If more computing power is needed, one way to get it is to buy a larger computer system. But buying a larger computer system is not possible for many small businesses or companies.
Another problem arises for those who are geographically dispersed. They may need to send messages to, receive messages from, or share problems at many different locations. One solution to this problem is to keep separate data files at each location.
But this approach is very costly and potentially a dangerous solution. The solution to both issues, the need Notes for more power and the ability to receive messages and share data are found in data communication technology. Even for a simple important exercise of printing any information from a computer by an attached printer to a computer, there is a requirement for error free data transmission from the computer to the printer.
The whole concept of data communication is based upon principles of sending data, checking and confirming its receipt and following error correction technique, to ensure accurate data transmission. Communication Process 1. They were never planned to send Data. So to send data through telephone lines, you have to convert the data into the format which can be read by telephone lines.
These are called analog signals. For data communication between computers to take place over a telephone line, the digital pulses of the data to be transmitted must be converted to an analog signal before these are transmitted. After its journey over the telephone lines, the analog signal must be re-converted to digital pulses so that it can be used by the receiving computer. The process of converting digital pulses to an analog signal is called modulation.
And the process of re-converting an analog signal to digital pulses is called demodulation. The device that accomplishes modulation-demodulation process is called a modem. A device using the simplex mode of transmission can either send or receive data, but it cannot do both. Simplex mode circuit is seldom used because a return path is generally needed to send acknowledgement, control or error signals. Full-duplex Mode: This mode allows a device to receive and send data simultaneously.
A full duplex mode is faster since it avoids the delay that occurs in a half-duplex circuit each time the direction of transmission is changed. An example is a citizens band radio, where the user must either talk or listen, but cannot do both at the same time. Transmission Modes 1. Twisted pair Cable This type of cable is made of pairs of thin strands of insulated wire twisted together.
Twisted pair is the least expensive type of networking cable and has been in use the longest. In fact, it is the same type of cabling used inside most homes for telephone communications. Twisted pair cabling can be used with both analog and digital data and is commonly used for LANs. Twisted pair cable is rated by category, which indicates the type of data, speed, distance and other factors that the cable supports.
Category 3 twisted pair cabling is a regular telephone cable with higher speed and quality cabling. For instance, Category 5 and Category 6 are Frequently used for home or business networks. The pairs of wires in twisted pair wires are twisted together to reduce interference and improve performance. To further improve performance, it can be shielded with a metal lining. Twisted pair Cable Coaxial Cable This medium also known as coax , pioneered by the cable television industry, was originally developed to carry a large number of high speed video transmissions.
A coaxial cable consists of a relatively thick centre wire surrounded by insulation and then a shield of braided wire the shield blocks electromagnetic signals from entering the cable. Coaxial cable are available in both baseband and broadband versions. Both type of coaxial cabless are used today in Notes computer networks. Coax is also used for short run telephone transmissions outside the home and for cable television delivery.
Although more expensive than twisted pair cabling, it is much less susceptible to interference and can carry more data more quickly. Coaxial Cable Fiber Optic Cable This is the newest and fastest of the three types of wired transmission media. It uses clear glass or plastic fibre strands, each about the thickness of a human hair, to transfer digital data represented by light pulses. The light pulses are sent through the cable by a laser device at speeds of billions of bits per second.
Each strand has the capacity to carry data for several television stations, or thousands of voice conversations. Fiber Optic connectors are less standardised than connectors for other types of wired media, so it is important to use cables with the connectors that match the hardware with which the cable will be used.
Fiber Optic cable is commonly used for the high speed backbone lines of a network, such as to connect networks housed in separate buildings or for the Internet infrastructure. It is used for telephone backbone lines and is increasingly being installed by telephone companies all the way to the home or business to provide super-fast connections directly to the end user. The biggest advantage of fiber optic cabling is speed. The main disadvantage of fiber optic cabling is the initial expense of both the cable and the installation.
Fiber Optic Cable b Wireless Network The most common types of wireless transmission media used in computer and communications networks are microwave, satellite and infrared. Sometimes, Notes a single piece of hardware functions as both the receiver and transmitter; if so, it is commonly called a transmitter or transceiver. Microwave and Satellite Transmission Microwaves are high frequency radio signals.
Microwave signals can be sent or received using microwave stations or satellites. Both methods can send large quantities of data speeds over long distances. Microwave stations sometimes referred to as terrestrial microwave stations are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.
