Solution of Information Technology Short Notes

23
WIFI Wi-Fi is a wireless networking technology that allows computers and other devices to communicate over a wireless signal. It describes network components that are based on one of the 802.11 standards developed by the IEEE and adopted by the Wi-Fi Alliance. Examples of Wi-Fi standards, in chronological order, include: 802.11a 802.11b 802.11g 802.11n 802.11ac Wi-Fi is the standard way computers connect to wireless networks. Nearly all modern computers have a built-in Wi-Fi chip that allows users to find and connect to wireless routers. Most mobile devices, video game systems, and other standalone devices also support Wi-Fi, enabling them to connect to wireless networks as well. When a device establishes a Wi-Fi connection with a router, it can communicate with the router and other devices on the network. However, the router must be connected to the Internet (via a DSL or cable modem) in order to provide Internet access to connected devices. Therefore, it is possible to have a Wi-Fi connection, but no Internet access. MICR Magnetic Ink Character Recognition is a character recognition system that uses special ink and characters. When a document that contains this ink needs to be read, it passes through a machine, which magnetizes the ink and then translates the magnetic information into characters. MICR technology is used by banks. Numbers and characters found on the bottom of checks (usually containing the check number, sort number, and account number) are printed using Magnetic Ink. To print Magnetic Ink need, you need a laser printer that accepts MICR toner. MICR provides a secure, high-speed method of scanning and processing information. Internet A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.

description

Solution of Information Technology Short Notes

Transcript of Solution of Information Technology Short Notes

Page 1: Solution of Information Technology Short Notes

WIFIWi-Fi is a wireless networking technology that allows computers and other devices to communicate over a wireless signal. It describes network components that are based on one of the 802.11 standards developed by the IEEE and adopted by the Wi-Fi Alliance. Examples of Wi-Fi standards, in chronological order, include:• 802.11a• 802.11b• 802.11g• 802.11n• 802.11ac

Wi-Fi is the standard way computers connect to wireless networks. Nearly all modern computers have a built-in Wi-Fi chip that allows users to find and connect to wireless routers. Most mobile devices, video game systems, and other standalone devices also support Wi-Fi, enabling them to connect to wireless networks as well. When a device establishes a Wi-Fi connection with a router, it can communicate with the router and other devices on the network. However, the router must be connected to the Internet (via a DSL or cable modem) in order to provide Internet access to connected devices. Therefore, it is possible to have a Wi-Fi connection, but no Internet access.

MICRMagnetic Ink Character Recognition is a character recognition system that uses special ink and characters. When a document that contains this ink needs to be read, it passes through a machine, which magnetizes the ink and then translates the magnetic information into characters. MICR technology is used by banks. Numbers and characters found on the bottom of checks (usually containing the check number, sort number, and account number) are printed using Magnetic Ink. To print Magnetic Ink need, you need a laser printer that accepts MICR toner. MICR provides a secure, high-speed method of scanning and processing information.

InternetA means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs.

No one owns Internet, although several organizations the world over collaborate in its functioning and development. The high-speed, fiber-optic cables (called backbones) through which the bulk of the Internet data travels are owned by telephone companies in their respective countries.The Internet grew out of the Advanced Research Projects Agency's Wide Area Network (then called ARPANET) established by the US Department Of Defense in 1960s for collaboration in military research among business and government laboratories. Later universities and other US institutions connected to it. This resulted in ARPANET growing beyond everyone's expectations and acquiring the name 'Internet.'

The development of hypertext based technology (called World Wide web, WWW, or just the Web) provided means of displaying text, graphics, and animations, and easy search and navigation tools that triggered Internet's explosive worldwide growth.

Page 2: Solution of Information Technology Short Notes

Social Networking:A social structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, animals, computers or other information/knowledge processing entities.The use of internet-based social media programs to make connections with friends, family, classmates, customers and clients. Social networking can be done for social purposes, business purposes or both. The programs show the associations between individuals and facilitate the acquisition of new contacts.

Cyber CrimeCybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.Cybercrime may also be referred to as computer crime.

Common types of cybercrime include online bank information theft, identity theft, online predatory crimes and unauthorized computer access. More serious crimes like cyberterrorism are also of significant concern.

Cybercrime encompasses a wide range of activities, but these can generally be broken into two categories:• Crimes that target computer networks or devices. These types of crimes include

viruses and denial-of-service (DoS) attacks.

