The document provides an introduction to information technology and software applications. It discusses:
- The increasing prevalence of computers and how software contributed to this growth.
- The shifts in computing paradigms from host-centric to client-server to network-centric models.
- Common types of application software including word processors, spreadsheets, databases, and presentations.
- How application software transforms raw data into useful information for users, with examples involving student records and smart cards.
Artificial intelligence and its impact on jobs and employmentafp11saurabhj
This presentation outlines the impact of AI on employment and jobs. which jobs will get obsolete faster and how the education system should change to reap the benefits of AI developments.
Artificial intelligence and its impact on jobs and employmentafp11saurabhj
This presentation outlines the impact of AI on employment and jobs. which jobs will get obsolete faster and how the education system should change to reap the benefits of AI developments.
Insurers need to evolve and view AI as a game-changing technology. Learn how 86% of UKI Insurers agree that technology is advancing at an exponential rate.
Power Point Presentation on Artificial Intelligence and Cool Current Projects...PuneetGautam6
It is a Powerpoint Presentation on Artificial Intelligence and Current Projects of AI have also been covered on this powerpoint presentation. Some videos have also been added to it and you can mail to me for full ppt at me.punit.as@gmail.com
Artificial Intelligence (A.I) and Its Application -SeminarBIJAY NAYAK
this presentation includes the the Basics of Artificial Intelligence and its applications in various Field. feel free to ask anything. Editors are always welcome.
History of Computer, History of Computing, Evolution of Computer, Generations of Computer, Past Present and Future of Computer, Abacus, Differential Engine, Analytical Engine
Artificial intelligence or AI in short is the latest technology on which the whole world is working today. We at myassignmenthelp.net are providing help with all the assignments and projects. So when ever you need help with any work related to AI feel free to get in touch
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
Insurers need to evolve and view AI as a game-changing technology. Learn how 86% of UKI Insurers agree that technology is advancing at an exponential rate.
Power Point Presentation on Artificial Intelligence and Cool Current Projects...PuneetGautam6
It is a Powerpoint Presentation on Artificial Intelligence and Current Projects of AI have also been covered on this powerpoint presentation. Some videos have also been added to it and you can mail to me for full ppt at me.punit.as@gmail.com
Artificial Intelligence (A.I) and Its Application -SeminarBIJAY NAYAK
this presentation includes the the Basics of Artificial Intelligence and its applications in various Field. feel free to ask anything. Editors are always welcome.
History of Computer, History of Computing, Evolution of Computer, Generations of Computer, Past Present and Future of Computer, Abacus, Differential Engine, Analytical Engine
Artificial intelligence or AI in short is the latest technology on which the whole world is working today. We at myassignmenthelp.net are providing help with all the assignments and projects. So when ever you need help with any work related to AI feel free to get in touch
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
1. What is IT infrastructure and what are its components?
2.What are the stages and technology drivers of IT infrastructure evolution?
3. What are the current trends in computer hardware platforms? Describe the evolving mobile
platform, grid computing, and cloud computing
4. What are the current trends in software platforms? Define and describe open source software
and Linux and explain their business benefits.
5.What are the challenges of managing IT infrastructure and management solutions? Name and
describe the management challenges posed by IT infrastructure
Solution
1.IT infrastructure is defined as a shared technology resources which is sum of all free and
licensed system software,third party services,owned or leased equipment that provide the
platform for the firm’s specific information system applications. IT infrastructure includes
hardware, software, and services that are shared across the entire firm.
2.The stages of IT infrastructure evolutions is began on the year 1930 and still it is continuing.
Electronic Accounting Machine-(1930-1950)->This era is began to replace Human effort from
accounting work.Machine started doing accounting and finance work effectivly and much more
errorfree than Human.
General-Purpose mainframe and minicomputer Era(1959-continuing)->This era has been started
by IBM, And it still persist in the position of supplying mainframe computer.Mainframe
computers are centralized computing with networks of terminal concentrated in the computing
department.In the mean while early models contained proprietary software and data.Mainframe
comuters able to process a wide variety of software and data ,It could able to process huge
amounts of data and transmission.
Personal Computer Era(1980 to Present)->Personal computers make a boom in both Home and
corporate sector .Personal computer makers like Microsoft and Apple take forward the evolution
by providing Desktops and Laptops which doubles the User effort.