Microwave signals sent via microwave station transmission are line of sight, which means that the microwaves must travel in a straight line from one station to another without encountering any obstacles.
To avoid building mountains and the curvature of the earth obstructing the signals, microwave stations are usually placed on tall buildings, towers and mountain tops. Microwave stations typically contain both a dish shaped microwave antenna and a transceiver.
When one station receives a transmission from another, it amplifies it and passes it to the next station. Microwave stations can also exchange data transmissions with satellites, discussed next. Microwave stations designed specifically to communication with satellites, such as for satellite TV and satellite Internet services are typically called satellite dishes.
Satellite dishes are usually installed permanently where they are needed, but they can also be mounted on trucks, boats and other types of transportation devices when portable transmission capabilities are necessary or desirable, such as on military or recreation vehicles. Communications satellites are space-based devices launched into orbit around the earth to receive and transmit microwave signals to and from earth. Originally used primarily to facilitate microwave transmission when transmission stations were not economically viable such as over large, sparsely populated areas or were physically impractical such as over large bodies of water , satellites can now send and receive transmissions to and from a variety of other devices, such as personal satellite dishes used for satellite television and Internet services, GPS receivers, satellite radio receivers and satellite phones.
Satellites Communications 1. This communication channel configuration can be inefficient and costly, if a terminal is not active enough to keep the line busy. Multi Point In this configuration, three or more devices, e. Compared to point-to-point configuration, multipoint channel configuration is more efficient and less costly, because it reduces the amount of inter-cabling needed.
These devices may be computers, telephones or other communicating devices. In case of computer, it is the connection between two or more autonomous computers. These computers are connected with each other for information interchange. For connecting two computers are available different media like copper wires, microwaves, optical fibers and satellite. So, a network can spread over an area which could be as small as a room, or as wide as the entire world.
Depending on the span of the computer network, any network can be placed in either of the following three categories: 1. LAN 2. WAN 3. MAN Local Area Network A local area network LAN is two or more computers directly within a small well defined area such as a room, building or group of closely placed buildings. Some computers require that all the computers be of a certain brand, while others allow a variety of brands to be connected. Most LANs allow cables of about 1, feet, but some allow cables of several miles to be used.
This type of network is usually limited to use by large corporations and government agencies because of the high cost involved in installing and maintaining these. A WAN is a network that links separate geographical locations and this network can be a public system or any of the various packet switched services provided by the public telecommunication agencies.
The main difference between a LAN and WAN is that former is under the complete control of the owner, whereas the latter needs the involvement of another authority like the telecom department.
Increasingly, wireless MANs are being created by cities or large organisations including Microsoft and Google to provide free, or low cost, Internet access to area residents. Four of the most common physical topologies are: star, bus, ring and mesh. Star Networks With a star network — one of the most common network topology - there is a device to which all the computers and other devices in the network connect, forming a star shape.
The central device contains multiple ports that are used to connect the various nodes on the network such as computers and printers and all network transmissions are sent through the central device. If an individual computer or other node on the network fails, the other nodes and the network itself are not affected. If the central device fails, however, the network can not function, although the individual nodes on the network can still work independently.
Star networks are common in traditional mainframe environments, as well as in small office, home and wireless networks. Star topology Bus Networks A bus network has no central hub. Instead, it consists of a central cable to which all network nodes are attached.
In a bus network, all data is transmitted down the bus line from one node to another and only oneline can transmit at a time. Similarly, in a star network, if an individual computer or other node on the network fails, the other nodes and the network itself are not affected.
It is only if the bus line fails that the network itself would not function. Like a bus networks, this network does not have a central hub but the computers and other network devices are connected in a ring formation from one node to the next, without the use of a central cable. In a ring network, data typically travels from one node to another around the ring in one direction only.
Consequently, if one device fails, it does affect other devices on the network. Ring Topology Mesh Network In a mesh network, there are a number of different connections between the devices on the network so that messages can take any of several possible paths from source to destination, instead of having to follow one specific path, as in star, bus and ring networks.
Consequently, if one device fails, it does not affect other devices on the network, assuming is an alternate path is available. Mesh Topology 1. In other words, the Internet is a global network of computer networks. The machines and the computer networks are interconnected. Therefore the Notes intercommunication information accessibility and exchange is possible. The Internet is a cooperative effort of many organisations and the people participate as the information users as well as the information providers, through their computer machines connected within the Internet.
