Computer Application in Management PDF
Computer Application in Management PDF
Computer Application in Management PDF
Credits: 4
SYLLABUS
Suggested Readings:
1. Fundamentals of Computers by Rajaraman, Publisher: Prentice Hall of India, New Delhi
2. Data Communication & Computer Network by White, Publisher: Thomas Learning, Bombay
3. Business Data Communication by Shelly, Publisher: Thomson Learning, Bombay
4. Computer Fundamentals by B.Ram, New Age Int.
5. Computer Fundamentals by P.K Sinha, Priti Sinha, Publisher Kalyani Publishers, 2nd Edition,
------------------------------------------------------------------------------------------------------------
1.1 INTRODUCTION
-----------------------------------------------------------------------------------------------------------Computer has been the premier invention of this century. Now a days Computer plays an
important role in almost every part of our lives, and their importance is so great that
without them we would not be able to live the way we do. Look around you and you
would find computers scattered all over the places, starting with the machine of computer
to washing machine to refrigerator to car to mobile and to life saving devices with the
doctors; everywhere a small computer working for your convenience and they seem
performing almost any task in the world. Computers have had a tremendous impact on
the way information is processed with in the organization. Although information have
been processed manually throughout the history but with modern management where
decision-making is so fast and the era of corporate governance is not possible without the
help of information system managed by computers.
The word computer comes from word compute, which means to calculate. A
computer is a programmable machine (or more precisely, a programmable sequential
state machine) that operates on data and is used for wide range of activities.
Computer is an electronic device or combination of electronic devices, which solves
problem after accepting the data and supply the result to the user. Computer is a
tool, which can be used to read and write stories, draw and look at images, and send and
receive e-mail. They can store large information and perform various scientific and
mathematical tasks.
Basically Computer system are a combination of the five elements i.e. Hardware,
Software, People, Procedure and Data / information. The computer organization often
compared with the human brain. Just think of a human brain how it works, first of all it
can store the data with its five senses (Just like input devices in computer), it can process
the gathered information and could reach to some conclusion drawing from the raw data
(Just like the processing of computer system) and then it can deliver the output or result
with speech or with expression (Just like the output device).
10
machine executed its first program in May 1949. In this machine, addition operations
took 1500 microseconds and multiplication operations took 4000 microseconds. A group
of scientists headed by Professor Maurice Wilkes at the Cambridge University
Mathematical Laboratory developed this machine.
6. The UNIVAC I (1951): The Universal Automatic Computer (UNIVAC) was the first
digital computer that was not one of a kind. Many UNIVAC machines were produced,
the first of which was installed in the Census Bureau in 1951 and was used continuously
for 10years. The first business use of a computer, a UNIVAC I, was by General Electric
Corporation in 1954.
In 1952, the International Business machines (IBM) Corporation introduced the IBM-701
commercial computer. In rapid succession, improved models of the UNIVAC I and other
700- series machines were introduced. In 1953, IBM produced the IBM-650, and sold
over 1000 of these computers. UNIVAC marked the arrival of commercially available
digital computers for business and scientific applications.
1.1.3 Characteristics
The ever-increasing use of computer is due to its special characteristics. Computer is not
just a calculating machine; they also have the capability of doing complex activities and
operation. Main characteristics of the computer are given bellow:
1. Speed: Computer is very fast and accurate device. Since electronic pulses travel
at incredible speed and they are electronic device its internal speed is virtually
instantaneous. A microcomputer can process millions of instruction per seconds
over and over again without any mistake.
2. Accuracy: Computers physical circuits rarely make errors, if the data and
instruction are correctly fed. Most errors which occur in computers are either
hardware error or human error
3. Storage: Computers have a large amount of memory to hold a very large amount
of data, we can store large amount of data information in the secondary storage
device.
4. Programmability: A computer is programmable; i. e. what computer does
depend on the lines of instruction (Program) it is using.
5. Diligence: Computer is free from problems like lack of concentration, and
confusions etc. Computer is never confused like humans and it can perform
instruction again and again without failing or getting bored.
6. Versatility: We can perform many different types of tasks on computer, one
moment it might be busy in calculating the statistical date for annual performance
evaluation of a business organization and next moment it might be working on
inventory control.
11
7. Power of remembrance: Unlike humans, computer can store things for unlimited
period of time. It has great remembering power.
1.1.4 Classification
Computers can be classified many different ways -- by size, by function, and/or by
processing capacity. We will study the classification of computers by size. The size of a
computer often determines its function and processing capacity. The size of computers
varies widely from tiny to huge and is usually dictated by computing requirements. For
example, it is clear that the IRS will have different requirements than those of a college
student.
There are two basic kinds of computers: analog and digital.
A. Analog computers
Analog computers are analog devices. That is, they have continuous states rather than
discrete numbered states. An analog computer can represent fractional or irrational values
exactly, with no round off. Analog computers are almost never used outside of
experimental settings. They handle or process information, which is of physical nature.
12
applications. With the advancement in technology the speed, memory size and other
characteristics developed and the minicomputer was then used for various stand alone or
dedicated applications. The minicomputer was then used as a multi-user system, which
can be used by various users at the same time. Gradually the architectural requirement of
minicomputers grew and a 32-bit minicomputer, which was called super mini, was
introduced. The super mini had more peripheral devices, larger memory and could
support more users working simultaneously on the computer in comparison to previous
minicomputers.
14
15
1.1.5 Generations
Generation in computer talk is a step of changing technology. It provides the framework
for the growth of computer industry. There are five generations of computer with the first
generation computers being those, which became commercially available in the early
1950s.
First Generation Computers (1951- 1958)
The first generation of computer was marked by the use of vacuum tubes for the
electronic components and by the use of either electrostatic tubes (i.e., cathode ray tubes)
or mercury delay lines for storage. Examples of such first generation machines are
EDSAC (operational in 1949), SEAC (1950, the first stored program computer
operational in the US), EDV AC (1951) and IAS (1952). This generation lasted until the
end of the 1950s and computers in this era had their basis in wired circuitry and
thermionic valves.
Their outstanding features were:
16
17
Microprocessor used
Increase cost of software
Data base management system
Distributes processing
Graphics manipulation
Pentium/AMD based are the fourth generation computers
19
Printer
Printer is the most important output device, which is used to print information on paper.
Printers are essential for getting output of any computer-based application.
20
PRINTER
Impact
Non Impact
Memory Unit
Memory Unit is that component of a computer system, which is used to store the data,
instructions and information before, during and after the processing by ALU. It is
actually a work area (physically a collection of integrated circuits) within the computer,
where the CPU stores the data and instructions.
It is also known as a
Main/Primary/internal Memory.
21
The storage device along with the algorithm or information on how to control and
manage these storage devices constitutes the memory system of computer. A memory
system is a very simple system yet it exhibits a wide range of technology and types. But
unfortunately, faster memory technology is more costly. In addition fast memories
require power supply till the information needs to be stored. These things are not very
convenient, but on the other hand the memories with smaller cost have very high access
time, this is the time taken by CPU to access a location in the memory in high, which will
result in slower operation of the CPU. Thus, the cost versus access time anomaly has lead
to a hierarchy of memory where we supplement fast memories with larger, cheaper,
slower memories. This memory unit may have different physical and operational
characteristics, therefore, making the memory system very diverse in type, cost,
organization, technology and performance. This memory hierarchy will be fruitful if the
frequency of access to slower memories is significantly less than the faster memories.
Cache
Fast, Small,
Experience
Slow,
Large, Cheap
Magnetic Tape
Thus, a memory system can be considered to consist of three groups of memories. These
are:
1) Internal Processor Memories: These consist of the small set of high speed
registers which are internal to a processor and are used as temporary locations
where actual processing is done.
2)
Primary memory or main memory: It is a large memory, which is fast but not
as fast as internal processor register. Processor directly accesses this memory. It
is mainly based on integrated circuit.
3)
Memory
Memory- is also known as the primary storage or main memory/ internal memory. It is a
apart of microcomputer that hold data for processing, instruction for processing the data
(the program) and information (processed data) .It is of the following three types:
22
23
known as random access memory. The memory capacity of RAM varies from 640 KB to
several megabytes (1 Megabyte = 1024 KB) with different models of PC.
Types of RAM
There are two types of RAM used in PCs - Dynamic and Static RAM.
Dynamic RAM (DRAM): The information stored in Dynamic RAM has to be refreshed
after every few milliseconds, otherwise it is erased. DRAM has higher storage capacity
and is cheaper than Static RAM.
Static RAM (SRAM): The information stored in Static RAM need not be refreshed, but
it remains stable as long as power supply is provided. SRAM is costlier but has higher
speed than DRAM.
3. Complementary Metal Oxide Semiconductor Memory
Complementary Metal Oxide Semiconductor (CMOS) memory is used to store the
system configuration, date, time and other important data. When the computer is
switched on, BIOS matches the information of CMOS with the peripheral devices and
displays error in case of mismatching.
------------------------------------------------------------------------------------------------------------
Integer part
Fractional part
25
Binary System
Octal System
Decimal System
10
Hexadecimal System
0,1,2,3,4,5,6,7
0,1,2,3,4,5,6,7,8,9
16
0,1,2,3,4,5,6,7,8,9,
A, B, C, D, E, F
Example
1011.11
3567.25
3947.89
3FA9.9A
Table 1.1
-------------------------------------------------------------------------------------------------------------
26
---------------------------------------------------------------------------------------------------------
COMPUTER SOFTWARE
-----------------------------------------------------------------------------------------Structure
2.1 What is Software?
2.1.1 Relation between Hardware and Software
2.2 Types of Software
2.2.1 System Software
2.2.2 Application Software
2.3 Software Development Life Cycle
2.4 Introduction to Algorithm
2.5 Flowcharts
2.5.1 Problem Solving, Step by Step
2.5.2 How to Draw Flowcharts
2.5.3 Basic Flowcharting Shapes
2.5.4 Advantages of Flowcharts
2.6 Review Questions
---------------------------------------------------------------------------------------------------------
27
Both hardware and software are necessary for a computer to do useful job. Both are
complementary to each other.
2. Same hardware can be loaded with different software to make a computer perform
different types of jobs just as different songs can be played using the same cassette
player.
3. Except for upgrades (like increasing main memory and hard disk capacities, or adding
speakers, modems, etc.); hardware is normally a one- time expense, whereas software
is a continuing expense. Like we buy new cassettes for newly released songs or for
songs whose cassettes, we do not have, we buy, new software to be run on the same
hardware as and when need arises, or funds become available.
---------------------------------------------------------------------------------------------------------
System Software
Application Software
Assemblers: Assemblers translate the assembly language code (source program) into
machine language code (object program). After assembling, a linker program is used to
convert the object program into an executable program. The Microsoft assembler program
(MASM) and Borland Turbo assembler program (TASM) are two popular assemblers.
Assemblers are used mainly in development of system software.
Interpreters: Instructions of a high-level language are coded in many statements. At the
time of their execution, they are converted statement by statement into machine code, by
using system software, called Interpreters. For example, programs written in BASIC
language are executed by using BASICA or GWBASIC interpreters. Programs written in
some fourth generation languages, like dBase III plus are also executed using dBase
interpreter.
There are certain disadvantages of interpreters. As instructions are translated and executed
simultaneously using interpreters, they are very slow for executing large programs. Hence,
interpreters are not suitable for most of applications development.
Compilers: As contrast to interpreters, compilers provide faster execution speed.
Compilers do not translate and execute the instructions at the same time. They translate the
entire program (source code) into machine code (object code). Using linker, the object
code is converted into executable code. Compilers are widely used in translating codes of
high-level languages (e.g. COBOL, FORTRAN, PASCAL, Turbo/ Quick BASIC, Turbo/
Microsoft C etc.) and fourth generation languages (dBase IV, FoxPro etc.). As compared to
interpreters or assemblers, compilers are preferred in development of application software.
29
SOFTW
APPLICATION
SYSTEM
Operatin
g System
File
Mgmt
Assemble
Compilers
Debugger
Utilities
Word
P
Spreads
Communica
Image
P
Databas
Games
30
31
2.5 FLOWCHARTS
--------------------------------------------------------------------------------------------------------A Flowchart is a pictorial representation of an algorithm. Programmers often use it as a
program planning tool for visually organizing a sequence of steps necessary to solve a
problem using a computer. It uses boxes of different shapes to denote different types of
instructions. The actual instructions are written within these boxes using clear and concise
statements. Solid lines having arrow marks connect these boxes to indicate the flow of
32
operation, that is, the exact sequence in which to execute the instructions. The Process of
drawing a flowchart for an algorithm is known as flowcharting.
33
34
35
The terminator symbol marks the starting or ending point of the system. It usually
contains the word "Start" or "End."
A box can represent a single step ("add two cups of flour"), or and entire subprocess ("make bread") within a larger process.
Indicates that the flow continues on another page, where a matching symbol
(containing the same letter) has been placed.
36
Basic Flowchart
A basic Flowchart identifies the starting and ending points of a process, the sequence of
actions in the process, and the decision or branching points along the way.
37
---------------------------------------------------------------------------------------------------------
38
---------------------------------------------------------------------------------------------------------
OPERATING SYSTEMS
---------------------------------------------------------------------------------------------------------
Structure
3.1 Introduction
3.1.1 Layers of Operating System
3.1.2 Functions of Operating Systems
3.1.3 Characteristics of an Operating System
3.1.4 Measuring System Performance
3.2 Evolution of Operating Systems
3.2.1 Serial Processing
3.2.2 Batch Processing
3.2.3 Multiprogramming
3.3 Types of Operating System
3.1 Batch Processing Operating Systems.
3.3.2 Time Sharing Operating Systems
3.3.3 Real Time Operating Systems
3.4 Operating System Techniques
3.4.1 Multiprogramming
3.4.2 Multiprocessing
3.4.3 Multitasking
3.5.4 Multithreading
3.5 Some Popular Operating Systems
3.5.1 Disk Operating System
3.5.2 UNIX
3.5.3 Linux
3.5.4 Microsoft Windows
3.5.5 Microsoft Windows NT
3.6 Review Questions
--------------------------------------------------------------------------------------------------------3.1 INTRODUCTION
--------------------------------------------------------------------------------------------------------What is human body without life giving Oxygen, the same is the case of a computer, its
existence is immaterial, without an operating system, such is the importance of the
Operating System. Operating System falls under the category of System software. The goal
of this unit is to introduce the concept related to operating system and what is the function
of operating system.
The Operating System is not the command interpreter alone, as people perceive. The
Operating System is the program that must be running all the time, and cannot be replaced
39
without it being a different O/S. Let us look into this most important component of the
Computer System, the Operating System.
Definition 1:
An operating system can be defined as the set of instructions or programs, which make the
computer work
Definition 2:
An Operating System or OS is a software program that enables the computer hardware to
communicate and operate with the computer software
Definition 3:
An operating system is software, which controls the computer and its peripherals
and makes the computer ready to use by a process called booting
Without an Operating System a computer would be useless.
An Operating System (OS) is an integrated set of programs that is used to manage the
various resources and overall operations of a computer system. It is designed to support the
activities of a computer installation. Its prime objective is to improve the performance and
efficiency of a computer and increase facility, the ease with which a system can be used.
As we have seen that an operating system is software, which makes the computer ready to
use by a process called booting. Before, discussing more on the operating systems, let us
first see what exactly do you mean by booting:
When we switch on the computer, the instructions stored in ROM are automatically
executed. These instructions help the computer to load the operating system from external
storage device (disk) to internal storage (RAM). This process of loading of operating
system from disk to RAM is called booting.
40
system start up device also. The operating system is automatically loaded into
hardware's main memory (RAM) when computer is turned on. Then the OS either
waits for you to give it a command of it brings a pre selected program into a read to
operate condition. This sequence is known as boot strapping or simply booting.
2. Assigning Priorities: Usually, the OS has several levels of priorities. For instance, a
report generating program may continue to run until the system receives a
command or query from the terminal, (a priority in computer lingo). Then the
system responds to the request from the terminal before continuing with the report
program.
3. The scheduling and loading of programs, or subprograms is necessary in order to
provide a continuous job processing sequence or to province appropriate responses
to events- job to job - processing and job as counting.
4. Control over hardware resources e.g. control over the selection and operation of all
peripheral devices used to input, or storage. The operating system also directs the
movement and processing of information required by your applications programs. It
transfers data to and from storage and input output devices like terminals or
printers.
5. Managing the data and program files: The operating system directs the information
storage and retrieval functions using one or more filing methods. These may include
sequential (magnetic tape), random (as on disk, units) or data base storage
structures. the latter method uses special identifiers for each file to locate
information more rapidly and to avoid- redundant information storage.
6. Provide utility functions that provide the user with tools for some operations like:
Loading programs
Transferring files from one floppy to another, backing up and copying.
Formatting a disk to accept data Program.
Sending information to I/O devices like printer, or a modem.
Displaying the directory of contents of a disk.
7. Handling errors when they occur and using corrective routines where possible.
8. Protecting hardware, software and data from improper use.
9. Furnishing a complete Account of what has happened during operation. Some
details of this log may be stored for accounting purposes.
The more sophisticated a computer's operating system, the better the computer system can
manage itself, the less human intervention is required, and the more data computer can
process. This is one reason why today's mainframe operating systems are large, complex
programs involving thousands of instructions and costing thousands of dollars.
42
Concurrency: being able to handle events as they occur and executing multiple
tasks in parallel;
Sharing the resourced for a number of reasons:
1. Cost
2. Using the work of others
3. Sharing data: use the same data in several different programs possibly
used by several different users.
Removing redundancy;
Long-term storage of information (privacy, integrity, security);
Non determinacy: an operating system must be able to handle events occurring
in an unpredictable order.
43
---------------------------------------------------------------------------------------------------------
suppose the operator received one FORTRAN program, one COBOL program and another
FORTRAN program. If he runs them in that order, he would have to set up for FORTRAN
program environment (loading the FORTRAN compiler tapes) then set up COBOL
program and finally FORTRAN program again. If he runs the two FORTRAN programs as
a batch, however he could set up only once for FORTRAN thus saving operator's time.
Batching similar jobs brought utilization of system resources quite a bit. But there were still
problems. For example, when a job is stopped, the operator would have to notice that fact
by observing the console, determine why the program stopped and then load the card reader
or paper tape reader with the next job and restart the computer. During this transition from
one job to the next, the CPU sat idle.
To overcome this idle time, a small program called a resident monitor was created which is
always resident in the memory. It automatically sequenced one job to another job. Resident
monitor acts according to the directives given by a programmer through control cards
which contain information like marking of job's beginnings and endings, commands for
loading and executing programs, etc. These commands belong to job control language.
These job control language commands are included with user program and data. Here is an
example of job control language commands.
$COB - Execute the COBOL compiler
$JOB - First card of a job
$END - Last card of a job
$LOAD - Load program into memory
$RUN - Execute the user program
Figure 3.3 shows a sample card deck set up for a simple batch system.
With sequencing of program execution mostly automated by batch operating system, the
speed discrepancy between fast CPU and comparatively slows input/output devices such as
' card readers, printers emerged as a major performance bottleneck. Even a slow CPU
works in the microsecond range, with millions of instructions per second. But, fast card
45
reader, on the other hand, might read 1200 cards per minute. Thus, the difference in speed
between the CPU and its input/output devices may be three orders of magnitude or more.
The relative slowness of input/output devices can mean that CPU is often waiting for
input/output. As an example, an Assembler or Compiler may be able to process 300 or
more cards per second. A fast card reader, on the other hand, may be able to read only 1200
cards per minute. This means that assembling or compiling a 1200 card program would
require only 4 seconds of CPU time but 60 seconds to read. Thus, the CPU is idle for 56
out of 60 seconds or 93.3 per cent of the time. The resulting CPU utilization is only 6.7 per
cent. The process is similar for output operations. The problem is that while an input/output
is occurring, the CPU is idle, waiting for the input/output to complete; while the CPU is
executing, input/output devices are idle.
Over the years, of course, improvements in technology resulted in faster input/output
devices. But CPU speed increased even faster. Therefore, the need was to increase the
throughput and resource utilization by overlapping input/output and processing operations.
DMA (Direct Memory Access) chip which directly transfers the entire block of data from
its own buffer to main memory without intervention by CPU was a major development.
While CPU is executing, DMA can transfer data between high speed input/output devices
and main memory. CPU requires to be interrupted per block only by DMA. Apart from
DMA, there are two other approaches to improving system performance by overlapping
input, output and processing. These are buffering and spooling.
Buffering is a method of overlapping input, output and processing of a single job. The idea
is quite simple. After data has been read and the CPU is about to start operating on it, the
input device is instructed to begin the next input immediately. The CPU and input device
are then both busy. With luck, by the time that the CPU is ready for the next data item the
input device will have finished reading it. The CPU can then begin processing the newly
read data, while the input device starts to read the following data. Similarly, this can be
done for output. In this case, the CPU creates data that is put into a buffer until an output
device can accept it. For output, the CPU can proceed at full speed until, eventually all
system buffers are full. Then the CPU must wait for the output device. This happens with
input/output bound jobs where the amount of input/output relation to computation is very
high. Since the CPU is faster than the input/output device, the speed of execution is
controlled by the input/output device, not by the speed of the CPU.
More sophisticated form of input/output buffering called SPOOLING (simultaneous
peripheral operation on line) essentially use the disk as a very large buffer (figure 3.4) for
reading and for storing output files reading and for storing output files.
Buffering overlaps input, output and processing of a single job whereas Spooling allows
CPU to overlap the input of one job with the computation and output of other jobs.
Therefore this approach is better than buffering. Even in a simple system, the spooler may
be reading the input of one job while printing the output of a different job.
46
3.2.3 Multiprogramming
Buffering and spooling improve system performance by overlapping the input, output and
computation of a single job, but both of them have their limitations. A single user cannot
always keep CPU or I/O devices busy at all times. Multiprogramming offers a more
efficient approach to increase system performance. In order to increase the resource
utilization, systems supporting multiprogramming approach allow more than one job
(program) to utilize CPU time at any moment. More number of programs competing for
system resources, better will be resource utilization. The idea is implemented as follows.
The main memory of a system contains more than one program (Figure 3.5).