• Crimes that use computer networks to advance other criminal activities. These types of crimes include cyberstalking, phishing and fraud or identity theft.

The FBI identifies cybercrime fugitives who have allegedly committed bank fraud and trafficked counterfeit devices that access personal electronic information. The FBI also provides information on how to report cybercrimes, as well as useful intelligence information about the latest cybercriminals.

Bandwith

Definition: Bandwidth in computer networking refers to the data rate supported by a network connection or interface. One most commonly expresses bandwidth in terms of bits per second (bps). The term comes from the field of electrical engineering, where bandwidth represents the total distance or range between the highest and lowest signals on the communication channel (band). Bandwidth represents the capacity of the connection.

The greater the capacity, the more likely that greater performance will follow, though overall performance also depends on other factors, such as latency.

Page 3: Solution of Information Technology Short Notes

Bandwidth is the difference between the upper and lower frequencies in a continuous set of frequencies. It is typically measured in hertz, and may sometimes refer to passband bandwidth, sometimes to baseband bandwidth, depending on context.

What does Wireless Network mean?Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure.

Wireless networks use radio waves to connect devices such as laptops to the Internet, the business network and applications. When laptops are connected to Wi-Fi hot spots in public places, the connection is established to that business’s wireless network.

There are four main types of wireless networks: • Wireless Local Area Network (LAN): Links two or more devices using a wireless

distribution method, providing a connection through access points to the wider Internet.

• Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.• Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and cities.• Wireless Personal Area Network (PAN): Interconnects devices in a short span,

generally within a person’s reach.

Definition - What does Algorithm mean?An algorithm is a step by step method of solving a problem. It is commonly used for data processing, calculation and other related computer and mathematical operations.An algorithm is also used to manipulate data in various ways, such as inserting a new data item, searching for a particular item or sorting an item.

An algorithm is a detailed series of instructions for carrying out an operation or solving a problem. In a non-technical approach, we use algorithms in everyday tasks, such as a recipe to bake a cake or a do-it-yourself handbook.

.Technically, computers use algorithms to list the detailed instructions for carrying out an operation. For example, to compute an employee’s paycheck, the computer uses an algorithm. To accomplish this task, appropriate data must be entered into the system. In terms of efficiency, various algorithms are able to accomplish operations or problem solving easily and quickly.

Definition - What does Microcomputer mean?A microcomputer is a computer with a central processing unit (CPU) as a microprocessor. Designed for individual use, a microcomputer is smaller than a mainframe or a minicomputer.

The term microcomputer is not as commonly used as it was during the 1970s-1980s. We now refer to microcomputers as, simply, computers, or personal computers (PC).

Page 4: Solution of Information Technology Short Notes

A microcomputer's CPU includes random access memory (RAM), read-only memory (ROM) memory, input/output (I/O) ports, interconnecting wires and a motherboard.In 1970, Hewlett-Packard (HP) manufactured and released a microcomputer as a calculator with varying levels of programmability, although the Datapoint 2200 by Computer Terminal Corporation (CTC) is credited as the first microcomputer. Intel’s x86 processor family can also be traced back to CTC’s release.

Definition - What does Bluetooth mean?Bluetooth is an open wireless technology standard for transmitting fixed and mobile electronic device data over short distances. Bluetooth was introduced in 1994 as a wireless substitute for RS-232 cables.

Bluetooth communicates with a variety of electronic devices and creates personal networks operating within the unlicensed 2.4 GHz band. Operating range is based on device class. A variety of digital devices use Bluetooth, including MP3 players, mobile and peripheral devices and personal computers.

Definition - What does Application Software mean?Application software is a program or group of programs designed for end users. These programs are divided into two classes: system software and application software. While system software consists of low-level programs that interact with computers at a basic level, application software resides above system software and includes database programs, word processors, spreadsheets, etc. Application software may be grouped along with system software or published alone.Application software may simply be referred to as an application.

Definition - What does Digital Signature mean?A digital signature guarantees the authenticity of an electronic document or message in digital communication and uses encryption techniques to provide proof of original and unmodified documentation.

Digital signatures are used in e-commerce, software distribution, financial transactions and other situations that rely on forgery or tampering detection techniques.

A digital signature is applied and verified, as follows:• The document or message sender (signer) or public/private key supplier shares the public key with the end user(s).• The sender, using his private key, appends the encrypted signature to the message or document.• The end user decrypts the document and verifies the signature, which lets the end user know that the document is from the original sender.