The people can use their stand-alone computers, or their local area network workstations to send messages or exchange files with the people using computers in another region be it in another company, another state, another country or anywhere-provided all the machines involved in the communication are connected within the Internet. Internet is suitable for all types of computers. It uses a wide range of communications media. Internet is a network of clients and servers. The servers may be, dedicated or general, performing dedicated functions or serving general requirements.
The information, which you need, is stored on the server computer and the computer and the programme, which accesses the information, site on client.
A number of tools are available to perform standard jobs of accessing, fetching and displaying information. Internet 1. A number of people and agencies are involved in Internet working. Modem A modem is a device that enables two computers to communicate with one another through phone lines.
When you open an internet account and use it, you are using the modem installed at your location to communicate through the modem installed at the internet service provider ISP. A modem has a speed, which is measured in bits per second Bps. Higher the Bps value,the faster the modem. Modems are available in the range of 9. Since you are on the internet and using modems to get a connection, the speed of exchange of information will be dedicated by the rate of modem.
For normal E-mail applications, standard PC of good speed is adequate. If your application requires multimedia capability, the PC should have all multimedia features, such as sound card, speakers and PC video camera, etc. Web TV cannot access all the Internet activities, which a computer can.
You cannot use it to get software online, to run Java programs or to chat. In simple terms, internet is a network spread over the globe not knowing precisely the number of servers and number of clients located in the network. Internet is a carrier of data and information across the network. But web is a global information sharing architecture that integrates information stored on servers.
Web offers software foundation as a standard for navigating, publishing information in the particular format, known as web pages. Internet holds and delivers the webpages and content stored on the pages.
Internet handles connectivity and web handles information across the internet. The information is stored in files on the web servers. The information is organised into distributed a pages. The pages are stored in HTML format. A page stored in HTML format is called web page.
A web page could be a text, mixed with multimedia content, that is graphics, audio and video attached with links. The links attached to pages helps users to browse from the internet.
When you jump between pages, you are web surfing for quick information access. In the normal course, a web page is a static page. It becomes dynamic when a portion of the page changes dynamically. The web technology provides a mechanism for fetching dynamic information from other sources and make it part of the webpage.
Thus, one of the key functions in network of many computers is to move the files Notes between two specific computers. TCP divides the data into little data packets.
The role of IP here is not put destination — address information on such packets. It is not necessary that all the packets follow the same path from source to destination when sent on the internet. They could be sent via different paths to load balance various paths that exits on the network. As an internet user, one must know how addresses are to be given. Unless and until the address is correct and unique, the item will not reach there.
Same is the importance of address in virtually everything we do on the internet. Word Address A typical word address of person understandable address on the internet is of the form: username host.
Hosts are, in general, machines at a particular location. These are the machines whose resources are normally shared and can be utilised by many users on the Internet. A user is given an account by the system administrator, which allows him to use the resources of that machine. This machine is also known as the server. The username is the name of your Internet account for loading into the host machine. Logging in is the process of gaining access to your account on the server, which is shared by several users.
Host and local networks are clubbed together into domains, which are, in turn, grouped into one or more larger domains. As an analogy Domain can be considered as a apartment complex, a town, or even a country a host computer can be considered are an apartment building in a complex and your account is just an apartment in it. Domains are usually classified as non-geographic and geographic.
Given below is a list of various common domain names. The IP address of any host computer is termed as the host address. Significance of IP addresses of computers is the same as that of telephone numbers to us. An IP address consists of four sets of numbers that are separated by dots.
These addresses are organised from left to right. The server of www. A portion of a number separated by the dot is known as an Octet, that is 8 bits of information. Just like our telephones number which includes country code, city code exchange code and the user, each octet has significance in an IP address. They consist of a sequence of domain code and sub-domain code from left to right.
Computer termed as servers contain the databases of the internet host addresses. They translate each word address or person understandable addressed into numeric equivalents and fetches the contents for you. The communication happens in the following way. URLs are used to jump from page to page. URL contains three parts mentioned in the following sequence: 1. Access method http, 2. Computer location, www. File location the last part of URL Directory path and or a file name.
HTML contains several categories of tags, known as mark-up tags. This type of service which does not require the communicating persons to be logged on simultaneously is called asynchronous communication. Thus, e-mail is analogous to an answering or voice mail system of a telephone. E-mail is the most commonly used service on the internet. E-mail is a cost effective, reliable and efficient mode of communication in comparison to most other means of communications such as faxing, courier or other postal services.