47
(a) Single-user operating systems: These operating systems are used for mainly
computers having only one terminal (stand-alone PCs). MS DOS (Microsoft Disk
Operating System) and PC DOS (Personal Computer Disk Operating System) are the two
important single user operating systems. Both systems are almost identical and are simply
called DOS. OS/2 and Windows NT are other popular single-user multi-tasking operating
systems for microcomputers.
48
(i)
(ii)
(b) Multi-user operating systems: These operating systems are used for those computers
(micro to mainframe), which have many terminals (multi-user systems). The popular
operating systems used for multi-user systems are UNIX, NETWARE, MVS, OS/400,
VMS and Linux.
Multi-user operating systems are used on networks of computers and allow many different
users to access the same data and application programs on the same network. It also allows
users to communicate with each other.
Modern computer operating systems may also be classified into three other groups, which
are distinguished by the nature of interaction that takes place between the computer user
and his or her program during its processing. The three groups are called batch, timeshared and real time operating systems.
49
50
testing, and debugging their programs, or for trying out various approaches to a problem
solving.
3. Offers good computing facility to small users. Small users can gain direct access to
more sophisticated hardware and software than they could otherwise justify or afford. In
time-sharing systems, they merely pay a fee for resources used and are relieved of
hardware, software, and personnel problems associated with acquiring and maintaining
their own installation.
Multitasking Operating Systems: Multi-tasking operating systems are now very
common. They enable the computer to run more than one piece of software at the same
time. It is quite common to sit at your computer and have a word-processor open and
running, as well as an Internet browser, and an audio CD player all at the same time.
The operating system allows you to switch between the applications and even transfer data
between them (for example, it helps you to copy a picture from an internet site shown on
your browser application and paste it into your DTP application).
Multitasking Operating systems allow multiple software processes to be run at the same
time. Operating systems that would fall into this category are:
System 7.x
System 8.x
UNIX
Windows 2000
Windows 95
Windows 98
Windows NT 4.0
Multitasking operating systems allow a user to do more than one thing at the same time.
Multi-user Operating Systems: Multi-user operating systems are used on networks of
computers and allow many different users to access the same data and application programs
on the same network. It also allows users to communicate with each other.
There are many different types of Network Operating System, each one suited to a
different.
Multi - User - Allows multiple users to utilize the computer and run programs at the same
time. Operating systems that would fall into this category are:
System 7.x
System 8.x
UNIX
Windows 2000
Windows 3.1x
Windows 95
Windows 98
51
Windows NT
3.3.3 Real Time Operating Systems
A Real-Time Operating System (RTOS) is a multitasking operating system intended for
real-time applications. Such applications include embedded systems (programmable
thermostats, household appliance controllers), industrial robots, spacecraft, industrial
control (see SCADA), and scientific research equipment. It is another form of operating
system which is used in environments where a large number of events mostly external to
computer systems, must be accepted and processed in a short time or within certain
deadlines. Examples of such applications are flight control, real time simulations etc. Real
time systems are also frequently used in military application.
Real Time Operating Systems are designed to service those applications where response
time is of the essence in order to prevent error, misrepresentation or even disaster.
Examples of real time operating systems are those, which handle airlines reservations,
machine tool control, and monitoring of a nuclear power station. The systems, in this case,
are designed to be interrupted by external signal that require the immediate attention of the
computer system.
A primary objective of real-time system is to provide quick response times. User
convenience and resource utilization are of secondary concern to real-time system. In the
real-time system each process is assigned a certain level of priority according to the relative
importance of the event processes. The processor is normally allocated to the highest
priority process among those which are ready to execute. Higher priority process usually
pre-empte execution of lower priority processes. This form of scheduling called, priority
based pre- emptive scheduling, is used by a majority of real-time systems.
In fact, many computer operating systems are hybrids, providing for more than one of these
types of computing service simultaneously. It is especially common to have a background
batch system running in conjunction with one of the other two on the same computer. A
number of other definitions are important to gaining an understanding of operating
systems:
A multiprogramming operating system is a system that allows more than one active user
program (or part of user program) to be stored in main memory simultaneously. Thus, it is
evident that a time-sharing system is a multiprogramming system, but note that a
multiprogramming system is not necessarily a time-sharing system. A batch or real time
operating system could, and indeed usually does, have more than one active user program
simultaneously in main storage. Another important, and all too similar, term is
multiprocessing.
A multiprocessing system is a computer hardware configuration that includes more than
one independent processing unit. The term multiprocessing is generally used to refer to
large computer hardware complexes found in major scientific or commercial applications.
This Operating system allows multiple processors to be utilized. Operating systems that
would fall into this category are:
52
UNIX
Windows 2000
Windows NT 4.0
3.4.1 Multiprogramming
It is a process by which single CPU works on two or more programs simultaneously.
Using this technique, the operating system keeps the CPU busy. Multiprogramming allows
the processor to handle either multiple batch jobs at a time (Batch Multiprogramming) or
53
multiple interactive jobs shared among multiple users (Time Sharing Multiprogramming).
Time-sharing is a technique that allows a CPU to simultaneously support the activities of
several users by allocating fixed time slots (in milliseconds). Examples of operating
systems that support multiprogramming are OS/2, UNIX and Macintosh System 7.
3.4.2 Multiprocessing
It refers to the use of two or more CPUs to perform a coordinated task simultaneously.
Figure 3.8 shows the architecture of a computer with its CPU, memory, and I/O processors.
Fig 3.8 Architecture of a computer system with its CPU, memory, and I/O processors.
The idea of using I/O processors to improve system performance was carried a step further
by designing systems with multiple CPUs. Such systems are called multiprocessing
systems because they use multiple processors (CPUs) and can execute multiple processes
concurrently. Multiple CPUs of these systems are used to process either instructions from
different and independent programs or different instructions from the same program
simultaneously. Figure 3.9 shows basic organization of a typical multiprocessing system.
3.4.3 Multitasking
It refers to the ability of an operating system to execute two or more tasks concurrently. In
multitasking environment, the user opens new applications without closing the previous
ones and the information can be easily moved among a number of applications.
54
3.5.4 Multithreading
Threads are a popular way to improve application performance. In traditional operating
systems, the basic unit of CPU utilization is a process. Each process has its own program
counter, its own register states, its own stack, its own address space (memory area allocated
to it). On the other hand, in operating systems, with threads facility, the basic unit of CPU
utilization is a thread. In these operating systems, a process consists of an address space
and one or more threads of control [see Figure 3.10(b)]. Each thread of a process has its
own program counter, its own register states, and its own stack. However, all the threads of
a process share the same address space. Hence, they also share the same global variables.
In addition, all threads of a process also share the same set of operating system resources,
such as open files, signals, accounting information, etc. Due to sharing of address space,
there is no protection between the threads of a process. However, this is not a problem
because process (and hence all its threads) is always owned by a single user. Therefore,
protection between multiple threads of a process is not necessary. Protection between
multiple processes is needed because different processes may belong to different users.
Threads share a CPU in the same way as processes do. At a particular instance of time, a
thread can be in anyone of several states - running, blocked, ready, or terminated. Due to
these similarities, threads are often viewed as mini processes. In fact, in operating systems
with threads facility, a process having a single thread corresponds to a process of a
traditional operating system [see Figure 3.10(a)]. Threads are often referred to as
lightweight processes and traditional processes are referred to as heavyweight processes.
55
56
> Keys together. This will restart your computer and wait for a few minutes. Then turn on
the power supply and start working. Sometimes, due to unknown reasons the system is
unable to boot from the hard disk, in such a situation, you are required to boot the system
from the bootable floppy (floppy that contains DOS).
Concept of Files and Directories: File is a collection of related information. Any kind of
text, data or program that is entered is stored in a file. Now, it is very essential to organize
your files in an ordered manner. This makes file search easier. Otherwise, it can really be a
difficult and time consuming job to search for a particular file out of the whole lot of files
stored on the disk. An example of library can make the explanation of the concept clearer.
As you must have already observed, the books in a library are put in big cabinets. Each
cabinet is divided into many shelves and sub shelves. Each shelve or sub-shelve contains
books on a particular subject. So, the required book on a particular subject can be found out
very easily without wasting much time and effort.
On similar grounds, all the files that are related to each other are clubbed at one place. This
is known as a Directory Structure or simply a Directory. A directory structure resembles
an inverted tree. The main directory becomes the Root directory. The directories and files
become the branches of this directory tree. Any number of files and directories can be
added to it, thus, making the tree grow big downwards. Let us take an example. Suppose
we wish to store two kinds of files on our disk: ACCOUNT and EXPENSE. Further, we
wish to keep two more kinds of files (say CASHSALE and CREDSALE) under
ACCOUNT sub-directory. DOS can very much help you in organizing your files through
directory structure.
1. On the top of the directory structure, there is a Root directory. This directory is
always present and is shown by \(backslash) for referencing. Any file or directory
that is created is always under the Root directory.
2. EXPENSE is the sub-directory of the Root directory.
3. ACCOUNT is the parent directory of the directories CASHSALE and CREDSALE.
It can also be said that the CASHSALE and CREDSALE are the sub-directories of
the ACCOUNT directory. Thus, a directory under a directory is called a subdirectory / (Root).
ACCOUNT EXPENSE
CASHSALE CREDSALE WEST.TXT
EAST.TXT
It can be clearly seen that the files relating to a particular subject can be put under a
directory. For example, all the files relating to expenses can be put under EXPENSE
subdirectory whereas all the files relating to cash sales can be stored under the subdirectory
CASHSALE.
Referencing Files
Its time to learn as to how to locate a file. The directory structure has two sub-directories
under the Root directory. The sub-directory EXPENSE has two files under it. DOS allows
you to go from one directory to another by following a certain path. In the beginning, the
user is always resident in the Root directory. While traveling from one directory to another
57
certain rules have to be followed. A user cannot go directly from ACCOUNT subdirectory
to EXPENSE sub-directory. To go from one sub-directory to another, you have to first go
to its parent directory or the Root directory. Thus, for going from ACCOUNT sub-directory
to EXPENSE sub-directory, you first have to go to Root directory. Similarly for going from
the file EAST.TXT to WEST.TXT, you have gone to the EXPENSE sub-directory first.
Thus, in other words, while moving from one directory to another, you have to its parent
directory first. Now, in order to reach out to the file WEST.TXT the following path has to
be followed:
C:\>Expense\West.txt
12345
Here,
1. Is the drive name where the file is resident in;
2. Is the path which DOS takes to reach for a file;
3. Is the directory under the Root;
4. Is the primary name of the file that is to be accessed;
5. Is the extension name of the same file.
The \ (backslash) has to be used for tracing out the path. First backslash takes you to the
Root directory. The subsequent backslashes separate the directories, sub-directories and the
filename that are given in the whole path. File Naming Conventions There are certain rules
that have to be followed while giving names to your files. A filename has two parts:
1. Primary Name
2. Extension (Secondary Name)
A dot (.) separates a primary name from an extension. Let see the two parts of the file
named DRAGON.TXT. A primary name cannot have more than eight characters and
similarly an extension can contain only up to three characters. Filename having only the
primary name and no extension is absolutely valid because it is absolutely optional to give
an extension to a filename. An extension is generally given by language or software used
by the file. For example, if you entering BASIC and PASCAL programs, their filenames
would have extension BAS and PAS respectively. A filename can contain the following
characters:
1. An Alphabet (A-Z) or (a-z)
2. A number (0-9)
3. Special characters such as etc.
Except *, ?, full stop (.) and space
It is a good practice to give meaningful names to your files. However, no two files can have
exactly the same name on disk. Thus, a name given to a file on a disk has to be unique. A
look at a few valid and invalid filenames:
58
The rules for naming a directory are the same as that of naming files.
Dos Commands:
DOS offers a variety of commands to perform various functions. With the help of DOS
commands, you can display the list of files and directories that are present on the disk,
create new files and directories; remove unwanted files and directories and much more.
DOS commands can be entered either in uppercase or lowercase letters. The format of a
DOS command is called syntax. All DOS commands begin with command name. When
DOS carries out the instructions given by you, is called the execution of DOS command.
All DOS commands can be classified into two categories: Internal Commands and External
Commands.
Internal Commands
The commands which are a part of the main files of DOS COMMAND.COM and two
hidden files) are known as Internal Commands. They are loaded in the RAM as soon as the
computer is switched on. The important internal commands are DIR, COPY, DEL, REN,
MD, CD, RD, TYPE, COPY CON, DATE, TIME, CLS, ECHO, PROMPT and PATH.
External Commands
External commands are those commands, which are stored disks as separate program files.
These files have the same primary name as the command name. The extension of these
files is either COM or EXE. So, at the time of execution of these commands, the
corresponding program file should be present in the DOS sub-directory of the hard disk and
DOS sub-directory should also be in the path search. The commonly used external
commands are- FORMAT, DISKCOPY, CHKDSK, XCOPY and LABEL.
Let us discuss some of the important DOS commands in detail.
CD or CHDIR
To change the directory path.
Syntax
CHDIR [drive:][path]
or
CD [drive:][path]
Switches Used
cd\ - Goes to the highest level the root of the drive.
cd.. - Goes back one directory. For example if you are within
C:\WINDOWS\COMMAND> directory this would take to C:\WINDOWS>
59
CD windows - If present would take you into the Windows directory. Windows can be
substituted with any other name. Example Suppose you are under the EXPENSE subdirectory and you want to access the files or directories in the ACCOUNT subdirectory.
This would involve the changing of directory from EXPENSE to ACCOUNT. This will
make the ACCOUNT directory active. The task of changing directories can be
accomplished with the help of CD command. Look at the following example:
C:\>CD ACCOUNT <Enter>
The above command will take you to the sub-directory ACCOUNT as shown by following
prompt:
C:\ACCOUNT>
If you want to go to the sub-directory CASHSALE from the sub-directory EXPENSE,
issue the following command:
C:\>CD ACCOUNT\CASHSALE <Enter>
After the above command, the following prompt C:\ACCOUNT\CASHSALE>
The command for going to the root directory from prompt is:
C:\ACCOUNT\CASHSALE>CD\ <Enter>
But, the command for going to the parent or previous (whether it is root or subdirectory) is:
C:\ACCOUNT\CASHSALE>CD.. <Enter>
If you are in the sub-directory CASHSALE, the command will take you to ACCOUNT
sub-directory below:
C:\ACCOUNT>
Suppose you are under the EXPENSE sub-directory want to access the files or directories
in the ACCOUNT subdirectory. This would involve the changing of directory.
EXPENSE to ACCOUNT. This will make the directory active. The task of changing
directories accomplished with the help of CD command. Look following example:
C:\>CD ACCOUNT <Enter>
where CD stands for Change Directory
The above command will take you to the sub-directory ACCOUNT as shown by following
prompt:
C:\ACCOUNT>If you want to go to the sub-directory CASHSALE from the sub-directory EXPENSE,
issue the following command:
C:\>CD ACCOUNT\CASHSALE <Enter>
After the above command, the following prompt
60
C:\ACCOUNT\CASHSALE>_
The command for going to the root directory from prompt is:
C:\ACCOUNT\CASHSALE>CD\ <Enter>
But, the command for going to the parent or previous
(whether it is root or subdirectory) is: C:\ACCOUN-RCASHSALE>CD.. <Enter>
If you are in the sub-directory CASHSALE, the command will take you to ACCOUNT
sub-directory below:
C:\ACCOUNT>The command for displaying the name of the currently directory is:
C:\>CD <Enter>
DIR
Displays a list of files and subdirectories in a directory.
Syntax
DIR [drive:][path][filename] [/P] [/W] [/A[[:]attributes]] [/
O[[:]sort order]] [/S] [/B] [/L] [/V]
Example
dir = Lists all files and directories in the directory that you are currently in.
dir /ad = List only the directories in the current directory.
61
dir /s = Lists the files in the directory that you are in and all sub directories after that
directory, if you are at root C:\> and type this command this will list to you every file and
directory that is on the computer.
dir /p = If the directory has a lot of files and you cannot read all the files you can use this
command and it will display all files one page at a time.
dir /w = If you dont need the info on the date / time and other information on the files you
can use this command to list just the files and directories going horizontal taking as little as
space needed.
dir /s /w /p = This would list all the files and directories in the current directory and the sub
directories after that in wide format one page at a time.
COPY CON
This command is used to create a file.
Syntax
Copy con <filename>
Once you have entered the above command this will create the file by the name specified.
Once you have typed all the lines you wish to be in the file press and hold CTRL + Z. This
should enter ^Z, once on the screen press the enter and one file should be copied.
Example
C:\>copy con file1.txt
MD
This command is used t make a directory.
Syntax
MD <directoryname>
Example
C:\>md dir1
This will create a directory named dir1 under root.
COPY
Copies one or more files to another location.
Syntax
COPY Source Destination
Example
copy *.* a: = This would copy all files in the directory currently in to the floppy disk in
drive a:
copy file1.txt c:\dir1\file2.txt = This would copy file1.txt to a directory dir1 under root
with a different name file2.txt.
62
copy myfile1.txt+myfile2.txt = This command would copy the contents in myfile2.txt and
combine it with the contents in
myfile1.txt
DEL
Deletes one or more files.
Syntax
DEL [drive:][path]filename
Examples
del test.tmp = Deletes the test.tmp in the directory that you currently are in, if the file
exists.
del c:\windows\test.tmp = Delete the c:\windows\test.tmp in the windows directory if it
exists.
del c:\windows\temp\*.* = (* is for wild character(s)) *.* indicates that you would like to
delete all files in the c:\windows\temp directory.
del c:\windows\temp\?est.tmp = (? is a single wild character for one letter) This command
would delete any file ending with est.tmp such as pest.tmp or zest.tmp
EDIT
Edit allows a user to view, create and or modify their computer files. The disadvantage of
copy con is that you cannot modify a file. So we use edit.
Syntax
EDIT <filename>
Example
Using edit you can also create files, for example if you wanted to create a file called
myfile.txt you would type:
edit myfile.txt <press enter>
This would bring up a blank edit screen, as long as the file is saved upon exit this will
create the file myfile.txt.
MOVE
Allows you to move files or directories from one folder to another or from one drive to
another.
Syntax
MOVE source destination
Example
C:\>move file.txt c:\dir1\file1.txt
This would move a file named file1.txt to directory dir1 with the same name.
REN OR RENAME
Used to rename files and directories from the original name to a new name.
Syntax
Ren oldfilename newfilename
Example
C:\>ren file1.txt file2.txt
This will change the name of file1.txt to file2.txt.
63
CLS
cls is a command that allows a user to clear the complete contents of the screen and leave
only a prompt.
Syntax
cls
Format
Format is used to erase all of the information off of a computer diskette or fixed drive.
Syntax
Format <drive>
Example
C:\>Format a:
This will erase all the contents of the floppy disk inside floppy drive.
3.5.2 UNIX
UNIX was developed by some of the members of the Multics team at the bell labs starting
in the late 1960s by many of the same people who help created the C programming
language. The UNIX today however is the not just the work of a couple of programmers.
Many other organizations, institutes and various other individuals contributed significant
additions to the system we now know to day.
UNIX is primarily a command line oriented operating system you can get additional
applications such as X-Window which allows you to have a graphic oriented operating
system similar to Windows 3.x / Windows 95 / Windows 98. However while this is
available UNIX is still primarily used from the command line. Because the UNIX
operating system is an open operating system you will discover that there are various
shells. A shell is a large add-on / modification of the UNIX operating system, to determine
the shell you can type echo $shell at the UNIX prompt. When typing this you will receive a
response such as / bin/csh which in this case indicates that the UNIX you are logged into is
a C shell. Another popular shell is the Borne shell which is / bin/ sh and Korn shell that the
UNIX you are logged into is a C shell. Another popular shell is the Borne shell which is /
bin/sh and Korn shell.
3.5.3 Linux
Linux is an open- source operating system enhanced and backed by thousands of
programmers worldwide. It is a multi tasking, multiprocessing operating system designed
originally for use on personal computers. The name Linux is derived from its inventor
Linus Torvalds. Torvalds was a student at the University of Helsinki, Finland in early
1990s when he wrote the first version of an UNIX- like kernel as a toy project. He later
posted the code on the Internet and asked programmers across the world to help him build
it into a working system. The result was Linux. Torvalds holds the copyright but permits
free distribution of source code. That is, he oversees development of kernel and owns its
trademark. When someone submits a change or a feature, Torvalds and his core team of
kernel developers review the merit of adding it to kernel source code.
64
65
66
67
---------------------------------------------------------------------------------------------------------
68
Structure
4.1 Data Processing
4.1.1 Types of Data Processing
4.2 File Management System
4.2.1 File Types
4.2.2 File Organizations
4.2.3 File Utilities
4.3 Database Management System
4.3.1 Data Base
4.3.2 Purpose of Database System
4.3.3 Database Management Systems (DBMS)
4.3.4 Database Models
4.3.4.1 Hierarchical Database
4.3.4.2 Network Model
4.3.4.3 Relational Model
4.3.4.4 Object-Oriented Model
4.3.5 Main Components of a DBMS
4.3.5.1 Data Definition Language (DDL)
4.3.5.2 Data Manipulation Language (DML)
4.3.6 Creating and Using a Database
4.3.6.1 Creating a Database
4.3.6.2 Viewing, Modifying, Deleting and Adding Records
4.3.6.3 Searching For Desired Information
4.4 Review Questions
---------------------------------------------------------------------------------------------------------
69
the raw material for information. Data has to pass through a specific process before it could
be changed to information, and it is called a process.
3. Output File: Some applications use multiple programs for data processing. In such
applications, output produced by one program is fed often as input to another program.
Hence, output produced by former program is stored in a file known as output file,
which is used later by the latter' program.
4. Report File: A report file holds a copy of a report generated by a data processing
application in computer-accessible form. A report file can be printed to obtain hard
copy of the report whenever desired. It is advantageous to keep report files instead of
paper documents because files are easier to store and carry.
5. Backup File: A backup file is a copy of a file created as a safety precaution against
loss of data due to corruption or inadvertent deletion of original file. Regular creation
of backup files is extremely important.
within department-code.
A sorting utility enables users to specify their sequencing requirements for a file by means
of input parameters. Input parameters such as size and number of keys, and type of
ordering (ascending, descending) vary from one sorting utility to another. These parameters
decide the extent and sophistication of sorting utilities.
Sorting utility reads un-sequenced records of an input file, and by means of various
copying techniques, ultimately produces an output file containing records of the input file
ordered in desired sequence.