Definition - What does Intelligent Character Recognition (ICR)mean?Intelligent character recognition (ICR) is a computer-based interpretation of handwritten or printed characters so that they can be transcribed into a standardized format that can be recognized and understood by a computer.

Page 5: Solution of Information Technology Short Notes

ICR and optical character recognition (OCR) have essentially the same meaning. Before these technologies were developed, written text was transformed into digital form by a data entry specialist, who continually typed written text with a keyboard.OCR/ICR technologies have since been substituted for older manual methods.

The most common input device for characters in written, no digital form is a scanner. These characters are processed by a digital signal processing-based (DSP-based) program, which compares characters within a stored database. This process is typically followed by a confirmation process based on a built-in dictionary that suggests matches closest to the entered characters.

Today, scanning is the only manual part of the process, and it is much faster than entering characters individually. ICR-based programs have the capacity to achieve high-recognition accuracy exceeding 98 percent. This is the same realized percentage of a data entry specialist, but it is accomplished within a shorter period of time.

Definition - What does Audit Trail mean?An audit trail, in the context of IT, is a chain of evidence in the form of hard or electronic business transactions or communications resulting from business processes, functions or programming executions.

An audit trail describes the chronological sequence of transactions, communications or both, and serves as a tool for facilitating financial or legal research and investigations to verify that all involved parties are fair, honest and truthful.

An audit trail may involve a specific purchase, sale or instance of noncompliance and includes a number of applications across a variety of fields, including:• Telecommunications• Information security/auditing• Communication security/auditing• Accounting (hard copy or electronic documentation)• Medical investigations• Research investigations• Legal investigations

Definition - What does Call Center mean?A call center is a facility that handles inbound and/or outbound calls on behalf of an organization. For example, a call center may handle customer service calls, complaints or other issues related to a company's products and services. The function of a call center is strictly focused on large telephone call volume beyond an organization's internal capabilities and infrastructure.

Today, call center operations are regularly outsourced to third-party service providers - many with operators that work from third-world countries, where telecommunication labor costs are low. Additinally, most call center services include some type of incorporated automation.

Inbound call centers handle customer inquiries and support, while outbound call centers handle telemarketing or communicate with customers about the products and services of a

Page 6: Solution of Information Technology Short Notes

company. Some call centers are part of a larger conglomerate of servicing known as contact centers, which provide phone, fax, email and live chat communication.

Definition - What does Programming Language mean?A programming language is a computer language engineered to create a standard form of commands. These commands can be interpreted into a code understood by a machine. Programs are created through programming languages to control the behavior and output of a machine through accurate algorithms, similar to the human communication process.

A programming language is also known as a programming system, computer language or computer system.

A programming language is typically divided into two elements: syntax and semantics. There is pretty much always a specification document to define both elements. For example, an ISO standard defines C, while Perl has a dominant implementation used as a reference.

An algorithm is described using the programming language. Programming languages are typically called computer languages; however, some authors deem programming languages to be subsets of computer languages. Since the oldest forms of programming languages like COBOL and FORTRAN, thousands of computer languages have been developed.

Definition - What does Cache Memory mean?Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to a processor and stores frequently used computer programs, applications and data. It stores and retains data only until a computer is powered up.

Cache memory is the fastest memory in a computer. It is typically integrated on the motherboard and directly embedded on the processor or main random access memory (RAM).

Cache memory provides faster data storage and access by storing an instance of programs and data routinely accessed by the processor. Thus, when a processor requests data that already has an instance in the cache memory, it does not need to go to the main memory or the hard disk to fetch the data.

Cache memory can be primary or secondary cache memory, where primary cache memory is directly integrated or closest to the processor. In addition to hardware-based cache, cache memory also can be a disk cache, where a reserved portion on a disk stores and provide access to frequently accessed data/applications from the disk.

Definition - What does Fiber Optic mean?Fiber optic refers to the technology and medium used in the transmission of data as pulses of light through a strand or fiber medium made of glass or plastic (optical fiber), versus being sent as electrical pulses through conductive metal, like copper wires. Optical fiber technology can carry much more data than conventional copper wires and is less prone to electromagnetic interference, simply because data is transmitted in the form of light, rather than electricity.