Notes One of the salient features of the email technology is that a system can be built to send an automated response back to the users who send messages to a company. A prompt acknowledgment of the e-mail satisfies the sender that his message has been received and is in the pipeline to be appropriately dealt with in due course.
Electronic mail Usenet USENET is an international meeting place where the people gather to meet other people with common interests and discuss about about mutual interests. On non-Internet sites, these are known as conferences, forums or bulletin boards. USENET is an asynchronous, one to many communications, which implies that someone prepares the information and anyone who is interested can read it whenever he feels like.
USENET newsgroups are organised into hierarchies either by subject or geographically and the part of the name of a newsgroup is the top level hierarchy and the following parts to more specific topics.
For example, a user can opt for a newsgroup title rec. Telnet TELNET is a service on the internet which allows the user to log on to a remote system and use various services available on that host. The user can use this utility to access huge databases catalogues or libraries on various servers and use the information for commercial or research purposes. These are two methods of using FTP. In the first approach, the user signs on the remote host with ID identity and is allowed to transfer files.
Restrictions to the privileges on the remote host in case of an anonymous FTP are due to security reasons. There are various programmes available Notes to use FTP.
A FTP server is the server which allows the files transfer from its resources to the users. The process of files transfer from the remote host to the users machine is popularly known as downloading files.
Converse of this process is known as uploading files to the server or the remote host. Archie Tjis is a collection of servers. Each of these servers is responsible for keeping track of file locations in several different FTP sites. All the Archie servers communicate and pool their information into a huge database. This database is updated periodically.
The user can search this database for a file location simply by giving an Archie client or server a keyword to search for. Gopher Gopher is a menu-driven system, which enables the user to navigate within the internet resources of information. A group of large number of specialised libraries which are interconnected for Gopher application is referred to as Gopherspace. The home page for each search tool contains a dialog box or frame where you type in a keyword or phrase.
Click on a button labeled search or submit and then the search begins. The search engine then examines a database for items that contains the key word s.
The search engine then brings back the search results — a list of hyperlinks and in some cases, a summary of the information found by clicking on each hyperlink.
The search results are used in the same way as any other web page. Around the world wide web, people have amassed collections of web sites to help steer them in the right direction for their needs. Some of the popular search engines are: google, altavista, excite, lycos and askjeeves. Search Engine 1. The connected computers have a unique address assigned by a central authority.
To get connected, you need a computer, a modem and an access provider, known as Internet Service provider ISP. Most users use internet through E-mail on world wide web www. Intranet could be open to other outside parties such as customers, vendors or individuals.
Intranet, just like internet, can use multimedia, sound and text forms for making use of internet beyond E-mail. The major difference between Internet and intranet is in terms of focus. An internet focuses outside the organisation, while the intra. The net focus is inside the organisation. However, both use almost the same technology. You can establish Internet, without the other being available. Like in any other system, hardware required for intranet is dependent on the design.
It largely depends on the number of clients and data types the server is going to handle. The client machine on this intranet could be any desktop low and machine with network interface card fitted to it. Further, the overall process cycle becomes shorter as communication is faster.
Security issues, hacking and viruses are frightening propositions for organisations with any level of internet information accessibility. Often companies address these issues by focusing only on the hardware and software needed to keep hackers and virus outside the internet systems. To prevent password cracking, users should create and use passwords of eight or more characters that combine alphanumeric elements, apart from changing it frequently. E-mail Spoofing Spoofing results when a user receives an e-mail that appears to have originated from one person, but is actually sent by another person.
The objective of spoofing is to trick the user into divulging confidential information. Electronic signature, also known as digital signature helps to prevent spoofing. It ensures that messages have not been altered during transmission and that the messages are from the person listed as the sender. Viruses are short programmes that are not engineered by accident. Someone somewhere has purposely designed these, usually with a malicious intent. Notes Hacker Attacks Hackers use a variety of tools to attack servers around using the world.
Most of these are preventable by implementing sound security policies and is appropriate software and hardware. It used very effectively to exploit the target computer. There are several hacking tools available to the hackers that allow them to send their oversized or continuous packets to the target computer.
This results in a system interruption, or even a system crash. A firewall acts as a barrier between Intranet and Internet which operates selectively and allows and disallows access after checking and verifying certain identity tags, such as passwords, IP address, and domain name. Firewall can also be created through software sitting on Proxy server which controls the incoming and outgoing traffic of the network.