Employee Code
101
123
124
176
178
202
213
Department Code
2
3
1
2
1
3
1
Other
fields
(Name,
Address,
Qualification,
Basic Salary, etc)
-----------------------------
Department Code
1
1
1
2
2
3
3
-----------------------------
Fig 4.3 Sorting on two keys: Ascending employee - code (secondary key) within
ascending department - code (primary key)
Searching: A file searching utility is used to find a particular record in a file. Searching is
carried out by matching the values of certain specified fields (known as keys) in each
record with desired values. For example, in employee file of Figure 4.2, a user can specify
value 202 for employee-code field to search corresponding employee's record.
Efficiency of a search algorithm depends on file organization. For example, to search a
particular records sequential file, records in the file are scanned sequentially, beginning
with the first record, and specified key field value is compared one-by-one with the key
field value of each record. Search process terminates when a record with matching key is
found. On the other hand, direct or index sequential file organizations enable immediate
73
access to desired record with the help of either a hashing algorithm (in case of direct file
organization) or an index file (in case of index sequential file organization). Users need to
specify a file and key field value as input parameters to a search utility, which searches
through the file and produces the desired record (s}. Normally, the time required for
searching a particular record from a direct or index sequential file is much less, than the
time required to search it from a sequential file.
Merging: A file merging utility is used to combine records of two or more ordered (sorted)
files into a single ordered file. Records of each of the input files must be sorted in same
order, although their record layout need not be identical. A merging utility places records
from each of the input files in their correct relative order, producing an output fill having
all records in same order as input files. Figure 4.4 illustrates merging of two input files A
and B to produce an output file C.
Input file
Output file
Input file
Othe
r
Employ
ee code
112
112
127
119
119
137
125
129
127
139
Emplo
yee
125
Other
fields
Employ
ee code
Other
fields
146
129
150
159
137
152
139
146
150
152
159
File A
File B
File C
Fig 4.4 Merging of files A and B to produce file C
Copying: A file copying utility is used to produce a copy of a file either from one unit of a
storage device to another similar unit (such as from one tape reel or floppy disk to another),
or from one storage medium to another (such as from tape to hard disk, or from CD-ROM
to hard disk).
File copying utilities are used often to take back-up copies of files. For example, a file may
be copied from a hard disk to a tape or floppy for back-up purpose. File copying utilities
74
are also known as peripheral interchange programs (PIP) since they are used often to
copy a file from one peripheral device to another.
Printing: A file printing utility is used to print a file on a printer to produce hard copy of
its contents. Printing utilities often provide facility to print file contents in different
formats. They often provide some selection and editing facilities to enable printing of parts
of files (such as specified number of records and only certain fields of records). Special
printing facilities are often provided to print files that contain program instructions rather
than data.
Maintenance: A file maintenance utility is used to copy data from one or more files to a
new file selectively, or to update a file's contents selectively. For example, a file
maintenance utility may provide features to combine data from more than one file into a
single file, delete records in a file identified by record key values or record count, and
select specific fields of records to be copied from an existing file to a new file.
---------------------------------------------------------------------------------------------------------
The centre of any information system is its database, which is a collection of the data
resources of an organization designed to meet the requirements of the company for
processing and retrieving information by decision makers. One important use of database is
to target more precisely marketing efforts. In the USA the later trend in management
information systems is the executive information system which is used by senior managers.
A database can be termed as a repository of data. A collection of actual data which
constitutes the information regarding an organization is stored in a database. For example,
there are 1000 students in a college & we have to store their personal details, marks details
etc., these details will be recorded in a database.
75
Actual data
Storage
A collection of programs that enables you to store, modify, and extract information from a
database is known as Data Base Management System (DBMS).The primary goal of a
DBMS is to provide a way to store & retrieve database information that is both convenient
& efficient.
Database systems are designed to manage large bodies of information. Management of data
involves both defining structures for storage of information & providing way for
manipulation of data. In addition, the database system must ensure safety of data.
Good data management is an essential prerequisite to corporate success.
Data
Information
Information
Knowledge
Knowledge
Judgment
Judgment
Decision
Decision
Success
Complete;
Accurate;
Timely; and
Easily available
76
As the need arises new applications can be added at a particular point of time as checking
accounts can be added in a saving account. Using file system for storing data has got
following disadvantages:1. Data Redundancy & Inconsistency:Different programmers works on a single project, so various files are created by different
programmers at some interval of time. So various files are created in different formats &
different programs are written in different programming language.
Same information is repeated. For ex name & address may appear in saving account file as
well as in checking account. This redundancy results in higher storage space & access cost.
It also leads to data inconsistency which means that if we change some record in one place
the change will not be reflected in all the places. For ex. a changed customer address may
be reflected in saving record but not any where else.
2. Difficulty in accessing data:Accessing data from a list is also a difficulty in file system. Suppose we want to see the
records of all customers who has a balance less than $10,000, we can either check the list &
find the names manually or write an application program .If we write an application
program & at some later time, we need to see the records of customer who have a balance
of less than $20,000, then again a new program has to be written.
It means that file processing system do not allow data to be accessed in a convenient
manner.
3. Data Isolation:As the data is stored in various files, & various files may be stored in different format,
writing application program to retrieve the data is difficult.
4. Integrity Problems
Sometimes, we need that data stored should satisfy certain constraints as in a bank a
minimum deposit should be of $100. Developers enforce these constraints by writing
appropriate programs but if later on some new constraint has to be added then it is difficult
to change the programs to enforce them.
77
5. Atomicity Problems
Any mechanical or electrical device is subject to failure, and so is the computer system. In
this case we have to ensure that data should be restored to a consistent state. For example
an amount of $50 has to be transferred from Account A to Account B. Let the amount has
been debited from account A but have not been credited to Account B and in the mean
time, some failure occurred. So, it will lead to an inconsistent state.
So, we have to adopt a mechanism which ensures that either full transaction should be
executed or no transaction should be executed i.e. the fund transfer should be atomic.
6. Concurrent access Problems
Many systems allow multiple users to update the data simultaneously. It can also lead the
data in an inconsistent state. Suppose a bank account contains a balance of $ 500 & two
customers want to withdraw $100 & $50 simultaneously. Both the transaction reads the old
balance & withdraw from that old balance which will result in $450 & &400 which is
incorrect.
7. Security Problems
All the user of database should not be able to access all the data. For example a payroll
Personnel needs to access only that part of data which has information about various
employees & are not needed to access information about customer accounts.
Table 4.1 Comparison of File Management Systems with Database Systems
File Management
Examples:-C++, VB or COBOL
program
Small systems
Often PC based
Relatively cheap
Few 'files'
Files are files
Simple structure
Little preliminary design
Integrity left to application programmer
No security
Simple, primitive backup/recovery
Often single user
Database Management
Examples:- Postgres, Oracle
Large systems
Mini-Mainframe
Relatively Expensive
Many 'files'
Files not necessarily files
Complex structure
Vast preliminary design
Rigorous inbuilt integrity checking
Rigorous security
Complex & sophisticated
backup/recovery
Multiple users
Files tend to contain duplication. Therefore they are susceptible to a loss of INTEGRITY
if all files are not updated at the same time. Programs are bound to a file. If a files
structure is modified then all programs that access it need to be modified. Thus alterations
to file structures are difficult and expensive.
78
Data base systems originated in the late 1950s and early 1960s largely by research and
development of .IBM Corporation. Most developments were responses to needs of
business, military, government and educational institutions which are complex
organizations with complex data and information needs.
79
A database contains a no. of files & certain programs to access & modify these files. But
the actual data is not shown to the user; the system hides actual details of how data is stored
& maintained.
.
(a)
(b)
Fig 4.7 Hierarchical Model
The example also shows a child element that has no parent element (student named Raju he might be a research student who has not taken any course in this semester).
82
College
English
Seeta
Hindi
Geeta
Mathematic
s
Ram
Moha
n
Sohan
Computer
Science
Raju
matching are often indexed in order to speed up the process and the data can be retrieved
and manipulated in a number of ways without the need to reorganize the original database
tables. Working under the assumption that file systems (which often use the hierarchical or
network models) are not considered databases, the relational database model is the most
commonly used system today. While the concepts behind hierarchical and network
database models are older than that of the relational model, the latter was in fact the first
one to be formally defined.
Properties of Relational Tables:
Values Are Atomic
Each Row is Unique
Column Values Are of the Same Kind
The Sequence of Columns is Insignificant
The Sequence of Rows is Insignificant
Each Column Has a Unique Name
84
model, data exists in the form of objects, which include both the data and the datas
behavior. Certain modern information systems contain such convoluted combinations of
information that traditional data models (including the RDBMS) remain too restrictive to
adequately model this complex data. The object-oriented model also exhibits better
cohesion and coupling than prior models, resulting in a database which is not only more
flexible and more manageable but also the most able when it comes to modeling real-life
processes. A major benefit of this approach is the unification of the application and
database development into a seamless data model and language environment. As a result,
applications require less code, use more natural data modeling, and code bases are easier to
maintain. Object developers can write complete database applications with a modest
amount of additional effort.
However, due to the immaturity of this model, certain problems are bound to arise, some
major ones being the lack of an SQL equivalent as well as lack of standardization.
Furthermore, the most common use of the object oriented model is to have an object point
to the child or parent OID (object I.D.) to be retrieved; leaving many programmers with the
impression that the object oriented model is simply a reincarnation of the network model at
best. That is, however, an attempt at the over-simplification of an innovative technology.
In contrast to a relational DBMS where a complex data structure must be flattened out to fit
into tables or joined together from those tables to form the in-memory structure, object
DBMSs have no performance overhead to store or retrieve a web or hierarchy of
interrelated objects. This one-to-one mapping of object programming language objects to
database objects has two benefits over other storage approaches: it provides higher
performance management of objects, and it enables better management of the complex
interrelationships between objects. This makes object DBMSs better suited to support
applications such as financial portfolio risk analysis systems, telecommunications service
applications, World Wide Web document structures, design and manufacturing systems,
and hospital patient record systems, which have complex relationships between data.
These applications include computer aided design (CAD), computer-aided engineering
(CAE), computer-aided manufacturing (CAM), computer-aided software engineering
(CASE), expert systems, and multimedia systems. Some key features required for effective
modeling of these applications, that are absent in conventional database models, are:
1. Ability to model complex nested entities, such as design and engineering objects, and
multimedia documents. Conventional database models do not provide mechanisms, such as
configuration management, to represent and manage such entities.
2. Support for general data types found in object-oriented programming languages.
Database management systems based on conventional database models support only a
limited set of atomic data types, such as integer, string, etc. They do not even allow storage
and retrieval of long unstructured data, such as images, audio, and textual documents.
3. Support for proper match between object-oriented programming languages and database
languages. A database application is normally implemented by using some conventional
programming language (such as COBOL, PASCAL, C, or C++), and some database
85
languages (data definition language, data manipulation language, query language) that are
part of database management system. With popularity of object-oriented paradigm, use of
object-oriented programming languages for implementing applications has become a
common practice. However, database languages used in database management systems for
conventional database models do not use object-oriented concepts for implementing
applications. This mismatch between object-oriented programming languages and database
languages used in database management systems for conventional database models makes
database implementation of many applications inconvenient.
Object-oriented database model was introduced to overcome these shortcomings of
conventional database models. An object-oriented database is a collection of objects
whose behavior, state, and relationships are defined in accordance with object-oriented
concepts (such as object, class, class hierarchy, etc.). An object-oriented database
management system allows definition and manipulation of an object-oriented database.
Figure 4.11 shows an example of an object-oriented database structure. Class Vehicle is
root of a class composition hierarchy including classes Vehiclespecs, Company, and
Employee. Class Vehicle is also root of a class hierarchy involving classes Two Wheeler
and Four Wheeler. Class Company is, in turn, root of a class hierarchy with subclasses
Domestic Company and Foreign Company. It is also root of a class-composition hierarchy
involving class Employee.
86
Class/subclass link
Attribute/domain link
--------------------------------------------------------------------------------------------------------TW
Two Wheeler
FW
Four Wheeler
DC
Domestic Company
FC
Foreign Company
Com
Company
Emp
Employee
---------------------------------------------------------------------------------------------------------
Numeric: Can contain numbers formed with digits 0 to 9, a decimal point, and a +
or sign
Memo: Can contain any type of data that user might like to type Binary: Can
contain binary data
4. Definition of controls for fields that can have selective values only. For example, in
an employee database, sex field can have controls to accept values M or F only.
Similarly, age field can have controls to accept values 18 or more and less than 70
only. Such controls ensure correctness of entered data to some extent.
5. Definition of access controls to various tables, records, and fields for different
87
89
856392
EMPLOYEE NAME:
SEX:
LAST NAME:
FIRST NAME:
MIDDLE NAME:
CONTACT ADDRESS:
ADDRESS1:
ADDRESS2:
CITY:
STATE:
POSTAL CODE:
TELEPHONE
NO.:
AGE:
48
SINHA
PUNIT
KUMAR
411007
(020) 5680-4892
90
Designing Forms
After defining the structure of a database, next step is to design forms (custom screens) for
convenient data entry. Each form displays a set of fields of database structure with
appropriate amount of blank spaces against each to enable data entry in those fields. Figure
4.12 shows such a form.
To facilitate easier data entry, often forms are designed with several fancy features, such
as:
l. A list-box for a field listing the options from which users can select a choice. For
example, in Figure 4.10, SEX field may have a list-box listing options "Male" and
"Female," and users simply select appropriate option for an employee. Depending on a
user's selected option, system enters "M" or "F" automatically in SEX field. Similarly,
STATE field may have a list-box listing all states, from which users can select appropriate
option for an employee's address.
2. Simple validation checks defined for a field to ensure correctness of entered data to some
extent. For example, in Figure 4.10, a validation check may be defined for POSTAL CODE
field to accept only six numeric characters. With this, the field will not accept less than or
more than six characters, and will also not accept alphabetic or special characters.
Similarly, a validation check may be defined for AGE field-to accept values in the range 18
to 70 only (both inclusive). Validation checks can be used also to force a certain character
position of a field to be a letter or numeral.
3. Automatic conversion of typed characters to upper-or lower-case. For example, in Figure
4.10, this feature may be used with STATE field. Hence, the system will accept
"mh","Mh";"mH" or "MH'; for state code of Maharashtra, and will convert the entry to
"MH" automatically. This feature greatly eases data entry and ensures uniformity of data.
4. Automatic formatting of certain fields. For example, in Figure 4.10, this feature can be
used with TELEPHONE NO field to display the value of this field automatically in
specified format (with parentheses, space, and hyphen). That is, to enter telephone number
"(020) 5680-4892", user only needs to type "02056804892", and the system displays "(020)
5680-4892" in that field automatically.
Entering Data
After forms have been designed, the database is ready for entry of data. Data is entered one
record at a time. To enter data, a user issues a command that calls up and displays
appropriate form with blank fields. The user then keys in data for each field in appropriate
spaces. In this manner, the user enters data for first record, then for second record, and so
on. In most database systems, records are assigned a number automatically as they are
entered.
While entering data into fields, the Tab or Enter key is used usually to move to next field.
Pressing Enter or Tab key in last field of the form saves the record in database and moves
to a new, blank form for next record's data entry. In addition to using the Tab or Enter key
91
to move forward through fields one can call directly go to any field on the form by c1icking
on it with mouse.
92
93
around some field names are needed in the example above because these field names
contain spaces, and brackets help the database to interpret each field name correctly.
A query language can be learnt and used easily even by a non-programmer, because
complexity of a query language statement is more or less of same order as given in the SQL
statement above. Furthermore, a query language uses a few keywords only that are easy to
remember and use. In fact, SQL has a few dozen or so basic keywords only.
Other advantages of using a query language are that a query statement can be used for
creating an elaborate set of criteria for complex queries, it can operate on multiple tables at
a time, and specified criteria can be saved for future use.
Query By Example (QBE)
Although query languages are easy to learn and use, many database developers further
simplify the job of specifying search criteria. For this, they provide a simpler user interface
(called front end) to query language. A database user specifies facts about a query by using
this interface and a query language builder composes query language statements
automatically from the facts. Front end usually consists of a form (called QBE form), and a
user specifies a search criteria simply by inputting values into the fields of this form. Again
values may be input either by typing them or by selecting an option from a set of options
provided for a particular field, depending on how the front end has been designed to work.
QBE form is designed to collect all necessary information from a user for composing query
language statement(s) for search criteria. Once the user completes the QBE form, QBE
engine converts user inputs automatically into suitable query language statement(s) for
search processing. Hence, the user is relieved of remembering query language keywords
and using them with correct syntax to. Form queries. This front-end feature is called query
by example (QBE). It is very useful for many database users, especially beginners.
Creating Reports
Users of a database system can use report generator to assemble output of a database query
in desired format. For this, a user creates a report specifying the layout of display (or
printout) of fields requested by the user in the query. Users can also specify titles and
subtitles for a report, column headings for various fields, and other elements, to make the
output appear more presentable. Furthermore, users can even specify sorting parameters to
obtain sorted output with respect to one or more fields in the output. When sorting is on
more than one field, a user has to specify the primary, secondary, and tertiary key fields. A
user can save a created report and use it later for generating similar reports whenever
required.
94
----------------------------------------------------------------------------------------------------------
95
---------------------------------------------------------------------------------------------------------
DATA COMMUNICATIONS
---------------------------------------------------------------------------------------------------------
Structure
5.1 Introduction
5.2 Basic Elements of a Communication System
5.2.1 Data Transmission Modes
5.2.2 Transmission Basics
5.3 Types of Data Transmission Media
5.3.1 Bounded Media
5.3.2 Unbounded Media
5.4 Modulation Techniques
5.4.1 Modems
5.4.2 Analog versus Digital Transmission
5.5 Multiplexing
5.5.1 Time Division Multiplexing (TDM)
5.5.2 Frequency Division Multiplexing (FDM)
6.6 Review Questions
---------------------------------------------------------------------------------------------------------
5.1 INTRODUCTION
--------------------------------------------------------------------------------------------------------The term Communication has a history as old as the existence of life on earth. The
telegraph revolutionized long-distance communications almost everywhere, reducing the
time taken to communicate across a country from days to hours or minutes, or from months
to days between continents. The early telegraph was a very simple device; it used a direct
current cell to operate an electromagnet.
At the time of the invention of the telephone, most effort was directed towards the
development of a 'multiple' telegraph: one that could signal more than one code at a time.
Despite digital communication getting a head start, voice telephony rapidly came to
dominate the wide-are a communications arena. It is only the last few decades that have
seen the development of wide-area networks exclusively for data, and only in the last few
years that this technology, in the form of ISDN, has become available to home subscribers.
Until very recently, if one wished to communicate between a home computer and a remote
site, one had no choice but to use a modem to convert the computer signals into a form
suitable for a voice communications medium.
96
Frequently, however, data must be sent beyond the local circuitry that constitutes a
computer. In many cases, the distances involved may be enormous. Unfortunately, as the
distance between the source of a message and its destination increases, accurate
transmission becomes increasingly difficult. This results from the electrical distortion of
signals traveling through long conductors, and from noise added to the signal as it
propagates through a transmission medium. Although some precautions must be taken for
data exchange within a computer, the biggest problems occur when data is transferred to
devices outside the computer's circuitry. In this case, distortion and noise can become so
severe that information is lost.
Data Communications concerns the transmission of digital messages to devices external to
the message source. "External" devices are generally thought of as being independently
powered circuitry that exists beyond the chassis of a computer or other digital message
source. As a rule, the maximum permissible transmission rate of a message is directly
proportional to signal power and inversely proportional to channel noise. It is the aim of
any communications system to provide the highest possible transmission rate at the lowest
possible power and with the least possible noise.
---------------------------------------------------------------------------------------------------------
Receiver
(Sink)
97
98
3. Full-Duplex
When signals are free to travel in both directions over a medium simultaneously, the
transmission is considered full duplex. Full duplex may also be called bi-directional
transmission or sometimes, simply duplex. When you call a friend on the telephone, your
connection is an example of a full-duplex transmission, because your voice signals can be
transmitted to your friend at the same time your friends voice signals are transmitted in the
opposite direction to you. In other words, both of you can talk and hear each other
simultaneously.
Full-duplex transmission is also used on data networks. For example, modern Ethernet
networks use full-duplex. In this situation, full-duplex transmission uses multiple channels
on the same medium. A channel is a distinct communication path between two or more
nodes, much as a lane is a distinct transportation path on a freeway. Channels may be
separated either logically or physically.
An example of physically separate channels occurs when one wire within a network cable
is be used for transmission while another wire is used for reception. In this example, while
each separate wire in the medium allows half-duplex transmission, when combined in a
cable they form a medium that provides full-duplex transmission. Full-duplex capability
increases the speed with which data can travel over a network. In some casesfor
example, telephone service over the Internetfull-duplex data networks are a requirement.
Many network devices, such as modems and NICs, allow you to specify whether the device
should use half- or full-duplex communication. Its important to know what type of
transmission a network supports before installing network devices on that network. If you
configure a computers NIC to use full duplex while the rest of the network is using halfduplex,
For example, computer will not be able to communicate on the network.
99
over a medium from one point to another. Long ago, people transmitted information across
distances via smoke or fire signals. Needless to say, many different types of data
transmission have evolved since that time. The transmission techniques in use on todays
networks are complex and varied.
Analog and Digital Signaling
One important characteristic of data transmission is the type of signaling involved. On a
data network, information can be transmitted via one of two signaling methods:
i.
ii.
Analog
Digital
Both types of signals are generated by electrical current, the pressure of which is measured
in volts. The strength of an electrical signal is directly proportional to its voltage. Thus,
when network engineers talk about the strength of an analog or digital signal, they often
refer to the signals voltage. The essential difference between analog and digital signals is
the way voltage creates and sustains the signal.
1. Analog Signaling
In analog signals, voltage varies continuously. In digital signals, voltage turns off and on
repeatedly, pulsing from zero voltage to a specific positive voltage. An analog signals
voltage appears as a continuous wave when graphed over time, because voltage is varied
and imprecise in analog signals, analog transmission is more susceptible to transmission
flaws such as noise than digital signals. To understand this concept, think of two tin cans
connected by a wire. When you speak into one of the tin cans, you produce analog sound
waves that vibrate over the wire until they reach the tin can at the other end. These sound
waves are merely approximations of your voice, and they are significantly affected by the
quality of the wire.