Page 7: Solution of Information Technology Short Notes

Fiber optic technology uses glass fibers to transmit data at blazing fast speeds, although not as fast as the speed of light. This is because the general notion of the speed of light, which is 299,792,458 meters per second, occurs in a vacuum. In reality, the speed at which light travels greatly varies, depending on the medium through which it passes.To decode data, special hardware with light sensors is needed for each terminal of the fiber optic cable. This technology is considerably more expensive because manufacturing this type of cable is more expensive, and even connecting two ends requires expensive measures.

CPUCPU (pronounced as separate letters) is the abbreviation forcentral processing unit.Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computerwhere most calculations take place. In terms of computing power, the CPU is the most important element of a computer system. Alternatively referred to as the brain of the computer, processor, central processor, or microprocessor, the CPU (pronounced as C-P-U), short for Central Processing Unit, was first developed at Intel with the help of Ted Hoff in the early 1970's. The computer CPU is responsible for handling all instructions it receives fromhardware and software running on the computer.

Definition - What does Flowchart mean?A flow chart is a type of diagram representing a process using different symbols containing information about steps or a sequence of events. Each of these symbols is linked with arrows to illustrate the flow direction of the process.

Flowcharts are a methodology used to analyze, improve, document and manage a process or program. Flowcharts are helpful for:

1. Aiding understanding of relationships among different process steps2. Collecting data about a particular process3. Helping with decision making4. Measuring the performance of a process5. Depicting the structure of a process6. Tracking the process flow7. Highlighting important steps and eliminating the unnecessary steps

A flowchart in computer science typically has the following types of symbols to represent a process or program:

Utility SoftwareUtility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, softwareand data storage) operates.

Definition - What does System Software mean?System software is a platform comprised of Operating System (OS) programs and services, including settings and preferences, file libraries and functions used for system applications. System software also includes device drivers that run basic computer hardware and peripherals.

Page 8: Solution of Information Technology Short Notes

System software is run by the OS, versus end users. Because system software runs in the background at a basic level, it is considered low-level software.

Basic examples of system software include:

• Utility software• System servers• Device drivers• Operating system (OS)• Windows/graphical user interface (GUI) systems

Definition - What does Database Software mean?Database software is a software program or utility used for creating, editing and maintaining database files and records. This type of software allows users to store data in the form of structured fields, tables and columns, which can then be retrieved directly and/or through programmatic access.

Database software is also known as database management software (DBMS), although these terms are not exact synonyms.Database software is primarily used to store and manage data/databases, typically in a structured format. It generally provides a graphical interface that allows users to create, edit and manage data fields and records in a tabular or organized form. The data/database stored using this software can be retrieved in a raw or report based format.

Although database software is similar to database management software (DBMS), most database software lacks native language support, such as SQL, MySQL or any other database querying language. For example, MS Access software allows users to create, manage and query a database using its GUI controls and features, without having to write programming queries.

Definition - What does Backup Software mean?Backup software is any application that enables the backup of files, folders, documents, software data, most data types and the computer/server as a whole. Backup software enables the creation of an exact duplicate of computer files that can be used for restoring the original files in case of file corruption, accidental/intentional deletion or a disaster.

Backup software is primarily used as means to keep a backup of important data residing on computer or server hard drives. It can be used for local/individual computers or for an enterprise’s computers, servers and networking devices. Backup software for individual use generally backs up selected files, folders and important operating system files on the same computer/hard drive. The advanced or enterprise-level software is typically integrated within each computer, server or node and backs up selected files and folders on a scheduled basis or as required. The backup software transmits the duplicated/backup data over the network/Internet to a local backup server or on an Internet/cloud-based backup storage server.Backup software also has the ability to compress data to reduce the amount of backup space required, as well as versioning control for maintaining different versions of the same file.

Definition - What does Multi-Processing mean?

Page 9: Solution of Information Technology Short Notes

Multi-processing refers to the ability of a system to support more than one processor at the same time. Applications in a multi-processing system are broken to smaller routines that run independently. The operating system allocates these threads to the processors improving performance of the system.

Definition - What does Enterprise Resource Planning (ERP)mean?Enterprise resource planning (ERP) is a method of efficiently utilizing people, hardware and software to increase productivity and profit, thus simplifying a company’s business processes. ERP may include many software applications or a single (but more complexes) software package that smoothly disseminates data required by two or more unique business departments.