Client/Server Era(1983 to Present)->as the desktop and laptop personal computers became more
powerful and cheaper, businesses began using them to replace mini-computers and some
mainframe computers by networking them together. Think of an octopus, with the body
representing the server and the tentacles representing the clients. At the heart of every network is
a server. It can be a mainframe, midrange, minicomputer, workstation, or a souped-up personal
computer.The client computer is the node on the network that users need to access and process
transactions and data through the network. Rather than one server trying to do it all, each server
is assigned a specific task on an application server.
Enterprise Internet computing Era(1992 to Present)->Perhaps no other era has seen the explosive
growth in functionality and popularity as this era. The problems created by proprietary, closed
systems are being solved by the standards and open-source software created in this era. The
promise of truly integrated hardware, softwar.
Computer Software Ultimate History and BenefitsTyler Aaron
Computer software is a couple of directions, data, or programs applied to use pcs and perform specific tasks. It is the alternative to equipment, which explains the bodily aspects of a computer. Actually, Computer software is just a universal term applied to reference purposes, texts, and programs that run using a device
For more details Please visit our Website
https://csubmit.com/
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Olivia Moran
This document will explore the technologies used for pervasiveness in an attempt to determine whether or not the technology infrastructure needed to implement the pervasive vision is really there yet. The different hardware and software used by professionals to create pervasive solutions will be examined.
It will focus on the limitations of mobile devices, the operating systems they will use, Wireless Application Protocol (W.A.P.), Transmission Control Protocol and the Internet Protocol (TCP/IP). Also examined is the over use of ad hoc solutions. Wireless networks and protocols as well as the software used for pervasive application development will be examined.
It will illustrate how seamless communication occurs and the role that network operators and the handover process play in the achievement of this goal. It will consider how a lack of standards is impacting on the success and growth of the pervasive industry as well as the issue of user acceptance.
BBA 3551, Information Systems Management Course Learn.docxtarifarmarie
BBA 3551, Information Systems Management
Course Learning Outcomes for Unit III
Upon completion of this unit, students should be able to:
8. Evaluate major types of hardware and software used by organizations.
8.1 Describe the features of a chosen NoSQL database.
8.2 Discuss how the use of a NoSQL database will affect competitive strategies in this era of IoT
(Internet of Things).
Course/Unit
Learning Outcomes
Learning Activity
8.1
Unit Lesson
Chapter 5
Unit III PowerPoint Presentation
8.2
Unit Lesson
Chapter 4
Chapter 5
Unit III PowerPoint Presentation
Reading Assignment
Chapter 4: Hardware, Software, and Mobile Systems, Q4-1 – Q4-7
Chapter 5: Database Processing, Q5-1 – Q5-7
Unit Lesson
In Unit II, we investigated ways that information systems (IS) can support collaboration, and we reviewed
Porter’s five forces model. In this unit, we will discuss the basic concepts of hardware and software. We will
also discuss open source software development and database management systems and compare the
differences between native and thin-client applications. Lastly, we will explore mobile systems and the
characteristics of quality mobile user experiences.
It is important that business professionals understand hardware components, types of hardware, and
computer data. We will start with bits and bytes. Computers use bits to represent basic units of data such as
ones and zeros. You should know the difference between bits, bytes, kilobytes, megabytes, gigabytes,
terabytes, petabytes, and exabytes (see Figure 1).
Term Definition Abbreviation
Byte A group of binary bits
Kilobyte 1,024 bytes K
Megabyte 1,024 K or 1, 048, 576 bytes MB
Gigabyte 1,024 MB or 1,073,741,824 bytes GB
Terabyte 1,024 GB or 1,099,511,627,776 bytes TB
Petabyte 1024 TB or 1, 125,899,906,842,624 bytes PB
Exabyte 1,024 PB or 1,152,921,504,606,846,976 bytes EB
Figure 1: Storage capacity terminology
(Kroenke & Boyle, 2017)
UNIT III STUDY GUIDE
Hardware, Software, and Mobile
Systems and Database Processing
BBA 3551, Information Systems Management 2
UNIT x STUDY GUIDE
Title
A byte generally contains eight bits. A switch can be open or closed. An open switch represents 0 or off, and
a closed switch represents 1 or on. Bits are basic units of data, such as ones and zeros, while data can be
represented by variables such as numbers, images, graphics, and characters to name a few (Kroenke &
Boyle, 2017).