For example,
If you try the tin can experiment with a pure copper wire, your voice will arrive at the other
end sounding clearer than if you used fishing line, because copper conducts sound better
than plastic. Regardless of which medium you use, however, the sound waves will become
distorted as they traverse the wire, arriving at the second tin can at least a little muddled.
This vulnerability makes analog transmission less precise than digital transmission.
2. Digital Signaling
Unlike analog signals where there is a smooth curve, digital signals jump directly to the
next value.
For example,
If the voltage changed from -5 V to 0 V, it would change instantly, not drop off with a
curve. When digital signals can exist in only one of two values, they go directly to the next
value, typically changing between 0 and 1. The jump from one value to another is known
as a transition. In digital signaling, transitions give a notched appearance to the graph.
Digital signals are synchronized in bits which can be clocked by either sending a separate
clocking scheme across the network with the bits, or by using a guaranteed state-change
100
clocking scheme. Data rate is measured in bits per second (bps). Also known as hertz or
baud, this rate is sometimes called baud rate. Encoding data in a digital signal can be
done using several encoding types. The different encoding types can be described as either
state-transition encoding or current-state encoding. State-transition encoding uses a change
(or lack of a change) in a signal to represent a data value. One way this is done is to let a
change in voltage represent a 1. Whenever the voltage changes this is translated to a 1; if
the voltage remains the same, the value is a 0. State-transition could also allow that a
change in voltage represents a specific value. When the voltages changes from high to low
this represents a 1, while a change from low to high represents a 0.
101
102
Capacity: So you have gotten past the cost and installation issues, and now the question is,
How fast will it go? Normally, cable speed is referred to as bandwidth and is an
important characteristic of a media type. Bandwidth is usually measured in bits per
second. For example, standard Ethernet cable is usually up to 10 Mbps, which is 10 mega
bits per second (note the small b for bits, not B for Bytes).
Attenuation (Maximum Distance): Depending on what you need to network together, the
maximum cable distance may also be another consideration.
Immunity to Interference: The last property is how well the cable holds up against
interference, normally electromagnetic interference, or EMI. EMI could play a big part in
which cable type you use, depending on the location. Suppose you needed to run a network
into a manufacturing facility with a lot of heavy machinery that used electrical motors. An
unshielded type of cable may not be the best choice in that situation.
Three common types of bounded media are in use out in the world they are
a) Coaxial
b) Twisted pair
c) Fiber optic
a) Coaxial Cable
Coaxial cable, called coax for short, was the foundation for Ethernet networks in the
1980s and remained a popular transmission medium for many years. Over time, however,
twisted-pair cabling has replaced coax in most modern LANs. Coaxial cable consists of a
central copper core surrounded by an insulator, a braided metal shielding, called braiding,
and an outer cover, and called the sheath or jacket. The copper core carries the
electromagnetic signal, and the braided metal shielding acts as both a shield against noise
and a ground for the signal. The insulator layer usually consists of a plastic material such as
polyvinyl chloride (PVC) or Teflon. It protects the copper core from the metal shielding,
because if the two made contact, the wire would short-circuit. The jacket, which protects
the cable from physical damage, may be PVC or a more expensive, fire-resistant plastic
Because of its insulation and protective braiding, coaxial cable has a high resistance to
interference from noise. It can also carry signals farther than twisted-pair cabling before
amplification of the signals becomes necessary, although not as far as fiber-optic cabling.
On the other hand, coaxial cable is more expensive than twisted-pair cable because it
requires significantly more raw materials (such as copper for the core, Teflon for the
insulation, and so on) to manufacture. Coaxial cable is also less desirable than twisted-pair
because it supports lower throughput.
103
The more twists per inch in a pair of wires, the more resistant the pair will be to all forms
of noise. Higher-quality, more expensive twisted-pair cable contains more twists per foot.
The number of twists per meter or foot is known as the twist ratio. Because twisting the
wire pairs more tightly requires more cable, however, a high twist ratio can result in greater
attenuation. For optimal performance, cable manufacturers must strike a balance between
crosstalk and attenuation reduction. Because twisted-pair is used in such a wide variety of
environments and for a variety of purposes, it comes in hundreds of different designs.
iii. Fiber-Optic Cable
Fiber-optic cable, or simply fiber, contains one or several glass fibers at its center, or core.
Data are transmitted via pulsing light sent from a laser or light-emitting diode (LED)
through the central fibers. Surrounding the fibers is a layer of glass called cladding. The
cladding glass is a different density from the glass in the strands. It acts as a mirror,
reflecting light back to the core in patterns that vary depending on the transmission mode.
This reflection allows the fiber to bend around corners without diminishing the integrity of
the light-based signal. Outside the cladding, a plastic buffer protects the glass cladding and
core. Since it is opaque, it also absorbs any light that might escape. To prevent the cable
from stretching, and to further protect the inner core, strands of Kevlar (an advanced
polymeric fiber) surround the plastic buffer. Finally, plastic sheath covers the strands of
Kevlar.
105
of its reliability, fiber is currently used primarily as a cable that connects the many
segments of a network. Experts predict, however, that it will replace UTP as the primary
means of bringing data to the desktop within the next decade. Fiber-optic cable provides
the benefits of nearly unlimited throughput, very high resistance to noise, and excellent
security. Because fiber does not conduct electricity like copper wire, it does not emit a
current. As a result, the signals it carries stay within the fiber and cannot easily be picked
up except at the destination node. Copper, on the other hand, generates signal that can be
monitored by taps into the network. Fiber can also carry signals for longer distances than
can coax or twisted-pair cable. In addition, you can use longer lengths of fiber with fewer
repeaters than on a copper-based network. Finally, fiber is widely accepted by the highspeed networking industry. Thus, industry groups are establishing standards to ensure that
fiber-networking equipment from multiple manufacturers can be integrated without
difficulty.
106
3. Infrared
i. Point-to-point
ii. Broadcast
1. Radio Waves
Radio waves have frequencies between 10 KHz and 1GHz. Radio waves include the
following types:
i.Short-wave
ii.Very-high frequency (VHF) television and radio
iii.Ultra-high frequency (UHF) television and radio
Most radio frequencies in the US and Canada are regulated. To gain permission to use a
regulated frequency can take a long time and a large amount of money. The good news is
that there are some frequencies that are not regulated and anyone can use.
The problem with unregulated frequencies is that they can get saturated. To ease this, there
have been limits set on the amount of power that devices can broadcast in these
frequencies. While letting more people use the frequencies, this cuts down on the usable
range.
2. Microwaves
Microwaves travel at higher frequencies than radio waves and provide better throughput as
a wireless network media. Microwave transmissions require the sender to be within sight of
the receiver. These systems use licensed frequencies, which makes them more costly than
radio wave systems. Microwaves are utilized on the following two types of communication
systems:
i. Terrestrial Microwaves
Terrestrial microwave transmissions are used to transmit wireless signals across a few
miles. These systems are often used to cross roads or other barriers that make cable
connections difficult. Terrestrial systems require that direct parabolic antennas be pointed
at each other. Relay towers can be used as repeaters to extend the distance of the
transmission. These systems operate in the low giga hertz range and require licensed
frequencies. Installation can be difficult because terrestrial microwave transmissions
require that the antennas have a clear line of sight.
ii. Satellite Microwaves
Satellite microwave transmissions are used to transmit signals throughout the world. These
systems use satellites in orbit about 50,000 kilometers (km) above the earth. Satellite dishes
are used to send the signal to the satellite where it is then sent back down to the receivers
satellite. These transmissions also use directional parabolic antennas within line-of-site.
The large distances the signals travel can cause propagation delays. These delays vary from
under a second to several seconds. These delays are roughly the same for transmissions
down the street as for transmissions across the world. This equipment is expensive and
107
quite complicated. Launching a satellite into orbit is a task beyond many organizations.
These systems can provide average bandwidth but lack advanced security and protection
from interference. These systems can provide a good bandwidth connection to link LANs
across the world, but this capability comes with (literally) a hefty price.
3. Infrared
Infrared frequencies are just below visible light. These high frequencies allow high-speed
data transmissions. This technology is similar to the use of a remote control for a television.
Infrared transmissions can be affected by objects obstructing the sender or receiver and by
interference from light sources. These systems are immune to electromagnetic interference
and can be used successfully where certain types of cable media fail. These transmissions
fall into the following two categories:
i. Point-to-point Infrared
Point-to-point infrared transmissions utilize highly focused beams to transfer signals
directly between two systems. Many laptop systems and PDAs (personal data assistants)
use point-to-point transmissions. Point-to-point systems require direct alignment between
devices. Point-to-point can provide an alternative to terrestrial microwave as well. If two
buildings have direct line-of-site availability, point-to-point can utilize high-power infrared
beams. This does not require an FCC license and is immune to EMI. These systems are
susceptible to interference from anything that can block the path of the beam. This provides
a high level of security, as any attempt to interfere with the beam would be noticeable. One
must be careful when working with high-power laser beams, as they can cause damage to
eye and skin tissue.
ii. Broadcast
Broadcast infrared transmissions use a spread signal, one broadcast in all directions,
instead of a direct beam. This helps to reduce the problems of proper alignment and
obstructions. It also allows multiple receivers of a signal. Some systems utilize a single
broadcast transceiver to communicate with many devices. This type of system is easy to
install. Broadcast infrared transmissions operate in the same frequencies as point-to-point
infrared and are susceptible to interference from light sources. The drawback of this system
is that the diffused signal reduces transmission rates to 1Mbps. This system overcomes
some of the problems of point-to-point transmissions, but the trade-off is a decrease in
speed.
---------------------------------------------------------------------------------------------------------
108
one property of the carrier wave (for example, the frequency, amplitude, or phase).The
result is a new, blended signal that contains properties of both the carrier wave and added
data. When the signal reaches its destination, the receiver separates the data from the
carrier wave.
Modulation can be used to make a signal conform to a specific pathway, as in the case of
frequency modulation (FM) radio, in which the data must travel along a particular
frequency. Modulation may also be used to issue multiple signals to the same
communications channel and prevent the signals from interfering with one another. In
frequency modulation, the frequency of the carrier signal is modified by the application of
the data signal.
There are three forms of modulation- amplitude, frequency and phase modulation. They are
described below:
1) Amplitude modulation (AM) is a technique used in electronic communication, most
commonly for transmitting information via a radio carrier wave. AM works by varying the
strength of the transmitted signal in relation to the information being sent. It is a method of
impressing data onto an alternating-current (AC) carrier waveform. The highest frequency
of the modulating data is normally less than 10 percent of the carrier frequency. The
instantaneous amplitude (overall signal power) varies depending on the instantaneous
amplitude of the modulating data. For example, changes in the signal strength can be used
to reflect the sounds to be reproduced by a speaker, or to specify the light intensity of
television pixels.
2) Frequency Modulation (FM) In telecommunications, frequency modulation (FM)
conveys information over a carrier wave by varying its frequency (contrast this with
amplitude modulation, in which the amplitude of the carrier is varied while its frequency
remains constant). In analog applications, the instantaneous frequency of the carrier is
directly proportional to the instantaneous value of the input signal. Digital data can be sent
by shifting the carrier's frequency among a set of discrete values, a technique known as
frequency-shift keying.
It is a method of impressing data onto an alternating-current (AC) wave by varying the
instantaneous frequency of the wave. This scheme can be used with analog or digital data.
Examples; FM is also used at audio frequencies to synthesize sound. This technique,
known as FM synthesis, was popularized by early digital synthesizers and became a
standard feature for several generations of personal computer sound cards.
3) Phase modulation (PM) It is a form of modulation that represents information as
variations in the instantaneous phase of a carrier wave.
Unlike its more popular counterpart, frequency modulation (FM), PM is not very widely
used. This is because it tends to require more complex receiving hardware and there can be
ambiguity problems in determining whether, for example, the signal has changed phase by
+180 or -180. This scheme can be used with analog or digital data.
109
5.4.1 Modems
The word "modem" is a contraction of the words modulator-demodulator. A modem is
typically used to send digital data over a phone line.
The sending modem modulates the data into a signal that is compatible with the phone
line, and the receiving modem demodulates the signal back into digital data. Wireless
modems convert digital data into radio signals and back.
110
Modems came into existence in the 1960s as a way to allow terminals to connect to
computers over the phone lines. A typical arrangement is shown in Fig. 5.11.
(a)
(b)
Fig 5.12 An Architecture of Modem
111
Advantages of Analog
1. Uses less bandwidth
2. More accurate
Disadvantages of Analog
1. The effects of random noise can make signal loss and distortion impossible to recover
Advantages of Digital
1. Less expensive
2. More reliable
3. Easy to manipulate
4. Flexible
5. Compatibility with other digital systems
6. Only digitized information can be transported through a noisy channel without
degradation
7. Integrated networks
Disadvantages of Digital
1. Sampling Error
2. Digital communications require greater bandwidth than analogue to transmit the same
information.
3. The detection of digital signals requires the communications system to be synchronized,
whereas generally speaking this is not the case with analogue systems.
---------------------------------------------------------------------------------------------------------
5.5 MULTIPLEXING
--------------------------------------------------------------------------------------------------------A form of transmission that allows multiple signals to travel simultaneously over one
medium is known as multiplexing. In order to accommodate multiple signals, the single
medium is logically separated into multiple channels, or sub channels.In
telecommunications and computer networks, multiplexing (also known as mixing) is a
process where multiple analog message signals or digital data streams are combined into
one signal over a shared medium. There are many different types of multiplexing, and the
type used in any given situation depends on what the media, transmission and reception
equipment can handle.The aim is to share an expensive resource. For each type of
multiplexing, a device that can combine many signals on a channel, a multiplexer (mux), is
required at the sending end of the channel. At the receiving end, a demultiplexer (demux)
separates the combined signals and regenerates them in their original form.
Multiplexing is commonly used on networks to increase the amount of data that can be
transmitted in a given time span.
channels in one communication channel, but are physically taking turns on the channel.
The time domain is divided into several recurrent timeslots of fixed length, one for each
sub-channel divides a channel into multiple intervals of time, or time slots. It then assigns a
separate time slot to every node on the network and in that time slot, carries data from that
node.
For example, if five stations are connected to a network over one wire, five different time
slots would be established in the communications channel. Workstation A may be assigned
time slot 1, workstation B time slot 2, workstation C time slot 3, and so on. Time slots are
reserved for their designated nodes no matter whether the node has data to transmit or not.
If a node does not have data to send, nothing will be sent during its time slot. This
arrangement can be inefficient if some nodes on the network rarely send data.
113
40 KHz
40 KHz
Sig-1
Sig-1
50 KHz
Sig-2
50 KHz
SENDER
Sig-3
RECEIVER
Sig-5
60 KHz
Sig-3
60 KHz
Channel
Sig-4
Sig-2
70 KHz
Sig-4
70 KHz
80 KHz
80 KHz
Sig-5
114
--------------------------------------------------------------------------------------------------------------
COMPUTER NETWORKS
--------------------------------------------------------------------------------------------------------------
Structure
6.1 Need for Computer Communication Networks
6.1.1 Advantages of Networking
6.2 Types of Network
6.3 Network Topologies
6.4 Network Protocol
6.4.1 Key Features of Protocols
6.4.2 Roles of Protocol
6.4.3 Need for Protocol Architecture
6.5 OSI and TCP/IP Model
6.5.1 ISO and Other Models
6.5.2 How the OSI Model Works
6.5.3 Key Words and Concepts from the OSI Model
6.5.4 The TCP/IP Model
6.5.5 Internetworking With TCP/IP
6.6 The Future of Internet Technology
6.7 Internet Protocols
6.7.1 Low Level Protocols
6.7.2 High Level Protocols
6.8 World Wide Web
6.9 E-Mail
6.10 Search Engines
6.10.1 Types of Search Engines
6.11 Review Questions
---------------------------------------------------------------------------------------------------------
Need: If your business has more than one computer, chances are you could benefit from
networking them. A local area network (LAN) connects your company's computers,
allowing them to share and exchange a variety of information. While one computer can be
useful on its own, several networked computers can be much more useful. Resource
sharing and communication are two principal reasons of building and using computer
networks.
Here are some of the ways a computer network can help your business:
o File sharing: Have you ever needed to access a file stored on another computer? A
network makes it easy for everyone to access the same file and prevents people
from accidentally creating different versions.
o Printer sharing: If you use a computer, chances are you also use a printer. With a
network, several computers can share the same printer. Although you might need a
more expensive printer to handle the added workload, it's still cheaper to use a
network printer than to connect a separate printer to every computer in your office.
o Communication and collaboration: It's hard for people to work together if no
one knows what anyone else is doing. A network allows employees to share files,
view other people's work, and exchange ideas more efficiently. In a larger office,
you can use e-mail and instant messaging tools to communicate quickly and to
store messages for future reference.
o Organization: A variety of scheduling software is available that makes it possible
to arrange meetings without constantly checking everyone's schedules. This
software usually includes other helpful features, such as shared address books and
to-do lists.
o Remote access: Having your own network allows greater mobility while
maintaining the same level of productivity. With remote access in place, users are
able to access the same files, data, and messages even when they're not in the
office. This access can even be given to mobile handheld devices.
o Data protection: You should know by now that it's vital to back up your computer
data regularly. A network makes it easier to back up all of your company's data on
an offsite server, a set of tapes, CDs, or other backup systems. Of course, another
aspect of data protection is data security.
116
Centralized Software Management: One of the greatest benefits of installing a network is the
fact that all of the software can be loaded on one computer (the file server). This eliminates
that need to spend time and energy installing updates and tracking files on independent
computers throughout the building.
Resource Sharing: Sharing resources is another area in which a network exceeds stand-alone
computers. Most companies cannot afford enough laser printers, fax machines, modems,
scanners, and CD-ROM players for each computer. However, if these or similar peripherals are
added to a network, they can be shared by many users.
Flexible Access: Networks allow employees/students to access their files from computers
throughout the company/college. Students can begin an assignment in their classroom, save
part of it on a public access area of the network, and then go to the media center after college to
finish their work.
Security: Files and programs on a network can be designated as "copy inhibit," so that you do
not have to worry about illegal copying of programs. Also, passwords can be established for
specific directories to restrict access to authorized users.
Requires Administrative Time: Proper maintenance of a network requires considerable time
and expertise. Many companies have installed a network, only to find that they did not budget
for the necessary administrative support.
File Server May Fail: Although a file server is no more susceptible to failure than any other
computer, when the files server "goes down," the entire network may come to a halt. When this
happens, the entire school may lose access to necessary programs and files.
--------------------------------------------------------------------------------------------------------------
117
118
119
The main criterion for a MAN is that the connection between LANs is through a local
exchange carrier (the local phone company).
WAN (Wide Area Network)
As the term implies, a WAN spans a large physical distance. The Internet is the largest
WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A
network device called a router connects LANs to a WAN. In IP networking, the router
maintains both a LAN address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are
not owned by any one organization but rather exist under collective or distributed
ownership and management.
A Wide Area Network is a network system connecting cities, countries, or continents
together. WANs are connected together using one of the telecommunications media.
The main difference between a MAN and a WAN is that the WAN uses Long Distance
Carriers. Otherwise the same protocols and equipment are used a MAN.
(a)
120
(b)
Fig 6.5 Examples of WAN
They may link the computers by means of cables, optical fibers, or satellites, but their users
commonly access the networks via a modem (a device that allows computers to
communicate over telephone lines). The largest wide area network is the Internet, a
collection of networks and gateways linking millions of computer users on every continent.
---------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------
Topology of a network refers to the way in which the networks nodes (computers or other
devices that need to communicate) are linked together. It determines the various data paths
available between any pair of nodes in the network. Choice of a topology for a computer
network depends on a combination of factors such as:
1. Desired performance of the system
2. Desired reliability of the system
3. Size (number of nodes and their geographical distribution) of the system.
4. Expandability of the system
5. Cost of components and services required to implement the network.
6. Availability of communication lines.
7. Delays involved in routing information from one node to another.
121
Bus Topology;
Ring Topology;
Star Topology;
Tree Topology;
Mesh Topology.
Bus Topology: Bus networks (not to be confused with the system bus of a computer) use a
common backbone to connect all devices. A single cable, the backbone functions as a
shared communication medium that devices attach or tap into with an interface connector.
A device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message. Ethernet bus topologies are relatively easy to install and
don't require much cabling compared to the alternatives
Benefits of Bus Topology
1. Cabling costs are minimized because of the common trunk.
2. Failure of a node does not affect communication among other nodes in the network
3. Addition of new nodes to the network is easy.
Disadvantages of Bus topology
1. Difficult to trouble shoot because no central distribution points exist.
2. Cable breaks can disable the entire segment because they remove the required
termination from each of the two cable fragments.
122
Hub
Multipoint Repeater
Concentrator
Multi-Access Unit (MAU)
Compared to the bus topology, a star network generally requires more cable, but a failure in
any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails).
Benefits of Star Topology
1. Each device is isolated on its own cable. This makes it easy to isolate individual devices
from the network by disconnecting them from the wiring hub.
2. All data goes through the central point, which can be equipped with diagnostic devices
that make it easy to trouble shoot and manage the network.
123
124
125
3. It is fault tolerant; since there is no gateway, nodes can connect to each other with no
regard to the state of the rest of the network. In addition, nodes can create their own paths
through the network because there is no gateway computer.
Disadvantages of Mesh Topology
1. Requires more cable than the other LAN topologies
2. Complicated implementation
3. Setup time can be quite time consuming.
--------------------------------------------------------------------------------------------------------A protocol is the formal code of behavior for a system, or to be more precise the set form
in which data must be presented for handling by a particular computer configuration. A
protocol defines the set of rules governing the exchange of data between two entities such
as user application programs, file transfer packages, email etc.
ii.
Data routing: Routing algorithms are designed to find the most efficient paths
between sources and destinations. They can handle varying degree of traffic on the
present network configuration with optimum time utilization. Normally, they are
dynamic enough to accommodate network changes and growth.
iii.
iv.
Error control: Error detecting and recovering routines are also important elements
of communication protocols. The most common methods for correcting errors are to
retransmit a block. This method requires coordination of the two stations that the
block having error is discarded by the receiving station and is repeated by the
transmitting station.
v.