An enterprise resource planning system (ERP system) is an information system that incorporates enterprise-wide internal and external information systems into a single unified solution.ERP systems integrate the software, hardware and network resources essential for building an enterprise resource planning (ERP) information system solution. ERP systems aim to streamline business processes.

Definition - What does Extranet mean?An extranet is a controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information, typically about a specific company or educational institution, and do so without granting access to the organization's entire network. An extranet is often a private part of a website. It is restricted to select users through user IDs, passwords and other authentication mechanisms on a login page.

Definition - What does Payload mean(computer virus)?A payload refers to the component of a computer virus that executes a malicious activity. Apart from the speed in which a virus spreads, the threat level of a virus is calculated by the damages it causes. Viruses with more powerful payloads tend to be more harmful.

Although not all viruses carry a payload, a few payloads are considered extremely dangerous. Some of the examples of payloads are data destruction, offensive messages and the delivery of spam emails through the infected user's account.A payload is also known as a destructive payload.

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

Definition - What does Computer-Aided Design (CAD) mean?Computer-aided design (CAD) is a computer technology that designs a product and documents the design's process. CAD may facilitate the manufacturing process by transferring detailed diagrams of a product’s materials, processes, tolerances and

Page 10: Solution of Information Technology Short Notes

dimensions with specific conventions for the product in question. It can be used to produce either two-dimensional or three-dimensional diagrams, which can then when rotated to be viewed from any angle, even from the inside looking out. A special printer or plotter is usually required for printing professional design renderings.The concept of designing geometric shapes for objects is very similar to CAD. It is called computer-aided geometric design (CAGD).CAD is also known as computer-aided design and drafting (CADD)

SWIFTSociety for Worldwide Interbank Financial Telecommunications. Global communication network that facilitates 24-hour secure international exchange of payment instructions between banks, central banks, multinational corporations, and major securities firms. A member owned cooperative organized in 1977 under Belgium law, it now includes over 6,500 participating members from more than 180 countries which together process in excess of a billionmessages every year (about 300 million messages every day). See also chips.

Definition - What does Voice Over Internet Protocol (VoIP)mean?Voice over Internet Protocol (VoIP) is a technology used for delivering different kinds of data from a source to a destination using IP (Internet Protocol). The data may be in many forms, including files, voice communication, pictures, fax or multimedia messages. VoIP is most often used for telephone calls, which are almost free of charge.

Definition - What does Monitor mean?A monitor is an electronic visual computer display that includes a screen, circuitry and the case in which that circuitry is enclosed. Older computer monitors made use of cathode ray tubes (CRT), which made them large, heavy and inefficient. Nowadays, flat-screen LCD monitors are used in devices like laptops, PDAs and desktop computers because they are lighter and more energy efficient.

Real Time Processing:The continuous and automatic processing of data as it occurs in order to generate systematic output used to analyze system functions and ongoing procedures. Real time processing is critical to maintain proper functionality of automated or continuously operated systems such as assembly line robots and radar systems.

Definition - What does Electronic Commerce (E-Commerce)mean?Electronic commerce (e-commerce) is the marketing, buying and selling of merchandise or services over the Internet. It encompasses the entire scope of online product and service sales from start to finish. E-commerce tools include computer platforms, applications, solutions, servers and various software formats manufactured by e-commerce service providers and purchased by merchants to increase online sales.E-commerce facilitates the growth of online business. It is categorized as follows:

• Online marketing• Online advertising• Online sales

Page 11: Solution of Information Technology Short Notes

• Product delivery• Product service• Online billing• Online payments

Definition - What does High-Level Language (HLL) mean?High-level language is any programming language that enables development of a program in much simpler programming context and is generally independent of the computer's hardware architecture.

High-level language has a higher level of abstraction from the computer, and focuses more on the programming logic rather than the underlying hardware components such as memory addressing and register utilization.

Definition - What does Universal Product Code (UPC) mean?The Universal Product Code (UPC) is a 12-digit barcode that is assigned to a consumer product for identifying it and its manufacturer. The barcode consists of a series of variable-width vertical bars and was originally created by IBM in 1973 for tracking merchandise in stores, mainly at the point of sale (POS). The use of UPC has since spread to other countries as well, such as the UK, Canada, Australia, etc.

The UPC standard is maintained and regulated by GS1, an international non-profit organization that maintains and develops standards for supply-and-demand chains across multiple industry sectors.