The categories of computer software are clients and servers. Personal computers (PCs) use non-mobile
operating systems (OSs) such as Microsoft (MS) Windows and Apple Macintosh (Mac) OS X. Remember that
OSs are developed for specific hardware and are often referred to as native applications. In other words, MS
Windows was created specifically for hardware-based PC systems, so you cannot install MS Windows on an
Apple Mac as a base OS, nor can you install the Apple OS on a PC-based.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A Survey of Techniques for Maximizing LLM Performance.pptx
Introduction to it application
1. UNIT 1 - Introduction
1. Introduction
The increasing use of computers in the last few decades has seen the ascendance of information technology to a position of
prevalence in human affairs. In our homes & offices today we have more computers than there are people who live & work. In this
semester we shall look into how & what software contributed to this growth and as well its relationship to Open Standards.
We have already understood Open Standard and Open Source in the previous semester. To recap, open standards promote…..
Interoperability
Prevents vendor lock-in
Flexibility
Collaborative innovation
Lower cost
Freedom of action
Also, we have understood that going forward Open Source software is there to exist for long time, to promote…..
Lower Cost of Ownership
Quality
Innovative reuse
Technical competence
In this context, we have to remember that sharing of software for enhancements & reuse is not new, but it has been there from the
days of sharing printed copies of programs along with the hardware. In the 1960’s IBM distributed the source code of mainframe
operating system, Airline Control Program (ACP). All the software available was usually supplied by IBM without additional charge.
One more thing to remember is the start of software industry when hardware manufacturers unbundled software and services from
hardware sales and end users had to pay for the software, which in turn brought in third party’s to develop software that works on a
given piece of hardware.
In this semester, particularly we will discuss about programs (software) that make use of OS capabilities and instruct the computer,
how to produce information.
Programs are the software. Software can be written in numerous programming languages. A programming language is used to
express the instructions which tell the computer what to do in response to a certain action. Software could be broadly divided into 3
sections:
Operating systems (OS). Communicates with the hardware. Acts as basis on which other software runs. The means by which
other programs and the user interact. E.g DOS, Linux, Windows, UNIX and Macintosh.
Languages. To write the software e.g.C, Smalltalk, C++, Java, JavaScript
Applications. Enables the user to carry out various activities e.g. Word, Photoshop, …
2. 2. Understanding Information Technology
What is Information Technology (IT) ??
As defined in Information Technology Association of America (ITAA) “IT” is study, design, development, implementation, support or
management of computer based information system particularly software’s applications & computer hardware.
It deals with treatment of information, and is one of the corner stones of our economy while forging a computer based society.
(Others are Land, Labour, & Capital)
3. The term “IT” in its modern sense first appeared in a 1958 article published in the Harvard Business Review, in which authors
Leavitt and Whisler commented that "the new technology does not yet have a single established name. We shall call it information
technology (IT)."
Information technology (IT) has proven to be a key enabler of socioeconomic progress and development, enhancing productivity
and therefore economic growth, reducing poverty and improving living standards in many ways. IT is increasingly revolutionizing
production processes, access to markets, and information sources together with social interactions. IT also has an impact on
government efficiency, fostering transparency and better communication and services with and to citizens.
Information technology (IT) is a defining force affecting all areas of society well into the next century, changing every institution,
every business, and every individual in profound ways. Technology itself has changed dramatically in the past 15-20 years.
Anticipate even more rapid change in the future, changes that impact organizations and society.
Within a short span of time we have seen better algorithms, many fold increase in computing power and hence more mobility of
information.
3. Shifts in computing paradigm
For some, computing today is radically different from early experiences. In fact, we have seen three major waves of computing…
host-centric, client/server and network-centric.
Host-centric, or "tops-down" computing, dominated the environment for the past twenty years. The focus was on the physical
enterprise, with a specific behavior pattern:
Buy a computer system;
Write applications;
Define the reports needed;
4. Develop fixed screens to display the results;
Operate over a private, wire network.
We still see host-centric computing among administrative applications in some of the institutions and businesses; operate their
institutional research or registration offices with a specific computer, using applications written in-house. Creation of reports is fixed
by the application, a new program must be written to generate a new report.
Today a distributed client/server model is prevalent. The focus is the distributed enterprise with a different behavior pattern:
Buy individual "client" units;
Purchase applications;
Use windowing to view information;
Operate over private wire local area networks or mixed private and public switched networks.
The client/server architecture has enabled organizations to do a great deal of "mixing and matching" to suit individual needs. An
example of this pattern is in purchasing client machines. People are buying CPUs separate from memory. Specific hard drive sizes
are ordered. Memory modules may be different. Connectivity is a mix. Customization is the rule rather than the exception.
