SlideShare a Scribd company logo
1 of 12
By Sadaqat Ahsan and Ansharah Ashraf
• We are surrounded by networks through
which information flows constantly.
• Information Technology cannot be
separated from our daily lives.
• IT is used in Banking, Marketing,
Educational field, Industries as well as in
“Supermarts”.
• Supermarket is a large retail Institution selling
food and household merchandise.
• It contains features like cheap prices, wide
range of goods.
• More features include no credit sales, operating
on self service basis etc.
There are many IT Equipments which are
serving as a backbone in Supermarkets.
1. Security Cameras
2. Door Frame Metal Detectors
3. Electronic Artical Surveillance (EAS)
4. Money Detector
5. Electronic Point of Sale (EPOS)
 Computer
 Displays
 Barcode Scanner
 Cash Drawer
 Weight Machine
 Payment Terminal
 Receipt Printer
1. Security Cameras:
 It covers the moments going
on in mart.
 Uses Radio Frequency
Signals.
2. Door Frame Metal
Detectors:
• Detects metal made
weapons.
• Generates a magnetic
field by short pulses of
current through the wire.
3. Electronic Artical
Surveillance:
• Prevents shop lifting.
• Uses special tags fixed with
merchandise.
• At exits EAS stands sounds
alarm when detects active tags.
• Tags are deactivated before
billing.
Money Detector
• Its a machine that detects
the security features of
bank notes.
• It helps in determining
whether any given bill is
counterfeit or genuine.
• It uses several different
methods of detection
which includes UV,
WatermarK and Metal
Thread Detection.
EPOS SOFTWARE
EPOS HARDWARE
• Its usage varies mart to mart.
• Most Important hardwares are
Computer, displays, barcode scanner,
cash drawer, payment card reader
and receipt printer.
• Other additional hardware includes
Weight machine, customer displays.
Computer DISPLAYS
BARCODE SCANNER RECIEPT PRINTER
WEIGHT MACHINE
CASH DRAWER PAYMENT
TERMINAL
• Historically, Early Pos systems were not that
advanced and had limited functions.
• In the 21st century, Microsoft access was
very common database software but
nowadays numerous softwares has taken its
place.
• 1973 IBM 3650 AND 3660(for mainframes)
• 1974,William Brobeck and Associates(first
microprocessor database software)
• 1986,First Graphical Touchscreen software
• In 2000,s ,Microsoft Access was used
• Oracle was launched
• Wide range of Pos softwares has been
developed on windows and unix.
Before After

More Related Content

Similar to Use of IT in Supermarts

Input devices lecture 5
Input devices lecture 5Input devices lecture 5
Input devices lecture 5Farheen Javed
 
Advantage, Scope & Future Possibilities
Advantage, Scope & Future PossibilitiesAdvantage, Scope & Future Possibilities
Advantage, Scope & Future PossibilitiesItachi Uchiha
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.pptNaveen Sihag
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Prachi Jain
 
Chapter 3 input and out put devices
Chapter 3   input and out put devicesChapter 3   input and out put devices
Chapter 3 input and out put devicesKhan Yousafzai
 
computer peripherals 9th ls 1.pptx
computer peripherals 9th ls 1.pptxcomputer peripherals 9th ls 1.pptx
computer peripherals 9th ls 1.pptxMVHerwadkarschool
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romquratyousaf8
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
MGT 131 LESSON 3 presentation and lesson
MGT 131 LESSON 3 presentation and lessonMGT 131 LESSON 3 presentation and lesson
MGT 131 LESSON 3 presentation and lessonMaryJaneGuinumtad
 
Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Ameer Hamxa
 
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovGab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovAZUG FR
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information TechnologySyed Zaid Irshad
 

Similar to Use of IT in Supermarts (20)

Input devices lecture 5
Input devices lecture 5Input devices lecture 5
Input devices lecture 5
 
Advantage, Scope & Future Possibilities
Advantage, Scope & Future PossibilitiesAdvantage, Scope & Future Possibilities
Advantage, Scope & Future Possibilities
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Chapter 3 input and out put devices
Chapter 3   input and out put devicesChapter 3   input and out put devices
Chapter 3 input and out put devices
 
computer peripherals 9th ls 1.pptx
computer peripherals 9th ls 1.pptxcomputer peripherals 9th ls 1.pptx
computer peripherals 9th ls 1.pptx
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and rom
 
Intro to up.pptx
Intro to up.pptxIntro to up.pptx
Intro to up.pptx
 
1.1 Input devices
1.1 Input devices1.1 Input devices
1.1 Input devices
 
1.1 Input devices
1.1 Input devices1.1 Input devices
1.1 Input devices
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
MGT 131 LESSON 3 presentation and lesson
MGT 131 LESSON 3 presentation and lessonMGT 131 LESSON 3 presentation and lesson
MGT 131 LESSON 3 presentation and lesson
 
Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)
 
I learning lot
I learning lotI learning lot
I learning lot
 
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkovGab17 lyon-the thingsofinternetofthings-by-alexandersurkov
Gab17 lyon-the thingsofinternetofthings-by-alexandersurkov
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 

Recently uploaded (20)

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 

Use of IT in Supermarts

  • 1. By Sadaqat Ahsan and Ansharah Ashraf
  • 2. • We are surrounded by networks through which information flows constantly. • Information Technology cannot be separated from our daily lives. • IT is used in Banking, Marketing, Educational field, Industries as well as in “Supermarts”.
  • 3. • Supermarket is a large retail Institution selling food and household merchandise. • It contains features like cheap prices, wide range of goods. • More features include no credit sales, operating on self service basis etc.
  • 4. There are many IT Equipments which are serving as a backbone in Supermarkets. 1. Security Cameras 2. Door Frame Metal Detectors 3. Electronic Artical Surveillance (EAS) 4. Money Detector 5. Electronic Point of Sale (EPOS)  Computer  Displays  Barcode Scanner  Cash Drawer  Weight Machine  Payment Terminal  Receipt Printer
  • 5. 1. Security Cameras:  It covers the moments going on in mart.  Uses Radio Frequency Signals. 2. Door Frame Metal Detectors: • Detects metal made weapons. • Generates a magnetic field by short pulses of current through the wire. 3. Electronic Artical Surveillance: • Prevents shop lifting. • Uses special tags fixed with merchandise. • At exits EAS stands sounds alarm when detects active tags. • Tags are deactivated before billing.
  • 6. Money Detector • Its a machine that detects the security features of bank notes. • It helps in determining whether any given bill is counterfeit or genuine. • It uses several different methods of detection which includes UV, WatermarK and Metal Thread Detection.
  • 8. EPOS HARDWARE • Its usage varies mart to mart. • Most Important hardwares are Computer, displays, barcode scanner, cash drawer, payment card reader and receipt printer. • Other additional hardware includes Weight machine, customer displays.
  • 10. BARCODE SCANNER RECIEPT PRINTER WEIGHT MACHINE CASH DRAWER PAYMENT TERMINAL
  • 11. • Historically, Early Pos systems were not that advanced and had limited functions. • In the 21st century, Microsoft access was very common database software but nowadays numerous softwares has taken its place. • 1973 IBM 3650 AND 3660(for mainframes) • 1974,William Brobeck and Associates(first microprocessor database software) • 1986,First Graphical Touchscreen software • In 2000,s ,Microsoft Access was used • Oracle was launched • Wide range of Pos softwares has been developed on windows and unix.