E-mailE-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binarystreams. E-mail was one of the first uses of the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private.

Email is a system for sending messages from one individual to another via telecommunications links between computers or terminals usingdedicated software:

Definition - What does Online Banking mean?Online banking refers to banking services where depositors can manage more aspects of their accounts over the Internet, rather than visiting a branch or using the telephone. Online banking typically is comprised of a secure connection to banking information through the depositor’s home computer or another device.

Online banking offers several main benefits to depositors. It provides a real-time view of finances and eliminates the need for numerous visits to a bank teller. It can also take the place of balancing a checkbook and other tedious tasks common to paper-based banking.

Page 12: Solution of Information Technology Short Notes

Depositors can monitor each transaction in an accessible user interface to understand how credits, deposits, deductions and payments affect their account's balance.

ASCIIASCII (American Standard Code for Information Interchange) is the most common formatfor text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128 possible characters are defined.UNIX and DOS-based operating systems use ASCII for text files. Windows NT and 2000 uses a newer code, Unicode. IBM's S/390 systems use a proprietary 8-bit code called EBCDIC. Conversion programs allow different operating systems to change a file from one code to another.ASCII was developed by the American National Standards Institute (ANSI).

Definition - What does Business Process Outsourcing (BPO)mean?Business process outsourcing (BPO) is the contracting of non-primary business activities and functions to a third-party provider. BPO services include payroll, human resources (HR), accounting and customer/call center relations.

BPO is also known as Information Technology Enabled Services (ITES).Techopedia explains Business Process Outsourcing (BPO)BPO categories are front office customer services (such as tech support) and back office business functions (such as billing).

The following are BPO advantages:• Business process speed and efficiency are enhanced.• Employees may invest more time in core business strategies to bolster

competitive advantage and enhance value chain engagement. • Organizational growth increases when capital resource and asset expenditures are

not required, which averts problematic investment returns.• Organizations are not required to invest in unrelated primary business strategy

assets, facilitating a shift in focus to specific competencies.BPO risks include:

• Data privacy breaches• Underestimated running costs• Overdependence on service providers

Definition - What does Storage Device mean?A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.A storage device may also be known as a storage medium.

Definition - What does Primary Storage Device mean?A primary storage device is any storage device or component that can store nonvolatile data in computers, servers and other computing devices. It is used to hold/store data and applications temporarily or for a shorter period of time while the computer is running.Primary storage is also known as main storage, main memory or internal memory.

Page 13: Solution of Information Technology Short Notes

Primary storage devices are internal to the system and are the fastest of the memory/storage device category. Typically, primary storage devices have an instance of all the data and applications currently in use or being processed. The computer fetches and keeps the data and files it in the primary storage device until the process is completed or data is no longer required. Random access memory (RAM), graphic card memory and cache memory are common examples of primary storage devices.

Definition - What does Secondary Storage Device mean?A secondary storage device refers to any volatile storage device that is internal or external to the computer. It can be any storage device beyond the primary storage that enables permanent data storage.A secondary storage device is also known as an auxiliary storage device or external storage.Secondary storage devices are primarily referred to a storage devices that serve as an addition to the computer's primary storage, RAM and cache memory. Typically, secondary storage allows for the storage of data ranging from a few megabytes to petabytes. These devices store virtually all programs and applications stored on a computer, including the operating system, device drivers, applications and general user data. Most of the secondary storage devices are internal to the computer such as the hard disk drive, the tape disk drive and even the compact disk drive and floppy disk drive.

Definition - What does Binary Number System mean?The binary number system is a numbering system that represents numeric values using two unique digits (0 and 1). Mosting computing devices use binary numbering to represent electronic circuit voltage state, (i.e., on/off switch), which considers 0 voltage input as off and 1 input as on.

This is also known as the base-2 number system, or the binary numbering system.Microcontrollers only use binary logic in computing. Compare this to the decimal numbering system, which is comprised of 10 unique digits (0-9). For example, a user input of 345 (in decimals) is 101011001 in binary form.

What does Binary Number System mean?The Octal Number System is another type of computer and digital base number system. TheOctal Numbering System is very similar in principle to the previous hexadecimal numbering system except that in Octal, a binary number is divided up into groups of only 3 bits, with each group or set of bits having a distinct value of between 000 (0) and 111 ( 4+2+1 = 7 ).