Precedence and order of transmission: There are well defined rules to condition
all stations about when to transmit their data and when to receive data from other
stations. It is ensured that all stations get a chance to use the communication lines
and other resources of the network depending upon the priorities assigned to them.
vi.
vii.
Data security: Providing data security and privacy is also built into most
communication software packages it prevents access of data by unauthorized users
because it is relatively easy to tap a data communication line.
viii.
127
The source system must set up the communication path or inform a remote network
of the identity of the system it wishes to communicate with.
ii.
The source system must determine whether the remote system is ready to accept
data.
iii.
The file transfer application on the source system must make sure that the file
management program within the remote system is ready to accept the data from the
source.
iv.
If there is any incompatibility between the two system's file formats, one of the
systems must perform a format translation.
v.
vi.
When the data transfer is complete, the systems must inform each other of their
readiness to break the connection.
vii.
The tasks described above are a highly simplified view of the process that actually
takes place and the logic to implement this co-operation is too complex to be
installed as a single module. Instead, this logic is broken down into a set of subtasks, each of which is implemented separately.
viii.
In protocol architecture, the logic modules are arranged in a vertical stack. Each
layer of this stack performs a subset of the entire logic necessary to communicate
with a remote system. Layers should be designed so that changes in one layer do
not affect any higher or lower layers.
ix.
This stack of logic modules must be implemented in both of the machines that wish
to communicate. Communication is achieved by corresponding, or peer levels in
both machines communicating with each other. Each of these peer levels
communicate according to a set of rules or conventions that are known as a
protocol.
128
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
129
130
131
several different protocols that perform the functions of the various layers of the OSI
Reference Model.
When an application sends information from one computer to another, the data is passed
down through the protocol stack on the sending computer, across the network, and then up
through the protocol stack on the receiving computer. At each level of the process,
information is attached to the data as it is sent. On the receiving end, this information is
stripped off until the original data is finally available to the receiving application.
133
Layer
Description
Protocols
Application
HTTP, Telnet,
FTP, TFTP,
SNMP, DNS,
SMTP,
X Windows,
other application
protocols
Transport
Internet
Network
interface
Ethernet, Token
Ring, FDDI,
X.25, Frame
Relay, RS-232,
v.35
Note
The OSI reference model is not specific to TCP/IP. It was developed by the ISO in
the late 1970s as a framework for describing all functions required of an open
interconnected network. It is a widely known and accepted reference model in the
data communications field and is used here only for comparison purposes.
134
grew out of a research project that began in 1969 and was funded by the U. S. Department
of Defense. The TCP/IP protocols are based on the packet-switching ideas developed for an
early research computer network called the ARPANET, whose acronym was based on the
name of the Advanced Research Projects Agency (ARPA) that funded its development.
ARPA is now known as the Defense Advanced Research Projects Agency (DARPA). The
early ARPANET tied together a number of research computers using conventional leased
telecommunications lines.
The original idea behind the TCP/IP protocol suite was to define a standard set of
procedures to allow individual computer networks to be connected to the ARPANET.
Today, the main purpose of the TCP/IP protocol suite is to allow diverse types of physical
networks to be tied together so that any networked computer can talk to any other
computer. The TCP/IP protocols allow the interconnected individual networks to give the
appearance of a single, unified network-called an internet-in which all computers can freely
exchange data as if they were all directly connected. The TCP/IP protocols make it appear
to a system that there is a simple point-to-point connection to any other system in the
internet, even though data might have to follow a quite complex path in traveling from one
system to another.
---------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------
From the humble beginning in the late 60s, today internet spans the whole world with
hundreds of millions of computers connected to it (500 million in 2004 estimated). The
remarkable achievement of the internet technology is that it has been able to accommodate
exponential growth (i.e., doubling each year) of the number of computers connected to it.
Also the speed of computers has been doubling every year and there are a variety of
computers connected to the internet. Individual LANs in an organization may use one of a
variety of interconnections and local protocols for communication. The physical connection
between computers may range from fast gigabit fiber optics to slower wireless. In spite of
this variety of technologies and speeds internet still works effectively. The reason for this is
the universal adoption of TCP/IP as the standard protocol which has proved very robust in
spite of rapid changes in technology. TCP/IP protocol emerged as a result of cooperative
effort in which a large number of persons participated and experimented before accepting
any version. The internet protocol accommodates a variety of hardware and a variety of
network speeds as it makes no assumptions regarding the underlying network hardware.
Packet switching ensures efficient and fault tolerant routings of packets. TCP ensures
reliable receipt of all packets sent by a sender to a receiver. It continuously monitors traffic
conditions on the internet and automatically adapts when there is congestion in the
network.
The only major problems currently faced by the internet are:
1. IP addresses are limited to 32 bits and the number of requests for addresses will
exceed this limit soon.
2. Originally the major traffic on the internet was e-mail and character files. Now
multimedia use has increased and one expects to send audio and video files in real
135
---------------------------------------------------------------------------------------------------------------------------------------------------------------------
Let us try to find the meaning of protocols in real life. In our day-to-day life, protocols are
a set of procedures and customs that aid in communication and relationships between
people. Many times the term is used in governmental foreign relations and other similar
human dialogue. When used in the context of computer networking, a protocol has a
similar meaning, but is more specific. A network protocol is the set of very detailed rules,
sequences, message formats, and procedures that computer systems use and understand
when exchanging data with each other.
In other words, a network protocol (which includes all of the Internet protocols) is the term
used to describe how computer systems communicate with each other at the bit and byte
level. Network protocols are layered on top of each other, with each layer providing
additional capabilities, but using the facilities provided by the lower layer.
Depending upon their capabilities, we can divide the Internet Protocols in two categories:
136
The common term for a network location is 'address', and each system on the Internet has
an address. This address is called an IP address, and there are two formats for an IP
address.
Internally, each computer system uses an IP address that is composed of four numbers,
usually written for humans with dots between each number. An example IP numeric
address is 178.127.201.1. However, since it's easier for humans to remember names
instead of numbers, most IP addresses have corresponding English-like names, also
separated with dots. The previous address can be written as a name as 'halcon.com'.
Scattered throughout the Internet are systems with the responsibility of translating Internet
name addresses into the IP address numeric form. These systems are called 'name servers'.
In general, it is better to use an Internet name address rather than the IP numeric address.
This is because IP numeric addresses can sometimes change for a given location, and the
change will be transparent if you are using the Internet name address rather than the IP
numeric address. However, the name servers have to be updated.
Occasionally you do need to use the numeric form of an Internet address, and most Internet
applications allow you to enter either format. Another term used in conjunction with
Internet name addresses is 'host name', because every Internet address must correspond to a
computer system (a 'host') somewhere on the Internet. The systems that provide IP name to
number translation are called 'Domain Name Servers', or DNS.
TCP and UDP: We have just seen how systems communicate at a very low level, using IP
addresses in either a numeric or name form to identify each other. The IP layer doesn't
provide many capabilities other than sending chunks of data back and forth. Much more is
needed than that, which is where TCP and UDP come in.
TCP, which is an abbreviation for 'Transmission Control Protocol', is very common on
the Internet, and is almost always mentioned together with IP, making the acronym TCP/IP
(TCP running on top of IP).
The TCP protocol provides a virtual connection between two systems, along with certain
guarantees on the data chunks (called 'packets') that are passed between the systems. Two
guarantees are retransmission of packets that are dropped (because of some network
problem), and ensuring that the packets are received in the same order that they are sent
(there can be multiple routes that a packet can take while traversing the Internet).
A third guarantee is that each packet received by the application has exactly the same
content as when it was sent. If a bit has changed or been dropped for some reason, TCP
will detect it and cause the packet to be re-transmitted.
Some applications use a different protocol running on top of IP called UDP ('User
Datagram Protocol'). UDP sends data one chunk at a time (called a 'datagram') to the
other system and doesn't provide a virtual connection like TCP does. UDP also doesn't
provide the same guarantees that TCP does, which means that datagram may be lost or
137
arrive out of sequence. Each received datagram is checked for internal integrity (like TCP),
but if it has been corrupted it is dropped, rather than re-transmitted (as TCP does).
You might be wondering why UDP is used instead of TCP since UDP is not as reliable as
TCP. To provide the extra guarantees, TCP has a lot of overhead compared to UDP, which
makes TCP slower than UDP. For applications where performance is more important than
reliability, UDP makes more sense. Some examples include audio and video streaming
over the Internet, and Internet phone applications.
SLIP and PPP: Many people are now connecting to the Internet (through an Internet
Service Provider, commonly abbreviated as ISP) by dialing up through a modem. Since IP
wasn't designed to be used over dial-up lines, this requires yet another protocol.
SLIP and PPP both allow IP data to be sent over dial-up lines. SLIP is an abbreviation for
'Serial Line IP' and PPP is short for 'Point-to-Point Protocol'. Both take IP data and
package it up so that it can be sent over modem dial-up lines. PPP is considered to be
newer and better than SLIP, although many Internet providers continue to support SLIP
dial-up access.
While connected to an ISP using SLIP or PPP, your system is now another location on the
Internet, with its own IP address. Your account with the ISP may assign you a permanent,
fixed IP address and name, or it may provide what is called a 'dynamic' IP address. Since at
any given time only a subset of dial-up lines are in use for an ISP, the provider may assign
an IP number (and also typically an IP name) from a pool of available addresses.
138
differentiates between text files usually ASCII (American Standard Code for Information
Interchange), and binary files (such as images and application executables), so care must be
taken in specifying the appropriate type of transfer.
When an Internet site makes files available to the general public, this is called 'anonymous'
FTP. A password does not need to be supplied, although the user e-mail address is typically
requested. Some sites have confidential files or directories, and an FTP login and password
is needed to download or upload.
Telnet is a way to remotely login to another system on the Internet. The Telnet allows you
to remotely connect into other computers and access them just as if you were sitting
directly in front of them. A telnet server must be running on the remote system, and a telnet
client application is run on the local system. When you are logged in to a system using
telnet, it is as if you were logged in locally and using the operating system command line
interface on the telnet server system. Typical operating systems for telnet servers are
UNIX, Windows NT, and VMS.
HTTP: HTTP stands for 'HyperText Transfer Protocol'. It is the primary protocol of the
World Wide Web (WWW). When a Web browser (such as Internet Explorer or Netscape)
connects to a Web server, it uses HTTP to request Web pages. A Web browser is an
Internet client application, and the Web server is an Internet server application.
HTTP has the ability to transfer Web pages, graphics, and any other type of media that is
used on the Web. HyperText Markup Language (HTML) the internal format of Web pages.
HTML consists of a set of tags and internal commands that are embedded inside Web
pages to control the appearance and layout of Web pages, as well as links to other Web
pages.
--------------------------------------------------------------------------------------------------------------
139
Standard Interface: Because the web presents a standard interface to FTP, News,
e-mail, gopher and other Internet tools, as well as a standard way of accessing
information through web pages and databases through forms, the web has become
an invaluable tool for simple access to the net.
Formatted Output: The Web supports formatted text. You can have:
Headings of a number of sizes...
while normal text can be formatted in a number of ways, including: bold,
italicized, super or sub-scripted. You can also have lists and tables.
Hypertext: As mentioned above, web pages use hypertext links to provide a
very easy and straightforward way to navigate around the net. Hypertext links
can be within a document, between web pages on the same computer or
between web pages on different computers. Hypertext links can also be between
graphics, audio and video.
Multimedia: One of the big advantages the web over earlier systems such as
telnet-based programs and gopher is that it is multimedia capable.
Any of the graphical browsers (like Internet Explorer and Netscape Navigator)
can display formatted text, as well as GIF images. Some browsers can also
handle JPEG images. You can also have images embedded in your web page,
like this structure:
If you want to view a file that your browser can't read, then you can easily
configure your browser to call up another program to view the file. This means
that you can send any type of data file across the web: MPEG or QuickTime
movies, WAV sound files, Excel spreadsheets, PhotoCD photos, postscript
files... the list is endless. The best solution of this type is a plug-in, which is
installed as part of your browser. We will study about browsers and plug-ins in
more details later in the chapter. However you can configure your browser to
140
feed files with a specific extension to a particular program. Excel files, for
example, with a .xls extension would open up MS Excel.
Interactive Pages: With forms, users can interact with web pages to obtain
dynamic or customized information. A typical example of form is the
registration form that you have to fill up while registering for an email account.
6.9 E-Mail
-------------------------------------------------------------------------------------------------------------
E-mail is an abbreviation for Electronic Mail. It is a way of sending messages from one
computer user to another computer user. The mail could be sent between two people using
the same computer or between two people on different sides of the world.
Advantages of E-Mail
Speed: Because e-mail is based around computer networks, it is fast - much
faster than standard mail (otherwise known as snail mail). An e-mail message
that you send to someone in Finland or Brazil could take only a few seconds to
reach them.
Cost: Depending on how you have obtained your Internet access, e-mail is free
or very cheap, much cheaper than the 45 cents it takes to send a standard letter
within Australia.
Flexibility: With the new MIME e-mail system being used today, you aren't
limited to text in your e-mail messages. You can include pictures, sound files,
movies, data files from your favorite spreadsheet program, etc.
141
--------------------------------------------------------------------------------------------------------------
Hybrid Search Engines: In the web's early days, it used to be that a search engine
either presented crawler-based results or human-powered listings. Today, it is
extremely common for both types of results to be presented. Usually, a hybrid
search engine will favor one type of listings over another. For example, MSN
Search is more likely to present human-powered listings from LookSmart.
However, it does also present crawler-based results, especially for more obscure
queries.
142
--------------------------------------------------------------------------------------------------------------
143
-------------------------------------------------------------------------------------------------------------
Structure
7.1 MS Word I
7.1.1 What Is Word Processor
7.1.2 Starting Microsoft Word
7.1.3 Key Terminologies
7.1.4 Opening and Formatting Documents
7.1.5 Formatting Page
7.1.6 Inserting a Table
7.1.7 Inserting a Picture
7.1.8 Inserting Page Numbers and Date/Time
7.2 MS Word II
7.2.1 Autocorrect Facility
7.2.2 Spelling and Grammar
7.2.3 Macros
7.2.4 Mail-Merge in Microsoft Word 2000
7.2.5 Create a Template
7.2.6 Style
7.3 MS-Excel-I
7.3.1 Working with Worksheet
7.4 MS Excel-II
7.4.1 Using Excel's Built-In Functions
7.4.2 What-if Analysis
7.4.3 Data Table sorting
7.5 MS-Excel-III
7.5.1 Graphs and Charts
7.6 Review Questions
--------------------------------------------------------------------------------------------------------------
7.1 MS WORD I
-------------------------------------------------------------------------------------------------------------Over the centuries, we as human beings have always felt the need to communicate and
share our ideas and thoughts. The written word has always remained the best and the most
effective way of interaction irrespective of the place and nature of job of the person.
Sometimes, writing a note comes more easily to us than conveying it verbally. We often
prefer to talk to our distant friends and relatives by way of writing only. At times, it is far
144
easier to express our feelings by setting them down on paper rather than saying them orally.
Any kind of formal or informal message can be best sent across by penning it down.
Once the whole work of writing is done, you would be very anxious to read it through to
check for any grammatical errors or spelling mistakes. If there are any, then imagine the
disappointment you will have to face because then it will demand the pains of writing the
whole document again. Similar kinds of problems are faced with our old conventional
typewriter also. A small change in the typewritten text would involve retyping the entire
text again. Now, as and when the work of writing the whole document is over, we must
concentrate our attention at the final look of the document. The document has to be made
attractive with text neatly and properly organized within margins. Paragraphs are required
to be indented with reasonable spacing between lines. Finally, the document should be free
from all kinds of spelling mistakes and grammatical errors. This is a universal truth that a
neatly organized and well formatted document is definitely more appealing to the reader's
eye.
The following things are to be kept in mind while giving a neat and formal look to your
document.
A long document should be broken down into small paragraphs. Proper line spacing
should be given.
The words at the end of the line should not be incomplete.
The important words and headings should be highlighted either by way of
underlining them or by putting them in different font and size.
There should not be any grammatical and spelling mistakes. The text should be
placed properly between margins.
Inspite of taking all the efforts and precautions, we cannot keep track of all the
above mentioned requirements. Now, for easing our job, software called 'Word
Processor' has come to our rescue. A Word Processor can do all of these things
without any hassle.
145
MS-WORD,
Word Star
Word Perfect
Professional Write
Brochures
Newsletters
Reports
Advertisements
Resumes and Cover letters
Books
Directories
World Wide Web Pages
There is absolutely no end to what a word processor can do. By now you must have
realized that the word processing applications have become much more sophisticated than
before.
Fig 7.1
146
Fig 7.2
147
148
Fig 7.3
(d)
Click View
Select Toolbars
Select Standard, Formatting, and Drawing
Other toolbars can be selected if you wish
Fig 7.4
Name
Icon
Description
Mail Recipient
150
again to turn
Hyperlink
Zoom
Office Assistant
151
Method 2: The other way of saving you r files is by clicking at the 'Save' button available
on the standard toolbar. It's a good idea to keep saving your documents after every few
minutes. The reason is if the computer goes down or a power failure occurs, then the
chances of recovering something in the document are high. Unsaved new documents are
the most vulnerable.
Closing a document
WORD offers a very handy method of closing documents. Like, you would prefer to close
and remove the office files that are no more required on your table, in the similar manner
you may want to close WORD documents too. So, for closing a file, click at the 'File'
menu and select the 'Close' option. This will close the file that is recently opened. As many
documents are opened in WORD, you are required to issue 'File - Close' commands for
those many times to close all the files one by one.
Exiting Word
To quit WORD or to close the WORD application program, click at 'File\Exit' option. With
this command, all the currently opened documents are also closed automatically. WORD
will again prompt you to save your files before quitting.
Formatting Text
1. Highlight the text that you want to format by dragging your mouse over while
holding down the left mouse button
2. Change the text to your desire
3.
Formatting Documents
Each one of us have a hidden desire that the reader should feel interested in whatever we
are trying to convey. So, for achieving this, a special effort on our front is required. We
must give a refined look to the document. The formatting features like fonts, bullets and
numbering, font type etc. can be used very intelligently to create the whole impact. Now,
let us proceed further learning about these special features smartly.
Defining Font Type and Size of Text
A font can be defined as a set of letters that have a common or the same typeface.
Different font types and sizes can be applied using the formatting toolbar or the Format
menu. Let's discuss them one by one.
153
It contains most of the tools that need to be used to give a complete and wholesome look to
your document. The toolbar also shows you the font type and size as applied to your text.
It also displays the effects (Bold, Italic or Underline) as given to the text. For applying a
font type and size to your text, use the formatting toolbar in following steps:
1. Select the text.
2. Click at the arrow beside the font type box and select a font type of your choice
from the drop down list.
3. Again, click at the arrow beside the font size box and select an appropriate font size
from the drop down list.
Using Format Menu: The required font type and size can also be applied to the text by
using 'Format Menu as described in the following steps:
1. Select the text.
2. From the 'Format' menu, select the 'Font' option. The 'Font' dialog box appears on
the screen.
3. Choose appropriate font type from the 'font' box. You can move up or down in the
'Font' box with the help of up and down arrow keys.
4. Similarly, choose the required font style and size for your text from the 'Font style'
and 'Size' boxes respectively.
5. The preview of the selected text can be seen in the 'Preview' window with the
applied formatting features.
6. Click <OK> button.
You will find the look of your text changing with the application of new font type, style
and size.
Making Text Bold, Italic & Underlined Using Formatting Toolbar: If you
have
given a keen look at the formatting toolbar, then you must have observed three buttons
showing the letters B, I and U. The letter 'B' stands for Bold, '1' for Italic and 'U' for
Underline. In order to make your text look a bit darker then the rest of the document,
concentrate on the following steps:
1.
2.
On carrying out these steps, the 'B' button becomes depressed or lightened. If you do not
want the text to be bold, select the text again and click at the 'B' button. This button on the
toolbar again becomes prominent and your text is not bold anymore.
At times you would like to see your text in italics or would like to underline it. To do this,
do the following steps:
1.
2.
Alternatively, the same work can also be done using the 'Format' menu by following steps:
1. Select the text.
2. Click at the 'Font' option of the 'Format' menu.
3. In the 'Font' dialog box, activate the 'Bold' option or 'italic' option from the 'Font
style' box to show your text in bold or italics.
4. In order to underline the text, select the required option from the 'Underline' box
drop down list.
If you are a keyboard person, you can also use one or more of the following key sequences
to achieve the same, after selecting the text:
Press <Ctrl + B> keys to bold the text
Press <Ctrl + 1> keys to italics the text
Press <Ctrl+ U> keys to underline the text
155
Fig 7.6
Changing Case of Text: WORD offers a quick and handy way to change the case of your
text. Lowercase characters can easily be changed to uppercase by hitting <Shift + F3>
keys. To achieve the contrary effect, press the <Shift + F3> keys again. This would
convert uppercase characters to lowercase.
Alignment of Text: Text alignment means placement of text between the margins. Your
text can be left, right, centre aligned or it can be justified within the margins. Left
alignment of text would mean the arrangement of text evenly in a straight line at the left
side of the document but with uneven edges on the right side.
Right aligned text is just the opposite of left aligned text with text evenly arranged at the
right edge of the document but uneven from the left side. Justified text would involve even
edges of text along both margins. Centre aligned text means that the text is placed exactly
in the centre of the page. Centre aligned text is most suitable for giving titles, headings etc.
Generally and most frequently the text is left aligned because then the text becomes easily
readable and understandable. Now, let us find out how text can be aligned using the
formatting toolbar.
156
1. Select the text (it could be a single line or a paragraph or the whole document).
2. Click at any of the alignment buttons from the formatting toolbar to get the desired
result.
If you are more in the habit of using keyboard, then give the following keyboard shortcuts
after selecting the text:
Press <Ctrl + L> keys to left align the text Press <Ctrl + R> keys to right align the text
Press <Ctrl + E> keys to show the text in the center.
Formatting Paragraphs: Formatting means deciding alignment of the paragraph. It also
includes the spacing that is to be put in between the lines. In order to carry out formatting
on paragraph, it needs to be selected first. Then go to the 'Format' menu and do the
following steps:
1. From the 'Format' menu, select 'Paragraph' option. A 'Paragraph' dialog box shoots
up on the screen.