Applications are no longer written in-house; they are purchased. Information is viewed through a windowing system, whether
Windows, OS/2, Mac operating system, or something else. Users tile their windows to view what they need.
The next step is network-centric computing. The behavior pattern changes again:
multi-source hardware platforms;
subscriptions for software rather than purchase;
human-centered, multi-form factors;
public switched infrastructure, both wired and wireless.
Hardware comes from many sources. The network contains your applications as well as the data. The network is, in fact, your
application. Software need no longer be purchased and installed on your computer. When you connect to the network, you access
the latest version of the software for which you have a subscription.
The network’s technical characteristics will be of little concern to its users. Its presence will be assumed. The vendors and the
technologies that enable service will be in the background. It will not matter what the topology is, where the server is located, or
whether the connection is facilitated by wire or wireless technology. From your computer, you will have access to the resources you
want and need.
In spite of its importance, the network is "dumb": It is unaware of individual computing needs and preferences. It is merely a
transport vehicle. Yet, one individual’s computing needs are differentthan another person’s. The "personalization" of your computing
interface will reside in the software.
Advances in computing technologies, such as high-resolution displays, 3-D graphics and animation, handwriting and speech input,
and natural language understanding will be used to improve the end-user interface, to facilitate personal interaction and
customization with computers. This will enable new interaction models, including:
Intuitive, task-tailored interfaces;
Virtual reality environments;
Mobile, Hands-free, and Eyes-free use;
Intelligent agents that will isolate users from the details of the infrastructure but will carry out tasks tailored by the user;
and Easier searching techniques.
Personal computers are in the phase of general purpose use today. PCs are used for many purposes: word processing, electronic
communications, spread sheets, graphics, multimedia, etc. The PC is highly adaptable because of the range of applications used to
tailor its functionality.
5. Yet to obtain this functionality, users are required to purchase specific software packages as well as upgrade hardware and
operating systems, and keep up with new versions of the applications. Over the next few years, the PC will move into another phase
of evolution, that of being an "appliance."
The "appliance" phase is characterized by a "thin-client, fat-server" model. In this scenario, code does not permanently reside on the
client, it resides on a server. When the user needs an application, it is accessed through the network and executed on the client
machine.
4. Application Software
ap·pli·ca·tion-noun
1. the act of putting to a special use or purpose: the application of common sense to a problem.
2. the special use or purpose to which something is put: a technology having numerous applications never thought of by
its inventors.
3. the quality of being usable for a particular purpose or in a special way; relevance: This has no application to the case.
Application software is a subclass of computer software that employs the capabilities of a computer directly and
thoroughly to a task that the user wishes to perform.
This should be contrasted with system software which is involved in integrating a computer's various capabilities, but
typically does not directly apply them in the performance of tasks that benefit the user.
In this context the term application refers to both the application software and its implementation. A simple, but may not be
perfect analogy in the world of hardware would be the relationship of an electric light bulb (an application) to an electric
power generation plant (a system).
The power plant merely generates electricity, not itself of any real use until harnessed to an application like the electric
light that performs a service that benefits the user. Typical examples of software applications are word processors, spread
sheets, and media players. Multiple applications bundled together as a package are sometimes referred to as an
application suite. Some might bundle together a word processor, a spreadsheet, and several other discrete applications.
The separate applications in a suite usually have a user interface that has some commonality making it easier for the user
to learn and use each application. And often they may have some capability to interact with each other in ways beneficial
to the user.
For example, a spreadsheet might be able to be embedded in a word processor document even though it had been
created in the separate spreadsheet application. User-written software tailors systems to meet the user's specific needs.
User-written software includes spreadsheet templates, word processor macros, scientific simulations, graphics and
animation scripts.
Even email filters are a kind of user software. Users create this software themselves and often overlook how important it
is.
In some types of embedded systems, the application software and the operating system software may be
indistinguishable to the user, as in the case of software used to control a VCR, DVD player or Microwave Oven.
4.1 List of common applications
I.
Word processing
o
o
Microsoft Word
Lotus Word Pro
6. II.
Spreadsheets
o
o
Microsoft Excel
Lotus 123
III.
Databases
o
o
Microsoft Access
Lotus Approach
IV.
Presentation
o
Microsoft PowerPoint
V.
Accounts / Payroll
o
Sage
VI.
Web browsing
o
o
Microsoft Internet Explorer
Mozilla Firefox
VII.