Octal numbers therefore have a range of just “8” digits, (0, 1, 2, 3, 4, 5, 6, 7) making them a Base-8 numbering system and therefore, q is equal to “8”.

Then the main characteristics of an Octal Numbering System is that there are only 8 distinct counting digits from 0 to 7 with each digit having a weight or value of just 8 starting from the least significant bit (LSB). In the earlier days of computing, octal numbers and the octal numbering system was very popular for counting inputs and outputs because as it works in counts of eight, inputs and outputs were in counts of eight, a byte at a time.

Page 14: Solution of Information Technology Short Notes

As the base of an Octal Numbers system is 8 (base-8), which also represents the number of individual numbers used in the system, the subscript 8 is used to identify a number expressed in octal. For example, an octal number is expressed as: 2378

Just like the hexadecimal system, the “octal number system” provides a convenient way of converting large binary numbers into more compact and smaller groups. However, these days the octal numbering system is used less frequently than the more popular hexadecimal numbering system and has almost disappeared as a digital base number system.

Definition - What does Keyboard mean?A keyboard is a peripheral device that enables a user to input text into a computer or any other electronic machinery. A keyboard is an input device and is the most basic way for the user to communicate with a computer. This device is patterned after its predecessor, the typewriter, from which the keyboard inherited its layout, although the keys or letters are arranged to function as electronic switches. The keys include punctuation, alphanumeric and special keys like the Windows key and various multimedia keys, which have specific functions assigned to them.

There are different types of keyboard layouts manufactured based on the region and language used. QWERTY: This layout is the most widely used and is named after the first six letters that appear on the top row. This layout is commonly manufactured today because of its popularity. It is so common across the world - even in countries that do not use the Latin-based alphabet for their language - that some people think that it is the only kind of keyboard there is. AZERTY: This was developed in France as another variation to the QWERTY layout and is considered the standard French keyboard. DVORAK: This layout was created to reduce finger movement when typing and produce faster typing speeds than QWERTY or AZERTY.

.

Definition - What does Management Information System (MIS)mean?A management information system (MIS) is a broadly used and applied term for a three-resource system required for effective organization management. The resources are people, information and technology, from inside and outside an organization, with top priority given to people. The system is a collection of information management methods involving computer automation (software and hardware) or otherwise supporting and improving the quality and efficiency of business operations and human decision making.As an area of study, MIS is sometimes referred to as IT management (information technology management) or information services (IS). Neither should be confused with computer science.

Techopedia explains Management Information System (MIS)It is important to note that a management information system should not only indicate the status of a business’s conditions, but also indicate why the conditions are improving or deteriorating. For example, an MIS should report performance relative to cost and profitable or unprofitable projects, while identifying individual accountability – both current and past. This can be done only if such reports are based on constantly updated information accessible to those in authority who are responsible for assessing and assuring it is used for timely decision-making.Examples of the broad scope and varied contexts of MISs are:

Page 15: Solution of Information Technology Short Notes

• Decision Support Systems• Enterprise Resource Planning (ERP)• Supply Chain Management• Customer Relationship Management (CRM)• Project Management• Executive Information Systems (EIS)The term MIS and "information system" are often confused. Information systems, by themselves, are differentiated from the decision-making process. Of course, the data within them may facilitate the decision-making process.

Definition - What does Input/Output Device (I/O Device)mean?An input/output (I/O) device is a hardware device that has the ability to accept inputted, outputted or other processed data. It also can acquire respective media data as input sent to a computer or send computer data to storage media as storage output.

An I/O device is also known as an IO device.Input devices provide input to a computer, while output devices provide a way for a computer to output data for communication with users or other computers. An I/O device is a device with both functionalities.

Because I/O device data is bi-directional, such devices are usually categorized under storage or communications. Examples of I/O storage devices are CD/DVD-ROM drives, USB flash drives and hard disk drives. Examples of communication I/O devices are network adapters, Bluetooth adapters/dongles and modems.

Definition - What does Batch Processing mean?Batch processing is a general term used for frequently used programs that are executed with minimum human interaction. Batch process jobs can run without any end-user interaction or can be scheduled to start up on their own as resources permit.

.Batch jobs are designed so that all input data is preselected through scripts or command-line parameters. The major benefits of using batch processes are: • The ability to share computer resources among users and programs• The ability to shifting job processing time to other resources that are less busy• The ability to avoid idling computer resources with manual intervention and

supervision• The amortization of computer cost