer Plus provides users with upto 650 MB of rewritable capacity. Q.No.37. WORM disk. (N06-4M, N07-1M) It stands for Write once, Read Many optical laser disks or WORM disks. These are used by end user companies to store their own proprietary information. Once the data have been written to the medium, data can only be read, not updated or changed. The PC version of a WORM disk cartridge, (which looks like a 5 inch version of 3 inch diskette) can store up to 200 MB. When compared to hard disks, the access times for CD-ROM and WORM drives are quite slow, ranging from 100 to 300 milliseconds. WORM disks cartridge is a feasible alternative to magnetic tape for archival storage (i.e. backup storage). Another popular application of WORM disks is in information systems that require the merging of text and images that do not change for a period of time. A good example is an Electronic Catalogue. A customer can see retailers electronic catalogue on a VDT, or on a PC and see the item while he/she reads about it. And, with a few keystrokes, the customer can order the item as well. The Library of Congress is using WORM technology to come out of serious shelf-space problem. 18 Q.No.38. Write about MO Discs. Floppies can be used for number of times. But its storage capacity is very limited. On the other hand optical storage devices can store huge amount of memory. But it cant be rewritten. Magneto-optical discs integrate (=combine) optical and magnetic disk technology to enable reading and writing of data. However, the technology must be improved. A 5 inch disk can store upto 1000MB.

It uses thermo-magnetic technology for recording. With this, Information cant be accidentally erased or corrupted by magnetic fields. At present, magneto-optical disks are too expensive and do not offer reliability that users have experienced from magnetic media. In addition, the access time is relatively slow equal to that of low end hard disk. If this technology is developed to offer reliable, cost effective medium, it may dominate the secondary storage devices. For example, MCA 64O is a magneto optical drive from Mitsubishi Chemical Corporation, Information Storage Division. Q.No.39. Write about Video discs / DVD (Digital Versatile Disk) Introduction: A digital video disk (DVD) closely resembles (=look like) a Compact Disk (CD). It is also a 5 inch plastic disk that uses a laser beam to encode microscopic pits on the surface of disk. But the pits on DVD are much smaller and closer than CD. On the other hand a DVD can be used on both sides. Video disks can support both direct and sequential access. Any of the 54,000 tracks on the surface of a video disk can be accessed in just 3 seconds. DVDs can store as much as 17 GB of data - over 25 times the capacity of a standard CD-ROM disk. Thus huge amount of data can be stored in a single, lightweight, removable, reliable, easilytransportable disc. Currently DVDs are used for entertainment - for example, storing movies or large amounts of music etc. Experts predict that in future DVDs will be used to distribute software or large amounts of accounting data. Some applications: Real estate agents, Training applications, Automobiles industry, Travel agents. Q.No.40. Write about Magnetic tapes? Introduction: Magnetic tape is the oldest secondary storage technology, still in wide use. It is very much similar to audio tape. It is made with plastic material, covered with metallic coating, which can be magnetized at different spots. It can provide sequential access only but not direct access. Following are the 2 most popular forms of magnetic tape: detachable reel magnetic tapes & tape cartridges. Detachable Reel Magnetic Tapes: Many of the tapes used with mainframes and minicomputers are stored on detachable reels. These plastic tapes are coated with magnetisable material (generally iron oxide) that can be encoded with 0 and 1 bits. The entire surface of the tape is divided into tracks. A character (byte) is represented vertically over the tracks of tape surface. Tapes can be read by a hardware device called tape unit. There will be one empty take up spool and one supply spool. Empty take-up spool accepts the tape, as it is being processed. The tape is processed by passing it under read/write head which is located between two spools. Depending on the instructions given to the computer system, data can be either read from the tape or written to it. Tapes come in various widths, lengths and data densities. Commonly found tapes come with 2400 feet length, inch width and it packs data at 6250 bytes per inch. Recording densities of tapes are expressed in bytes per inch (bpi). 19 The most common one is open reel tape, which is inch wide and usually comes on reels that are 10 inches in diameter. Tape Cartridge devices: Cartridge tape is the leading edge of tape technology. Tape cartridges are generally used to back up hard disks. They can backup the contents of hard disk in few minutes. These tapes are sometimes called streaming tapes.

These tape cartridges vary in storage capacity but several megabytes of storage space is quiet common. In 1986, IBM introduced a tape cartridge system, IBM 3480, for its 3090 series of mainframes. Each cartridge can store upto 200 MB of data and data-transfer rate is 3 MB / Sec. Conventional detachable-reel tapes consist of 9 tracks. But these inch tapes store data in 18 tracks. In 1992, IBM released 36 track tape cartridges to use in its mainframe computers. Tape cartridges are available for both large and small computer systems.

You might also like