Firewall Firewalls work like filtering routers, examining each packet of information by subjecting it to system check of authentication, verification of source and distinction and then allowing, or rejecting, the entry to the intranet or exit from internet.
Security on web is implemented through a layered system, each checking and protecting the flow of information. Encryption and Decryption Encryption is an effective and practical method to ensure security of data.
Encryption refers to encode data by converting the standard data code into a proprietary code. Just opposite to encryption, decryption is the process to convert encrypted data into its original form. Encryption and decryption are commonly used during transmission of data from one computer to another. The plain text message, which has to be transmitted, is encrypted to produce a cipher text.
The cipher text is transmitted to other terminals over communication lines. The cipher text is received at the authoried receiver and is decrypted back into plain text. It is widely used in many network security systems.
DES uses a binary number as the key for encryption. This key offers more than 72 quadrillion combinations. The binary number is used as a pattern to convert the bits at both ends of the transmission The key can be changed randomly.
Encryption and Decryption 1. Combining still and moving images, sound, audio, text and interactivity, multimedia has initially culminated in re-evaluation of the ways in which we communicate information. Unlike linear, no interactive media such as broadcast television, it provides users with a choice of numerous meaningful paths. Multimedia, therefore, is a combination of text, graphics, sound, animation and video delivered to users by computer or other electronic means.
Multimedia, through its dazzling pictures and animations, engaging sounds, compiling video clips and raw textual information, can electrify the thoughts and actions of users. The user can also be given the control of multimedia process.
In other words user can be allowed to control what and when the elements are delivered. This type of multimedia is called interactive multimedia. When the user is provided a structure of linked elements to navigate, interactive multimedia becomes hypermedia. The main focus area in any multimedia programme is the content of the Notes programme or presentation that the user pays for or the audience comes to use.
Different types of Multimedia Technically, multimedia represents the convergence between computers, digital video, and sound synthesis.
That is before starting with design of multimedia programme, it is necessary that the needs of users are understood properly. Multimedia Design Planning the overall design is the longest part of the development process. Designing involves preparing the outline of the sequences and blocks of information that will appear on the screen.
Designing phase also involves deciding how much information — text, graphics and clicking objects — will be presented on each screen.
It is in this phase that navigation methodology for the user is established. That is, how the user will navigate through various scenes established in this phase. Choosing the Tools Since the multimedia programme includes different kinds of content, creating it involves many types of software. For instance, creating text requires a word processor, working with digital images requires graphics software, using video requires a video capture programme and editing software and so on.
The selection of the appropriate software or tool depends largely on the planned programme. For examples, for a simple text and graphics, slide show type of presentation software programme should suffice. So variety of tools to be used depends on the type of presentation or programme designed.
Multimedia Authoring Once all the content has been created, it needs to be assembled. This process of putting together all the contents of the programme is called multimedia authoring. This process again requires a software that can understand all the different types of media, combine them, control the sequences in which they appear and create navigational tools and an interface for the user.
Testing Before the final programme is released, it must go through several testing and revision cycles so that everyone is satisfied with the finished product. In the testing phase, the user of the product is allowed to use the programme in the presence of the author the person who created the programme.
By going through this testing, the programmer locate flaws or errors and repair these before the final product is released into the market. Some of the application areas of multimedia are discussed below: Multimedia in Education Education is one of the first and best consumers of multimedia. Visual presentations, that include animation, video and sound, motivate students to become active participants in the learning process. Interactive multimedia programmes bring concepts to life and help students to integrate critical thinking and problem solving skills.
This approach to education also builds strong social skills and allows students with a wide range of learning skills to be successful.
The students can get information about any topic from such an encyclopedia and at the click of the mouse button; they Notes can also see video clips audio clips related to the chosen topic. Multimedia in Business or Organisation The multimedia equipped personal computer is the center piece of interactive multimedia applications in any organisation or business.
For example, many companies have developed customised interactive training materials for training their employees about the latest technologies. These materials fall into a category of products, called compute-based training CBT. Sales and marketing are also taking on new meaning in the age of multimedia. Companies are also beginning to allow customers to preview merchandise from an interactive catalog on the World Wide Web. Customers can place orders for merchandise by filling in an on screen order form.
For many marketers, this is the ultimate in interactivity. Multimedia is also helping employees to work together, even when their locations or schedules are different. Multimedia in Home Reference materials, self-help instructions and entertainment packages offer many opportunities for enhancement via multimedia products.