157
2. You can set the alignment i.e. decide the placement of text on the screen by clicking
on the dropdown arrow of the 'Alignment' box. Your whole of the paragraph can be
left, right or center aligned.
3. Go to the 'Line Spacing' box and click at the drop down arrow to make a choice.
Finally click at the <OK> button. In the 'Line Spacing' box there are many options
that need a bit of elaboration. Let us find them. For the options 'At least', 'Exactly'
and 'Multiple', a number has to be given in the 'At' box. In these cases, the space is
measured (between the lines) in terms of print size. The 'At least' option uses the
space as given in point size but it can also use some extra space in a case where it
needs to accommodate some text. 'Exactly' option gives exactly the same space as
defined in the 'At' box. If word needs extra space to adjust some more text, then it
cannot get it. 'Multiple' option allows you to specify the line spacing of your own
choice. If you want the lines to be triple spaced then type '3' in the 'At' box.
EXERCISE
Create a First-line Indent
1. Place your cursor anywhere within the first paragraph of the sample text you
created in Exercise 2.
2. Choose the Home tab.
3. In the Paragraphs group, click the launcher. The Paragraph dialog box appears.
4. Choose the Indents and Spacing tab.
5. Click to open the drop-down menu on the Special field.
6. Click First Line.
7. Enter 0.5" in the By field.
8. Click OK. The first line of your paragraph is now indented half an inch.
158
Bullets and Numbering: It is always advisable to put the text entries, which are separated
by commas in the bulleted or the numbered form. Adding bullets to the text makes it easy
to read and understand. Major points can be very well emphasized through this technique.
Points put in the order of preference are long remembered by the reader.
Moreover, in our day to day life, we prefer to make our daily list in the numbered manner
rather than putting it in a paragraph. The only idea is that the chances of forgetting are
turned low and visibility of important points is clearer. You can put bullets or numbers in
an existing list by using either the formatting toolbar or the 'Format' menu.
Using Formatting Toolbar
1. Select the text.
2. Click at either the 'Bullets' button or the 'Numbers' button on the formatting toolbar.
In case you decide that you don't require 'numbers' or bullets, you can very easily put
them off by repeating the above steps. This method perhaps offers a wider choice of
symbols other than the typical black circle. Let us discuss this method:
1.
2.
159
A 'Bullets and Numbering' dialog box appears on the screen(see figure below) . Select the
'Bulleted' tab in case you want bullets in your document. If you wish to put numbers then
select the 'Numbered' tab. Choose any of the bullets or numbers and apply it onto your
document by clicking <OK> button. You see how easy it is to place bullets and numbers in
your document.
Fig 7.8
160
Fig 7.9
2. Click in the 'Top' box and erase off the current setting by using either the <Del> key
or the <Backspace> key from the keyboard. Type in the desired number.
Alternatively, you can use the top arrow to increase the margin and down arrow to
decrease it.
3. Similarly, change the settings in the Bottom, Left and Right boxes as well.
At times, you might want that the changes that have been made recently should apply to the
current document only, and then click at <OK> button. But in case, you want that the
current document as well as any other new document that you open should have these page
settings, then click at the <Default> button. The next step would be to click at the <Yes>
button in which case WORD is trying to seek your permission in changing the default
settings for page setup.
Setting Margins using Ruler Line: Ruler line is very frequently used to change margins.
It is a quick and easy way to set margins but needs some amount of practice also. To set
margin using the ruler line, carry out the steps discussed below:
1. Place your mouse pointer on the left side of the horizontal ruler line. Slowly, move
the mo use pointer towards your right side till the place where your mouse pointer
acquires the shape of a double-headed arrow. A 'Left Margin' tool tip appears on
the screen.
2. Click at that location and drag the mouse towards right side to increase the margin
or on the left side to reduce it.
3. Release the mouse button when suitable margin is attained.
161
In order to set right margin, the method is just the same as discussed in the above three
steps. If you observe closely, you will find a thin gray line above the 'Right Indent' button
which is in the extreme right of the Ruler Line. This is the Right Margin Line. Place the
mouse pointer at this line and click on it. Drag the pointer in either direction to increase or
decrease the right margin. Finally, release your mouse button.
Now, let us learn how to set the top and bottom margins using the vertical ruler line. This
vertical ruler line appears only in the Page Layout view. So, in a case if your vertical ruler
line is not apparent on the screen, then first switch yourself to Page Layout view by
selecting 'Page Layout' option from the 'View' menu. To set the top margin:
1. Take your mouse pointer on the thin gray line that appears between the darkened
and white areas on the top side of the vertical ruler line.
2. As soon as your mouse pointer takes the shape of a double headed arrow, click and
drag it either upwards or downwards to attain the desired top margin.
3. Release the mouse button.
When you are trying to play with the margins, a line is shown across the page which keeps
moving up or down according to the movement of your mouse pointer. This gives you the
exact location of your margin on the page.
162
2. Highlight the number of rows and columns you need. The maximum table size you can
create by this method is a four-row by five-column table.
Moving Around a Table: Each block in a table is called a cell. Use the Tab key to move
from cell to cell from left to right. Use Shift-Tab to move from cell to cell from right to left.
The following exercise demonstrates.
1. Click in the first cell in the first column.
2. Press the Tab key nine times. The cursor moves forward nine cells.
3. Press Shift-Tab six times. The cursor moves backward six cells.
Note: You can also move to a cell by clicking in the cell. In addition, you can move around
the table by using the left, right, up, and down arrow keys.
Entering Text into a Table: To enter text into a table, simply type as you normally
would. Press Tab to move to the next cell. Enter the text shown below into your table.
1. Type Salesperson in the first cell in the first column. Press the Tab key.
2. Type Dolls in the first cell in the second column. Press the Tab key.
3. Continue until you have entered all of the text.
Salesperson
Kennedy, Sally
White, Pete
York, George
Banks, Jennifer
Dolls
1327
1421
2190
1201
Trucks
1423
3863
1278
2528
Puzzles
1193
2934
1928
1203
Selecting a Row and Bolding the Text: You learned about bolding in Lesson Three. In
this exercise, you will select the first row of the table and bold all of the text on the row.
Click anywhere on the first row of your table.
Choose Table > Select > Row from the menu.
Press Ctrl-b to bold the row.
Right-Aligning Text: You learned about alignment in Lesson Five. In this exercise, you
will right-align the second (Dolls), third (Trucks), and fourth (Puzzles) columns of the table
you created.
You need to highlight "Dolls," "Trucks," and "Puzzles." Place the cursor before the "D" in
"Dolls." Press the F8 key to anchor the cursor. Then press the right arrow key until you
have highlighted "Dolls," "Trucks," and "Puzzles."
Choose Table > Select > Column from the menu.
Press Ctrl-r to right-align the cells.
Your table should look like the one shown here. Make any needed corrections before
continuing.
Note: All of the formatting options you learned about in previous lessons can be applied to
cells in a table.
164
3079
2067
5214
3247
165
5467
Alternate Method -- Resizing Your Column Widths by Using the Width Indicator
You can resize your column widths by placing the cursor on the line that separates two
columns. This causes the width indicator to appear. After the width indicator appears, leftclick and drag with the mouse to adjust the column width.
166
Region
S
N
N
S
S
S
Dolls
1327
1421
5214
2190
1201
4098
Trucks
1423
3863
3247
1278
2528
3079
Puzzles
1193
2934
5467
1928
1203
2067
Sorting a Table
With Microsoft Word, it is easy to sort the data in your table. To sort your table data by
Region and within Region by Salesperson in ascending order:
1. Click anywhere on your table.
2. Choose Table > Sort from the menu.
3. Select Region in the Sort By field.
4. Select Text in the Type field (because you are sorting text).
5. Select Ascending.
6. Select Salesperson in the Then By field.
167
7. Select Text in the Type field (because you are sorting text).
8. Select Ascending.
9. Select Header Row (because your table has titles across the top of the table).
10. Click OK.
Microsoft Word should have sorted your table like the one shown here:
Salesperson
Pillar, James
White, Pete
Atwater, Kelly
Banks, Jennifer
Kennedy, Sally
York, George
Region
N
N
S
S
S
S
Dolls
5214
1421
4098
1201
1327
2190
Trucks
3247
3863
3079
2528
1423
1278
Puzzles
5467
2934
2067
1203
1193
1928
Deleting a Column
You can delete columns from your table. To delete the Trucks column:
1. Place your cursor anywhere in the Trucks column.
2. Choose Table > Delete> Columns from the menu.
Deleting a Row
You can delete rows from your table. To delete the York, George row:
1. Place your cursor anywhere in the York, George row.
2. Choose Table > Delete > Rows from the menu.
Merge Cell
Using Microsoft Word, you can merge cells -- turn two or more cells into one cell. In this
exercise, you are going to create a new row at the top of your table, merge the cells, and
add a title to the table.
1. Move to the cell located on the first row of the first column of your table (the
Salesperson cell).
2. Choose Table > Insert > Rows Above from the menu.
3. Choose Table > Merge Cells from the menu.
4. Type Toy Sales in the new cell.
5. Press Ctrl-e to center the title.
Table Headings
If Microsoft Word splits your table with a page break, the table heading will display on the
first page but not on subsequent pages. To correct this problem, you can designate rows as
headings. Heading rows are repeated on the top of your table at the top of each page. To
designate a row as a heading:
1. Place your cursor on the row.
2. Choose Table > Heading Rows Repeat from the menu.
168
169
Splitting a Table
With Microsoft Word, splitting a single table into two tables is easy. To separate the table
you just created into two tables:
1. Place your cursor anywhere on the row that reads "Name, Age, Sex."
2. Choose Table > Split Table from the menu.
You should now have two tables.
Table AutoFormat
You can use AutoFormats to apply borders, shading, special fonts, and color to your table.
Microsoft Word lists all Formats in the Table AutoFormat dialog box. While in the Table
AutoFormat dialog box, click a format to see that format displayed in the Preview box. You
can customize how the format is applied. Check the features you want in the Formats to
Apply and the Apply Special Formats To frames. Microsoft Word comes with a long list of
AutoFormats.
To apply an AutoFormat to your Name, Age, and Sex table:
1. Click anywhere in the table.
2. Choose Table > Table AutoFormat from the menu.
3. Click Table Colorful 1 in the Table Styles box.
4. Select Heading Rows and First Column in the Apply Special Formats To frame. Do
not select Last Row and Last Column.
5. Click Apply.
Your table should look like the one shown here.
170
Table Properties
Use the Table Properties dialog box to modify the alignment of the table with the body
text and the text within the table. Access the box by selecting Tables|Table Properties.
Size - Check the Preferred width box and enter a value if the table should be an
exact width.
Alignment - Highlight the illustration that represents the alignment of the table in
relation to the text of the document.
Text wrapping - Highlight "None" if the table should appear on a separate line
from the text or choose "Around" if the text should wrap around the table.
Borders and Shading - Select from a number of border styles, colors, and widths.
Click the Shading tab to change the background color and pattern.
171
Options - Click the Options button on the Table Properties window. To change
the spacing between the document text and the table borders under Default cell
margins. Check the Allow spacing between cells box and enter a value to add
space between the table cells.
Save File
Save your file by following these instructions:
1. Choose File > Save As from the menu.
172
2.
3.
4.
5.
173
5. Click on the image you want to insert. A shortcut menu appears. This little
shortcut menu can be a valuable tool - see the explanations in the graphic below.
The last tool, which finds clipart that is similar, can be great if you need more than one clip
to insert with the same theme or if you like the look of one and want to see other clipart
with the same artistic effect.
6. Once you are sure have located the right clip, click and choose the Insert Clip
button or right-click on the clip and choose Insert Clip.
174
The clipart is inserted in your document, but it probably needs some adjusting to fit your
needs.
Modifying Clipart
The first thing you should know about modifying clipart, is how to adjust the size. When
you single-click on clipart, the clipart is selected and square "nodes" appear on the corners
and sides, as below.
To resize:
A double arrow is displayed when hovering the mouse over one of these nodes. Holding
the mouse button down, drag to reduce or enlarge the image.
To have more control over adjusting the size, hold down the Alt key while dragging. This
allows for more precise adjustments.
Note: The nodes on the corners adjust the size proportionally, and do not distort the
image. More than likely, you will want to use the corner nodes to adjust size. The nodes
on the bottom and top adjust the height only, and the nodes on the sides adjust the only the
width. Take a look at the following comparison.
175
This same toolbar is used when you insert a picture from a file - like a family photo. If you
crop a picture, you cut out part of the picture along one of the sides. So, let's pretend our
clipart is a family photo and cut out our mother-in-law!
1. Choose the Crop tool, as above.
2. Move your mouse over one of the top, bottom, or side nodes. The crop tool appears
along with your mouse.
3. Hold the mouse button down and drag to crop. Note that you can also press the Alt
key here while dragging for greater control.
Following image control, are buttons that can be used to increase or decrease the
contrast and brightness of the clipart.
The Text Wrapping tool tells word how you want to treat text that surrounds the
clipart. For example, you might want to type text over the clipart and use it as a
background.
176
The Format Picture tool (paint bucket) opens the Format Picture dialog box,
which is discussed in the next section of this tutorial.
And last but not least, if you are not satisfied with the adjustments you have made,
the Reset Picture button on the end of the toolbar resets the clipart to its original
state.
The Format Picture Dialog Box
The methods discussed so far, are ones that I find are the easiest to use. However, you can
also make modifications with the Format Picture dialog box. It allows you to make many
changes at one time, and has a few additional features.
The easiest way to access the Format Picture dialog box is to double-click on the clipart.
The Picture tab is displayed first by default. As you can see, there are fields for cropping
and image control. Exact measurements and percentages can be used here to adjust
cropping, brightness, and contrast. However, I find the Picture toolbar discussed earlier to
be more "friendly". Personally, I could spend all day going to this box and adjusting
measurements, etc. - but if I use the Picture toolbar, I can see my changes immediately and
modify accordingly.
In the following example, some of the more useful features are demonstrated by creating a
watermark of our clipart that we can type text over for a newsletter title.
1. Select Watermark from the Color field.
2. Move to the Colors and Lines tab of the dialog box and select Patterned Lines
from the Line, Color field.
177
3. Select a pattern and choose Foreground and Background colors to match your
clipart. A preview is shown in the Sample field.
4. Choose OK.
5. Next, move to the Layout tab.
6. Use the picture examples and choose a Wrapping style. In our example, we need
Behind text.
7. Choose OK on the Format Picture dialog box. Our clipart now looks like the
example below.
178
8. Move your insertion point and type text as you would in any document.
When you choose to have Behind text as the layout, you are allowed to move the image
around on your screen. In this case, we want to move the image down and a bit to the right.
9. Select the image. Move your mouse to the middle of the image, hold the button
down, and drag the clipart to the proper location. Remember, you can press and
hold the Alt key for more precise movement.
Voila! We're finished. Clipart can be an amazing addition to your documents. It takes a
little time and practice, but is well worth the effort!
179
--------------------------------------------------------------------------------------------------------------
7.2 MS WORD II
-------------------------------------------------------------------------------------------------------------7.2.1 Autocorrect facility
Microsoft Word's AutoCorrect facility can automatically correct common spelling mistakes
and often-used acronyms, initialisms etc. AutoCorrect can be turned on and off from the
Tools menu:
1. Go to the Tools menu and select Options.
2. Click the Spelling & Grammar tab.
3. In the Spelling area, check (on) or uncheck (off) the Check spelling as you type
checkbox.
Adding entries to AutoCorrect
To manually add entries to AutoCorrect:
Go to the Tools menu and select AutoCorrect (Word 2000) or AutoCorrect Options (Word
XP/2003).
In the AutoCorrect: English (Australia) dialog, go to the Replace field and enter the
incorrect word or acronym/initialism (eg. organize, ATO).
In the with field, enter the correct word or full text of the acronym/initialism (eg. organize,
Australian Taxation Office).
Click the Add button.
Click the OK button.
Now, if you were to type: 'The ATO site can tell you how to organize your records', Word
would automatically change the sentence to read: 'The Australian Taxation Office site can
tell you how to organize your records, as you type.
If you're using spell checking as you type, you can also add entries through the right-click
menu:
1. Right-click the underlined word and select AutoCorrect.
2. From the sub-menu list of options, select the replacement word.
Note: AutoCorrect can be used for phrases as well as single words. If you find yourself
constantly using phrases such as 'give consideration to' instead of 'consider', or 'in the near
future' instead of 'soon', you can tell MS Word to automatically correct the phrase as you
type.
AutoCorrect Options buttons
In Word XP/2003, you can also manage auto-corrections using AutoCorrect Options
buttons. To turn on AutoCorrect Options buttons:
Go to the Tools menu and select AutoCorrect Options.
Tick the Show AutoCorrect Options buttons checkbox.
Click the OK button.
Now, whenever Word makes an auto-correction, you can backspace (or move your mouse)
to the correction to display the auto-correction underline:
However over the underline to show the AutoCorrect Options button, and then click the
button to display options:
181
Change back
182
As long as the Check Grammar box is checked in the Spelling and Grammar dialog
box, Word will check the grammar of the document in addition to the spelling. If you do
not want the grammar checked, remove the checkmark from this box. Otherwise, follow
these steps for correcting grammar:
If Word finds a grammar mistake, it will be shown in the box as the spelling errors.
The mistake is highlighted in green text.
Several suggestions may be given in the Suggestions box. Select the correction that
best applies and click Change.
183
If no correction is needed (Word is often wrong more than it is right), click the
Ignore button.
Synonyms
Word 2000 has a new feature for finding synonyms. Simply right-click on the word and
select Synonyms from the shortcut menu. From the list of suggested words, highlight the
word you would like to use or click Thesaurus... for more options.
Thesaurus
To use the thesaurus, select Tools | Language |Thesaurus from the menu bar or select it
from the Synonyms shortcut menu as detailed above.
184
A list of meanings and synonyms are given on the windows. Double-click on the words in
the Meanings box or click the Look Up button to view similar words. Double-click words
in the Replace with Synonym box to view synonyms of those words. Highlight the word
you would like to add and click the Replace button.
7.2.3 Macros
Do you always perform repeated tasks in Microsoft Word? Repeated tasks, if not
automated are prone to human errors. If you perform a task repeatedly in Microsoft Word,
you can automate the task by using a macro.
A macro is a series of Word commands and instructions that you group together as a single
command to accomplish a task automatically. Since not all of us are programmers who can
write code in Visual Basic, I will show you a way to create macros without even writing
code.
First open up your Word document then click Tools > Macro > Record New Macro
185
When you record a macro it will ask for a macro name so assign it a descriptive macro
name. After that, click the OK button to record the macro.
Once you see the recording toolbar, enter the keystrokes that you want to record. In the
example below I indented the first line of the paragraph (TAB) then I selected all (ControlA) then I applied the bold format (Control-B). After this I stopped the recording of macro
by clicking the stop button.
186
The macro will be saved and you can run it by clicking the run macro command (or Alt-F8)
from the Tools menu.
Now that you know how to make macros by recording keystrokes and mouse clicks, apply
this tip on your own repeated tasks. This will increase your productivity and also you
quality of work.
187
The Mail Merge Helper opens. Mail Merge is a three step process.
188
Step 2:
Click Get Data. This gets enabled once Step 1 is completed. Choose from the Get Data list
where the contacts are stored.
When the data source is chosen, a message will warn that no Merge Fields are in the
current document and will ask to insert Merge Fields in the document. Click "Edit Main
Document" on this message to enter Merge Fields in the document.
Merge Fields are placeholders for where the Contact's real information will be inserted by
the wizard.
189
Click in the appropriate place in the document that you want to insert Merge Fields.
From the Mail Merge toolbar Click "Insert Merge Field" and Click the Merge Field to
insert into the document. The Merge Field will appear as "<<Company>>" in the
document.
Click "ABC" to view the document with the merged data.
Click "Mail Merge Helper" button on the Mail Merge Toolbar.
Step 3:
Click Merge on the Mail Merge Helper screen.
190
The Mail Merge process is complete. Use this Mail Merged document to send faxes to
multiple
recipients
using
the
Fax
Merge
feature
in
Fax4Word.
How to Fax Merge
Once you have created a Mail Merge document, all you need to do is...
Click "Fax Merge" on the Fax4Word toolbar in MSWord.
In the Fax Merge screen, fill the details from the drop down list and choose the appropriate
fields
from
the
list
for
Name,
Company
and
Number.
Note: Number is required.
191
The fax will be sent when "Fax only" or "Fax and Print" is clicked. To view the status of
the faxes being sent, go to Fax Console. (Click Start > All Programs > Accessories >
Communications > Fax > Fax Console).
The Fax Merge is completed and multiple faxes are sent with just a few clicks.
192
Modifying a Template
The templates in the Template Library and on the Microsoft.com Website cannot
be altered until they have been saved in an alternate folder on the hard drive with a
different name.
Once saved, open the template, and make any alterations required.
To save a modified Template:
From the main menu, choose File > Save As to save the template as a template file.
Confirm that Document Template is selected in the Save as type field.
Once all selections are set and confirmed, click Save.
The various template tabs allow you to select and use templates to create Letters,
Faxes and Memos, do a Mail Merge, etc.
Most of the templates have built-in directions that cover where to enter information
193
7.2.6 Style
When working with Word, you can use styles to quickly format your documents. A style is
a set of formats consisting of such things as fonts, font colors, font sizes, and paragraph
formats. Word 2007 supplies you with pre-designed style sets that contain styles for titles,
subtitles, quotes, headings, lists and more. The sections that follow all show you how to
work with styles. Click Save Target As from the menu that appears, and save the linked file
to a directory on your computer. Then open the file.
194
EXERCISE:
Choose a Style Set
195
EXERCISE:
Apply the Title Style
Apply Subheadings
1. Click anywhere in the paragraph "Displaced Homemakers"
196
Displaced Homemakers
Adolescent Mothers
Single Fathers
High School Dropout Prevention
Established Education Sites
7.3 MS-EXCEL-I
-------------------------------------------------------------------------------------------------------------Microsoft Excel is an electronic spreadsheet. You can use it to organize your data into rows
and columns. You can also use it to perform mathematical calculations quickly. This
tutorial teaches Microsoft Excel basics. Although knowledge of how to navigate in a
Windows environment is helpful, this tutorial was created for the computer novice. This
lesson will introduce you to the Excel window. You use the window to interact with Excel.