Web authoring
o
Microsoft FrontPage
VIII.
CAD & CAM
o
AutoCAD
IX.
System Management
I.
II.
HP Open View
IBM System Director
5. Side Bar
PARC developed concepts with the potential for office use by non experts. PARC took Doug Engelbart's work at Stanford as a
basis for the development of graphical user interfaces (GUI). PARC developed this to the point of production, along with a pointing
device (mouse), bitmapping of images, page editors and WYSIWYG (What You See Is What You Get) computing. It also produced
OOP (Object-oriented programming) by writing a new programming language, Smalltalk.
PARC CSL (Palo Alto Research Center - Computer Science Laboratory) invented the first high speed networks, laser printers and
with the Xerox Alto, the first computer with a GUI. This machine had a B&W bitmapped screen, mouse and hard disk data storage.
However, the machine was not placed into production. At the time of its creation in 1973 it would have required a price tag of
$25000 in order for Xerox to make money.
There was no "killer app" written for it.
7. 6. Transforming Data into Information
Example 1:
Here is a form for student data.
Say, after clicking on submit button we get the following data….
Student Data
First name: Rohit
Second name: kk
Number of courses studied in 2004: 3
Previous courses: Y343 X444 Z555
Number of credits studied in 2004: 60
Reasons for study are: For professional development
Here is another form ……
8. Think, after clicking on submit button you get this:
Information about Rohit kk
Rohit is a continuing student at UPES
In the case of first form we entered the data, “data collected” and when we pressed the submit button the data is “stored & operated"
upon by a program; program could be a Java Script embedded in a webpage. The output simply reflected the values we entered.
With second form, the data was operated in such a way to display some information about a student, whether he/she is a new
student at UPES. Bottom of Form
Here the “program” that is the JavaScript is called the “application software or IT application”.
Example 2:
Another example we can look at is the smart card system where application software and hardware components require
interoperability.
In today’s world, all of us probably use a credit card-sized plastic card for one reason or another almost daily. Among these are
credit cards, debit cards or automatic teller machine (ATM) cards, in mass transit, for identification, not to mention cards to access
buildings or specific rooms.
A smart card, typically a type of chip card, is a plastic card that contains an embedded computer chip–either a memory or
microprocessor type–that stores and transacts data. This data is usually associated with either value, information, or both and is
stored and processed within the card's chip. The card data is transacted via a reader that is part of a computing system. Systems
that are enhanced with smart cards are in use today throughout several key applications, including healthcare, banking,
entertainment, and transportation. All applications can benefit from the added features and security that smart cards provide.
The microprocessor on the smart card is there for security. The host computer and card reader actually "talk" to the microprocessor.
The microprocessor enforces access to the data on the card. If the host computer can read and write the smart card's random
access memory (RAM), it would be no different than a diskette.
Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit
microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The
processor uses a limited instruction set for applications such as cryptography.
So we need applications to transform the data residing on smart cards for appropriate usage like,
9. Security solutions for electronic banking platform using 3DES and PKI cryptography, ensuring secured financial transactions.
Security solutions for mobile payments using SIM/WIM cards.
Campus card solutions used to store and manage identification, access control, attendance monitoring, marks card and e-cash
based payment information.
Security solutions using smart card as a copy protection device for software. Solutions for distributors and retailers of consumer
goods.
Solutions for vehicle dealers to keep track of all services and repairs done for a vehicle, along with loyalty points accrued
Readers and terminals operate with smart cards to obtain information that is contained in the card and perform a transaction.
Generally, a reader interfaces with a PC for the majority of its processing requirements. A terminal is a self-contained processing
device. Both readers and terminals read and write to smart cards.
A separate and distinct software application is required, that interacts with the data and service from the card. The data is processed
in varying environments where interoperability of application software as well as hardware components is a must; otherwise data will
get blocked in the network and becomes useless.
In the upcoming chapters we will see how IT Applications are made interoperable in different industry verticals by adhering to open
standards and also how open standards are governed by standard setting organisation.
8. Disclaimer
The contents of this report reflect the views of the author and do not necessarily reflect the official views or policy of the International
Business Machines Corporation in the United States and/or other countries. This report does not constitute a standard, specification
or regulation.
IBM is a registered trademark of International Business Machines Corporation in the United States and/or other countries.
Other company, product, and service names may be trademarks or service marks of others.
Microsoft is a registered trademark of Microsoft Corporation