Regardless of the content, the main aim of these packages in to keep the interest of the viewers. The largest application for commercial multimedia is in the entertainment field.
Besides games, multimedia packages for managing money are becoming popular. Other multimedia offerings range from gardening to household repairs. The combinations of textual material, colourful graphics, animation and videos of real people doing a job you are about to tackle gives you as much help as you need.
Another interactive service is a technology called interactive television. In conjunction with a specifically made computer connected to television set, the remote control is used for more than just switching channels. Multimedia in Public Place In hotels, train stations, shopping malls, museums and grocery stores, multimedia has become available at stand-alone terminals or kiosks to provide information and help.
Such installations have reduced the demand on traditional information booths and personnel, add value and they can work around the clock. For example, a supermarket kiosk will provide services, ranging from real planning to coupons. Hotel kiosk, list nearby restaurant,, map the city, airlines schedules and provide guest services. Printers are often attached so that user can have printed copy of the information. Virtual Reality At the convergence of technology and creative invention in multimedia is virtual reality, or VR.
Virtual reality is the presentation of anything in 3 dimensional world. The user can enter this world using special devices such as head mounded displays, stereoscope glasses, data gloves and sensor seats.
These devices with motion sensors are connected to the computer. When the user walks or moves a hand, the sensors detect the motion and send data to the virtual reality programme. Virtual reality is also invading the online Notes world.
This tool allows the user to navigate through 3-D world, create or edit — 3-D objects and links these to other Web projects. Rather, the elements of multimedia sound, video and interaction will be integrated into all kinds of documents and programmes. Lot of work will be undertaken in improving the realistic experience of virtual reality in text few years.
Lot of advancements will also occur in the medium through which the content containing multiple media and interaction are delivered. Sophisticated cable TV networks will beckon some households to join their interactive services. Electronic Commerce e-commerce has triggered yet another revolution, which is changing the way businesses buy and sell products and services. Associated with buying and selling of information, products and services over computer communication networks, e-commerce helps conduct traditional commerce through new ways of transferring and processing information.
E-commerce refers to the paperless exchange of business information using electronic data interchange, electronic mail. Electronic bulletin boards, electronic funds transfer, World Wide Web and other network based technologies.
E-commerce not only automates manual processes and paper transactions, but also helps an organisation move to a fully electronic environment and change the way it operates. The internet gave yet another boost to e-commerce because it is a low cost alternative to proprietary networks.
E-commerce standards are, however under development. The more well-known Electronic Data Interchange EDI , the inter- organisational exchange of business documentation is structured, machine-processable from over computer communication networks is still the dominant part of e-commerce.
Organisations and countries worldwide are seized of the impact e-commerce will have on the world economy globalization of market. The world is on the threshold of a new industrial revolution that is being shaped by the Internet and e-commerce in particular. E-commerce implies not just using network based technologies to conduct business, it is about moving organisations to a fully electronic environment through a change in their work procedures, re-engineering their business processes and integrating them with their business partners beyond their traditional boundaries.
E-commerce has brought about a revolution in the way business is conducted. E-methods using tools and technologies enable every process to run with greater speed and precision in an automated manner where decision making is embedded in the process itself. The e-methods transform the business from human driven to information driven where people play the role of knowledge workers.
In e-business, discontinuity of process marked with delays on line waiting and storage is eliminated through online integration of customers, partners, suppliers and employees. It allows information sharing bringing transparency in business management processes. In e-business, you may be anywhere in the world, but you are close to your business location, as access to information is possible from anywhere.
In e-business, you are like a mobile office available to anybody through electronic reach. In e-business, you can access information, view it, download it for processing and upload it again for sharing with others. The biggest beneficiary of e-business is the customer, who has access to information about the products and services he requires and order from any supplier located in any country.
He has a wide choice to select from. He is able to configure the requirement at least cost, forcing the supplier to deliver it at the doorstep. The customer has become knowledgeable, forcing the business to become customer centric. The second beneficiary of e-business is the supplier or information on inventory, schedules, order status, etc. E-Business E-business uses different technologies to covert conventional business methods to e-enabled methods.
It begins with intranet for in-company seamless integration of systems. It uses web enabled systems to deal with text based information. Intranet then is extended to trusted business partners with complete security measures to protect information from exposure to unauthorised people.