To begin this lesson, start Microsoft Excel 2007. The Microsoft Excel window appears and
your screen looks similar to the one shown here.
197
Note: Your screen will probably not look exactly like the screen shown. In Excel 2007,
how a window displays depends on the size of your window, the size of your monitor, and
the resolution to which your monitor is set. Resolution determines how much information
your computer monitor can display. If you use a low resolution, less information fits on
your screen, but the size of your text and images are larger. If you use a high resolution,
more information fits on your screen, but the size of the text and images are smaller. Also,
settings in Excel 2007, Windows Vista, and Windows XP allow you to change the color
and style of your windows.
The Microsoft Office Button
In the upper-left corner of the Excel 2007 window is the Microsoft Office button. When
you click the button, a menu appears. You can use the menu to create a new file, open an
existing file, save a file, and perform many other tasks.
The Quick Access Toolbar
198
Next to the Microsoft Office button is the Quick Access toolbar. The Quick Access toolbar
gives you with access to commands you frequently use. By default, Save, Undo, and Redo
appear on the Quick Access toolbar. You can use Save to save your file, Undo to roll back
an action you have taken, and Redo to reapply an action you have rolled back.
The Title Bar
Next to the Quick Access toolbar is the Title bar. On the Title bar, Microsoft Excel displays
the name of the workbook you are currently using. At the top of the Excel window, you
should see "Microsoft Excel - Book1" or a similar name.
The Ribbon
You use commands to tell Microsoft Excel what to do. In Microsoft Excel 2007, you use
the Ribbon to issue commands. The Ribbon is located near the top of the Excel window,
below the Quick Access toolbar. At the top of the Ribbon are several tabs; clicking a tab
displays several related command groups. Within each group are related command buttons.
You click buttons to issue commands or to access menus and dialog boxes. You may also
find a dialog box launcher in the bottom-right corner of a group. When you click the dialog
box launcher, a dialog box makes additional commands available.
199
If the Formula bar is turned on, the cell address of the cell you are in displays in the Name
box which is located on the left side of the Formula bar. Cell entries display on the right
side of the Formula bar. If you do not see the Formula bar in your window, perform the
following steps:
1. Choose the View tab.
2. Click Formula Bar in the Show/Hide group. The Formula bar appears.
Note: The current cell address displays on the left side of the Formula bar.
The Status Bar
The Status bar appears at the very bottom of the Excel window and provides such
information as the sum, average, minimum, and maximum value of selected numbers. You
can change what displays on the Status bar by right-clicking on the Status bar and selecting
the options you want from the Customize Status Bar menu. You click a menu item to select
it. You click it again to deselect it. A check mark next to an item means the item is
selected.
200
202
Select Cells
If you wish to perform a function on a group of cells, you must first select those cells by
highlighting them. The exercises that follow teach you how to select.
Alternative Method: Select Cells by Dragging
You can also select an area by holding down the left mouse button and dragging the mouse
over the area. In addition, you can select noncontiguous areas of the worksheet by doing
the following:
1. Go to cell A1.
2. Hold down the Ctrl key. You won't release it until step 9. Holding down the Ctrl
key enables you to select noncontiguous areas of the worksheet.
203
204
Delete Data
The Backspace key erases one character at a time.
1. Press the Backspace key until Jordan is erased.
2. Press Enter. The name "John" appears in cell A1.
Edit a Cell
After you enter data into a cell, you can edit the data by pressing F2 while you are in the
cell you wish to edit.
205
3. Use the backspace key to erase the "s," "e," and "n."
4. Type ker.
5. Press Enter.
Alternate Method: Edit a Cell by Double-Clicking in the Cell
You can change "Joker" to "Johnson" as follows:
206
Wrap Text
When you type text that is too long to fit in the cell, the text overlaps the next cell. If you
do not want it to overlap the next cell, you can wrap the text.
207
EXERCISE:
Wrap Text
7.4 MS EXCEL - II
--------------------------------------------------------------------------------------------------------------
209
210
To complete our modification we add appropriate data to new row 5, as shown in the figure
below.
Now notice (compare totals with those in the previous figure in Step 3) that the total for
Region 1 is automatically updated to include the additional $10,000 we just entered in cell
B5. However, the total for Region 2 does not include the new amount in cell C5.
211
The formula in cell C11, as you can see from the figure, changes to keep exactly the same
values in the sum as were there before the insertion of the new row. The new value is
omitted altogether. The SUM function incorporates the new row as part of its new range.
Hence the SUM function and the + operator are adjusted in different ways for the insertion
of new data. We added the new row just for the purpose of making this point. Let's delete it
before proceeding. To do this we select row 5 again (remember, click the row number on
the left side) and then select Delete from the Edit menu.
As a final adjustment to the worksheet in this step, replicate the SUM function formula in
cell B10 to cells C10, D10, and E10.
212
Once the average is computed for Region 1, you should replicate the formula to cells C12,
D12, and E12 to compute monthly averages for the other regions and for the total monthly
sales.
213
The completed worksheet should have the following figures in it. Check your work against
these numbers and locate and correct any errors.
Excel has a built-in function for computing loan payments. It is called PMT and can be
found in the financial function list as shown below.
214
The arguments for the PMT function hold the interest rate (Rate) for the period in which
you're interested -- a month in this case, the number of periods (Nper) you expect to pay,
the present value (Pv) or amount of the loan, the future value (Fv) of the loan (this will be
0 if you intend to pay the loan off), and the type (Type) of payment to be made (this is 0 if
your payments begin at the end of the month you get the loan; 1 if the payments begin
immediately when you get the loan -- 0 is the most common option here).
Convince yourself that the arguments for your function should be those shown below.
The completed worksheet should have the following figures in it. Check your work against
these numbers and correct any errors. The parentheses and red type face indicates that these
numbers represent a payment (negative).
215
Changing cells
216
Result cell
Best case scenario
Changing cells
Result cell
If several people have specific information in separate workbooks that you want to use in
scenarios, you can collect those workbooks and merge their scenarios.
After you have created or gathered all the scenarios that you need, you can create a
scenario summary report that incorporates information from those scenarios. A scenario
report displays all the scenario information in one table on a new worksheet.
Scenario summary report
NOTE Scenario reports are not automatically recalculated. If you change the values of a
scenario, those changes will not show up in an existing summary report. Instead, you must
create a new summary report.
Use Goal Seek to find out how to get a desired result
If you know the result that you want from a formula, but you are not sure what input value
the formula requires to get that result, you can use the Goal Seek feature. For example,
suppose that you need to borrow some money. You know how much money you want, how
long a period you want in which to pay off the loan, and how much you can afford to pay
each month. You can use Goal Seek to determine what interest rate you must secure in
order to meet your loan goal.
217
NOTE Goal Seek works with only one variable input value. If you want to determine
more than one input value, for example, the loan amount and the monthly payment amount
for a loan, you should instead use the Solver add-in.
Use data tables to see the effects of one or two variables on a formula
If you have a formula that uses one or two variables, or multiple formulas that all use one
common variable, you can use a data table to see all the outcomes in one place. Using data
tables makes it easy to examine a range of possibilities at a glance. Because you focus on
only one or two variables, results are easy to read and share in tabular form. If automatic
recalculation is enabled for the workbook, the data in data tables immediately recalculates;
as a result, you always have fresh data.
Smallest to Largest and Largest to Smallest; and for date columns, you have Newest to
Oldest and Oldest to Newest sorts. You can reorder sort conditions by using the buttons at
the top of the Sort dialog box. You can also copy sort levels to save time. The Options
button opens the Sort Options dialog box, which allows you to specify whether the sort
should be case-sensitive and allows you to specify the sort orientation. Both of these
features existed in Microsoft Office Excel 2003 but are more discoverable in Office Excel
2007.
219
One of the common requests from Excel users is the ability to sort by color, either
manually applied or applied by conditional formatting. In Office Excel 2007, you can sort
by:
Background color (however applied)
Font color (however applied)
Cell icon (applied by using conditional formatting)
For example, you can set up several conditions on the table data as seen in Figure 7.20.
Figure 7.21 Buttons at the top of each column provide sorting and filtering status
220
In addition to sorting by built-in values and color, you can specify a custom sort order by
selecting Custom List at each level of sorting. You can create a custom list from the Sort
dialog box.
222
223
224
7.5 MS-EXCEL-III
-------------------------------------------------------------------------------------------------------------7.5.1 Graphs and Charts: A graph is a chart or drawing that shows the relationship
between changing things. They are a diagram displaying the relationship between numbers
or amounts. Common graphs use bars, lines, or parts of a circle to display data. Below are
the steps given to insert Graphs and charts. They are:
Step 1 - Enter the data to be graphed. For the purpose of this lesson you will use data from
a Favorite Fruit Survey. Enter it as you see below:
225
Step 2 - Highlight data to be graphed. Do not include the row with heading titles, only the
names of fruit and the numbers. If your worksheet looks like the one above; put your cursor
in call A2, click hold the mouse button down and drag to cell B7. Highlighted data should
look like the image below:
Note: Cell A2 is selected; the select color extends around the cell
Step 3 - Select the Chart Wizard. That is done by going to the Insert menu and selecting
Chart. You can also click on the Chart Wizard button on the Standard toolbar.
Step 4 - From the Chart Wizard box that opens select Chart type. For this activity, I
selected pie.
226
After you have selected the Chart type, click and hold your mouse pointer down on the
Press and Hold... button to see what your data looks like in the chart type you selected. If
you do not like the look, select another chart type. After you have selected the chart type
you will have two options:
Select Next and let Chart Wizard show you a series of options to make changes to
your chart.
Select Finish and Chart Wizard puts your completed chart on the spreadsheet. You
can see the finished product below.
The first step taken by Chart Wizard is to verify the range of data being used for this chart.
The Data range displayed below is read "all cells from A2 to B7."
Notice where the cursor is located in the dialog box above. It is pointing to the small box at
the end of the line where the Data range is displayed. If the data range should be changed,
click on the box the cursor is pointing to.
227
The dialog box shrinks allowing you to see your entire spreadsheet. You can edit the data
range in this small window. When you are finished, click the same box at the end to restore
the window.
Select Next to go to the dialog box below. This box allows you to add a title to the chart,
make changes on the legend, or make changes on the data labels.
Select Next to move to the final dialog box which allows you to see the chart as a new
sheet or place it on one of the sheets in your workbook.
If you let the Chart Wizard finish your chart after the first dialog box, or work through
each of the four steps, your chart will look something like the one below.
228
--------------------------------------------------------------------------------------------------------------
229
--------------------------------------------------------------------------------------------------------------
Structure
8.1 Ms PowerPoint-I
8.1.1 Starting Microsoft PowerPoint
8.1.2 Auto Layout
8.1.3 Toolbars
8.1.4 Insertion of New Slides
8.2 MS PowerPoint-II
8.2.1 Apply a Design Template
8.2.2 Presentation Using Chart Wizards
8.2.3 Frame Movements of The Above
8.3 Review Questions
--------------------------------------------------------------------------------------------------------------
8.1 MS POWERPOINT-I
-------------------------------------------------------------------------------------------------------------Microsoft PowerPoint is a powerful tool to create professional looking presentations and
slide shows. PowerPoint allows you to construct presentations from scratch or by using the
easy to use wizard.
230
Creating & Opening a Presentation: After you open up Microsoft PowerPoint, a screen
pops up asking if you would like to create a New Presentation or Open an Existing
Presentation.
AutoContent Wizard
o Creates a new presentation by prompting you for information about content,
purpose, style, handouts, and output. The new presentation contains sample
text that you can replace with your own information. Simply follow the
directions and prompts that are given by Microsoft PowerPoint.
Design Template
o Creates a new presentation based on one of the PowerPoint design templates
supplied by Microsoft. Use what is already supplied by Microsoft
PowerPoint and change the information to your own.
Blank Presentation
o Creates a new, blank presentation using the default settings for text and
colors.
specific type of slide. They provide consistency throughout the presentation. Each layout
depicted is described in the lower right corner when you click the layout. This sample New
Slide dialog box shows the Title Slide selected (denoted with the thick border).
After you select Blank Presentation a window pops up asking you to select the layout of the
first slide.
Pre-Designed Slide Layouts (Left to Right)
Title Slide
Bulleted List
Two Column Text
Table
Text & Chart
Chart & Text
Organizational Chart
Chart
Text & Clip Art
Clip Art & Text
Title Only
Blank Slide
NOTE: If you already know what you want in your next slide, it is a very good idea to
choose one of the pre-designed layouts from above. However if you do not, then you
can still insert what you want in throughout your Presentation anytime you desire.
Just choose Blank Slide and insert items as you see fit.
Different Views That PowerPoint Demonstrates:
There are different views within Microsoft PowerPoint that allow you to look at your
presentation from different perspectives.
232
Normal View
Outline View
Slide View
Switches to
normal view,
where you can
work on one slide
at a time or
organize the
structure of all the
slides in your
presentation
Switches to
outline view,
where you can
work with the
structure of your
file in outline
form. Work in
outline view when
you need to
organize the
structure of your
file.
Switches to slide
view, where you
can work on one
slide at a time
Displays
Runs your slide
miniature versions show in a full
of all slides in a screen, beginning
presentation,
with the current
complete with
slide if you are in
text and graphics. slide view or the
In slide sorter
selected slide if
view, you can
you are in slide
reorder slides; add sorter view. If you
transitions, and
simply want to
animation effects. view your show
You can also set from the first
the timings for
slide:
electronic slide
Click Slide Show
shows.
at the top of the
screen
Select View
Show
233
8.1.3 Toolbars
Toolbars include important components for developing a presentation. A toolbar is an
onscreen bar which contains shortcut buttons. These allow easy access to frequently used
commands. You can easily get to the toolbars you need by telling PowerPoint which ones
to display.
PowerPoint includes 13 toolbars including commonly used ones such as the Standard,
Formatting, Drawing, Picture, and E-mail toolbars. You don't need all of them at once, and
some you may seldom use so you don't want them taking up space on your screen. You can
pick and choose which toolbars are visible, and once you know how to turn toolbars on and
off, you can always get to the toolbar you need.
Display and Hide PowerPoint Toolbars
Click View. Then click on Toolbars. A fly-out menu will appear with a list of all of the
Windows toolbars and any others that you may have installed from other applications on
your computer.
In the list of PowerPoint toolbars, the ones with the check mark next them are visible.
The ones without a checkmark are hidden.
To make a toolbars visible, simply click on its name in the list, a checkmark will appear
next to the toolbar name in the list and the toolbar will become visible in your PowerPoint
workplace. Check the toolbar you want to be visible and repeat as necessary.
234
You can also right-click on any existing toolbar and check or uncheck any entry in the
shortcut menu.
You can also right-click your mouse anywhere in a toolbar area and the list of PowerPoint
toolbars will appear. From here you can turn toolbars on or off.
235
Note that when you choose to view a toolbar, it appears in the position in which it was most
recently used. It was last docked at the bottom of the screen, then that's where it will appear
again when it is turned back on. You may need to experiment with various toolbar
locations until you find the arrangement that works best for you.
Creating Your Own Toolbar:
You can create your own customized toolbar. Right click any toolbar and hit Customize. In
the Customize dialog box. Select the toolbars tab and click New. Name the toolbar and
allocate a template.
236
In the Toolbars list, click the toolbars you want to display. Click Close, and the toolbars
you selected appear on the workspace.
3.
4.
--------------------------------------------------------------------------------------------------------------
8.2 MS POWERPOINT-II
-------------------------------------------------------------------------------------------------------------8.2.1 Apply a Design Template
.
1. Click the design icon
2. Design templates will appear on the left side of the screen.
3. Scroll down to view the design templates.
4. Right-click the design template you want to apply. A context menu will appear. Choose
Apply to All Slides. We used the Lock and Key design template.
238
2.
Click the Outline tab to view the text of your presentation as an outline.
239
3.
240
4.
5.
6.
7.
Animated Layers or Slides you may find it useful to bring a layered object into a
presentation one layer at a time, building it on-screen. To animate a layered object or to
animate each object on a slide:
1.
2.
241
3.
4.
5.
6.
(If you don't remember what a particular object is), click the object's name in the list;
that object appears selected in the preview window.
Click in the object's checkbox to animate that object. It will be added to the
Animation order list.
To change the order that the animated objects appear, select the object in the
Animation order list, then click the up or down arrow to move the object through the
list.
Choose whether the object appears only on a mouse click or after a specified number
of seconds.
To choose other effects such as sound effects and how the object appears on the slide
during the on-screen presentation, click on the Effects tab.
To animate text:
1. Click on the Effects tab.
2. In the Introduce Text section, from the drop-down box, choose whether the text is
introduced all at once, by word, or by letter.
To animate charts click the Chart Effects tab. You can choose to introduce the data by
series, categories, or elements.
NOTE: Be careful of using too many effects in any single presentation because they soon
become detraction to rather than an enhancement of the presentation.
b) Create a Presentation Using the AutoContent Wizard in Microsoft PowerPoint
1.
2.
3.
4.
243
To select a different slide, click the slide you wish to become current.
To duplicate or delete the current slide, choose EDIT: Duplicate (or Delete) Slide.
PowerPoint provides visual indicators beneath each slide showing any slide transition, text
animation, or advance timing that you have applied to that slide.
Using Transitions:
Transitions determine the effects applied when you move from one slide to another during
an on-screen presentation. You must be in Slide Sorter View to access the Transition
Toolbar.
To choose only a transition effect, click the dropdown box beside the words "No
Transition" and select a transition. To have other transition choices available to you, click
the Slide Transition Tool.
When you click the Slide Transition Tool, the Slide Transition dialog box allows you to
choose not only a transition effect from a drop-down box, but also offers other choices that
affect your on-screen presentation.
TIP: Don't use a different transition on each slide because your audience's attention should
remain focused on you and the content, not the effects. If you want to use multiple
244
transitions, a good rule of thumb is to apply a unique transition to each slide in a specific
module of the presentation.
Generally, you should leave the Effect Speed set to Fast. This brings in the next content
slide quickly and keeps your audience's attention focused on the presentation content.
PowerPoint contains a few built-in sounds. To play a sound as the slide is transitioning,
make a sound selection from the Sound drop-down box. Unless you have a well thought
out reason for doing so, don't choose to have the sound loop until the next sound; it can
become annoying very fast while you're giving a presentation, as well as making it difficult
for you to speak over. Also, many presentation locations don't have adequate speakers
attached to the computer to allow all of your audience to hear the sound.
Advance determines when the current slide proceeds to the next.
On mouse click advances the presentation to the next slide, or displays the next bullet
point, only when you click the mouse. (You can also use the keyboard arrow keys or the
spacebar.)
Automatically after xx seconds, makes the transition xx seconds after the preceding
transition ended.
NOTE: Make sure that if you select automatically, that you remove the check in on mouse
click.
For self-running presentations that function similar to a kiosk presentation where your
audience may stop, watch, then leave, generally you will want to set the advance to 3-5
seconds.
For a self-running presentation where you are speaking in synchronization with the
presentation, generally you will want to set the advance to 3-5 minutes.
Rehearse Timings
The Rehearse Timing Tool allows you to practice giving an on-screen presentation,
regardless of any slide advance timings you may have set previously. The tool times not
only the entire presentation, but also each individual slide, as you rehearse. Each time you
advance the slide, the time is recorded. You must be in Slide Sorter View to access the
Rehearse Timing Tool.
To use the Rehearse Timing Tool, click the Rehearse Timing Tool. When you have
completed rehearsing, PowerPoint displays the total time for the rehearsed presentation and
ask if you want to record the new timings. If you click "Yes," these new timings will
replace any slide advance timings you may have previously set for the presentation.
245
Bullet Effects:
The Text Preset Animation Tool controls how bulleted points appear on the slide during an
on-screen presentation. You must be in Slide Sorter View to access the Text Preset
Animation Tool.
To animate bulleted points, the slide containing bulleted points must be the current slide.
Then click the drop-down box and choose the animation effect you desire.
Hidden Slides
You can hide slides within a presentation. Hidden slides remain available as part of the
saved presentation and are accessible to you during development or in future presentations
but do not appear as one of the consecutive presentation slides during a show.
You must be in Slide Sorter View to access the Hidden Slide Tool. To hide a slide,
make sure it is the current slide, and then click the Hide Slide Tool.
Hidden slides display in Slide Sorter View with a slash through the slide number.
Slide View does not differentiate between hidden and non-hidden slides, and all are
displayed. During presentation, however, hidden slides are passed over unless specifically
chosen by you through the Slide Show Navigator.
--------------------------------------------------------------------------------------------------------------
246
--------------------------------------------------------------------------------------------------------------
Structure
9.1 Introduction to Ms Outlook
9.1.1 How to Set Up Outlook Express
9.1.2 New For Outlook 2000
9.1.3 Exploring Outlook 2000
9.1.4 Exploring Inbox
9.2 Difference between Outlook Express and Microsoft Outlook
9.3 Computer in Office Automation
9.3.1 Office Automation Technologies
9.4 Computers in Engineering
9.5 Review Questions
--------------------------------------------------------------------------------------------------------------
247
Quick start. You'll notice that when you use Outlook Express regularly, Windows XP will
put the Outlook Express icon on the Start menu (along with other programs you've used
recently). In that case, just click the Outlook Express icon in the Start menu to open the
program.
Set Up an Outlook Express E-Mail Account ; The Internet Connection Wizard makes
short work of setting up your online mailbox by walking you through each step for every email account you set up.
1. Before you get going, make sure you know your email address along with the following
information. (You may need to contact your ISP, Internet Service Provider, to get it.)
First, information about the e-mail servers:
The type of e-mail server you use: POP3 (most e-mail accounts), HTTP (such as
Hotmail), or IMAP
The name of the incoming e-mail server
For POP3 and IMAP servers, the name of the outgoing e-mail server (generally
SMTP)
Second, information about your account:
Your account name and password (For some solid advice about making a secure
password, read the Create strong passwords article.)
Find out if your ISP requires you to use Secure Password Authentication (SPA) to
access your e-mail accountyes or no is all that's required.
2. Start Outlook Express, and on the Tools menu, click Accounts.
3. If the Internet Connection Wizard starts up automatically, skip ahead to step 4. Click
Add, and then click Mail to open the Internet Connection Wizard
249
250
your account, Outlook Express offers help. Search for troubleshooting topics from
Contents and Index on the Help menu.