When you extend intranet to trusted business partners, it is called Extranet. The internet is now accessible on wireless devices such as palm top computers and cell phones.
Internet is used to develop web applications. Internet is a universal network and web is an application running over it. The auction or sale of goods by one person to another, through special auction sites run by business organisations, falls under this definition.
The exchange of products, services or information between businesses on the internet is B2B e-commerce. Some examples of B2B websites include company websites, product supply and procurement exchanges, specialised or vertical industry portals, brokering sites, information sites and banking and financial sites that provide information for their business customers and employees.
For example, Seekandsource. It may be defined as any business selling its products or services to consumers over the internet for their own use. In addition to online retailers, B2C has grown to include services such as online banking, travel services, online auctions, real estate, health services. A virtual market place on the internet in the form of website enables sellers and buyers to meet and exchange Notes goods, including used goods at a negotiated price in C2C.
Such a site is known as an auction site and it started out like garage sale. The most famous site is eBay. In all models, basic business and communication processes are executed through electronic documents. All transactions are paperless hence, confirmations, approvals signatures are electronically carried out and the party is informed through e-communication.
One can reach out to the world any time one wants. This helps the companies to have a cheap and effective way of communication with suppliers on one side, and customers, on the other. It can be integrated straight into your infrastructure with very little overheads.
It is used to transfer electronic documents from one computer system to another, i. Case study-IT Outsourcing in Denmark. Related Books Free with a 30 day trial from Scribd. Related Audiobooks Free with a 30 day trial from Scribd.
Outstanding Leadership Stan Toler. Information technology 1. Communication: Basic need for most human activities Tarditional- telephone, fax, mail In the new information era- e-mail, internet, video conferencing The new communication technology enables people located in different places to work together as if they were in the same office. Big multinational companies are already exploiting this technology to achieve better use of the resources of their seperate offices.
In this way projects can be shared between offices with the application of the best expertise, and around the clock 4 5. Internet The value of the Internet to construction companies derives from its ability to easily connect globally to a vast amount of data, which would otherwise have taken more time and money to organise.
By exploiting the resources of the Internet construction companies can gain the following benefits. On-line services: The rapid development of the Internet and the World Wide Web has enabled many services that traditionally required face to face meetings to be delivered on-line. E-business: Internet provides a virtual market place for buyers, suppliers, distributors and sellers to exchange information, negotiate and trade Teleworking: Flexibility in working conditions, less office space, more productive workers.
How is information technology being used in education? History and Development of Information Technology In the s and s, the term information technology IT was a little known phrase that was used by those who worked in places like banks and hospitals to store information. With the paradigm shift to computing technology and "paperless" workplaces, information technology has come to be a household phrase. It defines an industry that uses computers, networking, software programming, and other equipment and processes to store, process, transmit, and protect information.
Software development and computer programming were best left to the computer scientists and mathematical engineers, due to their complicated nature. As time passed and technology advanced, such as with the advent of the personal computer in the s and its everyday use in the home and the workplace, the world moved into the information age. Modern Technology By the early 21st century, nearly every child in the Western world, and many in other parts of the world, knew how to use a personal computer.
Businesses' information technology departments have gone from using storage tapes created by a single computer operator to interconnected networks of employee workstations that store information in a server farm, often somewhere away from the main business site. Technology facilitate our life Technology and information may be regarded as two things are mutually binding. Both support functions that are fairly similar. Advances in technology are always facilitate the delivery of information.
The rate information from one country can spread rapidly to other countries, even to all countries, through increasingly sophisticated technology. Advances in information technology provide enormous benefit in human survival. Information technology can provide facilities in various aspects of life.
Impact of Advanced Information Technology Advances in information technology is to be grateful and appreciated as a remarkable achievement. Therefore, we must take advantage of advances in information technology is to do positive things. Why is that? In fact, advances in information technology not only provides a positive effect.
Many also brought along the negative impact of information technology advances. Here's a positive impact of information technology development.
Besides positive impacts, advances in information technology have a negative effect. As a result, anything that is required is completed in quick time to be done by utilizing flash technology as well.
Finally, human life can not be separated from the flow of information technology. Benefits from IT Information and communications technology carries on high promise both in human and economic terms. IT is useful in all areas Many tourism businesses are involved in developing their internet services including traditional travel agents , tour operators , national tourist offices, airlines , hotels and other accommodation providers and car hire firms.
Thank you for your attention JamunaS18 Jan.
0コメント