Set Up a Web-based E-Mail Account
The e-mail that you get in a Hotmail account and other Web-based accounts is not stored
on your hard disk, but is kept on the account-provider's computer. That's what makes it
possible to access your account from any computer in the world over the Internet. Here's
how you set yourself up.
1. Go to the Web site and follow the setup instructionsfor example,
http://www.hotmail.com/ for Hotmail.
2. Set up Outlook Express to use the account, by following the instructions above in Set up
an Outlook Express e-mail account.
If you share your computer with someone else, take advantage of Fast User Switching. A
feature of Windows XP, it lives up to its name by enabling you to switch among users on a
single computer without closing any programs you are running or logging off.
To turn Fast User Switching on, open User Accounts in Control Panel. Click
Change the way users log on or off. Make sure the Use Fast User Switching box
is checked.
Then, to switch users, click Start, click Log off and then click Switch User. On the
Welcome screen, click the user account you want to switch to. That's it!
Close Outlook Express
In closing, Outlook Express works just as all other Windows programs do.
On the File menu, click Exit.
Tip: For a fast way out, press ALT+F4.
Version
Number
Name
Release Date
Notes
Outlook for
MS-DOS
Outlook for
Windows 3.x
Outlook for
Macintosh
251
Outlook 97
Outlook 98
8.0
January 16,
1997
8.5
Outlook 2000
Outlook 2002 10
9.0
June 7, 1999
Office Outlook
11
2003
October 21,
2003
Office Outlook
12
2007
November
30, 2006
252
Enhanced Mail Merge: You can filter the Contacts list in Outlook 2000 as desired and
then pass the contacts to the Microsoft Word Mail Merge and merge on any Outlook fields.
Outlook Bar shortcuts: You can easily create a shortcut on the Outlook Bar to any file,
folder, or Web page.
Find Exchange Server Public Folder: Outlook 2000 can search on Microsoft Exchange
Server Public Folder properties to locate items in public folders.
Web integration: You can view a contact's personal Web page, post your calendar to a
public folder for viewing on the Web, and share information within Outlook 2000.
Folder home pages: You can associate one or more Web pages with any personal or
Exchange Server folder.
View the Web: Clicking any Outlook Bar shortcut to a Web page, displays the Web page
in the right Outlook pane. Basic Web navigation is supported and the currently displayed
page can be opened in your default Web browser.
Internet group scheduling and iCalendar support: Group scheduling is possible over
the Internet. You can publish and download free/busy information for scheduling meetings,
as well as send and receive meeting requests and responses over the Internet.
Online meetings: You can easily schedule real-time meetings and automatically start the
Microsoft NetMeeting conferencing software.
Microsoft NetShow Integration: You can easily schedule your time to watch
broadcasts via Microsoft NetShow services and automatically start Microsoft NetShow at
the designated time.
Save as Web page: You can save Outlook 2000 items as HTML, making it easy to save
your course calendar, schedules, and even your contacts to a Web page.
HTML Mail: Outlook 2000 fully supports sending and receiving of e-mails in HTML.
Mails can be anything from simple formatted text to a complete Web page. Outlook 2000
also includes HTML stationery with different fonts and backgrounds.
253
Toolbars: You will find that the Standard and Web toolbar features in Outlook 2000 are
similar to those in other Office programs. For each Outlook folder, you can also display
Advanced toolbar that gives you ready access to more features specific to Outlook 2000.
To display toolbars, click View, point to Toolbars, and select those you want to make
visible.
Outlook Today: The Outlook Today window provides a preview of your day. By using
Outlook Today, you can see a summary of your appointments, a list of your tasks, and how
many new e-mail messages you have. You can set this page to be the first page that opens
when you start Outlook 2000, and you can customize Outlook Today to provide the
information that you need.
Click Send/Receive to send and
receive e-mail messages if you
have a dial-up connection.
Web Toolbar
Standard Toolbar
Advanced Toolbar
Folder list
The number in
parentheses
indicates how
many unread
e-mail messages
you have.
254
Inbox symbols:
High importance
message
Canceled meeting
Unread message
Task request
Forwarded message
Accepted task
Replied to message
Declined task
Message is flagged for follow
up
Saved or unsent
message
Message is flagged as
complete
Sealed message
Digitally signed
message
255
The following illustration shows the Inbox window in Outlook 2000. In this window you
can receive, compose, send, and organize e-mail messages.
Forwarded
This arrow indicates that this
message has been forwarded.
Bold
Messages displayed in bold
have not been read.
Web toolbar
Standard
toolbar
Advanced
toolbar
Folder list
Use this list to
organize your
messages in
personal folders.
Status bar
Displays the
number of
messages in
your Inbox and
the number of
messages
unread.
Preview pane
Displays a preview of the
highlighted message in
your inbox.
256
In the To field, type the e-mail address of the person to whom you are sending the
message. If you are sending to more than one person, type a semicolon (;) between
the e-mail addresses.
Or
Click To to open your address books. Select an address book and double-click a
name. The address moves to the To Message Recipients field.
Repeat the above step to add more e-mail addresses to the To field.
To send a carbon copy (CC) to someone, click the CC field. Type the e-mail
address in the field, or click CC, choose an address from one of your address books,
and click OK. Repeat to CC other people.
To send a blind carbon copy (BCC) to someone (to CC someone without the other
message recipients knowing the person received the message), on the View menu
select Bcc Field. Type the e-mail address in the field, or click BCC, choose an
address from one of your address books, and click OK. Repeat to Blind CC other
people.
To add a subject line to the message, click in the Subject field and then type a brief
line regarding the subject of the message.
Click in the blank field below the Subject field (the message field) and type your
message.
When you are satisfied with your message, click Send. The message automatically
moves to your Outbox folder and you return to the main Inbox window.
If you are always connected to the network and Internet connection, your message
is automatically sent.
Or -
257
If you are not already connected to the Internet, click Send/ Receive to connect to
the Internet and send the message.
When the message has been sent, it moves to the Sent Items folder. If the message
cannot be delivered to someone, you usually, but not always, receive an automatic
reply letting you know who could not be reached and why.
To attach a file to the message, position the cursor in the message field where you
want to insert the file. This can be at the beginning, at the end, or anywhere in
between.
On the Insert menu, click File. Or, click the Insert File button on the Standard
toolbar. The Insert File dialog box opens.
Locate the file you want to attach. Click the file and then click OK. An icon
representing the file labeled with the file name appears in the message field.
-OrClick on a file and drag it to the message field.
To create and send an e-mail message from another Office 2000 program
All Office 2000 programs integrate e-mail into their core functionality. You can send any
document as a message or an attached file from directly within an Office 2000 program.
When Outlook 2000 receives messages, it stores them in the Inbox folder. The
number next to the word Inbox in the Folder list tells you how many messages are
waiting for you. If there is no number, you have no new messages.
When you click the Inbox folder in the Folder list, the contents of the folder are
displayed on the upper, right portion of the window, which is called the Message
258
List pane. The Message header shows the subject and author of the messages in the
Inbox. If a message header is bold, that message has not yet been read. If the
message header is not bold, the message has been opened.
To receive and read messages
Open Outlook 2000.
If you are always connected to the network and the Internet, any messages sent to
you are automatically received to the Inbox folder. If you have new messages, an
envelope icon appears in the taskbar.
Or
Click Send and Receive. Your computer connects to the Internet and tries to
retrieve your messages to the Inbox folder. (It also sends any messages in the
Outbox folder.)
In the Folder list, click the Inbox folder. (If it has a number next to it, you have new
or unread messages.) New and unread messages appear in bold in the Message List
pane.
To read a new message, click it in the Message List pane. The contents of the
message are displayed in the Message Contents pane.
-Or
Double-click the message in the Message List pane to open the message in its own
window.
To open an attachment, double-click its file icon. The attachment opens in the
appropriate program.
When you are finished, you can close the message and it remains in the Inbox
folder.
You can also organize messages that have already been moved to other folders by opening
that folder and then clicking Organize.
Using the Rules Wizard
A rule is a set of conditions and actions for processing and organizing your e-mail
messages. Conditions identify messages for processing, and actions determine what
kind of processing is performed. For example, you can define a rule that tells
Outlook 2000 to forward all messages sent to you from students in Biology 101
section 3 to your lab assistants, or create a rule that tells Outlook 2000 to put all
message with Homework in the subject field into a certain folder in your Personal
Folders list.
If you receive a large volume of mail from several different groups (personal mail,
mail from students, mail from colleagues, even junk mail) you can use the Outlook
Rules Wizard to create your own rules to manage your messages automatically.
Here are some examples of rules you can create:
Assign categories to messages based on their contents.
Set up a notification, such as a message or a sound, when important
messages arrive.
Move messages to a particular folder based on who sent them.
Delete messages in a conversation.
Flag messages from a particular person.
Assign categories to your sent messages based on their contents.
Delay delivery of messages by a specified amount of time.
Redirect an e-mail message to a person or distribution list.
Automatically reply to a certain type of message with a specific message
you create.
To create a rule
Open Outlook 2000 and click the Inbox folder to display its contents.
On the Tools menu, click Rules Wizard. The Rules Wizard dialog box opens.
Click New. The Rules Wizard displays a list of the different types of rules you
can create along with a description of the rule in the Rule description box.
Select the type of rule you want to create and click Next.
Select the conditions for the rule as directed by the Rules Wizard and then click
Next.
Specify the action for the rule as directed by the Rules Wizard and then click
Next.
260
Specify any exceptions to the rule as directed by the Rules Wizard and then click
Next.
Specify a name for the rule and then select the Turn on this rule check box to
activate it.
Click Finish. The rule is added to the Rules Wizard list.
There are three ways to control how rules are applied in the Rules Wizard:
When you create a rule, you specify whether the rule is applied when the message
arrives in the Inbox or when you send a message. You set these options for each
rule.
After you create multiple rules, you can move the rules up or down in the list in the
Rules Wizard to change the order in which they are applied. Rules are applied in the
order they appear in the list. Rules that are marked client only are applied after all
other rules.
You can specify whether the rule runs automatically or manually. This is useful
when you want to apply rules manually to messages already delivered to the Inbox.
Creating an address book
Use the Address Book dialog box to look up e-mail and fax information when you
address messages. Use the Contacts folder to store and retrieve all types of
information about others such as street addresses, telephone numbers, e-mail
addresses, fax phone numbers, and Web page addresses. To open the Address Book
on the Standard toolbar, or click Address Book
dialog box, click Address Book
on the Tools menu.
There can be several types of address books in the Address Book dialog box
including the Global Address List, the Personal Address Book, and the Outlook
Address Book. Select these address books in the Show names from box. Contacts in
the Contacts folder that include an entry in the e-mail field or one of the fax phone
number fields automatically appear in the Outlook Address Book.
To add information to the address book
261
Exploring Contacts
Outlook 2000 serves as much more than just an e-mail program: you can use it to maintain
an electronic address book of your students, colleagues, and anyone else you need to
contact. Storing contacts electronically in Outlook 2000 allows you to find information
about someone quickly and easily. In the Contacts folder, you can store a wide range of
information about people, from their work and home phone numbers and physical
addresses to e-mail addresses and Web addresses, if they have them. You can link any
Outlook item or Office document to a contact to help you track activities associated with
that person or group.
Contacts symbols:
Activities have
been
automatically
recorded in
Journal for this
contact
Contact
Contact has an
attachment
Contact is flagged
for follow up
Contact is flagged
as complete
When you enter a name or address for a contact, Outlook 2000 separates the name or
address into parts and puts each part in a separate field. You can sort, group, or filter
contacts by any part of the name or any part of the address you want.
From a contact in your contact list, you can click a button or menu command to have
Outlook 2000 address a meeting request, e-mail message, or task request to the contact. If
you have a modem, you can also have Outlook 2000 dial the contact's phone number. You
can have Outlook 2000 time the call and keep a record in Journal complete with the notes
you take during the conversation.
262
Lett
Click a sy
button to
contacts b
that sym
Standard
Toolbar
Advanced
Toolbar
Outlook Bar
Status bar
Displays the
total number
of contacts.
You can file contact information under a last name, first name, company name, nickname,
or any word that helps you find the contact quickly, for example, Section 004 for
students in a particular class. Outlook 2000 gives you several naming choices to file the
contact under or you can enter your own choice. You can enter up to three addresses for
each contact. Designate one address as the mailing address and use it for mailing labels,
envelopes, or creating mail-merge letters.
Creating contacts
A contact is a person or organization you correspond with. You can store information
about contacts such as job titles, phone numbers, addresses, e-mail addresses, Internet email addresses, and notes. When you create a contact, you can start by entering all new
information or you can start with information from an existing contact.
263
On the File menu, point to New and then click Contact. The Contact dialog box
opens.
In the Full Name box, type a name for the contact.
Enter the information you want to include for the contact. There are several tabs
on which you can enter information.
If you wish, assign the contact to a category. Click Categories and then select a
category from the list.
Click Save and Close.
Exploring Calendar
Outlook 2000's Calendar offers an easy way to keep track of appointments and schedule
your time. You can look at appointments and tasks for a given day or look at appointments
in relation to other appointments in the month. You can also post your calendar to a Web
page or print it out and make handouts so that students, parents, or others can know when
you are available.
264
Click the ar
show other
Standard
Toolbar
Advanced
Toolbar
Folder List
Status bar
Displays the
total number of
calendar items.
Customize how
Outlook displays the
hours of the day.
265
Calendar symbols:
Appointment
Click to see calendar
items that do not fit in
the current view
Meeting
Meeting request
Recurring
appointment
Recurring meeting
Recurring meeting or
appointment
Reminder for the
appointment or
meeting
Private meeting or
appointment
Start and end times
of the appointment or
meeting
Calendar item has an
attachment
266
Select the days of the week you want to show on your calendar.
Select other options as necessary. To select a time zone, or show more than one
time zone at a time, click Time Zone.
To have Outlook 2000 automatically display holidays for different countries or
religions, click Add Holidays.
If you are responsible for coordinating resources, such as conference rooms, or
classrooms, click Resource Scheduling.
To publish your free/busy information on a Web or other server, click Free/Busy
Options.
When you are finished, click OK.
--------------------------------------------------------------------------------------------------------------
OUTLOOK
EXPRESS
AND
--------------------------------------------------------------------------------------------------------------
Definition
Outlook Express
Microsoft Outlook
267
Technology
Platforms
Supported
Calendars,
group
scheduling, task,
and contact
management
268
Integration with
Other
Applications
Network System
--------------------------------------------------------------------------------------------------------------
People
Although it takes people to complete work, it is the way people work that accounts for
productivity. In recent years, the trend has been towards people working together to
accomplish more. This is called work-group computing, which means a number of
knowledge workers, each with different tasks, jobs or duties, work together towards a
common goal. In large companies, there may be dozens or hundreds of workgroups. In
smaller companies, everyone is part of the workgroup.
Ergonomics
Business learned that "office could not be automated in the same way the factory was
automated, and the field of ergonomic began to emerge. Office tasks involve a great deal of
thinking and decision-making. As a result office systems must be flexible and versatile.
Moreover, they must be deigned so any knowledge worker, regardless of background can
easily use them. This is called ergonomics, the study of how to create safety, comfort and
ease of use for people who use machines. It is not a new field of study; in fact it has existed
for over 100 years.
With the advent of computers, ergonomics engineers became particularly interested in
office automation systems, furniture "and. environments for the knowledge worker
intensive studies determined the best ,designs for Keyboard, set. Eyes fatigue- levels for
monitors, and specified desks and seating designs that alleviate physical stress. Office
furniture companies soon introduced ergonomically designed chairs and "equipment.
Ergonomics has- played a significant role in -helping people use technology more
effectively
There are five primary technologies used in managing information in office automation:
In the past these forms of information- was created using different technologies. Text was
created using conventional typewriters' or more" recently, word processing.
mail. Or it may be a more complex document, with graphics or even Video. Most computer
'systems can incorporate sound, so that an onscreen document can be annotated with
comments spoken by the document creator.
Today, the computer integrates others different media and others' as well Data, sound and
images can all -be 'entered info' a computer-, stored- and translated into the kind of output
we need. It is now common to seek knowledge workers in workgroups using a special type
of, software designed' specifically for them and their work. This application softwares
called groupware, lets networked PCs and workstations share information and electronic
documents from both corporate and on-line sources. At the center of this integration are
networking and communications systems...
Office Automation Systems
Office automation uses computer based systems to provide" information to help knowledge
workers make decisions that benefit the business. Office automation systems are"
comprised of many distinct subsystems: text management systems, business analysis
systems, document management systems" and Network and communications C systems.
Text Management Systems
A text management system is a completer system -c1esigned to work with the written or
typewritten word. It includes all kinds of typewriters, word processing systems, PCs with
word processing, desktop publishing and text editing systems, and even computerized
typesetting equipment. Text management systems are used for test like writing memos,
notes, letters and other short documents, - printing envelopes" and labels preparing preprinted forms such as invoices, composing complex documents such as proposals and
reports, retrieving and editing documents such as contracts, Creating display documents
like newsletters, etc.
Business Analysis Systems
Managers need solid data from which to extract the information necessary to make good
decisions for the business. In the past, these knowledge workers had to rely on their
experience and other personal factors to make decisions. A business analysis system
provides data that, when used with the proper software, helps its users - better understand
the business environment and make more effective decisions. Corporate users routinely use
spreadsheets for analyzing cost and benefits and for creating budgets.
Other software tools for performing analysis that and"-.commonly used in large companies
are decision support systems (DSS), expert systems and executive support \ systems (ESS).
A decision support system helps the knowledge worker to extract information from the
various MIS database and reporting systems, analyze it, and then formulate a decision or a
strategy for business planning. An expert system is a computer system that can. store and
retrieve data with special problem solving expertise. An executive support system is an
information system that consolidates and summarizes ongoing transactions within the
organization. It provides the management with all the information it requires at all times
from internal as well as external sources.
271
272
Design, storage and retrieval - Some CAD systems can store the design characteristics of
existing products and components. Then, for example, if a company needs a gear for a new
product, the designer can enter the relevant information about the gear, such as its diameter,
tooth pattern, and required hardness, into the CAD system. The CAD system determines
whether the company is already using an identical of sufficiently similar gear, in which
case a new one is unnecessary. If not, a gear that has similar properties may exist. The
designer can then use the design of this similar gear as a starting point for the new gear:
This capability not only promotes the use of common components but also reduces design
time.
Automatic evaluation of specifications - One of the most time-consuming aspects of
design for highly technical products is calculating whether or not product specifications,
such as strength, heat resistance or aerodynamic drag, are satisfied. These calculations can
be programmed into some CAD systems so that whenever the designer changes the design
(by altering the shape or material to be used), these performance characteristics are
recalculated automatically and compared to the product requirements. This is sometimes
called Computerized. -Engineering (CAE).
The overall benefits of CAD systems can be substantial. The features described above
reduce development time and cost, and they improve product quality because more design
options can be evaluated in greater detail more quickly. For example, Motorola used threedimensional CAD to produce its award-winning MicroTac pocket sized cellular phone two
years ahead of the competition. It is not uncommon for CAD systems to reduce product
cycle times by 10-50 %.
Even greater time and cost reductions have resulted from recent advances whereby CADengineered designs are converted automatically into software programs for computerized
production machines. These are called Computer-aided Design/Computer-assistedManufacturing (CAD/CAM) systems. This automatic conversion eliminates the costly and
time consuming steps of having a person convert design drawings into a computer program
for computer-controlled production equipment; such as robots or machine tools. CAD and
CAD / CAM systems are not used by large automotive or electronics companies alone.
Future Enterprises, the largest maker of wedding jewelry in the United States, reported that
its CAD / CAM system reduced the time required to design and make jewelry from five
months to one week.
Product Data Management (PDM)
One of the major manufacturing challenges is to maximize the time-to-market benefits of
concurrent engineering while maintaining control -of your data and distributing it
automatically to the people who need it, when they need it. The way PDM systems cope
with this challenge is that master data is held only once in a secure 'vault' where its
integrity can be assured and all changes to it monitored, controlled and recorded.
Duplicate reference copies of the master data, on the other hand, can be distributed freely,
to users in various departments for design, analysis and approval. The new data is then
released back into the vault. When a 'change' is made to data, what actually happens is that
273
a modified copy of the data, signed and dated, is stored in the vault alongside the old data,
which remains in its original form .as permanent record.
The following are some of the benefits of the PDM system:
Reduced time-to-market
Improved design productivity
Better use of creative team skills
Data integrity safeguarded
Better management of engineering change
Feature Prototyping
One of the problems with product design is getting an intimate feel for the appearance and
behavior potential of a product. Now there are software packages, which can generate
computer prototypes, which' can be distributed and tested by actual customers. Usage data
from these tests is collected automatically and used to refine product specifications until
they precisely meets customers' needs. This process helps in ensuring the market success of
the new product before costly and time-consuming investments in engineering and
manufacturing are made.
Better than communicating with customers using written specifications, static drawings,
flip charts, or multimedia authoring tools, feature prototyping 'using fully functional
prototypes provide accurate and valuable feedback to the company based on customers'
experience that can make the difference -between a resounding market winner -and an
embarrassing product failure.
Project Management
When projects from marketing campaigns to construction projects are undertaken, keeping
track of all the tasks is a big job and that. is what project management programs have been
developed to do. One concept they use is the critical path; the series of tasks that must
follow one another in order and cannot be overlapped or begun until the previous one is
completed. For example, a roof cannot be put on a house until the walls are up, and the
walls cannot be built until the foundation is completed. When these dependent tasks are
laid out end-to-end, they form the project's critical path. Any delays in the tasks on this
path delay the entire project. Tasks not on the critical path like paving the driveway do not
affect the project's completion date. Speeding up the project, called trashing the schedule
can be done only by changing the dates on the critical path, but changing some dates on the
critical path may result in another path becoming critical. Since this process is so
interactive, it lets itself to computerization. Graphics are often used to show the
complicated relationships in the timing and sequence of a project.
274
--------------------------------------------------------------------------------------------------------------
275
The lesson content has been compiled from various sources in public domain including but not limited to the
internet for the convenience of the users. The university has no proprietary right on the same.